background preloader - Videos Related To Phreaking - Videos Related To Phreaking
Unsolved Mysteries: Kevin Poulsen This infamous Unsolved Mysteries segment features Kevin Poulsen aka Dark Dante, hacking ARPANET and breaking into a CO to "work" on the ESS. Telephone company investigators Terry Atchley and Jon Von Brauch, who worked to arrest Poulsen also appear in this episode. This is a must see video! Click here to download. CNN: Justin Petersen AKA Agent Steal

The Best, Free Alternatives to Nero CD/DVD Burner Nero is one of the best piece of softwares available in the market for CD/DVD Burning Purposes, but it’s quite expensive. It’s bulky and comes with a lot of programs that you’ll never really use. Why not try some freeware CD DVD Burning Apps applications that can serve as an alternative to Nero Burning ROM for your Windows PC? 1. CDBurnerXP This is by far the most popular free alternative to the expensive Nero Software.

Google Plus: Tips, tricks & how-to's Google Plus is another social network where you post status updates and share photos, just like Facebook — or is it? Actually, Google's latest project combines multiple services that make it more flexible and customizable than its competitors; for example, users can control exactly how their information is shared with features like "Circles," which separate contacts into distinct groups like friends, family and co-workers. While it's currently open to invited users only, it will soon be available to everyone. Described by Google as "real life sharing, re-thought for the web," Google+ makes it easy to tailor your online communication to your own needs and preferences. How to use Google+

Weekendhacker News, Videos, Reviews and Gossip - Lifehacker Since it's hard to trust what companies that get your data will do with it, the best way to maintain your privacy online is to minimize what you give them. Create accounts with pseudonyms or variants of your name (yes, even Facebook and Google+). Supply only profile information that is absolutely necessary, and lie about critical stuff like birthdates. Turn off all app- and ad-related functionality on Facebook and other sites wherever possible. Aggressively manage all forms of cookies and other persistent storage.

21 Images You Won't Believe Aren't Photoshopped (Part 8) #9. If Who Framed Roger Rabbit Was Directed by Michel Gondry Via What looks like a Lego building cropped into a nature photograph is actually a real building that sleeps four adults. Hovering in the middle of the forest just outside of the Arctic Circle, the bafflingly named "blue cone room" is part of the Treehotel. The hotel is located in Sweden, the same country that brought us IKEA. The Hacker Manifesto by +++The Mentor+++ Written January 8, 1986 Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike.

[Updated] Rooting Explained + Top 5 Benefits Of Rooting Your Android Phone In this article, I will discuss all kinds of aspects of rooting your Android phone and the benefits that come with it. Maybe you've heard about "rooting" a phone from a friend or read about it somewhere on the Internet. Maybe you even *kind of* know what it is but aren't sure what you can do with it. The 6 Creepiest Places on Earth Remember when we said Aokigahara was the Niagara falls of suicide? Well, for centuries the abbot in the small Czech town of Sedlec has been the Niagara Falls for dead people, regardless of cause of death. Ever since someone sprinkled soil from the Holy Land on the local cemetery in the 13th century, people from all over Europe started demanding to be buried there and the Sedlec graveyard kept growing until 1870, when the priests decided to finally do something about all those surplus bones lying around.

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.

[Complete Guide] How To Flash A Custom ROM To Your Android Phone With ROM Manager + Full Backup & Restore Have you been hearing about all this custom ROM business - Cyanogen, DamageControl, etc and wondering what in the world all those are about? Or perhaps you already know what those are but are still afraid of trying custom ROMs on your phone because you don't know how to install them or don't want to lose your data and current OS state? Well, today is your lucky day because in this article from the "I wish somebody showed me how to do this crap when I was getting started" series, I will show you how to easily install a custom ROM but only after you back up your current system and exact phone state so that you can restore to that exact state with a click of a button

The 6 Cutest Animals That Can Still Destroy You If animals could talk, they would spend most of their time calling us dicks and telling us to get off their land. The traits we think of as "cute" are often simply tricks animals have developed to get tourists to throw them food. Here are six animals that you'll probably want to steer clear of, no matter how adorable they look on that wall calendars. Hippopotamus (Hippopotamus amphibius) How cute! To give you an idea of how cute hippos are, we'd like you to have a look at this: Crack Password Hashes in Lion – OS X 10.7 This guide will NOT WORK with Mountain Lion 10.8. Please view our new, updated guide for Cracking Passwords in Mac OS X Mountain Lion This guide is an updated version of our extremely popular guide, Decrypt OS X User Account Passwords. The guide has been updated to work with Lion 10.7. Requirements Physical access to the machine.

Custom ROMs For Android Explained - Here Is Why You Want Them Introduction Ever wondered what the whole Android custom ROM scene was about? What is all this talk of installing "aftermarket", custom upgrades on your phone? Some Moral Dilemmas The Trolley Problem, not in Grassian. Suggested by Philippa Foot (1920-2010), daughter of Esther, the daughter of President Grover Cleveland, but of British birth because of her father, William Sidney Bence Bosanquet. A trolley is running out of control down a track. In its path are five people who have been tied to the track by a mad philosopher.

Wireless A handheld marine radio. Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. Somewhat less common methods of achieving wireless communications includes the use of other electromagnetic wireless technologies, such as light, magnetic, or electric fields or the use of sound. Introduction[edit]