Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material 94192bindex.qxd 6/3/08 3:29 PM Page 835 Index Symbols and Numbers 2600 # key, as end of dialing feature, 96 meetings, 512–522 10 reserved bytes, and virus detection, 291 writer indicted, 73 10297, 484 2600 Hz, 221 10457, 484 300 baud modems, 43 10502, 484 311, 483 10811, 484 31337SP34K, hacking, 816–817 10nnn, 93–97 3D glasses, 812–816 110w, 761 411 128-bit keys, cryptosystems, 308 directory assistance, 47 1633 Hz, 31 step offices and, 51 1980s 414 gang, 22 corporate history, see corporations. see 56-bit keys, Data Encryption Standard, 308 corporations, 1980s 62-second trick, and virus detection, 291 early days of Net. see Internet, early days of 64-bit keys, cryptosystems, 308 hacker philosophy. see hackers, philosophy *67, 483, 669 last days of Ma Bell. see Ma Bell 710 trick, 667 new toys. see telecommunications toys, 1980s 800 numbers raids. see raids, 1980s allocating, 92–93 stories. see stories, 1980s types of, 111–112 1990s 802.11b wireless networks, 733–739 computer revolution. see computer revolution background and basics, 733–734 hackers and the law. see law enforcement, 1990s community, 737–738 hackers really discovered in, 233–234 detecting, 734–736 hacking other things. see hacking other things getting to know your neighbors, 739–743 pop culture. see pop culture,COPYRIGHTED 1990s hacking MATERIAL Captivate network, 743–744 stories. see stories, 1990s non-beaconing, 737 2000 and beyond packet types, 734 hacker stories. see stories, 2000 and beyond practical examples, 738–739 lawsuits. see lawsuits, 2000 and beyond securing, 737 retail hacking. see retail hacking SSID cloaking, 736–737 telephony. see telephones, in 21st century threats to, 738 toys. see telecommunications toys, 21st century WEP, 736 2111 conference, 81 900 numbers, 93 94192bindex.qxd 6/3/08 3:29 PM Page 836 836 Index 911 computer program Advanced Multi-Band Excitation (AMBE), facts and rumors, 509–510 XM Radio, 756 negative feedback on hacking, 506–507 Advanced Research Projects Agency Network. seizing of Phrack newsletter, 493–496, 500–501 see ARPANET (Advanced Research Projects seizure of Jolnet, 497–498 Agency Network) views from a Fed, 384–385 advanced transmitters, 360 950 exchange, 84 advertising, while on hold, 90 976 (dial-it) numbers, 62 AEGIS encryption, 364 9999 numbers, 9–11 Aercom, 436 AFCEA (Armed Forces Communications & A Electronics Association), 248 A400S Fortezza Serial Modem, 312 Afghan phone system, 657–659 AB50 California bill, 811 Afghan Wireless Communications Company ABIX cellular interface, 105 (AWCC), 658 absent without leave (AWOL), 628 Aiken Biphase, MetroCards, 790 access charges, 488–490 Air Force law enforcement agencies, 620–623 access codes Airfone, 93 equal access, 93–97 AirSnort, 701 for networks, 109–111 Airsnort, 735 obtaining, 106 Akamai, 738 pseudo-felon obtaining, 630–634 alarms, ATM, 768 safe phreaking and, 106 algorithms, hacking credit card, 370–372 access points ALI (Automatic Location Identification), connecting to wireless network, 740–741 681–682 discovering with Kismet, 740 Alliance Teleconferencing Service, 76–82 exploring, 741 conference controls, 78–79 as security professional’s job, 386 conference numbers, 76–78 WiFi MITM attacks, 744–746 dangers, 79 ACCS (Automated Calling Card Service), 40 other conferences, 81 Acid Phreak, imprisonment of, 526 overview of, 76–77 ACLU (American Civil Liberties Union), stunts, 80–81 185–188 Allnet (Combined Network Services) acoustic modems, cell phones, 105 access code, 94 ACR (Anonymous Call Rejection), 669–670 how it works, 66–69 active detection, wireless networks, 734 leasing lines from AT&T, 96 activity logs, hacking, 400 multi-carrier toll abuse and, 222–223 ACTS (Automated Coin Toll System) sleazy practices of, 171–173 added to red box, 443 all-relay step office, 51–52 how pay phones work, 36–38, 40 alpha numeric pager units why redboxing doesn’t work, 447–448 defined, 340 ad groups, Google AdWords, 796–800 length of messages, 342 addresses sending out messages, 341 guide to credit card fraud, 190 alter tone, pagers, 341 reading network, 153–155 altered bias oscillator frequency, surveillance ad-hoc packets, 734 tape recorders, 361 ADS (Audio Distribution Systems), hacking, Alternate Operator Services (AOS), 158, 169–170 69–71, 181–184 Alvord, Thomas, 114 advanced dial-out slave infinity device, 359 Amateur Action BBS, 559 advanced modulation transmitters, 355 Amateur Radio, 367–369 94192bindex.qxd 6/3/08 3:29 PM Page 837 Index 837 AMBE (Advanced Multi-Band Excitation), Armed Forces Communications & Electronics XM Radio, 756 Association (AFCEA), 248 American Civil Liberties Union (ACLU), Army law enforcement agencies, 620–623 185–188 ARPANET (Advanced Research Projects Agency American Express phone story, 18–19 Network) Ameritech, 83 communications network of, 148–149 AMPS control bus, 104 future of, 148 Amsterdam elections, hacking, 807–809 gateways, 149–150 ANAC (Automatic Number Announcement how it works, 146–147 Circuit), ANI, 664 moving around, 146 analog receivers, satellite TV, 763–764 overview of, 145–146 Andrews, Rich, 497 reading addresses, 154 ANI (Automatic Number Identifier) safety tips and interesting programs, 147 Caller ID vs., 665 Worldnet concept, 151–152 spoofing, 664–669 Worldnet concept and, 151–152 using diverters, 61 Article 15, military law, 621–622 Verizon’s Call Intercept and, 671–672 Article 32 hearing, military hearing, 620 ANI-fails, 665, 667–669 Article 32 hearing, military hearings, 622 Anna Virus, 639–640 ARU (Audio Response Unit), ANI, 664 ANONYMOUS accounts, ARPANET, 147–148 ASPENs (Automated SPeech Exchange Anonymous Call Rejection (ACR), 669–670 Network) voice mail, 472–473 answering machine hacking, 659–662 Astonishing Hypothesis: The Scientific Search for answering services, 62 the Soul (Crick), 826 Answers for Gateway, hacking, 729–730 Astro, 363 antennas AT&T Communications cell phone, 105 800 numbers, 111–112 detecting 802.11b networks, 736 900 numbers, 93 GSM system, 431 access code, 94 pager decoding setup, 347 Advanced 800 Service, 92 radio piracy using, 760 Alliance Teleconferencing Service owned by, XM Radio, 754 76–77 AntennAudio, 724–725 dark side of Ma Bell breakup, 71–73 anti-cybersquatting act, 581, 583 detecting blue box usage, 29 AOS (Alternate Operator Services), 158, how it works, 66–69 169–170 Italian yellow page directory, 114 appeals process, military, 623 multi-carrier toll abuse and, 222–223 Application Processors. see APs (Application phone call rates, 483 Processors) privacy petition of, 99 application-layer encryption, wireless regulated through divesture agreement, 83–84 networks, 737 ATA-186 adapter, Vonage broadband security, APs (Application Processors) 686–687 CampusWide servers, 605 Atlanta Three, 509–510 exploits, 611–612 ATMs, NCR, 765–768 getting into database through, 606 atomic bomb, true story of first, 5–7 area code (NPA), pagers, 346 ATSC standard, 762 area codes ATTRIB command, 291 New York City in 1990s, 486–487 attribute byte, and virus detection, 291 Telnet using, 121–122 A-type pay phone system, 36 Argentina hackers, 557–559 94192bindex.qxd 6/3/08 3:29 PM Page 838 838 Index AUC (AUthentication Center) database, 430, threatening wireless networks, 738 432–433 XM Radio and, 754–755, 757–758 Audio Distribution Systems (ADS), hacking, banking 69–71, 181–184 1986 technology, 141 authentication, wireless networks, 737 Pronto electronic services, 162–164 authorization codes, phone phreaks, 109 banned books, 310 AUTHORIZE program, hacking VMS, 131–132 Bar Code Sorter (BCS), USPS, 375 AUTODIN (AUTOmatic DIgital Network), bar codes, Home Depot insecurity, 696–697 30–31 .BAS extension, RSTS/E, 129 AUTOEXEC.BAT file, 291 Base Station Controllers (BSCs), GSM, 431, 432 Automated Calling Card Service (ACCS), 40 Base Transceiver Station (BTS), GSM, 431–433 Automated Coin Toll System. see ACTS batteries, mobile scanner, 102 (Automated Coin Toll System) battery-powered transmitters, 354 Automated SPeech Exchange Network BAUDOT, modems and, 48 (ASPENs) voice mail, 472–473 BBS (bulletin board systems) AUTOmatic DIgital Network (AUTODIN), Ghost Board, 397–398 30–31 hacker communications and, 223–224 Automatic Location Identification (ALI), one interpretation of, 223–227 681–682 possible threat of, 229 Automatic Number Announcement Circuit private mailboxes and public levels for, 200 (ANAC), ANI, 664 progress made against victimizing, 194–197 Automatic Number Identifier. see ANI seizing Private Sector, 184–187, 189–192 (Automatic Number Identifier) Sherwood Forest shut down, 197–198 AUTOSEVOCOM (AUTOmatic SECure VOice story about hacked, 398–401 COMmunications), 30 Sysops protection, 192–194 AUTOVON (AUTOmatic VOice Network) victimizing, 187–189 false charges against Private Sector BBS, 190 BCS (Bar Code Sorter), USPS, 375 history of, 30–31 BCwipe, 285 silver box and, 24 beacon packets, 734, 736–737 AWCC (Afghan Wireless Communications Because It’s There network (BITNET), 149–152 Company), 658 beepers, 113, 340 AWOL (absent without leave), 628 beige box, 408–414, 445 Axxess Technologies, 710–711 Bell, Alexander Graham, 22 Bell Atlantic, 83, 482 B Bell monopoly. see Ma Bell Baby Bells, 21–22 Bell step office, 51 NYNEX/New York Telephone as, 83 BellSouth answering machines, 662 baby monitors, 356 Bergsman, Paul, 536 .BAC extension, RSTS/E, 129 Bernie S. (Ed Cummings) Back in Business: Disaster Recovery/Business fallout, 540–543 Resumption (Commonwealth Films), 239 false imprisonment of, 523, 563 Back Orifice (BO) tutorial, 294–296 freedom of speech on Net and, 539–540 backbones, Internet, 303 guilty plea, 535–538 backdoor exits, from U.S. Military, 627–628 how this happened, 544 backscatter modulation, toll pass systems, 328 media guiding perception of, 257–258 backspoofing, 672–675 saga of, 531–534 bandwidth torture of, 569 history of, 816 Best Buy, hacking, 692–695 long-distance charges and, 489–490 94192bindex.qxd 6/3/08 3:29 PM Page 839 Index 839 BHCA (Busy Hour Call Attempts), cell boxing phones, 86 AUTOVON and, 30–31 bias oscillator frequency, surveillance tape beige box, 408–414, 445 recorders, 361 black box, 25, 221, 441–442 Biham, Eli, 309 blue box.
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • WACO ISD FIRSTCLASS User Guide • FIRSTCLASS Is More Than Just Email
    WACO ISD FIRSTCLASS User Guide • FIRSTCLASS is more than just email. It is a client/server groupware, email, online conferencing and bulletin-board system. Users are able to share Calendars, instant messenger and storage of information sent to email, schoolhouse and for district information. It is also the go to place for contact information, district and campus news, alerts for emergency events and alerts for time sensitive events. LOG IN TO FIRSTCLASS • Click the FirstClass icon – • The LOG IN screen will appear • Enter your credentials • User ID : Active Directory user name • Password: Active Directory Password FIRSTCLASS DESKTOP The environment is the same no matter where you login at. This means that you can login on anyone's computer and get your desktop. Teachers who float from class to class this will now be your favorite program. No mail, address book, bookmarks, or documents are stored on the computer. When you log in at home to use firstclass, you have access to all your conferences and emails. FIRSTCLASS DESKTOP Each user will have a slightly different desktop. Icons down the left side are your conferences and folders. Only you will be able to see those icons and what's in them. Special conferences such as From the Superintendent will pop up a message as soon as you open FirstClass. It will continue to pop up every time you open FirstClass until you read the message. WISD News is a sharing area that the district personnel can post in and everyone else can read it. FIRSTCLASS DESKTOP All of the group mail that you would usually get in your personal mailbox may now come to WISD NEWS or the schoolhouse dedicated to the user so the user will have to look in more than one place for your mail.
    [Show full text]
  • Firstclass Messaging
    FirstClass Messaging FirstClass contains an incredibly powerful suite of messaging features that provides users with a wide array of capabilities for managing and customizing their messaging environment. • Secure email and instant MESSAGE GROUPING messaging The FirstClass mailbox supports filtered views that enable users to quickly switch from viewing all messages to specific subsets of messages such as all incoming messages, all draft messages, all unread messages, or all sent messages. In • Rich message content addition, FirstClass supports “threaded messaging” in which related messages are automatically grouped together, enabling users to quickly and easily review • Message grouping, history all messages related to a specific subject. tracking and archiving MESSAGE PREVIEWS FirstClass enables quick and efficient processing of incoming mail by displaying a • Easily customizable message preview of the first few sentences of the body of each message. Users can quickly handling rules assess the topic or urgency of the communication without having to open and read the entire message. • Message notification to mobile devices FIRSTCLASS NEWS WITH PREVIEWS ON The way to connect. FIRSTCLASS | OPEN TEXT™ CORPORATION | SOLUTION DATASHEET MESSAGING FIRSTCLASS MESSAGING MAIL AUTOMATION TOOLS pagers, mobile phones, and smartphones. Users can configure FirstClass includes a number of features to automate which events they would like to be notified of, and what messaging-related tasks, making messaging activities faster information to provide in the notification. By choosing, for and more reliable. These include: instance, to send notifications to a mobile phone regarding new email messages along with the sender information, subject, and Stationery some message body, text users can obtain many of the benefits to enable the creation of message templates that contain pre- of expensive wireless PDA handhelds at a fraction of the cost.
    [Show full text]
  • Versions and Languages - a Summary of the Comaround Knowledge Articles
    Versions and languages - a summary of the ComAround knowledge articles ComAround Knowledge™ August 2018 ComAround - www.comaround.com - www.comaround.se – www.comaround.no Text articles All text articles are available in the following language versions English, Español, Pусский, 中文;汉语/漢語, Français, Português, Deutsch, Nederlands, Polski, Svenska, Suomi, Norsk bokmål Office 2016 Office2013 Office365 Word, Excel, PowerPoint Word, Excel, PowerPoint Introduction,Delve Outlook, OneNote Outlook, OneNote Exel online, Flow Project, Publisher, OneNote on Surface Pro Forms,Officewebb apps Access SharePoint, Lync Microsoft Teams OneDrive for business Planner, Power Apps Office 2011 for Mac Office 2016 for Mac PowerPoint online Word, Excel, PowerPoint Word, Excel, PowerPoint Skype for Business Outlook Outlook, OneNote SharePoint Online, StaffHub, Stream, Sway, Word online Office2007 Libre Office Welcome Office LibreOfficeWriter 4.1 Word, Excel, PowerPoint LibreOfficeCalc 4.1 Office2010 Outlook, Access LibreOfficeImpress 4.1 Introduction to Office SharePoint Introduction to Outlook OfficeCommunicator Word, Excel, PowerPoint Outlook Web Access GroupWise Outlook, OneNote GroupWise 2014, 12 Outlook Web App GroupWise 12 Web access Publisher, Project Lotus Notes & iNotes GroupWise 8, 7 SharePoint, Lync Lotus Notes 9, 8.5, 8.0, 7.02 GroupWise 7 Web access Lotus Notes R5, 6.5, 6 GroupWise 6.5 iNotes 9, 6.5 Office 365 mobile Apps Domino Web Access Delve, Dynamics365 (iNotes) 8, 7 Operating systems Edge Excel, Flow Mac OS X Yosemite Word, OneDrive Mac OS X
    [Show full text]
  • Technology Plan
    TECHNOLOGY PLAN FY2019 – FY2021 Abstract Outlines the status and guiding vision for technology in the Kenai Peninsula Borough School District for fiscal years 2019 - 2021 Information Services Eric Soderquist, Director Released July 2018 Revised March 2019 with E-Rate Funding Year 2019 updates TABLE OF CONTENTS Section 1: Information Technology Systems ................................................................................................................. 1 FY19 Needs Assessment ............................................................................................................................................ 1 Network Overview .................................................................................................................................................... 2 School Connectivity ................................................................................................................................................... 3 FCC E-Rate Program .................................................................................................................................................. 5 KPBSD Use of E-Rate ............................................................................................................................................. 5 E-Rate Funding History and Forecast .................................................................................................................... 5 Infrastructure ...........................................................................................................................................................
    [Show full text]
  • Scada & Plc Vulnerabilities in Correctional Facilities
    SCADA & PLC VULNERABILITIES IN CORRECTIONAL FACILITIES White Paper Teague Newman Tiffany Rad, ELCnetworks, LLC John Strauchs, Strauchs, LLC 7/30/2011 © 2011 Newman, Rad, Strauchs PLC Vulnerabilities in Correctional Facilities Newman, Rad, Strauchs Abstract On Christmas Eve not long ago, a call was made from a prison warden: all of the cells on death row popped open. Not sure how or if it could happen again, the prison warden requested security experts to investigate. Many prisons and jails use SCADA systems with PLCs to open and close doors. As a result of Stuxnet academic research, we have discovered significant vulnerabilities in PLCs used in correctional facilities by being able to remotely flip the switches to “open” or “locked closed” on cell doors and gates. Using original and publically available exploits along with evaluating vulnerabilities in electronic and physical security designs, we will analyze SCADA systems and PLC vulnerabilities in correctional and government secured facilities while making recommendations for improved security measures. 1 PLC Vulnerabilities in Correctional Facilities Newman, Rad, Strauchs Biographies John J. Strauchs, M.A., C.P.P., conducted the security engineering or consulting for more than 114 justice design (police, courts, and corrections) projects in his career, which included 14 federal prisons, 23 state prisons, and 27 city or county jails. He owned and operated a professional engineering firm, Systech Group, Inc., for 23 years and is President of Strauchs, LLC. He was an equity principal in charge of security engineering for Gage-Babcock & Associates and an operations officer with the U.S. Central Intelligence Agency (CIA). His company and work was an inspiration for the 1993 movie, “Sneakers” for which he was the Technical Advisor.
    [Show full text]
  • Paper: Hacks and Attacks: Examples of Electronic Device Compromise
    Hacks and Attacks: Examples of Electronic Device Compromise Embedded Systems Conference Silicon Valley 2010 (ESC-343) Joe Grand* Grand Idea Studio, Inc. ABSTRACT Bolstered by the flourishing hobbyist electronics and do-it-yourself movements, easy access to equipment, and nearly realtime information sharing courtesy of the Internet, hardware devices have become a target for both harmless, curious hackers and malicious attackers. Many devices are inherently trusted and taken for granted, though they are actually susceptible to compromise leading to potential financial, social, or legal implications. As engineers, we have a responsibility to learn from problems of the past and anticipate new ones in order to better equip ourselves for designs of the future. This paper will present a typical hardware hacking process and explore a few real- world attacks against electronic devices. WHY HARDWARE? Society thrives on an ever-increasing use of technology. Electronics are embedded into nearly everything we touch. Hardware products are relied on for security-related applications and are inherently trusted, though many are completely susceptible to compromise with simple classes of attacks that have been known for decades. Contrary to conventional thinking, engineering doesn’t only have to be about design and hacking doesn’t have to be illegal. You can combine the best of both worlds - the skills and precision of an engineer with the freewheeling, anti- authoritative mindset of a hacker - to discover, learn about, experiment with, modify, build, break, or improve a product. Whether the goals of a hardware hack or attack are for “good” or for “evil” depends purely on the person or people undertaking the task.
    [Show full text]
  • D 4.4 Profiles of Cyber-Criminals and Cyber- Attackers
    Funded by the European Commission Seventh Framework Programme CyberROAD Development of the Cybercrime and Cyber-terrorism Research Roadmap Grant Agreement N. 607642 D 4.4 Profiles of Cyber- Criminals and Cyber- Attackers Date of deliverable: 01/12/2015 Actual submission date: 01/12/2015 Start date of the Project: 1st June 2014. Duration: 24 months Coordinator: UNICA – University of Cagliari, PRA Lab - Pattern Recognition and Applications Lab Version: 1.0 Project funded by the European Commission Directorate-General Home Affairs in the Prevention of and Fight against Crime Programme Restriction Level PU Public PP Restricted to other programme participants (including the Commission services) no RE Restricted to a group specified by the consortium (including the Commission services) no CO Confidential, only for members of the consortium (including the Commission) no Profiles of Cyber-Criminals and Cyber-Attackers Funded by the European Commission under the Seventh Framework Programme Page 1 of 58 Revision history Version Object Date Author(s) 0.1 Initial draft Table of 01/07/2015 INDRA Contents. 0.2 Structure Changes. 01/08/2015 INDRA Multiple changes in the 0.3 03/08/2015 INDRA structure. Content added to section 1 and 2. Review of attributes for 0.4 07/08/2015 INDRA characterization. Attacks to Postal and 0.5 28/08/2015 INDRA Logistic Services. Attacks to Social 0.6 01/09/2015 INDRA Networks, Unmanned Systems, Mobile Biometry, ICS, Automotive, IoT, Transport Critical Infrastructure, Virtualization, Cloud Computing. Attacks to Smart Grids. 0.7 11/09/2015 INDRA Attacks to BYOD, Smart 0.8 07/10/2015 INDRA Cities.
    [Show full text]
  • Anarchists Cookbook V2000
    ANARCHY COOKBOOK VERSION 2000 Table of Contents 1.Counterfeiting Money 58.Generic Bomb 2.Credit Card Fraud 59.Green Box Plans 3.Making Plastic Explosives 60.Portable Grenade Launcher 4.Picking Master Locks 61.Basic Hacking Tutorial I 5.The Arts of Lockpicking I 62.Basic Hacking Tutorial II 6.The Arts of Lockpicking II 63.Hacking DEC's 7.Solidox Bombs 64.Harmless Bombs 8.High Tech Revenge: The Beigebox 65.Breaking into Houses 9.COý Bombs 66.Hypnotism 10.Thermite II Bombs 67.Remote Informer Issue #1 11.Touch Explosives 68.Jackpotting ATM Machines 12.Letter Bombs 69.Jug Bomb 13.Paint Bombs 70.Fun at K-Mart 14.Ways to send a car to HELL 71.Mace Substitute 15.Do you hate school? 72.How to Grow Marijuana 16.Phone related vandalism 73.Match Head Bomb 17.Highway police radar jamming 74.Terrorizing McDonalds 18.Smoke Bombs 75."Mentor's" Last Words 19.Mail Box Bombs 76.The Myth of the 2600hz Detector 20.Hot-wiring cars 77.Blue Box Plans 21.Napalm 78.Napalm II 22.Fertilizer Bomb 79.Nitroglycerin Recipe 23.Tennis Ball Bomb 80.Operation: Fuckup 24.Diskette Bombs 81.Stealing Calls from Payphones 25.Unlisted Phone Numbers 82.Pool Fun 26.Fuses 83.Free Postage 27.How to make Potassium Nitrate 84.Unstable Explosives 28.Exploding Light bulbs 85.Weird Drugs 29.Under water igniters 86.The Art of Carding 30.Home-brew blast cannon 87.Recognizing Credit Cards 31.Chemical Equivalency List 88.How to Get a New Identity 32.Phone Taps 89.Remote Informer Issue #2 33.Landmines 90.Remote Informer Issue #3 34.A different Molitov Cocktail 91.Remote Informer Issue #4 35.Phone
    [Show full text]
  • Full Flavor Menthol Platinum Gold 120 Kamel Smooth K Premium Box
    MARLBORO ORDER L & M ORDER Pall Mall ORDER Parliament ORDER 83's Box Red Box Red 100 Box Light Box Black 100 Box Red 100 Box Blue 100 Box Light 100 Box Black 72 Blue Box Menthol 100 Box Virginia Slims ORDER Black Box Blue 100 Box Orange 100 Box Red Box Blend 27 Green Box Black 100 Box Silver Box Blend 27 100 Green 100 Box White 100 Box Menthol Box Edge Gold Box Red King Box Menthol Silver Box Gold 100 Box Gold 100 Box Blue King Box Virginia SuperSlims ORDER Gold 72 CAMEL ORDER Menthol King Box Full Flavor Gold Box Blue Box Orange King Box Gold NXT Blue Wide Black King Box Menthol Gold Soft Blue 99 White King Box Menthol Gold Gold Select 100 Box Crush Silver King Virginia Slims 120s ORDER Gold Select Box Platinum Silver 100 Menthol Gold Gold Soft 100 FF 99 Box Non Filter Menthol Silver Box Ice FF Wide AMERICAN SPIRIT ORDER Silver Box Men 100 Box Gold Box Yellow Gold 120 Men Black 100 Box Green Wide Lt. Blue Benson & Hedges ORDER Men Black Box Kamel Original Orange Deluxe Box Men Blue Bx 100 Kamel Smooth K Gold Organic Deluxe Men 100 box Men Box Men Box Black Luxury Menthol Men Gold 100 Box Men Silver Box Turquoise Menthol 100 box Men Gold Box No. 9 Pink Celadon Premium Box Men Silver 100 Box Non Filter Lime Green Basic ORDER Men Silver Box Red Box Dark Green Gold Box Menthol Blue Box Royal Box Doral ORDER Blue Box Menthol Grn 72 Silver Box Red Box Menthol Gold Box Midnight NO.9 Menthol Silver Box K More ORDER Red 100 Box Jade Menthol Gold Box Red 120 Red 72 Jade Silver Silver 100 Box Green 120 Red Box NEWPORT ORDER Menthol 100 Box MISTY
    [Show full text]
  • Phreaking Into the System
    Exploding The Phone db186 www.explodingthephone.com Bibliographic Cover Sheet Title Phreaking into the system Publication Nation Review (Australia) Date 1972-09-01 V/I/P p. 1308 Abstract Overview of phone phreaking in Australia circa 1972, with descriptions of the three prevalent methods. Also discusses the way that the Australian phone system differs from the US system. Keywords phone phreaks; Australia; step-by-step exchange; crossbar exchange; Ramparts; AT&T; mute box (black box); blue box; Australian phreaking Source An anonymous phone phreak The following pages may contain copyrighted material. We believe that our use of this material for non-commercial educational and research purposes constitutes "fair use" under Section 107 of U.S. Copyright Law. If you wish to use this material for purposes that go beyond "fair use," you must obtain permission from the copyright owner, if any. While it will make us slightly sad to do so, we will nonetheless comply with requests from copyright owners who want their material removed from our web site. This article is published by way of a public service and dedicated to the post- master-general, sir Alan Hulme. S;r Alan, until you read this article, you will no-~ have any idea of what SEVEN DAYS a week, fifty two weeks a year, in a peak ilour intricate methods are s~t/t be~wc :n se~ en and clght pro, the AP.C disseminates oile being used to cheat your- of ~ts intellectually most dubious products: the weather self and the public purse fnrccast, tl,df an hour’s conversation with an honest metcorolc~:ist will convince anyone that while the ob~erva- of valuable revenue.
    [Show full text]
  • Table of Contents
    TABLE OF CONTENTS RULE T-1 Application of Rules ................................................................................................................................. 1 RULE T-2 Definitions ................................................................................................................................................... 1 RULE T-3 Records and Reports ............................................................................................................................... 6 RULE T-4 Metering, Inspections and Tests ......................................................................................................... 7 RULE T-5 Customer Relations .................................................................................................................................. 8 RULE T-6 Reasons for Denying Telephone Service ...................................................................................... 1 2 RULE T-7 Insufficient Reasons for Denying Telephone Service ............................................................. 13 RULE T-17.1 Notice of Termination of Reseller ................................................................................................... 13 RULE T-8 Voluntary Suspension .......................................................................................................................... 14 RULE T-9 Directories ................................................................................................................................................ 14 RULE
    [Show full text]