Prefix Access Code Translator
c3210f7407a391f96ee7f76822f647165fe8761e6ec33a601ea1c5533906c64b
Remote Observation docs
dab765619e4a1797bc57e8a8828f367c4ac8b3a412a633a10d0efaf0d2f752ac
Worldwide used signalling systems
fedee9c0cedfcdb076188ee63ea04ecfd291131ec568f91e8652660a7108270d
SS7 Based Diversion
4d84897a271c45382c86e1af44172e8a484e1a98ccda26204303f13ad4e27070
Southwestern Bell Lineman codes
0238cfe969ea9e3d8d7ba66daa5a245d6bee7abb7b73a8b96d0e286d90b421db
Brief Guide to Definity G Series PBXes
d42fdb816f766fc33f9356f0ac922d4a86f3c3297e8fa27ae9eec47362664b2f
Sys75/85 Configurations
dccc5ec62887b31fe3afc269bc43a1c55d2f12ff7180bbf5f919ee15d57cb444
Telephone Company Customer Apps
e4d7f2b566ce943b89a94b13abb5e6976ed9a6e4d205390cb428f5c8dccb9b75
Telephony Acronyms
15421b83026bd156f48d2cedf86278990ea94690ec386bd8ab846d8b884f63b4
Understand the Digital Multiplexing System
48072547e9780f85989310ac69df97154b3cbfb815beefe8a2eac7869a4cf07f
The History of the 1AESS Switch
7f19cce6a67e68528e041d23d8022f554d88dfa5c1c5bf05518f106eae7c21b8
Network Associates, Inc. Security Advisory - Windows NT LSA Remote Denial of Service. An implementation flaw in the Local Security Authority subsystem of Windows NT, known as the LSA, allows both local or remote attackers to halt the processing of security information requiring the host to be restarted. This new vulnerability affects all Windows NT 4.0 hosts including those with Service packs up to and including SP6a. ms99-057 addresses this vulnerability. NAI homepage here.
d0c637cd4cedf750ac593d89bda9710934543e70938f9ef2d5f35184d7963107
BindView Security Advisory - Windows NT's SYSKEY feature. SYSKEY does not fully protect the SAM from off-line attacks. Specifically, dictionary and brute-force password cracking are still possible, even when SYSKEY is enabled and the attacker is not in possession of the SystemKey.
ed21462fc63b5f9e8702adc0dc85afa7134cb844786d5211b01a9c25a543ad2d
Cisco Advisory - Cisco Cache Engine Authentication Vulnerabilities. A vulnerability exists that could allow an unauthorized person to substitute arbitrary material in place of legitimate content for a specified website. This arbitrary content would be viewable only by users of the affected (or "polluted") Cache Engine. A second vulnerability exists that could allow unauthorized persons to view performance information via the web interface of the Cache Engine. A third vulnerability existed that allowed a null username and password pair to be accepted as valid authentication credentials.
a8efa2af873816da9ebec30ae0cbaadb68c7bb522fbb5f9db63d23edd5e6078f
Microsoft has released a patch for a vulnerability in Windows NT. The vulnerability could allow a malicious user to cause a Windows NT machine to crash. Microsoft FAQ about this vulnerability is here.
7d1a00ccde2db636cbc6c7a1b3648ea7ab13d34ea7bb42e32d36c009dda7101a
Yet another Imapd remote overflow.
c43a603aed41521971bf354ca7740bbd46771fe3281339c85ea4273a7d9b48dc