Popular Content

Showing content with the highest reputation since 07/06/2009 in all areas

  1. 6 points
    Hi all, Been busy for a while and was distracted by other facets of life. Signed in today was reading some of the posts to see if anything major or interesting has happened and not much has changed as I expected (no offence). So it seems no harm there in being temporarily gone. Now as I was reading some of the posts and a reply to my "Everything is Assumed" thread I noticed I had been down rep to -6 so I checked the Binary Revolution forum index page where it has a list of where you were down repped and which it was in like each thread over a long past with no replies as to why...I in some ways don't care but was wondering has another spam bot got lose or some dumb-ass, or did I make a thread that offended some community and they say it and one of them joined and down repped me for that. Anyway I was also wondering if this had happened to anyone else as well. Thanks in advance for any replies.
  2. 5 points
    Here's the complete collection of recordings I grabbed of the Odessa 1AESS switch before the cutover. The recordings were made during late may, with the last batch (A-D recordings) made on June 2, 2017 -- days before the cutover. The most interesting recordings I found during the calls to the switch: 1AESS-A.wav - Highest quality recording/best example I have of what a normal call to the 1AESS intercept sounded like. Allows you to hear the background SIT-tone noise before recordings. 1AESS-D.wav - Highest quality recording/best example I have of what a normal call to the 1AESS supervision test sounded like. 1AESS-3.wav - Bizarre because the switch cut to busy after intercept, instead of cutting over to reorder like normal. 1AESS-11.wav - Bizarre because the call, without ring, goes to the 1AESS intercept recording for one cycle, then stops for 20 seconds, and returns the Hillsboro 4ESS '121-T!' recording. 1AESS-14.wav - Bizarre because the call, rings once, goes silent for 30 seconds, then returns the Hillsboro 4ESS '121-T!' recording. 1AESS-15.wav - Bizarre because the call, rings once, goes silent for 40 seconds, then returns a reorder. More descriptions on the other calls are available on the 1A_desc.txt file on the dropbox drive. https://www.dropbox.com/sh/xca3wwskn1mzwzt/AABJMpTS0XDL9NQQgiz4LVI4a?dl=0 Enjoy.
  3. 5 points
    After reading your comment #4 I also got really annoyed. I agree with Berzerk on this. Correct me if I am wrong, but it seems you don't know the difference between petty theft and hacking. Here is what I consider the difference: HACKING - Taking a computer, and figuring out a way to bypass the password. Disseminating the contents of the drive to find the owner's name, address, and pictures of them to identify them. Being nice and installing programs to help them find their PC if they lose it again. VNC - (to view the system) An SSH server - (to help retrieve their files) An IP beacon - (To say when the PC is online and what the IP address is) [*]Returning the laptop to the owner. [*]Occasionally checking in on the PC to make sure the system is ok, and they didn't lose it again. (What a good citizen!!!) PETTY THEFT - Not using google to find a simple kiddie script. Being an idiot and telling everyone you are committing a crime.
  4. 4 points
    There's another number to that; 3438. If you're hitting a route that gives you g.729 (sorta ruins that catchy song), it's not a bad idea to try both a few times. Interestingly, the transcoding seems to come on after the C5 chirps; those (and sometimes some Australian sounding ring) are always clear as day. So now when I found this - I actually think I found it with radio_phreak, but when I did, I was about as excited as you can expect. But something wasn't quite right. If you do a RESPORG lookup on 3438/7, it comes back as using the MCI/0222 network. If you call the number directly terminating to the Malaysian destination (you'll find it with a bit of searching) over MCI though, it's end to end SS7. After trying a bunch of carriers with no success, the theory we wound up with is that they were re-originating via a third party country; likely Australia, to shave a few cents off termination charges. Interestingly, when you hop on a conference on that access number, it'll allow you the option to contact customer service for the company, which is based out of Denver. The route you get is _definitely_ not C5. For whatever it's worth, there was another number until semi-recently; 3439 that routed a little differently. Usually it was more likely to get a transcoded route, or other weird things - one route had 450 hertz ringback before the call went offhook quite a lot . But anyway, for whatever it's worth, during Hurricane Sandy it gave you an error recording from a Santera OCX. If I remember right, the other numbers worked fine though. One thing I've noticed is during that song they play for hold music, sometimes it likes to disconnect you in weird ways. The hold music in question passes some notes a few times that definitely sound like 2400 hertz, so I wonder if that has anything to do with it (maybe we should pay attention to the supervision status), or if it's just an apathetic operator hanging up on you. Incidentally, when the call tears down with 2600, you'll hear this curious reorder tone from the international gateway that sorta fades in and out. Based on this, I wonder if it's a type 1 EWSD: https://pastebin.com/q1dvEcVw . So this isn't exactly C5, but a while ago, I found some Axtel DMS logs on Scribd. No, seriously. You can see from there they have quite a few R2 trunks provisioned for end users: 142785363-switch-a.pdf . We were playing with this on the bridge a few months ago - something I sorta want to get into again at some point; a few people seemed pretty excited about it. There's one particular number, +52-818-114-1500 (on the AX2P42 trunk group; labeled STA_CATARINA_CALL_CENTER_PBX_R2. If you look at page 224, you'll see the trunk group type configuration for this and many others; there's a bunch of R2 trunks with generic labels) that will send a backwards 4 in MFC (780 + 1140 hertz)to the switch - indicating a network error when it messes up. Which it occasionally does. Dunno how or if these can be seized, but it seemed worth mentioning. Speaking of which, I don't have the number for this; I had the bright idea of putting it on the speed dial for a calling card and then letting it expire, but Russia has some sort of strange signaling - perhaps another R2 variant floating about in their network. This particular call I remember being to Siberia: weirdmfs.flac . A lot of their switches use whatever this is. It enables them to send vacant number conditions and such over their signaling network. All I do here besides try and hit some DTMF is whistle 2600 twice; once to seize the trunk, and another time to make the switch get all angry. The tones you hear are the standard R1 frequency set, but obviously an R1 trunk never barks MFs back at you. EDIT: Crap, I forgot about the Cuba stuff. From what I understand, Havana if no other place has a reasonably modern network of Alcatel gear. As for the fixed GSM terminals, there's some older documents on Cuban telecom infrastructure lying around. All of them seem to point towards the Cuban fixed network being very over capacity. That could have something to do with that particular addition. As for Paraguay, radio_phreak mentioned to me a while back a particular set of numbers that would route to C5 trunks over some carriers. I believe it was +595-528-222-xxx. Back to the C5 stuff though, does anybody know where we can find a protocol spec document for it? That'll probably help us with some of the oddities we've found on some of these trunk groups. Another EDIT: http://www.itu.int/rec/T-REC-Q.140-Q.180/en Holy shit, another EDIT: http://www.binrev.com/forums/index.php?/topic/47028-portugal/#comment-364799 portugal_c5.flac One (hopefully) last thing - for anybody looking for international credit, I've found http://www.call2.com to be pretty good for the most part. Most of their routes look to be resold MCI, the rates are reasonable, and it tends to be decent quality. It is a callback service though, so it can be a little clunky for a large number of calls like in a scan. DMS-10 loops can be a good way to make this a little less painful. I feel kinda gross giving out a plug like that, but given the relative obscurity of the service and the content of the thread, it seems appropriate.
  5. 4 points
    0800 890 595 is now a (quite rare) example of the equipment engaged tone. I haven't done much looking for interesting switching/signalling since the early 2000s. It's got more difficult now because most people and businesses in poor countries have jumped straight to GSM (+successors). Back then, it would (as radio_phreak notes) be much more productive to look in the provincial towns and cities of poor countries than in their main cities. My preferred method was to look online for hotels or businesses in those backwater areas, ideally finding their fax numbers, and call those. Much prefer bothering a fax machine than disturbing a person. Now-a-days you need to do this armed with the country's dialling plan (wikipedia usually has these) - and most of the numbers you find will be mobiles. Re Cuba, I can't reach the supposed second dialtone for the US base via +53 99. The state telco is marketing the "fija alternativa" service - ie a GSM-based fixed service - suggesting aged and interesting POTS equipment exists. Calling from here, it's evident that their international gateway is something not outrageously ancient, because it promptly returns an appropriate SS7 code for incorrect prefixes - eg +53 41 000000 returns the usual SIT+"the number you have dialled has not been recognised" from my local exchange. +53 xx 300000 returns a Cuban intercept - in Spanish then English - after about 5 seconds of delay, where XX is any of the 2-digit areacodes listed at https://en.wikipedia.org/wiki/Telephone_numbers_in_Cuba. Sadly no signalling sounds are evident during the delays - I think I've tried all of them. I had a quick look for hotels in Panama and all the phone numbers I found were +507 6xxx xxxxx - ie mobiles. However, again, I'm hopeful that downstream of the international gateway is something elderly and interesting. +507 900 0000 sometimes gives an intercept - Spanish only - mentioning C&W Panama, again with a significant post-dial delay. +507 800 0000 gives my local telco's equipment engaged tone. +507 811 1111 was answered by a human +507 700 0000 is a different Spanish intercept, with a longer post-dial delay. +507 600 0000 or 500 0000 give my local telco's SIT+number not recognised intercept. +507 400 0000 is the same intercept-after-delay as 900 0000. +507 300 0000 is yet another Spanish intercept, with delay. +507 200 0000 has a very long delay then something times out any my local telco plays SIT+"sorry, there is a fault". +507 210 0000 has a long delay then the 900 0000 intercept +507 220 0000 rings, again after a delay, and is answered by some sort of automated service - in Spanish. No signalling sounds or evident, for me, in any of the above :-(
  6. 4 points
    So I just logged into binrev using this: it automatically generates, stores, and types passwords and looks like a usb-keyboard to your computer. That's a at89c5131 dev-board, this mcu is pretty much an 8051 with usb hardware. I'm probably going to keep touching up the code a little before I start printing boards.
  7. 3 points
    Long time lurker.... registered recently..... first post... I know this thread is a bit old, figured I could be of some assistance here: Auto-scanned the 630713XXXX exchange (Took about ~15 hours), then did some manual checking: Number Auto-Scan Result Manual Scan, Comments 6307130025 VOICE Voicemail 6307130027 VOICE Subscriber 6307130107 VOICE Voicemail 6307130138 VOICE Voicemail (Nokia) 6307130460 VOICE UMTS Operations Support Group (Nokia -- "Please try again in 15 minutes") 6307130484 VOICE "We're sorry, but the blackout period for the transtition of the 401k record keeper is in effect on January 6th, please call back on January 7th." Repeats, then hangs up. 6307130563 VOICE Subscriber 6307130760 VOICE "Thank you for calling the Nokia workplace resources call center." 6307130869 VOICE Voicemail 6307130990 VOICE Voicemail Access Number, with working directory. 6307130996 VOICE Voicemail Access Number, with working directory. 6307131006 VOICE Subscriber 6307131229 VOICE Subscriber 6307131265 VOICE "Sorry, this automated attendant number is not available at the moment, goodbye." 6307131292 VOICE Subscriber 6307131304 VOICE "The called extension is busy" >> Voicemail 6307131329 VOICE Subscriber 6307131335 VOICE Ring >> Reorder 6307131553 VOICE Voicemail 6307131984 FAX Fax tones 6307132349 FAX Fax tones 6307133200 VOICE Voicemail Access Number, with working directory. 6307133678 FAX Possibly a modem. 6307134150 VOICE Subscriber 6307134389 VOICE Subscriber 6307134433 VOICE Voicemail 6307134484 VOICE Subscriber 6307134633 VOICE Voicemail 6307134967 VOICE Voicemail 6307135012 VOICE Voicemail 6307135163 VOICE Voicemail (reads back extension number) 6307135305 FAX Possibly a modem. 6307135353 VOICE Voicemail 6307135400 VOICE Voicemail 6307136056 FAX Fax tones 6307136081 FAX Fax tones 6307136082 FAX Fax tones 6307136091 VOICE Possibly an elevator?? Buzzing/Static on line. Hangs up with #. 6307136153 VOICE Another elevator phone? Hangs up with # again. 6307137073 VOICE Subscriber 6307137163 VOICE Voicemail 6307137180 VOICE Voicemail 6307137339 VOICE Subscriber 6307138416 VOICE Subscriber 6307138507 VOICE Voicemail 6307138668 VOICE Voicemail 6307138761 VOICE Voicemail 6307139039 VOICE Voicemail 6307139328 VOICE Voicemail 6307139379 VOICE Subscriber 6307139650 VOICE Voicemail 6307139764 VOICE Voicemail 6307139885 VOICE Subscriber 6307139988 VOICE Voicemail If there's any interest I can run a scan on 630979XXXX.
  8. 3 points
    So all credit goes to Ramsaso; he pointed this out on the bridge last night. If you have a T-Mobile phone, try calling 712-451-0011. You should get a recording saying they now charge 1 cent a minute to call it, even if you're on their unlimited plan.
  9. 3 points
  10. 3 points
    I got this bag phone last month and was playing around with it to see if there was some tiny chance that it could connect to any network. As I suspected, there aren't any crumbling remains of AMPS networks anywhere near me. An interesting feature about this phone is there's an "Aux Out" which apparently was for sending faxes. Can't imagine lugging all of that around and plugging everything into the 12v jack in your car...
  11. 3 points
    This is just a beginning to get people started. Feel free to add onto more if you wish. The 'Threads' links you will see are from threads from these forums where the topic has been discussed before. I wrote this a few months ago so there may even be more threads about them if you search around. This list was made from numerous threads about the same topics; to stop the bitching from the Department of Redundancy Department. 1. How do I use exploits? ::Discussions - 1. ::Programs for assistance - Nmap and Nessus. ::Reference material - Security Focus, and Irongeek. 2. How do I get the admin password for Windows XP? ::Discussions - 1. ::Programs for assistance - Login recovery, and John the Ripper. ::Reference material - Password Recovery, Irongeek.com, and many others. I would suggest reading the discussion thread. 3. How do I hack a website? ::Discussions - 1 , 2, 3. 4. How do I get around web filtering like Websense? ::Discussions - 1, 2, 3. ::Programs for assistance - It is probally easier to use a proxy to get around web filtering software. ::Reference material - Babelfish, Proxy Blind, and Proxify. 5. What are proxies and how do they work? ::Discussions - 1, 2. ::Programs for assistance - There are tons of proxy server lists out there. Suggest doing a Google search for "Proxy", "Proxies", "Proxy Server", etc. ::Reference material - Wiki Proxy Info. 6. Where can I find more Hacker media like HackTV or BRR? For general Hacker Media information check out the Forums. ::Reference material - Hackermedia, Infonomicon, Old Skool Phreak, WhiteSword TV, Packet Sniffers, Hak5. 7. What are some good books to read that will teach me about hacking? This all depends on what you are interested in learning. ::Reference material - Cryptography, Programming, Networking, and Social Engineering. 8. Where can I find a meeting to attend, and what if no one is in my area? If no one is in your area then start up your own meeting, and let others know about it! ::Reference material - Bin Rev meetings - BRR listeners map, DefCon groups, 2600 meetings, and also search for a LUG (Linux User Group) in your area. 9. What Linux distro is the best? ::Discussions - 1. ::Reference material - Rundown on different distros, a test that may help you decide which is best for you, and you may also want to check out more distros' for yourself. 10. How do I learn how to hack? ::Discussions - 1, 2. 11. I want to program, where should I start? ::Discussions - 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22. C Book, Tutorial, Windows Compiler, *nix Compiler, *nix Compiler How-To. Python Website, Book, Tutorial, Compiler, Compiler How-To.
  12. 3 points
    Hey Samo! Good to hear from you again. Sorry to give you a wall of text here, there's really no concise way to explain this. In short, if you want to explore a long distance tandem, your best bet is to use a PIC code. There's a very simple trick that lets you push any destination you want directly into the tandem. We'll use Worldcom as an example, since it works from basically anywhere in the United States. Ready? Dial 101-0555. That's it; no zero, nothing. What you get next is a dialtone straight from the tandem. In the case of the ex-Worldcom tandems, it's not quite as fun as it could be; it wants an authorization code a-la 950 calling card. Here's an example of what you might find - http://thoughtphreak..._800223110.flac That's from a DMS (500, I think) owned by Integra, one of the local CLECs. Most long distance tandems (AT&T's aside - we'll get into that in a bit) don't like terminating toll-free calls, so you'll end up getting weird messages that you'll never be able to hear normally unless your switch loses it's mind. What's so great about this is you're completely free from the dialing restrictions of a normal end office. Want to dial an NXX starting with 1 or 0? A code starting with #? *? There's nothing standing in your way. Sprint in particular stuck a speed dial function on their tandem for some weird reason in the #xx range. #99+anything seems to be it's own little exception - it'll wait for a very large amount of digits before eventually giving you a generic CBCAE recording. This might indicate they're hiding something else here. There's one downside to this technique; if you're not subscribed to a carrier, they won't always let you play with the tandem. ex-MCI (0222) and Sprint are a couple good examples of this, but Sprint will give you a cool message as a consolation prize. Depending on your area, you might have better luck too. For example, the Qwest long distance network has a combination of DMS-250 and Sonus switches. Sonus isn't fond of letting people have fun on the phone, so you'll just get a generic error recording. If you encounter Global Crossing's Sonus switches, you won't even get a custom recording, you'll get the Sonus stock one. It's worth a laugh if you ever hear it. It's under three seconds, and was clearly made last minute by an engineer. Speaking of Global Crossing, like MCI/0222, they have a number of Alcatel DEX switches floating around. Dialing 101-0444 will just get you an error, though. The solution? 950-1044! What dialplan they're using is absolutely beyond me, though, so you're on your own there. There's suggestions - like 800-223-1104 (but only without a 1) going to an invalid code recording that suggest it might be for calling card use, but most things I can think to try just go to a CBCAD. And then we come to AT&T's 0288 network. I'll level with you, this is something I haven't figured out at all. Whenever I've been fortunate to get a dialtone back, it's always been from one of their 5ESS toll tandems. If there's such thing as a pushy phone switch, this is it. It'll let you know right away if it thinks you're doing something wrong. And putting a 1 in front of your destination number is wrong. I haven't had time or an opportunity to just sit down and investigate this, but what I do know is it's unique from a lot of other switches. For one, it'll terminate toll-free calls, but only on specific carriers. I believe just AT&T and Global Crossing toll-frees. Sometimes, it gets a little weirder - like, if you dial 800-244-1111, you'll get a recording from a McLeodUSA DMS. What this means I'm not sure exactly, but my guess is since the 5E toll tandems are responsible for lending a hand in connecting toll-frees, they'll store translations for those toll-frees. If it happens to have one - outdated or not, it'll just use that instead of doing an SMS-800 dip. Also of note on the AT&T tandems is the 600 NPA. Instead of just intercepting it like any invalid NPA, it'll pass this onto the 4ESS. This might indicate AT&T stashed something in there. As for your question - is SS7 relevant to phreaks? Absolutely. The very core practice of phreaking - introducing unorthodox input into the phone network - is fair game to everything, in or out of the speech channel. In the past, we've proved ISDN cause codes can trigger calls to take a different route, and it's been demonstrated that originating a ghost call (in short, an ANI fail on steroids - a call originated with no field other than the destination number) can be enough trouble that phone companies would probably scratch their heads as to whom they should send the bill to. It's understandable that figuring these things out is a challenge, but if anything, that should be a motivator. We're phone phreaks, we've got the resourcefulness to identify a piece of telco hardware by nothing more than vague sounds, and have fun in the process. This should be a reminder that there's always more to explore, and always another limit to break.
  13. 3 points
    It's a mindset. You hack to learn, you don't learn to hack.
  14. 3 points
    That sounds like a lot of work! Can I just send you my bank account numbers and social and have you help me out?
  15. 3 points
    Not to stir shit up, but I certainly agree that this forum shouldn't be a place where fake accounts come along and post allegations which result in people being terminated from their employment. If "unlucky" was indeed the victim of a violation of his privacy by an employee of trapcall/spoofcard then he should have contacted them. Also, if Lucky was fired without any evidence of a particular account being accessed by an employee, then he worked for a piece of shit company. If I were a mod, i would have deleted this thread because even if the allegations were true, there was not a shred of evidence provided, and I do not believe that this is a place for such things. perhaps if "unlucky" simply voiced a concern over the privacy expectations when dealing with a particular service, but he didn't - he made an accusation directed at one man, without anything to back it up. That being said, it's probably all true. ...seriously.
  16. 3 points
    Stop paying for tv service Look into "FTA" or "FTA Receivers" Etc. Just read up on the "Free to Air broadcasts" You just buy a receiver, point your satellite at the orbiting satellite and you can get over 1,000 channels Free.
  17. 3 points
    SCO doesn't own UNIX, at least not yet. The actual "ownership" and copyright to UNIX is a very complicated issue. All this court decision did was "reverse material aspects" of the earlier verdict from 2007 that found Novell to be the rightful copyright owner. Now there's going to be yet another trial case to determine whether SCO does in fact own the copyright. I don't think anybody seriously gives a shit about System V UNIX, UnixWare or any of SCO's other crappy, outdated products. But a company like SCO, which has been in bankruptcy for over 2 years, has virtually no market share and appears to exist these days only for the purpose of suing other companies, might well gain legal ownership of the original System V UNIX code. In other words: they might gain a legal "leg to stand on" and cause more trouble for OSS creators and vendors. For years, SCO has been bitching that Linux infringes on a copyright for the original UNIX code that it assumes it holds. They have sued companies like IBM and Novell which produce Linux-based software and distribute Linux as an OEM OS. They have disseminated propaganda to Linux users, accusing them of copyright infringement and alleging they could be liable for damages simply by running Linux. They have sued their own (former) customers who switched from using their products to using Linux. SCO is also known to have received financial backing from other, far more powerful interests whose goal is to ruin the open source software movement by any means possible. At this point, SCO clearly has nothing to lose, and Microsoft doesn't have to dirty their hands or risk hurting their own public image by attacking open source developers in court. Microsoft can just sit back and bash the OSS movement in the press, allege IP infringements, negotiate cross-licensing agreements and provide financial support to companies like SCO to file anti-OSS suits. This may not be a potent threat to the very existence of Linux, but it could definitely harm Linux in the business market and lead to some very bad precedents regarding OSS and software copyright/patents in general. BTW, I'm not the one who voted down your post. It's an interesting bit of news on a case I haven't really followed in awhile. Thanks for posting it.
  18. 3 points
    The above is the 'offical' Postal Regulation for an IBI or Information Based Indicia. All this information is contained in the 2-D barcode to the upper left of a piece of metered mail. Look at some of your junk mail and it will be very clear what I mean. It's that box that looks like Lattera's avatar. The column that says barcode are all of the data items in that 2-D barcode that I'm talking about and the Human Readable is what you can decipher when you look at it...date, time, etc. The information is digitally signed so that when the Post Office reads the mail it can be fairly certain that it came from a particular licensed meter. What's crazy is that the meter internally communicates with 'itself' using an asymetric key system...public/private. That is the meter contains a postal security device which is tamper resistant (of course resistance is a relative term) that sends out commands to create and sign the indicia with all the signals being encrypted. Think of it like an HTTPS setup for internal communications or more appropriately like each command being digitally signed. Digital signatures use the public/private key system so this is closer to what is happening. The whole postage meter industry is so wacky. What I mean is that to actually attack the meter directly is incredibly hard but not impossible;however, there are far easier ways to 'hack' a meter. The meter itself and access thereof is fairly easy due to primitive security. If you have physical control of a meter and a system that can interface with it you can do pretty much whatever you want. But not to be too much of a worry wort...printing postage is printing money; stamps are a legal form of tender so if you play games with this stuff the penalties are insanely harsh because of that. I know some smartass is saying to himself, "Oh then I can use it to buy my groceries?" Not exactly...unclaimed stamps can and must be refunded by the post office. If you show up with a stamp that is legally yours or if you can 'somehow' prove that that is a stamp of yours the post office refunds the amount on the stamp. Of course it isn't an immediate refund. You can't just show up with a meter label for a hundred bucks and walk away with a c-note.
  19. 3 points
    Ohm, you obviously get off on policing binrev. Seriously, I've seen you crush countless topics with your sense of superior morality. The only thing that impresses me about you is that you always find some way to condescend. You've got a real talent.
  20. 3 points
    Clearly the best was Windows 95. Don't you miss 3 reboots a day? As for XP, it was received pretty badly at first. Pre-SP1, XP was quite buggy. Also, for the time it was resource heavy, so a lot of people complained they couldn't run it on their current machines. I always got a chuckle when people bashed Vista, yet praised XP which had similar problems at the start. Of course people were willing to bite the bullet since the alternative was Windows 98 (or for the enlightened few, Windows 2000). Now, you have XP which works and is stable, so you can sit back and poo Vista all you want. I've also had no problems with Vista. If you have a fast enough machine, there's just not much to complain about. It works, what more do you want? As long as you're listing future OSs, why not list Ubuntu 9.10?
  21. 3 points
    Great link. Who wants to mirror this and stick up a torrent?
  22. 2 points
    Just found this photo and article, figured I'd leave it here. https://www.rcrwireless.com/20171109/network-infrastructure/switching-it-up-bidding-farewell-to-the-1aess-switch-tag6
  23. 2 points
    My understanding is the switch portion of the packet switch is called a call agent (typically -CA0 or whatever if you're looking at a CLLI). A media gateway is just something that takes analog or TDM trunks/lines or whatever and interfaces them with the call agent. Sorta like a huge ATA. What differentiates a packet switch from a circuit switch (as far as I know) is that a packet switch internally uses packetized transport, while a circuit switch uses a time slot interchange to connect traffic. Though this isn't always black and white; sometimes media gateways have time slot interchanges. I guess if you want to be all lawyerly about it, that's technically not part of the switch. Then there's the term softswitch. As far as equipment vendors are concerned, I honestly think that's just a bullshit marketing term. A softswitch, as they put it, is a switch that's based entirely in software. A lot of packet switches will consolidate some components from the design of a circuit switch into software, but they're sold as custom, proprietary blades; there's a snowball's chance in hell you're running CS-2000 or Metaswitch software on a vanilla PC. There are things like Freeswitch and Asterisk that are actually softswitches, but the line between what is and isn't called one has been blurred by marketing weasels.
  24. 2 points
    Imagine if the Internet regressed back to 24.4, 33.6, or 56K for 24 hours? Will never happen, but made the start up sound on meh Windows to a 56K modem connecting. The memories. :-)
  25. 2 points
    Yeah, there are USB isolators you can get from industrial suppliers that will protect your machine, too (used to prevent a catastrophic failure on a machine tool from blowing up the control system). I would probably just grab the cheapest throwaway laptop in the parts heap/thrift store/whatever and use it, if I were going to check these out. Another thing to look at is local geocaches. I've found a few on hikes that had USB drives in them.
  26. 2 points
    Carriers couldn't wait to get rid of AMPS. It was a spectrum hog. They could compress a lot more GSM and CDMA calls in the same channel space. In fact, AT&T finally got rid of 2G (TDMA) in January 2017. Again, lack of market share, spectrum hog, and everyone had finally moved on to GSM or LTE. In fact, 5G (actually not really a consumer standard) is on its way soon. More signals, less need for the older crap. It was pretty amazing. In 2008 AMPS went away, in 2009 NTSC (analog) television went away. And in a few years, the current digital ATSC will go away (ATSC 1.0) because ATSC 3.0 is around the corner. And that will use even less spectrum because the FCC is giving that away to the cell companies. ATSC 3.0 uses more compression than the current ATSC 1.0 does. And don't get me started on the landline side of things. I see huge changes in the next 5 to 10 years. Ain't technology grand?
  27. 2 points
    I recently purchased a used Foundry/Brocade FastIron 24-port gigabit switch to try out. 24 gigabit ports, 4 of which are SFP (can be various kinds of fiber), an expansion bay that supports 10 gig modules, and switchable 802.3af PoE on all ports. Very nice hardware! The OS is very similar to Cisco IOS, and their documentation/command reference is excellent. I bought it used, I think I paid under $50 shipped -- there may be a thread on it elsewhere on the forums. Overall I'm super happy with it, would recommend Brocade for business/commercial hardware. I've also had very good experiences with Allied Telesis (used to be Allied Telesyn) products. They make a solid line of managed and unmanaged switches. They aren't as feature rich as HP, Brocade, or Cisco, but the price reflects that. Most of the admin is better done through the web interface, I didn't like working with the CLI, whereas I prefer the CLI on my Cisco and Foundy/Brocade hardware. I really like Allied Telesis' smaller workgroup switches (4-8 port units) as you can get them with a built-in power supply -- no wall wart or line lump.
  28. 2 points
    I just use my POTS line for the most part. Occasionally, calling cards too for international. They're ideal for that sort of thing since a lot of CO numbers don't go offhook. Finding them in the first place might well end up costing you more money then the actual scan.
  29. 2 points
    I am a phreaker. I phreak. Sometimes I phreak with phreaking tools, but I don't phreak systems. That would be weird. "To phreak" is an intransitive verb, denoting an activity but does not take a direct object.
  30. 2 points
    I remember my father had an analog answering machine in the 80's. It came with a little back box about the size of a small pack of smokes with a button. You held the button up to the phone and it would control the our home answering machine. It had different beep combinations to rewind, playback, play first messages, etc.. You;d need to consult an owner's manual for each device I think.
  31. 2 points
    I hack in machine code all the time, but it's on one of these: It's easy to stop a system and mess with memory when it's designed for it. Many embedded systems support a ROM monitor that would allow such operation. Finding a way to jam bytes into memory and jump to them is a large part of remote exploitation.
  32. 2 points
    800-877-3542 - Older IVR of some kind. JCSwishMan33 and Ramsaso helped narrow down that it belongs to some large gas company. Listen to those crunchy recordings! Oh, also there's hidden options. The golden rule seems to be * goes back, and #/0 will hang up.
  33. 2 points
    You've probably been hearing quite a bit about hackers recently. According to the mass media, hackers have been holding Hollywood hostage, are working for the North Korean government, and are basically equivalent to terrorists. Some of this we've heard before and some is just completely out of left field. As one small part of the vast and diverse hacker community, we felt compelled to not only say something, but to do something. First, let's clear one thing up: We have little remaining ill will towards Sony for their part in the MPAA lawsuit against us in 2000, when we were hauled into federal court for publishing a computer program that would allow Linux users to view DVDs. We learned a valuable lesson about corporate America, the government, and the power of the Digital Millennium Copyright Act. We saw how the media could be so easily manipulated by the powers that be. And, while we lost the case, we became the first actual victims of the DMCA, and had the privilege of being the ones to warn the rest of the country what was ahead. That fight has been going on ever since. And Sony played a valuable role in motivating us. We thank them for that. As hackers, we have a strong commitment to freedom of speech, which we regularly express through our magazine, our radio shows, our conferences, and any other medium we can get our hands on. Most in the hacker world share in these very basic values. We've protested films in the past when they've been unfair to the hacker community. It tends to freak out those in power when they realize hackers are angry at them, but most of those fears are based on paranoia and ignorance as to what the hacker community is really all about. And cutting off speech, silencing unpopular views, and avoiding controversy are not what we're about. As you have undoubtedly heard, Sony has decided to cancel the release of their controversial film "The Interview." They've done this because of a single, vague threat that is tantamount to something we've all seen at one time or another on an IRC channel and not thought twice about. By focusing on this threat, however, Sony can attempt to extricate itself from the controversy and the immensely stupid movie plot it agreed to produce - and blame the whole thing on hackers, albeit North Korean ones. (They might also escape liability for their inadequate computer security by claiming the massive compromise of their systems was equivalent to a terrorist act. But that's another story, or possibly a whole new movie.) In their gross generalization, and with the help of the mass media, the entire hacker community is being painted with a very broad and dark brush. We have decided to call their bluff. To demonstrate that hackers have no interest in suppressing speech, quashing controversy, or being intimidated by vague threats, we ask that Sony allow the hacker community to distribute "The Interview" for them on the 25th of December. Now, we're aware that Sony may refer to this distribution method as piracy, but in this particular case, it may well prove to be the salvation of the motion picture industry. By freely offering the film online, millions of people will get to see it and decide for themselves if it has any redeeming qualities whatsoever - as opposed to nobody seeing it and the studios writing it off as a total loss. Theaters would be free from panic as our servers would become the target of any future vague threats (and we believe Hollywood will be most impressed with how resilient peer-to-peer distribution can be in the face of attacks). Most importantly, we would be defying intimidation, something the motion picture industry doesn't quite have a handle on, which is surprising considering how much they've relied upon it in the past. We sincerely hope Sony doesn't refuse this offer because of the potentially bitter irony of having hackers show them how to run their own industry. Perhaps if they had spent less time in court and more time learning to stand up for the values they allegedly hold (not to mention installing a little security on their systems and protecting the privacy of their employees and associates), this little bit of drama might never have had to happen. But then, where would Hollywood be without drama? Even more vital than ensuring that the public gets to experience (and judge) art for themselves is the need for hackers to show their true colors. These are not the colors of terrorists, bullies, or government agents, but rather those of creative individuals who can cause all kinds of mischief and, in the process, come up with unique solutions and ingenious ways of preserving freedom. We believe it's the latter category that really scares those in power and is likely at the heart of all of the wild fear-mongering we're hearing today. Failure to correct these misconceptions now could easily assure future crackdowns that will affect all of us. We will be preparing a section of our website for screening of "The Interview" on December 25th. If Sony agrees, we will work our asses off to make this happen. If they don't give us permission to do this, then we will point to any sites that have managed to obtain the film. The address to write to for anyone from Sony, North Korean officials, hackers around the world, or the general public is interview@2600.com. Censorship and fear must be fought at every opportunity. We made that point while opposing Sony in the past. Now we must make that point again, this time for their benefit. http://www.2600.com/?q=content/offer-sony-2600
  34. 2 points
    Hey guys, I recently signed up for an AMD Embedded Developer account and have access to all sorts of tfiles for the Embedded G-Series Processors and SoCs, as well as the R-Series Processors. I've been looking to develop a board around these things for a while. I need someone who has the ability to help me through the process (both physics and design) and is willing to do so without financial compensation (well, unless I decide to start selling these boards for multipurpose stuffs, then there will be percentages involved). Now, all of these things are very closed source and I signed maybe four too many non disclosure agreements. And they can very much make lawsuits against me, so anyone who is going to be working with me must also be able to obtain access to the files. This is a link to the developer registration. The process shouldn't be too hard, given I (at 17 years old) signed up and got approved. It took an overnight approval process, but other than that, there were no hiccups. (Also, within 15 minutes I was declined, then in the morning I was approved, so I don't know what's going on there, just try it if you are interested).
  35. 2 points
    I'd heard of things like that happening, both with new flash drives and with those purchased secondhand (mostly eBay stories). Mine are usually immediately reformatted with a UDF filesystem anyway.
  36. 2 points
    Hrmph. DDoS isn't "hacking" and it's lame. Botnets can be interesting, but not for what you want to do (malicious activity). You'd be better off spending your time on better ventures. IE - "real hacking". There's a ton of ways you can get involved which don't involve destruction and disturbance of services. Hardware hacking, System & network security, etc.
  37. 2 points
    While our holiday specials are indeed something to get hysterical about, there's no reason why we have to behave like the WalMart crowds. We're better than that. So if you decide to visit our online store to take advantage of prices so low we're practically giving it all away, please remain calm and remember that others are also in the store trying to get the best value. There's no need for denial of service attacks, buffer overflows, or pepper spray exploits. We will do our best to accommodate everyone. http://www.2600.com/news/view/article/12162
  38. 2 points
    IDK about DDR2 and DDR3 compatibility, and am too lazy too google it right now. Just thought I'd add my 2 cents on liquid cooling. I'd not recommend it, unless you're gonna do some serious overclocking and need it. IMO, the more complicated stuff is, the less reliable it is. I've overclocked a 2.8 Q9550 to 3.5GHZ (pics were in the gallery) and it was stable as heck. That was with and nVidia chipset, that was known to run extra hot, too. Of course with the two 250mm side-fans, two internal 120mm fans, and a third-party zalman heatsink/fan it sounds like small vacuum when running full throttle on hot summer days.... EDIT: thermal compound; I've yet to find anything affordable as good as arctic silver 5. A small tube for about $20.00 will last 10 or so builds. Just be sure to learn to apply it properly! I've seen so many people that just splurge, thinking extra compound will work better. When in fact, too much, will actually insulate the CPU. Put about the size of a grain of rice on the heatsink. Then spread it evenly with a razor blade or exacto knife. The coat should be thin and even across the entire copper placement of the heatsink. You could put it on the CPU, but I just hate handling them too much, as pricey as the damn things are... The heatsinnk can usually withstand a static discharge that would fry the CPU. You could also use rubber, medical gloves to spread it with your fingers. Just don't touch the heatsink copper placement or cpu with bare hands, though. I've read the oils from human contact will degrade the compound prematurely...
  39. 2 points
    I think he is referring of your failure to read: Pinned thread: and Announcement: http://www.binrev.com/forums/index.php/forum-4/announcement-4-malicious-questions-will-not-be-answered/ If you had a "home network" in which you wanted to find a way to attach "Two Girls and One Cup" to every outbound email as an attachment called "statistical_survey.mp4" that might have been a different story. That is legal (weird, but legal) and people could reply to that; however, your request is quite illegal, and no hacker in their right mind would feel comfortable in helping you break any law. Hackers are inquisitive folk, not hooligans that are hell bent on going to jail.
  40. 2 points
    unlucky : unless you provide some solid evidence I call you a liar OSP subforum is not for this kind of abuse, I vote for trashing this topic
  41. 2 points
    As everyone has already heard, Google Chrome OS or Chromium OS source code was released a couple weeks ago. There have already been a few attempts at compiling it and getting it to work on devices. If anyone wants to try out Chromium OS safely and see what's up, you can use VirtualBox. 1.)Download and Install VirtualBox. 2.)Download the compiled Chromium OS in virtual hard drive format. [you can get this off torrents or PM me...I'm not going to get into another pissing war over TPB. The link is legal and the package is legal but out of respect for the board I'm not going to post the link.] 3.)Creat a new VM and during the hard drive set-up select the pre-existing hard drive option and select the downloaded Chromium OS. 4.)Create a bogus Gmail account...your real one, if you have it, will work too. 5.)Log into Chromium OS and hack away! It is very slow running even on my Quad Core...but this isn't even a beta...this is a hack beta:) I took some snapshots of what you would see: Notes: pretty typical. As you can see or actually maybe not, it will autofill @gmail after you enter in a user name. From a security perspective, since Google is making you live in the 'cloud' physical security is now virtually moot as my wireshark run picked up my username in the clear. Although my password was hashed this is not sufficient if people are going be exposed to an attack everytime they open up and use their Chromium OS device. Notes: Here is a screen shot of a failed certificate. This was caused, I think, by my computer having two gmail accounts inadvertantly opened at one time. Although it doesn't lock you out of the OS and hence your device (crazy legal reasons naturally) it does lock you out of Google's 'cloud.' You can still surf the web and access the device through the OS but this is naturally a reduced experience from Google's perspective. Notes: Here is the 'desktop.' Looks very familiar. Notes: Built in apps...all are web based, even the calculator. Notes: The good stuff.
  42. 2 points
    some one should email/message him then .
  43. 2 points
    Farmville seems to be one of these things that comes up in my notifications every once in a while... then i promptly ignore it. haxxxoring fayceboox ; so leet You think "it's time we hacked it" ? Who are you? Bye
  44. 2 points
    Yeah, they showed us how insecure hacker websites are, but didn't we already know this? Producing content to fill the forums is more important then securing the forums. You beat me to it. These guys are run of the mill hackers with excellent showmanship. How can I make that claim? They exploited common vulnerabilities, using common tools and techniques. It was evident that their brains were required occasionally, and I'm sure it was refreshing after all that routine hacking they bragged about. The choice of targets? High profile hacking- or security-oriented sites that focused more on content than their site security. Bragging about these sites is like saying you can shoot fish in a bucket... with a machine gun! Of course, these sites do get lots of press, so whatever happens to them gets noticed. In the end, Zero for Owned resembles a Richard Nixon publicity stunt more than a Kevin Mitnick exploit story. Does anyone else think Zero was named after its contribution to IT security? To Zero for Owned: You've Just Been Powned!
  45. 2 points
    That's why I always walk backwards down the street, it confuses the hell out of them. By the time I get to where I'm going I've already been there.
  46. 2 points
  47. 2 points
    Kevin Mitnick talked about it for 10min on Coast to Coast AM last night - equating it to a script-kiddie attack. I think the N. Korean Government would be a little more advanced. I mean every country that has any nuclear capability should be able to write buffer-over-flows and the like.
  48. 2 points
    He doesn't deserve rep. Both the Dev-Team and him knew the exploit, but he happened to think his glamor is more important than the well being of the community and released it before 3.1. This would've avoided problems down the long run. And so far his "purplera1n" is wreaking down a wave of bricks on each iDevice it touches.
  49. 2 points
    Does anyone know of default passwords for Microware (now Radisys) OS 9? After extensive searching I cannot seem to find any default username/password lists for this OS at all. Thank you in advance.
  50. 2 points
    Well, I finally have a need to get around a password protected hard drive on a Dell Latitude D600. I know there are a few methods that can be used to do this, but I wanted to post here and see if anyone can suggest anything else. The hard drive in question has a password on it. I believe the term is "platter locked". What I know of follows: http://www.rockbox.org/lock.html The utility atapwd, linked at the above url, looks like it might work, but I haven't gotten it to work yet. http://a-ff.com/products/rrs/drives/ This is a company that provides an unlocking service for around $60.00. I don't want to spend money though. http://www.vogon-forensic-hardware.com/for...cracker-pod.htm These guys sell hardware and software that can clear the password and then image a drive for forensic purposes. I don't think they sell to civilians though. There is also a thread on this elsewhere: http://www.hardwareanalysis.com/content/topic/34045/?o=0 Any thoughts as to where I should go to get this done?