Agents of the Revolution
  • Content count

  • Joined

  • Last visited

  • Days Won


jfalcon last won the day on April 1

jfalcon had the most liked content!

Community Reputation

9 Neutral

About jfalcon

  • Rank
    Hakker addict
  • Birthday 02/24/1974

Contact Methods

  • ICQ

Profile Information

  • Location
    Living within the ether

Recent Profile Visitors

2,759 profile views
  1. I'm not sure if you considered this, but you may want to consider bonding the two interfaces to a hosted machine. Then when an ISP gets cut by a backhoe, you're still rocking at the same IP address. Additionally, you would also get a nice boost in speed. Considering that congress has passed legislation on selling our network habits to 3rd parties, I think VPN and VPS providers are going to be in a growth period for a while.
  2. The emulation is very rudimentary. It basically creates a virtual serial port to the DOS side and ties it to some Telnet code (listener and client). https://sourceforge.net/p/dosbox/code-0/3843/tree/dosbox/trunk/src/hardware/serialport/softmodem.cpp It's likely that THC-SCAN is using hardware handshaking (RTS/CTS) that the emulation doesn't accomplish.
  3. We have DID's posted on our IRC channel. SIP/IAX of course still works. We don't offer voicemail anymore for many reasons.
  4. Sorry about that. The system is available via SIP/IAX but all the info on the website regarding DID's are probably toasted. I'll talk to Gid about updating that information. We ended up losing the old system and the backups we had weren't current enough so when we rebuilt, we decided to remove voicemail services (mostly for legal/privacy reasons). As for DID's, we have/had the one DID from IPKall that's posted in 2600net/#telephreak but I can add some more in. Behind the scenes: We're cooking up something new for a new era. It involves WebRTC and other fun stuff. Beave is still around but he's a very busy person now with life and all that. So the best would be to flag down one of the known TP crew somewhere or PM me direct here and I'll get the message.
  5. IAXModem just wraps the SpanDSP fax components. It presents itself to Linux as a ttyS device. Then it feeds in and out of Hylafax. I assume you would just point everyone to Hylafax and let it do the processing/sending/receiving in a centralized location. You wouldn't really need to do a fax line to every branch office. There is little point when you can get DID's in just about every location in the world. Outbound, you'd be better off using the best least cost routing across different VoIP providers or POTS/ISDN lines.
  6. Not to get off of my topic, but I did get ahold of a .dsk for The Cat's Meow, which I think was meant for the AppleCat. Sadly no Apple II emulators seem to have any networking emulation. It wouldn't help. The AppleCat is a very unique modem and the way old school 8-bit machines usually are not "Hayes Compatible" unless it spoke RS-232.
  7. I think it's all in how you use it. For instance, as part of the 2600/Telephreak group at Defcon, we've ran a pager network on 70cm for the weekend. There are those who do P25/MotoTrbo digital radio. If I was a little less lazy, I'd be more on HF or finish my satellite tracker project and monkey with satellites. It's all how you choose to use your ticket. You mentioned school crosswalk group - maybe take it further an volunteer to help in communications for 5k runs or the whole emcom thing. You can even legally use amplifiers with 802.11 hardware on certain frequencies with your ham ticket. I understand where you're coming from tho. When I lived in a different state than where I am now, there was the old-fogie "club" repeater who would get pissy when you used it after 10pm or there was the "other" repeater which was setup as an alternative to running simplex. Most of those guys were cb'ers who went "legit" with their power. Now that I live in a big city again, I have dozens of repeaters at my fingertips and I would say that 95% of them are people who I probably would keep at arms length. Friends that I do socialize with who also have a ham ticket either have the wrong class of ticket (most of the problem) for the range needed or we lack the setup to bridge the distance (usually antenna related). There's nothing wrong with having just the technician ticket. But it is limited intentionally. Upgrading my license was one of the first things I did once the newness of repeaters and ht radios wore off. After all, now it's just another written test to upgrade. Back then, I had to learn morse code at a sufficient speed. One of these days, I'll train my brain to hear words instead of letters.... GPRS/FRS has it's place and a lot more leeway in terms of content. But I still find amateur radio to be a lot more flexible in what you can do with the radio art. You will always find assholes that will stake their claim to any given frequency or spectrum - even when they know damn well that no allocated frequency is for exclusive use. I just remind them of the regs and tell them that the frequency is in use. Them trying to cause interference just makes them look petty and causes them to be put in a actionable position for a NAL from the FCC.
  8. Or you can do what I'm doing and get a old modem terminal server (Portmaster or Cisco AS5300), write some scripts to go massive parallel and find a VoIP provider that let's you really load up on channels. There is a version of iWar that does talk to rfc2217 modem pools, but it's also just as easy to write one in a scripting language that sends the results back to a database. Sometime this winter, I'll hook up the applecat I got a couple years back and see what it can do and video the results. Might be interesting how well it works since it supposedly could detect bells and whistles and other interesting things.
  9. First: Are you sure you're being hacked and not just paranoid (stress, drug or mentally induced)? I've worked for clients in the past who were 'concerned' with their privacy just as much as you or even myself and others on here. And at the end of the day, there was nothing to report except for some minor spyware due to some of their web browsing habits. But it's easy to be bombarded with un-truths and sensationalized accounts of "hacking" which are usually stories of fiction. Second: What you see on TV shows like 24, CSI or Person of Interest are greatly over exaggerated examples of "what if" cases. Technology in many cases isn't at that level, nor is there that great a consolidation of information - barring Governments - who have unlimited resources compared to private interests. Third: Why you? Why would someone from India target you specifically? Have you contacted Law Enforcement or the FBI? Coming to the hackers here will not likely garner you anything more than friendly advice as it's also illegal for us to hack them back in a "direct" manner. Fourth: You say you are experiencing electric shocks. Is it from the same piece of hardware? I have an old first generation MacBook Pro that does the same thing when charging. Not greatly painful but about like licking a 9v battery if touched in the right place. But when I unplug it from the charger, the shocking stops. The reason is because it's a very beat up laptop that's been dropped countless times. Not because someone has invaded my computer and told it to shock me. Consumer products wouldn't last long on the market without legal action if they could remotely trigger harm to the user. Fifth: Regarding phones. It is possible some application on your phone does have spyware. There are programs out there that run anti-virus/anti-spyware scans on your phone to ensure your phone doesn't have one of those applications. Additionally, phone os makers like Android and Apple scan and check new programs and updates for just such security violations before a program is allowed onto their respective stores. Between the two methods, the likelihood is greatly less than you think for a computer virus or spyware installation. Sixth: The only constant in the situation you presented is you. What are you doing to have them reacquire you? Like when a person goes into the Witness Protection Program, they are not allowed to go back to their old lives and old habits. But if they are reacquiring you, how are they doing that? What are you continuing to repeat for them to find you? Seventh: Consider befriending a geek. Someone who knows technologies capabilities - preferably in the administrations/operations or security field. They may not know everything, but I bet they know enough to determine what is a threat and what isn't which I think is what you really need... a person to work with you personally to calm your fears and has a good idea how it all works. Good luck and hope you find the help you need.
  10. You might want to check into cheap VoIP providers outside the US where it passes garbage for the ANI/CPN. Some even have unlimited US dialing.
  11. You can get DID's with more than one SIP/IAX channel so that your asterisk can just fork that portion of the dialplan. Check with your VSP.
  12. Sorry about the delay. We took the opportunity to do some long overdue upgrades/work on the box. Voice mail services are restored mostly (still haven't setup email notification - but we might be removing this piece to move towards more anonymity in our services we offer). We've also taken the time to add TLS/SRTP encryption support. Still lots of work to be done (including our website which is down at the moment) but feel free to check in at irc://irc.2600.net/#telephreak or follow us on Twitter: @telephreak.
  13. k.. will look into it.
  14. PM me your mailbox number and email address used when you signed up and I'll send you the password back to the email registered.
  15. This is quite the laundry list you have here and most of this you will end up discovering after doing more research elsewhere. But I want to leave you with one thought: You will constantly be plugged into the wall outlet due to the hard drain you will have running daemons 24/7 if you choose to run your phone as a server. Additionally, from my use of the mobile data networks, you're sitting behind a NAT of some kind which means you don't have a real world IP nor any way of forwarding real world traffic to your phone without a VPN of some kind. This requires the phone to be constantly running and constantly draining your battery due to radio use. Which means being constantly hooked to a charging device.