Transparent Telephony – Part 2 – Installing Asterisk

Welcome back to the Transparent Telephony series. If you’re new, you may want to check out part 1 here:┬áTransparent Telephony – Part 1 – An Introduction. This series is designed for technical people, programmers, and just general enthusiasts who want to learn: how telephony works, how to setup your own phone server (PBX), how to … Read more

Performing a Denial of Service (DoS) Attack on a Phone Line

Intro Denial of Service attacks are nothing new to people in the IT and computer security world. DoS attacks are a very simplistic form of attack which aim to flood the target (whether it be a computer, mobile device, or phone line) with traffic so that it cannot process legitimate traffic. While being simple simple … Read more