Skip to main content

Subscriber Identification Module (SIM)

A subscriber identity module or subscriber identification module (SIM) is an integrated circuit that securely stores the International Mobile Subscriber Identity (IMSI) and the related key used to identify and authenticate subscribers on mobile telephony devices ,such as mobile phones and computers.

It is also a portable memory chip used mostly in cell phones that operate on the Global System for Mobile Communications (GSM) network. These cards hold the personal information of the account holder, including his or her phone number, address book, text messages, and other data. When a user wants to change phones, he or she can usually easily remove the card from one handset and insert it into another. SIM cards are convenient and popular with many users, and are a key part of developing cell phone technology.

Sim Cards are of four (4) Types. Named as Below H1, H2, H3, H4

H1= You Will Get Normal Network On This Sim
H2= You Will Get Better Network On This Sim, Means Strong
H3= You Will Get More Better Network On This Sim, Means Stronger
H4= Normal, Better, More Better Is Nothing In Front OF This Sim.

Basically H4 Sim giving for Corporate Sim, Army Peoples etc. The Company doesn’t Provide H4 Sim To all User,because this Sim eat More bandwidth. For knowing Which Type of Sim is using Just Check Its Back Side and will Get the Sim No. and the Sim Type.

SIM cards are made in three different sizes to accommodate different devices. Most phones use mini-SIM or micro-SIM cards, which are quite small — the mini is 25 mm by 15 mm , and the micro is 15 mm by 12 mm.Full-sized cards are much larger, 85.6 mm by 53.98 mm , and are too big for most phones. All cards are only 0.76 mm thick, and the microchip contacts are in the same arrangement. This means that, with the proper adapter, the smaller cards can be used in devices designed for larger ones.

A SIM card offers security for both the user’s data and his or her calls. The cards can be locked, meaning that only someone who has the correct personal identification number (PIN) can use the card. If the phone is stolen, the thief cannot use a locked SIM or get any information off of it without the PIN.

Comments

Popular posts from this blog

Sample : String Reverse In Java

import java.io.*; class test {     public static void main(String args[])     {         DataInputStream in=new DataInputStream(System.in);         try         {             String text;             System.out.println("\nEnter The Text");             text=in.readLine();             System.out.println("\nIn Reverse Order::\n");             for(int i=text.length()-1;i>=0;i--)             {                 System.out.print(text.charAt(i));             }          ...

Using GREP in UNIX

How To Use grep Command In Linux / UNIX by  VIVEK GITE  on  AUGUST 2, 2007  ·  147 COMMENTS H ow do I use grep command in Linux? grep command searches the given file for lines containing a match to the given strings or words. By default, grep prints the matching lines. Use grep to search for lines of text that match one or many regular expressions, and outputs only the matching lines. The name, "grep", derives from the command used to perform a similar operation, using the Unix/Linux text editor ed: g/re/p grep command syntax grep 'word' filename grep 'string1 string2' filename cat otherfile | grep 'something' command | grep 'something' Use grep to search file Search /etc/passwd for boo user: $ grep boo /etc/passwd You can force grep to ignore word case i.e match boo, Boo, BOO and all other combination with -i option: $ grep -i "boo" /etc/passwd Use grep recursively You can search recursively i.e. read all files under each ...