For your convenience in reading: Subject lines are printed in RED and Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News

 

TELECOM Digest     Tue, 10 May 2005 02:30:00 EDT    Volume 24 : Issue 205

Inside This Issue:                             Editor: Patrick A. Townson

    Internet Attack Called Broad and Longlasting by Investigators (L Minter)
    Talking About Bloggers (Lisa Minter)
    ACL in Avaya Gateways (JRRJR)
    Re: Who Gets to See the E-mail of the Deceased? (Lisa Hancock)
    Re: Phone Line on cat 5 10-Base-T Ethernet? (Thor Lancelot Simon)
    Re: Name Twin's Misdeeds Plague a Good Driver (DevilsPGD)

Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet.  All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote.  By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.

               ===========================

Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent.  Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.

We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime.   Geoffrey Welsh

               ===========================

See the bottom of this issue for subscription and archive details
and the name of our lawyer; other stuff of interest.  

----------------------------------------------------------------------

From: Lisa Minter <lisa_minter2001@yahoo.com>
Subject: Internet Attack Called Broad and Longlasting by Investigators 
Date: Mon, 9 May 2005 23:49:59 -0500


By JOHN MARKOFF and LOWELL BERGMAN

SAN FRANCISCO, May 9 - The incident seemed alarming enough: a breach
of a Cisco Systems network in which an intruder seized programming
instructions for many of the computers that control the flow of the
Internet.

Now federal officials and computer security investigators have
acknowledged that the Cisco break-in last year was only part of a more
extensive operation -- involving a single intruder or a small band,
apparently based in Europe -- in which thousands of computer systems
were similarly penetrated.

Investigators in the United States and Europe say they have spent
almost a year pursuing the case involving attacks on computer systems
serving the American military, NASA and research laboratories.

The break-ins exploited security holes on those systems that the
authorities say have now been plugged, and beyond the Cisco theft, it
is not clear how much data was taken or destroyed. Still, the case
illustrates the ease with which Internet-connected computers -- even
those of sophisticated corporate and government networks -- can be
penetrated and also the difficulty in tracing those responsible.

Government investigators and other computer experts sometimes watched
helplessly while monitoring the activity, unable to secure some
systems as quickly as others were found compromised.

The case remains under investigation. But attention is focused on a
16-year-old in Uppsala, Sweden, who was charged in March with breaking
into university computers in his hometown. Investigators in the
American break-ins ultimately traced the intrusions back to the
Uppsala university network.

The F.B.I. and the Swedish police said they were working together on
the case, and one F.B.I. official said efforts in Britain and other
countries were aimed at identifying accomplices. "As a result of
recent actions" by law enforcement, an F.B.I. statement said, "the
criminal activity appears to have stopped."

The Swedish authorities are examining computer equipment confiscated
from the teenager, who was released to his parents' care. The matter
is being treated as a juvenile case.

Investigators who described the break-ins did so on condition that
they not be identified, saying that their continuing efforts could be
jeopardized if their names, or in some cases their organizations, were
disclosed.

Computer experts said the break-ins did not represent a fundamentally
new kind of attack. Rather, they said, the primary intruder was
particularly clever in the way he organized a system for automating
the theft of computer log-ins and passwords, conducting attacks
through a complicated maze of computers connected to the Internet in
as many as seven countries.

The intrusions were first publicly reported in April 2004 when several
of the nation's supercomputer laboratories acknowledged break-ins into
computers connected to the TeraGrid, a high-speed data network serving
those labs, which conduct unclassified research into a range of
scientific problems.

The theft of the Cisco software was discovered last May when a small
team of security specialists at the supercomputer laboratories, trying
to investigate the intrusions there, watched electronically as
passwords to Cisco's computers were compromised.

After discovering the passwords' theft, the security officials
notified Cisco officials of the potential threat. But the company's
software was taken almost immediately, before the company could
respond.

Shortly after being stolen last May, a portion of the Cisco
programming instructions appeared on a Russian Web site. With such
information, sophisticated intruders would potentially be able to
compromise security on router computers of Cisco customers running the
affected programs.

There is no evidence that such use has occurred. "Cisco believes that
the improper publication of this information does not create increased
risk to customers' networks," the company said last week.

The crucial element in the password thefts that provided access at
Cisco and elsewhere was the intruder's use of a corrupted version of a
standard software program, SSH. The program is used in many computer
research centers for a variety of tasks, ranging from administration
of remote computers to data transfer over the Internet.

The intruder probed computers for vulnerabilities that allowed the
installation of the corrupted program, known as a Trojan horse, in
place of the legitimate program.

In many cases the corrupted program is distributed from a single
computer and shared by tens or hundreds of users at a computing site,
effectively making it possible for someone unleashing it to reel in
large numbers of log-ins and passwords as they are entered.

Once passwords to the remote systems were obtained, an intruder could
log in and use a variety of software "tool kits" to upgrade his
privileges -- known as gaining root access. That makes it possible to
steal information and steal more passwords.

The operation took advantage of the vulnerability of
Internet-connected computers whose security software had not been
brought up to date.

In the Cisco case, the passwords to Cisco computers were sent from a
compromised computer by a legitimate user unaware of the Trojan
horse. The intruder captured the passwords and then used them to enter
Cisco's computers and steal the programming instructions, according to
the security investigators.

A security expert involved in the investigation speculated that the
Cisco programming instructions were stolen as part of an effort to
establish the intruder's credibility in online chat rooms he
frequented.

Last May, the security investigators were able to install surveillance
software on the University of Minnesota computer network when they
discovered that an intruder was using it as a staging base for
hundreds of Internet attacks. During a two-day period they watched as
the intruder tried to break into more than 100 locations on the
Internet and was successful in gaining root access to more than 50.

When possible, they alerted organizations that were victims of
attacks, which would then shut out the intruder and patch their
systems.

As the attacks were first noted in April 2004, a researcher at the
University of California, Berkeley, found that her own computer had
been invaded. The researcher, Wren Montgomery, began to receive
taunting e-mail messages from someone going by the name Stakkato -- now
believed by the authorities to have been the primary intruder -- who
also boasted of breaking in to computers at military installations.

"Patuxent River totally closed their networks," he wrote in a message
sent that month, referring to the Patuxent River Naval Air Station in
Maryland. "They freaked out when I said I stole F-18 blueprints."

A Navy spokesman at Patuxent River, James Darcy, said Monday said that
"if there was some sort of attempted breach on those addresses, it was
not significant enough of an action to have generated a report."

Monte Marlin, a spokeswoman for the White Sands Missile Range in New
Mexico, whose computers Stakkato also claimed to have breached,
confirmed Monday that there had been "unauthorized access" but said,
"The only information obtained was weather forecast information."

The messages also claimed an intrusion into seven computers serving
NASA's Jet Propulsion Laboratory in Pasadena, Calif. A computer
security expert investigating the case confirmed that computers at
several NASA sites, including the propulsion laboratory, had been
breached. A spokesman said the laboratory did not comment on computer
breaches.

Ms. Montgomery, a graduate student in geophysics, said that in a fit
of anger, Stakkato had erased her computer file directory and had
destroyed a year and a half of her e-mail stored on a university
computer.

She guessed that she might have provoked him by referring to him as a
"quaint hacker" in a communication with system administrators, which
he monitored.

"It was inconvenient," she said of the loss of her e-mail, "and it's
the thing that seems to happen when you have malicious teenage hackers
running around with no sense of ethics."

Walter Gibbs, in Oslo, and Heather Timmons, in London, contributed
reporting for this article.

Copyright 2005 The New York Times Company

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.
See http://telecom-digest.org/td-extra/nytimes.html for the daily newspaper.
Go to http://telecom-digest.org/td-extra/chatpage.html to join in a
discussion 24/7 relating to the obnoxious and malicious behavior of
hackers and spammers. 

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S.  Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, New York Times Company.

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml


[TELECOM Digest Editor's Note: Would you believe I actually get
messages here from readers who try and tell me "there is no mutual
agreement on the net as to what consititutes 'malicious behavior'
on the net". My God, how blind can they be? If this story from the
NY Times over the weekend is not an example of maliciousness
personified, then I don't know what is. Maybe among _their_ friends
there is no consensus, but that is their fault, not mine.   PAT]

------------------------------

From: Lisa Minter <lisa_minter2001@yahoo.com>
Subject: Talking About Bloggers 
Date: Mon, 9 May 2005 23:54:28 -0500


By TOM ZELLER Jr.

DON'T ask Nick Denton, publisher of Gawker Media and its growing list
of popular Web logs, about his empire. "People come up to me as if
it's witty and say, 'How is the empire going?' " Mr. Denton said,
"which is pretty pathetic."

Don't ask him about his business plan, either. He says he never had
one. The only reason he formed the company, he said, was to make his
network of blogs -- which includes Gawker, the flagship chronicle of
Manhattan news and gossip; Fleshbot, the thinking person's diary of
smut; and about 10 other titles -- more attractive to advertisers.

"It doesn't help with readers," he said. "It's actually a
disadvantage, because it looks corporate."

At a time when media conferences like "Les Blogs" in Paris two weeks
ago debate the potential of the form, and when BusinessWeek declares,
as it did on its May 2 cover, that "Blogs Will Change Your Business,"
Mr. Denton is withering in his contempt. A blog, he says, is much
better at tearing things down -- people, careers, brands -- than it is
at building them up. As for the blog revolution, Mr. Denton put it
this way: "Give me a break."

"The hype comes from unemployed or partially employed marketing
professionals and people who never made it as journalists wanting to
believe," he said. "They want to believe there's going to be this new
revolution and their lives are going to be changed."

For all of the stiff-arming and disdain that Mr. Denton brings to the
discussion of this nonrevolution, however, there is no question that
he and his team are trying to turn the online diarist's form --
ephemeral, fast-paced and scathingly opinionated -- into a viable, if
not lucrative, enterprise. Big advertisers like Audi, Nike and General
Electric have all vied for eyeballs on Gawker's blogs, which
Mr. Denton describes as sexy, irreverent, a tad elitist and
unabashedly coastal.

He says that there is no magic behind Gawker Media, his three-year-old
venture based in New York. To his mind, it is built around a basic
publishing model. But like it or not in the overheated atmosphere of
blog-o-mania, Mr. Denton, 38, remains one of the most watched
entrepreneurs in the business.

If his reluctance to be interviewed is theater, it is deft theater. A
British expatriate and former Financial Times reporter, Mr. Denton is
tall, slim, and salt-and-pepper handsome, with the slightly
embarrassed air of someone who invested in the dot-com boom and came
out unscathed. (He made millions in two previous ventures -- including
a company called Moreover Technologies, an online news aggregator that
presaged the twitchy, check-this-out linking that now make blogs de
rigueur reading for desk jockeys worldwide.)

STRIDING toward the unadorned third-floor TriBeCa loft that is the
closest thing to a Gawker nerve center, Mr. Denton reiterated, in a
polite, sometimes halting staccato that often fades into a string of
inaudible syllables, that he would not discuss money. He declined to
say if Gawker was profitable, or how much he paid Gawker's dozen or so
bloggers -- editors, as the company calls them.

He fired up a Marlboro Light and, hustling across Canal Street,
chattered obliquely about overhead (minimal in the blogging business),
libel (always a concern) and Fred Durst.

In March, Mr. Durst, the Limp Bizkit front man, sued Gawker, among
other sites, for linking to a sex video in which he appeared.

"Honestly, though, we don't know why you're so mad at us," Gawker's
editor, Jessica Coen, sneered in a March 4 entry. "The situation is
really rather simple. Someone sent us a link to a video of your penis,
we went into shock, and we shared it with the world for about two
hours. Then we wept, found God, took a hot bath, and removed the video
from our site."

Mr. Durst eventually dropped the suit.

A grueling climb led to the quiet, whitewashed loft space where a few
Gawker Media hands -- including Lockhart Steele, the company's
managing editor, and Gina Trapani, the editor of one of the company's
newest blogs, Lifehacker -- were plucking away at laptops. (Gawker
shares the space with another blogger, Maxwell Gillingham-Ryan of
Apartment Therapy.)

Mr. Steele, who joined the company in February, is the den mother for
Gawker's far-flung collection of bloggers and is in near constant
communication with them throughout the day via Instant
Messenger. About half of the editors live in New York. The rest are
distributed around the country. In California, Mark Lisanti edits
Defamer, the Los Angeles counterpart to Gawker, and in Colorado, Brian
D. Crecente edits one of the newer sites, Kotaku, dedicated to video
games. In New Orleans, John d'Addario edits Fleshbot, while Ana Marie
Cox covers political gossip from Washington on Wonkette.

Each editor is under contract to post 12 times a day for a flat fee,
Mr.  Steele said. (Gawker has two editors and now posts 24 times a
day.) It is best to have eight posts up before noon, if possible, to
keep readers coming back, he said.

The editors scan the Web for the best tidbits. Readers, and apparently
even published authors, send in tips. When a Gawker site highlights
articles from, say, The Wall Street Journal or The New York Times, it
is likely, both Mr. Steele and Mr. Denton said, that the article's
author sent an e-mail message to Gawker pointing out its
existence. (This reporter's naiveté about this process was met with
gentle laughter.)

Site traffic is a particular obsession. Gawker draws just over a
million unique visitors a month; Fleshbot, the most popular site,
lures nearly twice that number, and Gizmodo, a site dedicated to
gadgets, roughly 1.5 million.  All editors can earn bonuses if they
manage to generate spikes in traffic -- say, with a link to the latest
Paris Hilton crisis or Fred Durst's anatomy.

Ms. Trapani's hour-by-hour traffic statistics serve as the desktop
image on her computer. "It's extremely fast paced," she said. "It's a
lot of output.  Some days it's overwhelming without a doubt. Other
days it goes really smoothly if I get some good reader tips and
there's something great going on."

Like Mr. Denton, she was careful not to discuss specifics of Gawker's
business, including how much its editors are paid. But a published
interview with Mr. Steele earlier this year provides some
insight. Bloggers are paid a set rate of $2,500 a month, he told a
digital journalism class at New York University taught by Patrick
Phillips, the editor and founder of I Want Media, a Web site focusing
on media news.

Critics of the blog movement wonder whether the hoopla over the
commercial viability of blogs -- particularly as publishing ventures
 -- is overstated. "Blogs primarily excel at marketing and promotion
for companies or individuals," Mr. Phillips of I Want Media said. "I
think blogging can catapult unknown writers, and it can give them a
platform if they're talented. But as a stand-alone business, I think
the jury is still out on that."

Mr. Denton, who says that no one, least of all him, is becoming rich
publishing blogs, would seem to agree with that notion. It's not about
the money, he said -- or about corrupting the art of the blogger. "If
someone is saying that we publish according to a routine of at least
12 posts a day and begin in the morning and if someone is sick we
replace them, then I plead guilty," he said. "We believe in regular
posting schedules."

But he also says that nothing he is doing prevents other blogging
models from taking shape, or independent bloggers from logging on and
doing what they have always done. "Some of my own favorite sites are
ones that have no consistency beyond the wit and charm of the writer,"
he said. "There's room for both."

And there is, apparently, a ceiling on Gawker's expansion. Last month,
the company started Sploid, a Drudge-like headline news blog with a
tabloid look, and Mr. Denton says two more titles are planned for the
short term, although he would not be specific about the particular
consumer itches he'll be scratching this time. Having covered
everything from BlackBerries to Beltway gossip, it's hard to imagine
what else looms, but he said writers had already been lined up.

That will bring the number of titles to 14, and Mr. Denton indicated
that 17 seemed a good stopping point, if for no other reason than that
is the number of titles published by Condé Nast.

He also plans to reintroduce Gawker's "blog of blogs," called Kinja -
a service that even Mr. Denton says was rather badly deployed and even
more awkwardly explained in its original form. A team of programmers
has been working for the last two years to revamp the service, which
allows users to explore and scan their favorite blogs in one
place. The new version will be ready in about a month.

SO, onward goes the nonrevolution. "If you take the amount of
attention that has been devoted in the last year to Web logs as a
business and something that's going to change business and compare
that with the real effect and the real money, it's totally
disproportionate," Mr. Denton said, "in the same way all the coverage
of the Internet in the late 90's was out of whack.

"There are too many people looking at blogs as being some magic bullet
for every company's marketing problem, and they're not," he
added. "It's Internet media. It's just the latest iteration of
Internet media."

Copyright 2005 The New York Times Company.

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

------------------------------

From: JRRJR <inomaha_travels@yahoo.com>
Subject: ACL in Avaya Gateways
Date: Mon, 9 May 2005 22:06:02 -0500
Organization: Cox Communications


I want to regulate the IP addresses that have access to AVAYA WEB
Admin Interface.  Does anyone have step by step instructions on how
to?

If I read AVAYAs docs properly, the web admin for G350 goes over port
80 (like all web traffic).

Please advise.

rick.rodriquez@cox.net 

------------------------------

From: hancock4@bbs.cpcn.com
Subject: Re: Who Gets to See the E-mail of the Deceased?
Date: 9 May 2005 20:45:18 -0700


Justin Time wrote:

> The issue here is the intellectual property.  The output of the
> computer belongs to you.  You are free to take it with you and do with
> it as your heart desires.  The other side of the coin is the data you
> leave on the rented computer.  It does not belong to you.  It is the
> property of the machine owner.  All those temporary files Microsoft
> creates and stashes where only the programmer knows are not yours once
> you leave the machine and return it to its owner.

> A case in point is the example of rental machines at Kinko's.  Some of
> us may remember a few years ago the problem of some people who rented
> machines at Kinko's were finding confidential and personal information
> that had been left by prior users.  There are also instances where
> these "public" machines have been siezed with a warrant for evidence
> of illegal activities.  The entire point being the owner of the
> machine has the ownership of your intellectual property -- in this
> case Yahoo!  and the email files -- because you left them on their
> machine.  If you had taken them with you, or deleted them, then the
> owner of the machine would not have your intellectual property.

I do not believe the above is correct.  Again, the idea of leaving
property in the care of another is nothing new, it is covered under
the section of law known as bailments.  That law defines the duties of
holders of property relative to costs and abandonment of property.

The owner of a machine never had the ownership of your personal
property when you're using his machine or even if you abandon it on
his machine.

I want to point out there is no such thing as "finders keepers".  If
you lose something, you have not lost ownership in it, and someone
finding it does not gain ownership in it.  For example, if the doors
of an armoured truck break open and the money flies out (which has
happened several times), it is theft to keep any such money you find
and people have gone to jail taking such money.  One person who found
a large sum of money in the street and kept it went to jail because he
failed to make a reasonable effort -- such as reporting the find to the
police.  The police had a report of the missing money and would've
matched it to the owner.

As to intellectual property, this isn't anything new either.  Say I go
to a library and write up notes on paper, then leave the papers in a
book: Those papers remain my property.

JT mentioned internal temporary files -- qsuch things probably never
were a person's property in the first place because of their
temporary nature.  However files I create would be my property.

Now if the computer use was intended to be temporary, the owner would
have no obligation to maintain files after I've gone -- they could run
an automatic sweep.  But if someone comes in asking for a file and it
happens to be still available on the computer, they are entitled to
get their file back.

I do not believe the owner of any machine ever has ownership of your
property that you're running on it, any more than the landlord of your
apt has any ownership interests in your furniture kept in an apt
you're renting from him.

If I leave an expensive coat at a restaurant, that coat still belongs
to me -- the restaurant owner cannot simply give it away and must hold
it for a period of time for me to return to claim.  Bailment law
defines what the hold period would be and the proper care the owner
must exercise while holding the coat.  Obviously I can't show up five
years later and claim it.  If I checked the coat in their checkroom,
they shouldn't store it next to the stove where grease will splatter
on it, but on the other hand, they don't need to store it in a climate
controlled vault either.

As to seizing _anything_ for a criminal investigation, property
ownership is irrlevent except to state who receives the search
warrant.  If the cops think there's evidence in a restaurant to catch
a criminal who frequents that restaurant, they will search the
restaurant and its fixtures.

As to finding confidential information, it is theft to use such
information, in some cases a very serious felony.  As to a computer
rental place, it may be necessary for the store to automatically clean
the file space (as my public library does between users) or alert
customers to do so.  A public service has a duty to take _reasonable_
precautions to protect its customers, just like the restaurant must
make a reasonable effort to protect an expensive overcoat left behind,
and just as a checkroom won't hang up checked coats in the back alley
in the rain.  Generally, when such reasonable precautions are taken
there is no further liability.  Some rental agreements expressly limit
or even deny liability -- you see signs in restaurants "not responsible
for lost or stolen items".

------------------------------

From: tls@panix.com (Thor Lancelot Simon)
Subject: Re: Phone Line on cat 5 10-Base-T Ethernet?
Date: Tue, 10 May 2005 04:04:38 UTC
Organization: Public Access Networks Corp.
Reply-To: tls@rek.tjls.com


In article <telecom24.204.8@telecom-digest.org>, Robert Bonomi
<bonomi@host122.r-bonomi.com> wrote:

> In article <telecom24.203.6@telecom-digest.org>,

> Also, beware of "100Base-TX".  that trailing 'X' is signficant.

That's wrong.  All 100Mbit Ethernet on copper -- now that 100VG/AnyLan
is rather definitively dead, and excluding a few oddities like
shielded twisted pair -- is "100baseTX".

Gigabit on copper, however, is just "1000baseT".


Thor Lancelot Simon	                       tls@rek.tjls.com

"The inconsistency is startling, though admittedly, if consistency is
 to be abandoned or transcended, there is no problem."  - Noam Chomsky

------------------------------

From: DevilsPGD <spamsucks@crazyhat.net>
Subject: Re: Name Twin's Misdeeds Plague a Good Driver
Date: Mon, 09 May 2005 22:46:17 -0600
Organization: Disorganized


In message <telecom24.203.4@telecom-digest.org> TELECOM Digest Editor
noted in response to Monty Solomon <monty@roscom.com>:

> [TELECOM Digest Editor's Note: This type of thing used to happen a lot
> in Chicago, when the Cook County States Attorney would issue a warrant
> for someone with a very common name. Now in recent years, when a
> person (who is _NOT_ the wanted person) gets arrested and hassled,
> they are permitted to apply for a boilerplate letter which announces
> to one and all this particular [common name] is not wanted by law
> enforcement _at this time_. And it gives a phone number to call for
> verification. The common name person is 'encouraged' to carry this
> letter in his possession (his wallet perhaps) at all times, and
> present it to arresting officers, in the event of a mixup on his
> social security number or other details.   PAT]

While that might help reduce the inconvenience, it sure would reduce
the chances of getting lucky with a kidnap and unlawful detainment
civil suit after the fact.

------------------------------


TELECOM Digest is an electronic journal devoted mostly but not
exclusively to telecommunications topics. It is circulated anywhere
there is email, in addition to various telecom forums on a variety of
networks such as Compuserve and America On Line, Yahoo Groups, and
other forums.  It is also gatewayed to Usenet where it appears as the
moderated newsgroup 'comp.dcom.telecom'.

TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Patrick Townson. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.

Contact information:    Patrick Townson/TELECOM Digest
                        Post Office Box 50
                        Independence, KS 67301
                        Phone: 620-402-0134
                        Fax 1: 775-255-9970
                        Fax 2: 530-309-7234
                        Fax 3: 208-692-5145         
                        Email: editor@telecom-digest.org

Subscribe:  telecom-subscribe@telecom-digest.org
Unsubscribe:telecom-unsubscribe@telecom-digest.org

This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then.  Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!

URL information:        http://telecom-digest.org

Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/
  (or use our mirror site: ftp.epix.net/pub/telecom-archives)

Email <==> FTP:  telecom-archives@telecom-digest.org 

      Send a simple, one line note to that automated address for
      a help file on how to use the automatic retrieval system
      for archives files. You can get desired files in email.

*************************************************************************
*   TELECOM Digest is partially funded by a grant from                  *
*   Judith Oppenheimer, President of ICB Inc. and purveyor of accurate  *
*   800 & Dot Com News, Intelligence, Analysis, and Consulting.         *
*   http://ICBTollFree.com, http://1800TheExpert.com                    *
*   Views expressed herein should not be construed as representing      *
*   views of Judith Oppenheimer or ICB Inc.                             *
*************************************************************************

ICB Toll Free News.  Contact information is not sold, rented or leased.

One click a day feeds a person a meal.  Go to http://www.thehungersite.com

Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.

              ************************

DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO
YOUR CREDIT CARD!  REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST
AND EASY411.COM   SIGN UP AT http://www.easy411.com/telecomdigest !

              ************************

Visit http://www.mstm.okstate.edu and take the next step in your
career with a Master of Science in Telecommunications Management
(MSTM) degree from Oklahoma State University (OSU). This 35
credit-hour interdisciplinary program is designed to give you the
skills necessary to manage telecommunications networks, including
data, video, and voice networks.

The MSTM degree draws on the expertise of the OSU's College
of Business Administration; the College of Arts and Sciences; and the
College of Engineering, Architecture and Technology. The program has
state-of-the-art lab facilities on the Stillwater and Tulsa campus
offering hands-on learning to enhance the program curriculum.  Classes
are available in Stillwater, Tulsa, or through distance learning.

Please contact Jay Boyington for additional information at
405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at
http://www.mstm.okstate.edu

              ************************

   In addition, gifts from Mike Sandman, Chicago's Telecom Expert
   have enabled me to replace some obsolete computer equipment and
   enter the 21st century sort of on schedule. His mail order 
   telephone parts/supplies service based in the Chicago area has
   been widely recognized by Digest readers as a reliable and very
   inexpensive source of telecom-related equipment. Please request
   a free catalog today at http://www.sandman.com 
   ---------------------------------------------------------------

Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list. 

All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.

End of TELECOM Digest V24 #205
******************************

Return to Archives**Older Issues