Slash Boxes
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
More | Login | Reply
Loading... please wait.
  • To fiddle with your CLID you need to be able to speak SS7. Even so, you *can* still be traced.

    As an example, Alice PBX fiddles with her CLID, places a call which transit's Bob Telecom's network, and is terminated by Clare Telecom. Clare Telecom uses CLID to make some charge against Dave. Dave disputes the bill, Clare looks in her records to see where (which physical connection) the call came from, and sees that it came in from Bob Telecom. Bob can trace the call back from where it left his network to w
  • I wrote IVR code to do precisely this.. authenticate and login to an account using caller-id (they call it ANI, authorized number identification).

    It was even easier in my case.. Large companies basically give you a list of numbers and say "look, if anyone calls come from these numbers, let them through without authentication" (I asked everyone several variants of 'are you REALLY sure you want to do this'? but they still wanted it).. Find out the director's office number, change your caller-ID to respond wi