28 Years of the Digest ... founded August 21, 1981

Classified Ads
TD Extra News

Add this Digest to your personal   or  

 


The Telecom Digest for September 08, 2010
Volume 29 : Issue 243 : "text" Format

Messages in this Issue:

Re: A Strong Password Isn't the Strongest Security(John)
Re: A Strong Password Isn't the Strongest Security(David Clayton)
Re: A Strong Password Isn't the Strongest Security(Garrett Wollman)
Re: A Strong Password Isn't the Strongest Security(Robert Bonomi)
Re: A Strong Password Isn't the Strongest Security(tlvp)
Re: A Strong Password Isn't the Strongest Security(Wes Leatherock)
Re: A Strong Password Isn't the Strongest Security(tlvp)
Re: A Strong Password Isn't the Strongest Security(Robert Bonomi)
Re: A Strong Password Isn't the Strongest Security(Robert Bonomi)
Re: 911-only public phone(AES)
Re: 911-only public phone(Scott Dorsey)
Gmail phone service makes calling anywhere from home cheap. (Monty Solomon)
The Glut of Shows Unwatched(Monty Solomon)
Re: A Strong Password Isn't the Strongest Security(Fred Goldstein)


====== 28 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet.  All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote.  By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.

               ===========================

Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent.  Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.

We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime.   Geoffrey Welsh

               ===========================

See the bottom of this issue for subscription and archive details
and the name of our lawyer, and other stuff of interest.

Date: Mon, 6 Sep 2010 19:21:47 -0700 From: John <jmeissen@aracnet.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: A Strong Password Isn't the Strongest Security Message-ID: <201009070221.o872Ll1N022057@server.meissen.org> David Clayton <dcstar@myrealbox.com> wrote: >> Monty Solomon <monty@roscom.com> wrote: >> You're absolutely right about keyloggers. Unfortunately, many are now >> being spread via rootkits, which often have a booting component that is >> invisible to the operating system. >......... >And which Operating System are you referring to? > >Anyone got the stats of how many non-Windows OSs are ever infected by >root kits etc? Given that the term originated in the Unix world (where someone whould hack in, get root access and replace a number of standard system files with specially modified versions) I would say probably quite a few. I fact, that's one of the specific problems with root-escalation vulnerabilities in Linux. john-
Date: Wed, 08 Sep 2010 08:37:44 +1000 From: David Clayton <dcstar@myrealbox.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: A Strong Password Isn't the Strongest Security Message-ID: <pan.2010.09.07.22.37.41.456603@myrealbox.com> On Mon, 06 Sep 2010 19:21:47 -0700, John wrote: > David Clayton <dcstar@myrealbox.com> wrote: >>> Monty Solomon <monty@roscom.com> wrote: You're absolutely right about >>> keyloggers. Unfortunately, many are now being spread via rootkits, >>> which often have a booting component that is invisible to the operating >>> system. >>......... >>And which Operating System are you referring to? >> >>Anyone got the stats of how many non-Windows OSs are ever infected by >>root kits etc? > > Given that the term originated in the Unix world (where someone whould > hack in, get root access and replace a number of standard system files > with specially modified versions) I would say probably quite a few. > > I fact, that's one of the specific problems with root-escalation > vulnerabilities in Linux. > Yep, I suppose that there must be some historical and/or rare vulnerabilities in Unix/Linux systems *now*, but the bare facts are that these threats that being referred to now are almost solely Windows based, yet are always referred to without that obvious qualifier. Someone please show me where these infamous "rootkits" have compromised non-Windows systems in comparison to Windows in the last 10 years and I'll give these threats a little more credence. -- Regards, David. David Clayton Melbourne, Victoria, Australia. Knowledge is a measure of how many answers you have, intelligence is a measure of how many questions you have. ***** Moderator's Note ***** OK, children: play nice. I have a small amount of experience in this area. Here's some free advice - the moment you commit yourself to defending any piece of software because of the name on the box it came in, you lose. Microsoft's operating systems lead the "worst offender" list of virus magnets because Microsoft chose to make their products easier to use and thus more prone to malware. The company feels that security is a public-relations issue, since Microsoft's marketing team knows that the cost of infections and loss-of-use are "Externalities" that have nothing to do with the all-important goal of maintaining the market share which makes Microsoft's monopoly a self-fullfilling prophecy. But - ANY software can be attacked, and owned, by knowledgeable crackers who find an attack vector which hasn't been plugged. IT DOESN'T MATTER what name is on the box! The only reason that the various *nix-based systems have the appearance of security is that the exploit writers have had such an easy time with Windows: a lot more machines to attack, combined with a careless and callous attitude about security, and therefore "Microsoft" products are "insecure". As *nix varients gain market share, they will be attacked more often, and for the same reasons as Windows. The most well-known flavors of Linux, for example, concentrate on ease-of-use (it worked for Microsoft, didn't it?), and will therefore become targets in their turn. Some distributions of *nix are "secure" (for most flavors of security) because the people behind them take a lot of time and trouble to make them as secure as possible, and their market share varies in inverse relationship to the level of security that they have earned. FreeBSD is a lot more secure than a typical Linux varient, because those who work on it CHOSE to make it so, and to suffer the reduced popularity that comes with requiring users to rtfm and to take a part in securing their systems. But, having learned Debian Linux, it remains my OS of choice. I do what I can to keep my OS secure, but I'm not willing to climb the BSD learning curve, so I've made a choice to forgo the added security of FreeBSD in order to enjoy OS I'm used to. You can't have it both ways: more popularity means less security. Bill Horne Moderator
Date: Mon, 6 Sep 2010 18:47:12 +0000 (UTC) From: wollman@bimajority.org (Garrett Wollman) To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: A Strong Password Isn't the Strongest Security Message-ID: <i63cvg$98l$1@grapevine.csail.mit.edu> In article <i61qck$1hvl$1@grapevine.csail.mit.edu>, Garrett Wollman <wollman@bimajority.org> wrote: >In article <i617fb$p38$3@news.eternal-september.org>, >David Kaye <sfdavidkaye2@yahoo.com> wrote: > >>A good example is "1e100.net" which on the surface looks really >>bogus. > >Until you realize just what number that is, and which [company] takes >its name from it. > >***** Moderator's Note ***** > >Isn't 1e100 = 1? No. 1 x 10**100 == 10**100 == a googol -GAWollman -- Garrett A. Wollman | What intellectual phenomenon can be older, or more oft wollman@bimajority.org| repeated, than the story of a large research program Opinions not shared by| that impaled itself upon a false central assumption my employers. | accepted by all practitioners? - S.J. Gould, 1993
Date: Mon, 06 Sep 2010 19:08:43 -0500 From: bonomi@host122.r-bonomi.com (Robert Bonomi) To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: A Strong Password Isn't the Strongest Security Message-ID: <5qKdncEDza8WHxjRnZ2dnUVZ_vednZ2d@posted.nuvoxcommunications> In article <i61qck$1hvl$1@grapevine.csail.mit.edu>, Garrett Wollman <wollman@bimajority.org> wrote: >In article <i617fb$p38$3@news.eternal-september.org>, >David Kaye <sfdavidkaye2@yahoo.com> wrote: > >>A good example is "1e100.net" which on the surface looks really >>bogus. > >Until you realize just what number that is, and which takes its name >from it. > > >***** Moderator's Note ***** > >Isn't 1e100 = 1? that's computerese pseudo 'scientific notation' for: 1 x (10 to the 100th power) NOT '1 to the 100th power' as you're apparently thinking. In that context, 'e' doesn't mean simply .exponent', it means '10 to that power' Look up the definition of the numeric quantity 'a google', and all will become clear. For a really big number, see 'google-plex'. <grin>
Date: Tue, 07 Sep 2010 04:57:44 -0400 From: tlvp <tPlOvUpBErLeLsEs@hotmail.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: A Strong Password Isn't the Strongest Security Message-ID: <op.vinm6iilitl47o@acer250.gateway.2wire.net> On Mon, 06 Sep 2010 00:23:48 -0400, after a submission by Garrett Wollman <wollman@bimajority.org>, the Moderator wrote: > ***** Moderator's Note ***** >Isn't 1e100 = 1? Mmm ... 1^100 = 1. But 1e100 = 1 x 10^100 = 10^100 = one goo... (gaackh, the forces of darkness won't let me pronounce the rest, I'm choking ...) -- tlvp -- Avant de repondre, jeter la poubelle, SVP
Date: Tue, 7 Sep 2010 09:46:32 EDT From: Wes Leatherock <Wesrock@aol.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: A Strong Password Isn't the Strongest Security Message-ID: <38ea3.679eeb72.39b79c38@aol.com> In a message dated 9/7/2010 6:24:25 AM Central Daylight Time, tPlOvUpBErLeLsEs@hotmail.com writes: > Mmm ... 1^100 = 1. But 1e100 = 1 x 10^100 = 10^100 = one > goo... (gaackh, the forces of darkness won't let me pronounce the > rest, I'm choking ...) I thought the numeric quantity was googol or gogol, not Google. Wes Leatherock wesrock@aol.com wleathus@yahoo.com ***** Moderator's Note ***** I really couldn't remember "e" notation for exponentiation. Or is it logarithms? Bill Horne Moderator
Date: Tue, 07 Sep 2010 14:22:45 -0400 From: tlvp <tPlOvUpBErLeLsEs@hotmail.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: A Strong Password Isn't the Strongest Security Message-ID: <op.viodb7aoitl47o@acer250.gateway.2wire.net> On Tue, 07 Sep 2010 09:46:32 -0400, Wes Leatherock <Wesrock@aol.com> wrote: > In a message dated 9/7/2010 6:24:25 AM Central Daylight Time, > tPlOvUpBErLeLsEs@hotmail.com writes: > >> Mmm ... 1^100 = 1. But 1e100 = 1 x 10^100 = 10^100 = one >> goo... (gaackh, the forces of darkness won't let me pronounce the >> rest, I'm choking ...) >I thought the numeric quantity was googol or gogol, not Google. Right you are, Wes. Googol, that is. Note that I choked before I could finish writing that word. (Gogol (Nikolai Vasilievich), OtOH, was a Russian author of roughly two centuries ago.) > ***** Moderator's Note ***** > > I really couldn't remember "e" notation for exponentiation. Or is it > logarithms? Heh ... Engineers tend to use "aeb" to mean: a x 10^b . Mathematicians tend to use e^b for ... well, for e^b. Nobody uses that e notation for logarithms as such, although logarithms are ... well, somehow implicated here. Cheers, -- tlvp -- Avant de repondre, jeter la poubelle, SVP
Date: Tue, 07 Sep 2010 14:56:37 -0500 From: bonomi@host122.r-bonomi.com (Robert Bonomi) To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: A Strong Password Isn't the Strongest Security Message-ID: <sMKdndb55tBoBRvRnZ2dnUVZ_sudnZ2d@posted.nuvoxcommunications> In article <38ea3.679eeb72.39b79c38@aol.com>, > >***** Moderator's Note ***** > >I really couldn't remember "e" notation for exponentiation. Or is it >logarithms? > it's strictly from computer science. Dating to the early days of the FORTRAN programming language, and being able to 'reasonably' parse such values on _input_. Internally values are stored as a 'characteristic' (the 'significant figures' and an 'exponent', with the base for the exponent being 'implied', and thus not physically present. since the implied base was the same for all exponent-factor numbers it was omitted 'to save bandwidth' <grin> A number of early computers actually stored data internally as decimal (*NOT* binary) values, thus the 'e-format' output was a 'natural' representation of the internal data format. In this context, the 'e' is a sort-of shorthand for 'exponent' (with an implied 'power of ten' context), not to be confused with the 'e' that is the base for natural logarithms.
Date: Mon, 06 Sep 2010 19:50:32 -0500 From: bonomi@host122.r-bonomi.com (Robert Bonomi) To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: A Strong Password Isn't the Strongest Security Message-ID: <ANadnbPwFLbFERjRnZ2dnUVZ_hadnZ2d@posted.nuvoxcommunications> In article <pan.2010.09.06.05.47.58.659723@myrealbox.com>, David Clayton <dcstar@myrealbox.com> wrote: >On Sun, 05 Sep 2010 23:00:59 +0000, David Kaye wrote: > >> Monty Solomon <monty@roscom.com> wrote: >> >>>Here's one threat to keep you awake at night: Keylogging software, which >>>is deposited on a PC by a virus, records all keystrokes - including the >>>strongest passwords you can concoct - and then sends it surreptitiously >>>to a remote location. >> >> Not to be picky, but keyloggers aren't deposited by viruses, though they >> are desposited by malware (the general term for malicioius software). >> >> You're absolutely right about keyloggers. Unfortunately, many are now >> being spread via rootkits, which often have a booting component that is >> invisible to the operating system. >......... >And which Operating System are you referring to? > >Anyone got the stats of how many non-Windows OSs are ever infected by >root kits etc? Look up the infamous "Morris worm" -- it came the closes of anything to date to shutting down the entire Internet. It utilized specific exploits for several different hardware platforms and O/S's , none of which were e MS products. "primary" target was DEC VAX hardware, running U.C. Berkeley Unix. Number of machines infected was orders of magnitude smaller than say what "I love you", or "Melissa" hit, number of users affected (as a percentage of the 'entire' Internet-using community) was far *higher*. As for a 'root kit' that is subject to definition. There were UNIX exploits out in te 80s/90s that replaced the standard system 'shared library' ("libc") with ones where certain information was 'filtered' and not visible to the calling program. e.g. processes that 'ps' or similar tools were now blind to, or directories that existed but were invisible to any directory activity other that a 'cd'. In round one of those wars, the bad guys would replace the utility program itself, e.g. 'ps', or 'ls', with one that would suppress the display of the bag guy activities. Round two, they replaced the dynamic-load library that the 'regular' executables relied on. That way an integrity test of the executable still showed 'unmodified', although it was "lying through its teeth" about what was going on on the system. These are the kinds of reason you can't trust anything on a compromised system without verifying that every component it relies on is unchanged -- it's generally impractical to do a complete verify, and it is usually far quicker and less labor intensive to do a complete re-install.
Date: Mon, 06 Sep 2010 12:46:34 -0700 From: AES <siegman@stanford.edu> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: 911-only public phone Message-ID: <siegman-792722.12463306092010@sciid-srv02.med.tufts.edu> Moderator Bill Horne wrote: > Do you remember the "Cue Cat"? It was an optical bar scanner that > users could attach to their PC in order to scan bar codes from > magazines or TV so that users could get information about products > that interested them. It died a quick and expensive death, because Heck, I remember -- at least, I think I remember; never know for sure these days -- a computer hobbyist magazine that printed complete programs (that is, binary program code) as crude bar codes in the magazine. so you could read these little programs into your PC using some kind of simple hand-held scanner. Anyone else recall this? Was it in Radio Shack TRS-80 days? [Copied to ba.internet because I believe there are old-timers in that NG also.]
Date: 7 Sep 2010 11:06:15 -0400 From: kludge@panix.com (Scott Dorsey) To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: 911-only public phone Message-ID: <i65kd7$o0j$1@panix2.panix.com> AES <siegman@stanford.edu> wrote: >Moderator Bill Horne wrote: > >> Do you remember the "Cue Cat"? It was an optical bar scanner that >> users could attach to their PC in order to scan bar codes from >> magazines or TV so that users could get information about products >> that interested them. It died a quick and expensive death, because > >Heck, I remember -- at least, I think I remember; never know for sure >these days -- a computer hobbyist magazine that printed complete >_programs_ (that is, binary program code) as crude bar codes in the >magazine. so you could read these little programs into your PC using >some kind of simple hand-held scanner. > >Anyone else recall this? Was it in Radio Shack TRS-80 days? BYTE used to do that a lot in the late seventies and early eighties, also they published some books that had programs in barcode in the back. It was actually a very convenient idea in the days when programs were much smaller than they are today. --scott -- "C'est un Nagra. C'est suisse, et tres, tres precis."
Date: Tue, 7 Sep 2010 08:42:13 -0400 From: Monty Solomon <monty@roscom.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Gmail phone service makes calling anywhere from home cheap. Message-ID: <p0624087fc8ab7a62384e@[192.168.1.70]> The Home Phone Is Back! Google's new Gmail phone service makes calling anywhere from home cheap and crystal clear. By Farhad Manjoo Posted Thursday, Aug. 26, 2010, at 5:15 PM ET Among the many prophecies that techies take for granted, none seem more certain than the death of the home phone. Just look at that sorry thing, if you even still have one: Your landline remains fixed in a single spot; it can't text, take pictures, access the Web, or play games; and it's plagued by telemarketers and robocalls. Since most people find it impossible to navigate modern life without a cell phone-and because it's expensive and somewhat redundant to have both a landline and a cell plan-it's no surprise that people are ditching their home phones in droves. In 2003, according to the National Center for Health Statistics, fewer than 5 percent of American adults got by with only a cell phone. By 2009, that number was nearly 23 percent-and the agency found that the rate at which people are abandoning landlines is increasing. I suspect, though, that many people who cancel their landlines experience pangs of regret. The cell phone, after all, has its own problems. There's a good chance it doesn't work very well in your home or office. Even when it doesn't drop calls or take 30 seconds to connect, the quality of voice calls can range from "guy stuck in a car wash" to "guy stuck in a car wash with the windows rolled down and the radio blaring." In these moments, it's hard not to miss the trusty old home phone. That explains why I haven't joined the ranks of the landline-less. Instead, I pay the phone company about $20 a month to get a very basic plan, and then I use the home phone in conjunction with various Internet services to make very cheap calls. The service I use most often is Google Voice, which does several amazing things. It gives me a single number that rings all my phones, it transcribes my voicemail, and it lets me respond to text messages in my e-mail. Best of all, it lets me make calls through my home phone over Google's servers, which is cheaper than dialing directly. There's no charge to sign up for Google Voice, and it lets me call anyone in the United States and Canada for free; international calls are very cheap. (I also often use Skype on my iPhone, which, in my house, sounds much better than my iPhone.) On Wednesday, Google merged Google Voice with Gmail, building a phone in your inbox. After downloading a small app, Gmail users in the United States will now be able to dial standard phones from their e-mail. (The feature is rolling out gradually, so you may have to wait a few days for it to work on your account.) You don't need a phone to do it; instead, Gmail turns into a speakerphone using your computer's microphone and speakers. (You've probably got all the necessary hardware built into your laptop; if you're on a desktop, you can get a USB headset.) In my tests, the new service worked easily and flawlessly. You simply type a number or contact's name into the new Gmail calling-pane and hit "Call." Google's engineers built a sophisticated echo-cancellation algorithm into the system, so calls sound clear even when you're not using a headset. You don't need a Google Voice number to make outbound calls from Gmail, but if you want to receive calls, you'll need to be a Voice user. (Sign up at https://www.google.com/voice.) When someone calls your Google Voice number, you can answer in Gmail in addition to all your phones. All of Google Voice's call features work inside Gmail-you can jump into a call while someone is leaving you a voicemail, you can record your calls, and you can switch calls between Gmail and another phone while you're in the middle of a call. (For now, the service is available on the desktop version of Gmail, not the mobile version; it also hasn't been rolled out to anyone outside the United States or to Google Apps, the business version of Gmail. Google has hinted that it will make the service available to these other users at some point.) ... http://www.slate.com/id/2265201/ ***** Moderator's Note ***** I use the service: it performs as well as this reviewer says. The only inconvenience is that a single account can't have more than one "landline" phone number, so anyone in your home who wants "their" Google voice number routed to a cell phone or a different landline must have a different account. Sad to say, the best I could do with the available selection of numbers was 339-DOG-TITS. ;-) Bill Horne Moderator
Date: Tue, 7 Sep 2010 08:42:13 -0400 From: Monty Solomon <monty@roscom.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: The Glut of Shows Unwatched Message-ID: <p06240883c8ab833d4b8c@[192.168.1.70]> The Glut of Shows Unwatched By DAVID CARR September 5, 2010 The great thing about modern technology is that you never have to miss anything on television. That's also the terrible thing about it. Last Sunday, I was traveling and did not see "Mad Men." As someone who cares about being in the know, when I got back on Monday, I wanted to catch up on the episode. Because I spend time on Twitter, I already knew that the episode included a creative session conducted in the nude, so I wanted to see it for myself before I came across other spoilers. Having set my DVR - I subscribe to the FiOS television service from Verizon - for just such a circumstance, my wife and I plopped down on Monday night for a little time with Don and Peggy. I hit play, and then the screen went blank. After several more attempts, I called in the household's chief technology officer. "You recorded the high-def channel," said my 13-year-old daughter Maddie, adding that seeing as I own a cheap set from Costco, it wasn't going to play. Check, but not checkmate. Verizon has an on-demand service, but as it turns out "Mad Men" doesn't show up for a few days. Starting to feel desperate, I thought for a moment about hopping on the laptop and searching BitTorrent for an illegal copy, but given that I make a living creating original content for a large media company, stealing from another one did not seem like a good idea. Then I remembered iTunes. Right there for $2.99, Season 4, Episode 6, "Waldorf Stories." As I took the iPad downstairs to put it closer to the wireless signal, I told my wife it was going to take about 30 minutes to download. When I got back upstairs, she was already asleep and I shrugged and settled in for a little me time with the Mad Men. I woke up in the middle of the night with the iPad perilously balanced on my less-than-flat midsection, wondering what I had missed. That was Monday. By Wednesday, Steve Jobs, the sensei of all consumer desires, had announced the resurrection of Apple TV. For $99, I could buy a new geegaw from Apple that would allow me to rent, not buy, television shows for 99 cents that would play on devices that won't fit on my stomach, like big flat-screen televisions. (Then again, for the time being only Fox and ABC are doing television business with Apple, so it would not have ended my search for "Mad Men.") Apple is hardly alone. Amazon, Netflix and Google are getting in the television game. And all of them want to make sure that I have the means to dial up the programming I want at a time of my choosing on a device of my selection. Everyone wants to make sure that I never miss a thing. ... http://www.nytimes.com/2010/09/06/business/media/06carr.html ***** Moderator's Note ***** Telecom? I guess so: I've almost stopped keeing track. Is it a TV? A phone? A refrigerator? Your guess is as good as mine ... Bill Horne Moderator
Date: Tue, 07 Sep 2010 09:43:51 -0400 From: Fred Goldstein <fgoldstein.SeeSigSpambait@wn2.wn.net> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: A Strong Password Isn't the Strongest Security Message-ID: <20100907134357.0DEF45454@mailout.easydns.com> On 6 Sep 2010 04:23:48 +0000. Garrett Wollman wrote, > >A good example is "1e100.net" which on the surface looks really > >bogus. > >Until you realize just what number that is, and which takes its name >from it. A googol, of course. n: 1 followed by a hundred zeroes. Not to be confused with google, v: to stare with wide-open eyes. -- Fred Goldstein k1io fgoldstein "at" ionary.com ionary Consulting http://www.ionary.com/ +1 617 795 2701
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Bill Horne. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is moderated by Bill Horne. Contact information: Bill Horne Telecom Digest 43 Deerfield Road Sharon MA 02067-2301 781-784-7287 bill at horne dot net Subscribe: telecom-request@telecom-digest.org?body=subscribe telecom Unsubscribe: telecom-request@telecom-digest.org?body=unsubscribe telecom This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2009 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.
End of The Telecom Digest (14 messages)

Return to Archives ** Older Issues