• Main Menu
  • Telephony

    • Cell Phone Jammer

      Cell Phone Jammer

      With so many people using cell phones these days, one of the devices that have popped- up on the market are cell phone jammers. Be advised that cell phone jammers are usually black market devices, since using them is illegal in most municipalities. However, for those that are tired of hearing endless cell phone conversations

    • Cell Phone Cloning

      Cell Phone Cloning

      Cell phone cloning refers to the act of copying the identity of one mobile telephone to another. This is usually done to make fraudulent telephone calls. The bill for the calls go to the legitimate subscriber. This made cloning very popular in areas with large immigrant populations, where the cost to “call home” was very

    • Loop

      Loop

      Loops are a pair of phone numbers, usually consecutive, like 836-9998 and 836-9999. They are used by the phone company for testing. What good do loops do us? Well, they are cool in a few ways. Here is a simple use of loops. Each loop has two ends, a 'high' end, and a 'low' end.

    • Types of Mobile Telephone Systems

      Types of Mobile Telephone Systems

      The main mobile telephone systems in the last twenty five years have been: YearMobile Telephone System 1981 Nordic Mobile Telephone (NMT) 1983 Advanced Mobile Phone System (AMPS) 1985 Total Access Communication Systems (TACS) 1986 Nordic Mobile Telephony (NMT) 1991 American Digital Cellular (ADC) 1991 Global System for Mobile Communication (GSM) 1992 Digital Cellular System (DCS)

    • Phone Phreaking

      Phone Phreaking

      Phone phreaking is the act of gaining illegal access to resources of telecom networks for fun or malicious activity. Before computer hacking took over, phreaking was the dominant underground tech activity. Some phone phreakers just wanted to understand how telecom infrastructure worked. Others wanted to make free long distance phone calls. As voice and data

    • How to Unlock a Phone

      How to Unlock a Phone

      Many cell phone users remain confused on what it means to unlock a phone. Most commonly, this term is used to describe the process of removing restrictions placed on using a GSM cell phone by the manufacturer. These restrictions are intended to prevent the mobile phone from being used on competing cell phone carriers or

    • IS-54 and IS-136: TDMA

      IS-54 and IS-136: TDMA

      IS-54 and IS-136 are standards for TDMA American Digital Cellular. Mobile Frequency Range Rx: 869-894; Tx: 824-849 Multiple Access Method TDMA/FDM Duplex Method FDD Number of Channels 832 (3 users per channel) Channel Spacing 30Khz Modulation DQPSK Channel Bit Rate 48.6Kb IS-54 and IS-136: TDMA Security IS-54 and IS-136 use the CAVE (Cellular Authentication, Voice

    • SCM: Station Class Mark

      SCM: Station Class Mark

      The SCM (Station Class Mark) is a 4 bit number which holds three different pieces of information. Your cellular telephone transmits this information (and more) to the cell tower. Bit 1 of the SCM tells the cell tower whether your cellphone uses the older 666 channel cellular system, or the newer 832 channel cellular system.

    • How to Defeat Caller-ID Blocking

      How to Defeat Caller-ID Blocking

      One trick to defeat Caller-ID blocking is to forward your phone line to a friend who lives in another LATA. When your friend receives the anonymous phone call, have him use *69 Call Return to dial to offending party back. As he is now placing a long distance phone call, the telephone number of the

    • 110 Block

      110 Block

      A 110 block is a punch-down block used to connect wiring for telephone systems, data network wiring, and other low-voltage wiring applications. It improves on the 66 block by supporting higher frequencies and using space more efficiently. A punch-down tool is used to force solid wire into metal slots on the 110 block. Present residences

    telephony
    393 queries in 0.546 seconds.