what you don't know can hurt you
Showing 101 - 125 of 240 RSS Feed

Telephony Files

audix.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

very brief guide to using audix voicemail systems (old).

tags | telephony
MD5 | 36664854666f56d5b18bc54333170c92
9x_tel.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

introduction to the digital phone network. - Analogue systems and techniques, Basic network structures, Basic exchange structures, centrex, FDM hierarchy, PCS services, signalling, SPC, trunking, ACD, ADSL, ATM, digital centrex, CCITT parts.

tags | telephony
MD5 | 8df213cbaa3a137c8577a18a2b4d11b0
9x_swr8.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to the switched route of an 8oo number via the means of SS7 network protocols. also information on DSAC(dial service admin center).

tags | telephony, protocol
MD5 | 249ea89825e97565fa8c728f2907968f
9x_scntp.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to uk prefix assignments, including uk toll-free prefixes. - usefull for scanning, spunged from oftel.

tags | telephony
MD5 | f3b38cb638ac1beece815fa8762c5f50
9x_lmpt.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to latitude meetingplace teleconferencing. - Meeting Place is a powerful teleconferencing system designed to accommodate up to 120 ports in any combination of simultaneous conference calls.

tags | telephony
MD5 | 9c6b88f6d43cdecc9aa01f2df69408b6
9x_gets.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

GETS (Government Emergency Telecommunications System) - Since the begining of telecommunications, goverments around the world have always had their own secure voice and data networks. These secret networks have always served many purposes for government and military organistaions.

tags | telephony
MD5 | 2f6e2b8c5f144f845d27271b3fe14425
9x_dcom.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to new digital telcoms - Switching Hierarchys, North American Digital Hierarchies, The Local Subscriber Loop and various other digitaly derived telcom info.

tags | local, telephony
MD5 | a6921ddb20b368e51c48a5c4c041ae28
9x_cit.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

CTI (Computer-Telephony-Integration) - CTI stands for Computer Telephony Integration, the term covers a vast range of different technologys, from single user modem integration pacages to vast three-tier architectures for call-centres.

tags | telephony
MD5 | 4cdea0eb10977504f9213c9de656e2dc
wb900.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a guide to the BT WB900 unit. - WB9OO is a system designed by BT to split a line into two carriers. This way two seperate BT customers can use the same line with privacy, in other words two seperate incoming/outgoing calls can be made on 1 subscriber loop similtaniously.

tags | telephony
MD5 | b6f347e974031b60007ce3281e89526c
swtchhst.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a brief guide to the evolution of switching systems, from electromechanical switches to present day digital switches. - very brief.

tags | telephony
MD5 | 37acaf5afd057b71e88dbfd450eee296
autodin.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

government and military defense telecommunications networks. an overview of various networks that are deployed by the military in the event of national emergency or covert communication. autodin and the more contemporary dsn networks.

tags | telephony
MD5 | fa3bdf818452bd0f9dd7398fba2a67ee
mer-ninj.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

hacking meridian mail, ninja style.. a brief introduction to some of the efffective methods that can be used to gain access to a meridian mail voice mail network. written from both an attack and defense perspective.

tags | telephony
MD5 | 972340304f9e96d766281cf5e0a586e2
clid-cid.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

defeating the caller-id system with simple but effective stealth. a guid to routing your call through the international pstn ninja style. describes some methods that could be used to effectivly block/cloak the origionating point code of your call, aswell as technical information on clid, and cli data transmission bursts. written for f41th magazine.

tags | telephony
MD5 | 7df6380886d035edd86887043fe27b49
mer-hack.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

meridian mail switch managment and security audit. meridian switch hacking (expunged) written for f41th magazine.

tags | telephony
MD5 | 62846b559768cd51698b15de76f54064
systemx.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

bt systemx switch administration and overview of bt telcom operations and maintanance centers, written for f41th magazine. the system is based on a vax/vms platform with multi-level oracle databases, a look into the man-machine interface of uk switching, and remote switch/node interfaces.

tags | remote, telephony
systems | vax
MD5 | 0f9e81592d3b2509db6673ddff785b37
comint.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

covert government/military and diplomatic interception of telecommunications protocols and mediums. written for f41th magazine. an article that looks into the various covert methods deployed by international intellegence entitys to monitor/audit international communications for reasons of "national security" and informational gathering. includes a look into gchq, nsa and surrounding agencies that use provate wan's to form covert networks such as "project echelon".

tags | telephony, protocol
MD5 | ea754019f9beb2dbd5715a47f93ae9bc
x-local.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

overview of the uk systemx and axe pstn network. added december 1999, written for f41th magazine. a guide to dmsu's, dlsu's, rcu's, and the uk pstn trunking network "masterplan". gBH.

tags | telephony
MD5 | a4a5efef5c0be723f7ff678100d001c7
cnd.txt
Posted Apr 15, 2000

Calling Number Delivery: An explanation of Caller ID and how it works.

tags | telephony
MD5 | e512c0e62086da7b8d3fe9eb9b444cd9
sysid.html
Posted Mar 29, 2000

CellCo system ID listing.

tags | telephony
MD5 | 815759a8fc8620ed6d31f442efb30b2b
faoftel.txt
Posted Mar 29, 2000

The Fine Art of Telephony

tags | telephony
MD5 | a0bf45f775201ff50bae1f9c15965c50
anideliv.txt
Posted Mar 29, 2000

Automatic Number Identification delivery docs

tags | telephony
MD5 | b289c527034456d75649e5b356c1df1b
eric1331.zip
Posted Mar 29, 2000

Ericsson 1331 NAM and Options programming

tags | telephony
MD5 | 69d7955ee9bb8ca30aec2f0c788b66de
eric1341.zip
Posted Mar 29, 2000

Ericsson 1341 NAM and Options programming

tags | telephony
MD5 | 0a69c22a34bba936d3fbc638e86450a3
tacs.txt
Posted Feb 28, 2000
Authored by hybrid, faith | Site hybrid.dtmf.org

Technical info on TACS and how it can be used to monitor telephone calls.

tags | telephony, magazine
MD5 | e239321c86e3e8ef08d4347cbbfe1266
pana03.txt
Posted Jan 3, 2000

PANASONIC EB 300, EZ542, EZ952 Series NAM programming

tags | telephony
MD5 | cea122f800607563b10c752c214d2a3a
Page 5 of 10
Back34567Next

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    14 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close