Articles
January1984
February1984
March1984
April1984
May1984
June1984
July1984
August1984
September1984
October1984
November1984
December1984
January1985
February1985
March1985
April1985
May1985
June1985
July1985
August1985
September1985
October1985
November1985
December1985
January1986
February1986
March1986
April1986
May1986
June1986
July1986
August1986
September1986
October1986
November1986
December1986
January1987
February1987
March1987
April1987
May1987
June1987
July1987
August1987
September1987
October1987
November1987
December1987
Spring1988
Summer1988
Autumn1988
Winter1988
Spring1989
Summer1989
Autumn1989
Winter1989
Spring1990
Summer1990
Autumn1990
Winter1990
Spring1991
Summer1991
Autumn1991
Winter1991
Spring1992
Summer1992
Autumn1992
Winter1992
Spring1993
Summer1993
Autumn1993
Winter1993
Spring1994
Summer1994
Autumn1994
Winter1994
Spring1995
Summer1995
Autumn1995
Winter1995
Spring1996
Summer1996
Autumn1996
Winter1996
Spring1997
Summer1997
Autumn1997
Winter1997
Spring1998
Summer1998
Autumn1998
Winter1998
Spring1999
Summer1999
Autumn1999
Winter1999
Spring2000
Summer2000
Autumn2000
Winter2000
Spring2001
Summer2001
Autumn2001
Winter2001
Spring2002
Summer2002
Autumn2002
Winter2002
Spring2003
Summer2003
Autumn2003
Winter2003
Spring2004
Summer2004
Autumn2004
Winter2004
Spring2005
Summer2005
Autumn2005
Winter2005
Spring2006
Summer2006
Autumn2006
Winter2006
Spring2007
Summer2007
Autumn2007
Winter2007
Spring2008
Summer2008
Autumn2008
Winter2008
Spring2009
Summer2009
Autumn2009
Winter2009
Spring2010
Summer2010
Autumn2010
Winter2010
Spring2011
Summer2011
Autumn2011
Winter2011
Spring2012
Summer2012
Autumn2012
Winter2012
Spring2013
Summer2013
Autumn2013
Winter2013
Spring2014
Summer2014
Autumn2014
Winter2014
Spring2015
Summer2015
Autumn2015
Winter2015
Spring2016
Summer2016
Autumn2016
Winter2016
Spring2017
Summer2017
Autumn2017
Winter2017
Spring2018
Summer2018
Autumn2018
Adventures in Behavioral Linguistics
An ISP Story
Deobfuscation
Discovering Vulns
Enhancing Nortel IP Phones with Open Source Software
Fun at the Airport
Getting 2600 the Safe Way
HACKER PERSPECTIVE: Mitch Altman
Hacking Answers by Gateway
Hacking Whipple Hill with XSS
Hacking Xfire
Haunting the MS Mansion
Internet Archaeology
Java Reverse Engineering
Opinions
Pandora Hack - Get Free MP3s
Reading ebooks on an iPod
Remaining Relevant
TELECOM INFORMER
The Shifty Person's Guide to 0wning Tire Kingdom
TRANSMISSIONS
Valuepoint
VoIP Cellphones: The Call of the Future
prev
Volume 24
Number 2
68 pages
Quote: "Once a new technology rolls over you, if you're not part of the steamroller, you're part of the road." - Stewart Brand
Author
Nom de plume
Toni-Sama
Name
Email
Notes
Aritcle
Synopsis
Discusses VoIP cellular service - what it is, the state of the technology and uses and abuses.
Notes
Code
None
Page
48
Pages
1 and a half
In Best of 2600 book?
Yes, page 687, Section 3 (2000 and Beyond: A Changing Landscape), Chapter 16 (A New Era of Telephony)
Links
Addendum
Keywords
VoIP
Voice Over Internet Protocol - the transmission technologies for delivery of voice communications over the Internet. (more..)