The first time I called into an elevator, I picked up my iPhone and dialed the number—labeled on my list as the Crown Plaza Hotel in Chicago—and immediately heard two beeps, then a recording of a ...
Mike Convertino built a career making cyberweapons for the Air Force. While he can't talk about a lot that he did, there are some clues. He was decorated in Bosnia in the mid 1990s, around the same ...
I use the word “hack” advisedly in this column. It sets off alarms for GT Staff Writer Lucas Ropek and columnist Dan Lohrmann, who think in terms of white, gray and black hats in their coverage of ...
Apple founders Steve Wozniak and Steve Jobs had a brief and highly illegal business manufacturing and selling phone phreaking gear prior to founding Apple computer in 1976. Now one of the original ...
[Corelatus] said recently that “someone” asked them to identify the phone signals in the 1982 film The Wall, based on the Pink Floyd song of the same name. We suspect that, like us, that someone might ...
"Let's say a shopping center," says the hacker I'm talking to online. He's British, but is using an alias, 'Belial', and I don't know his real name. "The elevators or lifts inside have emergency ...
Hackers commonly replace the letter f with ph, a nod to the original form of hacking known as phone phreaking. Phreaking was coined by John Draper, aka Captain Crunch, who created the infamous Blue ...
In the 1960s and 70s, technically savvy enthusiasts sought to game telecommunications systems to make free calls, keeping telecom engineers on their toes. That practice, known as phreaking, involved ...
Intercepting a telephone line to make long distance calls or insert embarrassing comments. Phone phreakers would use a tone generator to bypass charges in the 1960s and 70s when telephone companies ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results