exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 36 of 36 RSS Feed

Files Date: 2000-04-15 to 2000-04-16

wb900.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a guide to the BT WB900 unit. - WB9OO is a system designed by BT to split a line into two carriers. This way two seperate BT customers can use the same line with privacy, in other words two seperate incoming/outgoing calls can be made on 1 subscriber loop similtaniously.

tags | telephony
SHA-256 | cb9e51cddf2dabb8ed811cc676abcb10559ec38bb0f2fbccb6bb0266062fcb5f
netserve.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

brief article explaining different commands etc on the U.S Robotics NetServers which are becomming incresingly popular. These servers are an extreame sercutity risk to any network that uses them for network managment, they essentialy give whoever has administrator access _total_ control over its surrounding network.

tags | paper
SHA-256 | d02357ba9581b3dad1b56ebeccdec08e451d1a441e354506566480a440a693f7
swtchhst.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a brief guide to the evolution of switching systems, from electromechanical switches to present day digital switches. - very brief.

tags | telephony
SHA-256 | a702810609512317bf0c37f09ea85296f68989fcb6795483dd6343c33f369b73
autodin.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

government and military defense telecommunications networks. an overview of various networks that are deployed by the military in the event of national emergency or covert communication. autodin and the more contemporary dsn networks.

tags | telephony
SHA-256 | bf17d5ecd745c0c48104c2d4f495f40ab342f6375a62691f5b7d24950c7ce2a5
mer-ninj.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

hacking meridian mail, ninja style.. a brief introduction to some of the efffective methods that can be used to gain access to a meridian mail voice mail network. written from both an attack and defense perspective.

tags | telephony
SHA-256 | a2cd05576d0d0a5638ca0ce6a96aea57eb36657b30511d1216d8d128ae7b65f1
clid-cid.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

defeating the caller-id system with simple but effective stealth. a guid to routing your call through the international pstn ninja style. describes some methods that could be used to effectivly block/cloak the origionating point code of your call, aswell as technical information on clid, and cli data transmission bursts. written for f41th magazine.

tags | telephony
SHA-256 | 6a710385a4c995edc29e8c654b689cd6df9fc0ada572b3c521fa33c8bae65079
mer-hack.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

meridian mail switch managment and security audit. meridian switch hacking (expunged) written for f41th magazine.

tags | telephony
SHA-256 | 53fdc2fa5f05cf1777e8479352cc1d861cec9b6e6f8e3889967f641800081772
systemx.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

bt systemx switch administration and overview of bt telcom operations and maintanance centers, written for f41th magazine. the system is based on a vax/vms platform with multi-level oracle databases, a look into the man-machine interface of uk switching, and remote switch/node interfaces.

tags | remote, telephony
systems | vax
SHA-256 | 779a4ec91dd89436fd5f104ed274d52dc3ddd09f544a61c1d4556c2c9473b03f
comint.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

covert government/military and diplomatic interception of telecommunications protocols and mediums. written for f41th magazine. an article that looks into the various covert methods deployed by international intellegence entitys to monitor/audit international communications for reasons of "national security" and informational gathering. includes a look into gchq, nsa and surrounding agencies that use provate wan's to form covert networks such as "project echelon".

tags | telephony, protocol
SHA-256 | 11595f66582c00b0f21a5b10af46020a74de3a4975af5e4d190e80bc49ba9b82
x-local.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

overview of the uk systemx and axe pstn network. added december 1999, written for f41th magazine. a guide to dmsu's, dlsu's, rcu's, and the uk pstn trunking network "masterplan". gBH.

tags | telephony
SHA-256 | 1f090e8554f5be05ed53b7a448628ee807e59fd1033b0de1a4a3177d925449f5
cnd.txt
Posted Apr 15, 2000

Calling Number Delivery: An explanation of Caller ID and how it works.

tags | telephony
SHA-256 | 63b8cbc2ad0c10c550351d2b5c22369b7301879e7b3adede2c751ae2a07e7fb5
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close