----------------------------------------------------------------------
Message-ID: <oe8s10$qeq$2@reader1.panix.com>
Date: Tue, 2 May 2017 02:48:00 +0000 (UTC)
From: David Lesher <wb8foz@panix.com>
Subject: Re: cellular telco region with lowest "911" and other
gov't fees?
On Thu, 27 Apr 2017 17:09:21 -0400, danny burstein wrote:
> Any one know of any publicly available list that keeps track
> of all these fees?
ALso note the state tax, set by the declared residence address,
varies widely:
1) WA 18.78%
3) NY 18.04%
43) MI 7.98%
52) OR 1.84%
On top of, of course, the federal 6.64% div. tax.
--
------------------------------
Message-ID: <oe8rg2$qeq$1@reader1.panix.com>
Date: Tue, 2 May 2017 02:38:58 +0000 (UTC)
From: David Lesher <wb8foz@panix.com>
Subject: Re: cellular telco region with lowest "911" and other gov't
fees?
"John Levine" <johnl@iecc.com> writes:
>>I figured I'd get a Tracfone or similar prepaid cheapie.
>If you just want a number to get texts, sign up for Google
>Voice. The numbers are textable, the texts show up in the
>linked inbox or the hangouts app. Works great.
Note that Google Voice does not receive all short code SMS texts.
(See <
https://usshortcodedirectory.com/faq/why-cant-i-receive-short-code-messages/>
for more on short codes.)
I use a T-mobile prepaid plan [which is] no longer available; it gives
me a one year expiration on my time. So every year I buy another $10
worth of time. But receiving a SMS does costs me $0.15.
--
------------------------------
Message-ID: <EE589FA8-79EC-46E1-9437-31E0DF5CDD3C@roscom.com>
Date: Sun, 30 Apr 2017 13:41:36 -0400
From: Monty Solomon <monty@roscom.com>
Subject: Vigilante botnet infects IoT devices before blackhats can
hijack them
Vigilante botnet infects IoT devices before blackhats can hijack them
Hajime battles with Mirai for control over the Internet of poorly secured
things.
By Dan Goodin
Mirai, the botnet that threatened the Internet as we knew it last year
with record-setting denial-of-service attacks, is facing an
existential threat of its own: A competing botnet known as Hajime has
infected at least 10,000 home routers, network-connected cameras, and
other so-called Internet of Things devices.
Hajime uses a decentralized peer-to-peer network to issue commands and
updates to infected devices. This design makes it more resistant to
takedowns by ISPs and Internet backbone providers. Hajime uses the
same list of user name and password combinations Mirai uses, with the
addition of two more. It also takes steps to conceal its running
processes and files, a feature that makes detecting infected systems
more difficult. Most interesting of all: Hajime appears to be the
brainchild of a grayhat hacker, as evidenced by a cryptographically
signed message it displays every 10 minutes or so on terminals.
https://arstechnica.com/security/2017/04/vigilante-botnet-infects-iot-devices-before-blackhats-can-hijack-them/
------------------------------
Message-ID: <F9215084-26D0-4591-94B6-1FBFA23833C0@roscom.com>
Date: Sun, 30 Apr 2017 17:18:35 -0400
From: Monty Solomon <monty@roscom.com>
Subject: FBI allays some critics with first use of new mass-hacking
warrant
FBI allays some critics with first use of new mass-hacking warrant
By Aliya Sternstein
Mass hacking seems to be all the rage currently. A vigilante hacker
apparently slipped secure code into vulnerable cameras and other
insecure networked objects in the "Internet of Things" so that bad
guys can't corral those devices into an army of zombie computers, like
what happened with the record-breaking Mirai denial-of-service
botnet. The Homeland Security Department issued alerts with
instructions for fending off similar "Brickerbot malware," so-named
because it bricks IoT devices.
And perhaps most unusual, the FBI recently obtained a single warrant
in Alaska to hack the computers of thousands of victims in a bid to
free them from the global botnet, Kelihos.
https://arstechnica.com/tech-policy/2017/04/fbi-allays-some-critics-with-first-use-of-new-mass-hacking-warrant/
------------------------------
*********************************************
End of telecom Digest Wed, 03 May 2017