home *** CD-ROM | disk | FTP | other *** search
- xdmcp 177/tcp X Display Manager Control Protocol
- xdmcp 177/udp X Display Manager Control Protocol
- nextstep 178/tcp NextStep Window Server
- NextStep 178/udp NextStep Window Server
- bgp 179/tcp Border Gateway Protocol
- bgp 179/udp Border Gateway Protocol
- ris 180/tcp Intergraph
- ris 180/udp Intergraph
- unify 181/tcp Unify
- unify 181/udp Unify
- audit 182/tcp Unisys Audit SITP
- audit 182/udp Unisys Audit SITP
- ocbinder 183/tcp OCBinder
- ocbinder 183/udp OCBinder
- ocserver 184/tcp OCServer
- ocserver 184/udp OCServer
- remote-kis 185/tcp Remote-KIS
- remote-kis 185/udp Remote-KIS
- kis 186/tcp KIS Protocol
- kis 186/udp KIS Protocol
- aci 187/tcp Application Communication Interface
- aci 187/udp Application Communication Interface
- mumps 188/tcp Plus Five's MUMPS
- mumps 188/udp Plus Five's MUMPS
- qft 189/tcp Queued File Transport
- qft 189/udp Queued File Transport
- gacp 190/tcp Gateway Access Control Protocol
- cacp 190/udp Gateway Access Control Protocol
- prospero 191/tcp Prospero
- prospero 191/udp Prospero
- osu-nms 192/tcp OSU Network Monitoring System
- osu-nms 192/udp OSU Network Monitoring System
- srmp 193/tcp Spider Remote Monitoring Protocol
- srmp 193/udp Spider Remote Monitoring Protocol
- irc 194/tcp Internet Relay Chat Protocol
- irc 194/udp Internet Relay Chat Protocol
- dn6-nlm-aud 195/tcp DNSIX Network Level Module Audit
- dn6-nlm-aud 195/udp DNSIX Network Level Module Audit
- dn6-smm-red 196/tcp DNSIX Session Mgt Module Audit Redir
- dn6-smm-red 196/udp DNSIX Session Mgt Module Audit Redir
- dls 197/tcp Directory Location Service
- dls 197/udp Directory Location Service
- dls-mon 198/tcp Directory Location Service Monitor
- dls-mon 198/udp Directory Location Service Monitor
- smux 199/tcp SMUX
- smux 199/udp SMUX
- src 200/tcp IBM System Resource Controller
- src 200/udp IBM System Resource Controller
- at-rtmp 201/tcp AppleTalk Routing Maintenance
- at-rtmp 201/udp AppleTalk Routing Maintenance
- at-nbp 202/tcp AppleTalk Name Binding
- at-nbp 202/udp AppleTalk Name Binding
- at-3 203/tcp AppleTalk Unused
- at-3 203/udp AppleTalk Unused
- at-echo 204/tcp AppleTalk Echo
- at-echo 204/udp AppleTalk Echo
- at-5 205/tcp AppleTalk Unused
- at-5 205/udp AppleTalk Unused
- at-zis 206/tcp AppleTalk Zone Information
- at-zis 206/udp AppleTalk Zone Information
- at-7 207/tcp AppleTalk Unused
- at-7 207/udp AppleTalk Unused
- at-8 208/tcp AppleTalk Unused
- at-8 208/udp AppleTalk Unused
- tam 209/tcp Trivial Authenticated Mail Protocol
- tam 209/udp Trivial Authenticated Mail Protocol
- z39.50 210/tcp ANSI Z39.50
- z39.50 210/udp ANSI Z39.50
- 914c/g 211/tcp Texas Instruments 914C/G Terminal
- 914c/g 211/udp Texas Instruments 914C/G Terminal
- anet 212/tcp ATEXSSTR
- anet 212/udp ATEXSSTR
- ipx 213/tcp IPX
- ipx 213/udp IPX
- vmpwscs 214/tcp VM PWSCS
- vmpwscs 214/udp VM PWSCS
- softpc 215/tcp Insignia Solutions
- softpc 215/udp Insignia Solutions
- atls 216/tcp Access Technology License Server
- atls 216/udp Access Technology License Server
- dbase 217/tcp dBASE Unix
- dbase 217/udp dBASE Unix
- mpp 218/tcp Netix Message Posting Protocol
- mpp 218/udp Netix Message Posting Protocol
- uarps 219/tcp Unisys ARPs
- uarps 219/udp Unisys ARPs
- imap3 220/tcp Interactive Mail Access Protocol v3
- imap3 220/udp Interactive Mail Access Protocol v3
- fln-spx 221/tcp Berkeley rlogind with SPX auth
- fln-spx 221/udp Berkeley rlogind with SPX auth
- fsh-spx 222/tcp Berkeley rshd with SPX auth
- fsh-spx 222/udp Berkeley rshd with SPX auth
- cdc 223/tcp Certificate Distribution Center
- cdc 223/udp Certificate Distribution Center
- 224-241 Reserved
- sur-meas 243/tcp Survey Measurement
- sur-meas 243/udp Survey Measurement
- link 245/tcp LINK
- link 245/udp LINK
- dsp3270 246/tcp Display Systems Protocol
- dsp3270 246/udp Display Systems Protocol
- 247-255 Reserved
- pawserv 345/tcp Perf Analysis Workbench
- pawserv 345/udp Perf Analysis Workbench
- zserv 346/tcp Zebra server
- zserv 346/udp Zebra server
- fatserv 347/tcp Fatmen Server
- fatserv 347/udp Fatmen Server
- clearcase 371/tcp Clearcase
- clearcase 371/udp Clearcase
- ulistserv 372/tcp Unix Listserv
- ulistserv 372/udp Unix Listserv
- legent-1 373/tcp Legent Corporation
- legent-1 373/udp Legent Corporation
- legent-2 374/tcp Legent Corporation
- legent-2 374/udp Legent Corporation
- exec 512/tcp remote process execution;
- authentication performed using
- passwords and UNIX login names
- biff 512/udp used by mail system to notify users
- of new mail received; currently
- receives messages only from
- processes on the same machine
- login 513/tcp remote login a la telnet;
- automatic authentication performed
- based on priviledged port numbers
- and distributed data bases which
- identify "authentication domains"
- who 513/udp maintains data bases showing who's
- logged in to machines on a local
- net and the load average of the
- machine
- cmd 514/tcp like exec, but automatic
- authentication is performed as for
- login server
- syslog 514/udp
- printer 515/tcp spooler
- printer 515/udp spooler
- talk 517/tcp like tenex link, but across
- machine - unfortunately, doesn't
- use link protocol (this is actually
- just a rendezvous port from which a
- tcp connection is established)
- talk 517/udp like tenex link, but across
- machine - unfortunately, doesn't
- use link protocol (this is actually
- just a rendezvous port from which a
- tcp connection is established)
- ntalk 518/tcp
- ntalk 518/udp
- utime 519/tcp unixtime
- utime 519/udp unixtime
- efs 520/tcp extended file name server
- router 520/udp local routing process (on site);
- uses variant of Xerox NS routing
- information protocol
- timed 525/tcp timeserver
- timed 525/udp timeserver
- tempo 526/tcp newdate
- tempo 526/udp newdate
- courier 530/tcp rpc
- courier 530/udp rpc
- conference 531/tcp chat
- conference 531/udp chat
- netnews 532/tcp readnews
- netnews 532/udp readnews
- netwall 533/tcp for emergency broadcasts
- netwall 533/udp for emergency broadcasts
- uucp 540/tcp uucpd
- uucp 540/udp uucpd
- klogin 543/tcp
- klogin 543/udp
- kshell 544/tcp krcmd
- kshell 544/udp krcmd
- new-rwho 550/tcp new-who
- new-rwho 550/udp new-who
- dsf 555/tcp
- dsf 555/udp
- remotefs 556/tcp rfs server
- remotefs 556/udp rfs server
- rmonitor 560/tcp rmonitord
- rmonitor 560/udp rmonitord
- monitor 561/tcp
- monitor 561/udp
- chshell 562/tcp chcmd
- chshell 562/udp chcmd
- 9pfs 564/tcp plan 9 file service
- 9pfs 564/udp plan 9 file service
- whoami 565/tcp whoami
- whoami 565/udp whoami
- meter 570/tcp demon
- meter 570/udp demon
- meter 571/tcp udemon
- meter 571/udp udemon
- ipcserver 600/tcp Sun IPC server
- ipcserver 600/udp Sun IPC server
- nqs 607/tcp nqs
- nqs 607/udp nqs
- mdqs 666/tcp
- mdqs 666/udp
- elcsd 704/tcp errlog copy/server daemon
- elcsd 704/udp errlog copy/server daemon
- netcp 740/tcp NETscout Control Protocol
- netcp 740/udp NETscout Control Protocol
- netgw 741/tcp netGW
- netgw 741/udp netGW
- netrcs 742/tcp Network based Rev. Cont. Sys.
- netrcs 742/udp Network based Rev. Cont. Sys.
- flexlm 744/tcp Flexible License Manager
- flexlm 744/udp Flexible License Manager
- fujitsu-dev 747/tcp Fujitsu Device Control
- fujitsu-dev 747/udp Fujitsu Device Control
- ris-cm 748/tcp Russell Info Sci Calendar Manager
- ris-cm 748/udp Russell Info Sci Calendar Manager
- kerberos-adm 749/tcp kerberos administration
- kerberos-adm 749/udp kerberos administration
- rfile 750/tcp
- loadav 750/udp
- pump 751/tcp
- pump 751/udp
- qrh 752/tcp
- qrh 752/udp
- rrh 753/tcp
- rrh 753/udp
- tell 754/tcp send
- tell 754/udp send
- nlogin 758/tcp
- nlogin 758/udp
- con 759/tcp
- con 759/udp
- ns 760/tcp
- ns 760/udp
- rxe 761/tcp
- rxe 761/udp
- quotad 762/tcp
- quotad 762/udp
- cycleserv 763/tcp
- cycleserv 763/udp
- omserv 764/tcp
- omserv 764/udp
- webster 765/tcp
- webster 765/udp
- phonebook 767/tcp phone
- phonebook 767/udp phone
- vid 769/tcp
- vid 769/udp
- cadlock 770/tcp
- cadlock 770/udp
- rtip 771/tcp
- rtip 771/udp
- cycleserv2 772/tcp
- cycleserv2 772/udp
- submit 773/tcp
- notify 773/udp
- rpasswd 774/tcp
- acmaint_dbd 774/udp
- entomb 775/tcp
- acmaint_transd 775/udp
- wpages 776/tcp
- wpages 776/udp
- wpgs 780/tcp
- wpgs 780/udp
- hp-collector 781/tcp hp performance data collector
- hp-collector 781/udp hp performance data collector
- hp-managed-node 782/tcp hp performance data managed node
- hp-managed-node 782/udp hp performance data managed node
- hp-alarm-mgr 783/tcp hp performance data alarm manager
- hp-alarm-mgr 783/udp hp performance data alarm manager
- mdbs_daemon 800/tcp
- mdbs_daemon 800/udp
- device 801/tcp
- device 801/udp
- xtreelic 996/tcp XTREE License Server
- xtreelic 996/udp XTREE License Server
- maitrd 997/tcp
- maitrd 997/udp
- busboy 998/tcp
- puparp 998/udp
- garcon 999/tcp
- applix 999/udp Applix ac
- puprouter 999/tcp
- puprouter 999/udp
- cadlock 1000/tcp
- ock 1000/udp
- blackjack 1025/tcp network blackjack
- blackjack 1025/udp network blackjack
- hermes 1248/tcp
- hermes 1248/udp
- bbn-mmc 1347/tcp multi media conferencing
- bbn-mmc 1347/udp multi media conferencing
- bbn-mmx 1348/tcp multi media conferencing
- bbn-mmx 1348/udp multi media conferencing
- sbook 1349/tcp Registration Network Protocol
- sbook 1349/udp Registration Network Protocol
- editbench 1350/tcp Registration Network Protocol
- editbench 1350/udp Registration Network Protocol
- equationbuilder 1351/tcp Digital Tool Works (MIT)
- equationbuilder 1351/udp Digital Tool Works (MIT)
- lotusnote 1352/tcp Lotus Note
- lotusnote 1352/udp Lotus Note
- ingreslock 1524/tcp ingres
- ingreslock 1524/udp ingres
- orasrv 1525/tcp oracle
- orasrv 1525/udp oracle
- prospero-np 1525/tcp prospero non-privileged
- prospero-np 1525/udp prospero non-privileged
- tlisrv 1527/tcp oracle
- tlisrv 1527/udp oracle
- coauthor 1529/tcp oracle
- coauthor 1529/udp oracle
- issd 1600/tcp
- issd 1600/udp
- nkd 1650/tcp
- nkd 1650/udp
- callbook 2000/tcp
- callbook 2000/udp
- dc 2001/tcp
- wizard 2001/udp curry
- globe 2002/tcp
- globe 2002/udp
- mailbox 2004/tcp
- emce 2004/udp CCWS mm conf
- berknet 2005/tcp
- oracle 2005/udp
- invokator 2006/tcp
- raid-cc 2006/udp raid
- dectalk 2007/tcp
- raid-am 2007/udp
- conf 2008/tcp
- terminaldb 2008/udp
- news 2009/tcp
- whosockami 2009/udp
- search 2010/tcp
- pipe_server 2010/udp
- raid-cc 2011/tcp raid
- servserv 2011/udp
- ttyinfo 2012/tcp
- raid-ac 2012/udp
- raid-am 2013/tcp
- raid-cd 2013/udp
- troff 2014/tcp
- raid-sf 2014/udp
- cypress 2015/tcp
- raid-cs 2015/udp
- bootserver 2016/tcp
- bootserver 2016/udp
- cypress-stat 2017/tcp
- bootclient 2017/udp
- terminaldb 2018/tcp
- rellpack 2018/udp
- whosockami 2019/tcp
- about 2019/udp
- xinupageserver 2020/tcp
- xinupageserver 2020/udp
- servexec 2021/tcp
- xinuexpansion1 2021/udp
- down 2022/tcp
- xinuexpansion2 2022/udp
- xinuexpansion3 2023/tcp
- xinuexpansion3 2023/udp
- xinuexpansion4 2024/tcp
- xinuexpansion4 2024/udp
- ellpack 2025/tcp
- xribs 2025/udp
- scrabble 2026/tcp
- scrabble 2026/udp
- shadowserver 2027/tcp
- shadowserver 2027/udp
- submitserver 2028/tcp
- submitserver 2028/udp
- device2 2030/tcp
- device2 2030/udp
- blackboard 2032/tcp
- blackboard 2032/udp
- glogger 2033/tcp
- glogger 2033/udp
- scoremgr 2034/tcp
- scoremgr 2034/udp
- imsldoc 2035/tcp
- imsldoc 2035/udp
- objectmanager 2038/tcp
- objectmanager 2038/udp
- lam 2040/tcp
- lam 2040/udp
- interbase 2041/tcp
- interbase 2041/udp
- isis 2042/tcp
- isis 2042/udp
- isis-bcast 2043/tcp
- isis-bcast 2043/udp
- rimsl 2044/tcp
- rimsl 2044/udp
- cdfunc 2045/tcp
- cdfunc 2045/udp
- sdfunc 2046/tcp
- sdfunc 2046/udp
- dls 2047/tcp
- dls 2047/udp
- dls-monitor 2048/tcp
- dls-monitor 2048/udp
- shilp 2049/tcp
- shilp 2049/udp
- www-dev 2784/tcp world wide web - development
- www-dev 2784/udp world wide web - development
- NSWS 3049/tcp
- NSWS 3049/ddddp
- rfa 4672/tcp remote file access server
- rfa 4672/udp remote file access server
- commplex-main 5000/tcp
- commplex-main 5000/udp
- commplex-link 5001/tcp
- commplex-link 5001/udp
- rfe 5002/tcp radio free ethernet
- rfe 5002/udp radio free ethernet
- rmonitor_secure 5145/tcp
- rmonitor_secure 5145/udp
- padl2sim 5236/tcp
- padl2sim 5236/udp
- sub-process 6111/tcp HP SoftBench Sub-Process Control
- sub-process 6111/udp HP SoftBench Sub-Process Control
- xdsxdm 6558/udp
- xdsxdm 6558/tcp
- afs3-fileserver 7000/tcp file server itself
- afs3-fileserver 7000/udp file server itself
- afs3-callback 7001/tcp callbacks to cache managers
- afs3-callback 7001/udp callbacks to cache managers
- afs3-prserver 7002/tcp users & groups database
- afs3-prserver 7002/udp users & groups database
- afs3-vlserver 7003/tcp volume location database
- afs3-vlserver 7003/udp volume location database
- afs3-kaserver 7004/tcp AFS/Kerberos authentication service
- afs3-kaserver 7004/udp AFS/Kerberos authentication service
- afs3-volser 7005/tcp volume managment server
- afs3-volser 7005/udp volume managment server
- afs3-errors 7006/tcp error interpretation service
- afs3-errors 7006/udp error interpretation service
- afs3-bos 7007/tcp basic overseer process
- afs3-bos 7007/udp basic overseer process
- afs3-update 7008/tcp server-to-server updater
- afs3-update 7008/udp server-to-server updater
- afs3-rmtsys 7009/tcp remote cache manager service
- afs3-rmtsys 7009/udp remote cache manager service
- man 9535/tcp
- man 9535/udp
- isode-dua 17007/tcp
- isode-dua 17007/udp
-
-
- 23. What is a trojan/worm/virus/logic bomb?
-
- This FAQ answer is excerpted from: Computer Security Basics
- by Deborah Russell
- and G.T. Gengemi Sr.
-
- Trojan: An independent program that appears to perform a useful
- function but that hides another unauthorized program
- inside it. When an authorized user performs the apparent
- function, the trojan horse performs the unauthorized
- function as well (often usurping the privileges of the
- user).
-
- Virus: A code fragment (not an independent program) that
- reproduces by attaching to another program. It may damage
- data directly, or it may degrade system performance by
- taking over system resources which are then not available
- to authorized users.
-
- Worm: An independent program that reproduces by copying itself
- from one system to another, usually over a network. Like
- a virus, a worm may damage data directly, or it may
- degrade system performance by tying up system resources and
- even shutting down a network.
-
- Logic Bomb: A method for releasing a system attack of some kind. It
- is triggered when a particular condition (e.g., a certain
- date or system operation) occurs.
-
-
- 24. How can I protect myself from virii and such?
-
- Always write protect your floppy disks when you are not purposefully
- writing to them.
-
- Use ATTRIB to make all of your EXE and COM files read only. This will
- protect you from many poorly written viruses.
-
- Scan any software that you receive with a recent copy of a good virus
- scanner. The best virus scanner currently available for DOS is F-Prot
- by Fridrik Skulason. The current version is FP-215. It is best to
- use more than one virus scanner. That will decrease your chances of
- missing a virus.
-
- Backup regularly, and keep several generations of backups on hand.
- If you always backup over your last backup, you may find yourself with
- an infected backup tape.
-
-
- 25. What is Cryptoxxxxxxx?
-
- This FAQ answer is excerpted from: Computer Security Basics
- by Deborah Russell
- and G.T. Gengemi Sr.
-
- A message is called either plaintext or cleartext. The process of
- disguising a message in such a way as to hide its substance is called
- encryption. An encrypted message is called ciphertext. The process
- of turning ciphertext back into plaintext is called decryption.
-
- The art and science of keeping messages secure is called cryptography,
- and it is practiced by cryptographers. Cryptanalysts are
- practitioners of cryptanalysis, the art and science of breaking
- ciphertext, i.e. seeing through the disguise. The branch of
- mathematics embodying both cryptography and cryptanalysis is called
- cryptology, and it's practitioners are called cryptologists.
-
-
- 26. What is PGP?
-
- This FAQ answer is excerpted from: PGP(tm) User's Guide
- Volume I: Essential Topics
- by Philip Zimmermann
-
- PGP(tm) uses public-key encryption to protect E-mail and data files.
- Communicate securely with people you've never met, with no secure
- channels needed for prior exchange of keys. PGP is well featured and
- fast, with sophisticated key management, digital signatures, data
- compression, and good ergonomic design.
-
- Pretty Good(tm) Privacy (PGP), from Phil's Pretty Good Software, is a
- high security cryptographic software application for MS-DOS, Unix,
- VAX/VMS, and other computers. PGP allows people to exchange files or
- messages with privacy, authentication, and convenience. Privacy means
- that only those intended to receive a message can read it.
- Authentication means that messages that appear to be from a particular
- person can only have originated from that person. Convenience means
- that privacy and authentication are provided without the hassles of
- managing keys associated with conventional cryptographic software. No
- secure channels are needed to exchange keys between users, which makes
- PGP much easier to use. This is because PGP is based on a powerful
- new technology called "public key" cryptography.
-
- PGP combines the convenience of the Rivest-Shamir-Adleman (RSA)
- public key cryptosystem with the speed of conventional cryptography,
- message digests for digital signatures, data compression before
- encryption, good ergonomic design, and sophisticated key management.
- And PGP performs the public-key functions faster than most other
- software implementations. PGP is public key cryptography for the
- masses.
-
-
- 27. What is Tempest?
-
- Tempest stands for Transient Electromagnetic Pulse Surveillance
- Technology.
-
- Computers and other electronic equipment release interference to their
- surrounding environment. You may observe this by placing two video
- monitors close together. The pictures will behave erratically until
- you space them apart.
-
- Although most of the time these emissions are simply annoyances, they
- can sometimes be very helpful. Suppose we wanted to see what project
- a target was working on. We could sit in a van outside her office and
- use sensitive electronic equipment to attempt to pick up and decipher
- the emanations from her video monitor.
-
- Our competitor, however, could shield the emanations from her
- equipment or use equipment without strong emanations.
-
- Tempest is the US Government program for evaluation and endorsement
- of electronic equipment that is safe from eavesdropping.
-
-
- 28. What is an anonymous remailer?
-
- An anonymous remailer is a system on the Internet that allows you to
- send e-mail anonymously or post messages to Usenet anonymously.
-
- You apply for an anonymous ID at the remailer site. Then, when you
- send a message to the remailer, it sends it out from your anonymous ID
- at the remailer. No one reading the post will know your real account
- name or host name. If someone sends a message to your anonymous ID,
- it will be forwarded to your real account by the remailer.
-
-
- 29. What are the addresses of some anonymous remailers?
-
- The most popular and stable anonymous remailer is anon.penet.fi,
- operated by Johan Helsingus. To obtain an anonymous ID, mail
- ping@anon.penet.fi. For assistance is obtaining an anonymous account
- at penet, mail help@anon.penet.fi.
-
- To see a list on anonymous remailers, finger
- remailer-list@kiwi.cs.berkeley.edu.
-
-
- 30. How do I defeat Copy Protection?
-
- There are two common methods of defeating copy protection. The first
- is to use a program that removes copy protection. Popular programs
- that do this are CopyIIPC from Central Point Software and CopyWrite
- from Quaid Software. The second method involves patching the copy
- protected program. For popular software, you may be able to locate a
- ready made patch. You can them apply the patch using any hex editor,
- such as debug or the Peter Norton's DiskEdit. If you cannot, you must
- patch the software yourself.
-
- Writing a patch requires a debugger, such as Soft-Ice or Sourcer. It
- also requires some knowledge of assembly language. Load the protected
- program under the debugger and watch for it to check the protection
- mechanism. When it does, change that portion of the code. The code
- can be changed from JE (Jump on Equal) or JNE (Jump On Not Equal) to
- JMP (Jump Unconditionally). Or the code may simply be replaced with
- NOP (No Operation) instructions.
-
-
- 31. What is 127.0.0.1?
-
- 127.0.0.1 is a loopback network connection. If you telnet, ftp, etc...
- to it you are connected to your own machine.
-
-
-
-
- Section B: Telephony
- ~~~~~~~~~~~~~~~~~~~~
-
- 01. What is a Red Box?
-
- When a coin is inserted into a payphone, the payphone emits a set of
- tones to ACTS (Automated Coin Toll System). Red boxes work by fooling
- ACTS into believing you have actually put money into the phone. The
- red box simply plays the ACTS tones into the telephone microphone.
- ACTS hears those tones, and allows you to place your call. The actual
- tones are:
-
- Nickel Signal 1700+2200 0.060s on
- Dime Signal 1700+2200 0.060s on, 0.060s off, twice repeating
- Quarter Signal 1700+2200 33ms on, 33ms off, 5 times repeating
-
-
- 02. How do I build a Red Box?
-
- Red boxes are commonly manufactured from modified Radio Shack tone
- dialers, Hallmark greeting cards, or made from scratch from readily
- available electronic components.
-
- To make a Red Box from a Radio Shack 43-141 or 43-146 tone dialer,
- open the dialer and replace the crystal with a new one.
- The purpose of the new crystal is to cause the * button on your tone
- dialer to create a 1700Mhz and 2200Mhz tone instead of the original
- 941Mhz and 1209Mhz tones. The exact value of the replacement crystal
- should be 6.466806 to create a perfect 1700Mhz tone and 6.513698 to
- create a perfect 2200mhz tone. A crystal close to those values will
- create a tone that easily falls within the loose tolerances of ACTS.
- The most popular choice is the 6.5536Mhz crystal, because it is the
- eaiest to procure. The old crystal is the large shiny metal component
- labeled "3.579545Mhz." When you are finished replacing the crystal,
- program the P1 button with five *'s. That will simulate a quarter
- tone each time you press P1.
-
-
- 03. Where can I get a 6.5536Mhz crystal?
-
- Your best bet is a local electronics store. Radio Shack sells them,
- but they are overpriced and the store must order them in. This takes
- approximately two weeks. In addition, many Radio Shack employees do
- not know that this can be done.
-
- Or, you could order the crystal mail order. This introduces Shipping
- and Handling charges, which are usually much greater than the price of
- the crystal. It's best to get several people together to share the
- S&H cost. Or, buy five or six yourself and sell them later. Some of
- the places you can order crystals are:
-
- Digi-Key
- 701 Brooks Avenue South
- P.O. Box 677
- Thief River Falls, MN 56701-0677
- (80)344-4539
- Part Number:X415-ND /* Note: 6.500Mhz and only .197 x .433 x .149! */
- Part Number:X018-ND
-
- JDR Microdevices:
- 2233 Branham Lane
- San Jose, CA 95124
- (800)538-5000
- Part Number: 6.5536MHZ
-
- Tandy Express Order Marketing
- 401 NE 38th Street
- Fort Worth, TX 76106
- (800)241-8742
- Part Number: 10068625
-
-
- 04. Which payphones will a Red Box work on?
-
- Red Boxes will work on TelCo owned payphones, but not on COCOT's
- (Customer Owned Coin Operated Telephones).
-
- Red boxes work by fooling ACTS (Automated Coin Toll System) into
- believing you have put money into the pay phone. ACTS is the
- telephone company software responsible for saying "Please deposit XX
- cents" and listening for the coins being deposited.
-
- COCOT's do not use ACTS. On a COCOT, the pay phone itself is
- responsible for determining what coins have been inserted.
-
-
- 05. How do I make local calls with a Red Box?
-
- Payphones do not use ACTS for local calls. To use your red box for
- local calls, you have to fool ACTS into getting involved in the call.
-
- One way to do this, in some areas, is by dialing 10288-xxx-xxxx. This
- makes your call a long distance call, and brings ACTS into the
- picture.
-
- In other areas, you can call Directory Assistance and ask for the
- number of the person you are trying to reach. The operator will give
- you the number and then you will hear a message similar to "Your call
- can be completed automatically for an additional 35 cents." When this
- happens, you can then use ACTS tones.
-
-
- 06. What is a Blue Box?
-
- Blue boxes use a 2600hz tone to size control of telephone switches
- that use in-band signalling. The caller may then access special
- switch functions, with the usual purpose of making free long distance
- phone calls, using the tones provided by the Blue Box.
-
-
- 07. Do Blue Boxes still work?
-
- Blue Boxes still work in areas using in band signalling. Modern phone
- switches use out of band signalling. Nothing you send over the voice
- portion of bandwidth can control the switch.
-
-
- 08. What is a Black Box?
-
- A Black Box is a 1.8k ohm resistor placed across your phone line to
- cause the phone company equipment to be unable to detect that you have
- answered your telephone. People who call you will then not be billed
- for the telephone call. Black boxes do not work under ESS.
-
-
- 09. What do all the colored boxes do?
-
- Acrylic Steal Three-Way-Calling, Call Waiting and programmable
- Call Forwarding on old 4-wire phone systems
- Aqua Drain the voltage of the FBI lock-in-trace/trap-trace
- Beige Lineman's hand set
- Black Allows the calling party to not be billed for the call
- placed
- Blast Phone microphone amplifier
- Blotto Supposedly shorts every fone out in the immediate area
- Blue Emulate a true operator by seizing a trunk with a 2600hz
- tone
- Brown Create a party line from 2 phone lines
- Bud Tap into your neighbors phone line
- Chartreuse Use the electricity from your phone line
- Cheese Connect two phones to create a diverter
- Chrome Manipulate Traffic Signals by Remote Control
- Clear A telephone pickup coil and a small amp use to make free
- calls on Fortress Phones
- Color Line activated telephone recorder
- Copper Cause crosstalk interference on an extender
- Crimson Hold button
- Dark Re-route outgoing or incoming calls to another phone
- Dayglo Connect to your neighbors phone line
- Divertor Re-route outgoing or incoming calls to another phone
- DLOC Create a party line from 2 phone lines
- Gold Trace calls, tell if the call is being traced, and can
- change a trace
- Green Emulate the Coin Collect, Coin Return, and Ringback tones
- Infinity Remotely activated phone tap
- Jack Touch-Tone key pad
- Light In-use light
- Lunch AM transmitter
- Magenta Connect a remote phone line to another remote phone line
- Mauve Phone tap without cutting into a line
- Neon External microphone
- Noise Create line noise
- Olive External ringer
- Party Create a party line from 2 phone lines
- Pearl Tone generator
- Pink Create a party line from 2 phone lines
- Purple Telephone hold button
- Rainbow Kill a trace by putting 120v into the phone line (joke)
- Razz Tap into your neighbors phone
- Red Make free phone calls from pay phones by generating
- quarter tones
- Rock Add music to your phone line
- Scarlet Cause a neighbors phone line to have poor reception
- Silver Create the DTMF tones for A, B, C and D
- Static Keep the voltage on a phone line high
- Switch Add hold, indicator lights, conferencing, etc..
- Tan Line activated telephone recorder
- Tron Reverse the phase of power to your house, causing your
- electric meter to run slower
- TV Cable "See" sound waves on your TV
- Urine Create a capacitative disturbance between the ring and
- tip wires in another's telephone headset
- Violet Keep a payphone from hanging up
- White Portable DTMF keypad
- Yellow Add an extension phone
-
- Box schematics may be retrieved from these FTP sites:
-
- ftp.netcom.com /pub/va/vandal (DnA)
- ftp.winternet.com /users/craigb (H/P)
-
-
- 10. What is an ANAC number?
-
- An ANAC (Automatic Number Announcement Circuit) number is a telephone
- number that plays back the number of the telephone that called it.
-