So from today onward, our homeline holds two numbers - one from Telecom for "old time sake" and one from TelstraClear for "moving forward".
This conclude the TelstraClear's Triple Services for a complete phoneline, television, and broadband internet in one single bill. I also have the fourth service which is mobile broadband.
Thank you Telecom, it was great to have you for the last 15 years, but it's time to move on...
Hello TelstraClear, looking forward to more wonderful services from you for many years to come.
Other related posts:
Telecom XT Pricing Plans Announced
Vista virtualisation ban lifted
64-bit Windows support in Boot Camp
Comment by Martin, on 27-Sep-2006 10:00
Hi, Be wary when you get your first bill. When we changed from Telecom to TelstraClear our first bill arrived with $150 worth of 0900 calls on it. When we rang to investigate we found that they were phone betting numbers. The interesting thing was the first call was the day we had the connection made live and carried on for two weeks usually at 6-7am or 8-9pm. Telstra weren't that interested in investigating what could be the cause and just tried to brush us off with "It must have been someone in your household" - It wasn't. they finally agreed to reverse the charge and we have a 0900 toll bar on the phone now (although the calls stopped after a couple of weeks). They suggested that it was phone bandits who hijacked our cordless phone. Maybe they followed the van around to know when the line was established.
Comment by sbiddle, on 27-Sep-2006 19:36
Hacking cordless phones these days is more of a myth than reality.
In the old days 10+ years ago with analogue cordless phones it was dead simple. You could not only listen to calls very easily but you could also make calls.
90% of cordless phones these days are either DECT or Uniden's Digital system which simply cannot be easily hacked. Older analogue phones (~5yrs) have security coding between the phone and base which often changes every time you put the phone back on the cradle so even if you have an identical model you can't transmit the code to access the base set because it's randomly generated.