For your convenience in reading: Subject lines are printed in RED and Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News


TELECOM Digest     Thu, 21 Apr 2005 17:30:00 EDT    Volume 24 : Issue 176

Inside This Issue:                             Editor: Patrick A. Townson

    New Spam Scam Exploits Pope's Death (Lisa Minter)
    Vonage to FCC: Qwest is Playing Nice, so SBC Should, Too (Jack Decker)
    Using Existing Home Telephone Wiring (Brian E Williams)
    Nextel Contract Expiration, How to Determine? (Steve)
    Time Warner, Comcast buy Adelphia (Telecom dailyLead from USTA)
    TC 35 Modules and 2N Gateways (dee4darek@gmail.com)
    Re: AOL to Block Identity Theft Sites (Ed Clarke)
    Re: New Technology Poses 911 Peril VOIP Not Part of Emergency (JustTime)
    Re: CNID Printouts on Cell Bills, was: SprintPCS Lousy Web (Justin Time)
    Re: Markey Targets Credit ID Theft: Wants Security Freeze (B. Williams)
    Re: ID Thief Wins Constantly! TRUE Story (Tim@Backhome.org)
    Re: It Happened Again (T. Sean Weintz)
    Re: Getting Serious About the War on Spam (hancock4@bbs.cpcn.com)
    Re: Getting Serious About the War on Spam (news01@jmatt.net)

Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet.  All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote.  By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.

               ===========================

Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent.  Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.

We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime.   Geoffrey Welsh

               ===========================

See the bottom of this issue for subscription and archive details
and the name of our lawyer; other stuff of interest.  

----------------------------------------------------------------------

Date: Thu, 21 Apr 2005 03:09:24 -0400
From: lisa_minter2001@yahoo.com
Subject: New Spam Scam Exploits Pope's Death


by Sharon Gaudin

http://www.internetnews.com/security/article.php/3497551

A new spam campaign is exploiting people's interest in and grief over
the death of Pope John Paul II.

The spam claims to offer readers a free collection of books written by
the late pope. The email tells users to click on a link to receive the
gift, but the link actually takes them to a Web site offering 'free
money-making advice'.

"This is absolutely slimy," says Carole Theriault, a security
consultant with Sophos, Inc., an anti-virus and anti-spam company with
U.S. headquarters in Lynnfield, Mass. "We started seeing this scam
over the weekend, soon after the pope's funeral ... They're using the
pope's name with all the news surrounding his death and the emotional
investment to fool people."

Pope John Paul II's funeral was held Friday, April 8.

Theriault says this is just the latest example of spammers using
current headlines and emotional topics to lure people in.

"We're seeing an increasing amount of spam using current events to get
into people's inboxes," she says. "They're stealing headlines from CNN
to try to bypass simple spam filters ... It's tasteless. People don't
like being mislead. If they want a book on Pope John Paul II, they
don't want to be misdirected to a site about money-making secrets."

Theriault notes that similar spam campaigns were launched soon after
the Dec. 26 tsunami crisis.

"Spammers are prepared to plumb the depths in their attempt to get
Internet users to buy their goods or services," adds Graham Cluley,
senior technology consultant for Sophos. "The pope's death has been
mourned by millions around the world, yet for the spammers it's just
another opportunity to sell their unwanted wares."

Theriault says she doesn't think this particular campaign will be a
long-lasting one.

"We expect this particular spam campaign to die out as the stories
about the pope's death and funeral trickle from our news bulletins,"
she says. "However, we can be sure that spammers will try and
capitalise on the next world event, be it a disaster or a triumph."

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.


[TELECOM Digest Editor's Note: Well, all these complainers should
read the advice given by our resident anti-spam expert, Robert Bonomi
who would tell them (1) any real man would know how to get his 
computer to do his bidding if only they would get rid of the 
Microsoft stuff on it and (2) if they really can't hack it, then
give up the computer and the net totally. Sounds like a good deal to
me.  PAT]

------------------------------

From: Jack Decker <jack-yahoogroups@withheld_on_request>
Date: Thu, 21 Apr 2005 00:47:54 -0400
Subject: Vonage to FCC: Qwest is Playing Nice, so SBC Should, Too


http://blogs.zdnet.com/ip-telephony/?p=365

Vonage to FCC: Qwest is playing nice, so SBC should, too

-Posted by Russell Shaw @ 2:44 pm 

[.....]  Vonage claims "that SBC has agreed to begin discussions on
working cooperatively to improve 911 offerings available to customers
using VoIP," Wilhelm wrote. "However, Vonage also noted its concern
that SBC has already provided 911 interconnection access to its
unregulated VoIP affiliate.

"The terms and conditions of the access granted its affiliate are also
not being made public and are subject to a non-tariffed 'ancillary'
agreement," Wilhelm added. "Vonage reiterated its strong concern about
any practice that would permit an ILEC to offer 911 access to its
unregulated affiliate on a confidential and non-tariffed basis while
restricting customers of other VoIP services from receiving the same
level of access."

Full story at:
http://blogs.zdnet.com/ip-telephony/?p=365

How to Distribute VoIP Throughout a Home:
http://michigantelephone.mi.org/distribute.html

If you live in Michigan, subscribe to the MI-Telecom group:
http://groups.yahoo.com/group/MI-Telecom/

------------------------------

From: BrianEWilliams <sorry_no_email@yahoo.com>
Subject: Using Existing Home Telephone Wiring
Date: 21 Apr 2005 05:50:15 -0700


I have POTS wired through the house.  Is it simple to get my VoIP
service to use this wiring?  The optimist in me says all I have to do
is turn off POTS, run a wire from the telephone jack on the VoIP
router, and plug it into a telephone wall jack.  The realist in me says
this would be way too simple.  Any thoughts?


[TELECOM Digest Editor's Note: You are on the right path, Brian. Just
make _absolutely_ positive that the POTS line is removed _at the
demarc_ where it cannot get in the way. Dialtone from the POTS line
colliding with dialtone from VOIP means disaster for your VOIP adapter
which will probably fry out. It probably won't hurt the telco central
office switch -- although 'they' may have to go reset a fuse
sometimes -- but it can mean death to the VOIP adapter if voltage from
the one comes in contact with the other. And don't just remove a
couple wires on a local box somewhere unless you know your house
wiring _very well_; go outside to the demarc or wherever it is and
pull the wires from central out of the way there.   PAT]

------------------------------

From: steve <steven_jones_71@hotmail.com>
Subject: Nextel Contract Expiration, how to determine?
Date: 21 Apr 2005 06:00:38 -0700
Organization: http://groups.google.com


Hi,

I am trying to determine what the expiration date on my Nextel
cellular contract is.  I cannot find it on my bill, or logging on to
online account management.

I would like to determine this without calling Nextel if possible, as
I'm afraid they might pull some trick and extend it if I call.

Any suggestions as to where I can obtain this info?

Thanks,

Steve

------------------------------

Date: Thu, 21 Apr 2005 13:50:06 EDT
From: Telecom dailyLead from USTA <usta@dailylead.com>
Subject: April 21, 2005 - Time Warner, Comcast buy Adelphia


Telecom dailyLead from USTA
April 21, 2005
http://www.dailylead.com/latestIssue.jsp?i=21008&l=2017006

		TODAY'S HEADLINES
	
NEWS OF THE DAY
* Time Warner, Comcast buy Adelphia
BUSINESS & INDUSTRY WATCH
* Verizon picks Motorola for FTTP gear
* Sprint's global hotspots double through deals
* Analysis: VoIP's future may be shaped this year
* EarthLink, Qualcomm, AT&T and Nokia report earnings
USTA SPOTLIGHT 
* At SUPERCOMM: Register today for the IP Video Conference
EMERGING TECHNOLOGIES
* Vodafone takes aim at BlackBerry
* 10 telecom technologies to watch

Follow the link below to read quick summaries of these stories and others.
http://www.dailylead.com/latestIssue.jsp?i=21008&l=2017006

------------------------------

From: dee4darek@gmail.com (dee4darek@gmail.com)
Subject: TC 35 Modules and 2N Gateways
Date: 21 Apr 2005 05:45:53 -0700
Organization: http://groups.google.com


Hello,

I want to buy big amount of Siemens TC 35 modules (new or used) and
GSM gateway (2N - working on tc 35). If you have any information where
can I find please let me know, below link with TC 35 description,

http://www.datek.no/Hardware/SiemensTC35/Datasheet-TC35_module.pdf

Please answer to my email.

dee4darek@gmail.com

Regards,

Darek

------------------------------

From: Ed Clarke <clarke@cilia.org>
Subject: Re: AOL to Block Identity Theft Sites
Date: 21 Apr 2005 11:01:50 GMT
Organization: Ciliophora Associates, Inc.
Reply-To: clarke@cilia.org


On 2005-04-20, mc <mc_no_spam@uga.edu> wrote:

> In my opinion, all browsers should block or warn about references of the 
> form:

> <a href="xxxxx">yyyyy</a>
> where yyyyy is a URL that does not match xxxxx.
> Simple - why don't they do it?

Virtual hosts. I have half a dozen websites on a single IP; costs my
customers less for web hosting.  The only time it makes a difference
is for vanity -- reverse host maps to forward host -- or for SSL.


This signature left blank.

------------------------------

From: Justin Time <a_user2000@yahoo.com>
Subject: Re: New Technology Poses 911 Peril VOIP Not Part of Emergency
Date: 21 Apr 2005 05:26:17 -0700
Organization: http://groups.google.com


Dave Garland wrote:

Of course.  But is *sounds* like Vonage is in fact telling people.
There's no reason why the county 911 can't use CID on a non-911 line
to access their database, except that they don't want to be bothered.

The point is that CID can be blocked and is not guaranteed to be
delivered.  The ANI information the 911 centers use is pretty much the
same data that feeds the telephone company billing system.  That
information cannot be blocked or opted out of providing.  Of course,
if you want the PSAP to use CID information to take emergency calls on
a non-emergency number and do the look-up from the CID it would be
permissible to have the PSAP lines configured for Anonymous Call
Rejection which would reject all calls that didn't have CID.  That
would insure the PSAP had at least some information to work with.


[TELECOM Digest Editor's Note: On 'regular' 911, attempts to use *67
in front of it are ignored. A good way to phrase it is that on calls
to 911 the police always pay the bill (for the transit of the traffic)
and they _insist_ on getting the numbers of the calling parties, just
like on an 800 number; when someone else is paying, you get no choice
in the matter. I notice an interesting thing about Vonage and *67
also. *67 _does work_, but if you do *67-something else you'll hear
a distinct 'click' after the *67 has been dialed and a new dial tone
 from some different switch it sounds like to me, jumps in and takes
the remainder of your dialing string. I dunno why ... but Vonage does
not accept *67-911 either, so there is no way the caller ID in those
cases would not get a story for its owners.   PAT]

------------------------------

From: Justin Time <a_user2000@yahoo.com>
Subject: Re: CNID Printouts on Cell Bills, was: SprintPCS Lousy Web
Date: 21 Apr 2005 05:46:18 -0700
Organization: http://groups.google.com


Interesting point.  But couldn't the cellular companies come back
stating they had delivered the CID when the phone rang?  That you
didn't record the information isn't their concern.

But again, if you use the argument that your cell phone is like an 800
number that is entitled to billing information, then the same argument
could be made for your POTS line as well.  You are paying to receive
the service.

Rodgers Platt

------------------------------

From: BrianEWilliams <sorry_no_email@yahoo.com>
Subject: Re: Markey Targets Credit ID Theft: Wants Security Freeze
Date: 21 Apr 2005 06:43:37 -0700


Great, another PIN to remember!  How about getting an email every time
my credit file is accessed?  Seems like a reasonable compromise.

------------------------------

From: Tim@Backhome.org
Subject: Re: ID Thief Wins Constantly! TRUE Story
Date: Thu, 21 Apr 2005 08:38:05 -0700
Organization: Cox Communications


There is a different between this criminal and a bank robber.
Innocent bystanders are in harm's way and are often shot and killed
during bank robberies.

You are rightfully offended to a point, but please don't suggest that
a thug with a gun is no more dangerous than a swindler.

Cheryl Rudow Pope wrote:

> Why The Courts Work For The Criminal and NOT The Victims! Illinois
> Now they send her on Vacation?? I am a victim of Identity Theft
> committed by a convicted felon who has done this to me several times.

> She was let off because of claims of medical conditions?? Like she
> can't be treated in prison? What is wrong here? So she can rob and
> steal from people and all she has to do when the Court system catches
> up with her is to just claim she has cancer, MS or some other staged
> up claim and she is FREE? That is what she used in both counties below
> to get off! Just think how much money these thieves can get away with!
> Like Probation is going to do a darn thing? ONLY IN AMERICA! She is no
> different from someone that robs a bank! I am OUTRAGED AT THE JUSTICE
> SYSTEM PERIOD! What exactly will stop her from doing this to me again?

> In 95 she stole my Identity and there were NO laws to prosecute
> her. NOW here we are in 2005 and have laws and alls they do is give
> her probation? PLUS she is a prior convicted FELON with a Criminal
> Background that does NOT stop!

> The felon now has 8 Current Identity Theft Charges/Check Deception
> Charges in 2 Counties, Will and Dupage. Six charges in Will and 2
> charges in Dupage. She also did prison time in 95 For Embezzelling and
> Employee Theft in Dupage County.

> I cannot believe the Judge gave her probation??? In DUPAGE COUNTY
> Dupage County Case Numbers: 04 CF 2875 04 CF 1193 February 2, 2005 she
> faced sentencing of the above cases. 1 Identity Theft and 1 Check
> Deception. I was the Identity Theft Victim.

> The Judge AGAIN gave her probation because Will County did and also
> she is claiming to have a Medical Condition? I don't care she can be
> treated in PRISON! ALSO why is she given the ROYAL treatment of being
> on Probation ?? SHE has a very LONG criminal background with drug
> conviction charges, Identity Theft charges and many more. How can a
> person on Probation for 3 years in 2 Different Counties with 8 Current
> Convictions get to travel and go on vacation when SHE got Probation
> because she claimed a so called medical condition that kept her from
> going to Jail and now a month later she takes a ski trip vacation?

> Here is the reply I got from Will County State's Attorney: On March
> 18, 2005, the defendant appeared with her attorney. The defendant
> requested the court's permission to travel to the State of Colorado
>  from March 23, 2005 to April 3, 2005. Over the State's objection, the
> court granted it, provided she have her court costs paid in full. They
> are, so she did. How did she get away with this? She is Cured, FREE
> and Taking Vacations on Stolen Money! The Courts sure work for the
> criminal here!

> [TELECOM Digest Editor's Note: Will County and Dupage County are both
> in the metropolitan Chicago area; Will being south/southwest and
> Dupage being west of Cook County/Chicago respectively. But, Ms. Pope,
> you seem to infer she was due back in court or probation on April 3,
> about two weeks ago. What has happened since then? Your story does not
> surprise me, knowing how the courts in that area operate. Can you
> bring us up to date?   PAT]


[TELECOM Digest Editor's Note: The only reason, IMO, that a criminal
uses a gun in a bank robbery rather than a computer is because he
is not smart enough. If he knows how to use a computer he likely 
will not get his hands dirty with the brute force a gun implies.  PAT]

------------------------------

From: T. Sean Weintz <strap@hanh-ct.org>
Subject: Re: It Happened Again
Date: Thu, 21 Apr 2005 12:07:00 -0400
Organization: Posted via Supernews, http://www.supernews.com


TELECOM Digest Editor wrote:

> Again, today, Wednesday, late evening, spam rolled in so heavily here
> at massis, about 6 or 8 messages got lost in the shuffle, including
> one from Robert Bonomi. When the last issue before this came out,
> around 7 PM Wednesday evening, it was a larger than usual issue and
> the queue totally cleared out. Then midnight Wednesday, start of
> Thursday, we were hit again with a spam attack.  So if you responded
> Wednesday evening sometime and it is not here, please replace it. I
> think it is quite ironic that one of Bonomi's messages got lost this
> time around, somewhere between a couple of the phishing attacks and
> one of the 'God Bless You from Nigeria Where my Late Husand was Killed
> by the Rebels' messages. 

> PAT

You might want to think about investing in a good anti-spam appliance.
Of course for that to be feasible, you must host your own email (run
your own mail server) which I am not sure you do.


[TELECOM Digest Editor's Note: Alas, I do not. The mail server is
purely part of the MIT system, besides which, I am not sure I am
smart enough to run a mail server. PAT]

------------------------------

From: hancock4@bbs.cpcn.com
Subject: Re: Getting Serious About the War on Spam
Date: 21 Apr 2005 09:45:49 -0700
Organization: http://groups.google.com


Paul Vader wrote:

>> Well then, who IS responsible to do the job?  If no such job
>> exists, why isn't one created?

> A) Why would anyone living in a free country want controls on what people
>    can say?

Your question assumes there are no controls on what people can say.
That assumption is wrong -- we have many controls on what we can say.
Among other things, you may not threaten anyone, harass anyone,
disburse certain kinds of pornography or libel or slander another
person.

Further, various communication media have additional restrictions
on them.  The US Mail has restrictions, as does the use of the
telephone or loudspeakers.

Spam is harassment.  It requires the _receiver_ to expend time
and money to deal with it day after day.

> B) Do you really misunderstand the internet so badly that you think that
>    there's any place you COULD create controls?

Any computer system has the capability of including controls.
Well-run computer systems had controls included within them right from
the start.  I don't know the technical details of the Internet; nor is
there any need for me to.  The fact is that the Internet has serious
problems and it's up to the people who operate it to fix it.

> C) Who says what's allowable or not? I vote for NOBODY.

See A) above.  Laws already exist that determine what is
allowable or not.  Sabotage via a "virus" is pretty obvious.
Further, fixing the Internet is not merely an issue of
"content" but also dealing with cost allocation and sender
identity.

> The internet doesn't exist - it's just a bunch of public ways
> connecting private networks. No website runs 'on the internet' - it's
> a peephole into private property that you get to look into. If you
> don't like what's going on inside, don't peek. *

That's flat out wrong.  Pat below gives a good analogy, but
there are others.  You do not have anonymity when using your
telephone -- your number is transmitted to certain recipients
whether you like it or not.  The US Mail is a "public way"
connecting people, but there are laws on using it just the same,
just as there are laws on using your telephone.

> [TELECOM Digest Editor's Note: Oh, sure as hell, Paul!  And every
> public highway in the world has lots of private driveways attached to
> it, but there are still rules to follow in order to be on the
> highway.

Excellent point.

> Let me ask you this: In 1905, when automobiles were first beginning to
> show up in mass numbers (on the non-highways which connected the
> little towns and roads of America) were you also opposed to speed
> limits, license plates -- indeed driver's licenses -- and rules which
> pertain to hit and run, etc. A lot of people were, you know, seriously.

The extent of such motor vehicle laws remains under great debate
today -- many people oppose new public safety laws (see misc.transport.road
for passionate discussions on this issue).  Many people object to being
ordered to wear their seatbelts or not use their cell phone.

But the bottom line is that as soon as there was more than one car on
the road with the potential of hitting each other (as well as people
and objects off to the side), laws were required to control use.  The
more cars on the road, the more laws required.

When the Internet was a private network serving an exclusive
community, few rules were needed.  But like roads, the Internet is no
longer a private enclave.  People and businesses are dependent on
their computers and email to conduct business and viruses and spam
have shut whole businesses down.  This is unacceptable just as
tolerating drunk drivers is unacceptable.

In the 1950s, engineers studying growing car accidents realized
certain things could be done to save lives.  The auto industry fought
these tooth and nail, a fight that continues to this day.  It's the
same thing with the Internet -- laws are required to protect the public
interest.

The issue is not whether laws are required, but rather what specific
laws and the degree of regulation are required.

Bob Goudreau wrote:

> inconceivable that an economy with *no one at all* in charge could not
> only work, but indeed actually work much *better* than one run in a
> top-down fashion by a select group of alleged economic experts.

Your analogy isn't true -- it's wrong to say the U.S. economy has
"no one at all" in charge.  Far from it.

First off, considerable control of the economy is exercised by the
Federal Reserve in regulating banking activity and the govt itself
influences activity by tax policy.

Secondly, and more importantly, the economy operates under a complex
set of laws governing commercial activity.  If I hand you a piece of
colored slip of paper printed "certified check" you have very strong
confidence that paper will convert into cash for you without question
or trouble.  That doesn't happen by accident, it happens by laws
regulating the banking system.

These laws didn't happen by chance, they happened because the economy
was growing but lacked the confidence and controls to work without
undue risk.  Many laws came out of the economic collapse of 1929.

Indeed, a big problem with today's Russian economy is that there are
few laws and controls on their economy.  Assumptions safely made in
U.S. trade cannot be done in Russia.  Everything has much higher risk.

> And so it is with the internet.  It turns out that just letting
> different private networks work out for themselves the terms of how
> they wanted to connect (or not) with other such networks became far
> more attractive to customers than the old centrally controlled "walled
> garden" private commercial networks that were around in the early
> 1980s (Compuserve, the original AOL, etc.)

That arrangement has serious problems.  Trying to fix said problems
is the point of our discussion.

IMHO, the private networks liked Compuserve failed because (1) they
came along too early in the PC era and (2) they were too expensive.
There was a limit on how much work could be done on a 2400 modem and
Compuserve virtually metered every keystroke.  Having an email account
was of little value when no one else you knew had a computer and
account in those days.

> No one is "in charge" of the internet, any more than someone is "in
> charge" of a market economy.

> Yes, both of them need a certain amount of rules in order to function
> (e.g., consensus on which currencies/protocols are popular enough to
> merit being used to exchange value/data; rights to own physical
> property/address numbering and name-space resources; rules against
> fraudulent behavior that would deprive someone of their property,
> etc.)

Your two statements contradict each other.  Either there is control or
no control.  Clearly there IS control.  Thus, our debate becomes not
one of having control (as some are framing it), but rather the
_degree_ of control.

> But you can't go too crazy with the rules, or else you end up
> either with rules that don't/can't get enforced (see: Prohibition, or
> the "CAN-SPAM" act) or you have to implement such an onerous
> overweening system of control that you lose the benefits of the free
> exchange of property/data (see: the North Korean economy, or the
> rigidly-controlled Chinese internet).

When mandatory seatbelt-wearing laws came out, not everybody obeyed
them.  But they had the positive effect of encouraging more seatbelt
use and saved many lives.  Laws and enforcement aren't perfect, but
the system overall does work.

The U.S. prospered BECAUSE of regulated trade laws (provided for
in the original Constitution), not in spite of them.  People had
far higher confidence and consistency in what they were dealing with.

------------------------------

From: news01@jmatt.net
Subject: Re: Getting Serious About the War on Spam
Date: 21 Apr 2005 10:48:14 -0700
Organization: http://groups.google.com


> [TELECOM Digest Editor's Note: I still suggest returning undelivered
> email 'to the sender'.

I used to agree with that.  I thought it was irresponsible and
inexcusable for any ISP to throw away mail without notifying (or
getting previous approval from) either the recipient or the (alleged)
sender.  But, after considering the potential effect on an innocent
party whose address gets forged on spam, I have reconsidered.  I still
hate it when I send mail that just silently disappears with no
notification or explanation, but there are worse things that could
happen.  However, I think letting the sending server handle the
notification alleviates this problem.

> If some innocent person gets a jillion pieces of mail because
> *someone else forged his email address* then maybe that person will
> get angry enough to join the effort to try and clean up the net.

I have already joined the effort to clean up the net.  My website is
helping Project Honeypot identify email-harvesting bots.  (
http://www.projecthoneypot.org/ )

My SMTP server is using RBL to reject a LOT of incoming spam, so I
don't have to whine about losing legitimate incoming email in a flood
of spam.  And it's up to the sending servers to decide whether or not
to notify the sender.  My guess is that legitimate servers will, and
spambots won't.  And if anybody either gets an erroneous notification
about rejected spam that he didn't really send, or fails to get a
notification when his legitimage message didn't reach me, that's the
fault of the sending server, not mine.

I'm doing what I can to clean up the net. I don't need a jillion
pieces of mail to convince me cleaning up the net is a good thing.


[TELECOM Digest Editor's Note: But isn't also a good idea to auto-ack
the alleged senders of the spam mail since if a person gets enough
of those they may be moved to clean out the zombies in their own
computer (if they have any, or if they don't) become angry enough to
join in the fight in a big time way?  That is why I am seriously
thinking about changing my auto-ack to say 'thank you for writing me
and if you didn't write to me then welcome to the club'.  PAT]

------------------------------


TELECOM Digest is an electronic journal devoted mostly but not
exclusively to telecommunications topics. It is circulated anywhere
there is email, in addition to various telecom forums on a variety of
networks such as Compuserve and America On Line, Yahoo Groups, and
other forums.  It is also gatewayed to Usenet where it appears as the
moderated newsgroup 'comp.dcom.telecom'.

TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Patrick Townson. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.

Contact information:    Patrick Townson/TELECOM Digest
                        Post Office Box 50
                        Independence, KS 67301
                        Phone: 620-402-0134
                        Fax 1: 775-255-9970
                        Fax 2: 530-309-7234
                        Fax 3: 208-692-5145         
                        Email: editor@telecom-digest.org

Subscribe:  telecom-subscribe@telecom-digest.org
Unsubscribe:telecom-unsubscribe@telecom-digest.org

This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then.  Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!

URL information:        http://telecom-digest.org

Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/
  (or use our mirror site: ftp.epix.net/pub/telecom-archives)

Email <==> FTP:  telecom-archives@telecom-digest.org 

      Send a simple, one line note to that automated address for
      a help file on how to use the automatic retrieval system
      for archives files. You can get desired files in email.

*************************************************************************
*   TELECOM Digest is partially funded by a grant from                  *
*   Judith Oppenheimer, President of ICB Inc. and purveyor of accurate  *
*   800 & Dot Com News, Intelligence, Analysis, and Consulting.         *
*   http://ICBTollFree.com, http://1800TheExpert.com                    *
*   Views expressed herein should not be construed as representing      *
*   views of Judith Oppenheimer or ICB Inc.                             *
*************************************************************************

ICB Toll Free News.  Contact information is not sold, rented or leased.

One click a day feeds a person a meal.  Go to http://www.thehungersite.com

Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.

              ************************

DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO
YOUR CREDIT CARD!  REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST
AND EASY411.COM   SIGN UP AT http://www.easy411.com/telecomdigest !

              ************************

Visit http://www.mstm.okstate.edu and take the next step in your
career with a Master of Science in Telecommunications Management
(MSTM) degree from Oklahoma State University (OSU). This 35
credit-hour interdisciplinary program is designed to give you the
skills necessary to manage telecommunications networks, including
data, video, and voice networks.

The MSTM degree draws on the expertise of the OSU's College
of Business Administration; the College of Arts and Sciences; and the
College of Engineering, Architecture and Technology. The program has
state-of-the-art lab facilities on the Stillwater and Tulsa campus
offering hands-on learning to enhance the program curriculum.  Classes
are available in Stillwater, Tulsa, or through distance learning.

Please contact Jay Boyington for additional information at
405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at
http://www.mstm.okstate.edu

              ************************

   ---------------------------------------------------------------

Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list. 

All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.

End of TELECOM Digest V24 #176
******************************

Return to Archives**Older Issues