Pat, the Editor

27 Years of the Digest ... founded August 21, 1981

Classified Ads
TD Extra News

Add this Digest to your personal   or  

 
 
Message Digest 
Volume 28 : Issue 235 : "text" Format

Messages in this Issue:
  my future telephones 
  Re: my future telephones 
  Re: my future telephones 
  Re: my future telephones 
  Re: Hacker-run GSM networks are coming 
  Re: Pop song phone number goes up for auction 
  Quote of the day - or maybe of the decade 
  Re: How Hackers Snatch Real-Time Security ID Numbers 
  Re: How Hackers Snatch Real-Time Security ID Numbers 
  Re: How Hackers Snatch Real-Time Security ID Numbers 
  Re: How Hackers Snatch Real-Time Security ID Numbers 
  Re: How Hackers Snatch Real-Time Security ID Numbers 
  Re: How Hackers Snatch Real-Time Security ID Numbers 


====== 27 years of TELECOM Digest -- Founded August 21, 1981 ====== Telecom and VOIP (Voice over Internet Protocol) Digest for the Internet. All contents here are copyrighted by Patrick Townson and the individual writers/correspondents. Articles may be used in other journals or newsgroups, provided the writer's name and the Digest are included in the fair use quote. By using -any name or email address- included herein for -any- reason other than responding to an article herein, you agree to pay a hundred dollars to the recipients of the email. =========================== Addresses herein are not to be added to any mailing list, nor to be sold or given away without explicit written consent. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome. We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. Geoffrey Welsh =========================== See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest. ---------------------------------------------------------------------- Date: Tue, 25 Aug 2009 01:43:23 -0400 (EDT) From: Dan Lanciani <ddl@danlan.com> To: redacted@invalid.telecom.csail.mit.edu Subject: my future telephones Message-ID: <200908250543.BAA11878@ss10.danlan.com> For many years I've used classic Western Electric phones throughout my house. Where I need multiple lines I have 2564 sets, though I do not have any 1A2 support hardware. I really like the ergonomics and sound quality [of] these phones. Recently I've been installing VOIP. All of my lines are connected to FXO ports and Asterisk replaces dedicated hardware including answering machines, alarm dialers, CID boxes, etc. (adding flexibility in the process, though probably reducing overall reliability). I have an FXS port connected to a line button on a 2564 set and I am satisfied with the voice quality for strictly internal purposes (all running G.711u) including connecting to an outside POTS line. Asterisk is happy to provide various features (transfer, park, etc.) by inband DTMF signaling, but enabling such means that a call is no longer transparent and accessing interactive voice response systems becomes a problem. There may be ways to do things with hook flashes but feature buttons would be better. Is there any chance of finding a VOIP feature phone with quality comparable to my WE sets? All the ones I've tried in offices have been disappointing, but then so have most of the "modern" pre-VOIP office phones. One possibility is to build an adapter to take advantage of the buttons on the 2564 and make it into a VOIP phone. Building the audio part is more than I can do, so unless there is an open source POTS/VOIP FXS adapter I would have to use an existing one in conjunction with an entirely separate interface between the lights/ buttons and Asterisk. It would be really cool to have a little box with a 50-pin Amphenol connector and an RJ45 that turns a 2564 into a VOIP feature phone, but I suspect the market isn't huge. :( Dan Lanciani dd1@danlan.*com ****** Moderator's Note ***** Please explain what "G.711u" means, and why you chose that option. I'd also appreciate you telling us how much it cost. Bill Horne ------------------------------ Date: Tue, 25 Aug 2009 11:47:24 -0700 From: Thad Floryan <thad@thadlabs.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: my future telephones Message-ID: <4A9431BC.1070506@thadlabs.com> > [...] > ****** Moderator's Note ***** > > Please explain what "G.711u" means, Per <http://www.voip-info.org/wiki/view/ITU+G.711>: ITU G.711 G.711 is a high bit rate (64 Kbps) ITU standard codec. It is the native language of the modern digital telephone network. Although formally standardised in 1988, the G.711 PCM codec is the granddaddy of digital telephony. Invented by Bell Systems and introduced in the early 70's, the T1 digital trunk employed an 8-bit uncompressed Pulse Code Modulation encoding scheme with a sample rate of 8000 samples per second. This allowed for a (theoretical) maximum voice bandwith of 4000 Hz. A T1 trunk carries 24 digital PCM channels multiplexed together. The improved European E1 standard carries 30 channels. There are two versions: A-law and µ-law. µ-law is indigenous to the T1 standard used in North America and Japan. The A-law is indigenous to the E1 standard used in the rest of the world. The difference is in the method the analog signal being sampled. In both schemes, the signal is not sampled linearly, but in a logarithmic fashion. A-law provides more dynamic range as opposed to µ-law. The result is a less 'fuzzy' sound as sampling artifacts are better supressed. Using G.711 for VoIP will give the best voice quality since it uses no compression and it is the same codec used by the PSTN network and ISDN lines, it sounds just like using a regular or ISDN phone. It also has the lowest latency (lag) because there is no need for compression, which costs processing power. The downside is that it takes more bandwidth then other codecs, up to 84 Kbps including all TCP/IP overhead. However, with increasing broadband bandwith, this should not be a problem. G.711 is supported by most VoIP providers. ------------------------------ Date: Tue, 25 Aug 2009 16:44:46 -0400 From: T <kd1s.nospam@cox.nospam.net> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: my future telephones Message-ID: <MPG.24fe1745e01f481b989b60@news.eternal-september.org> In article <200908250543.BAA11878@ss10.danlan.com>, ddl@danlan.com says... > > For many years I've used classic Western Electric phones throughout my > house. Where I need multiple lines I have 2564 sets, though I do not > have any 1A2 support hardware. I really like the ergonomics and sound > quality [of] these phones. > > Recently I've been installing VOIP. All of my lines are connected to > FXO ports and Asterisk replaces dedicated hardware including answering > machines, alarm dialers, CID boxes, etc. (adding flexibility in the > process, though probably reducing overall reliability). I have an > FXS port connected to a line button on a 2564 set and I am satisfied > with the voice quality for strictly internal purposes (all running > G.711u) including connecting to an outside POTS line. > > Asterisk is happy to provide various features (transfer, park, etc.) > by inband DTMF signaling, but enabling such means that a call is no > longer transparent and accessing interactive voice response systems > becomes a problem. There may be ways to do things with hook flashes > but feature buttons would be better. > > Is there any chance of finding a VOIP feature phone with quality > comparable to my WE sets? All the ones I've tried in offices have > been disappointing, but then so have most of the "modern" pre-VOIP > office phones. > > One possibility is to build an adapter to take advantage of the > buttons on the 2564 and make it into a VOIP phone. Building the > audio part is more than I can do, so unless there is an open source > POTS/VOIP FXS adapter I would have to use an existing one in > conjunction with an entirely separate interface between the lights/ > buttons and Asterisk. It would be really cool to have a little > box with a 50-pin Amphenol connector and an RJ45 that turns a > 2564 into a VOIP feature phone, but I suspect the market isn't > huge. :( > > Dan Lanciani > ddl@danlan.*com > > ****** Moderator's Note ***** > > Please explain what "G.711u" means, and why you chose that option. I'd > also appreciate you telling us how much it cost. > > Bill Horne >From Wikipedia: G.711 is an ITU-T standard for audio companding. It is primarily used in telephony. The standard was released for usage in 1972. Its formal name is Pulse code modulation (PCM) of voice frequencies. It is required standard in many technologies, for example in H.320 and H.323 specifications. It can be also used in one of methods for fax communication over IP networks (as defined in T.38 specification). G.711 represents logarithmic pulse-code modulation (PCM) samples for signals of voice frequencies, sampled at the rate of 8000 samples/second. G.711.1 is an extension to G.711, published as ITU-T Recommendation G.711.1 in March 2008. Its formal name is Wideband embedded extension for G.711 pulse code modulation.[1] G.711, also known as Pulse Code Modulation (PCM), is a very commonly used waveform codec. G.711 uses a sampling rate of 8,000 samples per second, with the tolerance on that rate 50 parts per million (ppm). Non- uniform quantization (logarithmic) with 8 bits is used to represent each sample, resulting in a 64 kbit/s bit rate. There are two slightly different versions; µ-law, which is used primarily in North America, and A-law, which is in use in most other countries outside North America. ------------------------------ Date: Tue, 25 Aug 2009 22:11:54 GMT From: Howard Eisenhauer <howarde@REMOVECAPShfx.eastlink.ca> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: my future telephones Message-ID: <ipn8959mh27qodur531d6ha2e9fu4353cc@4ax.com> On Tue, 25 Aug 2009 17:26:58 -0400 (EDT), T <kd1s.nospam@cox.nospam.net> wrote: *Snip* >G.711, also known as Pulse Code Modulation (PCM), is a very commonly >used waveform codec. G.711 uses a sampling rate of 8,000 samples per >second, with the tolerance on that rate 50 parts per million (ppm). Non- >uniform quantization (logarithmic) with 8 bits is used to represent each >sample, resulting in a 64 kbit/s bit rate. There are two slightly >different versions; µ-law, which is used primarily in North America, and >A-law, which is in use in most other countries outside North America. I used to work on an Ericsson switch. After it had been in service for 6 months or so someone figured out that the codecs had been set to a-law instead of µ-law (this was a North American market). I had to show up on site during the maintenance window while a switch engineer made the change. Immediately after the change was ordered he called me up & asked how he sounded, I'll be damned if I could hear any difference between the two. :\ ------------------------------ Date: Tue, 25 Aug 2009 14:10:12 +0000 (UTC) From: Koos van den Hout <koos+newsposting@kzdoos.xs4all.nl> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Hacker-run GSM networks are coming Message-ID: <h70rc4$2tj$6@kzdoos.xs4all.nl> Thad Floryan <thad@thadlabs.com> wrote in <4A88B360.7020506@thadlabs.com>: > Independent researchers are increasingly examining GSM > networks and equipment, Welte's work proves that GSM is > in the realm of the hackers now and that this realm of > mobile networking could be set for a few surprises in > the future. > [ We need to keep an eye on this; "a few surprises" could mean > many different things :-) ] Things like: "The Chaos Computer Club has told the FT that in the couple of months it will be releasing code capable of cracking GSM with just a laptop and an antenna. In comments made to the German edition of the Financial Times, the hacking group claims that governments, and criminals, are already using the technique which can break the encryption used to protect 2G GSM calls in near-real time using existing systems. The group says a public exposure of the technique will take place in the next month or two and allow anyone equipped with a laptop and an antenna to listen in to GSM phone calls." >From http://www.theregister.co.uk/2009/08/25/gsm_cracked/ Koos van den Hout -- Koos van den Hout, PGP keyid DSS/1024 0xF0D7C263 via keyservers koos@kzdoos.xs4all.nl or RSA/1024 0xCA845CB5 Weather maps from free sources at http://idefix.net/~koos/ http://weather.idefix.net/ ------------------------------ Date: Tue, 25 Aug 2009 06:19:08 -0500 From: Neal McLain <nmclain@annsgarden.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Pop song phone number goes up for auction Message-ID: <4A93C8AC.3070105@annsgarden.com> I wrote: >> Except that NPA 702 only covers Clark County. Lincoln and Ney >> Counties (including Town of Pahrump) are also "local" to (same DMA >> as) Las Vegas, but they're in NPA 775. Richard wrote: > Approximate populations: > Lincoln County: 4,000 > Nye County: 44,375 > Clark County 2,000,000 > > Clark County contains about 97% of their audience. No point in > wasting air time with an area code. Acknowledged. Still, I'm surprised that the station's management didn't insist on including the entire DMA's audience. In the broadcast business, advertising rates are based on TV homes in the entire DMA, not just homes in the county of license. Neal McLain ------------------------------ Date: Tue, 25 Aug 2009 17:20:26 -0400 From: Bill Horne <bill.remove@horne.remove.net> To: redacted@invalid.telecom.csail.mit.edu Subject: Quote of the day - or maybe of the decade Message-ID: <4A94559A.6050604@horne.net> The following is excerpted from a court finding which is published at http://www.raptorware.com/drudge/51%20-%20Order%20Granting%20Motion%20for%20Summary%20Judgment.pdf "Neither party in this case has acted like mature adults should act. Nor is either party in this case blameless for turning this into a federal case when it never should have been litigated in the first place." It seems the courts are running out of patience with a certain kind of lawsuit: actions which question attempts by school bureaucrats to implement electronic surveilance technology so as to avoid spending money for adequate staff levels. This lawsuit is relevant to telecom because it's about an technology which will become increasingly common until it is ubiquitous: the electronic verification of identity coupled with instant retrieval of every fact, factoid, or rumor in any database in the world. Get ready for the future, because within our lifetime, every imigration agent, border patrolman, visa office, merchant, employer, banker, and politician in the developed world will have at their fingertips anything and everything you'd rather keep private. Bill Horne -- E. William Horne William Warren Consulting Computer & Network Installations, Security, and Service http://william-warren.com 781-784-7287 --- StripMime Report -- processed MIME parts --- multipart/mixed text/plain (text body -- kept) text/x-vcard --- ------------------------------ Date: Tue, 25 Aug 2009 11:07:36 -0700 (PDT) From: "www.Queensbridge.us" <NOTvalid@Queensbridge.us> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: How Hackers Snatch Real-Time Security ID Numbers Message-ID: <be9f07cd-b674-4ad5-88b1-f93b0410cdb1@y20g2000vbk.googlegroups.com> On Aug 23, 2:19 pm, Monty Solomon <mo...@roscom.com> wrote: > How Hackers Snatch Real-Time Security ID Numbers > > By Saul Hansell > August 20, 2009, 1:20 pm > > The world's savviest hackers are on to the "real-time Web" and using > it to devilish effect. The real-time Web is the fire hose of > information coming from services like Twitter. The latest generation > of Trojans - nasty little programs that hacking gangs use to burrow > onto your computer - sends a Twitter-like stream of updates about > everything you do back to their controllers, many of whom, > researchers say, are in Eastern Europe. Trojans used to just > accumulate secret diaries of your Web surfing and periodically sent > the results on to the hacker. [Moderator snip] > http://bits.blogs.nytimes.com/2009/08/20/how-hackers-snatch-real-time... This is one of the most worthwhile articles on the subject. Also worthwhile to follow some of the links. ------------------------------ Date: Wed, 26 Aug 2009 09:19:52 +1000 From: David Clayton <dcstar@myrealbox.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: How Hackers Snatch Real-Time Security ID Numbers Message-ID: <pan.2009.08.25.23.19.51.104877@myrealbox.com> On Tue, 25 Aug 2009 17:39:43 -0400, www.Queensbridge.us wrote: > On Aug 23, 2:19 pm, Monty Solomon <mo...@roscom.com> wrote: >> How Hackers Snatch Real-Time Security ID Numbers >> >> By Saul Hansell >> August 20, 2009, 1:20 pm >> >> The world's savviest hackers are on to the "real-time Web" and using it >> to devilish effect. The real-time Web is the fire hose of information >> coming from services like Twitter. The latest generation of Trojans - >> nasty little programs that hacking gangs use to burrow onto your >> computer - sends a Twitter-like stream of updates about everything you >> do back to their controllers, many of whom, researchers say, are in >> Eastern Europe. Trojans used to just accumulate secret diaries of your >> Web surfing and periodically sent the results on to the hacker. > > [Moderator snip] > >> http://bits.blogs.nytimes.com/2009/08/20/how-hackers-snatch-real-time... > > This is one of the most worthwhile articles on the subject. Also > worthwhile to follow some of the links. And isn't it great that few - if any - of these news articles mention that almost all (or all?) of these threats are Windows based? Is it about time that every single news article on Internet/Computer security threats has a disclaimer along the lines of: "If you want to avoid 95% of the threats to your computer, don't use Windows and Internet Explorer" -- Regards, David. David Clayton Melbourne, Victoria, Australia. Knowledge is a measure of how many answers you have, intelligence is a measure of how many questions you have. ***** Moderator's Note ***** A disclaimer almost identical to that has been routine for years, and I'm surpris ... oh, wait, you're using a Windows OS. Never mind. Bill Horne ------------------------------ Date: Tue, 25 Aug 2009 19:13:33 -0700 (PDT) From: hancock4@bbs.cpcn.com To: redacted@invalid.telecom.csail.mit.edu Subject: Re: How Hackers Snatch Real-Time Security ID Numbers Message-ID: <39538d97-2d7d-43bf-bd4b-bc9778c5d653@j21g2000yqe.googlegroups.com> On Aug 25, 9:15 pm, David Clayton <dcs...@myrealbox.com> wrote: > "If you want to avoid 95% of the threats to your computer, don't use > Windows and Internet Explorer" Hackers focus on those platforms because they are the majority in use. If another platform replaced them, that platform would be the target. In my humble opinion, the highly automated start features of today's platforms make it easy for these viruses to do their work. The above article mentioned, "the Trojan allows the hacker to control your computer, opening a browser session that you can't see". Why should a browser session be _automatically_ opened, and why couldn't it be seen? Is it so onerous for a user to manually open up his own windows? To have all sessions visible? Another issue that needs discussion is the wide open connections to eastern Europe, where apparently a great deal of trouble originates. ***** Moderator's Note ***** Lisa, I'm not sure you're able to have a humble opinion. ;-) Seriously, I think the reporter was probably using "browser session" as a metaphor for the various rootkits that hackers like to use. Although Windows 2000 and later version are capable of supporting a web server, it's much easier to hack a machine with a rootkit which can be remotely controlled via custom software instead of via a web browser. BTW, the user can't see the "browser session" because that's what rootkits are for: to hide administrator-level access from the user, from AV software, and from the rest of the OS. It's not something a user can control once the machine is infected, onerous though it may be. As for Eastern Europe, the very first Internet hacker, Marcus Hess, the antagonist of Cliff Stoll's famous book "The Cuckoo's Egg", was operating from Bremen in Germany. ------------------------------ Date: Wed, 26 Aug 2009 14:35:43 +1000 From: David Clayton <dcstar@myrealbox.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: How Hackers Snatch Real-Time Security ID Numbers Message-ID: <pan.2009.08.26.04.35.41.934859@myrealbox.com> On Tue, 25 Aug 2009 23:56:44 -0400, hancock4 wrote: > On Aug 25, 9:15 pm, David Clayton <dcs...@myrealbox.com> wrote: > >> "If you want to avoid 95% of the threats to your computer, don't use >> Windows and Internet Explorer" > > Hackers focus on those platforms because they are the majority in use. If > another platform replaced them, that platform would be the target. ......... Maybe, but they also focus on them because they are far (FAR) more vulnerable to attacks because of deliberate design features that make things "user friendly" by allowing the user to be bypassed in too many critical areas. Having an environment marketed to computer illiterate people where code can be installed and run either without user knowledge or by just prompting with a "I'm a nice, fluffy ActiveX application, click OK to install me" is not just negligent, it is borderline criminal. -- Regards, David. David Clayton Melbourne, Victoria, Australia. Knowledge is a measure of how many answers you have, intelligence is a measure of how many questions you have. ***** Moderator's Note ***** "Never attribute to malice that which is adequately explained by stupidity" (Richard Feynman) Computers had to be simple before they could be sold. Americans aren't really very technical, and we always demand simplicity and ease of use from any inventor: anti-virus and anti-spyware programs came later because viruses and spyware came later. The first and most important survival trait of any business is the ability to generate the cash flow essential to growth. To do that, Microsoft concentrated on "Wow!" and told the security weenies that they had to wait. Once on that road, of course, they couldn't turn back, or even slow down: "market share" has always been the yardstick by which software firms are measured, and Microsoft is too busy trying to stay in front to worry about what is, in their mind, a public-relations matter. Bill Horne ------------------------------ Date: Tue, 25 Aug 2009 22:16:35 -0700 From: Thad Floryan <thad@thadlabs.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: How Hackers Snatch Real-Time Security ID Numbers Message-ID: <4A94C533.2010105@thadlabs.com> On 8/25/2009 8:56 PM, hancock4@bbs.cpcn.com wrote: > On Aug 25, 9:15 pm, David Clayton <dcs...@myrealbox.com> wrote: > >> "If you want to avoid 95% of the threats to your computer, don't use >> Windows and Internet Explorer" > > Hackers focus on those platforms because they are the majority in > use. If another platform replaced them, that platform would be the > target. It appears Macs have attracted the criminals' interest -- the new Snow Leopard release from Apple this coming Friday (Aug. 28) will have anti-virus/-malware software built in. Screen shot here: <http://blog.intego.com/2009/08/25/snow-leopard-contains-an-antivirus/> FWIW, IE is the most non-compliant and buggy browser in existence today, even the latest IE8 passes only 20% of the Web Standards browser suite. Two compliant and good browsers for use on Windows systems are Opera and Apple's Safari, both of which 100% pass the Web Standards suite: <http://www.webstandards.org/action/acid3> Download: <http://www.opera.com/download/> Download: <http://www.apple.com/safari/download/> > [...] > Another issue that needs discussion is the wide open connections to > eastern Europe, where apparently a great deal of trouble originates. Add Vietnam, South Korea and China to the list. Note, however, that many of the newer IFRAME exploits (really, really nasty on infected web sites) which appear to originate from China are, in fact, sites of the Russian Business Network (a criminal hacker group) in the Russian Federation and in Latvia. ------------------------------ Date: Wed, 26 Aug 2009 05:19:04 +0000 (UTC) From: danny burstein <dannyb@panix.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: How Hackers Snatch Real-Time Security ID Numbers Message-ID: <h72gk8$id5$1@reader1.panix.com> In <39538d97-2d7d-43bf-bd4b-bc9778c5d653@j21g2000yqe.googlegroups.com> hancock4@bbs.cpcn.com writes: >On Aug 25, 9:15 pm, David Clayton <dcs...@myrealbox.com> wrote: >> "If you want to avoid 95% of the threats to your computer, don't use >> Windows and Internet Explorer" >Hackers focus on those platforms because they are the majority in >use. If another platform replaced them, that platform would be the >target. It's really about time that people proposing this concept just stop a second and think before putting ink to paper. Or electrons to a screen. By this rationale, no one with an Audi should be able to find parts for their car. Somewhere between 5 and 10 percent of computers hooked up to the internet are Apples. Just about none of them have any sort of third party anti virus protection running. That's a pretty decent number of completely vulnerable systems, eh? On the other hand, perhaps two thirds of Windows based systems hooked up to the internet have some added protection of this sort. (Keep in mind that the situation is so bad that... many internet providers include these features as part of their internet connectivity suite of programs). This raises the proportion of "vulnerable", so to speak, computers on the Apple side quite a bit. And with such a virgin target, lots of Bad FOlk should be trying to exploit them. Yet we still don't see a single mass attack virus [a] against them. Why? Because there's no there, there. The operating systems and the various built-in designs make it a lot harder to take over. [a] that's not to say it's completely impossible, but it takes active confirmation, including entering the system password, before an outside program can do anything really ugly to a Mac. Yes, you can go to a web page that will try dl'ing something extremely nasty, but yo've got to then approve its actions before anything ugly will happen. As an analogy it's as if someone mailed out diskettes to a thousand people and attached a cover letter telling them it was a brand new way to Make Money Fast. Ninety nine percent would throw it out. Yes, a small number, though, would run it. So yes, you can have a Mac virus. But it ain't going to go very far. -- _____________________________________________________ Knowledge may be power, but communications is the key dannyb@panix.com [to foil spammers, my address has been double rot-13 encoded] ------------------------------ TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Patrick Townson. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is currently being moderated by Bill Horne while Pat Townson recovers from a stroke. Contact information: Bill Horne Telecom Digest 43 Deerfield Road Sharon MA 02067-2301 781-784-7287 bill at horne dot net Subscribe: telecom-request@telecom-digest.org?body=subscribe telecom Unsubscribe: telecom-request@telecom-digest.org?body=unsubscribe telecom This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2009 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. ************************ --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization. End of The Telecom digest (13 messages) ******************************

Return to Archives**Older Issues