List/Grid Tag Archives: Telecom

Why 2G cellular Networks will still play a Big role

Why 2G cellular Networks will still play a Big role

The biggest buzzword in today’s mobile market is 4G LTE. Yes, it represents something real: a network upgrade that provides faster data speeds and more efficient transfers. But it wasn’t… Read more »

Airtel Launches 4G LTE in India

Airtel Launches 4G LTE in India

Where the world is buzzing around the Long Term Evolution LTE, a 4G technology, India is still on its 3G and 3.5G speeds of HSDPA. The government of India had… Read more »

Google buys 6,000 Nortel Patents, Opens them up

Google buys 6,000 Nortel Patents, Opens them up

Ruthless Software Patents are Evil, claims the industry’s top innovators. Not only do they prevent good things from happening, they often aren’t worth the trouble. The tech world has recently… Read more »

Verizon launches iPhone 4, What’s New

Verizon launches iPhone 4, What’s New

Apple and Verizon have just announced the big thing, the wait is finally over after 2 long years of Rumors, the Verizon iPhone. iPhone comes to America’s most Reliable wireless… Read more »

How to Hack GSM Nework, Phone

How to Hack GSM Nework, Phone

A Group of researchers demonstrated a start-to-finish means of monitoring an encrypted GSM cellphone calls and text messages, using only sub-$15 telephones as network “sniffers,” attached to a laptop computer … Read more »

As part of this background communication, GSM networks send out identifying information, as well as "keepalive" messages and empty spaces are filled with buffered bytes. Truth be told, a new GSM standard was put in place several years ago to turn these buffers into random bytes, they in fact remain largely identical today, under a much older standard. Sticking to older standards enabled hackers to predict with a high degree of probability the plain-text content of these encrypted system messages. This, combined with a 2 terabyte table of pre-computed encryption keys (a so-called rainbow table), allows a cracking program to discover the secret key to the session's encryption in about 20 seconds. (Rainbow tables are usually used in all kinds of Brute-force password hacking).

Many GSM operators reuse these session keys for several successive communications, allowing a key extracted from a test SMS to be used again to record the next telephone call, minimizing the need for recomputation.

The process was demonstrated using their software to sniff the headers being used by a phone, extract and crack a session-encryption key, and then use this to decrypt and record a live GSM call between two phones in no more than a few minutes.

Who sued Whom: Mobile, Telecom Lawsuits

Who sued Whom: Mobile, Telecom Lawsuits

There’s a utter chaos in the Mobile world where each one is fighting to win the crown. The real fight is ON between Apple and Google. No brand has left… Read more »

Nokia Siemens buys Motorola Wireless, boost 4G Networks

Nokia Siemens buys Motorola Wireless, boost 4G Networks

The Telco equipment manufacturer giant, Nokia Siemens Networks, has agreed to purchase the network equipment division of Motorola for $1.2 billion. The business proposition is easy: The dying Motorola’s business… Read more »

How Firmware Upgrade can Fix iPhone 4 Signal, Reception Issues

How Firmware Upgrade can Fix iPhone 4 Signal, Reception Issues

Everyone seems to be complaining about the  iPhone 4 signal Reception issues, when held Incorrectly.  Holding iPhone 4 in left hand covering left side’s bottom bridges the left and bottom… Read more »

Cisco to Launch Android Tablet for Real-time Collaboration

Cisco to Launch Android Tablet for Real-time Collaboration

iPad is definitely revolutionary and thats why Apple still sells One of them every 2-3 seconds. Thanks to the popularity of Tablets, all eyes are now on Chrome OS Tablet… Read more »

Verizon: 4G Network in November, iPhone 4 in January 2011

Verizon: 4G Network in November, iPhone 4 in January 2011

Apple might have sold iPhone 4 in millions in its first week but it could have been way better if it had not been exclusive on AT&T, in U.S. The… Read more »

Reverse Phone Lookup – Weapon of Choice for Unsolicited Calls

Reverse Phone Lookup – Weapon of Choice for Unsolicited Calls

Technology always gives you a double-edged sword. The one that lets you cut through the gates, and the other side can cut the holding hand. Similar the story of Traceability… Read more »

Leveraging Cloud Computing to Drive Mobile Wireless Networks

Leveraging Cloud Computing to Drive Mobile Wireless Networks

Planning and building a Wide area Wireless Network could be painfully challenging.  Mobile service Providers have faced different kinds of challenges in Maintaining the 3G network throughout countries like US, UK, India,… Read more »

Open Source GSM Base Station [OpenBTS]

Open Source GSM Base Station [OpenBTS]

Closed Technologies have had the enough, the future is bound to be open. I can’t think of a stream where Open source has not contributed. In few of the relatively… Read more »

Airtel acquires Bangladesh-based Telecom

Airtel acquires Bangladesh-based Telecom

Bharti Airtel, India’s mobile and Internet services giant having 118 million subscribers, will acquire 70 percent stake in Warid Telecom International, 4th largest  mobile operator in Bangladesh. The acquisition is… Read more »

In India, 25 Million Chinese Phones Die Today

In India, 25 Million Chinese Phones Die Today

Indian Government has taken a big step to counter Mobile Phone Piracy. MSAI, Mobile standards Authority of India)  has put down a new rule abiding to which, cellular operators will… Read more »

© 2017 Geeknizer. All rights reserved. XHTML / CSS Valid.
Designed by taranfx.