text stringlengths 0 1.99k |
|---|
companies. The FCC recently brought charges against one of AT&T's largest 900 |
Service customers, and AT&T provided the confidential information necessary in |
the prosecution. AT&T also agreed to suspend or disconnect services of |
companies violating the commission ban by transmitting obscene or indecent |
messages to minors. |
______________________________________________________________________________ |
Some Hope Left For Victims Of FGD |
================================= |
US Sprint's famed FGD (Feature Group D) dial-ups and 800 INWATS exchanges may |
pose no threat to individuals under switches that do not yet offer equal |
access service to alternate long distance carriers. Due to the way Feature |
Group D routes its information, the ten-digit originating number of the caller |
is not provided when the call is placed from a non-equal access area. The |
following was taken from an explanation of US Sprint's 800 INWATS Service. |
************************************************************* |
CALL DETAIL |
************************************************************* |
With US Sprint 800 Service, a customer will receive call detail information |
for every call on every invoice. The call detail for each call includes: |
o Date of call |
o Time of call |
o The originating city and state |
o The ten-digit number of the caller if the call originates in an |
equal access area or the NPA of the caller if the non-equal access |
area. |
o Band into which the call falls |
o Duration of the call in minutes |
o Cost of the call |
This came directly from US Sprint. Do as you choose, but don't depend on |
this. |
Information Provided by US Sprint. |
______________________________________________________________________________ |
Telenet Bolsters Network With Encryption |
======================================== |
Telenet Communications Corporation strengthened its public data network |
recently with the introduction of data encryption capability. |
The X.25 Encryption Service provides a type of data security previously |
unavailable on any public data network, according to analysts. For Telenet, |
the purpose of the offering is "to be more competitive; nobody else does |
this," according to Belden Menkus, an independent network security consultant |
based in Middleville, NJ. |
The service is aimed at users transmitting proprietary information between |
host computers, such as insurance or fund-transfer applications. It is priced |
at $200 per month per host computer connection. Both the confidentiality and |
integrity of the data can be protected via encryption. |
The scheme provides end-to-end data encryption, an alternative method whereby |
data is decrypted and recrypted at each node in the network. "This is a |
recognition that end-to-end encryption is really preferable to link |
encryption," Menkus said. |
The service is available over both dial-up and leased lines, and it supports |
both synchronous and asynchronous traffic at speeds up to 9.6K BPS. |
Telenet has approved one particular data encryption device for use with the |
service, The Cipher X 5000, from Technical Communications Corporation (TCC), a |
Concord, Massachusetts based vendor. TCC "has been around the data encryption |
business for quite a while," Menkus said. |
The Cipher X implements the National Bureau of Standards' Data Encryption |
Standard (DES). DES is an algorithm manipulated by a secret 56 bit key. |
Computers protected with the device can only be accessed by users with a |
matching key. |
The data encryptor is installed at user sites between the host computer and |
the PAD (Packet Assembler/Disassembler). |
Installation of the TCC device does not affect the user's ability to send |
non-encrypted data, according to Telenet. By maintaining a table of network |
addresses that require encryption, the device decides whether or not to |
encrypt each transmission. |
Information Provided by Network World. |
______________________________________________________________________________ |
============================================================================== |
==Phrack Inc.== |
Volume Two, Issue 18, Phile #11 of 11 |
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
PWN PWN |
PWN >>>>>=-* Phrack World News *-=<<<<< PWN |
PWN Issue XVIII/2 PWN |
PWN PWN |
PWN Created By Knight Lightning PWN |
PWN PWN |
PWN Compiled and Written PWN |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.