From editor@telecom-digest.org Fri Sep 17 20:17:11 2004 Received: (from ptownson@localhost) by massis.lcs.mit.edu (8.11.6p3/8.11.6) id i8I0HBS28200; Fri, 17 Sep 2004 20:17:11 -0400 (EDT) Date: Fri, 17 Sep 2004 20:17:11 -0400 (EDT) From: editor@telecom-digest.org Message-Id: <200409180017.i8I0HBS28200@massis.lcs.mit.edu> X-Authentication-Warning: massis.lcs.mit.edu: ptownson set sender to editor@telecom-digest.org using -f To: ptownson Approved: patsnewlist Subject: TELECOM Digest V23 #432 TELECOM Digest Fri, 17 Sep 2004 20:17:00 EDT Volume 23 : Issue 432 Inside This Issue: Editor: Patrick A. Townson Amazon to Take Searches on Web to a New Depth (Monty Solomon) How to Protect Yourself From Vandals, Viruses Using Windows (M Solomon) iBasis to Offer Free Calls (Monty Solomon) The Pen Is Mightier Than the Lock (Monty Solomon) Intuit Pits Its Customers Against Its Partners (Monty Solomon) Why Jobs Should Heed VoIP's Call (Monty Solomon) A Great Phone, Tied Down (Monty Solomon) Interfacing With Telephone Ring + Tip?? (Zerang Shah) International Phone Numbers (ed) Re: Conference Call With Four Parties? Programming (John McHarry) Super Easy WIFI Hot Spot Kits - Indoor/Outdoor (Arthur Tyde) Re: Conference Call With Four Parties? Programming (Marise A Klapka) FTC Proposes (Tax Supported) Rewards for Spam Stoolies (Danny Burstein) Spammer 'Bounty Hunters' Will Need Cash, FTC Says (Lisa Minter) Internet Cafes Shut in Vietnam for Porn, Politics (Lisa Minter) Long-Distance Takes Local Route (Jack Decker - VOIP News) Packet 8 Share and Score (Jack Decker - VOIP News) All contents here are copyrighted by Patrick Townson and the individual writers/correspondents. Articles may be used in other journals or newsgroups, provided the writer's name and the Digest are included in the fair use quote. By using -any name or email address- included herein for -any- reason other than responding to an article herein, you agree to pay a hundred dollars to the recipients of the email. =========================== Addresses herein are not to be added to any mailing list, nor to be sold or given away without explicit written consent. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome. We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. Geoffrey Welsh =========================== See the bottom of this issue for subscription and archive details and the name of our lawyer; other stuff of interest. ---------------------------------------------------------------------- Date: Thu, 16 Sep 2004 23:10:00 -0400 From: Monty Solomon Subject: Amazon to Take Searches on Web to a New Depth By JOHN MARKOFF PALO ALTO, Calif., Sept. 14 - Amazon.com , the e-commerce giant, plans to take aim at the Internet search king Google with an advanced technology that the company says will take searches beyond mere retrieval of Web pages to let users more fully manage the information they find. A9.com, a start-up owned by Amazon, said in a briefing here on Tuesday that it planned to make the new version of its search service, named A9.com, available Tuesday evening. The service will offer users the ability to store and edit bookmarks on an A9.com central server computer, keep track of each link clicked on previous visits to a Web page, and even make personal "diary" notes on those pages for viewing on subsequent visits. http://www.nytimes.com/2004/09/15/technology/15search.html ------------------------------ Date: Thu, 16 Sep 2004 23:55:55 -0400 From: Monty Solomon Subject: How to Protect Yourself From Vandals, Viruses If You Use Windows By WALTER S. MOSSBERG If you use a Windows personal computer to access the Internet, your personal files, your privacy and your security are all in jeopardy. An international criminal class of virus writers, hackers, digital vandals and sleazy businesspeople wakes up every day planning to attack your PC. And the company that controls the Windows platform, Microsoft, has made this too easy to do by carelessly opening numerous security holes in the operating system and its Web browser. Even if you install the recent Service Pack 2 update to Windows XP, you will still be vulnerable. As I have said before, I believe Microsoft and the computer makers should be taking care of all these problems with a unified, managed approach that would free users from having to learn about all the threats and constantly manage security. They should take responsibility for shielding users from hackers, spammers, viruses and spyware -- the malicious software that hijacks your browsing and searching, pushes ads into your face, and secretly logs your activities. But until that happens, you will have to fend for yourself. So here's a quick, rudimentary guide to protecting yourself in the digital world. http://ptech.wsj.com/archive/ptech-20040916.html ------------------------------ Date: Fri, 17 Sep 2004 00:29:32 -0400 From: Monty Solomon Subject: iBasis to Offer Free Calls Carrier launches consumer service By Peter J. Howe, Globe Staff iBasis Inc. , a Burlington company that has become a major behind-the-scenes wholesale carrier of international phone calls over the Internet for big phone companies like AT&T Corp. and Sprint , is launching its first direct consumer service with a splashy promotion: 1 million minutes of free phone calls for the first customers who sign up. The promotion, equivalent to 50,000 free 20-minute calls, covers free calls to most destinations in Western Europe and east Asia, as well as other big cities, including Buenos Aires, Lagos, Nigeria, Moscow, and Warsaw. Free calls, which may also be placed within the United States, are limited to two hours in duration. Any individual call made right before the 1 million minutes get used up will remain free until callers hang up. To market the consumer service, iBasis has set up a new website called Pingo.com, similar to other so-called "virtual calling card" sites. Using a credit card, people can buy prepaid minutes online that they can use to make international calls by entering a personal identification code, as if they had bought a prepaid calling card with a printed number at a store. Users are charged a 98-cent-a-month service fee, in addition to the cost of calls, and surcharges for calls made from payphones. http://www.boston.com/business/technology/articles/2004/09/15/ibasis_to_offer_free_calls/ ------------------------------ Date: Fri, 17 Sep 2004 11:24:47 -0400 From: Monty Solomon Subject: The Pen Is Mightier Than the Lock By LYDIA POLGREEN The cunning bicycle thieves of New York City always seem to be one step ahead of lockmakers. Design a more sophisticated lock and the thieves make a better pick. Make a sturdier chain and they get bigger bolt cutters. And if all else fails, they just dig up the parking meter or stop sign to unshackle the bike from it. But to open some of the toughest locks on the market, a thief needs only to flick his Bic pen. Many cyclists erupted in disbelief and anger this week after videos were posted on the Internet showing how a few seconds of work could pick many of the most expensive and common U-shaped locks, including several models made by Kryptonite, the most recognized brand. Mashing the empty barrel of a ballpoint pen into the cylindrical keyhole and turning it clockwise does the trick that has struck fear into the hearts of bicycle owners, especially those in New York, where thousands of bikes are stolen each year. http://www.nytimes.com/2004/09/17/nyregion/17lock.html Cyclists: Bike locks easy prey for thieves Kryptonite promises more secure product By Ross Kerber, Globe Staff Kryptonite, the large bicycle-lock maker, said yesterday it will speed the delivery of new versions of its burly locks following complaints that current versions can be picked open with flimsy ballpoint pens. This week cycling enthusiasts have deluged the Canton business with concerns over the security of the locks. The apparent vulnerability is related to broader concerns that have arisen lately against makers of locks used to secure everything from laptop computers to coin-operated laundry machines. Kryptonite is best known for its "U-lock" designs that consist of heavy U-shaped pieces of steel meant to be much harder to saw or pry apart compared with a traditional padlock and chain. Some of the U-locks use an "axial pin tumbler" in which a tubular key is inserted into a circular keyhole. But at least since the summer, security specialists have raised concerns that pens inserted into the keyhole can jimmy the lock apart. Lately some specialists have become quite vocal and begun posting videos of themselves at the task. http://www.boston.com/business/technology/articles/2004/09/16/cyclists_bike_locks_easy_prey_for_thieves/ ------------------------------ Date: Fri, 17 Sep 2004 11:29:39 -0400 From: Monty Solomon Subject: Intuit Pits Its Customers Against Its Partners By Ed Foster , Section Columns In a way, you have to give Intuit credit. Who else could figure out how to "sunset" both their customers and their financial institution partners at the same time? Intuit's decision to disable its older technology for importing most types of bank account information in Quicken 2005 for Windows is causing quite a stir. "I remembered reading your story about Intuit no longer supporting on-line banking with older versions of Quicken, so I thought I should bite the bullet this year and upgrade to Quicken 2005 when it came out," a reader wrote. "So guess what -- with the new Quicken I can no longer download checking account info from my bank, something I could do perfectly well with Quicken 2002." The reader's bank informed her it had refused to pay Intuit's fees for implementing the OFX (Open Financial Exchange) download technology that is now mandatory for most online banking in Quicken 2005. "If I want to access my accounts, I have to revert to an older version of Quicken that still uses the .QIF file format," the reader wrote. "It's either that or type my data in by hand. Otherwise, my bank would have to charge an astronomical monthly fee to make up for extortion payments they'd be making to Intuit. What incredible greed!" http://www.gripe2ed.com/scoop/story/2004/9/17/82751/2423 ------------------------------ Date: Fri, 17 Sep 2004 12:18:26 -0400 From: Monty Solomon Subject: Why Jobs Should Heed VoIP's Call BYTE OF THE APPLE By Alex Salkever Apple has what it would need -- including its ongoing transition to a services outfit -- to make a "Macphone" network work The hype surrounding the Aug. 31 launch of the third-generation iMac stole the thunder from another launch of great interest to Mac users. I'm referring to the public release -- also on Aug. 31 -- by free Internet telephony company Skype of a long-awaited beta version of its software for Apple ( AAPL ) OS X. Apparently I wasn't the only Machead jonesing for Skype. According to the company, 105,000 people have downloaded its Mac software since its launch. And bear in mind that this is a true beta version -- definitely not ready for prime time and lacking some of the key features of the full version available to Microsoft ( MSFT ) Windows and Linux users. http://www.businessweek.com/technology/content/sep2004/tc20040916_1040_tc056.htm ------------------------------ Date: Fri, 17 Sep 2004 12:59:52 -0400 From: Monty Solomon Subject: A Great Phone, Tied Down Ten O'Clock Tech by Arik Hesseldahl But a week ago I swerved in new direction and dropped about $300 for an upgrade to the v710, which appears to be Motorola's highest-end phone that works on Code Division Multiple Access (CDMA) networks, namely that of Verizon Wireless, a joint venture of Verizon and Vodafone. But then I learned that the phone can't do this via Bluetooth. I've been syncing my PalmOne Tungsten T handheld with my Mac for about year now using Bluetooth without difficulty. Exactly why this phone couldn't do the same thing seemed ridiculous. It turns out Verizon has had certain features in the phone disabled. Full Bluetooth support is one of them. This rules out the phone connecting to any Bluetooth devices other than a headset, such as a wireless keyboard or a printer or indeed another Bluetooth-enabled phone. Another missing feature is the ability to move a photo from the phone directly to a computer via Bluetooth or a data cable. When you take pictures on this phone, the only way to save them on a computer is to send them by e-mail over Verizon's wireless network, for which there is a charge. The network works just fine and sending pictures in this way is more or less flawless. But it's irritating to know that when you just want to take a picture and save it for yourself, you can't just move it directly from the phone to a computer. And Verizon operates a Web service called Pix Place, where you can send pictures and then download them to a PC. But why add an extra step to a process that should be simple? A Verizon Wireless spokeswoman tells me this is standard operating procedure across its camera phone lines. Verizon's product is not the phone, she says, but rather the network itself. Indeed. http://www.forbes.com/personaltech/2004/09/13/cx_ah_0913tentech.html ------------------------------ From: ninjak@gmx.de (zerang shah) Subject: Interfacing With Telephone Ring + Tip?? Date: 16 Sep 2004 18:06:37 -0700 Organization: http://groups.google.com I have a design with a MT8880C DTMF transceiver ready to go. Right now it's outputing tones using a speaker, but I now need to output them across a telephone line to dial. I need to know a few things -- 1) How can I use the ring + tip to take the phone "off the hook" so that I can dial? 2) How can I take my DTMF frequency wire and interface it with the ring and tip of the telephone wire to dial out? Thanks for the help. ------------------------------ From: ed Subject: International Phone Numbers Organization: ed Date: Fri, 17 Sep 2004 23:08:01 +1000 Hi, I'm writing a parser for a project and have been looking for a web page or other source that lists the country codes alongside area code and the number of digitals in the local number. Could anybody suggest a web site or an alternative source? Thanks. ------------------------------ From: John McHarry Subject: Re: Conference Call With Four Parties? Programming Date: Thu, 16 Sep 2004 23:59:33 GMT Organization: EarthLink Inc. -- http://www.EarthLink.net rd wrote: > Wondering how we can program the Nortel system to have ourselves and 3 > other parties connected. We have programmed for 3 outgoing lines but > cannot connect the 3rd party. Getting a message saying only 3 three > partes are allowed to be on conference call. Any help will be greatly > appreciated. You didn't say what Nortel system. Anyway, going above three parties requires a more sophisticated bridge. Unless you have payed a premium for such, you are probably at your limit. ------------------------------ From: aftyde@tyde.net (Arthur Tyde) Subject: Super Easy WIFI Hot Spot Kits - Indoor/Outdoor Date: 17 Sep 2004 14:26:59 -0700 Organization: http://groups.google.com Briefly, Sputnik http://www.sputnik.com, provides a fully integrated Wi-Fi hardware and software solution that centralizes all of the wireless network and subscriber management functions. Sputnik's plug-n-play provisioning allows customers to deploy in multiple locations with no on-site technical expertise, yet immediately manage and administer their wireless networks from any web browser. Sputnik's software architecture consists of intelligent embedded software running on Sputnik-powered Access Points (APs) at the edge of the network that communicates with Sputnik Control Center Server software, running in a data center, enables deployment, monitoring and control of the wireless network from any Web browser. In addition, our open, standards-based platform is designed for rapid application delivery and flexible integration with other back-end systems such as billing, prepaid cards, credit card payment options, rogue AP detection, and network management. At the present, over 1000 hotspot locations had successfully deployed Sputnik's Wi-Fi technology solution, including the UK. *Equally important, our Sputnik-Powered network has several advanced features:* Centralized Management * Provides a centralized interface for remotely monitoring, configuring and updating one or thousands of access points through a web browser. Reporting and Data Mining * Real time and historical reporting and statistics on subscribers, bandwidth usage, location, and usage patterns. Security * Handles all AAA (Access, Authentication, and Authorization) or plugs in to external AAA systems. * Support SSL-encrypted HTTP traffic, Corporate VPN, WEP and WAP. Customized Content * Customizable captive portals and location specific content which can be tailored to individual APs. Scalability * Sputnik Control Center manages hundreds to thousands of locations and APs. Start with a small network and add more locations and APs as the network expands. Plug-n-play Provisioning * Enables rapid, organic deployment of a wireless network-simply plug in Sputnik-Powered access points wherever needed. They initiate authenticated communications over the internet with Sputnik Control Center, automatically configured, and ready to go under remote management and control. For additional information, please visit our website at: www.sputnik.com ------------------------------ Subject: Re: Conference Call With Four Parties From: Marise A Klapka Date: Thu, 16 Sep 2004 11:32:08 -0500 Please Withhold My E-Mail Address. In response to: From: rdaryani@aurigacorp.com (rd) Subject: Conference Call With Four Parties? Programming Date: 15 Sep 2004 13:03:25 -0700 Organization: http://groups.google.com > Wondering how we can program the Nortel system to have ourselves and 3 > other parties connected. We have programmed for 3 outgoing lines but > cannot connect the 3rd party. Getting a message saying only 3 three > parties are allowed to be on conference call. Any help will be greatly > appreciated. If you're programming for 3 parties, that's the problem - you, the user, make 4. Not knowing the system model or software release, I'm not sure if these programming instructions will help, but .... LD 11 req: PRT type: TNB tn: WWW X YY ZZ (phone set's terminal number, or TN) Look for the phone's Key ## that is assigned "AOx" (AO3 = 3 parties, AO6 = 6 parties, etc.) If you don't know the TN, then: req: PRT type: DNB (phone set's extension) dn: enter extension # To change the number of parties allowed in a conference: LD 11 req: CHG type: enter the phone model/type here, i.e,. 2006, 2008, 2616, 3904, etc. tn: WWW X YY ZZ echg: YES item: Key ## AOx (## being the key number, x being the number of users that can be conferenced) Hope this helps. Marise ------------------------------ From: Danny Burstein Subject: FTC Proposes (Tax Supported) Rewards For Spam Stoolies Date: Thu, 16 Sep 2004 23:23:21 -0400 Organization: PANIX Public Access Internet and UNIX, NYC The FTC today issued a report assessing whether and how a system that rewards members of the public for tracking down spammers would or could help improve enforcement of the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2002 (CAN-SPAM Act.)... http://www.ftc.gov/opa/2004/09/bounty.htm _____________________________________________________ Knowledge may be power, but communications is the key dannyb@panix.com [to foil spammers, my address has been double rot-13 encoded] [TELECOM Digest Editor's Note: In this same issue of the Digest, Lisa Minter brings a detailed account of this FTC proposal. PAT] ------------------------------ From: Lisa Minter Subject: Spammer 'Bounty Hunters' Will Need Cash, FTC Says Date: Fri, 17 Sep 2004 12:27:20 EDT Rewards of up to $250,000 will be needed to encourage people to turn over friends or associates who send out millions of deceptive e-mail pitches in violation of the law, the FTC said. And that cash will have to come out of the federal budget, rather than settlements collected from spammers, the FTC said. While millions of Internet users may be annoyed by spam, only a handful of insiders are likely to have enough information to form the basis of a case, the agency said. "The commission does not believe that the vast majority of consumers who are now forwarding 300,000 pieces of spam daily to the FTC spam database are likely to be a good source for such information," the FTC said in a report to Congress. Lawmakers asked the FTC to assess whether the government should encourage "cybersleuths" to help track down marketers who break the law by sending out deceptive pitches for herbal Viagra, pornography or other forms of spam. California Democratic Rep. Zoe Lofgren and other advocates have said such an approach would encourage technologically savvy citizens to help government investigators track down illicit marketers who often hide behind a trail of false online identities. The FTC didn't say whether it thought such a system was a good idea, but outlined conditions needed to make it work. To encourage insiders to come forward, they should be granted immunity and given the reward even if the FTC doesn't collect fines from the guilty party, the agency said. Even then, insiders might prove unwilling to cooperate as the FTC cannot grant immunity, the report said. "To the extent an insider has 'unclean hands' and faces potential legal liability, it is questionable whether such a person would be willing to assume the significant personal risk of coming forward," the report said. New Jersey Democratic Sen. Jon Corzine praised the report and said it would serve as a sound basis for a bounty-hunter program. "There is no single magic bullet in the battle against spam. But we've made so little progress to date that we can't afford to leave any reasonable approach untried," Corzine said in a statement. *** FAIR USE NOTICE. This message contains copyrighted material the use of which has not been specifically authorized by the copyright owner. This Internet discussion group is making it available without profit to group members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of literary, educational, political, and economic issues, for non-profit research and educational purposes only. I believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ------------------------------ From: Lisa Minter Subject: Internet Cafes Shut in Vietnam for Porn, Politics Date: Fri, 17 Sep 2004 12:28:38 EDT HANOI (Reuters) - Authorities in southern Vietnam have shut down 65 Internet cafes and kiosks after finding hundreds of addresses of pornographic and anti-government Web sites on their computers, a newspaper reported on Friday. The communist government recently intensified efforts to control use of the Internet by requiring customers of Internet cafes to register their identities and making cafe owners monitor the sites customers visit. Last month, authorities set up a special police unit to investigate online crime and curb the distribution of banned material in cyberspace. The 65 Internet outlets were shut down over the past two weeks in the bustling commercial hub of Ho Chi Minh City, the city-run Phap Luat (Laws) newspaper said. Inspectors were continuing to scour computers in Internet outlets to see what sites customers had been visiting, the newspaper quoted the deputy head of the city's science and technology department, Hoang Le Minh, as saying. While the number of Internet users in Vietnam has been rising quickly, hitting 5.34 million at the end of July, the government curbs access to the global network through firewalls that block sites deemed inappropriate. All media in Vietnam are state controlled. *** FAIR USE NOTICE. This message contains copyrighted material the use of which has not been specifically authorized by the copyright owner. This Internet discussion group is making it available without profit to group members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of literary, educational, political, and economic issues, for non-profit research and educational purposes only. I believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ------------------------------ From: Jack Decker Date: Fri, 17 Sep 2004 12:10:57 -0400 Subject: Long-Distance Takes Local Route Reply-To: VoIPnews@yahoogroups.com http://www.chicagotribune.com/business/chi-0409170230sep17,1,7145420.story?coll=chi-business-hed Got friends or family in L.A.? New York? Miami? New Internet-based phone service from AT&T charges local rates for their calls to your home. By Jon Van Tribune staff reporter What's your local calling area? For AT&T customers, it can be across the country and all points in between. On Thursday AT&T Corp. rolled out a new product called Simple Reach to provide as many as 10 different phone numbers -- each from a different area code, such as New York City's 212 and San Francisco's 415 -- to customers using its Internet-based phone service. And all of those numbers can be answered by the customer's phone in Chicago using voice over Internet protocol technology, with the caller in those distant cities billed only a local charge. For a customer with out-of-town numbers in New York or San Francisco, it means that friends or relatives who live in those cities can dial a local number and avoid paying long-distance fees. Also Thursday, Vonage -- the company that pioneered VoIP -- said its customers can get phone numbers from Mexico City. Both firms charge about $5 a month for each virtual number. Although the quality of Internet-based calls sounds much like regular phone calls, the underlying technology is more closely related to sending an e-mail than traditional circuit-based phone service. As with Internet technology generally, VoIP has little connection to geography. But there could be a chaotic downside to having 10 phone numbers besides trying to keep track of them. Full story at: http://www.chicagotribune.com/business/chi-0409170230sep17,1,7145420.story?coll=chi-business-hed How to Distribute VoIP Throughout a Home: http://michigantelephone.mi.org/distribute.html If you live in Michigan, subscribe to the MI-Telecom group: http://groups.yahoo.com/group/MI-Telecom/ ------------------------------ From: Jack Decker Date: Fri, 17 Sep 2004 13:43:36 -0400 Subject: Packet 8 Share and Score Reply-To: VoIPnews@yahoogroups.com Andy Abramson, in his VoIP watch blog at http://andyabramson.blogs.com/voipwatch/ notes that Packet8 seems to be the latest VoIP company to implement a customer referral program: [Begin quote:] Keith of VoIPNuke, who has resold Packet8 longer than anyone I know, pointed me to the new P8 referral program . This is taking a page out of both Vonage and AT&T's playbook. There is nothing more than one happy customer telling others about the service. Word of Mouth is the most valuable, next to word of mouse of course! ------------------------------ TELECOM Digest is an electronic journal devoted mostly but not exclusively to telecommunications topics. It is circulated anywhere there is email, in addition to various telecom forums on a variety of networks such as Compuserve and America On Line, Yahoo Groups, and other forums. It is also gatewayed to Usenet where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Patrick Townson. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. Contact information: Patrick Townson/TELECOM Digest Post Office Box 50 Independence, KS 67301 Phone: 620-402-0134 Fax 1: 775-255-9970 Fax 2: 530-309-7234 Fax 3: 208-692-5145 Email: editor@telecom-digest.org Subscribe: telecom-subscribe@telecom-digest.org Unsubscribe:telecom-unsubscribe@telecom-digest.org This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/ (or use our mirror site: ftp.epix.net/pub/telecom-archives) Email <==> FTP: telecom-archives@telecom-digest.org Send a simple, one line note to that automated address for a help file on how to use the automatic retrieval system for archives files. You can get desired files in email. ************************************************************************* * TELECOM Digest is partially funded by a grant from * * Judith Oppenheimer, President of ICB Inc. and purveyor of accurate * * 800 & Dot Com News, Intelligence, Analysis, and Consulting. * * http://ICBTollFree.com, http://1800TheExpert.com * * Views expressed herein should not be construed as representing * * views of Judith Oppenheimer or ICB Inc. * ************************************************************************* ICB Toll Free News. Contact information is not sold, rented or leased. One click a day feeds a person a meal. Go to http://www.thehungersite.com Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. ************************ DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO YOUR CREDIT CARD! REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST AND EASY411.COM SIGN UP AT http://www.easy411.com/telecomdigest ! ************************ --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization. End of TELECOM Digest V23 #432 ******************************