text stringlengths 0 1.99k |
|---|
4 Kowack, G and Healy, D "Can the holes be plugged?" Computerworld |
Vol 18 (26 September 1984) pp 27-28 |
5 Farrow, R "Security issues and strategies for users" Unix/World |
(April 1986) pp 65-71 |
6 Farrow, R "Security for superusers, or how to break the Unix system" |
Unix/World (May 1986) pp 65-70 |
7 Grampp, F T and Morris, R H "Unix operating system security" AT&T Bell |
Lab Tech. J. Vol 63 No 8 (1984) pp 1649-1672 |
8 Wood, P H and Kochan, S G "Unix system security" USA (1985) |
9 Nowitz, D A "UUCP Implementation description: Unix programmer's manual |
Sec. 2" AT&T Bell Laboratories, USA (1984) |
10 Thomas, R "Securing your terminal: two approaches" Unix/World |
(April 1986) pp 73-76 |
11 Karpinski, D "Security round table (Part 1)" Unix Review |
(October 1984) p 48 |
12 Karpinski, D "Security round table (Part 2)" Unix Review |
(October 1984) p 48 |
13 Lobel, J "Foiling the system breakers: computer security and access |
control" McGraw-Hill, USA (1986) |
14 National Computer Security Center "Department of Defense trusted |
computer system evaluation criteria" CSC-STD-001-83, USA (1983) |
15 Stewart, F "Implementing security under Unix" Systems&Software |
(February 1986) |
16 Schaffer, M and Walsh, G "Lock/ix: An implementation of Unix for the |
Lock TCB" Proceedings of USENIX (1988) |
17 Chuck, F "AT&T System 5/MLS Product 14 Strategy" AT&T Bell Labs, |
Government System Division, USA (August 1987) |
============================================================================== |
==Phrack Inc.== |
Volume Two, Issue 18, Phile #8 of 11 |
Control C |
and |
The Tribunal of Knowledge presents... |
LMOS (Loop Maintenance Operation System) |
-A List of Commands- |
This file contains what to our knowledge are the best things to do on |
LMOS. We were really vague due to the great power of the information provided |
in this file. You now know the commands so we will not go into (either in |
this file or when talking to us) how to use this information, it is up to you |
to figure out how to use it. |
+: Increase the voice volume on a line |
+ lets you increase the volume when you are talking on or monitoring a |
sub-scriber's line over a callback path. The volume is increased because MLT |
adds amplifier to the line. + may be used after a mon, talk, rev, talkin or |
call request. Sometimes MLT adds an amplifier automatically to a long line. |
You will not know it is there so if you try to add amplification, a + will |
appear in the status sections but the voices will not get any louder because |
they are already loud as possible. |
-: Decrease the voice volume on a line |
- lets you decrease the volume when you are talking on or monitoring a |
subscriber's line over a callback path. The volume is decreased because MLT |
removes amplifier from the line. - may be used to remove amplifier that you |
have placed on the line with the + request, or amplifier that MLT has |
automatically places on a long line. The main reason to remove the amplifier |
is because it can sometimes cause a shrill or howl. |
Call: Make a call on a subscriber's line |
Call lets you use your touch-tone pad to dial any number you want using the |
customer's line circuit. It does this by simulating an off-hook condition in |
order to draw dial tone. A callback number is a required entry on the tv mask |
and an mdf access is required for calling out (except in SXS and panel |
offices). You can use a call when: 1) You want to know the TN for a known CA |
& PR - you would call TSPS or ANI. 2) Calls cannot be completed to a TN - you |
would call that TN. 3) To monitor dial tone on a customer's line. |
Callrd: Make a call on a dial pulse line circuit |
Callrd lets you use your touch-tone pad to dial using the customer's rotary |
dial line circuit. MLT does this by translating tones on a customer's line. |
mdf access is required for calling out (except in SXS, DMS10, DMS100, and |
DMS100AC offices). Use a callrd if you want to know the TN for a known CA & |
PR - you would call TSPS or ANI. |
Ccol: Collect coins using coin relay |
Ccol attempts to collect any coins that are in the hopper of a coin telephone |
set by operating the coin relay. Ccol does not check the totalizer or check |
the rest of the line. The results tell you only about relay operation, speed, |
and the current that is necessary to operate it. A ver code is not returned |
by ccol. You must have access to the line before your request ccol. You will |
use ccol most often when you are talking to a repair person who is trying to |
fix a coin phone. |
Channel: Run enhanced channel tests on DLC lines |
Chan or channel runs channel isolation tests and tells you if you have a bad |
COT or RT channel unit. Use this request to run enhanced channel tests on |
lines served by digital loop carriers such as SLC Series 5. Chan can only be |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.