| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Attack dial |
On Apr 17 04:12 96, Meng-Shi Lim of 3:635/503 wrote: ML>> Can Telecom trace an attack dial. ie dial-> 1 ring ->hang-up and ML>> repeat. AA>> If they really wanted to, yes. While it is illegal to attack dial, I AA>> doubt they would bother scanning from them unless there was some AA>> complaint or some other network problems pointed to it. ML> I thought it would be extremely difficult because no connection is made ML> long enough for the trace to occur. It would take a powerful computer to ML> scan a very busy exchane and even more so if the attack was made from ML> several exchanges away. The "scan" is much more likely to involve a harrassed technician tracing back the cause of a consistent overload caused fault in the originating line rack, at the access line of the attack dialer. No exchange is designed to accept attack dialing - problems are a matter of when, not if. The line capacity doesn't exist, and shouldn't, by design. Investigated and logged it will be, to a near certainty. By the local tech - and identified all the way down to the originating line in the process of filling out his fault report sheet. Whatever happens afterward is up to his superiors. Regards, Dave Hatch. --- Msgedsq 3.20* Origin: DealBlue Support BBS (3:711/808) SEEN-BY: 50/99 78/0 620/243 623/630 624/300 711/401 409 410 413 430 808 809 SEEN-BY: 711/899 932 934 712/515 713/888 714/906 800/1 7877/2809 @PATH: 711/808 809 934 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.