 My entire visual presentation just got wiped, so I know. So I just buy a power out just now. And when it came back up, there was only one slide. I don't know if this is going to go the whole 50 minutes now, so I'm just going to have to wing this. This is going to just go off my raw notes, unfortunately. But anyway, what's it? No, it's not. It isn't. Can I get a what? I'm sorry? Oh, it did get erased. Well, I mean, because when it came back up, there was only like no, it's not on the CD. So that's why I was just asking whether there was another slot or something I could use. But I don't think there are any more slots. And I think this is kind of the last. So all right. So anyway, my research this past year has been on the Linux's WRTP VOIP Proxy Router. And the reason why I think this is a worthwhile presentation is because the reason why I think this router really bridges the gaps in many ways is because in the past, owning telecom was in the domain of the phone freak. I mean, you had to be pretty dedicated to trashing RC Max and being able to social engineer the telcos in order to be able to manipulate the telephone medium. And of course, there were dedicated freaks to do that. But I think with this router coming out, what it allows, kind of bridges the gap and allows Linux hackers now to essentially become phone freaks and achieve many of the same capabilities as the phone freaks have in the past. For instance, of course, phone freaks in general have a far more robust capability. But yeah, there's no more slots. So yeah, and in the case of what I was saying, in the case of a phone freak, you can social engineer the telco in order to be able to manipulate the line class codes of a telephone line to basically do what you want. You can, in the previous domain of phone freaks, there's being able to do things like spoof color IDs, call spoofing, changing the line class code of a line so you can turn it into a pay phone, all those sorts of things. And with VoIP, kind of being in the domain, it adds the medium of the internet to it now. So what you have is by you can do all this sort of manipulation before that was in the realm of the phone freak just by hacking the kernel. And the problem up to this point is that this is the very first router that has been, that VoIP router that's been released that is Linux based. So this opens up a whole world of possibilities as far as de-office case and understanding it. Of course, it's tied to only one vendor, and that's the primary issue with it. And this vendor doesn't really have any reason to want you to have any access to its Linux architecture. But of course, the whole idea, I guess, my presentation is was to kind of show you how to, first of all, unlock all the capabilities that are crippled before it was released, and then also how to manipulate that firmware to be able to customize it as well as add your own features to it as well. Third-party firmware right now is a big business. So in that sense, I think there's a lot of capability with this architecture. It's based on the TI Texas Instrument AR7 dual proc, which is based on one part MIPS32 bit and the other part is DSP630X. So what you have is you have two different, like, here's the board. And of course, you do have a JTAG, and you have serial capabilities. You need to have a converter to be able to convolve from 12 volt to 5 volt. But like the specs of the board, you've got native built-in QoS into the hardware. You've got native T38 codec support for fax processing. You've got a natural proxy router. And it's also got wireless capability. It's actually got a TI ACS111 mini PCI slot in here. And you've got, and so it's actually a very, very capable, very powerful system in itself. And ideally, I mean, this is a unit that you can get anywhere from between $500 to $800. And so ideally, you can actually run asterisk on it natively, which is a PBX software, to allow you to make use of all these capabilities that I just mentioned. So excuse me while I'm scrolling through these raw nodes. OK, so anyway, source is available for this router. You can go to the links to the site and get most of the source available for it. And Vonage, which is the major vendor that it's tied to, there's only a couple of different modules that they don't release. I mean, everything else, the source is available for it. So it is possible to customize it as you want to if you have access to it. So I was, in my demo, I was going to kind of do the step-by-step of showing you how to root this router. But since I don't have anything up, so I'll just kind of like just kind of go down the list of exactly how it's done. Unfortunately, you don't have anything to look at. But what you need to do is if you get this router, you have to put it online in order for it to auto provision. And so what that does is that allows Vonage to be able to put its firmware upgrade onto the router itself because it's going to come stock with a 2.20 firmware. And you want the latest firmware on there because you want the capability of being able to upgrade through the web interface. So if you do that and you let it out of provision, then you can go as a natural IP of 192.168.15.1. And so with that natural IP, you can use a, you can get, if you hit that and then you use the default password T-Von and a user T-Von PW, you can actually get into it. And then this is actually kind of impossible to explain because there's a series of URLs that you have to go to in order to get the admin pass, the hash crit key. And using the hash crit key, you can then, using that hash crit key with FC4 encryption, you can then decrypt the URL to the hidden page that it has. Yeah, I mean, what I'll probably do is I'll probably just put all the stuff on my link or something so that you guys, if you're interested at some future time, you can actually see how it's done because I can't really explain any of this stuff. That would be www.m-a-g.net. And so magnet, yeah. m-a-g.net, yeah, like m-a-g. So it would be like magnet.net, yeah. Oh, yeah, I know it's forbidden at this point in time. But I'll put everything up on there because I guess I don't think this is going to be very effective without a visual portion of this presentation, unfortunately. And they don't have any more slots. So anyway, I'm really apologizing for this not having what I hoped to have. It's really unfortunate, but I can't really wing it with what I have here. So.