I was working on Faking the IDCS to use there ITP Keysets away from the system..

I go to the point where two keysets could connect to each other and talk without the system. but took me a good part of the day, so i haven't done anything else with it.

Note: Technically, it would then be possible to proxy another venders phone and make it appear to be a "ITP" phone to the system.


Contract SQL/C# Developer / Network Engineer