29 Years of the Digest ... founded August 21, 1981
The Telecom Digest for July 15, 2011
====== 29 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Bill Horne and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
Addresses herein are not to be added to any mailing list, nor to be sold or given away without explicit written consent. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. - Geoffrey Welsh
See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest.
Date: Wed, 13 Jul 2011 08:34:15 -0400 From: Monty Solomon <email@example.com> To: firstname.lastname@example.org. Subject: Most cellphone voice mail is vulnerable to hackers Message-ID: <email@example.com> Most cellphone voice mail is vulnerable to hackers Online services guide the way By Hiawatha Bray Globe Staff / July 13, 2011 Breaking into someone's voice mailbox - in the style of the hackers at the British tabloid News of the World - can be as easy in the United States as it is on the other side of the Atlantic. It is done using a readily available online service known as "caller ID spoofing,'' which can make a call appear to be coming from any phone number. Hackers can use it to access someone else's voice mail messages by fooling the system into thinking the call is coming from the owner's cellphone. If the mailbox is not protected by a password, as is often the case, the attacker can hear and even delete messages in the target's voice mailbox. There are numerous spoofing services in the United States; all you need to do is Google them. Although these services are used by hackers to commit crimes, they're also used legitimately by, for example, battered women who do not want their calls traced, or law enforcement agents operating undercover. ... http://www.boston.com/business/technology/articles/2011/07/13/most_cellphone_voice_mail_is_vulnerable/
Date: 14 Jul 2011 00:33:27 -0000 From: "John Levine" <firstname.lastname@example.org> To: email@example.com. Subject: Re: Metro PCS type Service in UK Message-ID: <firstname.lastname@example.org> >> O2 offers unlimited talk and text for £46.00 month to month, £41.00 on >> a 12 month contract if you bring your own phone. Most carriers offer >> unlimited texts or unlimited calls to landlines as an option in their >> £20 and up plans. >That is a real help. I will check out their international rates for >calling back to the US. If they are reasonable, o2 will fit my needs. The international rates on that plan are awful (103p/min), but there are plenty of dialaround services that will let you call the US for 2p/min. You call the UK number of the dialaround service from your phone (free on an unlimited talk plan), then call the number you want to call. That's what I did when I was living in the UK. You can put the whole thing on speed dial for your most often dialed numbers. R's, John
Date: Wed, 13 Jul 2011 20:07:13 +0000 (UTC) From: email@example.com (Michael Moroney) To: firstname.lastname@example.org. Subject: Re: Battery power support today Message-ID: <email@example.com> Lisa or Jeff <firstname.lastname@example.org> writes: >I believe such locomotives generate AC, rectifier to DC, then convert >it back to AC for traction usage; apparently the frequency is varied >to drive the motor. (There are others who can explain modern AC >traction better than I can). What confuses me is why bother to >convert to DC and back to AC instead of merely generating at AC and >using that? AC electric motors will try to rotate at a rate determined by the AC frequency they are supplied. Since trains move at a rate anywhere from 0 to some maximum speed, that doesn't work so well. Variable Frequency Drives supply AC motors with AC at a frequency (and voltage) appropiate to the current speed of the train. Listen as a modern-ish subway or electric train pulls out of a station making musical notes. That's the VFD converting DC to AC at a frequency best to drive the motor, or the motor responding to that frequency.
Date: Thu, 14 Jul 2011 10:39:07 -0700 (PDT) From: Lisa or Jeff <email@example.com> To: firstname.lastname@example.org. Subject: Transit agency surveys social media usage Message-ID: <email@example.com> The Phila transit agency, SEPTA, is conducting a service on how much its riders use social media and if and how riders would like to use such media to communicate with the agency to get fare and schedule information. (SEPTA has rolled out several cell phone apps for riders.) http://www.septa.org/cs/survey/
Date: Thu, 14 Jul 2011 09:17:50 -0400 From: Pete Creswell <x@y.Invalid> To: firstname.lastname@example.org. Subject: Tracing Calls w/Spoofed Numbers? Message-ID: <email@example.com> Is this even possible - given the resources of a government? I keep getting these lame-sounding letters from the Pennsylvania (USA) AG's office explaining why they can't do anything about telephone solicitors calling my cell phone. The reason given is that they are offshore, spoofing CallerID, and/or relaying calls through multiple servers. But the cynic in me thinks that if those same calls were to a high-ranking politician, perhaps threatening bodily harm... that the NSA would be all over the perp in a matter of days - if not hours or minutes. Am I wrong? -- PeteCresswell
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Bill Horne. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is moderated by Bill Horne.
|Contact information:||Bill Horne|
43 Deerfield Road
Sharon MA 02067-2301
bill at horne dot net
This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2009 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.