TVs. Consoles. Projectors and accessories. Technologies. Digital TV

Beginner php programmer or how to start earning money. Instructions for using jSQL Injection - a multifunctional tool for searching and exploiting SQL injections in Kali Linux Companies inurl img php id

Any search for vulnerabilities on web resources begins with reconnaissance and information collection.
Intelligence can be either active - brute force of files and directories of the site, running vulnerability scanners, manually browsing the site, or passive - searching for information in different search engines. Sometimes it happens that a vulnerability becomes known even before opening the first page of the site.

How is this possible?
Search robots, constantly roaming the Internet, in addition to information useful to the average user, often record things that can be used by attackers to attack a web resource. For example, script errors and files with sensitive information (from configuration files and logs to files with authentication data and database backups).
From the point of view of a search robot, an error message about executing an sql query is plain text, inseparable, for example, from the description of products on the page. If suddenly a search robot came across a file with the .sql extension, which for some reason ended up in the site’s working folder, then it will be perceived as part of the site’s content and will also be indexed (including, possibly, the passwords specified in it).

Such information can be found by knowing strong, often unique, keywords that help separate “vulnerable pages” from pages that do not contain vulnerabilities.
A huge database of special queries using keywords (so-called dorks) exists on exploit-db.com and is known as the Google Hack Database.

Why google?
Dorks are primarily targeted at Google for two reasons:
− the most flexible syntax of keywords (shown in Table 1) and special characters (shown in Table 2);
− the Google index is still more complete than that of other search engines;

Table 1 - Main Google keywords

Keyword
Meaning
Example
site
Search only on the specified site. Only takes into account url
site:somesite.ru - will find all pages on a given domain and subdomains
inurl
Search by words present in the uri. Unlike cl. words “site”, searches for matches after the site name
inurl:news - finds all pages where the given word appears in the uri
intext
Search in the body of the page
intext:”traffic jams” - completely similar to the usual request for “traffic jams”
intitle
Search in the page title. Text between tags <br></td> <td width="214">intitle:”index of” - will find all pages with directory listings <br></td> </tr><tr><td width="214">ext <br></td> <td width="214">Search for pages with a specified extension <br></td> <td width="214">ext:pdf - finds all pdf files <br></td> </tr><tr><td width="214">filetype <br></td> <td width="214">Currently, completely similar to class. the word “ext” <br></td> <td width="214">filetype:pdf - similar <br></td> </tr><tr><td width="214">related <br></td> <td width="214">Search for sites with similar topics <br></td> <td width="214">related:google.ru - will show its analogues <br></td> </tr><tr><td width="214">link <br></td> <td width="214">Search for sites that link to this <br></td> <td width="214">link:somesite.ru - will find all sites that have a link to this <br></td> </tr><tr><td width="214">define <br></td> <td width="214">Show word definition <br></td> <td width="214">define:0day - definition of the term <br></td> </tr><tr><td width="214">cache <br></td> <td width="214">Show page contents in cache (if present) <br></td> <td width="214">cache:google.com - will open a cached page <br></td> </tr></tbody></table><p>Table 2 - Special characters for Google queries <br></p><table><tbody><tr><td width="214"><b>Symbol</b><br></td> <td width="214"><b>Meaning</b><br></td> <td width="214"><b>Example</b><br></td> </tr><tr><td width="214">“<br></td> <td width="214">Exact phrase <br></td> <td width="214">intitle:“RouterOS router configuration page” - search for routers <br></td> </tr><tr><td width="214">*<br></td> <td width="214">Any text <br></td> <td width="214">inurl: “bitrix*mcart” - search for sites on bitrix with a vulnerable mcart module <br></td> </tr><tr><td width="214">.<br></td> <td width="214">Any character <br></td> <td width="214">Index.of - similar to the index of request <br></td> </tr><tr><td width="214">-<br></td> <td width="214">Delete a word <br></td> <td width="214">error -warning - show all pages that have an error but no warning <br></td> </tr><tr><td width="214">..<br></td> <td width="214">Range <br></td> <td width="214">cve 2006..2016 - show vulnerabilities by year starting from 2006 <br></td> </tr><tr><td width="214">|<br></td> <td width="214">Logical "or" <br></td> <td width="214">linux | windows - show pages where either the first or second word appears <br></td> </tr></tbody></table><br>It is worth understanding that any request to a search engine is a search only by words. <br>It is useless to look for meta-characters on the page (quotes, parentheses, punctuation marks, etc.). Even a search for the exact phrase specified in quotation marks is a word search, followed by a search for an exact match in the results. <p>All Google Hack Database dorks are logically divided into 14 categories and are presented in Table 3. <br>Table 3 – Google Hack Database Categories <br></p><table><tbody><tr><td width="168"><b>Category</b><br></td> <td width="190"><b>What allows you to find</b><br></td> <td width="284"><b>Example</b><br></td> </tr><tr><td width="168">Footholds <br></td> <td width="190">Web shells, public file managers <br></td> <td width="284">Find all hacked sites where the listed webshells are uploaded: <br>(intitle:"phpshell" OR intitle:"c99shell" OR intitle:"r57shell" OR intitle:"PHP Shell" OR intitle:"phpRemoteView") `rwx` "uname" <br></td> </tr><tr><td width="168">Files containing usernames <br></td> <td width="190">Registry files, configuration files, logs, files containing the history of entered commands <br></td> <td width="284">Find all registry files containing account information: <br><i>filetype:reg reg +intext:“internet account manager”</i><br></td> </tr><tr><td width="168">Sensitive Directories <br></td> <td width="190">Directories with various information (personal documents, vpn configs, hidden repositories, etc.) <br></td> <td width="284">Find all directory listings containing VPN-related files: <br><i>"Config" intitle:"Index of" intext:vpn</i><br>Sites containing git repositories: <br><i>(intext:"index of /.git") ("parent directory")</i><br></td> </tr><tr><td width="168">Web Server Detection <br></td> <td width="190">Version and other information about the web server <br></td> <td width="284">Find JBoss server administrative consoles: <br><i>inurl:"/web-console/" intitle:"Administration Console"</i><br></td> </tr><tr><td width="168">Vulnerable Files <br></td> <td width="190">Scripts containing known vulnerabilities <br></td> <td width="284">Find sites that use a script that allows you to upload an arbitrary file from the server: <br><i>allinurl:forcedownload.php?file=</i><br></td> </tr><tr><td width="168">Vulnerable Servers <br></td> <td width="190">Installation scripts, web shells, open administrative consoles, etc. <br></td> <td width="284">Find open PHPMyAdmin consoles running as root: <br><i>intitle:phpMyAdmin "Welcome to phpMyAdmin ***" "running on * as root@*"</i><br></td> </tr><tr><td width="168">Error Messages <br></td> <td width="190">Various errors and warnings often reveal important information - from CMS version to passwords <br></td> <td width="284">Sites that have errors in executing SQL queries to the database: <br><i>"Warning: mysql_query()" "invalid query"</i><br></td> </tr><tr><td width="168">Files containing juicy info <br></td> <td width="190">Certificates, backups, emails, logs, SQL scripts, etc. <br></td> <td width="284">Find initialization sql scripts: <br><i>filetype:sql and “insert into” -site:github.com</i><br></td> </tr><tr><td width="168">Files containing passwords <br></td> <td width="190">Anything that can contain passwords - logs, sql scripts, etc. <br></td> <td width="284">Logs mentioning passwords: <br><i>filetype:</i><i>log</i><i>intext:</i><i>password |</i><i>pass |</i><i>pw</i><br>sql scripts containing passwords: <br><i>ext:</i><i>sql</i><i>intext:</i><i>username</i><i>intext:</i><i>password</i><br></td> </tr><tr><td width="168">Sensitive Online Shopping Info <br></td> <td width="190">Information related to online purchases <br></td> <td width="284">Find pincodes: <br><i>dcid=</i><i>bn=</i><i>pin</i><i>code=</i><br></td> </tr><tr><td width="168">Network or vulnerability data <br></td> <td width="190">Information not directly related to the web resource, but affecting the network or other non-web services <br></td> <td width="284">Find automatic proxy configuration scripts containing information about the internal network: <br><i>inurl:proxy | inurl:wpad ext:pac | ext:dat findproxyforurl</i><br></td> </tr><tr><td width="168">Pages containing login portals <br></td> <td width="190">Pages containing login forms <br></td> <td width="284">saplogon web pages: <br><i>intext:"2016 SAP AG. All rights reserved." intitle:"Logon"</i><br></td> </tr><tr><td width="168">Various Online Devices <br></td> <td width="190">Printers, routers, monitoring systems, etc. <br></td> <td width="284">Find the printer configuration panel: <br><i>intitle:"</i><i>hp</i><i>laserjet"</i><i>inurl:</i><i>SSI/</i><i>Auth/</i><i>set_</i><i>config_</i><i>deviceinfo.</i><i>htm</i><br></td> </tr><tr><td width="168">Advisories and Vulnerabilities <br></td> <td width="190">Websites on vulnerable CMS versions <br></td> <td width="284">Find vulnerable plugins through which you can upload an arbitrary file to the server: <br><i>inurl:fckeditor -intext:"ConfigIsEnabled = False" intext:ConfigIsEnabled</i><br></td> </tr></tbody></table><br>Dorks are more often focused on searching across all Internet sites. But nothing prevents you from limiting the search scope on any site or sites. <br>Each Google query can be focused on a specific site by adding the keyword “site:somesite.com” to the query. This keyword can be added to any dork. <p><b>Automating the search for vulnerabilities</b><br>This is how the idea was born to write a simple utility that automates the search for vulnerabilities using a search engine (google) and relies on the Google Hack Database.</p><p>The utility is a script written in nodejs using phantomjs. To be precise, the script is interpreted by phantomjs itself. <br>Phantomjs is a full-fledged web browser without a GUI, controlled by js code and with a convenient API. <br>The utility received a completely understandable name - dorks. By running it on the command line (without options), we get short help with several examples of use: <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/edd/6fb/ccc/edd6fbccc5ec340abe750f3073c1b427.jpg' width="100%" loading=lazy loading=lazy><br>Figure 1 - List of main dorks options</p><p>The general syntax of the utility is: dork “command” “option list”. <br>A detailed description of all options is presented in Table 4.</p><p>Table 4 - Dorks syntax <br></p><table border="1"><tbody><tr><td width="214"><b>Team</b><br></td> <td width="214"><b>Option</b><br></td> <td width="214"><b>Description</b><br></td> </tr><tr><td rowspan="4" width="214">ghdb <br></td> <td width="214">-l <br></td> <td width="214">Print a numbered list of dork categories Google Hack Database <br></td> </tr><tr><td width="214">-c “category number or name” <br></td> <td width="214">Load doors of the specified category by number or name <br></td> </tr><tr><td width="214">-q "phrase" <br></td> <td width="214">Download dorks found by request <br></td> </tr><tr><td width="214">-o "file" <br></td> <td width="214">Save the result to a file (only with -c|-q options) <br></td> </tr><tr><td rowspan="8" width="214">google <br></td> <td width="214">-d "dork" <br></td> <td width="214">Set an arbitrary dork (the option can be used many times, combination with the -D option is allowed) <br></td> </tr><tr><td width="214">-D "file" <br></td> <td width="214">Use dorks from file <br></td> </tr><tr><td width="214">-s "site" <br></td> <td width="214">Set site (option can be used many times, combination with option -S is allowed) <br></td> </tr><tr><td width="214">-S "file" <br></td> <td width="214">Use sites from a file (dorks will be searched for each site independently) <br></td> </tr><tr><td width="214">-f "filter" <br></td> <td width="214">Set additional keywords (will be added to each dork) <br></td> </tr><tr><td width="214">-t "number of ms" <br></td> <td width="214">Interval between requests to google <br></td> </tr><tr><td width="214">-T "number of ms" <br></td> <td width="214">Timeout if a captcha is encountered <br></td> </tr><tr><td width="214">-o "file" <br></td> <td width="214">Save the result to a file (only those tracks for which something was found will be saved) <br></td> </tr></tbody></table><br>Using the ghdb command, you can get all the dorks from exploit-db by arbitrary request, or specify the entire category. If you specify category 0, the entire database will be unloaded (about 4.5 thousand dorks). <p>The list of categories currently available is presented in Figure 2. <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/b8f/b11/ffe/b8fb11ffeaced5066fd2fd9e43be67fb.jpg' width="100%" loading=lazy loading=lazy></p><p>Figure 2 - List of available GHDB dork categories</p><p>The google team will substitute each dork into the google search engine and analyze the result for matches. The paths where something was found will be saved to a file. <br>The utility supports different search modes: <br>1 dork and 1 site; <br>1 dork and many sites; <br>1 site and many dorks; <br>many sites and many dorks; <br>The list of dorks and sites can be specified either through an argument or through a file.</p><p><b>Demonstration of work</b><br>Let's try to look for any vulnerabilities using the example of searching for error messages. By command: dorks ghdb –c 7 –o errors.dorks all known dorks of the “Error Messages” category will be loaded as shown in Figure 3. <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/28c/386/641/28c386641d1528652f7f8e8b8089097a.jpg' width="100%" loading=lazy loading=lazy><br>Figure 3 – Loading all known dorks of the “Error Messages” category</p><p>Dorks are downloaded and saved to a file. Now all that remains is to “set” them on some site (see Figure 4). <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/8e0/a8a/3af/8e0a8a3af4f26544da1faa584813dbff.jpg' width="100%" loading=lazy loading=lazy><br>Figure 4 – Search for vulnerabilities of the site of interest in the Google cache</p><p>After some time, several pages containing errors are discovered on the site under study (see Figure 5).</p><p><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/10b/e83/ba3/10be83ba38f172213ba06b3f9ad05a58.jpg' width="100%" loading=lazy loading=lazy><br>Figure 5 – Error messages found</p><p>As a result, in the file result.txt we get a complete list of dorks that lead to the error. <br>Figure 6 shows the result of searching for site errors. <br><br>Figure 6 – Error search result</p><p>The cache for this dork displays a complete backtrace, revealing the absolute paths of the scripts, the site content management system and the database type (see Figure 7). <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/0a9/455/588/0a9455588496d6609f5e13d598cb5a48.jpg' width="100%" loading=lazy loading=lazy><br>Figure 7 – disclosure of information about the site design</p><p>However, it is worth considering that not all dorks from GHDB give true results. Also, Google may not find an exact match and show a similar result.</p><p>In this case, it is wiser to use your personal list of dorks. For example, it is always worth looking for files with “unusual” extensions, examples of which are shown in Figure 8. <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/d7f/865/693/d7f865693f7fcf13137598eeed0ecb58.jpg' width="100%" loading=lazy loading=lazy><br>Figure 8 – List of file extensions that are not typical for a regular web resource</p><p>As a result, with the command dorks google –D extensions.txt –f bank, from the very first request Google begins to return sites with “unusual” file extensions (see Figure 9). <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/107/e1f/a2f/107e1fa2f41c4169bcc254cba2f2f4b6.jpg' width="100%" loading=lazy loading=lazy><br>Figure 9 – Search for “bad” file types on banking websites</p><p>It is worth keeping in mind that Google does not accept queries longer than 32 words.</p><p>Using the command dorks google –d intext:”error|warning|notice|syntax” –f university <br>You can look for PHP interpreter errors on educational websites (see Figure 10). <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/717/74f/e36/71774fe3656bfc058c42d43262fdec4a.jpg' width="100%" loading=lazy loading=lazy><br>Figure 10 – Finding PHP runtime errors</p><p>Sometimes it is not convenient to use one or two categories of dorks. <br>For example, if it is known that the site runs on the Wordpress engine, then we need WordPress-specific modules. In this case, it is convenient to use the Google Hack Database search. The command dorks ghdb –q wordpress –o wordpress_dorks.txt will download all dorks from Wordpress, as shown in Figure 11: <br><br><img src='https://i1.wp.com/habrastorage.org/getpro/habr/post_images/dcb/ac9/a4e/dcbac9a4eb12f6ec775d9cccc2fdee87.jpg' width="100%" loading=lazy loading=lazy><br>Figure 11 – Search for Dorks related to Wordpress</p><p>Let's go back to the banks again and use the command dorks google –D wordpress_dords.txt –f bank to try to find something interesting related to Wordpress (see Figure 12). <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/042/0c2/c43/0420c2c435931704288b171f725ccc6a.jpg' width="100%" loading=lazy loading=lazy><br>Figure 12 – Search for Wordpress vulnerabilities</p><p>It is worth noting that the search on Google Hack Database does not accept words shorter than 4 characters. For example, if the site's CMS is not known, but the language is known - PHP. In this case, you can filter what you need manually using the pipe and the system search utility dorks –c all | findstr /I php > php_dorks.txt (see Figure 13): <br><br><img src='https://i0.wp.com/habrastorage.org/getpro/habr/post_images/4c1/2f8/6e1/4c12f86e111074293c14d6a939c6ebab.jpg' width="100%" loading=lazy loading=lazy><br>Figure 13 – Search all dorks where PHP is mentioned</p><p>Searching for vulnerabilities or some sensitive information in a search engine should only be done if there is a significant index on this site. For example, if a site has 10-15 pages indexed, then it’s stupid to search for anything in this way. Checking the index size is easy - just enter “site:somesite.com” into the Google search bar. An example of a site with an insufficient index is shown in Figure 14. <br><br><img src='https://i2.wp.com/habrastorage.org/getpro/habr/post_images/78e/1db/b4f/78e1dbb4fc78cd422cec311fc2ca9d33.jpg' width="100%" loading=lazy loading=lazy><br>Figure 14 – Checking the site index size</p><p>Now about the unpleasant... From time to time Google may request a captcha - there is nothing you can do about it - you will have to enter it. For example, when searching through the “Error Messages” category (90 dorks), the captcha appeared only once.</p><p>It’s worth adding that phantomjs also supports working through a proxy, both via http and socks interface. To enable proxy mode, you need to uncomment the corresponding line in dorks.bat or dorks.sh.</p><p>The tool is available as source code</p> <p><b>Well:</b> <span><b>“Earn money on your own service via e-mail newsletters”</b> </span>. Draining a closed pool for 33 thousand rubles. There are different reviews at the warehouse. Based on the reviews, the course is not suitable for everyone, but only for those who have already encountered similar courses or mailings. Sent the material <b>anonymous user</b><span><b>with comment:</b> </span>« <i>I'm draining this course because I was banned from the warehouse for no reason. Regarding the course, I will say one thing that it is suitable for small mailings. Beginners will not understand anything, but they can watch it to get acquainted. The reviews are different, I refrained from commenting. If you want to learn how to send letters en masse, go to Shelest, he will help you. I studied with him, and bought this course only for general development. I hope it will be useful to someone.</i>» <span><b>Material may be removed at the request of the copyright holder!</b> </span> We evaluate</p> <p><b>Course Description:</b> </p> <p>A unique author's course of video lessons Quick start technology in email campaigns - How to send email letters in large volumes to “potential” clients. With the advent of the trend to develop business through the Internet and the constant increase in the number of active Internet users, various training courses began to appear, both for beginners and advanced users. This course is intended for everyone who is interested in how to effectively get traffic and sales without spending huge amounts of money on it. The most effective and convenient tool for online sales is the promotion of services and products using email (e-mail marketing).</p> <p>To organize professional e-mail marketing, and not just mass mailing, it is necessary to develop a systematic approach, collect a subscriber base, automate this process to increase stable profits, generate statistics and other tasks that are difficult to complete without professional help. In this course, as a quick start technology for email newsletters, it is proposed to send letters via VDS servers. Why pay a lot of money for mailing services if you can set it up yourself? And get the opportunity to send anyone, anything in large volumes of letters to your clients. This course will help you set up a VDS server for automatically sending letters and creating professional e-mail marketing, while any user can configure it simply by repeating the step-by-step instructions from the author’s video course. Cool tools best practices! The beauty of SET is that it is written in Python and does not require any third-party Python modules that would have to be installed additionally. Work is carried out through an interactive menu, where you only need to select the desired items of the application. At each step, the menu is accompanied by a good description of the proposed sub-items, so even a child can handle it (this is where it gets a little scary) But in some situations it is simply necessary to tune the toolkit itself, and for this you will have to refer to the settings file.</p> <p><b>What you will learn from the course:</b> </p> <ul><li>Setting up vds for email campaigns</li> <li>How to bypass spam filters. Reasons why letters end up in spam</li> <li>How to easily and quickly uniqueize emails</li> <li>How to collect 100% working and live e-mail addresses, and not just addresses, but e-mails</li> <li>addresses of your target audience</li> <li>How to work with SMTP and how to raise SMTP servers</li> <li>Get all the software you need</li> <li>How to earn money by sending letters, which affiliate programs to work with</li> <li>Generating a template and then uploading it to the VDS server(s)</li> <li>Extract email, scan inurl (readme.txt)</li> <li>Creating databases - cleaning, breaking down, removing duplicate emails</li> </ul> <p>Run the downloaded file by double clicking (you need to have a virtual machine).</p> <h2>3. Anonymity when checking a site for SQL injection <br></h2> <h3>Setting up Tor and Privoxy in Kali Linux <br></h3> <p>[Section under development]</p> <h3>Setting up Tor and Privoxy on Windows <br></h3> <p>[Section under development]</p> <h3>Proxy settings in jSQL Injection <br></h3> <p>[Section under development]</p> <p><img src='https://i2.wp.com/hackware.ru/wp-content/uploads/2015/12/02.jpg' width="100%" loading=lazy loading=lazy></p> <h2>4. Checking the site for SQL injection with jSQL Injection <br></h2> <p>Working with the program is extremely simple. Just enter the website address and press ENTER.</p> <p>The following screenshot shows that the site is vulnerable to three types of SQL injections at once (information about them is indicated in the lower right corner). By clicking on the names of injections you can switch the method used:</p> <p><img src='https://i0.wp.com/hackware.ru/wp-content/uploads/2015/12/03.jpg' width="100%" loading=lazy loading=lazy></p> <p>Also, the existing databases have already been displayed to us.</p> <p>You can view the contents of each table:</p> <p><img src='https://i0.wp.com/hackware.ru/wp-content/uploads/2015/12/04.jpg' width="100%" loading=lazy loading=lazy></p> <p>Typically, the most interesting thing about tables is the administrator credentials.</p> <p>If you are lucky and you find the administrator’s data, then it’s too early to rejoice. You still need to find the admin panel where to enter this data.</p> <h2>5. Search for admin panels with jSQL Injection <br></h2> <p>To do this, go to the next tab. Here we are greeted with a list of possible addresses. You can select one or more pages to check:</p> <p><img src='https://i1.wp.com/hackware.ru/wp-content/uploads/2015/12/05.jpg' width="100%" loading=lazy loading=lazy></p> <p>The convenience lies in the fact that you do not need to use other programs.</p> <p>Unfortunately, there are not very many careless programmers who store passwords in clear text. Quite often in the password line we see something like</p> <p>8743b52063cd84097a65d1633f5c74f5</p> <p>This is a hash. You can decrypt it using brute force. And... jSQL Injection has a built-in brute forcer.</p> <h2>6. Brute force hashes using jSQL Injection <br></h2> <p>The undoubted convenience is that you do not need to look for other programs. There is support for many of the most popular hashes.</p> <p>This is not the best option. In order to become a guru in decoding hashes, the Book “” in Russian is recommended.</p> <p>But, of course, when there is no other program at hand or there is no time to study, jSQL Injection with its built-in brute force function will come in very handy.</p> <p><img src='https://i1.wp.com/hackware.ru/wp-content/uploads/2015/12/06.jpg' width="100%" loading=lazy loading=lazy></p> <p>There are settings: you can set which characters are included in the password, the password length range.</p> <h2>7. File operations after detecting SQL injections <br></h2> <p>In addition to operations with databases - reading and modifying them, if SQL injections are detected, the following file operations can be performed:</p> <ul><li>reading files on the server</li> <li>uploading new files to the server</li> <li>uploading shells to the server</li> </ul><p>And all this is implemented in jSQL Injection!</p> <p>There are restrictions - the SQL server must have file privileges. Smart system administrators have them disabled and will not be able to gain access to the file system.</p> <p>The presence of file privileges is quite simple to check. Go to one of the tabs (reading files, creating a shell, uploading a new file) and try to perform one of the specified operations.</p> <p>Another very important note - we need to know the exact absolute path to the file with which we will work - otherwise nothing will work.</p> <p>Look at the following screenshot:</p> <p><img src='https://i1.wp.com/hackware.ru/wp-content/uploads/2015/12/07.jpg' width="100%" loading=lazy loading=lazy>To any attempt to operate on a file, we receive the following response: <b>No FILE privilege</b>(no file privileges). And nothing can be done here.</p> <p>If instead you have another error:</p><p>Problem writing into [directory_name]</p><p>This means that you incorrectly specified the absolute path where you want to write the file.</p> <p>In order to guess an absolute path, you need to at least know the operating system the server is running on. To do this, switch to the Network tab.</p> <p>Such a record (line <b>Win64</b>) gives us reason to assume that we are dealing with Windows OS:</p><p>Keep-Alive: timeout=5, max=99 Server: Apache/2.4.17 (Win64) PHP/7.0.0RC6 Connection: Keep-Alive Method: HTTP/1.1 200 OK Content-Length: 353 Date: Fri, 11 Dec 2015 11:48:31 GMT X-Powered-By: PHP/7.0.0RC6 Content-Type: text/html; charset=UTF-8</p><p>Here we have some Unix (*BSD, Linux):</p><p>Transfer-Encoding: chunked Date: Fri, 11 Dec 2015 11:57:02 GMT Method: HTTP/1.1 200 OK Keep-Alive: timeout=3, max=100 Connection: keep-alive Content-Type: text/html X- Powered-By: PHP/5.3.29 Server: Apache/2.2.31 (Unix)</p><p>And here we have CentOS:</p><p>Method: HTTP/1.1 200 OK Expires: Thu, 19 Nov 1981 08:52:00 GMT Set-Cookie: PHPSESSID=9p60gtunrv7g41iurr814h9rd0; path=/ Connection: keep-alive X-Cache-Lookup: MISS from t1.hoster.ru:6666 Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.4.37 X-Cache: MISS from t1.hoster.ru Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Date: Fri, 11 Dec 2015 12:08:54 GMT Transfer-Encoding: chunked Content-Type: text/html; charset=WINDOWS-1251</p><p>On Windows, a typical folder for sites is <b>C:\Server\data\htdocs\</b>. But, in fact, if someone “thought of” making a server on Windows, then, very likely, this person has not heard anything about privileges. Therefore, you should start trying directly from the C:/Windows/ directory:</p> <p><img src='https://i2.wp.com/hackware.ru/wp-content/uploads/2015/12/08.jpg' width="100%" loading=lazy loading=lazy></p> <p>As you can see, everything went fine the first time.</p> <p>But the jSQL Injection shells themselves raise doubts in my mind. If you have file privileges, then you can easily upload something with a web interface.</p> <h2>8. Bulk checking of sites for SQL injections <br></h2> <p>And even this function is available in jSQL Injection. Everything is extremely simple - download a list of sites (can be imported from a file), select those that you want to check and click the appropriate button to start the operation.</p> <p><img src='https://i2.wp.com/hackware.ru/wp-content/uploads/2015/12/09.jpg' width="100%" loading=lazy loading=lazy></p> <h2>Conclusion from jSQL Injection <br></h2> <p>jSQL Injection is a good, powerful tool for searching and then using SQL injections found on websites. Its undoubted advantages: ease of use, built-in related functions. jSQL Injection can be a beginner's best friend when analyzing websites.</p> <p>Among the shortcomings, I would note the impossibility of editing databases (at least I did not find this functionality). As with all GUI tools, one of the disadvantages of this program can be attributed to its inability to be used in scripts. Nevertheless, some automation is also possible in this program - thanks to the built-in function of mass site scanning.</p><p>established sample and <b>certificate</b>. For a special discount on any faculties and courses!</p> <h1>How to search correctly using google.com</h1> <p>Everyone probably knows how to use a search engine like Google =) But not everyone knows that if you correctly compose a search query using special constructions, you can achieve the results of what you are looking for much more efficiently and quickly =) In this article I will try to show that and what you need to do to search correctly</p><p>Google supports several advanced search operators that have special meaning when searching on google.com. Typically, these operators change the search, or even tell Google to do completely different types of searches. For example, the design <b>link:</b> is a special operator, and the request <u>link:www.google.com</u> will not give you a normal search, but will instead find all web pages that have links to google.com. <br>alternative request types</p><p><b>cache:</b> If you include other words in your query, Google will highlight those included words within the cached document. <br>For example, <u>cache:www.web site</u> will show the cached content with the word "web" highlighted.</p><p><b>link:</b> The search query above will show web pages that contain links to the specified query. <br>For example: <u>link:www.site</u> will display all pages that have a link to http://www.site</p><p><b>related:</b> Displays web pages that are “related” to the specified web page. <br>For example, <u>related: www.google.com</u> will list web pages that are similar to Google's home page.</p><p><b>info:</b> Query Information: will present some of the information Google has about the web page you are requesting. <br>For example, <u>info:website</u> will show information about our forum =) (Armada - Adult Webmasters Forum).</p><p><b>Other information requests</b> </p><p><b>define:</b> The define: query will provide a definition of the words you enter after it, collected from various online sources. The definition will be for the entire phrase entered (that is, it will include all words in the exact query).</p><p><b>stocks:</b> If you start a query with stocks: Google will process the rest of the query terms as stock symbols, and link to a page showing ready-made information for these symbols. <br>For example, <u>stocks:Intel yahoo</u> will show information about Intel and Yahoo. (Note that you should type breaking news symbols, not the company name)</p><p><b>Query Modifiers</b></p><p><b>site:</b> If you include site: in your query, Google will limit the results to those websites it finds in that domain. <br>You can also search by individual zones, such as ru, org, com, etc ( <u>site:com</u> <u>site:ru</u>) </p><p><b>allintitle:</b> If you run a query with allintitle:, Google will limit the results to all the query words in the title. <br>For example, <u>allintitle: google search</u> will return all Google pages by search such as images, Blog, etc</p><p><b>intitle:</b> If you include intitle: in your query, Google will limit the results to documents containing that word in the title. <br>For example, <u>intitle:Business</u></p><p><b>allinurl:</b> If you run a query with allinurl: Google will limit the results to all query words in the URL. <br>For example, <u>allinurl: google search</u> will return documents with google and search in the title. Also, as an option, you can separate words with a slash (/) then words on both sides of the slash will be searched within the same page: Example <u>allinurl: foo/bar</u></p><p><b>inurl:</b> If you include inurl: in your query, Google will limit the results to documents containing that word in the URL. <br>For example, <u>Animation inurl:site</u></p><p><b>intext:</b> searches only the specified word in the text of the page, ignoring the title and texts of links, and other things not related to. There is also a derivative of this modifier - <b>allintext:</b> those. further, all words in the query will be searched only in the text, which can also be important, ignoring frequently used words in links <br>For example, <u>intext:forum</u> </p><p><b>daterange:</b> searches in a time frame (daterange:2452389-2452389), dates for times are indicated in Julian format.</p><p><b>Well, and all sorts of interesting examples of queries</b> </p><p><u>Examples of writing queries for Google. For spammers</u> </p><p>Inurl:control.guest?a=sign</p><p>Site:books.dreambook.com “Homepage URL” “Sign my” inurl:sign</p><p>Site:www.freegb.net Homepage</p><p>Inurl:sign.asp “Character Count”</p><p>“Message:” inurl:sign.cfm “Sender:”</p><p>Inurl:register.php “User Registration” “Website”</p><p>Inurl:edu/guestbook “Sign the Guestbook”</p><p>Inurl:post “Post Comment” “URL”</p><p>Inurl:/archives/ “Comments:” “Remember info?”</p><p>“Script and Guestbook Created by:” “URL:” “Comments:”</p><p>Inurl:?action=add “phpBook” “URL”</p><p>Intitle:"Submit New Story"</p><p><u>Magazines</u> </p><p>Inurl:www.livejournal.com/users/ mode=reply</p><p>Inurl greatestjournal.com/ mode=reply</p><p>Inurl:fastbb.ru/re.pl?</p><p>Inurl:fastbb.ru /re.pl? "Guestbook"</p><p><u>Blogs</u> </p><p>Inurl:blogger.com/comment.g?”postID””anonymous”</p><p>Inurl:typepad.com/ “Post a comment” “Remember personal info?”</p><p>Inurl:greatestjournal.com/community/ “Post comment” “addresses of anonymous posters”</p><p>“Post comment” “addresses of anonymous posters” -</p><p>Intitle:"Post comment"</p><p>Inurl:pirillo.com “Post comment”</p><p><u>Forums</u> </p><p>Inurl:gate.html?”name=Forums” “mode=reply”</p><p>Inurl:”forum/posting.php?mode=reply”</p><p>Inurl:"mes.php?"</p><p>Inurl:”members.html”</p><p>Inurl:forum/memberlist.php?”</p> <p><i><b>From the author:</b> Hello friends! In this article we will talk about the PHP programming language. Let's find out what it is used for, what you can do with it, and what place it occupies in the stages of website development. Also in this article we will look at many ways to make money knowing how to program in PHP.</i></p> <h3>What is PHP and what is it for?</h3> <p>PHP is a scripting language that is very actively used in the development of web applications. PHP is one of the leading languages ​​used in developing dynamic websites.</p> <p>PHP is a server-side programming language. All scripts written in this language are executed on the server with the site. To study PHP, develop and debug websites and scripts, of course, you don’t have to buy a real server on the Internet. For these purposes, server emulators are used, which in the form of programs are simply installed on a working computer. And on the Internet server (hosting) ready-made websites and pages with PHP scripts are placed. By the way, almost all modern hosting supports the PHP language.</p> <p>The popularity of this language in the field of website building is determined by the presence of a large set of built-in tools for developing web applications. The main ones:</p> <p>automatic extraction of POST and GET parameters, as well as web server environment variables into predefined arrays;</p> <p>interaction with a large number of different database management systems (MySQL, MySQLi, SQLite, PostgreSQL, Oracle (OCI8), Oracle, Microsoft SQL Server, Sybase, ODBC, mSQL, IBM DB2, Cloudscape and Apache Derby, Informix, Ovrimos SQL, Lotus Notes , DB++, DBM, dBase, DBX, FrontBase, FilePro, Ingres II, SESAM, Firebird / InterBase, Paradox File Access, MaxDB, PDO Interface);</p> <p>automated sending of HTTP headers;</p> <p>working with cookies and sessions;</p> <p>working with local and remote files, sockets;</p> <p>processing files uploaded to the server;</p> <p>working with XForms.</p> <p><img src='https://i1.wp.com/webformyself.com/wp-content/uploads/2018/48/1.jpg' align="center" width="100%" loading=lazy loading=lazy></p> <p>Let's look at an example where the PHP script runs on the page. Take, for example, the subscription form in which you enter your name and email on many sites. HTML and CSS are responsible for the appearance of the form - the colors of the input fields and buttons, changing the color of the button when hovering and clicking on it, and so on. Using HTML5, you can check the correctness of the data entered into the form - for example, whether the email or phone fields are filled out correctly.</p> <p>And after you click the “Subscribe” button, a PHP script is called, which receives the data you entered into the form. The script records them in the database, generates and sends you a link to confirm your subscription to the email specified in the form, checks the subscription confirmation and sends you subsequent emails. All these operations are performed on the server, and this is done using the PHP programming language.</p> <h3>Application of PHP in website development</h3> <p>To create a website, you need to go through several stages:</p> <p>Planning. At this stage, we plan the future site: for whom and why are we making it, who will visit the site, what to fill it with, what should be on the site, and so on.</p> <p>Design. At the design stage, we create the appearance of the site pages in a graphic editor.</p> <p>Layout. At the layout stage, using HTML and CSS, we create the HTML pages of the future site from the layouts obtained at the design stage.</p> <p>Programming. At the programming stage, we automate the processes of working with the site. We program the administrative part of the site (admin panel) so that you can add, delete, edit existing pages even for a person completely unfamiliar with website building. We program so that the search and all subscription forms (if any) on the site work. We make sure that the newly added page is displayed on the site, and a link to the created page automatically appears in the menu. If the site uses voting or a survey, then this is also all programmed in PHP, at the programming stage.</p> <p><img src='https://i1.wp.com/webformyself.com/wp-content/uploads/2018/48/2.jpg' align="center" width="100%" loading=lazy loading=lazy></p> <p>If we consider the stage of programming a larger site, for example, an online store, then everything here is even broader and more interesting. In this case, we add not only pages, but also products - the main content of the online store. Moreover, in the admin panel you need to provide a breakdown of added products into various categories. It should also be possible to edit the product, change its description, price, picture, etc.</p> <p>In addition, an online store requires programming of an analytics system - so that you can see in the admin panel how many orders were placed and paid, for what amount, and what products were paid for from which categories, etc. Moreover, it should be possible to display such reports for various periods. When programming an online store, sales reporting for accounting and tax purposes is often also implemented.</p> <p>That is why the stage in which the PHP programming language is used is the most important, the longest in terms of time, and the most expensive and highly paid in website development. And once you understand how to program an online store, you will be able to create scripts for a website of almost any complexity.</p> <h3>Popularity of PHP</h3> <p>The popularity of PHP is evidenced by the fact that it is used by 83.1% of all sites where it was possible to identify a server-side programming language.</p> <p>All the most popular CMSs that occupy first places in popularity ratings (both paid and free: WordPress, Joomla, Drupal, Modx, Bitrix. Magento, etc.) are written in the PHP programming language.</p> <p>Also, the popularity of the PHP programming language is evidenced by the many created PHP frameworks, such as Laravel, Yii, CakePHP, Slim, Zend Framework 2, PHPixie, CodeIgniter, Symfony 2 and others. There are a huge number of forums and large communities - for PHP in general, for each framework and for each CMS separately. <br>I’ll also add that the world’s largest sites, for example, Facebook, Wikipedia, are also written in PHP.</p> <h3>How can you make money with knowledge of PHP?</h3> <p>Given the popularity of PHP, there is a constant high demand for PHP programmers. Having knowledge of PHP and being able to program in this language will open up new opportunities for earning money. Let's look at the main ones with which you can really make money today:</p> <p><img src='https://i2.wp.com/webformyself.com/wp-content/uploads/2018/48/3.jpg' align="center" width="100%" loading=lazy loading=lazy></p> <p>Earning money by developing scripts. All sites are constantly evolving, and they periodically require the writing of new scripts, or the development of additional functionality, modules, etc. For such developments, site owners turn to PHP developers. Moreover, in this case you can earn money in two ways:</p> <p>track orders to find a freelance developer;</p> <p>generate ideas for mass scripts. Having an idea for a script that will definitely be in demand among, for example, owners of online stores, you can independently develop such a script and sell it to online store owners;</p> <p>Finalization of ready-made scripts “to order”. Everything is simple here - you take on the modification or correction of a script. But in this case, there is a nuance - initially the script may not be made very well, and its refinement may take more time than writing a script from scratch. Therefore, if you use this method of earning money, initially look very carefully at what you will be modifying and completing.</p> <p>Development of plugins for CMS. In this method, everything is the same as when making money from scripts. Often, websites created on ready-made CMS require writing some kind of plugin, add-on or extension. And you can earn money here in two ways:</p> <p>track orders for the development of plugins, add-ons and extensions on a freelance basis;</p> <p>develop and sell a mass plugin that will definitely be in demand on most sites;</p> <p>Own and joint projects. If you have an idea for an Internet project (startup), for example, an idea for a useful service or application that would solve a specific problem, then you can start implementing it. At the initial stage, it can even be just as a hobby, in addition to your main job. Then, when it is clear that the hobby is growing into a big project, it will be possible to devote more time to it.</p> <p>Creation of dynamic websites and engines for them. You can also make good money by developing custom websites, working as a freelancer or in a web studio.</p> <p>Creating websites for yourself. You can create a website for yourself, fill it with useful content - and when the site has a sufficient number of visitors, start making money by placing paid advertising on it or promoting someone’s products through affiliate programs.</p> <p>I think many of you have thought that all of the above methods of earning money can be combined. And that's right! You can create a website for yourself and passively earn money by selling advertising from it, plus create a script or plugin and sell it on specialized sites, earning money on autopilot from each sale, and at the same time you can still work in a web studio. Why not? Of course you can!</p> <h3>How much can a PHP developer earn?</h3> <p>With the earnings of PHP programmers, everything is individual. A lot here depends on where to work, how to work, what level of knowledge, what experience, qualifications, what related additional knowledge the developer has, and so on. Therefore, in principle, there cannot be any exact figure here. But we can look at what salaries are offered when searching for PHP programmers in a web studio, and how much they are willing to pay for a project on freelance exchanges.</p> <p>The image below shows the proposed salary for PHP programmers in a web studio. Moreover, this is the salary for PHP programmers without work experience:</p> <p><img src='https://i2.wp.com/webformyself.com/wp-content/uploads/2018/48/4.jpg' align="center" width="100%" loading=lazy loading=lazy></p> <p>If you have work experience, you can earn much more. Below are the salaries offered to experienced PHP programmers.</p> <p><img src='https://i2.wp.com/webformyself.com/wp-content/uploads/2018/48/5.jpg' align="center" width="100%" loading=lazy loading=lazy></p> <p>And today you can also earn decent money from freelancing:</p> <p><img src='https://i2.wp.com/webformyself.com/wp-content/uploads/2018/48/6.jpg' align="center" width="100%" loading=lazy loading=lazy></p> <h3>Conclusion</h3> <p>PHP is the most popular programming language among web developers. The vast majority of all sites on the Internet are written in PHP. Having the knowledge and ability to develop in this programming language, you can earn good money, and there are many options for earning money - from working in a web studio to developing your own project or startup.</p> <script type="text/javascript"> <!-- var _acic={dataProvider:10};(function(){var e=document.createElement("script");e.type="text/javascript";e.async=true;e.src="https://www.acint.net/aci.js";var t=document.getElementsByTagName("script")[0];t.parentNode.insertBefore(e,t)})() //--> </script><br> <br> <script>document.write("<img style='display:none;' src='//counter.yadro.ru/hit;artfast_after?t44.1;r"+ escape(document.referrer)+((typeof(screen)=="undefined")?"": ";s"+screen.width+"*"+screen.height+"*"+(screen.colorDepth? screen.colorDepth:screen.pixelDepth))+";u"+escape(document.URL)+";h"+escape(document.title.substring(0,150))+ ";"+Math.random()+ "border='0' width='1' height='1' loading=lazy loading=lazy>");</script> <p style="text-align: center;"></p> <p> <div style="text-align: center; margin: 3px 0;"> </div> <div style="text-align: center; margin: 1px 0 5px;"> </div> </p><span class="adplacer_pro_adblock_end_post_content" style="display: none;width: 0;height: 0;"></span> </article> <div class="post-meta"> <div class="post-share"> <div class="post-share__title">Share with friends:</div> <script type="text/javascript" src="//yastatic.net/share2/share.js" charset="utf-8" async="async"></script><div class="ya-share2" data-services="vkontakte,facebook,odnoklassniki,gplus,twitter" data-counter=""></div> </div> </div> <div class="title">Related publications</div> <div class="yarpp-related"> <ul class="related-items"> <style> </style> <style> #perelink-horizontal{ vertical-align: top; margin: 0 -5px; text-align: left; } #perelink-horizontal .perelink-horizontal-item { vertical-align: top; display: inline-block; width: 230px; margin: 0 5px 10px; } #perelink-horizontal .perelink-horizontal-item a span { display: block; margin-top: 10px; } #perelink-horizontal img{ width:230px; height:150px; margin-bottom:10px; } </style> <div id="perelink-horizontal"> <div class="perelink-horizontal-item"> <a href="https://cammeteo.ru/en/kak-soedinit-tomy-rar-arhivov-kak-sobrat-arhiv-iz-chastei-samoraspakovyvayushchiisya-mnogotomnyi-arhiv/"> <img src="/uploads/0103be6e6c64c4491ae13829fb57f98e.jpg" height="150" width="230" loading=lazy loading=lazy> <span>How to assemble an archive from parts?</span> </a> </div> <div class="perelink-horizontal-item"> <a href="https://cammeteo.ru/en/planshet-nahodit-wifi-no-ne-podklyuchaetsya-planshet-ne-podklyuchaetsya-k/"> <img src="/uploads/4371166f72b573bf9aae57c620f7a100.jpg" height="150" width="230" loading=lazy loading=lazy> <span>The tablet does not connect to the Internet via wifi</span> </a> </div> <div class="perelink-horizontal-item"> <a href="https://cammeteo.ru/en/ustroistvo-usb-ne-opoznano-chto-delat-fleshka-chto-delat-esli/"> <img src="/uploads/db8f738021545806e010f93c22fcf30d.jpg" height="150" width="230" loading=lazy loading=lazy> <span>What to do if the USB device is not recognized</span> </a> </div> </div> </ul> </div> <div class="yarpp-related"> <ul class="related-items"> <li><img src="/images/dd45675d1468ecea73ab23198530af78ub-230x150.png" / loading=lazy loading=lazy> <a href="https://cammeteo.ru/en/zachem-soblyudat-pdd-5-prichin-kotorye-spasut-vashu-zhizn/" target="_blank" rel="nofollow noopener noreferrer">Why follow traffic rules: 5 reasons that will save your life</a></li> <li><img src="/images/1d517cb079ded120e6b9252be0f2718cub-230x150.png" / loading=lazy loading=lazy> <a href="https://cammeteo.ru/en/biometriya-pochemu-ona-mozhet-stat-vashejj-samojj-bolshojj-uyazvimostyu/" target="_blank" rel="nofollow noopener noreferrer">Biometrics: Why Could It Be Your Biggest Vulnerability?</a></li> <li><img src="/images/0d20b2bd18c15263d1e77834b61a4839ub-230x150.png" / loading=lazy loading=lazy> <a href="https://cammeteo.ru/en/innovacionnye-resheniya-ot-frigoglass-v-mire-holodilnyh-sistem/" target="_blank" rel="nofollow noopener noreferrer">Innovative solutions from Frigoglass in the world of refrigeration systems</a></li> </ul> </div> </main> <aside class="sidebar"> <div class="search-form ya-site-form ya-site-form_inited_no" onclick="return { 'bg': 'transparent', 'publicname': '\u041f\u043e\u0438\u0441\u043a \u043f\u043e cammeteo.ru', 'target': '_self', 'language': 'ru', 'suggest': true, 'tld': 'ru', 'site_suggest': true, 'action': '/search', 'webopt': false, 'fontsize': 12, 'arrow': false, 'fg': '#000000', 'searchid': '2265323', 'logo': 'rb', 'websearch': false, 'type': 2} "> <form action="/search" method="get" target="_self"> <input type="hidden" name="searchid" value="2265323"> <input type="hidden" name="l10n" value="ru"> <input type="hidden" name="reqenc" value=""> <input type="text" name="text" placeholder="Search the site:" class="search-form__field" value=""> <input type="submit" value="" class="search-form__button"> </form> </div> <div class="social-icon"> <a href="https://vk.com/share.php?url=https://cammeteo.ru/nachinayushchemu-php-programmistu-ili-kak-nachat-zarabatyvat-instrukciya/" target="_blank" class="vk">VKontakte</a> <a href="https://www.twitter.com/share?url=https%3A%2F%2Fcammeteo.ru%2Fen%2Fnachinayushchemu-php-programmistu-ili-kak-nachat-zarabatyvat-instrukciya" target="_blank" class="tw">Twitter</a> <a href="" target="_blank" class="gp">Google+</a> </div> <nav class="sidebar-menu section"><ul> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://cammeteo.ru/en/category/technology/">Technologies</a> </li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://cammeteo.ru/en/category/application/">Applications</a> </li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://cammeteo.ru/en/category/samsung/">Samsung</a> </li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://cammeteo.ru/en/category/iptv/">Iptv</a> </li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://cammeteo.ru/en/category/philips/">Philips</a> </li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://cammeteo.ru/en/category/satellite-tv/">Satellite TV</a> </li> <li id="menu-item-" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-"><a href="https://cammeteo.ru/en/category/digital-tv/">Digital TV</a> </li> </ul></nav> <div class="section section-question"> <div class="title"><a href="https://cammeteo.ru/en/">New articles</a></div> <ul class="section-question__posts"> <li> <a href="https://cammeteo.ru/en/vremya-pervyh-protektorfleks-i-innovacii-v-prokladke-kabelya/">Time of the first: ProtectorFlex and innovations in cable laying</a> </li> <li> <a href="https://cammeteo.ru/en/kak-vklyuchit-hdmi-na-noutbuke-podklyuchenie-noutbuka-k-televizoru/">Connecting a laptop to a TV via HDMI Windows 10 how to output an image via HDMI</a> </li> <li> <a href="https://cammeteo.ru/en/out-range-chto-delat-igre-reshenie-oshibki-out-of-range-rol-obnovlenii/">Solving the Out of range error</a> </li> <li> <a href="https://cammeteo.ru/en/zaprosy-ebay-dlya-podtverzhdeniya-lichnyh-dannyh-i-prav-sobstvennosti-na-tovar/">eBay Requests to Verify Identity and Ownership of an Item What eBay Will Do with My Documents</a> </li> <li> <a href="https://cammeteo.ru/en/funkcii-raboty-s-failami-rtf-chto-oznachaet-format-faila-rtf-chem-ego-otkryt/">What does the RTF file format mean and how to open it</a> </li> <li> <a href="https://cammeteo.ru/en/ekologicheskaya-bezopasnost-na-more-metody-i-tehnologii/">Environmental safety at sea: methods and technologies</a> </li> </ul> </div> <div class="section-posts-box section"> <div class="title">Popular articles</div> <div class="section-video section-posts"> <div class="section-posts__item section-posts__item_popular"> <img src="/uploads/d2c802a20f401f07eb07944c4f3e1e5d.jpg" width="199" height="150" alt="How to disable mts click" / loading=lazy loading=lazy> <a href="https://cammeteo.ru/en/chto-takoe-mts-klik-kak-proizvesti-otklyuchenie-mts-klik-drugie-interesnye-uslugi/" class="section-posts__item-title">How to disable mts click</a> </div> <div class="section-posts__item section-posts__item_popular"> <img src="/images/fb0deffb9762b18e79ad7f86df2bcdf3ub-199x150.png" width="199" height="150" alt="How to choose the ideal boarding house for the elderly: Important aspects and recommendations" / loading=lazy loading=lazy> <a href="https://cammeteo.ru/en/kak-vybrat-idealnyjj-pansionat-dlya-pozhilyh-lyudejj-vazhnye-aspekty-i-rekomendacii/" class="section-posts__item-title">How to choose the ideal boarding house for the elderly: Important aspects and recommendations</a> </div> <div class="section-posts__item section-posts__item_popular"> <img src="/uploads/58c6d9217d30d138af4855692d709dd0.jpg" width="199" height="150" alt="What to do if your laptop is flooded with water" / loading=lazy loading=lazy> <a href="https://cammeteo.ru/en/na-noutbuk-prolili-sok-chto-delat-chto-delat-esli-noutbuk/" class="section-posts__item-title">What to do if your laptop is flooded with water</a> </div> </div> </div> <div class="section-posts-box section"> <div class="title"><a href="https://cammeteo.ru/en/">Editor's Choice</a></div> <div class="section-video section-posts"> <div class="section-posts__item"> <img src="/uploads/c88d0dec874ee3af29059218d15c20c9.jpg" width="199" height="150" alt="Virtual German keyboard online How to type a with two dots" / loading=lazy loading=lazy> <a href="https://cammeteo.ru/en/nemeckaya-klaviatura-i-raskladka-kak-pechatat-po-nemecki-virtualnaya/" class="section-posts__item-title section-title_video">Virtual German keyboard online How to type a with two dots</a> </div> <div class="section-posts__item"> <img src="/images/ffcd960d3babc9c01908083ae9e83753ub-199x150.png" width="199" height="150" alt="Why should you upgrade your TV in 2024?" / loading=lazy loading=lazy> <a href="https://cammeteo.ru/en/pochemu-stoit-obnovit-svojj-televizor-v-2024-godu/" class="section-posts__item-title section-title_video">Why should you upgrade your TV in 2024?</a> </div> <div class="section-posts__item"> <img src="/uploads/d9e2f76d9fae8baf0c2fe8c06b4b79d2.jpg" width="199" height="150" alt="Personal page in contact" / loading=lazy loading=lazy> <a href="https://cammeteo.ru/en/v-kontakte-lichnaya-stranica-vk-vk-vhod-kak-voiti-na-staruyu/" class="section-posts__item-title section-title_video">Personal page in contact</a> </div> </div> </div> </aside> </div> <footer class="footer"> <div class="wrap"> <div class="logo logo_footer" style="background:none;"> <div class="logo__copy">All rights reserved, 2024</div> </div> <nav class="footer-navid"> <ul> <li class="menu-item type-post_type object-page "><a href="">About the site</a></li> <li class="menu-item type-post_type object-page "><a href="https://cammeteo.ru/en/sitemap.xml">Site map</a></li> </ul> </nav> <div class="social-icon"> <a href="https://vk.com/share.php?url=https://cammeteo.ru/nachinayushchemu-php-programmistu-ili-kak-nachat-zarabatyvat-instrukciya/" target="_blank" class="vk">VKontakte</a> <a href="https://www.twitter.com/share?url=https%3A%2F%2Fcammeteo.ru%2Fen%2Fnachinayushchemu-php-programmistu-ili-kak-nachat-zarabatyvat-instrukciya" target="_blank" class="tw">Twitter</a> <a href="" target="_blank" class="gp">Google+</a> </div> </div> </footer> <script>var adsplacerProAdblockMessage = { "message":"<div class=\"adb-def\">\r\n <div>\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0435 AdBlock?<\/div>\r\n <div>\u0420\u0435\u043a\u043b\u0430\u043c\u0430 \u043d\u0430 \u0441\u0430\u0439\u0442\u0435 \u043f\u043e\u043c\u043e\u0433\u0430\u0435\u0442 \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u0442\u044c \u0435\u0433\u043e<\/div>\r\n \u041f\u043e\u0436\u0430\u043b\u0443\u0439\u0441\u0442\u0430, \u0432\u043d\u0435\u0441\u0438\u0442\u0435 \u043c\u043e\u0439 \u0441\u0430\u0439\u0442 \u0432 \u0432\u0430\u0439\u0442\u043b\u0438\u0441\u0442 \u0432\u0430\u0448\u0435\u0433\u043e AdBlock \u043f\u043b\u0430\u0433\u0438\u043d\u0430\r\n<\/div>"} </script><script>var adsplacerProAdblockFirstOnly = 0</script><script>var adsplacerProVersion = "2.5.7"</script><script>if(!AdsplacerProReadCookie('adsplacerProReferrer')){ document.cookie = "adsplacerProReferrer=" + document.referrer + "; path=/; expires=" + (new Date(new Date().getTime() + 60 * 60 * 24 * 1000)).toUTCString(); } </script><script>var adsplacerProPostId = "1848"</script><script>var CookieDate = new Date;CookieDate.setDate(391);document.cookie = 'adsplacerProDontShowAdsIds=' + JSON.stringify(adsplacerProFirstTime) + '; expires=' + CookieDate.toGMTString( ) + '; path=/';</script><script>var adsplacerProAdblockExtendMessages = []</script><script type='text/javascript' src='https://cammeteo.ru/wp-content/plugins/adsplacer_pro/assets/js/jquery.adsplacer.adblock.js?ver=2.5.7'></script> <script type='text/javascript' src='/wp-includes/js/comment-reply.min.js?ver=4.9.1'></script> <script type='text/javascript' src='/assets/scripts1.js'></script> <script type='text/javascript'> /* <![CDATA[ */ var tocplus = { "visibility_show":"\u041f\u043e\u043a\u0430\u0437\u0430\u0442\u044c","visibility_hide":"\u0421\u043a\u0440\u044b\u0442\u044c","width":"Auto"} ; /* ]]> */ </script> <script type='text/javascript' src='https://cammeteo.ru/wp-content/plugins/table-of-contents-plus/front.min.js?ver=1509'></script> <script type='text/javascript' src='https://cammeteo.ru/wp-content/plugins/wp-postratings/js/postratings-js.js?ver=1.84'></script> <script type='text/javascript'> var q2w3_sidebar_options = new Array(); q2w3_sidebar_options[0] = { "sidebar" : "sidebar-2", "margin_top" : 10, "margin_bottom" : 150, "stop_id" : "", "screen_max_width" : 0, "screen_max_height" : 0, "width_inherit" : false, "refresh_interval" : 1500, "window_load_hook" : false, "disable_mo_api" : false, "widgets" : ['custom_html-2'] } ; </script> <script type='text/javascript' src='https://cammeteo.ru/wp-content/plugins/q2w3-fixed-widget/js/q2w3-fixed-widget.min.js?ver=5.0.4'></script> </div> <script type="text/javascript"> <!-- var _acic={dataProvider:10};(function(){var e=document.createElement("script");e.type="text/javascript";e.async=true;e.src="https://www.acint.net/aci.js";var t=document.getElementsByTagName("script")[0];t.parentNode.insertBefore(e,t)})() //--> </script><br> <br> </body> </html>