----------------------------------------------------------------------
Message-ID: <20190605150757.GA21958@telecom.csail.mit.edu>
Date: Wed, 5 Jun 2019 15:07:57 +0000
From: Bill Horne <bill@horneQRM.net>
Subject: Trump Has Already Committed An Impeachable Offense During
His London Trip
By Sean Colarossi
Donald Trump has only been in London for two days, but he has already
managed to commit an impeachable offense.
During a discussion with MSNBC's Ari Melber, former editor-in-chief of
Slate Jacob Weisberg said that while many like to focus on the Mueller
report or obstruction of justice, Trump is committing other unrelated
impeachable offenses.
https://www.politicususa.com/2019/06/04/trump-has-already-committed-an-impeachable-offense-during-his-london-trip.html
--
Bill Horne
(Remove QRM from my email address to write to me directly)
------------------------------
Message-ID: <ebbf8bb7-bc03-4f97-b01c-981e463d4116@googlegroups.com>
Date: 5 Jun 2019 13:57:19 -0700
From: gv.kwiebe@gmail.com
Subject: Re: Do you know where there are Teletype machines for sale?
[Telecom]
On Sunday, December 13, 2009 at 11:32:09 PM UTC-8, Bill Horne wrote:
> I subscribe to a mailing list for Teletype users, called GREENKEYS.
>
> One of the readers posted a request for info on whether a Model 15
> Teletype is available for purchase, and it got me wondering if any of
> the Digest's readers have knowledge in this area.
>
> Does anyone know of any repository of Teletype machines? I can't help
> but wonder if some Baby Bell has a warehouse full of them, and there's
> a fair number of users who'd be delighted to get at them.
>
> Thanks for your time.
>
> Bill
>
> --
> E. William Horne
> William Warren Consulting
> http://www.william-warren.com/
>
> "While you're waiting, read the free novel we sent you.
> It's a Spanish story about a guy named 'Manual'."
> -- Dogbert
I am in the market for a 33 ASR which is not a project machine, but
fully operational...
Please email or reply.
Thanks,
Ken
***** Moderator's Note *****
Please tell us what you'll be using it for: given that Teletype is out
of business, and parts may be hard to find, you'll almost always do
better with [any PC] and [any printer].
Bill Horne
Moderator
------------------------------
Message-ID:
<BN6PR1301MB2098A755A9BE6E38F5B97FD691160@BN6PR1301MB2098.namprd13.prod.outlook.com>
Date: 5 Jun 2019 23:03:06 +0000
From: "Naveen Albert" <wirelessaction@outlook.com>
Subject: Re: Apple is building a major defense against spam calls
into iOS 13
On 4 Jun 2019 at 01:55:02 -0400, Telecom Digest Moderator wrote:
> The solution to spam calls is the same one I've advocated for years:
> answer the call, and do everything you can to waste the time of a
> real human. Everything else is just talk, but the warm bodies have
> to be paid with real money, and if even a small percentage of
> victims fought back, the industry would be out of business inside a
> year.
I have a couple of questions. I have an Asterisk node with around
900 PSTN DIDs coming into it, and as a result, I get a fair volume
of calls from random numbers.
*Sometimes*, by sheer luck, they happen to pick one of the numbers
that rings one of my telephones. Usually I'm not there, but I find
out about it later while trawling the logs.
Anyhow, I wanted input on the following suggestions:
1. Playing an ear-splitting loud milliwatt tone to verified spam
callers. (perhaps using VOLUME(TX)=10 in Asterisk).
2. Obviously wasting their time is good, but that also wastes your
time - what about sending such calls to Lenny, or a variation
thereof? Perhaps recording numerous common prompts one would use
to waste a telemarketer's time, and then setting it up so every
call is different, in a way that wouldn't immediately let them
know they were "talking to a machine"
I wouldn't do either of these automatically, so as not to punish valid
callers. But perhaps if I setup an easy way to transfer obvious spam
calls to an extension that did one of these, it could be practical.
------------------------------
Message-ID: <873B705D-4B4D-493C-A39B-62F9490B60E8@roscom.com>
Date: 5 Jun 2019 11:57:27 -0400
From: "Monty Solomon" <monty@roscom.com>
Subject: In a rare advisory, NSA urges users to patch BlueKeep flaw
The National Security Agency has issued a rare advisory warning users
to update their systems to protect against BlueKeep, a new security
vulnerability with the capacity to rapidly spread between computers.
The "critical"-rated bug affecting computers running Windows XP and
later, can be exploited to remotely run malware at the system level,
which has full access to the computer. Because the bug is remotely
exploitable, any unpatched computer connected to the internet may be
at risk.
https://techcrunch.com/2019/06/05/nsa-advisory-bluekeep-patch/
------------------------------
*********************************************
End of telecom Digest Fri, 07 Jun 2019