|
Message Digest
Volume 29 : Issue 70 : "text" Format
Messages in this Issue:
Re: It's that time again in North America
Re: Clueless Woman Calls Tech Show When Her Stolen Wi-Fi Disappears
Re: NYS "bill" in works to outlaw phone ID spoofing
Re: emergency use of phone in car
Re: emergency use of phone in car
Re: Clueless Woman Calls Tech Show When Her Stolen Wi-Fi Disappears
Re: emergency use of phone in car
====== 28 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.
===========================
Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent. Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime. Geoffrey Welsh
===========================
See the bottom of this issue for subscription and archive details
and the name of our lawyer, and other stuff of interest.
Date: Wed, 10 Mar 2010 05:48:18 -0500
From: Diamond Dave <dmine45.NOSPAM@yahoo.com>
To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org.
Subject: Re: It's that time again in North America
Message-ID: <t4uep5dco4vgpnj3evtckkr9mp7afuq35v@4ax.com>
On Wed, 3 Mar 2010 20:28:29 -0800 (PST), Joseph Singer
<joeofseattle@yahoo.com> wrote:
> Here in North America we will leave standard time and will adjust
> our time one hour ahead for daylight saving time at 02:00 Sunday
> 7 March 2010.
There's another list of active (and no longer active) time and
temperature numbers (and recordings of these systems) at
http://www.phworld.org/sounds/modern/timetemp/
And another list is at:
http://shaneyoung.com/timeandtemp/list/
Date: Wed, 10 Mar 2010 14:39:27 +0000 (UTC)
From: Paul <pssawyer@comcast.net.INVALID>
To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org.
Subject: Re: Clueless Woman Calls Tech Show When Her Stolen Wi-Fi Disappears
Message-ID: <Xns9D3762407C21DSenex@188.40.43.213>
Bill Horne <bill@horneQRM.net> wrote in
news:E6ydnX2gHLvqTgvWnZ2dnUVZ_o6dnZ2d@speakeasy.net:
> On 3/9/2010 11:21 AM, David Lesher wrote:
>> The better analogy is sprinklers. If Hazel Homemaker runs her
>> sprinklers, and some 90 F day, the guy walking by pauses on the
>> sidewalk to enjoy the spray; she has nothing to whine about.
>>
>> If he turns them on, then she does.
>
> Analogies to the "brick and morter" world don't always carry well
> into cyberspace. If I were to compare an open WiFi Access Point to
> a sprinkler, it would be a situation where Hazel Homemaker objects
> to the neighborhood kids running through the spray along with her
> own.
And if a kid gets hurt on her sprinkler, their parents will sue her.
On another tack, what if the open WiFi operator keeps login,
password, and other personal information entered by the unauthorized
users?
--
Paul
Date: 10 Mar 2010 14:47:27 -0500
From: kludge@panix.com (Scott Dorsey)
To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org.
Subject: Re: NYS "bill" in works to outlaw phone ID spoofing
Message-ID: <hn8t0f$rbd$1@panix2.panix.com>
>On 2/28/2010 8:17 PM, danny burstein wrote:
>
>Missing from that article (and every other similar one I've seen over the
>years) is: HOW is the phone spoofer actually identified and caught?
>
>If the displayed number is spoofed, how can the real caller be ID'd? Is
>such identification (of a spoofer) even possible? I have the impression
>it's not [possible] since there are so many violators of the "Do Not Call"
>list(s).
Ask them where you send the money to. That is about the easiest way to
identify them.
Also, of course, they do have good ANI. So the telephone company could
in theory identify them, and all it takes to get the information out of
the telco is a subpoena from a judge. And that subpoena is very easy to
get if you're suing anyway... You just open a suit against an unknown party,
get the clerk to issue a subpoena to the telco to disclose the party.
>Frankly, I wish there was a button on one's phone that one could push upon
>receiving a spoofed call that would send 100kV down the line along with a
>plague of locusts, a tornado, a hurricane, an earthquake, and GPS coords
>for a Predator mission missile strike. :-)
The problem is not the spoofer, the problem is really the telco.
--scott
--
"C'est un Nagra. C'est suisse, et tres, tres precis."
Date: Wed, 10 Mar 2010 10:19:46 -0500
From: "Moore, Carl (Civ,ARL/SLAD)" <carl.moore2@us.army.mil>
To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org.
Subject: Re: emergency use of phone in car
Message-ID: <E37E0CCA58337B4195F363C78573E732932162@ARLABML03.DS.ARL.ARMY.MIL>
Yes, I understand the emergency but am interested in a little more
detail. How was the call made (were there one or more others in the
car)? It gives a scary first impression that such a call had to be
made when the car was going 90-plus miles per hour.
Date: Thu, 11 Mar 2010 09:02:04 +1100
From: David Clayton <dcstar@myrealbox.com>
To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org.
Subject: Re: emergency use of phone in car
Message-ID: <pan.2010.03.10.22.01.58.299028@myrealbox.com>
On Wed, 10 Mar 2010 10:19:46 -0500, Moore, Carl (Civ,ARL/SLAD) wrote:
> Yes, I understand the emergency but am interested in a little more
> detail.
> How was the call made (were there one or more others in the car)? It
> gives a scary first impression that such a call had to be made when the
> car was going 90-plus miles per hour.
On my Prius (it's an old one), you just have to push the button and then
bump the driver lever to Neutral to stop it going forward. Because the
accelerator pedal controls two different engines, it actually just sends
signals to a computer which does the work of determining which one - or
both - to control.
I would like to know how this particular acceleration affliction - which
has only previously affected other Toyota models, the braking problem is
the current Prius issue - has suddenly appeared in such a high-profile
example that has now had such a well publicised "happy ending".
Perhaps the phone was already conveniently prepared for such an event?
I smell a significantly large rodent with this one......
--
Regards, David.
David Clayton
Melbourne, Victoria, Australia.
Knowledge is a measure of how many answers you have, intelligence is a
measure of how many questions you have.
Date: Wed, 10 Mar 2010 17:34:47 -0800
From: Bruce L.Bergman <bruceNOSPAMbergman@gmail.com>
To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org.
Subject: Re: Clueless Woman Calls Tech Show When Her Stolen Wi-Fi Disappears
Message-ID: <39dgp55uh07q24d3r3t2a0fggl3cm1a6en@4ax.com>
On Fri, 05 Mar 2010 13:50:36 -0600, pv+usenet@pobox.com (PV) wrote:
>"Jeter la poubelle SVP" <tPlOvUpBErLeLsEs@hotmail.com> writes:
>> More likely, she thought wi-fi was some sort of birth-right, like
>> air or water. Sure, you can buy your wi-fi service from an ISP, just
>> as you can buy bottled water, but why do so if, like the air you
>> breath or the water from your tap, it's just there, free for the
>> taking?
>
>If you listen to the clip, you know exactly what she was thinking,
>because she told Leo. She rationalized stealing internet service
>because "they charge too much".
Ahh, so it's quite all right to take it from someone else who is
paying way too much, as long as it isn't /your/ money...
If the original clueless party was being honest, she would have
offered to locate the system owner and "Buy In" to the WiFi access,
trade the System Password for a portion of the bill, and agree to play
nice and not over-utilize it. (See Below) But we can see where that
went.
There are a few serious wrinkles in the issue of sharing WiFi -
First, data security. If you allow strangers access to your internal
network, they have just bypassed your firewall - and have access to
all the computers on your network and all the data stored on them.
For a good hacker, once they have breached the firewall and are
inside the network, the rest is childs play. Now it IS possible to
set it up where the guests on the unsecured WiFi node are outside the
LAN firewall and can only access the Internet, but the average user
isn't going to figure that one out, or spend extra for the gear
needed.
Second, you might think "That's all right, I have 'Unlimited'
Internet service, I can share" - but that's Unlimited in name only.
They DO run a usage meter on you at the Telco or CableCo internet
headend, you can find it hidden in the fine print of your contract. If
you use more than they consider 'normal usage' (the trigger point
figure I usually hear is ~5 GB a month) they can force you to buy
'Business Grade' service or just disconnect you for abuse.
(The Telco and CableCo want to conserve bandwidth on their system
for premium services like VoIP Phone Service and Movies On Demand.)
>Telecom Digest Moderator writes:
>
>> Well, I've made my position clear already. Using a resource that
>> the owner chooses not to safeguard is, to my mind, "acceptable
>> use".
Just because it is unsecured does NOT mean they can't come after you
for using it - IIRC, it was Lowe's Home Improvement who had someone
successfully prosecuted for hacking their internal network through an
*open and unencrypted* WiFi connection at several of their stores.
Yes, 2004, it's Googlable.
And another in November 2003 at a medical office. And again,
Nicholas Tombros busted for Wardriving to find open WiFi, and sending
spam runs out on the victim's internet connection. And hundreds
more...
>So if you don't lock your garden gate, I can spread a towel and
>sunbathe in the flower bed? What's your address? *
The fence and gate (even if not locked) are a de-facto No
Trespassing sign, but you should add a physical one to be clear.
Even with open land, if it's clearly posted at regular intervals
around the perimeter it is still closed to casual access.
>***** Moderator's Note *****
>
>43 Deerfield Road
>Sharon Massachusetts USA
>
>There's a fence around the backyard where I keep my garden: IANALB the
>law in this state, as I understand it, is that adults may not trespass
>on fenced land even if the gate is unlocked[1]. If you have a different
>theory of the law, and are willing to defend it, come ahead.
>
>My WiFi Access Point is labelled "PrivateHorneFamily", and even if it
>were not encrypted I would feel entitled to shoo you away if you tried
>to use it: after all, I made my ownership and the restriction clear.
>
>Bill Horne
>Moderator
>
>1. AFAIK, surveyors enjoy an exception to the rule, but their trespass is
> limited to the scope of their work and is done at their own risk.
There are many utility and public service workers (OB Telecom
reference!) that have the same "scope of work" exemption in most all
states, but they still better have a valid reason for the access.
"Your strawberries looked ripe..." isn't gonna work.
And barring a law enforcement officer in foot pursuit of a suspect,
they are still supposed to show common courtesy, knock on your door
first and notify you that they need access. "Asking for permission"
is the polite way to put it, but with a valid utility easement it's a
little more complex to deny access.
Been there, Knocked on a few doors wearing a Hard-hat and
(occasionally) Climbing Gaffs and all dressed to go vertical.
--<< Bruce >>--
Date: Wed, 10 Mar 2010 19:22:47 -0500
From: "Bob Goudreau" <BobGoudreau@nc.rr.com>
To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org.
Subject: Re: emergency use of phone in car
Message-ID: <92588B7DFDA5405AAF332D560B5331BD@estore.us.dg.com>
Thad Floryan wrote:
>> "Prius driver James Sikes called 911 about 1:30 p.m. after
accelerating to
>> pass another vehicle on Interstate 8 near La Posta and finding that
he could
>> not control his car, the CHP said."
>> [...]
>
> California law permits driver cell phone usage in an emergency; I
> use mine frequently to call 911 reporting road hazards.
>
> However, as can be read here:
>
> <http://www.sfgate.com/cgi-bin/article.cgi?f=/n/a/2010/03/08/national/a1
93031S51.DTL >
>
> [...]
> A patrol car pulled alongside the Prius and officers told Sikes over
> a loudspeaker to push the brake pedal to the floor and apply the
> emergency brake.
>
> "They also got it going on a steep upgrade," said Officer Jesse
> Udovich. "Between those three things, they got it to slow down."
>
> After the car decelerated to about 50 mph, Sikes turned off the
> engine and coasted to a halt.
> [...]
>
> There's more to this than what's being reported publicly.
I'll say. My first reaction to reading that article was to wonder why
the police officers didn't simply tell the driver to shift the
transmission into neutral. I can almost understand why that might not
occur to a panicked civilian driver, but the police are supposed to know
about such things.
Then I read a more detailed AP account of the incident
(http://www.wral.com/business/story/7203388/)
and discovered that the officers DID tell the driver, repeatedly no
less, to shift into neutral. The driver refused to comply, later
explaining that he thought that doing so would somehow cause his car
to flip over!
One might conclude that this is another example of how talking
on the phone while driving seems to lead to cognitive impairment.
Bob Goudreau
Cary, NC
TELECOM Digest is an electronic journal devoted mostly to telecom-
munications topics. It is circulated anywhere there is email, in
addition to Usenet, where it appears as the moderated newsgroup
'comp.dcom.telecom'.
TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Bill Horne. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.
The Telecom Digest is moderated by Bill Horne.
Contact information: Bill Horne
Telecom Digest
43 Deerfield Road
Sharon MA 02067-2301
781-784-7287
bill at horne dot net
Subscribe: telecom-request@telecom-digest.org?body=subscribe telecom
Unsubscribe: telecom-request@telecom-digest.org?body=unsubscribe telecom
This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then. Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!
URL information: http://telecom-digest.org
Copyright (C) 2009 TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.
---------------------------------------------------------------
Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list.
All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.
End of The Telecom digest (7 messages)
|