How to Modify a cordless phone for extended range.
8b61122ddd0453bc0e8f16988a66edd3979949efb38da39d0f3011ce6f423ad2
Interview with Sarlo and LVX from the Wind Chill
ccdf75f1b0f0decad74653d72b7db21ce00f1951ba371638cab3bf52f1b2f8ce
Breakdown of the UPC codes. Checksum/what it mean
8a0bb68dcb710db10106520a46d6483fe0f3a9156bb56eb2b4f1217931bdef30
Interview with Captian Crunch by Mondo 2000.
00e8cca4c99f32c1c748dc928ccbcd3da346c59591c27eb26cf3b1b0c4e0e651
Overview of Data transmission standards for Modems
68d0714a4a5f52d5e1e5d71a1f2e08a86e828cc06870cee1a7eda3eee282f5ab
Defcon ]I[ Announcment - Dec. 31, 1995
0fea044845603b1f4ca6884e7730d319d984cdd3db168912a6fc797655301c67
Detect cheap taps on your line. Won't find good
fd5d38f61d992edbae2b44ce50ede12eba9202c0fb0252550db1cc310ae05000
Article about Acid Phreak getting busted
5c05393f6656de0fb236dfec7f60900a65d2b045f49a1642a56704f171dc97c1
How to dissapear. Very interesting, you can [From The File Sponge]
b11b6cf4cb446afea05a8700c0f916408ecbea39569a32cba1a5fa12504d40aa
[TXT] Undocumented Dos Commands
ac8d4221fa954d941136b45b628bb59b040f632179b6972d7224123015338895
Introduction ot the use of Encryption.
5d927a214004a86ad79b5668df4377ba7cd4696724c1f4cf33901a91170af771
how to veiw the contents of envelopes without any hardware port (0000 to FFFF). This could be- come a valuable tool when troubleshooting or testing PC based projects, digital circuits or PC Mastercard Generator - With C++ source. Download it now, I know you want it, it's ELiTE!
adf32a03cd2587879892480256627c798b845f5ead1cac75c8062c1a4e9b6600
Fun with TV evangelists.
ef164a63c105eb0252fb6e716e586a3fe705bd26f8aa7c24da233d92765bf839
Push Button Felonies
82536b3850ecc23fa77b83554fc945c6462f04d7b572acc40199a7db3e7c1921
How to make a fake drivers liscense. Has GIF and if you have an account on the system.
94d8ea94168ab7e14b70147e3f1f8a6e5fdeff70c256c2621a176afb8674847c
Alt.locksmithing FAQ. Very good info on locks,
f331eec25a06e333d8ff8d4155a86f725d0be7788bbdf43a2ada27354354d95f
US government BBSes that are legal for us to use.
4cb115aeff87c5f1714b7cd3456ceac853865e34e6d0308276592d8a62c40ac5
make your own AV code for PKware products
5467fe475c534fa8828f0c3c4f00f759a1852dca46be74cbaa9a432e7b702685
Info on how the flash ANSI codes work, and why.
236ad1295464d64946c22561474c7b8865c6d8da9b707c6a1ffa94112ee7ed4a
Unlisted switches to the format command.
43da9439e59a875dd1c7614390198e38e518eb0075e552e33be93c8965c4686f
Lots of great phone pranks.
09ca3e4cce4920bb505c0d65879e406a479cf150f9ddd02ebf670ea16efc7926
Plans for a free energy machine, and physics
10065d988fe36da52dff8e185f43f3406bc990a24ee4b64aa846654646400661
Plans for a free energy machine, and plysics e you back to verify your phone number can be defeated.
e7a6aff823535aa44687ebfc6ab0b8c487664fa1e827cedf10e1b14338e405f3
How to be destructive at school. Can be quite fun!
e053e064f51cc31b73407513d2673ba96aaa025cdeb6a15d6220656ce2176bb7
Plans for Garage Door Opener Hacker. Opens any
fe35c9220e6deb06339346f4c4f61065f462d4381d012bb5d1fba5bce771aea7