what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 241 RSS Feed

Telephony Files

bcss.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

basic guide to CCS (Common Channel Signalling) and the SS7 network.

tags | telephony
SHA-256 | f4fe807aa75419b1c1d8228c5cd3cabe9172e73be9089f927ec4716c7b2f0962
audix.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

very brief guide to using audix voicemail systems (old).

tags | telephony
SHA-256 | 835a363a0bad0b9392d21318e46762edb76ae50ba4198afd786b207cacf0219e
9x_tel.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

introduction to the digital phone network. - Analogue systems and techniques, Basic network structures, Basic exchange structures, centrex, FDM hierarchy, PCS services, signalling, SPC, trunking, ACD, ADSL, ATM, digital centrex, CCITT parts.

tags | telephony
SHA-256 | d2e0b0c4150823e03f2c18945456897d2a3ca52f6dc857b195f626c03fa11217
9x_swr8.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to the switched route of an 8oo number via the means of SS7 network protocols. also information on DSAC(dial service admin center).

tags | telephony, protocol
SHA-256 | 220b86d49b3fc6c96f1c7ea9d4b3dd63bec785bbccf620093c36e68705940e40
9x_scntp.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to uk prefix assignments, including uk toll-free prefixes. - usefull for scanning, spunged from oftel.

tags | telephony
SHA-256 | 770b3014436d291933bfc943457579e27a8951e5f57cf3c26718ca8926119475
9x_lmpt.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to latitude meetingplace teleconferencing. - Meeting Place is a powerful teleconferencing system designed to accommodate up to 120 ports in any combination of simultaneous conference calls.

tags | telephony
SHA-256 | 02413e0f5bd47a3d86f63f9296f758c0c0992c93e1855eaa708dffbaf3718507
9x_gets.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

GETS (Government Emergency Telecommunications System) - Since the begining of telecommunications, goverments around the world have always had their own secure voice and data networks. These secret networks have always served many purposes for government and military organistaions.

tags | telephony
SHA-256 | cc46de7475a686d85616d54b70db7ac998ccf2c8f48ee3d098804807fcd336c5
9x_dcom.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to new digital telcoms - Switching Hierarchys, North American Digital Hierarchies, The Local Subscriber Loop and various other digitaly derived telcom info.

tags | local, telephony
SHA-256 | 7de56b697a52773d920f7a91309a1ec034564102e14dca0a72f5d620bf68b882
9x_cit.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

CTI (Computer-Telephony-Integration) - CTI stands for Computer Telephony Integration, the term covers a vast range of different technologys, from single user modem integration pacages to vast three-tier architectures for call-centres.

tags | telephony
SHA-256 | 05ffbebe5244763192d49793b38a1b169d2c76f527235d3573c3547e4f077f78
wb900.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a guide to the BT WB900 unit. - WB9OO is a system designed by BT to split a line into two carriers. This way two seperate BT customers can use the same line with privacy, in other words two seperate incoming/outgoing calls can be made on 1 subscriber loop similtaniously.

tags | telephony
SHA-256 | cb9e51cddf2dabb8ed811cc676abcb10559ec38bb0f2fbccb6bb0266062fcb5f
swtchhst.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a brief guide to the evolution of switching systems, from electromechanical switches to present day digital switches. - very brief.

tags | telephony
SHA-256 | a702810609512317bf0c37f09ea85296f68989fcb6795483dd6343c33f369b73
autodin.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

government and military defense telecommunications networks. an overview of various networks that are deployed by the military in the event of national emergency or covert communication. autodin and the more contemporary dsn networks.

tags | telephony
SHA-256 | bf17d5ecd745c0c48104c2d4f495f40ab342f6375a62691f5b7d24950c7ce2a5
mer-ninj.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

hacking meridian mail, ninja style.. a brief introduction to some of the efffective methods that can be used to gain access to a meridian mail voice mail network. written from both an attack and defense perspective.

tags | telephony
SHA-256 | a2cd05576d0d0a5638ca0ce6a96aea57eb36657b30511d1216d8d128ae7b65f1
clid-cid.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

defeating the caller-id system with simple but effective stealth. a guid to routing your call through the international pstn ninja style. describes some methods that could be used to effectivly block/cloak the origionating point code of your call, aswell as technical information on clid, and cli data transmission bursts. written for f41th magazine.

tags | telephony
SHA-256 | 6a710385a4c995edc29e8c654b689cd6df9fc0ada572b3c521fa33c8bae65079
mer-hack.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

meridian mail switch managment and security audit. meridian switch hacking (expunged) written for f41th magazine.

tags | telephony
SHA-256 | 53fdc2fa5f05cf1777e8479352cc1d861cec9b6e6f8e3889967f641800081772
systemx.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

bt systemx switch administration and overview of bt telcom operations and maintanance centers, written for f41th magazine. the system is based on a vax/vms platform with multi-level oracle databases, a look into the man-machine interface of uk switching, and remote switch/node interfaces.

tags | remote, telephony
systems | vax
SHA-256 | 779a4ec91dd89436fd5f104ed274d52dc3ddd09f544a61c1d4556c2c9473b03f
comint.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

covert government/military and diplomatic interception of telecommunications protocols and mediums. written for f41th magazine. an article that looks into the various covert methods deployed by international intellegence entitys to monitor/audit international communications for reasons of "national security" and informational gathering. includes a look into gchq, nsa and surrounding agencies that use provate wan's to form covert networks such as "project echelon".

tags | telephony, protocol
SHA-256 | 11595f66582c00b0f21a5b10af46020a74de3a4975af5e4d190e80bc49ba9b82
x-local.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

overview of the uk systemx and axe pstn network. added december 1999, written for f41th magazine. a guide to dmsu's, dlsu's, rcu's, and the uk pstn trunking network "masterplan". gBH.

tags | telephony
SHA-256 | 1f090e8554f5be05ed53b7a448628ee807e59fd1033b0de1a4a3177d925449f5
cnd.txt
Posted Apr 15, 2000

Calling Number Delivery: An explanation of Caller ID and how it works.

tags | telephony
SHA-256 | 63b8cbc2ad0c10c550351d2b5c22369b7301879e7b3adede2c751ae2a07e7fb5
sysid.html
Posted Mar 29, 2000

CellCo system ID listing.

tags | telephony
SHA-256 | 16b4e59f54dab4d17a90b240a231f53ccf261eabc2934acedb7f28d4f67c583a
faoftel.txt
Posted Mar 29, 2000

The Fine Art of Telephony

tags | telephony
SHA-256 | bf96c262439bb898f26175f14dca720d78e75f04121362ede2d6025ebebe1a93
anideliv.txt
Posted Mar 29, 2000

Automatic Number Identification delivery docs

tags | telephony
SHA-256 | 25c03d23068ed9de44cb2540c4f509394f3c58252cc93ede03088c17bb926a8c
eric1331.zip
Posted Mar 29, 2000

Ericsson 1331 NAM and Options programming

tags | telephony
SHA-256 | 5565d783a21994ff252552a35c5a41df4a358c2f1d8e4b03a587d9b5c7e49880
eric1341.zip
Posted Mar 29, 2000

Ericsson 1341 NAM and Options programming

tags | telephony
SHA-256 | 5581726504b3518e85d293a9d7644f231d5424da0a2cba812fe198abaf730f88
tacs.txt
Posted Feb 28, 2000
Authored by hybrid, faith | Site hybrid.dtmf.org

Technical info on TACS and how it can be used to monitor telephone calls.

tags | telephony, magazine
SHA-256 | 0e4701bc00451352a39e9f10346b7b34aae18e0341e0e36bfc358e18f1dd5b4f
Page 5 of 10
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close