Lucent Technologies DEFINITY User Manual page 10

Pc console
Table of Contents

Advertisement

About This Document
Chapter 9, " Troubleshooting," contains procedures and techniques for
n
troubleshooting hardware- and software-related problems. This chapter
also provides emergency recovery information, and outlines the
preventative steps you can take to ensure the integrity of your system.
The Quick Reference Card contains summaries of the commands and
n
procedures you will use most frequently in the PC Console environment.
A glossary is provided at the rear of this guide.
How to Comment on This Document
To comment on this document, please return the comment card.
Conventions Used in This Manual
The following conventions are used in this manual:
The mouse or the keyboard can be used to accomplish most tasks in
n
PC Console. Whenever possible, procedures apply to both the mouse
and the keyboard.
Information in bold type characters, such as F8, represents a keyboard
n
option, button, or indicator on the PC Console screen.
A keyboard equivalent is an alternative method of making a selection.
n
Pressing ALT and the underlined character of a selection allows you to
make that selection. For example, pressing ALT-T from the PC Console
Operations screen allows you to select the Attendant drop down menu.
Security Issues
As a Lucent Technologies customer, you should be aware that there is an
increasing problem of telephone fraud. Telephone toll fraud can occur in many
forms, despite the numerous efforts of telephone companies and telephone
equipment manufacturers to control it. Some individuals use electronic devices
to prevent or falsify records of these calls. Others charge calls to someone
else' s number by illegally using lost or stolen calling cards, billing innocent
parties, clipping onto someone else' s line, or breaking into someone else' s
telephone equipment physically or electronically.
Today security problems are not just limited to toll fraud. There have been
sharp increases in reported incidents of hackers: criminals skilled in
reprogramming computer systems, accessing telecommunications systems
through remote administration or maintenance ports. These ports cannot be
used to place phone calls, but hackers can gain control over the setup of the
system. Through these ports, hackers create security " holes" to allow
unauthorized calling — a serious form of electronic vandalism.
x
Issue 2.5 October 1999

Advertisement

Table of Contents
loading

This manual is also suitable for:

Definity pc console 2.5

Table of Contents