faq

Monday, October 3, 2005

 

The Telecrapper 2000

`First the TC2K computer (any standard PC) is connected to the phone line via a Caller ID modem or serial Caller ID device. The user creates a setup text file (called a “hit list”) that declares all of the Caller ID strings (numbers and/or names) he considers “annoying” and wants intercepted on the first ring. When a call on the users “hit list” arrives, the computer intercepts the call and picks up the extension. This feature alone is very valuable. It gives the ability to identify legitimate calls anywhere in the house by simply waiting to hear a second ring.

As if that feature wasn’t enough, the TC2K then plays a wave file over the extension for the telemarketer to hear. The user can declare a list of wave files, in a specific order, that he wishes to be played to calls on his “hit list”. The first wave file is played immediately after picking up the extension, the TC2K then waits for the telemarketer to respond, then the TC2K waits for silence (for the telemarketer to finish speaking), then plays the next wave file on the list. The cycle of play wave file, wait for response, wait for silence is repeated for each wave file the user has declared in his setup text file. This way the TC2K can carry on a “virtual” conversation with the telemarketer and the content of that conversation is completely up to the user. All the user needs to do is record his own set of wave files to be played and declare them in a setup file.

Perhaps best of all, the “virtual” conversation between the TC2K and the telemarketer is recorded for the user to enjoy and share with other TC2K users. I will try to maintain links to as many TC2K conversations as possible from this page.’

More of the same here: AstCrapper 2000!




Leave a Reply

mail