When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Unlisted number - Wikipedia

    en.wikipedia.org/wiki/Unlisted_number

    The second type unlisted number was not listed in the (paper based) phone book, but was listed on the directory service (a voice call to 018 in the 1970s). Listed number with a hidden address is useful for women's shelter etc., where the number needs to be listed, but where the address is to be hidden from the general public. Naturally, there ...

  3. Caller ID spoofing - Wikipedia

    en.wikipedia.org/wiki/Caller_ID_spoofing

    Caller ID spoofing is a spoofing attack which causes the telephone network's Caller ID to indicate to the receiver of a call that the originator of the call is a station other than the true originating station. This can lead to a display showing a phone number different from that of the telephone from which the call was placed.

  4. Call blocking - Wikipedia

    en.wikipedia.org/wiki/Call_blocking

    Call blocking, also known as call block, call screening, or call rejection, allows a telephone subscriber to block incoming calls from specific telephone numbers. This feature may require an additional payment to the subscriber's telephone company or a third-party. Call blocking is desired by individuals who wish to block unwanted phone calls.

  5. Caller ID - Wikipedia

    en.wikipedia.org/wiki/Caller_ID

    Caller-ID system response sounds in various cases: analog, ISDN and digital PBX Caller identification (Caller ID) is a telephone service, available in analog and digital telephone systems, including voice over IP (VoIP), that transmits a caller's telephone number to the called party's telephone equipment when the call is being set up.

  6. STIR/SHAKEN - Wikipedia

    en.wikipedia.org/wiki/STIR/SHAKEN

    STIR/SHAKEN, or SHAKEN/STIR, is a suite of protocols and procedures intended to combat caller ID spoofing on public telephone networks.Caller ID spoofing is used by robocallers to mask their identity or to make it appear the call is from a legitimate source, often a nearby phone number with the same area code and exchange, or from well-known agencies like the Internal Revenue Service or ...

  7. Nuisance call - Wikipedia

    en.wikipedia.org/wiki/Nuisance_call

    A nuisance call is an unwanted and unsolicited telephone call. Common types of nuisance calls include prank calls, telemarketing calls, and silent calls. Obscene phone calls and other threatening calls are criminal acts in most jurisdictions, particularly when hate crime is involved. [1] Unsolicited calls may also be used to initiate telephone ...

  8. Anonymous call rejection - Wikipedia

    en.wikipedia.org/wiki/Anonymous_call_rejection

    In many voice telephone networks, anonymous call rejection (ACR) is a calling feature implemented in software on the network that automatically screens out calls from callers who have blocked their caller ID information. The caller usually hears a voice message explaining that their call cannot be connected unless they display their number. Or ...

  9. Voice phishing - Wikipedia

    en.wikipedia.org/wiki/Voice_phishing

    A scammer may directly call a victim and pretend to be a trustworthy person by spoofing their caller ID, appearing on the phone as an official or someone nearby. [16] Scammers may also deliver pre-recorded, threatening messages to victims' voicemail inboxes to coerce victims into taking action. [16]