what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files

mm1admin.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

advanced guide to meridian mail administration, call routing etc via meridian adminstation tool (MAT) aswell as ESN analysis, and MIRAD built in conference loops.

tags | telephony
SHA-256 | 2baad51dc964ac0856e14493d9de2b3b2d4d22472fd36b219d3b5d27df8b7064
dc_sysad.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a very old file hybrid wrote for darkcyde when it first started in 97 - brief guide to some administration box in a voicemail system.

tags | telephony
SHA-256 | a6b102f043e4e34adfc77a8f4b2c85f9445f76a83df3d032af8121068d565d03
audix.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

very brief guide to using audix voicemail systems (old).

tags | telephony
SHA-256 | 835a363a0bad0b9392d21318e46762edb76ae50ba4198afd786b207cacf0219e
mer-ninj.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

hacking meridian mail, ninja style.. a brief introduction to some of the efffective methods that can be used to gain access to a meridian mail voice mail network. written from both an attack and defense perspective.

tags | telephony
SHA-256 | a2cd05576d0d0a5638ca0ce6a96aea57eb36657b30511d1216d8d128ae7b65f1
mer-hack.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

meridian mail switch managment and security audit. meridian switch hacking (expunged) written for f41th magazine.

tags | telephony
SHA-256 | 53fdc2fa5f05cf1777e8479352cc1d861cec9b6e6f8e3889967f641800081772
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close