Question about LG Cell Phones
Save hours of searching online or wasting money on unnecessary repairs by talking to a 6YA Expert who can help you resolve this issue over the phone in a minute or two.
Best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
Here's a link to this great service
Posted on Jan 02, 2017
SOURCE: lG puk
The puk code is sim card spesific it comes with the sim card when you get it or you can get it by calling your phone service provider of the sim card to get the puk code.
if you have entered the puk code wrong too many times you will make the sim card useless and you will have to contact your phone service provider for a new sim card, it will probably cost.
Posted on Dec 27, 2008
SOURCE: We are using LG Nortel
We've had similar problems with these systems, but have come up with a multilayered solution to deal with this. Most of these hacks are on either SIP trunks or ISDN trunks. Analogue trunks aren't generally affected as it's quite awkward to join the trunks to effect a call through the system. Here we go.
Disable voicemail remote access, change all voicemail passwords to non standard and keep changing them regularly. (Treat these passwords as you would a bank PIN).
In the toll exception tables, prevent calls out to 090 and 00 numbers which will prevent calls to premium rate and overseas. If your customer needs to call specific 090 number, you can enter these allowed numbers into the allowed table. If they require overseas, they have to accept that there is a risk of abuse.
If you're using SIP, make sure you get IP specific SIP trunks thereby preventing possible trunk hacking from offsite users.
To prevent unauthorised remote access, tie the customers router down to accept incoming requests only from a recognised maintenance IP address. Install a pc at the maintenance location that will act as a portal for mobile engineers who would access it remotely using PC anywhere or other remote management. Ensure you dont keep any saved databases on this remote PC.
Finally, ensure the system software is bang up to date and configure the new front end security. This requires a user name and password, and will lock the thing down for 15 minutes after 3 failed logins. (This also applies to users attempting to logon to the user portal)
Unfortunately this system isn't that secure out of the box. However if you think like the hacker, and configure accordingly, it's as secure as the best of them.
Posted on Jun 21, 2013
Tips for a great answer:
Nov 18, 2014 | Microsoft Office Home and Student 2010
Jun 07, 2014 | Apple iPhone 5c
Mar 26, 2014 | Vtech OfficeMax - Vtech5.8GHZ DSS Cordless...
Dec 11, 2013 | Televison & Video
Oct 16, 2012 | LG Ericsson LIP-8012D 12 Button IP Phone
Jun 06, 2012 | iPhone Apps
Jun 15, 2010 | LG CHOCOLATE VX8500 Cellular Phone
Feb 24, 2010 | LG KC550 Triband GSM 5MP Camera MP3 Phone...
123 people viewed this question
Usually answered in minutes!