Question about Cell Phones

1 Answer

I have a THOMSON MX29391 telephone (FACITEL CLASS-X). I would like to known if is possible to mask (with asterisks or another character) the dialed number. At my organization, an AUTHORIZATION CODE is required to make external calls, so the code is revealed on the display. ¿May I have a copy of the telephone service manual?.

Posted by on

  • p3rs3o Oct 18, 2010

    No problem. What do I need?

×

1 Answer

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points

    All-Star:

    An expert that got 10 achievements.

    MVP:

    An expert that got 5 achievements.

    Vice President:

    An expert whose answer got voted for 100 times.

  • Master
  • 712 Answers

Are you ready to pay for a service manual?

Posted on Oct 16, 2010

×

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

Our shaw pvr recording symbols have now turned into snowflake shapes


Disconnect the AC power from the PVR.
Reconnect it.
Wait a few minutes for the device to "call home" to completely reset itself.
Then, press LIST to show the recordings, instead of those "asterisk" characters.
Failing that, telephone Shaw to get free technical support.

Mar 18, 2012 | Televison & Video

Tip

Great Way to Reset many kinds of Passwords with the newest tools


Every month (if you're lucky), corporate information technology forces you to change your e-mail, network and other log-in passwords.
On top of that, there are numerous websites and accounts that demand passwords for access. A recent survey by RSA Security, a Bedford, Mass., consulting company that advises businesses on security issues, found that one in five business people are juggling more than 15 passwords.
Managing this "password inflation" leads people to get lazy, using easily guessed words or dates and writing them down where they can easily be found. Two-thirds of the respondents to RSA's study said they knew co-workers who kept their passwords on pieces of paper, and 40 per cent have seen passwords on Post-it notes stuck on workstations. The study also found that at some large companies, as many as half of all requests flowing into IT help desks involved forgotten or compromised passwords.
Passwords people choose are, on average, very weak. People are underestimating the level of ingenuity and determination on the part of hackers.
This is very boring when forgot your password, but don't think it trouble.
Once I met the same problem.
And my friend recommand me to free download a software to recovery password for Windows, Excel, Word, Access, PowerPoint, Outlook, Outlook Express, PDF, RAR/WinRAR, ZIP/WinZIP, MSN, AOL, Google Talk, Paltalk, Trillian, Miranda, Opera, Firefox and IE Browser, etc. Over 21 types of passwords can be Recovered instantly. Until now, these password recovery tools are the fastest on the market, the easiest to use and the least expensive...
Called Password Recovery Bundle
Password Recovery Bundle is a multifunctional tool to recovery many kinds of password.
http://www.recoverlostpassword.com/products/passwordrecovery.html

It provides three password attack modes to enhance its performance to crack the password. They are Brute-force attack, Brute-force with Mask attack, and Dictionary attack.
Brute-force Attack: It means the program will do a full-scale search and try all possibilities randomly in order to get the guess matched with the password and recover it. However, this mode is not as efficient as the other two attacks when the password is long and complex. As the length of the password increases, so does the number of possible passwords, in this way the program will do a lot more times of guess tests, sometimes a dramatically more times than the other two attacks. Obviously, this method is unlikely to be practical unless the password is relatively small and simple.
Brute-force with Mask Attack: What's Mask? In the field of decryption, mask is a commonly used term refers to the password features you still remember. For example, the possible password length, any digits, letters, special characters like pond, dollar, or asterisk in the password; what is the fist and last characters of the password, etc. You can use this attack if you still remember part of your password. For example, if you still remember your password is 4 characters and begins with "z", then you can define the mask as "z???". Thus reduces the detecting scale for the program, as it will only seek for the last 3 characters instead of 4 characters of the whole. To use this attack, a password mask must be defined.
Dictionary Attack: This attack is highly recommended as it offers a smarter access to the password recovery. If use properly, it is the fastest when compared with the above two attacks. This attack is intended to seek the possible password based on a dictionary. Then what's a dictionary? Dictionary is a text file, which can be simply interpreted as a library listing the password elements. The program will just base on this dictionary to detect the password. This dictionary can be the integrated one or the one you provide. The integrated dictionary is a text file listing common character combinations, such as a, ab, 123, 4, AB, etc. that people may frequently use for passwords. You can also create a dictionary by listing your character sets that you frequently use to let the program base on when seeking passwords, such as your name, birthplace, birthday, etc. If so, the seeking scope will be largely reduced and it is bound to save time for the process.

on Aug 03, 2010 | Computers & Internet

Tip

Great Way to Reset many kinds of Passwords


Every month (if you're lucky), corporate information technology forces you to change your e-mail, network and other log-in passwords.
On top of that, there are numerous websites and accounts that demand passwords for access. A recent survey by RSA Security, a Bedford, Mass., consulting company that advises businesses on security issues, found that one in five business people are juggling more than 15 passwords.
Managing this "password inflation" leads people to get lazy, using easily guessed words or dates and writing them down where they can easily be found. Two-thirds of the respondents to RSA's study said they knew co-workers who kept their passwords on pieces of paper, and 40 per cent have seen passwords on Post-it notes stuck on workstations. The study also found that at some large companies, as many as half of all requests flowing into IT help desks involved forgotten or compromised passwords.
Passwords people choose are, on average, very weak. People are underestimating the level of ingenuity and determination on the part of hackers.
This is very boring when forgot your password, but don't think it trouble.
Once I met the same problem.
And my friend recommand me to free download a software to recovery password for Windows, Excel, Word, Access, PowerPoint, Outlook, Outlook Express, PDF, RAR/WinRAR, ZIP/WinZIP, MSN, AOL, Google Talk, Paltalk, Trillian, Miranda, Opera, Firefox and IE Browser, etc. Over 21 types of passwords can be Recovered instantly. Until now, these password recovery tools are the fastest on the market, the easiest to use and the least expensive...
Called Password Recovery Bundle
Password Recovery Bundle is a multifunctional tool to recovery many kinds of password.
http://www.recoverlostpassword.com/products/passwordrecovery.html

It provides three password attack modes to enhance its performance to crack the password. They are Brute-force attack, Brute-force with Mask attack, and Dictionary attack.
Brute-force Attack: It means the program will do a full-scale search and try all possibilities randomly in order to get the guess matched with the password and recover it. However, this mode is not as efficient as the other two attacks when the password is long and complex. As the length of the password increases, so does the number of possible passwords, in this way the program will do a lot more times of guess tests, sometimes a dramatically more times than the other two attacks. Obviously, this method is unlikely to be practical unless the password is relatively small and simple.
Brute-force with Mask Attack: What's Mask? In the field of decryption, mask is a commonly used term refers to the password features you still remember. For example, the possible password length, any digits, letters, special characters like pond, dollar, or asterisk in the password; what is the fist and last characters of the password, etc. You can use this attack if you still remember part of your password. For example, if you still remember your password is 4 characters and begins with "z", then you can define the mask as "z???". Thus reduces the detecting scale for the program, as it will only seek for the last 3 characters instead of 4 characters of the whole. To use this attack, a password mask must be defined.
Dictionary Attack: This attack is highly recommended as it offers a smarter access to the password recovery. If use properly, it is the fastest when compared with the above two attacks. This attack is intended to seek the possible password based on a dictionary. Then what's a dictionary? Dictionary is a text file, which can be simply interpreted as a library listing the password elements. The program will just base on this dictionary to detect the password. This dictionary can be the integrated one or the one you provide. The integrated dictionary is a text file listing common character combinations, such as a, ab, 123, 4, AB, etc. that people may frequently use for passwords. You can also create a dictionary by listing your character sets that you frequently use to let the program base on when seeking passwords, such as your name, birthplace, birthday, etc. If so, the seeking scope will be largely reduced and it is bound to save time for the process.

on Jul 13, 2010 | Computers & Internet

1 Answer

I want to fax from new zealand to australia. how about i do it...........


In the setup you should enter your the fax number in the internationally standardised format, i.e.

in accordance with the following strict sequence:

??  The "+" (plus) character (by pressing

key)

??  Your Country Code( "64" for New Zealand)

??  Your local area code minus any leading "0"

??  A space

??  Your number on the local exchange, using spaces to aid readability as appropriate.


1 Press Menu/Set, 0, 3.

2 Enter your fax number (up to 20 characters).

Press Menu/Set.

3 Enter your telephone number (up to 20 characters).

Press Menu/Set. (If the telephone number and fax number are the same, enter the same number again.)

Note

??  You cannot enter a hyphen in the number.

To enter a space press once between numbers.

??  The telephone number you enter is only used for Cover Page features.


4 Use the dial pad to enter your name (up to 20 characters).

Press Menu/Set.

5 Press Stop/Exit.

Note

If the Station ID has already been

programmed, the LCD will ask you to press 1

to make a change or 2 to exit without

changing.

3.Station ID
??²
Now dial the fax number of australia 0061............ and send fax.

Jun 02, 2011 | Brother IntelliFax-2820 Laser Fax

1 Answer

How to enter * insted of words in text fields in html programming language


in order to display * instead of words in the text field you need to specify the input type as 'password' as shown below-

<html>
<body>

<form action="">
Password: <input type="password" name="password" />
</form>

<p><b>Note:</b> The characters in a password field are masked (shown as asterisks - * )</p>

</body>
</html>

Jul 26, 2010 | Creative Services Software Training For...

Tip

How to remove Microsoft Office password


clip_image002_thumb1.jpg Forgot Office file password? How to remove and open your file?
Do you have the experience that you forget the password when you are ready to open an MS Office document, such as Office, Excel, Word, Access, PowerPoint, Adobe PDF, and so on. Of course, I was puzzle by this problem. How should we do? Fortunately, a friend of mine commends me a handy and easy to use tool that can recover MS Office passwords. That is Accent Office Password Recovery which was published by SmartDoctor. Certainly, you can recover the password of other MS Office documents just as a hacker, but this does not have business with me absolutely. Following is the detailed introduction of Password Recovery Bundle.
clip_image004_thumb1.jpg
Password Recovery Bundle is an"all-in-one" tool that helps us recover lost or forgotten passwords to our documents created in Microsoft Office applications, such as: Office, Excel, Word, Access, PowerPoint, Adobe PDF also WinRAR/RAR and WinZIP/ZIP, Windows. Some types of password can be instantly restored. For other passwords there are three attack types including a brute force attack with a mask and advanced options while attacking using a dictionary. Start recovering passwords immediately with the easy-to-use graphical interface which includes context help, Task Creation Wizard and a step-by-step tutorial.
Password Recovery Bundle restores the passwords from popular MS Office applications and allows us to regain access to our information using Brute-force attack, Brute-force with Mask attack, and Dictionary attack.
  • Brute-force Attack: It means the program will do a full-scale search and try all possibilities randomly in order to get the guess matched with the password and recover it. However, this mode is not as efficient as the other two attacks when the password is long and complex. As the length of the password increases, so does the number of possible passwords, in this way the program will do a lot more times of guess tests, sometimes a dramatically more times than the other two attacks. Obviously, this method is unlikely to be practical unless the password is relatively small and simple.
  • Brute-force with Mask Attack: What’s Mask? In the field of decryption, mask is a commonly used term refers to the password features you still remember. For example, the possible password length, any digits, letters, special characters like pond, dollar, or asterisk in the password; what is the fist and last characters of the password, etc. You can use this attack if you still remember part of your password. For example, if you still remember your password is 4 characters and begins with "z", then you can define the mask as "z???". Thus reduces the detecting scale for the program, as it will only seek for the last 3 characters instead of 4 characters of the whole. To use this attack, a password mask must be defined.
  • Dictionary Attack: This attack is highly recommended as it offers a smarter access to the password recovery. If use properly, it is the fastest when compared with the above two attacks. This attack is intended to seek the possible password based on a dictionary. Then what’s a dictionary? Dictionary is a text file, which can be simply interpreted as a library listing the password elements. The program will just base on this dictionary to detect the password. This dictionary can be the integrated one or the one you provide. The integrated dictionary is a text file listing common character combinations, such as a, ab, 123, 4, AB, etc. that people may frequently use for passwords. You can also create a dictionary by listing your character sets that you frequently use to let the program base on when seeking passwords, such as your name, birthplace, birthday, etc. If so, the seeking scope will be largely reduced and it is bound to save time for the process.
Password Recovery Bundle interface is straightforward and easy to use. As shown in the screenshot at the right, there is a menu bar and a toolbar to manage the program. There are also hot key combinations to provide a quick access to the main menu options. The largest section is an information pane showing the progress and status of the program. There is a context help pane below which provides brief help information. Once we are familiar with the main features of the interface, we can proceed with the main function of the program �C password recovery. This product may cause our anti-virus software to show an alert!

on Jun 28, 2010 | Computers & Internet

Tip

How to figure out your default subnet mask


A subnet mask is a 32-bit binary number, very similar to an IP address. And like an IP address, the subnet mask is usually expressed as a set of four octets written in decimal form, with each octet separated by a period.

The subnet mask is used by routers and switches to determine which part of a computer or other device's IP address is the network identifier, and which part is the host identifier. There are three default subnet masks, one for each of the IP classes A, B, or C. The default subnet masks are:

Class A = 255.0.0.0
Class B = 255.255.0.0
Class C = 255.255.255.0

To determine the default subnet mask for your network, all you need to do is see which class your network falls into. A network's class is assigned based on the first octet (the set of digits before the first period) of the IP address. For example, to find out which class the network 123.22.8.0 belongs to, you would see where "123" fits into the following table:

First Octet: Class:
1-126 = Class A
128-191 = Class B
192-223 = Class C

So for the example above, 123.22.8.0 is a Class A network, which means it would have a default subnet mask of 255.0.0.0.

Most home and office networks will be Class C networks, so your default subnet mask will typically be (you guessed it) 255.255.255.0. Not all networks use the default subnets, but for those that do, figuring it out is easy once you know which class your network fits into.

on Jun 23, 2010 | Computers & Internet

1 Answer

I have 6 VODAVI 61612 phones. I want to reprogram some of them to havve 1-800 xxx-xxxx and 1-985 xxx-xxxx capabilities. Where do I start?


There is kind of a procedure. Here are the steps for this assuming you are using the Starplus 308. If this isn't the case or you want the manuals for your system, you can find them here.

1. Press SPD button
2. Press asterisk ( * ) once.
3. Dial bin location (00-09)
4. Select outside line or one will be chosen automatically
5. Dial number desired
6. Press HOLD button.
7. Hang Up

--Note-- Dialing an asterisk initiates a pulse to tone switchover. Dialing a pound ( # ) inserts a pause. Pressing the FLASH key inserts a flash. Pressing the CONF button programs a "no display".

Apr 22, 2009 | Vodavi SP61612-44 Enhanced Speaker...

Tip

Word Password Recovery! Word Password Reset! Word Password Retrieve!


In most companies’ offices, *.doc (Microsoft Word) documents are probably the most widely-spread files used by employee. To protect the information, users often set a password for *.doc files. This is a convenient way to restrict access to the file when users exchanged and store information. The problem appears when you forget or when an employee who set the password leaves the job and the password isn’t recorded anywhere. If this happens, how do you get out of the situation?

Well, as far as I know, there is a lot of software can recovery word password, and they focuses on recovering Word password with three attack modes, Brute-force Attack, Brute-force with Mask Attack and Dictionary Attack.
Brute-force Attack for passwords with nothing know on the password, it means the program will do a full-scale search and try all possibilities randomly in order to get the password guess with the correct password and recover it.
Brute-force Attack with Mask Attack is commonly used when some password features are still remembered. For instances, the possible password length, any digits, letters, special characters like pond, dollar, or asterisk in the password. What are the first or last characters of the password, etc.
This allows users to define a password mask to minimize the guess test load and maximize the recovery speed. You can choose this attack if you still remember part of your password. For example, if you still remember your password is four characters and begins with "z", then you can define the mask as “z???” Thus reduces the detecting scale for the program, as it will only seek for the last 3 characters instead of 4 characters of the whole. To use this attack, a password mask must be defined.
Dictionary attack allowed you to create your own dictionary for the program to base on Brute-force with mask attack helps to reduce the password search time.

In order to offer you the best software, I have tried all password recovery tools I can found, and according to my experience, I recommend you Word Password Recovery 5.0 your best choice to retrieve your password.

Features:
1. All versions of MS Word are supported
2. Recovers all types of passwords
3. Recovers Word 97-2007 open passwords using advanced password recovery
4. Instantly recovers or resets all other types of passwords: open, modify, write reservation, form and document protection passwords
5. Support for simultaneous processing of several password recovery projects. Several attacks (using different attack profiles) can be conducted on one file simultaneously.
6. Program automatically saves password search state and can resume after a stop or a crash
7. Includes a Wizard for easy setup of password recovery attacks
8. Free updates during 1 year
The Password Recovery Official site: http://www.recoverlostpassword.com/

on Mar 16, 2010 | Computers & Internet

Not finding what you are looking for?
Cell Phones Logo

Related Topics:

342 people viewed this question

Ask a Question

Usually answered in minutes!

Top Cell Phones Experts

Computer Repairing
Computer Repairing

Level 3 Expert

14641 Answers

yadayada
yadayada

Level 3 Expert

75077 Answers

William Alequin

Level 3 Expert

922 Answers

Are you a Cell Phone Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...