Google
 

Kamis, 01 Mei 2008

WiFi Hopper 1.2 Build 2008-021700

WiFi Hopper is a WLAN utility that combines the features of a Network Discovery and Site Survey tool with a Connection Manager.

Sporting a comprehensive arsenal of network details, filters, RSSI graphing and built-in GPS support, WiFi Hopper is invaluable for identification and advanced characterization of neighboring wireless devices.

Additionally, WiFi Hopper can connect to unsecured, WEP, WPA-PSK and WPA2-PSK networks directly from within the application. With editable network profiles and dedicated Connection Manager execution mode, WiFi Hopper can be used as a significantly more transparent replacement for Windows and manufacturer-provided wireless clients.

WiFi Hopper encompasses a feature set aimed for a wide variety of audiences including Wireless Network Administrators, Security Professionals, Programmers, QA Engineers and Power Users.

Following is a quick tour to the main components of WiFi Hopper. Be sure to check out the Features page for a complete picture of the extensive feature set!

Network Discovery and Site Survey

WiFi Hopper can display details like SSID, network mode, encryption type, RSSI, frequency and channel amongst numerous others for a complete picture of the environment.

It's easy to filter out classes of networks by using the network filters. Additionally, a GPS device can be used for reviewing the approximate locations of the detected access points.

With a combination of other features like signal graphing, WiFi Hopper can also be used for additional tasks like detecting channel congestion.

More Transparent Connection Manager

Compared to the Windows provided and manufacturer supplied connection managers, WiFi Hopper is significantly more transparent.

With its network profile support, WiFi Hopper can remember your networks so that it can automatically connect to them as they become available.

Finally, WiFi Hopper also supports a 'Network Hopping' mode in which it automatically connects to open networks in the area.

Security, Auditing and Testing

WiFi Hopper can be used to track unsecured wireless networks that may be compromising network security. Additionally, WiFi Hopper makes it easy to look to unauthorized access points involved in an attack or simply causing interference.

For programmers and QA engineers, WiFi Hopper is the ideal, Windows-NDIS based, testing tool. With WiFi Hoppers connectivity features, functionality of WLAN drivers and hardware can be independently verified.

Selasa, 29 April 2008

Easy-Hide-IP v1.6


Easy-Hide-IP is designed for sensitive browsing. Use it anytime you want to protect your privacy with full confidence.

Easy-Hide-IP will secures and anonymize all your internet connections and allow you to: Surf any Web Sites, Web-based Email services, Instant Messenger and Chat services, Newsgroups, Web Blogs and Forums.Your Identity is Secure, Protected, and Anonymized.

Easy-Hide-IP protects your identity by replacing your real IP address with a different one. You will appear to access the internet from a different location, not your own. Your real location is never revealed.

You can bypass virtually any form of censorship or internet traffic blocking imposed on you by your ISP, by your company, or by some other third parties. All your internet traffic is routed through remote servers. On your ISP's log file, only the IPs of the remote servers will be shown, not the
sites you have visited.

You do not need to worry about your ISP or some other Entities monitoring your internet activities, see what you are doing, which Newsgroups, Blogs or Forums you have visited and which messages you have posted.

· Newsgroups, Blogs and Forums
If you are banned or your access have been restricted by a forum administrator for example all you have to do is clean the cookies and hide your IP using Easy-Hide-IP. In this way you will be able to post new messages. If you are banned again just repeat the procedure (clean cookies and get a new IP using Easy-Hide-IP) and you gain access.

· Vote the same online poll several times
If you want to fill/vote the same online poll several times all you have to do is do is clean the cookies and hide your IP using Easy-Hide-IP and you will be able to vote again. If you want to vote 100 times – all you have to do is to repeat the procedure 100 times. In this way you can influence poll results.

· Internet Radio
If you want to listen to Internet Radio that is restricted for your real geographical location – all you have to do is to use Easy-Hide-IP to get a new IP address that will allow your access.


Requirements:
· 64 MB RAM
· 5 MB hard drive space
· Direct connection to Internet

Senin, 28 April 2008

Ipswitch WS_FTP Server 6.1 (Retail)

Every day, businesses large and small depend on the electronic exchange of ideas and information among employees and with partners and consumers. Often that data is highly sensitive, ranging from sales information, health records, credit card, and other financial data to internal earnings statements and intellectual property. Ipswitch’s WS_FTP Server with SSH (Secure Shell) uses unrivaled security to help businesses protect the confidentiality and integrity of their files and the privacy of their customers.

WS_FTP Server is used by administrators globally to support millions of end users and to transfer billions of files and petabytes of data. It’s designed to integrate smoothly into a company’s existing architecture and support an unlimited number of concurrent user connections, scaling to support businesses of any size and to grow along with the needs of your company. Our solution is easy to use and to implement, quickly enabling network administrators to:

* Achieve the highest levels of security
* Maintain high server availability
* Streamline workflows
* Gain ultimate control and visibility

Minggu, 27 April 2008

Invisible IP Map


This works with rapidshare (use internet explorer)
Invisible IP Map is user-friendly software that masks your real location. Every computer that is connected to the Internet has its own IP address which could easily be located on a map. This program will help you show yourself like you are surfing from another place on the planet.

This is a Mask IP software which is used to change your real Internet address while browsing. The software will deliver you fresh anonymous proxy servers every time you decide to click on Get IP Locations. The main benefit of this software is that you cant be traced when browsing websites. Also if a website is restricted for users from specified country the program can bypass that protection. By hiding your IP you will prevent receiving spam from marketers which know your interests by tracking your IP when browsing websites. You can use web based e-mail to send anonymous e-mail. Post on bulletin boards without displaying your real IP address

Sabtu, 26 April 2008

Easy Hide Ip v1.4


Key Features and Benefits provided by Easy-Hide-IP

» Easy-Hide-IP - Secures and Anonymizes all your internet connections and allows you to: Surf any Web Sites, Instant Messenger and Chat services, Web-based Email services, Newsgroups, Web Blogs and Forums. Your Identity is Secure, Protected, and Anonymized.
» Easy-Hide-IP protects your identity by replacing your real IP address with a different one. You will appear to access the internet from a different location, not your own. Your real location is never revealed.
» You can bypass virtually any form of censorship or internet traffic blocking imposed on you by your ISP, by your company, or by some other third parties. All your internet traffic is routed through remote servers. On your ISP's log file, only the IPs of the remote servers will be shown, not the sites you have visited.
» You do not need to worry about your ISP or some other Entities monitoring your internet activities, see what you are doing, which Newsgroups, Blogs or Forums you have visited and which messages you have posted.

Bandwidth Meter Pro 2.4


Top 9 Benefits of Bandwidth Meter Pro:

1. See your bandwidth speed visually

Bandwidth Meter Pro monitors network traffic through your computer and displays graphical and numerical download and upload speeds in real-time. You can use the software to measure the bandwidth speed of your LAN or WAN connections.
2. Get realtime Internet bandwidth usage

If you're using a dial-up connection (e.g. modem, ISDN, DSL, ADSL, cable modem) to connect to Internet, you can get the Internet bandwidth usage in real time and the total bandwidth usage to avoid overshooting your Broadband limitation.
3. Monitor multiple network connections bandwidth speed

It's very useful if your computer has multiple network connections (LAN and WAN) and you want to monitor more than one network connections bandwidth speed at the same time.
4. Daily, weekly and monthly bandwidth usage reports

Bandwidth Meter Pro logs network traffic and provides daily, weekly, monthly and summary bandwidth usage reports.
5. Bandwidth usage notification

If you're using a bandwidth limited Internet connect, you may need to get an notification when you exceed the limitation for the connection. It's available in Bandwidth Meter Pro as well.
6. Test download and upload speeds of your network connections

The built-in speeds stopwatch can help you to test the download and upload speeds of a network connection in a user-specified period.
7. Record traffic rates of a specified connection

Bandwidth Meter Pro provides a useful tool - traffic rates recorder, which records download and upload speeds of one or more connections and export to a text or Microsoft Excel .csv file.
8. No extra drivers needed

The Bandwidth Monitor doesn't install extra drivers to your computer. This will keep your system clean and reliable.
9. Small, simple, accurate and reliable

Size of Bandwidth Meter Pro is less than 1 MB; it has a simple interface, and it displays the accurate bandwidth speed and uses very low resources.


Bandwidth Meter Pro Key Features:

* Network connections bandwidth monitoring
* Internet connections bandwidth monitoring
* Real-time graphical and numerical bandwidth speed displaying
* Monitor multiple network connections at a time
* Speed rates scale
* Works with majority network connections including modem, ISDN, DSL, ADSL, cable modem, wireless network cards, Ethernet cards, VPN, and more
* Scalable to your own modem download capabilities
* Provides daily, weekly, monthly and summary bandwidth usage reports, plus exports to a plain text, HTML, or Microsoft Excel .csv file
* Readout in either KB/sec (kilobytes per second) or >kbps (kilobits per second)
* Bandwidth usage notification (notify user by playing sound, computer beep, sending email, running a program)
* Download and upload speeds stopwatch
* Customize colors and fonts
* Show real-time network traffic graph in system tray
* Show time in traffic graph
* Show traffic graph in line or column style; and column width and space can be customized
* Show average download and upload lines in traffic graph
* Includes complete window configuration and view options
* Requires minimal system resources
* Full compatible with Windows 98, Windows Me, Windows NT 4.0, Windows 2000, Windows XP, Windows 2003, and Windows Vista

Steganos Internet Anonym Pro 7.1.6

Your anonymous SSL tunnel to the Internet - surf, download, share files…
Why do you need Steganos Internet Anonym VPN?

Each visit to the Internet discloses your identity to Web providers – often, without you noticing or wanting this. And also your Internet provider can exactly see which Web sites you visit and what kind of data you upload or download. When you use a WLAN (Wireless Local Area Network) or a hot spot to access the Internet wirelessly, for example at a train station, an airport, or in an Internet café, it won’t be a problem for anyone to spy on you.

It just takes the corresponding software to turn you into a transparent user. All your movements on the Web can then be exactly traced – whether you send private e-mails, carry out online purchases, or enter your personal access data. Even when you dial in to online applications, you are unprotected: Someone could “stow away” and use your access data unnoticed in order to manipulate and even delete important data!
Why surf anonymously? I don’t have anything to hide.

As soon as you go online, you receive a clear Internet protocol address - an IP. The IP acts like a transmitter on the Internet to fix your location and can therefore be traced back to the very door of your house. Every provider of Web pages can recognize precisely what you have done on their Web site: Which products have you viewed but not bought? Which images have you looked at? And even your provider can view a large amount of data such as the movies and songs you have uploaded and downloaded on your legal file sharing platform.

It’s not about whether you have something to hide or not. You have a right to privacy and do not have to justify this. Allow yourself the freedom of surfing the Web anonymously as well as of uploading and downloading data.
How does Steganos Internet Anonym VPN work?

A Virtual Private Network (VPN) establishes a tunnel between your computer and one of the Steganos VPN servers. All your activities on the Internet are then carried out through that tunnel. The tunnel encrypts all information that runs through it by using an SSL connection which protects the information from being eavesdropped – even by your ISP. SSL connections are, for instance, also used for online banking activities. The tunnel leads to one of the Steganos servers which, in turn, forwards the request onto the Web. This way you can act completely anonymously on the Internet. The Web sites you visit will merely see the IP address of the Steganos servers.

All you need to do is install the Steganos Internet Anonym VPN™ service on your machine. A setup wizard assists you in establishing the connection to the server and activating your account. Once your access has been activated, the main window displays the amount of GB you used within the current month, which gives you 100% control of the costs.



Jumat, 25 April 2008

In-building Coverage CDMA and TDMA

Now let's deal with another issue involving CDMA and TDMA. In-building coverage is something that many people talk about, but few people properly understand. Although CDMA has a slight edge in this department, due to a marginally greater tolerance for weak signals, all the technologies fair about the same. This is because the few dB advantage CDMA has is often "used up" when the provider detunes the sites to take advantage of this process gain.

So, while a CDMA phone might be able to produce a reasonable call with a signal level of -106 dBm, whereas a GSM phone might need -99 dBm to provide the same level of service, does this mean that CDMA networks will always have a 7 dB advantage? If all things were equal, then yes, but they aren't equal.

As I mentioned earlier, channel pollution is a big issue with CDMA networks and to keep channel pollution to a minimum in urban environments a CDMA provider needs to keep site overlap to a minimum. Subsequently, a CDMA network engineer will use that 7 dB advantage to his advantage by de-tuning the network accordingly. This means that CDMA users will frequently see markedly lower signal levels indoors than a GSM user will, but in the end it all works out about the same.

The most important aspect to in-building coverage is the proximity of the nearest site. When a site is located just outside of a building it can penetrate just about any building material. When a site is much further away however, the signals have a much harder time of getting past the walls of a structure.

When it comes to distance, remember that signals are subject to the "distance squared law". This means that signals decrease by the square of the distance. A site at 0.25 kilometers away will have 4 times the signal strength of a site at 0.50 kilometers away, and 16 times that of a site 1.0 kilometers away. Distance squared however is the rate of signal reduction in free space. Recent studies have shown that terrestrial communications are usually subject to rates as high as "Distance cubed", or even "Distance to the 4th". If the latter is true, then a site 1.0 kilometers away will actually be 256 times weaker than a site 0.25 kilometers away.

In-building penetration is therefore less a technology issue than it is an implementation issue. Service providers who have sites close to the buildings you commonly visit will inevitably look better than those who don't. Never use someone else's in-building experiences unless you expect to go in the same buildings as they do. You cannot make useful generalizations about in-building coverage based upon one person's experience.

CDMA does have one peculiarity concerning in-building penetration that does not affect TDMA. When the number of users on a channel goes up, the general level of signal pollution goes up in tandem. To compensate for this the CDMA system directs each phone to transmit with slightly more power. However, if a phone is already at its limit (such as might be the case inside a building) it cannot do anything to "keep up with the pack". This condition is known as "the shrinking coverage phenomenon" or "site breathing". During slow periods of the day you might find coverage inside a specific building quite good. During rush hour however, you might find it exceedingly poor (or non-existent).

Spectral Efficiency cdma, tdma

Channel capacity in a TDMA system is fixed and indisputable. Each channel carries a finite number of "slots", and you can never accommodate a new caller once each of those slots is filled. Spectral efficiency varies from one technology to another, but computing a precise number is still a contentious issue. For example, GSM provides 8 slots in a channel 200 kHz wide, while iDEN provides 3 slots in a channel only 25 kHz wide. GSM therefore consumes 25 kHz per user, while IS-136 consumes only 8.333 kHz per user. When Direct Connect is used on iDEN, 6 users can be stuffed into a single channel, thus only 4.166 kHz is consumer per user. There is also a new 6:1 interconnect CODEC coming for iDEN which will allow 6 phone users per channel.

One would be sorely tempted to proclaim that iDEN has 3 to 6 times the capacity of GSM. In a one-cell system this is certainly true, but once we start deploying multiple cells and channel reuse the situation becomes more complex. Due to GSM's better error management and frequency hopping the interference of a co-channel site is greatly reduced. This allows frequencies to be reused more frequently without a degradation in the overall quality of the service.

Capacity is measured in "calls per cell per MHz". An GSM system using N=4 reuse (this means you have 4 different sets of frequencies to spread out around town) the figure is 5.0 We get an efficiency value of 6.6 for N=3. Unfortunately I could not find any figures for iDEN systems, but based on similar figures released for the IS-136 system we can expect efficiency values of 6.0 to 10.0.

Computing this figure for CDMA requires that certain assumptions are made. Formulas have been devised, and using very optimistic assumptions CDMA can provide a whopping 45 users per cell per MHz. However, when using more pessimistic (and perhaps more realistic) assumptions, the value is 12. That still gives CDMA an almost 2:1 advantage over GSM, but questionable advantage over a well-implement iDEN system.

TDMA

Let's move away from CDMA now and have a look at TDMA. Before we can go any further though, I should note that there are actually three different flavors of TDMA in the PCS market. Each of these technologies implements TDMA in a slightly different way. The most complex implementation is, without a doubt, GSM. It overlays the basic TDMA principles with many innovations that reduce the potential problems inherent in the system.

To reduce the effects of co-channel interference, multipath, and fading, the GSM network can use something known as Frequency Hopping. This means that your call literally jumps from one channel to another at fairly short intervals. By doing this the likelihood of a given RF problem is randomized, and the effects are far less noticeable to the end user. Frequency Hopping is always available, but not mandated. This means that your GSM provider may or may not use it.

iDEN is a proprietary Motorola technology that no other company seems to participate in. Only Motorola makes iDEN phones, and only Motorola makes iDEN infrastructure equipment. Perhaps the company guards its technology on purpose. iDEN was initially deployed as an alternative to standard packet radio systems commonly used by public safety and business users. However, it also provided phone interconnect services that are extinguishable from phone services offered by the other PCS systems, as well as packet data services for web browsing and hooking up your laptop to the Internet.

Finally there is the old IS-136 technology, but this is now an officially dead technology. All of the North American providers who used it (Rogers, Cingular, and AT&T) are abandoning it in favor of GSM. The same is happening in other parts of the world where IS-136 was used. I therefore will not spend much time talking about this variation of TDMA.

Each of these TDMA technologies uses a different CODEC. GSM sports a CODEC called EFR (short for Enhanced Full Rate). This CODEC is arguable the best sounding one available in the PCS world. IS-136 used to sound horrible, but in the fall of 1997 they replaced their old CODEC with a new one. This new CODEC sounds much better than the old, but it doesn't quite match the GSM and CDMA entries.

TDMA systems still rely on the switch to determine when to perform a handoff. Unlike the old analog system however, the switch does not do this in a vacuum. The TDMA handset constantly monitors the signals coming from other sites, and it reports this information to the switch without the caller being aware of it. The switch then uses this information to make better handoff choices at more appropriate times.

Perhaps the most annoying aspect of TDMA system to some people is the obviousness of handoffs. Some people don't tend to hear them, and I can only envy those individuals. Those of us who are sensitive to the slight interruptions caused by handoffs will probably find GSM the most frustrating. It's handoffs are by far the most messy. When handoffs occur infrequently (such as when we are stationary or in areas with few sites), they really don't present a problem at all. However, when they occur very frequently (while travelling in an area with a huge number of sites) they can become annoying.

CDMA

Now that we have a rudimentary understanding of the two technologies, let's try and examine what advantages they provide. We'll begin with CDMA, since this newer technology has created the greatest "buzz" in the mobile communications industry.

One of the terms you'll hear in conjunction with CDMA is "Soft Handoff". A handoff occurs in any cellular system when your call switches from one cell site to another as you travel. In all other technologies this handoff occurs when the network informs your phone of the new channel to which it must switch. The phone then stops receiving and transmitting on the old channel, and it commences transmitting and receiving on the new channel. It goes without saying that this is known as a "Hard Handoff".

In CDMA however, every site are on the SAME frequency. In order to begin listening to a new site the phone only needs to change the pseudo-random sequence it uses to decode the desired data from the jumble of bits sent for everyone else. While a call is in progress the network chooses two or more alternate sites that it feels are handoff candidates. It simultaneously broadcasts a copy of your call on each of these sites. Your phone can then pick and choose between the different sources for your call, and move between them whenever it feels like it. It can even combine the data received from two or more different sites to ease the transition from one to the other.

This arrangement therefore puts the phone in almost complete control of the handoff process. Such an arrangement should ensure that there is always a new site primed and ready to take over the call at a moment's notice. In theory, this should put an end to dropped calls and audio interruptions during the handoff process. In practice it works quite well, but dropped calls are still a fact of life in a mobile environment. However, CDMA rarely drops a call due to a failed handoff.

A big problem facing CDMA systems is channel pollution. This occurs when signals from too many base stations are present at the subscriber's phone, but none are dominant. When this situation occurs the audio quality degrades rapidly, even when the signal seem otherwise very strong. Pollution occurs frequently in densely populated urban environments where service providers must build many sites in close proximity. Channel pollution can also result from massive multipath problems caused by many tall buildings. Taming pollution is a tuning and system design issue. It is up to the service provider to reduce this phenomenon as much as possible.

In defense of CDMA however, I should point out that the new EVRC CODEC is far more robust than either of the earlier CODECs. Because of its increased robustness it provides much more consistent audio in the face of high frame error rates. EVRC is an 8 kilobit CODEC that provides audio quality that is almost as good to the older 13 kilobit CODEC. Since CDMA consumes only as much of the "ether" as a user talks, switching everyone to an 8 kilobit CODEC was an inevitable move.

Don't confuse EVRC with the old (and unlamented) 8 kilobit CODEC implemented in the early days of CDMA deployment. That CODEC was simply awful, and very few good things could be said about it. EVRC is a far more advanced compression algorithm that cleans up many of the stability problems inherent in the two older CODECs. The sound reproduction is slightly muddier than the 13 kilobit CODEC, but the improvement in stability makes up for this.

Supporters often cite capacity as one CDMA's biggest assets. Virtually no one disagrees that CDMA has a very high "spectral efficiency". It can accommodate more users per MHz of bandwidth than any other technology. What experts do not agree upon is by how much. Unlike other technologies, in which the capacity is fixed and easily computed, CDMA has what is known as "Soft Capacity". You can always add just one more caller to a CDMA channel, but once you get past a certain point you begin to pollute the channel such that it becomes difficult to retrieve an error-free data stream for any of the participants.

The ultimate capacity of a system is therefore dependent upon where you draw the line. How much degradation is a carrier willing to subject their subscribers to before they admit that they have run out of useable capacity? Even if someone does set a standard error rate at which these calculations are made, it does not mean that you personally will find the service particularly acceptable at that error rate.

3G is the third generation

3G is the third generation of mobile phone standards and technology, superseding 2G. It is based on the International Telecommunication Union (ITU) family of standards under the International Mobile Telecommunications programme, IMT-2000.

3G technologies enable network operators to offer users a wider range of more advanced services while achieving greater network capacity through improved spectral efficiency. Services include wide-area wireless voice telephony, video calls, and broadband wireless data, all in a mobile environment. Additional features also include HSPA data transmission capabilities able to deliver speeds up to 14.4Mbit/s on the downlink and 5.8Mbit/s on the uplink.

Unlike IEEE 802.11 networks, 3G networks are wide area cellular telephone networks which evolved to incorporate high-speed internet access and video telephony. IEEE 802.11 (common names Wi-Fi or WLAN) networks are short range, high-bandwidth networks primarily developed for data.

Short Message Service (SMS)

Short Message Service (SMS) is a communications protocol allowing the interchange of short text messages between mobile telephone devices. The SMS technology has facilitated the development and growth of text messaging. The connection between the phenomenon of text messaging and the underlying technology is so great that in parts of the world the term "SMS" is used colloquially as a synonym for a text message from another person or the act of sending a text message (even when, as with MMS, a different underlying protocol is being used).

SMS as used on modern handsets was originally defined as part of the GSM series of standards in 1985 as a means of sending messages of up to 160 characters, to and from GSM mobile handsets. Since then, support for the service has expanded to include alternative mobile standards such as ANSI CDMA networks and Digital AMPS, as well as satellite and landline networks. Most SMS messages are mobile-to-mobile text messages, though the standard supports other types of broadcast messaging as well.

GSM security

GSM was designed with a moderate level of security. The system was designed to authenticate the subscriber using a pre-shared key and challenge-response. Communications between the subscriber and the base station can be encrypted. The development of UMTS introduces an optional USIM, that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user - whereas GSM only authenticated the user to the network (and not vice versa). The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation.

GSM uses several cryptographic algorithms for security. The A5/1 and A5/2 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United States; A5/2 is weaker and used in other countries. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertext-only attack, and in February 2008, Pico Consulting, Inc revealed its ability and plans to commercialize FPGAs that allow A5/1 to be broken with. The system supports multiple algorithms so operators may replace that cipher with a stronger one.

Kamis, 24 April 2008

IP Address Searcher v2.1.2

P Address Searcher is a powerful IP Address Search tool that helps you to search IP address, list all IP Address on your network, ping a host, trace IP, get MAC information, search a ip geographic location. IP Address Searcher 2.12 supports different languages (including English). It works with Windows 98/XP/Vista.

Minggu, 20 April 2008

Universal Service

Each Party shall administer any universal service obligation that it maintains or
adopts in a transparent, non-discriminatory, and competitively neutral manner and shall
ensure that its universal service obligation is not more burdensome than necessary for the
kind of universal service that it has defined

Independent Telecommunications Regulatory Bodies

1. Each Party shall ensure that its telecommunications regulatory body is separate from,
and not accountable to, any supplier of public telecommunications services. To this end,
each Party shall ensure that its telecommunications regulatory body does not hold a financial
interest or maintain an operating role in any such supplier.
2. Each Party shall ensure that the decisions and procedures of its telecommunications
regulatory body are impartial with respect to all interested persons. To this end, each Party
shall ensure that any financial interest that it holds in a supplier of public
telecommunications services does not influence the decisions and procedures of its
telecommunications regulatory body.

Conditions for Supplying Information Services

1. Neither Party may require an enterprise in its territory that it classifies as a supplier
of information services (which supplies such services over facilities that it does not own) to:
(a) supply those services to the public generally;
(b) cost-justify its rates for such services;
(c) file a tariff for such services;
(d) interconnect its networks with any particular customer for the supply of such
services; or
(e) conform with any particular standard or technical regulation for
interconnection for the supply of such services other than for interconnection
to a public telecommunications network.
2. Notwithstanding paragraph 1, a Party may take appropriate action, including any of
the actions described in paragraph 1, to remedy a practice of an information services supplier
that the Party has found in a particular case to be anti-competitive under its law or
regulation(s), or to otherwise promote competition or safeguard the interests of consumers.

Submarine Cable Systems

1. Each Party shall ensure that enterprises in its territory that operate submarine cable
systems accord non-discriminatory treatment for access to submarine cable systems.
2. Whether to apply paragraph 1 may be based on classification by a Party of such
submarine cable system within its territory as a public telecommunications service supplier.

Unbundling of Network Elements

(a) Each Party shall provide its competent body the authority to require that
major suppliers in its territory provide suppliers of public telecommunications
services of the other Party access to network elements on an unbundled basis
for the supply of those services on terms and conditions and at cost-oriented
rates that are reasonable and non-discriminatory.
(b) Which network elements will be required to be made available in its territory,
and which suppliers may obtain such elements, will be determined in
accordance with national law and regulation(s).
(c) In determining the network elements to be made available, each Party’s
competent body shall consider, at a minimum, in accordance with national
law and regulation:
(i) whether access to such network elements as are proprietary in nature
is necessary, and whether the failure to provide access to such
network elements would impair the ability of suppliers of public
telecommunications services of the other Party to provide the services
they seek to offer; or
(ii) other factors as established in national law or regulation,
as that body construes these factors.
Co-Location
4. (a) Each Party shall ensure that major suppliers in its territory provide to
suppliers of public telecommunications services of the other Party physical
co-location of equipment necessary for interconnection or access to
unbundled network elements on terms, conditions, and at cost-oriented rates
that are reasonable and non-discriminatory.
(b) Where physical co-location is not practical for technical reasons or because of
space limitations, each Party shall ensure that major suppliers in its territory
provide:
(i) alternative solutions; or
(ii) facilitate virtual co-location,
on terms, conditions, and at cost-oriented rates that are reasonable and non-discriminatory.
(c) Each Party may determine which premises shall be subject to subparagraphs
(a) and (b).
Resale
5. Each Party shall ensure that major suppliers in its territory:
(a) offer for resale, at reasonable rates,3 to suppliers of public
telecommunications services of the other Party, public telecommunications
services that such major supplier provides at retail to end users that are not
suppliers of public telecommunications services; and
(b) subject to Annex 13.4(5)(b), do not impose unreasonable or discriminatory
conditions or limitations on the resale of such services.
Number Portability
6. Each Party shall ensure that major suppliers in its territory provide number
portability to the extent technically feasible, on a timely basis, and on reasonable terms and
conditions.
Dialing Parity
7. Each Party shall ensure that major suppliers in its territory provide dialing parity to
suppliers of public telecommunications services of the other Party and afford suppliers of
public telecommunications services of the other Party non-discriminatory access to
telephone numbers and related services with no unreasonable dialing delays.
Interconnection
8. (a) General Terms and Conditions
Each Party shall ensure that major suppliers in its territory provide
interconnection for the facilities and equipment of suppliers of public
telecommunications services of the other Party:
(i) at any technically feasible point in the major supplier’s network;
(ii) under non-discriminatory terms, conditions (including technical
standards and specifications), and rates;
(iii) of a quality no less favorable than that provided by such major
supplier for its own like services, or for like services of non-affiliated
service suppliers or for like services of its subsidiaries or other
affiliates;
(iv) in a timely fashion, on terms, conditions (including technical
standards and specifications), and cost-oriented rates that are
transparent, reasonable, having regard to economic feasibility, and
sufficiently unbundled so that the supplier need not pay for network
components or facilities that it does not require for the service to be
provided; and
(v) on request, at points in addition to the network termination points
offered to the majority of users, subject to charges that reflect the cost
of construction of necessary additional facilities.
(b) Options for Interconnecting with Major Suppliers
Each Party shall ensure that suppliers of public telecommunications services
of the other Party may interconnect their facilities and equipment with those
of major suppliers in its territory pursuant to at least one of the following
options:
(i) a reference interconnection offer or other standard interconnection
offer containing the rates, terms, and conditions that the major
supplier offers generally to suppliers of public telecommunications
services; or
(ii) the terms and conditions of an existing interconnection agreement or
through negotiation of a new interconnection agreement.
(c) Public Availability of Interconnection Offers
Each Party shall require each major supplier in its territory to make publicly
available a reference interconnection offer or other standard interconnection
offer containing the rates, terms, and conditions that the major supplier offers
generally to suppliers of public telecommunications services.
(d) Public Availability of the Procedures for Interconnection
Each Party shall make publicly available the applicable procedures for
interconnection negotiations with major suppliers in its territory.
(e) Public Availability of Interconnection Agreements with Major Suppliers
Each Party shall:
(i) require major suppliers in its territory to file all interconnection
agreements to which they are party with its telecommunications
regulatory body, and
(ii) make publicly available interconnection agreements in force between
major suppliers in its territory and other suppliers of public
telecommunications services in such territory.
Leased Circuits Services4
9. (a) Each Party shall ensure that major suppliers in its territory provide enterprises
of the other Party leased circuits services that are public telecommunications
services, on terms, conditions, and at rates that are reasonable and
non-discriminatory.
(b) In carrying out subparagraph (a), each Party shall provide its
telecommunications regulatory body the authority to require major suppliers
in its territory to offer leased circuits that are part of the public
telecommunications services to enterprises of the other Party at flat-rate
prices that are cost-oriented.

Additional Obligations Relating to Conduct of Major Suppliers of Public

Treatment by Major Suppliers
1. Subject to Annex 13.4(1), each Party shall ensure that major suppliers in its territory
accord suppliers of public telecommunications services of the other Party non-discriminatory
treatment regarding:
(a) the availability, provisioning, rates, or quality of like public
telecommunications services; and
(b) the availability of technical interfaces necessary for interconnection.
Competitive Safeguards
2. (a) Each Party shall maintain appropriate measures for the purpose of preventing
suppliers who, alone or together, are a major supplier in its territory from
engaging in or continuing anti-competitive practices.
(b) For purposes of subparagraph (a), examples of anti-competitive practices
include:
(i) engaging in anti-competitive cross-subsidization;
(ii) using information obtained from competitors with anti-competitive
results; and
(iii) not making available, on a timely basis, to suppliers of public
telecommunications services, technical information about essential
facilities and commercially relevant information which are necessary
for them to provide public telecommunications services.

Obligations Relating to Interconnection with Suppliers of Public

1. Each Party shall ensure that suppliers of public telecommunications services in its
territory provide, directly or indirectly, interconnection with the suppliers of public
telecommunications services of the other Party.
2. In carrying out paragraph 1, each Party shall ensure, in accordance with its domestic
law and regulations, that suppliers of public telecommunications services in its territory take
reasonable steps to protect the confidentiality of commercially sensitive information of, or
relating to, suppliers and end-users of public telecommunications services and only use such
information for the purpose of providing those services.

Access to and Use of Public Telecommunications Networks and Services1

1. Each Party shall ensure that enterprises of the other Party have access to and use of
any public telecommunications service, including leased circuits, offered in its territory or
across its borders, on reasonable and non-discriminatory terms and conditions, including as
set out in paragraphs 2 through 6.
2. Each Party shall ensure that such enterprises are permitted to:
(a) purchase or lease, and attach terminal or other equipment that interfaces with
the public telecommunications network;
(b) provide services to individual or multiple end-users over any leased or owned
circuit(s);
(c) connect owned or leased circuits with public telecommunications networks
and services in the territory, or across the borders, of that Party or with
circuits leased or owned by another person;
(d) perform switching, signaling, processing, and conversion functions; and
(e) use operating protocols of their choice.
3. Each Party shall ensure that enterprises of the other Party may use public
telecommunications services for the movement of information in its territory or across its
borders and for access to information contained in databases or otherwise stored in
machine-readable form in the territory of either Party.
4. Further to Article 23.1 (General Exceptions) and notwithstanding paragraph 3, a
Party may take such measures as are necessary to:
(a) ensure the security and confidentiality of messages; or
(b) protect the privacy of non-public personal data of subscribers to public
telecommunications services,
subject to the requirement that such measures are not applied in a manner that would
constitute a means of arbitrary or unjustifiable discrimination or disguised restriction on
trade in services.
5. Each Party shall ensure that no condition is imposed on access to and use of public
telecommunications networks or services, other than that necessary to:
(a) safeguard the public service responsibilities of providers of public
telecommunications networks or services, in particular their ability to make
their networks or services available to the public generally; or
(b) protect the technical integrity of public telecommunications networks or
services.
6. Provided that conditions for access to and use of public telecommunications
networks or services satisfy the criteria set out in paragraph 5, such conditions may include:
(a) a requirement to use specified technical interfaces, including interface
protocols, for interconnection with such networks or services; and
(b) a licensing, permit, registration, or notification procedure which, if adopted or
maintained, is transparent and applications filed thereunder are processed
expeditiously.

Rabu, 16 April 2008

Ipswitch WS FTP Pro 2007

WS_FTP Professional gives you lightning-fast transfer speeds, along with industry-leading security with 256-bit AES over SSL / FTPS & SSH / SFTP connections, fully-integrated PGP mode, and file verification mechanisms, and time-saving automation features like, scheduling, backup, synchronization, search, compression, scripting and email notifications.

Senin, 07 April 2008

Phone Calls Filter v1.0.2.0

Are you bothered with unwanted phone calls ? not anymore ! Block phone call by setting filters for incoming phone calls. use specific answering modes - such as: hanging up, personalized greetings etc... so that all your unwanted phone calls will go unnoticed. Once you turn off your telephone ring you will be able to listen the rings of only chosen phone calls - from your computer. Undesired callers will be blocked or keep ringing unanswered. You will not be interrupted anymore...

* Blocks unwanted phone call.
* Play specific greeting for each caller.
* Support UNKNOWN, OUTOFAREA etc.. calls formats.
* Calls log.
* Adding remarks, flags and priority for each call.
* Display of voice and speech, while a call is incoming, and when it ends.
* Caller ID- Tapi or Comm based.
* Presents the call on display, including caller name, caller number, and picture.
* A personalized unique answering mode, activating different options, for each contact.
* Filter list - a personalized answering mode, and a different alert sign for each contact.
* Create greetings with Speaker or TTS 5.1.
* Dialer - makes the outgoing phone call, directly from your PC.
* Powerfull search.
* Advanced and user-friendly graphic interface.
* Registration log for all calls and events.
* Runs as a service.
* And much more...

Jumat, 04 April 2008

NCH Switch Plus v1.24

Switch audio file conversion software is a sound file format converter for Windows or Mac. It can convert audio files from many different file formats into mp3, wav or wma files including wav to mp3, mp3 to wav, wma to mp3 and much more (see the supported formats list below).
Switch audio file converter is very easy to use. Just add the files you want to convert to the list, select the format you want to use, and then click the convert button.

Kamis, 03 April 2008

Motorola Phone Tools 4.5 Xp/Vista

Buy Motorola Phone Tools 4.0 to download and back-up your contacts, edit pictures and create ringtones. Personalize your wireless communications.
Motorola Phone Tools 4 is the ultimate in personalization and protection application. Download Phone Tools 4 and immediately start taking advantage of a wide range of cool capabilities.

Synchronize
Phone Tools 4 ensures you'll never lose your data if you lose your phone. Transfer and store all your phone numbers on your computer. With just one click synchronize all your phone contacts, calendar and tasks with major applications including Microsoft Outlook, Outlook Express, Lotus Notes or the in-built Motorola Phone Tools phone book and calendar client. An intuitive synchronization wizard guides you through the process.

Personalize*
Use Phone Tools 4 to personalize your phone by creating your own ring tones and adding personal pictures or videos. Phone Tools 4 software lets you transfer and store pictures taken with your cell phone camera to your computer, so you never have to worry about filling up your cell phone memory again!

Text Message*
With Motorola Phone Tools 4, you can choose to send text messages from your computer keyboard for greater speed and simplicity, minimizing dependence on the smaller phone keypad for typing SMS.

Go Online*
Phone Tools 4 lets you use your cell phone as a modem to connect your laptop to the Internet virtually anytime, anywhere... even at the airport, in a car, bus or other vehicle.

Connect with Bluetooth®**
Motorola Phone Tools 4 software is already Bluetooth® compatible. If your phone has Bluetooth® wireless technology, Phone Tools 4 allows you to connect your phone to your PC using Bluetooth® technology, provided your PC is also Bluetooth® compatible. If it is not, combine Motorola Phone Tools with Motorola's Bluetooth® PC Adapter and make your computer Bluetooth® ready (PC Adapter PC850 product sold separately.)

Upgrade
Included in the purchase price of the downloadable Motorola Phone Tools 4 are upgrades to newer versions of the Phone Tools software.

Mobile Phone Tools 4.0 System Requirements

* Windows® 2000, XP, Vista Operating Systems
* Pentium 466MHz or higher CPU
* 64MB RAM
* 120MB Free Hard Drive Disk Space
* 256 Color VGA or SVGA monitor
* MPC2 compatible CD ROM drive
* One available USB port
* Mouse or other pointing device

Connection Options

* Bluetooth®
* Cable (Mini USB or CE Bus)

What you get:
* Quick Start Guide (mailed separately)

Free Call

Flash Capture is the right tool you are looking for. This Internet Explorer add-on tool enables you to save, snapshot, email, and categorize Flash files (.swf) in just one click. Right click on the Flash you want to save Select Save Flash As... command


Point to the Flash you want to save, a floating toolbar will appear over the corner of that Flash, if you want to specify the file name and location.
Select the folder name under Save Flash To command, if you want to save it to the selected folder silently, with its default

Wireless Hacking Live-CD (FBI version)

Wireless Hacking Live-CD (FBI version){Must Have}

Hack a WLAN / Wireless Access Point
AND MORE, IT GOT EVERY PROGRAM THAT THE FBI WOULD USE!


Live Cd For Wireless Hacking, Also Used By The Fbi
This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
- Live CD with all the tools you need to hack a WLAN / wireless Access point -
Linux Live-CD - OS runs from CD - 635 mb - .iso
- also used by the FBI …

WEP Hacking - The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104. The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, “It doesn’t matter if you use 128 bit WEP keys, you are vulnerable!”
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.
WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104.
The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process.
An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.
After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.
This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.
Basic Directions:

1)Boot from cd
2)get the wep key
3)write it down
4)reboot into windows
5)connect using wep key.

Proxy Switcher Pro vv3.9.0 4059 portable

Different internet connections do often require completely different proxy server settings and

it's a real pain to change them manually. Proxy Switcher offers full featured connection management

solution.

This includes flexible proxy server list management, proxy server tester and anonymous surfing

capabilities.


Proxy Switcher Features

Change proxy settings on the fly
Automatic proxy server switching for anonymous surfing
Works with Internet Explorer, Firefox, Opera and others.
Flexible proxy list management
Proxy server availability testing
Anonymous proxy server list download

1st Network Admin v2.21

1st Network Admin offers a comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to almost every corner of Windows for all PC workstations you have in your network, apply executable patches to them remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. 1st Network Admin is very useful for Internet cafes, public-access terminals, libraries, large corporations, schools and for other applications where you have to deal with lots of stand-alone PC workstations to be secured and constantly maintained. Once you install and configure the remote client service application on all your remote computers, you do not need to physically attend those computers anymore. You just change security settings and apply executable patches form only your administrator's computer from almost everywhere where your corporate network is accessible by TCP/IP protocol. In total, 1st Network Admin supports over 600 different security restrictions, options and tweaks that allow you to completely secure your workstations

Selasa, 11 Maret 2008

FreeCall

Using this VOIP program, you can call landline numbers in any country for FREE.

FreeCall is still a Freeware app but you only get 300 minutes a week.

To bypass this restriction:

Keep the setup.exe. Freecall's protection system is quite flawed, when the program announces you cannot use any more minutes = Uninstall and reinstall and it will reset your 300 minutes which only takes a moment.

A)You MUST make an account with the program when it loads up. Then when your logged in (it will say at the bottom: 'The client is logged on')

B)Go to the dial pad TAB, ignore the on screen buttons, at the bottom type in your number and remember you need to add country codes at the beginning - NO spaces in the number either.

C) And it does do all countries for free - i've used it from NZ to england, USA, Spain and Aussie and they used it back.

D) If it didn't work, you need to check your firewall settings etc, this is an obvious but a program like this needs full access.

Sabtu, 01 Maret 2008

Radio


Radio is the transmission of signals, by modulation of electromagnetic waves with frequencies below those of visible light. Electromagnetic radiation travels by means of oscillating electromagnetic fields that pass through the air and the vacuum of space. Early speculation that this required a medium of transport, called luminiferous aether, were found to be false. Information is carried by systematically changing (modulating) some property of the radiated waves, such as their amplitude or their frequency. When radio waves pass an electrical conductor, the oscillating fields induce an alternating current in the conductor. This can be detected and transformed into sound or other signals that carry information.

James Clerk Maxwell, a Scottish scientist, developed the theoretical basis for explaining electromagnetism. He predicted that electric and magnetic fields can couple together to form electromagnetic waves. Heinrich Hertz, a German scientist, is credited with being the first to produce and detect such waves at radio frequencies, in 1888, using a sparkgap transmitter in the Ultra High Frequency range.

In 1893, Nikola Tesla, in America, first demonstrated the feasibility of wireless communications. Guglielmo Marconi, an Italian inventor, was one of the first to develop commercial workable radio communication. It is supposed that he sent and received his first radio signal in Italy in 1895.

Kamis, 28 Februari 2008

phone


Case Study: The University of Arizona Taps NEC for Large WLAN, VoIP Deployment
Founded in 1885, The University of Arizona (UA), with about 37,000 students, is considered by academic experts to be among the foremost student-centered institutions in the United States. It also is ranked among the nation’s top 20 public research institutions. With a dedicated, world-class faculty in fields as diverse as astronomy, plant science, biomedical science, business, law, music and dance,

Net Neutrality Redux: Markey Approaches the Issue from a New Angle
Rep. Ed Markey has a new take on how to approach net neutrality. The Massachusetts Democrat has proposed simply this: porting nondiscrimination philosophies from Title II of the 1934 Communications Act to Title I, where they would apply to broadband.The four amendments in the Internet Freedom Preservation Act of 2008 echo the FCC’s broadband policy statement in their support of

Microsoft Thinks Outside Business Box in the Battle for the Wireless Prosumer
Microsoft Corp.'s wireless division wants you. And everyone else as well. In a shift in strategy announced last week at Mobile World Congress in Barcelona, the software giant noted, a bit creepily, that it will be our constant "companion in a world of change." In fact, it is now actively targeting the con-sumer -- or, more specifically, the prosumer, which

Case Study: Appia Brings IP Justice to Indianapolis-based Law Firm
Krieg DeVault, a major law firm headquartered in Indianapolis now has disaster recovery for its voice services, thanks to the managed IP communications solution provided by Appia Communications.The ClientKreig DeVault is a law firm with 230 employees. The firm is headquartered in Indianapolis, and has additional offices in Indiana and Chicago. Krieg DeVault is one of the first law firms

Partners Go Exclusive With Mitel Unified Communications
Three months after introducing its Exclusive BusinessPartner (EBP) program, Mitel has more than 100 indirect sales partners as part of the tier, which offers resellers strategic advantages in selling and servicing Mitel's portfolio of unified communications solutions in ex-change for exclusivity.Mitel, which merged with Inter-Tel last year, has more than 800 U.S. indirect sales partners. The EBP program was introduced

Quantifying the Impact of UNE-P Deregulation
For the first time, the impact of UNE-P deregulation is becoming quantifiable. New data are showing what we all now know -- that few CLECs operate on a resale ba-sis, choosing either commercial agreements or their own facilities to replace the preferred competitive model of the late ‘90s.A December 2007 FCC report on local phone competition shows the migration of

Case Study: Psytechnics Helps Friends Provident With Voice Performance Management
The client in this case study is Friends Provident, the FTSE 100 life and pensions company.ProblemIn the financial services industry, quality of customer service can be more important to revenue growth than product performance. In a competitive market, the quality of customer-facing staff is critical in fostering customer loyalty, and ultimately in driving revenue growth. Factors such as the time

FCC Revises Anti-Slamming Rules
In January, the Federal Communications Commission released its fourth report and order modifying its rules against slamming, or unauthorized carrier changes - a move that should eliminate the confusing and disputable components of the verification process, thereby minimizing carriers' exposures to federal and state slamming liability.The changes, which stem from proposals issued by the Commission as far back as 2003, will

Editor's Letter: Open for Business
As you are reading this letter, the 700MHz spectrum auction will be in full swing. At press time, just two weeks before the auction’s start on Jan. 24, it’s unclear which companies will be the winners. It’s also unclear when we’ll know who the winners are since the auction has not set a close date. The auction will end when

Not Necessarily News: Ma Bell or Ma Gray?
Else the Bell a Liar CallWith the name Bell, you’d think Alexander Graham was destined to invent the telephone. However, a new book, "The Telephone Gambit: Chasing Alexander Graham Bell’s Secret" by Seth Shulman, casts doubt on Bell’s role in the invention of the telephone based on Bell’s own laboratory notebooks and voluminous correspondence. Author Shulman says he discovered a

Rabu, 27 Februari 2008

history of Telecommunications


history of telecommunication however it was not until the 1830s that electrical began with the use of smoke signals and drums in Africa, the Americas and parts of Asia. In the 1790s the first fixed semaphore systems emerged in Europetelecommunication systems started to appear. This article details the history of telecommunication and the individuals who helped make telecommunication systems what they are today.

History of telecommunication is an important part of the larger history of communication.

A replica of one of Chappe's semaphore towers.

Early telecommunications

Early telecommunications included smoke signals and drums. Drums were used by natives in Africa, New Guinea and South America, and smoke signals in North America and China. Contrary to what one might think, these systems were often used to do more than merely announce the presence of a camp.
In 1792, a French engineer, Claude Chappe built the first visual telegraphy (or semaphore) system between Lille and Paris. This was followed by a line from Strasbourg to Paris. In 1794, a Swedish engineer, Abraham Edelcrantz built a quite different system from Stockholm to Drottningholm. As opposed to Chappe's system which involved pulleys rotating beams of wood, Edelcrantz's system relied only upon shutters and was therefore faster. However semaphore as a communication system suffered from the need for skilled operators and expensive towers often at intervals of only ten to thirty kilometres (six to nineteen miles). As a result, the last commercial line was abandoned in 1880.