Studying, experimenting with, and exploring telecommunication systems, often with the goal of making free calls
POPULARITY
Über 60 SWAT-Einsätze. Phreaking. Gehackte Telefone. Ein blinder Teenager wird zum meistgesuchten Hacker der USA - doch sein größter Coup war nicht gegen das FBI, sondern gegen sich selbst.
ShiZZa OaK tells us about his switch to IRC and joining one of the first mp3 ripping groups on the scene, Rabid Neurosis (RNS) and hosting an mp3 top site. We also talk about his phone hijinks when phreaking, calling Miss Cleo, and cracking passwords. Other MP3 ripping groups mentioned: Underground Music Alliance CDA - Compress 'Da Audio Guest: ShiZZa Oak Host: Steve Stonebraker Audio Editor: Sam Fox CoverArt: Created by Broast (https://broast.org), original idea by LampGold. Episode References: How Music Got Free Rabid Neurosis mp3scene.info -- AOL Underground Podcast Follow us on twitter - @AOLUnderground @brakertech Reddit - https://www.reddit.com/r/AOLUnderground/ Youtube - https://www.youtube.com/@AOLUndergroundPodcast Merch - https://www.redbubble.com/people/AOL-Underground/shop Donate - https://www.buymeacoffee.com/AOLUnderground Contact the Host - https://aolunderground.com/contact-host/ Reconnect with old AOLers - https://nina.chat/ (AOL 4.0 is working!) https://discord.gg/p3ol https://aolunderground.com/community/ -- Other Check out my wife's Etsy shop - https://www.etsy.com/shop/Snowbraker --- Support this podcast: https://podcasters.spotify.com/pod/show/aolunderground/support
Mark Phoenix tells us about the cultural phenomenon of phone phreaking and it's connection to the blind community and to the development of assistive tech.
Michael Feir reviews the 29th drama from Dark Adventure Radio Theatre, The Iron Maiden, and tells us how the production company is tweaking their style with their latest creations. Psychotherapist Fern Lulham tells us about emotional triggers and what to do when we find ourselves in an emotionally triggered state. Sports Reporter Brock Richardson fills us in on how the 2024 Paralympics in Paris are shaping up for Canada. Whether you're getting back into a routine after a relaxed summer or just looking to refresh your eating habits, Mary Mammoliti is here with tips to help you Step Into a September Reset. Joining us on this week's Roundtable chat is AMI Content Development Specialist for Eastern Ontario, Karen Magee.
Under 50-talet började en subkultur gro som som hade en frekvens som gemensam nämnare. Den fyrstrukna oktaven E med frekvensen 2600 Hz visade sig kunna hacka telefonisystemet. Då var det ett enkelt telefonisystem men som senare skulle komma att utvecklas. Och så gjordes även den så kallade "Phreaking-scenen". Den blev till en sport som gick ut på att förstå de olika systemen och hur de kunde hackas. Så vad har det med IT-säkerhet att göra? Finns likheter med dagens hackning av brandväggar? Och så sent som 2011 hackades AT&T system i Manilla, Filippinerna - hur hänger det ihop? Och kan man säga att Phreaking-grundaren, en blind 7-åring med absolut gehör, är en elaksinnad hackare?
Episode 68 - Phreaking Collect Calls by Mx. Maxwell
Eine amerikanische Telefonchatcommunity vereehrt ihn als Meister des Phreaking, der Anfang der 2000er mit seinem Erscheinen im analogen Telefonnetz die alten Hackeridole demontiert. Er ist besser. Er ist schneller. Er klingt nach vielen Gesichtern, nach Kompetenz und Macht. Eins wissen jahrelang weder seine Telefonbuddies noch die Ermittler des FBI, Abteilung Cybercrime: Er ist ein blindes Kind. Du möchtest mehr über unsere Werbepartner erfahren? Hier findest du alle Infos & Rabatte: https://linktr.ee/verbrechenohnerichtigennamen
Charles and I talk Crocs, Phreaking, and the collective life of the Boomers flashing before their eyes.
In today's podcast, I interview Jenn Bass who is organizing the first-ever Pride Month Celebration here in Estes Park, about the planned festivities. I then read my next audio essay in my series of ‘Mostly True Tales' about an adventure I had in the Summer after graduating my senior year in high school. It is entitled ‘Red Boxes and Mafia Kids.'Here is the essay in written format: Mostly True Tales: Red Boxes and Mafia Kids.New Jersey is a strange place. You don't realize that until you get away from it.For the first twelve years of my life, I grew up in that land of the strange. I grew up in a small, little lakeside town called ‘Green Pond' It was in northern Jersey, which I now know most people think of as one vast paved-over wasteland of a cityscape. But, nothing could be further from the truth. It was a forested wonderland tucked behind a two-mile-long lake that was far from a pond. There were maybe two or three hundred people in the town; that's the picture my childhood memory paints. We lived in a small yellow house at the very end of Sunset Road. This story does not take place in Green Pond but starts there.I remember waking up one morning to find a strange, hairy man sleeping topless on our front couch, and the kicker was he was wearing a dress! It must have been a Saturday morning as I was fucking pissed off that this stranger was going to disrupt my usual Saturday morning routine of gorging myself on Lucky Charms and watching my favorite Saturday commercials.My parents had separated earlier in the year, and Mom had begun dating again. She had gone out the night before to some party, leaving my little brother and me with the red-headed babysitter down the street.I remember running to my mother's bedroom in fear, panic, and anger to let her know some crazed, homeless man wearing a dress appeared in the night and decided to crash out on our front couch.My mother roused from her cloudy-headed sleep to tell me it was ‘OK' and that the man was her new friend Bill whom she had met at a Hawaiian luau party. And she was sure to add that he was wearing a costume, not a dress.Bill would, in a year, become my step-father and, after my angst-ridden teenage years, become one of the most influential people in my life.When Bill became a part of my family's lives, I also got a new set of cousins from Jersey City, Billy, and Jimmy. Jimmy was the older of the two but smaller in stature; Billy, the younger cousin, loved to eat and was one of the happiest kids I remember. I remember one time he came out and, during a backyard cookout, would have several stacks of hamburger paddies that he would stack up and smother with condiments. I am not exaggerating when I say the kid tore through condiments.Jimmy was the smart one. He would start one of the first iPhone repair companies in New York City.Coming from the idyllic beachfront life experience, meeting Bill's family, whom all lived in the same tower of the Jersey City projects, was quite an adventure. There was a community pool. We spent many hot city summer days at the top of one of the towers in the early 80s. Where my little brother and I, along with Billy and Jimmy, would try and float paper airplanes over the Hudson into New York City. We would also drop pennies down onto the parking structure below us, cratering the hoods and roofs of the cars below to gleeful giggles—just a bunch of poor kids having the fun we could find in the smoggy Jersey City Summer.Once we moved to Colorado, I saw Billy and Jimmy less and less. But during the summer of '92, after I graduated from high school, I went back to Jersey to spend some time with my actual father and work fire demo with him. It had been several years since I had spent any time with him, and it didn't take long to realize why I had chosen not to spend my summers with him anymore.He had a new wife that wasn't much older than I was then, and I had my own experiences with women her age by this point in my life.She was a cunt, and I don't use the term lightly (as the Brits do.) She was just a straight-up bitch, and it only took a couple of weeks to realize that I had to get out of there.While brainstorming with my mother about getting the fuck out of Dodge (Along with the bitch breaking onto the call to refute just how awful she had been.) We came up with the idea that I could spend a couple of weeks couch surfing with my family in Jersey City.This worked out great because my friend from high school, Matt, was coming to New York City, and we were supposed to spend some time in the city before we both went off to college and started the rest of our lives. Matt was a walking dichotomy, He played varsity football, but we found a connection through our love of music and psychedelics.My mother bought me a train ticket to NYC, and my cousin Jimmy would meet me at Grand Central Station to ensure I got there alive. After making the short trip to the city, my cousin guided me back under the river to Jersey City.The family still lived in the same tower but had moved apartments from the one I remembered. My cousin Jimmy asked me the first thing when we got back to the apartment was, “Hey, feel like making some money?” He said it with the same grin he had when we were kids, and he asked me if I wanted to have some fun by tossing pennies off the roof of the building cratering the hoods of the cars below.“well, sure!” I answered. After being unable to work the whole summer doing the well-paying deconstruction of burnt-out condos, I was happy to find a way to make some extra money.“So…how are we making money?” I asked.With a twinkle in his eye, he answered my question with another question. “You ever hear of a red box?”For those of you who are too young to remember the days of public pay phones or didn't have friends who were hackers growing up, here is a little history lesson on ‘Red Boxes.'But first, we need to talk about the advent of the phone ‘Phreaking.'According to Wikipedia;Phone phreaking got its start in the late 50s. Its golden age was the late 1960s and early 1970s. Phone phreaks spent much time dialing around the telephone network to understand how the phone system worked, engaging in activities such as listening to the pattern of tones to figure out how calls were routed, reading obscure telephone company technical journals, learning how to impersonate operators and other telephone company personnel, digging through telephone company trash bins to find "secret" documents, sneaking into telephone company buildings at night and wiring up their telephones, building electronic devices called blue boxes, black boxes, and red boxes to help them explore the network and make free phone calls, hanging out on early conference call circuits and "loop around" to communicate with one another and writing their newsletters to spread information.A red box is a phreaking device that generates tones to simulate inserting coins in pay phones, thus fooling the system into completing free calls. In the United States, a nickel is represented by one tone, a dime by two, and a quarter by a set of five. Any device capable of playing back recorded sounds can potentially be used as a red box. Commonly used devices include modified Radio Shack tone dialers, personal MP3 players, and audio-recording greeting cards.So, my cousin had swiped his mom's credit card and ordered a case of radio shack phone dialers. These were small, handheld, brown plastic rectangles with a keypad and a speaker on the front face.For those of you old fogies out there, remember when you would put a quarter into a pay phone, and there would be a series of five tones. Well, that was the computer in the payphone, telling the computer at the phone company that you had put in 25 cents in intervals of 5 cents. So hackers, or rather phreakers, figured out that you could switch out a chip on a radio shack phone dialer, and it would emulate that tone exactly.My cousin also ordered a case of those chips, and we spent the next week soldering in the chips along with a switch that allowed the devices to either function as a red box or switched over to just being a regular phone dialer. (This was as close as a contact list as we had before the days of smartphones. (You could store like 25 numbers in these things.) The plan was to sell the case of red boxes to the Mafia Kids that Jimmy knew growing up with them in Jersey City, making a tidy profit for both of us.I still remember Jimmy driving around the different neighborhoods of Jersey City, showing me the various mafia cars parked outside of Italian restaurants, explaining to me the different meanings behind different colored flowers that were put in the hood ornaments of some of the cars.So we spent the next week before Matt came out to meet us disassembling the radio shack phone dialers, installing the replacement chips, and adding a switch.The plan was to go pick up Matt from the train station, fuck around for a bit in the city before meeting Jimmy's contact in Greenwich Village for him to check out the red boxes and pay us the money, and then we would hit the night clubs of NYC with our profits like pirates after a successful haul. We were walking on clouds that week. What could possibly go wrong?”Well, it turns out this was a series of monumental life lessons. Don't mess with the Mafia Kids.After securing a tazer (just in case), We picked up Matt as planned from the station, then headed to the village to find someone that looked radically different from the picture I had in my mind of what a ‘mafia kid' was supposed to look like. This was a skinny kid in shorts, a tank top, long hair pushed behind a Yankees cap, and a large pair of sunglasses. Maybe he was incognito. He directed us to pull onto a side street next to a payphone so he could test out one of the red boxes. He jumped out of the car and ran over to the payphone. After making a call with the red box, he grabbed out of the cardboard box we had them all in and trotted back.“So?” Jimmy asked“They work great!” The kid said with a smirk. Hey, pull off into this alley.” He pointed across the street. I'll give you the cash when we are out of sight. Jimmy naively did just what the kid said to do as soon as we pulled the car to a stop. My worst anxieties came to life. Four fully grown men in plain clothes walked up to the car's four doors. Just before they got to the front passenger door, the mafia kid jumped out with the cardboard box filled with our hopes and dreams and sprinted away. The men pulled up their shirts from their waistbands, revealing handguns and badges.“What the fuck are you kids up to?” the man outside Jimmy's open window yelled into the car.I am sure we all three collectively peed our pants, just a little.“Nothing. I was showing my friend our new phone dialers. We were selling them to raise funds for our band trip later this summer.” Jimmy had kept his cool much better than I had.“Yeah, sure, kid, you sure those weren't red boxes?”“Yeah, I'm sure.”“Shut up.” The man said, and we all sat in silence, sweating in the summer city heat.“We need you to meet us at the police station, don't fuck around; just drive right there and ask Detective Calzone. We'll meet you there. Got it?”“Yeah, sure, we got it.”As quickly as the men had appeared, they melted back into the pulse of the bustling city weekend, and we sat in stunned silence, letting the adrenaline course through our veins.I finally broke the silence. “Hey Jimmy, I'm not sure those were cops.”“Nope, they were mafia guys, and we just got ripped off.”“I think I need to call my parents,” Matt added.The next few days were spent in defeat. Matt and I went and got some fake ID's over in Times Square and then went back to Colorado.Later that month, I would get a call from Jimmy saying he had gotten some payback on the mafia kids when he had set fire to one of their private gas pumps.My mom and dad got some harrowing news at the end of summer. Billy, who had nothing to do with our dealings with the mafia kids, had been visiting his father in the Greek Isles and had been killed when the scooter he was riding was forced off the road and into a cable that had been strung across the exit. He was decapitated and killed instantly.While I don't know if these events were connected, I can't help to wonder if we should have never fucked with the mafia kids and red boxes. Today's episode is sponsored by: Get full access to The Colorado Switchblade at www.coloradoswitchblade.com/subscribe
New episode featuring very special guest Bryan Poole (aka the late b.p. helium) is alive! We discuss Bryan's start with music, his time with Elf Power, of Montreal and his future endeavors. Bryan also gives us a panoramic view of the Athens, GA music scene, including the origins of Elephant 6. Dig it! bandcamp: https://thelatebphelium.bandcamp.com instagram: https://www.instagram.com/bphelium/
There's power in music, but not all tones are created equal. During the reign of Bell Telephone there was one tone in particular that opened up a world of possibilities: 2600 Hz. The devotees of this note were called phreakers, and in some cases they knew the telephone system better than Bell employees themselves. This episode were diving in to the early history of phreaking, how a bag of tricks was developed, and why exploring the phone grid was so much fun. Selected sources: http://explodingthephone.com/ - Phil Lapsley's book and website of the same name https://archive.org/details/belltelephonemag09amerrich/page/205/mode/2up - All about the Holmes Burglar Alarm system http://explodingthephone.com/docs/dbx0947.pdf - FBI's records on Barclay and the Blue Box
Steve Wozniak aka “The Woz” learned about phreaking from the 1971 Esquire article “Secrets of the Little Blue Box” by Ron Rosenbaum. Half way through the article, Woz called his friend, Steve Jobs, and read it to him. They were fascinated by the exploits of JoyBubble, Captain Crunch, and the underground telephone hackers who were whistling their way into Ma Bell, also known as AT&T, which was the largest company in the world, employing over one million people and controlling almost all U.S. local and long distance service, as well as the equipment in most homes and networks. Listen to this fascinating interview with Woz. Story in Cybercrime Magazine: https://cybersecurityventures.com/steve-wozniak-phreaks-out-on-the-history-of-hacking/
Phreaking to łamanie zabezpieczeń w celu uzyskania darmowego połączenia telefonicznego. Pamiętasz jeszcze budki telefoniczne? Jak dzwoniono z nich za darmo? Sprawdź historię walki z Telekomunikacją Polską. Zobacz jak działały karty magnetyczne i jak były chronione. 0:00 Wstęp 1:33 AW-652 „mydelniczka” 2:35 AWS „kanciak” 4:24 TSP-91 „niebieski” 5:04 Pierwsze próby kopiowania kart 6:26 Dorabianie kluczy Abloy 7:32 Szczegóły zabezpieczenia paska magnetycznego 10:07 Nagrywarki do kart 11:54 Skąd brać zużyte karty 12:25 Karty serwisowe i „card programming” 13:15 Wybieranie tonowe i impulsowe 14:52 Wykorzystanie numerów zablokowanych 16:01 Jak zdobyć numer do budki 16:44 Centrum Nadzoru C90 19:15 Oprogramowanie budki 21:09 Zasady prawdziwego phreakera 22:06 Centralki PBX 24:00 Make your URMET smoke 24:25 Karty zielone z wielościeżkowym zapisem 25:59 SAM 28:44 Srebrny URMET 30:10 System DRA
Modem Mischief the stories of the outlaws of cyberspace. The hackers, phone phreaks, dark web lurkers and cybercrime perpetrators of the digital underground. Debuting October 6th, 2021. http://modemmischief.com Instagram @modemmischief Twitter @modemmischief Facebook Created, produced and hosted by Keith Korneluk. Mixed and mastered by David Swope. Music by Computerbandit.
This episode we go back and cover the modern ancient history of phreaking. A skill that was impressive the American government was terrified that the hacker Kevin Mitnick could launch a nuclear missile merely by whistling down the phone. Dave and Jon recount their small exposure when information between computers was actual done by sound!
Oggi la maggior parte delle comunicazioni passano dall’e-mail che in molti casi sono contenitori di informazioni sensibili che rivestono un particolare valore per l’individuo, l’organizzazione e la comunità.Le e-mail sono diventate nel tempo il principale mezzo usato tra truffatori e criminali, che effettuano la maggior parte delle loro azioni fraudolente tramite la modalità di Phishing.La parola Phishing deriva dall’unione delle parole Phreaking, con cui si sono indicate le prime truffe tecnologiche, e fishing che vuol dire andare a pasca.Quindi creare truffe tecnologiche lanciando un’esca, come nella pesca, per conquistare un premio grazie all’inganno.I Phisher inviano una e-mail, un messaggio in chat, un messaggio sullo smartphone, e cos’ via, con un contenuto ingannevole e invitano il destinatario a compiere un’azione generando in lui la possibilità di avere un vantaggio o superare una situazione spiacevole.La possibilità di successo del cyber attacco dipende dalla consapevolezza della vittima del possibile attacco e dalla sua capacità di individuare l’inganno.
Hacker History sits down with D1g1t4l_T3mpl4r to discuss his hacker story. We learn about how D1g1t4l_T3mpl4r got into hacking, what it was like for a Midwestern hacker in the late 80s and early 90s. We discuss phreaking, hacking, hardware, phones, culture, a message for the newest hackers among us, and more. Cyphercon presentation
To read more about Kevin Mitnick and watch the video version visit: https://cybersecurityventures.com/cybersecuritys-greatest-show-on-earth-kevin-mitnick/ For more on cybersecurity, visit us at https://cybersecurityventures.com/ For all of our podcasts, visit us at https://cybercrime.radio Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/ Twitter: https://twitter.com/CybersecuritySF
HD is a very interesting character, founder of Metasploit, security researcher, phone phreak, ruby hacker and the founder of the company rumble! He joins us in this episode to tell us the story of Metasploit, making security research and internet scanning more accessible and normalized. HD picked up an interest in computers and the telephone system at an early age and spent his time reading ezines, 2600 and other magazines that talked about the force of technology and the creative exploring we know as hacking. The passion went from just making silly screen savers to starting to play with, the analog phone system. Phreaking away on the phone lines and using the knowledge to travel wherever he wanted, on the phone lines. In 2003, at the time where the internet still was young and the security research where kept in the dark. HD wanted to shine some light on this and instead of commercializing and building a proprietary product he created metasploit. In order to make exploits easy to use and available for the business side and the hobbyist. HD received a lot of push back for doing this. A lot of people did not want to make security tools and techniques available for the wide majority to use. They tried to get him fired, hares him and a lot more :/ This mob of angry people did not stop him from keep working at metasploit. Countless hours were spent porting exploits to it. Making them easier to use and more accessible for everyone to use. A couple of years later the metasploit project got bought up by the US-based company "rapid7" which is home to several security related projects. One of these interesting projects is Project Sonar. Project Sonar is continuously scanning and indexing the entire internet. Creating a huge map of every device on the internet that you can search on based on timestamps. Like a modern-day time-machine for exploring devices on the internet. This can be used for keeping track of types of things, such as tracking Hillary Clinton's email server. Exploring the internet on a larger scale like this of course does not come without finding a lot of interesting things, HD tells us about the time he found a surgical robot that was being used for operating on people with a publicly accessible web interface. Luckily this was quickly reported and fixed! Evolution is pushing innovation and scanning the entire internet, which was very hard to do a while back is now not only cheap but can also be done in a couple of hours. Today HD is the CEO of a company called Rumble, and has gone from exploring the public internet to exploring the inner realms of intranets and internal networks. External links: https://www.rumble.run/ https://www.metasploit.com/ https://www.rapid7.com/research/project-sonar/ https://en.wikipedia.org/wiki/SAINT_(software) https://www.hdm.io/ https://github.com/hdm https://2600.com/ https://en.wikipedia.org/wiki/WarVOX https://zmap.io/
It's been a week; no self-driving cars anytime soon, shoooocking; Google & Fitbit deal with the EU; Hold For Me; Whole Foods employees angry at Amazon workers; cussing Parrots; Amazon's Utopia; Deep Questions with Cal Newport; Tehran; Borat's back; Hackers Part Deux; The Last Dance; RIP, Geeks & Beats; the Expanse books wrap up; Murderbot Diaries confusion; Phreaking at Disneyland; Elon Musk returns to Moron of the Week.Show notes at https://gog.show/476
Last week was Xbox Series X news, this week we get Playstation 5... but not quite yet, so we make our bold predictions that are sure to be wildly inaccurate within 24 hours. Plus a look back at how incredibly perfect our predictions were about Xbox last week (if you could check for us that'd be great). Plus all the Apple news on the Watch, the iPad and the One Plan To Rule Them All. Then there's Paul Rudd keeping it real like the certified young person he is, and Nic discovers the phreaker can now own our door locks. WTF? See acast.com/privacy for privacy and opt-out information.
More about Our Guesthttps://researchers.anu.edu.au/researchers/grabosky-pnPersons of Note:Abbie Hoffmanhttps://www.smithsonianmag.com/history/how-new-york-stock-exchange-gave-abbie-hoffman-his-start-guerrilla-theater-180964612/JoyBubbles, Josef Carl Engressia Jr.https://en.wikipedia.org/wiki/JoybubblesCaptain Crunch(VIDEO) 2015: "History of Hacking" by John "Captain Crunch" Draperhttps://www.youtube.com/watch?v=DK-352AWaKkYan Laura (22 Oct 2019) An Early Hacker Used a Cereal Box Whistle to Take Over Phone Lineshttps://www.popularmechanics.com/technology/a20762221/an-early-hacker-used-a-cereal-box-whistle-to-take-over-phone-lines/CSO, (20 Nov, 2017) Captain Crunch aka John Draper banned from DefCon for sexual misconducthttps://www.csoonline.com/article/3237591/captain-crunch-aka-john-draper-banned-from-defcon-for-sexual-misconduct.htmlCaptain ZapDelio, Michelle (Feb 6, 2001) The Greatest Hacks of All Timehttps://www.wired.com/2001/02/the-greatest-hacks-of-all-time/CaptainZaphttps://hackstory.net/Captain_ZapSteve Jobs and Steve WozniakLapsley, Phil (Feb 20, 2013) The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking(VIDEO) 1984: "Wozniak Meets Steve Jobs: Blue Box Free Phone Calls Worldwide" by Steve Wozniakhttps://www.youtube.com/watch?v=oeVOpDUWwpU ReadingDonn B Parker Crime by Computer (1976)August Bequai Computer Crime (1978)Steve Levy Hackers: Heroes of the computer revolution (1984)Gordon Meyer & Jim Thomas COMPUTER UNDERGROUND DIGEST (1990-2000)http://www.computer-underground-digest.org/Clough and Mungo Approaching Zero 1992C. Stoll Cuckoo’s Egg (1989) OtherA few things that you missed:You could read this paper from 1977, in which August Bequai attempts to define and illustrate the then 100 million dollar problem of computer crime :https://heinonline.org/HOL/P?h=hein.journals/polqua6&i=22The Equity Funding Scam.https://en.wikipedia.org/wiki/Equity_FundingBarbash, Fred(Nov 16, 1982) High Court to Review SEC Action on Whistleblower,https://www.washingtonpost.com/archive/politics/1982/11/16/high-court-to-review-sec-action-on-whistleblower/5d132a9e-f411-4138-acff-19d464c99189/Initial findings of the SEC on The Equity Funding Corporationhttps://www.sec.gov/litigation/aljdec/1978/id19780901djm.pdf MIT still has a Model railway clubhttp://tmrc.mit.edu/Rod Stewart (https://en.wikipedia.org/wiki/Rod_Stewart) is a railway enthusiast. I once worked with a guy who had a beer with Rod Stewart and insisted he was a good bloke.https://www.bbc.com/news/entertainment-arts-50403561Information wants to be freehttps://en.wikipedia.org/wiki/Information_wants_to_be_freeWhat is a punch card?https://www.computerhope.com/jargon/p/punccard.htmDARPA, the group behind the internet infrastructure, still existshttps://www.darpa.mil/
Cameron Smith @Secnomancer Layer8conference is virtual (https://layer8conference.com/layer-8-is-online-this-year/) https://csrc.nist.gov/publications/detail/sp/800-171/rev-1/final CMMC:https://info.summit7systems.com/blog/cmmc https://www.comptia.org/certifications/project - Project+ Cameron’s Smith = www.twitter.com/secnomancer Cybersmith.com - Up by 14 April Ask@thecybersmith.com Cameron@thecybersmith.com https://en.wikipedia.org/wiki/Christopher_Voss https://www.amazon.com/Never-Split-Difference-Negotiating-Depended/dp/0062407805 https://www.masterclass.com/classes/chris-voss-teaches-the-art-of-negotiation https://www.masterclass.com/ https://www.autopsy.com/support/training/covid-19-free-autopsy-training/ https://www.youtube.com/playlist?list=PLg_QXA4bGHpvsW-qeoi3_yhiZg8zBzNwQ “There is nothing noble in being superior to your fellow man; true nobility is being superior to your former self.”― Ernest Hemingway https://www.goodreads.com/quotes/76281-there-is-nothing-noble-in-being-superior-to-your-fellow Original B-Sides Talk Blurb SITREP: A Consultant's Perspective from the Trenches of InfoSec In this session you will hear war stories and lessons learned consulting for hundreds of clients across dozens of verticals at every level, from bootstrapped startups with garage beginnings to Fortune 50 companies and everything in between. We will cover life on the front lines in InfoSec, ranging from individual contributions and staying relevant in a rapidly evolving field all the way to how bad most orgs are at InfoSec and what we can do as practitioners to help make them better. Speaking Goal After my presentation is over, I want my audience to... Feel better about where they are as an infosec practitioner Understand that most of Cybersecurity is largely NOT about the latest hack or technique Failing is OK as long as you learn from it ...so that ... When they go back to their office / SOC / client engagements on Monday they focus on the things that matter to their organizations Hopefully feel a little bit less that the work they are doing is boring, exhausting, unappreciated, or hopeless Intro Security is a really crazy industry Like the wild west out here Constant threats Complacent or ignorant clients/dependents Resource and budget constraints Security is really complex There are SO. MANY. MOVING. PIECES. There is a never ending stream of new information to learn and new threats to face Security always involves at LEAST 4 parts The practitioner - Hopefully you have backup! What you're protecting - Employer, Client, System, Application, Data, SOMETHING, etc What you're protecting it from - External TAs, Internal TAs, Incompetence, Apathy, Plain Ol' Vanilla Constraints, etc What you have to protect it with - Budgets, Time, Personnel, Training, Relationships, etc Cybersecurity/Information Security is simultaneously an old and new/emergent discipline Cyber History Old Nevil Maskelyne / Guglielmo Marconi wireless telegraphy attack and Morse code insults - 1903 Phreaking in the 1960s ARPANET Creeper - 1971 Morris Worm - 1988 New Gartner Coined term SOAR in 2017 Yeah... It's barely 3 years old. Now you can literally find job openings with SOAR Engineering titles DevSecOps - Amazon presentation in 2015? Not even in grade school yet. Average enterprise is running 75 security tools in their environment (Cybersecurity almanac 2019) Most cybersecurity professionals over 30 do not have degrees in cybersecurity Many don't even have Computer Science or IT related degrees This is it's own problem Training cyber pros, Chris Sanders, cognitive crisis, etc. BDS ep 2019-021 and 2019-022 Emergent disciplines are challenging by default You chose to play the game on hard mode for your first play through Security really isn't as complicated as most people think Occult Phenomenon Things we don't understand we imagine to be far more complex Things we anticipate we imagine to be far worse than they are Grass isn't greener Most security departments aren't doing better than you are Maturity models aren't magic Establish Credibility I have been in A LOT of client environments in the last 12 years Last time I checked, I have more than 350 discrete client engagements under my belt I have worked with hundreds of internal, external, and hybrid IT and Security solutions I've met the same tired and beleaguered IT/Security personnel over and over again SSDD, very little actually changes from place to place In that time, I've learned quite a bit about what makes security work I've learned even more about what NOT to do I want to share some of that with you today so you can see how organizations of all shapes and sizes can fail Very Large Company Examples Big Four Bank Example Situation Four Local Branches in Midwest Physical Security Assessment How got onto site as cash machine servicer was incredibly easy Problem Absolute trust of vendors/vendor compromise How do we as security practitioners fix it? Good internal relationships with functional area leaders Work closely with functional areas to left and to the right Who? Operations? HR? Purchasing? Every functional area and specifically the leadership Improved communications and availability 8 and Up 'Gotta git gud' at the soft stuff Top 50 Chain Restaurant Example Situation Doing Chip Reader refreshes across all ~600 locations for PCI Compliance during 2017 window Problem Poor project management on behalf of security team led to project failure A security problem became an IT problem Contractor to subcontractor to subcontractor added time and complexity How do we as security practitioners fix it? Security managers needs to be aware of how their projects impact others Managing up Security needs to be interdisciplinary Government Examples Police Department Example Situation City Administrator got Spear Phished Problem Spear phishing Poor logging How do we as security practitioners fix it? Look for the most basic problems and try to fix them Find or create solutions that provide basic capabilities Cannot prevent the lowest hanging fruit directly, so impact what you can change What you can actually do about phishing Getting people to do something that you want them to do Defense SubContractor Example Situation Working with MSP on security issues “Do we have a SIEM” email? Problem Company executives have never done due diligence Assumed that MSP had it under control MSP just did what they normally do and within letter of their contract How do we as security practitioners fix it? Security needs to be proactive Small Company Examples Light Manufacturer Example Situation Server not working, Ransomware Attackers pivoted through third party accountant access Problem Single Point of Failure (SPOF) Vendor Compromise How do we as security practitioners solve it? IT problems become security problems on long enough timeline Need to provide actual solutions to business problems Security CANNOT be decoupled from business needs Telecommunications Provider Situation Employee reports CEO was hacked Problem Employee panicked, emailed everyone Escalated way beyond what was necessary How do we as security practitioners solve it? Employee education - Boring answer What's actually under our control here? Clear processes for security incidents Clear communications channels for employees with IT and security groups Knowledge management Local NGO Example Situation Meeting with Executive Director regarding server failure Problem Mentions that she was sent security guidelines from global parent org Got so overwhelmed reading it she just closed it and kept working on something else How do we as security practitioners solve it? We have to make this information digestible and accessible We do NOT need to make already dense subject matter even more inaccessible When cannot mandate compliance, how do you achieve compliance More flies with honey than vinegar Build relationships - Layer 8 strikes again Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #Pandora: https://pandora.app.link/p9AvwdTpT3 #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel: http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site: https://brakesec.com/bdswebsite #iHeartRadio App: https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec
Cameron Smith @Secnomancer Layer8conference is virtual (https://layer8conference.com/layer-8-is-online-this-year/) https://csrc.nist.gov/publications/detail/sp/800-171/rev-1/final CMMC:https://info.summit7systems.com/blog/cmmc https://www.comptia.org/certifications/project - Project+ Cameron’s Smith = www.twitter.com/secnomancer Cybersmith.com - Up by 14 April Ask@thecybersmith.com Cameron@thecybersmith.com https://en.wikipedia.org/wiki/Christopher_Voss https://www.amazon.com/Never-Split-Difference-Negotiating-Depended/dp/0062407805 https://www.masterclass.com/classes/chris-voss-teaches-the-art-of-negotiation https://www.masterclass.com/ https://www.autopsy.com/support/training/covid-19-free-autopsy-training/ https://www.youtube.com/playlist?list=PLg_QXA4bGHpvsW-qeoi3_yhiZg8zBzNwQ “There is nothing noble in being superior to your fellow man; true nobility is being superior to your former self.”― Ernest Hemingway https://www.goodreads.com/quotes/76281-there-is-nothing-noble-in-being-superior-to-your-fellow Original B-Sides Talk Blurb SITREP: A Consultant's Perspective from the Trenches of InfoSec In this session you will hear war stories and lessons learned consulting for hundreds of clients across dozens of verticals at every level, from bootstrapped startups with garage beginnings to Fortune 50 companies and everything in between. We will cover life on the front lines in InfoSec, ranging from individual contributions and staying relevant in a rapidly evolving field all the way to how bad most orgs are at InfoSec and what we can do as practitioners to help make them better. Speaking Goal After my presentation is over, I want my audience to... Feel better about where they are as an infosec practitioner Understand that most of Cybersecurity is largely NOT about the latest hack or technique Failing is OK as long as you learn from it ...so that ... When they go back to their office / SOC / client engagements on Monday they focus on the things that matter to their organizations Hopefully feel a little bit less that the work they are doing is boring, exhausting, unappreciated, or hopeless Intro Security is a really crazy industry Like the wild west out here Constant threats Complacent or ignorant clients/dependents Resource and budget constraints Security is really complex There are SO. MANY. MOVING. PIECES. There is a never ending stream of new information to learn and new threats to face Security always involves at LEAST 4 parts The practitioner - Hopefully you have backup! What you're protecting - Employer, Client, System, Application, Data, SOMETHING, etc What you're protecting it from - External TAs, Internal TAs, Incompetence, Apathy, Plain Ol' Vanilla Constraints, etc What you have to protect it with - Budgets, Time, Personnel, Training, Relationships, etc Cybersecurity/Information Security is simultaneously an old and new/emergent discipline Cyber History Old Nevil Maskelyne / Guglielmo Marconi wireless telegraphy attack and Morse code insults - 1903 Phreaking in the 1960s ARPANET Creeper - 1971 Morris Worm - 1988 New Gartner Coined term SOAR in 2017 Yeah... It's barely 3 years old. Now you can literally find job openings with SOAR Engineering titles DevSecOps - Amazon presentation in 2015? Not even in grade school yet. Average enterprise is running 75 security tools in their environment (Cybersecurity almanac 2019) Most cybersecurity professionals over 30 do not have degrees in cybersecurity Many don't even have Computer Science or IT related degrees This is it's own problem Training cyber pros, Chris Sanders, cognitive crisis, etc. BDS ep 2019-021 and 2019-022 Emergent disciplines are challenging by default You chose to play the game on hard mode for your first play through Security really isn't as complicated as most people think Occult Phenomenon Things we don't understand we imagine to be far more complex Things we anticipate we imagine to be far worse than they are Grass isn't greener Most security departments aren't doing better than you are Maturity models aren't magic Establish Credibility I have been in A LOT of client environments in the last 12 years Last time I checked, I have more than 350 discrete client engagements under my belt I have worked with hundreds of internal, external, and hybrid IT and Security solutions I've met the same tired and beleaguered IT/Security personnel over and over again SSDD, very little actually changes from place to place In that time, I've learned quite a bit about what makes security work I've learned even more about what NOT to do I want to share some of that with you today so you can see how organizations of all shapes and sizes can fail Very Large Company Examples Big Four Bank Example Situation Four Local Branches in Midwest Physical Security Assessment How got onto site as cash machine servicer was incredibly easy Problem Absolute trust of vendors/vendor compromise How do we as security practitioners fix it? Good internal relationships with functional area leaders Work closely with functional areas to left and to the right Who? Operations? HR? Purchasing? Every functional area and specifically the leadership Improved communications and availability 8 and Up 'Gotta git gud' at the soft stuff Top 50 Chain Restaurant Example Situation Doing Chip Reader refreshes across all ~600 locations for PCI Compliance during 2017 window Problem Poor project management on behalf of security team led to project failure A security problem became an IT problem Contractor to subcontractor to subcontractor added time and complexity How do we as security practitioners fix it? Security managers needs to be aware of how their projects impact others Managing up Security needs to be interdisciplinary Government Examples Police Department Example Situation City Administrator got Spear Phished Problem Spear phishing Poor logging How do we as security practitioners fix it? Look for the most basic problems and try to fix them Find or create solutions that provide basic capabilities Cannot prevent the lowest hanging fruit directly, so impact what you can change What you can actually do about phishing Getting people to do something that you want them to do Defense SubContractor Example Situation Working with MSP on security issues “Do we have a SIEM” email? Problem Company executives have never done due diligence Assumed that MSP had it under control MSP just did what they normally do and within letter of their contract How do we as security practitioners fix it? Security needs to be proactive Small Company Examples Light Manufacturer Example Situation Server not working, Ransomware Attackers pivoted through third party accountant access Problem Single Point of Failure (SPOF) Vendor Compromise How do we as security practitioners solve it? IT problems become security problems on long enough timeline Need to provide actual solutions to business problems Security CANNOT be decoupled from business needs Telecommunications Provider Situation Employee reports CEO was hacked Problem Employee panicked, emailed everyone Escalated way beyond what was necessary How do we as security practitioners solve it? Employee education - Boring answer What's actually under our control here? Clear processes for security incidents Clear communications channels for employees with IT and security groups Knowledge management Local NGO Example Situation Meeting with Executive Director regarding server failure Problem Mentions that she was sent security guidelines from global parent org Got so overwhelmed reading it she just closed it and kept working on something else How do we as security practitioners solve it? We have to make this information digestible and accessible We do NOT need to make already dense subject matter even more inaccessible When cannot mandate compliance, how do you achieve compliance More flies with honey than vinegar Build relationships - Layer 8 strikes again Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #Pandora: https://pandora.app.link/p9AvwdTpT3 #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel: http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site: https://brakesec.com/bdswebsite #iHeartRadio App: https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec
I commend people who are stuck in their ways because they're gonna be the ones that are going to be protected the most in the terrible event that something tragic does happen to us here. Karin and Kelly continue the conversation with Ashley Oliver and discuss cybersecurity, cryptocurrency, and potential changes to consumer banking in the coming decade. We also talk about a fun emanation experiment, and Ashley teaches us about Faraday cages and Van Eck phreaking. Connect with Ashley Facebook (https://www.facebook.com/ashley.oliver.165470) | LinkedIn (https://www.linkedin.com/in/ashleyreed4218/) | Instagram (https://www.instagram.com/olivercomsolutions_/) | Blog (https://olivercomsolutions.blogspot.com/) Want to learn more about 5G? Sign up for Ashley's webinar here (https://zoom.us/webinar/register/WN_uV1XGrRJS4qiDm9yKY7cyg) Ready to land any job you want in cybersecurity? Ashley can help! Sign up for her webinar on how to become a cybersecurity expert here (https://zoom.us/webinar/register/WN_oXIiDwMlRcOiveA6pB3MrA) Music This episode features "Brain Power" (https://freemusicarchive.org/music/Mela/Mela_two) by Mela from the album Mela two. This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License Follow Karin Blog (http://www.kethorne.com/) | Instagram (https://www.instagram.com/karin_thorne/) | Twitter (https://twitter.com/kaythorne) | Email (mailto:contact@kethorne.com) Follow JSWebb Development Site (https://jswebbdevelopment.com/) | Twitter (https://twitter.com/JSWebb_Dev) | Instagram (https://www.instagram.com/jswebbdev/) | Email (mailto:jswebbdevelopment@gmail.com) Follow Kelly Site (https://kell.dev/) | Instagram (https://www.instagram.com/kellytoearth/) | Twitter (https://twitter.com/kellytoearth) | Email (mailto:hello@kell.dev) Follow Salt City Code Instagram (https://www.instagram.com/saltcitycode/) | Twitter (https://twitter.com/saltcitycode) | Email (mailto:saltcitycode@gmail.com) --- Special Guest: Ashley Oliver.
In this episode we teach you how to use a Cap’n Crunch Bo’sun whistle to get free long distance calls.
It's a Phreaking special! We've included some audio from the wideweb phone trips site, "How Evan Doorbell Became a Phone Phreak part one" along with Katie and Alex's first few amateurish pranks. Oh, there will be much more, and they will be much funnier, but this is a historic moment in AF history! It's the first episode that includes calls that they did themselves, not left by listeners! Hey Fasters, leave us a voicemail at 737 800 1776! Follow us on Instagram: @accidentallyfasting Check out more fun junk at accidentallyfasting.com --- Support this podcast: https://anchor.fm/accidentally-fasting/support
Phreaking spelled with a "ph", otherwise known as phone hacking began in the 1960's when John Draper discovered that the whistle included in the Captain Crunch cereal boxes emitted a tone of precisely 2600 hertz.This was the same frequency the AT&T used for long distance and allowed people to make free calls. Some famous pranksters who also explored this were Steve Wozniak and Steve Jobs, the founders of Apple Computer.People started building "blue boxes" which were used to facilitate exploring long distance phone call routing. 2600 also became a quarterly publication that you can still buy today in places like Chapters, Barnes & Nobles, and even Amazon. There are current issues containing news of the computer underground. The magazine is a platform for speaking out against digital surveillance and advocating for digital and personal freedom.You can now begin recognizing the use of "2600" references in books and movies, whenever hackers are involved you start seeing 2600 mentionned.As an aside, this stopped working in the 1980's and the laws are much more strict. So don't even try this at home, it won't work. This was just to educate on some history of phone hacking and 2600.
¿Sabes qué es el Phreaking? ¿Eres 1337? ¿Matrix es un plagio de Hackers? ¿Si cambias los hackers por skaters es lo mismo? ¿Qué hace Marc Anthony aquí?
En el Episodio 023 tuvimos como invitado especial al gran! “Vampii” con el que hablamos sobre sus inicios en el mundo del hacking, quienes lo inspiraron, que es Phreaking y subculturas hackers y muchos temas más. Algunas preguntas fueron: ¿Cómo comenzaste en el mundo del Hacking? ¿Cuáles fueron tus primeros pasos? ¿Te acordas de algunas e-Zines de aquella época? ¿Quiénes te inspiraron? ¿Qué era el Phreaking? ¿Qué eran las famosas Blue Box, Black Box, Red Box? ¿Subcultura Hackers, cuáles eran los grupos famosos? ¿Qué pensas que cambió? Invitado: Jorge “Vampii” Franco,(@vampii) Staff: Diego (@BlackMantisSeg) Maxi (@MaxiSoler) Carlos (@carlosloyo23) Santiago (@friquetito) Emiliano (@emilianox) Marcos (@artsweb)
Occultae Veritatis Podcast Case #066: The Anarchist Cookbook The Anarchist Cookbook, is a book that contains instructions for the manufacture of explosives, rudimentary telecommunications phreaking devices, weapons, and instructions for home manufacturing of illicit drugs Subscribe: https://linktr.ee/ovpodcast Pallet cleanser: Song: Friends (Out There) Artist: Naked Bone Support the show on Patreon! https://www.patreon.com/ovpod
Show Notes: https://thugcrowd.com/notes/20181211.html
Show Notes: https://thugcrowd.com/notes/20181211.html
Show Notes: https://thugcrowd.com/notes/20181127.html
Show Notes: https://thugcrowd.com/notes/20181127.html
Desmistificamos o hacker e falamos muito sobre segurança! Feed do podcast: www.lambda3.com.br/feed/podcast Feed do podcast somente com episódios técnicos: www.lambda3.com.br/feed/podcast-tecnico Feed do podcast somente com episódios não técnicos: www.lambda3.com.br/feed/podcast-nao-tecnico Pauta: O que significa o termo hacker? Hacking, Cracking, Phreaking, white hat, black hat, grey hat Quais são as formas éticas de se praticar hacking O que faz uma pessoa que atua na área de segurança da informação? Vulnerabilidades, zero day, rootkit, virus, ransomware, backdoor, sniffing, injection, xss Falha de segurança é bug ou dívida técnica? Como se proteger: Tor, VPN, updates, antivírus, não reuse senhas, password manager, 2fa Eventos: defcon, Cryptorave Botnet Mirai Urna eletrônicas brasileira Experiências pessoais com hacking e segurança Links Citados: Zero day, Mark Russinovich OWASP Top 10 Google Project Zero Meltdown e Spectre Contêineres do Firefox Contêiner do Facebook no Firefox Firefox Focus Riseup (ferramentas de comunicação on-line para pessoas e grupos trabalhando por mudanças sociais libertadoras) Yandex (serviço de email e hosting situada na Rússia, com restrições com a NSA) urnaeletronica.info Relatorio técnico do TSE sobre a urna eletrônica Nerdcast sobre urnas eletrônicas Plaid CTF Kevin Mitnick Brian Krebs (jornalista de infosec) Expoit-db Revista PoC || GTFO Mirai Código do Mirai Tools for a safer PC Defcon Sobre CTF de ataque e defesa (defcon 2017 - cLEMENCy) Participantes: Giovanni Bassi - @giovannibassi Lucas Bertin – @lucascebertin Lucas Teles – @lucasteles42 Roberta Nunes - @betabrandaorio Edição: Luppi Arts Créditos das músicas usadas neste programa: Music by Kevin MacLeod (incompetech.com) licensed under Creative Commons: By Attribution 3.0 - creativecommons.org/licenses/by/3.0
TJ completes a lengthy quest on Twitch. Jon brings back an old segment, and tasks his co-hosts with homework assignments. NBA 2k19 is played, Matt's sleep schedule is tested, and Jon is a puppy dad. Warm up the hot stove, take off your pants in front of strangers and tune in now!
Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term phreak is a sensational spelling of the word freak with the ph- from phone, and may also refer to the use of various audio frequencies to manipulate a phone system. Phreak, phreaker, or phone phreak are names used for and by individuals who participate in phreaking. The term first referred to groups who had reverse engineered the system of tones used to route long-distance calls. By re-creating these tones, phreaks could switch calls from the phone handset, allowing free calls to be made around the world. To ease the creation of these tones, electronic tone generators known as blue boxes became a staple of the phreaker community, including future Apple Inc. cofounders Steve Jobs and Steve Wozniak. The blue box era came to an end with the ever-increasing use of computerized phone systems, which sent dialing information on a separate, inaccessible channel. By the 1980s, much of the system in the US and Western Europe had been converted. Phreaking has since become closely linked with computer hacking. This is sometimes called the H/P culture (with H standing for hacking and P standing for phreaking) Information Sourced from; https://en.wikipedia.org/wiki/Phreaking Body Sourced From: Code 2600 - Computer History, Hacking and Surveillance Documentary https://youtu.be/F8uuRSfDqiU Public Access America PublicAccessPod Productions Footage edited by PublicAccessPod producer of Public Access America Podcast Links Stitcher: goo.gl/XpKHWB iTunes: goo.gl/soc7KG GooglePlay: goo.gl/gPEDbf YouTube goo.gl/xrKbJb
The Phone Phreak Episode: The Woods, To All Who Dare, Phreak Philes, The Office, My Ship In The Darkness, The Next Generation, Exploding the Phone. I really push the book "Exploding the Phone" by Phil Lapsley in this episode. If you've not heard of it or you've always been on the fence about it... if the history of Phreaking interests you, this is the book.
Scott and Hayley talk about a memorial service, then stay culturally relevant by talking about a 25 year old movie... and then a 44 year old movie. Are we old? Beefy heavy! Closing Track: Scary Monsters (And Super Creeps) by David Bowie.
Critical Point is currently working on bringing our new show Phreaking to San Francisco! In this audio special, we will hear how the show has developed over the process. We will also sit down with Dylan James Amick, as he answers some questions about why we are so enamored with this show and its subject matter. Finally, […]
Critical Point is currently working on bringing our new show Phreaking to San Francisco! In this audio special, we will hear how the show has developed over the process. We will also sit down with Dylan James Amick, as he answers some questions about why we are so enamored with this show and its subject matter. Finally, […]
This month on Open Apple we sit down with David Schroeder, author of classic Apple II games such as Crisis Mountain, Dino Eggs, and Short Circuit. We talk about the randomness of our passionate brand-loyalty, the logistical realities of early Apple II development, and the magical era of “one-person, one-game”. We get into a lot of the technical […]
Obsoleet s02e02 – RISC OS on the Raspberry Pi Show Notes In this episode, we run RISC OS on the Raspberry Pi. About the Raspberry Pi – http://www.raspberrypi.org/ Operating system images for download – http://www.raspberrypi.org/downloads/ Win32 Disk Imager for writing to the SD Card on a Windows PC – http://sourceforge.net/projects/win32diskimager/ https://ia902505.us.archive.org/12/items/Obsoleet.s02e02/Obsoleet.s02e02.h264.1080p.mp4
Obsoleet s02e01 – Commodore Floppy Copy Show Notes First episode for the new season, using some footage shot last year. This episode focuses on backing up your Commodore disks to create images which can then be archived or played on an emulator. Showcases the ZoomFloppy, used to connect a Commodore Disk Drive to a modern […]
The Audiosode Show Notes Segments: 8-Track Tapes Book Review Flexies “8-Track Tapes” Shows the basics of 8-track tapes. Uses a Sears player/recorder. Music was recorded on to tape with an iPod connected to the input jacks on the tape deck. “Book Reviews” Kingpin – Kevin Poulsen Ghost in the Wires – Kevin Mitnick “Flexies” Shows […]
We take a trip down memory lane and talk about communication. How it has evolved over the past few decades, from radio to telephones, including some stories about phone phreaking, bulletin boards, and cell phones & beepers. SHOW NOTES: Artist's statement generator AcuteB Replacement battery rotary dial telephone DTMF USRobotics modems Motorola MicroTAC ANSI art Red Box Radio Shack tone dialer red box instructions Phone Phreaking CB Radio Ham Radio
The Digisode Show Notes Segments: Minidiscs ‘Secrets of a Super Hacker’ Review Digitizing VHS âMinidiscsâ Shows the basics of Minidisc Net-MD players, transferring to Minidsic from the computer, and playback on a Minidisc deck. Players used were: MZ-NE410, MZ-N510, MDS-JE500 (deck) The SonicStage software can be found here, forums.sonyinsider.com/files/file/95-sonicstage-43-ultimate-edition/ NOTE: Registration is required for download, […]
“The Belatesode” Show Notes Segments: CEDs Part II Holiday Reviews Commodore 1702 “CEDs Part II” Shows the operation of several CED players including: RCA Selectavision SKT 200 RCA Selectavision SJT 100 RCA Selectavision SFT 100 Zenith CED VP2000 “Holiday Reviews” Reviews several items: – “From Betamax to Blockbuster” by Joshua Greenberg – “Phone Losers of […]
“The Perspectivsode” Show Notes Segments: VHS Basics Payphone Anatomy Quadraphonics “VHS Basics” Makes use of a RCA Selectavision VCR and a Phillips Magnavox VCR. The segment talks about the history of VHS format and introduces the VCR and VHS tape. “Payphone Anatomy” Segment shows the inside and outside of a Protel payphone. This phone is […]
“The Monstersode” Segments: Scrap Stereo System Project (Shinmaryuu) Laserdisc Lives Old School BBSing (Patt) “Scrap Stereo System Project” Questions go to @Shinmaryuu on twitter. My scrap stereo system project and how to buy a old school stereo system components. My stereo is made up of a MCS (JC Penny Store) brand all in one system […]
Segments: Betamax Basics Vocoding with the Stylophone Reel-to-Reel Players “Betamax Basics” used a Sanyo Betacord VCR 4400, and a broken Sony Betamax SL-HF550. The blank tapes were Kodak and Sony brands with the number L-750. This segment focused on using the Betamax player while providing a brief history. “Vocoding with the Stylophone” used a Stylophone […]
Segments: Pocket Tone Dialers CEDs Portable Radio Station “Pocket Tone Dialers” used a Portatouch2 tone dialer, a Radioshack tone dialer, and a Bell model 500 rotary telephone. The Radioshack tone dialer appears to be modified to relay sound to an audio jack. Also featured was an iPod Video, and a Sony cassette recorder. To relay […]
Show Notes Segments: Lineman’s Handset Cable Descramblers and Filters Podcasting on the Cheap “Lineman’s Handset” used a lineman’s handset, Bell model 500 rotary telephone, and a telephone wall jack. Both the handset and the phone were wired to the wall jack. To relay sound so the camera could hear it, a recorder telephone pickup (Radioshack […]
SecuraBit Episode 42 – Phreaking Sweet Con in TN. Phreaknic 13 – October 30 – November 1 2009 Phreaknic Curse CCTV throughout hotel, great + for attending the con Ware Chair Toss Firing a jet engine in the parking lot. Four Tracks 1 Cumberland (Main ballroom) 2 9th Floor (Vendor Area) 3 Cafe Area (Gaming) 4 Contest Area Size of conferences ShmooCon Running Conferences #RoachesMustDie from ShmooCon 2009 via Security Justice http://www.youtube.com/watch?v=6FsuvbGJ6f4 Microsoft Security Essentials - http://www.microsoft.com/security_essentials/ Google Wave - http://wave.google.com/help/wave/about.html New iTunes Store - http://www.apple.com/itunes/ Hotmail, Yahoo, and Gmail email passwords exposed - http://www.cso.com.au/article/321185/gmail_yahoo_mail_join_hotmail_passwords_exposed 1password - http://agilewebsolutions.com/products/1Password iKeepass - http://ikeepass.de/ Inside the URLZone Trojan Network - http://www.threatpost.com/blogs/inside-urlzone-trojan-network-105 Metasploit hiring in Austin, TX Rockstar QA Engineer Needed - http://austin.craigslist.org/sof/1410600092.html jQuery/Ruby Ninja Needed - http://austin.craigslist.org/sof/1410620402.html New version of Pocket God for the iPhone Hacker Consortium - http://hackerconsortium.com/ hack.rva - http://twitter.com/hackRVA - http://hackrva.org/ TechShop - http://techshop.ws/ Join us in IRC at irc.freenode.net #securabit Hosts: Anthony Gartner – @anthonygartner Chris Gerling – @chrisgerling Christopher Mills – @thechrisam Andrew Borel – @andrew_secbit Guest: SkyDog Links: Phreaknic 13 - http://www.phreaknic.info/pn13/