30 Years of the Digest ... founded August 21, 1981
The Telecom Digest for January 31, 2012
====== 30 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Bill Horne and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using any name or email address
included herein for any reason other than responding to an article
herein, you agree to pay a hundred dollars to that person, or email address
Addresses herein are not to be added to any mailing list, nor to be sold or given away without the explicit written consent of the owner of that address. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. - Geoffrey Welsh
See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest.
Date: Mon, 30 Jan 2012 17:56:20 +1100 From: David Clayton <firstname.lastname@example.org> To: email@example.com. Subject: Re: Every home needs its own IT guru Message-ID: <firstname.lastname@example.org> On Sat, 28 Jan 2012 10:54:04 -0500, Monty Solomon wrote: > Every home needs its own IT guru - Our growing number of gadgets > means more questions for tech-savvy friends and family And where are the instructions on how to avoid those questions that you just KNOW are going to drain you like a vampire attached to your neck? -- Regards, David. David Clayton Melbourne, Victoria, Australia. Knowledge is a measure of how many answers you have, intelligence is a measure of how many questions you have.
Date: Sun, 29 Jan 2012 16:47:53 -0800 From: Thad Floryan <email@example.com> To: firstname.lastname@example.org. Subject: Re: Config advice for asterisk? Message-ID: <4F25E8B9.email@example.com> On 1/28/2012 9:14 PM, John R. Levine wrote: > Speaking of asterisk, can someone suggest a good source of configuration > advice for asterisk? [Moderator snip] > Any suggestions where to find simple canned configs and related advice? > I'm a reasonably competent programmer, so something that explained the > programming model as well as giving examples would be nice. I've been out of the business for 4 years now and am technically retired, but I used to set up [among other things] asterisk VoIP systems with interfaces to PRIs for small businesses which features probably the world's best voice mail system and support for Cisco 7960 VoIP instruments, Polycom IP4000 conference room phones, ATA analog adapters, etc. Googling "asterisk configuration examples" returns some very useful material, such as (among many others): http://www.voip-info.org/wiki/view/Asterisk+Configuration+Examples :-) FYI, there are 3 versions of the O'Reilly asterisk book so far: Asterisk, the future of telephony, 1st ed, 376 pages, September 2005 ISBN unknown -- my only copy is PDF Asterisk, the future of telephony, 2nd ed, 604 pages, August 2007 Asterisk 1.4, ISBN-10: 0-596-51048-9, ISBN-13: 978-0-596-51048-0, Asterisk, the definitive guide, 3rd ed, 734 pages, April 2011 Asterisk 1.8, ISBN: 978-0-596-51734-2 Also O'Reilly Asterisk Cookbook, 1st ed, 66 pages, April 2011 ISBN: 978-1-449-30382-2 And these two tomes: Asterisk Hacking [Ben Jackson] (Elsevier) 2007,253 pages ISBN 978-1-59749-151-8 comes with a CD (which I can't quickly find) Asterisk for Dummies (Stephen Olejniczak (author of Telecom for Dummies)) (Wiley) 2007, ISBN 978-0-470-09854-7, 334 pages
Date: Mon, 30 Jan 2012 14:17:27 -0700 From: Fred Atkinson <firstname.lastname@example.org> To: email@example.com. Subject: Fiber Optics Connectors Message-ID: <firstname.lastname@example.org> Folks, I need to read up on fiber optics connectors. I'm familiar with the LC, ST, and SC type connectors. I understand that there are special connectors called APC (Angle Polished Connectors) and I'd like to read up on when they are used. Can someone recommend a book that explains APCs and some of the newer connectors [those I have not listed here]? Thanks, Fred
Date: Mon, 30 Jan 2012 17:10:46 -0500 From: Monty Solomon <email@example.com> To: firstname.lastname@example.org. Subject: FDA staffers sue agency over surveillance of personal e-mail Message-ID: <email@example.com> FDA staffers sue agency over surveillance of personal e-mail By Ellen Nakashima and Lisa Rein, Published: January 29 The Food and Drug Administration secretly monitored the personal e-mail of a group of its own scientists and doctors after they warned Congress that the agency was approving medical devices that they believed posed unacceptable risks to patients, government documents show. The surveillance - detailed in e-mails and memos unearthed by six of the scientists and doctors, who filed a lawsuit against the FDA in U.S. District Court in Washington last week - took place over two years as the plaintiffs accessed their personal Gmail accounts from government computers. Information garnered this way eventually contributed to the harassment or dismissal of all six of the FDA employees, the suit alleges. All had worked in an office responsible for reviewing devices for cancer screening and other purposes. Copies of the e-mails show that, starting in January 2009, the FDA intercepted communications with congressional staffers and draft versions of whistleblower complaints complete with editing notes in the margins. The agency also took electronic snapshots of the computer desktops of the FDA employees and reviewed documents they saved on the hard drives of their government computers. FDA computers post a warning, visible when users log on, that they should have "no reasonable expectation of privacy" in any data passing through or stored on the system, and that the government may intercept any such data at any time for any lawful government purpose. But in the suit, the doctors and scientists say the government violated their constitutional privacy rights by gazing into personal e-mail accounts for the purpose of monitoring activity that they say was lawful. ... (URL points to The Washington Post, which sometimes requires registration to read the material - moderator) http://goo.gl/ZmEzr -or- http://www.washingtonpost.com/world/national-security/fda-staffers-sue-agency-over-surveillance-of-personal-e-mail/2012/01/23/gIQAj34DbQ_story.html
Date: Tue, 31 Jan 2012 09:16:26 +1100 From: David Clayton <firstname.lastname@example.org> To: email@example.com. Subject: Scanning QR codes can infect your smartphone Message-ID: <firstname.lastname@example.org> Scanning QR codes can infect your smartphone Stuart Corner Monday, 30 January 2012 09:01 Your IT - Mobility Cybercriminals are using QR codes to infect mobile phone with malware in a rapidly growing mobile malware 'industry' According to Australian security technology distributor AVG Technologies, "Putting a malicious QR code sticker onto existing marketing material or replacing a website's bona fide QR code with a malicious one could be enough to trick many unsuspecting peopleâ?¦This new technique is expected to gain momentum in 2012 and beyond, as the user does not know what lies behind the QR code until the malware is already installed and running. "For example a QR code could be used to download malware that directs the phone to send text messages to premium SMS numbers.' AVG says, in its Community Powered Threat Report for Q4 2011: "Malware targeting mobile devices evolves frighteningly fast and has the potential of being even more destructive than beforeâ?¦While consumers are going mobile, so are the cyber criminals. We have witnessed the use of the same malicious intent tactics targeting mobile devices: social engineering, stolen or fake certificates to sign malware, root kits and other tactics." AVG's CTO, Yuval Ben-Itzhak, said: "As phones become more like computers, so do the risks. Many sophisticated tricks of the trade from computers are now being repurposed for phones. However, as phones are often tied into billing systems the gains can be far greater." The report also warns that digital signatures attached to Android applications offer little guarantee of trust "Stealing or faking a private key of a trusted source (developer), will allow cyber criminals to sign their malicious applications with the same key as the trusted developer," it says. "By doing so, the cyber criminal could sign and distribute applications that maliciously replace the authentic applications or corrupt them." (URL points to a site that asks users to subscribe - moderator) http://goo.gl/dwNm6 -or- http://www.itwire.com/your-it-news/mobility/52424-scanning-qr-codes-can-infect-your-smartphone ***** Moderator's Note ***** AVG has been known to overestimate the risks associated with the various threats the company warns users about. Bill Horne Moderator
Date: Mon, 30 Jan 2012 17:10:46 -0500 From: Monty Solomon <email@example.com> To: firstname.lastname@example.org. Subject: Google says one hour of video is now being uploaded to YouTube every second Message-ID: <email@example.com> Google says one hour of video is now being uploaded to YouTube every second By - New Scientist January 30 People who complain about some of the racier content on YouTube are often told that the sheer rate at which that content is uploaded makes it impossible to moderate. That claim would seem to be more than borne out by the figures released recently by Google, YouTube's owner. The search giant's figures show that one hour of video is now being uploaded to YouTube every second. That upload rate - equivalent to 60 hours of video per minute - represents an astonishing tenfold increase from its 2007 rate. ... (URL points to The Washington Post's online site, which sometimes requires registration to read the material - moderator) http://goo.gl/oximr -or- http://www.washingtonpost.com/national/health-science/google-says-one-hour-of-video-is-now-being-uploaded-to-youtube-every-second/2012/01/27/gIQAtubBdQ_story.html
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Bill Horne. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is moderated by Bill Horne.
43 Deerfield Road
Sharon MA 02067-2301
bill at horne dot net
This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2012 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA.
Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.