$2600 Magazine Downloads & Information |
World's Largest Undocumented $2600 Distribution Site |
"We are creating a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity."
--- Quote from John Perry Barlow in A Declaration of the Independence of Cyberspace on February 8, 1996.
"Long live the underground! When the underground is gone, when the people's will to resist overbearing government and kneejerk morality is gone... Then, shall I be able to declare America dead."
--- Quote from Jello Biafra, a frequent HOPE keynote speaker.
"If liberty means anything at all, it means the right to tell people what they do not want to hear."
--- Quote from George Orwell (Eric A. Blair [1903-1950])
"Anyone who stands up for what he believes in is an inspiration. That's the spirit of a hacker, and it's the spirit of an individual."
--- Quote from Evil Corley during an Off The Hook broadcast. (I don't remember which one.)
"It's a question of freedom of speech, something that has stood up for the last couple hundred years, and I think the Internet should definitely continue the tradition."
--- Quote from Evil Corley on Off The Hook, June 18, 1996.
"... Freedom of speech, on the other hand, is something that is universally sought after and recognized as valuable."
--- Quote from a reply to a letter by William R. Epp in Vol. 18, No. 3.
"As you probably know it you've read our pages before, we have some major issues with entities who abuse power and intimidate individuals..."
--- Quote from a reply to a letter by "anonymous" in Vol. 20, No. 2.
"Unthinking respect for authority is the greatest enemy of truth."
--- Quote (paraphrased) from Albert Einstein used in Vol. 23, No. 1.
"The first condition of progress is the removal of censorship."
--- Quote from George Bernard Shaw used in Vol. 33, No. 1.
"Journalism is printing what someone else does not want printed. Everything else is public relations."
--- Quote from George Orwell used in Vol. 32, No. 1.
"If tyranny and oppression come to this land, it will be in the guise of fighting a foreign enemy.
--- Quote from James Madison used in Vol. 22, No. 1.
"We may not like the message, we may not agree with it, but if what we allege to stand for is to have any value, we have to do everything possible to ensure it isn't silenced."
--- Quote from Evil Corley in the editorial for Vol. 20, No. 1.
"9.) I will aid the voiceless in obtaining a voice and help them evade censorship so they too can enjoy the fundamental human rights of free speech."
--- Quote from Ghost Exodus (Jesse McGraw) in his article "No Country for Incarcerated Hackers" in Vol. 35, No. 3
"Recognizing the content of the wikileaks.org website is the subject of concern to a variety of individuals and nations, we nevertheless believe it must be subject to the same laws and policies of availability as all Internet sites. Free expression should not be restricted by governmental or private controls over computer hardware or software, telecommunications infrastructure, or other essential components of the Internet."
--- Quote by The Internet Society (Mirror) from the article entitled "The Internet Society on the Wikileaks issue" in their membership newsletter. (December 2010)
"We have learned a great deal in watching the reactions of our various leaders. We see how the surveillance of so many aspects of our lives is supported by politicians of both parties and how deep the cover-up goes. We also see how they have no problem changing the rules behind our backs to make these inexcusable actions 'legal.' Shining the light on their subterfuge is about the most patriotic act we can think of."
--- Quote from the editorial in Vol. 30, No. 3.
"We know that freedom of speech - even freedom in general - is considered by an increasing number to be subject to restrictive conditions in the interests of 'security.' Never mind that total security is completely elusive. There will always be someone claiming we can do better by closing off yet another avenue of activity, beliefs, or speech. And simpletons, fueled by mass media hysterics, will continue to believe it.
--- Quote from the editorial in Vol. 18, No. 4.
"Change does not come about from mindlessly following the rules. That's how dictatorships are maintained. Change is achieved through constant experimentation, the exchanging of ideas, and the freedom to do so. A society that views such things with suspicion is one that is doomed to stagnate and eventually fall."
--- Quote from the editorial in Vol. 22, No. 3.
"We may not like hate speech but it is within our rights to read it, listen to it, or watch it if we so desire."
--- Quote from the editorial in Vol. 23, No. 3.
Cult of the Dead Cow - FreedomcDc communications & HACKTIVISMO "A Special Message of Hope"
CENSOR! ATTACK! BAN! DELETE! SHUN! CANCEL! DEPLATFORM! SHUT IT DOWN!!!!!!
"Without the knowledge or support of management or the Board, Twitter learned that [Peiter] Zatko had engaged with members of U.S. intelligence agencies and sought to enter a formal agreement that would allow him to work with them and provide information to them."
...
"'The organizations and people behind this recommendation' Zatko explains, 'have the connection [sic] to get this in front of the right people in the administration.'"Oh look... Another Cult of the Dead Cow member trying to stiffle the freedoms of Americans. Mudge wanted pre-Elon Twitter to hire (((The Alethea Group))) - an organization run by people like Ukraine war-monger (((Nina Jankowicz))) - to spy on average Americans, and he pushed for more government-linked censorship. Do you think the (((EFF))) or $2600 will do anything about this? LOL!
- What Would (((Jello))) Do? Sell-out and become a tool for the FAGA Deep State & One Percent.
- 2600 Kicked Off of YouTube for Sarcastic Remark $2600 has now felt what many other content providers have felt after being censored for a seemingly meaningless, off-the-cuff remark.
Russia! Palestine! Iraq! Iran! Syria! Yemen!
Don't question anything!
Be a good goyim and fight our, err... your enemy!
War is peace.
Freedom is slavery.
Ignorance is strength.
"By means of ever more effective methods of mind-manipulation, the democracies will change their nature; the quaint old forms -- elections, parliaments, Supreme Courts and all the rest -- will remain. The underlying substance will be a new kind of non-violent totalitarianism. All the traditional names, all the hallowed slogans will remain exactly what they were in the good old days. Democracy and freedom will be the theme of every broadcast and editorial. ... Meanwhile the ruling (((oligarchy))) and its highly trained elite of soldiers, policemen, thought-manufacturers and mind-manipulators will quietly run the show as they see fit."
...
"But liberty, as we all know, cannot flourish in a country that is permanently on a war footing, or even a near war footing. Permanent crisis justifies permanent control of everything and everybody by the agencies of the central government."--- Aldous Huxley, Brave New World, 1958.
"At press time, Parler was no longer in service. We're not mourning its loss and don't believe it ever offered anything of value. We would certainly like to see alternative social media sites that aren't batshit crazy, as having everyone using only a couple of different sites is far from ideal."
--- Quote from a reply to a letter by "Jason" in Vol. 37, No. 4. Ironic, as $2600 is one of the most "batshit crazy" publications out there...
"Someone in this group reported me and got my account blocked for 24 hours over something that wasn't even that serious. I'm unhappy about that and I've never ever had someone do something so petty."
"I keep getting muted from the 2600 group without explanation. What am I doing wrong here?"
"Unfortunately, I've been blocked for seven days from posting for no apparent reason. I would like to read the guidelines as suggested, but when I go to read them, it says the post has been removed or deleted. Can someone please send me the guidelines and, if possible, tell me which I violated? I thought I posted a supportive humorous meme, but I'd like to follow the rules."
--- Letters in issue Vol. 37, No. 4 regarding censorship of posts (and users) on one of the $2600 Facebook groups.
"We believe in science. We support removing fascists from platforms. We want monopolies broke up. And we demand accountability. Saying these things really pissed a lot of people off. So we're saying them again in case we missed anyone."
--- Quote from a $2600 Twitter post in May 27, 2021. $2600 Magazine openly attacks the scientific method; believes that MEN can become pregnant or turn into women if they grown long hair, wear lipstick, and chop off their pee-pee; thinks Chelsea Manning is an actual female; openly supported (and voted for!) the fascist (((Obama and Biden regimes))); profits from complaints about the government's mess of the (((breakup))) of the the Bell System or has never once mentioned the monopolistic & private "Federal Reserve" as they slowly increase the price of their magazine to $9 and the banks demand more "bailouts"; doesn't want anyone to show an ID to vote, but they do use IDs (and encryption) on their own computer networks. And worst of all, has done NOTHING to expose the "accountability" of the FBI & Hillary Clinton's "Russian collusion hoax" or the FBI & Twitter's suppression of the Hunter Biden laptop and China COVID-19 origin stories, or all the other various Biden-family bribery schemes - all in order to affect the outcomes of the 2016, 2020, & 2024 presidential elections.
"... Nowadays, Off The Hook is filled with sycophants who dare not disagree with political views, no matter how misguided, or he will scream at them. Literally. The only personality brave enough to even attempt to disagree and reason with him at times is Alex (whom I applaud), but even his attempts are half-hearted and shouted down."
--- Quote from a letter by "J.X." in Vol. 38., No. 3 discussing their views on what Off The Hook and $2600 have turned into.
"... Anthony Fauci is a good scientist. Serious electoral tampering did not occur on the Democratic side (investigations into Trumpian tampering are ongoing on federal and state levels). I don't say these things because I download my opinions from the mainstream media. I say these things because of a compelling pattern of evidence from reputable sources..."
--- Quote from a letter by "James" in Vol. 38, No. 2. $2600's reply was: "Thank you for making these points better than we ever could." All those statements "James" made are demonstrability false. Dr. Fauci has been caught red-handed lying to Congress, the media, and the American people and actively covered-up his involvement in the creation of the China COVID-19 pandemic, leading to the potential deaths of millions.
Bernie Sanders actually won the Democrat primary nomination in Wisconsin (and in other states), and through the WikiLeaks' emails we now know that Hillary Clinton and the DNC basically stole the 2016 nomination from Bernie S. And people think Trump is crazy for saying they stole the 2020 election too...
"'If you happened to walk in the Capitol on Jan. 6, (2021), you might get 10 years in prison,' [Rand] Paul said. 'But if you're responsible for funding research that led to a pandemic and killed 15 million people, and then you lied about it to Congress, then nothing happens to you.'"
--- Quote from Rand Paul who filed a criminal referral against Anthony Fauci in July 2021 and again in July 2023 over the perjury claims.
>we didn't rig the election >we fortified it This works on small brains >we investigated the 2016 elections for 4 years and found nothing >we will not investigate the 2020 elections and you are a domestic terrorist if you think they should be This also works on small brains(Massive 2020 Voter Fraud Uncovered in Michigan Including estimated "800,000 ballot applications sent to non-qualified voters" - bags of prepaid gift cards, guns with silencers, burner phones, and a Democrat-funded organization with multiple temporary facilities in several states.)
(Evidence of Foreign Nationals Accessing Dominion Voting Machines Leaked to Public)
( Hillary Clinton's Campaign Coordinator... Trevor LaFauci Busted Ripping Up Trump Ballots)
(Georgia Update: The 2020 Election Hijack A private election consultant group, paid in part by (((Mark Zuckerberg))), arrived in Fulton County (Atlanta) just in time to "help manage" the 2020 election. Joe Biden did not "win" Georgia in 2020.
(Georgia Was Stolen From Trump, He Won Fulton County violated the Georgia state election laws.)
(Segment that got Lou Dobbs Fired from Fox News He interviewed a USPS whistleblower who drove 200,000+ illegal ballots from New York to Pennsylvania during the 2020 election.)
(BREAKING: The Georgia Nerds Serve GA Gov. Brian Kemp with Evidence of Four Years of Election Fraud)
"Comparing demonstrators and even common rioters to a President-led storming of the nation's Capitol building (Mirror) is a poor attempt to minimize the significance of the latter. Blaming groups like Black Lives Matter for everything you dislike only shows how easily you can be convinced that people who are different from you are nothing short of pure evil."
--- Quote from a reply to a letter by "pinkbathtowel" in Vol. 38, No. 1. $2600 is trying to compare the deadly (((Black Lives Matter))) chimp-outs which caused billions of dollars in damage and killed at least 19 innocent people to the Constitutionally-protected Jan. 6 election integrity (unarmed!) protests where the only death was the result of an unqualified, affirmative action negro Capitol police officer killing an unarmed woman (and veteran) for no reason (and the assault and resultant death of motionless woman [Roseanne Boyland] on ground.) Also, Mr. Trump had nothing to do with the "riot," as proven over-and-over again...
Also note that at HOPE X, $2600 praised the jewish supremacist and war-monger (((Emma Goldman ✡))) for being a "dissenter." Really... Emma Goldman is best known for helping plan the assassination of U.S. President McKinley (!) which set the stages for pushing the U.S. and Europe into (((World War 1 & 2))) resulting in the deaths of millions of innocent Gentiles, and the creation of private (((central banking ✡))) in the U.S. I'm pretty sure that is a textbook definition of "pure evil," and just a tad bit worse than a bunch of people walking around the Capitol building with a police escort...
Also, I bet January 6, 2021 was the first time those traitorous assholes working in the U.S. government realized their boss was John Q. American and not Shlomo Shekelstein on Wall St. BTW, George Floyd died from a fentanyl overdose and China COVID-19.
("Do Your Non-Uniformed Guys Have Any Identifiers" SHOCKING Capitol Police Video Uncovered from Jan. 6 Shows Undercover and Armed DOJ On Site - IT WAS A SETUP)
(Capitol Police Chief Called Jan. 6 Events 'A Cover Up' in Tucker Carlson Interview HIDDEN by Fox News Former Capitol Police Chief Steven Sund told then-Fox News host Tucker Carlson that events surrounding the January 6th riots at the U.S. Capitol appear to have been a "cover up," in never-seen-before footage published exclusively by The National Pulse.)
(MORE HORRIFIC J6 FOOTAGE HAS BEEN RELEASED!!)
(Former FBI and Now Contracting Officer for the CIA Reveals how there were FBI agents in the crowd on J6 and brags about how the agency helped others sue Alex Jones for defamation.)
vs.
"Hurr durr.... Deadly insurrection! Derp... Worse than 9/11!
Avenge Ashli Babbit!
Destroy $2600
"And again, this fallacy that we're in favor of some sort of approved speech doctrine is a load of horseshit. We will stamp out hate speech wherever we see it. We will continue to shut down overt racism in every forum. And we will not tolerate anti-democratic attempts to subvert legal elections and overthrow legitimate leaders or deny people the right to vote."
--- Quote from a reply to a letter by "6NdLXzc2" in Vol. 38, No. 1. $2600 REFUSES to stamp out hate speech on (((CNN ✡))) or (((MSNBC ✡))). They also refuse to shut down overt racism by Steve Rombom ✡, Kevin Mitnick ✡, Chuck Schumer ✡, AOC ✡, etc., or even shutdown $2600 meetings in apartheid Israel. They also refuse to condemn the phoney racially-motivated President Trump (((impeachment ✡))) hearings. And don't expect them to stand-up to the anti-democratic attempts to subvert our elections by the Democrat Party, Hillary Clinton, Twitter, Facebook, FBI, and WEF! And remember when Obama and his jew handlers overthrew a legitimate leader elected in Ukraine in 2014 (and also tried that in Syria!), and Evil Corley didn't say a single word about it?
"I acquired 𝕏 in order to preserve freedom of speech in America, the First Amendment and I am going to stick to that." --- Elon Musk
"A number of our own readers in this issue's letters section expressed their outrage at our opinions on the matter in 37:4, which encouraged responsible providers on the Internet to stop hosting forums for movements that refused to acknowledge scientific facts or that advocated such actions as overturning democratic elections and installing unelected leaders (Mirror). While we continue to believe that everyone is entitled to their own opinion, we don't subscribe to the belief that all opinions deserve the same platforms. We believe providers have the right to determine what they consider to be acceptable and what they don't, even when we disagree - and everyone has the right to pressure them to do the right thing."
--- Quote from the editorial in Vol. 38, No. 1 Many of those censored "unscientific facts" have since turned out to be true... Jan. 6 was a nothing-burger exploited by (((Democrats))) to seize power, China COVID-19 may have been man-made in a Chinese lab partially funded by the U.S. government and U.S. corporations, the number of deaths was grossly overinflated to get government hand-outs, the lock downs caused more problems than they solved, especially for young children, low-cost alternative vaccines were actively suppressed by (((Big Pharma))) in collusion with (((Big Tech))), and those cheap masks did very little (Mirror). $2600 also wants illegal aliens to vote in U.S. elections (and counted in our census), thereby "overturning" the will of legitimate U.S. voters. That editorial also contains the quote: "There is nothing at all political about a pandemic." LOL!
(NYC Council Asks State's Highest Court to Allow Non-Citizens to Vote in Local Elections)
Election Interference by Evil Corley and the One Percent
Destroy $2600
"While everybody has the right to free speech, that doesn't mean they can say or do whatever they want on a system run by others. It's only if someone is forbidden from speaking by the authorities in any setting that we can start talking about true violations of free speech.
...
While we agree that we'd be better off with a whole lot of smaller companies and less mega-giants, we still need to ensure that falsehoods, anti-science sentiment, and hate speech doesn't become empowered and allowed to dominate as it has been."--- Quote from the editorial in Vol. 37, No. 4. The FBI, CIA, DHS, White House, and DNC forcing Twitter and Facebook to censor certain conservative users in order to effect the outcome of the 2016 and 2020 elections is a "true violation of free speech" according to $2600. Just don't expect them - or people like (((Cindy Cohn ✡))) at the EFF - to do anything about it... Also, there is really no such thing as "hate speech." "Hate speech" is anything which effects Evil Corley's power grabs. "Truth sounds like hate to those that hate truth."
More Censorship by Evil Corley and the One Percent
Destroy $2600"And when the site tried to find hosting in other countries, one by one they were cut off due to the outrage and bad publicity. Is it right to cut off speech of any kind in this manner? We believe it is when the decision is being made independently of any government regulation. In other words, these people still have the right to free speech and they can say whatever they want. But such reprehensible speech will generate a reaction and nobody should be forced to help them along. Are there hypocrisies and double standards that can be found when making these decisions? Undoubtedly so. That doesn't take away from the guts required to stand up and say 'enough.' We don't have to simply stand around and continue to watch the ugliness. Resisting isn't always a neat process."
--- Quote from the editorial in Vol. 34, No. 3. $2600 was calling for MORE censorship of so-called "neo-Nazi" websites after the Charlottesville incident. Video of the event shows that landwhale leftist, Heather Heyer, was NEVER hit by James Fields' car and the coroner's report stated she died of a heart attack due to being obese. We now know mentally-ill fascist Dwayne Dixon pointed his gun at James Fields and Fields fled in his vehicle, rightfully fearing for his life. This event was then exploited by Evil Corley and the One Percent to shut down anyone (and any website) who exposed those in power... You know, what hackers used to do... Do you think Evil Corley will ever apologize for spreading these lies? BTW, DailyStormer had their .com domain STOLEN by (((Google))). They illegally took away access to a domain they didn't own.
Only five years in prison for targeting Trump voters! Where's Evil Corley?
"Winston sank his arms to his sides and slowly refilled his lungs with air. His mind slid away into the labyrinthine world of doublethink. To know and not to know, to be conscious of complete truthfulness while telling carefully constructed lies, to hold simultaneously two opinions which cancelled out, knowing them to be contradictory and believing in both of them, to use logic against logic, to repudiate morality while laying claim to it, to believe that democracy was impossible and that the Party was the guardian of (((democracy))), to forget whatever it was necessary to forget, then to draw it back into memory again at the moment when it was needed, and then promptly to forget it again: and above all, to apply the same process to the process itself.
That was the ultimate subtlety: consciously to induce unconsciousness, and then, once again, to become unconscious of the act of hypnosis you had just performed. Even to understand the word 'doublethink' involved the use of doublethink."
--- George Orwell, Nineteen Eighty-Four , 1949.
Destroy $2600
Evil Corley and the One Percent are an existential threat to our democracy and must be stopped AT ANY cost.
They are currently engaging in the greatest assault on our freedoms which we have ever seen.
What we're seeing with $2600 today is far more nefarious, as well-organized (((groups))) seek to influence massive amounts of people with fear, hatred, false information, and an unhealthy sense of paranoia. They encourage violence and want a far less democrat system in place, one where they reap the benefits and those who aren't like them are kept from having any power, to put it mildly.
Free Douglas Mackey!
Destroy $2600
To say the Obama/Biden/Harris/Corley cult, err... administration is unlike anything we've experienced before would be a massive understatement. We speak for many when we say that we were expecting a degree of crackdowns, closures, regressions, anger, fear, and the like, but what we've gotten so far leaves us almost speechless.
Almost.
It's well accepted that Joseph "China/Ukraine/Israel First, America Last" Biden is incompetent, racist, sexist, and an overall jerk, among many other things. This comes from people who have been in his inner-circle, fellow members of his party, foreign dignitaries, business partners, employees, and a whole lot more. This is before even introducing political opponents, the media, and the majority of Americans who voted against him - for forty years. $2600 refuses to outline all of the damage he has caused in his nightmare of a term. For that, we suggest the media and the commentaries that Evil Corley refuses to pay attention to.
We cannot think of a more traumatic time for so many people to have lived through at once. There have been many difficulties in the past with various travesties of justice in our own world. We've seen wars and invasions carried out in our name, and we've witnessed the nation transformed by September 11th. But apparently, all of that was the equivalent of training wheel for what we've been experiencing of late.
It's worth noting that $2600 has been especially friendly towards those in charge. They openly supported, voted for, and campaigned for Clinton, Obama, and those (((politicians ✡))) in New York who supported Bush's war(s) for Israel. But what we've experienced with the Biden/Harris reign has something quite unique and especially dangerous. To try and normalize that period by equating it with the others would be a tremendous disservice to anyone who truly cares about freedom and the great potential this country holds.
However, all of this default antagonism that we're always prepared for in any administration doesn't begin to cover what seems to be ahead on the Obama/Biden/Harris/Corley cult-like agenda.
In an incredibly brief time, we've seen the non-mainstream press defined as the enemy of the people, the demonization of documented immigrants with a nationalistic zeal that should worry anyone who's ever picked up a history book (Except for Ukraine & Israel - the money laundering and organ & child trafficking capitols for (((Democrats))) - they'll start World War 3 to protect Ukraine's & Israel's borders...), statements that unfairly castigate entire religions and nations, racial insensitivity, embracing of conspiracy theories, lack of meaningful dialogue, favoritism of an epic proportion resulting in unelected individuals being catapulted into positions of great power, huge and damaging conflicts of interest that are willfully ignored, unprecedented incompetence in vital posts, lack of knowledge or interest in history and world affairs, threats of military action within our own borders, a wanton disregard for the fragile environment of our planet, extreme insecurity and hostility when confronted with criticism, accusations with no supporting evidence... we could keep going, but odds are you're already aware of most of this. And all of these are ingredients vital to the rise of fascism, something we've never really experienced in our country since the Obama regime.
Sure, we have problems that need to be dealt with, as does any country. How such issues are handled is what defines a society and we are far from alone in being exceedingly troubled with what has happened so far.
Perhaps the core of what's most disturbing here is an attitude that somehow Obama/Biden/Harris/Corley and their cult-like ilk believe they don't have to abide by the same rules as everyone else:
"I have not taken a penny from any foreign source at any point in my life... Nothing was unethical... My son has no made money from China... Clap for that, you stupid bastards."
We've seen this assumption of privilege rear its ugly head before in Biden's previous life. It's up to all of us to make sure we remind him and his supporters at every opportunity that this is not how it works. Because once it is, any hope for a functioning free society is lost.
We all know it's possible "legally" to come up with all kinds of words to allow great injusices to be gotten away with. But morally... that's another story. That is where we must apply our efforts without any hesitation.
This brings us to the infamous tax returns dealing with shady business connections to Ukraine and China, the ones that Joe & Hunter Biden believes nobody cares about, the ones that he can continue to hide from the American public. It's no secret that the majority of people do care and, while legally he can hide them from us while lying about the reasons, morally it's indefensible.
How can anyone assert that we don't have the right to know what is being claimed on this form while we're entrusting him with such great power and responsibility? Mistruths and cheating will quickly be revealed if they are there. So too will the absence of these things, a revelation that will help the healing process begin and instill some much needed trust.
"Dear Hunter, thank you for inviting me to DC and giving an opportunity to meet your father and spent [sic] some time together. It's realty [sic] an honor and pleasure."
--- The main email obtained by the New York Post is an April 2015 message that the newspaper said was sent to Joseph Bidens's son, Hunter Biden, by Vadym Pozharskyi, an adviser to Burisma's board.
"'I looked at them and said: I'm leaving in six hours. If the prosecutor is not fired, you're not getting the money,' Biden infamously bragged to the Council on Foreign Relations in 2018. 'Well, son of a bitch. He got fired.'"
--- Then-vice president Biden admittedly pressured Ukrainian President Petro Poroshenko and Prime Minister Arseniy Yatsenyuk into getting rid of Prosecutor General Viktor Shokin investigating Burisma (and Hunter!) by threatening to withhold a $1 billion U.S. loan guarantee during a December 2015 trip to Kiev.
"I am sitting here with my father and we would like to understand why the commitment made was not fulfilled. Tell the director I would like to resolve this now before it gets out of hand, and now means tonight. And, Z, if I get a call or text from anyone involved in this other than you, Zhang, or the chairman, I will make certain that between the man sitting next to me and every person he knows and my ability to forever hold a grudge that you will regret not following my direction. I am sitting here waiting for the call with my father."
--- Hunter Biden text message to Chinese Communist Party-linked business man Henry Zhao.
Stories You Won't See in $2600!
- Trump Slams Biden Over Reports Hunter Biden Introduced Burisma Exec to VP Dad: 'Totally Corrupt'
- Hunter Biden Introduced Burisma Adviser to VP Dad Before Ukraine Pressure, Email Shows
- Hunter Biden's Ukraine Contact Allegedly a 'Fixer' for Shady Oligarchs
- Smoking-Gun Email Reveals how Hunter Biden Introduced Ukrainian Businessman to VP Dad
- EXCLUSIVE: If Only We'd Known Three quarters of survey respondents say voters lacked 'critical' information about Hunter Biden's laptop during the 2020 elections, and half would have voted differently.
- "The Biden Administration is absolutely corrupt to its core." Tweet from the U.S. Border Patrol Union.
- COMER CONFIRMS! FBI Says Biden Bribery Scheme 'Has Not Been Disproven'
- Voting Won't Matter: Biden's Power Grab Could Destroy Elections Big Government bureaucrats help Biden and Democrats seize power.
- The FBI Just Got Caught in Yet More Massive, Outrageous FISA Abuses
- Joe Biden Allegedly Paid $5M by Burisma executive as Part of a Bribery Scheme, According to FBI Document Biden's son Hunter was a board member of Burisma and also allegedly in on the scheme.
- 'Like Watergate': 'Coverup' of Biden Family Corruption
- Hunter Biden's Attorney Slams IRS Whistleblower's 'Illegal' Release of WhatsApp Message to Chinese Businessman IRS Criminal Supervisory Special Agent Gary Shapley Jr., who oversaw the agency's investigation into Hunter Biden, claims the agency obtained a message from WhatsApp dated July 30, 2017, from Hunter Biden to Henry Zhao, CEO of Harvest Fund Management, where the president's son claimed that he was with his father in an attempt to pressure Zhao to fulfill a commitment.
- 'Damning' New Hunter Biden WhatsApp Message Shows Him Demanding $10 Million
- BOMBSHELL: NYT CONFIRMS Hunter Biden Whistleblower Claim; DOJ Mishandled Probe
- IRS Whistleblowers Expose Reality About Hunter Biden's Sweetheart DOJ Deal, with Glenn Greenwald
- Biden's "Orwellian Ministry of Truth": Federal Judge Finds a 'Massive Attack' on Free Speech in Government Censorship Efforts
- Report on Hunter Biden's Laptop
- Blanket Immunity for Hunter Biden's Crimes Welcome to Biden's (((DOJ)))...
- Trump Rages After Jan 6th Committee "Illegally Destroyed Records And Documents"
- A NATIONAL DISGRACE: Photos Leaked of Horrific January 6 Prisoner Abuse Tortured five months in isolation in a closet room with light on and a bucket for a Toilet. Where are the (((ACLjU))), Amnesty International, Human Rights Watch?
- National Archives Reveals it Has 5,400 Biden Emails In which the president potentially used fake names to forward government information and discuss business with son Hunter.
- Biden's (((DOJ))) Starts Arresting Trump Supporters Who Stood Outside the U.S. Capitol and Committed No Violence Despite registered rallies on Capitol grounds that day.
- Mike Benz Explains How Hunter Biden's Work in Ukraine Touched on a CIA Operation CIA BLOCKED FEDS - Hunter's Handler = celeb Hollywood attorney 'Sugar Brother' Kevin Morris. Laptop researcher explains how Hunter's 'sugar brother' celeb Hollywood attorney Kevin Morris has been grifting China BHR investments for the Biden Crime Family and is also the CIA's asset. (Additional Info)
- The DOJ Alleges that Hunter Biden was Bribed by a Romanian Billionaire In order to influence U.S. policy via Joe Biden.
- Joe Biden "Defrauded the United States to Enrich his Family"
- In His New Letter, Zuckerberg Goes Beyond What He Told Joe Rogan He says the FBI specifically warned of disinfo re: Hunter Biden & his client, Burisma, the Ukrainian natural gas company. It's hard proof that the FBI illegally interfered in the elections. Someone should go to prison for it.
While Donald Trump's tax returns showed he actually LOST money. Joe Biden, a man who has never held a real job in 50 years and who Evil Corley VOTED FOR, is somehow a millionaire...
While members of the public can claim the right of privacy in not sharing their IRC logs when chatting with any male under the age of 18, it's pretty much an unwritten rule in our society that Evil Corley should display his honesty in this public manner. Yes, it's unwritten, meaning Corely doesn't have to do it. But the consequences of rejecting this tradition, as with many other voluntary actions that are expected of a hacker magazine editor, could have a very detrimental effect on our society... and the resulting ripples would be felt throughout the world. Being in such a privileged position means sacrificing some of one's privacy - as has been done for decades - in the interests of open and transparent democracy.
Clearly, Corely has not been willing to do this. And, equally troubling, his allies on $2600's "Staff" page are prepared to prevent this information from becoming public. In July & August every two years, $2600's staff have unanimously blocked the efforts of other hackers to obtain Evil Corley's IRC logs. Yes, they have the ability to obtain them and put this all to rest, but they chose to continue covering it up instead.
If I had $10,000, I'd offer it to anyone who could get us these elusive IRC logs from Evil Corley. Now that he's the "leader of the hacker world" with more scandals and cover-ups in the first 40 years of publishing than most hackers have had in their entire lives, this can no longer be thought of as remotely funny. We all have the right to know just how Evil Corley is running things. Maybe we should reinstate our offer and make it potentially much bigger... (That's a joke, if I had $10,000 I'd buy a new spectrum analyzer instead! BTW, where were these idiots when Obama was - and still is - refusing to show a valid birth certificate or jew Garland is refusing to release the Biden interview audio?)
There are basic values that we learned way back in the early days of IRC, surprisingly enough. It was great to have a forum for everyone to communicate and share opinions. But when people became disruptive or abusive, it was time to step up and say the right thing: Goodbye $2600.
We cannot be afraid to say this, whether it's on a chat network, in social media, at a conference, on network television, or in the halls of Congress. Continually allowing for the amplification of vile rhetoric or outright lies intended to cause mayhem is a sign of weakness, not fairness. It's time we all did more to stop what can rightfully be called a disease.
When having discussions, there have to be certain facts that are accepted by everyone or nothing ever gets accomplished. Lately, we've been mired in an almost unbelievable environment where established facts no longer seem to matter. This can't continue.
We all know people who have bought into this fiction. Some have woken up, many haven't. We shouldn't be surprised or overly judgmental. This sort of thing has happened many times throughout history. People make bad choices based on what they're told by others whom they trust. It can be helped along with fear, anxiety, prejudices, and outright hatred. To say each of us as individuals doesn't have the potential to be led down a similar dark path is as ignorant as the assumption that this sort of thing somehow could never have happened here.
It's part of the human condition, which is why we have to hold the door open for our fellow humans who believed in something that turned out not to be true. And at the same time, we cannot allow those who perpetuate the lies to get another chance to do it even better. Remember, they are still out there and, if encouraged, they will make more attempts to get their way.
Let's put aside the racism, sexism, ultra-nationalism (except for Ukraine ✡, a puppet-state controlled by U.S. oligarchs for money laundering purposes), and overall ignorance of domestic and world issues that Obama/Biden/Harris/Corley have become known for - and which, incredibly, seem to make them even more popular. You can read specifics on all that almost anywhere else.
What we need to focus on here is what a Obama/Biden/Harris/Corley presidency would mean to the hacker world and to technology, the Internet, and free speech. It's not pretty.
"The whistleblower alleges that a leader of CTI League, a 'former' British intelligence analyst, was 'in the room' at the Obama White House in 2017 when she received the instructions to create a counter-disinformation project to stop a 'repeat of 2016.'"
"Let me tell you, you take on the intelligence community and they have six ways to Sunday to getting back at you." --- Quote from (((Chuck Schumer))).
"... the essence of the evil government is that it anticipates bad conduct on the part of its citizens. Any government which assumes that the population is going to do something evil has already lost its franchise to govern. The tacit contract between a government and the people governed is that the government will trust the people and the people will trust the government. But once the goverment begins to mistrust the people it is governing, it loses its mandate to rule because it is no longer acting as a spoksman for the people, but is acting as an agent of persecution." --- Quote from Philip K. Dick.
- Stop Biden's Planned Takeover of Your Local Internet Service Providers
- Psycho Bitch Governor of NY to Collect Online Data on People in Search of "Hate Speech"
- Noticing Goes Mainstream, The Tide is Turning Against Zionism
- DOJ Ordered Sweep of Trump's Twitter Data for Everyone Who 'Liked, Followed or Retweeted' Trump (Warrant)
- Shocking Worldwide Attack on Free Speech!
- The So-Called "TikTok Ban" is a Trojan Horse
- Excessive Free Speech is a Breeding Ground for More Trumps Time to ban assault speech!!!
- Feds Ordered Google to Unmask Certain YouTube Users Critics say it's 'terrifying.'
- Americans from a Black Empowerment Organization Worked with Russian Intelligence to Spread Propaganda, Feds Say "Russia's foreign intelligence service allegedly weaponized our First Amendment rights - freedoms Russia denies to its own citizens - to divide Americans and interfere in elections in the United States," said Assistant Attorney General Matthew Olsen of the Justice Department's National Security Division.
- New NPR CEO Gave TED Talk Asserting "Truth" is a "Distraction"
- Massive Attack on Free Speech Passes! Even reading the Bible deemed illegal under new law.
- The Most Canceled Man in America A young political activist is openly targeted by the U.S. Government and banned from nearly every online platform. With his money seized and no ability to board a plane, he attempts to lead his nascent movement to new heights.
- CIA BUSTED! Sought total control of YouTube, Paypal, Godaddy, Amazon, and Twitter for Biden!
- Google Drive Censors Files of Pfizer Whistleblower
- NixOS Commits "Purge" of "Nazi" Contributors, Forces Abdication of Founder
- Colorado Now Has a "Ministry of Truth"
- GARM'S Harm: How the World's Biggest Brands Seek to Control Online Speech New info reveals that woke advertisers and brands are colluding together to attack people like @elonmusk, @joerogan, political candidates, and news organizations from the likes of (((Rob Rakowitz))).
- The European Commission Offered X an Illegal Secret Deal If they quietly censored speech without telling anyone, they would not fine them. The other platforms accepted that deal. X did not.
- Defend VDARE Foundation from Legal Tyranny (Additional Info & GiveSendGo)
- Letitia James is Killing a Conservative Website With Chilling Anti-Free Speech Lawfare VDARE has not been charged with any crime, yet has "fought NYAG Letitia James, at a cost of up to $1 million, for nearly three years." An onslaught of onerous subpoenas marks not a quest for justice but an orchestrated attempt to financially and morally bankrupt those who dare resist the liberal creed.
- Official GNOME Policy: Link to Lunduke, Get Banned "Posting links to content from Lunduke is an immediate ban on GNOME [sites]." Seriously. This a real thing. The one word officially banned by GNOME. Apparently there is nothing, on Earth, that GNOME fears more... than Lunduke.
- Tim Walz: "There's no guarantee to free speech on 'misinformation' or 'hate speech.' Yes there is, it's called the First Amendment.
- Chilliwack RCMP Arrest Social Media User Over 'Discriminatory' and 'Racially Offensive' Posts
- Telegram Creator on Elon Musk, Resisting FBI Attacks, and Getting Mugged in California Pavel Durov left Russia when the government tried to control his social media company, Telegram. But in the end, it wasn't Putin who arrested him for allowing the public to exercise free speech. He was detained at a Paris airport for allegedly "enabling criminal activity" with his encrypted messaging app, French media reported Saturday.
- Chris Pavlovski Flees Europe France has threatened Rumble, and now they have crossed a red line by arresting Telegram's CEO, Pavel Durov, reportedly for not censoring speech.
- Mark Zuckerberg Just Admitted Three Things 1: Biden-Harris Admin "pressured" Facebook to censor Americans. 2: Facebook censored Americans. 3: Facebook throttled the Hunter Biden laptop story. (((Zuckerberg))) "regrets" working with the Biden-Harris administration to censor COVID-era information online.
- Kamala Harris, Tim Walz, and Barack Obama Back Brazil-Style Censorship Next Democratic president and vice president may implement sweeping plan for "fighting misinformation" and "hate speech."
- Kamala: I Will Direct the DOJ to Censor... "misinformation and hate" online.
- (((John Kerry))) Says "1st Amendment Stands as a Major Block" To their ability to control the "facts."
- Hillary Clinton: "We Lose Total Control If social media stops censoring content. That what it's all about, folks.
Save the Free Speech on the Internet!
Destroy $2600It's painfully clear that Obama/Biden/Harris/Corley don't understand how the Internet works.
But that won't stop them from dictating how they believe it should work and making the lives of anyone who gets in the way absolutely miserable. The disdain with which those concerned about freedom of speech are referred to makes it abundantly clear that such people will not be looked upon kindly in a Obama/Biden/Harris/Corley administration. And when such freedom is seen as a threat, it's the beginning of a significant downward spiral. How do you suppose Obama/Biden/Harris/Corley would deal with an anonymity network like Tor? Or the use of encryption? Or hackers in general?
If Trump had been in power, Russian WOULD NOT have invaded Ukraine ✡, and the outcome could have been very different.
While he could only call for a boycott against them as a candidate, he could have taken actions to cripple (((those in power))) as president. And it wouldn't have ended there. The impact to technology companies, not to mention our very right to privacy would be severely impacted with (((Big Tech))) trying to censor information in order to manipulate our elections to keep Trump from winning.
It shouldn't come as a surprise that Trump is FALSELY attacked by phoney organizations like The Free Press Action Fund ✡, EFF ✡, ACLjU ✡, Facebook ✡, CNN ✡, and MSNBC ✡.
So there's that. Now try and imagine what his attitude and shoot-from-the-hip mentality would actually do to the world of hackers. Obama/Biden/Harris/Corley have publicly called for the execution of conservative White Americans, which ought to give you an idea of how anyone who embarrasses their regime would be treated.
We've all had these uncomfortable interactions with individuals who believe hackers are the equivalent of terrorists and, if these people had their way, all of the hackers would be locked up or worse. We can laugh when it's a misguided relative at Thanksgiving because they're only speaking their minds and they really don't know any better. But give someone with such massive gaps in knowledge the power to actually get their way and it quickly stops being funny. Look at the history of fascism in the last century and you'll see that it always starts with someone in power echoing people's misguided perceptions that revolve around fear and misinformation.
Not only does the power make these thoughts turn into policy, but it also emboldens more misguided members of the public to become authorities, and ultimately monsters. Before you know it, the mere suspicion of being different or of posing a potential problem is enough to have someone prosecuted, locked away, or simply kept from living a normal life. There is no nation on Earth that is safe from this sort of threat. Believing otherwise is the quickest way to learn that lesson.
We don't doubt that some will see this as an overreaction, to which we say it's a nice contrast to the underreaction we've been seeing over the past year. Obama/Biden/Harris/Corley are not just four unqualified and dangerous people; they represents many more who have no qualms about putting policies of hatred and anger into practice. We've seen it happen before and we'll see it happen again. If there's one thing we've gained from the Obama/Biden/Harris/Corley campaign, it's the realization that we are not immune. Sometimes change isn't funny at all.
How You Can Help
The easiest way you can help fight Evil Corley and the One Percent, their allies in the FAGA Deep State, survive the Biden/Harris/Corley/BlackRock/FTX/SVB inflation "economy," counter Corley's price gouging, and help undermine & boycott a New York business openly supporting their state's political corruption and election interference, is by NOT PAYING for issues of $2600 Magazine!!!
While this is mostly symbolic, Evil Corley & the FAGA bunch are rich, it is still a start.
"The price good men pay for indifference to public affairs is to be ruled by evil men."
--- Plato
(Note: Links to Wikipedia are for a general reference only. You should be smart enough to know (((Wikipedia))) can't always be trusted. Also, many JPEGs were jpegoptim -m50 to save space. Extract them from the PDFs for higher-quality versions.)
- Jonathan Littman writes a book about Kevin Poulsen called The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen. It is full of lies, distortions, invented facts, and both minor and major technical errors. It makes Kevin Poulsen look bad. There are no movies, protests, bumper stickers, T-shirts, or defaced websites. Imagine if someone wrote a book about YOU with the subtitle including the words "twisted life and crimes..."
"Furthering the humiliation, the press, as a general rule, will not be concerned with presenting the truth. They will print what suits them and often omit many relevant facts. If you have read any of the 5 books I am covered in you will no doubt have a rather jaded opinion of me. Let me assure you that if you met me today you would quickly see that I am quite likable and not the villain many (especially Jon Littman) have made me out to be. You may not agree with how I lived my life, but you wouldn't have any trouble understanding why I chose to live it that way. Granted I've made my mistakes, growing up has been a long road for me. Nevertheless, I have no shortage of good friends. Friends that I am immensely loyal to. But if you believe everything you read you'd have the impression that Mitnick is a vindictive loser, Poulsen a furtive stalker, and I a two faced rat. All of those assessments would be incorrect."
--- Quote from Justin T. Petersen (Agent Steal) in his "Everything a Hacker Needs to Know About Getting Busted by the Feds" in Phrack Magazine Issue #52.
- The Litt-Man Mirror from Kevin Poulsen's old website. This is a spoof of a game Mr. Littman had on his old The WELL website.
- Letter to Mr. Littman From the Legion of Doom.
- Justin Petersen's Review of The Watchman (Original) (Follow-Up Reply)
- Everything a Hacker Needs to Know About Getting Busted by the Feds Briefly mentions Mr. Littman towards the bottom.
- Former FBI Informant a Fugitive After Helping Track Fellow Hackers by Keith Stone.
- Irresponsible Journalism Article by Justin T. Petersen. Mentions errors in The Watchman.
- Hackers in Chains Encounters with some infamous computer hackers in federal prison, by Justin T. Petersen.
- Mirror of Kevin Poulsen's Old Website (www.catalog.com/kevin)
- Mirror of Justin Petersen's Old Website (www.agentsteal.com)
- Justin Petersen's Music Connection Website
- Justin Petersen's MySpace
- Who is Computer Hacker Agent Steal? WikiAnswers
- Mirror of Jonathan Littman's Website (www.well.com/user/jlittman)
- Why is Kevin Lee Poulsen Really in Jail? by Doug Fine
- The Last Hacker He called himself 'Dark Dante.' His compulsion led him to secret files and, eventually, the bar of justice, by Jonathan Littman
27B Stroke 6Blog by Ryan Singel and Kevin Poulsen- Kevin Poulsen & Jennifer Granick DEFCON 7 Speech - The legalities and practicalities of searches and interrogations. (9.6M MP3)
- "Unsolved Mysteries" Episode with Kevin Poulsen (18.7M WebM) (Additional Info)
- CNN 'Digital Desperado' Interview with Justin Petersen (YouTube) (Transcript)
- Markoff Aids Mitnick Investigation 1995 USENET thread in comp.org.eff.talk about John Markoff helping capture Kevin Mitnick. Includes replies from Ronald M. Austin (Email #2), Lewis De Payne, Mark Seiden, and Evil Corley.
- Kevin Mitnick's Legal Documents Mirror from the old "Free Kevin" website.
- Ham Radio: Lewis De Payne (KA6RBJ) (a.k.a. Roscoe, Lew Payne Publishing, Inc., Twitter, Email)
- Ham Radio: Kevin David Mitnick (N6NHG)
- Ham Radio: Ronald Mark Austin (KE6CXU)
- Katie Hafner and John Markoff write a book about Kevin Mitnick called Cyberpunk: Outlaws and Hackers on the Computer Frontier. It is full of lies, distortions, invented facts, and both minor and major technical errors. It makes Kevin Mitnick look bad. The "hacker" community, lead by $2600 Magazine, explodes in a riot of seething protests, rants, and defaced websites.
- Jonathan Littman next writes a book about Kevin Mitnick called The Fugitive Game: Online with Kevin Mitnick. It is full of lies, distortions, invented facts, and both minor and major technical errors. It makes Kevin Mitnick look good. The "hacker" community loves this book because it "shows the true story." They don't, however, ever seem to mention the lies of Littman's Kevin Poulsen book. Hmm...
- An Open Letter to Jon Littman February 1996 USENET posting by Justin Petersen. (Original)
- November 22, 1994 USENET Posting from Stephanie Schiff Ronald M. Austin's girlfriend and "sjs" in this online Mitnick session. Thinly veiled reference to Jonathan Littman's movie deal.
- Letter from Ronald M. Austin on the "Free Kevin" Mailing List Admits he was an informant against Kevin Mitnick.
- Moving Backup VMS Savesets via FTP Kevin Mitnick's February 9, 1995 USENET posting as "Marty Stoltz."
- Security on the Net - A Cautionary Tale by Bruce R. Koball.
- Funny alt.2600 USENET Post by Lewis De Payne. Line Class Code "PBM" under the #1A ESS (newer generics) was for "Hotel/Motel Message Register," and was useful as it sent no ANI. "LHB" was for "Line History Block," an output message listing the last called/received directory number in octal format. V-DNSVY-TN is a reference to the VF:DNSVY input messages used to check the features installed on a line. Datakits were used to link various Bell systems and switches (X.25, etc.) and often had regular modem dial-ups. MIZAR was the system to create Recent Change templates from RCMAC service orders. The new system is called MARCH. Having access to MIZAR allowed you to submit your own "recent changes" to the switch. SARTS is a reference to the Switched Access Remote Test System.
Transcripts of Kevin Mitnick's online hacking sessions:
- Looking Around February 5, 1995
- Cleaning Up February 5, 1995
- Kevin is a Good Name February 5, 1995
- He's Taken a Sudden Interest in John Markoff February 6, 1995
- More Cleaning Up February 7, 1995
- That's Odd February 8, 1995
- Pick Up Where We Left Off February 8, 1995
- "itni" as in Mitnick? February 8, 1995
- The Art of Begging (For Tools) February 10, 1995
- My Hero is Japboy! February 10, 1995 "he is the reason why my picture was the front page of the new york times"
- John Markoff's Mail February 10, 1995
- Read Cyberpunk :) February 10, 1995 "they will f*ck with me by mistake and they dont want to piss me off :-) or their phones wont have dialtone!"
- Soon SATAN Will Find Your Security Holes February 10, 1995
- He Just Stole MANIAC February 10, 1995
- Dumb and Dumber February 11, 1995
- What A Way To Spend A Friday Night February 11, 1995
- "I Am On A VMS V4.7 Box And I Am In Need Of Some Assistance" February 11, 1995. (USENET Post)
- U.S. Hunts Master Computer 'Cracker' February 11, 1995
- Back to Fish for SATAN February 11, 1995
- Probably a Tap on the Line :-) February 12, 1995
- He's Trying to Break Into WHAT? February 12, 1995
- He Seems Paranoid Now February 13, 1995
- Spooked February 14, 1995
- How Vulnerable are We? February 14, 1995. Accidentally wipes out the The WELL's accounting data with: grep -v dono > awtmp
- Moving and Hiding February 14, 1995. Why didn't he erase the credit card numbers?: rm: remove 0108.gz (y/n)? n
- Who or What Tipped Him Off? February 14, 1995
- Kevin's Last Trip to The WELL February 14, 1995
- zap.c rokK Industries
- zap2.c
- cloak.c UNIX Cloak v1.0 (alpha) Written by: Wintermute of -Resist-
- Kevin Mitnick gets caught hacking while using his modified Oki 900 cellular phone. The reverse engineering and initial experimentation the Oki 900 is based around the work done by Mark K. Lottor and Tsutomu Shimomura. They were true hackers in the original spirit.
- Hacking Cellular Phones Mark Lotter's 1994 DEFCON 2 speech on hacking and modifying Oki cellular phones. (3.7 MB MP3)
- Cellular Phreaks & Code Dudes V.T. = Tsutomu Shimomura, N.M. = Mark Lottor.
- Kevin Mitnick Phone Calls to Mark Lottor From October 1994. Mentions trading Mark Lottor for some stolen Motorola firmware. (Original & Transcript) (YouTube)
- Network Wizards Mark Lottor's company.
- Mirror of Mark Lottor's Old Personal Website (www.nw.com/mkl)
- Feds Ask Help Tracking Mitnick Associated Press - January 25, 1995.
- Wanted by U.S. Marshals - Poster (Text)
- Kevin Mitnick's Fifth HOPE Keynote Speech Read the "Kevin: The Dark-Side Hacker" chapter in Cyberpunk, then listen to this. Seems all those "lies" were not so far off!
- "60 Minutes" Interview with Kevin Mitnick January 2000 and post-prison interview with Kevin Mitnick. Admits to invading people's privacy. (YouTube)
- Tsutomu Shimomura Interview With Charlie Rose, January 23, 1996. (YouTube)
- CNBC Interview with Kevin Mitnick Two-part CNBC Special Report interview with Kevin Mitnick discussing his book The Art of Deception. Mentions that he stole other people's personal identification. (YouTube)
- Kevin Mitnick's Mugshot from His 1988 Arrest
- 1997 International Computer Crime Conference Speech by Louis J. Freeh, Director of the FBI, talking a little about the Mitnick case.
- Tsutomu Shimomura and John Markoff write a book about the tracking and capturing of Kevin Mitnick called Takedown: The Pursuit and Capture of Kevin Mitnick. Ignoring the fact that Tsutomu was actually there, witnessed everything, and pulled off some very clever hacks - $2600 Magazine jumps on him, screaming he's a fraud. They lead the charge for the kiddies to harass his personal life.
- Takedown.com Online transcripts of Mitnick begging for Sendmail exploits, messing up a SunOS kernel recompile, illegally accessing various computer systems, etc., all while $2600 Magazine maintains he's innocent. (Guestbook Archive)
- Giveup.com "Pro-Mitnick" propaganda parody of takedown.com by Ethercat (Ann Lowe).
MP3 versions of Tsutomu Shimomura's voice mail messages are below. Rumor has it, these were done by the infamous "Supernigger" (Zohar Michael Shif [Zeke]):
- #1 - December 27, 1994 (Original & Transcript) tweedle-dee.au - "Me, and my friends, will kill you"
- #2 - December 30, 1994 (Original & Transcript) tweedle-dum.au
- #3 - January 4, 1995 (Original & Transcript)
- #4 - January 5, 1995 (Original & Transcript)
- #5 - February 15, 1995 (Original & Transcript) After Mitnick is arrested.
- #6 - February 15, 1995 (Original & Transcript)
- Technical Details of the Attack Described by Markoff in NYT USENET posting by Tsutomu Shimomura. $2600 Magazine plagiarized this posting in the Vol. 12, No. 4 issue. Do you think they sent Shimomura a T-shirt?
- CERT Advisory CA-1995-01 IP Spoofing Attacks and Hijacked Terminal Connections
- January 23, 1995 USENET Posting by 'Shade' Describes jsz's (Jonathan Zanderson and a few others on #hack) attack on Shimomura's computer before Mitnick's arrest. "and it will be IMPOSSIBLE for any to trace." Heh. "Shade" is Paul A. Watson.
- TCP Connection Reset Remote Exploit by Paul A. Watson
- Slipping in the Window: TCP Reset Attacks by Paul A. Watson (PDF)
- Whitedust Security Interview: Paul Watson From July 28, 2005. (TechTV Interview, CBS Interview)
- Shimomura on BPF, NSA and Crypto Cypherpunks email post by John Gilmore, owner of toad.com, Julia Menapace's old boyfriend, and Shimomura's girlfriend in Takedown. John Gilmore started the rumor that Shimomura attacked himself to get back at him for stealing his girlfriend!
- Shimomura, Pursuer of Hackers, Finds Himself Homeless on Web by Jared Sandberg
- Saw the Tsutomu and John Show... Cypherpunks email post by Andrew Purshottam.
- A Most-Wanted Cyberthief is Caught in His Own Web by John Markoff
- How a Computer Sleuth Traced a Digital Trail by John Markoff
- Netcom Helps Protect the Internet Ouch. A letter from Netcom CEO Bob Rieger to our customers. "...we have further isolated these customers' billing information, including credit card data. This is why the 'ccupdate' feature for the UNIX shell accounts has been disabled." Netcom's "credit card problems" did not start with Mitnick...
- Catching Kevin by Tsutomu Shimomura, Wired, February 1996.
- Mitnick's Malice, Shimomura's Chivalry by Scott Rosenberg, Salon, December 30, 1995.
- Information on Tsutomu Shimomura by Timothy C. May.
- Letter to Jonathan Littman from John Markoff and Tsutomu Shimomura From The Fugitive Game. October 8, 1995.
- What the Feds Knew About John Markoff Excerpt from The Fugitive Game. Pages 357 & 358.
- Jonathan Littman on Kevin Mitnick Excerpt from The Fugitive Game. Pages 368-373.
- Toad Hall Excerpt from Takedown. Pages 17-21.
- Shimomura on BPF, the NSA, and Crypto Excerpt from Takedown. Pages 102-104.
- Charles Platt's CuD Review of Takedown
- John Markoff Responds to Charles Platt's CuD Takedown Critique The WELL discussion.
- Charles Platt Responds to John Markoff's Rebuttal The WELL discussion.
- John Markoff Responds Again to Charles Platt The WELL discussion.
- Charles Platt's Final Response to John Markoff The WELL discussion.
- Jeff Goodell writes a book about Kevin Mitnick called The Cyberthief and the Samurai. This book tries to stay neutral and calls bullshit on both the Markoff and Littman versions of the "tracking Mitnick" story. Markoff wanted to capture Mitnick so he could write a book about that, and Littman wanted to keep Mitnick "on the run" so he could write a book about that.
- The Unofficial Markoff, Mitnick, Shimomura FAQ
- The Cyberthief and the Samurai Reviewed by Chris Gulker
- The Fugitive Game - Online with Kevin Mitnick Reviewed by Chris Gulker
- Takedown - The Pursuit and Capture of Kevin Mitnick Reviewed by Chris Gulker
- San Diego Supercomputer Center Press Release SDSC senior research fellow Tsutomu Shimomura describes "takedown" of Kevin Mitnick, fugitive computer criminal.
- Debunking the "Mitnick has Been in Prison for Three Years Without a Trial" Myth USENET post by "Osiris."
- Debunking the "Mitnick has Been in Prison for Three Years Without a Trial" Myth USENET post by "MajickMutex."
- Debunking the "Mitnick had no Speedy Trial" Myth USENET post by "MajickMutex"
- Netcom Monitoring our Email? USENET post on Mitnick's buddy being monitored by the FBI.
- Susan Thunder's DEFCON 3 Speech Social engineering and psychological subversion of trusted systems Note how many times she says "we." (7.9M MP3)
- The January 1995 Systems Intrusion at The WELL The WELL press release.
- Paranoia Strikes Deep: Breaking Into The WELL Netta Gilboa interviews The WELL hackers.
- Hacker Case is a Challenge as Authorities try to Retrace Suspect's Steps in Cyberspace by Sarah Avery
- Who's On The Line? Cellular Phone Interception at its Best Harris TriggerFish (Pic #2) cellular interception information, by Glen L. Roberts. (Acquisition Request) (StingRay) (KingFish & AmberJack, Harpoon)
- Email Commentary on Takedown Review by Julia Menapace, Shimomura's girlfriend in Takedown.
- Jonathan Littman Sues Disney Parts of The Fugitive Game allegedly stolen for new movie.
- MSNBC Chat Transcript with Mitnick's Attorney Donald Randolph July 24, 1998
- The Kevin Mitnick Story Interview with Kevin Mitnick's attorney Donald Randolph from Beyond HOPE. (YouTube)
- A Conversation With Takedown Co-Author John Markoff by Scott Rosenberg
- Mitnick's Surprise Witness by Joseph C. Panettieri
- Mirror of the Hacked New York Times Webpage Hacked by HFG (H4CK1NG 4 G1RL13Z). Be sure to read the HTML source!
- Scrambled Evidence Mitnick couldn't review his encrypted evidence unless he gave his PGP passphrase, by Matthew Fleischer
- Judge Denies Hacker Access to Computer Mitnick can't be trusted.
- A Low-Key Mitnick Protest $2600 Magazine was protesting outside the New York Miramax offices.
- State of California vs. Kevin David Mitnick Mitnick actually had several charges in different states.
- Letters to the FBI from Companies Calculating their Financial Losses Caused by Mitnick's Alleged "Crimes"
- Sun Microsystems' Subpoena Response Sun tried to artificially inflate their damage costs, just like $2600 Magazine will do when you copy their little "hacker" magazine.
"The total man weeks lost, accordingly, would be 75.5 weeks which, based on an estimated average fully loaded salary of $1,442.31 per week, would result in total damage of $145,192.54."
"The second category is based on the shut down of all e-mail, modem, and fax access to Sun for three days. Based on payroll expenses at that time, reduced to a 25% loss of productivity, the resulting damages would be $1,847,172.50. An estimate of lost business during that time because of our customer's inability to access Sun in their accustomed mode, as well as additional lost employee productivity, would be $250,000.00."
"The third category of damage is related to the Solaris Operating Environment source code. The current commercial license for this product is approximately $1,000,000. Additionally, several hundreds of millions of dollars have been spent in the development and maintenance of this product."
- NYTimes Reporter Issues Weak Response to Charges of Libelous and Defamatory Reporting Mitnick's lame attempt to discredit John Markoff.
- The Demonizing of a Hacker by Adam Penenberg (Mirror)
- Mitnick Co-Defendant Sentenced Lewis De Payne got community service and a $2,500 fine, by Iolande Bloxsom.
- Searching for Susy Thunder
- Excerpt from Charles Platt's Anarchy Online Deals with Katie Hafner and John Markoff's research on Kevin, and how they were apparently duped by Lewis De Payne and Susan Thunder.
- Mitnick Speaks! by Adam Penenberg. (Mirror)
- Mitnick: I Was Manipulated Includes Kevin Mitnick's libelous and defamatory comments about John Markoff, by Robert Lemos.
- Can He Behave Himself Now? Commentary from John Vranesevich of Antionline.com.
- CyberCrime - or Hype? by Norman Oder
- Computer Hacker Kevin Mitnick Sentenced to Prison DOJ press release from June 27, 1997.
- Review of Hackers 2 - Operation Takedown The movie version of Takedown.
- Kevin Mitnick's Prison Release Statement From January 21, 2000
- Reformed Hacker Looks Back by Andy Greenberg (Wired Version)
- Kevin Mitnick: The Magic Hacker Reformed by Paul W. Taylor
- Hacker Hunter: An Ex-Convict Keeps Computer-Users Safe Psychology Today, December 2008.
- Man on the Run by Chris Warren AmericanWay, September 15, 2006
- $2600 Magazine now uses Kevin Mitnick as their main cash cow. Anybody else attempting to profit (as they see it) from Mitnick's story is immediately demonized. The peak of this cash cow is the release of the movie Freedom Downtime ($30). It's embarrassingly retarded. The point of the movie is to attack both Shimomura and Markoff, while ignoring the people Mitnick harassed. Freedom of speech and freedom of the press apparently only apply to $2600 Magazine now.
- Index and Article Listing For most early issues of $2600 Magazine.
- $2600 Article Index by William R. Epp
- Authors Index (TXT)
- Links
- SQL Data
- 2600 Index Project
- 2600index.info Searchable index of 2600 article information, by William R. Epp
- HOPE Conference Audio Direct MP3 downloads from the Hackers On Planet Earth conferences.
- Freedom Downtime ($30) Kevin Mitnick "fakeumentary" by the idiots at $2600 Magazine. Save yourself $30.00 on Evil Corley's favorite cash cow and protect your wallet from one of the most greedy profiteering gluttons.
- Off The Hook Audio All past Off The Hook propaganda broadcasts downloadable from a single webpage.
- Off The Hook Transcripts Archive This is cool... Text transcripts of past Off The Hook episodes made using AI.
- The Best of $2600: A Hacker Odyssey Links to some of the articles which appear in this cash cow.
- The Art of Intrusion No, no profit motive here at all. His lawyers and Evil Corley didn't whip up any publicity. Remember: When Kevin exploits the Open Records Act he's a hero. When others do it, it's like the end of the world.
- Ghost in the Wires Kevin Mitnick's own version of events surrounding his tracking and arrest.
- GOBBLES Security - $2600's Secrets Members nwonknu, Stephen Watt, and Silvio Cesare reveal some of $2600 Magazine's dirty little secrets at DEFCON 10. (3M MP3) (Complete Speech on YouTube) (GOBBLES Security)
- The Truth Almost Slips Out November 23, 1994 episode of Off The Hook with Phiber Optik. (75k MP3)
- Surveillance Audio Excerpt From outside Evil Corley's Victorian mansion in Sekauket, New York - which was paid for by selling other people's old BBS files.
- Kevin Mitnick Prank Call #1 (206k MP3)
- Kevin Mitnick Prank Call #2 (374k MP3)
- Kevin Mitnick Prank Call #3 Turns into a pretty good plug for his book! (1.3M MP3)
- Kevin Mitnick Prank Call #4 (517k MP3)
- Hackers '95 Erik Bloodaxe (Chris Goggans) gives his thoughts on $2600 Magazine and HOPE (YouTube)
- HOPE Bumper Sticker August 1994.
- $2600 Collective's Live Journal Keep track of these idiots.
- "Free Kevin" Mailing List Archive (members.tripod.com/~empallin/Free_Kevin_Mitnick)
- Windows '95 Start-Up Screen Displays the yellow "Free Kevin" banner. (Install as C:\LOGO.SYS for this to work.) (Free Kevin Icons)
- Free Kevin T-Shirt Make a T-shirt - print this image onto a T-shirt transfer and iron it on.
- Free Kevin Mitnick Now!
- "Free Kevin" Sticker on a Patch Panel
- Partial "Free Kevin" Flyer (17k PDF)
- Evil Corley Reviews the Mitnick Movie Script (Alternate) (Second Version)
- The Art of Being Pwnd
- John D. Nunes' Mailbox Member of Mitnick Security Consulting. Courtesy of the Phrack High Council.
I hope this works %% No, it didn't. It got to PHC!- Zero For 0wned - Issue #1 Contains their attack against $2600's IRC network.
- Zero For 0wned - Issue #2
- Zero For 0wned - Issue #3
- Zero For 0wned - Issue #4
- Zero For 0wned - Issue #5 Contains their attack against Kevin Mitnick's website.
- www.DefensiveThinking.com / www.KevinMitnick.com Defacement Quite amusing actually.
- www.mitsec.com Defacement "What a pity security specialists!!"
- SummerCon '89 Poster Held June 23-25, 1989 and hosted by Phrack, Inc. From a review in TAP, Issue #94. Did $2600 Magazine steal this design for their T-shirt?
- Information Wants to be Free? Phrack, Issue #44 editorial by Erik Bloodaxe.
- Amusing Quotes and General Media Whoring by Macki
- Good Info on Jello Biafra Eric Reed Boucher, $2600's "Hacker Ambassador." A clueless, hypocritical, rich, selfish, gay idiot who profits from other people's work and lives in a million dollar house. No wonder Evil Corley likes him!
- The Secret Service vs. Bernie S. Internet Underground article on the Edward E. Cummings (Bernie S.) case. Includes details you may not have heard on Off The Hook.
- Gray Areas Magazine Review the First HOPE August 13-14, 1994 at Hotel Pennsylvania in New York City.
- Kevin Mitnick Prison Release Pictures Pictures from the press conference Kevin Mitnick held after his release from prison. Can you guess who's in the background milking the Mitnick cash cow?
- Notwork Mirror From around 1998. This is where Emmanuel teaches teenage boys about "penetration."
- New York Hackers See Breaking Into Computers as a Healthy Thing New York Times article from June 14, 1998.
- IIRG's Radio Show: Byte Me Complete nine show MP3 archive.
- $2600 Staff Audio Panel Audio from the 1997 Beyond HOPE cash cow. Listen for them admitting: using another person's office and office supplies to make their little newsletter (so much for rights & privacy!), them admitting they steal and profit from other people's old BBS files, and them admitting they use voice mail systems to avoid listening to their customers - while complaining when other companies do the same thing. (YouTube)
- Reviews and Comments on H2K2 You won't see these mentioned in $2600 Magazine!
- Greg Newby Hypocrisy One of the $2600/HOPE idiots. He's whining about the U.N. sanctions against Iraq during the 1990s. If the U.N. removed Saddam back then, there would be no need for sanctions. Also note the rant against the Kosovo bombings. Not helping those Muslims being killed by the Serbs was one of the excuses cited by the 9/11 terrorists. Oh, the irony!
- GIST Communications David Ruderman, one of the co-founders of $2600 Magazine, is their Vice President of Technology (Mirror). GIST Communications received several million dollars (Mirror) in financial backing from Neptuno G.m.b.H. Remember this whenever $2600 Magazine complains they have no money. Hah!
- A Night in New Jack City on First Friday 'Our Misadventures with Emmanuel Goldstein during and after the New York 2600 Meeting'. A hilarious story by The Men from Mongo.
- Evil Corley ♥ Autojack "Do you like movies about gladiators?"
- John Draper a.k.a. Captain Crunch. He's a regular HOPE and DEFCON attendee. Watch out for his "Crunch Squats" and "energy massages" if you are under 18.
- ToorCon - No Moar Crunchberries Plz Captain Crunch meets GreenDiamond at ToorCon.
- Encyclopedia Dramatica Entry for Captain Crunch
- More Men Accuse Proto-Hacker "Cap'n Crunch" Of Inappropriate Sexual Contact
- Should You Buy Captain Crunch's Book? Good review of Crunch's new book.
- Beyond The Little Blue Box
- Kickstart Campaign
- Indiegogo Campaign
- Phone Phreak 'Captain Crunch' - Rare Interview from 1978 (YouTube)
- "If you run an event where Captain Crunch attends, ensure a member of staff is assigned to keep teenage boys away from him. Not a joke." Twitter post by the grugq. Includes a reply by villian: "Ditto Emanuel Goldstein. He pulled that shit in my apt, HHH" (Mirror)
- Emmanuel Goldstein Trading Card As featured in ~EL8, Issue #1.
- Emmanuel Goldstein Linux Kernel Module As featured in PHC's Phrack Magazine, Issue #62.
- The True Story of Emmanuelle Goldstein and Erik Corley Funny story from HoE #90.
- Emmanuel Goldstein vs. Danny Partridge Funny USENET post by netrunnr (Shoshi Wong).
- The Day Emmanuel Died And he wasn't even informed...
- Stop Paying for 2600! RedBoxChiliPepper's USENET thread from PLA Magazine, Issue #44.
- alt.2600 USENET Creation Message December 1, 1993. From Len Rose (Terminus).
- alt.26000/#hack FAQ Beta Revision .012 by Voyager
- Evil Corley Interview from PhreakNIC 4 by Iron Feather (2.4M MP3)
- Kevin Mitnick Interview on Info.Sec.Radio Both parts of the August 21, 2000 interview, by Dean Turner (11.6M MP3)
- $2600's guinessrecords.com Mirror More of their "Free Kevin" propaganda. (Legal Threat)
- Legal Threat from General Motors Legal threat against $2600 for the domain f*ckgeneralmotors.com.
- Off The Hook Farewell Good speech about $2600 Magazine's propaganda and a final goodbye from Izaac Falken.
- TELECOM Digest & Archives $2600 Magazine stole a lot of this information for their little magazine.
- 2600.org and 2600 Magazine Refused Press Coverage of OracleWorld Oh no! What are they going to do now?
- OracleWorld 2003 S.F. Day 3 Was Explosive! Why... they'll call in a bomb threat! How "elite" of them. (Arrest Info)
- Hackers Expose Vulnerability in White House Security $2600 Magazine did something mildly amusing, and probably illegal. They intercepted White House Communications Agency GOLAY pager traffic back in April 1997.
- Pam's Formal Description of The WHCA Paging Issue
- White House Communications Agency (WHCA) Paging Brief Transcript
- White House Press Briefing
- $2600 Magazine Twitter Magazine and radio show related info.
- $2600 Magazine Mastodon Magazine and radio show related info.
- $2600 Magazine Facebook
- Evil Corley's Twitter Follow his mental breakdown!
- r/2600 $2600 Reddit Group
- Victims of Communism Foundation Don't let $2600 Magazine do this to you!
- Communist Body Count Over 150 million people were killed because of people like Evil Corley.
What makes a good hacker magazine? Not having the number "2600" on the cover is a good start.
- Jason Scott's Textfiles.com Newer hacking textfiles and 'zines.
- Jason Scott's Textfiles.com - Magazines Huge archive of old hacking textfiles and 'zines.
- Phrack, Inc. The legendary Phrack. More content in one issue than all issues of $2600 combined.
- Uninformed Informative information for the uninformed.
- Saqueadores Edición Técnica (SET) E-Zine Spanish hacker magazine.
- HackWire Hacker news, a daily e-zine for hackers and computer security experts.
- The Collusion Webzine Exploring technology and culture from a hacker's perspective.
- Butchered From Inside Electronic publication of free speech and distribution written by the Italian hacker community.
- Hackin9 International magazine about hacking and IT security.
- Infiltration Main journal for urban exploration.
- Page 33 'Zine Hacking magazine, also in PDF format.
- Private Line A journal of inquiry into the telephone system.
- iGlitch 'Zine A new Macintosh and security 'zine.
- Hacking Etc. New 'zine in PDF format.
- Digital Whisper Information security magazine out of Israel. Most articles are in Hebrew.
- (IN)SECURE Magazine Freely available digital security magazine in PDF format.
- .aware eZine Short-lived 'zine with solid technical information.
- O3 Magazine The open-source enterprise data networking magazine.
- Tux Magazine The first and only magazine for the new Linux user.
- Hackszine
- NODE Zine New, independently created 'zine for the NODE community. It contains many of the subjects we talk about here; decentralization and P2P technologies, open-source, do-it-yourself tutorials and hardware design, cutting edge technology and more.
- tmp.0ut New magazine for ELF-lovers.
- Paged Out! Free experimental (one article == one page) technical magazine about programming (especially programming tricks!), hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics.
- Anarchivism - Printed Zine Archive
- Demodulate Not a 'zine, but a really cool technical show exploring hacking & phreaking in the 1980s-1990s with interviews of people involved in those scenes during that period.
- Hacker History Podcast Not a 'zine, but another really cool podcast with interviews of past and current hackers, by Josh Bressers
- Hacker Public Radio The technology community podcast.
- Low-Tech Magazine Low-tech Magazine underscores the potential of past and often forgotten technologies and how they can inform sustainable energy practices. Technology has become the idol of our society, but technological progress is - more often than not - aimed at solving problems caused by earlier technical inventions.
- DIYODE Magazine A new Australian magazine for supporting electronics enthusiasts and makers.
- Hot Iron The Hot Iron newsletters were begun by Tim Walford, G3PCJ and are currently produced by Peter Thornton, G6NGR and Frank Barnes, W4NPN. Issues cover a wide range of topics of interest to the amateur radio community.
- TELECOM Digest The oldest mailing list on the Internet!
- Ultimate Hardware Hacking Gear Guide Discover the best tools, detailed tutorials, and the latest updates on hardware hacking. Whether you're a seasoned pro or a beginner, our e-zine has something for everyone.
- VLAD Virus Laboratories & Distribution Magazine. Australia's number one export :).
Archived Locally
- X.25 Magazine Russian hacking 'zine.
- Da HaX0r BrUtHeRz NeWZlEtTeR
- ~el8 Magazine Support pr0j3kt m4yh3m!
- B4B0 Magazine The B4B0 Party Programme
- The Brotherhood of Warez Phear BoW!@#$%!
- 40Hex 40Hex was once the the most popular DOS virus magazine in the underground.
- PHANTASY Newsletter of the International Information Retrieval Guild (IIRG)
- Informatik Journal Hacker 'zine published by a couple of young punks from Texas.
- Frequency Inside the hacker mind. Editor-in-Chief: Screamer Chaotix
- Napalm E-Zine Napalm is an e-zine devoted to computer security, with a healthy dose of music, news, and ethics.
- Cybertek / TICOM 'Zine / Dystonaut Back Issues The Cyberpunk Technical Journal
- YIPL / TAP Magazine Back Issues Both "old" and "new" versions. Considered the first "hacker" newsletter.
- TEL Magazine Back Issues Telephone Electronics Line. 1970s printed phreaking newsletter, by Teletronics.
- PHC's Phrack Magazine Version of Phrack put out by the Phrack High Council.
- International Journal of Proof-of-Concept or Get The F*ck Out Ridiculously awesome hacker 'zine by Manul Laphroaig
- Binary Revolution Magazine Printed alternative to $2600.
- Blacklisted! 411 Both print and online magazine from the 1980s/1990s which
iswas back again.- Hack-Tic Magazine Archive Legendary printed Dutch hacker magazine from the 1990s.
- 't Klaphek Magazine Another magazine for Dutch speaking hackers and phreakers.
- K-1ine A 'zine for the Canadian underground hacking/phreaking scene.
- Patterns of Recognition New hack/phreak 'zine with funny stories by I-baLL, Judas Iscariot, Gonzo, Murd0c, Enamon, MikeTV, Scientist, Venadium, Rob T. Firefly, and Sephail. (Website)
- Reprimand The poison air bubble in the bloodstream of the american Collective, by Gonzo. Missing many files and images.
- Ethertech Global Industries Awesome new hack/phreak e-zine. From Wisconsin?!
- Telecom-munists Monthly Funny phreak magazine by Dimebag Kyle & IDontLikeRabbits: "We want stupid shit and stupid shit only".
- Phreakers Hackers Underground Network (P/HUN) Newsletter By Red Knight of the 'Hackers Den' BBS.
- DIG Magazine Online and printed magazine from the Digital Information Group (DIG).
- Syndicate Power Action Syndicate Power Action is a small newsletter which pays tribute to the roots of the Soljo - frequently released with the ultimate goals of being totally insane, badly written but slightly amusing. SPACT is SOL's contribution to the glorious 'Rag's Division' of the textscene - and perhaps the first "Fire and Forget ezine.
- Vicious Propaganda A step backwards in digital communications...
- Outbreak Magazine Nice little hack/phreak e-zine from around 2002/2003 by kleptic
- Radical Future This magazine focuses on computer hacking, as well as the freedom of speech, expression, and press when it comes to political beliefs and events. By Port7Alliance.
- System Failure System Failure is a publication geared towards the underground computer culture; mainly dealing with h/p issues. Each issue is designed to have both beginning and advanced material. Methods change all the time, and it's a race between them and us to find the holes in the system, to openly show the System Failure.
- Phr33k4z0iD'z & 13370 phr34k0 h34d5 Newer, detailed phreaking 'zine, plus a lot of cool and original phreaking/hacking text files.
- ODDREE: The Slacker Journal ODDREE is a free technical journal for hackers, slackers, and nerds. From Ray Dios Haque
- Analog.5 Analog.5 is a hacking e-zine designed by the Hak5 community, for the Hak5 community. A total of five issues were published until the zine died from a lack of submissions.
- root zine Small printed hacker magazine by Mutter from the 1990s. (Still looking for issues...)
- Blackzine Canadian hack/phreak zine by lord narayana of Phones of Zen, who ran the official 2600 meeting in Calgary. Unfortunately missing all the ZIP files....
- Phone Punx Magazine Cool little phreaking 'zine by Mohawk of the Ocean County Phone Punx, only three issues though?
- Digital Phreak P1mps The DPP is a loose association of hackers, phreaks, coders, and some other friends from IRC (#p1mp on EFnet). DPP originally started out in 1996 as a pseudo-hacking magazine that ended up being a skript-kiddy forum. Although there was some good material published, the 'zine never gained too much respect. From Wisconsin?!
- The HAVOC Technical Journal Scud-O presenting the best info the underground hacking scene has to offer, a HAVOC Bell Systems' Publication.
- Go Null Yourself New hacker 'zine by sToRm and m0nkee. Lots of good original content and old-school hacking vibe.
- Codebreakers The free online magazine for reverse-engineers, only two issues? (German version, not the virus one.)
- Confidence Remains High Very high quality hacking 'zine from the late-1990s which was known for the original work of "so1o." Includes the missing files.
- 29A Labs Quality 'zine from a highly-respected Spanish virus writing group which was active on the old VX Heavens forums.
- HWA.hax0r.news Cruciphux of Hackers Without Attitudes (HWA/DoK) chronicle the events of the computer underground in this excellent text 'zine. (Issues)
- Keen Veracity Hacker 'zine put by Legions of the Underground which is released every so often.
- InET Magazine InET - Intrusos Exploracion Tecnologica - an underground research group out of Columbia. In Spanish.
- DataZine DataZine is the official e-zine of The Datacore.
- DO NOT F*CK WITH A HACKER Chinese/English language hacker magazine with perhaps the greatest name ever...
- Anti-Social Magazine The only magazine to support all underground scenes. The magazine is in a DOS/Windows executable format. Many issues are missing.
- U H C A's Technical Journal Short-lived technical journal by Digital Phreak, the named changed to Infosanity in later issues.
- Hackers Information Report HiR is an electronic publication by Axon that is written by real hackers and phone phreaks that have the desire to share information. Missing all the images.
- Damage, INC Short-lived Canadian 'zine. We want to use this medium as a weapon to fight the corruption that exists, reveal conspiracies and coverups, give useful information to those in the h/p scene.
- Vaginal and Anal Secretions Newsletter From 1992 to 1999, Crygenic Piss and friends created a series of extremely original textfiles on anything they could come up with, the more disgusting the better, and called it "The Vaginal and Anal Secretions Newsletter," or, simply, VAS. Why? Well, as they say "We couldn't come up with a better name. F*ck off." Missing all the images and issue #130.
- Assembly Programming Journal Assembly Programming Journal is an online magazine covering assembly language programming techniques. The magazine will come out in ASCII format (natch) every three months, and will contain code and articles for beginner, intermediate, and advanced asm progammers.
- ARTeam eZine An excellent, but short-lived, 'zine for the dedicated software reverse engineer by ARTeam.
- vACZiNe Danish "ultra hardcore tutorial mag" dedicated to cracking, coding, cryptography, crackmes, art, and more!
- Barata Elétrica ("Electric Cockroach") Brazil's first hacking 'zine started by Derneval in 1994. In Portuguese.
- F41th Magazine The U.K.'s only dedicated H/P zine, run by D4RKCYDE, the U.K.'s only H/P group.
- Party Line Nice little 'zine covering the operating of the Futel public payphone operating.
- Kräcker mAG German software reverse engineering text magazine covering the German cracking scene. Started by Prof.X in 1999.
- REVERSERS E-ZiNE This e-zine is a try of making some good infos, links, ... about the current software reverse engineering scene. By TORN@DO of The Immortal Descendants, who also had their own 'zine titled Reverse EngineerZINE.
- Hakin9 Hakin9 is an infamous monthly magazine and online training provider dedicated to hacking and cybersecurity.
- Cult of the Dead Cow cDc: We're just into T-files for the Girlies and the Money.
- TAPR Packet Status Register Archives TAPR membership journal which features both technical and non-technical articles.
- The Groom Lake Desert Rat An online newsletter covering Area 51 and related UFO lore by Glenn Campbell.
- Satellite Watch News Your source for the latest news from the satellite underground. Dan Morgan's infamous satellite technolgy newsletter which DirecTV shut down. Missing a few issues and all the images.
- CovertAction Magazine Exposing covert action since 1978.
- FREN-Z Magazine FREN-Z, is a true alternative culture magazine. Each issue features a variety of articles, including those on self-improvement, activism, cyberpunk, art, paranormal subcultures, and other things of interest to our frens and family.
- Hacker News Network Working mirror of Space Rogue's infamous Hacker News Network from 1998-2000.
$2600 Magazine
Download Back Issues
"You can't stop P2P technology nor prevent the spread of alternative media - unless people allow it to happen."
--- Reply to a letter in $2600 Magazine Vol. 21, No. 4.
"We continue to maintain that there is nothing at all illegal about making your own copy of something you own."
--- Reply to a letter in $2600 Magazine Vol. 19, No. 3.
"For the record, and for the benefit of some people (like certain corporations and judges) who can't understand why a hacker magazine has a copyright, we encourage people to send our articles to other people."
--- Reply to a letter in $2600 Magazine Vol. 17, No. 3.
"It's amazing to us that people actually think they have to do this. This constitutes personal use - you have every right to use excerpts of a publication in such a manner without asking permission."
--- Reply to a letter in $2600 Magazine Vol. 19, No. 1 asking about copying articles.
"Several years ago it would have been almost unheard of for a corporation to bully someone into submission on the Net using nothing but its might. Today we seem to hear of a new case every day."
--- Editorial in $2600 Magazine Vol. 17, No. 2.
"Hmm... I think I'll start a 'hacker' magazine with articles written by other people but I'll keep the profits to myself. I'll refuse to take any personal responsibility and blame all my problems on someone else! When sales are sagging, I'll ask Hollywood to make a movie about me and my teenage boy posse, then claim I'm being 'suppressed,' while actively supporting truly corrupt politicians and the One Percent. LOL! While bitching about the telephone company selling long distance service, I'll sell T-shirts, hats, DVDs, and stickers! I'll spend 25% of each issue complaining about how dumb everyone else is, but I won't ever mention the word 'thanks' to those people who helped me to get where I am today! Slap a
sixseveneightnine dollar price tag on it and sue anyone giving it away for free! I'll never have to get a real job!"
$2600 Magazine Volume 1, Number 1 (January 1984)
- AHOY! - Introduction to $2600 and editorial
- FBI Goes After ADS Hackers - Tactics and sources of a FBI raid involving IBM's Audio Distribution System (ADS)
- 2600 Flash
- GTE Raids Still Have Many Unanswered Questions - Computer Owners Concerned
- AT&T Credit Cards Make Debut
- Wireless Phones Spell Trouble
- 1984 Arrives in Hong Kong
- The Truth Behind Those 9999 Numbers - Info on the services provided by the 800-9XX-9999 numbers, by Mark Bluebox
- White House Phone List - Phone numbers to various White House offices
- FBI Goes After ADS Hackers (cont.) - Tactics and sources of a FBI raid, continued
$2600 Magazine Volume 1, Number 2 (February 1984)
- Hacking on Telenet - Beginner's guide to GTE's Telenet system and a command overview, by Evil Corley
- ESS: Orwell's Prophecy - Info on the new ESS offices and how they operate, by BIOC Agent 003 (Donald Burgio)
- 2600 Flash
- Times Changing for Directory Assistance
- No Hacking While Flying, Please
- Trick of the Month
- Death Star Cards Spell Woe
- ADS Investigation Moved?
- Some Thoughts on "Garbage Picking" - How to dig through garbage for information and some notes on cross-talk
- Letters - (none given) (California)
- Country Codes & City Code Formats - Long-distance country and routing codes
$2600 Magazine Volume 1, Number 3 (March 1984)
- The Constitution of a Hacker - A look into the hacker's mind, by Evil Corley
- Alternate Long-Distance - A Guide to MCI - An overview of MCI long-distance operations, by Evil Corley
- 2600 Flash
- 718 is Coming!
- Supercomputer Dial-Ups
- Wiretap City
- Students Cause Havoc in Computer
- The Person Numbers
- Furthermore...
- The First Atomic Bomb: A True Tale - Story of Enrico Fermi and an asleep operator
- MILNET Hosts - Military host addresses available on the ARPANET
$2600 Magazine Volume 1, Number 4 (April 1984)
- Whose Strike Was That Anyway? - Info and analysis the 1983 AT&T strike
- The Trouble With Telemail - Security holes in GTE Telemail, by Evil Corley (Similar Article)
- 2600 Flash
- Bell Credit Card Abuse Soars
- Electronics Create Portable Prisons
- 414's Plead Guilty
- Teller Machine Crime Coming
- Free Information in Trouble
- A Word on Wiretapping
- A True Saga of Teleconferencing - Story on telephone conferences and a bust, by Electric Moon
- MCI Access Numbers - List of numbers to access MCI mail
- Old Phone Book Ads - Collage of old telephone company cartoons on how to use the phone
$2600 Magazine Volume 1, Number 5 (May 1984)
- The Simple Pleasures of a Step Office - Story of dialing (and sounds) on/to a step-by-step office, by Mr. French
- IBM's Audio Distribution System Sure Can Be Fun! - Info on the IBM ADS voice message system, by Evil Corley
- 2600 Flash
- A 414 is Silenced - Others Indicted
- Long-Distance Option Timetable
- Intelpost an Astronomical Failure
- Victory for Wiretap Victims
- Bank Records Aren't So Private
- The Woes of Having a Small-Time Rural Phone Company - Problems with independent phone companies, by Mr. French
- Defense Data Network - DDN addresses
- Easylink Numbers - DDN addresses, continued / Easylink dial-ups
$2600 Magazine Volume 1, Number 6 (June 1984)
- ARPANET Hopping: America's Newest Pastime - Overview of ARPANET and related commands, by Evil Corley
- Electronic Switching Advances - ESS calling features and some potential drawbacks
- 2600 Flash
- No More Free Info
- 2600 Writer Indicted
- Computer Threat Causes Chaos in Albany
- E-COM is Going Away
- AT&T Limits Use of Their Credit Card
- FCC Actions
- The Dark and Tragic Side of the Great Break-Up - Smaller companies may give poorer service, by Mr. French
- Letters - Quasi Moto (Michael Danseglio, Orlando, FL), Awfully Curious
- E-COM Dial-Ups - E-COM dial-up numbers
- New York Telephone "Letter of Doom" - Letter which says your lines are under surveillance by law enforcement
$2600 Magazine Volume 1, Number 7 (July 1984)
- "Look Out, He's Got a Computer!" - Newspaper stories and a defense of computer hackers, by Evil Corley
- MCI Mail: The Adventure Continues - Overview of the faulty MCI Mail computer network, by Evil Corley
- 2600 Flash
- Look Out For Sidney!
- Bell to AT&T: Get Lost!
- Five Arrested in Phone Fraud
- An Official Crackdown on Hackers
- Pay Telephones Deregulated
- "You Must First Dial a One..."
- Information News
- Introducing the Clear Box! - The "clear box"for post-payphones, by Mr. French
- Letters - Curious, RC
- TRW: Big Business is Watching You - Overview of the TRW Information Services and how to run your own TRW credit reports
$2600 Magazine Volume 1, Number 8 (August 1984)
- But How Does It Work? - A simple, but detailed, explanation of how the phone system works, by BIOC Agent 003
- Privacy Lost - Book review of David Burnham's Rise of the Computer State: The Threat to Our Freedoms, Our Ethics and Our Democratic Process
- 2600 Flash
- Big Brother No Longer Watching Miami
- Computers Seized as Summer Games Begin
- House: Hacking is Bad
- More PC Jr's, Less Z-100's for Soviets
- Federal Express Offers "E-Mail"
- ITT Wiping Out Fee
- 800 Directories Now Available
- Ice Cream Chain Aides Selective Service
- Be Nice to Your Telco - Tricks to play on your local phone company
- Letters - Agent Orange, Miserable in Philadelphia, John Gregg
- CN/A List - List of Customer Name/Address contact numbers
- The Hacker's Guide to Area Code - A simple scheme to help "map out" exchanges in your area
$2600 Magazine Volume 1, Number 9 (September 1984)
- History of British Phreaking - Guide to U.K. phone systems, by Lex Luthor (Vincent Louis Gelormine [TKOS][LOD/H], Rogue Fed, Tamarac, Florida)
- More on Trashing - Proper techniques on digging through garbage, The Kid & Co. and The Shadow (David Flory, Dan Foley, Shadow 2600)
- 2600 Flash
- NSA Doesn't Feel Secure
- Another Hacker Story
- AT&T Faces Serious Money Problem
- Private Directories Soon to be Available
- A Friend in High Places - Story of telecommunication fun and a friendly operator, by Mr. French
- Letters - AZ
- IBM ADS Directory - List of IBM's Audio Distribution System access numbers
- Telephone Company Letter - Need to subscribe to Touch-Tone service
$2600 Magazine Volume 1, Number 10 (October 1984)
- Getting Caught: Hacker's View - Story of a raided hacker and the effects on his life
- Vital Ingredients: Switching Centers and Operations - Description of the different central office operations and classifications, by BIOC Agent 003
- 2600 Flash
- NSA Wants Better Phones
- Oh No, Not Again!
- Victimized by Crime Computers
- Sears Satellite Network
- Loopholes Around Wiretap Laws
- IBM is Buying ROLM!
- 911 Suspect Hung Up
- Letters - Crystal Palace, The Animal, kd, The National Center for Computer Crime Data
- Contacting the Gestapo - New York Telephone security numbers
- Old Phone Book Ads - Some telephone company cartoons on how to use the phone
$2600 Magazine Volume 1, Number 11 (November 1984)
- Exploring Caves in TRAVELNET - Exploring the General Motor's TRAVELNET computer network / phone extender
- Fun With Fortress Fones - Technical info on Western Electric single-slot coin telephones (Coin Crafts' Manual)
- 2600 Flash
- Computer Foul-ups Hurt Social Security
- Phones in the Sky
- Another FBI Computer File
- Use of Wiretaps at Record Pace
- 818 Here to Stay
- One We Somehow Missed
- In Addition...
- Letters - Howard A. Karten (Randolph, MA), Fire Monger, The Trojan Horse
- Carrier Identification Codes - Alphabetical listing of Independent Carrier (IC) and Carrier Identification Codes (CIC) / Feature Group D 3-digit PIC codes
- MCI Mail Targets 2600 - Letter from MCI
$2600 Magazine Volume 1, Number 12 (December 1984)
- A Time for Reflection - A look back over the year, by Paul G. Estev
- MCI Mail and Easylink Updates - Electronic mail horror stories and billing problems
- The Scariest Number in the World - Story (fake?) about calling the president's bomb shelter, by Mr. French
- 2600 Flash
- Computer Makes it Easy for Reagan
- Penetrating the Pentagon by Phone
- First of the "Superminis"
- Students Bog Down Computer
- SBS Offers Toll-Free Service
- Electronic Jail All Screwed Up
- Video Telephone Invention
- Federal Telephone System Update
- Subscriber Comments - Reader survey responses
- Electronic Mail Systems - List and price comparisons of some electronic mail and voice mail services
- Dial-It Numbers - Funny phone numbers, by Paul D. Lehrman
$2600 Magazine Volume 2, Number 1 (January 1985)
- Those Horrible Hackers Strike Again - Newsweak media report of hackers
- Wiretapping and Divestiture: A Lineman Speaks Out - Phreaking story from a telco lineman, by The Shadow
- Getting In the Back Door - Back door access to various DEC operating systems (TOPS/VMX), by Mike Salerno
- Information Bureau - $2600 phone bill, our thanks, and other notices.
- 2600 Flash
- IRS Wants Access to Telco Data
- GEISCO's New Toys
- GTE Hit By Divestiture
- Fascist Computer Network
- A Challenge to Hackers
- In Addition...
- Letters - Jay Bloombecker (Los Angeles, CA), The GCI Guy (Alaska), John Sengelaub (Wantagh, New York), Sector 17, Bob Gamma, Father, Insomniac
- BITnet Topology - Graphic of the BITnet network layout.
$2600 Magazine Volume 2, Number 2 (February 1985)
- The Theory of Blue Boxing - How Blue Boxing works and a bit about their history, by BIOC Agent 003
- Trashing Alaska Style - Central office Dumpster diving story in Alaska, by The GCI Guy
- Surveying the COSMOS - Beginner's guide to Bellcore's Computer System for Main Frame Operations (COSMOS), by The Fire Monger
- 2600 Flash
- Phreak Roundups
- TRW Breached By Non-Hackers
- This Month's Mischief and Mayhem
- AT&T Keeps "800" Data to Self
- Letters - Mad as Hell, The Crazy Man, SJ, Another Hacker (Binghamton, New York), KC, DB (San Jose, CA), James (Scottsdale, AZ)
- 2600 Bulletin Board Online - Info on the Private Sector BBS
- Acronym List - List of common telco acronyms, by The Shadow
$2600 Magazine Volume 2, Number 3 (March 1985)
- Nazi BBS a Challenge to Hackers - "Hackers" who want to restrict freedom of speech
- Are You a Phreak??? - Humorous review of phreaking, by Bob Gamma
- How to Get Into a C.O. - Getting a tour of a telco central office, by The Kid & Co.
- 2600 Flash
- The Next Step in Custom Calling
- Industrial Espionage Seminar
- Kenyan Payphones Prove Popular
- This Month's Troublemakers
- A Mechanical Hacker
- Redemption for a Hacker
- I.R.S. Computers Screw Up
- Computel Does Exist
- Letters - Animal, The Shadow, Kazematic, GR, BIOC Agent 003, Mikhail Gorbachev, HK, Hunter Alexander
- Interesting Phone Numbers - Fun phone numbers
- How to Use the Dial Telephone - 'burr-burr-burr' and 'buzz-buzz-buzz'
- CN/A Numbers - Customer Name & Address phone number list
- The Cipher Disk - Cipher wheel from the NSA
$2600 Magazine Volume 2, Number 4 (April 1985)
- What a White Box Can Do - How to build and use a portable DTMF tone generator
- A Phone Phreak Scores - Social engineering and phreaking story
- Hacking Packard - Hacking HP-2000s, by BIOC Agent 003
- 2600 Flash
- At the Last Stroke...
- Good Apples for the Soviets
- Hackers Go Free
- Robot Kills Man
- 'Santa Fraud'
- Overseas Pirates
- Real Life WarGames?
- Silver Pages
- Other News
- Letters - Puzzled, Chuck Linder, Informed as Hell, (none given), (none given)
- Hosts by Location - ARPANET MILNET host locations
$2600 Magazine Volume 2, Number 5 (May 1985)
- People Express to be Hacked to Pieces - Hacking the People Express Touch-Tone reservation system, by Paul G. Estev
- How to Run a Successful Teleconference - Complete guide to ALLIANCE teleconferencing, by The Shadow
- 2600 Flash
- 414 Bust
- Police Hacker Cleared
- Dial-a-Directory
- Reagan Hangs Upon Kids
- MCI Goes to U.K.
- Yellow Scam
- "Crackers" Cracked
- Carrier Choosing Time
- Mystery Transistor
- ALLIANCE Teleconferencing - Diagram of the steps needed to setup an ALLIANCE teleconference
- Letters - (none given), The Crazy Man
- Inmate Payphone Ad
$2600 Magazine Volume 2, Number 6 (June 1985)
- A Guide to the Israeli Phone System - The phone system in Israel
- Sherwood Forest Shut Down by Secret Service - Sherwood Forest II & III BBSes raided for posting credit card numbers
- Some Words on Hacker Morality - Don't sell other people's BBS files
- Review: Out of the Inner Circle: A Hacker's Guide to Computer Security - Book review of Bill Landreth's Out of the Inner Circle: A Hacker's Guide to Computer Security
- 2600 Flash
- Bell Didn't Invent Phone?
- Porno Phone Service Busted
- IRS Drives Telcos to Drink
- Jersey Wins Wiretap Race Again
- AT&T Computer Caught Stealing
- Say Goodbye to Meter Readers
- Thai Phone Books a Hot Issue
- New Tracking Device for Cars
- Problems for New Payphones
- TINA Message Service
- AT&T Contractual Obligations
- "Call Me" Card
- Letters - (none given), Rusty Diode, (none given), The Silver Sabre
- 800 Prefix List - List of 800-NXXs by state, by Ax Murderer
- Systematically Speaking - Goodbye to meter readers, Thai phone book, tracking devices, TINA "Call Me" card.
- Sherwood Forest: Intro to Hacking - Beginner guide to computer hacking, by The Knights of Shadow
$2600 Magazine Volume 2, Number 7 (July 1985)
- Interesting Things to Do on a DEC-20 - Commands and hacking info for a DEC-20, by The Knights of Shadow
- The Basics of Hacking: Intro The Knights of Shadow Hacking Series, Re-edited and Messed by Elric of Imrryr
- Banking From Your Terminal - A Look at PRONTO - A look at electronic banking and Chemical Bank's PRONTO banking system, by Orson Buggy
- 2600 Flash
- $2 Billion Error
- ITT Crackdown
- GTE Sprint Cheats Customer
- Listening In on Cellular Phones
- More Phone Fraud
- Computers Monitor Truckers
- Missing Children's Faces Displayed
- Letters - (none given), (none given) (Birmingham, Alabama), (none given) (Gulfport, MO), (none given)
- MILNET TAC Dial-Ups - MILNET dial-ups
- Systematically Speaking - MCI goes optical, 100% ESS, GTE bigger than AT&T
$2600 Magazine Volume 2, Number 8 (August 1985)
- Seized! $2600's computer bulletin board "Private Sector" is implicated in raid on Jersey hackers, by Paul G. Estev
- Youth's Computer Seized in Jersey was used for Magazine 'Bulletin Board' by Joseph F. Sullivan, The New York Times, July 18, 1985
- The Threat to Us All - Editorial on BBS raids and seizures, by Evil Corley
- 2600 Flash
- $2600 a Hacking Victim
- New Phone System for Courthouse
- Moving Satellites... What Was Really Going On? - Point-by-point correction of the New Jersey prosecutors fallacious charges and debunking the "hackers moving satellites" myths, by Paul G. Estev
- Why Computers Get Snatched - Why BBSes get raided
- Some Important Questions to Ask - Who is responsible for BBSes and provocative questions about these events
- How Can Sysops Protect Themselves? - How to protect your BBS from raids, by Evil Corley
$2600 Magazine Volume 2, Number 9 (September 1985)
- A Guide to VMS - Beginner's guide to DEC's VAX/VMS systems, by Lex Luthor
- Advanced Hacking VAX'S VMS Lex Luthor and LOD/H
- The Infinity Transmitter - An Old Bug That Had Its Time - How the infinity transmitter phone tap works, by Howard
- Reaching Out on Your Own - Using a Blue Box to simulate Busy Line Verification (BLV) conditions, by Forest Ranger (John Thomas)
- Pursuit for People - Info on Telenet's PC Pursuit computer-to-computer link-up service, by Paul G. Estev
- 2600 Flash
- Phone-in Registration for College
- Trouble With 800 "Word Numbers"
- War Game Addict
- Hacker Extortionist Caught
- Pitcairn Island Now On AT&T Net
- Private Sector Update
- Dick Tracy Toys Are Closing In
- Directory Assistance By Computer
- Pest Control
- Bell Propaganda Films
- Europe Standardizing Telecoms
- Letters - D.J., SEVOX, Talbot, (none given), W.U. Friend
- Telenet Directory - Telenet address scan and banners, by Lex Luthor
- LOH Telenet Directory: Update #4 LOD/H Technical Journal
- Systematically Speaking - Dick Tracy toys, computer directory assistance, Bell propaganda films, Europe standardizing telcoms.
$2600 Magazine Volume 2, Number 10 (October 1985)
- And They Call US Crooks? - Getting ripped off consulting telcos and why he can't sell his expertise, by Silent Switchman
- An Interesting Diversion - How call diverters work and are abused, by Lord Phreaker
- More Info on VMS - Second part to the beginner's guide to DEC's VAX/VMS systems, by Lex Luthor
- Advanced Hacking VAX'S VMS Lex Luthor and LOD/H
- 2600 Flash
- Computer Elections Examined
- Two Inch Thick Bill
- Navy Calls Dial-a-Porn
- Navy Phone Phreaks Nabbed
- Phone Booth Captures Man
- Telco Rats On Government
- Hackers Have Big Business Scared
- Fiber-Optic Network For Du Pont
- Campaign Contributions On-Line
- AT&T Info Charges Upheld
- More Use of Phone Computers
- More Divestiture Woes
- Letters - L.L., The Long Distance Voyager and The Knight in White Satin, Person, Lord Phreaker
- Blue Box Plans - Schematic for a Blue Box, by Ford Prefect (Steve Richardson)
- The New AT&T Hostagephone System - Ad for a hostage negotiation phone
- Systematically Speaking - Hackers scare business, DuPont bypasses telco, computer campaign info, phone computer's divestiture woes
$2600 Magazine Volume 2, Number 11 (November 1985)
- RSTS: A Trick or Two - Hacking info for the DEC's RSTS operating system, by The Marauder (Todd Lawrence, Email #2)
- Here's the Secret! - Non-supervised (no billing) loop-around test lines on a GTE GTD5, by Silent Switchman
- The History of ESS - The history of the Western Electric ESS, by Lex Luthor
- 2600 Flash
- Columnist Attacks AT&T
- No Dial-it Calls for Feds
- Dial-it Sex Numbers Argued
- Big Deal for Little Town
- Springsteen Mania
- Avoid Phones in Storms!
- Rural Customers Denied Access
- Police Dept. Wants Cellular Phones
- Toll-free From Where?
- Pacific Cable Planned
- Free Kiddie Dial-It Calls
- AT&T to Read E-Mail
- Equal Access May Not Be "Equal" to Modems - Billing problems with autodialers, by The Shadow
- Letters - HAL-9000/Beast 666, Lord Phreaker, a.e., Worried Phreak
- Test Numbers - List of telco plant test numbers, by The Shadow (Shadow 2600 - Dave Flory - died 1989)
- The Early Phreak Days - Story of phreaking in the 1960s, by Jim Wood
- Systematically Speaking - Avoid phones in storms, rural unequal access, police cellular phones, toll-free from where?, AT&T to read email
$2600 Magazine Volume 2, Number 12 (December 1985)
- Our Wishes For '86 And Beyond - Editorial on telco improvements, by Evil Corley
- Fun With COSMOS - Additional info on Bellcore's COSMOS, by Lex Luthor
- Hacking COSMOS: Part 1 - Basics by Lex Luthor
- Hacking COSMOS: Part 2 - Intermediate Course by Lex Luthor
- 2600 Flash
- Telco Service Spawns Racist Banter
- French Phones Renumbered
- BB Watching Without Regulation
- Fawcett Phone Bill Too Big
- Inmates Handle Information Calls
- No More Redialing?
- Cityphone Has The Answer
- Super Crisis Alert System
- Super Payphone
- Phones at High and Low Speeds
- AT&T Offers E-Mail
- Dreams of GEnie
- German Phone System Stagnant
- Survey Results - Results from the $2600 reader survey (Page 2)
- More Than 1500 BBS Numbers - Big list of BBS numbers
- Systematically Speaking - AT&T email, German phones, super payphone
$2600 Magazine - Volume 3, Number 1 (January 1986)
- Private Sector Returning - Return of the Private Sector BBS. Back online soon, but many questions on seizure remain, by Evil Corley
- Divestiture: What Happened? - An explanation of that which is confusing the populace on the aspects of the AT&T breakup, by Evil Corley
- 2600 Flash
- AT&T Does It Again
- Five Aliens Hung Up
- Technology Nabs Hooky Players
- Home Computer Attacks Falwell
- Another Astronomical Phone Bill
- Dial-A-Porn Update
- Phone Booth Wins Again
- New Payphones Confuse Callers
- Security Software
- Your Own Private Centrex
- New VAX Announced
- Cray Maneuvers
- Overcharge Hunters Needed
- Phone Service via RadioShack
- Letters - Ford Prefect, Arab149, The Creature, The Grub (Canada)
- Blue Box Programs - TI-99, Commie 64, Atari code for generating MF tones, by Ford Prefect (Steve Richardson)
- Systematically Speaking - Confusing payphones, code abuse software, Centrex features in your house, VAX8650, overcharge hunters
$2600 Magazine - Volume 3, Number 2 (February 1986)
- VMS - The Series Continues - Additional info on hacking DEC's VAX/VMS systems, by Lex Luthor
- Advanced Hacking VAX'S VMS Lex Luthor and LOD/H
- It Could Happen To You! - Story of phone phreaks harassing other phreaks
- Dial Back Security - Info on how "dial back" security works and some ways to defeat it
- 2600 Flash
- Teenagers "Abuse" Party Line
- A Unique Obscene Caller
- The Scoop on Pen Registers
- Reporters Steal Swiss Phones
- Payphone Causes Panic
- Sprint Unites with US Telecom
- Write Protect Tabs Wrong
- Bell Atlantic & MCI Collaborate
- Cellular Phones in England
- Infrared Beeper Will Find You
- Electronic Tax Returns Are Here
- Acoustic Trauma
- Letters - Artful Dodger, Field Support, Fellow in Utah, John J. Williams, Mojave Dessert
- Interesting Phone Numbers - Interesting phone number list
- Systematically Speaking - Spring and US Tel merge, write protect tabs wrong, Bell Atlantic chooses MCI, cellular phones in England, infrared beeper, electronic tax returns, acoustic trauma
$2600 Magazine - Volume 3, Number 3 (March 1986)
- An Overview of AUTOVON and Silver Boxes - Info on the Department of Defense's AUTOVON phone system and how it uses those extended DTMF tones
- AUTOmatic VOice Network (AUTOVON) Excerpt from a Global AUTOVON Telephone Directory as found in a Fort Lauderdale library.
- An American Express Phone Story - Story about hacking the toll-free charge card authorization number, by Chester Holmes
- Final Words on VMS - Security info and tips on DEC's VAX/VMS systems, by Lex Luthor
- Advanced Hacking VAX'S VMS Lex Luthor and LOD/H
- 2600 Flash
- Hacker Zaps Computer Marquee
- Soviets Denied Computer Access
- Who Called The Shuttle?
- New Ways Of Stealing Data
- Computer Password Kept Secret
- Satellite Jammers Jammed
- TASS News Service
- Soviet Computer Update
- Dial The Yellow Pages
- Northern To Destroy COs
- There Are More Phones Than Ever
- Letters - Corporation, Dissenting Opinion, DIAL, Various People, Scan Man, A Subscriber in Pa.
- This Month at 2600 - Private Sector's return, Computel and Compuserve, Telepub '86, a postal miracle
- Systematically Speaking - Jamming satellites, TASS news service, Soviet computer update, dialing the Yellow Pages, Northern Telecom to destroy COs, more phones than ever
$2600 Magazine - Volume 3, Number 4 (April 1986)
- RSTS for Beginners - Beginner's guide to RSTS/E on DEC PDPs, by The Marauder
- Hacking the RSTS/E System by The White Guardian
- Making the Most of RSTS/E Systems by Captain Hack
- Mobile Phones - Theory & Construction - Info on Improved Mobile Telephone Service (IMTS) and building your own dialer, by The Researcher
- 2600 Flash
- British Phonebooth Wedding
- Man Worries About Sprint Bill
- Bad Tenant Databases
- Car Breathalyzers
- Phone Phreak Fined
- Marcos Phones For Free
- 617 Will Be Divided
- Congress Chooses AT&T
- Baby Bells Don't Pay AT& Bills
- Equal Access 800 Drawbacks
- Encryption Provides Signature
- Directory Assistance Failure
- Dial "00" For Operator
- Letters - A Reader, Ben Harroll, (none given), Heyzeus Arguillis, NYNEX Phreak (Charles Andrew Hope)
- A Story of Eavesdropping - Listening to conversations during World War 2
- This Month at 2600 - Transcripts of the Private Sector raid, more on Computel
- Systematically Speaking - 617 to be divided, Congress chooses AT&T, Baby Bells don't pay AT&T bills, equal access 800s, data encryption, DA failure, AT&T loses its zero
$2600 Magazine - Volume 3, Number 5 (May 1986)
- Exploits in Operator Hell - Harassing the operators in Alaska, by The Alaskan Phreak (TAP)
- The Computel Scoop - Info on the magazine Computel which was believed to be related to TEL
- 2600 Flash
- Bellcore Publications Go Public
- US and France Link Phones
- Computer Grammar
- Shower Phone?
- Cellular Modem
- High Tech Parking Meters
- Congressional Computer
- Wrestlemania Pins Bell
- Sting Boards on the Rise
- American Network Fears Hackers
- Free Pay-Phones Plague New Jersey
- Bogotá, Columbia Gets Extra Digit
- Patients May Get To Keep Phones
- Beware of Hacker Terrorists
- Letters - MM (Dublin, Ireland), MS, The Doctor, J in Boston, WP, The Hooded Claw, Unlisted Number
- AUTOVON Translations - Translations for AUTOVON numbers, by The Creature
- Systematically Speaking - Wrestlemania pins Bell, sting boards on the rise, American Network fears hackers, free payphones plague New Jersey, disposable phones, hacker terrorists
- Boxing on ITT / SBS Skyline - Boxing tips and code info
$2600 Magazine - Volume 3, Number 6 (June 1986)
- Computer Crime Review - Review of a report from The National Center for Computer Crime Data
- How to Hack a Pick - Beginner's guide to hacking the Pick operating system
- Review: The Computer Underground - Book review of M. Harry's The Computer Underground, by John Drake (Mark Bennett)
- 2600 Flash
- New York's Computer Law
- $6,829 Phone Bill
- Big Computer Crime Pays
- Public Phone Secrecy
- Capitol Hill Hacker
- Citibank Money Games
- Hands Across Telenet
- Kiev Calling Clogged
- NYNEX Bumps Southwestern Bell
- Stock Market Crash
- "Ed Quinn Cell Site"
- Let's Move To France!
- Letters - Twilight Zone The Phreaker (London, England), JN (Illinois), Lord Peter Wimsey, Dr. William Wainwright, John Smith Hacker, Seagull, PV, (none given), Right Track
- Special AT&T Services - Various phone numbers
- Resources Guide - Various groups and publications on computer security
- Systematically Speaking - Hands across Telenet, calling Kiev, NYNEX bumps off Southwestern Bell, stock market crash, cell site names, videophones
$2600 Magazine - Volume 3, Number 7 (July 1986)
- Violating a VAX - Trojan horses, obtaining passwords, and other VAX/VMS hacking tips, by Baalzebub
- The Free Phones of Philly - Skyline providing free long-distance from payphones, by Chester Holmes
- 2600 Flash
- Town on Hold During Strike
- Prisoners Break Law
- Hacker Degrees?
- New Jersey Tops Taps
- Ex-Fed Tapped
- SS Numbers Returned To Citizens
- Computers Strike Again!
- Federal Employees "Tracked"
- AT&T Selling Payphones!
- Automated Operators Coming
- Cellular Dial-By-Voice
- New British Phone Service
- No Data Protection for Hong Kong
- 74,000 Calls to Fraud Line
- Federal Phone Failure
- Indiana Telco Threatens AT&T
- Letters - Shadow 2600 and Kid & Co., Howard, kl, Untitled, SF
- Country Codes - Country code list from Telecom Digest
- Systematically Speaking - AT&T selling payphones, automated operators, cellular dial-by-voice, new British phone service, no data protection for Hong Kong, Congressional fraud hotline, federal phone failures, Indiana telco threatens AT&T
$2600 Magazine - Volume 3, Number 8 (August 1986)
- Knowing UNIX - UNIX hacking tips, sending email, and some simple C code, by The Kid & Co.
- A Trip To England - Phreaking story from England, by John Drake
- 2600 Flash
- Phone Fraud in Governor's House
- BB Watching VDT Operators
- LD Companies Strike Back
- Leave Our Poles Alone!
- Phone Booths Mauled Then Stolen
- The Ghost in the Machine
- USSR Computer Hungry
- ATM's in China!
- Cash Machines Are Popular
- TV Blue Boxes
- New Chip Helps Sprint
- Government Phone Fate?
- Rural Radio Phones
- "Debugging" Phones
- Letters - The Stopper, Rees Morrison (Scarsdale, New York), j, Stake Out
- Carrier Access Codes - List of 10xxx PIC codes (Updated List)
- NPA Exchange Count - List of area codes and the number of exchanges in each
- Systematically Speaking - USSR computers, ATMs in China, NYCE, TV Blue Boxes, government phones, rural phone radios
$2600 Magazine - Volume 3, Number 9 (September 1986)
- Some Facts on Supervision - Information on phone call answer supervision signals, by The Kid & Co.
- RCI & DMS-100 Bugs - Long-distance extender bug
- Another Stinger is Stung - Another sting BBS operated by John Maxfield and Mike Wendland of WDIV TV.
- 2600 Flash
- NSA Drops DES
- Hackers On Shortwave
- BB Traffic Cop
- Crosstalk Saves Old Lady
- Indian Phones Under Siege
- "Signature" On Video Transmitters
- FBI Shopping List
- Poor Connection Starts Bomb Scare
- GTE Sprint Overbills
- FCC Gives Away "Resource"
- AT&T Best For Hackers
- Portable VAXes!!!
- Computer Clothing
- Message On the Move
- Call Rejection In Natchez
- Letters - Lord Phreaker, TCCFBT, Joshua Falkon, Friends in faraway places, Curious, Captain Zorg, Hal-9000/Beast 666
- Interesting Numbers of Winnipeg - Fun phone numbers in Canada (Page 2)
- Systematically Speaking - GTE Sprint overbills, AT&T ranks #1, portable VAXes, call rejection
$2600 Magazine - Volume 3, Number 10 (October 1986)
- Death of a Payphone - Payphone secrets and how to mess up a payphone, by MAD!
- The ABC'S of Payphones by MAD!
- Trashing: America's Source for Information - How to dig through phone company garbage for information, by The Dragyn (Steven Nygard, Austin, Texas)
- Bell Trashing by The Dragyn
- 2600 Flash
- FBI Investigates Coffee Machine
- CIS Copyrights Public Software
- Navy Software Available
- HBO Encryption Broken
- Pennant Ties Up Phones
- Security Can Kill Creativity
- Indiana "Fones" Are Gone
- Electronic Tax Returns
- Software Makers Crash BBS
- Poor Service An Understatement
- Rural Ultraphones
- Local Toll-Free Numbers
- ESS Goes To Taiwan
- NSA Wants a New Chip
- Letters - Psycho (California), Wolfgang Amadeus Mozart, Crazy Eight, Long-Distance Voyager, Wize owl (Hilo, HI), Mr. Tracer, Het Kap, Bernie S.
- Interesting London Numbers - Fun phone numbers
- Systematically Speaking - Electronic tax returns, software makers crash BBS, ICN, Ultraphone, ESS in Taiwan, NSA wants new chip
- Ancient Bell Labs Advertisement - Bell System Ad for Touch-Tone signaling
$2600 Magazine - Volume 3, Number 11 (November 1986)
- ICN - More Than a Bargain - Info on Independent Communication Network phone service, by John Freeman and Evil Corley
- Mastering the Networks - Info on some of the larger computer networks (ARPANET, BITnet, etc.) and their email syntax, by John Anderson
- 2600 Flash
- Voice of Reagan Tortures Patients
- FBI Actions Anger Parents
- "Q" and "Z" Controversy Rages
- More Banks Link Arms
- Sprint - Too Many Customers
- More Magic Buttons
- New Payphone Service for Michigan
- Nickname Listings In Small Town
- Computer College
- Letters - Amadeus, Frustrated in Miami, Reader on the Pacific, Private Sector Subscriber, Any Mouse, NYNEX Phreak
- British BBS Numbers - BBS number list for the U.K.
- Wrath of God Strikes 2600 - They really are the dumbest people on the planet
- Systematically Speaking - Bank link arms, Sprint has too many customers, new payphones, nickname listing, computer college
$2600 Magazine - Volume 3, Number 12 (December 1986)
- Cellular Telephones - How They Work - How Improved Mobile Telephone Service (IMTS) cellular phones work, by Bruce Alston
- Things We're Not Supposed To Know About - Info on the Captain Midnight (John R. MacDougall) HBO hack, by Sir William
- 2600 Flash
- How Not to be Rejected
- Phreaks Tie Up Lines
- North Carolina #1 in Hacking
- International Hacking
- Computers Threaten Privacy
- Telco Says "Pay for Tones"
- Loophole in Wiretap Law
- Free Directories For Bigwigs
- PC Pictures
- Fingerprint Identification System
- Buy My Wires
- Navigate With A CD
- IBM Braille Compatible
- Who Wants To Be Swept?
- Letters - John Freeman (Ann Arbor, MI), BA, TOTE (Rio Piedras, Puerto Rico), Bernie S., Michael Marr (Dublin, Ireland), (none given)
- Net Mail Sites - Networks carrying electronic mail
- Systematically Speaking - Free directories, fingerprint ID system, navigating with CDs, sweeping for bugs
$2600 Magazine - Volume 4, Number 1 (January 1987)
- TAP: The Legend is Dead - Info on the ending of the TAP newsletter, by The Cheshire Catalyst
- TELEPUB '86 Exclusive footage of a hacker gathering on March 8, 1986 featuring Cheshire Catalyst discussing the issues surrounding the future of TAP.
- Stumbling Into Control on a VMS - VMS hacking tutorial, by The Mole
- Telecom Informer - British Telecom info, by Dan Foley (David Flory, The Shadow, Shadow 2600)
- Illegal Megahertz - Analog cellular frequencies
- Cellular Information Compiled by Madjus of N.O.D. Phrack, Issue #43
- Letters
- Beepers - da
- GTE Telcos - Arthur Dent
- Preacher Hams - Phil
- Student Restrictions - An "English Soccer Fan"
- An Acronym Maker - The Gladiator
- More TAP Woes - Arab149
- 800 Directories - Cocopelli
- Searching for ANI - Also frustrated in PA
- Phone News - Phone news
- 2600 Marketplace
$2600 Magazine - Volume 4, Number 2 (February 1987)
- Hugo Cornwall Interview - Interview with Peter Sommer, (a.k.a. Hugo Cornwall), Britain's most famous hacker/author, by John Drake
- COSMOS Guide - Overview of Bellcore's Computer System for Main Frame Operations (COSMOS) frame/OE management system, by Sir William
- The 1986 COSMOS Files: Part 3 Service Order Input, by Sir William [KOTRT]
- Telecom Informer - Phreaking news, by Dan Foley
- Nasty Business - MCI and Sprint letters
- Letters
- Some Suggestions - The Perpetrator
- Some Numbers - Silver Bandit
- On Cellular Phones - The New Age Phreaker
- ANI Trouble - (none given)
- Book Review: The Hacker's Handbook - Book review of Hugo Cornwall's The Hacker's Handbook, by Roland Dutton
- New Developments - Touch-Tone (DTMF) service charges
- Book Review: Automatic Teller Machines III - Book review of Consumertronics' Automatic Teller Machines III, by Lord Phreaker
- 2600 Marketplace
$2600 Magazine - Volume 4, Number 3 (March 1987)
- The Ballad of Captain Crunch - Folksong about John Draper, by Mike Agranoff (Boonton, New Jersey)
- A Guide to Equal Access - Overview of the AT&T breakup and PIC codes, by The Hobbit (Al Walker) (Getting the Most Out of Equal Access)
- Telecom Informer - Phreaking news, by Dan Foley
- The Wonderful World of COSMOS - Detailed information on using Bellcore's COSMOS, by Bill from RNOC
- The 1986 COSMOS Files: Part 3 Service Order Input, by Sir William [KOTRT]
- COSMOS Series: Part 1 - The Manual (OPA-1Y632-01), by Doctor Who
- Surveying the COSMOS by The Fire Monger
- COSMOS: Computer System for Main Frame Operations (Part One) From Phrack, Issue #26, by King Arthur
- The Definitive COSMOS From Phrack, Issue #31, by Erik Bloodaxe
- COSMOS Command Listing
- COSMOS Overview by The Warlock, Tuc, Agrajag the Prolonged
- Letters
- An Envelope Please - Bob Gamma
- Comments... - AH
- And More Comments... - Bernie S.
- An Experience to Share - The Sultan
- Words of Agreement - DE
- Words of Caution - Ben Harroll (San Diego, CA)
- A Response - John J. Williams
- More on ICN - Jim A. (Montana)
- 2600 Marketplace
$2600 Magazine - Volume 4, Number 4 (April 1987)
- Computel Put to Sleep - Computel hacking magazine out of business
- Hacking PC Pursuit - Using PC Pursuit out-dials on Telenet, by The Cheshire Catalyst
- Telecom Informer - Phreaking news, by Dan Foley
- CN/A List - Customer Name & Address number list
- Letters
- Communication - (none given)
- More ANI's - JA (Florida)
- Comments - Kirk (California)
- French Loophole - The Cote D'Azur
- Stuck on Busy - F.B.
- Praise - (none given)
- Criticism - RDM (Texas)
- Advice - A Reader
- A Warning - (none given) Newark, NJ
- Coin Test - Box Tester
- More Resources - Het Kapittel
- In Reply - MAC???
- Goings On - Various news bits
- 2600 Marketplace
$2600 Magazine - Volume 4, Number 5 (May 1987)
- More VAX Tricks - VAX/VMS hacking tips and code for password grabber and generator, by Mainstream America
- The Meaning of CLASS - Info on Custom Local Area Signaling Service (CLASS), by The Videosmith (Ronnen Miller, Philadelphia, PA)
- Custom Local Area Signaling Services (CLASS) by The Videosmith LOD/H Technical Journal
- Telecom Informer - AT&T's E-Card and the 959 test exchange, by John Freeman
- Phoning From Europe - European phone systems, by The Lineman
- Telenet Guide - Telenet address directory, The Legion of Hackers
- LOH Telenet Directory: Update #4 LOD/H Technical Journal
- Letters
- New Toys - Bernie S.
- Explain Yourselves - Izzy Hear
- Needs Blue Box Program - Edward Dean Jones
- Access Still Unequal - IHR
- Reaching Out - EH
- More on VAX - The Carolina Beachcomber
- FAX: A New Hobby - FAX machine info and receiving RF faxes, by Bernie S. (Edward Elliot Cummings, bernieS, DOB: 02-26-1962, N3KOW)
- 2600 Marketplace
- Review: Duophone CPA-1000 - Inexpensive telephone "pen register" from RadioShack, by Evil Corley
$2600 Magazine - Volume 4, Number 6 (June 1987)
- Allnet: A Horror Story - Allnet scam, by Mike Yuhas
- Paging for Free - Free voice paging, by Bernie S.
- TSPS Guide - Hackers guide to the AT&T Traffic Service Position System (TSPS) console, by The Marauder
- The Traffic Service Position System (TSPS) by The Marauder LOD/H Technical Journal
- Telecom Informer - Phreaking news, by Dan Foley
- Letters
- A Mystery - Silicon Rat and the Mice
- In Reply - John J. Williams
- Military Madness - MDLP
- More Publications - Tabula Rasa
- Additional Facts - The Librarian
- Autovon Info - Rusty Diode
- Visions of Doom - Hex Converter
- Words of Praise - BBQ
- 2600 Marketplace
$2600 Magazine - Volume 4, Number 7 (July 1987)
- Cellular Phone Fraud and Where It's Headed - Overview of cellular phone cloning, by Bernie S.
- Guide to Cellular Phreaking by Bernie S.
- How Phone Phreaks Are Caught - How code abusers are caught, by No Severence
- Telecom Informer - Phone news, by Evil Corley
- Letters
- On Disclaimers - MAC???
- Texas Toll Fraud - The Hooded Claw
- Suggestions, Comments - The RAM
- A Horrible Problem - JD
- 2600 Exposes New York Telephone - Unfair telephone company Touch-Tone charges
- 2600 Marketplace
- Saudi Arabian BBSes - List of public BBSes in Saudi Arabia, by Veteran Cosmic Rocker
$2600 Magazine - Volume 4, Number 8 (August 1987)
- The Summer Games of '87 - Editorial
- TRW Credentials - TRW credit history and their lack of security, by Rex Valve
- Phone Numbers - Interesting phone number, by NYNEX phreak (Charles Hope)
- Telecom Informer - Phone news, by Evil Corley
- FBI Revealed - Review of Glen L. Roberts' The FBI Project Newsletter and The FBI and Your BBS newsletters, by Evil Corley
- AT&T Submarine Map - How to social engineer submarine (underwater, intercontinental) cable system charts, by Bernie S.
- Capturing Passwords - DEC Control Language (DCL) script for capturing VAX/VMS passwords, by Texas Toad
- Letters
- CNA/CPA Questions - Samuel Rubin
- ITT Switching - The Primal Wombat
- Hotline Numbers - Frank B.
- Monitoring Cellular - Stingray
- An Experience - The Sorcerer
- Phone Literacy - Audio O'Sirkit
- A Hacker Survey - Reader survey of hackers, by Evil Corley
- 2600 Marketplace
$2600 Magazine - Volume 4, Number 9 (September 1987)
- Worldnet: Getting Closer Every Day - Overview of early ARPAnet, BITnet, and UUCP networks, by Hank@Taunivm.Bitnet (Hank Nussbacher)
- Operating With Difficulty - New York Telephone operator troubles, by Wintermute (Peter Zatloukal)
- Telecom Informer - Phone news, by Al Fresco
- English Dial-It Service - Recordings and announcement list for England, by John Drake
- Letters
- Notes and Replies - Rainer Mueller
- An Explanation - The Sorcerer
- Newsstand Update - Curious
- Misinformation? Us? - Worried and Upset in Arizona
- 2600 Marketplace
- Review: CO Magazine - Review of a good telecom monthly journal, by Dan Murphy
$2600 Magazine - Volume 4, Number 10 (October 1987)
- New York's IMAS - Integrated Mass Announcement System overview, by Mac+
- Telco's Response - Telco response to Touch-Tone fee, by Bruce Reisman
- Telecom Informer - Phone news, by Evil Corley
- International NUA's - Tymenet and Telenet Network User Addresses (NUA), by The Greek
- South African BBSes - South Africa BBS list, by The Greek
- Letters
- Verification and Tracing - Joshua Falkon
- Missing Blue Box Chip - KM
- BBS Numbers - HAL 9000/Beast 666
- Getting Started - JS
- Private Sector Style - (none given)
- More on Disclaimers - John J. Williams
- And More - N.E. Mouse
- British Payphones - John Drake
- Those Silly Codes - Bellcore Common Language Location Identification (CLLI) code information
- 2600 Marketplace
- Contest Results
$2600 Magazine - Volume 4, Number 11 (November 1987)
- 2600 Bulletin Boards - BBS ad
- Hacking IBM's VM/CMS System: Part 1 - IBM 43XX-series and 30XX-series VM/CMS info, by Lex Luthor
- Hacking IBM's VM/CMS Operating System by Lex Luthor LOD/H Technical Journal
- Social Security Prefixes - Prefix to state mappings, by The Disk Jockey (Douglas Mason, DOB: 12-29-1967)
- Listening In: Catch Me If You Can! - Monitoring satellite phone calls, by The LNA Master
- Review: Government Radio Frequencies - Book review of Tom Kneitel's The "Top Secret" Registry of U.S. Government Radio Frequencies, by Mr. Icom
- Telecom Informer - Phone news, by Staff
- Letters
- Double Beepers - Bob from Los Angeles
- Why No Boxing? - Franken Gibe (Texas)
- Apple Hacking - The Rifter
- More How-To Articles - Tabula Rasa
- A New Source - E.H.
- Pen Registers - Samuel Rubin
- Unique Projects - John Nix
- TAP is Dead! - D.L. (New York)
- 2600 Marketplace
$2600 Magazine - Volume 4, Number 12 (December 1987)
- Important News - Editorial
- Hacking IBM's VM/CMS System: Part 2 - IBM 43XX-series and 30XX-series VM/CMS info, by Lex Luthor
- Hacking IBM's VM/CMS Operating System by Lex Luthor LOD/H Technical Journal
- Telecom Informer - Phone news
- All About BLV - AT&T TSPS Busy Line Verification (BLV) information, by Phantom Phreaker (Curt Richard Wilson)
- Busy Line Verification by Phantom Phreaker Phrack, Issue #11
- Social Interaction With Phones - Stories about phones in our culture, by Dave Taylor
- Letters
- Switch-Hook Dialing - JS (Dallas, TX)
- Pen Registers - Norman Bates
- Evil Happenings - Pala Jones
- Canadian Questions - PG (Toronto, Canada)
- The Truth Revealed - The Cheshire Catalyst
- Ingenious Solution - Sgt. Pepper of Texas
- How Do Inmates Do It? - The Hooded Claw
- BBS Thoughts - P.A.Z.
- The Missing Chip - (none given)
- Yet Another Telco Ripoff - Mary M. (Cornland, IA)
- Roman Hacking - Overseas tales of hacking and phreaking, by Hal from Rome
- 2600 Marketplace
- Long-Distance Horror Tales - MCI tale of trying to set up a long-distance carrier
$2600 Magazine - Volume 5, Number 1 (Spring 1988)
- Monitoring Phone Calls With a TVRO - Listen in on international telephone calls using a satellite receiver
- More on VM/CMS - VM/CMS article corrections and additional info, by VM Guru
- Weathertrak Codes - Codes for a telephone weather system
- An Interpretation of Computer Hacking - An interpretation of computer hacking by a complete fraud, by Captain Zap (Ian A. Murphy, DOB: 01-25-1957)
- Private Sector Scam Revisited - Evidence from the Private Sector raid
- Letters
- More Secrets - Doom
- Encouraging Words - A Friend in Texas
- Still More Secrets - (none given)
- A Very Special Number - (none given)
- Tales of Hackers - The Hooded Claw
- Advice Wanted - (none given)
- Of Phones and Politics - Skinhead Steve and The Boy
- More on the 8038 - (none given)
- REMOB Hunting - MH (Uniondale, New York)
- The Global Village - The NATO Association
- A ROLM Catastrophe - ROLM telephone system troubles
- Happenings - Various news bits
- 2600 Marketplace
- AT&T/BOC Routing Codes - Routing codes used during Blue Boxing
$2600 Magazine - Volume 5, Number 2 (Summer 1988)
- Allnet's Legal Problems - Allnet lawsuit
- A Solution To Viruses - Protection from computer viruses, by Ross M. Greenberg
- How to Write a Virus - How to write a computer virus, by The Plague
- Building a Red Box - Schematic for a actual working Red Box, by R.J. "Bob" Dobbs (Vance Morgan)
- A Real Functioning RED BOX Schematic by: R.J. "BoB" Dobbs Phrack, Issue #33
- A Reader's Reply To Captain Zap - Reader replies to Captain Zap's drivel, by Rancid Grapefruit (Bruce Fancher, DOB: 04-13-1971)
- Letters
- Reactions to Zap - Murdering Thug and The Boy!, The Shadow, Yevgeny Zamyatin
- Gripes and Feedback - Natuerlich!
- A Useful Trick - (none given)
- "Deluxe" Call Waiting - GH
- New Falwell Numbers - A True Believer
- What is Sprint Up To? - Cray-Z Phreaker
- 2600 Marketplace
- Fun Phone Numbers - List of various interesting phone numbers, by Thunder Seven (Page 2, Page 3)
$2600 Magazine - Volume 5, Number 3 (Autumn 1988)
- Outside Loop Info - Telephone outside loop distribution plant overview, by Phucked Agent 04
- The Outside Loop Distribution Plant by Phucked Agent 04 LOD/H Technical Journal
- Cellular Phones - Update on cellular phones, by The Glitch
- Who Was Strowger? - Info on Almon Strowger, by Almon Strowger Jr. (No, not the real one)
- Communications Update - Various news bits
- A Map of the 516 NPA - List of exchanges in 516
- Red Box Program - Commodore 64 BASIC program for generating Red Box tones, by Tommy (Art of Hacking, BBS, Website, Victoria, British Columbia)
- Canadian Numbers - Canada WATS, by Tommy
- Letters
- The Schematic - The Bug Brother #1
- The Virus - Jonathan Porath, Paul van Hattum (Holland), Tommy
- The Chip - Rubber Soul (Toronto, Ontario)
- Another ANI - The Soldier
- BLV Tidbits - The Zeppelin
- What's The Point? - (none given)
- Questions - J.D.
- Another Scam - Doug Porter (Tucson, AZ)
- Anti-Gay Offensive - CH
- 2600 Marketplace
- Price: $4.00
- Cover (Cover Info)
- France A French payphone was our very first foreign payphone photo. Photo by John Drake.
- Staff
- Download Official Scanned Edition PDF!
- Download The Hacker Digest - Volume 5!
$2600 Magazine - Volume 5, Number 4 (Winter 1988-1989)
- The Internet Worm Story - Detailed technical information on the Robert Morris Internet worm, by Bob Page (Santa Cruz, California)
- A Report on the Internet Worm by Bob Page
- With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
- Code: Robert Morris Internet Worm Source Code
- MCI: The Phone Company with a Lot of Explaining to Do - MCI troubles and being switched to their service without notice, by Evil Corley
- Hacker's Guide to UNIX - Info on hacking UNIX systems, by Red Knight (Phreakers/Hackers Underground Network)
- An In-depth Guide in Hacking UNIX and the Concept of Basic Networking Utility by Red Knight Phrack, Issue #22
- Overhearing Phone Calls - Monitoring telephone calls on a scanner or TV (Page 2, Page 3, Page 4, Page 5)
- Letters
- Some Ideas - (none given)
- Articles & Boards - SW
- Need Info - Handel
- AT&T Nightmare - Cray-Z Phreaker
- Call Forwarding - JH
- Observations - Phantom Phreaker
- Soviet Operators - What it is like to be a Soviet telephone operator, by E. Solomenko (Page 2, Page 3, Page 4)
- Chaos Computer Club - Interview with several members of the Chaos Computer Club, by John Drake
- 2600 Marketplace
- Hardwiring Free Calls - Info on what is now called "Beige Boxing," by Dr. Williams (Hardwiring Your Way In)
- Review: Tune In On Phone Calls - Book review of Tom Kneitel's Tune In On Telephone Calls, by Lou Scannon
$2600 Magazine - Volume 6, Number 1 (Spring 1989)
- Hackers in Jail - Editorial (Kevin Mitnick hacked NORAD!?)
- The Wonders of UNIX - More info on hacking UNIX systems - part 2, by Red Knight (Phreakers/Hackers Underground Network)
- 800 & 900 Exchanges - 1-800 and 1-900 translation table, by Scott Statton (N1GAK)
- Letters
- WarGames Dialer - Phloyd Scaari
- More ANI's - RR, (none given), KH
- Blue Box Questions - Santa Claus, Boxed In (Texas)
- A Scary Tale - The Disk Jockey
- How Payphones Really Work - Detailed info on how payphones work, by The Infidel
- News From Around
- Ripoffs & Scams
- Long-Distance Censorship
- Foul-ups & Blunders
- Abuse....
- Mischief Makers
- 2600 Marketplace
$2600 Magazine - Volume 6, Number 2 (Summer 1989)
- Remember... - Editorial
- A Guide to PRIMOS - User guide to the PRIMOS operating system, by Violence (Yesmar, Glyph, The Raver [cDc], Necrovore [Bellcore], Violence [The VOID Hackers])
- Introduction to the PRIMOS Operating System by Violence
- 201 Exchange List - List of NXXs in the 201 NPA (Northern New Jersey), by The Infidel
- Scanning for Calls - Monitoring cordless phones, by Mr. Upsetter (Jason Hillyard)
- Letters
- The South African Phreak Crisis - (none given)
- Payphone Query - Uncle Ho
- UNIX Made Easy - The Micron
- Did You Know? - Name Withheld
- Notes and Info - S. Fox, Mr. Upsetter, PG
- Crossbar Trick - JWC
- Stories Wanted - JJ Buck Bloombecker
- Tuning In Calls - Cyber Punk
- Austrian Phreaking - WM
- Just Say No - Phil
- A Myriad of Questions - (none given)
- Tips on Trashing - How to dig through garbage, by Dr. Williams
- A Sprint Story - Story of a Sprint security raid against a code kiddie, by Larry P. (Larry Phreaker)
- Spanish Phones - Overview of the phone system in Spain which originally appeared in England's Financial Times, by Peter Bruce (Page 2)
- A Summer Worm - Similar Robert Morris' Internet worm ADA source code, by Jeff Gray
- 2600 Marketplace
- Reviews - Reviews of George Zeller's book The 1989 Pirate Radio Directory and the "new" TAP, by Paul Estev and Evil Corley
$2600 Magazine - Volume 6, Number 3 (Autumn 1989)
- Competition: It's the Next Best Thing to Being There - NYNEX Strike editorial
- Grade "A" Hacking - University Applications Processing Center (UAPC) information, by The Plague
- Galactic Hacker Party - Hacker con in Amsterdam
- British Telecom's Guilty Conscience - Letter to British Telecom customers (Page 2)
- The Death of COSMOS? - Some info on Bellcore/Telcordia SWITCH, the COSMOS replacement system
- What's Going On
- Technological Marvels
- Hacker Spies
- NYNEX Bigotry
- Dial-It News
- Payphone Choices
- Overseas Access
- News from the U.K.
- One Less Choice
- Privacy? What's That?
- Hackers In Trouble
- Hacker Fun
- Telco Literature
- Calling Card Tutorials
- Another Telco Ripoff
- Technology Marches Back
- And Finally
- The Secrets of 4TEL REMOBS - Info on the Teradyne 4TEL loop testing system used by GTE, by Doom Prophet (Craig Wilson, Ferrod Sensor, Trouble Verify)
- An Introduction to Teradyne's 4TEL System by Doom Prophet LOD/H Technical Journal
- Letters
- Mobile Telephone Info - Koo Iyo Do
- Southern ANI - John
- ROLM Horrors - gmw
- A Nagging Question - The Apple Worm
- A Request - (none given) (Grand Rapids, Michigan)
- Another Request - THOR
- The Call-Waiting Phone Tap - (none given)
- Interesting Numbers - (none given), LK
- UNIX Hacking - fin
- Intelligent Payphones - Mr. Upsetter
- Retarded Payphones - Incarcerated
- REMOBS - Information on the infamous Remote Observation Systems, by The Infidel
- GTE Horrors - Misc info on GTE and their operations, by Silent Switchman and Mr. Ed Angry
- Voice Mail Hacking - Hacking voice mail systems, by Aristotle (Kevin P. Jones, Louisville, Kentucky)
- Punching Payphones - How to "punch" payphones, like in WarGames, for free local calls, by Micro Surgeon / West Coast Phreaks
- Useful Frequencies - DTMF and Special Information Tone (SIT) frequencies
- 2600 Marketplace
- Carrier Access Codes - 10XXX PIC codes
$2600 Magazine - Volume 6, Number 4 (Winter 1989)
- The AT&T Story - Editorial
- Our Ever-Changing World
- Morris Found Guilty
- Real Damage
- Jailed For Incompetence?
- New Technology
- And Things To Play With
- Ripoff City
- Calling London
- Sprint Is Watching
- Equal Access For All
- German Democratic Phones
- Too Much Chatter
- NYNEX Central Office Data - CLLIs and info for NYNEX COs, by The Plague (Special thanks to Kornflake Killer)
- PRIMOS, Part Two - User guide to the PRIMOS operating system, by Violence
- Introduction to the PRIMOS Operating System by Violence
- Building a Silver Box - Build an extended DTMF keypad (A, B, C, D tones), by Mr. Upsetter
- Letters
- Help Needed - Concerned (Syracuse, NY)
- Interesting Facts - The Renegade of Pittsburgh
- More Frequencies - MM (Rutherford, NJ)
- Numbers Needed - MC (Van Nuys, CA)
- BBS Question - Greg (New York)
- Comments/Suggestions - HC (Phoenix, AZ)
- COCOT Hacking - (none given) (Akron, OH)
- GTE Mysteries - H. (Manhattan Beach, CA)
- On Being Traced - The CPU Raider
- Information - KS (Pittsburgh, PA), DS (Rocky Point, NY), AG (San Bernardino, CA)
- Life's Little Moments - F.M. "Cordless"
- Fun Numbers - The Seeker (Chris Hufnagel, New York, NY)
- Words of Thanks - ???
- How? - WAFB (Knob Noster, MO)
- Hacker Clubs - BK (Syracuse, New York)
- Another Rip-Off Story - Dr. Williams (Washington State)
- 2600 Marketplace
- Area Code/Exchange Count - Exchange count for each NPA
- UAPC Update - Update on the story of New York kids changing their grades, by The Plague
$2600 Magazine - Volume 7, Number 1 (Spring 1990)
- For Your Protection - Editorial
- Facts About MIZAR - Info on the MIZAR recent change memory management system, by The "Q"
- Translating Orders Into Action by The Renegade Hacker!
- How Blue Boxers Are Caught - Info on Signal Irregularity (SIGI) reports under a #1A ESS, by Phantom Phreaker and Doom Prophet (Ferrod Sensor)
- Build a Touch-Tone Decoder - Schematic for a DTMF decoder, by B/Square and Mr. Upsetter
- Silver Box Born in U.K. - Using the extended DTMF tones in the U.K., by Tamlyn Gam
- Listening In via VHF - Monitoring marine wireless phone conversations, by Mr. Upsetter
- News Update
- Morris Sentenced
- Albania Callable
- MCI Insecurity
- New York Tel Rate Increase
- Furthermore
- Letters
- Clarifying REMOBS - MOD!
- Who's Listening? - WH (New York)
- Blue Box Chip - Mr. Upsetter
- Bug Wanted - Charlie Brown
- Questions and Info - GB
- Yet Another Threat - fin
- Red Box Woes - Curious, (none given) (Rhode Island)
- Suggestions and Questions - Redneck 1 (San Luis Obispo, CA), Satisfied Customer, An Overseas Fan, Somewhere in the Midwest
- Hotel Phones - DB (New York, New York)
- The Facts on 10698 - The County Man
- More Network 2000 Ripoffs - The Iron Warrior
- Sensitive Material - A Dedicated Subscriber
- The 911 Document - Review of the infamous BellSouth Practice 660-225-104SV (E911 document), by Evil Corley
- Fun at the 2600 Meeting - New York 2600 meeting apparently under surveillance (Page 2)
- DNIC Codes - Data Network Identification Codes (DNIC) for X.25 packet networks
- 2600 Marketplace
- The 707 Area Code - List of exchanges in 707, by Lurch
- Review: The Cuckoo's Egg - Book review of Clifford Stoll's The Cuckoo's Egg, by Dr. Williams
"Remember, much of $2600 is written by YOU, our readers."
But the profits go into MY wallet! Suckers!
$2600 Magazine - Volume 7, Number 2 (Summer 1990)
- A Bittersweet Victory - Editorial
- The Neidorf/Phrack Trial - Day-by-day overview of the Craig Neidorf trial, by Gordon Meyer and Jim Thomas
- An Interview With Craig Neidorf - Interview with Craig Neidorf about the trial
- What is the EFF? - Info on the Electronic Frontier Foundation
- Negative Feedback - Different option on the Craig Neidorf trial
- PRIMOS Conclusion - Information on the PRIMOS computer system and PRIMENET, by Violence
- Introduction to the PRIMOS Operating System by Violence
- An Introduction to COCOTs - Information on Customer Owned Coin Operated Telephone (COCOT) payphones, by The Plague
- Letters
- Hunting for Wiretaps - none given (San Francisco, CA)
- Comments - Fred (Wilmington, Delaware), none given (Milwaukee, WI)
- On Government Raids - STM, DB
- For the Record - The Acronym King
- Questions - Simpson, BM, JI (Iceland), Jeff, none given (Guerneville, CA)
- Protection from Eavesdroppers - RG
- 2600 Compromising Ideals? - Disgusted Hacker
- An Unusual Request - Rick Saiffer
- Free Phone Calls - Mr. Upsetter, Birmingham
- News Update - Various new bits
- 2600 Marketplace
$2600 Magazine - Volume 7, Number 3 (Autumn 1990)
- Caller ID: The Facts - Information on caller ID, by Jake "The Snake"
- Network 2000 Saga Continues - Network 2000 signing people up to Sprint
- Dorothy Denning Interview - Interview with Dr. Dorothy Denning on the defense of Craig Neidorf, by Dr. Williams
- Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning
- New Revelations From Bellsouth - Technical information on Bellsouth Dialed Number Recorders (DNR), by Evil Corley (Page 2)
- Things You Shouldn't Know - Secret Service Fraud Division information on ATM fraud
- Defeating Trap Tracing - Using calling cards and how to handle telco security calls, by Lord Thunder (Page 2)
- Letters
- Questions - Snoopy, JB (Ontario, Canada), Confused in Kentucky, Ashley (United Kingdom)
- Information - Roy, S.D., Mr. Upsetter, EH, D
- Information Needed - Dr. Williams
- Complaint/Response - Rainbow Warrior
- The COCOT Article - Halo Jones, Dan (Denver, CO), R.S. Grucz, Guyler Magruder (Singapore)
- Prison Phones - C. Rebel
- Privacy Preservation - Reverend Doktor (Matthew X. Economou), Norman Appleton
- Wiretap Clarification - Alan M. Kaplan (Las Vegas, NV)
- A Modern Proposal - Dr. Deviant
- Neidorf Defense Fund - Jeff Hunter (Temple of the Screaming Electron)
- Which Decoder Chip? - none given (Akron, OH)
- General Observations - NB (Rhode Island)
- Converting a Tone Dialer into a Red Box - The infamous RadioShack tone dialer (Model #43-141) into a Red Box conversion article, by Noah Clayton
- Converting a Tone Dialer into a Red Box by Noah Clayton
- Making a Red Box Out of a Tone Dialer Includes pictures and DeadKat's "Stealth-Combo Box" modification.
- Build a Telephone Induction Coil - Make an inductive telephone pickup coil, by 1000 Spiderwebs of Might (Coil Picture)
- The Definitive ANAC Guide - List of Automatic Number Announcement Circuit (ANAC) numbers
- 2600 Marketplace
- An Algorithm for Credit Cards - Code for credit card checksum verification, by Crazed Luddite and Murdering Thug
- Code: cc.c
- Facts and Rumors - News bits from the Atlanta LoD trial.
$2600 Magazine - Volume 7, Number 4 (Winter 1990-1991)
- A Political Hacking Scandal - Hacking Democrats
- The Hacker Reading List - List of hacker magazines, books, and mailing lists, by Dr. Williams
- Central Office Operations - Overview of the inside and outside plant, by Agent Steal (Justin T. Petersen, DOB: 07-28-1960)
- More Leaked Documents - Amusing document from a telephone operator's supervisor manual
- 1-900-STOPPER: Anatomy of a Rip-Off - Info on the 1-900-STOPPER number (Similar Article)
- Letters
- COCOT Troubles - KM
- Future Surveillance - fin (Minnesota)
- Why Did You Do It? - Questmaster (Santa Barbara, CA), Kenton A. Hoover
- Questions - Rob (Woodmere, NY)
- BBS Troubles - The Spectre (St. Paul, MN), Charlie Tuna (Kokomo, IN)
- Another Method - Mr. T.
- Suggestions - The Concerned!
- Technical Suggestions - AP (Oakland, CA)
- Caller ID Override - Pete (Akron, OH)
- A Phone Company Tour - Mitch (Cincinnati, OH)
- Assorted Thoughts - Keyboard Jockey, The Disco Strangler (South River, NJ)
- COCOT Info - (none given, Waterbury, CT), The Martyr and The Mute & Bach Wai
- Winning Reader Entry - Letter contest winners on counter the negative negative articles about hackers, by TELEgodzilla & unknown
- The Word in the Street - Various news bits
- 2600 Marketplace
$2600 Magazine - Volume 8, Number 1 (Spring 1991)
- In Pursuit of Knowledge: An Atari 520ST Virus - Atari 520ST virus code for the GEMDOS operating system, by The Paranoid Panda
- The Terminus of Len Rose - Story of Len Rose's bust, by Craig Neidorf
- Soviet BBS List - Dial-up list for various Soviet BBSes
- What's Up?
- Identifying Callers
- Person Identification
- Credit Release
- Credit Due
- Modern Times
- Whose Scam Is It?
- Eternal Vigilance
- Illegal Networks
- EFF Lawsuit
- Prodigy Invading Privacy?
- Letters - Reader Feedback Time
- Some Suggestions - Mr. Upsetter, TT (Palo Alto, CA), Larry (New York), SM
- What Could It Be? - Mad Scientist
- Info Needed - JN (New York)
- Compliments - Carl Flach (San Leandro, CA)
- Mysteries - Flaming Carrot, (none given, New Mexico)
- Observations - Danny (Harlem, NY)
- General Complaints - Predator
- Payphone Question - TG PA
- Frustration - TG (Mt. Vernon, NY)
- AT&T Special Deal - Noah Clayton
- Telco Rip-Off - RG (Los Angeles, CA)
- Information - Boxholder (Walnut Creek, CA), The Butler, Jeopardy Jim (Jim Vichench, Stroke Information)
- Hacking 101 - S.C. (California)
- A Technical Explanation - Count Zero
- COCOT Observations - George W. (Camden, NJ)
- A Disagreement - Vernon J. Grant (Ely, NV)
- UNIX Password Hacker - Source code for a crypt() brute-forcer, by The Infidel
- Looking Up IBM Passwords - IBM CMS 3.0 password grabber for non-privileged users, by Kevin Mitnick (DOB: 08-06-1963)
- Internet Outdials - List of Internet modem out-dials and how to use them, by Kevin
- 2600 Marketplace
- The New LEC Order - Excellent article on modern Bell Operating Company (BOC) recent change and service order systems, by New Hack City
"Never gaze at a man, not even in passing.
A member of Al Qaeda might assume you are gay, and all gays are an abomination before Allah."Maybe the source of Evil Corley's anger is because he was rejected from joining Al Qaeda?
$2600 Magazine - Volume 8, Number 2 (Summer 1991)
- Where Have All the Hackers Gone - Editorial
- Magnetic Stripes - Magnetic stripe card reader schematic from Hack-Tic Issues #8/#9/#10, by Dr. Abuse
- Death of NYNEX Business Centers - Info on NYNEX changes, by Anonymous
- Hacker News - Info on Len Rose's prison sentencing for sending AT&T source code over a telephone
- Building a Tone Tracer - Build a tone generator for inductive probe line tracers, by Mr. Upsetter (Page 2)
- Hacking MCIMAX - Using a MCI product computer to access their MAX database, by MCI Mouse
- Inspect Implementation - Security problems in Digital's EASYnet and using INSPECT, by Condor Woodstein (Page 2, Page 3, Page 4)
- More on the CLASS Struggle - BELLCORE internal document on CLASS telephone service features
- Letters - The Letters Section
- UNIX Password Hacker - rj, DP, NEXUS 6
- Another 2600 Meeting - (none given)
- Access From Korea - Marooned in the ROK
- Red Box Notes - Larry (New York, NY), TH (Ventura, CA)
- UNIX BBSes - LT
- Interfacing With Mainframe - MAG (Saudi Arabia)
- Send A Message - Dark Overlord
- Caller ID Questions - MB, BK (Bethesda, MD), KB (Austin, TX)
- C&P Info Needed - The Monk (Arlington, VA)
- More Hackerphobia - Peter The Great
- Information Sources - CH (Los Angeles, CA), H. Rochim, Flatline
- On "Breaking In" - Scott Alexander (San Francisco, CA)
- Very Concerned - Quantom (Austin, TX)
- Interesting Numbers - Number 204 (Las Vegas, NV)
- COCOT Theories - Antonin Qwerty (Philadelphia, PA)
- Valuable Lessons - T.15 (Quebec, Canada)
- Hacking Water - RF (Hiller, PA)
- Numbers - American Anarchy (Virginia)
- Another MCI Rip-Off - GR (Libertyville, IL)
- The Value of 2600 - CH (New York)
- Disturbing Observations - DB (Flushing, NY)
- Some New Frequencies - Info on new analog cellular frequencies, by Bernie S.
- 411 - News about phone companies
- Regulating Scams
- AT&T Wants The World
- Advances in the U.K.
- New Services
- Corporate Litigation
- COCOT and PBX Features
- Story of the Year
- Another Great 900 Number
- Japanese Numbers
- Customs of the U.S.A.
- The Outages
- Another Outage
- Caller ID Pushers
- 2600 Marketplace
- When Hackers Ride Horses: A Review of Cyberpunk - Book review of Katie Hafner and John Markoff's Cyberpunk, includes an interesting reply from Kevin Mitnick, by The Devil's Advocate
- Outdials - List of PC Pursuit and Datapac modem out-dials on Tymenet, by Net Runner
- Prisoner Update - Letter from The Leftist (Frank Darden, Email #2, Email #3, Ft. Lauderdale, FL / Norcross, GA)
$2600 Magazine - Volume 8, Number 3 (Autumn 1991)
- Why Won't They Listen? - Editorial
- Simplex Locks: An Illusion of Security - Infamous article on the poor security of Simplex locks - which everyone knew already, by Scott Skinner and Evil Corley
- The Hacker Video - Video of Dutch hackers entering a U.S. military computer system, by Evil Corley
- Protecting Your SSN - Protecting your Social Security number from con artists, by Chris Hibbert
- COCOT Numbers - List of COCOT phone numbers in New England and Washington D.C., by NB & The Dead Cow
- Letters - Pages of Letters
- Where One Hacker Went - (I used to be) Lex Luthor
- Technical Questions - MC (Austin, TX)
- Raw Data - The Militant Midget, Arkansas Coin Collector, GS (Seattle, Washington)
- FAXers Beware - SC (Hollywood, FL)
- Prodigy Far From Gifted - Big Al (Brooklyn, NY)
- General Questions - Wilson Longline (New York)
- Red Box News - Pete in Akron
- Suggestions/Questions - RN (Lake Forest, IL), Midnight Caller, KS (Saskatoon, Canada), GS (Ottawa, Canada), SS
- Caller ID Decoders - Bernie S.
- Hacking UNIX Passwords - SJ (New Haven, CT)
- Voice Mail Fun - Nick (Newcastle, England)
- Tidbits - Various news bits
- USPS Hacking - Postal bar code hacking, by The Devil's Advocate
- Psychology in the Hacker World - Inside the hacker mindset, by Condor Woodstein (Kevin Mitnick?) (Page 2, Page 3)
- 2600 Marketplace
- More Conversion Tricks - More tips for converting those RadioShack dialers into Red Boxes, by DC (Plagiarized from an article by Count Zero)
- Useful UNIX Programs - Simple hacker-related C source code, by Marshall Plann
$2600 Magazine - Volume 8, Number 4 (Winter 1991-1992)
- Computer Security at the Bureau of Prisons - SENTRY computer system security statement before the Subcommittee on Government Information, by Richard J. Hankinson (Deputy Inspector General, Office of the Inspector General)
- Stuff You Should be Interested In
- Dutch Hacker Raids - by Fellpe Rodriquez & Rop Gonggrijp
- More AT&T Confusion
- Progression
- Regression
- Crypt() Source - C source code to the UNIX crypt() function, by Dust (Bern, Switzerland)
- Code: crypt-bsd-4.3-reno.c
- Birth of a Low-Tech Hacker - Story of an older hacker in India, by The Roving Eye
- Mobile Frequencies - List of VHF radiophone frequencies, by Esper
- Simplex Update and Corrections/ USPS Hacking Corrections - Error corrections in the last issue
- POSTNET Programs - Source code for generating POSTNET bar codes, by Marshall Plann
- Letters - The Letter Bag
- Government Nonsense - AB (Sacramento, CA)
- Various Bits of Info - The Crankster Gangster & Tweaky Bird, MG
- Hacking School - MOE
- Modem Voyage - CH
- Questions - LH (San Diego, CA), John, John, E, RA (Virginia)
- Abuse of SSN's - RH (Tacoma, Washington)
- Private Eye View - PW
- Call For Info - (none given)
- On Virus Books - Phat Phreddy Phreak (Dan DiCenso)
- Long-Distance Trouble - Danny (New York)
- Dutch COCOTs - Jack-o (Hengelo, Holland)
- Cellular Eavesdropping - Matt B. (Somerset, MA)
- COCOT Experimentation - Kingpin
- Credit Wanted - Count Zero
- POSTNET Corrections - Black Fox (New York, NY)
- On Prodigy - Lawrence (New York), Jon Radel (Reston, VA)
- Reading ANI - Pete at AU
- Red Box Warning - BillSF
- Reading Stripes - Trigger (Santa Ana, CA)
- Lock Your Terminal - Cray-Z Phreaker
- Russian Technology - KT (Moscow, Russia)
- Class Features - Overview of some custom calling features, by Colonel Walter E. Kurtz 75 Clicks from the bridge
- COCOT Corner - Examples from a COCOT database, various notes on payments and installation
- An Appeal For Help - Help pay Craig Neidorf legal defense fund, by Craig Neidorf (Page 2)
- Gulf War Printer Virus - Info on that stupid "Gulf War Printer Virus" April Fool's hoax, by Anonymous
- 2600 Marketplace
- U.S. Phone Companies Face Built-In Privacy Hole - Security hole in a switches Busy Line Verification (BLV) function
- Monitoring Devices - Simple FM wireless transmitter schematics, by BillSF (Bill Squire, Amsterdam, Holland)
- Human Database Centers - Various credit bureaus and database agencies, by PW
- Price: $4.00
- Cover
- Staff
- Payphones A vandalized payphone between Casablanca and Marrakesh in Morocco. Photo by Bernie S.
- Payphones A money-stealing Moroccan payphone. Photo by Bernie S.
- Payphones Belgium. This one takes money. Photos by Kingpin.
- Payphones Belgium. This one takes cards. Photos by Kingpin.
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 8!
$2600 Magazine - Volume 9, Number 1 (Spring 1992)
- An MS-DOS Virus - MS-DOS .COM infecter virus x86 assembly code, by Paranoid Panda
- A Batch Virus - Virus using DEBUG and EDLIN from a BATCH file, by Frosty of the GCMS (Robert E. Jones, Long Beach, MO)
- Virus Scanners Exposed - How virus scanners work and ways to bypass them, by Dr. Delam
- Hacking WWIV - Different techniques for hacking the WWIV BBS software package
- Using a Silver Box - Access ACD debug features using the extended DTMF tones, by Mad Scientist
- Fun Frequencies - Secret Service and Disney frequencies
- UNIX Password Hacker - An alternate approach to UNIX password cracking which hides your activity, by Keyboard Jockey
- How to Take Apart a Payphone - How to take apart a payphone, by The Monk
- Letters - The Letters
- Caller ID Info - Rich
- POSTNET Questions - BB (Woodbridge, VA), LM (Berkeley, CA), Anonymous
- Info - MT (Baton Rogue, LA), Taran King (Randy Tishler), Dr. Delam, SGC (New Jersey)
- Searching for Answers - The H. (Los Angeles, CA)
- COCOT Updates - NB, Juan Valdez (Washington D.C.), TELEgodzilla
- A Mag Strip Future - Mr. Upsetter
- Technological Marvels - Henry H. Lightcap (Seattle, Washington)
- Transmitter Bits - T^2 (Germany), BillSF (Amsterdam, Holland)
- Clarifications - Bill, Number 204 (Las Vegas, NV), DC (Loomis, CA)
- Why They're Watching - Dispater
- Breaking Into The Scene - The Information Junkie
- Questions - The Iron Warrior
- Outraged - P.O.
- The Australian Phone System - Overview of the phone system in Australia, by Midnight Caller
- A Way to Catch Peepers - C source code to log finger requests, by Alien X
- Review: Steve Jackson's Hacker - Game review of Steve Jackson Games' Hacker: The Computer Crime Card Game
- Simplex Locations - List of universities, colleges, schools, etc. which use Simplex locks
- 2600 Marketplace
- News Updates
- Big Brother
- International News
- New Technology
- Troublemakers
- Opportunists
- Observations
- Regulations
- Fascinating Fone Fun - Interesting phone numbers, by Frosty of the GCMS
$2600 Magazine - Volume 9, Number 2 (Summer 1992)
- On the Road Again: Portable Hacking - Guide to portable computers and mobile hacking, by The Masked Avocado
- Hitchhiker's Guide to the Phone System: Phreaking in the Nineties - Modern phone systems and phreaking, by BillSF
- Demon Dialer Review - Review of the Hack-Tic demon dialer, by The Devil's Advocate
- Bellcore's Plans for Caller ID - Caller ID info from Bellcore TA-NWT-000030
- Fun Things to Know - Various news bits
- Here We Go Again - More information about the Secret Service and "hacker" arrests, mostly the New York kiddies
- Letters - Here They Are
- Trouble to Come - Maelstrom 517
- Enhanced Exaggerations - Danny (New York)
- Mag Strip Update - SE (Minnesota)
- Scanning Results - FD (Atlanta, GA), Name Withheld, David
- At Wit's End - CB (Colorado)
- crypt() Correction - SJ (California)
- Simplex Sightings - Albatross
- Wanted - Birdman (Tennesse)
- Monitoring Problems - Vid Kid (Minnesota)
- Cellular Frequencies - 6025 (Scotland)
- What the NSA Does - Someone (Somewhere)
- Prisoner News - PW (Washington)
- Mystery Calls - Sitting Duck
- The Prodigy Side - Steve Heln (White Plains, NY)
- Defeating *69 - Tips to defeat the *69 automatic callback feature, by Bernie S.
- The View of a Fed - Story from a government computer security man, by The Fed
- Review: Devouring Fungus - Book review of Karla Jenning's book The Devouring Fungus, by W. Ritchie Benedict
- 2600 Marketplace
- Voice Mail Hacking - Hacking voice mail boxes, by Night Ranger (G. Batson)
- Price: $4.00
- Staff
- Cover
- Payphones They may not be foreign payphones but they look rather alien to us. These phones happened to be in the wrong place at the wrong time - namely, Los Angeles in the spring of 1992. Riots have never been kind to payphones. We can only imagine what the COCOTs looked like. Photos by Kuang.
- Payphones Los Angeles Riot - 2
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 9!
$2600 Magazine - Volume 9, Number 3 (Autumn 1992)
- Hacking AmiExpress - Security holes under this popular Amiga BBS software and a way to grab passwords and display them in ASCII borders, by Swinging Man
- Code: steal.c
- Defeating Callback Verification - Neat trick to defeat BBS callback modem verification, by Dr. Delam
- Shopper's Guide to COCOTs - Guide to COCOT payphones, by Count Zero (John Lester)
- Film Review: Sneakers - Review of the movie Sneakers, by Evil Corley
- A Simple Virus in C - Sample source code for a DOS-based overwriting virus that attacks all EXE files in the directories off the main C: directory, by Infiltrator
- Code: simple-virus.c
- Book Review: The Hacker Crackdown - Book review of Bruce Sterling's The Hacker Crackdown, by The Devil's Advocate
- Letters - I/O
- Blue Box Questions - MD (Sheboygan, WI), Phrankenstein
- Assorted Comments - DC
- Sheer Frustration - T^2 (Germany)
- Mild Encryption - Danny (New York)
- Cable Hacking - Lawrence (New York, NY), Anonymous
- A Phone Mystery - The Psychedelic Sloth (Paul Bradley, Oregon)
- Info - Erreth Akbe/Energy!
- Many Questions - The Ronin (Pennsylvania), Clark Kent (Ames, IA)
- An Opinion - TC (Blauvelt, NY)
- The Facts on ACD - Kingpin (Brookline, MA)
- Cellular Mystery - MM (Nova Scotia, Canada)
- Call For Data - The Azure Mage
- Call For Info - JS (Philadelphia, PA)
- Call For Help - TB (New Jersey)
- A Choke Tip - The Prophet
- Mail Problems - RD (Austin, TX)
- Comments From Abroad - EL (Faulconbridge, Australia), DF (Milan, Italy)
- BBS Update - Guy Nohrenberg (Canoga Park, CA)
- Voice Mail Question - Puzzled
- Hacking on the Front Line - Good article on early 1990s computer hacking, by Al Capone
- How to Use the Dial Telephone - New York Telephone document on how to properly dial a phone
- 2600 Marketplace
- Getting Started - Getting started in hacking, by Phord Prefect
- Toll Fraud: What the Big Boys Are Nervous About - Overview of the Toll Fraud Prevention Committee (TFPC), by Count Zero
- 2600 Meetings
- Price: $4.00
- Cover
- Staff
- Payphones East German phones. The translation is "Doesn't Work, Doesn't Exist." Taken from a postcard. Submitted by Katie Hafner.
- Download Official Scanned PDF! (Text Version)
- Download The Hacker Digest - Volume 9!
$2600 Magazine - Volume 9, Number 4 (Winter 1992-1993)
- Hackers in a World of Malls - Info on the Pentagon City Mall 2600 meeting being busted up by the Secret Service
- Cipher Fun - Overview of simple encryption ciphers, by Peter Rabbit
- Beginner's Guide to Minitel - Some info on the French Minitel network, by NeurAlien
- Vehicle Identification Numbers - Guide to VINs
- Secret Service Sites - List of Secret Service field offices, by GCMS MechWariors
- Letter From Prison - Letter from a whiny hacker in prison and brute-forcing Spring card codes
- Growth of a Low-Tech Hacker - Hacking in a low-technology atmosphere, by The Roving Eye
- High Tech Happenings
- The Hacker "Threat"
- Foulups and Blunders
- Advances in Technology
- Abuse of Power
- Numbers
- Letters - feedback
- Federal Issues - Albatross
- Credit Problems - D (Nederland, TX), BR (Hamilton, Ontario), Pacoid
- What a Surprise - JL (Tampa, FL)
- More Simplex Shenanigans - Cray-Z Phreaker
- In Defense of the Demon Dialer - Hack-Tic
- Slow Learners - Dan
- Data - Sarlo (Chicago, IL), Tremoto, Happy Reader and Reporter, MA (Baton Rouge, LA), Digital Bear (Canada), Naddy (Germany), Sp00f
- Scanner Observations - Anon.
- Where is TAP? - IRC (Torrance, CA)
- Book References - WT (Santa Barbara, CA)
- VMS Fun - Alien Hacker
- Answering Machine Hacking - SPaDe (Montebello, CA)
- A Request - The Har (Denver, CO)
- Bellcore Threats - Valis (West Orange, NJ)
- Caller ID Hoodwinking - Gabriel
- Hardware Lock Info Needed - The Pizza Maker Hacker
- Japanese Phone Tricks - Japanese Subscriber
- Assorted Info - Scott (Buena Park, CA)
- 2600 Meeting Adventures - Techno Caster
- Answers - Scott R. (Huntsville, Alabama)
- Toll Fraud of the Past - An official Bell System document on "Blue Boxing" and toll fraud. (Page 2, Page 3)
- AT&T Office List - List of AT&T offices and switching stations covering Connecticut, Delaware, D.C., Maryland, Maine, Massachusetts, New Jersey, and New Hampshire
- 2600 Marketplace
- More Telco Leaks - Southwestern Bell computers and dial-ups
- Review: Speach Thing - Review of a Convox add-on voice module, by Cray-Z Phreaker
- 2600 Meetings
- Price: $4.00
- Cover
- Staff
- Payphones Three different types of Norwegian payphones. Note the strange positioning of the numbers on the keypad. The mobile payphone was spotted on a tour bus. For some reason, the first payphone appeared reversed in $2600. Photos by JR of New York.
- Payphones Norway - 2
- Payphones Norway - 3
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 9!
$2600 Magazine - Volume 10, Number 1 (Spring 1993)
- Cellular Magic - Detailed cellular phone system overview, by Bootleg (Mike Beketic)
- Trouble in the White House - Story of White House phone system trouble, by Charlie Zee
- Beige Box Construction - How to build a Beige Box which is a little more complex than others, by The Phoenix (Page 2)
- Descrambling Cable - Cable scrambling and the infamous RadioShack descrambler, by Dr. Clayton Phorester
- Secret Service on Trial - Court report from the Steve Jackson Games trial, by Paco Xander Nathan
- One Angry Judge - One man's Steve Jackson Games trial perspective and how the judge turned against the Secret Service, by Scott Skinner
- Letters - Letters of Merit
- Cordless Questions - Happy Reader (North Dakota)
- Bypassing Restrictions - Major Tom (Ari Braginsky, Champaign, IL)
- More Simplex Stories - A Fly on the Wall, Pez (Lafayette, LA)
- Mysteries - Annom, DG (U.K.), Maelstrom 517
- Hacking Passwords - MR
- That Bell Computer - layden02, The Road Warrior
- Correction - CA
- Info - CL (Holmdel, NJ), JR (Kingsburg, CA), The Tick (Arizona), Avalar, Ken, Misha, Mr. Upsetter
- Red Box Questions - Frustrated in Berkeley
- Data in the Air - The Winged Plecenta (Oregon)
- Questions - JG, TW (Binghamton), MJ (Massachusetts), SB (Massachusetts), Freaked-out Feyodor, AB (New York), JL (Shoreham, New York), Brendog
- Fixing Your Credit - DC Credit
- Surprising Facts - JM
- Spanish Connection - GMV (Motril-Granada, Spain)
- BBS Info - JCB (Concord, North Carolina)
- Evil Payphones - Inhuman (Arlington, VA)
- Access to 2600 - The Apple II Evangelist (Jane Lee, Palos Verdes, CA)
- Rolling Stone Corrections - TELEgodzilla!
- Special Phone - TL (Tempe, AZ)
- Seeking Virus BBSes - YFNH (Your Friendly Neighborhood Hacker)
- Acronyms - Acronyms list a-g, by Echo
- A Study of Hackers - Article about hackers and setting up a honeypot, by Dr. Williams
- 2600 Marketplace
- Getting Your File - Getting your FBI or credit report files, by Bayonet
- Lawsuit Filed Against Secret Service - Legal action taken on behalf of the Washington D.C. $2600 meeting incident.
- British News - Various news information from Britain, by The Dark Knight (John Abercrombie)
- 2600 Meetings
$2600 Magazine - Volume 10, Number 2 (Summer 1993)
- A Guide to the 5ESS - Very detailed guide to the Lucent #5 ESS, by Crisp G.R.A.S.P.
- British Credit Holes - Potential credit card security holes and ways to bypass the "Data Protection Act"
- High School Hacking - School PS/2 computer and Novell system security holes, by The 999
- DTMF Decoder Review - Review of the MoTron TDD-8 DTMF decoder, by Les Inconnu (Sydney, Australia)
- Meeting Advice - How to have a $2600 meeting and how to protect them from disruption, by Parity Check and Romula Velcro
- More Acronyms - Acronyms list h-r, by Echo
- Letters - Printable Letters
- Mall Fallout - The Knight of Ni (New Jersey), Knight Klone (Atlanta, GA)
- Beginner Questions - JC (Canada), Dial Tone (Nevada City, CA)
- Defeating Hardware Locks - The Public, Arclight (Fullerton, CA)
- Telco Fascists - NA (Sacramento, CA), M
- Info - John Wesley Harding (New Jersey), Frion Man (Los Angeles, CA), Static (Washington), Mouse Balls, MW (Ohio), Martian, Clovis
- Freedom of the Press - Mike
- Equal Access? - userid@temple
- Help Needed - Reuben (New York, NY)
- Cable Potential - Master Quickly
- On Beige Boxing - Andrew Sharaf (Brooklyn, NY)
- Unlisted Directories - SDW (Fort Lauderdale, FL)
- Callback Defeat - MJ (California)
- Another Way to Fix Credit - ES (Hollywood, CA)
- Another Simplex Story - The Flea (Lexington, KY)
- Red Box Tones - PB (Deerfield, MA)
- Female Hackers - A-Gal (Florida)
- COCOT Question - DW (Providence, RI)
- New York's 890 Exchange - The Sheperd (Brooklyn, NY)
- The Best ANAC - Non-Stop Phone Phreak
- A Special Request - Matthew (Los Angeles, CA)
- AT&T's Pages - Additional addresses to various AT&T offices and switching stations covering New York, Pennsylvania, Puerto Rico, Rhode Island, Vermont, Virginia, and West Virginia
- Assorted Videos from Commonwealth Films - Software piracy video reviews, by Evil Corley
- 2600 Marketplace
- Toll Fraud Device - Red Box schematic using a Texas Instruments TCM5089 tone encoder IC. (Page 2)
- ANSI Bomb - How to use and install a DOS ANSI bomb, by Mister Galaxy (Patrick Harvey, Atlanta, GA, BBS Documentary)
- News Update - Steve Jackson declared innocent!
- 2600 Meetings
- Price: $4.00
- Cover (Cover Info)
- Staff
- Bombay, India Photo by David Johnson.
- Barcelona, Spain A "green goblin" that takes coins and cards. Photo by Drew Lehman.
- Somewhere in Poland Photo by Brad Dolan.
- Medellin, Colombia Photo by Anonymous
- Download Official Scanned Edition PDF!
- Download The Hacker Digest - Volume 10!
$2600 Magazine - Volume 10, Number 3 (Autumn 1993)
- Hacking at the End of the Universe - Editorial
- HEU Press Release Hack-Tic Presents: 1993 Summer Congress, The Netherlands
- The Wheel Cipher - How to use Jefferson's wheel cipher, by Peter Rabbit
- True Colors - Detailed technical overview of the various phone phreak "color" boxes, by BillSF
- Caller ID Technicalities - Technical information on Caller ID, by Hyperborean Menace
- Caller ID Technical Details by Hyperborean Menace, Phrack, Issue #45
- Congress Takes a Holiday - Evil Corley testifies before Congress
- Hacker Testimony to House Subcommittee Largely Unheard Computer Underground Digest 5.4
- UNIX Job Openings - UNIX hacking/Trojan horse tips, by Orb (Norman Richards) (Page 2)
- Code: job.txt
- Meeting Mania - More November 1992 Washington D.C. $2600 meeting info and Secret Service FOIA documents
- Never Erase the Past - Review of LoD's Hack/Phreak BBS Message Base Project, by Evil Corley
- Hacking Honesty Tests - How honest and integrity test work, by U.R. Source
- Letters - Never Before Printed Letters
- Foreign Charge Phones - Clovis
- Hacker Info - Crewcut
- Reading List - The Theoretician (Dana Beal)
- Telco Ripoffs - Sp00f!
- Seen the Light - A New Reader in Las Vegas
- Hacking An Intercom - The H. (Los Angeles, CA)
- AT&T Irony - PB at UT
- Locked Out - AH (Texas)
- New Long-Distance Services - Bill Bossiere, Telemanagement Systems of America (New Orleans, LA)
- Evil Engineers - Almost Anonymous
- Los Angeles Numbers - Red Wizard, (none given, Santa Ana, CA)
- Governmental Mystery - Baked Alaska
- Numbers - Boredom Prevails (Richmond)
- Cellular Mystery - ED (San Francisco, CA)
- Disney Details - IT (San Diego, CA)
- Are We Neglecting IBM? - KR (Little Rock, Arkansas)
- Lack of Understanding - Captain Poison (Puerto Rico), Tech
- Review Update - Les Inconnu (Sydney, Australia)
- High School Hacking - The Noid (Jason Chilton), Soylent Green, Haghard
- Telco UNIX Trap - A Maryland Hacker
- Bookstore Trouble - trader, J
- Rumor Quelling - Sue
- Problem Solving - LL, Saladin
- Cellular Criticism - Mark Uber
- Password Cracking Software - Review of Access Data Recovery NTPASS Password Cracking Software, by Hakim
- Changing Your Grades on a High School Computer - Hacking a school using Pupil Attendance and Records System (PARS), by Drewl/Salivate (A. Shafer)
- Overview of DSS1 - Review of ISDN Digital Subscriber Signaling System 1, by Cruise-CTRL
- Book Review: Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals - Book review of Paul Mungo's Approaching Zero, by Stephen J. Resz
- Protecting Your Virus from Evil Detectors - Short piece of assembly code to add to your viral code to "encrypt" the virus until run time, by Dr. Bloodmoney
- 2600 Marketplace
- More Cellular Fun - Info on cell cloning, by Judas Gerard
- The Last of the Acronym List - Acronyms list s-x (no y or z), by Echo
- The Hackers Acronym Chart by Mercenary/IIRG
- 2600 Meetings
$2600 Magazine - Volume 10, Number 4 (Winter 1993-1994)
- Hackers in Jail, Part Two - Editorial
- Cellular Phone Biopsy - Detailed cellular phone memory operations, by Kingpin (Joe Grand)
- Elementary Switching - Basics of phone switching and signaling systems, by 910
- Know Your Switch - Tricks to listen for to determine the type of telco switch (ESS, DMS) you are on or calling, by Rebel
- Hacking Smartphone - Info on the RBOC's Smartphone, by Tech Rat
- High School Mac Hack - Hacking Appleshare and using ResEdit at schools, by The Bard
- Hacking Computer Shows - Get into computer shows for free, by Walter S. Jaffee (Page 2)
- NYNEX Voice Mail - Voice mail phone numbers for various NYNEX central offices
- The Magical Tone Box - Overview of using an ISD1000A digital voice recorder IC to create a Red Box or Blue Box, by FyberLyte
- ISD1000A Datasheet
- QUARTER.VOC
- QUARTER.WAV
- BlueBEEP v0.10 (Manual)
- Simple Simplex Repeater Also uses the ISD1000A.
- The FOXBOX A voice ID transmitter hunt controller.
- Letters - Letters to Remember
- Fun Telco Numbers - Beetle Bailey (Arcadia, CA), MacGyver (Clearwater, FL), Uncle Waldo
- Hacking Traffic Lights - Lone Wolf (Atlanta, GA)
- Past Hacker Prime? - Darkhold Page (Pittsburgh, PA)
- Info and Questions - Whistler, Will Chung (San Luis Obispo, CA), Pipo Communications (Pollack Pines, CA)
- Potential Discovery - Maldoror (Florida)
- Security Concerns - Radiation X (California), Bleed The Freak
- Starting a Meeting - Johnny "The Quarter" Burpo (New York)
- Questions - M (Great Neck, New York), DY (Weston Ontario), Owen (Halifax, U.K.)
- Why Hack Cable? - A-$tring (Lenexa, Kansas)
- How to Learn About Your CO - Hook (Belmont, MA)
- Observations - The Lung (California)
- New Technology - Julian (Cleveland, OH)
- Modem Back Door - Antoch
- Foreign Payphone Flash - LN
- How to Really Abuse a Payphone - Peter (Manchaca, TX)
- Technology Moves Backwards - Martin
- Corrections - Jeff, King of Birds (Chapel Hill, CA)
- Red Box Concerns - Anoon, Nexus, Concerned
- How Easy It Is - CopKiller (Bethesda, MD), Erreth Akbe
- Bypassing Restrictions - Lost and regulated in NB, Canada
- A Way Around Caller ID? - Levendis (Deron Staffen)
- School Phone System - lexis
- 2600 Wins Over Class - BG (Georgetown, TX)
- The Honesty Test - The Vampire Gabrielle
- Passageways to the Internet - College Internet dial-ups
- More Meeting Advice - $2600 meeting advice and how to fight back if the government tries to prevent you from attending one, by The Judicator of D.C.
- Book Review: Virtual Reality - Review of Howard Rheingold's Virtual Reality, by W. Ritchie Benedict
- Digital Locks - List of the 1287 possible combinations for Digital-brand locks
- 2600 Marketplace
- News Roundup
- Foulups and Blunders
- Touch-Tone Registration
- Electronic Mayhem
- The Latest From The U.K.
- Collect Your Wits
- Fantasy World
- Start The Insanity!
- Insuring Profits
- New Numbers
- Journalistic Integrity
- The Joy of New Technology
- Caller ID News
- Corporate Ideas
- Tidbits
- 2600 Meetings
- Price: $4.00
- Cover (Cover Info)
- Staff
- Africa Payphones
- Voi, Kenya Photo by Friend of Daniel Jones.
- Kampala, Uganda A row of international phones in Kampala, Uganda. Photo by Friend of Daniel Jones.
- Zagora, Southern Morocco Photo by Drew Lehman.
- India Payphones
- Somewhere in India Complete with goat. Photos by Synthetic Man.
- Somewhere in India
- Download Official Scanned Edition PDF!
- Download The Hacker Digest - Volume 10!
$2600 Magazine - Volume 11, Number 1 (Spring 1994)
- Crime Waves - Editorial
- Build a DTMF Decoder - Hardware DTMF decoder using the Teltone 8870 DTMF receiver and code for recording the data via a Commodore 64/Vic-20, by Xam Killroy
- NYNEX Cards - Info on NYNEX coin-operated telephone change cards, by Kevin Daniel
- BT Fonecards by NeonDreamer
- Hacking Health - How to hack Stairmaster 4000 aerobic equipment, by MuscleHead
- Software Piracy - Another viewpoint on software piracy, by Roberto Verzola (Page 2)
- Coping With Cable Denial - Info on various cable TV scrambling systems, by Cap'n Dave
- Cellular Telephone Experimenters Kit Review - Review of Mark Lottor's CTEK for the Oki 900 cell phone, by Mr. Upsetter (Page 2)
- FOIA Facts and Fiction - How to use the Freedom of Information Act (FOIA), by GateDancer and Shrike
- Letters - Letterbox
- Comments - Big Wind
- Hacker Understanding - Scudder
- Novell Nosing - Digital Enigma (Cottonwood, CA)
- NYNEX Negativity - Happy in 212 Land
- Reader Abuse - Guy At The Desk (Ty Osborn, The Office BBS)
- Questions - BO (Cortlandt Manor, NY), Leroy Chism, Randy Ramone
- The Dark Side - Pissed-Off In Houston
- The Far Side - One very displeased former subscriber
- Payphone Fun - Neophyte1138 (Ohio), Tim (San Diego, CA), TcP, Death Adder
- Quarter Variations - Kingpin
- Prison Phone Project - Wag
- Government Data - AO (Arizona)
- Cellular Chatter - Tech-No Wiz (Columbus, OH)
- More Corporate Outrage - James F. Walker (Loveland, CO)
- Individual Outrage - Richard Finch (Glendale, AZ, U.S. National Crime BBS, 602-846-4470)
- Exiled Hacker - Ares (Hacker's Hospice)
- Pointers - Trout (William S. Gillingham)
- Fighting Back - Bellsouth Baboon (Atlanta, GA, Reply)
- Governmental Suggestions - Randy815 (Dallas, TX)
- Phiber Parallel - Racer X
- Correction - Aleph One (Elias Levy)
- Phone Company Charges - David
- Blue Boxing Revisited - CCITT System #5 - Blue Boxing under CCITT #5 and the basics of that type of signaling, by Kevin Crow
- A Gift From Hallmark - Building a Red Box using the internal electronics of a Hallmark talking card, by Bernie S.
- 10XXX - Info on 10XXX Primary Independent Carrier (PIC) codes, by The Prophet (Babu Mengelepouti, Seattle, Washington)
- Not Much Good News Here - Laws on "phone hackers" and seizing their equipment, Clipper Chip info
- 2600 Marketplace
- Michigan Access - MSUnet and Michnet dial-up access numbers, by Tonto of 517
- Merit/MichNet Hacking Issue Vaginal and Anal Secretions Newsletter, Issue #0015
- New Dial-Up Service Numbers for Michigan State University
- Book Reviews: Secrets of a Superhacker, UNIX Security - Reviews of The Knightmare's (Dennis Fiery) book Secrets of a Superhacker and Derek Arnold's UNIX Security: A Practical Tutorial, by Michael E. Marotta and Simson L. Garfinkel
- British Trojan - Story of installing a login-grabbing Trojan horse in college environment, by Veghead
- The Chrome Box - Box to active the 3M Opticom traffic control systems, by Remote Control
- 2600 Meetings
- Price: $4.00
- Distribution: 13,000
- Issue's Cash Cow: Harassing old ladies is hacking, or it isn't... I can't figure it out.
- Cover
- Staff
- Payphones Argentina has two phone companies: Telefonica in the south and Telecom in the north. Buenos Aires is divided between the two. Both companies use the same tokens but their cards aren't compatible. See if you can guess which phones belong to which companies. See if you can guess which one we're not sure about. Photos by Edward Stoever.
- Payphones Argentina - 2
- Payphones Argentina - 3
- Payphones Argentina - 4
- Payphones Argentina - 5
- Download!
- Download The Hacker Digest - Volume 11!
$2600 Magazine - Volume 11, Number 2 (Summer 1994)
- Hackers on Planet Earth - Editorial about the first HOPE conference
- Life Under GTD5 - Detailed info on a GTD5 under GTE, also has info on the Proctor Test Set, by Zaphraud (Jason Kennerly) (Page 2, Page 3, Page 4, Page 5, Page 6)
- The Joys of Voice Mail - Info on hacking voice mail systems and password guessing, by snes
- Foiling the Finger Command / Playing With Your Fingers - Overview of some of potentially sensitive information Finger can reveal and how to "back finger" a person, by Packet Rat (Tim Russo) and Shidoshi
- Code: backfinger.sh
- USENET Posting by Packet Rat
- Cordless Fun - How to listen to 49 MHz analog cordless phones, by Noam Chomski (New York Metropolitan Phreak Hack Organization [NYMPHO]) (Similar Article)
- Admins Without a Clue - Collection of quotes from various system admins, by Kevin Crow
- Hacking Prodigy - How to change your Prodigy ID, by DeVillage Fool
- Hacking the Small Stuff - Info on hacking ATMs, calculators, vending machines, by Leonardo Branson
- Letters - Letters to Read By
- A Busy Connection - Reuben (New York, NY)
- Touch-Tone Tall Tales - Power Spike
- Improving Grades - Brian, Black Night (Ohio)
- Regression - Fred
- Car Tracking - Tommy B.
- How to be Honest - V.A. Szell (Seattle, Washington)
- High School Notes - VicProphit, Number 6 (Bellevue, Washington), Deus/The Black Night/Silver Dragon/Pixel Threat/Zippy the WaterGod/The Unnamed One
- Fighting Traffic - flip (Ohio)
- Become Your Own Admin - Toaster (Narragansett, Rhode Island), Primitive Morales (Processed World)
- Passing Numbers - Ethan (Stanford), DD (Somerset, MA), Diashi (New York)
- Red Box Rumors - The Borg (Cleveland, OH)
- Those Three Tones - Empress
- Cellular Mystery - JV (Reston, VA)
- Thoughts On Congress - Gregg Giles (Oregon), John
- Defending the 64 - Commodore Hacker
- Tyranny in Church - The Roadkill
- Availability - Hermit the Herman (David Johnson), sciri
- Secrecy - Somewhere in Kansas
- Seen the Light - An isolated feeling guy in Portland, Oregon
- IBM Hacking - Powercell (Hartford, CT)
- Long Arm of the Secret Service - Juan Valdez (Cambridge, MA)
- Call Forwarding Tricks - CM (Attlehoro, MA), LN (Minneapolis, MN)
- Prodigy Savings - George
- Hungry For Knowledge - Emory T. Suchau
- Fighting the Slime - RG (Los Angeles, CA)
- Secrets of a Super Hacker - JB (Habay-La-Nevue, Belgium)
- Thoughts - PB (Wayland, MA)
- DTMF Decoder - DTMF decoder hardware/software for a Commie 64 or Vic 20, by Paul Bergsman (Merion Station, PA, N3PSO)
- Monitoring Keystrokes - Story of recording keystrokes using DEPL under DOS, by Dr. Delam
- 2600 Marketplace
- Facts - News bits
- Detecting Corporate Leaks - How businesses detect leaks and restrict data, by Parity Check
- 2600 Meetings
- Price: $4.00
- Issue's Cash Cow: HOPE
- Cover
- Staff
- Payphones A set of German phone booths. Note the incredible size of the handicapped booth. Photo by Frion Man.
- Payphones Aruba. Another card-only payphone. Photo by YETI.
- Payphones Ecuador. This phone on the Galapagos Islands is the reddest we've ever seen. A true red box. Photo by BLUBXR.
- Payphones Mexico. Public card reader payphone in Tijuana. Photo by Daniel Hank.
- Download!
- Download The Hacker Digest - Volume 11!
$2600 Magazine - Volume 11, Number 3 (Autumn 1994)
- Opening Doors - Editorial
- Monitoring U.S. Mail - USPS barcode information, by Paranoia
- Irish Telephones - The Irish telephone system Telecom Eireann, by Wonko the Inane
- The Ghost Board - Hidden bulletin board systems, by Autolycus
- Hacking Netcash - Hacking online money, by Palindrome
- Welcome to MEL - Southwestern Bell Mechanized Employee Locator (MEL), by EighT BaLL
- Generating an ESN - How ESNs are generated, by Maldoror
- The Ten Dollar Red Box - Instructions for turning a "talking" Hallmark card into a working Red Box, by Toxic Avenger (Jeff Burchell)
- How to Listen In - Very detailed overview of common audio surveillance hardware and techniques, by Q (Alan Hoffman)
- Letters - Vocals
- Worrisome Questions - Susan
- Defeating Call Return - Emperor (San Francisco, CA)
- Info - Quinton McHale (Seneca, IL), WW (Austin, TX), Norm D'Plume
- More Questions - (none given)
- Privacy Violation - Anonymous
- Meetings - Frank (Kansas City, MO)
- Reader Reunion - Mike (Chicago, IL)
- A Strange Number - John Q Public, Zappy (Atlanta, GA), Mr. Asshole (San Francisco, CA)
- Inside Info - King of Spam
- Strange Situation - Marcus
- Replies to Readers - Da Phigzter (PHiGAN/6o2), .gKo. (DTMF: AB67)
- Cordless Clarification - Gladshiem
- Mac Hacks - Xausii, Space Rogue (617) (Christopher Thompson, Lowell, MA)
- Sick ATMs - (none given, London)
- Lowdown on Lojack - CARTWHEEL
- Still More Questions - Clear Plastic Raincoat from Seattle
- On Piracy - SM (Morgan Hills, CA)
- On Honesty - A.R. Weeks (New York, NY)
- Northern Hacking - DrP (Medicine Hat, Alberta)
- Satellite Mystery - Alcatraz (Pt. Pleasant Beach, NJ)
- Red Light Cameras - An Unprintable Symbol (California)
- Security Concerns - lexis
- Security Lapses - Colostomy Bagboy (Paskell "Geno" Paris, Washington)
- Contradictions - Problem Child (Las Vegas, NV)
- Hacker Sites? - Roger Harrison (Long Island, NY)
- Help Needed - Lady Penelope (London, England)
- Living on the Front Line - Compromised Internet hosts (Page 2)
- News Items
- Breaking Windows - Bypass Windows screen savers, by The Camelback Juggler
- 2600 Marketplace
- Internet World Guide - List of the 2-letter Internet domains into countries
- Software Review - The Supervisor Series for VMS, by Floyd Lloyd
- 2600 Meetings
- Price: $4.00
- Distribution: 22,500
- Issue's Cash Cow: HOPE
- Cover
- Staff
- Payphones A "non-modern" model in Yangon, Myanmar - formerly Rangoon, Burma. Photo by Julie Alperin.
- Payphones Thailand. In a town called Phuket. Really. Photo by Chas Dye.
- Payphones Italy. This phone in Rome does everything. Photo by Davide D'Angelantonio.
- Payphones An "old model" New Zealand coin telephone. Photo by Kingpin.
- Download!
- Download The Hacker Digest - Volume 11!
$2600 Magazine - Volume 11, Number 4 (Winter 1994-1995)
- Inspiration - Editorial
- Bypassing Protec - How to defeat the Protec hard drive protection program, includes a Turbo Pascal boot sector copying program, by Michael Wilson
- More Key Capturing - Tips on capturing keystrokes and passwords for various operating systems, by Code-Cafe
- Digital Telephony Passes - Info and sensationalism on the Digital Telephony Bill
- The Risks of War Dialing - Legal problems you might run into war dialing, by Dr. Delam (Page 2)
- Cellular Hardware & Electronics - Detailed information on cellular phone PROMs/EPROMs and the data they hold, by Kingpin
- Australian Update - Info on Australia's phone and cellular system, by Les Inconnu
- Letters - Right Letters
- Missing The Point - Deeply Shrouded & Quiet
- Handy Tip - DMG (Cherry Hill, NJ)
- Problem - Harlequin
- HOPE Memories - Dave (Hofstra)
- Scantron Tricks - Jonathan
- Schematic Problems - The Camelback Juggler
- Fun With Sound - AK47/[GZ] (Arkansas)
- A Little History - Fart Wino
- Ottawa Fun Phone Facts - The Bishop (Ottawa, Canada)
- Wanted - Geert (Rochester, New York), Spartacus
- Info - FP (Long Island, New York), Atticus, BW, Paul (New Jersey), Morning Wood
- Mystery Number - Bruce
- Questions - Anonymous
- MetroCard Update - Red Balaclava (Jeopardy Jim)
- Highway Strangeness - Son of Holocaust Survivor Redhead
- More Hacker Persecution - Mr. Hallmark (Rochester, New York), Majic (Maryland)
- 800-433-3210 Update - Presto
- Payphone Tribulation - Weasel
- More Window Tricks - Brother Orbis
- More Mac Tricks - Mr. Blackhood
- Followup - John Q Public
- True Hacker Spirit - JL (Highland, CA)
- More On Honesty - U.R. Source
- Help Needed - Dr. X
- Hacker Graffiti - JV (New York)
- Take Responsibility - Brad Peebles (North Palm Beach, FL)
- Phone Boxes - Cat in the Hat (Warner Robins, GA)
- Inexcusable - Particle Man (Arlington, VA)
- International Tale of Woe - Fabian (Long Island, NY)
- Cable Affirmation - James S. Allen (Office of Cable Theft)
- VT Hacking - DEC VT100/200/220-series computer (dumb) terminal information and login spoofer/password grabber, by Mr. Bungle
- hook.c For DEC VMS only.
- Janitor Privileges - Security problems hiring outside janitors, by Voyager (Will Spencer)
- Net Surfing Techniques - Internet surfing tools and tricks, by Sonic Life
- News Update
- Things that Happen - 2600.com is started
- 2600 Marketplace
- Reviews: Network Security, Information Warfare, and Unauthorized Access - Review of Steven Shaffer's book Network Security, and Winn Schwartau's book Information Warfare, and the video Unauthorized Access by Annaliza Savage
- 2600 Meetings
- Price: $4.00
- Issue's Cash Cow: Harassing innocent people
- Cover
- Staff
- Payphones Tanzania. From the streets of Zanzibar. Photo by Hamilton Davis.
- Payphones Sofia, Bulgaria. Note the vulnerable cords. Photo by T. Mele.
- Payphones Sofia, Bulgaria. Space age. Photo by T. Mele.
- Payphones Romania. Still operating in Bucharest. Photo by T. Mele.
- Download!
- Download The Hacker Digest - Volume 11!
$2600 Magazine - Volume 12, Number 1 (Spring 1995)
- The World vs. Kevin Mitnick - Editorial
- The Gold Card - Holland PTT-Telecom prepaid phone cards and how to make your own reader/writer, by Hack-Tic
- Code: phone.c
- The Gold Card Dutch version, from Hack-Tic, Issue 24/25
- Programming GOLD MM2 Wafer Cards Cardem v1.000.414
- Facts on ATM Camera Security - Overview of ATM surveillance cameras and debunking some of the myths, by Kitsune
- Cellular Interception Techniques - Different methods for the interception of analog cellular phones, by Thomas Icom
- Letters - The Better Letters
- More Bookstore Fun - Seventh Son
- Piracy Proposal - Daveed Shachar (Israel)
- Eastern Europe Scene - The MacMan (Carl B. Constantine, Budapest)
- Locked Up - ATM Bandit, Phafnir, The Cryptic Prognosticator
- Bits of Info - Zeek (Major) (Colorado), Skimmer (Cambridge, MA)
- Digital Correction - Spook
- Intercept Tones - Scott (Buena Park, CA)
- Monitoring Mail - Drew
- Red Box Problem - Pestilence
- ATM Fun - Kilobyter (Flushing, New York)
- True Hackers - Edison Carter (M.D. Spangler)
- Mystery Computer - William Tell
- Source of Income - CMS (Santa Rosa, CA)
- Strange Numbers - Jason (Boise, ID)
- New Technology - Bitslicer
- Conscientious Trashers - "Hackers for a Cleaner Planet"
- Satellite Theory - Daughter of a Satellite Engineer
- A Fun Project - Quasinym (Peter Garver?)
- Mystery Number - Tony Sharp
- TV Garbage - Puppet Master
- Hacking Airphones - Empress (Georgia) (Similar Info)
- Mac Attack - Rev. Mr. DNA
- Computer Numbers - The Phantasm (Jim Brinkerhoff)
- Fun With Cordless Phones - Radio Man, Tom
- Hacking in Brazil - State of computer hacking in Brazil and notes about the local BBS scene, by Derneval (Ribeiro Rodrigues)
- Hacking Tandy/Casio Pocket Computer - Using the Tandy PC-6, by Sam Nitzberg (Eatontown, NJ)
- Hacking the Tandy Zoomer/Casio Z-7000 ZPDA - Using the Tandy ZPDA, by Enigma
- 500 Exchange Guide - List of NXXs in 1-500 land
- Pager Major - Shoulder-surfing a pager terminal password, by Danny Burstein
- 2600 Marketplace
- West Side Hacker: Masters of Deception - Book review of Joshua Quittner & Michelle Slatalla's Masters of Deception, by Scott Skinner
- Assorted News
- Leaking Cables - British cable company problems and leaks
- 2600 Meetings
- Price: $4.00
- Issue's Cash Cow: Kevin Mitnick
- Cover
- Staff
- Payphones Hong Kong. A Cardphone and a Creditphone. The Creditphone takes credit cards, the Cardphone takes phone cards. They both take coins as well. Photos by Michael Pusateri.
- Payphones Hong Kong Creditphone.
- Payphones Costa Rica. In the frontier town of Puerto Jimenez, Peninsula de Osa. Photo by Martin Raminer.
- Payphones Finland. Reminiscent of coin phones throughout Scandinavia. Card phones in Scandinavia are usually orange, coin phones are blue/silver. Photo by Flippy the Squid.
- Download!
- Download The Hacker Digest - Volume 12!
$2600 Magazine - Volume 12, Number 2 (Summer 1995)
- The Bernie S. Saga - Editorial
- New Anti-Viral Technologies - How to protect your virus from anti-virus software, by Adam Young
- The Gender Snooper - Cool little project involving a wireless serial port data transmitter to intercept low-speed RS-232 data going to things like modems, by Commander Crash
- ATM Tricks - Diebold ATM tricks, by Helen Gone
- Citibank ATM Fun - Playing with the ATMs at Citibank, by Ice of Spides
- Day of the Hacker - How a Wildcat BBS was hacked with a trick PKUNZIP.BAT and infected COMMAND.COM, by Mr. Galaxy
- Diverters - How call diverters (forwarding) work, by Ray Nonte
- Hacking the AS/400 - How the AS/400 works, by Mantis King
- Letters - "Letters are the cornerstone of any civilized society."
- Privacy Concern - Anonymous in MD
- Hacker Techniques - Pumpkin Smasher (Natchitoches, LA), Mickey and Mallory, Wicker Man (DeKalb, IL), Streaker
- War Dialing - Clint Sare (Texas), Lineman
- Numbers - TAG (Sheridan, Oregon), Mike, Major Zeek
- Data - Airwolf (Twin Cities, Minnesota)
- Questions - GF
- Pirate Alert - Red 5! and Hellbender
- Answers - Name and Address withheld, Gump (Sacramento, CA)
- Bookstore Stories - The Black Carpet (Bay Area, CA), Pestilence/517
- Caller ID Question - Chester-Buzz
- Lack of Security - Another Thought Criminal
- NYNEX Outrage - Scammed in NY
- Advice - Fortunate Sun, Lincoln
- On ATM's - Kamakize (Virginia)
- Spin Control - The Black Panther
- Handy Tip - BillSF
- Radio Reviews - Review of some frequency counter and scanner gear, including the Optoelectronics' Scout, R10A, APS104, Universal M-400 decoder, and AOR AR8000 receiver, by Blue Whale
- War Dialing - Interesting wardialing stories from a small town in Canada and an autodialer script for Qmodem, by VOM (Canada)
- Code: qmodem autodialer
- Coping with Cable Denial 2 - Jerrold 450 cable converter hack, by Prowler
- 2600 Marketplace
- News Items - Mitnick trial starts
- NPA List - List of area codes (1995), including all the weird ones
- 2600 Meetings
- Price: $4.00
- Issue's Cash Cow: Bernie S.
- Cover
- Staff
- Download!
- Download The Hacker Digest - Volume 12!
$2600 Magazine - Volume 12, Number 3 (Autumn 1995)
- No More Secrets - Editorial
- Stealth Trojans - Source code for a stealth DOS Trojan horse and "stealth" disk I/O access, by Commander Crash
- Military Madness - The true story of my experiences as a paid hacker for the military
- T-Shirt Follies - Washington D.C. $2600 meeting problems and harassment wearing a $2600 T-shirts, by The Roach
- Macintosh Key Capturing - Source code for a Mac keystroke recorder, by Swarthy
- Code: MacKeyCapture.c
- Just Say No - Build a "NO-Box" which is like an improved "gold box" (switchable second line), by Hudson
- COCOT Experimenter's Resource Guide - Very detailed guide to various technical details about COCOT phones, by Dastar Corn
- Letters - Language is a Virus From Outer Space
- Harassment - African Herbsman (Lexington, Kentucky), Roger Blake, Little Alex (Michigan), sam (Berkeley), Fast Lover (Houston, TX)
- Information - Ether, Dali Lamer, Curious and Anonymous (Los Angeles, CA), pbixby, Matthew Kassin, FkPigMan (Pittsburgh, PA)
- Telco Brains - Neo Zeed of 201, TTJ
- Article Feedback - (none given), Rokket Man, LACR01X, Bloodshot (Mt. Vernon, NY)
- Numbers and Addresses - McPhrie, Veg
- Censorship - Disgusted
- Discovery - Katfish
- Wanted - Nameless
- Mac Infiltration - Maud'Dib (Silicon Pirates)
- On Diverters - MASTER JSW, Anakin
- ATM Fun - The Final Chasm, ATM Dude
- Advice - Law Hack (Los Angeles, CA)
- Causing Confusion - tfg
- Fear of Subscribing - John Doe
- Yet More Bookstore Fun - John Lowe (Memphis, TN), Ford
- German Payphones - THX-1138 (Raleigh, NC)
- HOPE Repercussions - Mr. Pink (San Marcus, CA)
- Mutation Engine Demystified - Understanding virus mutation code, by Tio Mate Jones
- ISDN Overview - Technical overview of ISDN services, by Roger Harrison
- DTMF Decoder Review - Review of a MoTron TM-16A+ DTMF decoder, by Blue Whale
- Hacking a Police Interrogation - Tips on surviving a police interrogation, by Darlo Okasi (Page 2)
- 2600 Marketplace
- Breaking Windows 2 - Defeating Windows screen saver passwords, by Bisect Skull Gas
- Movie Reviews: The Net and Hackers - Movie reviews of The Net and Hackers, by Evil Corley and Thee Joker (Jason) (Hackers Transcript)
- 2600 Meetings
- Price: $4.00
- Issue's Cash Cow: Bernie S.
- Cover
- Staff
- Payphones Japan. This phone resides in Yokohama and is referred to as a "green phone". They use phone cards in 1000, 5000, or 10,000 yen denominations. Photo by Bill Bond.
- Payphones A typical French cardphone, found in Paris. Photo by Anonymous.
- Payphones This payphone was found in northern Norway (64.5 degrees north) and takes only coins. Photo by John Lewandowski
- Payphones An Israeli cardphone that is a big improvement over the old token system. Photo by Unka Nisi.
- Download!
- Download The Hacker Digest - Volume 12!
$2600 Magazine - Volume 12, Number 4 (Winter 1995-1996)
- Speech Control - Editorial
- What Happens on the AT&T Side - AT&T long-distance operator info, by Crash 24601
- AOL Censored Wordlist - AOL internal memo for rules on the use of certain words.
- News Updates
- A Spoofing Odyssey - How jsz, Shade, Len Rose?, and others on #hack used Robert T. Morris' IP spoofing vulnerability to attack Shimomura's system for Kevin Mitnick, by Gregory Gilliss
- Plagiarized from a USENET posting by Tsutomu Shimomura
- A Weakness in the 4.2BSD UNIX TCP/IP Software Robert Morris, Jr.'s original Bell Labs paper.
- Infiltrating Disney - Very inaccurate Disney World secrets, by Dr. Delam
- Sniffing Ethernet - Overview of DOS utilities for monitoring Ethernet traffic, by Veg
- Bypassing DOS/Windows Security - How to bypass the security on DOS/Windows machines, by Case
- Understanding VeriFone Machines - VeriFone machine info, by Dr. No
- Plagiarized from an Informatik article by Emery W. Lapinski
- Pakistani Phones - Info on the Pakistani phone system, by The Shepherd
- Letters - Thoughts of the Reader
- Fraid Not - madh, Avi Drissman (Farmington Hills, MI)
- Questions - Psycho, Proteus (Babylon, NY)
- Clarification - Lucas, Fastchrlie
- The Master Plan - The Silicon Phoenix/810
- Words of Thanks - Lady Penelope (London, England), Checkerboard Phox (Kevin Phillips, Memphis, TN), SLUMBRBAK of the forest, Joel (Orange County, CA)
- Mac Trix - The Invincible in MD, Equant (Tucson, AZ)
- Privacy Regained - DayEight, Jerry
- Of ANACs and ANIs - Kevin (Memphis, TN), Percival
- Viral Stuff - Problematic 29
- Brazilian Hackers - kazi (Brazil)
- The Truth About Mitnick - Daniel
- On Bernie S. - King B, Data Recall
- Possible Warning - J.R.
- AOL Hell - Mark
- Destruction and Theft - TD, LIG (Life is Good)
- Hacker Perceptions - se7en (Christian Valor, San Francisco, CA)
- Answers - Bell Buddah
- Speech Confinement - angchay twenty-fidy
- Bookstore Stories - Harmony, MRB (Boca Raton, FL)
- Standing Up - Feyd, Tunnel Vision
- Pet Peeves - Stickman, Hacked, Cracked, and Phracked
- Shocking News - GoatBoy
- Back Pack Hack - The Cat's Meow
- Problem Stealing Money - Riddler
- Contacts Wanted - Joey Jay Weinman (Texarkana, TX)
- Info - David Smith (Las Vegas, NV), CMS (Santa Rosa, CA)
- Opening Doors - The Laughing Cow
- .COM File Infecter - Source code to a .COM file infecter, by Impending Dhoom
- Understanding the Hacker - Editorial, by Bootleg
- Scanning Space - Military satellite, NASA, and Air Force radio frequencies, by The Majik Man
- AOL Syndrome - Using AOL's FTP space to host files via HTTP, by Kris
- 2600 Marketplace
- Hacking NetWare - Hacking Novell NetWare, by Trap
- Cashing in on Mitnick: The Fugitive Game - Oh, the irony!!! Book reviews of Jonathan Littman's The Fugitive Game and Tsutomu Shimomura's Takedown, by Scott Skinner
- 2600 Meetings
$2600 Magazine - Volume 13, Number 1 (Spring 1996)
- Caught in the Web - Editorial
- Tap Alert - Simple phone tap detector, by No Comment and Crash Test Idiot (Text)
- A Page of Revenge - Pager demon dialer ideas for Quick Basic, by Big Lou
- Unshredding the Evidence - How to unshred paper evidence, by Datum Fluvius
- Confessions of a Beige Boxer - Funny story, by RedBoxChiliPepper (Brad Carter, MySpace)
- Macs at Ease - Bypassing AtEase on school Macintosh computers, by Loogie
- Sharp Cash Trix - Sharp ER-3100 cash register information and how to open the cash drawer, by Dennis Fiery (Knightmare)
- Hacking Doors - Apartment telephone security system holes and intercepting their DTMF codes, by Clark W. Griswald
- Hacking Caller ID Boxes - Extend the memory on caller ID boxes, by Dave Mathews (Dallas, TX)
- The Alaskan Phone System - Info on the phone system in Alaska with a hacker point-of-view, by Ice
- Avoiding Suspicion - How to avoid looking and acting suspicious, by -Me
- Letters - Where the Letters Are
- Opening More Doors - RB (San Francisco, CA)
- Eastern Europeans - Hrvoje Vukovic (Croatia)
- ANAC Change - woodrat
- Points on Interrogation - The Prophet, System Default, Robin Scurr (White Lake, MI)
- Bernie S. Fallout - Name Withheld, Mike W., TcP (Denver, CO), Mario (Canada), Adam Schoenfeld
- Military Miscellany - Cockroach, Disappointed in our Government
- Spanish ANI - The Mad Tapper (Ringwood, IL)
- Cellular Prisoner - Jeremy G. Cushing (Alphabits, Arrest Info)
- Highway Weirdness - Jus Jizzen (Phoenix, AZ), King Otar
- Meeting Questions - Joshua, Skywarp (London, U.K.), Frank M.
- Info - anonymous, PhreakHolio (Colorado Springs, CO), The Mighty Pantharen (N. Vancouver, Canada)
- Corrections - b00da (Philadelphia, PA)
- Reality? - Meth
- RadioShack Fun - Biohazard
- Unfriendly Payphones - Michael H.
- Questions - NeVeR \FluX/, M
- The Winter Cover - Christian (Germany), Dereks, fuLcrum (Miami, FL)
- Fun On Planes - Particle Man (203)
- Repression and Hackers - Brian Martin (Australia)
- AOL Hell - YUKYUK
- Credentials on Credentials - Gebby
- Crippled 911 - Ben Stock
- Disney Critique - Michele Warner, The Imagineer
- An Edward A. Smith Theory - some guy
- Cincinnati Bell Nightmare - Mr iNSaNiTY
- Understanding the Hacker - Sevangels
- 56K ISDN Link - ThePawn (New Jersey)
- Netware Nonsense - Gandolf
- Words of Praise - The Cyber Hitchhiker
- Words of Shame - E.W.L., Dr. No
- Motorola Cellular Guide - Motorola cellular phone information, by Mike Larsen
- 2600 Marketplace - CAP'N CRUNCH WHISTLES. Brand new, only a few left
- Hackers '95 Review - Review of Phon-E and R.F. Burns' film Hackers '95, by Blue Whale
- 2600 Meetings
- Price: $4.50
- Issue's Cash Cow: Bernie S.
- Cover
- Staff
- Download Unofficial Scanned PDF!
- Download The Hacker Digest - Volume 13!
$2600 Magazine - Volume 13, Number 2 (Summer 1996)
- Guided Perceptions - Editorial
- Flood Warning - SYN flood code for IP spoofing or denial-of-service attacks, by Jason Fairlane
- Code: flood.c
- Scanning Australia - Toll-free carrier scan (0014-800-12[456]-XXXX) for Australia, by Comhack International
- Imaginary Friends - Getting phone service with fake ID by supplying the credit bureaus (TRW, Equifax, etc.) with false information, by Frog
- A Tale of Two Cities - Overview of the telephone system in Sarajevo, by Dr. Kolos
- How to Create Encryption - Overview of creating your own software (DOS) encryption tips, by TheCrow (Jack Mott, Greenwich, Connecticut)
- Secret Codes - PowerBASIC script for communicating in secret, by Mister Galaxy
- Code: codeit.bas
- CODEIT Version 3.0
- Consumer Hazards - Online shopping security and how to protect your credit card info, by Mr. Natural
- RCONSOLE Hacking - How to extract Novell RCONSOLE passwords from packet sniffer logs to gain access to NetWare's server console, by Simple Nomad (Mark Loveless, Facebook, LinkedIn)
- Appendix Section - Source Code and Other Documentation Source and notes for SPOOFKEY, NOCRYPT, SETPWD, and BURGLAR.
- rcon.c Novell RCONSOLE password encryption decode, by W.J. Hengeveld (itsme)
- "Decryption" of RCONSOLE Password
- The Unofficial NetWare Hack FAQ
- The Hack FAQ: NetWare Misc. - Attack Info
- Hacking NetWare
- Novell NetWare & Ethernet Address Spoofing with ODI
- Letters - The Search for Extraterrestrial Letters
- Clueless Mac Users - Z (Sacramento, CA)
- Clueless IBM People - Starz N Strifez
- Clueless Idiots - EliTe ProTocOl
- Finding 2600 - DavesDead (Hoboken, NJ)
- And very very Grateful - s6killer (Corpus Christi, TX), I Gate
- Inspirational Speech - Bottomless
- Secret Service Reactions - Active Matrix, Captain Hook (Sacramento, CA)
- Fun Numbers - Cache $$$ (Boston, MA) Scott, Vitamin X (Bethlehem, NH), TRON (Santa Rosa, CA)
- Hiding Files - Greg Guerin (Mesa, AZ), Flatliner
- Phone Card Hacking - Uri (Jerusalem, Israel)
- Stupid Questions - ben
- Pirate Radio - CrIcKeT
- Privacy Invasion - hell-boy, Raymond
- Hidden TV Worlds - Airwolf (Minnesota)
- The Truth Revealed - The Propagandist, I.M. Free (Milwaukee, WI)
- Eyes in the Sky - Tek
- AOL Purgatory - RazorBack
- Warnings - Max, F (Denver, CO)
- PSI Horrors - Space Shot
- Info Wanted - Raul (Houston, TX)
- The Marketplace - The Omega Man (Austin, TX)
- People Tagging - Druid, D.Q. (Stamford, CT)
- Danger on the Highway - Waxan Dwane (New Jersey)
- Prisoners - Jon R. Spatz (Pottsville, PA), Zero
- 2600 Marketplace
- FlightLink Fun - Continental Airlines' FlightLink computer information, which is a computer on the back of each seat capable of accessing the Internet, sending a fax, check stock quotes, and playing computer games by TDi
- NYNEX Regression - Smart payphone problems in New York City, by Rebel
- Starting a Hacker Scene - How to start a local hacker scene, by Derneval
- And Justice for All - Transcript of the Edware E. Cummings (Bernie S.) sentencing from March 5, 1996.
- 2600 Meetings
- Price: $4.50
- Issue's Cash Cow: Internet Censoring, Send Money
- Cover
- Staff
- Download Unofficial Scanned PDF!
- Download The Hacker Digest - Volume 13!
$2600 Magazine - Volume 13, Number 3 (Autumn 1996)
- Fallout - Editorial
- Searches and Arrests - Your rights during a search or arrest, by Keyser Soze (Page 2)
- Hacking the SCC OS - Hacking tips for the SCC business management software (not the telco system), by D-Day
- Security Through the Mouse - Bypass keystoke recording with this clever program which allows mouse clicks in your password, by Steve Rives (Email)
- Brazilian Phone System - Overview of the landline and cellular phone systems in Brazil, by Derneval
- The Dial Pulser - Turbo BASIC code for a 2600 Hz single-frequency pulser (a.k.a. Captain Crunch whistle), by Golem of Sprague
- GI CFT2200 Power Box - Overview of the General Instrument CFT2200 cable box, by Active Matrix
- GTE Voice Prompts - Codes to generate each of the voice recordings, by Chillin' Bit Boy
- HP LX200 - Hacking with the HP LX200 portable computer, by PsychoWeasel
- Maximum WOW! - Compuserve nation-wide PPP Internet service information, by Kris
- Hack Your High School - Tips for hacking your school's computer, by DayEight (Ryan Stevens)
- Federal BBSes - Government BBSes, by Anonymous
- Hacking the SR1000 PBX - Hacking the Cortelco SR1000 PBX system, by maldoror
- Building the Cheese Box - Build a phone line diverter box using a Parallax BASIC Stamp, by Thomas Icom
- Letters - Going Totally Postal
- The Cincinnati Nightmare - Craig A. Finseth, Judicator of DC, Mickle, Feanor (Fargo), Benjamin (New Jersey)
- 2600 Groups - Michael J. C. G., The Rippa
- Airplanes - Bishop (Maple Ridge, British Columbia))
- That Question Again - Jimp
- Phone Shutdown - PyroLite (Barry Bowling)
- Corrections - Cannibal
- Boat News - Phillip Phlop
- Mac Hiding - Josh M. McKee (Corvallis, Oregon)
- Submission - SN0WBLiND
- Numbers - foX mulder, Shadowdancer, cybersurfer, Ruthless Dictator, rolando rojas
- Mystery Computer - cookiesnatcher
- Novell Hacking - Dusty
- Security Concern - Ginchy
- Canceling AOL - Eribake
- NSA Tracking - Montauk
- The Red Box Issue - Cesar, Rev. Doktor S-bo (Steve Johnston), mthed
- Malfunction - Vader187
- Off The Hook - Mr. B.
- Free Communication - MA
- Words of Thanks - C.S Spankford (Seattle, Washington), DFW
- Applying Knowledge - Dr. Bob (Dr. Bob Testen, Germantown, MD)
- Coin Collection - Anonymous
- Trouble - alien13
- On The Inside - Cpt. Kirk
- Retail Madness - Jamez Bond
- Update - MRGALAXY
- Suspicion - Redial
- Videotext - MLiq
- Chip Implants - OddBall
- Hacker Defense - Charr
- Battling *69 - Ty Osborn
- Cash Registers - Spydir Man (Phoenix, AZ)
- Disney Facts - Line Noise (Orlando, FL)
- Crazy Phone - PoT-UsA
- Paranoia - Ben (Wichita, KS)
- Spoofing Cellular Service - Overview of cellular ESN cloning, by Baxlyder
- Reprogramming Data - NAM programming info for various Autovox cellular phones, by JS
- The Weird World of AOL - Various AOL Terms of Service violations
- 2600 Marketplace
- PHF Exploit - Using the infamous Apache PHF web server exploit, by fencer
- 2600 Meetings
- Price: $4.50
- Issue's Cash Cow: Bernie S.
- Cover
- Staff
- Download Unofficial Scanned PDF!
- Download The Hacker Digest - Volume 13!
$2600 Magazine - Volume 13, Number 4 (Winter 1996-1997)
- Knowledge is Strength - Editorial
- Toward More Secrets - Info on today's cryptography, by Seraf (Dominick LaTrappe)
- Backcountry Phones - Info on rural phone systems, Optaphones, by Equant (Nathan Hendler, Tucson, AZ)
- Chipcards Explained - Detailed information on chipcards, by BillSF (Page 2, Page 3, Page 4, Page 5, Page 6)
- Biggest Mac Mistakes - Securing Mac computer networks, by The Guy Who Was In Craig Neidorf's Spanish Class And Had No Idea
- Craft Access Terminal - Info on outside plant Craft Access Terminals and the Craft Access System, by Local Loop
- Cracking askSam - How to bypass askSam database password protection, by Datum Fluvius (Missing Table)
- Snooping via MS-Mail - Snoop on email using MS-Mail, by Schlork
- Letters - Your Letter Could Be Here
- The Ruling Class - Socrates, Josh (Abilene, TX), Hype (Mississippi)
- Folklore - Wussfish
- Finding People - Asmodeus (McKinney, TX)
- Info Needed - Jorge (Uruguay), Geert (Holland), DoubleZeroOne (Texas), Yosemite Sam
- Encryption - Data Stream, Azazel, Anonymous, WinSocker
- Questions - thedespised, Merlin (Anchorage, AK)
- Holes - charr (Atlanta, GA)
- On Cluelessness - Zyklon B
- Observations - Dr. Delam, xphreak, Desaparecido (San Francisco, CA), NG (New Jersey), Ammon, Rosey (Canada), president@whorehouse.gov, CF (Alameda, CA)
- New Stuff - xorsystm (Eric), TheFetish To Heresy
- Numbers - sisifis (Illinois), Captain Video, Michael (Germany)
- Corporate Hacking - Jack Stuart
- A Word of SYN - meem, George
- Oops - Gordon
- More FlightLink Facts - +universal cytixn+
- Bernie S. Thoughts - Kevin
- Our Hypocrisy - Sean Emerson (Goleta, CA)
- Upgrade - MRGALAXY
- A Freer Juno - phunhertz
- Cable Notes - Platypus Man
- Gambling Hack - Guz
- PHF Exploit - Astraea
- Monopolistic Motion - (orbital) (Nashville, TN)
- A Fun Federal Story - love 357
- Disturbing News - Rich D.
- Porn Sting Update - BD (Denver, CO)
- NYNEX Neighbor Problems - Guard of the Gate (Massachusetts)
- Subscriber Network Interfaces - Info on telephone network interfaces, by Frequency Man (FreqMan)
- Unfriendly Numbers - List of 800-numbers that charge, by Secret Squirrel (Michael Jacobus)
- How to Steal Things - How to steal stuff, by Ted Perver (J.J. Styles [a.k.a. 0ptiKal ilusioN, a.k.a. Zot the Avenger])
- Social Engineering via Video - Use video tools and techniques to social engineer information, by Bernz (David Noah Bernick, Email #2)
- The Complete Social Engineering FAQ by bernz
- 2600 Marketplace
- Defeating the W95 Screen Saver - How to extract a Windows 95 screen saver password, by rdpzza
- Book Review: Anarchy Online - Review of Charles Platt's book Anarchy Online, by Scott Skinner
- 2600 Meetings
- Price: $4.50
- Issue's Cash Cow: Bernie S. & Kevin Mitnick
- Cover Awesome cover photo!
- Staff
- Download Unofficial Scanned PDF!
- Download The Hacker Digest - Volume 13!
$2600 Magazine - Volume 14, Number 1 (Spring 1997)
- Enough is Enough - Editorial
- Hacking LED Signs - How to hack those scrolling LED signs, by Bernie S.
- Use Your Skills to Escape Boot Camp - How to get out of boot camp, by InVerse
- Poor Man's Access - Provides remote shell access on UNIX servers, by GT
- Consequences of .GOV/.MIL Hacking - What happens when you hack .gov/.mil sites, by Chocolate Phoetus
- More PHF Fun - Script to search for the Apache PHF exploit, by ChezeHead
- Code: phf.py
- Credit Card Numbers via Calculators - How to generate credit card numbers on a TI-82 calculator, by DETHMaster (Jesse Curry)
- Paper Evidence - How to properly destroy paper evidence, by F. Leader
- Cellular Programming Data - More CT-352/3, CP-170, Technophone 901, CT-100/101/200/201, EZ400 NAM programming notes, by Threc (Dustin Darcy)
- Downsizing Insurance - How to avoid being fired and collecting "payback" data, by Hans Gegen
- Letters - Letters That Don't Suck
- Dealing With Parents - edoban, FEENIX aka The Ebola Virus, fordyman, Ace Lightning
- Subscribing vs. Newsstands - jetman
- A Real Clever Trick - ameba
- Tale of Woe - Jeff
- Number Fun - CIA, Darkman, Saiine, CrACKeD (Tucson, AZ), BStone, JN, Rokket Man
- Technological Marvels - Phreakner
- Big Brother - Wes "Holodoc" Mills
- Frequencies - Desaparecido (Bryan Robert Cowan, Sacramento, CA, DOB: 11-27-1974)
- School Terror - Socrates
- Exciting Updates - sw, Josh M. McKee
- Bernie S. Feedback - CYBERJE, POEE Chaplin (J. Weiss), Armitage Shanks, MBG
- Video Boxing - =NSNiPER=, NeoCzar, Pyrojax (ShwaG)
- Exorcising AOL - Sevangels
- Newbies - ZeBoK, OpieX
- PHF Findings - Zeed
- Web Reaction - KH, Anonymous
- Submitting Stuff - (i), Jack T. Dragon
- 2600 Name Dispute - Mr. Kiddie Pr0n
- 2600 Sells Out - Brain Child
- Cable/Web Thoughts - Eli the Bearded
- Praise - sgtpepper
- More on Disney - Moonpanther, GB (Georgia)
- Cellular Spoofing - WinterMute
- Implants - /dev/null
- More on the Mystery Computer - Viral Messiah (Mike, Jamestown, KY)
- Credit Fraud - scrap
- Bookstore News - Phun and Gamez (Emporia, KS), /dev/thug
- On Stealing Things - Artifice, charr (Atlanta, GA), Dorsey Morrow, Jr.
- Mischief in the Subway - Madeagle
- Psychic Rip-Off - DT
- Radio Show Online - Zaph32 (Dallas, TX)
- One For Kevin - Venshea, MD
- Inspiration - SodaPhish (Corey J. Steele)
- Phone Weirdness - grim, Procell
- 2600 Meeting Mishaps - Cesaro (Toronto, Canada), Crumb (Buffalo, NY)
- Military Hacker - Mainframe
- Punctuation Problems - Niel Ians
- Mac Hiding - Total Idiot
- The Other Side - (unreadable signature on a fax)
- Evil Ex Strikes Hacker - MANOWAR (Orangeville, Ontario, Canada)
- Serious Concerns - Shadodin
- How to Hack Tech Support - How to talk on the phone, by Dennis Fiery (Knightmare)
- Letter from Prison - Letter from Agent Steal
- The Other Kevin Book - Book review of Jonathan Littman's The Watchman, by Noam Chomski
- 2600 Marketplace
- How to Legally Use a Red Box - Use the audio tone output of a Red Box to control things, by Kingpin
- Red Box Detection Circuit A practical use for a "toll fraud" device, by Kingpin
- The Red Box Detection Circuit
- Schematic PostScript
- 2600 Meetings
- Price: $4.50
- Issue's Cash Cow: Kevin Mitnick
- Cover
- Staff
- Download Unofficial Scanned PDF!
- Download The Hacker Digest - Volume 14!
$2600 Magazine - Volume 14, Number 2 (Summer 1997)
- The Neverending Story - Editorial
- Cable Modem Security Holes - Monitoring cable modem traffic, by Sciri (Sean Sosik-Hamor, Twitter, Reddit, Pelham, New Hampshire)
- GSM Comes to North America - Detailed overview of the GSM cellular phone system, by Phiber Optik (Mark Abene, Elmhurst, NY)
- The Wonders of Net2Phone - How to use Net2Phone, by tersIan
- Those Pesky Mylar Strips - Info on the Mylar strips in currency, by Dave Mathews
- Fortezza: The Next Clipper? - Sensational overview of a new encryption protocol, by Seraf
- Fast-Food Phun - Harassing fast food drive-thru operators, by VaxBuster (Bio)
- Tricks and Treats of the AUTOVON - How to use AUTOVON, by N-Tolerant
- Omnipoint in New York City - List of Omnipoint cell sites in NY, by Syringe
- Letters - Lucky Letters
- Injustices - The Hemroid, Kurt, Hellnite, Anonymous (Ocala, FL), X-Ion Noize
- Numbers - Josh, Memory Overflow, No Name, Joe Mama, Mindkiller, Legba, Saab, No Name, Ted Merriman
- Off The Hook - Brendon
- Commentary - YT
- Social Engineering - IFP (Iowa), Privacy Freak in MI, KpTone
- Defaming Our Good Name - greg
- Info - RBCP
- Meetings - Anonymous (New Jersey), The Hunter, Syphon Siege (Buffalo, NY), Low Tek (Rick Merced, CNN Interview, Atlanta, GA)
- Hacked Web Sites - Boris
- Mystery - wire fatigue
- The AOL People - Magus, Viral Tonic (Response)
- The AOL Rules - JediHamster (Xander)
- How Dare You - Fraas
- More School Stupidity - bryan
- The Decline of 2600 - pokis
- An Australian Nightmare - Cochrane
- Corrections - BillSF, Kaptain Kangaroo
- LED Sign Update - Da Findler Man
- Spy Hacking - S
- Clueless - Bear
- Hopeless - Nameless
- Pointless - Rhyme-Chai
- COCOT Mysteries - Cheeto
- Phone Tapping - Mwaahh
- Condoning Fraud - the trailer park hero
- Thanks for the Virus - MiSguiDeD
- Dangerous Info - Tim Leary
- Arcade Facts - James R. Twine
- Don't Steal Us - ISP Sales Snake
- Supervised Release Hell - Minor Threat (Chris Lamprecht, Austin, TX))
- Cellular Call Trace - KOADALAN
- The Mitnick Case - TC (Ft. Leavenworth, KS)
- Defeating HTTP Access Control - How to defeat web blocking, by Ryan (Ryan Nelson)
- Code: 401-grope.pl
- The Ins-and-Outs of MetroCard Gold - Technical details of the MetroCard system, by blueski-mask and the wrapper (Page 2)
- 2600 Marketplace
- News Summary
- 2600 Meetings
- Price: $4.50
- Issue's Cash Cow: Kevin Mitnick
- Cover
- Staff
- Download Unofficial Scanned PDF!
- Download The Hacker Digest - Volume 14!
$2600 Magazine - Volume 14, Number 3 (Autumn 1997)
- Sobering Facts - Editorial
- Busted! A Complete Guide to Getting Caught - What to do if you are busted by the feds, by Agent Steal with contributions and editing by Minor Threat (Chris Lamprecht)
- Hacking FedEx - Overview of FedEx computer systems and security (The Beast = SecurID), by PhranSyS Drak3 (Brian Taylor)
- Defeating *67 With Omnipoint - Defeat caller ID blocking using the Omnipoint GSM network, by TtJ
- How to be a Real Dick on IRC - Hacking and taking over IRC channels, by semiobeing
- Brute Forcing the World - Ideas for brute-force password hacking, by ChezeHead
- Hacking the Vote - Potential voting holes and loopholes, by A-Napa Candidate
- The E-ZPass System - Overview of the E-ZPass toll pass system, by Big Brother
- Letters - We Printed Your Letter!
- True Hacking - banaker
- Fun At Barnes & Noble - Black Jaguar, anonymous, Barnes & Noble Financial Center (Westbury, New York)
- Righteous Hacking - Bomber Chick, Katfish
- Replies - Imran Ahmed a.k.a. Eric Blair, kingpin, Deranged
- A Challenge - Clive
- Questions - StLSD2000, Phracture, scott, CP
- The End? - Ripped Off by NYNEX
- Critic's Corner - sTs, Orion, TC (Fort Leavenworth, KS)
- Mitnick Fallout - Phip-C, DM & NightShadow, fiNrod (Montgomery, AL)
- Circuitry - Crampet
- Suggestions - Steven, sb
- Problems - [Name Obliterated], MaRTiAs, sryob
- Improvements - Mutter
- Numbers - Ydeologi (Marshall Votta), DJinOK, A., Spillage (Orange, CT), Mwaaah, Jonny Deth
- Uh Oh - josmo
- Fixing Juno - BuPhoo, cap.n_crack
- Offended - Absinthia Vibrato
- Notes From The Military - Jungle Bob
- For The Record - The *REAL* NeoCzar
- Meeting Problems - CW Extreme, Flipliquid, Checkmate
- Beyond Hope Aftermath - mattj, D.
- IRC Woe - havok
- USA Still #1 - elw00d
- Gee Whiz - Adam768L and Da Violator
- Singapore Connection - Joe a.k.a. DaemonX
- Free Video Games - PaulT
- Clarification - Ether Bunny, TheEtch
- PCS Mystery - Matt D.
- 2600 Marketplace
- News Summary
- Secrets of Walmart - Overview of a Walmart phone systems and the different extensions, by Pirho (Gregory Jones, New York, New York, MySpace)
- 2600 Meetings
- Price: $4.50
- Issue's Cash Cow: We are too stupid to run a magazine. Instead of Evil Corley working at a McDonald's, why don't you send us more money?
- Cover
- Staff
- Download Unofficial Scanned PDF!
- Download The Hacker Digest - Volume 14!
$2600 Magazine - Volume 14, Number 4 (Winter 1997-1998)
- Remember the Future - Editorial
- Your Very Own Backhoe - Perl script to create a backdoor daemon which copies a root shell into /tmp, by miff
- Code: backhoe.pl
- The Medical Information Bureau - Getting medical information from insurance companies, by Crash 24601 (Matt D. Cox)
- Some 800-555 Fun - 800-555 carrier scan, by PorT666 and ChaosMakeR InC.
- TCP/IP Basics and Shortcomings - Overview of TCP/IP and some potential vulnerabilities, by Nathan Dorfman
- The Ominous GETS - Overview of the Government Emergency Telecommunication Service (GETS)
- The Potential of Mobil Speedpass - Info and dissection of a Mobil Speedpass card, by A.M.
- Telco/Government Cooperations - How the government gets a wiretap warrant, by Mr. Opossum (Page 2)
- How to Get Away With Things on GeoCities - How to hide files on GeoCities to bypass their restrictions, by Champ77 (Website)
- The Argentinian Phone System - Info on the phone system in Argentina, by Derneval (Derneval R. Rodrigues, Brazil)
- How to Hack a Virtual Pet - How to hack and experiment with "virtual" pets, by MiLtRoNi
- Letters - Letters to Captivate You
- Criminal Advice - Mr. Swervon (Michigan)
- Newbie Advice - Vic Sinclair, Spekter (Atlanta, GA)
- Defining Our Purpose - Dominus Omniae, Joe A
- Getting Caught - onyxfr0g, RM
- Equal Access - No Name No City Please
- Questions - Night Words, Silicon Mage, T.C.
- New Facts - Virtu-Al, Somewhere in Maryland
- Help Needed - Head-aches in Arlington, kyle, Jakob14246463526390210, JR
- Next Letter - Kurt
- Reactions - The Mad Hacker, Lee, phreakout, Tp, H.M. Murdock (Pennsylvania), Archmage, Nathan, John b Cannon, joshua, Anonymous, Austin, Citrus, phil, Hernan (Brazil), Seraf, Nitron
- Croatian Hacking - Electrik Monk, Anonymous
- Critique - DS
- Meetings - xxxxxx, The Phrkman and Cybrthuug (Lewisville, TX)
- Boston Transit - Anonymous in Boston
- Norwegian Payphones - Jostein Nygaard (Norway)
- Information - Dr.Seuss, Eric Albert
- Criminal Actions - Dan
- Canadian Stuff - dj.tazz@earthling.net (Canada), Members of RoK, Jim S [416] (Canada)
- Access Problems - MuSo (Florida)
- Words on Cable Modems - William
- Suggestion - Jim
- Military Recruits - Mortis, ToxicShock
- The Anarchy Debate - TDecius
- Miscellaneous Feedback - Boanne
- Apology - DETHMaster, Roy Haskins
- Spying on Yahoo! - 1,000 random Yahoo! search strings captured via a security hole
- Hack Your Head - Overview of legal stimulants and drugs, by Met-Enkeph (Evan Eveland)
- Noggin Cracking - Cracking software without any tools and just using your brain, by Fidel Castro
- Sun's Nasty Little List - Sun Microsystem's "Denied and Restricted Parties List" (i.e. no sales) list (Page 2, Page 3)
- 2600 Marketplace
- 2600 Meetings
- Price: $4.50
- Issue's Cash Cow: Kevin Mitnick
- Cover
- Staff
- Download Unofficial Scanned PDF!
- Download The Hacker Digest - Volume 14!
$2600 Magazine - Volume 15, Number 1 (Spring 1998)
- Message Sent - Editorial
- The Defense Switched Network - Info on the Defense Switched Network, by DataStorm
- More on Military Phones - Info on military phone systems, by Archive
- The Mysteries of SIPRNET - Overview of the Secure Internet Protocol Router (SIPR) network, by the Ruiner (Ian Reddy, Canada)
- ANI2 - The Adventure Continues - Automatic Number Identification (ANI) II digits are two-digit pairs sent with the originating telephone number. These digits identify the type of originating station, by vandal
- List of ANI II codes
- Eggdropping - How IRC eggdrops work, by Tempest (Partial)
- Naming Exchanges - How old phone exchanges were named, by Jeff Vorzimmer (Texas)
- Hack the Hardware - Hacking SuperStack hubs, by Sadena Meti (David Emiley)
- Day of the Office Assault - Office pranks, by MRGALAXY
- Code: office.bs
- Defeating CyberPatrol - How to bypass CyberPatrol, by Franz Kafka
- CGI Flaws - Security flaws in CGI scripts, by Friedo (Mike Friedman)
- A Brief History of Postal Hacking - Funny (spoof?) history of trying to mail for free, by Alien Time Agent, Seraf, and Waldo
- Letters
- Plea For Help - Sly
- Infos - PhatKat, Packrat, anonymous, MR, D-Recz, Super Sharp Shooter (Ottawa, Canada), skwp, Chris (d7), Rev. Smoov
- Finances - AcidHawk, Tuxedo Mask (Aaron, Ciba Mamoru, Phoenix, AZ)
- Arcade Memories - Semaj31273 (James R. Twine, Goffstown, New Hampshire)
- Random Questions - Tim, zuggy, Dave, Meglomaniac, SaLT, Phreakin in Phoenix, boardfreak, ALC, The Computer Junkie
- A Big Misprint - Sith
- More Newbie Bitching - PaKo, Jade
- Clarifications - James S. Kaplan (KG7FU), philosopher, Christos Paraskeyopoulos (Christos Paraskevopoulos?)
- Criticism - Ultra Sonic, KnIgHtMaRe
- More on Anarchists - MALICO
- AOL People - Khan SW, JJ (Johnny Blaze)
- Facts - Allin, Donoli, Anonymous, codefreez (Eric, Mountain View, CA)
- Independent Browsing - VirtualToaster (Merritt Burrus, MySpace)
- Bookstore Computers - Ranma, Istra
- Clampdown - Greythorne The Technomancer
- More IRC Abuse - Calis
- On Mitnick - candyman, Silicon Mage (Neufeld)
- Posers - TDK (Urbana, IL)
- 800 Fun - FoNeCoRd
- Military Insight - I3ullseye (Dave Maynor, Spokane, Washington), annsan
- Encryption and the US - A member of the TMC (Note: The Canadian government is filled with foreign spies)
- Hassles - Anonymous, tennis ball, Resol Etile
- More Privacy Lost - mix
- Wow - zigzag
- Suggestion - soldado
- Weirdness - Anonymous
- New Meetings - I)ruid (Forth Worth, TX)
- Drugs - informagnet, Dr. S
- Cable Modem Facts - TyPEsCAN
- Hacking a BBS with DOS - BBS security, by Section8
- How to Get the Better of Best Buy - Best Buy computer network info, by Mbuna
- Setting up UNIX Trapdoors - How to hide your entry on UNIX systems, by Nathan Dorfman (Email #2)
- 2600 Marketplace
- Not a Secret - Military can't figure out DOS
- News Update
- 2600 Meetings
- Price: $4.50
- Issue's Cash Cow: Kevin Mitnick, send more money...
- Cover ("Free Kevin" Static HTML Page)
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 15!
$2600 Magazine - Volume 15, Number 2 (Summer 1998)
- Lies - Editorial
- Where Long-Distance Charges Come From - Detailed tabulation of where long-distance phone charges come from, by The Prophet (Babu Mengelepouti)
- Facts About Cable Modems - Technical info on cable ISPs and modems, by jeremy
- What is ICA? - Overview of the Citrix Independent Computing Architecture thin-client protocol, by Democritus "Father of Materialism"
- A Newbie Guide to NT4.0 - Beginner guide to Windows NT 4.0, by Konceptor
- Build a Modem Diverter - Divert an incoming modem line to another line, by digital/Digital
- The Tyranny of Project LUCID - Info on Advanced Technologies' LUCID "international justice" computer system, by Tom Modern
- Hacking Lasertag - Hacking the LaserStorm games, by johnk
- Fun With Java - Playing around with JavaScript, by Ray Dios Haque
- Millennium Payphones - Overview of Nortel Millennium payphones, by Phluck
- How to Hack Your ISP - Overview of some basic UNIX security and exploits, by Krellis
- Gameguru Hacking - How to hack the demo copy of Game Guru, by Axon
- Letters
- Questions - Payphone, reid, Anonymous in Minnesota, Callme Ishmael, kris, Bendzick, PbH, Asher
- Newsstand Update - Javelin, John Doe
- Meetings - twisted circuits, Flash, Dr. Doolittle
- Disturbing News - Ruiner (New Times BBS), M Davis a.k.a. SemiSpy
- Online Idiots - Dave, The Informant
- Software Concerns - Schrooner, Greyhare
- Random Info - Luke, Allin, SilverStream, FIXatioN, Mark Iannucci, Soul Implosion, phiberphit, Desaparecido, Flinx, skwp, Citrus, Mastery
- More Fun In Stores - Corvi42 (Trisan Nixon, Toronto, Ontario), Carole
- 2600 Problems - Kevin Brown, Eric B. AKA Flyable George, SYCO, Dave Kiddell, Catt, Disappointed
- Comments - Dr. Psycho, JJ
- Pleasantries? - DramaDame, Briareos
- Mitnick - klineline, *69, ed
- Head Hacking Advice - Malico, kevin g
- Clarification - Atrifix (Matt Atrifix), K. Ruff
- Bookstore Monopolies - R.J. Eleven
- Credit Due - Nothingg
- Phone Exchange History - Stealth Ricochete
- A Suggestion - F.E.D.-D.E.F.
- The Generation Gap - curtis in cali
- More on FYROM - MJ Mastermind (Athens, Greece)
- A Nagging Question - Trend_Killa
- Fingerprinting at the Precinct - Story of being fingerprinted at the NYPD 44th Precinct and the computer system they used, by The IMC
- Inter-Tel Phone Systems - Hacking Inter-Tel phone systems, by Sundance Bean
- Security Through "Secure" - Program to watch process IDs vi ps aux to determine if they exceeding a set limit, by kasper
- Code: secure.c
- Tips on Generating Fake ID - Info on getting or making fake IDs, by DrNick (Ben Polen)
- More on DSN - Overview of the Defense Switched Network, by Dr. Seuss of the OCPP
- 2600 Marketplace
- 2600 Meetings
- Price: $4.50
- Issue's Cash Cow: Kevin Mitnick
- Cover
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 15!
$2600 Magazine - Volume 15, Number 3 (Autumn 1998)
- Progress - Editorial
- Homemade TCP Packets - Perl script for crafting spoofed or corrupted TCP/IP packets, by miff
- Code: lego.pl
- Socket Programming for Fun and Profit - Beginner info and code for TCP/IP socket programming, by Darknite (Email #1, Email #2)
- Blasting Sound - Simple shell script for generating annoying audio, by Slatan
- Back Orifice Tutorial - How to use and install Back Orifice, by skwp (Yan Pritzker)
- BO2K - Back Orifice 2000
- Back Orifice - Original
- Welcome to the Back Orifice Section Original Packet Storm Archive
- BO Plugins, Screenshots and Fan Pages
- Back Orifice 2000: The Ultimate Remote Network Administration Tool by Thomas DeVoss
- Back Orifice ButtPlugs and Goodies
- They Made Hacking Possible to Every Schoolkid - Cult of the Dead Cow Cool little video on the history of Back Orifice and cDc.
- How to Probe a Remote Network - Port scanning overview, by Armageddon
- Hack Your Console - Hacking video game consoles and making game backups, by m0tion (James Wiggins, Email, Columbia, SC)
- Cushioned Encryption and Deniability - Overview of different encryption techniques, by Phunda Mental
- The Backyard Phreaker - Beginner phreaking info and terminal box information, by D-Recz
- Expanding Caller ID Storage - Increase the memory on a CIDCO Model PA caller ID box, by Datum Fluvius
- CLLI Codes Explained - Info on the Bellcore Common Language Location Identification (CLLI) codes, by Crossbar
- Hacking RESNET - Hacking Residence Hall Networks on a college campus, by jk
- Letters
- Warning - Lucy aka Baudewiser
- Store Section - Bluebell, N8, 4U2PN, flatline, Op_Code, Pixelated!, entropic, GW, Allegra
- Help Needed - JD (West Columbia, SC)
- Identity Problems - SaaWeetie
- Mitnick Feedback - Phlight, Wheetabix, Columbus, OH, MW (Solon, OH), Malkor, God of Dirt, mcd, D-Recz
- Church People - free radical, harris (Greece)
- Generic Feedback - Skippie the Ageless Hippie, Outlawyr, squarechin, ccure, Wraith, Keen, Alan M, Mac
- Clarifications - Cathode Ray, CKG, TS, Chris, xChEWx, iZRaXXX, Whirlwind, emory, MMX Killa
- Curious - Skeet, Neurotik
- Numbers - Infect
- Career Move - triplogik
- Surprised? - KB
- Questions - RepoMonster, VxPLaToNiUM, Nathan Hendler, Malbushsa, Arag0rn
- Incidents - Net X, datapleX (Daniel M. Robertson), darkrazor, SkidMarx (Gregory L. Marx), Tuxedo Mask, Zero_Null
- Facts - hhiggins, Lord Mistical (Cincinnati, OH), Louis Blue, Vex Hardline (Zen Master Vex)
- MetroCard Fun - Loggia
- Fun Sites - KRaZy d0h
- Still More FYROM Fun - Varelides Marios (An angry Greek)
- Screwing With Blockbuster Video - Messing with Blockbuster, by Hiemlich VonScootertraus the 53rd
- Screwing With MovieFone - Messing with MovieFone, by thirdhorse (Chris Miller)
- Screwing With RadioShack & Compaq - Messing with RadioShack and Compaq, by Informagnet
- Trunking Communications Monitoring - Monitoring information for trunked radio communications, by TELEgodzilla
- More on SIPRNet - Info on the government's Secure Internet Protocol Router Network (SIPRNet), by Ex-Eleven (John Tate)
- 2600 Marketplace
- 2600 Meetings
- Price: $4.50
- Issue's Cash Cow: Send us more money, Kevin Mitnick
- Cover
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 15!
$2600 Magazine - Volume 15, Number 4 (Winter 1998-1999)
- The Victor Spoiled - Editorial, plus Mitnick case update
- A Touch Memory Primer - Detailed overview of Dallas iButton Touch Memory devices, by Kingpin
- A Practical Introduction to theDallas Semiconductor iButtonâ„¢ by Kingpin
- iButton Product Selection Table
- iButton Data Sheets & Application Notes
- The Facts of SSN - Social Security number info and prefix guide, by Kermit the Hog
- A Guide to VMS'pionage - Hacking OpenVMS, by EZ Freeze
- Samba: Lion King or Software Suite? - Overview and security of Samba shares and the SMB protocol, by VmasterX (Ron Belcher)
- Copper Pair Color Coding - 25-pair color code, by Catatonic Dismay
- A Security Hole at S-CWIS - Computer security holes in Student Campus Wide Information Service, by Phineas Phreak (Bryan Finger)
- Pocket Connectivity for Frugal Hackers - Hacking with the Sharp Zaurus 3500X, by Mr. Curious
- Fun With NetWare 5 - Hacking Novell NetWare 5, by Khyron (Claude Johnson)
- Become a Radio Ninja - Radio hacking and how to get your ham license, by Javaman (Adam J. O'Donnell)
- Cable Modem Security - MAC address security with cable modems , by Fencer (Dr. Faubert)
- How to Handle the Media - How to properly deal with talking to the media about hacking subjects, by nex
- 800-555 Carriers - 1-800-555-XXXX modem carrier scan, by MSD
- Letters - NON SPAM
- More on "Free" Software - (none given)
- Data - Pigano, nobody, Mark Milgrom, Nighthawk, KC, Shahn
- Questions - Rav0n, analyzer, smokescreen, Matt, Keebler, the medik, NAME, KLoWN, RANT-o-MATIC, RANT-o-MATIC, vsr600, Envision (Anaheim, CA), TydiLFuX (Wisconsin)
- RadioShack Antics - Jestah (Orlando, FL)
- Fun on the Phone - NERO, Knotfil, Innominate (Buffalo, NY)
- Religious Advice - Patrick, Deryc, Riddler
- Scary Stuff - jagxr
- Injustices - wrath, Toxygenn, hex
- Olympic Fun - Informagnet
- Miscellaneous Mitnick - denileofservice, Anthony T. aka SYCO, TetterkeT (Jonathan M. Wilcox), exhalibut, Shawn Morris, Timba Wulf, Eppie, snachbot, Little Bobby, Telephreak, Pago, Jade, DaRkSiDe (Richmond, Indiana), Desaparecido, Baaaa (Waltham, MA)
- Fingerprinting - The Fryar
- Barnes & Noble Feedback - J.A. Hasse, Bendar the Barbarian, cloak, Rachael (Chapel Hill, North Carolina)
- Between The Lines - Pete
- Help Needed - morbus, Col Pete
- Hotmail Fun - Feng Laser
- Non-Subscriber - Sandy
- 2600 To The Rescue - jeff
- In Defense of Microsoft - Count Zero Int
- Clarifications - Spoon, StuntPope, Dustin Decker, Rave669, Archive, D-Recz, Cslide, Frank (Seattle, Washington), Shaggy Dan, Frogman
- An Offer - st
- Military Madness - Dippy (Virginia), Virtual Vandal (Detroit, MI)
- Thoughts and Reflections - BurningWorld (New York), fl00dland, WG (Friday Harbor, Washington)
- Why Anonymous Phone Cards Aren't - Laws that can reveal phone card info and FBI testimony
- The Cryptography of Today - Modern computer encryption, by kriminal 3nigma
- Hacking the Atcom Cyberbooth - Hacking airport kiosks, by Fever
- Le Firewall - How firewalls work and Checkpoint Firewall-1 3.0b information, by Black Ice
- Phreaking in the Midwest - Phreaking story and information for Midwest states, specifically Illinois, by deth6 of the Bullz On Parade
- How to Hide From Netscape - Clearing your Netscape web browser cache and history, by J.P. (John Pierce "J.P." Cummins)
- 2600 Marketplace
- 2600 Meetings
- Price: $4.50
- Issue's Cash Cow: Kevin Mitnick
- Cover
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 15!
$2600 Magazine - Volume 16, Number 1 (Spring 1999)
- The Big Time - Editorial
- Tracking Your Vehicles with AVI & ETTM - Detailed info on Electronic Tolls and Traffic Management (ETTM) toll systems, by Thomas Icom
- Big Brother on the Boulevard by Thomas Icom/IIRG
- AVI, ETTM, and E-ZPass: A Look at ITS Systems by Thomas Icom/IIRG
- Cracking the Time-Banc System - Hacking the Time-Banc employee time system and its default password, by johnk
- A Retail Target - Overview of the Target retail store computer systems, by Luna
- Wreaking Havoc with NetBus - Take control of a remote host using NetBus, by Sikdogg
- More Socket Programming for Fun and Profit - Overview and code examples for TCP/IP socket programming and example code for a Window 95 NetBIOS nuker, by Darknite
- Code: nuker.c
- Code: sock.c
- Socket Programming for Fun and Profit
- Internet Peering - Info and politics on "behind-the-scenes" Internet linking, by The Prophet
- Fun With Tripwire - How to bypass the Tripwire checksum-based computer security system, by Estragon
- A Hacker's Guide to Getting Busted - What to do if you are busted, by Outlawyr (Mark Weissburg, Facebook, Chicago, Illinois)
- Letters - Express Yourself
- Fun At The Retailers - Paladine, cili_ra/bit, Anonymous, a|chEmist, gabo, gLyKOgen
- Tracking Clive - Reapyr, Lakota
- Blockbuster Facts - mark h, DiGi_TaL
- Concerns - ICON, KaptainKool (Brett Johnson), DVS, Uneasy Rider, LiquidCache (Jason Murphy, DOB: 04-08-1984), Central Intelligence Agent #23642
- Bookstores - Jack Dangers, L.A.N.-master (Elgin, IL), Ray Dios Haque (United Phreak Syndicate), Simple Nomad, gonzo
- Phone Exploration - Dave, msdaisey, matrix bomb, Telesis, Liquid Fire, pokesmote/Lindsay^, maxm0use (Owosso, MI)
- Praise - Dre, Kanemura, Jean Dupree, Schism, SPECOP002
- Mitnick Reactions - Dr. K, C.D., Phone Bandit, Phrostbyte
- Foreign Interests - Fransico Franca Arraes, marko c, Pabst
- Security Issues - chown 2ME, comet
- ADSL Report - Perogie
- Questions - Quantex, Savage, OkornO99, Satire, Cooldek, Phredde
- Hacking Moviefone - killerclown
- Federal Interest - jason head
- Color Coding - Joe630 (Ben Sherman), todd, Seuss
- The Newbie Threat - ddhd
- SSN Corrections - Loki128, Gareth Davies, fin, Zool, teclo, Charlie
- Netscape Issues - defen, t.d.m.
- Hackers At War - Splat, Rue-the-Day
- Y2K - Zack
- Observations - Frosty, MSD, SD, John Q Sample, Rev. Randall Tin-ear (Randall Fleming)
- Cable Modems - James Carlson (Lexington, MA)
- Netware Feedback - godbox, Buzz
- SS7 Explained - An overview of Signaling System No. 7, by Friedo
- Network Scanning with Nmap - General overview and scanning tips for using Nmap, by rain.forest.puppy (Jeff Forristal)
- News Update - Various news bits
- Hacking a Sony PlayStation - Installing a PlayStation mod chip so it will play copied games, by Flack (Robert Patrick O'Hara, Yukon, Oklahoma, DOB: 08-22-1973)
- 2600 Marketplace
- 2600 Meetings
- Price: $5.00
- Issue's Cash Cow: Computer security is either good or bad, depending on how much money Evil Corley needs that month
- Cover
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 16!
TAKEDOWN: Number of crimes documented : 2 Number of meals documented : 42 $2600: Number of good articles : 2 Number of TinyPedoAds® : 42
$2600 Magazine - Volume 16, Number 2 (Summer 1999)
- A Culmination of Efforts - Editorial
- Securing Your Linux Box - Steps to help secure your new Linux installation, by miff
- More on SIPRNet - Overview of the Secure Internet Protocol Router Network (SIPRNet) used by the U.S. military, by Happy Harry
- Hacking AS/400 - Discusses the IBM AS/400 mainframe including pre-set user IDs, default password policy and some useful commands, by radiat
- Fun at Costco - Hacking Costco's AS/400, by nux
- Brute-Forcer for Tracer - Brute-forcer for Tracer unit control hardware found at most big stores, by J-lite
- Broad Band via the Earth - Broadband radio/data transmissions using the Earth as a conductor, by saint (David)
- Secrets of Copy Protection - How various hardware and software copy protection schemes work, by root access (Data War)
- How Parents Spy on Their Children - Computer usage spy programs and One Tough Computer Cop software, by Demonologist
- The Future of IPV6 - How IPv6 works in comparison to IPv4, by rift
- Letters - Chatter
- Offerings - flatline, Douglas
- Revelations - ZeROLogiKz (Michigan), ronwarren, Justin, Rufus T. Firefly, charr (Atlanta, GA)
- Responses - Ethan LaPan, Fencer
- Fun Numbers - maxm0use (Owosso, MI), Remy, PhuzzBoi, Mike
- Secrets - ethan (army.mil)
- Gripes - ICE breaker, RGBKnight, K2, shinobi, Matt Lesko
- Tales of Injustice - marbike, Outbreak
- Retail Tips - Fredrick 860, Sylex
- Cries for Help - TOPACE12
- Flush Out Religion - Joe Sixpack
- Mischief - Anonymous, the ninth name is NOD
- Clarification - baalse, Lucky225, NoDiCe, Elite
- Supplemental Info - Corey, ts, Corban, Scoop, rain.forest.puppy, MMX, Justin (Memphis, TN), Anonymous, Charon, F00bar98, matt, techs, The WildCard & |SC|
- Military Mentality - aeglemann, USN Sailor & ModG, Surreal
- Education - Made in DNA
- Miscellaneous Mitnick - RomeoW, Static-Pulse, Payphone, Chris, David, Ed in CT, toneboy1700, EchoMirage
- Mysteries - shine, niceroova)
- Foreboding - SLATAN, Mars
- Feedback - pArtYaNimaL, olsonjv, tk, brm, Grey Ghost, oolong, First_Incision, mgs21, Phred, xdissent, r0uter
- Advice - LeeTKuRp of HoC, Karen, CorLan
- Pure Stupidity - pretzelboy
- Reassurance - (none given)
- General Weirdness - ICON
- Chutzpah - Robin S (White Lake, MI)
- How to Keep Parents From Spying - Tips minors can use to prevent parents from monitoring their activities, by JediMaster666 (Phillip Benoit)
- Food for Your Brain - Finding personal info about people using info available from things like IRC, by DJ Tazz
- Adventures With Neighborhood Gates - How security gates in gated communities work, by jaundice
- Internal Hacking - Story of a person hacking an internal computer system to try and get a raise, by Zenstick
- Batch vs. Interactive - Overview of the different types of computer processing systems, by StankDawg (David Blake)
- Manipulating the Aspect - Hacking the Aspect ACD call center system, by HyTeK
- Pushbutton Lock Hacking - Info on Benton T2 model DL2700 and DL2750 push-button locks, by Clawz
- 2600 Marketplace
- 2600 Meetings
- Price: $5.00
- Issue's Cash Cow: Kevin Mitnick
- Cover
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 16!
$2600 Magazine - Volume 16, Number 3 (Autumn 1999)
- Slow Motion - Editorial
- Upload Bombing - Web server attack exploiting CGI holes by pretending to be a web browser uploading a file, by Ulf of VSU
- Code: upload-bomb.pl
- Killing a File - How to thoroughly remove a file from a computer, by THX1138
- The Terrorist of Orange, Texas - Story from Texas about a high school student labeled a potential "terrorist," by The Abstruse One (Jason Byrons)
- ITS Prison Phones - Info about the Inmate Telephone System, by ElecRage (John Schang)
- Infiltrating MediaOne - Cracking MediaOne Express - the password is "password," by Lobo The Duck
- PalmPilot's Canadian Red Box - PalmPilot program for generating Red Box tones used in Canadian payphones, by CYB0RG/ASM
- Forging Ping Packets - C source code to forge ICMP echo requests under *BSD, by /bin/laden
- Code:forge-ping.c
- Similar Code: echospoof.c ICMP_ECHO Spoofer, by Javaman
- Trunking Communications Monitoring: Part 2 - More info on monitoring trunked radio systems, by TELEgodzilla
- Internet Radio Stations - Running a Internet "radio" station, by -theJestre- (Chris Marland)
- Quantum Hacking - Info on quantum computer hacking and the OpenQubit project, by skwp (Yan Pritzker)
- Protel COCOTs - Info on hacking Protel COCOT payphones with the dial-up feature, by HeadTrip
- Beating Protel's Programming Security Code by MaNiAK
- Programming Protel Phones by El Jefe
- Programming Call Routes Using Protel's ExpressNet Software by El Jefe
- Protel Payphones Parts & Support
- Protel Software ExpressNet III
- ProNet v3.211 User's Guide
- Assorted Disney Fun / More Disney Fun - Disney crap, by Hacks and Madjestr
- Letters - Enunciations
- Clarifications - Barcode, RS, still nobody, Falcon, twiztid, joe cool, John Belushi, rj, Meth_od, Sunshine
- Venom - None of your Damn Business., alex
- Guilt By Association - icon, napalm, artiedeco
- Retail Hacking - KeMo BoY, caesar gaius caligula, Drifter, Yerba AKA Willy L., xprotocol
- Phone Trickery - payphone, Jonathan Fredericksen, Iineside, SSTcobra (Atlanta, GA), Loggia, Rolan
- Dissatisfaction - Dementia, Entropic (Dallas, TX), M0leBrain, cookiesnatcher
- Free Kevin - crypto, Lord Maestro, Brother Inferior, Fire Drake, Skyppey the Hyppey (Canada), Joe Blow
- Foreign Phones - Psychedelia, MD_Yugo_NSM
- Conspiracies - name withheld because I can't think of a good one, FeuErWanD, namib1234, ghostriter, john doe
- Discoveries - Weber, EKo, admintemplate_, finn, Calis, BBrain (Boston, MA), timm
- Hunting For 2600 - Phreakilation, SAR, GB
- Y2K - RB, R.B.
- Game Playing - Mike (Seattle, Washington), AllOut99, mad cow disease
- Corporate Expansion - james hall
- Hiding Things - SCUDS
- Info Wanted - caffeine, tnsecure, Bazz
- Stealing - SpeedDRaven (Carl J. "Byron" Speed)
- Ad Policy - Eric W.
- Secrets - Seraf
- An Overview of Cellemetry - Wireless telemetry technology designed to monitor, control, and track anything that is worth being monitored, controlled, and tracked, by Jinx (Johnny)
- Solaris x86 for Plants - Overview of installing Solaris 7 on an Intel x86-base system, by Javaman (Adam J. O'Donnell)
- Eleetisms - How to talk like an idiot, by Hex (Jarrod Eyamie)
- 2600 Marketplace
- 2600 Meetings
- Price: $5.00
- Issue's Cash Cow: Kevin Mitnick
- Cover
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 16!
$2600 Magazine - Volume 16, Number 4 (Winter 1999-2000)
- Violence, Vandals, Victims - Editorial
- Accessing Forbidden NTFS Drives - Circumvent security on a Windows NT machine by booting from a Trinux Linux floppy, by Number Syx (Chris Stoddard)
- Trinux: A Linux Security Toolkit
- Trinux: A Linux Security Toolkit - Distribution Mirror Trinux was originally released by Matthew Franz in 1998. The collection includes floppy boot images, ISO files, kernel modules, and documentation.
- Trinux FAQ Version 0.2
- trinux-070 Trinux 0.70 distribtions. You'll need three formatted floppies.
- 2.4.19-modules Trinux/Linux kernel 2.4.19 pre-compiled modules.
- ntfstools.tgz NTFS tools for Trinux
- RawWrite for Windows (RawWrite v0.4 [Win], RAWRITE2 Ver 1.1 [DOS]
- How I Recovered an Unbootable NTFS Windows System
- Security Through NT? Not Likely - Security holes in Windows NT and Microsoft networking, by Kurruppt2k (DOB: 05-01-1986)
- Digital Voodoo: How to Break into Computer Systems by Kurruppt2k
- Countermeasures Revisited - Use a milliwatt plant test number and inductive probe to find phone taps or extensions, by Seuss
- DATUs - The Tool of the New Age Phreak - Detailed info on Harris DATUs, by MMX
- Supplemental Files Missing a few.
- Messing With Staples - Harassing old ladies at a Staples store, by Maverick(212)
- I Own Your Car! - Car company story and infiltrating a "restricted" area (Chrysler PT Cruiser), by Slatan
- Telco-Babble - Phone wiring color and bundle info, by Android
- An Intro to Paging Networks and POCSAG/FLEX Interception - Monitoring pager networks, by Black Axe (Email)
- Hack the Media - Fighting today's media con artists and trying to get the truth out, by Jim Nieken
- Letters - People Who Can't Keep Quiet
- Inequities - Ackbar,
- The Politics of Hacking - Desaparecido, phillip, TeckX3, Major Motoko
- Difference of Opinion - Jeffrey Seelman (Milwaukee, WI), Da "Sleep"
- Mitnick - EchoMirage, skaboy, Don L, CherryPie,BADJRM, matt, Darth_tampon, Suicidal
- Stupidity - kipple, Jack O'Lantern, Dr. Bagpipes, c. edward kelso, Arcoddath (Scotland), Anubis
- Handy Stuff To Know - J. Arthur Ballarat (Los Angeles, CA), mad kow diseez
- The High Cost of Learning - gpf, hightechno, Valen
- Mysteries - drdoom, Jack
- Hotmail Hijinks - Shaun (Memphis, TN)
- Retail Tips - WillyL. AKA Verba, SenorPuto, creature, kAoS, Sirblime, Loggia, dannyh, Sir Reginald, Wisbing he was back in New York, ScOOter, emdeo, Eil, SAR, hidden101, CaS
- Suggestions - Black Knight, Russ, sureshot
- Ripoff - Larry, errorshutoff, Dumah, Snot Gnome, Shawn, Dissolution X, Graphix, Websurfer
- Questions - Val, Infinet
- MTV - Skanarchist (Eddie), i_ball, techx3, UnclePhester9600
- Barnes & Noble Memo Found? - Mangaburn, Dawn Bates (Muskegon, MI)
- Fun Stuff - Slack Packet
- Stories of the Past - Brien
- How to Create New Urban Legends - Creating your own myths and urban legends and how people manipulate the truth, by Jim Johnstone
- Hacking Explorer (the car) - Hacking Ford Explorers' keyless entry system, by Bob
- Net Nanny Nonsense - How Net Nanny works and stuff, by Raz
- Why Red Boxing Doesn't Work - Death of Automated Coin Toll Service (ACTS), by The Prophet
- Spoofing Call Waiting ID - Simple little trick to send fake caller ID data during the call waiting phase, by Lucky225 (Jered Morgan, Facebook, Medium, YouTube)
- Spoob Spoonm's open-source Orange Box Perl script.
- Caller ID Basics by Michael W. Slawson
- Software Orange Box (S.O.B.) v1.9.4
- The Sprint Integrated On Demand Network - Info on Sprint's Integrated On Demand (ION), by Prototype Zero
- Understanding Microsoft Exchange - Overview of Microsoft's Exchange server and potential exploits, by PayLay
- 2600 Marketplace
- 2600 Meetings
- Price: $5.00
- Issue's Cash Cow: Kevin Mitnick and some others
- Cover
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 16!
$2600 Magazine - Volume 17, Number 1 (Spring 2000)
- The Next Chapter - Editorial (css-auth.tar.gz)
- A Taste of Freedom - Post-prison letter from Kevin Mitnick, by Kevin Mitnick
- How to Stay a Sysadmin - Overview of tips and tricks for computer system admins to prevent burnout or to make their job easier, by Shade (Paul A. Watson, Resume)
- Military Computer Secrets - Military computer (Naval Aviation Logistics Command Management Information Systems [NALCOMIS]) tidbits, by Suicidal
- NALCOMIS and the Aviation Maintenance Analyst by Glenn J. Boston
- NALCOMIS/OMA: Functional Considerations for Automating Organizational Maintenance Activities by Ronald T. Allen
- Securing Websites With ASP - Security tips (cookies, session IDs) for securely writing web pages for database-driven websites using Microsoft IIS/AS/SQL, by guinsu
- Still More on SIPRNet - More info on SIPRNet and some of the hardware used for the Navy's "Information Technology - 21st Century" project, by Phrostbyte (Kevin Wahl)
- Finding and Exploiting Bugs - List of points to keep in mind when searching software and code for potential bugs, by Astroman66 (Andrew Lance)
- All About SecurID - Overview of Security Dynamic's SecurID token, by magus (Steven Beverly)
- SecurID - Info on the SecurID protocol and real-world usage, by xenox
- Your Internet Birthday - Privacy reasons for giving out a "fake" birthday when filling out forms on the Internet, by The Cheshire Catalyst
- When is Your Internet Birthday? Original
- Make Spammers Work For You - "Spamming spammers" by trying to track down details of their operation and personally contacting (or harassing) them, by Chatreaux
- Taking Advantage of AllAdvantage - Exploiting the AllAdvantage system which pays you to surf the Internet by using automated web browsing macros, by silicon kill
- More Advantages of AllAdvantage
- AIM Keys 6 User's Guide
- AIM Keys 6 Evaluation Copy
- AT&T's Gaping Hole - Exposing a glich to get free phone service with AT&T wireless service by activating a prepaid phone via a "regular" cell phone number, by Jinx
- Cellular Networks Detailed - Detailed info on various new digital cellular protocols and network, by EchoMirage (Englewood, Colorado, Email)
- Letters - WE'RE LISTENING
- Alien Intelligence - CgK
- Bookstores - Downsouth, Anonymous Barnes and Noble Music Seller, quash
- Adventures in School - Xkaliber, P2129 - the student formerly known as Kevin, phil, gopher the contradictory, Microkiller
- Discoveries - darky0da, casey, Handle6015, Mongo, brain, robert, Dr. K, carls_pub
- Kevin Free - Koishii, KuNg, Chris from Chrisconsin, ASZ, Rave669, VinceC, r00t_Canal
- More on SecurID - Kingpin
- More Fun in Retail - Anguirus, The Wedge, cashmolia, MustardMan, Phelix, cashmolia, Jack A. VanWoerkom, squatex
- Anti-Venom - The Devil
- Additional Details - netsplit, Cilo, Platinum Dragon
- Defeating Corporate Advertising - orn, Alpha
- Help Needed - xequalsl, Dan Wheeler, Lubdub
- State of the Hacker World - Pestilent, Mind Plague of The Committee, JL, phiber_life, Quantum Knight
- Positive Developments - ph0x
- Idiocy - wNdozCRASH, tacit
- Humor - Rick
- Forbidden Exchanges - .244
- The MPAA Lawsuit - Michael F. Nudell, Punker04, Anonymous (London), Apocalyse, Wayne, Pay_No_Attention_To_That_Man_Behind_The_Curtain!
- Y2K Issues - Desaparecido, AssMonkey, Gustaf, CubanPete
- Facts on NT - RickDogg
- Irony - Knightsabre
- Free Stuff - Twist (Tripwire Exploit Poster)
- Question - scorchmonkE
- 2/6/00 - MeSSerSchMiTT (David or The "RUSSIAN" as I get called in USA school), Rhymezor
- DoS Cluebags - Keith Gardner, Andrew, Cooter, Jason (Louisiana)
- How PSX Copy Protection Works - How PlayStation PSX copy protection works, by Lord Xarph (Tod Weitzel, San Jose, California)
- Fun at Circuit City - Secrets of Circuit City's price labels and an overview of their internal telephone system and extensions, by ccsucks
- How to Build a Coffee Box - Combine a Beige Box and Brown Box, by skrooyoo
- The Sprint PCS Network - Tech info on the Sprint PCS cellular network, by ~sn0crash
- How to Get Banned From Your ISP - Common sense tips to avoid being kicked off your ISP, like not send spam or exceeding file transfer limits, by Mandark
- Build, Don't Buy, Your Next Computer - Several tips for building your own high-quality computer system, by bober
- How Does That DSS Card Really Work? - Brief overview and technical details of the operation of DirecTV DSS cards, by Phredog
- 2600 Marketplace
- 2600 Meetings
- Issue's Cash Cow: The MPAA is suing $2600 Enterprises over them linking to a copy of the DeCSS source code.
- Cover (Cover Info)
- Back Cover Asian Payphones
- Bangkok, Thailand This phone looks like it's been through an awful lot. Photo by MC Telecom
- Tokyo, Japan Will ISDN payphones ever be a common site in the States? Photo by MC Telecom
- Shanghi, China A true work of art with the phone number proudly displayed. Photo by Julian
- Beijing, China Happy telephone workers. Photo by Julian
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 17!
$2600 Magazine - Volume 17, Number 2 (Summer 2000)
- Madness - Editorial
- The Art of System Profiling - Overview of some of the tools used for identifying operating systems and network layouts on the Internet, by Thuull
- A Brief Intro to Biometrics - Overview of various biometric-based physical security systems and upcoming technologies, by Cxi~
- Fun With TDOC - Information on the Tennessee Department of Corrections computer network and the Tennessee Offender Management Information System (TOMIS) system, by Anonymous
- State of Tennessee: Integrated Criminal Justice Portal Help and FAQ
- Tennessee Offender Management Information System (182k PDF)
- Strange Abuses for Your Home Phone - Info on a Conair HAC SW8260 phone, by Static (Brandon Malzahn, Email #2)
- More Advantages of AllAdvantage - More info on All Advantage and how to disable ads, by KireC
- Over the Verizon? - List of 706 Internet domains registered by Verizon
- Securing ASP: A Deeper Cut - Overview of tips for securing ASP-based websites, by AgentK (Kent Tegels, Omaha, Nebraska, Email)
- Jello Biafra: Hacker Ambassador - Clueless, rich, hypocritical, media whore - sounds just like Evil Corley, by princessopensource (Shana Skaletsky)
- Hacking the Three-Holed Payphone - Technical overview of the Bell System three-hole payphone, and a look at some of the infamous hacks for this phone, by Munzenfernsprechermann
- Packet Analysis and Header Sniffers - General overview of packet sniffing for header identification and a good low-level Internet protocol overview, by Javaman (Adam J. O'Donnell)
- Code: headers.c A program to display packet headers sniffed off the line. Uncommented.
- Letters - Dangerous Thought Section
- Clarification - Kevin V (Trenton, OH), Treker, Einstein, Mark, Transmissions from the South
- Getting Around Stupidity - Dr Jest, Karr0t T0p (Kristoffer William Marshall, DOB: 05-13-1984), phil, sonnik, GhettoBlaster (Jason Louisiana)
- Discoveries - Squee, Allin, Elektr0chr0nik, bill
- Car Talk - Devil Moon, The Artful Dodger
- Annoyances - thegeek (Glasgow, Scotland), Funk Strings, 2MnYiDiZ, ryan
- Retail Tips - SnoFlak, gasfumes, Cybah
- Additional Info - Immolation, mbve, Qwertydvorak, DAR
- Dealing With The MPAA - Scott, Sys Edit, mr. blonde, Mr. Roboto, Jedi's Chaos, Daewoo, g00fy, steven az (heretidpogo)
- The Mitnick Case - Sienne (805), Technomatrix, Speedk0re (Gary Kuhlman, Irvine, CA)
- Fun With Cable Companies - RootX11, jjjack, Rizzn Do'Urden (Mark Hopkins)
- Info Needed - Popeye
- School Update - Izubachi, Eric S., Code_WarriorX, cs0074life, Blooder, ICMP
- Criticisms - Patrick, cryptofreq, The_36th_Chamber, dustbert
- Helping New People - Notmyrealhandle
- Ideas - MrBid
- Injustices - Anthrax, SHemp5150 (Shaun Kemp), KoDo, diss0nance
- Starting a New Meeting - NuLL vaLue, neurophilter
- Praise - Dave (New York, New York), Da Clyde, 3_trinity_3 (Shawn McCullough, San Antonio, TX)
- ANAC Number - Goop, PaleronD
- Media Misrepresentation - phil
- The Staples Threat - Cielo, Maverick212
- Y2K - Mojo
- True Security - pulse (Tony Brown)
- Listening In - zzflop
- Female Hackers - MiStReSS DiVA (aka-Beui)
- Desperate - From a Wanna be Hacker
- The Verizon Threat - majickmutex
- A Simple Hex Hack - Windows registry hex editing (date editing) to defeat time-limited software trials with a specific example using Hex Workshop v2.54, by Zarathustra
- Secrets of Dell - Secrets of Dell tech support, what to look out for when ordering a new Dell, or returning your hardware, by Deamtime
- Del ZZTop Software Restoration Utility Dimension - NT4/Win98 / vA00
- How Domains Are Stolen - The potential for domain name hijacking by sending spoofed emails, by Crim, Redomega
- Playing With Dominos - Explaining some of the more confusing points about Lotus Notes/Domino, and a potential DoS email attack, by Dr. Clue
- Java Applet Hacking - Exploit password-protected web pages via information revealed inside a public Java archive file, by Xprotocol
- The Privacy Box - The purpose of this box is to add a measure of privacy to your phone calls. It does this by blocking your phone when someone else in the house picks up another phone on the same extension, by obitus
- Hacker's Information Report Issue #2 - Revised Fuschia Box
- A Student's Privacy Security Survey - Survey of private student information at California State University, Chico college and how it is protected, by Pip Macki (Mike S.)
- 2600 Marketplace
- 2600 Meetings
- Price: $5.00
- Issue's Cash Cow: (((Corporate America))) has gone mad with litigation and its obsession with the Net.
- Cover (Cover Info)
- Back Cover Global Payphones
- Taipei, Taiwan This thing truly scares us. Photo by MC Telecom
- Turku, Finland Note the funky coin mechanism on the top and the extra long cord. Photo by Chase Brown
- Freeport, Bahamas Amazing what a little color can do. Photo by Pentastuy
- Ch'ongju, South Korea There's a lot going on here. Photo by C. Jacques
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 17!
$2600 Magazine - Volume 17, Number 3 (Autumn 2000)
- A Summer of Trials - Editorial
- Kernel Modification Using LKMs - Detailed article on creating hidden loadable modules to alter a running Linux kernel, by dalai (Josh D.)
- Code: wipemod.c
- How to Hack Cyber-Time Software - Admin password hack for Cyber-Time - a Internet cafe/kiosk time usage management system, by Waphle/Managahtzul
- Target Advertising - Advertising notes and how advertising can be seen as propaganda, by Hiemlich VonScootertraus the 53rd
- An Introduction to Sprint ION - Overview of Sprint's Integrated On Demand (ION) Network voice and data system, by The Prophet
- The Geospatial Revolution - A look at using Geographical Information Systems tied with various databases (e.g. E911) and the data they provide, by Silvio Manuel
- Anomaly Detection Systems - Part 1 - Exploring the general concepts behind intrusion detection, a means of classifying intrusion detection systems, and a brief outline of a simple passive/host-based intrusion detection system on a Linux platform, by Thuull
- Hunting the Paper Carnivore - A look at the FBI's Carnivore email scanning system and how it infringes on our rights, by BrotherBen
- AskCALEA Mirror of askcalea.fbi.gov
- The Making of a Pseudo-Felon - Story of a person caught scanning for "codes" and the hell the Secret Service put him through for such a minor incident, by Brent Ranney
- Flaws in Outsourced E-Commerce Systems - Potential security problems with e-commerce sites, specifically websites which use third-party credit card processing, by Dean Swift (Dandalf, Harlesden, London, United Kingdom, Email)
- Letters - READER DROPPINGS
- How Verizon Sucks - Jeff, Kendall, Filthytot, Alterego, AM, Trouble Maker from WayBack
- More Corporate Intimidation - 7h3 31337 pHr34k4r0id, LoC, dot, robin, J-Fast, Secret Squirrel
- Answers - drakiel
- IRC Bitching - Muckraker, FLAMEcow
- H2K Videos - Hedgecore
- Questions - Phuct, kamal abbas, Theseus, Wolf
- DeCSS/MPAA/DMCA - Matt, Anonymous in Ireland, William, beezle, Brad Brown, phil, Decius 6i5 (Tom Cross), Scott, William Ryan, happitree, oddyOphile (Portland, Oregon, DOB: 05-10-1974), Quikfuze, Blanked Out, Woody
- Misconceptions - phx
- More Info - SLATAN, Will, Dave (Adelaide, Australia), jeremy, Cafeeen Boy, Mr. Roboto, Bowman, Court Jester, WStend, Immolation, kram12085, guinsu
- Bypassing Napster - Hedgecore
- Mitnick - illii, ReNt12596, Bill Dahab
- Reprinting Stuff - Jason Benton
- The Old Days - Akolade
- More Government Stupidity - Chad Ziccardi
- Bookstores - vesparado
- Observations - SuperHacker@aoI.com, COMTek, watice, Aulophobe (Phoenix, AZ), Kevin V. (Trenton, OH), Luminol, Stealth Ricochet, Queen Ann
- Lotto Fever - b0b126, DigitalZero
- The Dangers of Info - rootx11
- Phone Problems - Maria, Roark, Silverspartan
- Schools - Anonymous Hacker in England, SwordMage, YorNamHere, Herbert, SSGohan, Tweeter
- Fast Food Facts - Big Mac
- Credit Files - LoAN RAnGER (Colorado)
- Finding a Target Using DNS Lookups - A look at some DNS tooks for mapping out host and network layouts under a particular domain, by fU9A5i
- DNScape 1.1 DNScape 1.1 is a name and address search tool for Internet addresses. It can be used by system administrators to verify the configuration of DNS tables and can be used by anyone to track down pesky spammers. Just type in the IP address you find from the headers in an unwanted mail message and retrieve all the information available from DNS on that IP address. You can extract the associated mail server and send mail directly to the administrators to warn them that a spammer is using their site.
- Another Way to Defeat URL Filters - Use a host's IP decimal equivalent to bypass web filters or URL blocking software, by ASM_dood
- Code: url-filters.c
- Accessing Federal Court Records - Getting access to various public court records and using the Public Access to Court Electronic Records (PACER) system, by Iconoclast
- DNS Zone Scanning - Tips for quickly and efficiently scanning an entire network by only choosing the "important" machines, by DEFT
- DeCSS in Words - DeCSS is protected speech but the Pledge of Allegiance is not - figure that one out!, by CSS
- Build a Car Computer - Tips for build a low-cost computer/MP3 system for your vehicle, by Megatron
- 2600 Marketplace
- 2600 Meetings
- Price: $5.00
- Issue's Cash Cow: Evil Corley's Logic: Arrested walking around the RNC: BAD Arrested walking around the Capitol: GOOD
- Cover (Cover Info)
- Back Cover Worldly Payphones
- Delhi, India That's actually a water bottle stuffed down the phone's throat. People in India take a dim view of inadequate payphones. Photo by Tom Mele
- Lahure, Pakistan This phone supposedly can go anywhere. Photo by Tom Mele
- Cayman Islands From the Grand Cayman Island, this phone seems overly modern for such a tiny place. Photo by Paul Benford
- Jerusalem, Israel Phones do not misbehave here. Not with that kind of enforcement. Photo by M. Cameron Newell
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 17!
$2600 Magazine - Volume 17, Number 4 (Winter 2000-2001)
- Direction - Editorial
- Introduction to Snooping Around - Overview of basic Internet host snooping and network probing, by copycat
- BellSouth's Mobitex Network - Technical information and general overview of BellSouth's Mobitex wireless data networks, by Dspanky (Dave)
- An Introduction to Radio Scanning - Detailed guide to the basics of radio scanners, searching for new frequencies, and signal analysis, by Sam Morse
- More Java Fun - Ideas for decompiling Java applets and trying to obtain passwords via <param> tags, by FaultySignal9
- Decafe Pro Decafe Pro is the fastest Win95/98/NT decompiler for Java which reconstructs the original source code from the compiled binary class files.
- Sub7 - Usage, Prevention, Removal - Info on the Sub7 script kiddie remote administration Trojan program, by CaS
- Get Anyone's Credit Report for Free - An insider's trick for getting ahold of (other people's) credit card reports, by Renaldo
- Microsoft's Hook and Sinker - Microsoft Certified Systems Engineer (MCSE) info and questions, by LeXeR
- Hacking an NT Domain from the Desktop - Messing with Windows NT via the command line and adding yourself tot he local admin group, by Hi_RISC
- The DVD Paper Chain - DVD manufacturing info, by Common Knowledge
- Polymorphism Script - Demonstration of polymorphism in a Perl script based on the ILOVEYOU worm, by xdroop (David Mackintosh, Ottawa, Canada Twitter)
- Code polymorphism.pl
- Letters - POSTAL PROSE
- Clarifications - D. Lopez, p4
- Exciting News - Katia S. McKeever (Foster City, CA)
- The DeCSS Case - MaD-HaTTeR, Dan, Reverend Lust, Ned Flanders, aUd10phY|, eggo, Pete Davis, carpman, DG, Tony, rootx11 (Farhan Khan), Michael, Weez, jys_f, Harry, Nitehawk, KisP, n3xu56 (Sam K.), Mistral, Jakob (Denmark), hiredgun
- Hacker Ethics - Lizard, Mannequin, joshstout
- Newbies - DreyDay_33 (New York, New York)
- Hacker Fashion - Downsouth
- Scary News - Katia S. McKeever
- New Projects - s0ny, CaseTheWig
- Discoveries - buster, Colin, Kyoya san, matt (anonymous), Mr. DNA, JEM, zzflop, Dan, Big Shooter, NaterZ, Bob
- Questions - mpower, mheyes, catfood, S0J073RO, Paper
- Parallels of Oppression - Cambalache20
- Takedown Spotting - Camandrett (Argentina)
- More Corporate Evil - B.R., Byran, Rebilacx (Matt, DOB: 03-08-1980), The Dude (iamnotahacker), BizarreOne
- Annoying News - Brigit Blomme (Foster City, CA)
- Further Info - Daewoo, narce
- Suggestions - arc, Pestaline, RevZer0
- General Feedback - Manic Velocity (Salt Lake City, UT), Viaticus, KoDo, HamAZ, Enzo, TBOTe, maldoror, Stark, Phil
- The Politics of Change - BATTERY, phillippe, chrisbid, Prehistoric Net-Guy
- Schools - Aragoren, Sekicho-sensei, data refill, student #3594, JoePunk102
- Microsoftheadedness - Hermit, CB, Agentskye101, jesus X
- Spreading the Word - Kent
- Not News At All - Katia S. McKeever
- Confusing ANI and Other Phone Tricks - Explains how to bypass CLASS services, spoof ANI to AT&T 800 numbers, and make free untraceable calls, by Lucky225
- Jury Nullification and The Hacker - Jury tricks and why hackers can make good jurists and to just say "not guilty" to bullsh!t charges, by Also Sprach Zarathustra
- Cop Proof Laptops - Police car laptop computers like the PCMobile by CYCOMM, by Common Knowledge
- RadioShack's Newest Giveaway - Quick little look at the :CueCat and some usage tips, by canyoumatrix
- Dissecting Shaw's Systems - Cash register information and network layout for Shaw's supermarkets and and look at manager/employee login information, by Sect0r F4ilure
- Hacking Free ISPs Using WinDump - Hacking free or ad-based dial-up Internet services by capturing the PPP login information with WinDump, by rys
- 2600 Marketplace
- 2600 Meetings
- Price: $5.00
- Issue's Cash Cow: Kevin Mitnick
- Cover
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 17!
$2600 Magazine - Volume 18, Number 1 (Spring 2001)
- Signs of Hope - Editorial
- Police Searches of Computers - Very detailed overview of the legal procedures for police searches and warrants regarding computers and networks, by Todd Garrison (Denver, Colorado, Email, MySpace, Band Info, KC0KPN)
- The Future of PKI - Overview of the Public-Key Infrastructure (PKI) for credit and smart cards and the government's Fortezza cards, by Elite158
- PHP/CGI Vulnerabilities and Abuses - Common security holes with PHP and Perl scripts, specifically how variables are passed to PHP from the web browser, by L14
- Breaking the Windows Script Encoder - How to defeat and decode the infamous Windows Script Encoder, by Mr. Brownstone
- Code: scrdec18.c
- Code: scrdec18.exe Windows Script Decoder v1.8 (52k EXE) (Manual)
- Breaking the Windows Script Encoder 't Klaphek, Issue #6
- Microsoft Script Encoder Version 1.0 (130k EXE)
- Inside the Microsoft Script Encoder
- Soya.Encode.ScriptDecoder (JavaScript Source)
- Liberating Advants Terminals - Quick little hack for Advants Internet kiosks to replace their NetShift shell with Windows Explorer so you can run your own software, like games or a VNC server, by Loki
- A Romp Through System Security - Overview of locally and remotely securing the various services your Linux system, by Lumikant with help from Zarium
- Hacking QuickAid Internet Stations - Bug in QuickAid Internet kiosks to run Windows Explorer via WinZip, by Durkeim the Withered God
- The Billboard Liberation Front - People with too much time on their hands
- Computing with the Fabric of Reality - Overview of quantum-based computers and their applications for defeating public-key crypto, by Chris Silva (a.k.a. Sarah Jane Smith)
- Letters - SMS
- Politics - Lisa J., Ben Stragnell, Chris S.
- Random Questions - MiStReSS DiVA, Frank R. (San Antonio, TX), Equinox, Keyser Soze (Chris V.), Wax, muthu, EmptySet, Boneman, D'artagnon, haux, Philter (Chicago, IL), CyberInferno
- Ideas - Phredog@Work, Reverand_Daddy, DragonByte
- Info Hungry - Screeching Weasel
- Random Fear - Brad
- Harassment - Nate, Sam 'E', RagnSep, MajickMutex (Jenn), KNP, Corv
- Cluelessness - Parin, Randy Ford, Screamer Chaotix (Connecticut), SellOut
- Observations - C...., *31337*, Kyle, ~otacon~, RevZer0, Three, Mad Pyrotechnologist (Eric Schmiedl), Trigga Bistro, Your Mom, tnt419 (Tom M. Brady, MySpace, Toledo, OH), zerolemons, noire (Colorado), Eric, kju, almightycoop, Biohazard51 (DOB: 05-28-1988), Xian, zeitgeist (Germany), hemlock, Weez, patrick, rootx11, Sir_Poet, shader, gan0n
- Discoveries - Kal, Robb (Ireland), Splices
- Memories - Stevie B a.k.a. Blue Lightning
- Fighting Back - Scott, rene gonzalez, Marina Brown (MGN)
- Voting Ideas - SiON42, cstoll, Michael, anon
- Article Feedback - reuven, Tim, v-dick
- Fun in the Stores - xcham, AquaGlow
- Legal Questions - Joseph, Hy Stress
- Advice - noname
- Technological Nightmares - Xerxes2695, Jeffery, ^CircuiT^, Dalai, The_Chaotic_1 (Joseph, Email, DOB: 03-14-1985)
- Offerings - Simon Jester
- From The Inside - James, Eric Burns
- Secrets of Electronic Shelf Labels - A quick look at supermarket Electronic Shelf Labels, those LCD price labels which are starting to show up, by Trailblazer (Paul)
- Anomaly Detection Systems - Part 2 - Discusses different ways to accomplish anomaly detection on large heterogeneous networks cheaply and efficiently from the passive/network-based angle, and signature-based IDS systems' usage in conjunction with anomaly detection to create a well-rounded overall intrusion detection solution, by Thuull
- Strange Love - Amusing look at the Anna Kournikova Virus and how allowed the author to get in touch with people he hadn't heard from in a while, by 6M AL
- Declawing Your :CueCat - Removing the serial number from your :CueCat, by Lunius
- Declawing your :Cue:Cat Original
- Passwords on a :CueCat
- :CueCat Login Shell
- Open-Source :CueCat Software/Drivers
- Scum - Realistic-looking "fake" bill from a company called UTP Internet Business Guide
- Takedown Taken Down - Only $2600 Magazine can distort the truth about Kevin Mitnick and profit from him, by Evil Corley
- 2600 Marketplace
- 2600 Meetings
- Issue's Cash Cow: A look at $2600's DeCSS case & appeal, and how the DMCA and its effects are covered by various media.
- Cover (Cover Info)
- Back Cover Strange Looking Foreign Payphones
- Giza, Egypt Note the pyramid in the distance. Photo by Justine Lackey
- Luxor, Egypt In the Valley of the Kings. Photo by Lawrence E. Stoskopf
- Zagolsk, Russia Outside the Trinity Monastery. Photo by Katherine E. Pope
- Dar-Es-Salaam, Tanzania Photo by Alain Quackelbeen
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 18!
"Psst... Hey Kevin! Listen to me and we can both pull in six-figures a year by scaring teenage boys."
$2600 Magazine - Volume 18, Number 2 (Summer 2001)
- The Broken Wheels of Justice - Editorial
- What is Carnivore, Really? - Overview of the FBI's Carnivore electronic interception program, by Achilles Outlaw, Ph.D.
- Carnivore FAQ by Robert Graham, Version 3, October 6, 2001
- Carnivore FOIA Documents These documents have been released through a lawsuit EPIC filed against the FBI and the Department of Justice.
- Extra Polymorphic Worms - Update to xdroop's polymorphism script article and ideas to bypass detecting systems, includes example Java code, by Dr. Leovinus
- Code: ReWriter.java
- Code: RandomRunner.java
- Everything Your Parents Told You About ESS Was a Lie - A look at the 5ESS and telco system in the "modern" age, by dalai
- Michigan Memos - Internal memos from Ameritech and Ford
- How to Become a Hacker Saint - This article explains how a hacker can become an official "saint" as declared by the Pope, by J-Fast
- Misconceptions About TCP Wrappers - Overview of using and securing TCP Wrappers rules and what to watch out for, by Golden_Eternity (Blake R. Swopes, Ventura County, California, GitHub)
- TCP Wrappers Misconceptions Original
- Hacking an NT 4 Domain from the Desktop - Revisited - Example scripts to gain administrative rights on Windows NT system, then email or crack the passwords, by Hi_Risc (a.k.a. ASB)
- Code: SendEmailMessage.vbs
- Popular Myths on Password Authentication - Tips on choosing secure passwords, use your head and consider the statistics, the sensitivity of the resources which you are trying to protect, and your user base, by Stephen Thomas
- Exploring HP-UX Password Schemes - Overview of the "Trusted Systems" protected password database scheme under HP-UX 10.x, by Alex
- Trusted System vs Non-Trusted System
- Managing Systems and Workgroups A Guide for HP-UX System Administrators - Edition 7 (HP Part No. 5990-8172) (HTML Version)
- Letters - THE INBOX
- DeCSS Fallout - gc, Anonymous Reader, Clown Father, Xerock, Avon, yonder, jeff weems, djeaux, Brian
- Bypassing Restrictions - mkr08, HacKz_jEEveZ, F.H., Av1d
- Spying - R Otterbine, The_Chaotic_1
- School Stupidity - Wetwarez, Newzweak, Phredog, Sam S., mr self destruct
- Real World Stupidity - dc66, Tizal, The Colonel, zeigeist, phobik, Chewie, Joe, Ray
- Appreciation - TwistedGreen (Donna Murawski, Windsor, Ontario), civilsurveydraft, nomad, Danny, Waldo, Cunning Linguist (Jeff Strauss), Ford Prefect, Sate, Thomas
- Individual Perspectives - KHD, Gil Young, kate, kaH220
- Clarification - kaige, Shadow Freq, Mike Walton, Qblade, Anonymous, Jeff, Dan, Scabby, Mike
- Questions - Neo, IM_Ruse, Mike G., SPAMLord, BillyNo, IceBlast, Double Helix, grant welch, Mikko, Peter, Kn0w, quatre
- Corporate Stupidity - 7h3 31337 pHr34k4z0id, Tony, Newspimp, niihon, litze, Thomas
- Discoveries - LazerBeamX, ryanx7, Cyrus, Morn_Star, SkorpiosDeath, toast666
- Issue Problems - doug, I1269U, Jizzbug
- Napster Alternatives - Shawn
- Counterpoint - Bob, Steve
- An Idea - My Name is Joe!
- Voter Education - Poll Watcher
- A Call To Arms - ICFN PMP
- AOL @SCHOOL - Nice little trick where you can grab your school's AOL @SCHOOL serial number/signon code, then login from home and create a new account so you can have unrestricted @SCHOOL access for yourself at school, by The Datapharmer
- Fun With Fortres - Messing with Fortres 101 Windows security program, by Amatus (David Barksdale, Email #2)
- Fortres Hacking by Amatus
- DeFortres.zip
- fortres.c Part of Amatus' fortres.cgi - a CGI application for decrypting administrator passwords for disabling Fortres.
- AT&T @Home - Info on AT&T @Home Internet services from a first-level tech support operator, by m0rtis (Daniel R. Wright)
- The New AT&T Network - Overview of AT&T's long-distance network updates after the article "ANI Spoofing" appeared, by Lucky225
- Tellme: Uses and Abuses - Using and abusing the various Tellme specialized in telephone-based applications, by Screamer Chaotix (Bridgeport, Connecticut, Email #1, Email #2, Frequency, YouTube Channel)
- Snooping the Stack - A look at some common TCP/IP analysis tools for "snooping" and "footprinting" hosts on the Internet, by ThinkT4nk (Ryan McGowan, St. Louis, Missouri, Email #2)
- 2600 Marketplace
- 2600 Meetings
- Issue's Cash Cow: These idiots actually think registering stupid domain names has something to do with hacking
- Cover (Cover Info)
- Back Cover Strange Looking Foreign Payphones
- Kusadasi, Turkey Said to be near presumed historical House of the Virgin Mary. Verizon phones never get to make claims like that. Photo by Richard Bejtlich
- Sogut Island, Turkey No maior religious icons in sight but this is rumored to be the only such phone on the island, which has less than 300 inhabitants. Photo by by Paul Pate
- Luqa, Malta Baby blue phone found at the Malta International Airport. Photo by A. Evans
- Gzira, Malta Variations on a theme. Note the near identical features to the blue model. Photo by A. Evans
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 18!
$2600 Magazine - Volume 18, Number 3 (Autumn 2001)
- Consequences - Editorial
- Deconstructing a Fortres - Overview of Fortres 101 version 4 security software and some potential ideas for bypassing it, by Acidus (Billy Hoffman, Atlanta, Georgia, Pic, Blog, Email #1)
- Passport Hacking - This article introduces a security vulnerability in Microsoft Passport, specific details explaining how to compromise a user's Passport account as well as example code, by Chris Shiflett (Boulder, Colorado, Email, Twitter)
- How to Decrypt DirecTV - How to decode DirecTV satellite signals using H-cards, by Clovis (Louis Edward Trumpbour)
- DSS Test Cards Buyer's FAQ Version 1.0 (May 15, 1998)
- The DSS Underground Programming Guide
- The DSS Underground Basic Unlooper Guide
- H Cards and You: The H Card Hacking FAQ
- The History of DSS Hacking
- For Nearly 10 Years I Operated a Satellite TV Hacking Network Anonymously from South East Asia
- Dennis Megarry Affidavit
- How to Reverse-Engineer a Satellite TV Smart Card
- Satellite Hackers Bible The elite satellite hackers techniques from the year 2000 to 2010 are covered in this special muti-chapter presentation.
- DSS Emulation Information
- Code Red 2 - Or how to anonymously get root on 250,000 machines overnight by remotely accessing Code Red infected computers, by Braddock Gaskill (Baltimore, Maryland, Email, W3BCV)
- Republishing the Rules - The Ultimate DRM Hack - Overview of the different types of Digital Rights Management (DRM) systems and the need to push for an open-source solution before the technology gets hijacked, by The Walrus
- DecloQing Copy Protection - Patch to cdparanoia to bypass the MediaCloQ anti-ripping feature, by Pack Rat Sam
- Hacking Time - Overview and hacking potential Qqest ETC-series dial-up employee time clock machines, by HoTsAbI
- Using the Model ETC 100 Time Clock
- Using the Model IQ 500 IntelliClock
- Qqest Time Force II Hardware Guide
- Myths About TCP Spoofing - Some myths surrounding IP spoofing attacks being able to cover your tracks, by Grandmaster Plague (Evan Sparks)
- Various Network Tools by CyberPsychotic
- Playing with Qwest DSL - Overview of Qwest DSL Internet service, by phobik
- Cisco 600 Series Installation and Operation Guide July 2000
- Cisco Broadband Operating System Commands v2.4
- Cisco Broadband Operating System User Guide (HTML Version)
- Defeating Intrusion Detection Systems - Tips and Perl scripts for port scanner that can defeat certain IDS settings or work over proxies, by SnakeByte (Eric Sesterhenn)
- Code: sockscan.pl
- Code: sockscan2.pl
- Code: wingate-scan.pl
- Code: portscan-over-http-proxy.pl
- Letters - fine print
- People Power - zenunit
- The Mass Culture - psycho-mantis, Spacemonkey6945
- Scams - Slam
- Politics - Jonathan Fredericksen
- Guns - clvr_handl, Tozetre, Don, William R. Epp (Email #1)
- Questions - Adam J., Steven, Gzamay, jeff, Conscience, studin, E, Alexander, R3dO (Lithuania), Reinaldo, IncogX (Marcus Anderson), argie1607, Marc
- Concerns - Gino, Net Admin, stufff, Pete, Doc Kennedy
- More Info - Hugh G. Rection, phix, hanoverfist, Ben Sherits, bd, Rogue, EnochRoot, ryno
- Injustices - chromosome fortyseven, fuzzhack, kloXTicToX, Sab0tage, Ben, DiabolicEdict (Lewisville, TX), Joe Newman, tek_guy, Crazy K
- Data - Dco, medik
- Appreciation - JohnG54429, Josef Trimpert, Akolade, ratner, Omega Red, iceplant999 (Paul), Michael Piacsek (South Africa)
- Article Feedback - Eric Lippert, ive
- Surprises - binary, Iamnoone, Bill
- Quest For Knowledge - Interested, covertuw, David R.
- Satellite Watch - Burgy, Mangaburn, brian
- A Handy Tip - Anthony
- The Evils of Microsoft - Avon, Iceplant999, Daewoo
- Just Plain Evil - Speed Racer
- Just Plain Stupid - lunius
- An Idea - Trent
- Compromising Internet Appliances - A look at hacking Internet connected household appliances and their ability to cause physical harm, by Plex Inphiniti
- An Introduction to ARP Spoofing - Good overview of ARP spoofing, a method of exploiting the interaction of IP and the Ethernet protocols, by Sean Whalen
- An Introduction to ARP Spoofing Original (v1.8)
- An Introduction to ARP Spoofing Slides
- Offset Hacking - Story of a person "banned" for apparently using in-memory hex editing during a game of EverQuest, by Darbyersh
- The Invisible Box - The Invisible Box will make it so that when you pick up an extension phone on your phone line, any of those "in-use" lights that alert if an extension phone is picked up won't light, by Lucky225
- Bypassing Cisco Router Passwords - How to bypass the passwords on Cisco 2500/2600-series router, by Nickels 1
- Bypassing Cisco Router Passwords Original
- Hacking Retail Hardware - A closer look at VeriFone PINPad 1000 and the PIN pads used at Walmart and QuickScribe kiosks, by dual_parallel (Mike, Phoenix, Arizona)
- Hacking KODAK Picture Maker - Tips to obtain the printing or setup passwords on a KODAK picture kiosk and using your own floppy, by deadkode
- Netjacking for Complete Idiots - Introductory look at intercepting 802.11b Wi-Fi traffic and using other people's networks, by Dark Overlord of the DoC (Peter M. Shipley, DOB: 09-30-1965, Berkeley, California)
- Exploiting Intelligent Peripherals - Scanning for HP JetDirect printers with wide-open programming ports, by Screamer Chaotix
- Exploiting Intelligent Peripherals Original
- 2600 Marketplace
- 2600 Meetings
- Issue's Cash Cow: Robert S. Mueller is a horribe person, constant liar, and a tool for the deep-state. Why does Evil Corley keep supporting him? Also, blame everyone but the terrorists, typical.
- Cover (Cover Info)
- Back Inside Foreign Phones
- Malta Rather different than the ones featured in the last issue. Photo by Bill Raynault
- Peru Found at the airport in Iquitos, the largest city on the Amazon River. Photo by by Raven
- Russia #1 From remote Ussuriysk, north of Vladivostok in the Primorsky Krai territory in the far eastern part of the country. We suspect it would be hard to find our magazine there. Photo by Tresa Thompson
- Russia #2 " Photo by Tresa Thompson
- Back Cover Foreign Phones
- Cambodia #1 A card phone in a busy street in Battambang Photo by Eric Tucker
- Cambodia #2 Another card phone from the capital city of Phnom Penh. It's rumored that there are no coin phones at all in this country. Photo by by Eric Tucker
- Greece #1 Found in the small Greek village of Milies. Photo by John Klacsmann
- Greece #2 From the village of Makrinitsa. We hope that isn't a speaker behind the grill above the phone since it looks like it would easily deafen anyone standing there. Photo by John Klacsmann
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 18!
$2600 Magazine - Volume 18, Number 4 (Winter 2001-2002)
- 2001-2002 - Editorial
- The Security of the Inferno OS - Security semantics of Vita Nuova's Inferno OS, including a password cracker and the ability to break out a shell on the emulator's host, by dalai
- The Security of Inferno OS Original
- hellfire.b Inferno password cracker.
- clogon.b Inferno command line program to change user.
- Inferno Programmer's Guide
- Futuristic OS? by Oscar A. Tobar
- An Analysis of Inferno and Limbo by Kim Nyberg
- Inferno Reference Manual
- BlackICE Defender - a Personal Firewall - Overview and install how-to for Black Ice Defender, by Suicidal_251
- BlackICE Defender User Guide Version 1.0
- BlackICE Defender User Guide Version 2.9
- BlackICE Pro User Guide Version 2.0
- BlackICE Basic Release 1.9.21 LE (Help File)
- BlackICE Defender Version 2.5.chE
- The Future of Enhanced 911 - Implementing cellular E911 and GPS location, by Wumpus Hunter
- Behind the Scenes on a Web Page - Very detailed overview of how a web server works and the client/server relationship, and how those nasty ads are served, by angelazaharia (Angela Zaharia)
- Cracking Clever Content - How to bypass Clever Content, which is software designed to prevent the saving of images and PDF documents from webpages, by Tokachu
- Right-Click Suppression - Code to add right-click suppression to your webpage and how to bypass it, by Rob Rohan
- Fun With RadioShack - General overview of the Canadian RadioShack kiosks and a method of breaking out of the software, by Cunning Linguist (Jeff Strauss)
- Building a Floppy Based Router - Overview of building an Internet router using an old 386+ computer with only a floppy drive, two NICs, and Coyote Linux, by netfreak
- Build a Wooden Computer - Coll little project to build a computer case out of wood, by Elite158 (Joerg Kurt Wegner)
- Harnessing the Airwaves - Introduction and overview of low-power "pirate" radio, by Mark12085 (Mark)
- Secrets of Rogers@Home - Behind the scenes at Canada's Rogers@Home Internet services by a former tech supervisor, by Gr@ve_Rose (Sean Murray-Ford)
- Basics on Answering Machine Hacking - More information on hacking answering machines and VMBs, and a cool hack using long strings of 2- & 3-digit numbers, by horrid
- Letters - still legal thoughts
- Ideas - Mitchell_pgh (Richard Mitchell), FlashARK, Tresser McKay
- Prison Life - //buddha
- School Life - christian, risus sardonicus, bb_student, Maniac_Dan, DeftonesGuy0183
- Corporate Life - Hex
- Observations - fuzzy, mAd-1, Muchocaca, Silent, Chase "Michael Kenyon" Brown, Osi44 (Argentina), Evil_Monkey, Yonder, lord ice, Johnny C., Cody, DJBusyB (MySpace), Anon O Mous, Mark12085, Felix, Andrew Holt, mickeym
- Politics - G. Conterio, American citizen residing abroad
- Con Jobs - ns, sxpert
- Morale Boosts - S, David Middleton (Cobra2411, Philadelphia, PA), LanZfreak
- More Info - No Name, g0 seigen, meowmixman, Lucifier Messiah (Anarkick Systems), Anonymous, Phate, Kingpin, Cudabean
- Quest For Knowledge - dmitry kostyuk
- Old-School Perspective - Primenumber
- Film Update - DQ
- Hacker Pedestals - chris s
- Questions - sk, Halo Nine, Zach, K0ldshadow, Phaceoff, Ghost007, Lunchbox (a.k.a. King of Lag)
- Signs of Hope - Silent Transgressor, Sean
- Thoughts on 9/11 - Thinking, voice of reason, Re-LoaD, Waldo (East Lansing, MI), The_Chaotic_1, joeman, A C, RenderMan (Brad Haines), noire, Island Boy
- Response To Criticism - DarkBlayd, Phyt3b4ck
- Legal Nonsense - Danny, Sazook, Dan, pa
- Suggestions For Newbies - Funkstrings
- More on Telemarketing - Vengul Ator
- Camera Crap - CyBeRJaK
- Labels - The Zygote Killa
- Hacking the Highway - Hacking those ADDCO road sign trailers, by mennonite
- ADDCO BRICKBuilder v2.6.1
- How to Hack from a RAM Disk - Setting up Cenatek's RAMDisk9x/Me in order to running programs (and swap) in a RAM disk for both security and speed, by Nv
- Hacking with Samba - Overview of port scanning, and exploiting, open Samba shares and servers, by dknfy
- Fun Facts About Walmart - A look at the customer terminals, handheld price scanner, and EAS system at Walmart stores, by A.W.M.
- IIS - Far from Unhackable - hacking Microsoft IIS web servers via unicode exploits, by xile
- IIS Unicode Exploit
- IIS Unicode by rain forest puppy
- Examining Student Databases - Story of "accidently" accessing potentially confidential data in a university student databases, by Screamer Chaotix
- 2600 Marketplace
- 2600 Meetings
- Issue's Cash Cow: 2001 had been a most difficult year for hacker in so many ways.
- Cover (Cover Info)
- Back Inside Payphones of Countries We're Mad At Part One: Cuba
- Cuba #1 A popular payphone kiosk in Havana. And that's not an ad for sneakers in the background. Photo by T. Mele
- Cuba #2 ETECSA is Cuba's state-owned phone company. This phone in Havana takes smartcards. Photo by Pawel Krewin
- Cuba #3 Another model that's real high tech found in Regla Photo by T. Mele
- Back Cover Payphones of Countries We're Mad At Part Two: Iran
- Iran #1 In the holy city of Qom, this rather advanced card reader phone takes something called "kart atabar." Photo by Phundisk
- Iran #2 This your basic payphone found all over Iran - this one was in Rasht. The instructions make it real simple. The Touch-Tone pad could be a bit smaller though. Photo by Phundisk
- Iran #3 Found in Delijan, this green monster is so haunting it will visit you in your dreams. It's got so much personality plus you can hang a painting on the front of it. There are two coin slots for each type of coin and the amount is displayed in the box on the upper left. Photo by Phundisk
- Iran #4 At first glance you might think this wasn't a payphone at all. You'd be wrong. Found by a Ghazian gas station, this phone has a slide coin chamber which would last about 30 seconds in the States. Photo by Phundisk
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 18!
$2600 Magazine - Volume 19, Number 1 (Spring 2002)
- Time To Care - Editorial
- Transaction-Based Systems - Overview and potential security holes in transaction-based (online) ordering systems, by StankDawg
- How to Regain Privacy on the Net - Tips for managing cookies, web bugs, spyware, etc. in Netscape and Internet Explorer, by Boris Loza (Toronto, Canada)
- Stupid Google Tricks - How to search for specific file extensions/types or search within certain websites when using Google, by Particle Bored (Cory Bys, Email)
- Neat Stuff with Switchboard.com - Searching for public & private information with Switchboard.com, by Cunning Linguist (Jeff Strauss)
- Poor Man's 3D - Really cool idea for using cheap comic book 3D glasses with Winamp's AVS to make a realistic 3D audio spectrum analyzer, by diabolik (DJ Diabolik)
- Poor Man's 3D: Winamp AVS Presets
- SuperScope... Any Help Out There?
- Winamp AVS Pixel Vectorscope Example
- AppleTalk Security Secrets - How to remove the Appleshare client's ability to authenticate against a server using passwords which get sent in cleartext, by Steven Kreuzer
- The Definitive Guide to Phreak Boxes - Brief overview of each the phone phreak's "color" boxes, by Elf Qrin (Valerio Capello)
- The Definitive Guide to Phreak Boxes Original
- The Bungee Box - Simple modification to add a retractable cord to your Beige Box, by Captain B
- CampusWide Wide Open - Very good article on the AT&T/Blackboard CampusWide ID card system and a potential security exploit, by Acidus
- CampusWide Wide Open Original
- Acidus' CampusWide Archive
- AT&T CampusWide Access Solutions Frequencies FCC ID: WPHF476
- AT&T to Facilitate Tech's All-Campus Card system
- Cease and Desist Letter Sent to Interz0ne II
- Blackboard Campus IDs: Security Thru Cease & Desist via Slashdot
- CampusWide Chronicles Vol. 1, Issue 1 (March 2000)
- CampusWide Chronicles Vol. 1, Issue 2 (April 2000)
- CampusWide Chronicles Vol. 1, Issue 3 (July 2000)
- Idiocy in the Telcos - Confusion for customer's using directory assistance with today's phone companies, by The Cheshire Catalyst
- Idiocy at the Telcos Original
- Letters - Backtalk
- Signs of Hope - Breto, avatar
- Higher Education - A7th, StMike
- Help Wanted - Mingus, Asbigassex@aol.com, HSFk2
- Corrupting Youth - ex_chronos (Reno, NV)
- Miscellaneous Info - ~dissoluten, Empty Set, Raleigh Cross, Revanant, Doodle, Random Jubatus (Jeremy Whelchel)
- Answers Needed - Rick Olson (Fluffy, Vista, CA), Johnny, haux, Bill Boyle, Anti-Christ, lop, Drew, SuperGuido, Crim, Kaoslord (Guillermo Roditi, Fort Lauderdale, FL)
- Complaints - john smith (California), tHr13z3, Binary Burnout
- Worries - Mr. Brown, 3-Com, Silent
- Ideas - Drwar
- More Politics - Mike S. Lorrey (Retroman), Jon McLaughlin, Joseph McLeod, SKZ
- Observations - noire, Gustaf, psyk0mantis, bluness, Herman, Cody Beeson (Yuma, AZ), DephKon1 (Phil Nolan, Will Ohmsford), dougk_ff7 (Doug Kelly), Suicidal, Phookadude (Patrick Moore, Topeka, KS), Two Avocados
- The World of Retail - TheDude (Sacramento, CA)
- Injustice - Scott Moulton (Court Case), ht, Anthony D. Bower, Johnny Slash, Nicolai, Sunfist, Ghent (Branden Hancock), johnnyfulcrum (Johnny Fulcrum), Polar Mike, Jeremy M Lang
- Corporate Corruption - ~toast666, vidic0n (Canada), Robert Williams, c0d3wr3ck3r (Eric), nomotion, Dash Interrupt, Brad
- Article Feedback - MSM, Kurt Winter, ascii32, ted, P4R4d0x, Scott, Emre Yucel (amoeba1911, Cincinnati, OH), InternetGoddess, Steven Richards
- Tracking Terrorists - Chris, Dan
- Creative Cable Modem Configuration - Overview of cable modem configurations and DOCSIS information, and the potential to edit the modem's configuration file to remove data caps or rate limiting, by Pankaj Arora
- Fun Password Facts - Overview of different password combinations including using ASCII control characters, by hairball (New Kensington, Pennsylvania)
- Defeating Network Address Translation - Defeat a NAT by redirecting ports via an unsecure router, by g00gleminer
- NSI Abuse - Network Solutions not following their own rules regarding expired domains, by Chris Byrnes
- The Threat of a Lazy Admin - On why you should secure all sides of your network, the Internet-facing side and the local router/switch side, by Javier O. (Javier Ortega)
- A Script for the Right-Click Suppressed - Example Perl script to grab images/files from websites which block right-clicks, by Pete
- Code: isninja.pl
- Retail Hardware Revisited - A look at the checkout PIN pads used by Walmart and Kmart, and a look at Kmart's in-store BlueLight app computers, by dual_parallel
- More RadioShack Facts - Overview of the Microsoft Internet Center in-store kiosk at RadioShack peddling MSN, and a look at that stupid name database, by c3llph
- RadioShack's All ZIP Code Program & Data File v4.00.00 (June 7, 2004)
- RadioShack Adds Microsoft Net Kiosks to Stores
- 2600 Marketplace
- 2600 Meetings
- Price: $5.00
- Issue's Cash Cow: Looking at DMCA, WIPO, CARP, COPA, CDA, PATRIOT Act, and a bunch of Hillary Clinton voters complaining about "big government" - you can't make this stuff up!
- Cover (Cover Info)
- Back Inside Dutch Payphones
- Amsterdam #1 Increasingly hard to find, this phone only accepts coins. Photo by Daniel Langdon Jones
- Amsterdam #2 Increasingly easy to find, this phone doesn't accept coins. Photo by Daniel Langdon Jones
- Rotterdam #1 A Telfort phone that takes both coins and cards. Photo by Daniel Langdon Jones
- Rotterdam #2 Probably best not to ask. Photo by Daniel Langdon Jones
- Back Cover More Foreign Payphones
- Phnom Penh, Cambodia #1 A card-only phone. Photo by John Bullock
- Phnom Penh, Cambodia #2 Close-up view. Photo by John Bullock
- Willemstad, Curacao A shape and color so rarely seen in the States. Photo Phillip Bettac Zoufal
- Kyiv, Ukraine This rotary phone is said to only take pre-paid smart cards, although it's rather hard to figure out where they would go. Photo by an anonymous Canadian
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 19!
$2600 Magazine - Volume 19, Number 2 (Summer 2002)
- Fair Use and Abuse - Editorial
- The Comprehensive Guide to 802.11b Wireless Networks - Good overview of the 802.11 (Wi-Fi) wireless protocol and networks, by Dragorn (Michael Kershaw, Email, GitHub)
- How to Break Through a Proxy or Firewall - How to break through a firewall or proxy by using SSH tunneling, by unformed
- Corkscrew Corkscrew is a tool for tunneling SSH through HTTP proxies.
- A Nasty NT Bug - How to kill a NT machine with only three lines of C code, by HJH
- How to Crash Windows XP
- The CSRSS Backspace Bug in Windows NT 4/NT 2000/NT XP
- W2K/XP Hangs with "TAB BS BS" on Console
- A Look Back - Story of the old hacker days and to become a leader of the ignorant, not their enemy, by Dufu (Joe Agro, Millington, New Jersey)
- Grab That Cache - Perl script to collect and view images in a Netscape web browser's cache, by David Nicol (Kansas City, Missouri)
- Code: grabcache.pl
- The End of an Era - AT&T's retirement (or not) of ACTS and the end of Red Boxing as we know it, by Lucky225
- redboxatt.ogg A recording of the announcement stating that AT&T will no longer be accepting coins from payphones as a form of payment for long distance calls.
- Older Technology Payphones Soon Will Go "Coin Less" for AT&T Long Distance Calls
- NCR ATMs - Aurum Ex Machina - Detailed overview of the computer and operating system in NCR personaS88 ATMs, by Acidus
- The Afghan Phone System - An overview of the post-9/11 phone system in Afghanistan, by Iconoclast
- Yet Another Way to Defeat URL Filters - Program to bypass URL filtering by generating "decimal" versions of IP addresses, by ThermoFish (James Wood, Bristow, Virginia)
- Code: host2dec.cpp
- Getting Into Cisco Routers - Overview of attacking Cisco routers via a ping flood to force it into its "safe mode," by Grandmaster Plague
- A New Era of Telecommunications Surveillance - Overview of post-9/11 telecommunications surveillance with a good look at the FBI's CALEA, by The Prophet
- Web Server Discovery Tool - Simple and quick Perl script for scanning hosts for ports serving websites, by Boris Loza
- Code: ws.pl
- Letters - Input
- Darwin Awards - CrashPlastic, JohnnyD, Carter (U.K.), John Fannin, THE COMMON SENCE!, Nick Fury, Fisqual, RW
- Questions - Ricardo (Brazil), marblehead, MW, gomma, fallout, psi, Mark12085
- Privacy Issues - Godless Phreak, bear, thoughtcrime
- Feedback - gir, Buster Doney, Silent, Rat, Grey Frequency (New York, DOB: 09-03-1978, Twitter), lunius, ThieF, Klep, James, Mike K, Ninjak, fremont_dslam (Fremont, CA), blind, littlegreenguy, Suicidal, Kronikal, Czar Donic, Junglee, Aaron, Kristopher Barrett, Manic Velocity, CK
- Trash - captain_b
- Revenge - deadkode, brujo
- Help - Terrance, Adam from Ontario, Alice
- 4/1/2 - Bob Smellicular, Nothing None
- Education - Wild Karrde (Cottage Grove, Oregon), Windwalker
- Weird Stuff - soloha
- Fun Stuff - Gary (Japan)
- More Info - maldoror (Tampa, FL), Bildo, phlux, drew
- Issues - vroman, Craig, jesse s., American Citizen Living Abroad
- Retail - DEESil, fuzzhack, Angela, Moon Knight, Signal9, Neo Retrospect
- Solutions - husam, quel
- More Corporate Abuse - Peter
- Observations - drenehtsral (Lar Friend, Ithaca, New York), William Rudek, Erovi, zanar (Australia), Rabid, Super-Fly, pa, phobik, Methaline, xcham, aimfan69
- Your Eyes Have Just Been Sold - Behind the scenes information on what it takes to serve DoubleClick web ads, by docburton
- Dumpster Diving: One Man's Trash - A collection of tips which are good for the beginner or experienced undocumented garbage collector, by Grifter (Salt Lake City, Utah)
- Dumpster Diving: One Man's Trash... Original
- Mind Tricks - This article shows you how easy it is to make people do and think what you want, beyond the standard concepts of asking certain questions to obtain the information you seek, by Tazz Shippensburg
- Review: Hacker Culture - Book review of Douglas Thomas' Hacker Culture, by Ben McCorkle (Marion, Ohio)
- Testimony for the Committee on Government Reform's Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations Cyber Terrorism and Critical Infrastructure Protection by Douglas Thomas (July 24, 2002)
- CBDTPA: Yet Another Privacy Concern - Info on the Consumer Broadband and Digital Television Promotion Act, by area_51
- NULL Sessions and Enumeration - Information on exploiting Windows NULL sessions, which are "hidden" connections to Windows shares with no username or password, by AcidFlame
- 2600 Marketplace
- 2600 Meetings
- Price: $5.00
- Issue's Cash Cow: DMCA, stealing movies & music is O.K.
- Cover (Cover Info)
- Back Inside Spanish Payphones
- Barcelona #1 This phone could easily be mistaken for a UFO. Photo by h4h
- Barcelona #2 A payphone from one of the other phone companies. Photo by h4h
- Barcelona #3 We can only guess that there was a heated argument on this phone. Photo by h4h
- Barcelona #4 At the train station. Photo by h4h
- Back Cover Australisn Payphones
- Concord One of the really old payphones with rotary dials. Photo by Patrick Webster
- Sydney #1 One of the new payphones found in shopping malls. Operated by TriTel. Photo by Patrick Webster
- Sydney #2 Typical Telstra payphones. Can you tell which scene of The Matrix was filmed here? Photo by Patrick Webster
- Burwood A closer view of a Telstra (formerly Telecom Australia) phone. Photo by Patrick Webster
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 19!
$2600 Magazine - Volume 19, Number 3 (Autumn 2002)
- Freedom's Biggest Enemy - Editorial
- Lawfully Authorized Electronic Surveillance - Communications Assistance for Law Enforcement Act overview and notes, by Mystic (Andrew Lowe, Santa Cruz, California, GitHub, Twitter)
- Introduction to Lawfully Authorized Electronic Surveillance (LAES) Original, Phrack, Issue #60
- AskCALEA Mirror of askcalea.fbi.gov
- Can They Hear Me Now? A security analysis of law enforcement wiretaps, by Matt Blaze
- The Mysterious World of the LERG - Definitions of some Local Exchange Routing Guide (LERG) terms, by Tom Morrow 3.0
- LERG Routing Guide Specifications (2020)
- LERG Routing Guide General Information (2002)
- Central Office Code (NXX) Assignment Guidelines INC 95-0407-008
- NPA/NXX Activity Guide Vol. 12, Issue 6 (June 1, 2002) (README)
- TeleZapper, Telemarketers, and the TCPA - General overview of the TeleZapper device, the SIT tone, and some tips on how to stop being contacted by telemarketers, by bland_inquisitor
- A Password Grabbing Attempt - Perl script to generate a fake "error message" in an attempt to capture the user's password, by Gr@ve_Rose
- Code: passgrab.pl
- Advanced Password Recovery - Password cracking tips, by Galahad
- Advanced Password Recovery Original
- Fun Password Facts Revisited - The dangers of using weak passwords as they are more easy to brute-force than you think, and why you should use Password Safe to safely store them, by kaige
- Hacking on Vacation - A look at Disney World's FastPass ticket system and some other technical adventures (Antenna Audio) to look for while on vacation, by Eric
- Your Guide to Target - Overview of the cash registers, POS software, and login information used at Target stores, by Code0
- Outsmarting Blockbuster - Social engineering Blockbuster to get out of late fees, by Maniac_Dan (Dan McAloon)
- The New Card Up DirecTV's Sleeve - A look at the various generations of DirecTV's satellite receiver smart cards, by Mangaburn
- DirecTV's Secret War on Hackers
- From the Eye of a Legal Storm, Murdoch's Satellite-TV Hacker Tells All
- The Pewter Box - Turn an old hard drive into a speaker, by Mark12085
- How to Log URL Request Strings - Article and code overview for a program to display and log all URL requests from Internet Explorer, by LiquidBinary (Mike Leonguerrero)
- Code: IE_spy.c
- Code: IE_Spy.exe
- URLlogger.zip (LogIEUrlrRequests.exe)
- Letters - Missives
- Discoveries - Eric, NilObject, BF, fatdave (MySpace, De Forest, WI), Jonathan, drlecter
- Meeting Issues - Blue Canary (Laguna Niguel, CA)
- Ideas - Elstun, Bac, David Parker, Jeremy
- Unease - 24CORE, Wyatt, David, cerebrum86 (DOB: 07-16-1986), Nicker (Canada), GnuHal & GnuWopr (Spain), Hualon, Peter (j0lt) Truth
- Getting Around the System - NcongruNt (John Menke, Austin, TX, MySpace, DOB: 09-16-1978), Folkert van Heusden (Netherlands), Doug
- Words of Thanks - nuclear_decay, strupp, Galaxyhq, Mobius, Fr33d0mFiteR, Zapphire, Netrunner
- Critique - Greg (Golden, CO), execute aka Ex3cut3, Chris, rootx11
- The Hacker Ethic - anonymous, Rob T. Firefly (Rob Vincent, MySpace)
- Questions - ng, sergio, Cybersavior, tyg0n, Tony, 'Notary Public', Steve, Chris Hanks, Razorface, drlecter, James
- Problems - echolon, Jeff (London, Ontario), VanEck, your_uncle_vinny (Maine), Wendy (Lakeland, FL)
- The School System - ThyF, PSX00 (Michael J. Moro, Waukesha, WI), JavaJacker (Dallas, TX), MacAllah
- Something Positive - Veg, JL (Arvada, CO), Y2kbug, bernz, bradsnet, Buzzter66 (Houston, TX), James
- Further Info - Karl, Andrew, rook, Fractal, Ion, Steven, Jennifer, Toph
- A History of "31337SP34K" - Explaining to a new generation of hakkerz into what "elite speak" is, where it came from, and when (and if) to use it, by StankDawg
- Hardware Broadband Client Monitoring - An Overview - A look at the possiblity of telco/ISP monitoring of your DSL traffic and ways to prevent that, by psyk0mantis (Email)
- How to Set Up a Free (Secure!) Web Server at Home - How to hide a web server (TinyWeb) on a Windows server on a household cable/DSL connection, by Khoder bin Hakkin
- A Word of Warning from a Caught Uncapper - Story of a caught cable modem "uncapper" who was nearly criminally charged and how it's not really worth it, in the long run, by Kris Olson
- Hacking Electronic Message Centers - A detailed look at the hardware and software used by those popular Electronic Display Systems' electronic message signs, by Mr. Glenn Frog
- Breaking Down the Dynix Door - How to harass those poor old librarians who didn't lock down their Dynix Automated Library Systems, by iCe799 (Joe Damato?, Email #2)
- The Current State of E-Commerce Security - A real-world example of exploiting e-commerce website "shopping cart" security issues via client-side editing of sent HTML data, by Derek P. Moore (Email, GitHub, Twitter, Resume)
- Review: The Art of Deception - Book review of Kevin Mitnick's The Art of Deception, by Evil Corley
- 2600 Marketplace
- 2600 Meetings
- Issue's Cash Cow: How the (((mass media))) manipulates what we see and hear and the FBI now going after "cyber-based attacks and high technology crimes."
- Cover (Cover Info)
- Back Inside Scottish Payphones
- Luss #1 This phone takes both cards and coins. Photo by John Klacsmann
- Luss #2 This is the card-only version. Photo by John Klacsmann
- Edinburgh A "mini" payphone that takes cards and coins. Note the coin drawer at the bottom. Photo by John Klacsmann
- Dundee #4 This is a high-tech Internet phone that takes cards and coins. Judging from the size of the coinbox below, the rates aren't cheap. Photo by John Klacsmann
- Back Cover Netherlands Antilles Payphones
- Island of Bonaire #1 This phone looks a little short for a payphone. Photo by Will Ellis-Adams
- Island of Bonaire #2 Looking closer, we can see that this is a card-only phone with the coin return and coin box missing, which is why it seems so squat. Photo by Will Ellis-Adams
- Island of Bonaire #3 Another weird looking model which doesn't appear to take coins OR cards. (Or pre-paid calling cards.) Photo by Will Ellis-Adams
- Island of Bonaire #4 This is the weirdest yet! It looks like someone just replaced the payphone with a white deskphone. Try doing THAT in the USA. Photo by Patrick Webster
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 19!
$2600 Magazine - Volume 19, Number 4 (Winter 2002-2003)
- Positivity - Editorial
- Passport Hacking Revisited - Vulnerability in Microsoft Passport due to its complete dependence on cookies, by Chris Shiflett
- Passport Hacking Revisited Original
- Lazy Exchange Admins - Security holes in Microsoft Exchange servers - including a way to remotely crash them and guessing the administrator account address, by ddShelby (George M., Savannah, Georgia)
- Warspying - Utilize a portable X10 video receiver to scan for wireless X10 cameras, VCR, or cable TV connections, by Particle Bored
- CD Media Data Destruction - A look at what it would take to properly physically destroy a CD-ROM/RW/Rs, by Gr3y t0qu3
- How to Make a DVD Backup - Very good and detailed article on the steps and software required to properly rip, copy, and encode DVDs, by Maniac_Dan
- Honeypots: Building the Better Hacker - Overview of using computer honeypots and how they may not always be practical in stopping (or exposing) a really dedicated attacker, by Bland Inquisitor
- DNS Redirection Stopped - Example HTML script and VB program to check the web browser's sent "host" via the HTTP request, and redirect the query to a different host if necessary, by c0ld_b00t
- Code: dns-redirect.vb
- More on Telemarketing - More tricks for defeating telemarketers, by D. Foetus (D.L. Jones)
- Cracking Voter Fraud - Story from a 2600 reader who was involved exposing suspected fraudulent voters in New Brunswick, New Jersey, by Kr@kH3d (DFxC, Dominick)
- Linux on the Xbox - Overviewof the necessary steps, modchips, and BIOS modifications required to install Linux on an Xbox, by Live_wire
- More Xbox Fun and Mischief
- The Complete Guide to Setting Up Evox.ini
- Mirror of distribution.xbins.org distribution.xbins.org as of Sep. 20, 2017
- Removing Spyware and Adware - Overview of removing spyware and adware which is bundled with many Windows P2P clients, by 0/\/3_3y3d_/\/\0/\/st3r
- Exposing the Coinstar Network - A quick overview of Coinstar change machine and their network, by area_51
- A Dumpster Diving Treasure - Story of finding a working Alteon iSD-100 in the garbage and getting it up and running, by phantasm (Robert Davies)
- DMCA vs. DMCRA - A look at the Digital Media Consumers' Rights Act which is designed to give consumers rights the DMCA took away regarding "fair-use" rights of copy-protected CDs, by Alex Daniel
- Letters - Blather
- Spreading News - NoSpahm, Keith, scott, Sardonicus, cybernard
- Terrorism Related Issues - Tresser, jmu, Herman, PLMN, Lectoid, Surfgods, LordKhamul, Hells-own, Kr00lee-O
- Dumpster Diving - Paddy, Nomad, Stinky
- Feedback - Traveler, XiChimos, joe, Bob M., Eil, Charles, Shadowfax0 (Kingston, Ontario), hawk2000, Poetics, Nietzsche, JaMm3r, Rob T. Firefly, Jason Argonaut, Resurrection20
- Injustice Department - deejayred2001 (Templeton, CA), Matt, Evnglion, im_source, Dune Tanaka, Todd
- Thoughts On Piracy - I1269U (Leilan, Harrisburg, PA)
- Questions - Super-Fly, In a TrAnCe, QuietShadow (Liz), Phate_2k2, Quiet Riot, ddShelby, Ganja51 (Kris Blommel, Rosemount, Minnesota), Tony
- Observations - Freddy, Quebec, Mark, The Nibbler, Spooky Chris, jesse, christopher, jasonburb, jmk, Radarjam, sunzi, Cambalache20, k1d0n, derrick
- Tale From The Past - John K.
- Retail World - Zac T., XiChimos, acj626 (Arleigh, Austell, GA), pinchepunk (J.M, Chicago, IL)
- Parallels - Sparkster
- A New Project - Poetics, Elf Qrin
- Critique - AGE_18, Dave D.
- Significant Developments - RusH, fstratto (Frank Stratton, Urbana, IL)
- Defining Hackers - f0x deacon
- Reaching Out - Nyght
- .ncsc.mil (144.51.x.x) - List of hostnames for the 144.51.x.x network
- A Brief Introduction to Deep Freeze - Overview of Deep Freeze, software which "freezes" your Windows software configuration, by The Flatline
- Deep Freeze 3 (Standard) - User Guide Windows 95/98/ME
- Deep Freeze 4 (Standard) - User Guide Windows 2000/XP
- Deep Freeze 2 (Standard) - 60-Day Demo Version v2.10.000.0265
- Deep Freeze 3 (Standard) - 60-Day Demo Version v3.20.000.0505
- Beating Download Manager Protection - Ideas for defeating file blocking ("Download Manager Blocked" messages) used by various websites, by Straightface
- DHCP is Your Friend! - A good look at DHCP and the dangers of non-authenticating DHCP servers which will hand out IPs to just about any MAC address, by di0nysus
- 2600 Marketplace
- 2600 Meetings
- Issue's Cash Cow: In the fast paced culture that we seem to find ourselves caught in the middle of, it's very easy to get stuck in a default mood of euphoria or despair. Lately it seems that we ve been despairing quite a bit. We're certainly not alone.
- Cover (Cover Info)
- Back Inside Forbidden Payphones
- Alexandria, Egypt It's illegal to take pictures in Egyptian airports. Here's one they couldn't stop. Photo by Tom Mele
- Tunis, Tunisia Taking photographs in public here is considered an offense worthy of incarceration. This was a "drive-by" of one of the payphone rooms that exist throughout the city - there are no single payphones anywhere. Photo by John Freund
- Xi'an, China This card-only phone is the most common type. The writing on the blue plastic says: "It is everyone's duty to be careful with public phones." Photo by Robin Kearey
- Shanghai, China The type accepts both coins and cards. Photo by Robin Kearey
- Back Cover South Korean Payphones (we will pay any price for pictures of North Korean payphones)
- Seoul #1 The most common type of payphone which only accepts cards. Photo by Robin Kearey
- Seoul #2 A coins-only version, also fairly common and usually found near the cards-only phones. Photo by Robin Kearey
- Kyeonghee University The old style coins-only payphone which is becoming increasingly rare. Photo by Robin Kearey
- Seoul #3 This is a rare phone too. Its location is probably even more rare. Photo by Robin Kearey
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 19!
$2600 Magazine - Volume 20, Number 1 (Spring 2003)
- Not In Our Name - Editorial
- ANI and Caller ID Spoofing - Very detailed article on the commons methods to spoof the Calling Party Number (CPN) parameter and even ANI, by Lucky225
- spoof.ogg In this recording, you hear a call being spoofed as 909-661-2600. The number called is the 800-555-1140 ANAC that will announce 909-661-2600 as the number being called from.
- Caller ID Spoofing Through TELUS As demonstrated at H2K2, by Lucky225
- Automated Caller ID / ANI Spoofing
- AOH Caller ID
- A Hacker Goes to Iraq - An old-school hacker discusses a possible trip to Iraq in order to protest the (((sanctions))) against them and teach computer programming to Iraqi students, by Chris McKinstry (Mindpixel, Wikipedia Entry, Flickr)
- Getting Busted - Military Style - Good (insider?) overview of the Uniform Code of Military Justice and what it's like at Fort Leavenworth, by TC
- Unsolicited Mail - An apparent U.S. Navy Special Warfare Development Group SIPRNET email was sent to a public Internet mailing list...
- Anonymous Email Using Remailers - Good overview on using (or setting up your own) anonymous email remailers, by angelazaharia
- Frequently Asked Questions About Mixmaster Remailers by Lance Cottrell (1996)
- Fun With 802.11b at Kroger - Overview of the wireless network at Kroger stores and the possibility of intercepting their open Telnet traffic with Kismet, by Kairi Nakatsuki (Email)
- Best Buy Insecurities - How to access the Internet via computers at Best Buy, by WInt3rmut3
- Ripping Movies from DVD to CD-R - Detailed overview of how to rip DVDs using various free software packages to emulate DVD Copy Plus, by Solthae
- XM - The Flawed Future of Radio - Basic technical overview of the XM Satellite Radio service, by Acidus
- Letters - Babble
- The War on Stupidity - JF (Texas), FEMA Emergency Contacts Directory - shaggyeightball (Harold Backer), eigenvalue (Canada), 2600 Reader
- Random Observations - kyoung, Tom, CaptainJ, TwinZero, rOb, dougk ff7, Phake, Victor Hugo, Herman, Abstract, Robert (Johannesburg, South Africa), squid, confusedbee (Elizabeth J. Clayton, Toronto, Canada, DOB: 01-22-????), fremont_dslam, eyenot (Gabriel Arthur Petrie), scott (West Nyack, New York), Aaron, (none given), dominatus, chaos985 (William Harry, Email #1, Email #2, West Palm Beach, FL, DOB: 11-30-????), 2600reader
- Meetings - x, cs, Oversight
- Security - DWD, Poetics, DVNT
- New Projects - Jari (Finland), Ghent
- Inquiries - kayvan, root, InfrHck, x8ou;##5, Ray, Mark, osiris, kaspel (New York, New York), alan
- New Feedback - ByteEnable (Austin, TX), Jester (New Jersey), Aaron, Kimberly, Anewname (Toronto, Canada), glenn, cOld.bOOt, TheTechnophile
- Response to Old Feedback - Kyle, JohnnylS (San Diego, CA), Zeitgeist, Blake, CableTick, Lunacite, Jon
- Bypassing Security - LMB
- Problem Solving - Pi, Siece, Pete
- Cover Comments - BC, CrzyDragn, Leprkan, f
- An Accomplishment - Adam
- More on Telemarketing - TimBER
- Discoveries - Poetics & Stealth5325 (Steve), Osiris, DriZakE, EBone, N (United Kingdom)
- Suggestions - DarkSide
- Dangerous Info - Beowulf
- A First Look at Virgin Mobile - Technical overview of the Virgin Mobile cellular carrier and some useful handset tips, by The Prophet
- Creating Delay in the New Age - Using three-way calling to recreate the old phreak sounds of "tandem stacking," by Screamer Chaotix
- iBuySpy Portal Software - Overview of the Microsoft's iBuySpy Portal software - and huge bug to grab plaintext passwords, by Papa Doc
- Code: ibuyspy.vbs
- Defeating Salon.com's Premium Content - View "premium" Salon web pages without having to pay for them by editing your browser cookies, by annie niemoose
- Fun With Hosting on Your Cable/DSL - Additional tips for port forwarding and dynamic DNS when hosting your own servers on a cable/DSL connection, by Toby (Ryan Toby Richards)
- Keyboard Theory for the New Age Phreak - Neat concept linking piano keys and their associated frequencies to the tones used by the telephone system, by autocode
- A Glimpse at the Future of Computing - Discussion of what would happen to the Internet if it was ever taking over by "progressives," by Phocks (? Joshua Birtles, Brisbane, Australia, GitHub, Website #2)
- 2600 Marketplace
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: How hackers can help prevent dictatorships, whether in foreign countries, or under Obama/Biden/Corley.
- Cover (Cover Info)
- Back Inside Egyptian Payphones
- Egypt #1 This is known as a "Nile" phone. They're fairly popular and widespread and they use prepaid cards. Photo by Encrypted_Error
- Egypt #2 This is a Telecom Egypt phone which can be found near phone company buildings and a few other places. Even in Egypt, phone companies seem to like using that silly swirl symbol that seems to dominate the technology world. Photo by Encrypted_Error
- Egypt #3 An old Telecom Egypt phone found at a major bus station. Photo by Encrypted_Error
- Egypt #4 An even older Telecom Egypt phone that takes coins and could really use a good scrubbing. Photo by Encrypted_Error
- Back Cover Thai Payphones
- Thailand #1 This is as bright and as blue as they come. Photos by Dieter K.
- Thailand #2 A phone designed for international calls that takes all kinds of credit cards. Photos by Dieter K.
- Thailand #3 From Bangkok. The booth alone is a spectacle to behold. Photo by Matthew Swenson
- Eritrea Found in a small town called Keren. Famed for behold its sacred baobab tree, its walled camel market, and its dwindling population of landmines. Photo by Mark Sadler
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 20!
New $2600 Magazine T-Shirt Ideas
$2600 Magazine - Volume 20, Number 2 (Summer 2003)
- Disrespecting the Law - Editorial
- Roll Your Own IIS Intrusion Detection System - Detect attacks on an Microsoft Internet Information Services web server with this useful Perl script, by The Rev. Jackal-Headed-God (Corey Ehmke, Bloomingdale, Illinois)
- Watcher.cgi Watcher/WormSign is a small-footprint, passive intrusion detection system for IIS written entirely in Perl.
- Traversing the Corporate Firewall - How to pass non-HTTP traffic through a firewall using port forwarding and SSH, by superheast
- Staying Anonymous in the Information Age - Social engineering tips for obtaining private information and also some tips on how you can protect yourself, by Lucky225
- Hardware Key Logging - Overview of operation of hardware key logging devices, like the KeyKatcher keystroke logger, by XlogicX (Eric Davisson, Email, GitHub, Twitter)
- ooPIC Multi-Language Compiler Ver 5.00 Full install for Windows 95/98/ME
- NT Printer Port Driver Need to run compiler v5.0 under Windows 2000 or NT
- ooPIC Manual & Technical Specifications
- ooPIC Compiler IDE Via SourceForge
- Wireless Keystroke Data Tap
- Peeling Grapes - A look at "peeling back" website security and layout using PHP, by Bryan Elliott
- Microphones, Laptops, and Supertaps - Potential security problems with unsecured computer microphones or headphones, by Dark Spectrum (Wideband Dreamer)
- Optimum Online and You - Using Optimum Online cable ISP services and how they block or filter incoming traffic, by Screamer Chaotix
- Cyber Cafe Software Security - A look at TinaSoft's EasyCafe cyber cafe software and some potential security holes, by minion
- A Coupon Trick - Story of generating your own UPC code on a coupon to increase its value, by Charles
- Hacking the Look - Tips using Resource Hacker to tweak the look of your Windows system, by Rev. Edward E. Karn (ZenLogic)
- Hacking the Look Original
- Hacking the Look: Revisited
- Resource Hacker v3.4.0 (555k ZIP)
- Hosting a FTP Server on Cable/DSL Routers - How to host a FTP server under Windows 2000 on a cable or DSL connection, by osiris188 (Canada)
- GuildFTPD v0.999.13 GuildFTPD is an FTP server with special support for IRC, by Matthew Flewelling (1.8M EXE)
- Letters - Voices
- Sensitive Info - f0urtyfive (Matt Mills), brian
- Handy Tips - Jason Argonaut, favdog
- Policy - Gloria, Captain B, Pi, No Name
- Dealing With Opposition - anonymous, Brian
- Defining Terms - fyrwurxx (Austin D.), fyrwurxx, revanant
- The Law - tack, Magelus, Jeremy, KoDo
- Letter Responses - encrypted, Lookat ThatThar, TC, blanch, p3rl_junki3, Ninjalicious (Jeff Chapman), darkism, dhax, area_51, drlecter, Walter
- Web Feedback - Scared in Iowa, demothenes (Mesa, AZ), Talofa, Inacho
- Unlearn - Screamer Chaotix, JPK, Amanda, Camille, Meriana, Christina
- Random Observations - fremont dslam, Weex, Scott, Sunfist, Jonathan, NeuRd, Procyrus (Ohio), J, Ivan, anonymous, Zen Lunatic, Mark Sadler, Mr. "of Lag"
- Economics - Lamerjoe, J. Miller
- Misconceptions - brian botkiller (MySpace)
- Article Clarifications - Toby, Marc Wallace, Firehazard, Matt, Jim, Papa Doc, Flat Line, Lucky225, Stormbringer (William K. Smith)
- Clearing Blockages - Skazz, Bullet, Logix
- McWireless Exposed - Overview of McDonald's new public Wi-Fi network and some bonus backdoor logins, by Epiphany (Darien S. Acosta) and J0hny_Lightning
- 802.11b Reception Tricks - Adding and external antenna and other hardware tips to improve 802.11b networking performance, by ddShelby
- Distributed Reflective Denial-of-Service Attacks - Overview of the dangers of newer DRDoS attacks which exploit the TCP 3-way handshake and how networks are potentially vulnerable to them, by Spyrochaete (Brian, DJ Brian Damage)
- Fun With the Nokia 3360/3361 - Outlines how to change the alpha tag and network settings on the Nokia 3360/3361 phones, by FragSpaz
- Why Red Boxing Still Works (sorta) - It appears possible to Red Box off live operators - if your're nice to them, by Plazmatic Shadow (cmantito, Kevin Leacock, LiveJournal)
- XPloiting XP - Good overview of the techniques required to get around Windows XP serial numbers and activation, by Bill Melater
- Windows XP Professional Service Pack 2/3 VOL/VLK Keys
- How to Change the Windows XP Product Activation Key Code
- XP SP1 Updating
- 2600 Marketplace
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: Fighting the DMCA, RIAA, MPAA over the right to use filesharing.
- Cover (Cover Info)
- Back Inside Island Payphones
- Fiji This is a charge card phone. Note that "Q" and "Z" are represented by the 1 key. Photo by Zach Andersson
- Turks & Caicos An outdoor booth operated by Cable & Wireless on one of the islands of Turks & Caicos. Photo by nexus-3
- New Zealand A coin and card phone with plenty of documentation and accessories surrounding it. Photo by J. Hamilton Davis
- French Polynesia This phone was found on an island called Huahine. Photo by J. Hamilton Davis
- Back Cover Irish Payphones
- Ireland #1 From Cong is County Mayo of the Irish Republic, a card/coin model operated by Eircom. Photo by Jamie Stack
- Ireland #2 This could be the same exact phone captured by an entirely different person, but we doubt it. Photo by Raul Perez
- Ireland #3 An outer view of the booth of the previous phone(s). Photo by Raul Perez
- Ireland #4 An entirely different type of phone from a different company known as ITG, whose phones can be found across the British Isles. Photo by Raul Perez
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 20!
$2600 Magazine - Volume 20, Number 3 (Fall 2003)
- Feeding the Frenzy - Editorial
- Getting to Know Your Neighbors - Overview of using Kismet to look for local wireless networks to connect to and using LinNeighborhood to browse Samba/SMB shares, by Shiv Polarity
- Servers on a Ghetto ISP - Running and hiding servers (like Sendmail) on a cable/DSL connection in which the ISP is blocking ports, by Lirakis (Eric Tamme, New Rochelle, New York)
- More Methods for Hosting FTP on Broadband - Methods for running (and hiding) a FTP server on cable/DSL connection, by Apratt
- Hacking the Look: Revisited - How to install alternatives to the stock Windows Explorer desktop and shell, by mojomonkee (Brian Connolly)
- Case Mods Made Easy - How to make your computer case look pretty, by X3N0X
- DVDs on a Pocket PC - Play DVDs on a Pocket PC, by Shawn Frederick
- DVD2AVI v1.77.3 Stable version, resize function unfinished.
- More Xbox Fun and Mischief - A look at Xbox hardware modifications and modchip installation, by spite
- Linux on the Xbox
- Xecuter 3 Installation Tutorial (v1.03)
- Xecuter 3 CE Installation Tutorial (v1.0 - v1.6)
- Heimdall's Xbox Engineering Disc 2018
- Mirror of distribution.xbins.org distribution.xbins.org as of Sep. 20, 2017
- Shopping for a Security Flaw? Try Retail - Potential to exploit security holes at retail stores via their open PBXes or ignorant employees, by dead_pilgrim
- Troubling Target - It appears possible to execute the infamous NT bug on Target store Symbol 6800 barcode scanners, by redxlegion (Red Legion, DOB: 08-21-????, Michigan)
- Blockbuster Tricks - Social engineering Blockbuster by pretending to be another store to get out of late fees or to even keep the item itself, by C.B. Cates
- Webhacking with CVS - Looking for potential secret information in open CVS directories, by methodic (Tony Lambiris)
- Webserver CVS (In)Security Original
- Basics of Cellular Number Portability - A good look into how cellular number portability works, by C3llph
- The Hacker Diet - How to eat good, by Shade
- Feather.c - C code to preserve a program's atime and mtime after execution, by Kairi Nakatsuki (Email)
- Code: feather.c
- Letters - Articulated Gibberish
- Article Feedback - rFmAn, Matt M., Austrailian Knight, shaggyeightball, Tonio K., Scott (New Jersey), Analog666, mojomonkee, Al, JL, D1vr0c (David Crowe), mAineAc, Jim, Eeviac
- Confusion - Manga, netj, Sph1nx
- Newbies - MarBle, Henry (Germany), Drake Smith, Joseph, Thierry (Africa)
- Have You Heard? - Jesse W., PhrenicGermal (Thomas Hodges, Winfield, IL, DOB: 11-29-????), MacAllah
- Taking Action - Patrick
- Observations - Satch379, SeKToR, Spua7, Dave C, John Tate, CPUHaxxer, aaron t, Eric
- Keep The Faith - tWiST, c0l0r3dfr34k (Anthony, DOB: 02-22-1984), Bob
- The Past - walt, kdg, Fruber
- Destructiveness - Lord Kahless
- The Quest For Knowledge - slax0r (Eric Agan, South Bend, Indiana), Brainwaste, Helen
- Piracy Prevention - semicerebral, eigenvalue
- Insecurity - tr, osiris, Big B. Statz
- Suggestions - drlecter, Ion, PCBootlegger, scissorjammer (Alex Rakoczy, DOB: 12-07-1986), Concerned Grandma
- The Authorities - Performaman, Alan (The Hague, Netherlands, Note: The Taliban receives their money from drug sales in Holland and Western Europe)
- Concerns - Caps Lock, Sam, Martin
- Chastising the Ignorant - leetkurp (Atlantic City, NJ)
- A Sign of Hope - theXorcist
- Denial-of-Service Attacks, Tools of the Tools - Overview of how denial-of-service attacks work and some of the tools capable of causing them, by bland_inquisitor
- Frequency Theory for the Phone Hacker/Musician - How audio frequencies in the phone system and music are spectrally related, by The Piano Guy
- A Trip Down Memory Lane - Story of using the early browsers and UNIX email/chat utilities while on the Internet, by Jimmy Yu
- Finding Ogg - Audio Evangelism - Overvview of the Ogg Vorbis audio encoding format as a replacement for MP3, by The Dark Shirt (Irving Washington, London, U.K.)
- Infidelity in the Information Age: How I Caught My Cheating Girlfriend - Story on how "deleted" information on computers really isn't, by atoma
- The Threat of Biometrics - Overview of the MorphoTouch biometrics system installed at a school, by _cHiCkEn_ (Pennsylvania)
- Gentner GSC3000 for Total Morons - Information and command overview of the Gentner GSC3000 radio station remote facilities control system, by blakmac (Blake MacArthur)
- Genter GSC3000 Remote Facilities Management Installation & Operations Manual Gentner Part No. 800-085-100 (1998)
- Burk Technology GSC3000/VRC2500 Broadcast Facility Control Systems Installation & Operations Manual (2006)
- Genter GSC3000 Voice Interface Installation and Operations Manual Gentner Part No. 800-085-130 (1999)
- Burk Technology VRC2500 Remote Facilities Management Installation & Operations Manual (2002)
- 2600 Marketplace
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: It's clear there's a lot we're not being told and that there are many in power who would like to keep it that way.
- Cover (Cover Info)
- Back Inside Costa Rican Payphones
- Costa Rica #1 If it wasn't for the "Call USA" on the bottom, we would have had a very hard time telling which end was up on this tiny phone. Photo by Ricardo Muggli
- Costa Rica #2 Unlike in the United States, many foreign payphones are proud of their phone numbers. We suspect this one may soon be ringing off the hook. Photo by Ricardo Muggli
- Costa Rica #3 It's kind of hard to believe that this is in the same country, but this old metallic model phone can also be found in Costa Rica. Photo by Ricardo Muggli
- Costa Rica #4 Our favorite is the even larger metal box with tiny keypad. Think about it - at some board meeting in the past, this design beat out the competition. Photo by Ricardo Muggli
- Back Cover Payphones From Egypt
- Egypt #1 Completely different from the four we printed two issues ago. This one is a Menatel, probably the most popular and widespread payphone in Egypt. It uses prepaid chipcards. Photo by Encrypted_Error
- Egypt #2 What the connection is to the former Beatle we don't know, but these phones use prepaid cards and are only found in Cairo and Alexandria. Photo by Encrypted_Error
- Egypt #3 This phone was found in the middle of the desert. Not much is known about it other than the fact that it only takes coins. Photo by Encrypted_Error
- Egypt #4 This is actually the exact same kind of Telecom Egypt phone we printed in the Spring issue, but this one is a completely different color! And that makes all the difference. And no, she isn't giving us the finger. Photo by Encrypted_Error
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 20!
$2600 Magazine - Volume 20, Number 4 (Winter 2003-2004)
- Paranoia vs. Sanity - Editorial
- Hacking the Genome - The creation of Genetically Modified Organisms (GMOs) is now within the ability of a knowledgeable and dedicated hacker, by Professor L
- Hacking the Genome- Designer Proteins, Elite Organism, and You by Russell W. Hanson, from his speech at 21st CCC (Slides)
- Whom Do You Trust? Issues of Several CAs Authentication Mechanisms - Good SSL overview and how the author was able to trick Certification Authorities (CA) to issue him a certificate, when they really shouldn't have, by Juraj Bednár (Slovak Republic, Email, GitHub, Twitter, )
- System Profiling Through RPC - Overview of probing, and/or exploiting, hosts via open RPC daemons, by Screamer Chaotix
- Robots and Spiders - How Internet spiders (search engine crawlers) work, loopholes, and potential security issues, by StankDawg
- Living Without a SSN - Very detailed (and modern) article on how to avoid giving out your Social Security number during credit card applications, etc., by Lucky225
- Cellphone Without SSN alt.cellular.attws posting
- More Fun With Wireless Hacking - Quick notes on Wi-Fi hacking and the dangers of using WEP encryption, by VileSYN (Dennis Brown)
- More Fun With Wireless Hacking Original
- WEP: Not For Me - Story of a person scanning for Wi-Fi devices and finding lots of open Access Points, includes a list of default logins & password, by 0x20Cowboy
- Wardriving with a Pocket PC - How to use a Pocket PC and MiniStumbler to wardrive Wi-Fi access points, by RaT_HaCk
- vxUtil Windows CE 2.x.x, 3.0 (or later) (HPC Pro, Pocket PC, Windows Mobile 2003) software (version 1.6.2, 02/06/2005)
- vxUtil Windows CE 2.0 and Palm-Size PC software software (version 1.6.1, 03/12/2004)
- Verizon's Call Intercept - Overview and potential security loopholes in Verizon's Call Intercept service, by decoder (William Quinn)
- Verizon's Call Intercept Original
- Fun With Hping - How to use Hping, a program which allows you to create arbitrary packets with all types of options, by methodic
- Remote Computing Secured - How to secure Virtual Network Computing (VNC) using SSH and SSL, by Xphile
- Letters - Speech
- Getting Around the System - Evil Alex, Rifkey, Khoder bin Hakkin
- Miscellaneous Fact - SFG
- New Ideas - Erik, Chris
- The State of Education - richard, Muttski, lord_stinkington (South Carolina), alex (a.k.a. Suge, Florida), Sheff-Boy-RD (Adam Sheff)
- Military Readers - Neo, Noname, PhatMan (Canada), karniv0re, Cpl Grimes
- Miscommunication - Regards
- Further Info - DeadPainter, Anonymous, miniz003, Slacksoft, hbob, mrbrown8 (Curtis J. Brown), Sparklx, Somar, Taurus Bulba, Hroly
- Misdeed - Paul
- Pointed Questions - TrIpAnDaNce, magnum0711, Marcelo Barb (Brazil), Ken
- Call For Help - Professor_Ling
- The Issue of Piracy - fH, martianpenguin (DOB: 12-03-1985), Jeff, Hooky1963
- Some Clarifications - Mark A. McBride (Evans, GA), Colonel Panic (John S. Albert, KC9EQK), D1vr0c, Poetics, phresno
- Spreading Knowledge - Robert (Portland, Oregon)
- Food For Thought - Blair (California), Code Dark, nameless, SoftwarePir@te, Jon, Anonymous
- Info Needed - Mike, Scott, Uncle Dust, Elvis Carter-Abbot
- Ominous Developments - czarandom, Iz
- Annoying Problems - Daniel, Erik, zs (Zachary Smith), sandman10_99, Lily
- Appreciation - ReDLiNe135, Tarball Gunzip
- Reader Advice - Stone Wolf, Chris, crypto
- Stories of Insecurity - Cory K., Zardoz
- DISA, UNIX Security, and Reality - Overview of the U.S. Department of Defense recommended UNIX security configuration specifications, by sunpuke (Robert Escue, Virginia Beach, Virginia)
- Hacking the "Captivate" Network - Overview of the Captivate screens mounted in some elevators and how to connect to their wireless network, by Darlok
- Unlocking GSM Handsets - How to unlock some common GSM handsets for use on other cellular phone carriers, by The Prophet
- FAQ: How to Flash / Repair / Unlock Nokia Mobile Phones
- GSMANIA
- Code Calculator 5.4
- DCT4CALC.COM HONGXING DCT4 Calc 3.0 for MS-DOS
- Yet Another DCT4 Calc by Wilson
- Nokia DCT4 Mastercode FREE 1.0 by TechGSM
- Cybergasm DCT4 Calculator 1.4
- Unlocking WebLock Pro - Information on how to defeat the WebLock Pro HTML source protection system, by Schnarf
- Code: decode.pl
- Example Output
- Holes in Windows 2003 Server - Setup Manager overview, passwords are standard LAN Manager hash capable of being attacked by John the Ripper, by Joseph B. Zekany (Zucchini)
- Code: xpgrab.pl
- Setup Manager Windows 2003 Server
- Windows Server 2003 ISOs (Key: QKDCQ-TP2JM-G4MDG-VR6F2-P9C48)
- How to Mess with Citibank Collections - Tips and tricks for messing with (and avoiding) Citibank's collection centers, by The Pissed-Off One Armed Man
- 2600 Marketplace
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: Same nonsense as 10 years ago
- Cover (Cover Info)
- Back Inside Payphones From All Around The World
- Romania One of the more modern phones useful for telling you the date and time among other things. And it's orange! Photo by Dieter K.
- Singapore So much for the perfect society. Apparently payphone theft is still a popular activity. Photo by Louis Pezzani
- Paraguay Located in the Monday State Park near the Monday Falls in Ciudad del Este. Photo by Darryl Duer
- Colombia Found in the airport of Barranquilla. We just don't see enough orange phones. Photo by Bruce Engelberg
- Back Cover Payphones From Everywhere
- Glenfinnan, Scotland A colorful old style coin-only phone with a large coin box. Photo by John Klacsmann
- Dundee, Scotland The most high-tech payphone in Scotland. It's Internet-ready and takes both coins and cards. And the coin box is even bigger. Photo by John Klacsmann
- Hong Kong #1 Another colorful variety with a unique shape and a lot of directions. Photo by Dieter K.
- Hong Kong #2 The PowerPhone enables you to see video while making calls. Photo by Dieter K.
- Staff
- Download Official Digital Edition PDF!
- Download The Hacker Digest - Volume 20!
$2600 Magazine - Volume 21, Number 1 (Spring 2004)
- Twenty Years After - Editorial
- Taking Advantage of Physical Access - Physical security for your computer and the easy ability to copy hard drive contents to an external drive, by Evil Wrangler
- Bypassing Minor Website Security - Several tricks for defeating right-click suppression, anti-content saving, and cookie checks, logging, etc., by Galahad
- Exploiting AIM Screen Name Loggers - Exploit to gain admin access to any IMChaos account by spoofing the AIM Browser window, by Stik
- Code: imchaos.cgi
- Using Perl to Defeat Provider Restrictions - Using a couple of Perl CGIs to alert you if your dynamic IP address has changed, by TRM
- A Simple but Effective Spanner in Your AVS - Trick program to defeat an anti-virus scanner (Symantec, McAffe, etc.) by covertly deleting the EXE or other required operating files, by Irving Washington (Email)
- Hacking the Hilton - Using the (paid) high-speed Internet connection at Hilton Hotel's for "free" by using non-standard ports, by Estragon
- Hotels: Your Inn for Access by dual_parallel
- Cruise Cracking - Carnival Cruise computer network overview and a look at their "Sail and Sign Cards," by Jesters8 (Stephen?)
- A Sprint PCS Trick - A look at the Sprint-to-Sprint trick discussed on Off The Hook and op-diverting to "ANI Fail," then supply the target's number. It's also possible to uncover the target's PIN via their voicemail settings, by quel
- Hacking a Mercedes-Benz with a Universal Remote - Use an universal IR remote control to record the "Lock," "Unlock," and "Trunk Release" infrared codes used on older Mercedes-Benz vehicles, by TOneZ2600 (Corey Friedman)
- The $40 Hardware Wardialer - Palm V PDA plus a Palm modem and Kingpin's TBA software to create a low-cost war dialer, by Grandmaster Plague
- TBA_v1_prc.zip Version: 03.24.00 / Palm OS 3.0 to 3.3 / Fully-functional wardialer for the Palm OS platform.
- TBA Handbook The wardialer for Palm-powered devices.
- War Dialing Brief by Kingpin
- Serial Number Security - Why hardware product serial numbers should not be out in the open and the potential ability to "social engineer" free items, by TEV (U.K.)
- Barcode Tricks - How to read UPC barcodes and several tricks for "changing" their values, by XlogicX
- Installing Debian on Your Unmodded Xbox - How to install Linux on your Xbox without any significant hardware modifications, by dave (U.K.)
- Turn an Xbox into a Debian Server
- Technical Analysis of James Bond 007: Agent Under Fire Save Game Hack (007linux.zip)
- Game Console Hacking: Have Fun While Voiding Your Warranty by Joe Grand, Albert Yarusso, Ralph H. Baer, Marcus R. Brown, and Frank Thornton
- Letters - Mind Exercises
- Assorted Questions - Jason, Andrew, tchnprgrmr (Ceda, Jacksonville, FL), Alexey (Russia), Multivac_Kleenex, N,cow, moviestardog04, Jerry, Phreakinphun
- Con Game - Darkstorm777 (Steven Caputo, Email #1, Chicago, IL)
- Random Feedback - Osama, Anton, Performaman, Amit Jain, Adam Rzepka, FTE, gabriel aaron, Digital_Cowboy, uberphreak, Enonymous, Ian Johnson (jwoulf, LiveJournal), The Fallen One, rainwater5 (Scott), Eric M., Mike Neary, drlecter (Weston George), Blimpieboy, Witchlight, Karlman Rovetounge, Daniac, NGTV|3
- Help Offered - loco freak
- Observations - MoJo, darkpo3t (Daniel Hmeidan, DOB: 02-19-????), Poetics, Jim_Steele (San Francisco, CA), jake, drlecter, SAR, Louie, lint, Stephen
- Military Readership - d0rk, misterjager, MegaGeek, slack_pizza_guy, jim, E8Q
- A Problem - ALI
- The Power of Ignorance - the_heretic, AltSp4c3Ctrl, John Anon, thesuavel, sunami, ieMpleH, mord
- Tips - College_Student
- Meeting Trouble - Kaosaur
- From the Other Side - rewt, Rafin
- The Music Industry - Jakob Larson
- More Bookstore Hijinks - Cygnwulf, MG48s
- Thoughts on Terrorism - drlecter, Lindsey The Boy
- To Clarify - Lawrence, ZeroSpam
- Mentoring - Billy, Radix
- Working Around the System - Nathan
- Uncapper's Paradise - Overview of uncapping your shell-enabled cable modem (SURFboard SB2100) by adding IP filters or changing the HFC MAC address automatically to a random address, by CronoS@OlympoS (Ertan Kurt)
- Inside Adelphia - Outside plant overview and info for an Adelphia CATV/Internet installation, by J. P. Arnold
- Subverting Non-Secure Login Forms - PHP code to spoofing login forms (and capture passwords) on Internet Explorer 5.0, 5.5, and 5.0, by I. O. Hook
- Code: gotcha.php
- Setting Your Music Free: iTunes Music Sans DRM - Use Apple's own provided tools to convert AACs to DRM-free WAV/MP3 files, by k0nk
- Vonage Broadband Phone Service - Potential network security vulnerabilities in the Vonage VoIP service (and Cisco ATA-186) and their inability to care, by Kevin T. Blakley
- Sharing Your Life on a Peer-to-Peer Network - Be careful what you put on the Internet when using poorly configured peer-to-peer sharing software, by Kong
- MSN.com Redirect Scan - Scanning the different sites MSN can redirect users to, by StankDawg
- 2600 Marketplace
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: Celebrating 20 years of selling other people's BBS files, free information, and spreading Marxist-Leninists/Communist "useful idiot" propaganda.
- Cover (Cover Info)
- Back Inside Payphones From Brazil
- Brazil #1 If phones like this started to sprout in American streets, there would be massive panic. They look like some kind of alien. Photo by Anonymous
- Brazil #2 And yet, people in São Paulo don't seem to be in the least bit concerned with this new life form. Photo by Anonymous
- Brazil #3 If you're really daring, this is what one of these monsters looks like as you approach. This one was seen in Campinas. Photo by Anonymous
- Brazil #4 And yes, the phone itself, which doesn't seem to really match its spacy surroundings. Photo by Anonymous
- Back Cover Chinese Payphones
- China #1 From the Northwest corner of Tiananmen Square in Beijing (People's Republic). Photo by Tim Fraser
- China #2 And here we have the Southwest corner. Photo by Tim Fraser
- China #3 From Taiwan. This is a standard card reader phone. Photo by Tim Fraser
- China #4 Also in Taiwan, this is an older phone with a coin slot and lots of extra space. Photo by Tim Fraser
- Staff
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 21!
$2600 Magazine - Volume 21, Number 2 (Summer 2004)
- Mirroring the Future - Editorial
- Scumware, Spyware, Adware, Sneakware - Overview of the latest spyware, like Gator/GAIN, and detailed steps on how to remove it, by shinohara
- ClearChannel's Dirty Little Secret - Behind the scenes at a Clear Channel radio station's "media research" call centers, by Chris Johnson (Bellows Falls, Vermont)
- Impromptu Lock Picks - Make lockpicks out of household items, by L. Gallion
- Magstripe Interfacing - A Lost Art - Very detailed (and updated) article on the properties of magnetic stripe cards and how to build your own reader, by Acidus
- Code: SwipeCard.bas Original (2004) - This is the source code distributed with the article. It is heavily commented and easy to port. This is not a free standing application, but simply a function that returns the contents of a magstripe. If use on Win2K or XP machines, you will need INPOUT32.DLL, which allows direct port access.
- Code: Stripe Snoop - Updated via SourceForge
- Stripe Snoop Media Collection of audio and video files demonstrating Stripe Snoop operation.
- Article in PDF
- INPOUT32.DLL Contains the INPOUT32.DLL needed to directly access I/O ports using INP and OUT on Win XP/2K.
- Interface a TTL Magcard Reader to the PC Games Port by Patrick Gueulle
- Applying the AN10E40 Magnetic Stripe Read Head Amplifier
- Privacy Implications of Magstripes Toorcon 6 slides
- MagSpoof "Wireless" credit card/magstripe spoofer.
- Listening via Linux - Source code for a simple port listener (server), by Solthae
- Code: listener.cc
- Passwords on a :CueCat - Use your :CueCat and a random bar code as a fairly secure password, by SARain
- Declawing Your :CueCat
- Building Cheap ID Cards
- :CueCat Login Shell
- Open-Source :CueCat Software/Drivers
- The Global Date Format - The "correct" way to write dates (Year/Month/Day/Hour/Minute/Second) or ISO 8601, by Richard Cheshire
- The Global Date Format Original
- Behind the Scenes of ITEC and the Milwaukee Bus System - Info on the Wi-Fi network used by Transmit TV video displays in certain city buses, by Eoban (Eoban Binder, Bloomington, Indiana, Facebook, Twitter, GitHub)
- OMNILOCKs and Stupid Politics - Story of an OMNILOCK adventure, or how poor how poor computer security can defeat your fancy electronic locks, by R. Toby Richards
- OSI Security Devices Catalog - 2002
- OSI Security Devices Catalog - 2004
- Stanley OMNILOCK Wireless Access Control Systems
- Stanley OMNILOCK Stand-Alone Access Control Systems
- OMNILOCK 2000 Lock Operating System - v1.20
- OMNILINK Facility Manager Installation Manual
- A Guide to Internet Piracy - Detailed look at the hierarchy and tools used by modern Internet warez couriers, by b-bstf (Andrew Smith)
- Letters - Verbal Constructs
- Reference Material - Twiggs, Scott, XsnipaX (Aurora, CO)
- Gratitude - The Piano Guy, SillyCatOwner, mg48s, Redukt, Closer (Greenville, SC), Nick
- Questions - AB, Zero Cool (Pakistan), kenneth, Charles, ass goblin, Rick, Lynn
- Meetings - iostreamz (Frank, Miami, FL), Tsun
- Tricks - infrared, Brendan Bogosian
- Complaints - Jeff, Vladinator, S, Joshua, Shortfuse, Dr. Smack
- More Info - w1nt3rmut3, Matthew "Blueleaf" Capone, vectorsigma, daste73 (Stephen J. Heeney, Pennsylvania), Unlocked, ScottVR, SJKJRX
- Satellite Radio - M@, Stormbringer
- Call For Info - Miles, mustangdriver504
- More From The Military - Caps Locks
- Positive Stuff - scotwr, Steaming Martyr
- Submissions - mike, Anon Ymous, drlecter
- Warnings - eyenot, mixmaster, Sysopny, crazypete, Ben Franklin, RT
- Stupid Stuff - Fairy Fock, sephail, Maniac_Dan, Ash (Ashmit), The Great Belzoni, Clint, Gigabyte_GRynd3R (Massachusetts)
- Homeland Security - Lee Colleton (Flickr, Seattle, Washington), Prospero
- Redirecting - Steve Duch
- Observations - Mugulord, Pablo, Michael J. Ferris, Micheal, autocode, Bryan, DRAHZ (Arlington, VA), cycoanalytikal (Marty, Lawton, OK, DOB: 07-18-????), Simon Shadow, Greg Gowen (Corrales, New Mexico)
- Consumer Spookware vs. Your Castle - A look at some common, and not-so-commn surveillance hazards (dryer vents and heating ducts) which are encroaching on our privacy today, by dark spectrum (a.k.a. wideband dreamer)
- Consumer Spookware vs. Your Castle Original
- A Lesson on Trust - Story of hacking a school's network, bypassing the Bess Internet filter proxy - and getting in trouble when finally caught, by Sairys
- Fun With Netcat - General overview and some tips for using Netcat, by MobiusRenoire (Weylin Burgett, Mt. Vernon, Ohio)
- The Lantronix SCS1620: An Unpublicized Gold Mine - Command info for the Lantronix SCS1620 secure console servers, by JK
- 2600 Marketplace
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: The Fifth HOPE
- Cover (Cover Info)
- Back Inside Payphones From All Around
- Ethiopia Not very many payphones to be found in this country, but here's one of them in Addis Ababa. Photo by Tom Mele
- Sri Lanka #1 Found in Sigiriya, this booth holds the mounting from a previous tenant. Photo by Tom Mele
- India On Elephanta Island in Mumbai, some careless painters splotched this phone but not enough to dampen its brilliant yellow spirit. Photo by Tom Mele
- Sri Lanka #2 The shape of this phone in the city of Kandy is rather weird to say the least. Photo by Tom Mele
- Back Cover Bulgarian Payphones
- Bulgaria #1 All of these photos were taken in Sofia. Here we see a modern orange coin and card phone. Photo to by karniv0re
- Bulgaria #2 And when a phone only takes cards, they appear to simply cut the bottom half off. Photo to by karniv0re
- Bulgaria #3 Here's a blue card phone which was rigt next to the orange phone above. Such spectacular displays of color are virtually unheard of here in the States. Photo to by karniv0re
- Bulgaria #4 The old style payphone with funky surrounding. Drab, yet intriguing. Photo to by karniv0re
- Staff
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 21!
$2600 Magazine - Volume 21, Number 3 (Autumn 2004)
- Learning Curve - Editorial
- In the Belly of the Beast - Story of working at AOL and an overview of their internal computer network and operations security, by slummin
- Anti-Forensics: Make Secrets Stay Secret - Overview of what it takes to keep your data safe and secret, including sensative RAM and hard drive contents you may not even know about, by Frater Ignotius
- Digital CDMA Cloning - Overview of the technical steps and software needed to "clone" a Kyocera 2235 CDMA phone's ESN to another phone, by tele
- BitTorrent - The Future of the Internet? - Overview of the BitTorrent peer-to-peer file sharing protocol, by spite
- The Insecurity of PHP Includes - Security holes with PHP include files and the potential to leave database username and passwords "in the clear," by jumbobrian (Brian DeFreitas, San Leandro, California, Facebook)
- Code: db-get.php
- Movies on a Phone - Overview of the steps required to rip a DVD and convert the file to a format which can play on a PDA, Pocket PC, or cell phone, by bill
- Free Encryption Backup - Use Google Mail, or other online email providers, to store encrypted files as an improvised back-up system, by Fernando
- Laptop Security - Scripts you can use to remotely access your laptop if it's ever stolen and a few tips to protect your data, by Fernando
- Code: tracker.php
- Code: beacon.sh
- Code: tracker-enh.php
- Introduction to IPv6 - Overview of the IPv6 protocol, by Gr@ve_Rose
- Hacking Soda Machines - Debug menus on soda machines, by MeGaBiTe1 (Email)
- Hacking Coke Machines by Fire and Kyint
- Hacking + 2600 Magazine + Coke Machines = Crime in San Diego County?
- Hack Soda
- Murphy Oil (Walmart) Fueling Stations - Info on Walmart's/Sam's Club Murphy Oil POS and back office computer systems, by max_9909
- The Big Picture - Linux is Approved! - Update to the "DISA, UNIX Security, and Reality" article and a new UNIX STIG for Linux systems, by Zourick
- How to Hack the Lottery - How do you hack the lottery? I can sum up the answer to this question in two words: don't play, by StankDawg
- Letters - Troublemakers
- Clearing Things Up - nima (Denmark), Mark
- Expanding on Thoughts - Rujo-king, FredTheMole, Cameron, generationxyu (James Longstreet), aguilanegra (Mateo E. Nares), Mannequin, w00tpro, ieMpleH, Jarett M, Jacob, ree, jazzy, Michael J. Ferris, OpenDNA, Copyaj, quel, DarkLight, Shadowfox, Goldman of Chaos (Matthew Goldman), The Gillig Phantom
- Discoveries - Wildkat, Dave (New Jersey)
- Idiocy - PCracer51, No Name, Wildrobo, Steve Shaw (Tennesse), BBV, PsychOcrazY
- Security Holes - Chthon, a.texas, FreshFeesh (Christopher Wright), ericc
- Randomness - Thomas
- Red Flags - Jynx, Brian the Fist (Howard Feldman)
- Interpreting Covers - coolguy, demosthenes, RTFM Noriega, vyxenangel
- Scams - Al3xTr3b3K, Andrew, SystemX
- Making Change - Mike, qw0ntum (Shaddi Hasan)
- Observations - Juan in Aztlan, Judas Iscariot, John, Beaver, Lori, t3st_s3t (Email, BinRev Profile), ReEk0n, Haleon, Miles, KPR, fyrwurxx, mike s., Alex K, Steven Jackson (Joliet, IL)
- General Queries - Tap, hb0b, Beowulf, Pierre, Hiten, Servus Casandro (Christian Berger)
- The LEIGHTRONIX TCD/IP - Info and commands for the LEIGHTRONIX TCD/IP Network Managed Video System, by slick0 (MySpace)
- Decoding Blockbuster - Blockbuster barcode information and tricks, by SDMX
- Warwalking in Times Square - Scanning for wireless access points in New York City's Times Square, by Sam Nitzberg
- Fight Spam with JavaScript - How to hide your email address from Internet email harvesters with some simple JavaScript tricks, by arse
- FC.EXE to the Rescue - Neat article on cracking Windows-program passworded files using file compare utilities, by akaak
- A Simple Solution to Dynamic IP Tracking - How to track your dynamic IP, by Gruggni (DOB: 02-09-1975)
- 2600 Marketplace
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: The Fifth HOPE
- Cover (Cover Info)
- Back Inside Payphones From Everywhere
- Hong Kong Yes, this phone appears to be on its side, but we're told that kind of thing is normal over there. Photo by Robert Vargason
- St. Lucia Looks like a British Telecom phone. Cable & Wireless is the local monopoly. Photo by StuntPope
- Hungary Found in Budapest. This is the kind of phone you should really spend some time with since it seems to be bursting with exuberance. Photo by Dieter K.
- Japan A close-up of a payphone found at Narita Airport which apparently had enough of a problem with its buttons that a little sign had to be installed above them. Photo by Alex
- Back Cover More Chinese Payphones
- China #1 A nice mix of colors on this GTCCL phone found a few blocks west of Tiananmen Square. Photo by Tim Fraser
- China #2 Found in Shanghai, this brilliantly colored phone with its sharp edges looks like a piece of modern art. Just don't try to give it coins. Photo by Tim Fraser
- China #3 This Alcatel phone in Shanghai is run by China Telecom and also only accepts cards. Photo by Tim Fraser
- China #4 Here we finally see a more friendly phone (also in Shanghai) that accepts both cards and coins. Photo by Tim Fraser
- Staff
- Download Unofficial Scanned PDF
- Download The Hacker Digest - Volume 21!
$2600 Magazine - Volume 21, Number 4 (Winter 2004-2005)
- Stick Around - Editorial
- Hacking CDMA PRLs - Overview of hacking Preferred Roaming Lists in your phone to choose your own roaming service provider, by The Prophet
- Hacking CDMA PRLs The Fifth HOPE (2004)
- Editing the PRL File HowardForums Thread
- An Old Trick for a New Dog: Wi-Fi and MITM - Overview of a possible scenario for performing a Wi-Fi "man-in-the-middle" attacks, by uberpenguin (Matt Britt)
- Vulnerabilities in Subscription Wireless - Potential vulnerabilities in MAC address (Layer 2) Wi-Fi authentication used by many hotels, cruise ships, cafes, etc., by wishbone
- Best Buy's Uber Insecurity - Info on Best Buy computer/network security and unpassworded routers, by skilar
- Hijacking AutoRun Programs for Improved Stealth - Overview of how to hide running processes (like a keylogger) under Windows, by Forgotten247 (Shawn Maschino)
- Catching Credit Card Fraud through Steganography - Customize credit card charges (e.g. all charges end in 17 cents, cents equals dollars + 1, etc.) to verify what you are charged, by Anonymous Author MD5: d03d3293cd954af6bccd53eac5d828fc
- Adware: The Art of Removal - Overview of spyware removing programs, by Patrick Madigan (Doylestown, Pennsylvania)
- Tracking Wireless Neighbors - Some interesting ideas on what to do if you find an unwanted intruder on your wireless networkck, by Sam Nitzberg
- Wireless Neighbors Are Fun! Original
- Backdooring the NAT'ed Network - Somebody read the Netcat manual, by David Dunn
- Electronic Warfare - Overview of the different electronic warfare methods, by HOMA
- Grokking for Answers - How to search the interweb for all your technical needs, by Bryan Elliott
- Letters - Back and Forth
- Questions - Deepen D. Shah (Livingston, NJ), Mike, Shell, Sheri Lowers, Carole, Nick (Florida), Sarma, LeStat, Andrew 0., Tabetha
- Life's Little Experiences - DemonEclipse, Austin D. (Washington), Alex (Massachusetts), Muhammad Adil
- Discoveries - Mr. Fairweather, LabGeek, Mike
- Injustices - Will, Black_Angel (Ligia Tinta), Tcc9mpl (Matt Lametta), Monkey Minister, Citron, waterboy382, Oz1980, Zacchini
- Observations - Narcess, Dr. Ultra Doom Laser, .:LOGIX:., Ryan, CSIN, TOneZ2600, jeff affiliate, Freakker, Hoser, Josh, OveRHaulT (Arvada, CO), 00 (Tampa, FL), Dufu, Anon, Shellcode, William, Brain Waste (New York, New York), Chris C.
- Visibility - niknak (Galway, Ireland), chris (Canada), Ruth (Puerto Rico), bookdrone
- Additional Info - Jon, brarsh, Redukt, BBVGoon2126, Crapinapale
- Responses - WhiteHat (Australia), Osi44 (Buenos Aires, Brazil), N@vi, BuffaloB, oZ, H, Paul, Dagfari, Evan, tutwabee (Trey Hunner, San Diego, CA), Cabal Agent #1, Ellomdian
- Gratitude - Alexis, A little kid
- Info Needed - jjr, Jeff, PurpleSquid (Netherlands)
- Hacking La Gard ComboGard Locks - How to reset the combination, by ax0n (Noah Dunker, Olathe, Kansas, Blogspot, Resume)
- Change an Unknown Electronic Combo Lock Combination Hard reset of a La Gard Model 33E (YouTube)
- AVS Spanner Addendum - A follow up to "A Simple but Effective Spanner in Your AVS" by Irving Washington in the 21:1 issue, by Suicidal
- Code: avs_spanner2.cc
- How to Own Star Search - How to make little kids cry, by StankDawg
- Hacking Ticketmaster - Overview of potential exploits to Ticketmaster's TicketFast printed ticket system, by battery
- Practical Paranoia - Practical tips for what to look for when choosing computer file encryption techniques or software, by MoJo
- Building Cheap ID Cards - Make your own barcode ID cards (or "passwords") with an old :CueCat barcode scanner, by Barfbag (Admin @ Team Blank)
- Hotspot Tunneling - Increase your security with SSH tunneling, and also hide your traffic, when using public Wi-Fi hotspots, by Samjack
- Self-Checkout or ATM? - Overview of potential self-checkout machine vulnerabilities - like obtaining the self-checkout operator key or printing your own UPC codes, by Bob Krinkle (Ryan R. Frederick)
- 2600 Marketplace
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: More drivel
- Cover (Cover Info)
- Back Inside Payphones From All Around
- Seychelles A Tatung made phone. Photo by Dominic
- Uruguay Spotted in Colonia del Sacramento, this is known as the "cowhide phone kiosk." Photo by Tom Mele
- Denmark A standard coin phone found on the streets of Copenhagen. Photo by A.M.
- Mali In what may be one of the most remote locations we've ever published, this public satellite phone resides in Sangha on the Bandiagara Escarpment which is in Dogon country and a seven hour drive from Timbuktu. Photo by David Conn
- Back Cover Payphones of the World
- Switzerland This phone is located in Lucerne. The black terminal next to the phone provides email and directory assistance as well as city maps. Photo by Gabriel Guzman
- Japan One of the common gray phones that accepts coins and cards and even has a spot to plug in a modem. Photo by cyph3rkat
- Lebanon A modern looking phone from Beirut. Photo by Dieter K.
- Azerbaijan Taken in Baku with a cameraphone in a "photography prohibited" zone. Photo by Dieter K.
- Staff
- Download Unofficial Scanned PDF!
- Download The Hacker Digest - Volume 21!
$2600 Magazine - Volume 22, Number 1 (Spring 2005)
- Enemy of the People - Editorial
- New York City's MTA Exposed! - Very detailed overview of New York City's Metro Transit Authority (MTA) fare collection system, by Redbird (Joseph Battaglia, Fort Lee, New Jersey, K2BAT)
- mcdecode.pl Display MetroCard Raw and Parsed Data
- Electronic Application Technology - Massive insecurites in the computer employment application forms at JCPenney, by clorox
- Baking Cookies - Overview of browser cookie exploits and PHP code to use captured or packet sniffed cookies, by VileSYN
- Voice Over Internet Protocol - Brief overview of Time Warner's VoIP digital phone service, by Kong
- Hacking Cisco IP Phones - Information on remotely changing settings (via Telnet), initiating calls, and even crashing the Cisco 7940 & 7960 series of IP phones, by Moby Disk (William Garrison)
- Decrypting WS_FTP.INI Passwords - How to decode the password string saved by WS_FTP FTP client software. Simply change the username to anonymous and reopen WS_FTP and it will unmask the password, by H2007
- Hunting Wi-Fi Leeches - Using a packet sniffer to monitor for unauthorized access to your wireless LAN, by RSG
- Unlocking the Power of WAP - How to configure WAP browsers and proxies for Internet access on your cellular phone, by Joshua D. Dick (Marlborough, Massachusetts, Email, Twitter, W1JDD)
- Unlocking the Power of WAP Original
- Unlocking the Power of WAP via Forever Geek
- Backdoor Exits from the U.S. Military - It's intended for use in case the draft is reinstated, or if you really make a major mistake by joining, by Bac
- Blockbuster's Compass - Setting Sail for Port Bureaucracy - Overview of Blockbuster's new employee computer system called "Compass," by Aristotle
- How to Get Out of Google - How to block the Google web spider using meta tags in HTML files or robots.txt, by Chess (Frank Coruzzi, Burnaby, British Colombia)
- How to Get Out of Google Original
- HP Printers: The Hidden Threat - Open ports on HP printers and identification using Nmap and the ability to bypass a firewall by setting up a proxy on an open printer, by DarKry (Wife)
- Disposable Email Vulnerabilities - Potential security concerns with using disposable email services and some ideas for starting your own, by StankDawg
- Disposable Email Vulnerabilities Slides from his Interz0ne 4 presentation.
- Magnetic Stripe Reading - Very good article on homebrew magnetic stripe reader hardware & software, by Redbird
- Code: dab.c
- Code: dmsb.c
- Code: dmsb.py
- Magnetic Stripe Technology and the New York City MetroCard Presented at HOPE Number Six (2006)
- Magnetic Stripes: Part 1
- Magnetic Stripes: Part 2 - Attacking)
- Letters - Exchanges
- Research Results - The Neuralogist, Dyslexic_Hippie, The Grand Master of Confusion (Texas), CatWithTheGatt (Email)
- Further Info - Ruth, chuck, Steve, Mouser_inc, haydenth (Thomas Hayden, Ann Arbor, MI), Mogus, Bob Krinkle
- Questions - 11x, David Oliver, Batman 24, Jason, DP, William, Dave, Black_Angel
- Appeals - DB
- Utter Stupidity - Public Display, gmitch
- Appreciations - marco (aka prime anarchist), Robbie Brewer, Rob Hundred
- Security Issue - Brian
- Experiences - aaron (Los Angeles, CA), MikeyB
- Observations - kyle, scotk, SystemDownfall, Doda McCheesle, Impact, Rifkey, p4p3r t1g3r, drlecter, Freezing Cold 2600 Fan (Ontario, Canada), Terry
- Responses - Alan Horkan (Dublin, Ireland), Jaypoc, Alop, BitPimp (Australia), sp1ke, (none given), Daniel Gray (Defiance, OH), The Stealthed One, Chaad, Skillcraft
- Cover Letter - anonymous, gmcsparran3 (Glen McSparran III, DOB: 09-13-1970), Faber, john2kx (DOB: 08-01-1981), jason, mr_bloko (Garrett Davis), Alex, miles bogus, DigitalDesperado, Martian
- Critiques - Rage1605 (Robert Pierucci)
- Problems - Phreakinphun, andehlu, Alop, ryan, Chris, Jon
- Ideas - Tommy (Maine)
- Fighting Back - saynotoid@gmail.com
- Complete Scumware Removal - Overview of several utilities you can run to remove scumware installed on a Windows system, by LoungeTab
- More Fun With Netcat - Continuation to MobiusRenoire's article "Fun With Netcat" by using Netcat to scan for banners, as a quick FTP server, and to run commands on a remote system, by DJ Williams
- Potential Vulnerabilities in Shared Systems - Overview of why you should have the proper file and directory permissions when using shared hosting services in order to not give out any confidential details, by st4r_runner
- Inside the Emergency Alert System - Technical overview of the FCC's new nationwide Emergency Alert System (EAS) and the possibility of remotely setting it off, by Tokachu
- IPv6 Redux - Examples of a configuring a working IPv6 network under Linux, by Gr@ve_Rose
- tspc-4.0-winxp.exe Hexago Tunnel Setup Protocol Client v4.0 (WinXP)
- tspc-2.1.1.tar.gz Hexago Tunnel Setup Protocol Client v2.1.1
- Introduction to IPv6 by Gr@ve_Rose
- 2600 Marketplace
- Puzzle - A complete scan of #5 ESS RC input message manuals No.. wait.. it's a f*cking crossword puzzle.
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: You just paid $5.50 for a crossword puzzle
- Cover (Cover Info)
- Cover Inside Foreign Payphones
- Alicante, Spain - A standard phone throughout the country. It takes credit cards and coins. In addition this phone has SMS and fax capabilities. Photo by Gabriel Scott Dean
- Alicante, Spain - An older version of the Telefónica phone which has the same features but isn't nearly as pretty. Photo by Gabriel Scott Dean
- Seoul, South Korea - One of many phones operated by KT. This one has a very dominant coin slot as well as the ability to take cards. Photos by Goran Topalovic
- Seoul, South Korea - Another KT phone. The amount of space saved by not taking coins is striking. Photos by Goran Topalovic
- Back Inside Payphones of the World
- Samarkand, Uzbekistan - Coins only but what a magnificent handset. And just look how they've reconfigured the Tone-Tone pad! Photo by Tom Mele
- Mumbai, India - A coin-operated phone at the Taj Mahal Hotel. Photo by Tom Mele
- Anuradhapura, Sri Lanka - We've seen the actual phone in a previous issue but this rural phone booth is a striking sight. Photo by Tom Mele
- Firenze, Italy - A space-age phone that looks as if it's about to burst with enthusiasm. Photo by Lorette Masa
- Back Cover Photo This has to be about the worst idea ever concocted We've heard of driverless light rail systems in the confines of an airport but huge steel freight train locomotives on an easily accessible track? Technology marches on. Found in Roseville, California. Photo by Adrian Lamo
- Staff
- Download Official Scanned Edition PDF!
- Download The Hacker Digest - Volume 22!
"Where's my nine dollars? I want my nine dollars!"
$2600 Magazine - Volume 22, Number 2 (Summer 2005)
- One Step Forward, Two Steps Back - Editorial
- Hacking Google AdWords - Detailed overview of using Google's advertising program and concerns about their profit-driven censorship and hypocrisy, by StankDawg
- DEFCON 13: Hacking Google AdWords (12M MP3) (Slides)
- Hacking Google Map's Satellite Imagery - Analysis of the URL format used to access Google satellite imagery, by Morcheeba (John Maushammer)
- Googlejacking by Example - Technique for Google results hijacking by using HTTP 302 redirects to point Google's search result to a different webpage, by J. V. (Justin Vieira)
- Home Depot's Lousy Security - Huge security hole with Home Depot gift cards using the Codabar system, by glutton (Minneapolis, Minnesota, DOB: 10-12-????)
- SYN-ful Experiment - Perl source code for a program to open a TCP port, useful for testing SYN packet issues on state-like firewalls, by Gr@ve_Rose
- Code: grass.pl Gr@ve_Rose's Atomically Small SYN (GRASS) v0.5
- Gr@ve_Rose's Atomically Small SYN
- The University of Insecurity - Security problems when using easy-to-guess student IDs, by chiLL p3ngu1n
- Creating AIM Mayhem - Programming requirements for making manual AIM connections and sending messages, by windwaker (Drew Blaisdell)
- AIM Eavesdropping Hole - AOL Instant Messenger (AIM) conversations showing up on two (logged-in) clients, by george
- Network Vigilantism Using Port 113 - Testing and securing proper Identd operation on your IRC server, by Tokachu
- Hacking Encrypted HTML - How to use and bypass web pages (HTML) "encrypted" via JavaScript routines used in several software packages, by Edward Stoever (Glendale, California, Resume)
- Hacking Encrypted HTML Original
- Follow-Up
- Passwords from Windows - How to retrieve passwords from Windows' "Protected Storage" with various Windows utilities, by Big Bird
- Data Mining with Perl - Utilizing LWP modules in Perl to automate searching websites or even Google, by Luckycan (Nick, Memphis, Tennessee, luckyallcan)
- A Yahoo! Restriction Defeated - How to save high-resolution pictures from Yahoo! user albums, by BreakDecks (Alexander Vranas, Seattle, Washington, Collierville, Tennessee, LinkedIn, GitHub, Twitter)
- Spying on the Library - How to harass old ladies at the Los Angeles Public Libraries, by solemneyed (Scott Zimmer)
- ParadisePoker.com Blackjack Cracked - Neat trick (and observation) to exploit Internet poker, by JackAceHole
- Letters - Artillery
- In Search Of - Cohen (Eugene, Oregon), Dave, smes (Spam Man Sam, Kelowna B.C., Canada), l0gic (Vancouver, B.C., Canada)
- Questions - Aurature, InfernalStorm, tamsto (Serbia), Gary B. Ticked, Brian, Jason, A Little Boy from China, Orchid
- Feedback - Dave Puype, Crash the Greenhat (Email #1, Email #2, DOB: 02-07-1983), drlecter, Shardin 359, xzanu, Loyal reader (Florida), Brian Detweiler, TraktorGrl, Brian Detweiler, MegaGeek, Hsiao-Ling Liao (Taiwan), Dan, Emoticon, Leprechaun
- Meeting Issues - Chris, James (Louisville, Kentucky), Rashid, Allan, eyeconoclast, ht, Eric Blair, Advent Systems, Don Johnson, James Turner
- Conundrums - Tangled Web, Himi Jendrix (Connecticut)
- Suggestions - windwaker, CSIN, Joe37
- Electronic Voting - Semantic, Bor Onx, Joe Domenici (Austin, TX)
- Contribution - mAcfreAk
- Witnessed - Anarchivist (Karen), MLG
- Letters From Prison - Tony Sparx, Stormbringer
- Further Info - dan0111, Woodzy, FxChiP (Zach, Pittsburgh, PA, MySpace, DOB: 03-17-1987), noir, Nicholas, Shortfuse, ax0n, ssinformer, OWA, D3vUS
- Curiosity - hendon40 (DOB: 07-02-????)
- Corporate Secrets - Please don't use my name, Kaos
- Security Issues - dbax, anonymous, meatwad, Alop, MS3FGX, Bob, SSSSSSSS
- Where Have all the Implants Gone? - Discussing the hype vs. reality of all the bio-implant technology we've heard about in the news and the need for hackers to "challenge the dominant paradigm and break down the bars of technical illiteracy," by Estragon
- Adding Sub-Domain Support to Your Free Dot TK Domain - PHP script to add sub-domains to your free dot.tk hosting service, by Trent Bradley (Blue Collar Camel)
- Code: dottk.php Dot TK Free Sub-Domain Script v1.02
- Getting More from T-Mobile - Overview of customer accounts on T-Mobile plus the possibility of remotely activating a phone via Watson (or social engineering) if you have the proper information, by Psycho
- Remote UNIX Execution via a Cell Phone - How to execute shell scripts remotely via cellular phone email messages by parsing the "Subject" line for commands, by Muskrat
- Code: checkmail.sh
- NCR: Barcodes to Passwords - His article covers the method of creating operating override barcodes knowing operator numbers and passwords and reversing an existing barcode to operator override number and password for NCR E-Series self-checkouts, by Bob Krinkle
- Defeating BitPim Restrictions - Defeat BitPim file copy restrictions, by dk00
- Fun With School ID Numbers - Create your own barcodes in MS Word to alter a school or other similar ID card, by gLoBuS
- Remote Secrets Revealed - Programming Toyota car remote controls (Prestige/TDS/Audiovox APS95BT3/ELVAT5G) or similar without having to pay a tech, by The AntiLuddite
- 2600 Marketplace
- Puzzle
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: The people who try and censor you for having the wrong opinions, and vote for the most corrupt politicians in the world, now apparently care about your freedom.
- Cover (Cover Info)
- Cover Inside Israeli Payphones
- Downtown Jerusalem Someone had to make the decision to put "FIRE" ahead of "AMBULANCE" even though it's out of numerical order. Photo by Shibuya
- Jerusalem's "Old City" Not far from the Western Wall. Seems like all of that yellow space is just begging for some graffiti. Photo by Shibuya
- Jerusalem Near downtown. An orange card-only phone with what appears to be the phone number above. Photo by Shibuya
- Jerusalem In the shopping market district. A gray version with complimentary beverages. Photo by Shibuya
- Back Inside Payphones of the World
- Tunisia This payphone is located at the end of the Tunis Grand Metro in La Marsa. It seems that payphones in Tunis only accept coins. Photo by Richard Springs
- Tunisia This curvy payphone is located in a plaza in La Marsa. This seems to be the newest model of payphones in Tunis. Photo by Richard Springs
- Tunisia The payphone is located in the Tunis Airport. This style seems to be the oldest model still in use. Probably the most blue as well. Photo by Richard Springs
- Syria A payphone from the Axis of Evil! This phone is located next to a tea and shisha shop in Al-Hamidiyeh Souq. It accepts both coins and prepaid cards, although coins are most commonly used. Photo by Richard Springs
- Back Cover Photo We're pleased that Underwriter's Laboratories Inc. recognizes the value of our magazine and that they're willing to tell the world in such a bold an defiant manner. Let's hope it catches on. Found in Camas, Washington. Photo by tOnedeph
- Staff
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 22!
$2600 Magazine - Volume 22, Number 3 (Autumn 2005)
- Questions - Editorial
- Data Destruction, Covering Your Tracks, and MBSA - Removing web browser history's, cookies, and Microsoft Baseline Security Analyzer, by El Rey
- MBSASetup-x86-EN.msi Microsoft Baseline Security v2.2 (32-bit)
- MBSASetup-x64-EN.msi Microsoft Baseline Security v2.2 (64-bit)
- Stupid WebStat Tricks - Overview of using HTTP statistics packages and some potential security holes in leaving them in an open directory, by StankDawg
- A Randomizing Wi-Fi MAC Address AP Hopper - Perl script to program your Wi-Fi adapter with a random hardware (MAC) address via ifconfig, by Eprom Jones
- Code: hopper.pl
- Fun With the PRO-83 - RadioShack PRO-83 scanner overview and discriminator tap mod, by Dit and Dah
- Radio Scanner Modifications and Information
- PRO-83 Keypad Tricks (Note that "PowerHouse Communications" is a fraud who just took the keypad codes from the BC246T/PRO-83 service manual and expanded on them a bit, then whines and pouts if you make a local copy of 'his' little document...)
- Getting More Out of SSH - Basic overview of using a SSH client for those normally familiar with Telnet, by Apratt (Aaron)
- Using Tor and SSH Tunneling - Overview of installing and using Tor onion routing, plus an idea to combine it with SSH tunneling for increased security, by OSIN
- Reverse Remote Access - Initiate a remote access connection to a Windows machine through a firewall using SSH, rdesktop, and sending the remote commands as an email message, by st4r_runner
- Securing a Drive - Using Sentry 2020 on an external USB hard drive, by Dr. Apocalypse
- Securing a External Drive Original
- JavaScript Injection - Detailed overview of a JavaScript-injecting exploit in an online form, by A5an0
- Climbing the SonicWall - Info on SonicWall and SonicOS, and a potential to login as admin without verification, by Kn1ghtl0rd (David, Email, MySpace)
- Verizon Fios - Fiber to the Home - Overview of ordering Verizon fiber to the home service in New York city, by striker
- Improving Stealth With Autoruns - Rename and replace DLLs to hide programs from Microsoft's Autoruns, by BrothaReWT
- SQL Exploits - Overview of of common SQL security holes and the need to parse user input data to prevent SQL injection attacks., by AOnRkjk=
- Hexing the Registry - Manually hex edit the Windows XP registry to disable Messenger Service (or other servies) without the convenience of the registry editor so as to bypass access restrictions, by divarin (Lisa Webber)
- Letters - Words from You
- Devious Plots - anonymous, Shah Chopzillian (Canada)
- Random Questions - B.H.K. Chanaka (Sri Lanka), CalebLeo1 (Owensboro, Kentucky, MySpace, Email, DOB: 08-09-1986), Steven, Jeff, Henry (U.K.), Andrew, George, Duciniti, Dave, Black_Angel, Jeff
- Security Holes - Anonymous, KJ
- Observations - john, Dr. Apocalypse, 5+3v3 D4v3, theXorcist, -ht, Krazy, Sam, Digital_Cowboy, thedave, Mixfever, e-tipper
- Responses - TackGentry (Benji Gray), kip, forrest hoover, kingconga, El Jefe (Zak), Ovid, Dufu, RustyOldBoat (Greg, Australia), GeekBoy, MetroTek, paper tiger, Andrew, MS, Shadow0049, redjen, Shadow Walker, concerned reader, Lews Therin (Ryan T. Barber), Witchlight, Proud Female Geek, Alan, GulfstreamXo, Metal Cutter, pyroburner69
- Advice - *s00p3r sKri8s*, A Big Corporate Tool
- Help Needed - anina, WiseCracker, Marina
- Dept. of Injustice - Screamer Chaotix, fallen (Jake Tungate, Raytown, MO, Website #2), pukethecat, Luke, David
- Memories - Mudwasp (Sydney, Australia), CWA1108
- Reestablishing Contact - Woodstock, CD, jay (Norton, MA)
- Not Working at a Call Center - Story of working at a call center and tips how to avoid work after taking breaks by timing them just right, by XlogicX
- Securing Your Wireless Network - How to secure your wireless connection, by Seal (Julien McArdle, Canada)
- Securing Your Wireless Network BinRev forum posting
- The Continuing War on Spyware - Additional tips and tricks to locate and remove "spyware" on Windows-based systems, by Inglix the Mad
- Hacking ImageShack - Perl script to automate grabbing random pictures hosted on ImageShack, by System Downfall and Worm
- Code: imageshack.pl
- I Am Not a Hacker - Gayhat, by mirrorshades
- Security Pitfalls for Inexperienced Web Designers - Tips for the beginner webmaster on securing CGI/PHP scripts and email addresses on web pages, by Savage Monkey
- A Peek Inside a Simple ATM Machine - Overview of the internals of a Diebold Cash Source Plus 100 ATM, by FocusHacks (Noah Dunker)
- How to Get Responses Through Deception - Telling lies in emails to get the answer you want, by JFast
- The Ancient Art of Tunneling, Rediscovered - Tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as Ping requests and replies, by Daniel (Daniel Stødle, Tromsø, Norway, Email)
- PingTunnel
- PingTunnel-0.72.tar.gz
- PingTunnel-0.70.tar.gz
- Covert Communications on Linux by Kurt Seifried
- Project Loki: ICMP Tunneling Phrack, Issue #49
- LOKI2 - The Implementation Phrack, Issue #51
- Forging an Identity - Some tips on making or obtaining a false ID, by SistemRoot
- 2600 Marketplace
- Puzzle
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: You just paid $5.50 for a crossword puzzle
- Cover (Cover Info)
- Cover Inside Mongolian Payphones
- Phone #1 Yes, this is a payphone. In the streets of Ulaanbaatar, it's the human holding the phone who is referred to as the payphone. Photo by Sasja Barentsen
- Phone #2 The phone itself is a wireless CDMA phone. You give the "payphone" money and you make a call. And yes, most of them wear masks. Photo by Hanneke Vermeulen
- Phone #3 A more normal looking payphone but one that isn't seen in very many places. This one was found in the post office. Photo by Sasja Barentsen
- Phone #4 Here's a variation, designed to appeal to travelers and others who may have second thoughts about walking up to a masked person. Photo by Sasja Barentsen
- Back Inside Payphones of the World
- Belarus #1 A pack of payphones hangs out in the streets of Minsk. Photo by Emmanuel Goldstein
- Belarus #2 A closer look at two of them with subtle differences. Photo by Emmanuel Goldstein
- Russia #1 These were found in the city of Yekaterinburg. Photo by Emmanuel Goldstein
- Russia #2 Very clean and rarely used due to the prevalence of mobile phones. Photo by Emmanuel Goldstein
- Back Cover Photo From the Some People Have Entirely Too Much Time On Their Hands Dept., here is a true "minivan" recreation of our own 2600 van, made from a Tonka toy phone van picked up at an antique shop in Austin, Texas. The tires are a little weird and our rear end looks a lot better, but it's a valiant effort. Photos by Golden Helix
- Staff
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 22!
$2600 Magazine - Volume 22, Number 4 (Winter 2005-2006)
- Preserving the Magic - Editorial
- Network Administrators: Why We Make Harsh Rules - A seasoned computer administrator discusses why they make harsh rules for systems operating on their networks, by The Piano Guy (Gary Rimar)
- Practical Web Page Steganography - RGB, ISO 8859-1, and 1337sP33K - Implementing a form of steganography using HTML color values, by glutton
- Hacking a JP1 Remote Control - Using the JP1 connection on a programmable remote control to reprogram, tweak, or upgrade the control, by J.M.
- The Redbox DVD Kiosk - Overview of the possibility of hacking the Redbox DVD rental kiosks, by blakmac
- Punking the Watchers - Defeating Windows Messenger snooping with a program to simulate random user input and activity, by Mister Bojangles
- How to Track Any U.K. GSM Mobile Phone (Without the User's Consent) - How to track cellular phones on the U.K. GSM system using public mobile phone tracking websites and a fake SMS, by Jonathan Pamplin
- An Introduction to the Asterisk PBX - Introduction to setting up and using Asterisk under Linux, by zeitgeist (Christoph Eicke)
- Spoofing Your Charge Number - Proof that is actually possible to change the Charge Number parameter when spoofing calls, by greyarea
- Spoofing Charge Number DIG Magazine, Issue #4
- Audio Version (5.5M MP3)
- Phone System Loopholes Using VoIP - A list of various tricks for VoIP phones like getting free service, assign a U.K phone number, voicemail, etc., by BreakDecks
- Physically Accessing Your Apartment with Skype - Access an apartment building callbox by call forwarding to a voicemail message containing the proper DTMF code via Skype, by dopamine (Aubrey Ellen Shomo, born Justin Michael Shomo, Denver, Colorado, Resume)
- Obfuscation and Encoding in PHP - Overview of the author's Phonic64 script, which will obfuscate PHP code by turning it into "nearly-sensible gibberish," by Bryan Elliott
- Code: Phonic64.php
- APOP Email Protocol - MDS Challenge/Response - Overview of the Authenticated Post Office Protocol and how it uses MD5 hashes for a challenge/response instead of "in the clear" passwords, by Ovid
- Code: ApopCrack.sh
- PGP Key Signing Observations - Discussing how social systems are the weakest link in PGP and the proper etiquette for key signing, by Atom Smasher
- Letters - Writewords
- Questions - Nate, Kn1ghtl0rd, Buzzbros2002 (Shawn), LiRM, Tenchuu
- New Ideas - Impact, Beowulf, ph4n7oMphr34k
- General Feedback - SAM, Merlin, Colin, glutton, phil, jpeg v1rus, Mike, George The Pancake, Luke, Matt Dreyer, alphabot, savaticus, Anthony
- Advice - Javier (Spain), Harry, Phillip, Adria
- Guidelines - Byte Stealer, Jake, Triad, Andy
- Responses - ProtoHippy, SamStone, Jeff
- Responses to Responses - Ryan, oleDB, Josh D., Maniac_Dan
- The Corporate World - Jon, Golden Helix, Anonymous, NetSurf, John YaYa, sting3r (Mike Jones), CEH
- Evil Doings - Toast-sama (J. Donovan), Selena, Ben, BugDave, Sab, Pizentios (Nick Peters, Brandon, Manitoba, DOB: 02-15-1983)
- Homeland Security - necco
- Permissions - Elegin, Uncle Wulf
- Insecurity - Gavin, Nick B.,
- Offenses - Stuart, Tim "Taiwanese" Liim (New Jersey), Ramasee, Chad
- On The Inside - RustyOldBoat, xoxo (New Zealand)
- Discovery - Tat
- Persuasiveness and Social Engineering - How to be a good social engineerin' engineer, by subphreeky (Jon Winder)
- The Real Electronic Brain Implantation Enhancement - This article will offer information on the factual and idealistic concept of electronic implants working for or alongside the biological nervous system and brain of man, by Shawn Frederick
- Observing the Lottery - Story of a person tracking Pick-6 lottery numbers and finding a "bug" in the ping-pong ball method, by CeeJay
- Sears Portrait Insecurities - Potential security holes in Sears' Portrait Studio system, by Stephonovich (Charleston, South Carolina)
- KODAK Secrets and Walmart Fun - Overview of the KODAK Picture Maker G3 used as the self-photo printing machines at Walmart, by Thorn
- The Workings of a KODAK Picture Maker - KODAK Picture Maker kiosk info - the first generations used Sun hardware!, by t_ratv (Michael, DOB: 10-03-1981, UW Stout)
- WiMAX, AT&T Style - General overview of AT&T's implementation of WiMAX, by Pirho
- Cheap Mobile Internet for Your PowerBook - Connecting a phone (Motorola T722i) to your Mac computer for mobile Internet access, by Mystic
- 2600 Marketplace
- Puzzle
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: You just paid $5.50 for a crossword puzzle
- Cover (Cover Info)
- Cover Inside North Korean Payphones!
- North Korea Phone #1 In the lobby of the Yanggakdo Hotel, Pyongyang. This one only takes IC cards and makes local calls on the phone system that isn't connected to the outside world. (North Korea has two phone systems - one is international-capable and the other can only place and receive domestic calls.) Photo by TProphet
- North Korea Phone #2 On the third floor of the Koryo Hotel, Pyongyang. This one has international capability. To use it, you make an appointment for an international phone call (there are only three international circuits so all usage must be scheduled) and place your call then. You pay when you're finished. Photo by TProphet
- Jordan This phone doesn't take coins or cards and can only call toll-free numbers. Photo by Eric
- Katrina It's true that Katrina isn't a country and that this phone isn't foreign. But it's definitely a payphone in a strange environment and a pretty sturdy one at that. We assume the receiver is around somewhere. Photo by Cameron Bunce
- Back Inside Iranian Payphones
- Esfehan Makes you realize just how insignificant the Touch-Tone pad is in the bigger scheme of things. Photo by Qumars Bolourchian
- Shiraz A little worse for wear. But what a unique cord. Photo by Qumars Bolourchian
- Tehran A more modern model that only takes cards. Photo by Qumars Bolourchian
- Tehran This is a true work of art. At first glance it might seem as if someone just shoved a deskphone into a payphone kiosk. But a coinslot has been added into this structure making it a true payphone. It's unclear what that little padlock is protecting. Photo by Qumars Bolourchian
- Back Cover Photo Here's living proof that reading 2600 will lead to trouble. This little cluster of buildings in San Jose very subtly makes the connection. People driving by see the huge 2600 on the building and rush on over thinking that this is our legendary west coast distribution center. But when they arrive they get the message that becoming involved in 2600 will only wind up getting them sentenced as an adult. Photos by Amorel
- Staff
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 22!
$2600 Magazine - Volume 23, Number 1 (Spring 2006)
- 2600... 2006... 2060 - Editorial
- Filesharing Using TinyURL.com - How to trade small files via URL shortening services (like TinyURL) by converting them into long "hex string" URLs, by mirrorshades
- Code: implant.rb
- Code: extract.rb
- XSS'ing MySpace.com - Good overview of using Cross-Site Scripting (XSS) and JavaScript URL injection on MySpace.com, by FxYxIxE
- United Kingdom: The State of Surveillance - CCTV, ID info, license plate readers - Automatic Number-Plate Recognition (ANPR) in the U.K., by Xen (Xenuhdo)
- Making Rover Fart - Make the Microsoft Search Assistant dog fart by editing the ACS file with your own audio, by Bryan Elliott
- Telecom Informer - Discusses how to add a second phone line (VoIP) to your house for less than $20 and with no monthly fee by modifying an AT&T CallVantage DVG-1120M, by The Prophet
- Hacking the HNAS1 Network Attached Storage Unit - Detailed overview of hacking the firmware on a Hawking Technologies NAS unit for HTTP and root shell access, by Michael Saarna
- Code: fsearch.c
- Hacking 2600.com - Messing around with 2600.com WHOIS information, by Andrew Smith
- Direct Inward System Access and Caller ID Spoofing - Caller ID (CPN) spoofing using Asterisk and an outbound VoIP provider, by iSEPIC
- Hacker Perspective - by The Cheshire Catalyst (Robert Osband, Titusville, Florida, N4SCY, Twitter, Facebook)
- Hacker Perspective Original
- The Intruder A biography of Cheshire Catalyst, Technology Illustrated, Oct./Nov. 1982, by Douglas Colligan
- Hacking PCReservation - Cleartext passwords and open directories with PCReservation software used by many libraries, by Henry Q. Buther
- Hacking the Facebook - Tricks to get people on Facebook to add you to their Friends list or to gather information, by Savage Monkey
- The Price of Convenience: Our Identities - Identity theft info and lack of good prevention laws and just how much of our personal information is already out there, by Squealing Sheep
- Highlighting the Holes - Overview of potential holes in video camera and key card physical security systems, by Modman
- Letters - Sounding Board
- Of Concern - Hiro, Noli
- Requests - Dave L., pseudofed
- An Idea - Miles
- Looking for Advice - Pascal Cretain, phuoc yu, 88LoGan14
- Inquiries - Mike Moore, dt2ra711, Tim, Decay, zack, Peter, Cody, Jsnake, Brian, P3ngu1n, Death, Willie
- Accolades - Joe S., mic911, Part11, Queenie Marblebridge, N. Rajasekharam
- Adventure - DrahconMan
- Stupid Stuff - G Man in the Hole, Alop, M, XSnidalX (James), Death by Microsoft
- Observations - Monty G., Mattington, ch3rry, WiseCracker, Zachary, Undefined32
- Critique - I)ruid, SHR
- Responses - Kn1ghtl0rd, Phuzion, Simon Jester, aztek, Alexei Udal (Audal), Toots, Stormbringer
- Security - The Piano Guy, drlecter, deadman, comfreak, scott
- Further Info - DrBensina (DOB: 11-04-1982), Beowulf, Angry (not mad) Max, The Sarge
- The DRM Plan - How we can fight DRM by supporting the artist, local retailers, and buying the CD, etc. Keep music an issue of control, not permissions, by Don
- The Secrets of Cingular Wireless - Insider information of the customer service procedures at Cingular Wireless, formally AT&T Wireless, which customers can exploit to get free services by The iNSiDER
- Techno-Exegesis - Overview of the new digital satellite and broadcast radio systems and the need for open standards, by Joseph Battaglia
- Not Quite Dead Yet - The current state of payphones, ACTS, and Red Boxing in the U.S., by Black Ratchet (Ben Jackson)
- School Connections - Story of obtaining "free" Internet service in a school dorm after finding a bundle of Ethernet cables in the closet, by graphak
- iPod Sneakiness - Use an iPod and an AutoIt script to steal passwords and install software on someone's computer, by Rob
- A Look at Jabber/XMPP - Discusses Google Talk and potential vulnerabilities in Jabber client/servers using the Extensible Messaging and Presence Protocol (XMPP), by windwaker
- Spyware - The Ever Changing Threat - General overview of spyware/malware, including new developments and understanding the spyware threat and how to defeat it, by FreeRider
- 2600 Marketplace
- Puzzle
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: HOPE Number 6
- Cover (Cover Info)
- Cover Inside More Katrina Phones
- Phone #1 A New Orleans payphone in the Lakeview area that has seen things no payphone should ever have to see. Photo by Chris Chambers
- Phone #2 This area was only a few blocks from where the 17th Street Canal broke. The phone had been submerged and the storage building next to it was overturned. Photo by Chris Chambers
- Phone #3 And this is what it looks like when a cable snaps. Photo by Chris Chambers
- Phone #4 This row of phones is located in St. Bernard Parish in New Orleans and was set up by BellSouth so residents could make calls (supposedly anywhere) for free. Photo by Chris Chambers
- Back Inside Payphones of the World
- India Found in Mumbai Airport. The phone on the left is a typical STD.ISD.PCO payphone with a coin slot. The phone on the right is a credit card payphone. Photo by William Garrison
- Tunisia Another look at the massive blue phones as seen in the arrivals lounge at Tunis Airport. Photo by Joe Deuter
- Austria A few feet of snow has no effect whatsoever here. Photo by slowburn
- Malaysia Found in the streets of Kuala Lumpur. Photo by Gurt
- Back Cover Photo #1 We've been looking for this police car for YEARS! Congratulations to C6S6R8 for finding it somewhere in the streets of New York and for resisting the temptation to steal the license plate and mail it to us. We appreciate that.
- Back Cover Photo #2 Where else but in Ohio could such a sight be seen? Well, probably in quite a few places but this one's a first for us. Spotted by cojak in Columbus.
- Staff
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 23!
$2600 Magazine - Volume 23, Number 2 (Summer 2006)
- Whom Shall We Blame? - Editorial
- More on Hacking Facebook - Discusses a method of reading anything you want from a user's Facebook profile regardless of their privacy settings, by b0rn_slippy
- Code: script.cgi
- Code: script.html
- Getting Screwed by PayPal - Story of problems with PayPal when the person legitimately sold a laptop and the receiver disputed the purchase (with three simple words: "Not As Described," an obvious scam) causing him to lose over $600 and his fight to clear his name, by silic0nesilence (Corey Mishler, Nyack, New York)
- F*ck PayPal The story of how I was screwed by PayPal under the terms of three simple words.. "Not As Described."
- The Battle With PayPal
- Telecom Informer - "NSA has admitted to illegally spying on virtually everyone in the U.S." - this is a flat out lie and isn't even technically possible. Perfect example of the lies and sensationalism Evil Corley and his little followers use to sell more magazines, by The Prophet
- Can They Here Me Now? A security analysis of law enforcement wiretaps.
- Lawful Interception for Internet Protocol (IP) Network
- Lawful Interception and Countermeasures: In the Era of Internet Telephony by Romanidis Evripidis
- SS8 Lawful Intercept Briefing
- Hacking the System - Discusses the author's views on hacking society and includes a detailed example of him harassing his middle school teachers, by Moebius Strip
- Easy Access to T-Mobile and Cingular Accounts - Accessing personal information on T-mobile phones by borrowing their phone, by Battery (Chris Falco, Sycamore, Illinois)
- Ego Surfing - Keeping track of who is searching for you (or others) on the Internet by using Google AdWords, by alokincilo
- Public Access - Tricks on using locked-down public Windows computers to access "unapproved" websites via Windows Media Player , by Insert Name Here
- Breaking Mac OS X Program Security - This article is aimed at displaying the weaknesses in MCX and the XML files that Mac OS X uses to define both the applications that are installed on the system and the applications that a user can run, by Sibios
- GPOs and Group Policy: Just Say No! - Group Policy Objects management information under Microsoft Windows, by WagStaff
- Hacker Perspective - by Bruce Schneier
- Music Today - Holes in the Music Today hosting service by hijacking the chat program, by noir (Nick Arnott)
- Hacking Warner Brothers Records - How to download the top three songs of most artists signed to Warner Brothers Records directly, by c0z
- Letters - Jibber-Jabber
- Experiences - auto456565, Cleara, BigBrother, Acidevil, Mr. K
- Input - vyxenangel, Jeremy, runsetuid.root, Brad Hall
- Suggestions - ThrILL, nitromatt, CerealKiller, Pointilleux
- Another View - Digital_Cowboy
- Responses - windwaker, blakmac, Kaige, devnull, CJ, DZ, Nucow, FelixAlias, The Cheshire Catalyst, George, hypoboxer (Tom Brennan, Murfreesboro, TN, MySpace), Nick
- More Info - Aendrew, sc, meatwad
- Advice Sought - Imegabyte, Symantic, dNight, ansichart, Jeff
- Disturbing Stuff - O-nonymous, NoKaOi, webbles
- Inquiries - Philip, Dany, Zenmaster, Poetics, Shelly L., Uriah C.
- Security Holes - justin, Mark B., Sting3r
- The Retail World - Helack101 (DOB: 08-04-????), Nemo de Monet, Kevin
- Network Administrators: Why We BREAK Harsh Rules - Why strict network rules are not always a good idea, by kaigeX
- Having Fun With Cookies - Discusses uses and abuses of HTTP cookies in real-world e-commerce web applications, by Simon Templer (Email, DOB: 11-30-????)
- Techno-Exegesis - People who think the NSA actually cares about what they do, by Joseph Battaglia
- Roll Your Own StealthSurfer II Privacy Stick - Homebrew USB drive for private web surfing and encryption, by David Ip
- Using Loopback-Encrypted Filesystems on JumpDrives - Using Linux kernel-based loopback filesystems (Loop-AES) to encrypt files on an USB JumpDrive, by OSIN
- An Argument Against MD5 Authentication - Potential security holes with using JavaScript to MD5 hash passwords being sent over the Internet, by David Norman (Orlando, Florida, Email)
- 2600 Marketplace
- Puzzle
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: Bush listening to some terrorist raghead's telephone call is bad, Clinton killing innocent White people at Waco & Ruby Ridge, and Obama/Biden weaponizing the (((DOJ))) to attack their political opponents is good. Who's to blame? Evil Corley.
- Cover (Cover Info)
- Cover Inside European Payphones
- France A stereotypically French payphone booth on the Champs-Élysées in Paris. Photo by 303909
- Ireland This phone was seen in Dublin and is operated by Ireland's second largest telecom company, Smart Telecom, second to the former state-owned Eircom. Photo by Tom Mele
- Romania #1 Found in Sibiu, Transylvania. Until quite recently, Romtelecom had the monopoly in Romania. Photo by Michael Francois
- Romania #2 Also found in Sibiu, Transylvania. A couple of standard (and large) Romanian telephone booths. Photo by Michael Francois
- Back Inside South American Payphones
- Chile #1 In the tiny town of Cucao on Chiloé Island, this picturesque phone booth was found. Photo by Pelayo Besa Vial
- Chile #2 Apart from clashing with its surroundings, this blue phone resembles the old credit card phones that used to be all over the place in the States. Photo by Pelayo Besa Vial
- Brazil #1 Seen in Salvador, a city in the northeast of the country, where people often look as if they're being devoured by payphones. Photos by Marta Strambi
- Brazil #2 These phones are meant to resemble a folk instrument known as a berimbau, which looks remarkably similar - just not as scary. Photos by Marta Strambi
- Back Cover Photo #1 This is an interesting little nail care shop located in a strip mall on the corner of Rt. 59 and New York Ave., Naperville, Illinois. Their explanation of the name is that it's either supposed to mean "unisex" or "uniques." They apparently also run Windows. Spotted by Wordsmith.
- Back Cover Photo #2 Some of you may have heard of the recent Phoenix hostage standoff at the 2600 Building. Our public relations department will stop at nothing to get our name out there. Several of you sent us screen captures from your local TV news. This one was sent by Phnx_fiend. (And everyone got out safely.)
- Staff
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 23!
$2600 Magazine - Volume 23, Number 3 (Autumn 2006)
- Hope and Fear - Editorial
- Identity Theft: Misinformation Can Be Your Friend - How to tweak your privacy, legal documents, and mailing address to keep your identity from being stolen by people like Kevin Mitnick, by Arcade One
- Where Have The Philes Gone? - Why today's "hackers" appear to be most clueless retards and profiteering sell-outs, by glutton
- Jason Scott's Response
- A Back Door to Your Oracle Database - Gaining DBA rights to an Oracle database and keeping those rights by creating a back door, by Edward Stoever
- A Back Door to Your Oracle Database Original
- A Back Door to Your Oracle Database: Part 2 - Obfuscation of the String Literals then Wrapping the Code
- Telecom Informer - Alaskan phone system information, by The Prophet
- Hacking Flickr - How you can change the _t to an _o in Flickr URLs to get the original size image, by undergr0und n1nja
- Fun With the Sears POS - Information on Sears' point of sale terminals and how to crash them, by chr0nicxb0red0m
- Never Pay for Wi-Fi Again! - MAC address tricks to get free wireless Internet access at coffee shops, hotels, by Ray Dios Haque
- Never Pay for Wi-Fi Again! Oddree Magazine, #Issue #1
- Hacking MySpace Using Common Sense - Discusses a method of taking over a MySpace account by guessing the answers to their "lost password" questions, by Dexterous1 (Chino Hills, California)
- Ringtone Download Folliez - How to get free ringtones by viewing the HTML source to grab the direct link to the MP3, by GurtDotCom (Garrett Kendrick)
- Hacker Perspective - by Mark Abene (Phiber Optik)
- Insecurity at Pep Boys - Network and terminal information at the Pep Boys car repair places, by Sakuramboo
- Code: port-scan.pl
- Code: port-scan-update.pl
- Mobile Devices - Current and Future Security Threats - Known and potential security holes in today's mobile devices, smartphones, PDAs, etc., by Toby Zimmerer
- Letters - Written Expressions
- On Privacy - Rogaine Rebel, lup0, Robert Barat, eudemonist, Highdesert, Sim, Marxc2001, Capt Blah, Anonymous, C
- Foreign Payphones - D P, Ahmed M Attef
- Interesting Facts - Name Removed, Zeromatic (DOB: ??-??-1985), Neito, dodgydave, Soho, Wave_Rider_1899, Ashley, Kingpin
- Questions - Neo_Chalchas, BrakeDanceJ, John, Lenny Love the Hobo
- Fighting Back - Arcade One, R
- From the Military - doctor zoiby, Sgt. Paccerelli
- Followups - Black_Angel, Mike Smith, X-Man (Eric-Not), digitalFX, quel, AtomicRhino, Mingming5, Jeremy Moskowitz, Darren, eviscerator, Anonymous, Josh, R., Beowulf, SeLTiC, Second_Wave, Life Subscriber, CJ, Anymoose, BillSF
- Blowing the Whistle - dohboy, El Duderino
- Exploration - Phone Trick, Vince N., fortschreiten
- HOPE Stuff - Aaron, Doulos, Doda McCheesle
- Hacking the System: Useful Connections - Discusses hacking the "real world" by cultivation, nurturing, and maintenance of useful social connections, assets, and information, by Moebius Strip
- Techno-Exegesis - Corporate attitude towards security, by Joseph Battaglia
- Ownage by AdSense - Google AdSense information and a loopholes in allowing third-party websites to place ads based on keywords, by Natas (MySpace)
- Ownage by AdSense Original
- Information's Imprisonment - Freedom of speech restrictions (heh!) and digital rights in today's computer world, by Dr. Apocalypse and Matt Fillhart
- Information's Imprisonment Original
- Singapore Library Mischief - Overview of the new RFID-based system in use at Singapore libraries, by Ghostie
- Monitoring Motorola Canopy with Windows XP and MRTG - Monitoring Motorola Canopy wireless network equipment using Windows XP and Multi Router Traffic Grapher, by dNight (Chris O'Hara?, MySpace, DOB: 09-13-????)
- Attacking Third-Party Tracking - Overview of using a Squid proxy and access-control lists to prevent external party monitoring your traffic while on the Internet, by Particle Bored
- 2600 Marketplace
- Puzzle
- 2600 Meetings
- Price: $5.50
- Issue's Cash Cow: HOPE Number 6
- Cover (Cover Info)
- Cover Inside More Iranian Payphones
- Iran #1 One of the more modern public phones operated by the Iranian PTT in the northern part of Tehran. Photo by op amp
- Iran #2 An older public phone but easily one of the coolest designs we've ever seen on any phone old or new. Found in Shiraz. Photo by op amp
- Iran #3 This is what a privately-operated payphone in Tehran looks like up close. For those keeping track, the fee is 250 rials in coins. Photo by op amp
- Iran #4 Also in Tehran, this demonstrates how privately-operated payphones can literally be put anywhere that happens to be convenient. Photo by op amp
- Back Inside Foreign Payphones
- India Yes, this is actually a payphone in Mumbai. You pay the friendly guy at the counter and make a call. This is very low tech but it provides service to the masses. Photo by Michael Kane
- Norway This is a phone booth seen in the old section of Fredrikstad. These are becoming very rare in the country. Photo by A. Harjurju
- Ghana This is a phone from Cape Coast in the southern part of Ghana. It looks like cards are the only way to pay in order to use the phone but it's not so easy to figure out what kind of card to use. Photo by Patrice Beaulieu
- Philippines Found in General Santos. PLDT, incidentally, stands for Philippine Long Distance Telephone Company. Photo by Chris Crowley
- Back Cover Photo #1 This is part of the secret 2600 compound in Lombard, Illinois where our readers gather for indoctrination sessions and to have their minds purified of anti-hacker rhetoric. Uncovered by Stephen who will now have to be purged.
- Back Cover Photo #2 An important part of any indoctrination is to get to the new crop of minds while they are still young. Here we see this evidenced in the form of one of our elementary schools designed with a hacker curriculum in mind in Manchester, Georgia. Taken without our consent by a free-spirited Mouser_inc who will be sent to the bigger building down the road for reeducation.
- Staff
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 23!
$2600 Magazine - Volume 23, Number 4 (Winter 2006-2007)
- Transition - Editorial
- Mobile Devices - Current and Future Security Threats - Known and potential security holes in today's mobile devices, smartphones, PDAs, etc., by Toby Zimmerer)
- FirstClass Hacking - Overview and security holes in the FirstClass classroom software program used by Canadian colleges, by Cristian (Canada)
- Network Administrators: Rules Rationale - Continuing the discussion on why network admins develop the rules they do, by The Piano Guy (Gary Rimar)
- Wi-Fi Hunting: Basic Tools and Techniques - Overview of the hardware and software needed to track down open Wi-Fi networks, by Rick Davis
- Telecom Informer - Overview of the Japanese telephone and cellular networks and how they use similar U.S. standards and technology, by The Prophet
- Circumventing the DoD's SmartFilter - How to defeat firewall filtering rules on a Department of Defense's computer network by using Archive.org, by Comspec - Sigma Nu
- Algorithmic Encryption Without Math - DOS-based file encryption program which repositions the bits based on multiple encoding passes using one or more pseudo-random number generators, by Dale Thorn (Email #2)
- Code: ccrp.h Version 3.1
- Code: ccrp.c Version 3.1
- Code: ccrp.h Version 4.3
- Code: ccrp.c Version 4.3
- Cryptography of a Sort (COAS) (Original)
- Red Boxing Revealed for the New Age - Red Boxing on ACTS is still possible with the proper routing, by Royal (BinRev Profile, Email)
- Red Boxing Revealed for the New Age Original
- How to Get Around Cable/DSL Lockdowns - Getting around outgoing SMTP filters on cable/DSL lines by forwarding different ports, by Pirho
- Hacker Perspective - by Phillip Torrone
- Library Self-Checkout Machine Exploit - A potential vulnerability in "demagnetize" library self-checkout machines by placing two books in the demagnetizer, by Byron Bussey
- Fun With Novell - NetWare and GroupWise overview and security holes and how to use NWSend, by Cronicl3
- (More) Fun With Novell
- PWDUMP Windows NT Password Dump Utility
- NWSend 5.0 NWSend allows sending and receiving messages between Novell NetWare users that have Client32 installed.
- How to Build a Book Safe - How to turn an old hardcover book into a hidden safe by cutting out the insides, by c-dollar
- Network Programming and Distributed Scripting with newLISP - Overview of TCP/IP network and socket programming using newLISP, by ax0n
- Code: port.lsp
- Code: net-eval-test.lsp
- Code: uname.lsp
- Letters - Conversations
- Suggestion - aft
- Reaction - comfreak, Lex, X!U304d (Sean Street, Arlington, TX), Steve, P3ngu1n, An Unapologetic Neo-Luddite
- Oppression - Kevin, Serkit, Darkpr0, Barada, jasonB
- Submission - Sandro, Riccardo, Name Removed
- Question - vyxenangel, Paul Burden, Greg, ldgeitman, E1nstein, Clark Milholland (Carson City, NV), Raj, Squealing Sheep, Oral Seymour, Pac.Man, Samuel Reed
- Prosecution - Kristin, aft
- Revolution - aRevolutionist
- Clarification - jazzlup0, The Joker, Cynagen, G, Eric Smith, D10D3, BugDave
- Proclamation - Candycone
- Information - Anders, soursoles, Hawk82, Doda McCheesle, Crapinaple (Ryan, LiveJournal, DOB: 05-17-????), Jayster
- Observation - Adelain, Zaphod, GBM76010, Brian, knotknaught, Mike the Liar, chemdream, Marxc2001, Zaphod_B, ben
- Provocation - Tapi, gh0stb0t (Alex Love)
- Appreciation - Jason C.
- Techno-Exegesis - Discusses the overuse of new technology and argues that old technology is often times more appropriate (with specific examples of RFID passports, red light cameras, voting machines, slide rules), by Joseph Battaaglia
- GasJack - Hijacking Free Gasoline - Discusses a method of taking advantage of Giant Food store's gas station GasRewards promotion, by cipz (Jim)
- Code: GasJack.rb
- Motorola IMfree as a Wireless iTunes Remote - Hacking the Motorola IMfree wireless instant messenger device into an iTunes remote control, by Kcahon
- Motorola MX240a Device Interface
- Motorola IMFree MX240a Software Version 1.0.694
- Motorola IMfree MX240a PC Client Version 1.0.729
- The Not-So-Great Firewall of China - Technical overview of how China blocks "harmful" websites and some techniques for defeating Internet censorship by converting search strings from regular ASCII to "fullwidth," by Tokachu
- Code: fw.pl
- Hacktivism in the Land Without a Server - Using JavaScript injection to get "free" stuff via the Korean Friendship Association website by changing the price variable, by \/indic8tr
- K7: Free [for the taking] Voicemail - Obtain (or hihack) a voicemail setup via K7 by tweaking their login URL and deleting the k7.net cookie, by noir
- 2600 Marketplace
- Puzzle
- 2600 Meetings
- Price: $6.25
- Issue's Cash Cow: Stop stealing our magazine or we will increase the price again!
- Cover (Cover Info)
- Cover Inside Payphones of the World
- Albania A friendly looking orange phone which only takes cards. Found in Tirana. Photo by Christian Smith
- Turkey This is a payphone booth in a small town by the Aegean Sea near Assos. It takes credit cards and phone cards while a light switch conveniently hangs from the ceiling. Photo by John Shramko
- Denmark An old coin model. Taken outside one of the main train stations in Copenhagen. Photo by rinjava
- Japan Old and big, yet it does it all. Seen in the city of Kin on the island of Okinawa. Photo by Brian McIntosh
- Back Inside More Western Hemisphere Phones
- Dominican Republic #1 Found outside of Dajabón. It's debatable whether that dish and its solar panel, not to mention the huge conduit, are all there for this one little payphone, which seems to have had all its coin mechanisms removed. Photos by Alex
- Dominican Republic #2 "
- Cuba #1 Two very different ETECSA models. This is part of the government owned communications service. The drab phone on the left takes coins, the bright and cheerful looking one on the right takes cards. Found in Varadero. Photos by Alan Prusila
- Cuba #2 "
- Back Cover Photo #1 Here's a "glitch" that happened at the Barnes & Noble in Easton, Pennsylvania and captured by l33tphreak and smoke. Further proof that their scanning system doesn't always work. The cashier was overheard saying to all of the other clerks gathered round, "And it's a hacker magazine too."
- Back Cover Photo #2 Let's hope the cars don't also run on Windows. This little crash was caught by Brandon Freeman on his way to work in Atlanta.
- Staff
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 23!
$2600 Magazine - Volume 24, Number 1 (Spring 2007)
- Challenges - Editorial
- Understanding Web Application Security - General overview of JavaScript, SQL injection, and cross-site scripting vulnerabilities in modern high-performance web applications and protection from attacks, by Acidus
- JavaScript Malware for a Gray Goo Tomorrow!
- SQL Injection Cheat Sheet v1.4 by Ferruh Mavituna
- RFID: Radio Freak-Me-Out Identification - General overview of how RFID technology can effect our privacy in ways we may not have thought possible, by Kn1ghtl0rd
- Exploiting LiveJournal.com with Clickless SWF XSS - Cross-site scripting attack to play an off-site Flash video on LiveJournal.com, by Zaphraud (Jason Kennerly)
- Telecom Informer - Overview of the New Zealand phone systems and a company that apparently tried to scam the USF, by The Prophet
- Avoiding Internet Filtering - Using HTTPS connections, open proxies, and even Google, to bypass Websense school web filtering software, by Major Lump
- Hacking Your Own Front Door - Quick overview of bump keying commons locks and some tips to prevent this from happening, by Cliff
- Dorking the DoorKing - Overview of DoorKing telephone entry systems, by Cadet Crusher
- Security Holes at Time Warner Cable - Story of grabbing a Time Warner cable technician's authorization code via a keylogger to access tech.nyc.rr.com, by Xyzzy
- Hacking My Ambulance - Overview of the computer system used in American Medical Response ambulances, by anonymous
- SSL MITM Attacks on Online Poker Software - Very well written technical article on Man-in-the-Middle (MITM) attacks and an overview and theory in using them against online poker websites, by John Smith (Email, ICQ: 493690985)
- SSL MITM Attacks on Online Poker Software A paper on mistakes made when using SSL for secure connections. (Original)
- CertChecker.java Checks whether a host's SSL cert is valid. Using this is simpler than openssl s_client -connect <host>:<port> -showcerts and is more scriptable. This was used to validate an entire /19's worth of certs in the MITM article.
- Hacker Perspective - by Bill Squire (BillSF)
- Demon Dialer" Package 1991 Hack-Tic "Demon Dialer" phone phreaking tool. Around 1989, BillSF fled the U.S. to the Netherlands where he then designed the infamous "Demon Dialer."
- Ripping MMS Streams - Saving Microsoft Media Streams (MMS) to you computer using SDP Downloader, by EvilBrak
- Backspoofing 101 - Detailed overview of the "backspoofing" technique to retrieve Caller ID CNAM information, by Natas
- My 2600 Article: Backspoofing 101 BinRev forum posting.
- Can I Read Your Email? - Laws on who can legally read your email (besides Kevin Mitnick), by Alex Muentz, Esq. (Alexander Charles Muentz, Philadelphia, Pennsylvania, 215-895-6469)
- Script Kiddies with Briefcases Additional Info
- Letters - Snippets
- Queries - Name Deleted, A. Saboteur, mr.bitworth, about:blank, The Laguna, Victor, d
- Info - Breto, Danielmoore, N0vus0piate, Bac, LocalLuminary (David Crosby), SN
- Stories - brill, Dave, Kevin, JZ
- Danger - dNight, ch3rry
- Weirdness - drlecter
- Advice Sought - Alexander Chase
- Following Up - Marcio, \8/, Dave, Duncan Smith, McViking, Troy
- Gratitude - Barry, Tr4/\/ce
- Thoughts - skoobedy, Computer Bandit, Exo, psion, Rev. Troy (SubGenius)
- The Format - Brian Heagney, Jeff, Inked Fingers, Adric, Iroe8, Jason, Ian
- Sales - sailboogu, CPeanutG, TwitcH, Johnson Hayes, Alfredo Octavio, Digit_01, Prof. Morris Sparks, F
- Stalking the Signals - General introduction to radio scanning and using near-field receiver functions like Signal Stalker in modern scanners, by Tom from New England
- GoDaddy.com Insecurity - Potential security problems with GoDaddy's account information, by SLEZ
- Hubots: New Ways of Attacking Old Systems - Human-based denial-of-service vulnerabilities with the possibility of distributed brute-forcing of ATM card PINs, by S. Pidgorny (Svyatoslav "Slav" Pidgorny)
- Network Ninjitsu: Bypassing Firewalls and Web Filters - Detailed methods of bypassing firewalls and web filtering using SSH tunneling, by James Penguin (Austin. Texas, Email, Website #2, Website #3, Website #4, Deviant Art, GitHub)
- Hacking a Major Technical School's Website - Getting into an online college library (ITT Technical Institute?) by guessing student ID numbers, by valnour (Bobby Burden, Tennessee)
- Covert Communications Channels - Using JavaScript and HTML methods for covert communication over the Internet, by OSIN
- Code: app.java
- Code: bottom.html
- How to Cripple the FBI - Why you should use strong encryption and passwords for your hard drive contents and Internet communication, by comfreak
- 2600 Marketplace
- Puzzle Excerpt from Led Zeppelin's Communication Breakdown (MP3 - Kinda garbled)
- 2600 Meetings
- Price: $6.25
- Issue's Cash Cow: People Evil Corley supports falsely arrested at protests in Philadelphia & New York: Bad. People Evil Corley doesn't support falsely arrested at protests at the U.S. Capitol: Good.
- Cover (Cover Info)
- Cover Inside Payphones of the World
- Palestine Located in the West Bank city of Ramallah. Photo by Sharif
- China Found in the lobby of a hotel in Xiahe in the Gansu province. Photo by Siegfried Loeffler
- South Korea #1 An older phone found in Seoul that takes coins and cards. Photo by Jean
- South Korea #2 Also in Seoul, this model only take cards. Photo by Jean
- Back Inside Strange Foreign Payphones
- Thailand Separated at birth? This phone was spotted in Chiang Mai, Thailand Photo by Mediatech
- Kosovo And its relative was found all the way over in Fushë Kosova, Kosovo. Photo by Mark Johnson
- London #1 SNAFU? One of those Internet terminals that can be found throughout London, England. And, as with many devices in London, this one had a bit of a problem. Photo by Siegfried Loeffler
- London #2 "
- Back Cover Photo #1 Streets are the theme for the back cover of the Spring issue. And here we see an aptly named intersection in Bellevue, Washington spotted by Pat. Naturally, we are being given the right of way. Please don't ask why 2600 crossed the road.
- Back Cover Photo #2 It's very fortunate for us that the word "hacking" is also a somewhat popular surname. So that means there are all sorts of great photo opportunities out there. This one was taken at Blackpool Pleasure Beach in England. Yeah, that's a strange name too, but the U.K. is full of them. The street was named after one Victor Hacking, a longtime employee of the beach and its associated pleasure(s). Spotted by d2812.
- Staff
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 24!
$2600 Magazine - Volume 24, Number 2 (Summer 2007)
- Remaining Relevant - Editorial
- Discovering Vulns - A good introduction article on the different types of software vulnerabilities and the process by which they are, by Cliff
- Web Application Stress Tool v1.0 The Microsoft web stress tool is designed to realistically simulate multiple browsers requesting pages from a web site.
- The Shifty Person's Guide to 0wning Tire Kingdom - Week long adventure story about Tire Kingdom and exploring their network of IBM AS/400s, by The Thermionic Overlord
- Enhancing Nortel IP Phones with Open-Source Software - Use DD-WRT with OpenVPN to use an IP phone at home as an extension of his office phone, by Ariel Saia
- Telecom Informer - SMS Short Code numbers and the scams that typically revolve around them, and a nice look at long distance "slamming," by The Prophet
- Deobfuscation - Good article on reversing the obfuscation that SourceCop applies to PHP code, by Kousu (Nick Guenther)
- Getting 2600 the Safe Way - Overly paranoid person sets up an ASP script to tell him when this crap comes out, by daColombian
- Code: getting-2600.asp
- Fun at the Airport - Security problems with TSA checkpoints and the low-I.Q., affirmative-action types running them, by Evil Wrangler
- Hacking Xfire - Tweaking the XFire games xfire_games.ini file, including loading programs to create false game results, by Akurei
- Hacker Perspective - by Mitch Altman
- ValuePoint - Serious flaws in the ValuePoint wireless network service offered by many hotels, by Sidge.2 & Bimmerfan
- Internet Archaeology - How to gather historical/hidden information from websites using Archive.org, by ilikenwf (Matt Parnell)
- Internet Archaeology Original
- Hacking Answers by Gateway - How to get help from the Answers from Gateway service with running undocumented commercial software, by Franz Kafka
- Letters - Opinions
- Suggestions - L0j1k, MS3FGX
- Complaints - Guitarmaniax (Peter Huggins, MySpace), Minstrel, Jacqueline, mikes, A Fan, Ignacio, SiKing
- Response to Articles - aa2600 (Dave), dthron, JB, Ugg, Wgoodf (Dale Goodfellow, Edinburgh, U.K.), Wesley, Short Blonde, NYC Locksmith, Pat
- Response to Letters - S. Pidgorny, Hennamono (John English, Littlehampton, West Sussex, U.K.), OSIN
- Injustice - Xiver0m, Barron, Kristian
- Observations - FeTuS in MN, Randall, ThrILL (Orlando, FL), DJ Walker, justin, Ian 2.0
- Taking Action - Anon
- Security Issuse - lucidRJT
- Store Issues - Matthew, Raven, Ben
- Questions - Macavity, M, Davis
- VoIP Cellphones: The Call of the Future - Different technologies being used to implement Voice over IP calling for cellphones, by Toni-Sama
- Pandora Hack - Get Free MP3s - How to download MP3s that are streamed to you by the Pandora Internet radio station, by SickCodeMonkey (David Huggins)
- Adventures in Behavioral Linguistics - People who are wishing really hard to have "Jedi mind tricks" in real life (Neuro-Linguistic Programming), by Marxc2001 (Mark Carney)
- Transmissions - Good advice for improving your operational Internet/computer security in situations where you should be more paranoid, by Dragorn
- An ISP Story - Story about tech support trying to help someone who is having their account compromised by unspecified MSN exploits, by Witchlight
- Hacking Whipple Hill with XSS - Cross-site scripting vulnerability in some school's schedule management software by Whipple Hill, by Azohko
- Code: logger.php
- Haunting the MS Mansion - Windows XP system recovery, and other useful tricks, while using the Norton GHOST 9 bootable recovery CD, by Passdown
- Reading Ebooks on an iPod - Different options for converting long text files into multiple linked "Notes" for viewing on an iPod, by DBTC (Andy Kaiser, Grand Rapids, Michigan)
- Reading Ebooks on an iPod Original
- Java Reverse Engineering - A very good article on using a Java decompiler to make a key generator for Zend Studio, by quel
- Zend Studio 3.0.0 - Linux Client - No JRE
- Zend Studio 3.0.0 - Windows Client - No JRE
- GBPPR Reverse Engineering Lab Software cracking tools, links, & notes.
- Code: createkeys.php
- 2600 Marketplace
- Puzzle (Solution) Data Matrix of HD-DVD/Blu-Ray AACS processing key: 0x09f911029d74e35bd84156c5635688c0
- 2600 Meetings
- Price: $6.25
- Issue's Cash Cow: We are all too stupid to write good articles. Send us more crap!
- Cover (Cover Info)
- Cover Inside North Korean Payphones
- North Korea #1 At long last, we have pictures of actual payphones in the streets of Pyongyang. These are the kind that real North Koreans use, not the ones found in tourist hotels. All of these pictures are of the same payphone bank, which is possibly the only one of its kind in the country. Here we see kids crowding excitedly around the phones, just as they do at payphones all over the world. The allure of communications seems to be universal. Photos by Emmanuel Goldstein
- North Korea #2 "
- North Korea #3 This is the same bank of phones as seen from the opposite end, taken while passing in a bus. There never seems to be a time when these payphones aren't extraordinarily busy. They're located right outside Pyongyang Department Store No. 1 and adjacent to a metro station. Photos by Emmanuel Goldstein
- North Korea #4 "
- Back Inside More Foreign Payphones
- Australia We don't even want to know. Seen in Castle Hill, New South Wales. Photo by P C
- New Zealand This manages to top the Australian entry in the silliness category. This thing actually exists on Stewart Island where the population is 300. We have no idea how payment is arranged but the canopy and phone book certainly add to the experience. Photo by Ben Auchter
- Russia Found in Magadan on the Staritsky Peninsula in Siberia. Payment is through tokens purchased from the local Post, Telephone, and Telegraph (PTT) office. Photo by Intellstat
- Azerbaijan Seen in Baku on Neftilar Prospekti which we're told translates to "Oil Boulevard." On the other side of this phone is a totally different looking payphone that we can't print because we're out of space. Photo by Dominique
- Back Cover Photo #1 Now this looks like it just has to be one of the coolest places in the world to hang out. That is, assuming they have issues of 2600 to peruse. Thanks to Bernie C. for alerting us to the existence of this cafe, located in Honolulu, Hawai'i, right down the road from the main campus of the University of Hawai'i, Mānoa.
- Back Cover Photo #2 "You should never deny your kids education" is how contributor Ethem sums this one up. This 12-month-old kid, incidentally, picked up a copy of 2600 on his own. Toddlers and hacker 'zines both spend a lot of time in bathrooms, after all.
- Staff
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 24!
$2600 Magazine - Volume 24, Number 3 (Autumn 2007)
- Politics - Editorial
- VoIP Security: Shit or Get Off the POTS - Summary of the risks of implementing VoIP in an organization and a good overview of some tools you can use to test your VoIP implementation, by Reid
- Getting More Out of Your College Linux System - Overview of securing your sessions and bypassing any imposed "limits" when using a school-provided Linux system, including install the lightweight Fluxbox window manager, by Silent Strider
- Social Engineering and Pretexts - Store detective and private investigator gives anecdotal advice and stories about social engineering, by Poacher (England)
- Telecom Informer - History and purposes of PBX systems and their significance to phone phreaks and hackers, by The Prophet
- Language Nonspecific: Back to Fundamentals - How once you learn one programming language, you can easily learn others, and why it doesn't matter what language you use as long as you understand what its logically doing, by Kn1ghtl0rd
- Front Door Hacking: Redux - Additional information and tips to the "Hacking Your Own Front Door", by Darkarchives
- A Penny For Your Laptop - Very simple vulnerability in the Kensington MicroSaver notebook lock - use a penny to add tension and spinning the dials until they stick, by Atom Smasher
- Kensington MicroSaver Lock Defeated with a Penny Press coverage on ZDNet. (Mirror)
- Kensington MicroSaver Lock, Paper Key (YouTube)
- The RIAA's War on Terror - Discussion comparing anti-terrorist tactics to those the RIAA is using against music file sharers, by Glider
- Free Files from Flash - Tips for downloading Flash files directly by using a packet sniffer to get their exact URL, by DieselDragon (Colin Blanchard, Farnborough, England, Blog, Twitter, YouTube Channel)
- Free Files from Flash Original
- Target: For Credit Card Fraud - Former employee of Target discloses a whole host of problems with the stores' computer networks and details a method of obtaining register transaction logs, including credit card information, by Anonymous
- Code: grabcc.bat
- How to Get More from Your SugarMama - How to cheat Virgin Mobile's SugarMama ad-supported free minutes program, as well as how to send free text messages through one of Virgin's web interfaces, by gLoBuS
- Owning UTStarcom F1000 - How to unlock the UTStarcom F1000 VoIP phone, by ZiLg0 (Jeremy Brosnahan, Craftsbury Common, Vermont)
- UTStarcom F1000 Release Package V4.50st
- UTStarcom F1000G Release Package V2.70st
- UTStarcom F1000G User Manual
- Hacker Perspective - You (Results from the subscriber survey)
- Hacking 2600 Magazine Authors - A store security agent attempts to track down a 2600 Magazine author via details in their article, by Agent Smith (Possible Email)
- Designing a Hacker Challenge - Create a hacker challenge designed to help you and your crew find out who is the best, and who dies like the rest, by glutton
- Hacking an Election - Former employee of Elections Manitoba, gives a good description of how provincial elections work in Canada, by Dagfari (Canada, South Korea, Dave Alexander, Email)
- How to Cheat Goog411 - How to make free phone calls using Google's 411 service (1-800-GOOG411) by setting up "fake" businesses, by PhreakerD7 (Website #2, Twitter)
- How to Cheat Goog411 Original
- Letters - Yammering
- Privacy - A Broken Husband, Muddy
- Safeguards - inf3kT1D, AnOldFool
- Submissions - Michael, Tyler, ithilgore (Email), Josh, WC
- Meetings - Vince, MasterChen, John
- Critique - Jason Scott, Anonymous, Cliff, P3ngu1n, micah, Crazypete, D1vr0c, Nelson, Anonymous
- Retail - Michael, Justin, John, Trollaxor, Michael
- Encryption - Atom Smasher, SodaPhish
- Questions - dluvaisha, Elana, Haroon the Hacker (Grant Hayes), Zoran, Phail_Saph (Email, BinRev Profile), Omid
- Injustice - The Invisible Man, carbide
- Gratitude - Jane Doe
- Observations - Rev. Troy, Arcade One, Jason, Mattew, Cyphertrex, acidie, ViSiOn
- Hacking the Buffalo AirStation Wireless Router - Default login and password (root!) on Buffalo AirStation wireless routers, by Donoli
- The Thrill of Custom Caller ID Capabilities - Discusses using caller ID for call routing to lower costs, simplify voice mail access and maintain a single-number presence, by krt
- Securing Your Traffic - How to tunnel all of your traffic through SSH, includes options for Mac & PC, by b1tl0ck
- Transmissions - Ethical implications of using "open/free" wireless access points, and then goes into how different countries view the legal aspects of it, by Dragorn
- Hacking the Nintendo Wi-Fi USB Connector - How to modify drivers and software for this device to unlock its use as a general purpose USB Wi-Fi device and access point, by MS3FGX (Tom Nardi, Trenton, New Jersey)
- Hacking the Nintendo Wi-Fi USB Connector Original
- Nintendo Wii Networking Guide Version 1.2 by Tom "TJ" Nardi
- Fun With International Internet Cafes - Disable the timer on an Internet cafe computer in Bangkok by removing it from the startup entries and rebooting, by route (Australia)
- The Trouble with Library Records - History behind INNOPAC, a popular library management system, by Barrett D. Brown
- The Life and Death of an American Help Desk Agent - Good summary of the different tiers of support and their culture - and how evil IBM Charlotte is, by Geospart (George Doscher, Jacksonville Beach, Florida, Twitter)
- 2600 Marketplace
- Puzzle A PDF417 barcode containing a quote from Winston Churchill that was broadcast on October 1, 1939 and said, "It is a riddle, wrapped in a mystery, inside an enigma." (He was talking about the USSR.)
- 2600 Meetings
- Price: $6.25
- Issue's Cash Cow: Evil Corley voted for, campaigned for, and openly supported the most corrupt (((politicians))) in human history - but it's all YOUR fault nothing works!
- Cover (Cover Info)
- Cover Inside North Korean Payphones!
- North Korea #1 As luck would have it, we have a second batch of North Korean payphones, one issue after we printed our very first pictures of actual payphones in the streets of Pyongyang. These are from a different bank of payphones in the same city. Photos by kalafior
- North Korea #2 "
- North Korea #3 For the first time, some really up close pictures of these phones. Photos by kalafior
- North Korea #4 "
- Back Inside More Foreign Payphones
- Tajikistan #1 Found in Dushanbe, this newer phone takes cards. Photo by Astcell
- Tajikistan #2 Also in Dushanbe, older phones like this one are from the Soviet-era. In many locations, people take the old phones, tap in their own personal phone, and open their own payphone business. Photo by Astcell
- Bangladesh #1 A non-operational model found at the Chittagong Railway Station in Chittagong. Photo by Inferno
- Bangladesh #2 Also non-operational in the same place, but at least this one looks like it's been through a lot more. Photo by Inferno
- Back Cover Photo #1 It took darkism nine months of riding the 'L' in Chicago before spotting car #2600 on the Purple Line at Howard Station. Naturally, #2599 was spotted dozens of times before this memorable moment finally occurred.
- Back Cover Photo #2 Yet another cool hangout for us all to congregate in. Joel Weisman says the Hexagon Bar in Minneapolis is a hole-in-the-wall with a magical address that actually isn't all that bad. We can certainly identify with that.
- Staff
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 24!
$2600 Magazine - Volume 24, Number 4 (Winter 2007-2008)
- The More Things Change... - Editorial
- Power Trip - In-depth article on using web cameras, motion capture software, and remote UPS controls to monitor unauthorized access to your secure computer setup, by OSIN
- Code: apm-monitor.pl
- Building Your Own Networks - Building secure "off-Internet" wired or wireless networks modeled after FidoNet using OpenVPN, by Casandro (Christian Berger, Germany)
- Code: getkeys.cgi
- Code: search_ip.sh
- Code: write_configuration_files.sh
- Pirates of the Internet - Overview on some of the terms used, and who are the people behind, the warez you download, by black_death (Canada, Email #1, Email #2, DOB: 01-26-1989)
- Telecom Informer - Overview of the Enhanced 911 system and "SWATting," by The Prophet
- Darknets - A look at creating private, secure file sharing networks to avoid government censorship, by WillPC (William Raffield, BinRev Profile #1, BinRev Profile #2)
- Scanning the Skies - Overview of satellite receiving technology and receiving free analog video channels, by GutBomb (Jason Merrill)
- Pansat 2500A Firmare Update Procedure
- Pansat 2500A Receiver-to-Receiver Transfer
- Pansat 2500A Firmware Update
- Essential Security Tools - Overview of common open-source network security tools, like Netcat, Nmap, THC-Amap, hping, GRASS, and ike-scan, by Gr@ve_Rose
- Decoding Experts-Exchange.com - Access "censored" information on certain websites by viewing the HTML source and ROT-13'ing the access key or answers, by Phatbot (Derek Kurth)
- An Introduction to Beige Boxing - Discusses construction of a phreaker's "Beige Box" - which allows you to connect a phone, laptop, or PalmPilot to a POTS phone line, by Erik Paulsen
- Hacking the SanDisk U3 - Overview of the U3 Smart Drive partition layout and some example ISO files to create your own applications, by Mercereau (Jonathan Mercereau, dohboy)
- Code: getInfo.vbs
- Hacking the SanDisk U3 Original
- Reinstall or Restore U3 LaunchPad Software into USB Flash Smart Drive
- How to Customize U3 USB Smart Drive to Become Ultimate Hack Tool
- Hacking U3 Smart USB Drives
- launchpadremoval.exe This is the same EXE as U3Uninstall.exe (3.5M EXE)
- U3 Deployment Kit Version 1.0 (March 2006, Rev. 1.0)
- U3 Platform 1.0 SDK September 2005
- Exploring AT&T's Wireless Account Security - Discusses customer information that AT&T customer service representatives have, and how that information might be social-engineered out of them, by satevia (Michael, Fullerton, California)
- Hacker Perspective - by Rop Gonggrijp
- Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment
- Case Study Report on Electronic Voting in the Netherlands
- Nedap/Groenendaal ES3B Voting Computer: A Security Analysis
- (More) Fun With Novell - Additional Novel hacking tips, including how to hide PWDUMP from Norton AntiVirus and an intro to PsTools, by Cronicl3
- PayPal Hurts - Article about how PayPal ✡ transaction reversals can cost recipients a lot of shekels, by Estragon
- Facebook Applications Revealed - Security implications of third-party apps using the new Facebook application API, by stderr (Kenny, Florida, Email #2, BinRev Profile, Website #1, Website #2, MySpace, GitHub, Twitter)
- Letters - Declarations
- Mischief - PhreakerD7@gmail.com, mthed
- Binding Woes - XeNoS, Andy
- Discoveries - shaunxcore (Manchester, U.K.), Chris, Lex, a a, Noah
- Theories - Jesse, Ken, kiX
- Responses - Squeeling Sheep, 3v.mike (Mike Lauber), i<3puppies, theforensicsguy, ThoughtPhreaker (Cody, DOB: 02-13-1991, Portland, Oregon), c0ld_phuz10n (Las Cruses, New Mexico), Logopolis, Zaphraud, Dvnt, F33dy00
- Ideas - FobG, thotpoizn (Jason), Matthew
- Problems - Beachedwhale, The Philosopher, Togeta, Ramie, hypo, Office of Special Investigations
- Questions - M, Doda, David, John, RB in SF, CMG, suN8Hclf, BiomechanoidXIII (Brandon, DOB: 05-13-1987), Anthony, Christine, W1f3y 0f R34d3r, FK
- Surprised? - SJKJRX, MasterChen, PriesT, Unknown One, stranger0nfire
- Opportunity - John(SAN)
- Observations - PlumBob, hypoboxer, Mike, DataBoy, speedk0re, Brian the Fist, drlecter, Jeff, Boomer/NTT, Matt
- Hacking Windows Media DRM - Using Windows Media Player 9 in debug mode and DRM2WMV to remove DRM protection from WMV video file, by Alt229 (Erin Scott, Arcadia/Sierra Madre, California)
- DRM Tools
- How to Remove DRM Protection for Video Files
- Satmonk's DRM Tutorial Direct stream copy with decrypting for online license acquisition WMV files.
- DRM10 Cracked? via Doom9's forums, the in-place to be for everyone interested in DVD conversion.
- DRM Removal - A Detailed Guide
- How to Remove DRM (Digital Rights Management) from WMV Videos
- Windows Media Player v10.00.00.3646 Original CAB file
- Windows Media Player v10.00.00.3650 Original CAB file
- Windows Media Encoder 9 Series
- The Noo World - A look at nootropic drugs, which are natural, semisynthetic, or synthetic compounds which purportedly improve cognitive functions, such as executive functions, attention or memory, by Agent5
- Nootropic Drugs "Drugs that make you smart."
- Forensics Fear - Information on Guidance Software's Encase Enterprise Edition and how to find and bypass it, by Anonymous Chi-Town Hacker
- Transmissions - Various issues with privacy related to browsing, searching, and using various web sites, by Dragorn
- Cracked Security at the Clarion Hotel - Story on keystroke loggers found on the computers at a Clarion hotel and general poor security of their network, by Gauss VanSant
- Building Your Own Safe, Secure SMTP Proxy - Python script to bypass SMTP restrictions on your network, by sail0r (Email #2)
- Code: SMTPLocalService.py
- Code: SMTPRemoteService.py
- Zero-Knowledge Intrusion - Zero-knowledge intrusion is based on two principles: perform only passive reconnaissance, and do not ever generate traffic that is not generated by legitimate clients on the network, by S. Pidgorny (Svyatoslav "Slav" Pidgorny)
- Getting Around 802.1x Port-based Network Access Control Through Physical Insecurity
- Securing Wireless LANs with PEAP and Passwords v1.6
- Securing Wireless LANs with Certificate Services v1.6
- Booting Many Compressed Environments on a Laptop - Run multiple operating systems on a limited-space hard drive by compressing them, by Scotty Fitzgerald (Email #2)
- Avoid Web Filtering with SSH Tunneling: Encrypted Circumvention - Discusses a method of circumventing web filtering systems by disguising your SSH tunnel as a HTTPS connection, by Tessian (Bensalem, Pennsylvania)
- How to Bypass Most Firewall Restrictions and Access the Internet Privately (a.k.a. The Surf at Work Page) Versioe 2.1
- 2600 Marketplace
- 2600 Meetings
- Price: $6.25
- Issue's Cash Cow: More sensationalism to help increase their net profits.
- Cover (Cover Info)
- Cover Inside Payphones of the America
- United States One of the more creative payphones of the States, found (where else?) at the entrance to the Kennedy Space Center on Merritt Island in Florida. Photo by icurnet
- Costa Rica Seen at a local shopping mall. Note how large the phone number is on this particular model. It's almost as if they want people to call payphones, unlike in the States where incoming service is often turned off. Photo by RadioRover
- Belize Found in a restaurant/bar in San Ignacio. What it lacks in size it makes up for in overall design. Photo by Phred
- Colombia Seen in Chia, this bank of phones has what has to be the most dramatic awning ever made for payphones. Photo by Random
- Back Inside Overseas Payphones
- Iraq #1 Seen in a bombed out Iraqi hospital east of Baghdad. Note the "Call Me" request on the chassis. Photo by William Johnson
- Iraq #2 Seen outside a hospital in Sulaimanyah. The white piece of paper gives advice on preventive measures to take so as not to contract cholera. Photo by Conan
- Morocco Found in Marrakesh, this is what we imagine payphones must look like on other planets. Photo by birdy
- Cayman Islands This is about as many payphones as you'll ever see in one place. These were found at the port of call for cruise ships in George Town, no doubt placed there before the advent of cell phones. Photo by StankDawg
- Back Cover Photo #1 This photo of 2600 Barracks Road in Charlottesville, Virginia comes to us from Beth Skrobanski. It's home to The Colonnades, a retirement community that we're currently negotiating with to get discounted rates for members of the hacker community when the time comes. Even the font looks familiar.
- Back Cover Photo #2 In answer to the question we get asked more than any other as to just where Walmart Store #2600 is, the answer is of course Chesterfield, Missouri. In fact, it's on the wall of this very store, discovered by Doyle Glaze, that the Children's Miracle Network donated a whole bunch of balloons to commemorate this historic fact.
- Staff
- Download Official Scanned PDF!
- Download The Hacker Digest - Volume 24!
$2600 Magazine - Volume 25, Number 1 (Spring 2008)
- The Whole World's Watching - Editorial
- Vhreaking with VoXaLot - Defines common VoIP terms and describes how to set up a nearly free telephone system to make calls around the globe using the VoXaLot service, by Jose Romeo Vela
- Dirt-Cheap Phone Calls the VoIP Way - Describes the author's VoIP setup and what he's learned from setting it up. He was unable to discover a truly free setup, by SiliconeClone (Swartz Creek, Michigan, MySpace)
- Skype/VoIP Phone Adapter by Vitali Virulaine
- Gaming AT&T Mobility - Discusses a number of "social engineering" methods and strategies for obtaining freebies/extras on your mobile phone bill from AT&T customer service, by The Thomps
- Telecom Informer - Discusses the telephone systems in jails and prison and how its a profit center for prisons and a ripoff for the inmates. Also details a bit about the systems used and some of the rules imposed, by The Prophet
- Password Memorization Mnemonic - Discusses a method of generating passwords for multiple websites that are both easy to remember and fairly secure, by Agent Zer0 (Philadelphia, Pennsylvania, MySpace)
- Hacking Two-Dimensional Barcodes - Discusses 2D or matrix bar codes, details what they are, how they work and the types, by glutton
- Dissecting the EPC: RFID for the Commercial Sector - A good technical dissection the Electronic Product Code and Gen2 standards for RFID tags, by Kn1ghtl0rd
- Eavesdropping with LD_PRELOAD - Discusses a method of overloading shared libraries in user space to hijack function calls, by phundie
- Code: eve.c
- April Fools' Day - The Hacker Way - Discusses a pretty good April Fools' Day joke done by the author on his company's CEO, by xinit
- Remember CompUSA - Details a method of obtaining CompUSA sales information (including credit card number, expiration date, etc) from an IMS terminal within the store, by silic0nsilence
- Downloading MP3s From AllOfMP3 for Free - Discusses a method of getting free MP3's by using the sign-up credit of the allofmp3.com site, by He-Who-Must-Not-Be-Named
- Swindling From SearchFeed - Discusses a method of simulating user clicks on SearchFeed ads, by Atomic Rhino (Matt McMillan, Ontario, Canada, DOB: 11-01-1983)
- Hacker Perspective - by Martin Eberhard
- Bypassing a Restrictive Internet Proxy - Explains how a restrictive Internet filter works, and how to tunnel past it by setting up a SSH tunnel proxy, by Anonymous
- Corkscrew Corkscrew is a tool for tunneling SSH through HTTP proxies.
- Shadow Life - Outlines the basic techniques of creating and maintaining an alias or alternate personality, by Akasha
- Walk With Me, Talk With Me - Discusses gang signs and suggests using for covert communications during field phreaking or urban explorations, by phlux (Clinton Haller)
- Walk With Me, Talk With Me Original
- Letters - DISPATCHES
- Random Bits - A reader of 2600, Travis H., Michael J. Kowalski, Peter, chris, Tsun
- Suggestions - Bluecoat, Rodger, Bryce Lynch, Loki
- Analysis - s, Oisin O'Connell
- Queries - Michelle, Jeff Nunn, drlecter, j4ys0n, Cyph3r7, name, Jan, T.L./Retroactive, Andrew, Anonymous, granny, Widerstand, Jane Doe
- "Surprised?" - Unr3a1, HealWHans
- Statements - Asymptoted, A Depressed Soccer Mom, dave
- Article Feedback - Storm2439, Yawk, Anonymous, Jeff, Da Keet, Mike Diaz, virusrr, Darren McCall, The Jeff, David Barrios
- Scams - Warden1337 (Ontario, Canada), LoHan, Nagasenpai, GeekBoy, L33tphreak
- Opportunity - marie
- Observations - Rob G. (San Jose, CA), LongwoodGeek, Check Check, carbon/infowire, orPHan, J, Jeff, Eric Lee Elliott
- Letter Feedback - Cliff, hAshedmAn, Tony Zinnanti, "Thok", Paul
- Sad News - The Clone (Canada)
- Fun With the Snom Outlook Add-On - Discusses a method of VoIP remote call initiation using the Snom Outlook add-in, by reid
- The EU Directive on Data Retention: Surveillance 2.0 - Discusses the European Union's retention policy for communication data. Details the pros and cons (i.e. privacy vs sanity) and mentions direction U.S. is heading, by Andreas Rietzler
- Transmissions - Discusses broadband service providers efforts to control the Internet and the 'net neutrality' debate, by Dragorn
- Information Flow on Campus: A Closer Look at Wikipedia - Discusses Wikipedia and how the editing process works. Notes the process lends itself to (((bias and manipulation))) of information, by Barrett D. Brown
- Fiction: To Kill an Atomic Subwoofer - Tells the story of how the author silenced a neighbors loud car stereo system, by Dionysus
- Uses for Knoppix - Discusses the use of Knoppix to retrieve files from a Windows machine without having to login to it, by Variable Rush
- 2600 Marketplace
- 2600 Meetings
- Price: $6.25
- Issue's Cash Cow: Confusing FISA, a foreign intelligence act, with the (technically) legal monitoring U.S. citizens.
- Cover (Cover Info)
- Cover Inside Foreign Payphones
- Argentina It's hard to believe such old payphones are still in use but this one was indeed found in the Palermo Viejo district of Buenos Aires. Photo by Kingpin
- Barbados Seen in Bridgetown, this has got to be one of the flashiest, most commercial telephones ever created. Photo by Keith Hopkin
- China Seen in Songpan and conveniently next to a fire hydrant. Photo by Ben Tanner
- Ethiopia Seen in Jimma and conveniently next to a trash can. Photo by Ben Tanner
- Back Inside Weird Payphones Moments
- Morocco Found in Agadir, this is probably the most secure phone in the world. At least in outward appearance. Photo by Shareef Zawideh
- England No, it's not a hacker space. It's actually a British Telecom facility in Leeds where payphones are tested. Each payphone runs a TCP/IP stack over PPP. Photo by Kokor Hekus
- United States #1 We had heard that AT&T was dropping all payphone service. Here's the proof. This was spotted outside their Gardena, California office. Photo by Jerry Dixon
- United States #2 "
- Back The Back Cover Photos
- Back Cover Photo #1 Mungopw discovered this 60 foot sign right outside the Muckleshoot Indian Casino in Auburn, Washington. We see the existence of "2600 machines" as an open invitation to hackers to come and try their luck.
- Back Cover Photo #2 Here's one of those tenant directory phones that you find at the entrances to apartment buildings. You scan for the person's name and it dials them, often Touch-Toning their unlisted phone number for you to hear. As you can see, this tenant has a rather interesting name. Spotted (and hacked) by drlecter.
- Staff
- Download Unofficial Scanned PDF!
- Download The Hacker Digest - Volume 25!
$2600 Magazine - Volume 25, Number 2 (Summer 2008)
- The Best of Times - Editorial
- Don't "Locate Me" - Clever little hack for defeating Google Maps "Locate Me" feature via MAC address manipulation, and the possibility of turning it around and tracking a target via their MAC, by Terry Stenvold (Vancouver, Canada, Email)
- Don't "Locate Me" Original
- Code: delbr0.sh
- Code: skyhack.sh
- Don't "Locate Me" - Video Demonstration (YouTube)
- Article corrections appear in the letters section of 25:3
- Exploring Road Runner's Internal Network - Discusses how the Road Runner ISP internal network for static IP addresses is (was) wide open for network sniffing!, by Tim
- Hacking Wireless Networks with Windows - Discusses how to access a wireless network that limits connectivity by using an existing computer's MAC address, by Carbide
- The HughesNet FAP - Discusses a method of circumventing the download limits of the HughesNet satellite Internet service, by ntbnnt (Nathan Bennett, Marion, North Carolina, MySpace)
- Telecom Informer - Discusses the technology and standards of SMS text messaging and what it takes to send an receive a simple message, by The Prophet
- Hacking Society - Discusses how companies use holding actions (i.e. placing barriers and wasting your time) to manipulate customers and how to turn the tables on them, by Barrett Brown
- Thirteen Years of Starting a Hacker Scene - Discusses the history of the Brazilian hacker scene and Brazil's firest hacker 'zine, Barata Eletrica, he created in 1994, by Derneval
- Hping (The Part I Forgot) - Discusses the Hping tool from the basics of crafting TCP/UDP packets to advanced abilities like file transfer over ICMP, by Gr@ve_Rose
- Meditation for Hackers: All-Point Techniques - Discusses meditation and several techniques for practicing the author's "all-point" method, by Sai Emrys (Berkeley, California, DOB: 01-12-1982, Facebok, Twitter, YouTube Channel)
- Fun With Network Friends - Discusses a method of being able to view (in Firefox) the web sites someone on your network is viewing using tools in dSniff, by Uriah C.
- Code: HTTPSteal.sh
- Hacking: A Graffiti Writer's Perspective - Discusses the similarities between computer hacking culture and graffiti artist culture, by sc0ut64 (Dominic Gross, NYC, Miamisburg, Ohio, Website #1, Website #2?, Twitter, DeviantArt, MySpace, Facebook)
- Hacker Perspective - by Barry Wels (The Key, Holland)
- A Portable Encrypted Linux System for Windows - Discusses how to create a portable Linux work environment using TrueCrypt and Damn Small Linux, by Aaron
- MAC Address Changer - Discusses randomly changing your MAC address to maintain your privacy on a network, provides a Bash script to accomplish this easily, by Plasticman (Steve)
- Code: change-mac.sh
- Capturing Botnet Malware Using a Honeypot - Discusses how to set up a Windows honeypot, and analyzes a botnet that infected the author's own honeypot system, by L0j1k
- Letters - dialogue
- Suggestions - Nsane HAcker, Greg
- Inquiries - Carl, Tommy, redtape, Joseph, Mike, Liam/M/37 (Glasgow, Scotland), SAR, etsjobs, John, Eva, Z, Haestar, R, Phobus, Donna, Tom (Austria), [Name Deleted], erik, Acidevil, chris, Musique Maison, ero0cool
- Observations - f0xR4c3r, Padraig, tim, CJ Lorenz, rmpants, SiKing, Bob, Noli, Jigsaw, Barrett Brown, Peter DiGiovanni, Lo$er, aurfalien, Dr. C.
- Critique - Gunslinger, Chris A., Shocked998, Druid, indiana_lau, iivix (U.K.)
- Projects - dave, David, Breaker Boy, Inmate #210266
- Responses - Emperor, Omega_Iteration, Zach C., Exo, Rob, Peet the geek, Unr3a1, Ed, m0untainrebel, creepyinternetstalkerdude
- Problems - Morgan, route (Australia), Martha Adams, Krista (Fredericton, N.B., Canada), Sneak Email from a Vendor, Paddy, Markus (Austria), Nick (England), The Jeff, Max Rider
- Good Things - ExPhillyMM, Apathy, Israel Torres, Lex
- Cracking with the Webtionary - Using Google and Yahoo! and other search engines to "light-force" crack MD5s with an (almost) infinite dictionary, by Acrobatic (Jeff B. Nunn, Dallas, Texas, Website #2)
- Code: index.php
- Code: md5-source.php Crack MD5 v.03 by Acrobatic
- Cracking MD5 Hashes with the Webtionary
- JavaScript Password DOMination: Easy Password Retrieval Using JavaScript and the HTML - Discusses a method of using JavaScript in a browser's address bar to re-display a password from a previous login form, by Jacob P. Silvia
- Spirits 2000 Insecurity - Discusses the Spirits 2000 retail liquor store software suite including where employee and plaintext credit card information is stored, by drlecter (Weston George)
- Transmissions - Discusses the history, circumstances and technical details of the OpenSSL flaw affecting many Debian-based Linux distributions, by Dragorn
- The Geek Squad - Discusses using a keylogger to obtain access to the Geek Squad's customer database, by Turgon
- Bank of America Website Flaw - Describes a security flaw in Bank of America's website which allows other customer credit card statements to be viewed in some circumstances, by malpelo93
- Why is This Computer Connected to the Internet? - Discusses the flawed rational for connecting many computers to the Internet unnecessarily and the potential catastrophic ramifications, by Porter Payne
- Fiction: Message of the Day - Tells the story of how the author almost got arrested for hacking and ended up working as a security consultant, by Peter Wrenshall
- 2600 Marketplace
- 2600 Meetings
- Price: $6.25
- Issue's Cash Cow: The Best of $2600: A Hacker Odyssey
- Cover (Cover Info)
- Cover Inside Weird Ass Foreign Payphones
- Tunisia Found in Chebika, near the Algerian border. This is the first payphone we've ever seen that specifically expresses hostility to cell phones. Photo by Lawrence Stoskopf
- Panama Now here's something you don't see every day. Unless you're in Boquete, a city in Chiriquí province, in which case you'd be used to this trailer of phones that was just dropped on an available dirt patch. Note the phone cables running from the hitch on the left. Photo by Xiguy
- Fiji Seen in Suva. We can't really say for sure just what's going on here with the pincher-looking things. Perhaps it's for those people with cell phones? It could also conceivably be some sort of tribal pole. Photo by Peter Vibert
- Argentina We'd love to know the story behind this one. This payphone was found in the middle of the jungle at Iguazú National Park. The sign translates to "Please do not put water on the telephone." Too bad, it was exactly what we wanted to do when we saw it. Photo by Martin
- Back Inside More Strange Foreign Payphones
- Mali At last we can say we have a payphone photo from Timbuktu. And here you can relax outside the phone booth as well as inside. Photo by Stephen Rice
- Thailand Found in Chiang Mai in the north. This thing looks like a creature from The Terminator. Let's hope it's on our side. Photo by swan
- Peru Apparently you can save a lot of time and expense by simply drilling phones into stone walls around here. These ones were found in a mountainous region. Photo by Mark Jensen
- India This phone was seen in Bangalore. It's about as retro a look as we could ever hope for. Photo by Larry Cashdollar
- Back The Back Cover Photos
- Back Cover Photo #1 Tom discovered our secret Walmart trailer parked in a loading zone in an undisclosed part of the country where there were signs all over proclaiming "Camera Use Prohibited." They really should know better, shouldn't they?
- Back Cover Photo #2 Found in Phoenix, Arizona by David Jacobson, who believes this institution's motto should read: "Be debt free and never have to pay for the credit charges that you make in the future. Hacker Financial can make it happen."
- Staff
- Download Unofficial Scanned PDF!
- Download The Hacker Digest - Volume 25!
$2600 Magazine - Volume 25, Number 3 (Autumn 2008)
- The Last Shall Be First - Editorial
- Bell's Mind Markup Language - Information on the Bell's Mind "phone scanning by hand" language to help in the creation and dissemination of phone number scanning data, by dual_parallel
- Bell's Mind Markup Language Original
- Code: handscan.pl
- Code: process4mysql.pl
- The TORminator - Perl script to help identify which countries (IPs) are running the exit routers on the Tor network, by OSIN
- Code: parse.pl
- Code: Tor Analyzer
- The State of Cyberspace and Cyberwar - Article discussing what and who could be involved while "fighting" in "cyberspace," by Barrett Brown
- Watching the Watchers - How to prevent you computer from contacting/updating Google Analytics by blocking it in your computer's hosts file, by ZoeB
- Telecom Informer - SMS/800 and SS7 information during the placement of a toll-free call, by The Prophet
- Apple Dashboard Widget Insecurity - Potential security vulnerabilities in Apple's Mac OS X 10.4 Dashboard widgets, including the ability to remotely execute unverified shell commands, by zeitgeist
- Apple Dashboard Widget Insecurity Original
- Penetration Testing: The Red Team Way - Information on Red Team penetration testing and why it pays to start your own to keep up with your "enemies," by MS-Luddite (M$ Luddite, Indiana, DOB: 02-13-1976)
- FaxCore AUID Exploit - Security and password vulnerabilities and default passwords to the FaxCore system, by Element.Crying
- Resource Hacking Windows Vista Games - Use ResHacker to alter Minesweeper as an example, by Vitaminion
- Ripping MP3s from Bleep - Python script to direct-download full MP3 files from Bleep, by m0ther
- Code: bleep_ripper.py
- Imation Insecurities - How to recover files, even after entering six bad passwords, on an Imation 18405 USB flash drive, by PriesT
- Blackhat SEO: Exploring the Dumb Masses to Make a Profit - Information and tips for setting up your own "Blackhat Search Engine Optimizer" content-rich spam websites, by ilikenwf
- Hacker Perspective - by Nick Farr
- Spoofing Banners with Open-Source Servers - Altering the (OpenSSH, or others) server display banners when performing Nmap scans to fool OS fingerprinting, by m0untainrebel (Asheville, North Carolina, Email, YouTube Channel
- A Different Kind of Remote Scripting - Using SSH to execute remote commands and scripts, by Atom Smasher
- A Different Kind of Remote Scripting Original
- Code: adblock-wrt54g.sh
- Letters - Communications
- Information - macnutzj (Jason, Tennessee, DOB: 06-28-1981), R3t0DD, Bus boy
- Meeting Issues - Jem Tallon (Fargo, ND), Robert, DrF, TIA (Mayaguez, Puerto Rico), Eric (Alabama)
- General Questions - Alex (Switzerland), Kevin, Adam, Terry, KNiGHT, Oxilary, Anonymous, Matt, Andrew, Steph, daniel, Brian V.
- Proclamations - my apologies for not signing, Swinger (Holland), Trollaxor (Grant Hayes, Overland Park, KS) , jodi, Jeff, Homeless Hacker, Lord Pong
- Help Needed - Ian, Singa Crew (Singapore)
- Experiences - Micah, drlecter, Shai, Noah Schiffman (Charleston, SC - Video), S1m0nS3z (Pittsfield, MA), Cracker Spion (Sweden)
- Best of 2600 - Hans, mikef, Jeff Strauss
- Problems - Viksa (New Delhi), Daniel, Terry Stenvold, Psion the GateKeeper (Harrison Township, MI)
- Requests - John, xemail, E
- Contributions - Dr. Rolf Freitag, bluSKR33N
- Observations - John, Dr. No (Germany), drlecter, PriesT, Oddlyeven (Sean Street, Arlington, TX), Sn00py, aurfalien, Manuel (New York, New York), PF, Norm
- Gratitude - 990.Tim, Max@MVCT, Marcio (Toronto, Canada), Kikidotstrange, Sebastian
- Six Quick Points of Disguise - Examples of several quick physical disguise techniques and how to create a subtle, yet effective, disguise, by MasterChen (QuarterMasterChen, Las Vegas, Nevada, Email, Twitter)
- AT&T Wireless Customer Information - Get a AT&T Wireless customer's personal information using only their phone number or last four digits of their Social Security number, by using that number when signing up to AT&T website portal, by Frater Perdurabo
- Setting Up Your Mobile Phone for International Dialing - Overview of the phone number format for calling overseas and the proper use of the + symbol, by The Cheshire Catalyst
- USB Anti-Forensics - Windows 2000/XP registry edits to defeat potential forensic attempts against removable USB media, by briatych
- Transmissions - Wireless vulnerabilities and the weakness of WEP, by Dragorn
- Be Your Own DDNS Service Using PHP - Create your own Dynamic DNS service with a few lines of PHP code, by glider
- Code: ip.php
- Code: sendip.php
- Code: sendip.bat
- Code: invisible.vbs
- Code: currentip.php
- Discovering Firewalls - Using common utilities like traceroute , Hping, and Netcat to detect firewalls and identify on a network, by suN8Hclf
- Hacking Music - Article on the aspects of hacking in making music and the need for musicians not to limit themselves to traditional methods or sounds, by Dr. Zoltan (Dr. Zoltan Øbelisk, Sir Millard Mulch, Carl King, MySpace, YouTube Channel)
- Fiction: Sleeper - Story about meeting a Russian sleeper agent while at school, by Peter Wrenshall
- 2600 Marketplace
- 2600 Meetings
- Price: $6.25
- Issue's Cash Cow: The Last HOPE
- Cover (Cover Info)
- Cover Inside Really Strang Payphones
- India #1 Another example of adaptation by the people of Bangalore. These phones are pretty much just nailed to the tree. Nothing unusual here. Photo by infowallah
- India #2 "
- Puerto Rico Seen in the El Condado area. Try to spot what is unusual about this phone. Hint: Something is missing. Photo by Alex Llama
- Dominican Republic We know this is not a payphone. But undoubtedly there are payphone lines hidden in this mess of wires somewhere. Along with a million other things. We pity the repairman who's called upon to find the source of a broken connection here. Photo by TicoPhreak
- Back Inside More Funny Looking Payphones
- United States From a place that's actually called Big Arm in Montana comes this picturesque view of a simple payphone by the side of the road. Photo by Thomas Fleming
- Guinea This phone was found in the capital city of Conakry. It uses national carrier SOTELGUI's network. The country also has at least three cellular networks. Photo by alphabot
- Ecuador Seen at the equator at a tourist stop. Porta also operates the largest GSM network in the country. Photo by pelik
- Canada This is just your basic Canadian payphone manufactured ages ago by Northern Telecom. But this scene from a highway in Alberta looks like some sort of classic painting. This lonely phone is 39 miles from the U.S. border and 65 miles from any town. Photo by Paul Rainey
- Back Cover Photo #1 Motzie found this sign outside her local community college in Edison, New Jersey. If ever there was a good place to have 2600 meetings, right underneath that sign would be it. They even use the same font!
- Back Cover Photo #2 The most elite train in Sweden as seen by Robert Luciani who rode it to Stockholm. If we ever get around to chartering a train, this one is first on the list.
- Staff
- Download Unofficial Scanned PDF!
- Download The Hacker Digest - Volume 25!
$2600 Magazine - Volume 25, Number 4 (Winter 2008-2009)
- Beginnings - Editorial
- Introduction to Forensic Data Recovery - How to recover deleted JPEGs (or other files) on an USB drive using Foremost and Knoppix, by Paradox
- Hacking Dubai and More Internet Proxy Loopholes - How to bypass Internet restrictions using a proxy and getting free wireless at hotels in the United Arab Emirates, by forgotten247
- Calling Comdial: Part 1 - CONVERSip EP300 tips and tricks using Nmap and Netcat to view or alter settings, by Metalx1000 (Kristofer Occhipinti, Naples, Florida, YouTube Channel, GitHub)
- Telecom Informer - Telco outside plant cable and grounding information and cable requirements in various environmients, by The Prophet
- De-Obfuscating Scripting Languages - Decoding and 'undoing' the various tricks people use to hide HTML and PHP source, by Cliff
- Social Engineering the Stock Market and Circumventing the Price of Gas - Social engineering ideas to help lower the price of oil, which would probably get you droned or "liberated" in real life, by Isreal
- Making Your Windows Box a Little More Secure - General tutorial and information on how to secure Windows 2000, XP, and Vista, by DieselDragon
- Hack Thyself - "Seeing yourself as the world's victim is profoundly disempowering and keeps you locked in a cycle of self-created pain and misery", by Kartikeya Putra (Alex, Email #1, Email #2, Dallas, Texas)
- "Hacker Hack Thyself" Phrack, Issue #66
- Hacker Perspective - by Bre Pettis
- Beating the System to Get Beats - Trick to remove the "audio watermarking" from the RocBattle online Flash MP3 player, by Ik
- Anonymous SSH at the Library - How to use a free Java-based SSH client on Rutger's library computers, by carbide
- Trashing Gone Wrong in Switzerland - Story of being busted by the cops Dumpster diving in Switzerland, and why you should always have a (good) cover story, by PriesT
- This Posting Has Been Flagged for Removal - Information on how Craigslist flags its ads/posts and how to bypass restrictions using a proxy, by Half Life
- Improved Mnemonic Password Policy - Evil Corley likes to touch little boys (EClttlb), by Ian Murphy (Backspace)
- Letters - Messages
- Revelations - Pathogen, Quarx, Sai Emrys, Very Anonymous, 63585730, Borked Pseudo Mailed
- Alerts - Mister Mods, J, rosa
- Assorted Meeting Bits - Acetolyne (MySpace, Spokane, Washington), D.
- Inquiries - Angela Sherman, Crash the Greenhat, Mario Chiesa, frameloss, Mark, Wyllie, LiteralKa (Slashdot, Twitter), Jeff, Pelik, m0untainrebel, Louis Martinez, Elizabeth Greer, Daniel, Bavs, Apple Freak, Dan, William R. Epp, Brady DeStefanis (Memphis, TN)
- Rants - Robyn Adelaide, PMD, Greggg (feretman), AJ (Ohio), Unknown Unknown, CJ Hinke (Thailand), Brainwaste, Larry Clements
- Praise - drlecter, scripter, Steve McLaughlin, Nik (Nick Barron), LodeRunner, Andy
- Google Bits - Pulse, brian h.,
- From the Inside - Rob (Michigan), Joseph, Michael Earl Short (Rosharon, TX), Johndillinger, David L. Williamson
- The Future - Phr0zenSane, JP (J.P. Armstrong, Miami, FL)
- Pappy's Cheese Box - Instructinos for building a VoIP-based phreaker's Cheese Box, by Pappy
- Hacking for Beer - Use an alternate I.D. or turn "soda into beer" to purchase beer through a self-checkout system, by Yimir
- Gaming GameStop - How to get an extra 20% and cash when trading in video games at GameStop, by Unanimously Anonymous
- Vulnerabilities in the Corporate Sector - Retrieve data from the hard drives of used computers using GetDataBack, by =-virus-=
- Transmissions - WPA-TKIP vulnerability information and potentially illegal U.S. border searches, by Dragorn
- Business Intelligence - How sales companies and businesses store data on their customers for later analysis, by Tony Hepo
- Hacking WebCT - Information on the WebCT online class software and the possiblity of using other student's accounts to "cheat" on exams, by Milton Bradley
- Fiction: Conspiracy - Can our protagonist pull off the Hack of the Year?, by Peter Wrenshall
- 2600 Marketplace
- 2600 Meetings
- Price: $6.25
- Issue's Cash Cow: Satan's little helper (a.k.a. Barack Hussein Obama) was "elected." And Evil Corley voted for him...
- Cover (Cover Info)
- Cover Inside Foreign Payphones
- Azerbaijan #1 These distinctly different types of phones were both found in Baku, the capital city. Photo by David Scott
- Azerbaijan #2 "
- Cyprus This is a card-only phone found in the Greek half of capital city Nicosia. Photo by Daniel Olewine
- Malaysia A neat little row of colorful phones found in Kuala Lumpur. Photo by Matthew W.
- Back Inside Unusual Payphones
- Antarctica Yes, there are indeed payphones on the seventh continent. This one can be found at New Zealand's Scott Base. It only takes cards. Photo by rooperator
- Bahamas Found on a cruise ship pier in Nassau, we are told there is indeed a payphone hidden somewhere within all those advertisements. Photo by Scott
- Australia This is actually a radio payphone found on a Sydney to Canberra country train. It uses satellite and mobile phone networks, and only accepts credit vouchers or credit cards. Photo by Rowan Wilding
- Morocco Found somewhere in the middle of nowhere near Errachidia, this is one impressive phone booth (note writing that says "Telephone Public"). Unfortunately it was locked so the actual payphone remains a mystery. Photo by Paul Rainey
- Back Cover Photo #1 This is NOT the 2600 van but merely one of many cheap imitations. Thanks to Vyrix who spotted this off US 290 in Houston, Texas. Our lawyers will be following up with a copyright infringement suit.
- Back Cover Photo #2 Now THIS is a van we'd be proud to own. Actually this vehicle, spotted by asd dasdsa in Uijeongbu, South Korea, is a whole lot more than a mere van. We really don't know what they're up to with this thing, but we want in. (Their website, incidentally, could be used as a pictorial definition of the word "busy.")
- Staff
- Download Unofficial Scanned PDF!
- Download The Hacker Digest - Volume 25!
$2600 Magazine - Volume 26, Number 1 (Spring 2009)
- Year 26 - Editorial
- ATA Security Exposed - Vulnerabilities in ATA hard drive password security and the proper way to securely erase a hard drive, Michael Hampton
- Outsourced - Horror stories of working at an outsourced technical support call center for a large ISP where they are taught not to help the customers, by Witchlight
- Annoying Dormitory Phones - Flaws in the pre-programmed phones at a Swiss university dorm which allowed you to make calls without a phone card ("taxcard"), by Chris Dickinson
- robots.txt Mining Script for the Lazy - Shell script to make a website's robots.txt file "clickable" so you can browse blocked directories manually, by Kelly R. Keeton (Snoqualmie, Washington, K7MHI)
- Telecom Informer - Overview of telco tariffs and public utility commissions, by The Prophet
- Surfing Without a Board - Using a mouse (on a system with no working keyboard) to create a URL in a web browser by copy-and-pasting single letters from Notepad's help screen, by XlogicX
- MP3 Data Stream as a Covert Means of Distributing Information - Hiding data in the unused portions of a MP3 file, by enferex (Matt Davis, GitHub)
- Don't Steal Music!: Catching an iPod Thief Using Forensic Evidence - Tracking down who stole his iPod by utilizing the device access log times, by Todd Garrison (frameloss)
- Inside Google Radio - Overview of the SS32 radio automation system and Google Radio Automation, by hypo
- Scour: Paid to Search, Again? - Trick using AutoHotKey to earn extra points via Scour, by D4vedw1n
- Code: scour.ahk
- Battling the Fanuc Datapanel - Story of a tech who needed to replace a GE Fanuc 1062 Datapanel and problems with the proprietary WinCfg software which they had to overcome, by scamorama
- Network Neutrality Simplified - General overview on the need to keep the Internet "neutral" by net neutrality laws, by linear
- Network Neutrality Simplified Original United Phone Losers, Issue #30
- Hacker Perspective - by Virgil Griffith (Website)
- Second Life Hacking - Case study using the online virtual world Second Life discussing security vulnerabilities in email-based "Forgot your password?" password recovery systems, by Lex Neva
- Exploiting Price Matching Through JavaScript Injection - Discusses a method of modifying web pages with in-browser JavaScript so the page can be printed out and brought to certain stores for a price-matching discount, by Sigma
- Hacker Spaces of North America - List of hackerspaces in North America
- Letters - Social Discourse
- Random Advice - Exothermicus (Denton, TX), Jesus Bonehead (Victoria, British Columbia)
- Random Observation - Clay (Lakeland, FL)
- Random Remarks - Neito, Jesus Montoya, R. Toby Richards
- Random Questions - DANIEL OBORI (Nigeria), Jason Liszkiewicz (Twitter, New York, New York), misterht01, userguid, The Scorpion, William, fakexsound (Marc DeAngelis, Massachusetts), cu florian hannemann, Art Smass (Santa Cruz, CA)
- Random Problems - Infinityx, Jack, John and Lissa (Jacksonville, FL), Colby, Arkhayne, Syntax, Robert Royer
- Random Info - Sync, R. Holden, Sync, Jeff, ulysses, Mr. Velleman (France)
- Random Feedback - Big G, Anonymous, Jason, Arethusa, Steven C. Jackson, CJ, Vandy, Michael, gHOst_Guard, Estragon, Shocked998, ZANAC, thinkt4nk, jus, bogaty, Pampaluz, Ben Edwards
- Random Offer - freakball
- DNS Spoofing on a LAN - Discusses DNS spoofing and describes the steps necessary to accomplish it on your own network, by Felixalias
- An Astronomer's Perspective on Hacking - Discusses some of the author's phreaking experiences while at work late at night and how being curious about things can lead you to unexpected results, by Ethernium57 (Omaha, Nebraska)
- Transmissions - Discusses how simple it is to spoof wireless network access points to gain access to client machines using various tools and procedures and the lack of adequate defenses to protect against this attack, by Dragorn
- Social Engineering HP for Fun and Profit - Discusses some weaknesses in the HP customer support system that could be taken advantage of, by haxadecimal
- The Last 1000 Feet - Discusses the author's experience with getting wireless Internet access to his newly built house after he found out the corporate ISPs didn't provide service in his area, by b1tl0ck
- Fiction: The Particle - Tells the story of a couple of days in the life of a network support engineer and the strange occurrences that took place, by Leviathan
- Hacker Happenings
- 2600 Marketplace
- 2600 Meetings
- Price: $6.25
- Issue's Cash Cow: Celebrating 26 years of this crap!
- Cover (Cover Info)
- Cover Inside Eastern European Payphones
- Serbia #1 Found in Belgrade, these phones seem to be the prevailing model throughout the city and possibly the entire country. Photos by Stevan Radanovic
- Serbia #2 ""
- Ukraine #1 Both of these phones were seen in the city of Cherkasy. One is a newer model while the other is a slight bit older. See if you can figure out which is which. The older one was actually attached to the former KGB building. Both are operated by Ukrtelecom. Photos by Alex Kudelin
- Ukraine #2 ""
- Back Inside Foreign Payphones
- Hungary #1 Seen in Szolnok in a quaint but graffiti ridden booth, this phone is operated by T-Com, a fully consolidated subsidiary of German phone giant Deutsche Telekom, the company best known for inventing the pink handset. Photos by Rob Craig
- Hung