FON-860I Telephone User Guide FON-860I Telephone User Guide August 24, 2015 Copyright © 2015 Fortinet, Inc

Total Page:16

File Type:pdf, Size:1020Kb

FON-860I Telephone User Guide FON-860I Telephone User Guide August 24, 2015 Copyright © 2015 Fortinet, Inc FON-860i Telephone User Guide FON-860i Telephone User Guide August 24, 2015 Copyright © 2015 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet's General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet's internal lab tests. In no event does Fortinet make any commitment related to future deliverables, features or development, and circumstances may change such that any forward-looking statements herein are not accurate. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. FortiVoice fortivoice.com Technical Documentation docs.fortinet.com Knowledge Base kb.fortinet.com Customer Service & Support support.fortinet.com Training Services training.fortinet.com FortiGuard fortiguard.com Document Feedback [email protected] Table of Contents Introduction.................................................................. 1 Phone features ................................................................. 1 Codecs and protocols ...................................................... 1 Parts list............................................................................ 2 Installing the FON-860i................................................ 7 Installing the base............................................................. 7 Installing the handset charger .......................................... 9 Installing the batteries .................................................... 10 Charging the batteries .................................................... 11 Registering handsets with the base ............................... 11 Using the handset charger ....................................... 12 Using the handset itself ............................................ 12 Deregistering a handset from a base ............................. 13 Viewing all handsets registered with a base .................. 13 Checking and updating firmware ................................... 13 Checking the current firmware version..................... 13 Checking for firmware updates ................................ 14 If there is no Internet access at this location ...... 14 If there is Internet access at this location ........... 14 Configuring the FON-860i as an IP extension......... 16 Configuring the FON-860i for use within the office ........ 16 IP Extension Details area.......................................... 18 Configuring the FON-860i for use outside the office...... 19 Checking the firewall ................................................ 19 Selecting the extension ............................................ 20 IP Extension Details area.......................................... 22 Configuring the external IP extension handset......... 22 Configuring the handset ........................................... 24 Enabling auto answer mode........................................... 24 Fortinet Technologies Inc. Page i FON-860i Telephone User Guide Changing the display contrast........................................ 24 Restoring the default display contrast............................ 24 Changing the audio settings........................................... 25 Using the FON-860i ................................................... 26 Using the speakerphone ................................................ 26 Adjusting the handset volume ........................................ 26 Locking and unlocking the keypad................................. 26 Activating silent mode .................................................... 27 Typing text and numbers................................................ 27 Inserting a symbol .......................................................... 27 Changing the input mode............................................... 28 Making and answering calls ..................................... 29 Calling an outside number.............................................. 29 Calling an extension ....................................................... 29 Calling a voice mailbox................................................... 29 Making a call using a system speed dial number .......... 30 Calling the receptionist................................................... 30 Making a call using contacts.......................................... 30 Making a call using the call log ...................................... 30 Making a call using redial ............................................... 31 Making a call using a speed dial number ....................... 31 Making an emergency call.............................................. 32 Making a conference call................................................ 32 Making an analog call..................................................... 32 Answering a call ............................................................. 33 Answering call waiting.................................................... 33 Answering a queued call ................................................ 34 Picking up a call for any extension................................. 34 Picking up a call for a specific extension ....................... 34 Answering an analog call................................................ 34 Fortinet Technologies Inc. Page ii FON-860i Telephone User Guide Rejecting a call ............................................................... 35 Muting a call ................................................................... 35 Ending a call ................................................................... 35 Caller ID .......................................................................... 35 Using the FON-860i with a traditional phone line........... 36 Holding and transferring calls .................................. 37 Placing a call on hold ..................................................... 37 Taking a call off hold ...................................................... 37 Transferring a call ........................................................... 37 Attended transfer............................................................ 38 Parking calls and paging........................................... 39 Parking a call .................................................................. 39 Retrieving a parked call .................................................. 39 Two-way intercom paging.............................................. 39 One-way group paging................................................... 40 Overhead paging ............................................................ 40 Voicemail .................................................................... 41 Setting up voicemail ....................................................... 41 Checking voicemail using the FortiVoice feature code .. 41 Checking voicemail using the voicemail menu............... 41 Controlling message playback ....................................... 42 Other features ............................................................ 43 Toggling do not disturb mode ........................................ 43 Attaching an account code to the last call ..................... 43 Call log........................................................................ 44 Viewing numbers in the call log...................................... 44 Contacts ..................................................................... 45 Adding a contact ............................................................ 45 Choosing a contact ........................................................ 45 Fortinet Technologies Inc. Page iii FON-860i Telephone User Guide Deleting a contact .......................................................... 46 Editing a contact............................................................. 46 Changing the ring tone for a contact.............................. 46 Changing the default number for a contact ................... 47 Specifying a speed dial number for a contact................ 47 Adding a call log number to contacts ............................ 48 Adding a call log number to an existing contact............ 48 Creating a group............................................................. 48 Editing a group ............................................................... 49 Adding a contact to a group........................................... 49 Deleting
Recommended publications
  • Anarchists Cookbook V2000
    ANARCHY COOKBOOK VERSION 2000 Table of Contents 1.Counterfeiting Money 58.Generic Bomb 2.Credit Card Fraud 59.Green Box Plans 3.Making Plastic Explosives 60.Portable Grenade Launcher 4.Picking Master Locks 61.Basic Hacking Tutorial I 5.The Arts of Lockpicking I 62.Basic Hacking Tutorial II 6.The Arts of Lockpicking II 63.Hacking DEC's 7.Solidox Bombs 64.Harmless Bombs 8.High Tech Revenge: The Beigebox 65.Breaking into Houses 9.COý Bombs 66.Hypnotism 10.Thermite II Bombs 67.Remote Informer Issue #1 11.Touch Explosives 68.Jackpotting ATM Machines 12.Letter Bombs 69.Jug Bomb 13.Paint Bombs 70.Fun at K-Mart 14.Ways to send a car to HELL 71.Mace Substitute 15.Do you hate school? 72.How to Grow Marijuana 16.Phone related vandalism 73.Match Head Bomb 17.Highway police radar jamming 74.Terrorizing McDonalds 18.Smoke Bombs 75."Mentor's" Last Words 19.Mail Box Bombs 76.The Myth of the 2600hz Detector 20.Hot-wiring cars 77.Blue Box Plans 21.Napalm 78.Napalm II 22.Fertilizer Bomb 79.Nitroglycerin Recipe 23.Tennis Ball Bomb 80.Operation: Fuckup 24.Diskette Bombs 81.Stealing Calls from Payphones 25.Unlisted Phone Numbers 82.Pool Fun 26.Fuses 83.Free Postage 27.How to make Potassium Nitrate 84.Unstable Explosives 28.Exploding Light bulbs 85.Weird Drugs 29.Under water igniters 86.The Art of Carding 30.Home-brew blast cannon 87.Recognizing Credit Cards 31.Chemical Equivalency List 88.How to Get a New Identity 32.Phone Taps 89.Remote Informer Issue #2 33.Landmines 90.Remote Informer Issue #3 34.A different Molitov Cocktail 91.Remote Informer Issue #4 35.Phone
    [Show full text]
  • Phreaking Into the System
    Exploding The Phone db186 www.explodingthephone.com Bibliographic Cover Sheet Title Phreaking into the system Publication Nation Review (Australia) Date 1972-09-01 V/I/P p. 1308 Abstract Overview of phone phreaking in Australia circa 1972, with descriptions of the three prevalent methods. Also discusses the way that the Australian phone system differs from the US system. Keywords phone phreaks; Australia; step-by-step exchange; crossbar exchange; Ramparts; AT&T; mute box (black box); blue box; Australian phreaking Source An anonymous phone phreak The following pages may contain copyrighted material. We believe that our use of this material for non-commercial educational and research purposes constitutes "fair use" under Section 107 of U.S. Copyright Law. If you wish to use this material for purposes that go beyond "fair use," you must obtain permission from the copyright owner, if any. While it will make us slightly sad to do so, we will nonetheless comply with requests from copyright owners who want their material removed from our web site. This article is published by way of a public service and dedicated to the post- master-general, sir Alan Hulme. S;r Alan, until you read this article, you will no-~ have any idea of what SEVEN DAYS a week, fifty two weeks a year, in a peak ilour intricate methods are s~t/t be~wc :n se~ en and clght pro, the AP.C disseminates oile being used to cheat your- of ~ts intellectually most dubious products: the weather self and the public purse fnrccast, tl,df an hour’s conversation with an honest metcorolc~:ist will convince anyone that while the ob~erva- of valuable revenue.
    [Show full text]
  • Table of Contents
    TABLE OF CONTENTS RULE T-1 Application of Rules ................................................................................................................................. 1 RULE T-2 Definitions ................................................................................................................................................... 1 RULE T-3 Records and Reports ............................................................................................................................... 6 RULE T-4 Metering, Inspections and Tests ......................................................................................................... 7 RULE T-5 Customer Relations .................................................................................................................................. 8 RULE T-6 Reasons for Denying Telephone Service ...................................................................................... 1 2 RULE T-7 Insufficient Reasons for Denying Telephone Service ............................................................. 13 RULE T-17.1 Notice of Termination of Reseller ................................................................................................... 13 RULE T-8 Voluntary Suspension .......................................................................................................................... 14 RULE T-9 Directories ................................................................................................................................................ 14 RULE
    [Show full text]
  • "Secrets of the Little Blue Box" 09/27/2007 11:03 AM
    "Secrets of the Little Blue Box" 09/27/2007 11:03 AM "Secrets of the Little Blue Box" Written by Ron Rosenbaum Esquire Magazine, October 1971 I am in the expensively furnished living room of Al Gilbertson (His real name has been changed.), the creator of the "blue box." Gilbertson is holding one of his shiny black-and-silver "blue boxes" comfortably in the palm of his hand, pointing out the thirteen little red push buttons sticking up from the console. He is dancing his fingers over the buttons, tapping out discordant beeping electronic jingles. He is trying to explain to me how his little blue box does nothing less than place the entire telephone system of the world, satellites, cables and all, at the service of the blue-box operator, free of charge. "That's what it does. Essentially it gives you the power of a super operator. You seize a tandem with this top button," he presses the top button with his index finger and the blue box emits a high-pitched cheep, "and like that" -- cheep goes the blue box again -- "you control the phone company's long-distance switching systems from your cute little Princes phone or any old pay phone. And you've got anonymity. An operator has to operate from a definite location: the phone company knows where she is and what she's doing. But with your beeper box, once you hop onto a trunk, say from a Holiday Inn 800 (toll-free) number, they don't know where you are, or where you're coming from, they don't know how you slipped into their lines and popped up in that 800 number.
    [Show full text]
  • The Hacker Voice Telecomms Digest #1.01
    p3 … Connections p5 … A Rough Guide To Number Stations p12 … BT 17070 Line Test – Option Map p13 … Communications Your Letters Answered, Perhaps! p14 … Phreaking Around With * - Part 1 p21 … JoyBubbles R.I.P p22 … Phreaking Bloody Adverts! Pssst! Over Here… You want one of these?! p23 … Culture: Caffeinated Beverages - Tea p25 … Who Are They Watching? The Hackers Voice Telecomms Digest Team p27 … Google Chips Editors: Blue_Chimp, Demonix. Staff Writers: Blue_Chimp, Naxxtor, Belial, 10nix, p27 … Unexpected Hack? Demonix & Hyper Contributors: UltraViolet, eDgE, and Sam. P28 … Phreaking Around With * - Part 2 DTP: Demonix. Cover Graphics: Demonix. P31 … Social Engineering Printing: THV. A limited number of printed versions of this digest is made available p33 … Hiding Your Tracks With TOR on release please contact the HVR team for further details. Thanks : To everyone who has input into this p35 … The Random Data Dump issue, especially the people who have submitted an article and gave feedback P36 … Back Page on the beta releases. Back Page: Demonix. What is The Hackers Voice? The Hackers Voice is a community designed to bring back hacking and phreaking to the UK . Hacking is the exploration of Computer Science, Electronics, or anything that has been modified to perform a function that it wasn't originally designed to perform. Hacking IS NOT EVIL, despite what the mainstream media says. We do not break into people / corporations' computer systems and networks with the intent to steal information, software or intellectual property. The Hackers Voice projects include a Radio Show, Forums, an IRC server and much more. Please visit our site and join in with the community: http://www.hackervoice.co.uk/ Article Submissions.
    [Show full text]
  • Your Television Is Ringing a Survey of Telecoms Covergence L October 14Th 2006
    Your television is ringing A survey of telecoms covergence l October 14th 2006 Republication, copying or redistribution by any means is expressly prohibited without the prior written permission of The Economist The Economist October 14th 2006 A survey of telecoms convergence 1 Your television is ringing Also in this section All things to all men Two other kinds of convergence. Page 3 The end of the line Traditional xed-line telephony has had its day. Page 5 Home and away After many false starts, xed and mobile phones are getting ready to merge. Page 7 Tuning in to the future? Telecoms rms are moving into television, but it may not be a licence to print money. Page 10 Changing the rules How should regulators respond to conver- Convergence is the telecoms industry’s new mantra. Whether gence? Page 12 customers really want it is another matter, says Tom Standage HAT has come over the telecoms in- Meanwhile, large internet companies Winners and losers Wdustry? The spectacular crash of including Google, Yahoo! and Microsoft’s Who will benet most from convergence? 2001, with its associated bankruptcies, MSN marched into the telecoms business Page 14 fraud and the destruction of around $1 tril- by launching new services oering free lion of investors’ money, has evidently calls over the internet. Skype, the leader in been forgotten. The gloom has given way this market, was acquired by eBay for $2.6 to a fresh sense of opportunity and a re- billion. And equipment-makers began newed frenzy of dealmaking. The past teaming up too: Cisco, the world’s largest couple of years have seen a series of huge network-equipment rm, bought Scien- takeovers and mergers among network tic-Atlanta, which makes television set- operators and makers of telecoms equip- top boxes, for $6.9 billion; Alcatel and Lu- ment around the world.
    [Show full text]
  • The Little Blue Box
    Exploding The Phone db92 www.explodingthephone.com Bibliographic Cover Sheet Title Secrets of the Little Blue Box Publication Esquire Magazine Date 1971-10-00 Author(s) Rosenbaum, Ron V/I/P p. 116 Abstract Lengthy and famous article explains how the phone lines work in technical detail, with technical details of different methods of phreaking. Author interviewed serveral phreaks including Captain Crunch, Joe Engressia, Mark Bernay and a phreak who is given the alias Al Gilbertson for this article. Their histories and current lives are discussed at length. Keywords gambling; blue box; tandem; Las Vegas; Phillipines; Fraser Lucey; Pacific Telephone and Telegraph Company (PTT); black box; 2600; phone phreaks; Joe Engressia; multi-frequency tones; Bell Telephone Laboratories; long-line trunks; toll switching offices; Captain Crunch; Dr. No; Frank Carson; Marty Freeman; Peter Perpendicular Pimple; Alefnull (phone phreak); The Cheshire Cat; toll-free loop-around; 4A switching machine; stacking tandems; phone tapping; verification; Memphis; University of South Florida; Los Angeles; General Telephone and Electronics; Seattle; Cambridge, MA; New York; MF Boogie; Number 5 crossbar switching system; phone tripping; band-six in-WATS numbers; AT&T; 2111 conference; Vancouver, Canada; Mark Bernay; Automatic Electric; Northwest Pacific Bell; computer hackers; FBI; Alexander Graham Bell (phone phreak); breadbox; Millington, TN Source ProQuest The following pages may contain copyrighted material. We believe that our use of this material for non-commercial educational and research purposes constitutes "fair use" under Section 107 of U.S. Copyright Law. If you wish to use this material for purposes that go beyond "fair use," you must obtain permission from the copyright owner, if any.
    [Show full text]
  • Copyrighted Material
    94192bindex.qxd 6/3/08 3:29 PM Page 835 Index Symbols and Numbers 2600 # key, as end of dialing feature, 96 meetings, 512–522 10 reserved bytes, and virus detection, 291 writer indicted, 73 10297, 484 2600 Hz, 221 10457, 484 300 baud modems, 43 10502, 484 311, 483 10811, 484 31337SP34K, hacking, 816–817 10nnn, 93–97 3D glasses, 812–816 110w, 761 411 128-bit keys, cryptosystems, 308 directory assistance, 47 1633 Hz, 31 step offices and, 51 1980s 414 gang, 22 corporate history, see corporations. see 56-bit keys, Data Encryption Standard, 308 corporations, 1980s 62-second trick, and virus detection, 291 early days of Net. see Internet, early days of 64-bit keys, cryptosystems, 308 hacker philosophy. see hackers, philosophy *67, 483, 669 last days of Ma Bell. see Ma Bell 710 trick, 667 new toys. see telecommunications toys, 1980s 800 numbers raids. see raids, 1980s allocating, 92–93 stories. see stories, 1980s types of, 111–112 1990s 802.11b wireless networks, 733–739 computer revolution. see computer revolution background and basics, 733–734 hackers and the law. see law enforcement, 1990s community, 737–738 hackers really discovered in, 233–234 detecting, 734–736 hacking other things. see hacking other things getting to know your neighbors, 739–743 pop culture. see pop culture,COPYRIGHTED 1990s hacking MATERIAL Captivate network, 743–744 stories. see stories, 1990s non-beaconing, 737 2000 and beyond packet types, 734 hacker stories. see stories, 2000 and beyond practical examples, 738–739 lawsuits. see lawsuits, 2000 and beyond securing, 737 retail hacking.
    [Show full text]
  • Public Telephone Network Vulnerabilities
    PUBLIC TELEPHONE NETWORK VULNERABILITIES G. Lorenz, J. Keller, G. Manes, J. HaIe, S. Shenoi Abstract Tbe convergence of public telephone networks (PTNs), wireless networks and the Internet makes it possible to disrupt vital information and communications systems from afar with software. PTN vulnerabilities are also growing due to system complexity, deregulation, increasing numbers ofhighly-skilled attackers, and the automation of attacks. Tbis paper analyzes PTNs vulnerabilities, and presents an attack taxonomy. Tbe taxonomy considers security threats posed by in-band attacks, out-of-band attacks, wireless attacks and Internet attacks. Keywords: Public telephone networks, converged networks, vulnerabilities, attack taxonomy 1. INTRODUCTION Public telephone network (PTN) fraud originated in 1961, when Blue Boxes were used to make free long-distance calls [4]. In the 1970s, "phone phreaking" drew attention: whistles packaged in Cap'n Crunch cereal boxes were used by "phreakers" to generate control tones, enabling them to modify telephone service at will [4]. The explosion of global communications has increased the scope and magnitude of fraud [4,14,19]. In 1997, a fifteen-year-old breached telephone systems at a high tech company to make free calls, access voice mail and eavesdrop on company business [4]. In 1998, a company lost $700,000 in two days from PBX attacks [4]. Worldwide los ses - due to toll fraud, insider misuse, cell phone cloning and slamming - now exceed $30 billion a year [4]. But new dangers are posed by insidious penetrations into PTN networks [19,22]. Most penetrations are by thrill-seeking hackers and novices using "kiddie scripts." However, criminals, terrorists and foreign governments are also systematically probing PTNs,potentially monitoring communications and searching for vulnerabilities [22].
    [Show full text]
  • Xblue X16 Telephone User Guide
    XBLUE Networks X16 Telephone User guide X16 User Guide Revision Table Revision Description of Changes Date Released Issue 2 – PAL This manual supersedes all other manuals 06-09 Page 13 – There was a hidden line behind the graphic. Page 14 – Adjusted numbering within “Add new Record”. Page 18 – added a voice mail button graphic Page 20 – adjusted graphic to exclude VM Page 29 – Busy CO Line – added New LIU function. Page 33 – fixed typo in call forwarding Page 36 – fixed typo in Muted Ring Page 36 – fixed typo in New Message Playback Page 39 – fixed typo in Set Relocation Page 40 – fixed typo in Transfer Page 45 – fixed typo in One Touch Record Page 46 – fixed typos in Using AME Preliminary Release – PAL 11/2007 Table of Contentsof Table Reproduction, publication, or duplication of this manual, or any part thereof, in any manner, mechanically, electronically, or photographically, is strictly prohibited. © Copyright 2006 by XBLUE Network, LLC. All rights reserved. The information contained in this document is subject to change without notice and should not be construed as a commitment by XBLUE Networks, LLC,; XBLUE Networks, reserves the right, without notice, to make changes to equipment design as advances in engineering and manufacturing methods warrant. Any and all toll charges are the sole responsibility of the user of the installed equipment; XBLUE offers no warranty or will assume any responsibility for any toll charges. Trademarks: XBLUE, XBLUE Networks, X16 are trademarks of XBLUE Networks, LLC. All trademarks are the property of their respective owners. Issue 2 - 2 - Table of Contents TABLE OF CONTENTS ............................................................................................
    [Show full text]
  • Zen and the Art of Fone Phreaking `97 Bi: Cberphreak and DTMF Of
    Zen and the Art of Fone Phreaking `97 bi: CbeRpHreAk and DTMF of 4matt producti0nz b4 i get started, just remember i did not rite this phile so you people can learn preform telecommunications fraud! contrary to popular beleafs phreaking is still an art form. phreaking is a form of intelectual advancement. is just like hacking, if u think of it this way: when hacking you type certain commands in phreaking, you play certain MHz tones. blue boxing is just like gaining r00t access of a unix sys. by gaining r00t access you be come the 'system operator'. the blue box utelizes 'system operator' tones. see what i'm sayn? just cuz phreaking is intelectual it dousnt mean it cant be fun. _`'.,_,.'`_`'.,_,.> [ definitions ] <.,_,.'`_`'.,_,.'`_ Phreak ["free"k] Verb1. The act of "Phreaking" 2. The act of making telephone calls without paying money [the word phreak is a combination of phone, freak, and free] Phreaker ["free"ker] Noun1. One who engages in the act of "Phreaking" 2.One who makes telephone calls without paying money _`'.,_,.'`_`'.,_,.> [fone systems in the world today] <.,_,.'`_`'.,_,.'` _ [1] Step by Step [2] Crossbar [3] ESS Electronic Switching System Step by Step ~~~~~~~~~~ First switching system used in America, adopted in 1918 and until 1978 Bell had over 53% of all exchanges using Step by Step [SxS]. A long,and confusing train of switches is used for SxS switching. [> Disadvantages <] [A] The switch train may become jammed : Blocking call. [B] No DTMF [DualTone MultiFrequency]["Touchtone"].
    [Show full text]
  • Reakers' Recipe Book the Phreakers' Recipe Book
    THE PHR REAKEAKERERS’S’ RECIPE BOBOOOKK THE PHREAKERS’ RECIPE BOOK AN ANALOG LOVE STORY 002 PHREAKERS' RECIPE BOOK スタ 魔 ジオ 悪 :: :: : : 䜹 I 䜿 䝲 䝍 䝕 ܈ 䵼 Ⴭ ᛙ 䝅 ON 䝔 䝲 䞒 WERKS® 䝯 䞘 і 䞑 䝌 䞃 䝉 䝑 䝮 PHREAKERS’ RECIPE BOOK 003 スタ 魔 ジオ 悪 :: :: : : 䜹 I 䜿 䝲 䝍 䝕 ܈ 䵼 Ⴭ ᛙ 䝅 ON 䝔 䝲 䞒 WERKS® 䝯 䞘 і 䞑 䝌 䞃 䝉 䝑 䝮 FIRST INTERNATIONAL EDITION, SEPTEMBER 2017 Copyright © 2017 by Édition Delince Incorporated. All rights reserved under International and Pan-American Copyright. Published in the United States by Édition Delince Incorporated, Miami Florida USA. Édition Delince ISBN: 978-1-944556-29-7 For information, address: ONIWERKS PO BOX 61121 MIAMI, FL 33261 USA Published in The United States of America www.oniwerks.com 2 3 0 5 0 A 0 0 6 1 THE PHREAKERS’ RECIPE BOOK AN ANALOG LOVE STORY 008 PHREAKERS' RECIPE BOOK Recipes PHREAKERS’ RECIPE BOOK 009 Aqua Box Plans by Jolly Roger Every true phreaker lives in fear of the dreaded F.B.I. 'Lock In Trace.' For a long time, it was impossible to escape from the Lock In Trace. This box does offer an escape route with simple directions to it. This box is quite a simple concept, and almost any phreaker with basic electronics knowledge can construct and use it. --------------- The Lock In Trace --------------- 0010 PHREAKERS' RECIPE BOOK A lock in trace is a device used by the F.B.I. to lock into the phone users location so that he can not hang up while a trace is in progress.
    [Show full text]