-- MySQL dump 10.19 Distrib 10.3.34-MariaDB, for debian-linux-gnu (x86_64) -- -- Host: localhost Database: 2600 -- ------------------------------------------------------ -- Server version 10.3.34-MariaDB-0+deb10u1 /*!40101 SET @OLD_CHARACTER_SET_CLIENT=@@CHARACTER_SET_CLIENT */; /*!40101 SET @OLD_CHARACTER_SET_RESULTS=@@CHARACTER_SET_RESULTS */; /*!40101 SET @OLD_COLLATION_CONNECTION=@@COLLATION_CONNECTION */; /*!40101 SET NAMES utf8mb4 */; /*!40103 SET @OLD_TIME_ZONE=@@TIME_ZONE */; /*!40103 SET TIME_ZONE='+00:00' */; /*!40014 SET @OLD_FOREIGN_KEY_CHECKS=@@FOREIGN_KEY_CHECKS, FOREIGN_KEY_CHECKS=0 */; /*!40101 SET @OLD_SQL_MODE=@@SQL_MODE, SQL_MODE='NO_AUTO_VALUE_ON_ZERO' */; /*!40111 SET @OLD_SQL_NOTES=@@SQL_NOTES, SQL_NOTES=0 */; -- -- Dumping data for table `Addendums` -- LOCK TABLES `Addendums` WRITE; /*!40000 ALTER TABLE `Addendums` DISABLE KEYS */; INSERT INTO `Addendums` VALUES (1,1267,'See Autumn 2008 [25:3] page 43 in letters section.'),(2,1247,'See Autumn 2008 [25:3] page 43 in the letters section.'),(3,1350,'See Summer 2009 [26:2] page 44 in letters section.'),(4,486,'See \'More Socket Programming for Fun and Profit\' page 15 for errata and updates. (..)'),(5,391,'See Spring 1997 [14:1] page 46 for the AskSam Password Table.'),(6,207,'See Autumn 1993 [10:3] page 37 for the corrected circuit diagram.'),(7,128,'See \'simplex/usps update\' page 21 for corrections in Winter 1991 [8:4]. (..)'),(8,123,'See \'simplex/usps update\' page 21 for corrections in Winter 1991 [8:4]. (..)'),(9,1552,'See November 1987 [4:11] page 22 for the correction.'),(10,1607,'See October 1987 [4:10] page 18 for the correction.'),(11,1950,'See Winter 2010 [27:4] page 43 in the letters section.'),(12,1979,'See Spring 2011 (28:1) in Letters page 38 for a correction to step 6.'),(13,2341,'See Spring 2015 [32:1] page 41 in the letters section.'); /*!40000 ALTER TABLE `Addendums` ENABLE KEYS */; UNLOCK TABLES; -- -- Dumping data for table `Articles` -- LOCK TABLES `Articles` WRITE; /*!40000 ALTER TABLE `Articles` DISABLE KEYS */; INSERT INTO `Articles` VALUES (1,1,'Monitoring Phone Calls',346,'Discusses technical details on receiving microwave linked telephone conversations using conventional and widely available ham satellite/satellite TV receiving equipment.','Public domain article obtained from ARPANET.','N',4,'Monitoring Phone Calls With a TVRO',4.500,0),(2,1,'More on VM/CMS',945,'Discusses the previous articles author\'s superficial knowledge of VM/CMS and fills in some of the gaps and gives a more complete picture of VM.','References \"Lex Luthor\" articles in November 1987 .. and December 1987 .. issues.','N',9,'VM/CMS Corrections',6.000,0),(3,1,'Weathertrak Codes',346,'Lists Weathertrak codes for the Weathertrak service.','','N',15,'',1.000,0),(4,1,'The Hacker Threat',946,'Discusses telecommunications and fraud, phreaking, hacking and bulletin board systems, includes a short modem war-dialing Basic program.','A reader response is in Summer 1988 ..','A',16,'An Interpretation of Computer Hacking',5.000,220),(5,1,'Private Sector Scam Revisited',346,'Discusses the New Jersey Bell investigation of the Private Sector 2600 bulletin board including a oscilloscope printout and Telephone Network Security letter.','','N',21,'',3.000,0),(6,1,'A ROLM Catastrophe',346,'Discusses the University of New York at Stony Brooks installation of a brand new ROLM phone system and the incredible range of problems and foul-ups that ensued.','Includes complicated ROLM dialing instructions.','N',30,'ROLM Phone System Creates a Nightmare',7.000,0),(7,1,'Happenings',346,'Discusses several current news items.','','N',37,'',2.500,0),(8,1,'AT&T/BOC Routing Codes',346,'List of routing codes used by AT&T and the Bell Operating Companies (BOC) that you can blue box to and includes pages of notes.','','N',42,'',5.000,0),(9,2,'Allnet\'s Legal Problems',346,'Prints the \"Notice of Class Action and Proposed Settlement to Certain Current and Former Customers of Allnet Communication Services, Inc.\".','','N',2,'',2.000,0),(10,2,'A Solution To Viruses',941,'Discusses Trojan and virus programs and presents the FLUSHOT series of programs designed and written by the author to protect against them along with detailed information on how it attempts this.','','N',4,'A Form of Protection For You and Your Computer',17.000,0),(11,2,'How To Write a Virus',908,'Discusses virus programs including how they work and spread, a program outline and information on virus types.','','N',8,'the dark side of viruses',7.000,0),(12,2,'Building a Red Box',942,'Discusses what a red box is and how to use it and includes parts list, schematic and instructions for building one.','','N',13,'',3.000,0),(13,2,'Reply To Captain Zap',943,'Discusses and criticizes the Caption Zap article and makes specific responses to some of his statements regarding phreaking and hacking.','References Captain Zap article in Spring 1988 ..','N',16,'A Reader\'s Replay to Caption Zap',6.000,227),(14,2,'Fun Phone Numbers',944,'Lists a bunch of interesting telephone numbers along with some notes.','','N',44,'List Of Numbers Rev. 1.0',3.000,0),(15,3,'Outside Loop Info',926,'Discusses the path from the central office (CO) to the subscriber and examining each major point along the route (these facilities are called the outside local loop distribution plant).','','N',4,'',1.000,0),(16,3,'Cellular Phones',927,'Discusses the rising interest in the cellular scene and provides insight into what is going on.','','N',8,'',1.000,0),(17,3,'Who Was Strowger?',930,'Discusses the rather sketchy life of Almon Strowger who, it could be fairly stated, was the first phreak ever to exist.','','N',9,'Who The Hell Was Almon Strowger, Anyway?',1.000,0),(18,3,'Communications Update',346,'Discusses several current news items.','','N',10,'What\'s Going On With Phones/Computers',5.000,0),(19,3,'A Map of the 516 NPA',346,'Discusses the 516 area code and lists all of the exchanges.','','N',14,'The 516 Area Code In Detail',5.000,0),(20,3,'Red Box Program',931,'Discusses a Commodore-64 basic program to play red box tones.','','A',22,'',1.000,0),(21,3,'Canadian Numbers',931,'Lists Canadian WATS telephone numbers.','','N',23,'',1.000,0),(22,4,'The Internet Worm Story',922,'Discusses the \"Internet Worm\" including the exploits it uses and analysis of the disassembled worm code - no source code shown.','Reprinted from the RISKS Newsletter.','N',4,'A Report on the Internet Worm',6.000,0),(23,4,'MCI Ripping Off Customers',346,'Discusses some of the scams and deceptive business practices MCI uses to \"slam\" long distance customers and overcharge them.','','N',10,'MCI: The Phone Company with a Lot of Explaining to Do',2.000,168),(24,4,'Hacker\'s Guide to UNIX',920,'Discusses the UNIX operating system\'s operation and useful commands, including a brief history.','Part two in Spring 1989 ..','N',12,'A Hacker\'s Guide to UNIX',7.000,0),(25,4,'Overhearing Phone Calls',346,'Discusses the telephone calls you can listen to depending on the radio receiver you have, lists frequencies and some phone calls overheard.','','N',19,'how to hear phone calls',5.000,0),(26,4,'Soviet Operators',923,'Discusses the job of an inter-city telephone operator in Novosibirsk, Soviet Union named Valentina Efimovna Vdovina.','Reprinted from Pravada.','N',30,'What Its Like To Be A Soviet Operator',3.330,0),(27,4,'Chaos Computer Club',924,'An interview with two members of the Chaos Computer Club.','','N',34,'an interview with the chaos computer club',6.000,0),(28,4,'Hardwiring Free Calls',859,'Discusses a number of ways to do \"hardwiring\" - directly connecting a phone to somebody else\'s line without their knowledge to get free telephone service.','','N',42,'Hardwiring Your Way In',3.000,33),(29,4,'Review: Tune In On Phone Calls',925,'Discusses the book \"Tune In On Telephone Calls\" by Tom Kneitel published by CRB Research.','','N',45,'Book Review',2.000,0),(30,5,'Hackers in Jail',346,'Discusses two stories of hackers winding up in jail (Kevin Mitnick and Herbert Zinn Jr.) and draws some conclusions about this disturbing trend.','','N',3,'',4.660,202),(31,5,'The Wonders of UNIX',920,'Discusses various useful UNIX commands and system files (eg. /etc/passwd) that could be useful in exploring a UNIX computer.','Part two, part one in last issue. (..)','N',4,'More On Hacking Unix',7.000,0),(32,5,'800 & 900 Exchanges',921,'Discusses 800 and 900 numbers, lists the 800/900 exchange translations and who owns them and contains a glossary of terms.','','N',12,'Ever Wonder Who Owns All Those 800 Numbers?',8.000,0),(33,5,'Payphones Explained',898,'Discusses and explains how a fortress phone (a.k.a. payphone) works and how one can (ab)use it.','','N',30,'How Payphones Really Work',10.250,35),(34,5,'News From Around',346,'Discusses several current news items.','Ripoffs & Scams, Long Distance Censorship, Foulups & Blunders, Abuse...., Mischief Makers','N',36,'',5.000,0),(35,6,'A Guide to PRIMOS',907,'Discusses the PRIMOS operating system, this initial installment is an introduction and contains extensive technical documentation.','First of three. (2nd) (3rd)','N',4,'',14.000,0),(36,6,'201 Exchange List',898,'Lists the valid exchanges in the 201 (Northern New Jersey) area code.','','N',20,'Exchange List: 201 Area Code',2.250,0),(37,6,'Scanning For Calls',828,'Discusses eavesdropping on telephone calls with a radio scanner, primarily concerned with receiving cordless and cellular.','','N',22,'',2.000,116),(38,6,'Tips on Trashing',859,'Discusses the benefits of exploring your local phone company\'s garbage and then how to do it without getting into trouble.','','N',32,'',3.000,0),(39,6,'A Sprint Story',916,'Discusses details of the police search of \"Mike\'s\" room the day after messing around with Sprint, a couple of hints on avoiding this and some advice.','','N',34,'The Spring Gestapo Strike Again!',2.000,0),(40,6,'Spanish Phones',917,'Discusses how in the space of a few months the Spanish telephone system, one of Europe\'s most efficient, all but collapsed.','Reprint from last year\'s England\'s Financial Times.','N',36,'Spanish Phones - and what they don\'t do',2.000,0),(41,6,'A Summer Worm',918,'Discusses the Ada source code for a DEC VMS worm.','Initial development on a PC using R.R. Software\'s JANUS/Ada.','A',38,'',3.000,0),(42,6,'Reviews: Pirate Radio Directory, The New \'Tap\'',919,'Discusses \"The 1989 Pirate Radio Directory\" published by Tiare Publications.','Index entry shared with this article ..','N',42,'',1.000,0),(43,7,'The NYNEX Strike',346,'Discusses the New York Telephone (NYNEX) strike and details service issues and problems.','','N',3,'Competition... It\'s the Next Best Thing to Being There',1.000,62),(44,7,'Grade \'A\' Hacking',908,'Discusses the University Applications Processing Center (UAPC who process student records) including technical information, logging on, getting a password and changing grades.','Updated in Winter 1989 (6:4) (..)','N',4,'',5.330,132),(45,7,'Galactic Hacker Party',346,'Discusses the Galactic Hacker Party conference which took place at the Paradiso Cultural Center in Amsterdam on August 2nd, 3rd and 4th.','','N',10,'The Galactic Hacker Party',4.000,216),(46,7,'British Telecom\'s Guilty Conscience',346,'Discusses a plea sent to the British people by British Telecom.','','N',12,'British Telecom: Guilty',1.500,0),(47,7,'The Death of COSMOS?',346,'Discusses the summer edition of COSMOS Currents (a newsletter put out by Pacific Bell/Pacific Telesis) that says COSMOS will be replaced with SWITCH.','','N',13,'',1.000,0),(48,7,'What\'s Going On',346,'Discusses several current news items.','','N',14,'',7.500,0),(49,7,'The Secrets of 4TEL',346,'Discusses details and information about 4TEL, a loop testing system mainly used by General Telephone (GTE).','','N',20,'4TEL',4.000,0),(50,7,'REMOBS',898,'Discusses REMote Service OBservation System (REMOBS), a method for Ma Bell to watch what you do on the phone.','','N',32,'',1.000,0),(51,7,'GTE Horrors',346,'Discusses information about General Telephone & Electronics Corporation (GTE) equipment and customer complaints.','Article written with the help of Silent Switchman and Mr. Ed.','N',33,'Gee...GTE Telcos',2.000,0),(52,7,'Voice Mail Hacking',914,'Discusses how to take advantage of the Genesis Voice Mailbox Systems (VMS) and details of the NYNEX Business Center voice mail compromise.','','N',36,'Voice Mail Hacking... ...NYNEX Style',1.000,0),(53,7,'Punching Payphones',915,'Discusses how to obtain free local phone calls on many pay phones by \"punching\" the handset receiver.','West Coast Phreaks.','N',37,'',1.000,0),(54,7,'Useful Frequencies',346,'Discusses details of the touch tone frequencies used in the telephone system.','From a central office recorder/announcer installation manual circa 1983.','N',40,'Touch-Tone Frequencies',1.000,0),(55,7,'Carrier Access Codes',346,'Lists the telecommunications carrier access codes.','','N',42,'',2.000,0),(56,8,'The AT&T Story',346,'Discusses the AT&T long distance meltdown of January 15th.','','N',4,'The Day The Phone System REALLY Died',2.500,0),(57,8,'Our Ever-Changing World',346,'Discusses several current news items.','','N',6,'Morris Found Guilty',5.000,155),(58,8,'NYNEX Central Office Data',908,'Discusses information and data relating to New York & New England Telephone (NYNEX) switching systems and lists telephone centers subdivided by sector.','Special thanks to Kornflake Killer.','N',9,'NYNEX Data',5.000,0),(59,8,'PRIMOS, Part Two',907,'Discusses the PRIMOS operating system, this installment covers several useful applications you are likely to find on Prime computers.','Second part of series. (1st)(last)','N',14,'More Hacking On PRIMOS',11.000,0),(60,8,'Building a Silver Box',828,'Discusses information about and details for building a silver box, including schematic and parts list.','','N',20,'How To Build A Silver Box',4.000,0),(61,8,'Area Code/Exchange Count',346,'Lists all North American area codes and the number of exchanges being used in each ordered by area code and population.','','N',44,'The NPA Countdown',1.000,0),(62,8,'UAPC Update',908,'Discusses the University Applications Processing Center (UAPC) scandal in the media and ways around the changes they made.','References article in the last issue. (..)','N',45,'',1.000,0),(63,9,'For Your Protection',346,'Discusses hacker arrests, the apparent government crackdown and the suppression of the electronic newsletter Phrack in response to the 911 document scandal.','','N',3,'',7.660,493),(64,9,'Facts About MIZAR',909,'Discusses the MIZAR system which is used by Bell in the Recent Change Memory Administration Center (RCMAC, also CIC) to process Recent Change Messages.','','N',8,'The Secrets of MIZAR',3.000,0),(65,9,'How Blue Boxers Are Caught',910,'Discusses the rumors, false information and myths circulating about how phone phreaks are caught for using blue boxes and dispels them.','Legion of Doom!','N',12,'Toll Fraud Detection Techniques',2.000,0),(66,9,'Build a Touch Tone Decoder',911,'Discusses how to build a \"snatch \'n latch\" DTMF decoder including schematic, parts list and instructions.','','N',14,'Building a DTMF Decoder',5.000,0),(67,9,'Listening In Via VHF',828,'Discusses how ship-to-shore telephone calls can be listened to with a scanner, lists the frequencies and notes that calling card numbers can be heard.','','N',19,'Listening In',2.660,423),(68,9,'News Update',346,'Discusses several current news items.','','N',23,'',1.000,0),(69,9,'The 911 Document',2,'Discusses the \"Documentation on the E911 System\" document published by Bell South.','','N',37,'The Scoop on 911',1.000,0),(70,9,'Fun at the 2600 Meeting',346,'Discusses the bizarre story of the 2600 meeting in New York City being monitored by investigative agents and harassed by a mob of police, includes pictures.','','N',38,'Fun and Games at a 2600 Meeting',2.000,0),(71,9,'DNIC Codes',346,'Discusses Data Network Identification Codes (DNIC) and lists known DNIC\'s with their countries and networks.','','N',40,'Data Network Identification Codes',3.000,0),(72,9,'The 707 Area Code',913,'Lists the exchanges for area code 707 including city and county.','','N',44,'',1.250,0),(73,9,'Review: The Cuckoo\'s Egg',859,'Discusses \"The Cuckoo\'s Egg\" by Clifford Stoll published by Doubleday.','','N',45,'Book Review',1.750,0),(74,10,'A Bittersweet Victory',346,'Discusses the news about the Phrack case being officially dropped by the prosecution but details the costs paid by Craig Neidorf and his decision to stop publishing.','','N',3,'',0.500,501),(75,10,'The Neidorf/Phrack Trial',906,'Discusses the five day Craig Neidorf/PHRACK Magazine trial (concerning the 911 document) giving a day by day account of what happened.','','N',4,'The Neidorf/Phrack Trial: Day by Day',5.000,0),(76,10,'An Interview With Craig Neidorf',346,'An interview with Craig Neidorf, publisher of PHRACK magazine.','','N',8,'',2.000,0),(77,10,'What is the EFF?',346,'Discusses the formation of the Electronic Frontier Foundation (EFF) and details of their minor involvement in the Craig Neidorf/PHRACK case.','','N',10,'',1.000,501),(78,10,'Negative Feedback',346,'Discusses bringing the Phrack story to the attention of the public and prints some of the electronic and paper mail received by 2600 from people who didn\'t like what 2600 was doing.','','N',11,'',6.000,503),(79,10,'PRIMOS Conclusion',907,'Discusses the PRIMOS operating system, this installment covers Prime\'s network communications capabilities and associated utilities.','The final article of the series. (1st) (2nd)','N',14,'PRIMOS: The Final Part',11.000,0),(80,10,'Fun With COCOTS',908,'Discusses Customer Owned Coin Operated Telephones (COCOTS), a treasure trove of tasty parts and a phone line to explore the phone system for telephone enthusiasts.','','N',20,'An Introduction to COCOTs',8.000,448),(81,10,'News Update',346,'Discusses several current news items.','','N',38,'',1.000,0),(82,11,'Caller ID',901,'Discusses information about the Incoming Call Line Identification Device (ICLID) and the Caller*ID service it uses. Also discusses other Custom Local Area Signaling Services (CLASS) becoming available.','','N',4,'Caller ID: The Facts',4.000,458),(83,11,'Network 2000 Saga (cont.)',346,'Prints a Network 2000 newsletter concerning unauthorized accounts (long distance telephone slamming) and letters from Cable & Wireless Communications, Inc. and AT&T.','','N',8,'The Network 2000 Saga Continues',2.000,0),(84,11,'Dorothy Denning Interview',859,'An interview conducted via e-mail over a two-month period of Dr. Dorothy Denning, well known in the computer security community and author of \"Cryptography and Data Security\" along with numerous research papers.','','N',10,'An Interview with Dorothy Denning',6.000,0),(85,11,'Things You Shouldn\'t Know',2,'Discusses internal documents 2600 has obtained detailing BellSouth\'s future plans for monitoring telephone lines.','','N',16,'New Revelations From Bellsouth',6.000,0),(86,11,'Defeating Trap Tracing',902,'Discusses what you should do if you receive a call from telephone company security personnel asking you who made an illegal call to your telephone.','','N',22,'',2.000,0),(87,11,'Tone Dialer Conversion',903,'Discusses a very simple modification to a Radio Shack pocket tone dialer that can make it into a red box.','','N',32,'Converting a Tone Dialer into a Red Box',3.000,439),(88,11,'Build a Telephone Induction Coil',904,'Discusses the multipurpose induction coil, some of it\'s uses and instructions on how to build one.','','N',36,'Building a Telephone Induction Coil',3.000,0),(89,11,'The Definitive ANAC Guide',346,'Lists Automatic Number Announcement Circuit (ANAC) numbers for the United States.','','N',39,'',1.000,0),(90,11,'Credit Card Algorithm',905,'Discusses a c source code program that does a checksum verification of a credit card number.','K00l/RaD Alliance!','A',42,'An Algorithm for Credit Cards',2.000,370),(91,11,'Facts and Rumors',346,'Discusses several current news items.','','N',44,'',3.000,509),(92,12,'A Political Hacking Scandal',346,'Discusses the Land case, how political organizations are using hackers and how corrupt the whole political process has become.','Index indicates page 4 but article begins on page 5.','N',5,'Hacking Scandal',3.000,0),(93,12,'The Hacker Reading List',859,'Lists sources of computer security information of interest to hackers in six parts: underground magazines, catalogs, books journals, newsletters and network mailing lists.','','N',8,'',4.000,0),(94,12,'Central Office Operations',684,'Discusses information about the organization and operation of a telecommunication companies\' central office. ','One of the last articles to come out of The Legion of Doom.','N',12,'',8.000,0),(95,12,'More Leaked Documents',346,'Displays pages from an unnamed phone company\'s manual for supervisors.','','N',16,'Leaked Documents',2.000,0),(96,12,'1-900-STOPPER: Anatomy of a Rip-off',346,'Discusses the 1-900-STOPPER service rip-off after receiving a threatening letter from the CEO of Private Lines, Inc. the service provider.','References a letter on page 25-26 of Autumn 1990.','N',22,'Anatomy of a Rip-off',2.000,0),(97,12,'IT\'S THE LETTERS PAGE',15,'Dear 2600:','COCOT Troubles, Future Surveillance, Why Did You Do It?, Questions, BBS Troubles, Another Method, Suggestions, Technical Suggestions, Caller ID Override, A Phone Company Tour, Assorted Thoughts, COCOT Info.','N',24,'',7.000,0),(98,12,'Winning Reader Entry',346,'Prints two letters that are the winners of a contest from the Summer 1990 issue to respond to negative letters written about hackers.','Entry 1 by TELEgodzilla, no author for entry 2.','N',32,'Our Contest Winners',5.000,0),(99,12,'The Word in the Street',346,'Discusses several current news items.','','N',36,'',5.000,0),(100,12,'Listings',346,'Shows a \"Publication Denial Notification\" for 2600 and a Fraud Alert from a Communications Fraud Control Association newsletter.','','N',42,'',2.000,0),(101,13,'An Atari Virus',897,'Discusses the assembler source code for a virus program for the Atari 520ST and its GEMDOS operating system.','','A',4,'In Pursuit of Knowledge: An Atari 520ST Virus',6.000,0),(102,13,'The Terminus of Len Rose',888,'Discusses the case of Len Rose (known to some as Terminus) an example of blind justice and corporate power perpetuated by the SS (US Secredt Service) and AT&T.','','N',11,'',5.000,0),(103,13,'Soviet BBS List',346,'Lists BBS telephone numbers in the Soviet Union and some interesting phone numbers supplied by readers.','','N',16,'(? in Russian?)',2.000,0),(104,13,'What\'s Up?',346,'Discusses several current news items.','Only EFF Lawsuit section on page 22 is in Best of 2600 book.','N',19,'',5.000,511),(105,13,'UNIX Password Hacker',898,'Discusses a c source code program for UNIX systems that automates the process of hacking users\' passwords.','','A',31,'',4.000,0),(106,13,'Looking Up IBM Passwords',555,'Lists an assembler program for IBM CMS 3.0 systems that snags passwords off the disk and decrypts them.','','A',36,'',4.000,0),(107,13,'Internet Outdials',899,'Discusses an introduction to Internet outdials and a list of some with instructions on how to access them.','','N',40,'',1.000,0),(108,13,'The New LEC Order',900,'Discusses the forward movement of telecommunications companies to ready themselves for new technologies (eg. ISDN) and how it has been revolutionizing Local exchange carriers (LEC).','','N',42,'The New LEC Order Acronym City',5.000,0),(109,14,'Where Have All The Hackers Gone?',346,'Discusses recent witch hunts and draconian law enforcement that is driving the hacker community underground and the need to fight for freedom of speech and continue sharing information to prevent this.','I\'ve assumed this is an editorial though that is not specified, there is no author and there typically weren\'t editorials in these early issues.','N',4,'',2.000,0),(110,14,'Magnetic Stripes',894,'Discusses plans for building a credit card copier and reader/writer, including schematics and data formats and bit encoding information.','Translated from Hack-Tic, #8, #9/10.','N',7,'',4.000,0),(111,14,'Epitaph For NYNEX Business Centers',62,'Discusses the sale of NYNEX Business Centers to ComputerLand and a brief history and background written by an employee.','','N',11,'Death of NYNEX Business Centers',1.000,0),(112,14,'Hacker News',346,'Discusses several current news items.','','N',12,'',1.000,0),(113,14,'Building a Tone Tracer',828,'Discusses how to build a tone tracer from a handful of parts and a few dollars, includes schematic and parts list.','','N',14,'Build a Tone Tracer',2.000,0),(114,14,'MCIMAX',895,'Discusses MCIMAX which is MCI\'s link into the MAX database (that contains information about MCI/AT&T/Sprint products) and MCI\'s domestic products.','','N',16,'Hacking MCIMAX',2.000,0),(115,14,'Inspect Implementation',346,'Quotes the more interesting sections of an internal document concerning security implementations on Digital\'s EASYnet.','Information supplied by an employee to be known as \"Condor Woodstein\".','N',18,'',4.000,0),(116,14,'More on the CLASS Struggle',346,'Quotes internal documents from Bellcore which go into some detail on CLASS services.','','N',22,'The Class Struggle',2.000,0),(117,14,'Some New Frequencies',701,'Discusses NYNEX plans for testing wireless technologies and lists their science and technology experimental radio frequencies.','','N',32,'Secret Frequencies',2.000,0),(118,14,'411',346,'Discusses several current news items.','','N',35,'411 - news about phone companies',6.000,0),(119,14,'Review: Cyberpunk',869,'Discusses \"Cyberpunk: Outlaws and Hackers on the Computer Frontier\" by Katie Hefner and John Markoff published by Simon and Schuster.','','N',42,'When Hackers Ride Horses: A Review of Cyberpunk',2.000,235),(120,14,'Tymnet PCP Outdials',896,'Discusses and lists some PC-Pursuit and Datapac outdials from Tymnet.','','N',44,'Outdials',2.000,0),(121,14,'Prisoner Update',346,'Discusses a note received from Frank Darden in prison (one of the Atlanta hackers) and the U.S. Department of Justice\'s rational for restricting an issue of 2600.','','N',46,'',1.000,0),(122,15,'Why Won\'t They Listen?',346,'Discusses recent media portrayal of hackers and how 2600\'s attempts to publicize the real story and warn the public of real concerns has received negligible media interest.','I\'ve assumed this is an editorial though that is not specified, there is no author and there typically weren\'t editorials in these early issues.','N',4,'',2.000,0),(123,15,'Simplex Locks: Illusion of Security',722,'Discusses information and details of Simplex locks, including how easy they are to open (even by complete novices) and lists all the possible combinations.','Emmanuel Goldstein also listed as an author.','N',6,'Simplex Locks An Illusion of Security',10.000,314),(124,15,'Dutch Hacker Intrusion',346,'Discusses the video showing Dutch hackers accessing military computer systems in the United States, including commands used and a complete explanations of what is going on.','','N',14,'The Hacker Video',4.000,253),(125,15,'Protecting Your SSN',890,'Discusses methods to keep your Social Security Number from being used as a tool for the invasion of your privacy, including a short history of related federal legislation.','','N',18,'',3.250,0),(126,15,'COCOT Numbers',891,'Lists Customer Owned Coin Operated (COCOT) telephone numbers in Washing DC and New England (Maine, Rhode Island and Massachusetts).','','N',22,'COCOT Numbers (Customer Owned Coin Operated Telephones)',2.000,0),(127,15,'Tidbits',346,'Discusses information about MCI 800-FRIENDS update service, 800 ANI numbers and a reasonable 900 number reverse listing service.','','N',31,'',1.000,463),(128,15,'Postal Hacking',869,'Discusses information about the United States Postal Service (USPS) including POSTNET, MARK, FIM, LSM, BCS, MLOCR, free/fast/snail mail and encourages exploring the system.','Further reading: \'A Guide to Business Mail Preparation\' by the USPS.','N',32,'USPS Hacking',6.000,372),(129,15,'Psychology in the Hacker World',892,'Discusses the Enforcer archetype, an enforcement personality type, which at its most extreme is a paranoid schizophrenic unable to distinguish friend from foe.','','N',38,'',2.660,0),(130,15,'Another Dialer Converted',893,'Discusses an enhancement to the Radio Shack red box conversion that incorporates a switch to select between the two different frequency crystals to enable both touch tones and a red box.','References conversion article in Autumn 1990.','N',43,'More Conversion Tricks',1.000,0),(131,15,'Useful UNIX Programs',886,'Discusses two c programs, the first lets you see what words look like encrypted and the second is an example of embedding that encrypted word into a program for a password so it can\'t be gleaned from the source.','','A',44,'',1.000,0),(132,16,'Sentry Security',346,'Discusses the SENTRY system used by the Bureau of Prisons from a statement by Richard J. Hankinson of the Inspector General before a government subcommittee.','','N',5,'Computer Security at the Bureau of Prisons',3.000,0),(133,16,'Important News',883,'Discusses several current news items.','','N',8,'Stuff You Should Be Interested In',3.000,0),(134,16,'Crypt() Source',884,'Discusses an issue concerning UNIX encryption and the crypt() function including c source code.','References a letter from SJ on page 29 of the Autumn 91 issue.','A',11,'',5.000,0),(135,16,'Birth of a Low Tech Hacker',805,'Discusses how the author became a hacker in a very different culture (India).','','N',16,'',2.000,382),(136,16,'Mobile Frequencies',885,'Discusses mobile phone frequencies (not cellular!) and lists them for 31 large cities throughout the United States.','References article by The Researcher in April 1986 [3:4].','N',18,'',2.000,0),(137,16,'Simplex/USPS Update',346,'Discusses corrections to the Simplex lock codes and the POSTNET examples previously published.','References page 12 of \"Postal Hacking\" (..) and 32/36 \"Simplex Locks: Illusion of Security\" (..) in the Autumn 1991 issue.','N',21,'',0.500,0),(138,16,'Postnet Programs',886,'Lists a BASIC and a c source code programs to print POSTNET\'s for a five or nine digit zip code.','','A',22,'',2.000,0),(139,16,'Class Features',887,'Discusses the custom calling features of the Centel telephone system in Las Vegas.','','N',31,'',2.000,0),(140,16,'COCOT Corner',346,'Discusses information to show you what is unique and precious about customer-owned coin-operated telephones (COCOT).','','N',33,'',3.000,0),(141,16,'An Appeal For Help',888,'Discusses the aftermath of the author\'s court case, the expenses involved and a request for assistance.','','N',36,'',2.000,0),(142,16,'Gulf War Printer Virus',62,'Discusses the news accounts of the \"Gulf War\" virus being introduced into an Iraqi air defense system via a printer.','','N',39,'Annalysis: Gulf War Printer Virus',1.000,289),(143,16,'Major Telco Privacy Hole',346,'Discusses exploiting a weakness in Busy Line Verification (BLV) whereby it is possible to remotely listen in on phone conversations at a selected telephone number.','','N',42,'U.S. Phone Companies Face Built-In Privacy Hole',2.000,464),(144,16,'Monitoring Devices',346,'Discusses plans (parts list and schematic) for a FM wireless transmitter and the same circuit modified to take its input and power from a telephone line.','Originally published in Hack-Tic, designed by Billsf.','N',44,'FM Wireless Transmitter',2.000,0),(145,16,'Human Database Centers',889,'Lists addresses and phone numbers for companies that provide data and information services (ie. credit, real estate, court, etc).','','N',46,'',1.000,0),(146,17,'MS-DOS Virus',876,'Discusses the MS-DOS assembly language code for a .COM file infecter with a placeholder for a payload.','References Atari virus code in Spring 1991 issue.','A',4,'An MS-DOS Virus',3.250,0),(147,17,'Batch Virus',877,'Discusses a MS-DOS virus created with batch files that infects .COM files.','','A',8,'A Batch Virus',1.000,0),(148,17,'Virus Scanners Revealed',770,'Discusses some insight into just a few methods that could be used in a virus that current virus protection wouldn\'t catch.','','N',9,'Virus Scanners Exposed',3.000,290),(149,17,'Hacking WWIV',346,'Discusses four techniques for hacking the popular WWIV BBS program and hacking prevention countermeasures.','','N',12,'',4.000,0),(150,17,'Using a Silver Box',878,'Discusses how to use the silver box that you built. (see notes)','References Winter 1989 silver box article.','N',16,'',0.500,0),(151,17,'Fun Frequencies',346,'Lists selected SS (Secret Service) and Disney radio frequencies with description.','','N',17,'Real Important Frequencies',1.000,0),(152,17,'UNIX Password Hacker',879,'Discusses an alternative way of password hacking, using the same method as most others, but with a different approach, includes c source code.','','A',18,'',2.000,0),(153,17,'How To Take Apart a Payphone',880,'Discusses detailed instructions for disassembling a typical pay phone including the tools required.','','N',20,'',3.330,0),(154,17,'The Australian Phone System',881,'Discusses information about the public switched telephone network in Australia including Telecom Australia, the network, pay phones, special numbers and more.','','N',31,'',4.000,0),(155,17,'Catching Peepers',882,'Discusses a little C program that will let you know when someone tries to finger you via the \"finger\" command.','','A',35,'A Way To Catch Peepers',1.000,0),(156,17,'Review: Steve Jackson\'s \'Hacker\'',869,'Discusses \"Hacker: The Computer Crime Card Game\" by Steve Jackson of Steve Jackson Games.','','N',36,'Hacker Review',2.000,0),(157,17,'Simplex Locations',346,'List of Universities, Colleges, Preparatory Schools and School Organizations using SIMPLEX pushbutton locks.','References article on page 6 of the Autumn 1991 issue.','N',38,'Looking for Simples Locks?',3.000,0),(158,17,'News Updates',346,'Discusses several current news items.','','N',42,'The Latest',3.000,0),(159,17,'Interesting Numbers',877,'List of currently available numbers and where they lead to, in constant need of updating.','','N',45,'Fascinating Fone Fun',1.000,0),(160,18,'Portable Hacking',873,'Discusses the recent hacker/phreaker crackdown and suggests ideas for avoiding these problems by taking it to the road.','','N',4,'On the Road Again: Portable Hacking',6.000,278),(161,18,'Hitchhiker\'s Guide To Boxing',713,'Discusses the most complex machine on earth: the phone system, an introduction and guide to having fun with the technology.','Recommends \"Signaling in Telecommunications Networks\" by S. Welch, CCITT Red/Blue/Green/etc Books and \"Telecommunications Engineering\" by Roger L. Freeman.','N',10,'Hitchhikers Guide to the Phone System : Phreaking in the Nineties',6.000,466),(162,18,'Demon Dialer Review',869,'Discusses the \"Do It Yourself Demon Dialer Kit\" by Hack-Tic Technologies.','','N',15,'Do It Yourself Demon Dialer Kit',3.000,0),(163,18,'Revelations',346,'Discusses Bellcore technical advisory TA-NWT-00030 that details data transmission standards for future Caller ID services.','Titled \"bellcore\'s plans for caller id\", also index entry for \"Fun Things to Know\" (..) and \"Here We Go Again\" (..)','N',18,'Bellcore\'s Plans for Caller ID',1.000,0),(164,18,'Defeating *69',701,'Discusses several methods you can use to defeat Return Call (*69) and Caller ID to maintain your telephone privacy.','','N',31,'Hot To Defeat *69',4.000,0),(165,18,'The View of a Fed',874,'Discusses the author\'s (a computer security specialists who works for the U.S. government) take on his interactions with the hacker scene versus the governments\' distorted view.','','N',38,'',2.000,384),(166,18,'Review: Devouring Fungus',840,'Discusses \"The Devouring Fungus (Tales of the Computer Age)\" by Karla Jennings published by W.W. Norton & Company, Ltd. in U.S. and Penguin Books Canada Ltd. in Canada.','','N',40,'Book Review',1.000,0),(167,18,'Voice Mail Hacking',875,'Discusses details and information about hacking voice mailboxes (VMB\'s), which have become a very popular way for hackers to get in touch with each other.','','N',42,'Voice Mail Hacking',5.000,472),(168,19,'Hacking AmiExpress',866,'Discusses the AmiExpress BBS software for the Amiga and presents a c program that displays the sysop password.','','N',4,'',3.000,0),(169,19,'Defeating Callback Verification',770,'Discusses some methods for circumventing the callback verification done by a sysop after applying at a BBS.','','N',9,'',2.000,0),(170,19,'Shopper\'s Guide to COCOTs',867,'Discusses information about Customer Owned Coin Operated Telephones (COCOTs) and a potential method of getting free calls from them.','','N',13,'',4.000,0),(171,19,'Review: Sneakers',2,'Discusses a review of the Universal Pictures movie \"Sneakers\" starring Robert Redford.','','N',17,'Film Review',1.000,0),(172,19,'A Simple C Virus',868,'Discusses the DOS c source code for a simple overwriting virus that attacks all .exe files in it\'s subdirectories.','','A',19,'',2.250,0),(173,19,'Review: The Hacker Crackdown',869,'Discusses \"The Hacker Crackdown: Law and Disorder on the Electronic Frontier\" by Bruce Sterling published by Bantam Books.','','N',21,'Book Review',1.750,0),(174,19,'Hacking on the Front Line',870,'Discusses basic information on gaining computer access including identifying the system, telephone tracing, common accounts and password guessing ideas.','References Lex Luthor\'s \"Hacking VAX/VMS\" Feb 1986 and \"Hacking IBM\'S VM/CMS Operating System\" by Lex Luthor Nov/Dec 1987.','N',31,'',5.000,0),(175,19,'Using the Dial Telephone',871,'Reprint of a phone company document entitled \"How To Use The Dial Telephone\".','','N',36,'How To Use The Dial Telephone',3.000,0),(176,19,'Getting Started',872,'Discusses what it takes to get going and involved in hacking and phreaking.','','N',42,'',1.000,0),(177,19,'Toll Fraud',867,'Discusses documents the author recently obtained from AT&T and Bellcore detailing what they are doing to stop toll fraud \"thefts\".','','N',43,'Toll Fraud: What the Big Boys Are Nervous About',4.000,478),(178,20,'Hackers in a World of Malls',346,'Discusses details of what happened at the Pentagon City Mall during the November 6th Washington DC 2600 meeting including eyewitness account, reporter interview and pictures.','','N',4,'Hackers in a World of Malls: Secret Service Behind Harassment of 2600 Meeting',4.000,512),(179,20,'Cipher Fun',841,'Discusses a procedure for telephone number encipherment that is designed to frustrate most snoops based on the polyalphabetic substitution cipher devised by Giovanni Battista della Porta.','','N',6,'',2.000,0),(180,20,'Beginner\'s Guide to Minitel',862,'Discusses a short introduction to the Minitel or technically the Teletel network (a videotex online service).','From CORE-DUMP a French hacker publication.','N',8,'',3.000,0),(181,20,'Vehicle Identification Numbers',346,'Discusses details of the VIN (vehicle identification number) required by the National Highway Traffic Safety Administration, Department of Transportation for the 1981 model year.','','N',11,'',1.000,0),(182,20,'Secret Service Sites',863,'Lists the city/state/telephone number and whether a Resident Agent (RA) or Domicile (D) of all SS (US Secret Service) field offices.','','N',12,'U.S. Secret Service Field Offices',1.000,0),(183,20,'Letter From Prison',346,'Discusses the lack of First Amendment rights and some details of the prison telephone access.','From a prisoner in California.','N',13,'',2.000,387),(184,20,'Growth of a Low Tech Hacker',864,'Discusses some pointers for newcomers to hacking from the author\'s own experience.','','N',17,'',2.000,390),(185,20,'High Tech Happenings',346,'Discusses several current news items.','','N',19,'',4.000,0),(186,20,'Toll Fraud of the Past',346,'Discusses how one branch of the old Bell System educated its employees about blue boxes.','','N',33,'A Blast From The Past',3.000,0),(187,20,'AT&T Office List',346,'Lists every AT&T office address and telephone number (including switching stations) in eight states.','Part two of the list is in Summer 1993 (..)','N',36,'Is AT&T Hiding Near You?',3.000,0),(188,20,'More Telco Leaks',346,'Discusses the lack of security on some telco computer systems that have dial-up connections and the internal NYNEX guidelines for unacceptable yellow pages advertising.','','N',42,'Telco News',3.330,0),(189,20,'Review: Speach Thing',865,'Discusses the \"Speach Thing\" by Convox Inc. (an add-on audio port for IBM/clone computers) and it\'s use as a red box.','','N',45,'Product Review',1.000,0),(190,21,'Cellular Magic',776,'Discusses the manuals and equipment necessary to do virtually anything regarding cellular.','','N',4,'',9.500,0),(191,21,'Trouble in the White House',855,'Discusses how the White House telephone system has been busy since Tuesday, January 26 and speculates why they\'ve been getting so many calls.','','N',12,'',2.000,0),(192,21,'Beige Box Construction',856,'Discusses the instructions for building a beige box and how to add some features that the lineman\'s handset has.','','N',14,'',2.000,0),(193,21,'Descrambling Cable',857,'Discusses how to build a pay TV descrambler including materials and instructions.','','N',16,'',2.000,331),(194,21,'Secret Service on Trial',858,'Discusses the day by day details of the Steve Jackson Games trial, a travesty instigated by the SS (U.S. Secret Service).','','N',18,'Secret Service on Trial - SJG Trial: Day By Day',5.000,0),(195,21,'Acronyms',851,'Lists telecommunication acronyms from letters a to g.','Subsequent parts of this list can be found in the Summer and Autumn issues.','N',34,'Acronyms A-G',4.000,0),(196,21,'A Study of Hackers',859,'Discusses the author\'s use of MINIX to imitate a UNIX system and his observations of what happened after posting a login/password on some hacker bulletin boards.','','N',38,'',3.000,392),(197,21,'Getting Your File',860,'Discusses information and addresses for obtaining your credit history, criminal record and Social Security information.','','N',42,'Getting Your File...',1.000,0),(198,21,'British News',861,'Discusses several current British news items.','','N',44,'',2.000,0),(199,22,'A Guide to the 5ESS',852,'Discusses extensive details and information about the Class 5 telephone Electronic Switching System (5ESS) including switch topology, hardware, software and how to program it.','','N',4,'',11.000,0),(200,22,'British Credit Holes',346,'Discusses a flaw in the British credit reporting companies procedures and suggestions on how it can be taken advantage of.','','N',12,'',1.000,0),(201,22,'High School Hacking',853,'Discusses the author\'s experience exploring the Netware network and PS/2 computers at his high school and encourages you to do the same.','','N',13,'',1.000,0),(202,22,'DTMF Decoder Review',801,'Discusses the TDD-8 DTMF Decoder - a Touch-Tone Decoder/Display & ASCII Converter Board - sold by MoTron Electronics','','N',14,'Product Review',2.000,0),(203,22,'Meeting Advice',822,'Discusses suggestions and strategies for preventing problems like the disruption of the November 2600 meeting in Washington DC.','Listed under \'Meeting Advice\' in Index with another article (..)','N',16,'',1.500,0),(204,22,'More Acronyms',851,'Lists telecommunication acronyms from letters h to r.','Previous/subsequent parts of this list can be found in the Spring and Autumn issues.','N',20,'Acronyms H-R',4.000,0),(205,22,'AT&T\'s Pages',346,'Contains a threatening letter from AT&T concerning previously published AT&T office addresses and telephone numbers and part two of that list.','Part one in Winter 92 issue.','N',35,'Corporate Speak: Part Two',4.000,0),(206,22,'Video Review: Commonwealth Films',2,'Discusses three videos released by Commonwealth Films - \'Lost Control: Illegal Software Duplication\', \'Virus: Prevention, Detection, Recovery\' and \'Back in Business: Disaster Recover/Business Resumption\'.','','N',40,'Video Review: Assorted Videos from Commonwealth Films',1.000,238),(207,22,'Toll Fraud Device',346,'Discusses building a red box (ie. toll fraud device) including schematic and parts list.','See correction to schematic on page 37 in Autumn 1993 [10:3] issue.','N',42,'',2.000,0),(208,23,'Hacking at the End of the Universe',2,'Discusses the \"Hacking at the End of the Universe\" hacker event organized by Hack-Tic and several recent hacker/university student cases with disturbing outcomes.','','N',4,'',2.000,271),(209,23,'The Wheel Cipher',841,'Discusses Thomas Jefferson\'s major contribution to cryptography - his invention of the Wheel Cipher and how it works.','The same Thomas Jefferson known as the father of the Declaration of Independence.','N',6,'',3.500,0),(210,23,'True Colors',713,'Discusses the confusion in the color coding scheme of various \"Toll Fraud Devices\" (TFD\'s) - sets the record straight with the color of each box and it\'s function.','','N',9,'',3.000,441),(211,23,'Caller ID Technicalities',842,'Discusses the way Caller ID works internally through Signaling System (SS7) messages between telephone switches.','','N',12,'',2.000,0),(212,23,'Congressional Wake-up Calls',346,'Discusses Emmanuel Goldstein\'s testimony before the House Subcommittee on Telecommunications and Finance on June 9.','Markey (D-Massachusetts) and Fields (R-Texas) the only idiots (aka Congressmen) attending.','N',14,'Congress Takes A Holiday',2.000,550),(213,23,'UNIX Openings',843,'Discusses a simple Unix trojan horse script and suggestions for writing it as a program and getting it executed.','','A',16,'UNIX Job Openings',1.500,0),(214,23,'Hacking Honesty Tests',844,'Discusses honesty and integrity tests, the underlying principles, how they are constructed and the knowledge and skills needed to beat them.','','N',20,'How To Hack Honesty',4.000,0),(215,23,'Password Cracking Software',845,'Discusses the \"Password Cracking Software\" commercial programs written by Access Data Recovery.','','N',33,'Product Review',1.000,0),(216,23,'Changing Your Grades',846,'Discusses the author\'s experience hacking the Pupil Attendance and Records System (PARS) at his high school to alter his grades.','','N',34,'Changing Your Grades on a High School Computer',2.000,0),(217,23,'Overview of DSS1',847,'Discusses Integrated Services Digital Network (ISDN) and Digital Subscriber Signaling System 1 (DSS1) which handles signaling between the end nodes.','','N',36,'',1.000,0),(218,23,'Book Review: Approaching Zero',848,'Discusses \"Approaching Zero\" by Paul Mungo and Bryan Clough published by Random House.','','N',38,'Book Review',2.000,0),(219,23,'Protecting Your Virus',849,'Discusses some sample assembly language code to encrypt a virus until runtime to allow it to avoid detection by virus scanners.','','A',40,'Protecting Your Virus From Evil Detectors',1.000,0),(220,23,'More Cellular Fun',850,'Discusses details of cellular phone\'s Electronic Serial Number (ESN) and some Caller ID information.','References Spring 1993 \"Cellular Magic\" article by Bootleg.','N',42,'',2.000,0),(221,23,'The Last of the Acronym List',851,'Lists telecommunication acronyms from letters s to x.','Previous parts of this list can be found in the Spring and Summer issues.','N',44,'Acronyms S-X (no Y or Z)',2.000,0),(222,24,'Hackers in Jail, Part Two',2,'Discusses recent hackers who have been imprisoned, specifically details of the Phiber Optik case.','','N',4,'',2.000,526),(223,24,'Cellular Phone Biopsy',624,'Discusses some useful techniques, ideas and tips for exploring and modifying you cellular phone.','','N',6,'',2.500,425),(224,24,'Elementary Switching',834,'Discusses how signals are sent over the telephone network to control its operation and indicate its status.','Two articles for index entry, \"KNOW YOUR SWITCH\"(..)','N',9,'',1.500,0),(225,24,'Hacking Smartphone',835,'Discusses details of the Smartphone, a soon to be release service available in some ares that will incorporate all the currently available telephone services.','','N',11,'',2.000,0),(226,24,'High School Mac Hack',836,'Discusses some tips to pass on to hopeful high school Mac hackers.','','N',15,'',1.000,0),(227,24,'Hacking Computer Shows',837,'Discusses several methods to get free stuff at computer industry trade shows or expositions.','','N',16,'',2.000,0),(228,24,'NYNEX Voice Mail',346,'Lists NYNEX telephone exchanges, type of switch/location and local telephone number for voice mail.','','N',18,'',4.000,0),(229,24,'The Magical Tone Box',838,'Discusses the author\'s design for a box that can handle any tone related task, includes parts list and building advise.','','N',22,'',2.000,0),(230,24,'Passageways to the Internet',346,'Lists locations and phone numbers that provide access to the Internet.','','N',32,'',3.000,0),(231,24,'More Meeting Advice',839,'Discusses the 1st and 14th Amendments to the Constitution and how they don\'t apply to 2600 meetings on private property, advises participants to know the local laws.','','N',35,'',2.000,519),(232,24,'Book Review: Virtual Reality',840,'Discusses the \"Virtual Reality\" book by Howard Rheingold published by Touchtone, Simon & Schuster Inc.','','N',37,'Book Review',1.000,0),(233,24,'Digital Locks',346,'Discusses how to open the fully mechanical Digital lock.','','N',38,'Digital Locks: Another Contradictions In Terms',3.000,0),(234,24,'News Roundup',346,'Discusses several current news items.','','N',42,'',4.000,0),(235,25,'Crime Waves',2,'Discusses the difference between hacking for personal adventure (what 2600 is about) and using hacker knowledge for personal profit (what criminals are about).','','N',4,'',2.000,266),(236,25,'Build a DTMF Decoder',823,'Discusses plans for a dual-tone multi-frequency (DTMF) decoder including schematic, parts list, circuit description, instructions and Commodore Basic source code.','References TDD-8 DTMF Decoder review in Summer 1993 (..). Author offers kits for sale.','A',6,'',7.000,0),(237,25,'NYNEX Cards',824,'Discusses an analysis of the new Nynex disposable card technology (Change Card) based on card dissection and use of Nynex test sites.','','N',13,'The Nynex Change Card',1.000,0),(238,25,'Hacking Health',825,'Discusses several things you can do to a Stairmaster 4000 treadmill.','','N',14,'How To Hack Health',2.000,0),(239,25,'Software Piracy',826,'Discusses software piracy in Manila and the double standard Western countries apply to it.','Reprinted World Press Review.','N',16,'Software Piracy: Another View',1.500,0),(240,25,'Cable Denial',827,'Discusses the three forms of denial technology cable TV companies use and some suggestions for bypassing them.','','N',18,'Coping With Cable Denial',2.000,0),(241,25,'Cellular Telephone Experimenters Review',828,'Discusses the Cellular Telephone Experimenters Kit by Network Wizards which allows control of an OKI 900 cellular telephone from a DOS PC via the RS323 port.','','N',20,'Product Review',2.000,0),(242,25,'Facts on FOIA',829,'Discusses information about Freedom of Information Act (FOIA) requests and the Privacy Act, provides a list of FBI field offices.','','N',22,'FOIA Facts and Fiction',2.000,0),(243,25,'Blue Boxing - CCITT System #5',818,'Discusses basic CCITT-5 International signaling (\"Comité Consultatif International Téléphonique et Télégraphique\" or International Telegraph and Telephone Consultative Committee).','Article is a supplement to the CCITT-5 \"RedBook\".','N',32,'Blue Boxing Revisted: A CCITT SYSTEM #5 Interpretation',4.750,0),(244,25,'A Gift From Hallmark',701,'Discusses using the Hallmark, Inc. \"Talking Greeting Card\" as a cheap digital audio recording device.','References Fyberlyte\'s \"The Magical Tone Box\" article in Winter 1993.','N',37,'',0.500,339),(245,25,'10XXX',7,'Discusses the misunderstood and unused features of the post-breakup telconet tenex codes (10-XXX codes).','','N',37,'',0.500,0),(246,25,'Scary News',346,'Discusses several current news items.','','N',38,'Not Much Good News Here',2.000,555),(247,25,'Michigan Access',346,'Lists telephone access numbers for MSUnet, Michnet and Ameritech Commercial Service.','','N',42,'Michigan Numbers',1.000,0),(248,25,'Book Reviews: Secrets of a Superhacker, UNIX Security',830,'Discusses the book \"Secrets of a Super Hacker\" by The Knightmare published by Loompanics Unlimited.','Shares index with hacker reviews (..)','N',43,'Hacker Reviews',0.500,0),(249,25,'British Trojan',832,'Discusses a couple of trojan programs to capture user passwords.','','N',44,'Trojans in the U.K.',1.000,0),(250,25,'The Chrome Box',833,'Discusses OptoComs, which are sensors on traffic lights that detect a pattern of flashes from vehicle-mounted strobe lights, and how you might build a device to trigger these.','','N',45,'',1.000,324),(251,26,'Hackers On Planet Earth',2,'Discusses the upcoming Hackers on Planet Earth (HOPE) conference and a \"Hacker Congress\" in Buenos Aires, Argentina.','','N',4,'',2.000,273),(252,26,'Life Under GTD5',142,'Discusses detailed information on the GTD5 telephone switching software that runs on numerous switches (GTE uses DM-100 AND ESS).','','N',6,'',6.000,0),(253,26,'The Joys of Voice Mail',815,'Discusses enough details of the \"Meridian Mail\" voice mail system to get you going.','','N',12,'',1.000,0),(254,26,'Finger Follies',816,'Discusses the Unix Finger command and presents a bash shell script to monitor it.','Actually two articles, this one \"foiling the finger command\" and here (..)','A',14,'Foiling the Finger Command',1.660,0),(255,26,'Cordless Fun',711,'Discusses information about legally monitoring cordless phone conversations.','','N',18,'',1.000,0),(256,26,'Admins Without a Clue',818,'Discusses a collection of quotes that have been gathered during the recent past that express a position on security that the author would like to entitle \"Famous Last Words\".','','N',19,'',1.000,0),(257,26,'Hacking Prodigy',819,'Discusses a method of obtaining free access to the Prodigy online service.','','N',20,'',2.000,0),(258,26,'Hacking the Small Stuff',820,'Discusses how hackers experiment, play around and figure out stuff by noticing the little details that most other people overlook, includes several examples.','','N',22,'',2.000,0),(259,26,'DTMF Decoder',821,'Discusses how to interface a simple Dual-tone multi-frequency (DTMF) decoder circuit to an IBM compatible computer via its parallel port, includes schematic, parts list and QBasic source code.','References Spring 94 article by Xam Killroy (..).','A',32,'',6.000,0),(260,26,'Monitoring Keystrokes',770,'Discusses the author\'s \"Detam\'s Elite Password Leecher\" (DEPL) programs for capturing keystrokes.','References Spring 1994 article by Veghead about \"Keyspy\".','N',38,'',3.000,0),(261,26,'Facts',346,'Discusses several items of interest.','','N',43,'',1.000,0),(262,26,'Detecting Corporate Leaks',822,'Discusses several methods corporate security teams use to reveal the source of leaked documents.','','N',44,'How Corporate Leaks are Detected',2.000,0),(263,27,'Opening Doors',2,'Discusses the first Hackers on Planet Earth (HOPE) conference held August 13th and 14th and praises the attendees and volunteers that made it a great event.','','N',4,'',2.000,274),(264,27,'Monitoring U.S. Mail',806,'Discusses details of the United States Postal Service (USPS) Optical Character Readers (OCR) for setting address bar codes and how they could be used to monitor someone\'s mail.','','N',6,'',1.000,0),(265,27,'Irish Telephones',807,'Discusses information about the Irish telephone system currently run by the Telecom Eireann company.','','N',8,'',2.000,0),(266,27,'The Ghost Board',808,'Discusses phreaking culture centered around Evergreen State College in Olympia, Washington and it\'s \"parasitic bulletin board/message system\" called the Ghost Board.','','N',11,'',1.000,397),(267,27,'Hacking Netcash',809,'Discusses information about how Netcash - a form of electronic money/online payment system - works.','References July issue of Boardwatch.','N',12,'',1.000,0),(268,27,'Welcome to Mel',810,'Discusses details of Southwestern Bell\'s Mechanized Employee Locater (MEL) which provides access by telephone to the official company directory.','','N',13,'',1.000,0),(269,27,'Generating an ESN',747,'Discusses how the Electronic Serial Numbers (ESN) is generated based on the serial number stamped on the mobile phone by the manufacturer.','','N',14,'',1.000,0),(270,27,'The Ten Dollar Red Box',811,'Discusses detailed instructions on using a Hallmark card to create a working red box.','','N',15,'',1.000,0),(271,27,'How To Listen In',812,'Discusses information about the many devices available to the general public for eavesdropping on people/places.','','N',17,'',7.000,349),(272,27,'Living on the Front Line',346,'Discusses details of a network intrusion and compromise gathered from Internet posts.','','N',32,'',3.000,0),(273,27,'News Items',346,'Discusses several current news items.','','N',35,'',4.000,0),(274,27,'Breaking Windows',813,'Discusses a couple methods of bypassing the Windows screen saver password.','','N',38,'',2.000,0),(275,27,'Internet World Guide',346,'Lists the two-letter Internet domains and the corresponding county code and name.','','N',43,'',2.000,0),(276,27,'Software Review: The Supervisor Series for VMS',814,'Discusses the Supervisor Series of Utilities for VMS, a public domain collection of tools to intercept traffic between terminals and user processes running on the VAX.','','N',45,'',1.000,0),(277,28,'Inspiration',2,'Discusses the promise of the Internet and the need to oppose restrictions and over regulation on it in a manor that is not self-destructive.','','N',4,'',2.000,557),(278,28,'Bypassing Protec',799,'Discusses a method of bypassing the Protec hard drive protection program, includes a Turbo Pascal program that helps.','','A',6,'',5.000,0),(279,28,'More Key Capturing',800,'Discusses the author\'s password capturing program and several useful methods for capturing keystrokes on DOS/Windows machines.','','N',12,'',3.000,0),(280,28,'Digital Telephony Passes',346,'Discusses the Communications Assistance for Law Enforcement Act (CALEA HR 4922), the Congress approved law enforcement takeover of the phone system to make surveillance easier.','','N',15,'',1.000,559),(281,28,'The Risks of War Dialing',770,'Discusses some of the legal complexities of war dialing and Florida statue 815.03 (Florida Computer Crimes Act) and the author\'s justification.','','N',16,'',2.000,0),(282,28,'Cellular Hardware & Electronics',624,'Discusses details of the Number Assignment Module (NAM) that older phones store in PROM (Programmable Read-Only Memory).','','N',18,'',4.000,0),(283,28,'Australian Update',801,'Discusses the massive brush fires near Sydney Australia that triggered numerous calls from overseas that overloaded many local exchanges.','','N',22,'News From The Far Side of the Planet',1.000,0),(284,28,'VT Hacking',802,'Discusses how the DEC VT220 or VT240 computer terminals may be utilized to hook accounts on any system it connects with using the included c program.','','A',32,'',4.000,0),(285,28,'Janitor Privileges',803,'Discusses how many companies janitorial services employ temp workers and how that may allow access to internal company information.','','N',36,'',1.000,0),(286,28,'Net Surfing Techniques',804,'Discusses a (potentially time consuming) method of finding interesting machines on the Internet.','','N',37,'',1.000,0),(287,28,'News Update',346,'Discusses several current news items.','','N',38,'Things That Happen',2.000,0),(288,28,'Reviews: Network Security, Unauthorized Access',805,'Discusses Network Security by Steven L. Shaffer and Alan R. Simon published by AP Professional. Also has a video review by Emmanuel Goldstein of Unauthorized Access by Annaliza Savage of Savage Productions.','','N',43,'Book Reviews, Video Review',3.000,0),(289,29,'The World vs. Kevin Mitnick',2,'Discusses the recent capture of Kevin Mitnick and details surrounding it and John Markoff\'s involvement.','','N',4,'',3.000,528),(290,29,'The Gold Card',346,'Discusses prepaid chipcards for telephones (mainly used overseas) including building your own reader/writer and source code in c for experimentation.','Adapted, translated, updated article from Hack-Tic, the Dutch hacker magazine issue 24-25.','A',6,'',13.500,0),(291,29,'Facts On ATM Camera Security',796,'Discusses facts to clear up the many misconceptions on cameras at Automatic Teller Machines (ATMs).','','N',20,'',2.000,0),(292,29,'Cellular Interception Techniques',615,'Discusses monitoring cellular telephony communications including security, usage analysis, equipment availability and interception techniques. ','The Electronic Communications Privacy Act of 1986 (ECPA) prohibits the monitoring of these frequencies.','N',23,'',5.000,0),(293,29,'Hacking in Brazil',35,'Discusses the current state of hacking, phreaking, computer and Internet use in Brazil.','','N',36,'',2.000,0),(294,29,'Hacking Tandy',285,'Discusses the Radio Shack PC-6 and a method of creating a Trojan horse to display the memo area.','One listing in index, actually two articles, \"Hacking the Tandy/Casio Pocket Computer\" and this one (..)','A',38,'Hacking the Tandy/Casio Pocket Computer',1.000,0),(295,29,'500 Exchange Guide',346,'Provides a list of exchanges and the owner.','','N',41,'Exchanges In 500 Land Home Of Phone Numbers For Life',1.000,0),(296,29,'Pager Major',798,'Discusses answers to some of the more common questions about pager systems, primarily focused on the US and Canada.','','N',42,'',4.000,339),(297,29,'Review: Masters of Deception',722,'Discusses Masters of Deception by Michelle Slatalla and Joshua Quittner published by Harper Collins.','','N',50,'West Side Hacker: Masters of Deception',2.000,239),(298,29,'Assorted News',346,'Discusses several current news items.','','N',52,'News Items',2.000,0),(299,29,'Leaking Cables',346,'Discusses a leaked internal British Telecom briefing document about the challenge it faces from cable companies.','','N',54,'',1.000,0),(300,30,'The Bernie S. Saga',2,'Discusses details of the Bernie S. (Ed Cummings) case and his current incarceration in a federal prison.','','N',4,'',2.660,531),(301,30,'New Antiviral Technologies',788,'Discusses how viruses and anti-virus software work and summarizes the author\'s many years of independent study on computer viruses.','References an article in 2600 called \"Protecting Your Virus\" (..)','N',6,'Pioneering New Antiviral Technologies',4.000,0),(302,30,'The Gender Snooper',779,'Discusses information and plans for a device (the author used a gender changer) plugged between a computer and modem which will transmit the data going thru it.','','N',10,'',3.000,0),(303,30,'ATM Tricks',789,'Discusses a couple of problems with ATM Diebold hardware and procedures that could result in free cash.','','N',13,'',3.000,335),(304,30,'Citibank ATM Fun',790,'Discusses how some Citibank ATMs can be put into a special mode by simply using the touchscreen.','','N',16,'',1.000,0),(305,30,'Day of the Hacker',791,'Discusses the author\'s experience running a Wildcat BBS system and how even though he was vigilant his system was eventually hacked.','','N',18,'',2.000,398),(306,30,'Diverters',792,'Discusses telephone call diverters, what they are, how to use them and where to fin them.','','N',20,'',1.000,0),(307,30,'Hacking AS/400',793,'Discusses information about the AS/400 IBM mainframe computer\'s operating system OS/400.','','N',22,'',4.000,0),(308,30,'Radio Reviews',768,'Discusses information about Opto\'s radio scanners \"the Scout\", R10A FM Communications Interceptor, APS104 Active Pre-selector, Universal M-400v2 Decoder and AOR\'s AR8000 Wide Range Receiver.','','N',36,'',4.000,0),(309,30,'War Dialing',794,'Discusses the author\'s experiences with war dialing and computers found, includes a qmodem auto dialer script.','','A',40,'',3.000,401),(310,30,'Coping With Cable Denial 2',795,'Discusses some methods for getting free cable service at a low cost, includes specific mods to a General Instrument Jerrold 450.','References Cap\'n Dave article in Spring 94.','N',43,'Coping With Cable Denial 2: The Jerrold 450 Hack',4.500,0),(311,30,'News Items',346,'Discusses several current news items.','In Best of 2600 twice, page 534 has the last section and 562 has the first.','N',50,'',2.000,534),(312,30,'NPA List',346,'Discusses Number Plan Areas (NPA or area codes) and presents an update list of them for North America.','','N',52,'The Complete NPA List',2.000,0),(313,31,'No More Secrets',2,'Discusses the Secret Service, a group of dimwitted, overzealous law enforcers and their mistreatment and mis-portrayal of Bernie S. (Ed Cummings).','','N',4,'',2.500,535),(314,31,'Stealth Trojans',779,'Discusses an assembly language trojan and the use of \"Stealth\" disk I/O to avoid detection by anti virus programs or protected mode environments.','','A',6,'',6.500,0),(315,31,'Military Madness',346,'Discusses the authors experience as the resident techie on a US Air Force base.','','N',14,'',2.000,405),(316,31,'T-Shirt Follies',780,'Discusses three episodes during which the author was harassed for wearing a 2600 t-shirt.','','N',16,'',1.000,0),(317,31,'Macintosh Key Capturing',781,'Discusses a THINK C or C++ program that utilizes a quick key capturing scheme for the Macintosh.','References Winter 19945 article \"More Key Capturing\".','A',17,'',1.500,0),(318,31,'Just Say No',782,'Discusses the NO-Box which is a like a new and improved gold box without the wires and mess.','','N',19,'Just Say No!',1.000,0),(319,31,'COCOT Experimenter\'s Resource Guide',783,'Discusses customer-owned coin-operated telephones (COCOT ie. payphones), including the internal hardware and operation, the business side and operational maintenance.','','N',20,'',10.000,0),(320,31,'Mutation Engine Demystified',784,'Discusses the mutation engine virus writers use to avoid detection by anti-virus scanners','','A',36,'',5.000,0),(321,31,'ISDN Overview',785,'Discusses information about Integrated Services Digital Network (ISDN).','','N',41,'',1.000,0),(322,31,'DTMF Decoder Review',768,'Discusses information about the TM-16a Plus touch tone decoder by MoTron Electronics.','','N',42,'The * DTMF # Decoder',2.000,0),(323,31,'Hacking Interrogation',786,'Discusses how a police interrogation works and what you can do to be better prepared for it should it ever happen to you.','Mentions ATM Bandit article in the Spring 1995 issue.','N',44,'Hacking A Police Interrogation',2.000,0),(324,31,'Breaking Windows 2',787,'Discusses additional information on Windows 3.x that may be useful in hacking limited access Windows machines.','References \'Breaking Windows\' in the Autumn 1994 issue.','N',50,'',1.000,0),(325,31,'Movie Reviews: The Net, Hackers',2,'Discusses a review of the Columbia Pictures movie \'The Net\' starring Sandra Bullock.','Shared index entry with Hackers ..','N',51,'The Net',1.000,242),(326,32,'Speech Control',2,'Discusses the most important issue facing the net community is that of censorship and how government and law enforcement want to control speech on the Internet.','','N',4,'',2.000,0),(327,32,'What Happens on the AT&T Side',676,'Discusses information about the AT&T long distance customer service call in center operations.','','N',6,'',4.000,0),(328,32,'News Update',346,'Discusses several current news items.','','N',12,'',2.000,0),(329,32,'A Spoofing Odyssey',769,'Discusses the technical description of the methods used by Kevin Mitnick to infiltrate Shimomura\'s computer system.','','N',14,'',3.000,0),(330,32,'Infiltrating Disney',770,'Discusses the mysterious underground tunnels at Walt Disney World and presents a few pointers for \"urban hacking\" activities.','','N',17,'',1.000,0),(331,32,'Sniffing Ethernet',771,'Discusses what packing sniffing on Ethernet networks is and how it works with examples of useful tools.','','N',18,'',2.000,0),(332,32,'Bypassing DOS/Windows Security',772,'Discusses the conditions for bypassing many security measures on DOS/Windows machines and some useful examples/tools for doing this.','','N',20,'',2.000,0),(333,32,'Understanding Verifone Machines',773,'Discusses the basic layout and some information about how the Verifone machine works, a point of sale (POS) device.','','N',22,'',3.000,0),(334,32,'Pakistani Phones',774,'Discusses recent developments in telephone technology in Pakistan the author discovered during a trip to the area.','Recommends Signaling in Telecommunications Networks by S. Welch and Telecommunications Systems Engineering by Roger L. Freeman.','N',25,'Phones in Pakistan',3.000,0),(335,32,'.com File Infector',775,'Discusses and explains an assembly language program that infects .com files on DOS/Windows systems.','','N',36,'',6.125,0),(336,32,'Understanding the Hacker',776,'Discusses the reasoning that could justify hacking in the eyes of those who do it.','','N',42,'',1.000,0),(337,32,'Scanning Space',777,'Discusses other frequencies beside fire/police to listen in on with scanners, including low orbiting satellites, the US space shuttle, Coast Guard etc.','Recommends Comprehensive Guide to Military Monitoring by Steve Douglass and The Outer Space Frequency Directory by Anthony Curtis from CRB Research Books, Inc.','N',43,'Scanning',1.000,0),(338,32,'AOL Syndrome',745,'Discusses AOL\'s Home Page publisher and Personal Publisher, known as \"My Place\" and \"My Home Page\".','','N',44,'',1.000,0),(339,32,'Hacking Netware',778,'Discusses the author\'s successful attempt to acquire the Supervisor password on a Novell 3.11 Netware system.','','N',50,'',1.825,0),(340,32,'Fugitive Game, Takedown Review',722,'Discusses The Fugitive Game by Jonathan Littman published by Little, Brown and Company and Takedown by Tsutomu Shimomura with John Markoff published by Hyperion Press.','','N',52,'Cashing in on Mitnick: The Fugitive Game',2.000,245),(341,33,'Caught in the Web',2,'Discusses how the Internet can be used by individuals against corporations and bureaucratic and repressive regimes.','','N',4,'',2.000,538),(342,33,'Tap Alert',760,'Discusses plans for and building a tap-alert device to detect lower grade taps (not the non-parasitic or the electronic taps at the switch).','','N',6,'',2.000,0),(343,33,'A Page of Revenge',761,'Discusses the design of a program that would call pager numbers with a victim\'s phone number','','N',9,'',1.000,0),(344,33,'Unshredding the Evidence',644,'Discusses the key to reconstructing shredded documents (assumes you are not dealing with cross-cut, chipped documents, or ashes, but with \"paper spaghetti\").','','N',10,'',2.000,378),(345,33,'Confessions of a Beige Boxer',762,'Discusses the author\'s history of phone phreaking, though some stories are obviously fiction it is very interesting and amusing.','','N',12,'',5.000,408),(346,33,'Macs at Ease',763,'Discusses how to circumvent the AtEase security system software on Macs commonly used at schools.','','N',17,'',1.000,0),(347,33,'Sharp Cash Trix',709,'Discusses an interesting security problem with the Sharp ER-3100 cash register that allow it to be opened silently bypassing the activity log.','','N',18,'',2.000,0),(348,33,'Hacking Doors',764,'Discusses some vulnerabilities in some of the telephone security systems often used in apartment buildings to control access.','','N',20,'',1.000,0),(349,33,'Hacking Caller ID Boxes',694,'Discusses how to modify a Caller ID Company (CIDCO) caller id box with ROM revision 1.2A or 1.4 so that it has more capacity.','See also \'Expanding Caller ID Storage\' in 15:3. (..)','N',22,'',1.500,0),(350,33,'The Alaskan Phone System',765,'Discusses the Alaskan phone system and how it is actually very interesting and different from most others because of it\'s size and low population density.','','N',24,'',2.000,0),(351,33,'Avoiding Suspicion',766,'Discusses how to avoid the attention of law enforcement and recommendations for keeping a low profile.','','N',26,'',2.000,0),(352,33,'Motorola Cellular Guide',767,'Discusses detailed information about Motorola\'s pagers and their test mode commands.','','N',38,'',10.000,0),(353,33,'Hackers \'95 Review',768,'Discusses a review of the movie Hackers \'95 by Phon-E and R.F. Burns, Custom Video Productions.','','N',53,'Paparazzi Hackers',1.000,0),(354,34,'Guided Perceptions',2,'Discusses the government and media\'s exaggeration of the hacker threat and subsequent inane politician responses, calls for intelligent questioning to limit this nonsense.','','N',4,'',1.660,256),(355,34,'Flood Warning',750,'Discusses a hostlock.c program written for Linux that uses ip source address spoofing to flood a target with SYN packets.','','A',6,'',6.000,0),(356,34,'Scanning Australia',751,'Discusses a total free phone carrier scan of the entire continent of Australia.','','N',12,'',2.000,0),(357,34,'Imaginary Friends',752,'Discusses suggestions for obtaining a phone under any name you want.','','N',14,'',1.660,0),(358,34,'A Tale of Two Cities',753,'Discusses the current phone system in Sarajevo and some of it\'s history.','','N',16,'',2.000,0),(359,34,'How To Create Encryption',754,'Discusses the logic and design for a program that would encrypt/decrypt files, email author for a version that runs in DOS.','','N',18,'',2.000,0),(360,34,'Secret Codes',755,'Discusses basic encryption and presents a Powerbasic 3.0 program that codes/decodes messages using a keyword and a simple algorithm.','','A',20,'',3.000,0),(361,34,'Consumer Hazards',756,'Discusses how easy it is for credit card information to be stolen in real life, much less the Internet.','','N',23,'',2.000,0),(362,34,'RCONSOLE Hacking',757,'Discusses how to extract the RCONSOLE password from a sniffer trace to gain access to a Novell Netware\'s server console.','','N',25,'',5.000,0),(363,34,'Flightlink Fun',758,'Discusses the Flightlink communications service being offered on almost all Continental Airlines airplanes.','','N',42,'',2.000,0),(364,34,'NYNEX Regression',759,'Discusses the Smart Pay Phones operated by NYNEX in the New York City area.','','N',44,'',1.000,0),(365,34,'Starting a Hacker Scene',35,'Discusses how the author initiated a hacker community in San Paulo, Brazil.','','N',45,'',3.000,0),(366,34,'And Justice For All',346,'Discusses and prints the full transcript of the March 5, 1996 sentencing of Ed Cummings (Bernie S.).','','N',58,'',10.000,0),(367,35,'Fallout',2,'Discusses the ongoing saga of Ed Cummins (Bernie S.) and his mistreatment by the Secret Service and the prison authorities.','','N',4,'',2.000,540),(368,35,'Searches and Arrests',723,'Discusses what the law is, what the police can legally do to you and what your rights are.','Prompted by \"Avoiding Suspicion\" in Spring 1996 (..)','N',6,'',2.000,0),(369,35,'Hacking the SCC OS',724,'Discusses the Site Client Control (SCC) OS which is a business program used for keeping records and making secretaries\' jobs easier.','','N',8,'',2.000,0),(370,35,'Security Through the Mouse',740,'Discusses a Turbo C++ program that accepts mouse left/right button clicks as part of a password.','','A',10,'',1.000,0),(371,35,'Brazilian Phone System',35,'Discusses the numerous problems and a few tricks using the telephone system in Brazil.','Author is Derneval, same as Argentinian Phone System in Winter 1997. (..)','N',11,'The Brazilian Phone System',3.000,0),(372,35,'Dial Pulser',741,'Discusses a Turbo BASIC program that is a \'Rotary SF\' or \'dial pulser\' generator.','','A',14,'The Dial Pulser',2.000,0),(373,35,'GI CFT2200 Power Box',742,'Discusses details of the General Instrument CFT2200 boxes being installed by the local cable company whey laying fiber optic cable.','','N',16,'The GI CFT2200 Power Box',2.000,0),(374,35,'GTE Voice Prompts',743,'Lists the codes for GET voice prompts.','','N',18,'GTE Voice Prompts (Found Inside GTE Computers)',1.000,0),(375,35,'HP LX200',744,'Discusses details of the HP LX200 personal digital assistant (PDA) and why the author likes it.','','N',19,'The HP LX200',1.000,0),(376,35,'Maximum WOW!',745,'Discusses how to use the Windows 95 dial up scripting tool to get unlimited Internet access to CompuServe WOW! customers.','','A',20,'',2.000,0),(377,35,'Hack Your High School',746,'Discusses some suggestions for gaining access to your High School\'s computer system.','References \'gender snooper\' in Vol. 12 # 2.','N',22,'',1.000,0),(378,35,'Federal BBS\'s',62,'Lists some Federal BBS\'s and their phone numbers.','','N',23,'',1.000,0),(379,35,'Hacking the SR1000 PBX',747,'Discusses the SR1000 redundant PBX system by Solid State Systems and how it could easily be taken advantage of.','','N',24,'',3.000,0),(380,35,'Building the Cheese Box',615,'Discusses construction and use of a cheesebox which turns two phone numbers into a loop line.','','A',27,'',3.000,0),(381,35,'Spoofing Cellular Service',748,'Discusses a method of spoofing the celco for phone service instead of having to clone a cellular phone.','','N',40,'',2.000,0),(382,35,'Reprogramming Data',749,'Discusses information on reprogramming your cell phone.','','N',42,'',8.000,0),(383,35,'The Weird World of AOL',346,'Discusses two emails received from AOL related to Terms of Service violations.','','N',50,'',2.000,0),(384,35,'PHF Exploit',632,'Discusses PHF, a common gateway interface (CGI) that is used to browse files on a website and how it can be abused.','','N',56,'The PHF Exploit',2.000,0),(385,36,'Knowledge is Strength',2,'Discusses hacker culture : the trap of complacency, divisiveness in the community, the need for awareness of the past and the temptation of true crime.','','N',4,'',2.000,0),(386,36,'Toward More Secrets',695,'Discusses encrypted data communications and the complex science of cryptology which is only beginning to be well understood.','','N',6,'',2.000,308),(387,36,'Backcountry Phones',712,'Discusses information about radiotelephones - which are used to connect isolated areas to a phone network without the installation of phone lines.','','N',8,'',2.000,0),(388,36,'Chipcards Explained',713,'Discusses detailed information on phonecards (or chipcards) and provides details on how to test the card and find out its secrets.','','N',10,'',12.000,0),(389,36,'Biggest Mac Mistakes',1065,'Discusses basic ways a Macintosh network can be attacked or compromised using three methods: File Sharing, Retrospect Remote and Appletalk Remote Access.','','N',20,'',3.000,0),(390,36,'Craft Access Terminal',715,'Discusses CATs (Craft Access Terminals) with an introduction to the system, lists the menus attained and describes the sequence of events occurring when testing.','','N',23,'',3.000,0),(391,36,'Cracking AskSam',644,'Discusses the askSam database software and details how easy the password scheme it uses is to crack.','','N',26,'',1.500,0),(392,36,'Snooping Via MS-Mail',716,'Discusses a method of snooping through other people\'s mail if your company is using MS-Mail for its email system.','','N',28,'',1.500,0),(393,36,'Subscriber Network Interfaces',717,'Discusses Telephone/Subscriber Network Interfaces which are now installed on all new lines and some fun you can have with them.','','N',41,'',2.000,0),(394,36,'Unfriendly Numbers',718,'Discusses and lists 800 numbers that end up costing you money and 900/976 \"stealth numbers\" that were liberated from internal telco documents.','','N',43,'',2.000,0),(395,36,'How To Steal Things',719,'Discusses how the author\'s \"friend\" orders stuff thru mail order and then never pays for it.','Note stealing is illegal and immoral.','N',45,'',1.000,0),(396,36,'Social Engineering Via Video',720,'Discusses how almost everyone in the world loves the camera and how this is a security flaw that can be exploited to a great degree.','','N',48,'',1.500,0),(397,36,'Defeating the W95 Screensaver',721,'Discusses cracking the password scheme for Microsoft Windows 95.','','A',54,'',2.000,0),(398,36,'Anarchy Online Review',722,'Discusses the book \"Anarchy Online\" by Charles Platt, published by Black Sheep Books.','','N',56,'',2.000,0),(399,37,'Enough is Enough',2,'Discusses the ongoing over two years saga of Kevin Mitnick and the outrageous treatment he is receiving.','','N',4,'',2.000,544),(400,37,'Hacking LED Signs',701,'Discusses a brief, general overview of most types of LED displays, how they\'re programmed and how you can use them to get your message out.','','N',6,'',2.500,325),(401,37,'Use Your Skills to Escape Boot Camp',702,'Discusses a technique the author used to get out of boot camp with an honorable discharge.','I would advise everyone not to join in the first place!','N',9,'Social Engineering Your Way Out Of Boot Camp',3.000,0),(402,37,'Poor Man\'s Access',703,'Discusses a c program call PMA (Poor Man\'s Access) that provides limited shell access to multiple clients from a host server.','','A',13,'',5.000,0),(403,37,'Consequences of .gov/.mil Hacking',704,'Discusses the hacked home page of the US Air Force and the potential downside for the people who did it.','','N',18,'The Consequences of .gov/.mil Hacking',1.000,301),(404,37,'More PHF Fun',688,'Discusses a Python script to find web servers with the \"phf hole\" vulnerability.','','A',19,'',1.000,0),(405,37,'Credit Card Numbers Via Calculators',705,'Discusses a program that runs on a TI-82 calculator where you enter a 6 digit prefix and it outputs a credit card number.','','A',20,'How To Generate Credit Card Numbers On A Calculator',1.000,0),(406,37,'Paper Evidence',706,'Discusses some of the FBI\'s capabilities in restoring evidence that is on paper and two possible suggestions to prevent restoration.','','N',21,'',1.000,0),(407,37,'Cellular Programming Data',707,'Discusses a number of cellular phones with some instructions and background on how to enter program mode.','','N',22,'',4.000,0),(408,37,'Downsizing Insurance',708,'Discusses what the author calls a \"fire kit\" which are suggestions and strategies for making your ex-companies life difficult if you are let go.','','N',27,'',2.660,414),(409,37,'How To Hack Tech Support',709,'Discusses how you can avoid paying for technical support and how to receive better support from most companies.','','N',41,'',3.000,0),(410,37,'Letter From Prison',710,'Discusses some details of the author\'s Appeals Court decision and contains an apology to the hacker community.','Second page is titled: Digest Of Opinion.','N',44,'',2.000,0),(411,37,'The Other Kevin Book',711,'Discusses a review of \"The Watchman: The Twisted Life and Crimes of Serial Hacker Keven Poulsen\" by Jonathan Littman, published by Little/Brown.','','N',47,'',1.000,0),(412,37,'How To Legally Use a Red Box',624,'Discusses the Red Box and presents a detection circuit (with bill of material/schematic) that gives you a legitimate reason to possess this type of multi-frequency generator.','','N',54,'Red Box Detection Circuit A Practical Use For A \"Toll Fraud\" Device',4.000,0),(413,38,'The Neverending Story',2,'Discusses attempts by the government to control and regulate the Internet, reveals details of Kevin Mitnick\'s proposed conditions of supervised release.','','N',4,'',2.000,562),(414,38,'Cablemodem Security Holes',691,'Discusses some of the security issues with the cable modems being used by home Internet users.','All references to specific ISP have been censored.','N',6,'Cable Modem Security Holes',2.000,333),(415,38,'GSM Comes to North America',692,'Discusses and describes various aspects of the newly implemented Global System for Mobile communications (GSM).','','N',8,'',5.330,428),(416,38,'The Wonders of Net2Phone',693,'Discusses a new product by Net2Phone that allows you to have real-time uninterrupted voice communication between two calling parties over the Internet.','','N',14,'',2.000,0),(417,38,'Those Pesky Mylar Strips',694,'Discusses the plastic anti-counterfeiting strips placed within US $20 bills in the early 1990\'s.','','N',16,'Twenty 20 USA Those Pesky Mylar Strips USA 20 Twenty',0.660,0),(418,38,'Fortezza: The Next Clipper?',695,'Discusses the Fortezza Crypto Card which represents the US governments attempt to implement NSA-breakable cryptographic technology like it tried with the Clipper/Capstone project.','','N',17,'',2.660,310),(419,38,'Fast Food Phun',696,'Discusses the radio equipment and information needed to intercept/override a fast food drive thru speaker/transmitter.','','N',20,'',2.000,365),(420,38,'Tricks and Treats of the Autovon',697,'Discusses the Automatic Voice Network (AUTOVON) used by the US military to link all DOD installations on one telephone network.','','N',22,'',3.000,0),(421,38,'Omnipoint in New York City',698,'Discusses New York\'s first GSM provider Omnipoint and lists all of the current transmitters/site IDs/frequencies in the New York metropolitan area.','','N',25,'',5.000,0),(422,38,'Defeating HTTP Access Control',699,'Discusses the HTTP 1.0 protocol feature for user name/password access control for specific files, presents a Perl script for a brute force dictionary attack.','','A',40,'http://www.Defeating.HTTP.Access.Control.edu',4.000,0),(423,38,'The Ins and Outs of Metrocard Gold',700,'Discusses details of MetroCard Gold, a thin plastic credit card sized magnetic stripe card used in the New York City transit system.','','N',44,'',4.000,0),(424,38,'News Summary',346,'Discusses several current news items.','In Best of 2600 twice, page 299 has page 54, page 481 starts halfway on page 55 and has 56 and part of 57.','N',54,'News Items',4.000,299),(425,39,'Sobering Facts',2,'Discusses why the issue was late - the bankruptcy of 2600\'s distributor Fine Print and the resulting monetary problems.','','N',4,'',2.000,296),(426,39,'How To Get Busted by the Feds',684,'Discusses from the author and contributor\'s personal experience the criminal justice system in the US and how it applies to hackers. At 15 pages it is quite thorough.','From Federal Prison, 1997. Contributions and editing by Minor Threat.','N',6,'Busted! A Complete Guide To Getting Caught',15.000,0),(427,39,'Hacking Fedex',685,'Discusses an overview of FedEx\'s monolith mainframe, a look at FedEx security methods and even a few tips should anyone decide to try and hack FedEx.','','N',14,'',3.000,0),(428,39,'Defeating *67 With Omnipoint',686,'Discusses how Omnipoint voicemail can make *67 (used to block caller id) completely useless.',NULL,'N',17,'',1.000,0),(429,39,'How To Be a Real Dick on IRC',687,'Discusses a methodology for hacking IRC channels, some of the better channels to hack as well as fun things to do while \"owning a channel\".','','N',19,'',3.000,0),(430,39,'Brute Forcing the World',688,'Discusses brute forcing the Post Office Protocol (POP) as many systems don\'t log or timeout yet.','','N',23,'',0.660,0),(431,39,'Hacking the Vote',689,'Discusses the Voting Rights Act, National Voter Registration Act and suggestions for casting multiple votes.','','N',24,'Hack The Vote',2.000,0),(432,39,'The EZPass System',690,'Discusses the New York State Thruway\'s E-ZPass system and speculates on whether it is used for vehicular violation enforcement.','','N',26,'The E-ZPass System',3.000,327),(433,39,'News Summary',346,'Discusses several current news items.','','N',54,'',2.000,0),(434,39,'Secrets of Walmart',163,'Discusses how the phones at your local WalMart work including extensions, standard models and available features.','','N',56,'Secrets of Wal-Mart',2.000,0),(435,40,'Remember the Future',2,'Discusses the ongoing Kevin Mitnick case (now three years without trial) and updates details of the 2600\'s magazine distributor bankruptcy (Fine Print).','Best of 2600 Book only reprints the Distributor Update section on page 5. ','N',4,'Remember the Future - Distributor Update section',2.000,348),(436,40,'Your Very Own Backhoe',600,'Discusses a perl script called Backhoe that is a backdoor daemon that copies a rootshell into /tmp periodically, then deletes it.','','A',6,'',5.000,0),(437,40,'The Medical Information Bureau',676,'Discusses the MIB (Medical Information Bureau) which tracks the medical conditions and health of anyone who has applied for life insurance.','','N',11,'',1.000,0),(438,40,'Some 800-555 Fun',677,'Discusses a list of the interesting numbers found in a scan of the 800-555 exchange.','','N',12,'',1.000,0),(439,40,'TCP/IP Basics and Shortcomings',674,'Discusses TCP/IP including the basics of how it works, the protocols and some vulnerabilities.','','N',13,'TCP/IP',3.000,0),(440,40,'The Ominous GETS',346,'Discusses the Government Emergency Telecommunications Service (GETS), an emergency telecommunications system for the federal government.','','N',16,'GETS',2.000,0),(441,40,'The Potential of Mobil Speedpass',678,'Discusses information about the Mobil Speedpass key tag device including a dissection and how it works.','','N',18,'',2.000,0),(442,40,'Telco/Government Cooperation',679,'Discusses and presents documents from a Threat Assessment seminar put on by law enforcement and the local phone company.','','N',20,'',4.000,0),(443,40,'How To Get Away With Things on Geocities',680,'Discusses using GeoCities free web space service and a suggestion for bypassing their content restrictions (censorship).','','N',24,'',1.500,0),(444,40,'The Argentinian Phone System',35,'Discusses a few things about the phone system in Argentina.','References author\'s article about the Brazilian phone system. (..)','N',26,'Mar del Plata Sede de los Xll Juegoes Panamericanos The Argentinian Phone System Telefo',2.500,0),(445,40,'How To Hack a Virtual Pet',681,'Discusses the author\'s daughter\'s virtual pet and some experiments performed on it.','','N',29,'Hacking the Virtual Pet',1.000,0),(446,40,'Spying on Yahoo',346,'Lists 1000 search strings from random Yahoo users captured thru a security hole (since patched).','','N',40,'Yahoo Searches',2.000,0),(447,40,'Hack Your Head',682,'Discusses legal stimulants including caffeine, ephedrine, other assorted goodies, toxicity and recommendations.','','N',42,'Hack Your Head: Stimulants For The Uberhacker',2.000,0),(448,40,'Noggin Cracking',683,'Discusses the principals of \"Noggin Cracking\" - the process of breaking certain kinds of software protection using nothing besides the gray stuff underneath your hair.','','N',44,'',2.000,0),(449,40,'Sun\'s Nasty Little List',346,'Discusses Sun Microsystems \"Denied and Restricted Parties List\" and lists the names in Canada and the US.','','N',46,'',6.000,0),(450,41,'Message Sent',2,'Discusses the latest news concerning the Kevin Mitnick case and additional details of 2600\'s financial state and the problems causing it.','Page 5 has a section titled Our Financial State that is in the Best of 2600 book.','N',4,'',2.000,530),(451,41,'The Defense Switched Network',662,'Discusses information about the Defense Switched Network (DSN) used for voice and data communications between various DoD installations around the world.','','N',6,'',2.000,0),(452,41,'More on Military Phones',663,'Discusses details about military installation phone systems including monitoring, Defense Switching Network (DSN, formally AUTOVON) and general information.','References \'Tricks and Treats of AUTOVON\' article by N-Tolerant in Summer 97. (..)','N',8,'',2.000,0),(453,41,'The Mysteries of SIPRnet',664,'Discusses information about and the author\'s experience with the Secret Internet Protocol Routing Network (SIPRNET) used by the US Defense Department.','','N',10,'',2.000,0),(454,41,'ANI2 - The Adventure Continues',665,'Discusses a new feature call Automatic Number Identification II (ANI II) of the Automatic Number Announcement Circuit (ANAC) tool.','','N',12,'',3.000,0),(455,41,'Eggdropping',666,'Discusses Internet Relay Chat (IRC) and the use of an \"eggdrop\" bot to protect a channel.','Includes TCL code to change a BOT\'s ident and op commands.','A',15,'',5.000,0),(456,41,'Naming Exchanges',667,'Discusses the Telephone Exchange Name Project, a web page maintained by Robert Crowe.','','N',20,'',1.500,484),(457,41,'Hack the Hardware',668,'Discusses other devices such as hubs, printers, etc. on the Internet/network that are just as interesting as computers to hack on.','','N',22,'',1.000,0),(458,41,'Day of the Office Assault',669,'Discusses a prank played on a fellow technical support person by the author using a Power Basic 3.0 program.','','A',24,'',1.000,0),(459,41,'Defeating Cyberpatrol',132,'Discusses how to remove the CyberPatrol software from a Win95 computer system.','','N',25,'',0.500,0),(460,41,'CGI Flaws',621,'Discusses several security threats and flaws when using the Common Gateway Interface (CGI).','','N',26,'',2.000,0),(461,41,'A Brief History of Postal Hacking',670,'Discusses Phacking (postal hacking) and presents a brief history of hacking the US postal system.','','N',28,'',2.000,0),(462,41,'Hacking a BBS with DOS',671,'Discusses several methods of getting a target to install software you\'ve modified, example Microsoft DOS batch commands that may be useful.','','N',40,'',4.000,0),(463,41,'How To Get the Better of Best Buy',672,'Discusses information concerning Best Buy\'s phone system/procedures by an ex-employee.','','N',44,'',1.000,0),(464,41,'Setting Up UNIX Trapdoors',674,'Discusses several methods to set up hidden ways to enter a computer system and gain root privileges over and over, typically called a trapdoor or hidden backdoor.','','N',46,'',2.000,0),(465,41,'NOT A SECRET',675,'Discusses a message (printed in it\'s entirety) from Space and Naval Warfare Systems Command about issues with the military\'s new cryptography package.','','N',54,'',2.000,0),(466,41,'News Update',346,'Discusses several current news items.','In Best of 2600 twice, page 434 has two items and page 486 has three items of the 11 items in the original article.','N',56,'News Items',2.000,434),(467,42,'Lies',2,'Discusses several media articles that misrepresent hackers (one being later found out to be a complete fabrication) and details of the Takedown script (an upcoming movie about Kevin Mitnick).','','N',4,'',4.000,247),(468,42,'Where Long Distance Charges Come From',7,'Discusses how long distance phone call charges are calculated, includes a glossary of terminology.','','N',6,'',2.000,487),(469,42,'Facts About Cablemodems',649,'Discusses how cable companies are modifying their systems so they can provide Internet connectivity and provides information on how it works.','','N',8,'Facts About Cable Modems',3.000,0),(470,42,'What is ICA?',650,'Discusses Independent Computing Architecture (ICA), a protocol developed by Citrix Systems, Inc. that is used to connect thin clients to servers.','','N',12,'',2.000,0),(471,42,'A Newbie Guide to NT4.0',651,'Discusses a tool to gain administrator access on a Windows NT 4.0 Workstation system and what the author did with the access on his school\'s network.','','N',14,'',2.000,0),(472,42,'Build a Modem Diverter',652,'Discusses how to build a basic modem diverter - a piece of hardware that diverts an incoming signal on a phone line to another line.','','N',16,'',2.000,0),(473,42,'The Tyranny of Project LUCID',653,'Discusses project LUCID - a computer network being designed to complement and enhance the international justice system.','','N',18,'LUCID',2.000,0),(474,42,'Hacking Lasertag',616,'Discusses information about customizing a game of LaserTag by accessing the LaserStorm computer.','','N',20,'',1.330,0),(475,42,'Fun With Java',178,'Discusses a method of embedding Java applets into Yahoo mail email so the code runs faster on Yahoo\'s servers.','','N',23,'',1.000,0),(476,42,'Millenium Payphones',654,'Discusses information about the Millenium payphone by Nortel Telecom, a new technically advanced payphone being installed in Canada.','','N',26,'The Millenium Payphone',1.000,0),(477,42,'How To Hack Your ISP',655,'Discusses the gaping security holes at the author\'s ISP in the hope that the security staff will fix them.','','N',27,'',1.000,0),(478,42,'Gameguru Hacking',656,'Discusses how to bypass the disk copy protection scheme of Game Guru by Studio 3DO.','','N',28,'How To Hack Game Guru',2.000,0),(479,42,'Fingerpainting at the Precinct',657,'Discusses information about the Identix fingerprinting system for law enforcement, from the author\'s personal experience as a guest of the NYPD.','','N',40,'',2.000,0),(480,42,'Inter-tel Phone Systems',658,'Discusses information about Inter-Tel Technologies phone and digital PBX systems including the AXXESS and AXXENT.','','N',42,'',2.000,0),(481,42,'Security Through \'Secure\'',659,'Discusses a c program the monitors memory and CPU usage on all programs retrieved from ps aux, written and tested on Linux.','','A',44,'secure.c',2.000,0),(482,42,'Tips on Generating Fake ID',660,'Discusses fake id\'s including disclaimer and legalities, making it yourself, how to make it, purchasing, and using the ID.','','N',46,'',2.000,0),(483,42,'More on DSN',661,'Discusses the Defense Switched Network (DSN), an unsecured automatic phone system serving the US military and related government agencies around the world.','DRSN BBS - telnet to drsnbbs.ncr.disa.mil.','N',56,'',1.500,0),(484,43,'Progress',2,'Discusses the financial challenges for 2600 over the past year and the ongoing Kevin Mitnick saga (including the New York Times web page hack).','In Best of 2600 book twice the first part on page 254 and the second part on page 565.','N',4,'',3.000,254),(485,43,'Homemade TCP Packets',600,'Discusses a perl script called lego that is a demo tcp spoofer based on slapfro.','','A',6,'',4.000,0),(486,43,'Socket Programming',619,'Discusses a c program for a simple portscanner that will also demonstrate basic TCP/IP and get those interested started in socket programming.','See follow up article in Spring 1999 issue. (..)','N',10,'Socket Programming For Fun and Profit',3.000,0),(487,43,'Blasting Sound',577,'Discusses a C shell script that will use send_sound to annoy/amuse people on your local network.','','N',13,'',1.000,0),(488,43,'Back Orifice Tutorial',595,'Discusses the recently released Back Orifice (by CdC) and explains it\'s uses, how it works and how to prevent it from attacking you.','','N',14,'',2.000,294),(489,43,'How To Probe A Remote Network',640,'Discusses the process the author used in exploring a remote network and eventually gaining root access.','Title is \'Probing Remote Networks\' on page.','N',16,'Probing Remote Networks',2.000,0),(490,43,'Hack Your Console',641,'Discusses back-up devices for the Nintendo64 including uses, the different types and where they can be obtained with approximate costs.','','N',18,'',2.000,0),(491,43,'Cushioned Encryption and Deniability',642,'Discusses a method of encrypting a file so that different keys may be used to decrypt different sensible plaintexts, making it possible to reveal a key law enforcement without comprising your sensitive data.\r\n','','N',20,'',3.000,0),(492,43,'The Backyard Phreaker',643,'Discusses some things you can do with and some tools you may need to play with your local neighborhood telco box.','','N',23,'',1.000,0),(493,43,'Expanding Caller ID Storage',644,'Discusses a simple method of changing the memory capacity for the CIDCO model PA Caller-ID box.','See also \'Hacking Caller ID Boxes\' in 15:3. (..)','N',24,'',1.000,0),(494,43,'CLLI Codes Explained',645,'Discusses and explains the construction of Common Language Location Identification (CLLI) Codes.','','N',25,'',1.000,0),(495,43,'Hacking Resnet',318,'Discusses the residence hall network (RESNET) - an approach used by many universities for networking dorm rooms.','','N',26,'',4.000,0),(496,43,'Screwing With Blockbuster',531,'Discusses information concerning operations at a Blockbuster Video franchise or corporate store, written by an employee.','','N',40,'Screwing With Blockbuster Video',2.000,0),(497,43,'Screwing With Moviefone',646,'Discusses information about MovieFone (MOFN) a publicly traded company that lets you purchase movie tickets with your credit card via phone or web site.','','N',42,'',1.500,0),(498,43,'Screwing With Radio Shack & Compaq',647,'Discusses information about Radio Shack\'s switch from selling IBM computers to Compaq computers and bypassing restrictions on the demo machines.','','N',44,'Screwing With Radio Shack and Compaq',2.000,0),(499,43,'Trunking Communications Monitoring',593,'Discusses trunked radio systems - which allot multiple users to all available channels/frequencies through a series of user programmed controls.','See 2nd article 16:3. (..)','N',46,'',2.000,362),(500,43,'More on SIPRnet',648,'Discusses details of SIPRnet (Secret IP Routing Network) - a defense network that connects subnets and individual hosts that are classified at the secret level.','References article by Ruiner.','N',54,'',1.000,0),(501,44,'The Victor Spoiled',2,'Discusses the recent phenomenon of \"reformed\" hackers being hired by corporate America, includes a Kevin Mitnick update.','Page 546 in Best of 2600 book has section titled Mitnick Update on page 5.','N',4,'',2.000,268),(502,44,'A Touch Memory Primer',624,'Discusses details of the Dallas Semiconductor iButton Touch Memory devices used as a replacement for smart cards, barcodes, magnetic stripes and RF tags.','','N',6,'Touch Memory Primer',6.000,0),(503,44,'The Facts of SSN',625,'Discusses information about and details of the social security number (SSN) used by the U.S. government.','I can offer proof of the last four digits being assigned in order - me and my siblings SSN\'s were applied for all at once and the last four digits are in sequence.','N',12,'',2.000,0),(504,44,'VMS\'pionage',626,'Discusses a few ways to exploit a system running OpenWMS and a MultiNet server (or a server similar to MultiNet).','','N',14,'A Guide To VMS\'pionage',3.000,0),(505,44,'Samba: Lion King or Software Suite?',627,'Discusses the basic elements of the Samba suite and the Server Message Block (SMB) protocol.',NULL,'N',17,'',1.000,0),(506,44,'Copper Pair Color Coding',628,'Discusses phone cable wiring and how the wires are color coded so you can determine which go together and which ones are the ring and tip.','','N',18,'',1.500,0),(507,44,'A Security Hole at S-CWIS',629,'Discusses a security flaw in the Student Campus Wide Information Service at the University of Nebraska at Omaha.','','N',20,'',1.000,0),(508,44,'Pocket Connectivity for Frugal Hackers',630,'Discusses information about and features of the Sharp Zaurus 3500X handheld computer.','','N',21,'',1.000,0),(509,44,'Fun With Netware',631,'Discusses a quick overview of what NetWare is, what is changing, and what the current attacks are that can result in damage and or greater privileges to users.','','N',22,'',2.000,0),(510,44,'Become a Radio Ninja',547,'Discusses amateur radio to hopefully dispel the myths and shed a bit more light on what it is all about.','','N',24,'',2.000,367),(511,44,'Cable Modem Security',632,'Discusses the increasing popularity of cable modems for Internet access and information about how they work.','','N',26,'',3.000,0),(512,44,'How To Handle the Media',633,'Discusses some tips and things to remember when chatting with the public and the media about hackers/hacking.','','N',29,'',0.660,0),(513,44,'800-555 Carriers',634,'Discusses the 800-555 exchange and presents a list of numbers that had a carrier.','','N',29,'',0.330,0),(514,44,'Why Anonymous Phone Cards Aren\'t',346,'Discusses testimony of the FBI relating to the tracing of a telephone debit card found in the possession of Timothy McVeigh.','','N',40,'',4.000,0),(515,44,'The Cryptography of Today',635,'Discusses the author\'s attempt to give a good outline of cryptography and how each and every one of us can use it to our advantage.','','N',44,'',3.000,0),(516,44,'Hacking the Atcom Cyberbooth',636,'Discusses the Atcom Cyberbooth - a booth that has pay for use Internet access - and presents a method which may provide free use.','','N',47,'',1.500,0),(517,44,'Le Firewall',637,'Discusses some information about Checkpoint\'s Firewall-1.3.0b product running on Solaris 2.5.1.','','N',53,'',1.330,0),(518,44,'Midwestern Beige',638,'Discusses phreaking information specifically for the midwest area (appears author is in Illinois).','Titled \'Phreaking in the Midwest\' on the page.','N',54,'Phreaking In The Midwest',0.660,0),(519,44,'How To Hide From Netscape',639,'Discusses a batch file to help you keep your privacy after you have been surfing the Internet with Netscape.','','N',55,'',1.000,0),(520,45,'The Big Time',2,'Discusses President Clinton\'s January 22, 1999 speech (see quote), what it may mean to hackers and what the hacker community should do about it.','','N',4,'Big Time',2.000,258),(521,45,'Tracking Your Vehicles with AVI & ETTM',615,'Discusses Intelligent Transportation Systems (ITS) and details of the Electronic Tolls and Traffic Management (ETTM) and the Automatic Vehicle Identification (AVI) systems.','','N',6,'',5.000,0),(522,45,'Cracking the Time-Banc System',616,'Discusses details of the Time-Banc \"Phoenix\" unit by Westview Instruments, a computer based time clock system for small to mid-sized companies.','','N',11,'Cracking the Time-Banc',1.500,0),(523,45,'A Retail Target',617,'Discusses details of the computer terminals, Laser Radio Terminals (LRT) and phone system at Target.','','N',12,'',1.500,0),(524,45,'Wreaking Havoc with Netbus',618,'Discusses NetBus v1.6 remote control software including how it works, commands, detection/removal and use.','','N',13,'',2.000,0),(525,45,'More Socket Programming for Fun/Profit',619,'Discusses a c program that creates a simple Windows95 netbios nuker and demonstrates basic TCP/IP programming.','References previous article in Fall 1998 issue. (..)','A',15,'More Socket Programming for Fun and Profit',5.000,0),(526,45,'Internet Peering',7,'Discusses the structure of the Internet, including the backbone, POPs (Points of Presence), NAPs (Network Access Point) and MAEs (Metropolitan Area Exchanges).','','N',20,'',2.330,302),(527,45,'Fun with Tripwire',82,'Discusses the Tripwire intrusion detection software, it\'s history, typical usage and places where a hacker could interfere with it.','','N',22,'',1.330,0),(528,45,'A Hacker\'s Guide to Getting Busted',620,'Discusses the basic law/legal rights so that every hacker has at least some understanding of how criminal law works and what they can expect if officers come tapping at their door.','','N',24,'',5.500,0),(529,45,'An Overview of SS7',621,'Discusses details and information about Signaling System Seven (SS7) - a Ma Bell out of band signaling technology.','','N',40,'SS7 Explained',4.000,0),(530,45,'Network Scanning with NMAP',622,'Discusses information about and usage of NMAP, the network scanner.','References lego program by Miff in 15:3 and Armageddon article in same issue.','N',44,'',3.500,0),(531,45,'News Update',346,'Discusses several current news items.','','N',52,'News Items',3.000,0),(532,45,'Hacking a Sony Playstation',623,'Discusses modifying your Sony Playstation (PSX) with the addition of a \"mod\" or \"pic\" chip so you can play backed up or import games.','','N',55,'',1.000,0),(533,46,'A Culmination of Efforts',2,'Discusses the Kevin Mitnick case including details of the plea agreement he was virtually forced to accept.','','N',4,'',2.000,547),(534,46,'Securing Your Linux Box',600,'Discusses practical ways to secure your Linux box including info on post installation, test attacking yourself, system modifications and monitoring/logging.','','N',6,'',3.000,0),(535,46,'More on SIPRNet',601,'Discusses some details of the Secret IP Routing Network (SIPRnet) used by the U.S. Air Force.','','N',9,'',1.000,0),(536,46,'Hacking AS/400',602,'Discusses the IBM AS/400 mainframe including pre-set user IDs, default password policy and some useful commands.','','N',10,'',2.000,0),(537,46,'Fun at Costco',603,'Discusses the basics of hacking Costco\'s AS/400 terminals, used for everything from adding new members to tracking inventory and inter-store e-mail.','','N',12,'',2.000,0),(538,46,'Brute Forcing Tracer',604,'Lists the c source code for a brute forcer for Tracer the unit control hardware found at best buy, k-mart, wal-mart, etc.','','A',14,'A Brute Forcer For Tracer',2.000,0),(539,46,'Broad Band via the Earth',605,'Discusses the possibility of using good old mother earth as a huge conduit for data streams.','','N',16,'',2.250,0),(540,46,'Secrets of Copy Protection',606,'Discusses the two main types of software protection locks commonly used : hardware and software, including theoretical ways to beat them.','','N',18,'',2.000,0),(541,46,'How Parents Spy on Their Children',607,'Discusses the One Tough Computer Cop software which claims to monitor your kids computer by searching files by type and text word lists.','','N',20,'',8.000,0),(542,46,'The Future of IPV6',608,'Discusses IPv6 which is the next generation IP (Internet Protocol) that will replace the current version IPv4.','Article incorrectly states 4 million addresses for IPv4 when it should be billion.','N',28,'',1.000,0),(543,46,'How To Keep Parents From Spying',609,'Discusses several methods of keeping prying parents out of your personal stuff.','','N',40,'',1.330,0),(544,46,'Food For Your Brain',610,'Discusses several methods for finding information about people on line, starting with someone on IRC.','','N',41,'',3.000,0),(545,46,'Adventures With Neighborhood Gates',611,'Discusses a little about security gates found on gated communities, office buildings, etc. and what can be done with them.','','N',44,'',1.000,419),(546,46,'Internal Hacking',612,'Discusses the insider threat that needs to be considered in corporate network security using a hypothetical scenario.','','N',45,'',1.000,0),(547,46,'Batch vs. Interactive',234,'Discusses the differences between batch and interactive computer systems and how they are used.','','N',46,'',1.660,0),(548,46,'Manipulating the Aspect',613,'Discusses the call center (basically a PBX) built by Aspect, a manufacturer of Automatic Call Distribution (ACD) Systems.','','N',52,'',2.000,0),(549,46,'Pushbutton Lock Hacking',614,'Discusses messing around with the Benton brand of T2 pushbutton locks (models DL2700 and DL2750).','','N',54,'',1.750,0),(550,47,'Slow Motion',2,'Discusses information and details about Kevin Mitnick\'s case and the current status.','','N',5,'',3.000,0),(551,47,'Upload Bombing',586,'Discusses a new type of attack the author has named \"upload bombing\" that repeatedly attempts to send file data to a web server.','','A',6,'',6.000,0),(552,47,'The Guide to Thorough Killing',587,'Discusses the fact that getting rid of all traces of a file is far more complex than you could have imagined, proposes solutions.','Title \'Killing a File\' is different from index.','N',12,'Killing a File',2.000,285),(553,47,'The Terrorist of Orange, Texas',588,'Discusses the author\'s experience in high school with authoritarian officials.','','N',14,'',1.000,0),(554,47,'ITS Prison Phones',589,'Discusses details of the Inmate Telephone System (ITS) and the author\'s unsuccessful attempts to beat it.','','N',15,'',1.000,0),(555,47,'Infiltrating Mediaone',590,'Discusses the author\'s MediaOne Express service experience and what the default email account password is.','','N',16,'Infiltrating Media One',0.750,0),(556,47,'Palmpilot\'s Canadian Red Box',591,'Discusses how the PalmPilot by 3Com can function as a Red Box.','','A',16,'',0.250,0),(557,47,'Forging Ping Packets',592,'Discusses a c program to forge Ethernet packets via ICMP echo requests.','Program has been tested on BSD systems.','A',17,'',4.000,0),(558,47,'Trunking Communications Monitoring 2',593,'Discusses listening in on the airwaves and finding a great many interesting things.','Recommends \'Challenges in IDing Trunked Radio Systems\' in Dec 1998 issue of Monitoring Times. See previous article in 15:3. (..)','N',20,'Trunking Communications Monitoring Part 2',2.000,0),(559,47,'Internet Radio',594,'Discusses information concerning the new phenomenon of Internet radio stations, whose benefits include a broader audience and no FCC regulation.','','N',22,'Internet Radio Stations',1.000,306),(560,47,'Quantum Hacking',595,'Discusses information about quantum computers and an open source Linux project to build a quantum computer simulator.','','N',24,'',1.330,287),(561,47,'Protel COCOTS',596,'Discusses investigating Protel COCOTs (customer-owned coin-operated telephones) and provides useful info for anyone interested in hacking/phreaking them.','','N',26,'',1.000,0),(562,47,'Unauthorized Disney Fun',597,'Discusses the author\'s attempts to hack computers at Disney Worlds\' Innovations at Epcot.','Page 28 has another article \'More Disney Fun\' on it. (..)','N',28,'Assorted Disney Fun',0.660,0),(563,47,'An Overview of Cellemetry',563,'Discusses Cellemetry, which is a wireless telemetry technology designed to monitor, control and track devices.','','N',40,'',1.500,435),(564,47,'Solaris x86 for Plants',547,'Discusses the installation, adding basic functionality and elementary security issues surrounding Solaris x86.','','N',42,'',5.000,0),(565,47,'Eleetisms',599,'Discusses the occasional use of k-leet characters in communication or hacked works of art by the hacker community.','','N',55,'31337-isms',1.000,0),(566,48,'Violence, Vandals, Victims',2,'Discusses how we\'re being enslaved by the corporate agenda and media control but how events in Seattle show an alternative Internet based media can get the true story out.','','N',5,'',2.000,566),(567,48,'Accessing Forbidden NTFS Drives',572,'Discusses a method of circumventing Windows NT security (requires physical access to the machine).','','N',6,'',1.000,0),(568,48,'Security Throught NT? Not Likely',573,'Discusses Windows NT and some of the skills and techniques required to hack it, including several useful utilities for your toolbox.','','N',7,'',3.000,0),(569,48,'Countermeasures Revisited',574,'Discusses telephone counter-surveillance and tools and methods for helping to determine if you phone line is being tapped.','','N',10,'',1.660,0),(570,48,'DATUs - The Tool of the New Age Phreak',575,'Discusses extensive details and functions of the Harris Direct Access Test Unit Remote Terminal.','','N',12,'',6.000,0),(571,48,'Messing With Staples',576,'Discusses the technology and security at Staples, written by an ex-employee.','','N',18,'',2.000,0),(572,48,'I Own Your Car!',577,'Discusses features of a prototype car the author gained access to.','','N',20,'',2.330,0),(573,48,'Telcobabble',578,'Discusses the purpose and terminology pertaining to telephony cabling.','References \"Copper Pair Color Coding\" by Catatonic Dismay in 15:4 (..)','N',23,'Telco-Babble',1.000,0),(574,48,'Intro to POCSAG/FLEX Interception',579,'Discusses detailed information about intercepting and decoding pager transmissions.','','N',24,'An Intro to Paging Networks and POCSAG/FLEX Interception',1.750,345),(575,48,'Hack The Media',580,'Discusses the news media and gives advice on how to turn the idiosyncrasies of journalism to your advantage and help reporters present an accurate and positive account.','','N',27,'',3.000,261),(576,48,'How To Create New Urban Legends',581,'Discusses urban legends including common characteristics, presents three urban stories and talks about creating your own.','','N',40,'',2.000,0),(577,48,'Hacking Explorer (the car)',582,'Discusses gaining access to a Ford Explorer with the keypad entry system.','','N',43,'',1.000,0),(578,48,'Netnanny Nonsense',583,'Discusses what the Net Nanny software is and several methods of circumventing it.','','N',44,'Net Nanny Nonsense',1.000,0),(579,48,'Why Redboxing Doesn\'t Work',7,'Discusses redboxing, what it is and how it worked so you can understand why it doesn\'t work in most places anymore.','','N',45,'',1.500,446),(580,48,'Spoofing Call Waiting ID',354,'Discusses how Caller ID on Call Waiting (Call Waiting ID) works and how it is possible to display messages on Caller ID equipment.','','N',46,'',0.500,0),(581,48,'Sprint ION',584,'Discusses information on Sprint\'s new Integrated On-demand Network (ION) technology.','','N',47,'The Sprint Integrated On-demand Network [ION]',1.000,0),(582,48,'Understanding Microsoft Exchange',585,'Discusses Microsoft Exchange Server, an introduction for the curious, how it works and some of its vulnerabilities.','','N',53,'',2.000,0),(583,49,'The Next Chapter',2,'Discusses events (eg. Kevin Mitnick, MPAA lawsuit) of the past five years and reflects on where society is going - and what we are losing along the way.','','N',5,'',4.000,575),(584,49,'A Taste of Freedom',555,'Discusses his time spent in prison, release, conditional freedom, senate testimony and New York visit.','','N',9,'',3.000,586),(585,49,'How to Stay a Sysadmin',374,'Discusses the pitfalls of being technical gurus and makes suggestions on ways to keep your job.','','N',12,'',1.500,0),(586,49,'Military Computer Secrets',288,'Discusses some details of the US Marine Corps and US Navy computer systems.','','N',13,'',0.500,0),(587,49,'Securing Web Sites With ASP',556,'Discusses some techniques that can help make sites more secure and keep information from being seen by the wrong people.','Author\'s experience is with MS IIS, ASP/VB Script and MS SQL.','N',14,'',3.000,0),(588,49,'Still More on Siprnet',557,'Discusses hardware/software details of the network for Siprnet access on board US Navy ships.','References \"More on Siprnet\".','N',17,'',1.000,0),(589,49,'Finding and Exploiting Bugs',558,'Discusses three major points: all systems have bugs in them, how to find bugs in software systems and how to exploit those bugs.','','N',18,'',2.000,0),(590,49,'All About Securid',559,'Discusses an overview of the SecurID technology developed by Security Dynamics.','','N',20,'',2.000,0),(591,49,'Your Internet Birthday',21,'Discusses making up a data of birth (DOB) for Internet sites that request one so it\'s harder to mess with your identity.','','N',24,'',1.000,0),(592,49,'Make Spammers Work For You',561,'Discusses a proposal to fight spam by using it against itself.','','N',25,'',1.000,0),(593,49,'Taking Advantage of Alladvantage',562,'Discusses the All Advantage system that pays you to use the Internet by showing you ads and presents a method to take advantage of it.','','N',26,'Taking Advantage of All Advantage',1.000,0),(594,49,'AT&T\'s Gaping Hole',563,'Discusses a glitch in AT&T Wireless Service that allows a user to receive free phone service.','','N',27,'',1.000,0),(595,49,'Cellular Networks Detailed',564,'Discusses each of the currently available cellular networks and the basic differences between them.','','N',28,'',2.000,0),(596,49,'How PSX Copy Protection Works',565,'Discusses details of the Playstation CD-ROM disc copy protection scheme.','','N',40,'',3.000,0),(597,49,'Fun at Circuit City',566,'Discusses details of Circuit City price tags, in-store telephone extensions and (800) numbers.','','N',43,'',1.000,702),(598,49,'How to Build a Coffee Box',567,'Discusses materials and construction of a \'Coffee\' box which is a combination of a Beige and Brown box.','','N',44,'',2.000,0),(599,49,'The Sprint PCS Network',568,'Discusses information about the Sprint PCS cellular network and the Sanyo SCP-3000 mobile phone.','','N',46,'',1.000,0),(600,49,'How to Get Banned From Your ISP',569,'Discusses several methods and suggestions for activities that could get you disconnected from your ISP.','','N',47,'How to Get Banned From Your Internet Service Provider',1.000,0),(601,49,'Build, Don\'t Buy, Your Next Computer',570,'Discusses why you would want to build your own and suggestions/tips for completing the task.','','N',53,'',2.000,0),(602,49,'How Does That DSS Card Really Work?',571,'Discusses public domain information regarding the DirecTV Digital Satellite Service (DSS) card.','','N',55,'',1.000,0),(603,50,'Madness',2,'Discusses the corporate and government attempts thru legislation and litigation to control the Internet and technology.','','N',5,'',2.000,580),(604,50,'The Art of System Profiling',490,'Discusses system profiling (learning everything you can about a target system) including methods, strategies and tools.','','N',6,'',3.000,0),(605,50,'A Brief Intro to Biometrics',541,'Discusses biometrics, what it is, the categories used today, how they work generally and some of the legal aspects.','','N',9,'',3.000,809),(606,50,'Fun With TDOC',62,'Discusses details of the Tennessee Department of Corrections (TDOC) network and TOMIS system.','','N',12,'',2.330,0),(607,50,'Strange Abuses For Your Home Phone',542,'Discusses the Conairphone model HAC SW8260 and several suggestions for using it\'s 1/8 inch i/o jack.','','N',14,'',0.660,0),(608,50,'More Advantages of Alladvantage',543,'Discusses a couple of methods of shutting off the ads, as well as the whole bar in AllAdvantage and still get paid.','References AllAdvantage article in Spring 2000 issue (..)','N',15,'More Advantages of AllAdvantage',1.000,0),(609,50,'Over The Verizon?',346,'Discusses Verizon\'s attempt to control domain names that are critical of them. Lists the domains they\'ve registered.','','N',16,'',2.000,0),(610,50,'Securing ASP: A Deeper Cut',544,'Discusses expanded details on some of the issues Guinsu glossed over and some alternatives.','References Guinsu\'s article in 17:1. Recommends Richard Harrison\'s ASP/MTC/ADSI Web Security (1999, Prentice Hall) and Alex Homer (et al)\'s ASP 3.0 Programmer\'s Reference (2000 Wrox Press).','N',18,'',3.000,0),(611,50,'Jello Biafra: Hacker Ambassador',545,'Discusses Jello Biafra, former front man for the Dead Kennedys, social activist, and keynote speaker for H2K.','','N',21,'',1.000,0),(612,50,'Hacking The Three Holed Payphone',546,'Discusses the once ubiquitous standard AT&T black pay phone and some of the hacks from that era.','','N',22,'',2.000,652),(613,50,'Packet Analysis and Header Sniffers',547,'Discusses packet capturing and low level IP operation with example source code written in C.','','A',24,'',6.000,0),(614,50,'A Simple Hex Hack',548,'Discusses how to crack Hex Workshop V2.54 by BreakPoint software.','','N',41,'',1.000,0),(615,50,'Secrets of Dell',549,'Discusses Dell computer and technical support details from the author\'s experience working in tech support at Dell.','','N',42,'',1.330,697),(616,50,'How Domains Are Stolen',550,'Discusses a possible method of changing a Network Solutions domain registration.','','N',43,'',0.660,0),(617,50,'Playing With Dominos',551,'Discusses details of the Lotus Notes system used by Dominos Pizza.','','N',44,'',1.000,0),(618,50,'Java Applet Hacking',552,'Discusses a method of determining a password for a Java applet.','','N',45,'',1.000,0),(619,50,'The Privacy Box',553,'Discusses how to build a box that blocks your phone when someone else picks up another phone on the same extension.','Based on the Fuscia Box in Hackers\' Information Report #2.','N',46,' ',2.000,0),(620,50,'A Student\'s Privacy Security Survey',554,'Discusses a survey of the security of private student information at California State University at Chico.','','N',53,'',3.000,0),(621,51,'A Summer of Trials',2,'Discusses the result of the DeCSS trial and the bad publicity received by the MPAA. And the rise of new media not controlled by corporate interests, via the Internet and satellite channel Free Speech TV.','','N',4,'',3.000,587),(622,51,'Kernel Modification Using LKMs',438,'Discusses the mysterious virtue of kernel modification with particular regard toward LKMs (Loadable Kernel Module) and their use in the subject.','','A',6,'',4.000,0),(623,51,'How to Hack Cybertime Software',530,'Discusses what Cybertime is, the coolest way to hack it, and how anyone can get the admin password in no time flat.','','N',10,'',2.000,0),(624,51,'Target Advertising',531,'Discusses some of the historical uses of propaganda and how corporations are using the same techniques in advertising.','','N',13,'Target Advertising!',1.000,0),(625,51,'An Introduction to Sprint ION',7,'Discusses details of Sprint\'s Integrated On-Demand Network (ION) which is an integrated voice and data services network currently available in limited areas.','','N',14,'',2.000,0),(626,51,'The GeoSpatial Revolution',532,'Discusses the basics of Geographic Information Systems (GIS) including what it is, the main software vendors and why it is important to you.','References \"Protecting Personal Privacy in Using Geographic Information Systems\" in Photogrammetric Engineering and Remote Sensing Vol 60 No 9 September and \"We Know Who You Are and We Know Where You Live: The Instrumental Rationality of Geodemographic Systems by Jon Gos Univ of Hawaii.','N',16,'',1.750,0),(627,51,'Anomaly Detection Systems',490,'Discusses Intrusion Detection Systems (IDS) and presents the author\'s version (Anomaly Detection).','See part 2 (Anomaly Detection Systems) in 18:1 (..)','N',18,'',2.000,0),(628,51,'Hunting the Paper Carnivore',533,'Discusses the FBI\'s Carnivore system.','','N',20,'',2.000,0),(629,51,'The Making of a Pseudo Felon',534,'Discusses the author\'s experience being arrested and convicted of a \"hacking\" crime.','','N',23,'The Making of a Pseudo-Felon',3.000,630),(630,51,'Flaws in Outsourced ECommerce Systems',535,'Discusses writing shopping basket software and discovering a potential implementation flaw for any ECommerce systems using third party credit card processing.','','N',26,'',4.000,0),(631,51,'Finding a Target Using DNS Lookups',536,'Discusses what Domain Name Service (DNS) is and several tools for retrieving DNS information.','','N',40,'',2.000,0),(632,51,'Another Way to Defeat URL Filters',537,'Discusses a method of bypassing software that blocks URL access.','','A',43,'',1.000,0),(633,51,'Accessing Federal Court Records',425,'Discusses the information available from the federal court system and the methods of accessing it.','','N',44,'',1.000,0),(634,51,'Zone Scanning',538,'Discusses a method to focus network scanning by using DNS zones.','References \"Net Surfing Techniques\" page 37 in 11:4.','A',45,'',2.000,0),(635,51,'DeCSS in Words',539,'Discusses the decryption of data on a DVD encoded through the CSS (Content Scramble System) algorithm.','','N',53,'',1.000,584),(636,51,'Build a Car Computer',540,'Discusses some ideas for adapting a computer to a car.','','N',54,'',2.000,0),(637,52,'Direction',2,'Discusses events of the year 2000, including Kevin Mitnick, lawsuits/threats of lawsuits, mergers/takeovers and oppressive government.','','N',4,'',2.000,0),(638,52,'Introduction to Snooping Around',517,'Discusses a few tips and tricks for obtaining information about ip\'s along with a brief overview of simple tools to assist you.','','N',6,'',3.000,0),(639,52,'BellSouth\'s Mobitex Network',518,'Discusses the network architecture and protocol of Mobitex and a little bit about how to monitor it.','','N',9,'',1.000,0),(640,52,'An Introduction to Radio Scanning',519,'Discusses RF scanning using a device commonly known as a \"police scanner\", including device recommendations, finding frequencies and signal analysis.','','N',10,'',5.000,0),(641,52,'More Java Fun',520,'Discusses additional tips on gathering information about a Java applet including obtaining source code.','References Xprotocol\'s \"Java Applet Hacking\" in 17:2.','A',15,'',1.000,0),(642,52,'Sub7 - Usage, Prevention, Removal',521,'Discusses the Sub7 (version 2.1) trojan horse in general, how to remove it, how to prevent becoming a victim and how to get the most out of it.','','N',16,'SubSeven - Usage, Prevention, Removal',15.000,0),(643,52,'This Issue\'s Featured Lawsuit Threat',346,'Displays a letter received by Emmanuel Goldstein from General Motors Corporation legal staff.','','N',21,' ',0.500,0),(644,52,'Get Anyone\'s Credit Report For Free',522,'Discusses a method of obtaining a free credit report on someone.','','N',21,'',0.500,0),(645,52,'Microsoft\'s Hook and Sinker',523,'Discusses the Microsoft Certified System Engineer (MCSE) or MCSE+I (Internet) certification programs and what you should know before taking them.','','N',22,'',2.000,0),(646,52,'Hacking an NT Domain from the Desktop',475,'Discusses a method of making yourself a Local Administrator on a Windows NT machine.',NULL,'A',24,'',1.000,0),(647,52,'The DVD Paper Chain',524,'Discusses how DVD\'s are manufactured, from the actual 35mm film down to the encrypted disc.','','N',25,'',1.000,0),(648,52,'Polymorphism Script',525,'Discusses a Perl script to demonstrate polymorphism.','','A',26,'',4.000,0),(649,52,'Confusing ANI and Other Phone Tricks',354,'Discusses how to bypass CLASS services, spoof ANI to AT&T 800 numbers and make free untraceable calls.','','N',40,'',2.000,0),(650,52,'Jury Nullification and The Hacker',526,'Discusses Jury Nullification (or Jury Veto), what it is, some history and what it means to you.','','N',42,'',1.000,0),(651,52,'Cop Proof/Laptops',524,'Discusses details of the PCMobile by CYCOMM computer laptop used by cops in police cars.','','N',43,'Cop Proof Laptops',1.000,0),(652,52,'Radio Shack\'s Newest Giveaway',527,'Discusses the \":CueCat\" by Digital:Convergence - a bar code scanner participating Radio Shacks are giving away.','','N',44,'',1.000,0),(653,52,'Dissecting Shaw\'s Systems',528,'Discusses details of the computer/cashier systems at Shaw\'s (the New England supermarket chain).','','N',45,'',3.000,0),(654,52,'Hacking Free ISPs Using WinDump',529,'Discusses a method of determining the user name and password used by free ISP software.','','N',54,'',2.000,0),(655,53,'Signs of Hope',2,'Discusses the 2600 DeCSS case and how many people are waking up to the true dangers of the DMCA (with several examples).','','N',4,'',2.000,591),(656,53,'Police Searches of Computers',482,'Discusses searching and seizing computers and obtaining electronic evidence in criminal investigations including warrantless searches, warrants, general information and advice.','Author involved in information security and is not a lawyer.','N',6,'',5.000,0),(657,53,'The Future of PKI',451,'Discusses a government system for electronic identification known as Fortezza that is coming out to the public as Smart Cards.','','N',11,'',1.000,0),(658,53,'PHP/CGI Vulnerabilities and Abuses',483,'Discusses several security issues the author encountered while writing a PHP mailing list application.','','N',12,'',2.000,0),(659,53,'Breaking the Windows Script Encoder',484,'Discusses how the Windows Script Encoder works and presents the logic for how a decoder would work (see srcdec link for actual program).','Article originally appeared in the Dutch hacker zine \'t Klaphek.','A',14,'',4.000,0),(660,53,'Liberating Advants Terminals',485,'Discusses two methods of \"liberating\" the Advants Terminals Internet kiosk (which offers Internet access for a fee).','','N',18,'',2.000,0),(661,53,'A Romp Through System Security',486,'Discusses the basics of Unix/Linux computer hardware, software and general common sense security techniques.','With help from Zarium.','N',20,'',4.000,0),(662,53,'Hacking QuickAid Internet Stations',487,'Discusses a method of using the QuickAID Internet station for free.','','N',24,'',1.000,0),(663,53,'The Billboard Liberation Front',346,'Discusses a 11/20/2000 parody news release from the Billboard Liberation Front of San Francisco, USA.','','N',25,'',1.000,0),(664,53,'Computing With The Fabric of Reality',488,'Discusses quantum-based computers and their application for defeating public-key crypto.','aka Sarah Jane Smith.','N',26,'',4.000,0),(665,53,'Secrets of Electronic Shelf Labels',489,'Discusses some details of the electronic shelf labels that display product prices in supermarkets.','References Sam Morse\'s article in 17:4.','N',40,'',2.000,0),(666,53,'Anomaly Detection Systems, Part II',490,'Discusses a couple of different ways to accomplish anomaly detection on large heterogeneous networks cheaply and efficiently.','See part 1 (Anomaly Detection Systems) in 17:3 (..)','N',42,'',2.000,0),(667,53,'The Anna Kournikova Virus',491,'Discusses the author\'s experience with the Anna Kournikova virus.','','N',45,'Strange Love: Or How I Learned to Stop Worrying and Love the Anna Kournikova Virus',1.000,639),(668,53,'Declawing Your :CueCat',492,'Discusses a method of removing the serial number from a :CueCat and decrypting it\'s output.','','N',46,'',1.000,0),(669,53,'Scum',346,'Discusses two companies that send invoice like letters for a business guide to scam companies.','','N',47,'',1.000,0),(670,53,'\'Takedown\' Taken Down',2,'Discusses the movie Takedown (cybertraque) based on the John Markoff book - a grossly inaccurate and unfair portrayal of the Kevin Mitnick story.','','N',53,'',2.500,0),(671,54,'The Broken Wheels of Justice ',2,'Discusses several lawsuits (Ford, Phrack, ShapeShifter) where even if you win in court you lose because of the time, resources and money lost fighting against them.','','N',4,'',2.000,0),(672,54,'What is Carnivore, Really? ',471,'Discusses details of the FBI\'s Carnivore program which uses content wiretap and trap and trace/pen register to snoop on Internet use.','','N',6,'',2.000,0),(673,54,'Extra Polymorphic Worms ',472,'Discusses Java code that modifies it\'s comments, variable/function names and order of execution to bypass signature based virus detection software.','References Winter 2000 article by xdroop.','A',8,'',6.000,0),(674,54,'Everything Your Parents Told You About ESS was a Lie ',438,'Discusses the telephone/ESS (Electronic Switching System) grid including AM/ASM, SS7, FACS, broadband and security. ','','N',14,'',3.000,0),(675,54,'Michigan Memos ',346,'Discusses documents found at Ameritech and Ford offices in Michigan.','','N',17,'',1.000,0),(676,54,'How To Become a Hacker Saint ',473,'Discusses how a hacker can become and official \"saint\" as declared by the Pope.','','N',18,'',2.000,0),(677,54,'Misconceptions About TCP Wrappers ',474,'Discusses misconceptions and hopes to clear up confusion/raise security awareness surrounding TCP Wrappers (hosts.deny/hosts.allow) and ipchains.','','N',20,'',2.500,0),(678,54,'Hacking an NT 4 Domain from the Desktop - Revisited ',475,'Discusses how to gain administrative rights to an NT domain and email the passwords to an anonymous mailbox.','','A',22,'',2.500,0),(679,54,'Popular Myths on Password Authentication ',476,'Discusses security \"experts\" recommended password schemes, some of the problems with them and the probability of brute force approaches.','','N',25,'',2.000,0),(680,54,'Exploring HPUX Password Schemes',480,'Discusses the HPUX 10.x Trusted Systems\' protected password database.','','A',27,'',3.000,0),(681,54,'AOL At School ',477,'Discusses how the author bypassed some of the restrictions imposed by his school\'s aol@school account.','','N',40,'',1.000,0),(682,54,'Fun With Fortres ',479,'Discusses several methods of obtaining the password for the Fortres 101 (computer lockdown software) configuration dialog.','','A',41,'',2.500,0),(683,54,'AT&T At Home ',478,'Discusses the AT&T@Home First Level Tech Support and several security problems that exist with it.','','N',43,'',1.500,0),(684,54,'The New AT&T Network ',354,'Discusses changes to the AT&T network that prevent ANI spoofing but allow a free ANI blocking service.','References authors ANI Spoofing article in 17:4.','N',45,'',1.250,0),(685,54,'Tell Me: Uses and Abuses ',353,'Discusses some of the features of the new Tell Me (800) service.','','N',46,'',1.750,0),(686,54,'Snooping the Stack ',481,'Discusses snooping or footprinting (the process of obtaining information about a target system) from the very basic to the very complex.','','N',53,'',3.000,0),(687,55,'Consequences ',2,'Discusses how the 9/11 tragedy is being used to further repressive legislation. Mentions the Dimtry Sklyarov case and HAL 2001.','','N',4,'',2.000,615),(688,55,'Deconstructing a Fortres',141,'Discusses details of the Fortres 101 version 4 software for Win 9x which is a security layer for restricting access to a computer.','','N',6,'',5.000,0),(689,55,'Passport Hacking ',394,'Discusses in specific detail a security vulnerability in Microsoft Passport.','','A',11,'',3.000,0),(690,55,'How to Decrypt DirecTV ',458,'Discusses how to listen in on the DirecTV broadcasts by hacking DSS (Digital Satellite Service).','','N',14,'',3.330,0),(691,55,'Code Red 2 ',459,'Discusses a means through which a complete list of CodeRed II infected machines could be obtained.','','N',17,'',1.660,0),(692,55,'The Ultimate DRM Hack ',460,'Discusses DRM (Digital Rights Management) and calls for an open protocol to be developed thru the IETF (Internet Engineering Task Force).','','N',19,'Republishing the Rules - The Ultimate DRM Hack',1.330,0),(693,55,'Decloqing Copy Protection ',461,'Discusses using a modified version of cdparanoia to copy CDs protected by SunnComm MediaCloQ 1.0 software.','','A',20,'',2.000,0),(694,55,'Hacking Time ',462,'Discusses time clocks like qqest systems ETC M100 and how to get connected and enter with administrator privileges.','References Jaundice in 16:2.','N',22,'',1.330,0),(695,55,'Myths about TCP Spoofing ',326,'Discusses what TCP spoofing is and it\'s inherent limitations and uses.','Recommends Hack Proofing Your Network from Syngress Books.','N',23,'',1.330,0),(696,55,'Playing with Qwest DSL ',463,'Discusses the Cisco routers that the author found on Quest\'s DSL network and how 80% of them have no password.','','N',25,'',1.000,0),(697,55,'Defeating Intrusion Detection Systems ',464,'Discusses some ideas which will make it possible to perform a portscan on an IDS system without being detected.','','A',26,'',4.000,0),(698,55,'Compromising Internet Appliances ',465,'Discusses the growing tendency to make all devices Internet ready (with examples) and the problems that could ensue.','','N',40,'',1.000,0),(699,55,'An Introduction to ARP Spoofing ',466,'Discusses the subject of ARP (Address Resolution Protocol) spoofing - which is a method of exploiting the interaction of IP and Ethernet protocols.','','N',41,'',3.000,0),(700,55,'Offset Hacking ',467,'Discusses how the author got banned from the Everquest online game from Verant Inc.','','N',44,'Offset Hacking or How I Got Bannded From Everquest',1.250,0),(701,55,'The Invisible Box ',354,'Discusses a device that allows you to pick up an extension phone without lighting the in use light on other phones.','','N',45,'',0.750,0),(702,55,'Bypassing Cisco Router Passwords ',468,'Discusses a method of bypassing the password on Cisco 2500/2600 series routers - requires physical access.','','N',46,'',0.660,0),(703,55,'Hacking Retail Hardware',445,'Discusses POS (Point Of Sale) hardware hacks - the VeriFone PinPad 1000, the Wal*Mart register pin pad and the Axxess Technologies Quick-Scribe.',NULL,'N',46,'',1.000,0),(704,55,'Hacking Kodak Picture Maker ',469,'Discusses how to obtain the print password and the typical setup password for the Kodak Picture Maker system.','','N',47,'',0.330,0),(705,55,'Netjacking for Complete Idiots ',470,'Discusses wireless 802.11 networking - what it is, hardware, software and locating.','','N',53,'',1.660,0),(706,55,'Exploiting Intelligent Peripherals ',353,'Discusses the lack of security on Internet connected intelligent peripherals (like the HP JetDirect) and the potential issues.','','N',54,'',1.330,0),(707,56,'2001-2002',2,'Discusses events in the year 2001 and how freedoms are being eroded and reviews the court cases 2600 has been involved with.','','N',4,'',2.000,594),(708,56,'The Security of the Inferno OS',438,'Discusses the security semantics of Vita Nuova\'s Inferno OS and some means by which they may be circumvented.','See missing source code listings on page 28 in 19:1 (..)','N',6,'',3.000,0),(709,56,'Black Ice Defender - a Personal Firewall',446,'Discusses the interface and details of the Back Ice Defender software firewall (by Internet Security Systems).','','N',9,'',2.250,0),(710,56,'The Future of Enhanced 911',447,'Discusses the FCC mandated Enhanced 911 (E911) including how it works, how it will be implemented and the potential privacy concerns.','','N',11,'',1.750,681),(711,56,'Behind the Scenes on a Web Page',448,'Discusses using the @Guard firewall to investigate what actually is happening when accessing a popular commercial web site.','','N',13,'',4.330,0),(712,56,'Cracking Clever Content',171,'Discusses one method of bypassing the \"Clever Content\" technology by Alchemedia that is supposed to protect web images from being printed, saved or otherwise captured.','','N',17,'',0.660,0),(713,56,'Right Click Suppression',449,'Discusses a javascript function to disable the right click \"Save As...\" feature and a Java program to bypass it.','','A',18,'',2.000,0),(714,56,'Fun with Radio Shack',433,'Discusses the Radio Shack kiosk and methods to freely surf the web and break free of any kiosk restrictions.','References Screamer Chaotix\'s \"Tell Me: Uses and Abuses\" in 18:2.','N',20,'',1.500,704),(715,56,'Building a Floppy Based Router',450,'Discusses building a cheap 386 computer for use as a router so you can hook up multiple computers to your broadband Internet connection.','','N',21,'',0.500,0),(716,56,'Build a Wooden Computer',451,'Discusses plans for building a wooden case for your computer.','','N',22,'',3.000,0),(717,56,'Harnessing the Airwaves',413,'Discusses the basics of pirate radio including the transmitter, power, putting it all together and ideas for not getting caught.','References the ARRL Handbook for Radio Amateurs and the ARRL Antenna Handook.','N',25,'Harnessing the Airwaves - A Primer to Pirate Radio',2.000,758),(718,56,'Secrets of Rogers @Home',36,'Discusses details of Rogers @Home broadband technical support and the modems they use.','','N',27,'',1.000,0),(719,56,'Basics on Answering Machine Hacking',452,'Discusses a generic overview of gaining remote access to answering machines.','','N',28,'',2.000,659),(720,56,'Hacking the Highway',453,'Discusses details of the highway hazard information sign built by ADDCO.','','N',40,'',2.000,0),(721,56,'How to Hack from a Ram Disk',454,'Discusses how to run Windows 9x/ME and Windows/NT/2000/XP from a RAM disk.','','N',42,'',2.000,0),(722,56,'Hacking with Samba',455,'Discusses using the Linux based Samba suite to find and access Windows file shares.','','N',44,'',2.000,0),(723,56,'Fun Facts about Wal-mart',456,'Discusses details of the retail hardware and software at Wal*Mart.','Follow-up to article that appeared in 18:3 entitled \"Hacking Retail Hardware\".','N',46,'',2.000,711),(724,56,'IIS - Far from Unhackable',457,'Discusses how to own an IIS server of your own and how to deface the site.','','N',53,'',1.500,0),(725,56,'Examining Student Databases',353,'Discusses a university \"email station\" that allows unfettered access to information in the student database.','','N',54,'',1.500,602),(726,57,'Time To Care',2,'Discusses current and proposed legislation (including DMCA, CARP, CDA, COPA, DCS-1000, USA Patriot Act, etc) that are wiping away our individual rights.','','N',5,'',1.250,0),(727,57,'Transaction Based Systems',234,'Discusses batch processing transaction systems, how they work and potential vulnerabilities.','','N',6,'',1.250,0),(728,57,'How to Regain Privacy on the Net',427,'Discusses the trail of information your Internet browsing leaves (ie. cookies, web bugs, ip info, etc) and recommends things you can do/programs you can use to limit it.','','N',7,'',3.000,0),(729,57,'Stupid Google Tricks',187,'Discusses using Google as a hacking tool.','','N',10,'',0.750,0),(730,57,'Neat Stuff with Switchboard.com',433,'Discusses information on the Yellow Pages like Switchboard web site.','','N',11,'',0.660,0),(731,57,'Poor Man\'s 3d',434,'Discusses how to create very realistic 3D spectrum analyzer effects using \"3D glasses\" and Winamp\'s AVS studio.','','N',12,'',2.000,812),(732,57,'Appletalk Security Secrets',435,'Discusses potential security holes and what you can do to harden client and servers in AppleTalk networks.','','N',14,'',1.500,0),(733,57,'The Definitive Guide to Phreak Boxes',436,'An attempt at to make the definitive list of all the known \"color boxes\" (ie. blue box, red box, etc) with a brief description of each.','','N',15,'',5.250,0),(734,57,'The Bungee Box',437,'Discusses the modification of a phone handset cord for use as a line cord.','','N',21,'',0.660,0),(735,57,'CampusWide Wide Open',141,'Discusses the CampusWide card access system for colleges (now owned by Blackboard) including software, hardware, infrastructure and a potential exploit.','','N',22,'',4.660,604),(736,57,'Idiocy in the Telcos',21,'Discusses how the local exchange carriers never puts itself in the directory making it difficult or impossible for customers to find them thru directory assistance.','','N',26,'',1.330,655),(737,57,'Creative Cable Modem Configuration',439,'Discusses the way ISPs configure DOCSIS-compliant cable modems and the potential for the user to configure it themselves.','','N',40,'',2.000,0),(738,57,'Fun Password Facts',440,'Discusses some of the limitations of password lists used for brute force password attacks.','Referenced by \'Fun Password Facts Revisited\' in 19:2 (..)','N',42,'',3.500,0),(739,57,'Defeating Network Address Translation',441,'Discusses how the author obtained Internet access from a cybercafe by modifying the admin settings of their Flowpoint router.','','N',45,'',1.000,0),(740,57,'NSI Abuse',442,'Discusses how VeriSign (who owns registrars.com and Network Solutions) breaks its own rules by holding expired domains for however long it wants.','','N',46,'',0.500,0),(741,57,'The Threat of a Lazy Admin',443,'Discusses how the author gained access to a 3Com switch and found other potential vulnerabilities after having DSL installed.','','N',47,'',1.000,0),(742,57,'A Script for the Right Click Suppressed',444,'Discusses a perl script that prints the scripts and image URLs (option to download) of the web page URLs entered.','References \"Right Click Suppression\" by Rob Rohan in 18:4.','A',53,'',1.000,0),(743,57,'Retail Hardware Revisited',445,'Discusses a the compromise of an in store computer at Kmart.','','N',54,'',1.000,714),(744,57,'More Radio Shack Facts',373,'Discusses details of the Microsoft Internet Center computer system installed in Radio Shack stores.','','N',55,'',1.000,0),(745,58,'Fair Use and Abuse',2,'Discusses the reorganization of the FBI and it\'s newly reauthorized KGB style tactics. Updates the DMCA case and the continuing fight for fair use.','','N',4,'',2.000,0),(746,58,'The Comprehensive Guide to 802.11B Wireless Networks',23,'Discusses 802.11b background and basics, packet types, detecting, WEP, SSID, securing and threats with practical examples.','','N',6,'',6.000,733),(747,58,'How to Break Through a Proxy or Firewall',421,'Discusses the reasons and demonstrates various methods to get by most implementations of firewalls/proxies.','','N',12,'',1.250,0),(748,58,'A Nasty NT Bug',422,'Discusses a bug in Windows NT/2000 that causes the system to reset or hang.','','N',13,'',1.000,0),(749,58,'A Look Back',423,'Discusses some the of technologies the author has worked with over the years and how much things have changed.','','N',15,'',1.000,640),(750,58,'Grab That Cache',424,'Discusses a small Perl program to display images in the Netscape browser cache.','','A',16,'',1.000,0),(751,58,'The End of an Era',354,'Discusses the official discontinuation of AT&T sent-paid coin service which means the end of redboxing.','','N',17,'',1.250,0),(752,58,'NCR ATMs - Aurum Ex Machina',141,'Discusses details of the NCR ATM.','','N',18,'',1.750,765),(753,58,'The Afghan Phone System',425,'Discusses the telecommunications infrastructure of Afghanistan.','','N',20,'',1.000,657),(754,58,'Yet Another Way to Defeat URL Filters',426,'Discusses a short Visual C++ program to translate a URL/hostname to the IP address.','References \"Another Way to Defeat URL Filters\" by ASM_dood in 17:3.','A',21,'',1.500,0),(755,58,'Getting Into Cisco Routers',326,'Discusses a method of obtaining admin/root access to a Cisco router.','Recommends \"Hardening Cisco Routers\" by Thomas Akin, O\'Reilly Books.','N',22,'',1.250,0),(756,58,'A New Era of Telecommunications Surveillance',7,'Discusses the governments ongoing efforts to increase telecommunications surveillance capabilities with programs like CALEA and DCS1000 (formerly Carnivore).','','N',23,'A New Era of Telecommunications Surveillance: America in the 21st Century',2.330,683),(757,58,'Web Server Discovery Tool',427,'Discusses a Perl script to discovering all web servers on a network.','','A',26,'',4.000,0),(758,58,'Your Eyes Have Just Been Sold',428,'Discusses ad serving and an overview of how DoubleClick works and it\'s DART technology.','References angelazaharia\'s article \"Behind the Scenes on a Web Page\" in 18:4.','N',40,'',3.330,0),(759,58,'Dumpster Diving: One Man\'s Trash',429,'Discusses the basics of dumpster diving including what it is, why do it, what to wear, rules, the cops and where to dive.','','N',43,'',3.500,0),(760,58,'Mind Tricks',430,'Discusses how easy it is to make people do and think what you want.','','N',47,'',0.750,0),(761,58,'Review: Hacker Culture',431,'Discusses the book \"Hacker Culture\" by Douglas Thomas, published by University of Minnesota Press.','','N',53,'',1.000,0),(762,58,'CBDTPA: Yet Another Privacy Concern',402,'Discusses the details of the Consumer Broadband and Digital Television Promotion Act (S 2048 IS).','','N',54,'',1.330,0),(763,58,'Null Sessions and Enumeration',432,'Discusses what null sessions are and how to enumerate them on Windows computer systems.','','N',55,'',0.660,0),(764,59,'Freedom\'s Biggest Enemy',2,'Discusses how the mass media amplifies the governments agenda of security thru control and how the hacker quest for knowledge and lack of group think naturally opposes it.','','N',4,'',1.750,0),(765,59,'Lawfully Authorized Electronic Surveillance',232,'Discusses the Communications Assistance for Law Enforcement Act (CALEA) with details of how it enhances law enforcements abilities to tap communications.','','N',6,'',3.000,0),(766,59,'The Mysterious World of the Lerg',408,'Discusses details of the Local Exchange Routing Guide (LERG).','','N',9,'',2.000,0),(767,59,'Telezapper, Telemarketers, and the TCPA',376,'Discusses how telemarketing work, details of the telezapper device and suggests a method for reducing telemarketing calls for free.','','N',11,'',2.000,0),(768,59,'A Password Grabbing Attempt',36,'Discusses a script and scenario for obtaining a root password on a Linux system.','','A',14,'',2.000,0),(769,59,'Advanced Password Recovery',320,'Discusses details of several password recovery programs available from Elcomsoft.','','N',16,'',1.660,0),(770,59,'Fun Password Facts Revisited',409,'Discusses how password cracking works, suggests better password practices and recommends PasswordSafe to manage them.','References \'Fun Password Facts\' in 19:1 (..)','N',18,'',2.000,0),(771,59,'Hacking on Vacation',410,'Discusses Disney World \"Fast Pass\", Universal Studios \"Universal Express\", restaurant TouchPaks, self-guided tour AntennAudios and the French post office Internet terminals.','','N',20,'',2.000,722),(772,59,'Your Guide to Target',411,'Discusses details of the cash registers and other computer equipment used in Target stores.','','N',22,'',1.000,0),(773,59,'Outsmarting Blockbuster',396,'Discusses a method of having Blockbuster late fees removed.','','N',23,'',1.000,695),(774,59,'The New Card Up DirecTV\'s Sleeve',412,'Discusses the current DirecTV access card swap to the new \"secured\" P4.','','N',25,'',2.330,0),(775,59,'The Pewter Box',413,'Discusses how to make a speaker from a non-working hard disk.','','N',27,'',0.660,0),(776,59,'How to Log URL Request Strings',414,'Discusses a c program to log url requests made by Internet Explorer on Windows.','References \'Behind the Scenes on a Web Page\' article in 18:4 (..)','A',28,'',2.000,0),(777,59,'A History of \'31337SP34K\'',234,'Discusses \"elite speak\" - what it is, where it came from and when (and if) to use it.','','N',40,'',1.500,816),(778,59,'Hardware Broadband Client Monitoring - an Overview',415,'Discusses a rumored DSL provider device that prevents more than one computer from using the service and a possible counter measure.','','N',41,'',1.000,0),(779,59,'How to Set Up a Free (Secure) Web Server at Home Behind Your Cable Modem and Get Away With It',416,'Discusses a method of circumventing an ISP\'s restriction on hosting a web server (uses a Windows machine).','','N',42,'',1.000,0),(780,59,'A Word of Warning from a Caught Uncapper',417,'Discusses the author\'s experience with uncapping his cable modem','','N',43,'',1.660,634),(781,59,'Hacking Electronic Message Centers',418,'Discusses details of the \"electronic message center\" electronic sign.','','N',45,'',2.000,768),(782,59,'Breaking Down the Dynix Door',419,'Discusses the security holes/vulnerabilities in the Dynix library software.','','N',47,'',1.500,0),(783,59,'The Current State of E-commerce Security',420,'Discusses the author\'s search for a vulnerable shopping cart solution and his successful exploitation of it.','','N',53,'',1.500,0),(784,59,'Review: The Art of Deception',2,'Discusses the book \"The Art of Deception\" by Kevin Mitnick and William Simon, published by Wiley Publishing.','','N',54,'',1.500,0),(785,60,'Positivity',2,'Discusses some of the positive and negative things (Mitnick, Elmsoft, TIPS, TIA, Patriot Act etc) that have taken place in the technology world and the continuing need for vigilance and activism.','','N',4,'',2.000,596),(786,60,'Passport Hacking Revisited',394,'Discusses a vulnerability in the Microsoft Passport service.','References \"Passport Hacking\" in 18:3 (..)','N',6,'',1.660,0),(787,60,'Lazy Exchange Admins',389,'Discusses security concerns for servers running Microsoft Exchange.','','N',7,'',1.660,0),(788,60,'Warspying',187,'Discusses setting up a mobile X10 receiver and monitor to view complete strangers\' X10 cameras.','','N',9,'',0.660,0),(789,60,'CD Media Data Destruction',395,'Discusses the efficacy of using a microwave to nuke CDs to destroy the data on them.','References \"How to Hack From a RAM Disk\" in 18:4.','N',10,'',1.500,0),(790,60,'How to Make a DVD Backup',396,'Discusses in detail the steps required to make a backup copy of your legally purchased DVD movies.','','N',12,'',2.250,0),(791,60,'Honeypots: Building the Better Hacker',376,'Discusses how honeypots work, why they are not generally practical and how they break smarter attackers and dumber admins.','','N',15,'',1.500,818),(792,60,'DNS Redirection Stopped',397,'Discusses a method of determining if DNS has redirected a site.','','A',16,'',2.000,0),(793,60,'More on Telemarketing',398,'Discusses the TeleZapper, details of telemarketing computer systems and methods to reduce unwanted phone calls.','','N',18,'',1.500,0),(794,60,'Cracking Voter Fraud',399,'Discusses the discovery of suspected fraudulent voters in New Brunswick, NJ.','Questions/comments email dominick@ramiustech.com with \"2600\" in subject line.','N',20,'',1.500,0),(795,60,'Linux on the Xbox',400,'Discusses a method of running Linux on an Xbox.','','N',21,'',1.500,0),(796,60,'Removing Spyware and Adware',401,'Discusses the increasing problem of removing spyware and adware.','','N',23,'',1.000,0),(797,60,'Exposing the Coinstar Network',402,'Discusses details of the Coinstar machines which accept unrolled, unsorted change and spit out a voucher redeemable for cash.','','N',25,'',1.330,0),(798,60,'A Dumpster Diving Treasure',403,'Discusses the Alteon iSD-100 the author stumbled across on his weekly dive.','','N',26,'',1.250,0),(799,60,'DMCA vs. DMCRA',404,'Discusses the Digital Millennium Copyright Act (DMCA) and the proposed Digital Media Consumers\' Rights Act (DMCRA) to amend DMCA and prevent the corporate abuses that have taken place.','','N',27,'',2.330,0),(800,60,'.ncsc.mil (144.51.x.x)',346,'Lists the ncsc.mil ip addresses.','','N',40,'',6.000,0),(801,60,'A Brief Introduction to Deepfreeze',405,'Discusses details of Deepfreeze a Windows program designed to be a deterrent to hackers, a virus solution and maintenance tool.','','N',46,'',2.000,0),(802,60,'Beating Download Manager Protection',406,'Discusses using packet sniffers to bypass restrictions on using wget to download files.','','N',53,'',1.250,0),(803,60,'DHCP is Your Friend!',407,'Discusses Dynamic Host Configuration Protocol (DHCP) and how it works.','','A',54,'',1.750,0),(804,61,'Not in Our Name',2,'Discusses events surrounding the launch and subsequent DOS (denial of service) attack against the English language version of the Al Jazeera web site.','','N',4,'',2.000,0),(805,61,'ANI and Caller ID Spoofing',354,'Discusses many methods of Caller ID and ANI spoofing that can still be used as of today. Includes a brief FAQ.','','N',6,'',3.000,664),(806,61,'A Hacker Goes to Iraq',493,'Discusses the author\'s plan to go to Iraq and teach about programming and Alan Turing\'s imaginary computer.','Author committed suicide in 2006 ...','N',9,'',1.000,618),(807,61,'Getting Busted - Military Style',494,'Discusses military law, enforcement, court-martial and confinement for the military audience or those thinking of joining (don\'t do it!).','References Agent Steal\'s article \"How to Get Busted by the Feds\" in 14:3 (..)','N',10,'',4.000,619),(808,61,'Unsolicited Mail',346,'Discusses an email sent to an Internet mailing list by the U.S. Navy\'s Surface Warfare Development Group and an interesting piece of spam.','','N',14,'',2.000,0),(809,61,'Anonymous E-mail Using Remailers',448,'Discusses remailers, what they are, their history, types, preparation steps, commands and fields, pgp use and remailer chaining.','','N',16,'',3.500,0),(810,61,'Fun with 802.11b at Kroger\'s',375,'Discusses details of the wireless network used by Kroger grocery stores.','','N',19,'',1.750,700),(811,61,'Best Buy Insecurities',495,'Discusses details of the Best Buy in-store network as accessed thru the \"Build Your Own Computer/Try Out Broadband\" terminals.','','N',21,'',1.750,692),(812,61,'Ripping Movies from DVD to CD-R',310,'Discusses a simple guide to the software and hardware used to make backup copies of your legitimately purchased DVDs.','','N',24,'',2.000,0),(813,61,'XM - The Flawed Future of Radio',141,'Discuss XM radio including an overview, transmission, signal, compression, encryption, activation, exploitation, premium channels and future.','','N',26,'',3.000,753),(814,61,'A First Look at Virgin Mobile',7,'Discusses details of the new Virgin Mobile service in the USA.','','N',40,'',2.000,0),(815,61,'Creating Delay in the New Age',353,'Discusses a method of conferencing phone calls to increase the voice delay.','','N',42,'',1.000,0),(816,61,'Ibuyspy Portal Software',496,'Discusses a serious flaw (and fix) in the IBuySpy Portal software released by Microsoft and Vertigo Software as an example ASP.NET application.','','A',43,'',3.000,0),(817,61,'Defeating salon.com\'s Premium Content',497,'Discusses how to take advantage of the \"one day pass\" offer for salon.com\'s premium content service.','','N',46,'',1.250,0),(818,61,'Fun with Hosting on your Cable/DSL',313,'Discusses additional information for setting up a web server on your cable or DSL service.','References Khoder bin Hakkin article in 19:3 (..)','N',47,'',0.750,0),(819,61,'Keyboard Theory for the New Age Phreak',498,'Discusses the 88 frequencies in HZ for each piano key and how they map to a dial tone.','','N',53,'',1.500,0),(820,61,'A Glimpse at the Future of Computing',499,'Discusses what a government controlled Internet would look like.','','N',54,'',1.500,642),(821,62,'Disrespecting the Law',2,'Discusses how unjust laws are difficult to correct and how people in power often disregard laws and are not held accountable.','','N',4,'',2.000,0),(822,62,'Roll Your Own IIS Intrusion Detection System',381,'Discusses a method of setting up an intrusion detection system for Microsoft\'s IIS 5.x web server on Windows 2000.','','A',6,'',6.000,0),(823,62,'Traversing the Corporate Firewall',382,'Discusses two methods of bypassing the restrictions of a firewall by using SSH and an external server.','','N',12,'',1.000,0),(824,62,'Staying Anonymous in the Information Age',354,'Discusses several scenarios for obtaining personal information about someone and some tips to help protect your information from these scenarios.','','N',14,'',2.000,0),(825,62,'Hardware Key Logging',244,'Discusses the disadvantages/benefits/ethics of hardware keyloggers and how they work, details of a commercial one called KeyKatcher and a bit about building your own.','','N',16,'',2.000,0),(826,62,'Peeling Grapes',203,'Discusses the design of a program to rip content from web sites.','','N',18,'',1.250,0),(827,62,'Microphones, Laptops, and Supertaps',383,'Discusses how computer microphones are everywhere and how they could be used by third party eavesdroppers.','','N',19,'',1.500,0),(828,62,'Optimum Online and You',353,'Discusses some of the onerous terms of service of cable companies (specifically Optimum Online) Internet service.','','N',20,'',2.000,0),(829,62,'Cyber Cafe Software Security',384,'Discusses how to bypass the Tinasoft EasyCafe software.','','N',22,'',1.250,0),(830,62,'A Coupon Trick',385,'Discusses a method of creating a duplicate coupon to increase the discount given.','','N',23,'',0.500,0),(831,62,'Hacking the Look',386,'Discusses several methods of altering the look of Windows 2000 and Windows XP.','','N',24,'',4.000,0),(832,62,'Hosting an FTP Server on Cable/DSL Routers',387,'Discusses a method of setting up an FTP server behind a cable modem/DSL router.','References 19:3 Khoder Bin Hakkin and 20:1 Toby.','N',28,'',1.000,0),(833,62,'McWireless Exposed',388,'Discusses the author\'s findings after playing with the WiFi Internet access offered at McDonald\'s locations.','','N',40,'',2.000,0),(834,62,'802.11b Reception Tricks',389,'Discusses how to build an antenna for better WiFi receiption.','References \"Comprehensive Guide to 802.11b\" in 19:2.','N',42,'',2.500,0),(835,62,'Distributed Reflective Denial of Service Attacks',390,'Discusses a very recent iteration of the DoS attack called the Distributed Reflective DoS attack.','','N',44,'',1.500,0),(836,62,'Fun with the Nokia 3360/3361',391,'Discusses how to change the alpha tag and network settings on the Nokia 3360 and 3361.','','N',46,'',1.330,0),(837,62,'Why Redboxing Still Works (sorta)',392,'Discusses the author\'s attempt at redboxing and how it still sorta worked.','','N',47,'',0.660,0),(838,62,'Xploiting XP',393,'Discusses a method of creating copies of Windows XP Professional that act just like the genuine article.','','N',53,'',3.000,0),(839,63,'Feeding the Frenzy',2,'Discusses how the U.S. has become paranoid, sees threats in every shadow, exaggerates/sensationalizes the potential harm and places the blame on the hackers/terrorists instead of the inadequate security practices.','','N',4,'',1.750,662),(840,63,'Getting to Know Your Neighbors',365,'Discusses the tools and tactics that can be used to protect your WiFi network from invaders by describing some of the methods used.','','N',6,'',2.660,739),(841,63,'Servers on a Ghetto ISP',366,'Discusses the ports Cox Communications blocks and how to circumvent this to run a web server and an email server.','References \"Fun With Hosting On Your Cable/DSL\" by Toby in 20:1 (..)','N',9,'',1.660,0),(842,63,'More Methods for Hosting FTP on Broadband',237,'Discusses a method of setting up an FTP server behind a broadband router (ISP) and suggests several alternative options.','References \"Fun with Hosting on your Cable/DSL\" in 20:1 (..)','N',10,'',1.330,0),(843,63,'Hacking the Look: Revisited',367,'Discusses more details of desktop customization in Windows by changing the default shell.','References ZenLogic\'s \"Hacking the Look\" in 20:2.','N',12,'',2.000,0),(844,63,'Case Mods Made Easy',368,'Discusses some of the methods, tools and sources that can be used for modding computer cases.','','N',14,'',2.000,0),(845,63,'DVDs on a Pocket PC',369,'Discusses how to put a DVD movie on a Pocket PC 2002 system.','','N',16,'',1.660,0),(846,63,'More Xbox Fun and Mischief',295,'Discusses several modifications you can make to your Microsoft Xbox video game console.','','N',17,'',2.500,0),(847,63,'Shopping for a Security Flaw? Try Retail',370,'Discusses retail store computer systems and how they often have modems for tech support that are very vulnerable.','','N',20,'',1.000,0),(848,63,'Troubling Target',371,'Discusses the Symbol 6800 PDT (portable data terminal)/LRT (laser radio terminal), a barcode scanner used at Target stores.','','N',21,'',1.330,0),(849,63,'Blockbuster Tricks',372,'Discusses a method of not returning rentals from Blockbuster Video stores (another name for this is stealing).','References article in 19:3.','N',22,'',1.250,0),(850,63,'Webhacking with CVS',358,'Discusses how using CVS (concurrent versions system) to manage web content can leave your web server vulnerable.','','N',23,'',1.660,0),(851,63,'Basics of Cellular Number Portability',373,'Discusses the basics and then some of the more technical issues of number portability.','','N',25,'',1.000,0),(852,63,'The Hacker Diet',374,'Discusses diet hints and tips (including several recipes) for hackers.','','N',26,'',1.330,0),(853,63,'Feather.c',375,'Presents a program to preserve a program\'s atime and mtime after executing.','','A',27,'',2.330,0),(854,63,'Denial of Service Attacks, Tools of the Tools',376,'Discusses DoS attacks including the types, tools and distributed (DDoS) and local attacks.','','N',40,'',2.000,0),(855,63,'Frequency Theory for the Phone Hacker/Musician',158,'Discusses the dial tone frequencies and harmonics of phone switch circuitry.','Reference to autocode\'s article in 20:1.','N',42,'',1.000,0),(856,63,'A Trip Down Memory Lane',377,'Discusses the tenth anniversary of the Mosaic web browser and reminisces about the early days of the Internet.','','N',43,'',1.000,0),(857,63,'Finding Ogg - Audio Evangelism',378,'Discusses the history of MP3, it\'s increasing use of DRM (digital rights management) and an alternative audio format called Ogg Vorbis (or just Ogg).','','N',44,'',2.000,0),(858,63,'Infidelity in the Information Age',379,'Discusses some of the digital footprints left behind on a computer and the amount of information that can be determined from it.','','N',46,'Infidelity in the Information Age: How I Caught My Cheating Girlfriend',1.500,637),(859,63,'The Threat of Biometrics',380,'Discusses details of a biometric system used by the author\'s school',NULL,'N',53,'',1.000,0),(860,63,'Gentner GSC3000 for Total Morons',219,'Discusses details of the Gentner GSC 3000 Remote Facilities Management device used by many local radio stations.','Gentner Technical Support 800-283-5936','N',54,'',1.660,0),(861,64,'Paranoia vs. Sanity',2,'Discusses the excessive fear of hackers created by the authorities, talks about the use of fear to control people and expresses hope for the future.','','N',4,'',2.000,706),(862,64,'Hacking the Genome',351,'Discusses genetically modified organisms (GMOs) and gives enough information that anyone who could pass a high school biology lab could create a \"transgenic organism\".','','N',6,'',3.330,820),(863,64,'Whom Do You Trust?',352,'Discusses the certificate authority system and how the lack of a secure process at some of these companies could affect your security.','','N',9,'',2.660,0),(864,64,'System Profiling Through RPC',353,'Discusses the Sun RPC (Remote Procedure Call) Portmapper running on port 111 and how it can be used to gain information about a target system or potentially compromise it.','','N',12,'',2.000,0),(865,64,'Robots and Spiders',234,'Discusses search engines and their use of the robots.txt file, it\'s structure and how it protects nothing because it can be ignored.','','A',14,'',2.500,0),(866,64,'Living Without an SSN',354,'Discusses the use and history of the Social Security Number (SSN) and methods for not divulging it.','','N',16,'',2.000,0),(867,64,'More Fun With Wireless Hacking',268,'Discusses several tools for finding and compromising WiFi access points.','','N',18,'',1.000,0),(868,64,'WEP: Not For Me',355,'Discusses the prevalence of WiFi access points and provides a list of default ip address/user name/password for numerous manufacturers/models.','','N',19,'',1.500,0),(869,64,'War Driving with a Pocket PC',356,'Discusses finding WiFi access points with a Pocket PC, mentioning what you\'ll need and the numerous tools available.','','N',21,'',2.000,0),(870,64,'Verizon\'s Call Intercept',357,'Discusses the Call Intercept service offered by Verizon, which prevents callers that do not send any Caller ID information from directly ringing your line.','','N',23,'',2.500,669),(871,64,'Fun With Hping',358,'Discusses the hping tool and some of it\'s useful features.','','N',26,'',2.330,0),(872,64,'Remote Computing Secured',359,'Discusses some of the methods to secure VNC (Virtual Network Computing) using SSH and SSL.','References \"Optimum Online and You\' in 22:2.','N',28,'',1.660,0),(873,64,'DISA, Unix Security, and Reality',360,'Discusses and reviews the Defense Information System Agency\'s Unix Security Technical Implementation Guide (STIG) Version 4, Release 3.','','N',40,'',3.660,0),(874,64,'Hacking the \'Captivate\' Network',361,'Discusses details of the network used by computer screens mounted in elevators in many office buildings.','','N',43,'',0.660,743),(875,64,'Unlocking GSM Handsets',7,'Discusses methods of unlocking GSM mobile phones focusing on the Nokia DCT4 series.','','N',44,'',1.660,0),(876,64,'Unlocking WebLock Pro',362,'Discusses a method of breaking Weblock Pro\'s website protection.','','A',46,'',2.000,0),(877,64,'Holes in Windows 2003 Server',363,'Discusses an issue with the Microsoft Windows 2003 server Setup Manager.','','A',53,'',2.000,0),(878,64,'How to Mess with Citibank Collections',364,'Discusses the Citibank oil card collection centers and advice about talking to them about your account.','','N',55,'',1.000,0),(879,65,'Twenty Years After',2,'Discusses the 20th anniversary of 2600 and recalls some of the history of the magazine.','','N',4,'',2.000,0),(880,65,'Taking Advantage of Physical Access',319,'Discusses a brief lesson on how to hack a computer in a secure organization under certain circumstances.','','N',6,'',1.500,0),(881,65,'Bypassing Minor Website Security',320,'Discusses several tricks some websites use to protect their sites and describes methods of bypassing this limited security.','','A',7,'',1.250,0),(882,65,'Exploiting AIM Screen Name Loggers',321,'Discusses a method using IMChaos loggers to gain admin access to the screen name logger.','','A',10,'',1.500,0),(883,65,'Using Perl to Defeat Provider Restrictions',322,'Discusses a method of updating your hosted website with a link to your personal home web server when your ISP changes your broadband IP address on a regular basis.','','A',11,'',2.500,0),(884,65,'A Simple But Effective Spanner in Your AVS',323,'Discusses a proof of concept program that deletes files and can be used to circumvent anti-virus programs by just removing them.','','A',14,'',4.000,0),(885,65,'Hacking the Hilton',82,'Discusses a method of using the Hilton hotel\'s room Internet access for free.','','N',18,'',1.500,716),(886,65,'Cruise Cracking',324,'Discusses the security of the \"Sail and Sign Card\" used on the Carnival cruise ship Spirit and it\'s Internet cafe.','','N',19,'',1.500,0),(887,65,'A Sprint PCS Trick',140,'Discusses a method of accessing your Sprint PCS voicemail with free Sprint to Sprint minutes.','','N',21,'',0.660,0),(888,65,'Hacking a Mercedes Benz with a Universal Remote',325,'Discusses how to make an archive key for one of the Mercedes Benz keyless entry system.','','N',21,'',0.500,772),(889,65,'The $40 Hardware War Dialer',326,'Discusses a method of creating a cheap hardware war dialer.','','N',22,'',1.330,0),(890,65,'Serial Number Security',327,'Discusses a method of obtaining free hardware using serial numbers obtained from retail stores.','','N',23,'',1.330,0),(891,65,'Barcode Tricks',244,'Discusses a method of purchasing a product with the price of another after reviewing the meaning of the bard and number on the bar code.','','N',25,'',2.000,0),(892,65,'Installing Debian on your Unmodded Xbox',328,'Discusses a method of installing GNU/Linux on an unmodified Xbox.','','N',27,'',3.000,0),(893,65,'Uncapper\'s Paradise',329,'Discusses a method of uncapping a Surboard 2100 cable modem and how to add filters and change a HFC Mac address automatically so you can surf anonymously.','','A',40,'',4.000,0),(894,65,'Inside Adelphia',330,'Discusses the interior of the typical apartment complex cable junction and provides rudimentary guidance on the enclosed hardware.','','N',44,'',1.500,0),(895,65,'Subverting Non-Secure Login Forms',331,'Discusses the Secunia released Internet Explorer vulnerability that allows malicious web sites to spoof what appears in the address bar.','','A',45,'',2.500,0),(896,65,'Setting Your Music Free: iTunes Music Sans DRM',332,'Discusses two methods of removing DRM from iTunes media files.','','N',52,'',1.000,0),(897,65,'Vonage Broadband Security Risk',333,'Discusses security issues with the Vonage broadband phone service.','','N',53,'',0.750,686),(898,65,'Sharing Your Life on a Peer-to-Peer Network',269,'Discusses peer to peer file sharing systems and how naive users often mistakenly share files they shouldn\'t.','','N',53,'',0.750,0),(899,65,'MSN Redirect Scan',234,'Discusses url\'s found with the http://go.msn.com redirect and the proper URL parameters.','','N',55,'',1.000,0),(900,66,'Mirroring the Future',2,'Discusses the explosion of technology since 2600 was founded 20 years ago and how hackers are uniquely positioned to warn people of the potential weaknesses and abuses and to influence the changes that will occur during the next 20 years.','','N',4,'',1.500,0),(901,66,'Scumware, Spyware, Adware, Sneakware',307,'Discusses the \'GAIN/Gator\' and \'Newton Knows Best\' spyware programs, including how, what, removal and fighting back.','','N',6,'',4.500,0),(902,66,'ClearChannel\'s Dirty Little Secret',308,'Discusses operational details of the Critical Mass Media telemarketing division of ClearChannel.','','N',10,'',2.000,0),(903,66,'Impromptu Lock Picks',309,'Discusses how to create lock picking tools out of materials commonly found at home or the office.','Recommends MIT Guide to Lockpicking (search web to find).','N',12,'',2.660,777),(904,66,'Magstripe Interfacing - A Lost Art',141,'Discusses magstripes in detail - a brief history, how to interface, bit stream explained, problems and source code.','Recommends the Nov 1992 Phrack 37 \'Card-O-Rama: Magnetic Stripe Technology and Beyond\' article by Count Zero and the June 1998 \'Interfacing a TTL Magcard Reader to the PC Game port\' by Patrick Gueulle.','A',15,'',5.000,0),(905,66,'Listening Via Linux',310,'Discusses a simple C program that listens on a port you specify, designed as a basic starting point for network programming.','Recommends \'TCP/IP Sockets in C\' by Donahoo & Calvert and \'Linux Socket Programming by Example\' by Warren W. Gay.','A',20,'',2.250,0),(906,66,'Passwords on a Cue Cat',311,'Discusses using a barcode with a Cue Cat to enter a password.','','N',22,'',0.500,0),(907,66,'The Global Date Format',21,'Discusses the ISO-8601 International Date and Time format.','','N',22,'',1.250,0),(908,66,'Behind the Scenes of ITEC and the Milwaukee Bus System',312,'Discusses some details of the Transit TV media/advertising computer systems.','','N',24,'',1.000,0),(909,66,'Omni Locks and Stupid Politics',313,'Discusses some details of the Omni Lock, a popular brand of combination lock for securing doors.',NULL,'N',25,'',1.000,0),(910,66,'A Guide to Internet Piracy',314,'Discusses the various forms of Internet piracy including warez, site traders, fxp, irc and KaZaA kiddies.','IRC: EFnet irc.efnet.net and Rizon irc.rizon.net.','N',26,'',4.000,0),(911,66,'Consumer Spookware vs. Your Castle',315,'Discusses wireless camera and audio devices and how easily they can be planted in various places in your home.','','N',40,'',5.500,0),(912,66,'A Lesson on Trust',316,'Discusses and an computer security incident that took place at the author\'s school.','','N',45,'',2.500,0),(913,66,'Fun With Netcat',317,'Discusses the Swiss Army knife of network utilities - netcat.','','A',52,'',2.000,0),(914,66,'The Lantronix SCS 1620: An Unpublicized Goldmine',318,'Discusses the defaults and specifications of the Lantronix SCS 1620 (a secure console server).','','N',54,'',1.000,0),(915,67,'Learning Curve',2,'Discusses learning, how hacking is all about learning and how it can be dangerous in a restrictive society but that learning is what makes it fun.','','N',4,'',1.750,0),(916,67,'In the Belly of the Beast',292,'Discusses America OnLine (AOL) systems and procedures from a low-level workers perspective including a basic layout of their internal security.','','N',6,'',2.500,0),(917,67,'Anti-Forensics: Make Secrets Stay Secret',293,'Discusses some additional steps to take to protect sensitive encrypted data from forensics analysis.','','N',8,'',1.500,0),(918,67,'Digital CDMA Cloning',294,'Discusses the steps to clone a code division multiple access (CDMA) and/or time division multiple access (TDMA) mobile phone.','','N',10,'',1.750,0),(919,67,'Bit Torrent - The Future of the Internet?',295,'Discusses the bit torrent protocol.','','N',12,'',1.250,0),(920,67,'The Insecurity of PHP Includes',296,'Discusses a method of finding user name/passwords for databases on the Internet.','','A',13,'',1.000,0),(921,67,'Movies on a Phone',297,'Discusses how to get a film viewable on a Nokia 3650 handset, a Microsoft Pocket PC and a Palm Pilot.','','N',14,'',2.750,0),(922,67,'Free Encrypted Backups',298,'Discusses how to use a free email service to store your encrypted back up files.','','A',17,'',1.000,0),(923,67,'Laptop Security',298,'Discusses a method of securing your laptop by being able to track and access it over the Internet should it be stolen.','','A',18,'',3.000,0),(924,67,'Introduction to IPv6',36,'Discusses IPv6 with a basic introduction and the technology behind it.','Recommends IPv6 Essentials by Slyvia Hagen (O\'Reilly ISBN: 0-596-00125-8).','N',21,'',2.330,0),(925,67,'Hacking Soda Machines',299,'Discusses a method of accessing a menu on a soda machine and info on the options available.','','N',23,'',0.660,721),(926,67,'Murphy Oil (Wal-Mart) Fueling Stations',300,'Discusses the hardware, software and potential exploits for the Murphy Oil (gas stations at Wal-Mart and Sam\'s Club) POS (Point Of Sale) system.','','N',24,'',1.500,0),(927,67,'The Big Picture - Linux is Approved!',301,'Discusses the STIG (Security Technical Implementation Guide) and since Linux is in it that means it is approved OS for Federal use.','','N',25,'',1.250,0),(928,67,'How to Hack the Lottery',234,'Discusses the typical state lottery, the logistics, statistics, applications and myths and how they are all stacked against the player.','','N',27,'',3.000,780),(929,67,'The Leightronix TCD/IP',302,'Discusses a vulnerability in the Leightronix TCD/IP software that controls equipment used for scheduling and running programming for television networks.','','N',40,'',3.000,0),(930,67,'Decoding Blockbuster',303,'Discusses vulnerabilities in Blockbuster\'s use of printable barcode coupons.','References article in issue 20:3.','N',43,'',1.000,0),(931,67,'Warwalking in Times Square',285,'Discusses a casual approach to wireless sniffing and access point identification using Ministumbler running on an iPaq 5455 PDA.','','N',44,'',3.000,0),(932,67,'Fight Spam with JavaScript',304,'Discusses a method of preventing email address harvester programs/scripts from obtaining the email addresses on your website.','','A',47,'',1.000,0),(933,67,'fc.exe to the Rescue',305,'Discusses using the Windows file compare program (fc.exe) and a freeware hex editor to remove password protection from an accounting program\'s files. ','','N',52,'',2.250,0),(934,67,'A Simple Solution to Dynamic IP Tracking',306,'Discusses using Lynx and PHP to track the dynamic IP assigned by your ISP.','References TRM\'s \'Using Perl to Defeat Provider Restrictions\' in Spring 2004. Recommends \'PHP and MySQL Web Development\' by Luke Welling and Laura Thomson and O\'Reily\'s \'Linux Server Hacks\' by Rob Flickenger.','A',54,'',1.750,0),(935,68,'Stick Around',2,'Discusses the loss of freedom and privacy and the use of fear to control the public. Discourages apathy and reminds us that resisting these changes is a never ending process that can be won.','','N',4,'',2.000,0),(936,68,'Hacking CDMA PRLs',7,'Discusses Code Division Multiple Access (CDMA), the most popular digital technology used in wireless telecommunications, with extensive details of the Preferred Roaming List (PRL).','','N',6,'',4.250,0),(937,68,'An Old Trick for a New Dog - WiFi and MITM',280,'Discusses a possible man in the middle attack (MITM) that could be applied to an 802.11 WiFi network.','','N',10,'',1.750,744),(938,68,'Vulnerabilities in Subscription Wireless',281,'Discusses the use of a MAC address for controlling access to wireless networks and the lack of security this provides. Describes a method of compromising or attacking these networks. ','','N',12,'',1.750,0),(939,68,'Best Buy\'s Uber Insecurity',282,'Discusses a method of getting full access to computers in Best Buy stores, including possible Internet access.','','N',13,'',0.750,0),(940,68,'Hijacking Auto-Run Programs',96,'Discusses the logic needed for a program to intercept an autorun executable so it gets run at startup. Details Windows OS though the method could be applied to other OS\'s.','','A',14,'Hijacking Auto-Run Programs for Improved Stealth',1.750,0),(941,68,'Catching Credit Card Fraud through Steganography',283,'Discusses a method to insure that tips charged to credit cards haven\'t been changed from what you authorized.','','A',16,'',2.000,0),(942,68,'Ad-Ware: The Art of Removal',284,'Discusses tips, techniques and programs for keeping and/or cleaning your computer system of spyware.','','N',19,'',2.250,0),(943,68,'Tracking Wireless Neighbors',285,'Discusses the author\'s experience with an uninvited visitor on his wireless access point and some of the tools/methods he used to track what the visitor was doing.','References Shiv Polarity article in Fall 2003 issue.','N',20,'',4.000,0),(944,68,'Backdooring the NAT\'ed Network',286,'Discusses a method of creating access to a network behind a NAT router. Details for Windows 2000/XP though concept works for other OS.','','A',25,'',1.000,0),(945,68,'Electronic Warfare',287,'Discusses electronic warfare as practiced in the Army over the last 60 years.','','N',26,'',2.000,0),(946,68,'Grokking for Answers',203,'Discusses information sources for beginners interested in learning more about computer systems.','','N',28,'',1.330,0),(947,68,'Hacking LaGard ComboGard Locks',167,'Discusses details of the LaGard ComboGard Model 33E digital combination lock.','','N',40,'',2.250,0),(948,68,'AVS Spanner Addendum',288,'Discusses rewriting the source code in article \"A Simple But Effective Spanner In Your AVS\" of issue 21:1 that deletes/renames files into C++.','','A',42,'',1.500,0),(949,68,'How to Own Star Search',234,'Discusses a method of gaming the Star Search online voting system.','','A',43,'',3.000,0),(950,68,'Hacking Ticketmaster',189,'Discusses the TicketFast system from TicketMaster which allows customers to print their tickets and a couple of methods to take advantage of it.','','N',46,'',1.330,0),(951,68,'Practical Paranoia',289,'Discusses some aspects of encryption that leave it open to vulnerability.','','N',51,'',1.000,0),(952,68,'Building Cheap ID Cards',290,'Discusses using the :CueCat to scan barcoded cards for use as passwords.','','N',52,'',0.660,0),(953,68,'Hotspot Tunneling',291,'Discusses using an encrypted SSH tunnel to keep your network traffic private on open hotspots.','Check out \"Remote Computing Secured\" by Xphile in 20:4 and \"Traversing the Corporate Firewall\" by superbeast in 20:2.','N',53,'',1.500,0),(954,68,'Selfcheckout or ATM?',263,'Discusses several inherent flaws in selfcheckout systems.','','N',54,'',1.000,0),(955,69,'Enemy of the People',2,'Discusses the legislation and issues being pushed by government in the name of \"security\" and the constant vigilance required to resist it.','','N',4,'',2.000,0),(956,69,'New York City\'s MTA Exposed',266,'Discusses the many of the inner workings of the New York City Transit Authority fare collection system and exposes the contents of MetroCards.','Contribute to the data being collected at the link or: 2600 Metrocard Project, PO Box 752, Middle Island, NY 11953 USA.','N',7,'',6.500,785),(957,69,'Electronic Application Insecurity',267,'Discusses the vulnerabilities of the employment application computers used by JC Penney, Best Buy and Circuit City.','','N',13,'',0.660,720),(958,69,'Baking Cookies',268,'Discusses a few ways that cookies can be exploited.','','A',14,'',0.660,0),(959,69,'Voice Over Internet Protocol',269,'Discusses some details from the VoIP manual of a major cable company that owns AOL and CNN.','','N',15,'',1.000,0),(960,69,'Hacking Cisco IP Phones',270,'Discusses information pertaining to the Cisco 7940 and 7960 IP phones and how they are highly hackable.','','N',17,'',0.250,0),(961,69,'Decrypting WS_FTP.ini Passwords',271,'Discusses how to view a password saved in a WS_FTP.ini file using WSFTP.','','N',18,'',0.500,0),(962,69,'Hunting Wifi Leeches',272,'Discusses a method of finding a Wifi leech and some interesting things you can find out about them thru the network.','Reference: Richard Stevens TCP/IP Illustrated Vol 1 (O\'Reilly), Eric Hall Internet Core Protocols (O\'Reilly), RFC 791 and RFC 793.','N',19,'',1.000,0),(963,69,'Unlocking the Power of WAP',273,'Discusses Wireless Access Protocol and the WAP browser Openwave.','','N',20,'',1.660,747),(964,69,'Backdoor Exits from the US Military',274,'Discusses several methods for getting out of the military using \"entry level separation\" within the first 180 days and clarifies the facts per personal experience.','','N',21,'',1.000,627),(965,69,'Blockbuster\'s Compass - Setting Sail for Port Bureaucracy',275,'Discusses the Blockbuster corporate software for payroll management called Compass by BlueCube.',NULL,'N',22,'',1.000,0),(966,69,'How to Get Out of Google',276,'Discusses a method of keeping your site out of Google\'s listings.','','A',23,'',1.250,0),(967,69,'HP Printers: The Hidden Threat',277,'Discusses network enabled HP printers and some of the vulnerabilities they create.','','N',24,'',1.000,0),(968,69,'Disposable Email Vulnerabilities',234,'Discusses the spam epidemic and describes one solution using temporary email addresses.','','N',25,'',2.250,0),(969,69,'Magnetic Stripe Reading',266,'Discusses the process of making an extremely cheap, simple, and reliable single-track reader for magnetic stripe cards.','','A',28,'',8.000,0),(970,69,'Complete Scumware Removal',278,'Discusses spyware - how to know if you are infected and software programs available to remove it.','References \"Scumware, Spyware, Adware, Sneakware\" in 21:2.','N',50,'',1.250,0),(971,69,'More Fun with Netcat',279,'Discusses several Netcat tricks - web server (banner) discovery, port scanning, ftp and remote command shell.','References \"Fun With Netcat\" in 21:2 (..)','N',51,'',1.500,0),(972,69,'Potential Vulnerabilities in Shared Systems',238,'Discusses potential vulnerabilities with web-hosting services that provide shell access.','','N',53,'',1.000,0),(973,69,'Inside the Emergency Alert System',171,'Discusses the Emergency Alert System, it\'s history, network topology, data format and security.','','N',55,'',1.500,0),(974,69,'IPv6 Redux',36,'Discusses how to configure your network with the IPv6 protocol.','References author\'s previous article \'Introduction to IPv6\' in 21:3 (..)','N',56,'',1.500,0),(975,70,'One Step Forward, Two Steps Back',2,'Discusses privacy, how poorly it is protected and how the government and corporations are misusing personal information.','','N',4,'',2.000,0),(976,70,'Hacking Google AdWords',234,'Discusses the Google AdWords program from setting up an account to creating a campaign, ad groups and keywords, to their lack of customer service and big brother attitude.','','N',7,'',4.500,795),(977,70,'Hacking Google Map\'s Satellite Imagery',252,'Discusses and documents the Google Map\'s URL format.','','A',11,'',1.500,0),(978,70,'Googlejacking by Example',253,'Discusses Googlejacking by walking thru some php code and detailing some tips and tricks.','','A',13,'',1.500,0),(979,70,'Home Depot\'s Lousy Security',54,'Discusses Home Depot\'s gift cards and a method of taking advantage of the poor security.','','N',14,'',0.500,696),(980,70,'SYN-ful Experiment',36,'Discusses the tcp handshake process and describes a program which leaves the port open after the handshake.','','A',15,'',3.750,0),(981,70,'The University of Insecurity',254,'Discusses a security hole in the author\'s university\'s computer system called CatNet.','','N',18,'',1.250,612),(982,70,'Creating AIM Mayhem',216,'Discusses the AOL Instant Messenger service and describes a method to spam a screen name.','','A',20,'',1.000,0),(983,70,'AIM Eavesdropping Hole',255,'Discusses three methods of monitoring one side of an Instant Messenger conversation and the methods to protect against them.','','N',21,'',1.000,0),(984,70,'Network Vigilantism Using Port 113',171,'Discusses the identd network service (which uses port 113) and describes how it has been hijacked by botnets/viruses for IRC communication.','','A',22,'',1.500,0),(985,70,'Hacking Encrypted HTML',175,'Discusses a method to decrypt the html encrypted by three popular software programs.','','A',23,'',1.500,0),(986,70,'Passwords from Windows',256,'Discusses details of the Protected Storage Manager in Windows and describes some utilities for accessing it.','','N',25,'',1.500,0),(987,70,'Data Mining with Perl',257,'Discusses the LWP modules with Perl to acquire data from the web.','Recommends Perl and LWP by Sean M. Burke.','A',26,'',2.000,0),(988,70,'A Yahoo! Restriction Defeated',223,'Discusses how to retrieve pictures in their original size from a user\'s Yahoo page. Similar methods often work with other sites.',NULL,'A',28,'',1.000,0),(989,70,'Spying on the Library',258,'Discusses the Los Angeles Public Library system and describes a method of viewing/altering reservations.','','A',29,'',1.000,0),(990,70,'ParadisePoker.com Blackjack Cracked',259,'Discusses a vulnerability in the blackjack system at ParadisePoker.com that the author exploited and has since been closed.','','N',30,'',1.330,644),(991,70,'Where Have all the Implants Gone?',82,'Discusses how the promises of future technology rarely live up to the reality and how entrenched power molds technology and the public for their own profit. Calls on hackers to deliver the promise of technology.','','N',46,'',2.500,0),(992,70,'Adding Sub-Domain Support to Your Free DotTK Domain',260,'Discusses the use of a PHP script to add sub-domains to your website on DotTK.','','A',48,'',1.500,0),(993,70,'Getting More from T-Mobile',261,'Discusses the T-Mobile computer system employees use called Watson, describes several vulnerabilities.','','N',50,'',2.000,675),(994,70,'Remote Unix Execution Via a Cell Phone',262,'Discusses a method of executing Linux commands from a mobile phone using text messaging.','','A',52,'',1.000,0),(995,70,'NCR: Barcodes to Passwords',263,'Discusses the creating of override barcodes knowing operator numbers and passwords and reversing an existing barcode to operator override number and password.','See article \"Selfcheckout or ATM?\" in 21:4 (..)','N',53,'',0.660,0),(996,70,'Defeating BitPim Restrictions',264,'Discusses a method of circumventing the problem of retrieving more than 20 pictures from the BitPim handset.','','N',54,'',0.660,0),(997,70,'Fun with School ID Numbers',112,'Discusses how simple it was to duplicate a barcode on a student ID card.','','N',54,'',0.660,614),(998,70,'Remote Secrets Revealed',265,'Discusses how to program a Prestige/TDS/Audiovox (APS95BT3/ELVAT5G) remote.','','N',55,'',2.660,773),(999,71,'Questions',2,'Discusses how hackers are inquisitive and how that often conflicts with authority - which doesn\'t like to be questioned.','','N',4,'',1.750,0),(1000,71,'Data Destruction, Covering Your Tracks, and MBSA',233,'Discusses a program that can remove the traces of Internet surfing. Special emphasis on it\'s ability to destroy not just delete these traces.','References \"Complete Scumware Removal\" 22:1 (..), \"Ad-Ware: The Art of Removal\" 21:4 (..) and \"Scumware, Spyware, Adware, Sneakware\" 22:2 (..) for additional info.','N',7,'',2.000,0),(1001,71,'Stupid Webstat Tricks',234,'Discusses web site statistics and the vulnerabilities that exist when exposing these on the Internet.','','N',9,'',2.000,0),(1002,71,'A Randomizing WiFi MAC Address AP Hopper',235,'Discusses a simple method of masking your MAC using Perl and Linux (author runs Slackware).','References \"Hunting Wifi Leeches\" in 22:1 (..)','A',11,'',2.500,0),(1003,71,'Fun with the PRO-83',236,'Discusses hardware modifications that can be made to the Radio Shack PRO-83 scanner.','','N',13,'',2.000,0),(1004,71,'Getting More out of SSH',237,'Discusses using SSH for more than just telnet so that your network traffic can not be understood by sniffers.','','N',15,'',1.500,0),(1005,71,'Using Tor and SSH Tunneling',4,'Discusses the loss of privacy on the Internet and how to reclaim it with Tor.','','N',17,'',2.000,0),(1006,71,'Reverse Remote Access',238,'Discusses a method of getting a remote computer to connect to you instead of remoting into it.','','A',19,'',1.750,0),(1007,71,'Securing a Drive',184,'Discusses how to use the Sentry 2020 program to secure data.','','N',21,'',1.500,0),(1008,71,'Javascript Injection',239,'Discusses the author\'s use of Javascript to get a \"discount\" on a conference registration page.','','A',22,'',1.500,0),(1009,71,'Climbing the SonicWall',55,'Discusses the SonicWall security appliance and how the author broke into it during a pen test.','','N',24,'',1.500,0),(1010,71,'Verizon Fios - Fiber to the Home',240,'Discusses the new Verizon Fiber Optic Service (FiOS).','','N',25,'',1.000,0),(1011,71,'Improving Stealth With Autoruns',241,'Discusses how programs can be run on startup and several ways to find/hide them.','References \"Hijacking Auto-Run Programs\" in 21:4 (..)','N',26,'',1.000,0),(1012,71,'SQL Exploits',242,'Discusses SQL injection attacks and details several examples of potential issues.','References Citron letter page 33/34 in 21:4.','N',27,'',1.500,0),(1013,71,'Hexing the Registry',243,'Discusses a method of editing the system registry in Windows without the registry editor.','','A',29,'',2.750,0),(1014,71,'Not Working at a Call Center',244,'Discusses a method of not working a whole shift by using the phone system.','','N',46,'',1.000,0),(1015,71,'Securing Your Wireless Network',245,'Discusses the insecurity of many wireless networks and recommends using SSH tunneling to protect your data.','','N',47,'',1.330,0),(1016,71,'The Continuing War on Spyware',246,'Discusses several programs useful for spyware detection and removal.','References \"Ad-Ware: The Art of Removal\" in 21:4 (..)','N',48,'',1.000,0),(1017,71,'Hacking Image Shack',247,'Discusses the Image Shack url format and presents a script to download images from the site.','','A',49,'',1.000,0),(1018,71,'I Am Not a Hacker',200,'Discusses media portrayal of hackers and argues that the term hacker is obsolete. ','','N',50,'',0.500,0),(1019,71,'Security Pitfalls for Inexperienced Web Designers',208,'Discusses common security holes introduced by inexperienced web designers.','','N',51,'',1.250,0),(1020,71,'A Peek Inside a Simple ATM Machine',248,'Discusses the Diebold CashSource+100 which is a smaller indoor ATM.','','N',52,'',2.000,0),(1021,71,'How to Get Responses Through Deception',249,'Discusses a method of getting people to respond to emails by making them perplexing.','','N',54,'',1.000,0),(1022,71,'The Ancient Art of Tunneling, Rediscovered',250,'Discusses a method of obtaining free use of many pay-per-use and/or content filtered networks.','','A',55,'',2.000,0),(1023,71,'Forging an Identity',251,'Discusses the two documents required to create a false identity.','','N',57,'',0.660,0),(1024,72,'Preserving the Magic',2,'Discusses the technological advances made in telecommunications and computers and argues that technology is a double edged sword which needs hackers to keep magical, fun and beneficial.','','N',4,'',2.000,0),(1025,72,'Network Administrators: Why We Make Harsh Rules',158,'Discusses the rational behind network rules from a network admin perspective and explains some of the trade offs involved.','','N',7,'',2.250,0),(1026,72,'Practical Web Page Steganography',54,'Discusses steganography, describing what it is and some history behind it along with some possible methods of implementing it with images.','','N',9,'Practical Web Page Steganography: RGB, ISO 8859-1, and 1337sP33K',1.330,0),(1027,72,'Hacking a JP1 Remote Control',218,'Discusses how to hack a remote control thru the JP1 connector.','','N',11,'',1.500,0),(1028,72,'The RedBox DVD Kiosk',219,'Discusses the DVD rental kiosk seen at many McDonalds locations and some potential vulnerabilities.','','N',12,'',1.330,0),(1029,72,'Punking the Watchers',220,'Discusses the author\'s companies\' use of Windows Messenger to track employees and includes a program to subvert the tracking software.','','A',13,'',3.330,0),(1030,72,'How to Track Any UK GSM Mobile Phone',221,'Discusses a method of tracking the location of a mobile phone using the T-Mobile, Orange, 02 and Vodaphone networks in the UK.','','N',17,'How to Track Any UK GSM Mobile Phone (Without the User\'s Consent)',1.000,679),(1031,72,'An Introduction to the Asterisk PBX',8,'Discusses the capabilities of the Asterisk PBX software and how to setup up a server for VoIP (SIP protocol) with it.','','A',18,'',2.000,0),(1032,72,'Spoofing Your Charge Number',222,'Discusses Calling Party Number (CPN) and Automatic Number Identification (ANI) and how you can change the Charge number when spoofing.','','N',20,'',1.330,0),(1033,72,'Phone System Loopholes Using VoIP',223,'Discusses several tricks you can do with VoIP.','','N',21,'',1.660,0),(1034,72,'Physically Accessing Your Apartment with Skype',224,'Discusses a method of using a voicemail message to buzz the author into his entry controlled apartment building.','','N',23,'',1.000,0),(1035,72,'Obfuscation and Encoding in PHP',203,'Discusses a method of obscuring PHP code.','','A',24,'',2.500,0),(1036,72,'APOP Email Protocol - MDS Challenge/Response',225,'Discusses the Authenticated POP (APOP) protocol and how it is vulnerable to packet sniffing.','','A',27,'',1.000,0),(1037,72,'PGP Key Signing Observations',18,'Discusses the social aspects of key signing systems because the human is the weakest link.','Suggested Further Reading: Bruce Schneier, Applied Cryptography and Secrets and Lies.','N',28,'PGP Key Signing Observations Overlooked Social and Technical Considerations',4.000,0),(1038,72,'Persuasiveness and Social Engineering',226,'Discusses Social Psychology, which deals with why and how humans are able to influence one another.','','N',46,'',1.330,0),(1039,72,'The Real Electronic Brain Implantation Enhancement',227,'Discusses the factual and idealistic concepts of electronic implants working for or alongside the biological nervous system and brain of man.','','N',47,'',1.750,824),(1040,72,'Observing the Lottery',228,'Discusses how the author\'s friend supplemented his regular income with money made from the lottery.','','N',50,'',1.660,646),(1041,72,'Sears Portrait Insecurities',229,'Discusses several vulnerabilities with the Sears Portrait Studio\'s POS (point of sale) system.','','N',51,'',1.330,0),(1042,72,'Kodak Secrets and Wal-Mart Fun',230,'Discusses vulnerabilities with the Kodak Picture Maker G3 software run on Kodak machines seen in stores like Walmart.','','N',53,'',1.660,0),(1043,72,'The Workings of a Kodak Picture Maker',231,'Discusses the hardware and software vulnerabilities of the Kodak Picture Maker machines.','','N',54,'',1.000,0),(1044,72,'WiMax, AT&T Style',163,'Discusses the new broadband communication called WiMax being introduced into beta environments by AT&T.','','N',55,'',1.500,0),(1045,72,'Cheap Mobile Internet for Your PowerBook',232,'Discusses how to get the same access your wireless phone has on your Mac laptop running OS X.','','N',57,'',1.000,0),(1046,73,'2600... 2006... 2060',2,'Discusses the addition of two new columns and announces HOPE Number Six.','','N',4,'',2.000,0),(1047,73,'Filesharing using TinyURL.com',200,'Discusses tinyurl.com and a method of using it to share data.','','A',7,'',3.000,0),(1048,73,'XSS\'ing MySpace.com',201,'Discusses how to use JavaScript encoded directly in a hyperlink to exploit MySpace XSS vulnerabilities.','','A',10,'',1.500,0),(1049,73,'United Kingdom: The State of Surveillance',202,'Discusses the ANPR (Automatic Number Plate Recognition) system that has been rolled out in the United Kingdom.','','N',11,'',2.000,0),(1050,73,'Making Rover Fart',203,'Discusses how to turn the Microsoft Search Assistan dog into a flatulent beast.','','N',13,'',1.000,0),(1051,73,'TELECOM INFORMER',7,'Discusses how to add a second phone line to your house for less than $20 and with no monthly fee.','First column article - described as a \'guide through the exciting, dynamic, and rapidly evolving world of telecommunications\'.','N',14,'',3.660,0),(1052,73,'Hacking the HNAS1 Network Attached Storage Unit',204,'Discusses how to modify the Hawking Technologies HNAS1 so it allows http access.','','A',18,'',4.000,0),(1053,73,'Hacking 2600.com',205,'Discusses gathering information about a web site and the fact-finding and planning involved in hacking.','','N',22,'',1.660,0),(1054,73,'Direct Inward System Access and Caller ID Spoofing',206,'Discusses Caller ID spoofing using the Asterisk open source PBX software.','','A',24,'',1.500,0),(1055,73,'HACKER PERSPECTIVE: The Cheshire Catalyst',21,'Discusses what a hacker is and what hacking is all about.','','N',25,'',2.000,0),(1056,73,'Hacking PCReservation',207,'Discusses PCReservation, a system used by public libraries that allows customers to make online reservations, and how easy it is to exploit.','','A',27,'',1.000,0),(1057,73,'Hacking the Facebook',208,'Discusses a method of gaining access to someone\'s Facebook profile.','','N',28,'',1.000,0),(1058,73,'The Price of Convenience: Our Identities',209,'Discusses identity theft, the lack of legislation protecting us and the many ways it can be accomplished.','','N',29,'',1.250,0),(1059,73,'Highlighting the Holes',210,'Discusses some of the holes in the two most typical security measures - security cameras and key card locks.','','N',30,'',1.500,0),(1060,73,'The DRM Plan',215,'Discusses how DRM (Digital Rights Management) will change the way we use music and why the music industry loves digital audio files.','Suggested reading: Lawrence Lessig - Free Culture, Kembrew McLeod - Freedom of Expression (r), Siva Vaidhyanathan - Copyrights and Copywrongs and The Anarchist in the Library.','N',46,'',2.330,0),(1061,73,'The Secrets of Cingular Wireless',211,'Discusses customer service at Cingular Wireless and several ways to take advantage of them.','','N',48,'',1.250,0),(1062,73,'TECHNO-EXEGESIS',168,'Discusses how radio content delivery is changing specifically addressing satellite radio, Digital Radio Mondiale and Hybrid Digital Radio.','','N',49,'',2.330,0),(1063,73,'Not Quite Dead Yet',212,'Discusses the current state of Pay Phones, ACTS and Red Boxing in the United States.','','N',52,'',1.660,0),(1064,73,'School Connections',213,'Discusses the author\'s method of obtaining free Internet service in his school\'s dorm room.','','N',53,'',1.250,0),(1065,73,'iPod Sneakiness',214,'Discusses a method of obtaining passwords and stored information with the use of an iPod.','','A',54,'',1.000,0),(1066,73,'A Look at Jabber/XMPP',216,'Discusses Google Talk and the vulnerability in Jabber client/servers using the Extensible Messaging and Presence Protocol (XMPP).','','N',55,'',1.000,0),(1067,73,'Spyware - The Ever Changing Threat',217,'Discusses spyware by understanding the threat, threat assessment and defeating the threat.','','N',56,'',1.330,0),(1068,74,'Whom Shall We Blame?',2,'Discusses the some issues in the current political environment (NSA spying/Net Neutrality) and suggests people become involved if they want anything to change.','','N',4,'',2.000,0),(1069,74,'More on Hacking Facebook',188,'Discusses a method of reading anything you want from a user\'s Facebook profile regardless of their privacy settings.','','A',7,'',5.000,0),(1070,74,'Getting Screwed by PayPal',58,'Discusses the author\'s nightmare experience with using PayPal for an eBay sale.','','N',12,'',1.000,0),(1071,74,'TELECOM INFORMER',7,'Discusses the surveillance built into the telecommunications system since CALEA (Communications Assistance for Law Enforcement Act) in 1994.','Reference: RFC 3924\r\nListserv archive: CALEA-HE@LISTSERV.SYRACUSE.EDU','N',13,'',3.000,0),(1072,74,'Hacking the System',183,'Discusses the author\'s views on hacking society and includes a detailed example.','','N',16,'',3.250,0),(1073,74,'Easy Access to T-Mobile and Cingular Accounts',189,'Discusses a method of getting someone\'s personal information by simply borrowing their phone for a brief period.','','N',19,'',1.750,0),(1074,74,'Ego Surfing',190,'Discusses a method of finding out how often a name is searched for on Google.','','N',21,'',0.660,0),(1075,74,'Public Access',191,'Discusses a method of gaining access to a regular Internet Explorer windows on computers where that access is normally prevented.','','N',21,'',0.750,0),(1076,74,'Breaking Mac OS X Program Security',192,'Discusses the weaknesses in the MCX and XML files that Mac OS X uses to limit what programs users are allowed to run.','','N',22,'',1.500,0),(1077,74,'GPOs and Group Policy: Just Say No!',193,'Discusses a method of disabling Group Policy propagation to a Windows NT4/2000/XP workstation.','','A',24,'',2.000,0),(1078,74,'HACKER PERSPECTIVE: Bruce Schneier',194,'Discusses what a hacker is, what they do and the useful function they perform in computer security.','Author of Applied Cryptography, Secrets and Lies, and Beyond Fear.','N',26,'',1.750,0),(1079,74,'Music Today',173,'Discusses how to hijack the chat program to access any site for free and/or use someone else\'s screen name.','','A',28,'',2.000,0),(1080,74,'Hacking Warner Brothers Records',195,'Discusses a method of downloading songs from artists signed with Warner Brothers.','','A',30,'',2.000,0),(1081,74,'Network Administrators: Why We BREAK Harsh Rules',196,'Discusses the authors perspective on the policies and justifications laid out in article \'Network Administrators: Why We Make Harsh Rules\' in 22:4.','','N',46,'',2.000,0),(1082,74,'Having Fun with Cookies',197,'Discusses uses and abuses of cookies in web applications.','','A',48,'',1.000,0),(1083,74,'TECHNO-EXEGESIS',168,'Discusses the privacy practices and intrusive policies of government and corporations using Facebook as an example.','','N',49,'',2.660,0),(1084,74,'Roll Your Own StealthSurfer II Privacy Stick',198,'Discusses how to create your own portable, private surfing environment on a USB flash drive (similar to the Privacy Stick).','','N',52,'',2.500,0),(1085,74,'Using Loopback-Encrypted Filesystems on JumpDrives',4,'Discusses a method of creating an encrypted file system in chunks that can be safely hidden in places out on the web.','','A',54,'',2.500,0),(1086,74,'An Argument Against MD5 Authentication',199,'Discusses the use of MD5 to hash user passwords for login and the vulnerabilities with doing this.','','N',57,'',0.750,0),(1087,75,'Hope and Fear',2,'Discusses the increasing prevalence of the surveillance/police state in the U.S. and comments on some current events. Expresses some optimism about the eventual outcome.','','N',4,'',1.750,0),(1088,75,'Identity Theft: Misinformation Can Be Your Friend',174,'Discusses a method of protecting yourself from identity theft by purposely obfuscating your name and address whenever you can get away with it.','','N',7,'',2.660,0),(1089,75,'Where Have The Philes Gone?',54,'Discusses how the sharing of hacking and phreaking files and information has changed over time.','','N',9,'',1.660,0),(1090,75,'A Back Door to Your Oracle Database',175,'Discusses a method of gaining dba rights to an Oracle database and keeping them with a back door.','','A',11,'',1.660,0),(1091,75,'TELECOM INFORMER',7,'Discusses the phone systems in rural Alaska.','','N',13,'',2.500,0),(1092,75,'Hacking Flickr',176,'Discusses a method of grabbing the original uploaded pictures from Flickr even when the \'view all sizes\' option isn\'t enabled.','','A',15,'',1.500,0),(1093,75,'Fun with the Sears POS',177,'Discusses several vulnerabilities in the POS (point of sale) systems used by all Sears stores.','','N',17,'',1.500,0),(1094,75,'Never Pay for WiFi Again!',178,'Discusses a method of obtaining wifi access by assuming the mac address of another computer (notes potential problems involved with doing this).','','A',18,'',2.500,0),(1095,75,'Hacking MySpace Using Common Sense',179,'Discusses a method of taking over a MySpace account.','','N',21,'',1.750,0),(1096,75,'Ringtone Download Folliez',180,'Discusses a method of downloading ring tones from sites where they cost money for free.','','A',23,'',3.000,0),(1097,75,'HACKER PERSPECTIVE: Mark Abene aka Phiber Optik',181,'The author discusses how he became involved with computers and hacking.','','N',26,'',2.000,0),(1098,75,'Insecurity at Pep Boys',182,'Discusses a bit about the Pep Boys POS (point of sale) system and some details of the network setup at the retail stores.','','A',28,'',2.500,0),(1099,75,'Mobile Devices - Current and Future Security Threats',156,'Discusses the potential vulnerabilities (ie. OS and Internet) and existing threats (ie. viruses) in smart phones and PDAs as a prime target for attack.','','N',30,'',1.500,0),(1100,75,'Hacking the System: Useful Connections',183,'Discusses the cultivation, nurturing and maintenance of useful connections, assets and information.','','N',46,'',3.000,0),(1101,75,'TECHNO-EXEGESIS',168,'Discusses how computer security is improving and outsmarting technology is becoming more difficult, but that as long as authorized employees need access to data the weakest link will be the human being.','','N',49,'',1.750,0),(1102,75,'Ownage by AdSense',149,'Discusses Google\'s AdSense and a method to potentially \"own\" a website\'s owner/webmaster.','','A',51,'',1.500,0),(1103,75,'Information\'s Imprisonment',184,'Discusses the lack of competition in the communications, entertainment and technology industries and how that adversely affects our access to information and freedom of speech.','and Matt Fillhart','N',52,'',1.500,0),(1104,75,'Singapore Library Mischief',185,'Discusses a method of taking advantage of the Singapore library\'s book borrowing system.','','N',54,'',1.000,0),(1105,75,'Monitoring Motorola Canopy with Windows XP and MRTG',186,'Discusses a method of monitoring the Motorola Canopy equipment using XP instead of Linux.','','A',55,'',1.250,0),(1106,75,'Attacking Third Party Tracking',187,'Discusses a method of significantly reducing your exposure to third party tracking without adversely affecting your browsing experience.','','A',56,'',1.000,0),(1107,76,'Transition',2,'Discusses the current state of the publishing industry, how it is adversely affecting 2600 and what they are doing about it.','','N',5,'',2.000,0),(1108,76,'Mobile Devices - Current and Future Security Threats',156,'Discusses mobile devices and smart phones and their potential security issues. Operating systems used, bluetooth, future/current threats and defenses are covered.','','N',7,'',1.330,0),(1109,76,'FirstClass Hacking',157,'Discusses vulnerabilities in the FirstClass system used by the author\'s school for class related tasks.','','N',8,'',1.500,615),(1110,76,'Network Administrators: Rules Rationale',158,'Discusses the reaction to the author\'s previous article and a response to that reaction.','References \"Network Administrators: Why We Make Harsh Rules\" (22:4)','N',9,'',1.500,0),(1111,76,'Wi-Fi Hunting: Basic Tools and Techniques',159,'Discusses some of the best methods for finding available wireless connections.','','N',11,'',1.330,0),(1112,76,'TELECOM INFORMER',7,'Discusses the wireless services and mobile phone technologies used in Japan.','','N',13,'',1.500,0),(1113,76,'Circumventing the DoD\'s SmartFilter',160,'Discusses the Department of Defense\'s use of SmartFilter and a method to circumvent it.','','N',15,'',1.000,628),(1114,76,'Algorithmic Encryption Without Math',161,'Discusses the author\'s program for encrypting plaintext or binary files.','','A',16,'',7.330,0),(1115,76,'Red Boxing Revealed for the New Age',162,'Discusses red boxing - what it is, how it\'s changed and how you can still accomplish it today.','Accurate for Verizon payphones.','N',20,'',4.500,0),(1116,76,'How to Get Around Cable/DSL Lockdowns',163,'Discusses how to bypass ISP restrictions on SMTP port 25 access by creating an SMTP forwarding server using a different port.','','N',24,'',1.500,0),(1117,76,'HACKER PERSPECTIVE: Phillip Torrone',164,'Discusses hacking hardware - open source hardware or open design. Includes a circuit diagram for the jammer in the links section.','','N',26,'',3.000,0),(1118,76,'Library Self-Checkout Machine Exploit',165,'Discusses a method of taking advantage of the self check out system a the author\'s city library.','','N',29,'',1.000,0),(1119,76,'Fun with Novell',81,'Discusses a method of obtaining passwords for a Novell Netware network.','Follow-up article in Winter 2007 - (More) Fun With Novell.','N',30,'',1.000,0),(1120,76,'How to Build a Book Safe',166,'Contains instructions for building a book safe.','','N',31,'',1.000,0),(1121,76,'Network Programming and Distributed Scripting with newLISP',167,'Discusses newLISP, an updated version of the interpreted language LISP.','','A',32,'',2.000,0),(1122,76,'TECHNO-EXEGESIS',168,'Discusses the overuse of new technology and argues that old technology is often times more appropriate (with specific examples of RFID passports, red light cameras, voting machines, slide rules).','','N',52,'',1.660,0),(1123,76,'GasJack - Hijacking Free Gasoline',169,'Discusses a method of taking advantage of Giant food store\'s gas station GasRewards promotion.','','A',54,'',3.500,0),(1124,76,'Motorola IMfree as a Wireless iTunes Remote',170,'Discusses how to turn the Motorola IMfree wireless instant messenger device into an iTunes remote.','','N',57,'',1.000,0),(1125,76,'The Not-So-Great Firewall of China',171,'Discusses China\'s Internet censorship, how the firewall works and how to get around it.','','A',59,'',2.000,801),(1126,76,'Hactivism in the Land Without a Server',172,'Discusses a method of taking advantage of the Korean Friendship Association\'s online store.','References \"Having Fun with Cookies\" in 23:3.','A',60,'',1.000,0),(1127,76,'K7: Free [for the taking] Voicemail',173,'Discusses a method of seeing user information/accessing voicemail for other phone numbers on this free voicemail/fax service web site.','','N',61,'',0.660,0),(1128,77,'Challenges',2,'Discusses some hacker history and 2600\'s place in it. Talks about the current effort to protect the Hotel Pennsylvania.','','N',4,'',2.000,751),(1129,77,'Understanding Web Application Security',141,'Discusses common attack methods (with brief examples) against web applications and how to secure them.','','A',6,'',3.500,0),(1130,77,'RFID: Radio Freak-me-out Identification',55,'Discusses what RFID is potentially capable of and where the technology is heading.','','N',9,'',1.500,749),(1131,77,'Exploiting LiveJournal.com with Clickless SWF XSS',142,'Discusses the clickless SWF XSS exploit (subsequently fixed) on LiveJournal.com.','','A',11,'',2.000,0),(1132,77,'TELECOM INFORMER',7,'Discusses the author\'s short lived long distance service working with a company in Spencer, Iowa and some information on Telecom New Zealand.','','N',13,'',2.000,0),(1133,77,'Avoiding Internet Filtering',143,'Discusses bypassing the Websense web filtering software by using an https connection to a proxy.','','N',15,'',1.250,0),(1134,77,'Hacking Your Own Front Door',98,'Discusses how to make a skeleton key, the implications and how to improve your security.','','N',16,'',1.750,0),(1135,77,'Dorking the DoorKing',144,'Discusses the DoorKing telephone entry system.','','N',18,'',1.330,0),(1136,77,'Security Holes at Time Warner Cable',145,'Discusses a vulnerability at Time Warner Cable due to lax security.','','N',19,'',1.330,0),(1137,77,'Hacking My Ambulance',62,'Discusses the American Medical Response field computers including hardware, software and technical details.','','N',20,'',3.000,0),(1138,77,'SSL MITM Attacks on Online Poker Software',146,'Discusses how if SSL/TLS is not implemented correctly it is left open to man-in-the-middle attacks and applies this to Virgin Poker and City Poker.','','A',24,'',1.660,0),(1139,77,'HACKER PERSPECTIVE: Bill Squire',147,'Discusses the author\'s life and details a personal view of hacking.','','N',26,'',3.330,0),(1140,77,'Ripping MMS Streams',148,'Discusses a method of ripping MMS (Microsoft Media Server) streams.','','N',29,'',1.000,0),(1141,77,'Backspoofing 101',149,'Discusses what backspoofing is (calling yourself with spoofed Caller ID to get the Caller ID Name), how it works and what it can be used for.','','N',30,'',1.750,672),(1142,77,'Can I Read Your Email?',150,'Discusses the legalities of reading other people\'s emails per U.S. Federal Law.','This is not legal advice.','N',32,'',2.000,0),(1143,77,'Stalking the Signals',151,'Discusses RF (radio frequency) hacking, including the Signal Stalker police scanners.','','N',48,'',1.750,0),(1144,77,'GoDaddy.com Insecurity',152,'Discusses several potential vulnerabilities with GoDadday.com accounts.','','N',50,'',1.000,0),(1145,77,'Hubots: New Ways of Attacking Old Systems',89,'Discusses a method of PIN brute forcing and ATM machine.','','N',51,'',0.750,0),(1146,77,'Network Ninjitsu: Bypassing Firewalls and Web Filters',153,'Discusses using and SSH tunnel to bypass web filtering software.','','A',52,'',2.000,0),(1147,77,'Hacking a Major Technical School\'s Website',154,'Discusses a simple hack which allows access to student data at a technical schools library web site.','','N',54,'',0.750,0),(1148,77,'Covert Communications Channels',4,'Discusses how various types of communication channels can be rendered in unusual ways.','','N',55,'',5.000,0),(1149,77,'How to Cripple the FBI',155,'Discusses the importance of passwords when encrypting data.','','N',60,'',1.000,0),(1150,78,'Remaining Relevant',2,'Discusses hacking history, how hacking fits in today and the hacker mentality.','','N',4,'',2.000,0),(1151,78,'Discovering Vulns',98,'Discusses some general methodologies used to discover computer vulnerabilities and turn them into exploits.','','N',6,'',2.500,0),(1152,78,'The Shifty Person\'s Guide to 0wning Tire Kingdom',124,'Discusses the Tire Kingdom\'s main computer system and potential weaknesses.','','N',8,'',1.500,0),(1153,78,'Enhancing Nortel IP Phones with Open Source Software',125,'Discusses a method of connecting remote Nortel IP phones thru a broadband connection and VPN tunnel.','','A',10,'',3.000,0),(1154,78,'TELECOM INFORMER',7,'Discusses the scams perpetuated by the telecommunications industry to bilk unsuspecting subscribers.','','N',13,'',2.000,0),(1155,78,'Deobfuscation',126,'Discusses SourceCop (used to obfuscate php) and a method of getting the underlying source code it was designed to protect.','','A',15,'',5.000,0),(1156,78,'Getting 2600 the Safe Way',127,'Discusses some ASP code that grabs the cover image of the latest issue from the 2600 web site. Used so the author would know when the latest issue was out.','','A',20,'',2.000,0),(1157,78,'Fun at the Airport',128,'Discusses the TSA and airport security witnessed at a major U.S. city.','','N',22,'',3.000,0),(1158,78,'Hacking Xfire',129,'Discusses a method of altering the items Xfire (a gamer tool) records time for.','','N',25,'',0.660,0),(1159,78,'HACKER PERSPECTIVE: Mitch Altman',130,'Discusses some of the author\'s life experiences, technology, hacking and community.','Inventor of TV-B-Gone.','N',26,'',2.660,0),(1160,78,'Valuepoint',131,'Discusses a method of obtaining complete control of a motel\'s wireless Valuepoint network.','','N',29,'',3.000,0),(1161,78,'Internet Archaeology',14,'Discusses the use of archive.org to find content no longer available on the Internet.','','N',32,'',1.250,0),(1162,78,'Hacking Answers by Gateway',132,'Discusses how to get real help from Gateway, with words to avoid and scenarios to use.','','N',33,'',0.750,729),(1163,78,'VoIP Cellphones: The Call of the Future',133,'Discusses VoIP cellular service - what it is, the state of the technology and uses and abuses.','','N',48,'',1.500,687),(1164,78,'Pandora Hack - Get Free MP3s',134,'Discusses how to get music free from online radio station Pandora.','','N',49,'',1.000,0),(1165,78,'Adventures in Behavioral Linguistics',135,'Discusses NLP (Neuro-linguistic programming) - describes what it is, some of the theory/techniques and hype.','Author recommends: Teach Yourself NLP by Steve Bavister and Tricks of the Mind by Darren Brown.','N',50,'',1.660,0),(1166,78,'TRANSMISSIONS',23,'Discusses some guidelines for securing systems and maintaining a balance between security and usability.','','N',52,'',1.660,0),(1167,78,'An ISP Story',136,'Discusses technical support (or what passes for it) at an ISP and the author\'s attempt to help a customer who had been hacked.','','N',54,'',1.250,648),(1168,78,'Hacking Whipple Hill with XSS',137,'Discusses an XSS vulnerability in the Whipple Hill web software user interface used by schools.','','A',55,'',0.750,0),(1169,78,'Haunting the MS Mansion',138,'Discusses using Norton Ghost 9 to copy off or change files from a Windows disk and have access to system files (for support technicians).','','N',56,'',1.000,0),(1170,78,'Reading ebooks on an iPod',139,'Discusses a method or reading \"plain text\" format ebooks on an iPod.','','N',57,'',1.500,0),(1171,78,'Java Reverse Engineering',140,'Discusses a method of removing the 30 day trial from Zend Studio.','','A',58,'',2.000,0),(1172,79,'Politics',2,'Discusses the pol results indicating 20-30% of the readers believe 2600 should leave the \"politics\" out of the magazine.','','N',4,'',1.500,0),(1173,79,'VoIP Security: Shit or Get Off the POTS',65,'Discusses some of the security risks and available security tools for VoIP networks.','','N',6,'',3.660,0),(1174,79,'Getting More Out of Your College Linux System',92,'Discusses some tips/methods to get more out of the author\'s college linux/unix systems.','','A',9,'',1.330,0),(1175,79,'Social Engineering and Pretexts',93,'Discusses social engineering and the golden rules of using a pretext.','','N',11,'',2.000,828),(1176,79,'TELECOM INFORMER',7,'Discusses Private Branch Exchanges or PBXs.','','N',13,'',2.000,0),(1177,79,'Language Nonspecific: Back to Fundamentals',55,'Discusses programming/coding as a skill that is not computer language specific.','','A',15,'',2.500,0),(1178,79,'Front Door Hacking: Redux',94,'Discusses creating and using bump keys.','References \'Hacking Your Own Front Door\' in 24:1 (..)','N',17,'',1.500,0),(1179,79,'A Penny For Your Laptop',18,'Discusses how to pick the MicroSaver Combination Notebook Lock. This technique may be applicable to similiar locks.','','N',19,'',1.000,0),(1180,79,'The RIAA\'s War on Terror',24,'Discusses file sharing, fair use and the RIAA. Argues the RIAA needs to rethink it\'s current policies and strategies.','','N',20,'',2.000,0),(1181,79,'Free Files from Flash',100,'Discusses methods to obtain the underlying media file (ie. .mp3/.flv/.wmv etc) from web pages with an embedded Flash player.','','N',22,'',1.330,0),(1182,79,'Target: For Credit Card Fraud',62,'Discusses the lack of network security at Target stores and details a method of obtaining register transaction logs.','','A',23,'',1.000,708),(1183,79,'How to Get More from Your Sugar Mama',112,'Discusses a method of taking advantage of Virgin Mobiles Sugar Mama kickback program.','','N',24,'',1.000,0),(1184,79,'Owning UTStarcom F1000',113,'Discusses the UTStarcom F1000 (a WiFi VoIP device) and how to unlock it.','','N',25,'',0.750,0),(1185,79,'HACKER PERSPECTIVE: YOU',114,'Discusses the subscriber survey results.','','N',26,'',3.000,0),(1186,79,'Hacking 2600 Magazine Authors',115,'Discusses how the author found the identity of another 2600 author and got him fired.','','N',29,'',1.330,0),(1187,79,'Designing a Hacker Challenge',54,'Discusses a hacker contest with suggested rules, objectives and scoring.','','N',30,'',1.330,0),(1188,79,'Hacking an Election',116,'Discusses a potential method of rigging an election in Manitoba Canada.','','N',31,'',1.000,805),(1189,79,'How to Cheat Goog411',117,'Discusses how to use the Google 411 service for free phone calls.','','N',32,'',1.330,0),(1190,79,'Hacking the Buffalo Air Station Wireless Router',118,'Discusses some vulnerabilities in a WiFi network the author worked on.','','N',48,'',1.000,0),(1191,79,'The Thrill of Custom Caller ID Capabilities',119,'Discusses using caller ID for call routing to lower costs, simplify voice mail access and maintain a single number presence.','','N',49,'',1.660,0),(1192,79,'Securing Your Traffic',120,'Discusses using SSH to set up secure tunnels thru a corporate firewall.','','N',50,'',1.330,0),(1193,79,'TRANSMISSIONS',23,'Discusses the legality of accessing a wireless network without the permission of the owner, some applicable laws and some case history.','','N',52,'',2.330,0),(1194,79,'Hacking the Nintendo WiFi USB Connector',121,'Discusses hacking the Nintendo WiFi USB Connector so it works with other WiFi devices and can be used under Linux.','','A',54,'',4.330,0),(1195,79,'Fun with International Internet Cafes',122,'Discusses how the author circumvented security at an Internet cafe in Bangkok.','','N',58,'',1.330,0),(1196,79,'The Trouble with Library Records',5,'Discusses information about and some of the security issues with the INNOPAC library management system.','','N',60,'',1.000,0),(1197,79,'The Life and Death of an American Help Desk Agent',123,'Discusses the help desk industry and the author\'s experiences of working in it for many years.','','N',61,'',1.000,0),(1198,80,'The More Things Change...',2,'Looks at the things that have changed and those that have stayed the same as 2600 approaches it\'s 25th year.','','N',4,'',2.000,831),(1199,80,'Power Trip',4,'Discusses setting up a video camera to monitor private areas as a means of exposing secret warrantless searches.','','A',6,'',2.750,0),(1200,80,'Building Your Own Networks',69,'Discusses how to build a network modeled after FidoNet.','','C',9,'',2.000,0),(1201,80,'Pirates of the Internet',70,'Discusses the types of piracy (music, movies, software, games and other) an how it works.','','N',11,'',2.000,0),(1202,80,'TELECOM INFORMER',7,'Discusses the operation of the 911 emergency response system.','','N',13,'',2.000,0),(1203,80,'Darknets',73,'Discusses the evolution of file sharing technologies and introduces the latest called a darknet.','','N',15,'',1.000,0),(1204,80,'Scanning the Skies',75,'Discusses building a low cost system to explore television broadcasts from around the globe.','','N',16,'',2.000,761),(1205,80,'Essential Security Tools',36,'Discusses network security tools and details the where, what, when and how of each program.','','N',18,'',2.330,0),(1206,80,'Decoding Experts-Exchange.com',76,'Discusses a Perl script to decode the rot13 encoded solutions in Experts-Exchange.','Editor Note: Experts-Exchange has since changed the encoding algorithm.','A',20,'',0.660,0),(1207,80,'An Introduction to Beige Boxing',77,'Discusses beige boxing - which allows you to connect a phone, laptop or Palm Pilot to a landline. Includes a glossary.','','N',21,'',1.500,0),(1208,80,'Hacking the SanDisk U3',78,'Discusses the U3 smart drive system - specifically on the Sandisk Cruzer Micro 2GB usb flash drive.','','C',22,'',1.500,0),(1209,80,'Exploring AT&T\'s Wireless Account Security',79,'Discusses the potential insecurities of AT&T\'s wireless phone service accounts.','','N',24,'',2.000,0),(1210,80,'HACKER PERSPECTIVE: Rop Gonggrijp',80,'Discusses the author\'s involvement in the hacker culture in Amsterdam and his political activism against computer voting machines there.','','N',26,'Using Hacker Skills to Change History',3.000,807),(1211,80,'(More) Fun with Novell',81,'Discusses some work-arounds for issues from the initial article along with some additional tools.','References previous article \"Fun with Novell\" in 23:4 (..)','N',29,'',1.000,0),(1212,80,'PayPal Hurts',82,'Discusses how PayPal transaction reversals work and that they can cost a lot of money to the recipient.','','N',30,'',2.000,725),(1213,80,'Facebook Applications Revealed',83,'Discusses the Facebook development platform and looks at the security and privacy issues of three third-party applications (Moods, Free Gifts and Super Wall).','','N',32,'',2.000,0),(1214,80,'Hacking Windows Media DRM',84,'Discusses how Windows Media DRM works and describes one method of unlocking a DRM protected file.','','N',48,'',1.500,0),(1215,80,'The Noo World',85,'Discusses Nootropics - which are drugs that are purported to improve human cognitive abilities. Drug information and side effects for Deprenyl, Modafinil, Piracetam and Neurogenex are described.','Self medication is dangerous, especially with powerful cerebral drugs such as these.','N',49,'',1.500,0),(1216,80,'Forensics Fear',86,'Discusses a forensics company tool that allows Big Brother to search our computers without us knowing. List some security measures that could be taken to prevent this.','','N',51,'',1.000,0),(1217,80,'TRANSMISSIONS',23,'Discusses Internet privacy - past, present and future. Lists some methods to try and protect your Internet privacy.','','N',52,'',2.000,0),(1218,80,'Cracked Security at the Clarion Hotel',87,'Discusses the lack of security of a WiFi network at a Clarion hotel.','','N',54,'',1.500,718),(1219,80,'Building Your Own Safe, Secure SMTP Proxy',88,'Discusses a method of using ssh and scp to proxy email thru a personal shell account - useful if your workplace has SMTP restrictions.','','C',55,'',1.250,0),(1220,80,'Zero-Knowledge Intrusion',89,'Discusses the evasion of intrusion detection systems. The two main principles are to perform only passive reconnaissance and never generate traffic that is not generated by legitimate clients.','','N',57,'',1.330,0),(1221,80,'Booting Many Compressed Environments on a Laptop',90,'Discusses setting up a multiboot computer with the multiple operating systems in a compressed format.','','A',58,'',2.250,0),(1222,80,'Avoid Web Filtering with SSH Tunneling',91,'Discusses a method of circumventing web filtering systems by disguising your SSH tunnel as an HTTPS connection.','','N',61,'Avoid Web Filtering with SSH Tunneling : Encrypted Circumvention',1.000,0),(1223,81,'The Whole World\'s Watching',2,'Discusses the increasing use of surveillance, the lack of adequate security protecting private information, the voluntary and involuntary loss of privacy and the FISA and PATRIOT acts.','','N',4,'',2.000,0),(1224,81,'Vhreaking with VoxALot',50,'Defines common VOIP terms and describes how to set up a nearly free telephone system to make calls around the globe.','','N',6,'',3.500,0),(1225,81,'Dirt-Cheap Phone Calls - The VoIP Way',51,'Describes the author\'s VoIP setup and what he\'s learned from setting it up. Author was unable to discover a truly free setup.','','N',9,'',1.500,0),(1226,81,'Gaming AT&T Mobility',52,'Discusses a number of methods and strategies for obtaining freebies/extras on your mobile phone bill from AT&T customer service.','','N',11,'',2.000,0),(1227,81,'TELECOM INFORMER',7,'Discusses the telephone systems in prison and how its a profit center for prisons and a ripoff for prisoners. Also details a bit about the systems used and some of the rules imposed.','','N',13,'',2.000,0),(1228,81,'Password Memorization Mnemonic',53,'Discusses a method of generating passwords that are easy to remember.','','N',15,'',1.330,0),(1229,81,'Hacking Two-Dimensional Barcodes',54,'Discusses 2D or matrix bar codes. Details what they are, how they work and the types.','','N',16,'',1.660,0),(1230,81,'Dissecting the EPC: RFID for the Commercial Sector',55,'Discusses the EPC and Gen2 standards for RFID.','Emailed author about links 12/26/2008.','N',18,'',2.000,0),(1231,81,'Eavesdropping with LD_PRELOAD',56,'Discusses a method of overloading shared libraries in user space to hijack function calls.','','C',20,'',1.660,0),(1232,81,'April Fools\' Day, the Hacker Way',57,'Discusses an April Fools Day joke done by the author.','','N',22,'',1.000,0),(1233,81,'Remember CompUSA',58,'Details a method of obtaining CompUSA sales information (including credit card number, expiration date, etc) from an IMS terminal within the store.','','N',23,'',0.750,0),(1234,81,'Downloading MP3s for Free',59,'Discusses a method of getting free MP3\'s by using the sign-up credit of the www.allofmp3.com site.','Other .com domains the Russian company owns: mp3Sparks, mp3sugar, mp3stor, mp3fiesta, mp3ninja, mp3skyline, mp3sale, lavamus.\r\nAlso: mp3search.ru, mp3legal.org, isound.be','N',24,'Downloading MP3s From www.allofmp3.com For Free',0.750,0),(1235,81,'Swindling From SearchFeed',60,'Discusses a method of simulating user clicks on SearchFeed ads.','','A',25,'',0.750,0),(1236,81,'HACKER PERSPECTIVE: Martin Eberhard',61,'Discusses the current trend of governments to subvert people\'s privacy and some existing legislation to protect it. Details methods and strategies to protect your privacy.','','N',26,'',3.000,0),(1237,81,'Bypassing a Restrictive Internet Proxy',62,'Explains how a proxy works, how to tunnel past it and shows how to configure your applications.','','N',29,'',1.330,0),(1238,81,'Shadow Life',63,'Outlines the basic techniques of creating an alias.','','N',30,'',0.660,0),(1239,81,'Walk with Me, Talk with Me',64,'Discusses gang signs and suggests using for field phreaking or urban explorations.','','N',31,'',2.660,0),(1240,81,'Fun With the Snom Outlook Add-on',65,'Discusses a method of VoIP remote call initiation using the Snom Outlook add-in.','','N',48,'',1.500,0),(1241,81,'The EU Directive on Data Retention: Surveillance 2.0',66,'Discusses the European Unions retention policy for communication data. Details the pros and cons (ie. privacy vs and mentions direction U.S. is heading.','','N',49,'',2.500,0),(1242,81,'TRANSMISSIONS',23,'Discusses broadband service providers efforts to control the Internet and the \'net neutrality\' debate.','','N',52,'',1.330,0),(1243,81,'Information Flow on Campus: A Closer Look at Wikipedia',5,'Discusses Wikipedia and how the editing process works. Notes the process lends itself to bias and manipulation of information.','Includes a glossary.','N',54,'',3.500,0),(1244,81,'Story: To Kill an Atomic Subwoofer',67,'Tells the story of how the author silenced a neighbors loud car stereo system.','','N',57,'',3.500,0),(1245,81,'Uses for Knoppix',68,'Discusses the use of Knoppix to retrieve files from a Windows machine without having to login to it.','','N',61,'',1.000,0),(1246,82,'The Best of Times',2,'Announces and discusses the upcoming publication of \'The Best of 2600: A Hacker Odyssey\' book.','','N',4,'',2.000,0),(1247,82,'Don\'t \'Locate Me\'',29,'Discusses a method of locating people with the Skyhook Wireless system if you know their MAC address.','','C',6,'',2.000,0),(1248,82,'Exploring Road Runner\'s Internal Network',30,'Discusses how the Roadrunner ISP internal network for static ip addresses is wide open.','','N',8,'',2.660,0),(1249,82,'Hacking Wireless Networks with Windows',31,'Discusses how to access a wireless network that limits connectivity by using an existing computer\'s MAC address.','','N',10,'',1.330,0),(1250,82,'The HughesNet FAP',34,'Discusses a method of circumventing the download limits of the HughesNet satellite Internet service.','','N',12,'',1.000,0),(1251,82,'TELECOM INFORMER',7,'Discusses the technology and standards of text messaging.','','N',13,'',2.000,0),(1252,82,'Hacking Society',5,'Discusses how companies use holding actions (ie. placing barriers and wasting your time) to manipulate customers and how to turn the tables on them.','','N',15,'',1.750,0),(1253,82,'Thirteen Years of Starting a Hacker Scene',35,'Discusses the history of the Brazilian hacker scene and the ezine Barata Eletrica.','','N',17,'',3.000,0),(1254,82,'HPing (The Part I Forgot)',36,'Discusses the HPing tool from the basics of crafting tcp/udp packets to advanced abilities like file transfer over icmp.','References \"Essential Security Tools\' in 24:4 (..)','N',20,'',2.000,0),(1255,82,'Meditation for Hackers: All-Point Techniques',37,'Discusses meditation and several techniques for practicing the author\'s all-point method.','Working on a book: A Hacker\'s Guid to Meditaion: Practical Receipts Without the Dogma.','N',22,'',2.000,0),(1256,82,'Fun with Network Friends',39,'Discusses a method of being able to view (in Firefox) the web sites someone on your network is viewing.','','N',24,'',1.000,0),(1257,82,'Hacking: A Graffiti Writer\'s Perspective',40,'Discusses the similarities between computer hacking and graffiti art.','','N',25,'',1.000,0),(1258,82,'HACKER PERSPECTIVE: Barry Wels',41,'Discusses the author\'s fascination with locks and some story\'s from his past.','The author is president and founder of Toool, The Open Organization of Lockpickers.','N',26,'',3.000,0),(1259,82,'A Portable Encrypted Linux System for Windows',42,'Discusses how to create a portable Linux work environment using TrueCrypt and Damn Small Linux.','','N',29,'A Portable Encrypted Linux System That Runs Under Microsoft Windows',1.500,0),(1260,82,'Mac Address Changer',43,'Discusses changing your MAC address to maintain your privacy on a network, provides a bash script to accomplish this easily.','','C',30,'',0.500,0),(1261,82,'Capturing Botnet Malware Using a Honeypot',44,'Discusses how to set up a Honeypot, and analyzes a botnet that infected the author\'s Honeypot system.','','N',31,'',3.000,0),(1262,82,'Cracking with the Webtionary',45,'Discusses using pre-computed hashes to crack encrypted passwords and a method of using google/yahoo to get them.','','C',48,'Cracking with the Webtionary: Using Google and Yahoo! To Light-force an (almost) Infinite Dictionary',1.500,0),(1263,82,'JavaScript Password DOMination',46,'Discusses a method of using Javascript in a browser\'s address bar to display a password from a login form.','','A',49,'JavaScript Password Domination: Easy Password Retrieval Using Javascript and the HTML',1.500,0),(1264,82,'Spirits 2000 Insecurity',47,'Discusses the Spirits 2000 retail liquor store software suite including where employee and credit card information is stored.','','N',51,'',1.000,0),(1265,82,'TRANSMISSIONS',23,'Discusses the history, circumstances and technical details of the OpenSSL flaw affecting many Debian-based Linux distributions.','','N',52,'',2.000,0),(1266,82,'The Geek Squad',48,'Discusses using a keylogger to obtain access to the Geek Squad\'s customer database.','','N',54,'',1.000,0),(1267,82,'Bank of America Website Flaw',28,'Describes a security flaw in BofA\'s website which allows customer credit card statements to be viewed in some circumstances.','','A',55,'Bank of America Website Flaw Allows Reading of Other Customers\' Statements',0.660,0),(1268,82,'Why is This Computer Connected to the Internet?',49,'Discusses the flawed rational for connecting many computers to the Internet unnecessarily and the potential catastrophic ramifications.','','N',56,'',2.000,0),(1269,82,'Story: Message of the Day',27,'Tells the story of how the author almost got arrested for hacking and ended up working as a security consultant.','','N',58,'',4.000,0),(1270,83,'The Last Shall Be First',2,'About the Last Hope.','','N',4,'',1.750,0),(1271,83,'Bell\'s Mind Markup Language',3,'Discusses Bell\'s Mind Markup Language for the creation and dissemination of scan information.','','C',6,'',2.000,0),(1272,83,'The TORminator',4,'Analyze Tor routers (by ip) to determine who they belong to and where they\'re located.','','C',8,'',2.660,0),(1273,83,'The State of Cyberspace and Cyberwar',5,'Discusses the changing relationship of cyberspace and hackers over the past three decades including the fairly recent phenomenon of cyberwar.','','N',10,'',1.330,0),(1274,83,'Watching the Watchers',6,'Discusses methods for disabling Google Analytics.',NULL,'A',12,'',1.000,0),(1275,83,'TELECOM INFORMER',7,'History of toll-free 800 number service.','','N',13,'',2.000,0),(1276,83,'Apple Dashboard Widget Insecurity',8,'Description of Mac OS X 10.4 dashboard widget exploit.','','S',15,'',3.000,0),(1277,83,'Penetration Testing: The Red Team Way',9,'Defines penetration testing and the Red Team. Discusses the benefits of the Red Team method.','','N',18,'',1.660,0),(1278,83,'FaxCore AUID Exploit',10,'Describes a security exploit of the FaxCore (web based faxing system) which allows someone to view any user\'s domain password.','','N',20,'',1.500,0),(1279,83,'ResHacking Windows Vista Games',11,'Describes the ResHacker freeware Windows program and explains a method to use it to alter the Minesweeper game.',NULL,'N',21,'',1.000,0),(1280,83,'Ripping MP3s from Bleep',12,'Describes a method of downloading the full mp3s from the Bleep online MP3/FLAC store.','','C',22,'',0.500,0),(1281,83,'Imation Insecurities',13,'Describes a method of circumventing the security features of the Imation 18405 2 gigabyte usb drive.',NULL,'N',23,'',1.000,0),(1282,83,'Blackhat SEO: Exploring the Dumb Masses to Make a Profit',14,'Describes blackhat search engine optimization and the practice of putting up content-rich websites in an automated way.','','S',24,'',2.000,0),(1283,83,'HACKER PERSPECTIVE: Nick Farr',16,'Describes the hacker space concept, the creation of The Hacker Foundation and hackerspaces around the globe.','','N',26,'',3.000,0),(1284,83,'Spoofing Banners with Open Source Servers',17,'Discusses port scanning/OS fingerprinting and modifying open source servers banner code.','','A',29,'',2.000,0),(1285,83,'A Different Kind of Remote Scripting',18,'Discusses remote scripting with SSH and command shells.','Don\'t trust anyone who smokes marijuana and votes for Bush.','C',31,'',3.000,0),(1286,83,'Six Quick Points of Disguise',19,'Discusses methods to change your appearance.','Suggested reading: The Spy\'s Guide: Office Espionage, Mind Manipulation by Dr. Haha Lung.','N',48,'',1.250,0),(1287,83,'AT&T Wireless Customer Information',20,'Discusses a method of obtaining access to an AT&T customer\'s information thru their website.','','N',49,'',0.750,0),(1288,83,'Setting Up Your Mobile Phone for International Dialing',21,'Discusses international phone numbers and the use of the plus (\'+\') sign.',NULL,'N',50,'',1.000,0),(1289,83,'USB Antiforensics',22,'Discusses methods to remove forensic evidence of USB activity.',NULL,'N',51,'',1.000,0),(1290,83,'TRANSMISSIONS',23,'Discusses wireless networks weakness and vulnerability of WEP.','','N',52,'',1.660,0),(1291,83,'Be Your Own DDNS Service Using PHP',24,'Describes a method of creating your own personal Dynamic DSN service using script and PHP.','','A',54,'',1.660,0),(1292,83,'Discovering Firewalls',25,'Discusses methods to discover and fingerprint firewalls.','','A',55,'',1.330,0),(1293,83,'Hacking Music',26,'Applying the hacker mentality to music.',NULL,'N',57,'',1.000,0),(1294,83,'Story: Sleeper',27,'Fictional hacking account.','','N',58,'',4.000,0),(1295,83,'Communications',15,'Dear 2600:','Information, Meeting Issues, General Questions, Proclamations, Help Needed, Experiences, The Best of 2600, Problems, Requests, Contributions, Observations, Gratitude.','N',34,'',14.000,0),(1296,82,'dialogue',15,'Dear 2600:','Suggestions, Inquiries, Observations, Critique, Projects, Responses, Problems, Good Things.','N',34,'',14.000,0),(1297,81,'DISPATCHES',15,'Dear 2600:','Random Bits, Suggestions, Analysis, Queries, \"Surprised?\", Statements, Article Feedback, Scams, Opportunity, Observations, Letter Feedback, Sad News.','N',34,'',14.000,0),(1298,80,'DECLARATIONS',15,'Dear 2600:','Mischief, Binding Woes, Discoveries, Theories, Responses, Ideas, Problems, Questions, Surprised?, Opportunity, Observations.','N',34,'',14.000,0),(1299,84,'Beginnings',2,'Discusses the recent historic presidential election and the implications for technology (ie. net neutrality). Though optimistic, reminds readers of Clinton\'s poor track record (Clipper Chip, CALEA, DMCA, etc). Notes the past eights years have been worse and power changes people, but expresses hope.','','N',4,'',2.000,0),(1300,84,'Introduction to Forensic Data Recovery',95,'Discusses the method the author used to recover photos inadvertently deleted from a digital camera\'s memory card. Using Linux, describes some theory and the commands used to accomplish this and notes the process is generally applicable to any deleted files.','','N',6,'',2.000,0),(1301,84,'Hacking Dubai and More Internet Proxy Loopholes',96,'Discusses getting free wifi access at the Jumeirah hotel in Dubai (this would also be something to try elsewere). And circumventing the Internet filter proxy there by using a low cost hosting service to run an Internet-facing server running a PHP or ASP web proxy (ie. PHProxy).','','N',8,'',3.000,0),(1302,84,'Calling Comdial',97,'Discusses Comdial phones which are SIP phones connected to a local network with CAT5. Describes how to use nmap to find these phones and to use netcat to play with them (ie. see/change settings and see numbers being dialed). Phone model used is a CONVERSip EP300 (similar techniques will probably work for other models).','','N',11,'',2.000,0),(1303,84,'TELECOM INFORMER',7,'Discusses the physical wiring system of the telephone network, describing how damage (storm/man made) to telephone cables happen and some of the methods used to prevent damage. Also, describes how they get repaired and a bit about who (ie. splicers/lineman).','','N',13,'',2.000,0),(1304,84,'De-obfuscating Scripting Languages',98,'Discusses script obfuscation - which is the encoding of clear text to make the script difficult to decipher. Describes the general logic used to obfuscate code (string replacements, offsets, loops, obscure constructs) and the general process to decode it (which is always possible as it has to for the code to work - though not saying it will be easy).','','A',15,'',2.750,0),(1305,84,'Social Engineering the Stock Market',99,'Discusses a stock market scam that inflated the price of a stock for an illegal profit and how it could be used in reverse to lower the price of oil stocks as a method of lowering the price of gas.','','N',18,'Social Engineering the Stock Market and Circumventing the Price of Gas',1.660,0),(1306,84,'Making Your Windows Box A Little More Secure',100,'Discusses Windows security for a typical home user. Takes a hypothetical case and gives detailed instructions for securing the computer. Advice is targeted for general users in a tutorial format and includes a best practices summary. OS used is Windows XP but should work with Vista etc. and the concepts used are generic.','','N',20,'',4.750,0),(1307,84,'Hack Thyself',101,'Discusses cognitive science including the Information Processing Model and Transactional Analysis. Argues people are programmed by society/culture and controlled by commercial enterprises. Recommends \'The Anger Habit Workbook\' and \'Breaking Free from the Matrix\' to take control of your mind/emotions yourself.','','N',24,'',1.250,0),(1308,84,'HACKER PERSPECTIVE: Bre Pettis',102,'Discusses combing imagination and creativity with technology and prototyping. Rapid prototyping can be implemented with Blender/Pepakura, Craft ROBO, DIY solutions or commercial tools. Suggests creating a hackerspace with other like minded people to begin bringing virtual objects to the real world.','','N',26,'',2.660,0),(1309,84,'Beating the System to Get Beats',103,'Discusses how to circumvent RocBattle\'s audio watermarking.','','N',29,'',0.750,0),(1310,84,'Anonymous SSH at the Library',31,'Discusses using publicly available computers for anonymous Internet access by using a free ssh account and a free ssh applet.','','N',29,'',0.750,0),(1311,84,'Trashing Gone Wrong in Switzerland',13,'Discusses a situation where the author was perusing documents in plastic trash containers with details of a company\'s secure banking software and was apprehended by private security. The police were called but fortunately they hadn\'t seen the papers collected and believed his cover story.','','N',30,'',1.500,0),(1312,84,'This Posting Has Been Flagged For Removal',104,'Discusses the Craigs List Flagging System which lets users flag ads but limits the flagging by ip address. Ads surpassing a Flag Threshold (which is variable) will be removed. Describes a method of defeating this limitation by using proxy servers - which can be found using Google.','','N',32,'',1.000,0),(1313,84,'Improved Mnemonic Password Policy',105,'Discusses another method of generating and remembering complex passwords.','References \'Password Memorization Mnemonic\' in 25:1 (..)','N',33,'',1.000,0),(1314,84,'Pappy\'s Cheese Box',106,'Discusses what a Cheese Box is (a device connected between two telephones to prevent tracing), what it was used for and some of the history behind it. Describes a method of creating a Cheese Box to use with two VoIP accounts that accomplishes the same purpose. (Parts not included).',NULL,'N',48,'',1.000,0),(1315,84,'Hacking for Beer',107,'Discusses a method of using a store membership/club card and the self-check-out machine available in many grocery stores to purchase beer, even if you are underage.','','N',49,'',1.000,0),(1316,84,'Gaming Gamestop',108,'Discusses a method of trading in your old games/hardware at Gamestop that saves you the twenty percent trade-in charge for getting cash back and also gets an additional twenty percent.','','N',50,'',1.000,0),(1317,84,'Vulnerabilities in the Corporate Sector',109,'Discusses recovering data from a hard disk that has been reformatted and describes the methods/tools used. The author purchased a corporate lease laptop from an auction site and was able to recover all of the data on it including email, VPN/PGP keys, etc.','','N',51,'',1.000,0),(1318,84,'TRANSMISSIONS',23,'Discusses the year 2008 in review. The WPA-TKIP wireless network attack, U.S. Customs border search and seizure policy and the FCC judgment against Comcast and metered bandwidth are all covered.','','N',52,'',1.660,0),(1319,84,'Business Intelligence',110,'Discusses Business Intelligence and how it is used for data analysis. Covers the data warehouse, star schema, fact tables, dimensions and ETL. Lists the major players involved and some open source projects.','','N',54,'',2.000,0),(1320,84,'Hacking WebCT',111,'Discusses WebCT (owned by Blackboard), an online proprietary virtual learning environment system. Details the user name and password logic used and describes several approaches to cheat the system.','','N',56,'',2.000,0),(1321,84,'Story: Conspiracy',27,'Tells a story about the author being a trustee of the high school computer lab and his attempt to hack a computer dating program for a school dance.','','N',58,'',4.000,0),(1322,84,'Messages',15,'Dear 2600:','2600 blessing granted to this site, p. 40.\r\nRevelations, Alerts, Assorted Meeting Bits, Inquiries, Rants, Praise, From the Inside, The Future.','N',34,'',14.000,0),(1323,79,'YAMMERING',15,'Dear 2600:','Privacy, Safeguards, Submissions, Meetings, Critique, Retail, Encryption, Questions, Injustice, Gratitude, Observations.','N',34,'',14.000,0),(1324,78,'Opinions',15,'Dear 2600:','Suggestions, Complaints, Response to Articles, Response to Letters, Injustice, Observations, Taking Action, Security Issues, Store Issues, Questions.','N',34,'',14.000,0),(1325,77,'Snippets',15,'Dear 2600:','Queries, Info, Stories, Danger, Weirdness, Advice Sought, Following Up, Gratitude, Thoughts, The Format, Sales.','N',34,'',14.000,0),(1326,76,'Conversations',15,'Dear 2600:','Suggestion, Reaction, Oppression, Submission, Question, Prosecution, Revolution, Clarification, Proclamation, Information, Observation, Provocation, Appreciation.','N',34,'',14.000,0),(1327,75,'Written Expressions',15,'Dear 2600:','On Privacy, Foreign Payphones, Interesting Facts, Questions, Fighting Back, From the Military, Followups, Blowing the Whistle, Exploration, HOPE Stuff.','N',32,'',14.000,0),(1328,74,'Jibber-Jabber',15,'Dear 2600:','Experiences, Input, Suggestions, Another View, Responses, More Info, Advice Sought, Disturbing Stuff, Inquiries, Security Holes, The Retail World.','N',32,'',14.000,0),(1329,73,'Sounding Board',15,'Dear 2600:','Of Concern, Requests, An Idea, Looking for Advice, Inquiries, Accolades, Adventure, Stupid Stuff, Observations, Critique, Responses, Security, Further Info.','N',32,'',14.000,0),(1330,72,'Writewords',15,'Dear 2600:','Questions, New Ideas, General Feedback, Advice, Guidelines, Responses, Responses to Responses, The Corporate World, Evil Doings, Homeland Security, Permissions, Insecurity, Offenses, On The Inside, Discovery.','N',32,'',14.000,0),(1331,71,'Words from You',15,'Dear 2600:','Devious Plots, Random Questions, Security Holes, Observations, Responses, Advice, Help Needed, Dept. of Injustice, Memories, Reestablishing Contact.','N',32,'',14.000,0),(1332,70,'Artillery',15,'Dear 2600:','In Search Of, Questions, Feedback, Meeting Issues, Suggestions, Electronic Voting, Contribution, Witnessed, Letters From Prison, Further Info, Curiosity, Corporate Secrets, Security Issues.','N',32,'',14.000,0),(1333,69,'Exchanges',15,'Dear 2600:','Research Results, Further info, Questions, Appeals, Utter Stupidity, Appreciations, Security Issue, Experiences, Observations, Responses, Cover Letters, Critiques, Problems, Ideas, Fighting Back.','N',32,'',14.000,0),(1334,68,'Back and Forth',15,'Dear 2600:','Questions, Life\'s Little Experiences, Discoveries, Injustices, Observations, Visibility, Additional Info, Responses, Gratitude, Info Needed.','N',30,'',13.250,0),(1335,67,'Troublemakers',15,'Dear 2600:','Clearing Things Up, Expanding on Thoughts, Discoveries, Idiocy, Security Holes, Randomness, Red Flags, Interpreting Covers, Scams, Making Change, Observations, General Queries.','N',30,'',14.000,0),(1336,66,'Verbal Constructs',15,'Dear 2600:','Reference Material, Gratitude, Questions, Meetings, Tricks, Complaints, More Info, Satellite Radio, Call For Info, More From The Military, Positive Stuff, Submissions, Warnings, Stupid Stuff, Homeland Security, Redirecting, Observations.','N',30,'',14.000,0),(1337,65,'Mind Exercises',15,'Dear 2600:','Assorted Questions, Con Game, Random Feedback, Help Offered, Observations, Military Readership, A Problem, The Power of Ignorance, Tips, Meeting Trouble, From The Other Side, The Music Industry, More Bookstore Hijinks, Thoughts on Terrorism, To Clarify, Mentoring, Working Around the System.','N',30,'',14.000,0),(1338,85,'Year 26',2,'Discusses some of the changes occurring in the publishing industry and how it\'s affected 2600 along with other alternative noncommercial publications over the past 25 years.','','N',4,'',2.000,0),(1339,85,'ATA Security Exposed',334,'Discusses DriveLock and the ATA Security Mode feature set, including DOS and Linux utilities and how it won\'t protect you from the police and/or FBI.','','N',6,'',2.000,0),(1340,85,'Outsourced',136,'Discusses working in an outsourced call center for 5 1/2 years and how though hired to provide technical support the real objective is to get the customer off the phone.','','N',8,'',2.000,0),(1341,85,'Annoying Dormitory Phones',335,'Discusses how the author decoded the touch tones from his dorm phone to make calls without using his phone card.','','N',10,'',1.500,0),(1342,85,'robots.txt Mining Script for the Lazy',336,'Discusses what robots.txt is used for and presents a bash script that creates a web clickable page from a url\'s robot.txt file.','Code is also in article.','C',11,'',1.500,0),(1343,85,'TELECOM INFORMER',7,'Discusses the state public utility commission and the regulated and deregulation of telephone companies.','','N',13,'',2.000,0),(1344,85,'Surfing Without a Board',244,'Discusses how the author was able to log into his physics class profile from a computer without a keyboard.','','N',15,'',1.000,0),(1345,85,'MP3s: A Covert Means of Distributing Information',337,'Discusses hiding and transmitting information within an MP3 file and the use of the mp3nema tool.','','N',16,'MP3 Data Stream as a Covert Means of Distributing Information',2.000,0),(1346,85,'Catching an iPod Thief Using Forensic Evidence',338,'Discusses the author\'s iPod being stolen and how the Linux log files helped nail the culprit. Describes a method that may work on Windows machines.','','N',18,'Don\'t Steal Music! (or Catching an iPod Thief Using Forensic Evidence.)',1.660,0),(1347,85,'Inside Google Radio',339,'Discusses the SS32 radio automation system (acquired by Google), including some history and the typical configuration.','','N',20,'',1.330,0),(1348,85,'Scour: Paid to Search, Again?',340,'Discusses the author\'s attempt to beat the system of a new web site called Scour.','','A',21,'',1.250,0),(1349,85,'Battling the Fanuc Data Panel',341,'Discusses the author\'s task of replacing a database on a GE Fanuc 1062 DataPanel using GE\'s proprietary WinCFG software.','','N',22,'',1.500,0),(1350,85,'Network Neutrality Simplified',342,'Discusses a quick, very basic primer on net neutrality, where we currently stand and where we go from here.','Support the Internet Freedom Preservation Act (H.R. 5353).','N',24,'',2.000,0),(1351,85,'HACKER PERSPECTIVE: Virgil Griffith',343,'Discusses the creative, artistic enterprise called hacking - the author\'s experiences, what it means to him and a little about the community.','','N',26,'',3.000,0),(1352,85,'Second Life Hacking',344,'Discusses a case study of the insecurity of \"Forgot your password?\" type systems.','','N',29,'',2.330,0),(1353,85,'Exploiting Price Matching Through Javascript Injection',345,'Discusses a method of modifying web pages with Javascript so the page can be printed for price-matching discounts.','','A',31,'',1.660,0),(1354,85,'HACKER SPACES - NORTH AMERICA',346,'Lists addresses of Hacker Spaces in North America.','','N',33,'',1.000,0),(1355,85,'DNS Spoofing on a LAN',347,'Discusses DNS spoofing and describes the steps necessary to accomplish it on your own network.','Inspired by \"Fun With Network Friends\" in 25:2 (..)','A',48,'',1.000,0),(1356,85,'An Astronomer\'s Perspective on Hacking',348,'Discusses some of the author\'s phreaking experiences and how being curious about things can lead you to unexpected results.','','N',49,'Hacking: An Astronomer\'s Perspective',3.000,0),(1357,85,'TRANSMISSIONS',23,'Discusses how simple it is to spoof wireless network access points to gain access to client machines using various tools and procedures and the lack of adequate defenses to protect against this attack.','','N',52,'',1.660,0),(1358,85,'Social Engineering HP for Fun and Profit',349,'Discusses some weaknesses in the HP customer support system that could be taken advantage of.','','N',54,'',0.750,0),(1359,85,'The Last 1000 Feet',120,'Discusses the author\'s experience with getting Internet access to his newly built house after he found out the corporate ISP\'s didn\'t provide service in his area.','','N',54,'',1.250,0),(1360,85,'Story: The Particle',350,'Tells the story of a couple of days in the life of a network support engineer and the strange occurrences that took place.','','N',56,'',5.000,0),(1361,85,'HACKER HAPPENINGS',346,'List of upcoming events.','','N',61,'',1.000,0),(1362,85,'Social Discourse',15,'Dear 2600:','Random Advice, Random Observation, Random Remarks, Random Questions, Random Problems, Random Info, Random Feedback, Random Offer.','N',34,'',14.000,0),(1363,64,'Speech',15,'Dear 2600:','Getting Around the System, Miscellaneous Fact, New Ideas, The State of Education, Military Readers, Miscommunication, Further Info, Misdeed, Pointed Questions, Call For Help, The Issue of Piracy, Some Clarification, Spreading Knowledge, Food For Thought, Info Needed, Ominous Developments, Annoying Problems, Appreciation, Reader Advice, Stories of Insecurity.','N',30,'',15.000,0),(1364,63,'Articulated Gibberish',15,'Dear 2600:','Article Feedback, Confusion, Newbies, Have You Heard?, Taking Action, Observations, Keep The Faith, The Past, Destructiveness, The Quest For Knowledge, Piracy Prevention, Insecurity, Suggestions, The Authorities, Concerns, Chastising the Ignorant, A Sign of Hope.','N',30,'',15.000,0),(1365,62,'Voices',15,'Dear 2600:','Sensitive Info, Handy Tips, Policy, Dealing With Opposition, Defining Terms, The Law, Letter Responses, Web Feedback Unlearn, Random Observations, Economics, Misconceptions, Article Clarifications, Clearing Blockages.','N',30,'',15.000,0),(1366,60,'Blather',15,'Dear 2600:','Spreading News, Terrorism Related Issues, Dumpster Diving, Feedback, Injustice Department, Thoughts On Piracy, Observations, Tale From The Past, Retail World, Parallels, A New Project, Significant Developments, Defining Hacker, Reaching Out.','N',30,'',15.000,0),(1367,59,'Missives',15,'Dear 2600:','Discoveries, Meeting Issues, Ideas, Unease, Getting Around the System, Words of Thanks, The Hacker Ethic, Questions, Problems, The School System, Something Positive, Further Info.','N',30,'',14.000,0),(1368,58,'input',15,'Dear 2600:','Darwin Awards, Questions, Privacy Issues, Feedback, Trash, Revenge, Help, 4/1/2, Education, Weird Stuff, Fun Stuff, More Info, Issues, Retail, More Corporate Abuse, Observations.','N',30,'',15.000,0),(1369,57,'The Security of the Inferno OS',438,'Source code listing left out from this article in 18:4 (..)','','A',28,'',2.000,0),(1370,57,'BACKTALK',15,'Dear 2600:','Signs of Hope, Higher Education, Help Wanted, Corrupting Youth, Miscellaneous Info, Answers Needed, Complaints, Worries, Ideas, More Politics, Observations, The World of Retail, Injustice, Corporate Corruption, Article Feedback, Tracking Terrorists.','N',30,'',15.000,0),(1371,56,'still legal thoughts',15,'Dear 2600:','Ideas, Prison Life, School Life, Corporate Life, Observations, Politics, Con Jobs, Morale Boosts, More Info, Quest For Knowledge, Old School Perspective, Film Update, Hacker Pedestals, Questions, Signs of Hope, Thoughts on 9/11, Response To Criticism, Legal Nonsense, Suggestions For Newbies, More on Telemarketing, Camera Crap, Labels.','N',30,'',15.000,0),(1372,55,'fine print',15,'Dear 2600:','People Power, The Mass Culture, Scams, Polities, Guns, Questions, Concerns, More Info, Injustices, Data, Appreciation, Article Feedback, Surprises, Quest For Knowledge, Satellite Watch, A Handy Tip, The Evils of Microsoft, Just Plain Evil, Just Plain Stupid, An Idea.','N',30,'',15.000,0),(1373,54,'THE INBOX',15,'Dear 2600:','DeCSS Fallout, Bypassing Restrictions, Spying, School Stupidity, Real World Stupidity, Appreciation, Individual Perspectives, Clarification, Questions, Corporate Stupidity, Discoveries, Issue Problems, Napster Alternatives, Counterpoint, An Idea, Voter Education, A Call To Arms.','N',30,'',15.000,0),(1374,53,'Ss Mm Ss',15,'Dear 2600:','Politics, Random Questions, Ideas, Info Hungry, Random Fear, Harassment, Cluelessness, Observations, Discoveries, Memories, Fighting Back, Voting Ideas, Article Feedback, Fun in the Stores, Legal Questions, Advice, Technological Nightmares, Offerings, From The Inside.','N',30,'',15.000,0),(1375,61,'Babble',15,'Dear 2600:','The War on Stupidity, Random Observations, Meetings, Security, New Projects, Inquiries, New Feedback, Responses to Old Feedback, Bypassing Security, Problem Solving, Cover Comments, An Accomplishment, More on Telemarketing, Discoveries, Suggestions, Dangerous Info.','N',30,'',15.000,0),(1376,86,'Not The Enemy',2,'Discusses the Obama administration\'s initiative on cybersecurity, how misguided the Clinton and Bush administration policies were and how Obama\'s policy has potential if the actions taken match the words.','','N',4,'',2.000,0),(1377,86,'Regaining Privacy in a Digital World',500,'Discusses methods to not only help you cut down on the amount of junk mail you receive, but it will also make it harder for the average person to track you down.','','N',6,'',4.000,0),(1378,86,'The Security-Conscious Uncle',501,'Discusses the author\'s story of a family dinner at which he figured out his uncle Bob\'s ATM card\'s pin number.','','N',10,'',2.000,0),(1379,86,'Why the \'No-Fly List\' is a Fraud',502,'Discusses the US governments \"No-Fly List\" including a practical example of how to circumvent it and an MIT published analysis indicating it decreases security.','','N',12,'',1.000,0),(1380,86,'TELECOM INFORMER',7,'Discusses details of the \"ugliest gutter trash bastard child of telephony\" - the Motorola iDEN system. Mentions ToorCamp','','N',13,'',2.000,0),(1381,86,'Finding Information in the Library of Congress',503,'Discusses the Library of Congress web site including several useful features.','','N',15,'',1.000,0),(1382,86,'Hacking the DI-524 Interface',504,'Discusses the D-Link DI-524 wireless router and how to bypass the bug in the web interface to configure it with encryption.','','A',16,'',1.000,0),(1383,86,'Simple How-to on Wireless and Windows Cracking',505,'Discusses the Backtrack distro (Linux Live CD distribution generally used for Penetration testing) including setting up a USB boot disk, WEP/WPA cracking and several tools/utilities.','','N',17,'',2.500,0),(1384,86,'If You Can\'t Stand the Heat, Hack the Computers!',506,'Discusses details of the OAS Heat Computer (version 6310) used to monitor and control building heating and/or hot water systems.','Part two of the article is in the Autumn 2009 issue [26:3]. (..)','N',19,'If You Can\'t Stand the Heat, Hack the Computers! Understanding OAS Heat Computers',2.250,0),(1385,86,'Security: Truth Versus Fiction',507,'Discusses the author\'s ability to gain access to a resident\'s room and other unauthorized areas of a university residence building.','','N',23,'',1.500,0),(1386,86,'Hacking the Beamz',508,'Discusses a method to modify/edit the sounds which the Beamz (a MIDI-controlled musical instrument called a laser harp) can play.','','A',24,'',1.500,0),(1387,86,'HACKER PERSPECTIVE: Jason Scott',509,'Discusses the author\'s life-long interest in computers, how textfiles.com came to be and his opinion on what hacking is about.','','N',26,'',2.000,0),(1388,86,'iTunes Stored Credit Card Vulnerability',510,'Discusses the author\'s discovery of an iTunes security issue with the one-click purchase option after his laptop was stolen.','','N',28,'',0.660,0),(1389,86,'Zipcar\'s Information Infrastructure',511,'Discusses some of the inner workings of Zipcar (the largest car-sharing company in the country) via the author\'s membership and use.','','N',29,'',1.000,0),(1390,86,'The How and Why of Hacking the U.N.',512,'Discusses how the United Nations (UN) doesn\'t allow links to transcripts of official meetings in pdf format and presents a script to defeat this restriction.','','A',30,'',2.330,0),(1391,86,'Listen to Radio Hackers!',513,'Lists hacker radio frequencies in the US and abroad, links to Larsen (Vincent Plousey) bust by French secret service.','','N',32,'',0.660,0),(1392,86,'HACKER SPACES - EUROPE',346,'Lists addresses of Hacker Spaces in Europe.','','N',33,'',1.000,0),(1393,86,'Abusing Metadata',514,'Discusses metadata, what it is, examples of what information is available and how it can be used to your advantage.','','A',48,'',2.330,0),(1394,86,'Verizon FIOS Wireless Insecurities',515,'Discusses the default wireless router (Actiontec) setup for Verizon\'s FIOS service and how unsecure and easy to crack it is.','','N',50,'',1.660,0),(1395,86,'TRANSMISSIONS',23,'Discusses the first release of the rewritten Kismet software (used to analyze wireless networks) and some of the changes/enhancements made including plugins and useful scripts.','','A',52,'',2.000,0),(1396,86,'Using Network Recon to Solve a Problem',516,'Discusses the author\'s problems with a Cisco GSS/CSS device and a primary/secondary server shared IP range network and how he used nmap to solve the issue.','','N',54,'',2.000,0),(1397,86,'Suing Telemarketers for Fun and Profit',37,'Discusses detailed information and suggestions about how to cash in on the illegal actions of your telemarketers.','','N',56,'',5.000,0),(1398,86,'HACKER HAPPENINGS',346,'List of upcoming events.','','N',61,'',1.000,0),(1399,86,'reader reflections',15,'Dear 2600:','Stories, Remarks, Submissions, Responses, Ideas, Appeals.','N',34,'',14.000,0),(1400,52,'POSTAL PROSE',15,'Dear 2600:','Clarifications, Exciting News, The DeCSS Case, Hacker Ethics, Newbies, Hacker Fashion, Scary News, New Projects, Discoveries, Questions, Parallels of Oppression, Takedown Spotting, More Corporate Evil, Annoying News, Further Info, Suggestions, General Feedback, The Politics of Change, Microsoftheadedness, Spreading the Word, Not News At All.','N',30,'',15.000,0),(1401,51,'READER DROPPINGS',15,'Dear 2600:','How Verizon Sucks, More Corporate Intimidation, Answers, IRC Bitching, H2K Videos, Questions, DeCSS/MPAA/DMCA, Misconceptions, More Info, Bypassing Napster, Mitnick, Reprinting Stuff, The Old Days, More Government Stupidity, Bookstores, Observations, Lotto Fever, The Dangers of Info, Phone Problems, Schools, Fast Food Facts, Credit Files.','N',30,'',14.330,0),(1402,50,'DANGEROUS THOUGHT SECTION',15,'Dear 2600:','Clarification, Getting Around Stupidity, Discoveries, Car Talk, Annoyances, Retail Tips, Additional Info, Dealing With The MPAA, The Mitnick Case, Fun With Cable Companies, Info Needed, School Update, Criticisms, Helping New People, Ideas, Injustices, Starting a New Meeting, ANAC Numbers, Media Misrepresentation, The Staples Threat, Y2K, True Security, Listening In, Female Hackers, Desperate, The Verizon Threat.','N',30,'',15.000,0),(1403,49,'SECURID',560,'Discusses additional details of the SecurID technology developed by Security Dynamics.','Not in index, see All About SecurID page 20.','N',22,'',2.000,0),(1404,49,'WE\'RE LISTENING',15,'Dear 2600:','Alien Intelligence, Bookstores, Adventures in School, Discoveries, Kevin Free, More on SecurID, More Fun in Retail, Anti-Venom, Additional Details, Defeating Corporate Advertising, Help Needed, State of the Hacker World, Positive Developments, Idiocy, Humor, Forbidden Exchanges, The MPAA Lawsuit, Y2K Issues, Facts on NT, Irony, Free Stuff, Question, 2/6/00, DoS Cluebags.','N',30,'',15.000,0),(1405,48,'PEOPLE WHO CAN\'T KEEP QUIET',15,'Dear 2600:','Inequities, The Politics of Hacking, Difference of Opinion, Mitnick, Stupidity, Handy Stuff To Know, The High Cost of Learning, Mysteries, Hotmail Hijinx, Retail Tips, Ripoff, Observations, Questions, MTV, Barnes & Noble Memo Found?, Fun Stuff, Stories of the Past.','N',30,'',15.000,0),(1406,47,'More Disney Fun',598,'Discusses the complete story of what the Magic Kingdom tunnels are all about including a map, written by an ex-Disney cast member.','Index has \'Unauthorized Disney Fun\', page 28 has another article \'Assorted Disney Fun\' on it. (..)','N',28,'',1.330,0),(1407,47,'ENUNCIATIONS',15,'Dear 2600:','Clarifications, Venom, Guilt By Association, Retail Hacking, Phone Trickery, Dissatisfaction, Free Kevin, Foreign Phones, Conspiracies, Discoveries, Hunting For 2600, Y2K, Game Playing, Corporate Expansion, Hiding Things, Info Wated, Stealing, Ad Policy, Secrets.','N',30,'',15.000,0),(1408,46,'Chatter',15,'Dear 2600:','Offerings, Revelations, Responses, Fun Numbers, Secrets, Gripes, Tales of Injustice, Retail Tips, Cries for Help, Flush Out Religion, Mischief, Clarification, Supplemental Info, Military Mentality, Education, Miscellaneous Mitnick, Mysteries, Foreboding, Feedback, Advice, Pure Stupidity, Reassurance, General Weirdness, Chutzpah.','N',30,'',14.000,0),(1409,45,'EXPRESS YOURSELF',15,'Dear 2600:','Fun At The Retailers, Tracking Clive, Blockbuster Facts, Concerns, Bookstores, Phone Exploration, Praise, Mitnick Reactions, Foreign Interests, ADSL Report, Questions, Hacking Moviefone, Federal Interest, Color Coding, The Newbie Threat, SSN Corrections, Netscape Issues, Hackers At War, Y2K, Observations, Cable Modems, Netware Feedback.','N',30,'',14.000,0),(1410,44,'NON SPAM',15,'Dear 2600:','More on \"Free\" Software, Data, Questions, Radio Shack Antics, Fun on the Phone, Religious Advice, Scary Stuff, Injustices, Olympic Fun, Miscellaneous Mitnick, Fingerprinting, Barnes & Noble Feedback, Between The Lines, Help Needed, Hotmail Fun, Non-Subscriber, 2600 To The Rescue, In Defense of Microsoft, Clarifications, An Offer, Military Madness, Thoughts and Reflections.','N',30,'',14.500,0),(1411,43,'LETTERS',15,'Dear 2600:','Warning, Store Section, Help Needed, Identity Problems, Mitnick Feedback, Church People, Generic Feedback, Clarifications, Curious, Numbers, Career Move, Surprised?, Questions, Incidents, Facts, Metrocard Fun, Fun Sites, Still More FYROM Fun.','N',30,'',15.000,0),(1412,42,'LETTERS',15,'Dear 2600:','Questions, Newsstand Updates, Meetings, Disturbing News, Online Idiots, Software Concerns, Random Info, More Fun In Stores, 2600 Problems, Comments, Pleasantries?, Mitnick, Head Hacking Advice, Clarification, Bookstore Monopolies, Credit Due, Phone Exchange History, A Suggestion, The Generation Gap, More on FYROM, A Nagging Question.','N',30,'',14.000,0),(1413,41,'Letters',15,'Dear 2600:','Plea For Help, Infos, Finances, Arcade Memories, Random Questions, A Big Misprint, More Newbie Bitching, Clarifications, Criticism, More on Anarchists, AOL People, Facts, Independent Browsing, Bookstore Computers, Clampdown, More IRC Abuse, On Mitnick, Posers, 800 Fun, Military Insight, Encryption and the US, Hassles, More Privacy Lost, Wow, Suggestion, Weirdness, New Meetings, Drugs, Cable Modem Facts.','N',30,'',14.000,0),(1414,41,'Even Better Still',673,'Discusses how Best Buy store utilities are controlled and tips for gaining access and possible uses.','Not in index, see \'How to Get the Better of Best Buy\' page 44.','N',45,'',1.000,0),(1415,40,'Letters to Captivate You',15,'Dear 2600:','Criminal Advice, Newbie Advice, Defining Our Purpose, Getting Caught, Equal Access, Questions, New Facts, Help Needed, Next Letter, Reactions, Croatian Hacking, Critique, Meetings, Boston Transit, Norwegian Payphones, Information, Criminal Actions, Canadian Stuff, Access Problems, Words on Cable Modems, Suggestion, Military Recruits, The Anarchy Debate, Miscellaneous Feedback, Apology.','N',30,'',11.000,0),(1416,39,'WE PRINTED YOUR LETTER!',15,'Dear 2600:','True Hacking, Fun At Barnes & Noble, Righteous Hacking, Replies, A Challenge, Questions, The End?, Critics\' Corner, Mitnick Fallout, Circuitry, Suggestions, Problems, Improvements, Numbers, Uh Oh, Fixing Juno, Offended, Notes From The Military, For The Record, Meeting Problems, Beyond Hope Aftermath, IRC Woe, USA Still #1, Gee Whiz, Singapore Connection, Free Video Games, Clarification, PCS Mystery.','N',30,'',14.000,0),(1417,38,'Lucky Letters',15,'Dear 2600:','Injustices, Numbers, Off The Hook, Commentary, Social Engineering, Defaming Our Good Name, Info, Meetings, Hacked Web Sites, Mystery, The AOL People, The AOL Rules, How Dare You, More School Stupidity, The Decline of 2600, An Australian Nightmare, Corrections, LED Sign Update, Spy Hacking, Clueless, Hopeless, Pointless, COCOT Mysteries, Phone Tapping, Condoning Fraud, Thanks for the Virus, Dangerous Info, Arcade Facts, Don\'t Steal Us, Supervised Release Hell, Cellular Call Trace, The Mitnick Case.','N',30,'',14.000,0),(1418,37,'Letters That Don\'t Suck',15,'Dear 2600:','Dealing With Parents, Subscribing vs. Newsstands, A Real Clever Trick, Tale of Woe, Number Fund, Technological Marvels, Big Brother, Frequencies, School Terror Exciting Updates, Bernie S. Feedback, Video Boxing, Exorcising AOL, Newbies, PHF Findings, Web Reaction, Submitting Stuff, 2600 Name Dispute, 2600 Sells Out, Cable/Web Thoughts, Praise, More on Disney, Cellular Spoofing, Implants, More on the Mystery Computer, Credit Fraud, Bookstore News, On Stealing Things, Mischief in the Subway, Psychic Rip-off, Radio Show Online, One For Kevin, Inspiration, Phone Weirdness, 2600 Meeting Mishaps, Military Hacker, Punctuation Problems, Mac Hiding, The Other Side, Evil Ex Strikes Hacker, Serious Concerns.','N',30,'',14.000,0),(1419,36,'YOUR LETTER WOULD BE HERE',15,'Dear 2600:','The Ruling Class, Folklore, Finding People, Info Needed, Encryption, Questions, Holes, On Cluelessness, Observations, New Stuff, Numbers, Corporate Hacking, A World of SYN, Oops, More Flightlink Facts, Bernie S. Thoughts, Our Hypocrisy, Upgrade, A Freer JUNO, Cable Notes, Gambling Hack, PHF Exploit, Monopolistic Motion, A Fun Federal Story, Disturbing News, Porn Sting Update, NYNEX Neighbor Problems.','N',30,'',13.000,0),(1420,87,'Hacking In Tents',2,'Discusses the concept of a hacker camp, it\'s long history in Europe and the first one in the US this July called ToorCamp in Washington state.','','N',4,'',1.660,0),(1421,87,'Exploiting University Students using Rogue Access Points',62,'Discusses creating an access point in a university environment to exploit students and faculty workstations with different attack vectors to collect sensitive data.','','N',6,'',2.000,0),(1422,87,'Catching a Laptop Thief/WiFi Hacker',725,'Discusses a method of finding a computer via it\'s MAC address by listening to WiFi transmitted data and processing it with a Perl script.','','N',8,'',1.500,0),(1423,87,'Attacking a Blind Spot',726,'Discusses vulnerabilities with modern network printers and how you can own and disrupt this network resource that is critical for most businesses.','','N',9,'',1.500,0),(1424,87,'How to Almost Hide Your Digital Identity While Port Scanning',727,'Discusses how to use the IP spoofing and decoying options of nmap when doing port scans so as to try and hide their source.','','N',11,'',1.750,0),(1425,87,'TELECOM INFORMER',7,'Discusses the types of operator handled calls still available from AT&T long distance operators and from local ILEC (incumbent local exchange carrier) phone company operators.','','N',13,'',2.000,0),(1426,87,'Hello! Google Calling',728,'Discusses details of the beta Google Voice service and lists some of the abuses available using it.','','N',15,'',1.000,0),(1427,87,'Post-Apocalyptic Communications',729,'Discusses using amateur radio so you can communicate after doomsday should it occur in 2012, including types of licenses, exams and the annual Field Day.','','N',16,'',1.000,0),(1428,87,'Roll Your Own Hive Mind',167,'Discusses using social networking sites to create a collective that will give input on ideas from within and refine, disprove or validate answers given to questions within itself.','','N',17,'',1.000,0),(1429,87,'Free DirecTV on Frontier',620,'Discusses a method the author used to get free DirecTV service while on a Frontier Airlines flight.','','N',18,'',1.000,0),(1430,87,'Free Trials - Avoid Giving Out Your Credit Card Number',730,'Discusses how to generate and/or validate a credit card number with the Luhn check algorithm and the major credit card companies starting digit.','','N',19,'',1.000,0),(1431,87,'If You Can\'t Stand the Heat, Hack the Computers! (Part 2)',506,'Discusses details of the OAS Heat Computer (version 6310) used to monitor and control building heating and/or hot water systems.','Part one of the article is in the Summer 2009 issue [26:2]. (..)','N',20,'If You Can\'t Stand the Heat, Hack the Computers! Understanding OAS Heat Computers Part Two',6.000,0),(1432,87,'HACKER PERSPECTIVE: Johannes Grenzfurthner',731,'Discusses how the Media is the strongest political, economic, and heuristic power in the modern world and how hacking this system can be done with guerrilla communication.','','N',26,'',3.250,0),(1433,87,'Granny Loves Linux!',732,'Discusses interesting insight into two people who have chosen to live with Linux and are doing very well in their life after Windows.','','N',29,'',0.750,0),(1434,87,'Cracking WPA - PSK',733,'Discusses a method of cracking a Wifi Protected Access Pre-Shared Key (WPA-PSK) password on a wireless network.','','N',30,'',3.000,0),(1435,87,'HACKER SPACES - THE REST OF THE WORLD',346,'Lists addresses of Hacker Spaces for the rest of the world.','','N',33,'',1.000,0),(1436,87,'Hard Disk Encryption, No Excuses',734,'Discusses hard disk encryption for laptop computers and provides information on the opensource Truecrypt software.','','N',48,'',1.330,0),(1437,87,'Microsoft, Please Salt My Hash!',735,'Discusses how Microsoft Windows hashes suffer from the weakness of no salt and provides the evidence to prove it.','','N',49,'',1.660,0),(1438,87,'How to Get Free Loans From American Express',736,'Discusses a way to exploit the American Express grace period, to help keep your account in good standing and avoid accruing interest charges.','','N',51,'Amazing Grace Period: How to Get Free Loans From American Express',0.660,0),(1439,87,'TRANSMISSIONS',23,'Discusses how WiFi is a throwback to the days of media shared networks and many vulnerabilities like session hijacking.','','A',52,'',1.660,0),(1440,87,'SSL DNSSEC',737,'Discusses Domain Name System Security Extension (DNSSEC) which is an extension that adds security to DNS domain name lookups and compares it to SSL (TLS).','','N',54,'',3.500,0),(1441,87,'Tethering the Samsung SCH-R450 on MetroPCS',738,'Discusses MetroPCS and some interesting things you can do with the Samsung SCH-R450 mobile phone.','','N',57,'',1.500,0),(1442,87,'\'Borrowing\' the CustomInk.com Vector Library',739,'Discusses CustomInk, an online custom shirt design site and provides a method of downloading all of the custom art images files.','','N',59,'',1.000,0),(1443,87,'Hacking Your Hospital Bed',158,'Discusses the Stryker Secure II hospital bed that the author became familiar with when a multi-day guest of a local hospital.','','N',60,'',1.000,0),(1444,87,'HACKER HAPPENINGS',346,'List of upcoming events.','','N',61,'',1.000,0),(1445,87,'Vowels & Consonants',15,'Dear 2600:','Building the Community, Ideas on Spreading Knowledge, New Information, All Sorts of Questions, Cries for Help, General Feedback.','N',34,'',14.000,0),(1446,35,'GOING TOTALLY POSTAL',15,'Dear 2600:','The Cincinnati Nightmare, 2600 Groups, Airplanes, That Question Again, Phone Shutdown, Corrections, Bloat News, Mac Hiding Submission, Numbers, Mystery Computer, Novell Hacking, Security Concern, Canceling AOL, NSA Tracking, The Red Box Issue, Malfunction, Off The Hook, Free Communication, Words of Thanks, Applying Knowledge, Coin Collection, Trouble, On The Inside, Retail Madness, Update, Suspicion, Videotext, Chip Implants, Hacker Defense, Battling *69, Cash Registers, Disney Facts, Crazy Phone, Paranoia, Immortalize Yourself.','N',30,'',10.000,0),(1447,34,'The Search for Extraterrestrial Letters',15,'Dear 2600:','Clueless Mac Users, Clueless IBM People, Clueless Idiots, Finding 2600, And very very Grateful, Inspirational Speech, Secret Service Reactions, Fun Numbers, Hiding Files, Phone Card Hacking, Stupid Question, Pirate Radio, Privacy Invasion, Hidden TV Worlds, The Truth Revealed, Eyes in the Sky, AOL Purgatory, Warnings, PSI Horrors, Info Wanted, The Marketplace, People Tagging, Danger on the Highway, Prisoners, Immortalize Yourself.','N',30,'',10.000,0),(1448,33,'WHERE THE LETTERS ARE',15,'Dear 2600:','Opening More Doors, Eastern Europeans, ANAC Change, Points on Interrogation, Bernie S. Fallout, Military Miscellany, Spanish ANI, Cellular Prisoner, Highway Weirdness, Meeting Questions, Info, Corrections, Reality?, Radio Shack Fun, Unfriendly Payphones, Questions, The Winter Cover, Fun On Planes, Repression and Hackers, AOL Hell, Credentials on Credentials, Crippled 911, Disney Critique, An Edward A. Smith Theory, Cincinnati Bell Nightmare, Understanding the Hacker, 56K ISDN Link, Netware Nonsense, Words of Praise, Words of Shame, Immortalize Yourself.','N',28,'',13.000,0),(1449,32,'THOUGHTS OF THE READER',15,'Dear 2600:','Fraid Not, Questions, Clarification, The Master Plan, Words of Thanks, Mac Trix, Privacy Regained, Of ANACs and ANIs, Viral Stuff, Brazilian Hackers, The Truth About Mitnick, On Bernie S., Possible Warning, AOL Hell, Destruction and Theft, Hacker Perceptions, Answers, Speech Confinement, Bookstore Stories, Standing Up, Pet Peeves, Shocking News, Back Pack Hack, Problem Stealing Money, Contacts Wanted, Info, Opening Doors, Immortalize Yourself.','N',28,'',11.000,0),(1450,31,'LANGUAGE IS A VIRUS FROM OUTER SPACE',15,'Dear 2600:','Harassment, Information, Telco Brains, Article Feedback, Numbers and Addresses, Censorship, Discovery, Wanted, Mac Infiltration, On Diverters, ATM Fun, Advice, Causing Confusion, Fear of Subscribing, Yet More Bookstore Fun, German Payphones, HOPE Repercussions.','N',28,'',8.000,0),(1451,30,'Letters are the cornerstone of any civilized society',15,'Dear 2600:','Privacy Concern, Hacker Techniques, War Dialing, Numbers, Data, Questions, Pirate Alert, Answers, Bookstore Stories, Caller ID Questions, Lack of Security, NYNEX Outrage, Advice, On ATM\'s, Spin Control, Handy Tip.','N',28,'',8.000,0),(1452,29,'THE BETTER LETTERS',15,'Dear 2600:','More Bookstore Fun, Piracy Proposal, Easter Europe Scene, Locked Up, Bits of Info, Digital Correction, Intercept Tones, Monitoring Mail, Red Box Problem, ATM Fun, True Hackers, Mystery Computer, Source of Income, Strange Numbers, New Technology, Conscientious Trashers, Satellite Theory, A Fun Project, Mystery Number, TV Garbage, Hacking Airphones, Mac Attack, Computer Numbers, Fun With Cordless Phones.','N',28,'',8.000,0),(1453,29,'Hacking the Tandy Zoomer/Casio Z-7000 ZPDA',797,'Discusses the author\'s personal digital assistant (PDA) and making modifications to the configuration files of the GEOS operating system it uses.','One listing in index, actually two articles, \"Hacking the Tandy/Casio Pocket Computer\" (..)','N',39,'',2.000,0),(1454,28,'RIGHT LETTERS',15,'Dear 2600:','Missing The Point, Handy Tip, Problem, HOPE Memories, Scantron Tricks, Fun With Sound, A Little History, Ottawa Fun Phone Facts, Wanted, Info, Mystery Number, Questions, Metrocard Update, Highway Strangeness, More Hacker Persecution, 800-433-3210 Update, Payphone Tribulation, More Window Tricks, More Mac Tricks, Followup, True Hacker Spirit, More On Honesty, Help Needed, Hacker Graffiti, Take Responsibility, Phone Boxes, Inexcusable, International Tale of Woe, Cable Affirmation.','N',24,'',9.000,0),(1455,27,'vocals',15,'Dear 2600:','Worrisome Questions, Defeating Call Return, Info, More Questions, Privacy Violation, Meetings, Reader Reunion, A Strange Number, Inside Info, Strange Situation, Replies to Readers, Cordless Clarification, Mac Hacks, Sick ATM\'s, Lowdown on LoJack, Still More Questions, On Piracy, On Honesty, Northern hacking, Satellite Mystery, Red Light Cameras, Security Concerns, Security Lapses, Contradictions, Hacker Sites?, Help Needed.','N',24,'',9.000,0),(1456,26,'playing with your fingers',817,'Discusses the different options available to you for backfingering people over the Internet.','\"Finger Follies\" in the index for two articles, see (..)','N',15,'',2.330,0),(1457,26,'LETTERS TO READ BY',15,'Dear 2600:','A Busy Connection, Touch Tone Tall Tales, Improving Grades, Regression, Car Tracking, How To Be Honest, High School Notes, Fighting Traffic, Become Your Own Admin, Passing Numbers, Red Box Rumors, Those Three Tones, Cellular Mystery, Thoughts On Congress, Defending the 64, Tyranny in Church, Availability, Secrecy, Seen the Light, IBM Hacking, Long Arm of the Secret Service, Call Forwarding Tricks, Prodigy Savings, Hungry For Knowledge, Fighting The Slime, Secrets of a Super Hacker, Thoughts.','N',24,'',8.750,0),(1458,25,'LETTERBOX',15,'Dear 2600:','Comments, Hacker Understanding, Novell Nosing, Nynex Negativity, Reader Abuse, Questions, The Dark Side, The Far Side, Payphone Fun, Quarter Variations, Prison Phone Report, Government Data, Cellular Chatter, More Corporate Outrage, Individual Outrage, Exiled Hacker, Pointers, Fighting Back, Governmental Suggestions, Phiber Parallel, Correction, Phone Company Charges.','N',24,'',9.000,0),(1459,25,'hacker reviews',831,'Discusses the book \"UNIX Security: A Practical Tutorial\" by N. Derek Arnold, ITCC published by McGraw-Hill, Inc.','Shares index entry with \"Book Reviews\" (..)','N',43,'',0.500,0),(1460,24,'KNOW YOUR SWITCH',759,'Discusses how to listen for particular sounds to find out what type of switch is serving your exchange.','Not in index, see \"Elementary Switching\" (..)','N',10,'',0.500,0),(1461,24,'LETTERS TO REMEMBER',15,'Dear 2600:','Fun Telco Numbers, Hacking Traffic Lights, Past Hacker Prime?, Info and Questions, Potential Discovery, Security Concerns, Starting a Meeting, Questions, Why Hack Cable? How to Learn About Your CO, Observations, New Technology, Modem Back Door, Foreign Pay Phone Flash, How to Really Abuse a Payphone, Technology Moves Backwards, Corrections, Red Box Concerns, How Easy It Is, Bypassing Restrictions, A Way Around Caller ID?, School Phone Systems, 2600 Wins Over Class, The Honesty Test.','N',24,'',8.000,0),(1462,23,'meeting mania',346,'Discusses the latest in the ongoing Pentagon City Mall/Secret Service scandal involving attendees of the Washington DC 2600 meeting in November 1992.','Not in index.','N',18,'',1.000,518),(1463,23,'never erase the past',2,'Discusses the \"LOD Communications Underground Hack/Phreak BBS Message Base Project\" written and published by LOD Communications.','Not in index.','N',19,'',1.000,0),(1464,23,'NEVER BEFORE PRINTED LETTERS',15,'Dear 2600:','Foreign Charge Phones, Hacker Info, Reading List, Telco Ripoffs, Seen the Light, Hacking An Intercom, AT&T Irony, Locked Out, New Long Distance Services, Evil Engineers, Los Angeles Numbers, Governmental Mystery, Numbers, Cellular Mystery, Disney Details, Are We Neglecting IBM?, Lack of Understanding, Review Update, High School Hacking, Telco UNIX Trap, Bookstore Trouble, Rumor Quelling, Problem Solving, Cellular Criticism.','N',24,'',8.500,0),(1465,22,'Printable Letters',15,'Dear 2600:','Mall Fallout, Beginner Questions, Defeating Hardware Locks, Telco Fascists, Freedom of the Press, Equal Access?, Help Needed, Cable Potential, On Beige Boxing, Unlisted Directories, Callback Defeat, Another Way to Fix Credit, Another Simplex Story, Red Box Tones, Female Hackers, COCOT Question, New York\'s 890 Exchange, The Best ANAC, A Special Request.','N',24,'',8.000,0),(1466,22,'government bulletin boards',346,'Lists telephone numbers for government bulletin boards.','Not in index.','N',39,'',1.000,0),(1467,22,'ANSI BOMB',755,'Discusses how to use ANSI codes to redefine the keys of a keyboard (requires a DOS computer using ANSI.SYS).','Not in index.','N',44,'',1.500,0),(1468,22,'News Update',346,'Discusses several current news items.','Not in index.','N',45,'',0.500,511),(1469,22,'Meeting Advice 2',854,'Discusses suggestions and strategies for preventing problems like the disruption of the November 2600 meeting in Washington DC.','Listed under \'Meeting Advice\' in Index with another article (..)','N',17,'',1.500,0),(1470,21,'One Angry Judge',722,'Discusses the Steve Jackson Games civil suit against the SS (U.S. Secret Service) and some of Judge Sparks\' findings and comments about the inept raid.','Not in index, see (..)','N',23,'One Angry Judge - SJG Trial: 2600 Perspective',1.000,0),(1471,21,'LETTERS OF MERIT',15,'Dear 2600:','Cordless Questions, Bypassing Restrictions, More Simplex Stories, Mysteries, Hacking Passwords, That Bell Computer, Correction, Info, Red Box Questions, Data in the Air, Questions, Fixing Your Credit, Surprising Facts, Spanish Connection, BBS Info, Evil Payphones, Access to 2600, Rolling Stone Corrections, Special Phone, Seeking Virus BBS\'s.','N',24,'',8.000,0),(1472,21,'Lawsuit Filed Against Secret Service',346,'Discusses the FOIA (Freedom of Information Act) requests and legal actions taken since the Washington DC 2600 meeting SS (U.S. Secret Service) incident.','Not in index.','N',43,' Lawsuit Filed Against Secret Service: Action is Taken on Behalf of D.C. 2600 Meeting',0.750,517),(1473,21,'2600 ROBBED OF TOUCH TONES',346,'Discusses the ridiculous amount New York Telephone wants to charge 2600 magazine for touch tone dialing.','Not in index.','N',43,'',0.250,0),(1474,20,'feedback',15,'Dear 2600:','Federal Issues, Credit Problems, What a Surprise, More Simplex Shenanigans, In Defense of the Demon Dialer, Slow Learners, Data, Scanner Observations, Where is TAP?, Book References, VMS Fun, Answering Machine Hacking, A Request, Bellcore Threats, Caller ID Hoodwinking, Hardware Lock Info Needed, Japanese Phone Tricks, Assorted Info, 2600 Meeting Adventures, Answers.','N',26,'',7.000,0),(1475,19,'i/o',15,'Dear 2600:','Blue Box Questions, Assorted Comments, Sheer Frustration, Mild Encryption, Cable Hacking, A Phone Mystery, Manny Questions, An Opinion, The Facts on ACD, Cellular Mystery, Call For Data, Call For Info, Call For Help, A Choke Tip, Mail Problems, Comments From Abroad, BBS Update, Voice Mail Question.','N',24,'',8.000,0),(1476,18,'Fun Things To Know',346,'Discusses various news items from different telephone companies around the U.S.','Index entry \"Revelations\", also index entry for \"bellcore\'s plans for caller id\" (..) and \"Here We Go Again\" (..)','N',19,'',3.000,0),(1477,18,'Here We Go Again',346,'Discusses newly announced hacker indictments in New York City on July 8 involving the USDJ (United States Department of Justice), FBI (Federal Bureau of Investigation) and SS (Secret Service).','Index entry \"Revelations\", also index entry for \"bellcore\'s plans for caller id\" (..) and \"Fun Things To Know\" (..)','N',22,'',2.000,524),(1478,18,'here they are',15,'Dear 2600:','Trouble To Come, Enhanced Exaggerations, Mag Strip Update, Scanning Results, At Wit\'s End, crypt() Corrections, Simplex Sightings, Wanted, Monitoring Problems, Cellular Frequencies, What the NSA Does, Prisoner News, Mystery Calls, The Prodigy Side.','N',24,'',7.000,0),(1479,17,'the letters',15,'Dear 2600:','Caller ID Info, POSTNET Questions, Info, Searching For Answers, COCOT Update, A Mag Strip Future,Technological Marvels, Transmitter Bits, Clarifications, Why They\'re Watching, Breaking Into The Scene, Questions, Outrage.','N',24,'',8.000,0),(1480,16,'The Letter Bag',15,'Dear 2600:','Governmental Nonsense, Various Bits of Info, Hacking School, Modem Voyage, Questions, Abuse of SSN\'s, Private Eye View, Call For Info, On Virus Books, Long Distance Trouble, Dutch COCOT\'s, Cellular Eavesdropping, COCOT Experimentation, Credit Wated, POSTNET Correction, On Prodigy, Reading ANI, Red Box Warning, Reading Stripes, Lock Your Terminal, Russian Technology.','N',24,'',8.000,0),(1481,15,'Pages of Letters',15,'Dear 2600:','Where One Hacker Went, Technical Questions, Raw Data, FAXers Beware, Prodigy Far From Gifted, General Questions, Red Box News, Suggestions/Questions, Caller ID Decoders, Hacking UNIX Passwords, Voice Mail Fun.','N',24,'',7.000,0),(1482,14,'The Letters Section',15,'Dear 2600:','UNIX Password Hacker, Another 2600 Meeting, Access From Korea, Red Box Notes, UNIX BBS\'s, Interfacing With Mainframe, Send A Message, Caller ID Questions, C&P Info Needed, More Hackerphobia, Information Sources, On \"Breaking In\", Very Concerned, Interesting Numbers, COCOT Theories, Valuable Lessons, Hacking Water, Numbers, Another MCI Ripoff, The Value of 2600, Disturbing Observations.','N',24,'',8.000,0),(1483,13,'Reader Feedback Time',15,'Dear 2600:','Some Suggestions, What Could It Be?, Info Needed, Compliments, Mysteries, Observations, General Complaints, Payphone Question, Frustration, AT&T Special Deal, Telco Rip-off, Information, Hacking 101, A Technical Explanation, COCOT Observations, A Disagreement.','N',24,'',6.000,0),(1484,11,'write us a letter',15,'Dear 2600:','Questions, Information, Information Needed, Complaint/Response, The COCOT Article, Prison Phones, Privacy Preservation, Wiretap Clarification, A Modern Proposal, Neidorf Defense Fund, Which Decoder Chip?, General Observations.','N',24,'',8.500,0),(1485,10,'letters from our readers',15,'Dear 2600:','Hunting for Wiretaps, Comments, On Government Raids, For the Record, Protection From Eavesdroppers, 2600 Compromising Ideals?, An Unusual Request, Free Phone Calls.','N',24,'',8.000,0),(1486,9,'SILVER BOX BORN IN U.K.',912,'Discusses converting a tone generator to a silver box and how the U.K. and Europe are behind the U.S. in the transition to tone controlled services.','Not in index. References article in Winter 1989.','N',19,'',0.660,0),(1487,9,'you\'ve found the official 2600 letters column',15,'Dear 2600:','Clarifying REMOBS, Who\'s Listening, Blue Box Chip, Bugs Wanted, Questions and Info, Yet Another Threat, Red Box Woes, Suggestions and Questions, Hotel Phones, The Facts on 10698, More Network 2000 Ripoffs, Sensitive Material.','N',24,'',9.660,0),(1488,8,'words and characters',15,'Dear 2600:','Help Needed, Interesting Facts, More Frequencies, Numbers Needed, GTE Mysteries, On Being Traced, Information, Words of Thanks, Hacker Clubs, Another Rip-Off Story.','N',24,'',10.500,0),(1489,7,'words from our readers',15,'Dear 2600:','Mobile Telephone Info, A Southern ANI, ROLM Horrors, A Nagging Question, A Request, Another Request, The Call-Waiting Phone Tap, Interesting Numbers, UNIX Hacking, Intelligent Payphones, Retarded Payphones.','N',24,'',6.500,0),(1490,6,'REMEMBER....',346,'A tribute to and remembrance of the lives of Abbie Hoffman and David Flory (aka The Shadow/Dan Foley).','Not in the index.','N',3,'',1.660,229),(1491,6,'The Voice of Our Readers',15,'Dear 2600:','The South African Phreak Crisis, Payphone Query, UNIX Made Easy, Did You Know?, Notes and Info, Crossbar Trick, Stories Wanted, Tuning In Calls, Austrian Phreaking, Just Say No, A Myriad of Questions,','N',24,'',8.750,0),(1492,6,'Reviews: The New \'Tap\'',2,'Discusses the new TAP newsletter recently published by people not involved in the original.','Original index entry shared with this article ..','N',43,'',1.000,0),(1493,5,'THE FIRST LETTERS OF 1989',15,'Dear 2600:','Wargames Dialer, More ANI\'s, Blue Box Questions, A Scary Tale, ','N',24,'',6.500,0),(1494,4,'Letters For Winter Reading',15,'Dear 2600:','Some Ideas, Need Info, AT&T Nightmare, Call Forwarding, Observations.','N',24,'',6.000,0),(1495,3,'Letters And A Few Numbers',15,'Dear 2600:','The Schematic, The Virus, The Chip, Another Ani, BLV Tidbits, What\'s the Point?, Questions, Another Scam, Anti-Gay Offensive.','N',24,'',8.000,0),(1496,89,'Smart Regression\r',2,'Discusses the fact that all of the devices (computers/phones/cars) around us are getting smarter and with us always and the need for a balance of real life with technology and our virtual/on-line life.','','N',4,'',2.000,0),(1497,89,'Pwning Past Whole Disk Encryption\r',17,'Discusses bypassing whole disk encryption on a Linux Ubuntu distribution that uses dm-crypt, includes commands and c source code modifications for what basically is a root kit.','','N',6,'',3.500,0),(1498,89,'L33ching the L33chers: Using a Portable Wireless Network\r',100,'Discusses setting up a portable wireless access point as a means of intercepting people\'s network traffic and suggests a number of possible uses.','','N',9,'',3.500,0),(1499,89,'TELECOM INFORMER\r',7,'Discusses information and details of the MagicJack VoIP serice by YMAX Communications Inc., including it cannot be uninstalled and will track your activity and display ads forever (unless you track down and eradicate every piece of it).','The only PC Magazine Product of the Year (2008) endorsement ever to be rescinded.','N',13,'',2.000,0),(1500,89,'Hacking Tor\'s Control Protocol\r',932,'Discusses how to control Tor\'s operations by delving into it\'s embedded control protocol to create custom circuits, monitor activity and other really cool hacks.','','S',15,'',5.000,0),(1501,89,'Hack T-Mobile Prepaid Messaging and T-Zones\r',933,'Discusses a method that allows you to work outside the margins that T-Mobile has established for its prepaid customers.','web-by-email service: www@web2mail.com or ww4mail@wm.ictp.triese','N',20,'',1.000,0),(1502,89,'Calling Comdial Part 2\r',97,'Discusses additional information about Comdial (now owned by Vertical Communications) VoIP telephones, including how to record and play back telephone conversations using packet captures.','Part #1 in Winter 2008 ..','N',21,'',2.500,0),(1503,89,'Underground Physical Network\r',19,'Discusses setting up an underground network of physical caches, hideouts, or just secret meeting areas and advice for staying off the grid.','Refers to author\'s article in Autumn 2008 ..','N',23,'',1.500,0),(1504,89,'Understanding Hacking Tools with Socket Programming\r',39,'Discusses a short Java program for port scanning an ip address.','','A',25,'',1.000,0),(1505,89,'HACKER PERSPECTIVE: Annalee Newitz\r',934,'Discusses the author\'s early experiences with hacking and hackers in high school and how she\'s learned to hack, subvert and reconfigure her life and hopes to inspire others to do the same.','Editor of io9.com, contributer to \"Wired\", \"New Scientist\" and the \"Washington Post\", co-editor of \"She\'s Such a Geek\".','N',26,'',3.000,0),(1506,89,'Hey Adobe! Leave My Boot Loader Alone!\r',935,'Discusses how a valid/licensed copy of Adobe\'s Creative Suite 3 (CS3) trashes your multi-boot GRUB system and provides a means of recovering from Adobe\'s malicious copy protection scheme.','','N',29,'',3.000,0),(1507,89,'Revenge is a Dish Best Served Cold\r',154,'Discusses the author\'s method of taking revenge on a class bully in high school.','','N',32,'',1.000,0),(1508,89,'HACKER SPACES - NEW FOREIGN\r',346,'Lists addresses of New Foreign Hacker Spaces.','','N',33,'',1.000,0),(1509,89,'Social Engineering from a New Perspective\r',936,'Discusses the advantage women have over men in social engineering, recommends a toolkit and provides some great examples and real life experiences.','','N',46,'',1.500,0),(1510,89,'A Simple Technique for Drum \'n\' Bass\r',937,'Discusses a c program that lets you create a techno music background from a repeating loop and the ability to modify it by pressing keys on the computer keyboard.','','A',47,'',1.500,0),(1511,89,'Retail Automation - ABS\r',938,'Discusses the ABS Point of Sale (POS) system by Retail Automation and the lack of security of it\'s database and user name/passwords.','','N',49,'',1.250,0),(1512,89,'Connecting to streamtheworld Audio Stream Directly\r',939,'Discusses how to connect directly to a streamtheworld audio stream without using the provided web client by describing the steps necessary to find the appropriate url.','','N',50,'',1.000,0),(1513,89,'TRANSMISSIONS\r',23,'Discusses the latest must-have gadget, the new Android phone and how it is basically a netbook with a smaller screen, but warns with added complexity comes added security risks and advises people to become aware of what\'s at risk.','','N',52,'',1.000,0),(1514,89,'The Importance of Hacking Your School\'s Network\r',940,'Discusses the author\'s use of a RPC DCOM remote exploit on Windows machines with port 135 open to gain access to the grading system and personal information for all of the students.','No details on the exploit except for a screen shot and a mention of Google.','N',54,'',2.000,0),(1515,89,'Fiction: Shakedown\r',27,'Tells the story of a help desk technician who has to fly to a customer site because they believe they have a hacker and how he stumbles upon the true problem.','','N',56,'',5.000,0),(1516,89,'HACKER HAPPENINGS\r',346,'List of upcoming events.','','N',61,'',1.000,0),(1517,89,'VOLLEYS',15,'Dear 2600:','Meeting Stuff, Inquiries, Observations, Requests, Grammer and Spelling, Feedback.','N',34,'',13.000,0),(1518,2,'These Are The Letters',15,'Dear 2600:','Reactions to Zap, Gripes and Feedback, A Useful Trick, \"Deluxe\" Call Waiting, New Falwell Numbers, What is Sprint Up To?','N',24,'',6.000,0),(1520,1,'Letters',15,'Dear 2600:','More Secrets, Encouraging Words, Still More Secrets, A Very Special Number, Tales of Hackers, Advice Wanted, Of Phones and Politics, More on the 8038, REMOB Hunting, The Global Village.','N',24,'Springtime Letters',5.000,0),(1537,92,'Important News\r',346,'Discusses the circumstances that led to 2600 becoming a quarterly publication instead of a monthly publication and how it changes subscriptions, etc.','','N',3,'',1.000,200),(1538,92,'IBM\'s VM/CMS System\r',947,'Discusses IBM\'s VM/CMS operating systems and everything you need to become familiar with the operating system and its security/insecurity.','Part one in November 1987 ..\r\nReferenced by article in Spring 1988 ..','N',4,'Hacking IBM\'s VM/CMS - Part Two',6.750,0),(1539,92,'Telecom Informer\r',346,'Discusses telecomunications industry related news items.','','N',8,'',2.000,0),(1540,92,'BLV\r',346,'Discusses Busy Line Verification (BLV) which is an operator assisted emergency interrupt on a busy telephone line and explains how it all really works.','Article written solely on the AT&T TSPS process of verification.','N',10,'All About BLV',3.500,0),(1541,92,'Letters\r',15,'Dear 2600:','Switch-Hook Dialing, Pen Registers, Evil Happenings, Canadian Questions, The Truth Revealed, Ingenious Solution, How Do Inmates Do It, BBS Thoughts, The Missing Chip, Yet Another Telco Ripoff.','N',12,'',3.250,0),(1542,92,'Social Interaction\r',948,'Discusses how the telephone has been extended to be the ultimate in safe social interaction systems - including 976, 900 and phone conferencing.','','N',17,'Social Interaction With Phones',1.000,0),(1543,92,'Roman Hacking\r',949,'Discusses hacking and phreaking in Italy.','','N',18,'Roman Hackers',1.000,0),(1544,92,'L.D. Horror Tales',346,'Discusses the author\'s experience with selecting a long distance carrier and his communication with US Sprint, MCI and Allnet/ALC Communications.','','N',20,'More Long Distance Unpleasantries',1.500,0),(1545,93,'2600 Bulletin Boards\r',346,'Discusses the first official bulletin boards of 2600 Magazine.','','N',3,'',1.000,0),(1546,93,'IBM\'S VM/CMS System\r',947,'Discusses IBM\'s VM/CMS operating system used by over 50 percent of the mainframes in the US today.','Part two in December 1987 .. Referenced by article in Spring 1988 ..','N',4,'Hacking IBM\'s VM/CMS',6.750,0),(1547,93,'S.S. Prefixes\r',950,'Discusses and lists the United States social security number\'s first three digits and which state they are issued from.','','N',6,'US Social Security Prefixes',1.000,0),(1548,93,'Listening In\r',951,'Discusses how to use your satellite dish to listen into phone conversations.','','N',7,'Listening In: Catch Me If You Can',0.750,0),(1549,93,'Telecom Informer\r',953,'Discusses telecomunications industry related news items.','','N',8,'The Telcom Informer',2.500,0),(1550,93,'Letters',15,'Dear 2600:','Double Beepers, Why No Boxing?, Apple Hacking, More How-To Articles, A New Source, Pen Registers, Unique Projects, TAP is Dead!','N',12,'Why Not Write Us A Letter?',2.330,0),(1551,94,'BBS Update\r',346,'Discusses the planned 2600 computer bulletin board system (BBS).','','N',3,'',0.330,0),(1552,94,'New York\'s IMAS\r',954,'Discusses New York Telephones new Integrated Mass Announcement System (IMAS), which will allow many more 976/970 numbers.','','N',4,'',3.500,0),(1553,94,'Telco\'s Response\r',346,'Discusses New York Telephone\'s response to 2600\'s criticism of the fee for touch tone service.','','N',6,'Telco Response',2.000,176),(1554,94,'Telecom Informer\r',2,'Discusses telecommunications industry related news items.','','N',8,'',2.500,113),(1555,94,'NUA List\r',955,'Lists International Network User Addresses (NUA) accessible from Tymnet and Telenet.','','N',10,'International NUA\'s',1.000,0),(1556,94,'South African BBS\'s\r',955,'Lists BBS telephone numbers in South Africa.','','N',11,'24 Hr. BBS\'s in the Republic of South Africa',1.000,0),(1557,94,'Letters\r',15,'Dear 2600:','Verification and Tracing, Missing Blue Box Chip, BBS Number, Getting Started, Private Sector Style, More on Disclaimers, And More, British Payphones.','N',12,'Reader Response',4.000,0),(1558,94,'Those Silly Codes\r',346,'Discusses Common Language Location Identification (CLLI, pronounced \"silly\") codes.','','N',14,'',1.000,0),(1559,94,'Contest Results\r',346,'Discusses the results of the funny and interesting ways of answering the phone 2600 Contest.','','N',22,'',1.000,0),(1606,103,'Worldnet is Coming\r',956,'Discusses how international computer networks work and how they are spawning off of Arpanet and has grown so large it is known as The Internet','Further reading: Communications of the ACM, October 1986.','N',4,'Worldnet: Getting Closer Every Day',3.000,151),(1607,103,'Operating With Difficulty\r',957,'Discusses New York Telephone\'s operator service, including the equipment used and routing/hardware problems.','','N',6,'',2.500,0),(1608,103,'Telecom Informer\r',958,'Discusses telecommunications industry related news items.','Reprints an ad for Minitel from a French phone book.','N',8,'',2.000,0),(1609,103,'English Dial-it Service\r',924,'Discusses how British Telecom has created an industry out of the pre-recorded message, lists a bunch of them.','','N',10,'England\'s Mass Announcements',1.500,0),(1610,103,'Letters\r',15,'Dear 2600:','Notes and Replies, An Explanation, Newsstand Update, Misinformation? Us?','N',12,'The Readers Speak Out',2.500,0),(1611,103,'Review: CO Magazine',959,'Discusses CO Magazine published monthly by Telecom Library Inc.','','N',22,'Review: CO Magazine Enlightening',1.000,0),(1612,104,'Summer Games of 87\r',346,'Discusses the Nationwide raids of computer equipment at teenager\'s houses in mid-July by the Secret Service (SS).','','N',3,'The Summer Games of 87',2.000,198),(1613,104,'TRW Credentials\r',961,'Discusses the new TRW Credentials service offered by TRW credit service that allows American consumers the ability to look at their own credit reports and is of dubious value.','','N',4,'TRW Credentials Lack Credibility',1.000,0),(1614,104,'Phone Numbers\r',962,'Lists numerous interesting telephone numbers.','','N',6,'Numbers of Interest',2.500,0),(1615,104,'Telecom Informer\r',2,'Discusses telecommunications industry related news items.','','N',8,'',2.000,0),(1616,104,'FBI Revealed\r',2,'Discusses \"The FBI Project Newsletter\" (quarterly) and \"The FBI and Your BBS\" published by Glen L. Roberts.','','N',9,'',1.000,0),(1617,104,'Capturing Passwords\r',964,'Discusses a method for obtaining user names/passwords on VAX VMS systems and a method to capture all activity occurring at a terminal.','','A',10,'',1.000,0),(1618,104,'AT&T Submarine Map\r',701,'Discusses the \"Submarine Cable Systems Chart of the World\" obtained from the International Cable Engineering Department of AT&T\'s Long Lines Division.','','N',11,'AT&T Sub Maps',0.500,0),(1619,104,'Letters\r',15,'Dear 2600:','CNA/CPA Questions, ITT Switching, Hotline Numbers, Monitoring Cellular, An Experience, Phone Literacy.','N',12,'Hear Are The Letters',3.500,0),(1620,104,'A Hacker Survey',346,'Discusses philosophical questions about what is right and what isn\'t for the hackers of the world to ponder.','','N',15,'',1.250,218),(1621,105,'Cellular Fraud\r',701,'Discusses cellular phreaking in detail, including safety, equipment, antennas, interfacing, access codes, programming the CMT and roaming.','','N',4,'Cellular Phone Fraud and Where It\'s Headed',4.250,102),(1622,105,'How Phreaks Are Caught\r',965,'Discusses details from the author\'s experience working in a long distance company switchroom and by educating phreaks hopes they don\'t get caught.','','N',6,'How Phone Phreaks Are Caught',3.250,109),(1623,105,'Telecom Informer\r',2,'Discusses telecommunications industry related news items.','','N',8,'',2.000,0),(1624,105,'N.Y. Telephone Exposed\r',346,'Discusses New York Telephones touch tone \"service\" (which is a scam) and how 2600 has been raising public awareness of it.','Index has incorrect page 9.','N',15,'2600 Exposes New York Tel',1.000,175),(1625,105,'Letters\r',15,'Dear 2600:','On Disclaimers, Texas Toll Fraud, Suggestions, Comments, A Horrible Problem.','N',12,'The Letters Never Stop',4.000,0),(1626,105,'Saudi Arabian BBS\'s',966,'Lists BSS telephone numbers (with notes) from Saudi Arabia.','','N',21,'Saudi Arabian BBS List',1.000,0),(1627,106,'Allnet Horrors\r',967,'Discusses the author\'s horrendous customer service experience with Allnet after being mislead by them.','','N',4,'Allnet: A Horror Story',1.660,171),(1628,106,'Pager Tricks\r\n',701,'Discusses how in many areas the local voice-paging system can be used without charge.','','N',5,'Paging for Free',1.330,101),(1629,106,'TSPS Guide\r',968,'Discuss the basic layout, description, and use of the keys found on the standard AT&T 100-B TSPS Console (used by operators).','','N',6,'A Hacker\'s Guide to the TSPS Console',5.250,0),(1630,106,'Telecom Informer\r',969,'Discusses telecommunications industry related news items.','','N',8,'The Telcom Informer',1.500,0),(1631,106,'Telenet Guide',346,'Lists details of Telenet addresses.',NULL,'N',9,'More Telenet Addresses',4.000,0),(1632,106,'Letters',15,'Dear 2600:','A Mystery, In Reply, Military Madness, More Publications, Additional Facts, Autovon Info, Visions of Doom, Words of Praise.','N',12,'Letters, PO Box 99, Middle Island, NY 11953-0099',4.000,0),(1633,107,'More VAX Tricks\r',970,'Discusses a weakness of VAX/VMS clustered environment systems that allows non-privileged users unlimited guesses at any account, includes password generating program.','','A',4,'',2.000,0),(1634,107,'The Meaning of Class\r',971,'Discusses the newly developed Custom Local Area Signaling Services (CLASS) system by AT&T Bell Labs and how it may affect us in the near future.','Very similar to second article in LOD/H link.','N',6,'CLASS: What It Means To Us',3.250,0),(1635,107,'Telecom Informer\r',972,'Discusses telecommunications industry related news items.','','N',8,'The Telecom Informer',1.000,0),(1636,107,'Phoning From Europe\r',973,'Discusses information about overseas telephone systems including England, Switzerland and Italy.','','N',9,'Phoning Home From Europe',1.500,0),(1637,107,'Telenet Guide\r',974,'Lists telenet directory last update 1/1/87.','','N',10,'Telenet Addresses',2.330,0),(1638,107,'Letters\r',15,'Dear 2600:','New Toys, Explain Yourselves, Need Blue Box Program, Access Still Unequal, Reaching Out, More on VAX.','N',12,'Put Letters Headline Here',3.230,0),(1639,107,'Fax Machines\r',701,'Discusses the facsimile (FAX) machine - what they are, how they work and ideas for getting one cheap, uses, etc.','','N',14,'FAX : A New Hobby',1.000,144),(1640,107,'Pen Register Review',2,'Discusses the Duophone CPA-1000 Dialed Number Recorder available at Radio Shack.','','N',22,'A Pen Register For Phreaks?',1.000,0),(1641,108,'Computel Put to Sleep\r',346,'Discusses an investigation of Computel (in Van Nuys, California) and the events and details surrounding their going out of business.','Thanks to John Williams for his help on this story.','N',4,'',2.000,0),(1642,108,'Hacking PC Pursuit\r',21,'Discusses PC Pursuit (PCP) a service provided by Telenet (a division of US Sprint) and some interesting ways to abuse it.','','N',6,'',2.000,141),(1643,108,'Telecom Informer\r',969,'Discusses telecommunications industry related news items.','','N',8,'The Telecom Informer',3.000,97),(1644,108,'CNA List\r',346,'Lists Customer Name Address (CNA) Numbers (used to find out who belongs to a phone number) with notes.','','N',10,'Customer Name Address (CNA) Numbers',4.000,0),(1645,108,'Letters\r',15,'Dear 2600:','Communication, Comments, French Loophole, Stuck on Busy, Praise, Criticism, Advice, A Warning, Coin Test, More Resources, In Reply.','N',12,'',3.750,0),(1646,108,'Goings On',346,'Discusses several current news items.','','N',16,'',4.000,0),(1647,109,'The Ballad of Captain Crunch\r',976,'A fictitious story about an imaginary person to whom the author has attributed a real person\'s name, written in a poetic format.','','N',4,'',3.750,0),(1648,109,'A Guide to Equal Access\r',977,'Discusses how to place long distance calls with the carrier of your choice in areas that are now equal access.','','N',6,'Getting the Most Out of Equal Access',3.000,93),(1649,109,'Telecom Informer\r',969,'Discusses telecommunications industry related news items.','','N',8,'The Telecom Informer',1.000,0),(1650,109,'The Wonderful World of COSMOS\r',978,'Discusses COSMOS, a database program used by various telephone companies to keep track of central office facilities.','','N',10,'Still More on the World of COSMOS',6.250,0),(1651,109,'Letters',15,'Dear 2600:','An Envelope Please, Comments..., And More Comments..., An Experience to Share, Words of Agreement, Words of Caution, A Response, More on ICN.','N',12,'Printable Letters',4.000,0),(1652,110,'Hugo Cornwall Interview\r',924,'An interview with Hugo Cornwall, a British hacker/author.','','N',4,'An Interview with Hugo Cornwall',3.660,0),(1653,110,'COSMOS Guide\r',979,'Discusses the operation and use of the COmputer System for Mainframe Operations (COSMOS) system (used by some telephone companies) and is meant as an introduction.','','N',6,'Some COSMOS Documentation That May be Useful',4.000,0),(1654,110,'Telecom Informer\r',969,'Discusses telecommunications industry related news items.','','N',8,'The Telecom Informer',2.000,91),(1655,110,'Nasty Business\r',346,'Reprints various letters received from telephone and long distance carrier companies.','More Nasty Business on page 17.','N',10,'',2.000,0),(1656,110,'Letters\r',15,'Dear 2600:','Some Suggestions, Some Numbers, On Cellular Phones, ANI Trouble.','N',12,'',2.000,0),(1657,110,'New Developments\r',346,'Discusses several ways (touch tone access, gold numbers, Personal Response System) the phone company is riping off customers.','','N',18,'',1.000,0),(1658,110,'Phone News',346,'Article not in this issue, page 20 is part of the COSMOS article.','','N',20,'',1.000,0),(1659,111,'TAP: The Legend is Dead\r',21,'Discusses the history of the Technological American Party/Technological Assistance Program (TAP) and why the author let TAP die.','','N',4,'',4.500,0),(1660,111,'VMS Hacking\r',982,'Discusses some tips on taking over a VMS system, including two routes to take and tips for breaking onto a VAX.','','N',6,'Stumbling Into Control on a VMS',2.000,129),(1661,111,'Telecom Informer\r',969,'Discusses telecommunications industry related news items.','','N',8,'The Telecom Informer',1.000,0),(1662,111,'Illegal Megahertz\r',346,'Lists cell site output frequencies.','','N',10,'',3.000,0),(1663,111,'Letters\r',15,'Dear 2600:','Beepers, GTE Telcos, Preacher Hams, Student Restrictions, An Acronym Maker, More TAP Woes.','N',12,'',2.000,0),(1664,111,'Phone News',346,'Discusses how few of us see the possibilities when we look at our telephones and talks about what is really there and available today.','','N',20,'Phones',2.000,89),(1665,112,'A Look at the Future Phreaking World\r',984,'Discusses a non-technical explanation of the newest in mobile telephone communications, the cellular telephone.','','N',1,'Cellular Telephones - How They Work',1.000,85),(1666,112,'How Cellular Phones Came About and What You Can Expect\r',346,'Discusses a bit of the history of cellular communications, how the cellular system works and cost.','','N',2,'',0.500,0),(1667,112,'things we\'re not supposed to know about\r',979,'Discusses the Captain Midnight episode and how law enforcement has access/purchase surveillance equipment that is actually illegal to use.','','N',2,'',0.500,0),(1668,112,'2600 \"LAST\".....\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',3,'',1.000,0),(1669,112,'LetterPile\r',15,'Dear 2600:','','N',1,'',1.250,0),(1670,112,'The 2600 Information Bureau\r',346,'Contains a list of all the remote mail sites known to the message system.','','N',5,'',2.250,0),(1671,112,'Systematically Spoken',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1672,113,'ICN - more than a bargain',972,'Discusses Independent Communications Network (ICN) and details of its service which supposedly allows you to make all the call you want for $100 a month.','And Emmanuel Goldstein.','N',1,'',1.330,173),(1673,113,'Mastering the Networks\r',985,'Discusses the diverse networks including ARPAnet, BITNET, CSnet, Mailnet, UUCP network and their gateways.','','N',2,'',1.330,148),(1674,113,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',1,'',1.000,0),(1675,113,'Letters You Wrote\r',15,'Dear 2600:','','N',4,'',1.500,0),(1676,113,'The 2600 Information Bureau\r',346,'List British BBS numbers and prints a cartoon.','','N',5,'',1.000,0),(1677,113,'Wrath of God Strikes 2600\r',346,'Discusses the effects of a lightening strike on the 2600 offices and it\'s aftermath.','','N',6,'',0.500,161),(1678,113,'Systematically Speaking',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1679,114,'Death of a Pay Phone\r',986,'Discusses various methods of taking advantage of and screwing up pay phones (AT&T and GTE between 1982-1985).','MAD! members: Mr. COSMOS, The Commodore Kid, Death-Stalker and The Gremlin.','N',1,'',1.500,0),(1680,114,'Trashing: America\'s Source for Information\r',987,'Discusses some of the items found in the local telephone companies\' garbage bins.','','N',1,'',0.500,0),(1681,114,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',3,'',1.000,0),(1682,114,'October letter department\r',15,'Dear 2600:','','N',4,'',2.000,0),(1683,114,'The 2600 Information Bureau\r',346,'List various telephone numbers.','','N',5,'',0.500,0),(1684,114,'Playing a tune for a telephone number\r',346,'Reprint of a Bell Telephone Laboratories add announcing touch tone dialing.','','N',6,'',1.000,0),(1685,114,'Systematically Speaking',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1686,115,'Some Facts on Supervision\r',988,'Discusses answer supervision - the telco term for the signal sent back to indicate the call has been answered and billing should commence.','References November 1985 \"Equal Access May Not be \"Equal\" to Modems\" ..','N',1,'',0.500,0),(1687,115,'RCI & DMS-100 Bugs\r',346,'Discusses the infamous 202 bug and how RCI is the only long distance company it still works on.','','N',1,'',0.750,0),(1688,115,'Another Stinger Is Stung\r',346,'Discusses a \"sting\" bulletin board system run by Mike Wendland of WDIV-TV in Detroit.','','N',2,'',1.000,0),(1689,115,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',3,'',1.000,0),(1690,115,'Letters & Numbers\r',15,'Dear 2600:','','N',4,'',1.500,0),(1691,115,'The 2600 Information Bureau\r',346,'Interesting telephone number of Winnipeg.','','N',5,'',1.500,0),(1692,115,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1693,116,'Knowing UNIX\r',988,'Discusses how to hack and use UNIX, includes a C program to send email with a fake From account.','','A',1,'',1.250,0),(1694,116,'A Trip to England\r',924,'Discusses details about the telephone system in the United Kingdom based on the author\'s spending time there.','','N',2,'',1.000,0),(1695,116,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',3,'',1.000,0),(1696,116,'Letters of the Month\r',15,'Dear 2600:','','N',4,'',1.250,0),(1697,116,'The 2600 Information Bureau\r',346,'Lists interesting phone numbers, displays phone card instructions and lists area codes and the number of exchanges being used in each one.','','N',5,'',2.000,0),(1698,116,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1699,117,'Violating a VAX\r',989,'Discusses DEC VAX/VMS systems and some methods, including scripts and programs to take advantage of them.','','A',1,'',1.500,0),(1700,117,'The Free Phones of Philly\r',990,'Discusses a method of obtaining free long distance calls courtesy of Bell of Pennsylvania.','','N',2,'',0.500,0),(1701,117,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',3,'',1.000,0),(1702,117,'Dear 2600....\r',15,'Dear 2600:','','N',4,'',1.250,0),(1703,117,'The 2600 Information Bureau\r',346,'List all country codes in numerical order, info from Telcom Digest via Private Sector.','','N',5,'',1.500,0),(1704,117,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1705,118,'Computer Crime Review\r',346,'Discusses the National Center for Computer Crime Data\'s (NCCCD) first statistical report entitled \"Computer Crime, Computer Security, and Computer Ethics\".','','N',1,'',1.000,0),(1706,118,'How to Hack a Pick\r',346,'Discusses the Pick operating system, some suggestions for gaining access, some useful commands including ones to crash and disable the system.','References the September/October 1984 issues of Byte magazine.','N',2,'',0.750,0),(1707,118,'Nothing New in Computer Underground\r',924,'Discusses \"The Computer Underground\" by M. Harry published by Loompanics Unlimited.','','N',1,'',0.250,0),(1708,118,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',3,'',1.000,0),(1709,118,'Letters of the Month\r',15,'Dear 2600:','','N',4,'',1.500,0),(1710,118,'The 2600 Information Bureau\r',346,'List interesting phone numbers, a cartoon and resources from the \"Computer Crime, Computer Security, Computer Ethics\" report.','','N',5,'',1.750,0),(1711,118,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1712,119,'Exploits in Operator Hell\r',991,'Discusses some telephone calls made by the author and fellow phone enthusiasts and their conversations with long distance operators.','','N',1,'',1.000,0),(1713,119,'The Computel Scoop\r',346,'Discusses 2600\'s investigation into Computel (a \"hacker\" magazine) after receiving numerous complaints about them.','','N',2,'',1.000,0),(1714,119,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',3,'',1.000,0),(1715,119,'Letters, Communications, Correspondence\r',15,'Dear 2600:','','N',4,'',1.250,0),(1716,119,'The 2600 Information Bureau\r',346,'Lists local exchanges and their Autovon equivalents and a cartoon.','','N',5,'',1.500,0),(1717,119,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1718,120,'RSTS For Beginners\r',968,'Discusses the Resource System Time Sharing Environment (RSTS/E) operating system on DEC PDP series computers including the basics of identifying, obtaining entry, and things to do once you have access.','','N',1,'',1.000,127),(1719,120,'Mobile Phones - Theory and Construction\r',992,'Discusses the operation and construction of a mobile phone, including signaling used in Improved Mobile Telephone Service (IMTS), building, the transmitter, placing a call and security.','','N',2,'',1.330,0),(1720,120,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',3,'',1.000,0),(1721,120,'Letters...More Mail From You...\r',15,'Dear 2600:','','N',4,'',0.750,0),(1722,120,'A Story of Eavesdropping\r',346,'Discusses the monitoring of international radio-telephone channels and telephone security during World War II.','','N',5,'',0.750,0),(1723,120,'This Month at 2600\r',346,'Discusses the Private Sector BBS and two transcripts of proceedings to obtain search warrants for computers related to that case.','','N',6,'',1.250,0),(1724,120,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1725,121,'An Overview of AUTOVON and Silver Boxes\r',346,'Discusses the AUTOmatic VOice Network (AUTOVON) used for unsecure voice communications by the Department of Defense (DOD) and how to access it.','','N',1,'',1.000,30),(1726,121,'An American Express Phone Story\r',990,'Discusses the story of hacking American Express\'s toll-free charge card authorization computer.','','N',1,'',0.500,18),(1727,121,'Final Words on VMS\r',947,'Discusses details of Digital Equipment Corporation\'s (DEC) Virtual Memory System (VMS) operating system.','Last of the current series, see February 1986 ..','N',1,'',1.000,0),(1728,121,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',3,'',1.000,0),(1729,121,'Mail We Get\r',15,'Dear 2600:','','N',4,'',1.250,0),(1730,121,'This Month At 2600\r',346,'Discusses events of interest at the 2600 office.','','N',6,'',0.660,0),(1731,121,'2013664431 - Call It!\r',346,'Discusses the Private Sector BBS being back online and details of what has happened since the July seizure.','','N',6,'',0.330,0),(1732,121,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1733,122,'VMS - The Series Continues\r',947,'Discusses details of Digital Equipment Corporation\'s (DEC) Virtual Memory System (VMS) operating system including the VAX-11 series computers.','Follow-up article in March 1986 ..','N',1,'',1.000,0),(1734,122,'It Could Happen to You!\r',346,'Discusses a bizarre story unfolding in New York City of one hacker tormenting another with the phone system.','','N',2,'',0.500,0),(1735,122,'Dial Back Security\r',346,'Discusses a computer security device often referred to as being foolproof - the dial back system - and some suggestions on how to circumvent it.','','N',2,'',0.750,0),(1736,122,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',3,'',1.000,0),(1737,122,'This Month\'s Mail\r',15,'Dear 2600:','','N',4,'',1.250,0),(1738,122,'The 2600 Information Bureau\r',346,'List of interesting phone number (available on the 2600 subscriber bulletin board) and a cartoon.','','N',5,'',2.000,0),(1739,122,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1740,123,'Private Sector Returning\r',346,'Discusses the Private Sector bulletin board system (the official BBS of 2600 Magazine) that was seized by New Jersey authorities on July 12, 1985, gives details of the case and promises it\'s return.','','N',1,'',1.500,194),(1741,123,'The Basics: Divestiture: What Happened?\r',346,'Discusses how the break up of the telephone company has given phreaks new toys to play with and new ways of doing things.','','N',2,'Divestiture: What Happened? ',1.500,82),(1742,123,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',3,'',1.000,0),(1743,123,'Notes From You\r',15,'Dear 2600:','','N',4,'',1.000,0),(1744,123,'The 2600 Information Bureau\r',993,'Lists blue box programs for the Texas Instrument 99/4(a), Commodore 64 and Atari.','','A',5,'',2.000,0),(1745,123,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1746,124,'Our Wishes for \'86 and Beyond\r',346,'Discusses how the things around us can improve, assembles a few 2600 writers who suggest how technology can better serve everyone.','','N',1,'',1.250,139),(1747,124,'Fun With COSMOS\r',947,'Discusses the COmputerized System for Mainframe OperationS (COSMOS), which is a telephone company computer system for wire center administration for subscriber services.','','N',2,'',1.000,0),(1748,124,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',3,'',1.000,0),(1749,124,'Survey Results\r',346,'Discusses the results of the 2600 survey and prints a bunch of user comments.','','N',4,'',1.330,0),(1750,124,'The 2600 Information Bureau\r',346,'Prints an extensive list of over 1500 bulletin board numbers.','','N',5,'',2.000,0),(1751,124,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1752,125,'RSTS: A Trick or Two\r',968,'Discusses some aspects of the Resource System Time Sharing (RSTS) operating system on DEC PDP-11 series computers that are quite popular.','See more in April 1986 article ..','A',1,'',0.750,0),(1753,125,'Here\'s the Secret!\r',994,'Discusses the GTD#5 switch made by Automatic Electric and the ability to make free calls thru it\'s toll-free loops.','','N',1,'',0.250,0),(1754,125,'The History of ESS\r',947,'Discusses the greatest development effort in Bell System\'s history - the Electronic Switching System (ESS).','References February 1984 article ..','N',2,'',0.500,0),(1755,125,'Equal Access May Not be \"Equal\" to Modems\r',995,'Discusses how some long distance carriers start charging after 30 seconds whether the call is completed or not and how that could affect modem owners.','','N',2,'',0.250,0),(1756,125,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various sources.','N',3,'',1.000,0),(1757,125,'Letters\r',15,'Dear 2600:','','N',4,'',1.000,0),(1758,125,'The 2600 Information Bureau\r',995,'Lists test phone numbers.','','N',5,'',2.000,0),(1759,125,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1760,125,'The Early Phreak Days',996,'Discusses the author\'s job at the phone company and his idea on \"deadheading\" calls (sounds like red boxing) which his boss told him to keep quiet about.','','N',8,'',0.500,44),(1761,126,'And They Call Us Crooks?\r',994,'Discusses how phone companies can\'t be trusted, from the author\'s experience of people contacting them with flaws that were costing them thousands of dollars and getting nothing in return.','','N',1,'',0.660,0),(1762,126,'An Interesting Diversion\r',980,'Discusses diverters (a form of call forwarding), how they\'re used, how to find them, other forms of diverters and the dangers of diverting.','','N',1,'',0.750,60),(1763,126,'More Info on VMS\r',947,'Discusses the Virtual Memory operating System (VMS) by Digital Equipment Corp. (DEC) including user authorization, accounting, logging off and shutting the system down.','Second installment, see first in September 1985 ..','N',2,'',1.250,0),(1764,126,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1765,126,'Dear 2600\r',15,'Dear 2600:','','N',4,'',1.000,0),(1766,126,'The 2600 Information Bureau\r',993,'Discusses plans for a blue box, including schematic and parts list.','','N',4,'',1.000,0),(1767,126,'The New AT&T HOSTAGEPHONE System\r',346,'Displays an AT&T add for the Hostagephone telephone - only $1850.','','N',5,'',1.000,0),(1768,126,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1769,127,'A Guide to VMS\r',947,'Discusses the Virtual Memory operating System (VMS) by Digital Equipment Corp. (DEC) including Entrance, default passwords and directories.','See second installment in October 1985 ..','N',1,'',1.000,0),(1770,127,'The Infinity Transmitter - An Old Bug That Had Its Time\r',997,'Discusses the infinity transmitter - a bugging device that allows you to call the phone it is in and listen to what is going on around that phone.','','N',2,'',0.500,0),(1771,127,'Reaching Out On Your Own\r',998,'Discusses verification - a telco secret that allows you to listen in on a telephone number for thirty seconds if you have a simple descrambler from Radio Shack.','','N',2,'',0.250,0),(1772,127,'Pursuit For People\r',346,'Discuss a GTE Telnet service call PC Pursuit that allows you to connect your computer to any other computer (eg BBS) without paying long distance phone charges.','','N',2,'',1.250,164),(1773,127,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1774,127,'Dear 2600\r',15,'Dear 2600:','','N',4,'',1.000,0),(1775,127,'The 2600 Information Bureau\r',947,'Lists the Telnet Directory revision #2, last update 08/20/85.','','N',5,'',2.000,0),(1776,127,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1777,128,'Seized! 2600 Bulletin Board is Implicated in Raid on Jersey Hackers\r',346,'Discuss the July 12, 1985 seizure by law enforcement officials of the Private Sector BBS - the official bulletin board of 2600 magazine.','','N',1,'Seized',2.500,184),(1778,128,'Commentary: The Threat To Us All\r',346,'Discusses the Private Sector bulletin board system, the misconceptions about it\'s use and the issues like freedom of speech and public assembly it represents.','','N',2,'The Threat To Us All ',1.000,187),(1779,128,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','2600 News Service','N',3,'2600 A Hacking Victim',0.500,170),(1780,128,'Moving Satellites Right Up in the Blue......What Was Really Going On?\r',346,'Discusses the ridiculous charges and misinterpretations coming out of the Middlesex County Prosecutor\'s Office press conference concerning the Private Sector BBS seizure.','With the aid of The Shadow.','N',4,'What Was Really Going On? ',2.000,189),(1781,128,'Why Computers Get Snatched\r',346,'Discusses how hacker and BBS computer systems are confiscated as a punishment and warning to others and a method of inducing confessions, rather than dragging kids through court with the difficulty of obtaining convictions.','','N',6,'',0.500,0),(1782,128,'Some Important Questions To Ask\r',346,'Discusses some of the legal issues surrounding a BBS and computer communications and some of the legislation being proposed to regulate them.','','N',6,'',0.500,0),(1783,128,'How Can Sysops Protect Themselves?',346,'Discusses a few suggestions to Bulletin Board System (BBS) operators to lessen the odds of a raid and to thwart the investigators before they get into confidential material.','','N',7,'',1.000,192),(1784,129,'Interesting Things To Do On A DEC-20\r\n',999,'Discusses the Digital Equipment Corporation (DEC) model 20 computer system and gives tips on logging in, terminal setup and useful commands.','','N',1,'',1.250,125),(1785,129,'Banking From Your Terminal - A Look At PRONTO\r',1000,'Discusses Chemical Bank\'s PRONTO, one of the older and more varied electronic banking services used via personal computer and modem available in the New York City area.','','N',2,'',1.000,162),(1786,129,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1787,129,'Letters\r',15,'Dear 2600:','','N',4,'',1.000,0),(1788,129,'The 2600 Information Bureau\r',346,'List MILNET TAC dialups sorted by location as of 22-Jan-85.','','N',5,'',2.000,0),(1789,129,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1790,130,'A Guide to the Israeli Phone System\r',346,'Discusses details and information about the telephones and phone system used in Israel.','','N',1,'',1.250,0),(1791,130,'Sherwood Forest Shut Down by Secret Service\r',346,'Discusses the shutdown of the Sherwood Forest bulletin board system (BBS) by the Secret Service (SS).','Subtitled \"An All Too Familiar Story\".','N',2,'',0.330,197),(1792,130,'Some Words on Hacker Morality\r',346,'Discusses the authors view that hacking and phreaking have turned towards criminality rather than for the challenge and having fun.','','N',2,'',0.500,0),(1793,130,'Out of the Inner Circle - A Review\r',346,'Discusses the book \"Out of the Inner Circle, A Hacker\'s Guide to Computer Security\" by \"The Cracker\" Bill Landreth published by Microsoft Press.','','N',2,'',1.000,0),(1794,130,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1795,130,'The 2600 Information Bureau\r',1001,'List of 800 prefixes in order by state.','Posted on The Private Sector.','N',5,'',1.000,0),(1796,130,'Systematically Speaking\r',346,'Discusses several current news items.','Various Sources.','N',7,'',1.000,0),(1797,131,'People Express to be Hacked to Pieces\r',1002,'Discusses the Tone Activated Service (TAS) offered by People Express for booking airline tickets and how it can be abused.','','N',1,'',1.125,166),(1798,131,'How to Run a Successful Teleconference\r',995,'Discusses the teleconferencing service run by Alliance (owned by AT&T Communications) including telephone numbers, controls, dangers, stunts, other conferences and conclusion.','','N',2,'',2.125,76),(1799,131,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1800,131,'Letters\r',15,'Dear 2600:','','N',4,'',1.250,0),(1801,131,'The 2600 Information Bureau\r',346,'Displays computer posture info, ALLIANCE Teleconferencing Services info, phone number and an ad for inmate collect only service.','','N',5,'',1.750,0),(1802,132,'What a White Box Can Do\r',346,'Discusses how to take a standard touch tone keypad and convert it to a portable unit.','','N',1,'',0.660,0),(1803,132,'A Phone Phreak Scores\r',346,'Discusses another story to add to the annals of social engineering, a method of obtaining the telephone billing address of a company.','','N',1,'',0.330,16),(1804,132,'Hacking Packard\r',1003,'Discusses details about Hewlett-Packard\'s HP2000 systems including login procedure, users, library organization, group/system masters, commands and programs.','','N',2,'',1.000,0),(1805,132,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1806,132,'The 2600 Information Bureau\r',346,'Lists ARPANET addresses including host name, host address and site address.','References June 1984 \"ARPANET Hopping: America\'s Newest Pastime\" ..','N',5,'',2.000,0),(1807,133,'Nazi BBS a Challenge to Hackers\r',346,'Discusses a Bulletin Board System (BBS) run by the American Nazis.','','N',1,'',0.500,0),(1808,133,'Are You a Phreak?\r',1004,'Discusses the \"various levels of the phone kingdom\" by giving names to types of phreaks based on their activities.','','N',1,'',0.500,0),(1809,133,'How to Get Into a C.O.\r',988,'Discusses how the author arranged a tour of a local Central Office (CO), some facts learned from it and suggestions for setting up your own.','','N',2,'',1.000,52),(1810,133,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1811,133,'This Month\'s Letters\r',15,'Dear 2600:','','N',4,'',1.000,0),(1812,133,'The 2600 Information Bureau\r',346,'Lists interesting phone numbers, How to Use the Dial Telephone, lists CN/A Bureaus and info about the Cipher Disk.','','N',5,'',2.000,0),(1813,134,'The Theory of \'Blue Boxing\'\r',1003,'Discusses and explains the fundamental principles of the fine art of blue boxing.','Subtitled \"their history, how they\'re used, their future\". Taken from Basic Telecommunications Part VII.','N',1,'',1.000,27),(1814,134,'Trashing Alaska Style\r',1005,'Discusses the author and his buddies adventures while going thru the local Central Office\'s (CO) dumpster.','','N',2,'',0.330,17),(1815,134,'Surveying the COSMOS\r',1006,'Discusses Bell\'s Computerized System for Mainframe Operations (COSMOS) including the basic, pertinent info on how users get in, account format, and a few other goodies.','','N',2,'',0.660,58),(1816,134,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1817,134,'Letters From You\r',15,'Dear 2600:','','N',4,'',1.000,0),(1818,134,'The 2600 Information Bureau\r',995,'List of acronyms mostly from Bell and AT&T documents collected from trashing.','','N',5,'',2.000,0),(1819,135,'Those Horrible Hackers Strike Again\r',346,'Discusses how a Newsweek reporter, Richard Sanzda, was harassed with a flury of hacking and phreaking after he wrote a semi-revealing article.','','N',1,'',0.330,0),(1820,135,'Wiretapping and Divestiture\r',995,'Discusses the amount of information that can be learned from speaking with the local telephone company worker.','Subtitled \"A Lineman Speaks Out\".','N',1,'',0.660,0),(1821,135,'Getting in the Back Door\r',1007,'Discusses information about the four popular operating systems on Digital Equipment Corporation (DEC) machines: TOPS-10, TOPS-20, UNIX and VMS.','Subtitled \"A Guide to Some Popular Operating Systems\".','N',2,'',1.000,0),(1822,135,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1823,135,'Letters to Us\r',15,'Dear 2600:','','N',4,'',1.000,0),(1824,135,'The 2600 Information Bureau\r',346,'Display a New York Telephone bill, pay phone card, Zippy, The Happy Hacker and BITnet topology Summer 1984. ','','N',5,'',2.000,0),(1825,136,'A Time For Reflection\r',346,'Discusses 1984, and though it won\'t go down in history as the year of the phone phreak and hacker the author feels it should.','','N',1,'',0.500,215),(1826,136,'MCI Mail EasyLink\r',346,'Discusses the problems many people have been having with E-Mail using MCI Mail and Western Union Easylink.','','N',1,'',1.000,0),(1828,136,'The Scariest Number in the World\r',346,'Discusses the author\'s discovery of a phone number beginning with 804-840 that turns out to be the President\'s bomb shelter.','','N',2,'',0.500,8),(1829,136,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1830,136,'Letters\r',15,'Dear 2600:','','N',4,'',1.000,0),(1831,136,'2600 page 5',346,'Lists electronic mail systems and voice messaging systems.','','N',5,'',1.000,0),(1832,136,'Reach Out and Goose Someone\r',1008,'Lists sources of entertainment from your phone culled from telephone directories in the English-speaking world.','Subtitled \"Hours of pleasure from your Telephone\".','N',6,'',1.000,0),(1833,137,'Exploring Caves in Travelnet\r',346,'Discusses the author\'s discovery of an interesting phone number and his exploration of the Travelnet system at General Motors.','','N',1,'',1.000,73),(1834,137,'Fun With Fortress Fones\r',1003,'Discusses the standard Western Electric single-shot coin telephone (aka fortress fone) including depositing coins, TSPS and ACTS, Green Boxes, Physical Attack, Miscellaneous and Security.','Excerpted from Basic Telecommunications Part VI.','N',2,'',1.000,0),(1835,137,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1836,137,'Letters From All Over\r',15,'Dear 2600:','','N',4,'',1.000,0),(1837,137,'2600 page 5',346,'Alphabetical listing of ICs and Carrier Identification Codes (CICs) and a information about letter 2600 received from MCI.','','N',5,'',2.000,0),(1838,138,'Getting Caught: Hacker\'s View\r',346,'Discusses the author\'s experience after being arrested by the FBI for hacking and how he found out who his real friends were and the ways it changed his life.','','N',1,'',1.000,213),(1839,138,'Vital Ingredients Switching Centers and Operators\r',1003,'Discusses the different classes of Central Offices and the different kinds of telephone operators with a discussion of some of the more common ones.','Taken from Basic Telecommunications Part IV.','N',2,'',1.000,45),(1840,138,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1841,138,'Letters From The Outside World\r',15,'Dear 2600:','','N',4,'',1.000,0),(1842,138,'2600 page 5\r',1003,'Contains an MCI news item, lists various security telephone numbers and miscellaneous telephone slogans and ads.','','N',5,'',2.000,0),(1843,139,'History of British Phreaking\r',947,'Discusses some of the history and details of phreaking in Britain including the frequencies for blue boxing.','','N',1,'',1.000,0),(1844,139,'More on Trashing\r',988,'Discusses how inspection of your local Telco offices trash can reveal a wealth of documents of interest to a telecommunications hobbyist, includes tips to get the most out of your effort.','and The Shadow.','N',2,'',1.000,0),(1845,139,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1846,139,'A Friend in High Places\r',346,'Discusses the story of Joanne, the telephone operator in a small, rural, Midwestern community who was also a phone phreak.','','N',4,'',0.500,55),(1847,139,'Letters From The Outside\r',15,'Dear 2600:','','N',4,'',0.500,0),(1848,139,'2600 page 5',346,'Lists IBM \'ADS DIRECTORY\', DOD hot line info and a New York Telephone letter concerning use of Touch Tone Service without paying for it.','','N',5,'',2.000,0),(1849,140,'But How Does It Work?',346,'Discusses how a telephone works, including wiring, voltages, how they\'re built, how they work and ringing.','','N',1,'',1.000,24),(1850,140,'Privacy Lost\r',346,'Discusses the book \"The Rise of the Computer State\" by David Burnham with foreword by Walter Cronkite published by Vantage Books.','','N',2,'',1.000,0),(1851,140,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1852,140,'Reader Feedback\r',15,'Dear 2600:','','N',4,'',0.660,0),(1853,140,'2600 page 5',346,'Lists telephone numbers (with area code), lists area codes and space for coding them according to the specified legend.','','N',5,'',2.000,0),(1854,141,'\"Look Out, He\'s Got a Computer!\"\r',346,'Discusses the ignorance of people concerning computers and the irony of the fact that the most idiotic people are the ones with the power to regulate them, includes details of some of the legislation proposed.','','N',1,'',1.000,211),(1855,141,'MCI Mail: The Adventure Continues\r',346,'Discusses MCI Mail, compares it to the US Postal Service and details some of the problems encountered using it.','','N',2,'',1.000,159),(1856,141,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1857,141,'Introducing the Clear Box\r',346,'Discusses a new device called the \"clear box\" that can be used on \"post-pay\" (eg where you pay after the call is connected) pay phones and allows you to bypass the cut off mouthpiece.','','N',3,'',0.250,32),(1858,141,'Letters From Our Readers\r',15,'Dear 2600:','','N',4,'',0.750,0),(1859,141,'2600 page 5',346,'Discusses TRW Information Services America\'s largest credit reporting company and gives detailed information about using their online system including an example listing.','','N',5,'',2.000,0),(1860,142,'ARPANET Hopping: America\'s Newest Pastime\r',346,'Discuss the Advanced Research projects Agency Network (ARPANET) including what it is, how it works and safety tips and interesting programs.','Precursor to the Internet.','N',1,'',1.000,145),(1861,142,'Electronic Switching Advances\r',346,'Discusses Electronic Switching Systems (ESS) and some of the advantages and interesting things it can do along with some of it\'s problems.','Subtitle \"Despite Obvious Drawbacks, ESS Has Quite a Few Nice Features\".','N',2,'',1.000,0),(1862,142,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources. Only the section titled \"2600 Writer Indicted\" is included in the 2600 book.','N',3,'',1.000,73),(1863,142,'The Dark and Tragic Side of the Great Break-up\r',346,'Discusses the \"Ma Bell\" divestiture and the current confusion and lack of service from the local and long distance telephone companies.','','N',4,'',0.500,71),(1864,142,'Letters From Our Readers\r',15,'Dear 2600:','','N',4,'',0.500,0),(1865,142,'2600 page 5',346,'Lists E-COM (a USPS service) subscriber phone numbers and a copy of a letter from New York Telephone (with specifics obfuscated) you\'ll receive if law enforcement is monitoring your phone line.','','N',5,'',2.000,0),(1866,143,'The Simple Pleasures of a Step Office\r',346,'Discusses the few step offices left in the United States today, including ease and safety of phreaking, more tricks and different varieties.','','N',1,'',1.000,49),(1867,143,'IBM\'s Audio Distribution Systems Sure Can Be Fun!\r',346,'Discusses the IBM Audio Distribution System (ADS), a voice mail system that has been very useful to phreakers, includes details of operation and how IBM has tried to secure it.','','N',2,'',1.000,69),(1868,143,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1869,143,'The Woes of Having a Small-Time Rural Phone Company\r',346,'Discusses the author\'s experiences with his rural telephone company and how it makes Ma Bell actually look good.','','N',4,'',1.000,56),(1870,143,'2600 page 5',346,'List of networks currently available on the Defense Data Network including base address and list of Easylink modem numbers.','','N',5,'',2.000,0),(1871,144,'Whose Strike Was That Anyway?\r',346,'Discusses the American Telephone and Telegraph (AT&T) strike by the Communications Workers of America in August 1983 with an interesting analysis of the results.','','N',1,'',1.000,0),(1872,144,'The Trouble With Telemail\r',346,'Discusses Telemail, the electronic email service of GTE Telenet, and how easy it still is to access as it was last year, prior to the October raids on computer owners who had allegedly broken into the system.','Subtitled \"GTE is practically inviting intrusions, and odds are they\'ll get plenty\'.','N',2,'',1.000,122),(1873,144,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1874,144,'A True Saga of Teleconferencing\r',1009,'Discusses some of what was said on various teleconferences, some mischief that ensued and the resulting FBI and Bell Security visits.','','N',4,'',1.000,11),(1875,144,'2600 page 5',346,'Lists MCI access numbers, various telephone company cartoons, ads and public service announcements.','','N',5,'',2.000,0),(1876,145,'The Constitution of a Hacker\r',346,'Discusses some of the common traits and characteristics of a hacker and the rationale and philosophy behind it.','','N',1,'',1.000,209),(1877,145,'Alternate Long Distance\r',346,'Discusses how some of the long distance telephone companies work in general with a specific look at Microwave Communications Inc. (MCI).','Subtitled \"First of a persistent series - how the companies work and a guide to MCI.','N',2,'',1.250,66),(1878,145,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1879,145,'The First Atomic Bomb\r',346,'Discusses the first test of an atomic bomb in Alamogordo, New Mexico in July, 1945 as related by Laura Fermi, wife of Enrico Fermi, who were both there.','Subtitled \"A True Tale\".','N',4,'',0.750,5),(1880,145,'2600 page 5',346,'Lists host, address, computer type and operating system of computers on the MILNET (Military Network) which is a subnet of ARPANet.','','N',5,'',2.000,0),(1881,146,'Hacking On Telenet\r',346,'Discusses GTE\'s Telenet data network and details how the connection works so you could write a program to scan for computers on the network.','Subtitled \"It\'s as easy as 123456\".','N',1,'',1.000,121),(1882,146,'ESS: Orwell\'s Prophecy\r',346,'Discusses Electronic Switching System (ESS), a new Bell technology in the central office, and why phreakers need to be careful.','','N',2,'',1.000,0),(1883,146,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1884,146,'Some Thoughts on \"Garbage Picking\"\r',346,'Discusses the art of finding things that someone else has thrown away from computers to real life.','','N',3,'',0.750,0),(1885,146,'Q&A\r',346,'Answers the following question: How does the operator find out if you ar calling from a fone booth or house fone? Is there any way to defeat this?','','N',4,'',0.250,0),(1886,146,'2600 page 5',346,'Lists country telephone codes.','','N',5,'',2.000,0),(1887,147,'Ahoy!\r',346,'Discusses the motives and goals that the publication of 2600 hopes to achieve.','Subtitled \"(That\'s how Alexander Graham Bell used to answer his phone. For some reason, it never caught on...)\".','N',1,'',1.000,22),(1888,147,'FBI Goes After ADS Hackers\r',346,'Discusses details about a group of hackers using IBM\'s Audio Distribution System (ADS) who found out one of them was an informant for the FBI.','Subtitled \"IBM must press charges before action can be taken - Feds reveal their tactics, blow source\".','N',4,'',2.000,181),(1889,147,'2600 \"FLASH\"......\r',346,'Discusses telecommunications industry related news items.','Various Sources.','N',3,'',1.000,0),(1890,147,'The Truth Behind Those 9999 Numbers\r',1010,'Discusses the series of 800 numbers starting with 9 and followed by the suffix 9999 with details on some of the more interesting ones.','','N',4,'',1.000,9),(1891,147,'2600 page 5',346,'Lists telephone numbers for the Offices of the President, Counselor to the President, Chief of Staff, Deputy Chief of Staff and Offices of the Vice President.','','N',5,'',1.000,0),(1892,93,'A Review of \"The \'Top Secret\' Registry of U.S. Government Radio Frequencies\"',952,'Discusses \"The \'Top Secret\' Registry of U.S. Government Radio Frequencies\" published by CRB Research, lists a couple of interesting frequencies.','Not in index.','N',7,'',1.000,0),(1894,103,'CT36 TechNote Ge006 Decrypting password security',960,'Discusses how to locate and decrypt the user-ID and password of the master security officer on an IBM System/36.','Not in the index.','N',14,'',2.000,0),(1895,31,'Movie Reviews : The Net, Hackers',963,'Discusses a review of the United Artists movie \'Hackers\' starring Jonny Lee Miller, Angelina Jolie and Fisher Stevens.','Shared index entry with The Net ..','N',52,'\"Baby... You\'re Elite\"',2.000,243),(1896,104,'The Cold Truth',346,'A Poem.','Not in the index.','N',20,'',1.000,0),(1897,108,'Who, What, and Where in Communications Security',975,'Discusses Who, What, and Where in Communications Security, 1986 Product Profiles published by Marketing Consultants International, Inc.','Not in index.','N',21,'',0.250,0),(1898,110,'Book Review 1',975,'Discusses \"The Hacker\'s Handbook\" by Hugo Cornwall published by the E. Arthur Brown Company.','Not in index.','N',15,'',0.500,0),(1899,110,'Book Review 2',980,'Discusses \"Automatic Teller Machines III\" by John J. Williams, MSEE published by Consumertronics Co.','Not in index.','N',21,'',1.250,0),(1900,111,'Evolution of the Telephone',346,'Comics of different periods in the history of the telephone.','Not in the index.','N',9,'',1.000,0),(1901,119,'We\'ve Dug Up Some Alternate Ways to Phreak on Alternate Long Distance',346,'Discusses details and step by step instructions for boxing on ITT, Sprint and SBS/Skyline.','','N',6,'',1.000,0),(1902,130,'Letters and Questions',15,'Dear 2600:','','N',4,'',1.000,0),(1903,132,'All Kinds of Letters',15,'Dear 2600:','','N',4,'',1.000,0),(1904,140,'Be Nice to Your Telco',346,'Discusses things to do to your telephone bill that will force the telephone company to have to process it manually.','','N',4,'',0.330,0),(1905,148,'Cloudy Skies',2,'Discusses cloud computing and how any new technology has advantages and disadvantages, details a few of them and reminds readers to always take them into account before implementing.','','N',4,'',2.000,0),(1906,148,'Insecurities in Emergency Rescue',97,'Discusses medical records security at fire departments, focusing on the EMS 2000 application used by many firefighters/emergency personnel and a number of potential methods for gaining access to it\'s data.','','N',6,'',2.000,0),(1907,148,'AJAX Hacking for the Discerning Pro Wrestling Fanatic',1011,'Discusses a pro wrestling web site at PWInsider and how the author\'s script to circumvent the sites Adblock detection allows free access to the Elite content.','','A',8,'',1.500,0),(1908,148,'A Little Fish in a Big Pond',1012,'Discusses the author\'s new 3G router and how it was configured from the provider with the the last four digits of the SSID matching the WPA key and details the ease with which it was cracked.','','A',9,'',2.500,0),(1909,148,'The Grey Hat Manifesto',1013,'Discusses some of the author\'s experiences with a bully from school and some of the methods he\'s used to get back at that person.','','N',12,'',1.000,0),(1910,148,'TELECOM INFORMER',7,'Discusses information about the Tracfone mobile service (marketed under four brands), including a method of checking voicemail for free and making virtually unlimited long distance calls to over 60 countries.','','N',13,'',2.000,0),(1911,148,'No Sale for You!',1014,'Discusses the \"shopper\'s card\" issued by numerous grocery chain stores (eg. Kroger, Ralphs, Tom Thumb, CVS etc) and some of the issues these cards present.','','N',15,'',1.660,0),(1912,148,'CrazyGeorge - Security Through Obscurity',1015,'Discusses a simple method of password protecting web site pages by using the password in the path part of the URL.','','A',16,'',2.330,0),(1913,148,'BartPE: A Portable Microsoft Windows',27,'Discusses BartPE, a portable version of Windows that can be booted and run from a memory stick, including installation, plugins, building, installing to USB drive and troubleshooting.','','N',19,'',2.000,0),(1914,148,'Influential Angles',1016,'Discusses when the author worked for a debt collection/investigation company and describes several incidents that happened over six years ago with names/addresses etc changed to protect the guilty.','','N',21,'',5.000,0),(1915,148,'HACKER PERSPECTIVE: Bill From RNOC',978,'Discusses how the author became involved in phreaking, hacking and social engineering and relating some of the handles and incidents that occurred.','','N',26,'',3.000,0),(1916,148,'The Hacker Enigma: Positives, Negatives and Who Knows?',1017,'Discusses some of the positive and negative effects of \"being found out\", eg. three real world examples of doing something hack worthy and how different types of people reacted to them.','','N',29,'',1.500,0),(1917,148,'An Introduction to CSRF Attacks',95,'Discusses cross site request forgery (CSRF) attacks with an actual vulnerability in a real website (now patched) and a working proof of concept that steals account credentials.','Where is the source? news.php?','N',30,'',1.500,0),(1918,148,'The Voyager Library Information System',1018,'Discusses the Voyager Library Information System by Endeavor corporation of Chicago, Illinois. Details some of the data stored in the database including info about any searches made.','','N',32,'Voyager Library Information System',1.000,0),(1919,148,'\'Print Me?\' Why, Thank You!',234,'Discusses the PrintMe service by Electronics for Imaging (EFI) and notes some interesting uses and abuses when using this software.','','N',33,'',1.000,0),(1920,148,'My First Hack',1019,'Discusses the author\'s first phreaking/hacking experiences back in 1972 at Gunn High in Palo Alto.','','N',46,'',1.500,0),(1921,148,'Dr. Jekyll and Mr. PayPass',1020,'Discusses the new Citizens Bank PayPass debit card and the author\'s attempt to disable the RFID technology it uses (without success though it ends well).','','N',47,'',2.500,0),(1922,148,'Writing a Small Port Checker in C in 40 Lines (or Less)',1017,'Discusses the c source code for a small single port single host port check program with a Perl wrapper to scan many ports.','','A',50,'',1.500,0),(1923,148,'Procurve Switch Hacking',1021,'Discusses Hewlett Packard Procurve switches and gives details of the commands to get at it\'s true OS/Diagnostic level and some suggestions for what to do there.','','N',51,'',0.500,0),(1924,148,'TRANSMISSIONS',23,'Discusses some of the downsides of DRM e-books including no loaning, no resell, no anonymity, hardware lock-in, format decay, remote and invisible censorship.','Subtitled \'Why I Like Print (or \"E-books Can Go to Hell\")\'.','N',52,'',1.625,0),(1925,148,'Bluetooth Hacking Primer',121,'Discusses Bluetooth, originally conceived by Ericsson in 1994, and gives the reader information on how it works, what you can do with it and the risks associated with it.','','N',54,'',5.000,0),(1926,148,'Simple How-to on Wireless and Windows Cracking, Part 2',505,'Discusses some incomplete descriptions and updates to the information in the previous article along with responses to comments. Includes a bash script to create a wordlist for aircrack.','Subtitled \'(or Simple How-to on Wireless and Windows Cracking\' Part 2). References part one in Summer 2009 ..','A',59,'',2.000,0),(1927,148,'HACKER HAPPENINGS',346,'List of upcoming events.','','N',61,'',1.000,0),(1928,148,'Speak',15,'Dear 2600:','Inquiries, Meetings, A Way Out, Suggestions, Gratitude, Observations, Telephone Tidbits, Help Needed, More Info.','N',34,'',12.000,0),(1929,149,'The Hacker Dialogue',2,'Discusses the latest 2600 book (Dear Hacker) and the letters section has typically been the largest and most popular section of 2600. Discusses the importance of dialogue and how the magazine, the Internet, the Hope conference has facilitated it between hackers and between people in the \"real world\".','','N',4,'',2.000,0),(1930,149,'Hacking Google Analytics',1023,'Discusses Google Analytics, how it tracks users using Javascript and cookies and how to prevent tracking and/or send bogus information. Questions whether Google should be trusted with your analytics data.','','A',6,'',2.000,0),(1931,149,'My Second Implant',82,'A story about getting a vocal and hearing implant so the author could communicate thru bluetooth devices without a headset or microphone, though it turns out the implants had a transmitter that was used for spying on him.','','N',8,'',2.500,0),(1932,149,'Free Encrypted 3G Web Access on T-Mobile Smartphones',1024,'Discusses a couple of methods for obtaining free data usage on T-Mobile\'s 3G network. Author used a pre-paid plain with no data subscription on a G1 Android phone.','References T-Mobile article in 26:4 (..)','N',11,'',1.000,0),(1933,149,'Why Cell May Die in a Modern Hacker\'s World',1025,'Discusses a method of using wifi networks to make calls with your cell phone to avoid expensive service fees.','','N',12,'',1.000,0),(1934,149,'TELECOM INFORMER',7,'Discusses the author\'s temporary work assignment in Bejing, China and details some of the issues he had setting up cell/voip phone service.','','N',13,'',2.000,0),(1935,149,'Call the World for Free',1026,'Discusses Universal International Freefone Numbers (UIFNs), including behind the scenes, billing, where to use and what you can do with them.','','N',15,'Call the World for Free (on someone else\'s nickel) with Universal International Freefone Service',2.250,0),(1936,149,'How to Create Mass Hysteria on a College Campus Using Facebook',1027,'Discusses how the author abused Facebook to obtain thousands of students info from UCSD (University of San Diego), created fake profiles, got hundreds of friends and used bots to affect opinions when a racial incident occurred.','','N',18,'',1.000,0),(1937,149,'Educational Wireless Honeypots',1028,'Discusses detailed steps, configuration files and information for creating your own honeypot and introduces a new use for them in the public sphere.','','A',19,'',5.000,0),(1938,149,'I\'m Not a Number',93,'Discusses how the convergence of three systems in the modern supermarket produces the conditions for two exploits (which are both dishonest and crimes).','','N',24,'',1.330,0),(1939,149,'How I Scored the Avaya PBX Init Password',1029,'Discusses how the author stumbled upon the init level (ie. deepest level) password during training for the Avaya Interaction Center PBX software.','','N',25,'',0.660,0),(1940,149,'Why You Need a Grimoire',350,'Discusses maintaining a notebook containing all of the important IT information you\'ve accumulated over the years and why you would want to do this.','','N',27,'',1.000,0),(1941,149,'(Potential) Laptop Recovery',1030,'Discusses the author\'s laptop security/recovery solution so if his laptop is stolen he can view the on board video cam and remote control the computer.','','N',28,'',1.000,0),(1942,149,'Hacking Boingo Wireless',1031,'Discusses how the author stumbled across a hack of Boingo Wireless (a service provider for many hotels/airports/shops/etc) hotspots to gain free Internet access.','','N',29,'Access on Boingo Wireless',2.000,0),(1943,149,'How AT&T Data Plans Work (and How to Make Them Stop Working)',1032,'Discusses how to not get charged by AT&T Wireless for a data package you don\'t want and other Service Order Codes (SOCs) that might be of interest.','','N',31,'',1.000,0),(1944,149,'Casual Encounters of the Third Kind: A Bayesian Classifier for Craigslist',1033,'Discusses a scientific examination of the Craigslist Casual Encounters w4m section in the Omaha, Nebraska location using Bayesian classification to determine the spam.','','N',32,'',2.000,0),(1945,149,'Outline for a Simple Darkserver and/or Darknet',1034,'Discusses how government/employer monitoring invades our privacy and covers a few methods for setting up a darknet, not set by step instructions but the general outline.','','N',46,'',2.330,0),(1946,149,'Goog411 Skype Hack',1035,'Discusses how to make phone calls thru Skype using Goog411 without purchasing/using SkypeOut minutes.','','N',48,'',0.660,0),(1947,149,'Hacking Autodialer Telephone Access Systems',319,'Discusses a method of making free telephone calls using a Mircom intercom system which is commonly used in apartment and office buildings for access control. Suggests other possibilities.','','N',49,'',1.000,0),(1948,149,'TRANSMISSIONS',23,'Discusses the controversy surrounding Google\'s collecting wireless network data alongside Street View.','','N',52,'',1.500,0),(1949,149,'Written in Spam',1036,'Discusses the spam the author received after disabling his spam filter and presents nine poems \"Written In Spam\" using words included at the bottom of those spam emails.','','N',54,'',1.250,0),(1950,149,'Roll-your-own Automated System Restore Discs',1037,'Discusses a method of creating a system restore disk using PING (Partimage Is Not Ghost) which is a bootable Linux system to backup and restore disk partitions.','','A',55,'',1.750,0),(1951,149,'Grazing Voicemail Passwords',1038,'Discusses password security for PBX systems and presents an analysis of actual voice mail passwords gathered from several thousand live phone systems which happen to store the password in plain text.','','N',57,'',2.000,0),(1952,149,'Private Key Exchange Using Quantum Physics',1039,'Discusses how the BB84 protocol functions - this is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984.','','N',59,'',1.000,0),(1953,149,'How to Overwrite JUNOS Proprietary Code',62,'Discusses Juniper devices that run JUNOS and teaches you how to break into that code in order to insert your own algorithms.','Examples performed on a Juniper M120 device.','A',60,'',1.000,0),(1954,149,'HACKER HAPPENINGS',346,'List of upcoming events.','','N',61,'',1.000,0),(1955,149,'Letters',15,'Dear 2600:','Discoveries, Beating the System, Inquiring Minds, On Grammar, Contributions, Ignorance, Random Meeting Notes, Further Comments, The Publishing World.','N',34,'Textual Feedback',12.000,0),(1956,150,'Conflict in the Hacker World',2,'Discusses the Wikileaks/Julian Assange - Bradley Manning - Adrian Lamo controversy, how it affected the Next HOPE conference and some lessons to be learned from it.','','N',4,'',2.000,0),(1957,150,'Read All About It! Online Security and Paid Newspaper Content',1040,'Discusses on-line newspaper content and how companies are starting to charge for access to it, details the steps the author took to gain free access to the London Times archive after the free trial period was over.','','N',6,'',2.500,0),(1958,150,'Old School Hacking',1041,'Discusses the author\'s early programming and hacking experiences, names and places have been changed to protect the innocent (guilty?).','','N',8,'',3.000,0),(1959,150,'How I Learned to Stop Worrying and Spam the Scammers',1042,'Discusses how a friend was scammed out of his Steam account username/password via an IM phish and describes how he responded by writing a program to flood the phishing web site with bogus data.','','N',11,'Step 1. Steal Accounts, Step 2. ?, Step 3. Profit! (or how I learned to stop worring and spam the scammers)',1.500,0),(1960,150,'TELECOM INFORMER',7,'Discusses the mobile phone carriers, market and plans available in Beijing, China (where the author is helping to install a new central office).','','N',13,'',2.000,0),(1961,150,'Forgeries, Branding, and Network Theory in the Digital Playground',62,'Discusses a method and campaign checklist to devalue a targeted brand, includes examples in three different categories - content, technical and social.','','N',15,'Editing the Brand Images: Forgeries, Branding, and Network Theory in the Digital Playground Page Title ',8.000,0),(1962,150,'SPAM Simplified',297,'Discusses the mysterious and hidden world of SPAM, including botnets, irc, spoofing, methods of connecting to the Internet, bulk e-mail tools and the spam signature.','','N',19,'',3.500,0),(1963,150,'Hacking Out',1043,'Discusses Internet content filtering and web site blocking and various techniques used by the author to get around these restrictions.','','N',22,'',1.500,0),(1964,150,'Man in the Middle Attack',1044,'Discusses one method of performing a man in the middle attack using the Backtrack operating system, test example performed on an SSL connection.','','N',24,'',1.660,0),(1965,150,'HACKER PERSPECTIVE',5,'Discusses the author\'s life experiences and journey, his youthful wish to be a hacker and his realization that he has always been one.','','N',26,'',4.000,0),(1966,150,'IPv6 Connection Hijacking and Scanning',1045,'Discusses background information about IPv6 and details of how to redirect a user\'s connection to an arbitrary location and perform a practical network scan with it.','','N',29,'',2.000,0),(1967,150,'Gmail and SMS Gateway Fun',1046,'Discusses the SMS gateway and gives detailed instructions and a bash script for using it to perform an SMS denial of service.','','A',31,'',1.000,0),(1968,150,'Moving from Robotics to Artificial Intelligence',1047,'Discusses the history of robotics and the dream of incorporating artificial intelligence with it.','Recommended reading: Robotics A Reference Guide to the New Technology; The Emotion Machine Commonsense Thinking, Artificial Intelligence, and the Future of the Human Mind; Robots The Quest for Living Machines.','N',32,'',2.000,0),(1969,150,'Seven Things \'Hackers\' Did Right',54,'Discusses what the 1995 movie Hackers got right as we approach it\'s 15th anniversary.','','N',50,'',1.000,0),(1970,150,'Life Without Walls: Circumventing Your Home Security System',1048,'Discusses how the author\'s parents installed a home security alarm system so he wouldn\'t sneak out to see his girlfriend and the process it used to circumvent it.','','N',51,'',1.000,0),(1971,150,'TRANSMISSIONS',23,'Discusses the jailbreak vulnerability on the iPhone and how smart phones in general are ripe for these types of attacks.','','N',52,'',1.660,0),(1972,150,'How to Turn Local Admin into Domain Admin',286,'Discusses a simple method of using the provided batch file to potentially obtain domain access to a Windows network.','','N',54,'',2.000,0),(1973,150,'Panasonic Phreaking in the New Age',1049,'Discusses the Panasonic VMbox PBX and details a method of abusing it to make phone calls.','','N',56,'',1.250,0),(1974,150,'Hacking and Securing the Tandberg C20',1050,'Discusses the Tandberg C20, a hi-def video conferencing solution, and it\'s utter lack of security, details how you could remotely eavesdrop on it and makes recommendations for securing it.','','N',58,'',3.000,0),(1975,150,'HACKER HAPPENINGS',346,'List of upcoming events.','','N',61,'',1.000,0),(1976,150,'LETTERS',15,'Dear 2600:','Ideas, Feedback, Continuation, Observations, Concerns, Inquiries, 2600 to the Rescue.','N',34,'Material for the Next Book',1.000,0),(1977,151,'Changing Landscapes',2,'Discusses 2600\'s first steps into the world of electronic publishing, some of the hurdles and circumstances unique to 2600 and the hope that people will respect what 2600 is doing and not take advantage of it.','','N',4,'',2.000,0),(1978,151,'Bash Bash Bash!',725,'Discusses the author\'s love for the bash shell, includes example uses and scripts with line by line descriptions.','Author recommends the following O\'Reilly books: \"Unix Shell Programming (In a Nutshell)\", \"Bash Cookbook: Solutions and Examples for Bash Users\" and \"Classic Shell Scripting\".','N',6,'you@host:~$ # Bash Bash Bash!',2.500,0),(1979,151,'How to Cheat at Foursquare',1051,'Discusses how to abuse the Foursquare application by modifying the Foursquarefox Firefox extension to prompt you for latitude and longitude so you can spoof your location.','','A',9,'',1.500,0),(1980,151,'The (Obvious?) Dangers of Free WiFi',1052,'Discusses free public WiFi hotspots and how they can be used for man in the middle attacks, gives Linux commands and instructions for implementing an attack and provides some suggestions for protecting yourself.','','N',10,'',1.500,0),(1981,151,'The Buck Stops Here: Inside AT&T\'s Tier 2 Tech Support',1053,'Discusses the author\'s experience as a Tier 2 Tech Rep for AT&T Mobility, including the lack of technical knowledge needed and the pressure to sell new features to customers.','References article \"How AT&T Data Plans Work\" (..)','N',12,'',1.000,0),(1982,151,'TELECOM INFORMER',7,'Discusses the mobile phone carriers, market and network in Japan and how once a leader in high-tech telecommunications the system is aging and no longer leading edge.','','N',13,'',2.000,0),(1983,151,'Various Vulnerabilities in the UPS Shipping System',423,'Discusses several methods of taking advantage of United Parcel Service (UPS) shipping services.','','N',15,'',4.000,0),(1984,151,'Ode to the United States Postal Service',5,'Discusses the author\'s use of the United States Postal Service (USPS) \"General Delivery\" service which can be used to protect your real address or if you are homeless, and some of the issues and problems he had with it.','','N',20,'Ode to the United States Postal Service, Privacy, and Bureaucracy',2.000,0),(1985,151,'Android, You Broke My Heart',1054,'Discusses the author\'s new Android cell phone and how he stumbled upon a huge gaping security hole in the 1.6 version OS that could leak phone data to anyone with access to the phone.','','N',22,'',2.330,0),(1986,151,'Corporate Reconnaisance for the Anti-Social',1052,'Discusses various methods of gathering as much contact information and personal data about as many employees of a company/business as possible.','','N',24,'',1.660,0),(1987,151,'HACKER PERSPECTIVE',1055,'Discusses a \"pushing 70\" year old hacker\'s recollection of some the memorable experiences in his life.','','N',26,'The Hacker Perspective',3.000,0),(1988,151,'Anti-Satellite (ASAT) System for Dumbasses',1056,'Discusses how to set up a telescope with lasers and/or microwave to interfere with spy satellites, includes references.','See \'Detecting and Tracking Stealth Satellites\' (..)','N',29,'',1.000,0),(1989,151,'The Trouble with the \'Digital\' Music Industry',1057,'Discusses some of the author\'s problems with downloadable music and how he got some MP3s from Amazon for free.','','N',30,'The Trouble with the \"Digital\" Music Industry (And How to Beat Ity At Its Own Game)',2.000,0),(1990,151,'Invisible ASCII: A Poor Person\'s Steganography',1058,'Discusses the author\'s discovery of a simple steganography and cipher that uses ASCII art in MS-DOS.','','N',32,'Invisible ASCII: Using An ASCII Glitch To Create A Poor Person\'s Steganography',2.000,0),(1991,151,'EMR Interception and the Future of Computer Hacking',1059,'Discusses Electromagnetic Radiation Interception (EMR), what it is, advice on how to stop it and how to get involved in EMR hacking.','','N',46,'Tuning In: EMR Interception: What is is, how it works, and what it means for the future of computer use and hacking',1.330,0),(1992,151,'The Joy of IPv6',735,'Discusses IPv6 including why you need it, how to get started with it quickly and easily and a few tips on hacking it.','The book \"IPv6 Security\" by Scott Hogg and Eric Vyncke is recommended by experts.','N',48,'',2.500,0),(1993,151,'Dormitory Phishing',346,'Discusses a Facebook incident and the author\'s plan to phish the instigator out.','','N',50,'',0.500,0),(1994,151,'How to Find Information on People Using the Internet',1060,'Discusses several methods for finding information on someone through the Internet.','','N',51,'',1.000,0),(1995,151,'TRANSMISSIONS',23,'Discusses how the Immigrations and Customs Enforcement (ICE) agency in the Department of Homeland Security of the United States has the ability to seize domain names of sites it believes are copyright infringing and how this is a slippery slope to censorship.','','N',52,'',2.000,0),(1996,151,'Phun with FOIA',1061,'Discusses the Freedom of Information Act (FOIA), including it\'s history, how it works, links containing successful requests and a sample FOIA letter.','','N',54,'',2.000,0),(1997,151,'iBahn Hotel Site Kiosks and How to Pwn One',1062,'Discusses how to circumvent the restrictions on the iBAHN hotel computer kiosk which the author found at a Best Western in the UK.','','N',56,'',1.330,0),(1998,151,'RAM Dumping',97,'Discusses the steps and tools useful for acquiring memory dumps from your Windows computer.','','N',57,'',1.660,0),(1999,151,'Who\'s Got Your Vote?',1063,'Discusses how signing a petition with a second address can change your voter registration in Maryland and the potential for abuse in this system.','','N',59,'',1.000,0),(2000,151,'Vulnerabilities in Quantum Computers',1064,'Discusses quantum computers including qubits operation, what they\'re useful for and a proposed architecture called quantum random access machine (QRAM).','','N',60,'',1.000,0),(2001,151,'HACKER HAPPENINGS',346,'List of upcoming events.','','N',61,'',1.000,0),(2002,144,'Letters',15,'Dear 2600:','Query, Spreading the Word, Coincidences?, Exciting Offers, Another Query or Two, Policy, Critique, Still More Grammar, Infiltration, Fighting the Power, Yet Another Couple of Queries, Addendum, Advice Sought, Challenges, The Last of the Queries.','N',34,'Discussion Time',12.660,0),(2003,152,'A World Spinning',2,'Discusses recent world events in the middle east and how WikiLeaks and the truth are playing a role in them. Argues that exposing authoritarian abuses can bring about positive change and notes the parallels to hackers exposing security flaws.','','N',4,'',2.000,0),(2004,152,'Password (In)security?',1066,'Discusses the author\'s analysis of user passwords obtained from multiple websites and presents some statistics regarding the quality of passwords used.','','N',6,'',2.500,0),(2005,152,'Password Bypassing and Clearing',97,'Discusses several methods of gaining control of a Windows and/or Linux computer that you have physical access to.','','N',8,'',1.500,0),(2006,152,'How Good is Geolocation?',1067,'Discusses what geolocation is, how it typically works, how the accuracy can be pretty poor and that it can be spoofed.','','N',10,'',3.000,0),(2007,152,'TELECOM INFORMER',7,'Discusses how the author is helping to implement number portability in the Bejing Central Office being constructed and gives details of how it functions in the United States.','','N',13,'',2.000,0),(2008,152,'Why I Like E-Books',1068,'Discusses six disadvantages (with counter arguments) regarding e-books and then some additional advantages.','References \"Transmissions\" article in 27:1 (..)','N',16,'',1.330,0),(2009,152,'What is a Hacker?',1069,'Discusses what the author believes a hacker is and recounts some stories from his past to illustrate it.','','N',16,'',0.660,0),(2010,152,'Who is Anonymous or How to Troll the Media for Fun and Profit',62,'Discusses the media hype surrounding Anonymous and details what is actually happening.','','N',17,'',1.000,0),(2011,152,'How to Accept Payments Anonymously - A Digital Currency Guide',1070,'Discusses the options available to conceal your identity and buy or sell something without anyone knowing who you are. Details valid reasons for this and makes recommendations for the best anonymous payment choices.','','N',18,'',2.330,0),(2012,152,'How to Find Out What the Government Knows About You',68,'Discusses and gives advice about writing Freedom of Information Act (FOIA) letters and lists addresses of some U.S. agencies you may want to send your request to.','','N',20,'',1.660,0),(2013,152,'Bypassing Javascript Timers or How I Learned to Stop Waiting and Love the Variable',1071,'Discusses how Rapidshare (and similar sites like Megaupload/Deposit Files) typically program the wait before download function on their web sites and how to circumvent this.','','A',22,'',1.250,0),(2014,152,'Remote Login Made Easy',739,'Discusses a method of using free versions of software to get remote access to your machines behind a NAT router/firewall.','','N',23,'',0.750,0),(2015,152,'Two Party Covert Communication Over MSN Messenger System Using Emoticons',1072,'Discusses a method of covert channel communications using the emoticons used in MSN Messenger instant messaging.','','N',24,'',1.000,0),(2016,152,'Virtual Anti-Forensics',1073,'Discusses a method of having a file temporarily on you computer without leaving a forensic trace.','References \"USB Antiforensics\" in 25:3 (..)','N',25,'',1.000,0),(2017,152,'HACKER PERSPECTIVE',1074,'Discusses some hacker stereotypes, how her computer experience evolved over the years and her definition of a hacker.','','N',26,'',2.000,0),(2018,152,'Secrets of the Spider',1075,'Discusses the author\'s spider.pl Perl program that reads a file of urls and crawls them looking for links. It isn\'t clear what the author intended to do with these as he has removed the \"weapon code\".','','A',29,'',3.000,0),(2019,152,'The Lessons Learned on a Training Site',97,'Discusses the methods the author used to find vulnerabilities in his companies new training web site.','','N',32,'',1.000,0),(2020,152,'Writing Bots for Modern Websites',1076,'Discusses how writing web crawling/spider/manipulating code is difficult with modern web sites using so much Javascript and presents a tool to circumvent these issues.','','A',33,'',1.000,0),(2021,152,'Where Have All Our Secrets Gone?',1077,'Discusses privacy in the present day technological world.','','N',47,'',1.660,0),(2022,152,'LDAP Directory Servers: TMI!',350,'Discusses a method of obtaining passwords from LDAP directory servers by dumping the change log.','','N',49,'',1.000,0),(2023,152,'Computers: With and Without',1078,'Discusses several scenarios in the computer-related world and how it would map to a non-computer situation.','','N',50,'',1.000,0),(2024,152,'Automatic Usage of Free Wi-Fi',1079,'Discusses a bash script to automatically find and use open Wi-Fi connections for free Internet access.','','A',51,'',1.000,0),(2025,152,'TRANSMISSIONS',23,'Discusses a new tool for Bluetooth sniffing, wireless keyboard sniffing and how hardware hacking is getting cheap enough for anyone to get into.','','N',52,'',2.000,0),(2026,152,'Coding Bots and Hacking Wordpress',1080,'Discusses PHP and Javascript code that automatically loads web pages, submits forms, and does sinister stuff, while looking like it\'s human.','','A',54,'',6.250,0),(2027,152,'Abusing the Cloud',1081,'Discusses a method of using someone else\'s account when connecting to The Cloud\'s public wifi network.','','N',60,'',0.750,0),(2028,152,'HACKER HAPPENINGS',346,'List of upcoming events.','','N',61,'',1.000,0),(2029,152,'Non-Verbiage',15,'Dear 2600:','Gratitude, Fun Facts, Letters from Prison, Addendum, Feedback, Queries, On WikiLeaks, Wanted, Discoveries, Grammer Words, Advice.','N',34,'',13.330,0),(2030,153,'Progress Report',2,'Discusses the ongoing saga of providing 2600 issues in electronic format, including Amazon/kindle and the annual PDF format.','','N',2,'',2.000,0),(2031,153,'Dealing with Credit Card Companies',158,'Discusses lessons learned when the author had to assume control of his mother\'s affairs and change her credit card accounts address.','','N',6,'Dealing with Credit Card Companies - Lessons Learned from an Illness',1.660,0),(2032,153,'Detecting and Tracking Stealth Satellites',1056,'Discusses how the author detects and tracks low observable stealth/spy satellites, lists the equipment he uses and includes references.','References article \'Anti-Satellite (ASAT) System for Dumbasses\' (..)','N',7,'ASAT for Dumbasses: Part Two - Detecting and Tracking Stealth Satellites',1.330,0),(2033,153,'Pen Testing from a Mile Away',1082,'Discusses how to build a WiFi satellite dish to greatly extend your WiFi receiving range, includes parts list and pictures.','','N',9,'',2.000,0),(2034,153,'Securing Online Voting',1083,'Discusses the author\'s experiences creating websites for competitions that allow users to vote for a winner. Include an overview of methods and a case study.','','N',11,'',2.000,0),(2035,153,'TELECOM INFORMER',7,'Discusses the telecommunications system in North and South Korea, the adoption of smartphones, mobile payments and fiber Internet service to the home.','','N',13,'',2.000,0),(2036,153,'Mobile Hacking with Android',121,'Discusses some Android applications of interest to hackers (and criminals alike) and details a proof of concept man in the middle attack.','','N',15,'',5.500,0),(2037,153,'How I Escaped Google',1084,'Discusses open source applications that can be used instead of proprietary web based services, one example is Crystal Mail/Roundcube instead of GMail.','Requires a web host and recommends a static IP with SSL certificate.','N',20,'How I Escaped Google (and other web based services)',1.500,0),(2038,153,'Add a User with Root Privileges Non-Interactively',1085,'Discusses two methods to add a user that mirror\'s root\'s privileges in a non-interactive *nix environment.','','N',22,'',1.330,0),(2039,153,'Simple RSA Encryption',1086,'Discusses how to encrypt and decrypt a simple message using the RSA public key cryptosystem by hand.','','N',23,'Simple RSA Encryption or Human-Calculable Encryption',1.660,0),(2040,153,'Booze, Nosiness, and City Terminals',1087,'Discusses some public information terminals in a city in southern Germany using the mcOne4all content management system and how the author obtained the admin interface.','','N',25,'',1.000,0),(2041,153,'HACKER PERSPECTIVE',1088,'Discusses the author\'s view that a hacker is someone with a need to know, who wants to blaze a new trail, make things better and share them, and hacking is asking why and what if and how, it is curiosity and perpetual discovery.','','N',26,'',2.000,0),(2042,153,'How to Protect Your Car from Radio Jammers',1089,'Discusses how a cheaply purchased radio jammer can prevent your car\'s remote from locking/unlocking the doors and warns you to be aware of this.','','N',28,'',1.000,0),(2043,153,'POCSAG and Radio Privacy',1090,'Discusses pager protocols and their inherent lack of security, details a system setup with examples, and reminds the reader this is probably illegal under U.S. law.','See article \'Intro to POCSAG/FLEX Interception\' (..)','N',29,'Air Intercepted Messaging: A Revisit of POCSAG and Radio Privacy',3.250,0),(2044,153,'Auditing the MiFi2200',1091,'Discusses a vulnerability in the MiFi2200 Mobile Hotspot used by Virgin Media that would allow temporary free anonymous Internet access.','','N',32,'',1.750,0),(2045,153,'Hiding the Hacker Instinct',629,'Discusses the author\'s curiosity about a door locking mechanism at work and how he was afraid to mention the flaw because he was sure he\'d get into trouble.','','N',47,'Hiding the Hacker Instinct: Or, No Oppressor Strategy Can Be More Successful Than Training the Oppressed to Oppress Himself/Hers',1.125,0),(2046,153,'Starting a Path to Modern Database Privacy',5,'Discusses how maintaining ones privacy these days is a daunting task and provides a starting point with a list of the largest data brokers and government privacy agencies.','','N',48,'',3.330,0),(2047,153,'TRANSMISSIONS',23,'Discusses the media frenzy surrounding \"cyberwar\" and describes that the real threats are infrastructure attacks like Vadaphone Greece and Stuxnet.','','N',52,'TRANSMISSIONS : \"Real Cyberwar\"',1.000,0),(2048,153,'A Brief Guide to Black Edition XP',1044,'Discusses the illegal Microsoft Windows XP Black Edition, which is XP stripped of useless components and pre-installed with a boatload of useful software and security enhancements.','References article \"Microsoft, Please Salt My Hash!\" (..)','N',54,'',2.000,0),(2049,153,'The Many Uses of SSH Tunnels',1093,'Discusses how to setup and use an ssh tunnel in Linux/Mac/Windows, including examples of what to use it for and why you would need to use it.','','N',56,'',2.000,0),(2050,153,'Senatorial Courtesy Plates - An Inside Look',423,'Discusses special license plates called \"Senatorial Courtesy Plates\" issued in New Jersey and some details of what they are and signify.','','N',58,'',1.000,0),(2051,153,'Fishing with Squid',1094,'Discusses how to setup the Squid proxy server, how to use it to see data leaking from your Internet use and to block (blacklist) ad servers.','','N',59,'',2.000,0),(2052,153,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2053,153,'Letters',15,'Dear 2600:','Reaching Out, New Stuff, Meetings, Clarifications, Electronic Publishing, Curiosity, Observations, Worries, Experiences, Questions, Wikileaks.','N',34,'Voice of the People',13.500,0),(2054,154,'Awakenings',2,'Discusses the groups Anonymous and the short lived LulzSec and how they\'ve politicized hacking with actions that can lead to full disclosure, pure mischief and justice.','','N',4,'',2.000,0),(2055,154,'Introduction to Chrome OS',121,'Discusses Google\'s Chrome OS based on GNU/Linux and the Chrome web browser that puts all it\'s applications and personal data in the \"Cloud\".','References article So... I Bought a Chromebook (..)','N',6,'',3.500,0),(2056,154,'Bypassing Shell Restrictions',1095,'Discusses the steps used by the author to circumvent the restrictions of a BusyBox shell on a Dell device.','','N',9,'',1.500,0),(2057,154,'Phishing on an iDevice',1039,'Discusses a proof of concept for turning your iDevice into a phishing device for gaining facebook.com account information.','','A',11,'',2.000,0),(2058,154,'TELECOM INFORMER',7,'Discusses Chinese phone etiquette concerning Caller ID, the dangers of relying on it and how easy, via multiple methods, Caller ID spoofing is.','','N',13,'',2.000,0),(2059,154,'Network Anonymity Through \'MAC Swapping\'',1096,'Discusses MAC addresses, how to harvest and spoof them (with tutorial) and presents a scheme for maintaining anonymity on a network that uses MAC addresses to authenticate and identify users.','','N',15,'',6.000,0),(2060,154,'Both Sides of the Story',93,'Discusses the police interview and presents a survival guide with four rules for anyone who might be questioned by law enforcement.','','N',21,'',2.000,0),(2061,154,'Video Game Hacking',1097,'Discusses game hacking (hardware and software), giving a brief overview on how and why games are hacked.','','N',23,'',1.500,0),(2062,154,'Hacking Alt Detection in Second Life',1098,'Discusses the alt-detecting security system zF RedZone and details of how it works including it\'s simple substitution cypher.','','N',24,'',1.500,0),(2063,154,'HACKER PERSPECTIVE',1099,'Discusses the authors adventures in exploring, programming and learning about computers.','','N',26,'',2.500,0),(2064,154,'How to Spoof Another User in MindAlign',1100,'Discusses the chat system call MindAlign and how the author figured out a method to impersonate another user in it.','','N',29,'',1.000,0),(2065,154,'Access Control: A Fancy Facade',1101,'Discusses access control systems, gives a basic overview of how they work and a common physical security flaw the many of them contain.','','N',30,'',2.500,0),(2066,154,'Go Daddy Shared Hosting Review',1102,'Discusses some of the vulnerabilities and security holes found in the Go Daddy shared hosting service.','','N',32,'',1.500,0),(2067,154,'Logging and Analysis with Your GPS-enabled Phone',1103,'Discusses some things you can do with the GPS coordinates from your cell phone (author uses an HP/Palm webOS phone).','','N',48,'',1.500,0),(2068,154,'Cellphone, Keys, Wallet? Check!',1104,'Discusses what happened when the author\'s phone was stolen and how T-Mobile wouldn\'t block the IMEI and SIM card and why.','','N',49,'',1.500,0),(2069,154,'Mobile Hacking: Really',1105,'Discusses running the Laika Linux OS image on an Android powered phone which gives you command line access to Hydra, Nmap, Metasploit, etc.','','N',51,'',1.000,0),(2070,154,'TRANSMISSIONS',23,'Discusses how little security has improved and in some cases actually gotten worse in the past 14 years of the Internet.','','N',52,'',1.000,0),(2071,154,'Asterisk, The Gatekeeper',1106,'Discusses a modification to an Asterisk system to automatically open the gate of a gated communities\' access control system for a specific phone number.','','N',54,'',1.000,0),(2072,154,'Wear a White Hat',735,'Discusses the recent incidents involving HBGary and Anonymous with the author questioning both groups ethics (or lack thereof).','','N',55,'',1.000,0),(2073,154,'How I Got Firefox to Accept the Tel Tag for Phone Calls',21,'Discusses how to modify Firefox so it accepts the tel: tag (which is like a mailto: tag but for phone numbers).','','N',56,'How I Got Firefox to Accept the Tel Tag and Place Phone Calls from Web Pages',1.330,0),(2074,154,'Fiction: Kill Switch',350,'Tells a story about how the U.S. government restricts Internet and wireless phone networks but are subverted by a group of amateur radio operators.','','N',57,'',3.660,0),(2075,154,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2076,154,'Letters',15,'Dear 2600','Writing for Us, More on Meetings, Information, Corporations, Digital 2600, Projects, Inquiries, Desperation, Random Thoughts, Retorts, Still More on Wikileaks.','N',34,'Utterances',14.000,0),(2077,155,'Movements',2,'Discusses events like the Arab Spring and Occupy Wall Street movement that used new technologies and social media to effect change and showed how individuals can be empowered and make a difference.','','N',4,'',2.000,0),(2078,155,'Google Temphptations',1107,'Discusses the .php~ problem and how this can be taken advantage of (with suggestions for remedying), shows how google may be used to find such sites.','','A',6,'',2.000,0),(2079,155,'Free Phone Numbers with Google Voice',1108,'Discusses Google Voice, what it is, setting it up, and how to disconnect it from a real phone number.','','N',8,'',1.000,0),(2080,155,'Abuse Reports Still Work',1109,'Discusses how many people think filing abuse reports is a waste of time, but the author contends this is not the case and provides tips and his own experiences to indicate otherwise.','','N',9,'',1.000,0),(2081,155,'MAC Spoofing Your Way to Free Internet',1110,'Discusses a method of gaining free access to pay-for-use wireless hotspots using a MAC spoofing technique that will work in OS X, Linux and Windows.','','N',10,'',1.000,0),(2082,155,'Hacking Refog Keylogger',1111,'Discusses the Refog Keylogger software program, what it is, how to detect it and to completely render the monitoring and invasion of privacy it is supposed to provide completely useless.','','N',11,'Hacking Refog Keylogger (Snoop Unto Others as Others Snoop Unto You)',2.000,0),(2083,155,'TELECOM INFORMER',7,'Discusses details of the land line and mobile phone telecommunication services in Palau (a former U.S. territory of small islands in the Pacific Ocean).','','N',13,'',1.660,0),(2084,155,'Who is Anonymous?',1077,'Discusses how the Anonymous group doesn\'t fit the good guy versus bad guy model and how the lack of a hierarchal structure empowers the individual.','','N',15,'',1.500,0),(2085,155,'Property Acquisition - For Free?',1120,'Discusses the author\'s experience as a Permanent Traveler (homeless) and how her boyfriends payment of her property tax switched the properties title.','','N',16,'',1.500,0),(2086,155,'Let\'s Feed the Phishes',1113,'Discusses a phishing attempt the author received and provides a Python script for posting bogus data to that phishing site. It could be modified for many such sites.','','A',18,'',2.000,0),(2087,155,'Bypassing Universal Studio\'s MP3 Security the EZ Way',129,'Discusses a method of removing copyright and DRM from Universal Pictures MP3 files.','','N',20,'',1.000,0),(2088,155,'Internal Denial of Service with Fork and Malloc Bombs',1073,'Discusses a simple c program to Denial of Service a host machine, requires a reverse shell/compromised system to implement.','','A',21,'',1.000,0),(2089,155,'Whitelisting with Gmail',1043,'Discusses a method of completely avoiding spam.','','N',22,'',1.000,0),(2090,155,'Eye Spy',1046,'Discusses the MobileChan phone app and the tools the author used to see what data it was sending.','','N',23,'',1.000,0),(2091,155,'How to Social Engineer Your Local Bank',214,'Discusses the \"daily authentication code\" system used by many banks and a method for obtaining it (used by the author during numerous pen tests).','','N',24,'',1.000,0),(2092,155,'Laptop Repair, Customer Beware',1114,'Discusses a major security hole in the ASUS Repair Status Inquiry on-line web application.','','N',25,'',1.000,0),(2093,155,'HACKER PERSPECTIVE',1117,'Discusses the author\'s first experiences running a BBS system, the difficulties security researchers face in disclosing system vulnerabilities in todays environment and her enthusiasm for the work and the community.','','N',26,'',2.660,0),(2094,155,'More Active Gamers Should Become Activist Hackers',1119,'Discusses the author\'s involvement in writing privacy software for activists and encourages hackers to get involved and help make change happen.','','N',29,'',1.000,0),(2095,155,'Simplex Locks: Illusion of Security, Version 2.0',1089,'Discusses a method to quickly bypass many models of the Simplex line of door locks.','','N',30,'',1.330,0),(2096,155,'Hacking Is in the Blood',1121,'Discusses the author\'s experiences with locks in high school and how that relates to hacking.','','N',31,'',0.660,0),(2097,155,'Support for Cable Providers? Why?',1122,'Discusses a couple of court cases brought by cable providers that have actually been beneficial to consumers and the average public.','','N',32,'',1.000,0),(2098,155,'Pre-Texting-R-Us',1123,'Discusses the author\'s work in collections and relates a couple of pretexts used to obtain information and find people.','','N',33,'',1.000,0),(2099,155,'Pirating the Caribbean',214,'Discusses how to set up an autorun CD with some suggestions on what to make it look like.','','N',48,'',1.000,0),(2100,155,'Perfect Encryption - Old Style!',98,'Discusses a very simple cipher and encryption scheme that is unbreakable and still used be people all over the world.','','N',49,'',2.000,0),(2101,155,'The Piracy Situation',1043,'Discusses piracy and some of the author\'s reasons for why it is not a good thing and urges the hacker community to actively advocate against it.','','N',51,'',1.000,0),(2102,155,'TRANSMISSIONS',23,'Discusses cell phone tracking including software like CarrirIQ, how and what information is collected and how the data collected may be sold to anyone (ostensibly for marketing).','','N',52,'',1.330,0),(2103,155,'Anonymity and the Internet in Canada',1130,'Discusses privacy destroying laws in danger of being passed in the Canadian House of Commons and some measures you can take to enhance your anonymous Internet Experience.','','N',54,' ',1.000,0),(2104,155,'Elegant Password Generation with Oplop',1131,'Discusses the author\'s system for managing account credentials and his use of the Oplop password hashing algorithm to create them.','','N',55,'',3.250,0),(2105,155,'Hacking the Winn-Dixie Survey',1132,'Discusses the meaning of the survey code at the bottom of Winn-Dixie receipts and the potential for abuse.','','N',58,'',0.750,0),(2106,155,'Switch',1133,'Discusses exploring the drainage pipes under Harbor Boulevard in Costa Mesa.','','N',59,'',2.000,0),(2107,155,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2108,155,'Letters',15,'Dear 2600:','Opportunity, Still More on Meetings, Postscripts, Wondering, Stories, Requests, Disclosure, Struggles, More Observations, DRM Issues, ','N',34,'General Assembly',14.000,0),(2109,156,'Game Changing',2,'Discusses SOPA (Stop Online Piracy Act), PIPA (Protect IP Act) and ACTA (Anti-Counterfeiting Trade Agreement), the ongoing efforts by corporations and those in power to control speech and art and the activism needed to prevent this from happening.','','N',4,'',2.000,0),(2110,156,'A PHP Rootkit Case Study',1134,'Discusses the author\'s analysis of a web server that had been infected with a virus, including examples of what he found and suggestions for remediation and prevention.','','A',6,'',2.000,0),(2111,156,'Denial of Service 2.0',1135,'Discusses traditional techniques used in DoS attacks as well as introducing some new theories on how to create DoS conditions on a network.','','N',8,'',2.000,0),(2112,156,'Spoofing MAC Addresses on Windows',1136,'Discusses a simple method of changing your MAC address on Windows systems and gives some reasons for why you might want to do this.','','N',10,'',2.000,0),(2113,156,'GroupMe: A Modern Approach to Social Engineering',1137,'Discusses a flaw in the GroupMe social networking application which potentially allows you to gain access to the groups messages so you can gather information for future social engineering attacks.','','N',12,'',1.000,0),(2114,156,'TELECOM INFORMER',7,'Discusses the lack of in-flight telephone service on Asian airlines and the history of in-flight telephone service in the United States.','','N',13,'',2.000,0),(2115,156,'Curiosity Killed the Cat',1138,'Discusses the author\'s nearly disastrous experience with finding and reporting a cross site scripting vulnerability at a large American university.','','N',15,'',1.500,0),(2116,156,'Stupid 9-Volt Tricks',244,'Discusses several interesting things you can do with a 9-volt battery.','','N',16,'',1.500,0),(2117,156,'So... I Bought a Chromebook',121,'Discusses some additional information about Google\'s Chrome OS and the Chromebook.','References article Introduction to Chrome OS (..)','N',18,'',2.000,0),(2118,156,'Hacking Giveaway of the Day',1139,'Discusses the Giveaway of the Day web site which gives away software every day and explains how to keep the programs and reinstall most of them.','','N',20,'Hacking Giveaway of the Day (GOTD)',1.250,0),(2119,156,'How to Avoid the Online Dating Scam',1140,'Discusses how the online dating sites (like eHarmony, Match and Chemistry) are free until you want to see the picture/profile of any matches and a method the author discovered to see them for free.','','N',21,'',1.500,0),(2120,156,'RTF... TOS',1141,'Discusses Terms of Service (TOS) and how important they are to read and understand and the ones that are easier to understand and are upfront will tell you something about the quality of the company writing it.','','N',23,'',2.330,0),(2121,156,'Domain and Security',1142,'Discusses how one domain name registrar manages account and domain information and how control of that data is basically control of the domain.','','N',25,'',0.660,0),(2122,156,'HACKER PERSPECTIVE',1037,'Discusses what the author believes is at the heart of being a hacker and how everyone is or has been a hacker at times.','','N',26,'The Hacker Perspective',2.500,0),(2123,156,'Towards a Hacker Friendly Mobile World',69,'Discusses some history and information about the current technology available for building your own mobile phone.','','N',29,'',2.000,0),(2124,156,'LinuxLive... Save Me',340,'Discusses a couple of options for setting up bootable thumb drives that have persistent so you can save information.','','N',31,'',1.000,0),(2125,156,'The Major Flaw of Pentesting',1122,'Discusses how pentesting by itself isn\'t enough, and as the weakest link in any network are the users, the author recommends social engineering pentesting/audits.','','N',32,'',1.000,0),(2126,156,'Free Music: The Quest for the MP3',1143,'Discusses the method the author uses for finding and getting MP3 music files.','','N',33,'',1.000,0),(2127,156,'An EMP Flash - It All Stops',1144,'Discusses EMP - Electro-Magnetic Pulse and speculates about the implementation and effects that weaponized versions of these could have on the United States.','','N',48,'',1.250,0),(2128,156,'Learning from Stratfor: Extracting a Salt from an MD5 Hash',45,'Discusses the Stratfor breach and how using the list of user names/encrypted passwords released was able to figure out the salt, which makes brute forcing all the passwords fairly easy.','','N',49,'',2.750,0),(2129,156,'TRANSMISSIONS',23,'Discusses the general trend towards locking down devices so you only run the code you\'re told you can run (ie. Apple, Intel TPM) and the need for a balance between security and fair use.','','N',52,'',1.330,0),(2130,156,'Control4 and Home Automation',1145,'Discusses Control4 home automation, how it works, being creative with it and the author\'s personal fears of the potential abuses.','','N',54,'',1.330,0),(2131,156,'Backdooring with Metasploit',1044,'Discusses the Metasploit Framework and walks thru the steps for a basic Metasploit attack.','','N',55,'',1.250,0),(2132,156,'My Grandpa\'s Books Never More!',1063,'Discusses how the author ripped his college textbooks to save money.','','N',57,'',1.000,0),(2133,156,'Insurgent Technology: In WikiLeaks\' Wake',1146,'Discusses some of the social and political implications of Wikileaks, the Arab Spring and Occupy movements.','','N',58,'',2.000,0),(2134,156,'The Pros and Cons of Courses',1122,'Discusses \"ethical\" hacking and network security courses and though a certificate can be worthless in the real world they can be a valuable learning experience.','','N',60,'',1.000,0),(2135,156,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2136,156,'Letters',15,'Dear 2600:','Information, Challenges, Meeting Stuff, Revelations, Inquiries, Random Thoughts, The Crime of Knowledge, Aggressive Prosecution, QR Fun.','N',34,'Cables',14.000,0),(2137,157,'Scales of Inequality',2,'Discusses the Richard O\'Dwyer extradition case (mentions several others) and how this miscarriage of justice is becoming more commonplace.','','N',4,'',2.000,0),(2138,157,'Bluetooth Hunter\'s Guide',1147,'Discusses bluetooth device discovery including non-discoverable device scanning using available tools and includes real world results from the authors\' own experiments.','References article Bluetooth Hacking Primer in 27:1. (..)','N',6,'',4.000,0),(2139,157,'Security by Obscurity = Insecurity',1148,'Discusses how often a security experts advice for protecting your stuff is useless as most locks can be picked without the need for expensive high tech gear.','','N',10,'',1.000,0),(2140,157,'Building a Cat-5 Cable Tap',1110,'Discusses how to build a ghetto/poor man\'s cat-5 network cable tap.','Seriously?!?! try this...','N',11,'',1.000,0),(2141,157,'NGFW - Not Grandpa\'s Firewall',1149,'Discusses the nearly quarter century history of firewall technology.','','N',12,'',1.000,0),(2142,157,'TELECOM INFORMER',7,'Discusses the Iridium global constellation of 66 low earth orbit satellites, including details of the historical and current technology and services available.','','N',13,'',2.000,0),(2143,157,'A Counterpoint to \'The Piracy Situation\'',1150,'Discusses piracy and urges the hacker community to actively advocate it, details his arguments for this position.','References article The Piracy Situation in 28:4. (..)','N',15,'',1.330,0),(2144,157,'The Piracy Situation: The Devil\'s Advocate',1151,'Discusses the fundamental problems with the current copyright laws and the positive aspects of piracy.','References article The Piracy Situation in 28:4. (..)','N',16,'',1.660,0),(2145,157,'Why is Piracy Still Allowed?',1152,'Discusses the inevitability of piracy when the price is overinflated and suggests applying the open source model (as it is already successful with software).','','N',18,'',1.000,0),(2146,157,'The New Age of the Mind',1153,'Discusses a very broad overview of dry-electrode EEG and some of the exciting and fascinating doors it opens for people interested in \"mind hacking\".','References the story My Second Implant in 27:2. (..)\r\nRecommends Cognitive Neuroscience: The Biology of the Mind, by Gazzaniga, Ivry, and Mangun.','N',19,'',2.000,0),(2147,157,'Building the Better Brute Force Algorithm',153,'Discusses current dictionary/brute force attacks limitations and presents an algorithm generating passwords containing only English like words or phrases.','','N',21,'Building the Better Brute Force Algorithm A Guide to Heuristic Password Cracking',4.500,0),(2148,157,'HACKER PERSPECTIVE',1154,'Discusses the author\'s journey from being a computer novice to professional penetration tester and instructor and self-defined hacker.','','N',26,'',2.330,0),(2149,157,'Firewall Your iPhone',1155,'Discusses the Apple iPhone 4S, how it appears to be connecting/sending data to Apple and other servers and how to block this behaviour.','Hardware summary looks screwed up!?!','N',29,'',2.000,0),(2150,157,'Memoir of a Tech Writer: The Art of Leverage',1156,'Discusses the author\'s work as a tech writer and his experience editing a post-translated software manual originating from Europe in a corporate environment.','','N',32,'',2.000,0),(2151,157,'Say It Ain\'t So Verizon',1085,'Discusses how Verizon\'s stock setup allows you to reset the FiOS Internet service router password without authorization or physical access.','','N',48,'',1.000,0),(2152,157,'Hacking Climate Change With WeatherLink',1157,'Discusses the WeatherLink cloud service maintained by Davis Instruments for use with their weather stations (such as the Davis Vantage Pro 2).','','N',49,'',2.000,0),(2153,157,'Baofeng UV-3R: The Cheapest Dual-Band Ham Radio HT',1158,'Discusses the Baofeng UV-3R ham radio and how to turn this dual-band HT into a tri-band HT.','','N',51,'',1.000,0),(2154,157,'TRANSMISSIONS',23,'Discusses the Android update cycle and how security updates aren\'t being pushed to older handsets in a timely fashion.','','N',52,'',1.750,0),(2155,157,'Metaphasic Denial of Service Attacks',1159,'Discusses a hybrid of DoS and DDoS (Distributed DoS) attacks called MDoS or the Metaphasic Denial of Service attack.','','N',54,'',1.000,0),(2156,157,'Never Be ON TIME Again!',1160,'Discusses the On Time Payment Protection Systems, Inc. device, a simple method to defeat it and how the author thought thru the process.','','N',55,'',1.500,0),(2157,157,'Fiction: Hacking the Naked Princess 1 & 2',1161,'The first two chapters of the newest Dev Manny, Information Technology Private Investigator story \"Hacking the Naked Princess\".','','N',57,'Dev Manny, Information Technology Private Investigator \"Hacking the Naked Princess\"',3.250,0),(2158,157,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2159,157,'Letters',15,'Dear 2600:','Missing Issues, Questions, Defeating the System, On Piracy, Advice, Social Engineering, A Little Feedback, More Kindle Fun, Article Issues, Opportunity, Observations, Prison Update.','N',34,'Kindling',14.000,0),(2160,158,'The Eyes Have It',2,'Discusses the growing use of surveillance technologies since the debut issue in 1984 and the need to question the value of, reasons for and ultimate destination of this trend.','','N',4,'',1.750,0),(2161,158,'Technology at the Federal Bureau of Prisons',1162,'Discusses the Federal Bureau of Prisons computer situation for inmates known as TRULINCS (Trust Fund Limited Inmate Computer System).','','N',6,'',4.000,0),(2162,158,'Using Bluetooth Devices as an Additional Security Measure in Linux',1163,'Discusses how to use BlueProximity to add a physical layer of security to your Linux system and some relevant potential usage scenarios.','','N',10,'',1.500,0),(2163,158,'Hackers Indispensable for Volunteer Groups',1164,'Discusses the low-budget, not-for-profit world where hacking is a necessity and the hacker\'s skills and experience would be welcome.','References quote by ternarybit in Hacker Perspective article in 29:1. (..)','N',12,'',1.000,0),(2164,158,'TELECOM INFORMER',7,'Discusses the basics of building a GSM network, including details of NinjaTel at Defcon and ShadyTel at ToorCamp and the OpenBTS and OpenBSC platforms.','','N',13,'',2.000,0),(2165,158,'The Quadcopter Crash Course',1165,'Discusses the UAV (Unmanned Aerial Vehicle) and remote controlled vehicles called quadcopters and outlines the underlying principles one should be familiar with when delving into crafting one.','','N',15,'',3.660,0),(2166,158,'Spear Phishing at a Bank - A Hard Lesson Learned',1123,'Discusses a spear phishing attack against the author\'s place of employment.','','N',18,'',1.330,0),(2167,158,'Restoring Honest Elections',1166,'Discusses how elections can be (and have been) hijacked and some of the problems with proprietary electronic voting systems.','','N',20,'',1.500,0),(2168,158,'Hackers in Space',121,'Discusses some of the practical aspects of building a free and globally accessible satellite communications network.','','N',21,'',2.500,0),(2169,158,'Hacking Apple\'s System',256,'Discusses how the author spilled coffee on his Macbook and got the Apple store to replace the damaged keyboard under warranty for free.','','N',24,'',1.000,0),(2170,158,'Fundamental Flaws in Online and Phone Ordering',1167,'Discusses the author\'s place of work which takes phone and online orders.','','N',25,'',1.000,0),(2171,158,'HACKER PERSPECTIVE',1168,'Discusses why the author believes he\'s a hacker and how his hacking has evolved over the years.','','N',26,'',2.330,0),(2172,158,'Beware the Cyber Weapons Industrial Complex',1169,'Discusses the growing cyber weapon industrial complex and questions whether militarizing malware and rootkits and selling them to any buyer for profit is such a good idea.','References Dragorn article Real Cyberwar in 28:2. (..)\r\nSee \"The Code War\" by Michael Riley and Ashley Vance in Bloomberg Businessweek July 25-31 2011.','N',29,'',3.000,0),(2173,158,'XML Automated Gambling',1170,'Discusses the author\'s observations of online gambling web sites followed by a series of discoveries, tests, and experiments.','','A',32,'',2.000,0),(2174,158,'Stuxnet: An Analysis',1171,'Discusses the Stuxnet attack as a case study of what a modern computer virus can accomplish. Details exploits used, file names and end result.','','N',48,'',2.660,0),(2175,158,'How to Leech from Spotify',1172,'Discusses how to record albums and/or songs from Spotify and obtain music for free.','','N',50,'',1.330,0),(2176,158,'TRANSMISSIONS',23,'Discusses the network (Wi-Fi and hard wired) used at the this summers HOPE conference.','','N',52,'',2.000,0),(2177,158,'Radio Redux',1173,'Discusses some basic info for those who would like to explore RF hacking and talks about some of the latest news in the RF hacking scene.','Recommends the Handbook for Radio Communications and Experimental Methods in RF Design published by the ARRL.','N',54,'',5.000,0),(2178,158,'Physical Security Threat from Hotel WiFi',1174,'Discusses issues with hotel pay as you go Internet services that allow attackers to compromise your Internet access and potentially gain physical access to your room.','','N',59,'',1.000,0),(2179,158,'A Nice, Hot, Socially Engineered Meal',1138,'Discusses a situation where the author received a free pizza without any social engineering whatsoever.','','N',60,'',1.000,0),(2180,158,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2181,158,'Letters',15,'Dear 2600','Guidance, Assorted Info, More on Meetings, Feedback, Words, of Note, Just Asking, Payphones, Randomness.','N',34,'Fundamental Interaction',14.000,0),(2182,159,'Storm Clouds',2,'Discusses some of Superstorm Sandy effects on technology, particularly how thoroughly cell service was wiped out in so many areas.','','N',4,'',2.000,0),(2183,159,'Basic Code Breaking',363,'Discusses the RSA algorithm, covers some of the weaknesses and gives readers a better understanding of basic code breaking with some simple examples.','References article Simple RSA Encryption in 28:2. (..)','N',6,'',2.000,0),(2184,159,'An Overview of the Security Benefits Offered by Desktop Virtualization',1175,'Discusses an overview of the benefits and detriments of the desktop virtualization model as it relates to the security of the client and network.','','N',6,'',3.000,0),(2185,159,'Hardware Hacking - An Introduction Via Dev\' Boards',1176,'Discusses a brief history of hardware hacking with an overview of some of the many options available today.','Recommends The Art of Electronics 2nd ed. 1989 by P. Horowitz and W. Hill, Microcomputer Architecture and Programming Wily 1989 by J. F. Wakerly.','N',11,'',1.500,0),(2186,159,'Hacking Walgreens Photo Processing Machines',1177,'Discusses the author\'s use of a \"Switchblade\" prepared SD card to garner information from a digital photo kiosk at Walgreens.','','N',12,'',0.500,0),(2187,159,'TELECOM INFORMER',7,'Discusses mobile phone service in rural areas including AMPS (mostly obsolete), femtocells, microcells and repeaters/amplifiers and signal boosters.','','N',13,'',2.000,0),(2188,159,'C is for Camouflage',1178,'Discusses a method of making the Windows DOS box look more like Notepad so as to hide it\'s use from prying eyes.','','N',15,'',1.000,0),(2189,159,'A Method to Spider Sites Like Indeed.com with Teleport Pro',1179,'Discusses a method of web crawling (spidering) a web site using a \"port bouncer\" when the normal method (ie. HTTrack/Teleport Pro) don\'t work.','','N',16,'',1.000,0),(2190,159,'Steganography over Covert Channels: Implementation and Government Response',1181,'Discusses the hiding of data in dynamic or static channels to covertly transmit information, efforts to detect this, and the increasing use of deep packet inspection to monitor communications on the Internet.','','N',17,'',7.000,0),(2191,159,'New Ways of Ranking Documents',69,'Discusses two additional methods of ranking documents based on the author\'s proposed information content and inspirational index ideas.','','N',24,'',1.000,0),(2192,159,'Hacking Dirt',1182,'Discusses a problem with sink holes caused by a drainage pipe and the author\'s hack to correct the problem.','','N',25,'',1.000,0),(2193,159,'HACKER PERSPECTIVE',1139,'Discusses the author\'s definition of hacking and covers his life story in relation to computing and being a hacker.','','N',26,'',3.000,0),(2194,159,'The Security Funnel: When OpenVPN Meets Tor',1136,'Discusses how to maintain your privacy using OpenVPN and Tor and also how to combine them for an added layer of security.','','N',29,'',2.500,0),(2195,159,'Tactical Teensy Rapid Recon',1183,'Discusses using the Teensy device to deliver payloads as an USB HID (Human Interface Device), including code examples.','I\'ve added a link to the USB Rubber Ducky, a similar device.','A',31,'',2.500,0),(2196,159,'An Alternate Method for Creating an SSH Tunnel with PuTTY and Squid',1184,'Discusses a method of port forwarding that allows you to use PuTTY in Windows to connect to an SSH server.','References article The Many Uses of SSH Tunnels in 28:2. (..)','N',48,'',2.000,0),(2197,159,'How to Survive a DNS Attack',1185,'Discusses a simple method of preventing a website from being unavailable due to a DNS outage.','','N',50,'',1.125,0),(2198,159,'The Breach That Wasn\'t',735,'Discusses the truth behind the (actually false) news reports of viruses found at City College of San Francisco in January 2012.','','N',51,'',0.875,0),(2199,159,'TRANSMISSIONS',23,'Discusses the collapse of the SSL trust system due to flaws and compromises, describes the two current models (trust certificate authority and self signed) and looks to the future with Certificate Pinning.','','N',52,'',2.000,0),(2200,159,'Wordpress Exploit Immunization',1122,'Discusses the author\'s web site being compromised (which uses the Wordpress platform) and the steps taken to fix the site and to prevent it\'s recurrence.','','N',54,'',2.000,0),(2201,159,'Fiction: Hacking the Naked Princess 3-5',1161,'The third, fourth and fifth chapters of the newest Dev Manny, Information Technology Private Investigator story \"Hacking the Naked Princess\".','','N',56,'Dev Manny, Information Technology Private Investigator \"Hacking the Naked Princess\"',5.000,0),(2202,159,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2203,159,'Letters',15,'Dear 2600:','Propositions, Inequity, Reader Thoughts, Listener Thoughts, New Meeting, In Need of Advice, Advice to Share, New Stuff, Miscellaneous.','N',34,'Intercepts',14.000,0),(2204,160,'A Lost Promise',2,'Discusses the tragic suicide of Aaron Swartz, a bit about depression and some background on Aaron\'s case and his outrageous treatment by the feds.','','N',4,'',2.000,0),(2205,160,'Guest Networks: Protection Less Than WEP?',1187,'Discusses a flaw in some Linksys/Cisco routers that will allow you to log into a Guest network setup on these devices.','','A',6,'',3.000,0),(2206,160,'Practical Cryptanalysis',1188,'Discusses the weaknesses of Type 7 passwords that can be used on Cisco routers with a Python program that demonstrates the algorithm.','','S',9,'Practical Cryptanalysis: Reversing Cisco Type 7 Password Hashes',1.500,0),(2207,160,'Twitter For Fun and Profit',1189,'Discusses a new type of Twitter botnet which doesn\'t infect computers or steal anyone\'s account, includes some example php code.','','A',10,'',1.500,0),(2208,160,'Warning for Ye Olde Bank - Don\'t Do This!',1123,'Discusses an old school phishing attack that used a fax and how close it came to succeeding.','','N',12,'',1.000,0),(2209,160,'TELECOM INFORMER',7,'Discusses voice/internet options while traveling in southern Argentina and on an Antarctica cruise and then the author\'s new home in Rotterdam Amsterdam.','','N',13,'',2.000,0),(2210,160,'Social Engineering: Tactics for Prevention',1190,'Discusses social engineering - what it is, helpful skills, character traits and tools, and the importance of planing, reconnaissance, organization, preparation and finally execution.','','N',15,'',4.500,0),(2211,160,'Extra-Legal Harassment',1191,'Discusses the concept of extra-legal harassment, outlines the main techniques used and shares hardwon lessons on how activists can most effectively protect themselves from these forms of attack.','','N',19,'',6.500,0),(2212,160,'HACKER PERSPECTIVE',1192,'Discusses why the author considers himself a hacker and some stories to illustrate his belief.','','N',26,'',2.000,0),(2213,160,'Book Review: ',1193,'Discusses the book \"Exploding the Phone\" by Phil Lapsley, published by Grove Press.','','N',28,'Book Review: Exploding the Phone',1.000,0),(2214,160,'Fiddler - Never Trust the Client',1170,'Discusses the use of fiddler as a web debugging proxy to examine http(s) traffic and tamper with it. Let\'s you spoof requests and responses to/from remote machines.','','N',29,'',1.500,0),(2215,160,'U.S. Department Of State Loves Mexico',1194,'Discusses a Department of State Request for Quote document titled Mexico Technical Surveillance System.','','N',31,'',1.000,0),(2216,160,'Hypercapitalism and Its Discontents',1195,'Discusses piracy and hacking as a reaction to the excessive control corporations exert in the modern capitalist world.','References D351\'s article. (..)','N',32,'',1.000,0),(2217,160,'Fun with Base Math',503,'Discusses what base math and base numbering systems are and provides a brief primer or introduction to how it works.','','N',33,'Fun with Base Math: A Primer on Base Numbering Systems',1.000,0),(2218,160,'Cracking Push-Button Locks',1081,'Discusses push-button locks made by Borg Locks whose combination is fairly easy to crack depending on the code set.','','N',48,'',1.000,0),(2219,160,'Brute Force Access',1196,'Discusses how to brute force the password for the TRIPLEX DVRLink DVR468RW CCTV security system with a Python script.','','A',49,'',1.000,0),(2220,160,'The Usage of the Assumption Technique in Social Engineering',1197,'Discusses how implicit assumptions and peoples innate desire to be helpful can be utilized in a social engineering example.','','N',51,'',1.000,0),(2221,160,'TRANSMISSIONS',23,'Discusses the value of open communities and forums on the Internet to build knowledge and answers to common problems and warns of services like Facebook and Google+ that appear open but really aren\'t.','','N',52,'TRANSMISSIONS The Value of Open Communities',2.000,0),(2222,160,'Dev\'ing an OS',1198,'Discusses the basics of systems development including the boot process, real mode, assembly registers, memory stack, interrupts, bootloader, etc.','','N',54,'',5.000,0),(2223,160,'Learning, Hacking, and the Raspberry Pi',1199,'Discusses the Raspberry Pi - what it is, what it\'s for, some quick and hard hacks and notes about gaming.','','N',59,'',2.000,0),(2224,160,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2225,160,'Letters',15,'Dear 2600','Propositions, Commentary, Information, Observations, Questions, Fun With Meetings, Reader Feedback, Digital Issues.','N',34,'Symptoms',14.000,0),(2226,161,'The Road to Safety',2,'Discusses the fallout from the Boston Marathon bombings - increased calls for surveillance and intrusions on privacy, even though they are ripe for abuse and won\'t prevent such attacks so don\'t make us safer.','','N',4,'',2.000,0),(2227,161,'Splunking the Google Dork',1200,'Discusses Google hacking/dorking using SearchDiggity and writes a Python script to automate the process and put the output into Splunk (a log analysis/intelligence tool).','','S',6,'',2.500,0),(2228,161,'Fun with the Minuteman III Weapon System',1204,'Discusses some of the physical security details of an active ICBM missile site.','See part two (..), part three (..)','N',8,'',1.000,0),(2229,161,'My First Blackhat',1201,'Discusses the use of a cross-site scripting (XSS) attack to get the password of a classic social networking site rip-off.','','A',9,'',2.000,0),(2230,161,'How to Create and Operate a Temporary Free Autonomous Zone',1069,'Discusses a framework of protocols and techniques to organize a large, diverse group of individuals voluntarily gathered together for a shared purpose.','','N',11,'',1.500,0),(2231,161,'TELECOM INFORMER',7,'Discusses CDMA450 technology which is designed for rural areas and is deployed or being tested in 62 countries worldwide (not the U.S.).','','N',13,'',2.000,0),(2232,161,'A Broad Spectrum of DRM',1202,'Discusses a method of disabling the one hour DRM in Alawar\'s demo games.','','N',15,'',1.000,0),(2233,161,'Getting Free Media - All Without Torrents!',1203,'Discusses several suggestions for finding the media you are looking for on the Internet and advice on how to accomplish it safely.','','N',16,'',1.000,0),(2234,161,'A Beginner\'s Guide to Social Engineering',1152,'Discusses the most common types of social engineering from technical to simple and explains the best way for users to posture themselves to stay protected from such attacks.','','N',17,'Tech Gets Better, Humans Do Not: A Beginner\'s Guide to Social Engineering',6.000,0),(2235,161,'Why Your Grandparents Don\'t Like the Internet',1189,'Discusses some of the reasons people (often older) are afraid of using the Internet.','email stories to Internet4TheElderly@xnite.org','N',23,'',1.000,0),(2236,161,'What Made Unix Great and Why the Desktop is in Such Bad Shape',69,'Discusses how the main ingredient of Unix is the idea that everything is a file (often text) and the flexibility of simple tools that can be combined to increase versatility.','','N',24,'',2.000,0),(2237,161,'HACKER PERSPECTIVE',1205,'Discusses episodes in the author\'s life that illustrate his hunger for knowledge (otherwise called hacking).','','N',26,'',2.660,0),(2238,161,'0-Day Adventures',1206,'Discusses a 0-Day security vulnerability the author encountered while working in a security role and how he assessed it.','','A',29,'',1.000,0),(2239,161,'How a Prehistoric Hacker Got Started',1207,'Reflects on the author\'s career in information technology which began in the 1960s and describes the first computer he used.','','N',30,'',1.000,0),(2240,161,'The Weather Outside is Frightful/Bulls-eye on the Banks - Again',1123,'Discusses an incident at a bank where ATM skimming equipment was installed by criminals but accidentally discovered by a customer. Also discusses a new Trojan focused on around 30 banks.','Two articles.','N',31,'',1.500,0),(2241,161,'Exploiting the Postal Service Address System for Personal Gain',1208,'Discusses what you can modify in your mailing address and still have the postal service be able to deliver it to you. Useful for offers/special deals that are limited by address.','','N',32,'',0.500,0),(2242,161,'A World without Security',1209,'Discusses the hassles that computer security causes for users and software developers.','','N',32,'',1.000,0),(2243,161,'Book Review: ',1210,'Discusses the book \"Pirate Cinema\" by Cory Doctorow published by Tor Teen.','','N',48,'Pirate Cinema by Cory Doctorow',1.000,0),(2244,161,'Cyber Attacks on Equities Markets',1211,'Discusses the instability and frailty of the U.S. electronic markets and exchanges (NYSE, NASDAQ, etc).','','N',49,'Cyber Attacks on Equities Markets: The Real Threat of High Frequency Trading',1.000,0),(2245,161,'Static Code Analysis Using Watchtower',1212,'Discusses Watchtower, a static code analysis tool the author recently published under the GPL license written in Ruby.','','N',50,'',2.000,0),(2246,161,'TRANSMISSIONS',23,'Discusses the hacker skill set as somewhere between a mindset and a continual vocation and warns of some hacker mindset pitfalls.','','N',52,'',1.000,0),(2247,161,'Tracking Users on Trustworthy Sources',1189,'Discusses a method of obtaining someones ip address from a forum web site.','','A',54,'',1.000,0),(2248,161,'A Response to \'Perfect Encryption - Old Style!\'',98,'Discusses the old school method of encrypting messages by hand using a one time pad, still used the world over.','References article Perfect Encryption - Old Style!. (..).\r\nReprinted original article by mistake - see Autumn 2013 (30:3) page 64 and 65 for correct article.','N',55,'Perfect Encryption - Old Style!',2.330,0),(2249,161,'Fiction: Hacking the Naked Princess 6',1161,'The sixth chapter of the newest Dev Manny, Information Technology Private Investigator story \"Hacking the Naked Princess\".','','N',57,'Dev Manny, Information Technology Private Investigator \"Hacking the Naked Princess\"',3.330,0),(2250,161,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2251,161,'Letters',15,'Dear 2600:','Reading and Writing, Pitching In, Help Wanted, Inquiring Minds, Service Declined, Call to Action, More Meeting Mania, Responding, The Game of Justice, Memories, \"Copy Protection, Trademarks, et al\", Advice.','N',34,'autonomous consciousness',14.000,0),(2252,162,'The Right to Know',2,'Discusses the Edward Snowden NSA revelations and the Bradley Manning sentencing and what these stories tell us about those in power.','','N',4,'',1.750,0),(2253,162,'An Introduction to Bitcoin',1213,'Discusses Bitcoin, a digital peer-to-peer currency, how it works and some novel uses.','','N',6,'',1.800,0),(2254,162,'Bitcoin: The Hacker Currency?',68,'Discusses Bitcoin, a decentralized, non-fiat currency and covers wallet(s), mining and issues converting to cash.','','N',7,'',1.200,0),(2255,162,'Inquiring Minds = Hacker = Design Engineer',1176,'Discusses some of the differences and similarities of hardware versus software hacking.','','N',9,'',1.000,0),(2256,162,'Hacking The Apple Collective',1214,'Discusses the author\'s experiences working at an Apple retail outlet.','References article \"Hacking Apple\'s System\" in 29:3. (..)','N',10,'',1.500,0),(2257,162,'Internet Trolls',735,'Discusses trolls - what they are, how they operate and some strategies for dealing with them.','','N',11,'',1.500,0),(2258,162,'TELECOM INFORMER',7,'Discusses Private Branch Exchange (PBX) systems as they currently are and where they are headed.','','N',13,'',2.000,0),(2259,162,'Controlling the Information Your Android Apps Send Home',1163,'Discusses three methods of controlling permissions for your apps on your rooted/unlocked Android phone.','','N',15,'',2.330,0),(2260,162,'U-verse Networking',1215,'Discusses how to set up a network and correctly configure it to connect to AT&T Business U-verse (a VDSL Internet connection).','','N',17,'',1.330,0),(2261,162,'Scamming the Scammer: A Fun Way to Respond to a 419 Scam',158,'Discusses a Nigerian 419 Scam attempted on the author and what he did about it.','','N',19,'',2.660,0),(2262,162,'The Art of War and What IT Professionals Can Learn from It',1216,'Discusses applying the philosophy in The Art of War by Sun Tzu to the IT profession.','','N',21,'',1.330,0),(2263,162,'Access Tandem Codes and the Hidden Phone Network',1217,'Discusses hidden telephone codes (including access tandem codes), what they are, how they work and how to find them.','','N',23,'',3.000,0),(2264,162,'HACKER PERSPECTIVE',1218,'Discusses the author\'s history with computing/hacking and what hacking means to him.','','N',26,'',2.660,0),(2265,162,'Palo Alto NGFW Insider',1219,'Discusses the Palo Alto Next Generation Firewall and what the author found opening the unit up and examining the hardware.','','N',29,'',2.000,0),(2266,162,'Identity Management and Its Role in Security Strategy of Enterprise Environments',1220,'Discusses Identity and Access Management (IDAM) and what it means to the security strategy of enterprise environments.','','N',31,'',3.000,0),(2267,162,'Defeating Forensic Attacks on Full Disk Encryption',289,'Discusses several methods to defeat common forensic techniques used to circumvent full disk encryption.','','N',48,'',1.500,0),(2268,162,'Bank Notes',1123,'Discusses a phishing attempt, cloud versus local network security and a social engineering attempt at the author\'s workplace.','','N',49,'',2.500,0),(2269,162,'TRANSMISSIONS',23,'Discusses security, cryptography, anonymity and identity protection.','','N',52,'',2.000,0),(2270,162,'Relax, We Bought Security',1136,'Discusses how computer security is often poorly implemented in many companies and some advice on the correct method.','','N',54,'',2.000,0),(2271,162,'Clouds, Clouds, Clouds',1123,'Discusses a small community bank\'s experience with moving it\'s transaction processing function into the Cloud.','','N',56,'',1.250,0),(2272,162,'Lights, Camera, Hack',1138,'Discusses the author\'s belief that hacking exists in other facets of life and presents cinema/film making as an example.','Book recommendation: Everything is Cinema: The Working Life of Jean-luc Godard by Richard Brody.','N',57,'',1.330,0),(2273,162,'Fiction: The Error',1221,'Tells a story about someone with a neural implant.','','N',58,'',2.500,0),(2274,162,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2275,162,'Letters',15,'Dear 2600:','Random Bits, Contributions, Special Requests, Continuations, Critiques, Info Needed, Meeting News, Feedback, On Privacy.','N',34,'lore',14.000,0),(2276,163,'Dissent or Descent',2,'Discusses the continuing NSA revelations, some historical NSA related concerns and what should be done now.','','N',4,'',2.000,0),(2277,163,'ID3 Tag Messages',1209,'Discusses the MP3 standard and it\'s ID3 tag and how it is the perfect place to hide secret messages.','','N',6,'',1.250,0),(2278,163,'Privacy - A New Hope Through Tails',1222,'Discusses using a Linux Live CD called Tails to help prevent tracking and surveillance of your Internet use.','','N',8,'',2.750,0),(2279,163,'Fun with the Minuteman III Weapon System - Part Two',1204,'Discusses some of the communication details of an active ICBM missile site.','See part one (..), part three (..)','N',11,'',2.000,0),(2280,163,'TELECOM INFORMER',7,'Discusses some of the history of independent telephone companies often seen in rural areas.','','N',13,'',2.000,0),(2281,163,'The Many Vulnerabilities of Verity Parental Control',1223,'Discusses the Verity Parental Control program and numerous methods of defeating it.','','N',15,'',2.330,0),(2282,163,'Anonymity and You, Firefox 17 Edition',1224,'Discusses some methods that could be used to break Tor\'s anonymity and suggestions to use Tor safely.','','N',17,'',1.250,0),(2283,163,'Wi-Fi Security: Attack and Defense',1037,'Discusses the current state of Wi-Fi security with a practical emphasis on attack and defence methodology.','','A',18,'',5.330,0),(2284,163,'The Maturation Cycle of a Hacker',1123,'Discusses the hacker life cycle.','','N',24,'',1.000,0),(2285,163,'There is Never a Free Lunch',1123,'Discusses the positive and negative sides of technology and mentions the \'Microsoft customer service calling you about a virus\' scam.','','N',25,'',0.660,0),(2286,163,'HACKER PERSPECTIVE',1184,'Discusses what the word hacker means to the author.','','N',26,'',3.000,0),(2287,163,'CYS Using a Pi to Pivot',1225,'Discusses using a raspberry pi to cover you tracks online.','','N',29,'',1.250,0),(2288,163,'Pretty Good Privacy',1226,'Discusses using the OpenPGP protocol to encrypt files and emails.','','N',30,'',1.750,0),(2289,163,'Hacking Your Mother Tongue to Obfuscate your Encryption',1073,'Discusses using the Russian alphabet instead of the English alphabet to further obfuscate encryption of plain text.','','N',32,'',1.660,0),(2290,163,'The Growing Schism Between Hackers and the Law',1227,'Discusses finding a vulnerability in a website used by federal law enforcement and the consequences suffered for exposing it.','','N',48,'Black and White * The Growing Schism Between Hackers and the Law',2.000,0),(2291,163,'Netcam: Basics and Vulnerabilities',1228,'Discusses IP cameras or webcams that operate over a network and lists common netcam default passwords.','','N',50,'',1.660,0),(2292,163,'TRANSMISSIONS',23,'Discusses the several ways governments and companies are tracking your location with suggestion to protect your privacy.','','N',52,'',2.000,0),(2293,163,'All I Want is Total Freedom',1069,'Discusses some ways to get back some privacy.','I\'ve assumed Lifeguard and lifegaurd are the same author.','N',54,'',1.000,0),(2294,163,'Fiction: Hacking the Naked Princess 7-9',1161,'The seventh thru ninth chapters of the newest Dev Manny, Information Technology Private Investigator story \"Hacking the Naked Princess\"','','N',55,'Dev Manny, Information Technology Private Investigator \"Hacking the Naked Princess\"',5.330,0),(2295,163,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2296,163,'Letters',15,'Dear 2600','Queries, Additional Info, Critical Observations, Statements, On Meetings, Free Advice, Horror Story from Hell, Future Plans, Appreciation, Digital Divide, HOPE-X Tickets','N',34,'Communicatory Types',14.000,0),(2297,164,'Thirty Years On',2,'Discusses 30 years of publishing 2600 and reflects on what hasn\'t changed.','','N',4,'',2.000,0),(2298,164,'Lessons from \'Secret\' History',93,'Discusses some historical instances of the U.K. government controlling/collecting telecommunication data and how it seems to reveal an on going pattern.','Bibliography: Intelligence in War, John Keegan, 2010, GCHQ, Richard Aldrich, 2010, \"GCHQ taps fibre-optic cables for secret access to world\'s communications\", The Guardian, 6/21/2013.','N',6,'Lessons from \'Secret\' History From Cable Vetting to Tempora',3.000,0),(2299,164,'Google\'s Two-Factor Authentication: The Sneaky Trust Feature',1229,'Discusses a \"feature\" of Google\'s two factor authentication scheme.','','N',9,'',1.000,0),(2300,164,'Identity and Encryption Verification',1189,'Discusses some PGP key signing best practices.','','N',10,'',1.000,0),(2301,164,'Asterisk: The Busy Box',19,'Discusses a method to bring back the phreaker busy box using an Asterisk PBX server.','','A',11,'',1.000,0),(2302,164,'Using Square to Obtain Dollars at a Reasonable Rate',1230,'Discusses a method to obtain a reasonable Argentina peso to U.S. dollar exchange rate.','','N',12,'Using Square from Outside the U.S. to Obtain Dollars at a Reasonable Rate',1.000,0),(2303,164,'TELECOM INFORMER',7,'Discusses voice/internet options while travelling in Ecuador and Mexico City.','','N',13,'',2.000,0),(2304,164,'Robbing the Rich Using Bitcoin',1225,'Discusses how thieves could exploit a couple of the most common security flaws still in practice today.','Python script to scrape websites for potential passwords.','A',15,'',4.660,0),(2305,164,'The Night the ATM Went Down on Me',158,'Discusses observing the boot sequence of an NCR ATM and finding out it was running Windows XP which has just gone end of life.','','N',19,'',1.330,0),(2306,164,'Android Reversing Bootcamp',1231,'Discusses a brief introduction to Android application reversing.','','A',21,'',2.330,0),(2307,164,'Hacking Commercial Maytag Washers and Dryers',1232,'Discusses how to put most Maytag commercial washers and dryers into service mode to reprogram them.','','N',25,'',2.000,0),(2308,164,'HACKER PERSPECTIVE',1233,'Discusses how the author first got into computers and his first program hack to capture user login passwords.','','N',26,'',3.000,0),(2309,164,'Accessing Data Structures in a Randomized Address Space',1234,'Discusses a potential exploit in the Linux glibc library in the srand function.','Part of page title : (how to eliminate entropy and bring the universe back to the singularity)','A',29,'Accessing Data Structures in a Randomized Address Space (ASLR)',3.500,0),(2310,164,'A Little Excitement Never Hurt Anybody!',1123,'Discusses an email the author received purporting to be from the IRS and an analysis of how he determined it was bogus.','','N',32,'',2.000,0),(2311,164,'Brute-forcing PIN Code Keypads Using Combinatorial Mathematics',1235,'Discusses finding the shortest possible sequence of digits containing all four-digit pin codes from 0000 to 9999.','','N',48,'',4.000,0),(2312,164,'Building a Community Forum',1236,'Discusses how to build successful online forums.','','N',52,'',2.000,0),(2313,164,'Why IMDB Got a Captcha',1237,'Discusses how the GNAA devised a plan to troll IMDb users using various hacks.','','N',54,'Procedural Worlds Statistical Analysis Image Processing and PRNG Exploitation for the Lutz - or Why IMDb Got a Captcha',3.000,0),(2314,164,'At Home Malware (and Online Ads) Protection',1110,'Discusses a script to update a DD-WRT router with malware/adware hosts to block access to.','','A',57,'',1.000,0),(2315,164,'Automated Target Acquisition',1238,'Discusses a method of protecting a web server while obtaining potential targets at the same time.','','A',58,'',1.500,0),(2316,164,'Fiction: Lock and Key',1239,'Tells a story about a unique hackerspace project.','','N',59,'',1.500,0),(2317,164,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2318,164,'Letters',15,'Dear 2600','Notations, Questions, Accusations, Litigation, Conversation, Clarification, Donations, Contributions, Investigations, Suggestions, Observations, Versification, Convocations, Appreciation.','N',34,'Vapors',14.000,0),(2319,165,'Watching the Watchers',2,'Discusses the continuing Snowden leaks, the ongoing discussion of privacy versus security and mass media\'s distorted coverage of the issues.','','N',4,'',2.000,0),(2320,165,'Sabotage The System: Encryption as Surveillance State Monkey Wrench',1191,'Discusses two methods of increasing the cost of automation in the NSA\'s global data surveillance system which can make the output brittle, imprecise and uncertain.','','N',6,'',4.000,0),(2321,165,'Crossover: Where Metal and Hacking Met and Mixed',1240,'Discusses the parallels between hacking and heavy metal in the formative years of both.','','N',10,'',3.000,0),(2322,165,'TELECOM INFORMER',7,'Discusses carrier hotels and the author\'s unethical methods of achieving efficiencies and cost savings in one.','','N',13,'',2.000,0),(2323,165,'Fun With the Minuteman III Weapon System - Part Three',1204,'Discusses how to intercept basic nuclear missile communications of an active ICBM missile site.','See part one (..), part two (..)','N',15,'Fun With the Minuteman III Weapon System - Part Three \"AHC Chicken\"',2.000,0),(2324,165,'Fun with Data Entropy Attacks',1241,'Discusses how knowledge of variances in compression can be used to gain advantage over a target system.','','N',17,'',1.500,0),(2325,165,'Network Condom',1206,'Discusses a Python script to safely explore the seedier side of the Internet.','','A',18,'',0.500,0),(2326,165,'Yippie Ki-Yay: Social Engineering and Film',1138,'Discusses the presence and implications of social engineering in film.','','N',19,'',1.500,0),(2327,165,'Hack Your House',1242,'Discusses using a Raspberry Pi to control all the lights in a house and play streaming media.','','A',20,'Hack Your House Making The Most Of Raspberry Pi',1.500,0),(2328,165,'Corporate Security and Chinese Hacking',1243,'Discusses the Mandiant report findings (published last year) and offers suggestions to improve your security.','','N',22,'Corporate Security and Chinese Hacking Lessons From The Mandiant Report on Chinese Espionage',4.000,0),(2329,165,'HACKER PERSPECTIVE',1244,'Discusses the author\'s foray into hacking, the beginner hacking subculture and the hacker mentality.','','N',26,'',3.000,0),(2330,165,'Experiences of a Hobo Security Consultant',1245,'Discusses the author\'s life as a homeless person doing computer repair work for other homeless people.','','N',29,'',3.500,0),(2331,165,'\'My Precious...\' (Apple)',1123,'Discusses the July 2013 Apple developer site security breach.','','N',32,'',1.500,0),(2332,165,'Hacking the SanDisk Connect Wireless Media Drive',1246,'Discusses gaining root access on the SanDisk Connect Wireless Media Drive.','','A',48,'',2.000,0),(2333,165,'Toilet Hacking',1247,'Discusses hacking low-flow toilets.','','N',50,'',3.500,0),(2334,165,'\'Good Afternoon. This is Your Fake AV Calling.\'',1123,'Discusses ransomware, a form of computer malware.','','N',53,'',2.000,0),(2335,165,'Future Visions',1248,'Discusses how far technology has come since the author was a child and where it might be going.','','N',55,'',1.330,0),(2336,165,'Closing the Schism Between Hackers and the Law',158,'Discusses what the author believes is the proper procedure to follow when finding a vulnerability on a website.','References Scott Arciszewski article in 30:4. (..)','N',57,'',2.000,0),(2337,165,'Fiction: Hacking the Naked Princess 10',1161,'The tenth chapter of the newest Dev Manny, Information Technology Private Investigator story \"Hacking the Naked Princess\".','','N',59,'Dev Manny, Information Technology Private Investigator \"Hacking the Naked Princess\" Synopsis ',2.000,0),(2338,165,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2339,165,'Letters',15,'Dear 2600','Further Questions, Article Feedback, Random Thoughts, Communications, Information, Meetings, Letters on Letters, The Digests, Critique, Experiences, New Stuff.','N',34,'Public Address',14.000,0),(2340,166,'A Tale of Many Hackers',2,'Discusses the 2600 distributor Source Interlink disaster and the HOPE X conference success.','','N',4,'',1.750,0),(2341,166,'The Demoscene - Code, Graphics, and Music Hacking',1249,'Discusses what a \"demo\" and the Demoscene is, some history and sample code in C.','Bibliography, Usenet and ftp sites.','C',6,'',5.000,0),(2342,166,'Bugging a Room with an IP Phone',1095,'Discusses a flaw in the NEC DT700 VoIP system that allows remote recording of any phone in the system.','','N',11,'',1.750,0),(2343,166,'TELECOM INFORMER',7,'Discusses some of the innovations/changes in the telecommunications industry over the past 15 years and what may be coming.','','N',13,'',2.000,0),(2344,166,'Hack the Track: Put Your Money Where Your 0wn Is!',1250,'Discusses the world of handicapping in gambling systems and some of the mathematics and technology being used.','','N',15,'',2.500,0),(2345,166,'Linux Pwned - Just Not By Me',1251,'Discusses the Ebury virus that infests Linux machines.','','N',17,'',1.500,0),(2346,166,'Writing Buffer Overflows for Non-Programmers',1110,'Discusses Buffer Overflows and details the steps required to write one.','','N',19,'',1.500,0),(2347,166,'Remailing with USPS',1229,'Discusses what remailing is, how it works and using the USPS as a remailer along with information about how all mail is monitored.','','N',20,'',3.500,0),(2348,166,'Forensic Bioinformatics Hacks',1252,'Discusses what forensic bioinformatics is and a real life example conducted by the author.','','N',24,'',2.000,0),(2349,166,'HACKER PERSPECTIVE',1253,'Discusses the author\'s definition of hacking and some of his life experiences as one.','','N',26,'',3.500,0),(2350,166,'Spam: Where Does It Come From?',1123,'Discusses spam, what it is, why it\'s prevalent and the author\'s research conducted on a subset of the spam he received over 128 days.','','N',30,'',3.000,0),(2351,166,'Checkmate or How I Bypassed Your Security System with a Shoe String and Hanging File Folder the Morning After You Upgraded It',1254,'Discusses how the author was able to defeat a building security system with simple tools.','','N',33,'',1.000,0),(2352,166,'Installing Debian on a Macbook Pro without rEFInd or Virtual Machines',1035,'Discusses how the author installed Debian Wheezy onto an Apple Macboo Pro without any Mac partitions or rEFInd.','','N',48,'',1.000,0),(2353,166,'Film Review: Die Gstettensaga: A Call to Class Consciousness for Hackers',1255,'Discusses the movie Die Gstettensaga : A Call to Class Consciousness directed by Johannes Grenzfurthner.','Review contains spoilers.','N',49,'',1.000,0),(2354,166,'Xfinite Absurdity: True Confessions of a Former Comcast Tech Support Agent',1053,'Discusses the author\'s experience working at Comcast in online support for Internet and phone service.','','N',50,'',1.750,0),(2355,166,'EFFECTING DIGITAL FREEDOM',1256,'Discusses patent trolls, what they are, how we got here and how you can help.','','N',52,'',1.750,0),(2356,166,'Covert War-Driving with WiGLE',1225,'Discusses the Wigle Wifi Wardriving Android app used to find wireless access points and details six steps to crack a WEP protected network.','','N',54,'',2.500,0),(2357,166,'Quantum Computers for Code Breaking',1257,'Discusses current technology and limitations of quantum computers, set algorithms, code breaking and trends in hardware.','','N',56,'',2.250,0),(2358,166,'InfoSec and the Electrical Grid: They Go Together Like Peas and Carrots',1123,'Discusses the electrical grid/utility companies and it\'s/their lack of appropriate computer security.','','N',59,'',2.000,0),(2359,166,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2360,166,'Letters',15,'Dear 2600','Better Protection, Electronic Editions, Sensitive Info, Ignorance Campaign, Reader Response, Issues, Gratitude, Distributor Problem, Inquiries, More on Meetings, HOPE X.','N',34,'RX',14.000,0),(2361,167,'Tools for a New Future',2,'Discusses how technological advances can be used to advance freedom and/or totalitarian control and have dramatically affected social media and video.','','N',4,'',2.000,0),(2362,167,'Password Cracking in the Modern Age',1258,'Discusses passwords, how hashes work, different methods imployed for cracking, HashCat, CPU versus GPU and salting.','','N',6,'',4.660,0),(2363,167,'What Do Ordinary People Think a Hacker Is?',1259,'Discusses some of the misconceptions concerning the word hacker, what it is and the author\'s attempts to use it properly.','','N',10,'',1.330,0),(2364,167,'Security Behavior',1209,'Discusses using user and group behaviour to monitor users as a way to secure networks and possibly do away with passwords.','','N',12,'',1.000,0),(2365,167,'TELECOM INFORMER',7,'Discusses how cheap GSM phone technology components are and how they\'re being used by utilities and agriculture','','N',13,'',2.000,0),(2366,167,'Format De-Shifting',1260,'Discusses PDF.js, the PDF viewer written in HTML5 and three methods to download the actual .pdf file.','','N',15,'',1.500,0),(2367,167,'Simplocker Gonna Get\'cha',1123,'Discusses the Simplocker malware (ransomware) which infects a system and encrypts files and then demands a payment to decrypt them.','','N',16,'',1.500,0),(2368,167,'Home Depot Hacks',1261,'Discusses how the Home Depot anti-theft devices can be hacked for petty theft.','','N',18,'',1.000,0),(2369,167,'Leeching Music From YouTube For Fun, Learning, and Profit',1184,'Discusses a Python script the author wrote to download youtube videos, convert them to .mp3 and optionally burn to a CD.','Coded for Linux.','A',19,'',5.000,0),(2370,167,'Recon on Disney\'s Magic Band',1262,'Discusses the Disney Magic Band, a waterproof high tech wristband that is an all inclusive pass to everything Disney (.ie resorts, parks, cruise ships, etc).','','N',24,'',1.000,0),(2371,167,'How Portable Can Wi-Fi Get?',158,'Discusses a T-Mobile Wi-Fi router manufactured by Americhip that was given away in an issue of Fortune Magazine.','','N',25,'',1.000,0),(2372,167,'HACKER PERSPECTIVE',1263,'Discusses the author\'s experiences learning hacking as an inmate in a prison.','','N',26,'',3.000,0),(2373,167,'The Surveillance Kings: Who\'s Really Behind Who\'s Watching Us',1148,'Discusses an IBM project almost ten years ago that was developing and perfecting a computer surveillance program that became part of the operating system.','','N',29,'',2.000,0),(2374,167,'Taking Your Work Home After Work',1264,'Discusses a method of circumventing an email system that blocked most attachments for security reasons.','Includes Perl script.','A',31,'',2.000,0),(2375,167,'The Perils of Lackadaisical Updates',1123,'Discusses computer application update and patch management.','','N',33,'',1.000,0),(2376,167,'Crypto Systems Which Resist Quantum Computers',1257,'Discusses crypto methods which are resistant to known algorithms used in quantum computers.','','N',48,'',2.000,0),(2377,167,'The 21st Century Hacker Manifesto',1265,'Discusses a list of the author\'s opinions of the current global state of affairs in relation to hackers.','','N',50,'',1.750,0),(2378,167,'EFFECTING DIGITAL FREEDOM',1256,'Discusses what net neutrality is, some history and why it is important to all Internet users.','','N',52,'',1.660,0),(2379,167,'Are You the Consumer, or the Product?',158,'Discusses services like Google and Facebook and why they\'re \"free\".','','N',54,'',1.500,0),(2380,167,'Generating Phone Numbers',1229,'Discusses the author\'s Python script to generate every valid phone number within a specified area code.','','A',55,'',1.500,0),(2381,167,'Hacking Dudley',1266,'Discusses some shortcomings with the Dudley combination lock.','','N',57,'',1.000,0),(2382,167,'Fiction: Hacking the Naked Princess 0xB-0xC',1161,'The eleventh and twelfth chapter of the newest Dev Manny, Information Technology Private Investigator story \"Hacking the Naked Princess\".','','N',58,'Dev Manny, Information Technology Private Investigator ',3.000,0),(2383,167,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2384,167,'Letters',15,'Dear 2600','Curiosity, Deals, Fun with Meetings, Some Facts, Offerings, Ideas, Rules of Publishing, Article Comments, More Observations, Speech, Thanks, Injustices','N',34,'verdicts',14.000,0),(2385,168,'Nous Defions Tout',2,'Discusses the Sony hack and how hackers continue to be catalysts for change and scapegoats for every imaginable problem.','','N',4,'',2.000,0),(2386,168,'So, You Want to Be a Darknet Drug Lord....',1267,'Discusses how to run a hidden service based on the author\'s stated real life experience.','','N',6,'',4.000,0),(2387,168,'Out of the Box Survival - A Guide to PowerShell Basics',97,'Discusses scripting on Microsoft Windows Vista and later using PowerShell.','See Part Two','A',10,'Out of the Box Survival, Part One A Guide to PowerShell Basics',2.500,0),(2388,168,'TELECOM INFORMER',7,'Discusses some of the telecommunication services available in Turkey.','','N',13,'',2.000,0),(2389,168,'Brazil\'s Electronic Voting Booth',1268,'Discusses the Direct Recording Electronic (DRE) voting booth made by Diebold and used in Brazil.','','N',15,'',2.000,0),(2390,168,'Evolution of a Hack',39,'Discusses how a simple Python program to send emails evolved to something more complex.','','A',17,'',4.000,0),(2391,168,'Bleeper - Downloading Full-length Preview MP3s from bleep.com',1269,'Discusses a Python program to download all Bleeper .mp3s for an album.','','A',21,'',1.000,0),(2392,168,'The Enterprise, the Subverted PKI Trust Relationship, and You',1270,'Discusses how SSL traffic can be monitored with a proxy and how you can determine if your SSL connection is secure.','','N',23,'',3.000,0),(2393,168,'HACKER PERSPECTIVE',1271,'Discusses the authors experiences with hacking that does not involve computers.','','N',26,'',4.000,0),(2394,168,'WYSE Moves',1272,'Discusses the WYSE Xenith box and version 8.0_306 WYSE ThinOS firmware.','','N',30,'',1.500,0),(2395,168,'Office Talk or Social Engineering?',1138,'Discusses how office jargon is a form of social engineering.','','N',31,'',1.500,0),(2396,168,'Archiving ComiXology',1246,'Discusses a method of downloading comics from Comixology and provides a program to automate it.','','C',33,'',1.000,0),(2397,168,'McAfee Family Protection - Epic Fail!',1273,'Discusses several methods of bypassing the McAfee Family Protection software.','','N',48,'',2.000,0),(2398,168,'Abusing the Past',1274,'Discusses a method for finding potentially vulnerable website servers.','','N',50,'',1.000,0),(2399,168,'Hacking the HandLink Gateway',1275,'Discusses a method of obtaining free Wi-Fi access from the HandLink WG-500P gateway.','','N',51,'',1.000,0),(2400,168,'EFFECTING DIGITAL FREEDOM',1276,'Discusses the recent FCC vote on net neutrality - what happened and what it means.','','N',52,'',1.660,0),(2401,168,'Ohio Prison IT Security from the Inside',1277,'Discusses the computer and network configuration and security at an Ohio prison.','','N',54,'',1.500,0),(2402,168,'Hacking For Knowledge',1278,'Discusses hacking - what it is with examples from the author\'s experience.','','N',55,'',1.500,0),(2403,168,'Linux Containers for Event Training',1279,'Discusses Linux based Containers (a form of lightweight process virtualization) specifically ISLET (Isolated, Scalable, and Lightweight Environment for Training).','','N',57,'',2.000,0),(2404,168,'Are Smart Meters the End-All?',1123,'Discusses some of the benefits and drawbacks of smart meters.','','N',59,'Are Smart Meters the End-All? or How I Learned to Love the IoT',2.000,0),(2405,168,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2406,168,'Letters',15,'Dear 2600','Opportunities, Idealism, Responses, Facts and Theories, More on 2600 Meetings, Issues, Free Expression, Inquiries, Tribute.','N',34,'Ponderings',14.000,0),(2407,169,'Old and New Together',2,'Discusses generational differences and how both sides of any issue can learn from each other and have value.','','N',4,'',2.000,0),(2408,169,'I Tapped That... Tapping a Nationwide Telecommunications Network',1280,'Discusses the authors experience with telecommunications monitoring systems and the amount of detail they provide about individual phone use. Recommends using a vpn.','','N',6,'',2.500,0),(2409,169,'Use Your 3D-Capable TV to View 3D Stills of Your Own Making',1281,'Discusses creating 3D SBS images viewable on a 3D capable TV using a python program and GIMP scripting.','','A',8,'',3.500,0),(2410,169,'A Phone Story',62,'Discusses the author\'s discovery of a method of obtaining free pay phone calls while in college may years ago.','','N',12,'',1.000,0),(2411,169,'TELECOM INFORMER',7,'Discusses the telecommunications technology used by a TV show called Capture.','','N',13,'',2.000,0),(2412,169,'Chiron and Me: Hacking Astronomy',1282,'Discusses the author\'s experience writing a program to compute an ephemeris for Chiron.','','N',15,'',2.000,0),(2413,169,'Nigrum Libro Interceptis',1283,'Discusses the basics of writing overloadable libraries in Linux with several examples written in c including subverting time-locked demo program PV-Wave.','Followup article \'Nigrum Libro Interceptis: Secundae\'. (..)','A',17,'',8.000,0),(2414,169,'HACKER PERSPECTIVE',1284,'Discusses the author\'s experiences, career in computers and introduction to 2600.','','N',26,'',3.000,0),(2415,169,'Library Security',1285,'Discusses poor state of security in many programming libraries and some suggestions for improving it.','','N',29,'',1.500,0),(2416,169,'Decoding a Carrier Pigeon',363,'Discusses a coded message found on a long dead pigeon in 2012','','N',31,'',3.000,0),(2417,169,'Attitude Adjustment: How to Keep Your Job',158,'Discusses how workplace networks and IT staff should be treated.','','N',48,'',1.500,0),(2418,169,'Out of the Box Survival, Part Two',97,'Discusses scripting on Microsoft Windows Vista and later using PowerShell.','See Part One','A',49,'Out of the Box Survival, Part Two A Guide to Powershell Basics',2.000,0),(2419,169,'EFFECTING DIGITAL FREEDOM',1286,'Discusses how websites track internet users to make money and an EFF tool called Privacy Badger to try an protect you from this.','','N',52,'Effecting Digital Freedom Creepy Web Tracking Tricks',2.000,0),(2420,169,'Coding as a Foundational Skill',1287,'Discusses the claim that \"everybody should learn how to program a computer\" and argues against it.','','N',54,'',1.000,0),(2421,169,'A Plea for Simplicity',69,'Discusses the size and complexity of current computer programs and argues for simpler, smaller, more understandable programs instead.','','N',55,'',2.000,0),(2422,169,'Ransomware Still Active and Looking for Victims/Volunteers',1123,'Discusses ransomware scenarios, targets, how they work and lessons to be learned.','','N',57,'',1.500,0),(2423,169,'Fiction: Hacking the Naked Princess 0xD-0xE',1161,'The thirteenth and fourteenth chapters of the newest Dev Manny, Information Technology Private Investigator story \"Hacking the Naked Princess\".','','N',58,'Dev Manny, Information Technology Private Investigator \"Hacking the Naked Princess\"',2.500,0),(2424,169,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2425,169,'Letters',15,'Dear 2600','General Questions, Injustice, Curiosity, Meetings, Artwork, Deep Thoughts, Help, Contributions, Deeper Thoughts, Concerns, Sad Tidings, Replies, Still Deeper Thoughts, Trouble.','N',34,'Diagnostics',14.000,0),(2440,170,'The Hacker Image',2,'Discusses preserving, correcting and maintaining the image of hackers and talks about a few current issues.','','N',4,'',2.000,0),(2441,170,'A Primer on Home Automation (and How Easy It Can Be)',1288,'Discusses automating audio/video equipment with a Logitech Harmony Ultimate Home device and a Bluetooth-capable PC.','','N',6,'',2.660,0),(2442,170,'Dangerous Clouds',1209,'Discusses how private companies collect more data on you than the government does.','','N',9,'',2.000,0),(2443,170,'Unexpected Denial Of Service',1289,'Discusses how quite by accident the author wrote a Denial Of Service program that bypassed a clients supervision tool.','','A',11,'',1.000,0),(2444,170,'A Convenient Method for Cloud Storage with Preserved Privacy',1235,'Discusses one method of using cloud services securely.','Website maintainer comment: I wouldn\'t trust Apple, Mac OS X may have a backdoor.','N',12,'',1.000,0),(2445,170,'TELECOM INFORMER',7,'Discusses the use of mobile phones in prisons and the attempts to prevent there use.','','N',13,'',2.000,0),(2446,170,'Ashley Madison Military Sites',346,'List of .mil domains from leaked Ashley Madison files.','','N',15,'',1.000,0),(2447,170,'The Technology at QPDC',1290,'Discusses the phones available to inmates at the Queens Private Detention Center.','','N',17,'',4.500,0),(2448,170,'Open Source Repository Abuse',1100,'Discusses using open source repositories to find security flaws/info useful for hacking.','','N',21,'',1.500,0),(2449,170,'My Voice Is My Key',1264,'Discusses the process the author went thru to penetrate the physical security of a company for a security test.','','N',23,'',3.000,0),(2450,170,'HACKER PERSPECTIVE',1222,'Discusses the author\'s hacker mindset and events from his past which illustrate it.','','N',26,'',3.000,0),(2451,170,'Fun with Billing Forms and International Debit Cards',1291,'Discusses a technique to use a debit card without a U.S. billing address even if formally required.','','N',29,'',1.000,0),(2452,170,'Going Nuclear - A Tale of Revenge',1292,'Discusses what the author did to someone who\'s trolling went way to far.','','N',30,'',1.000,0),(2454,170,'Malware Attacks - Leave Those Banks Alone',1123,'Discusses various banking malware.','','N',32,'',2.000,0),(2455,170,'Mr. Robot - A Ray of Light in a Very Dark World',2,'Discusses the USA Network TV series Mr. Robot.','','N',48,'',2.000,0),(2456,170,'Cruising the Wideband Spectrum',1293,'Discusses equipment likely to be found at hamfests/on ebay of interest for wideband reception.','','N',50,'',2.000,0),(2457,170,'EFFECTING DIGITAL FREEDOM',1294,'Discusses Let\'s Encrypt - a free, automated certificate authority that will be run by the non-profit Internet Security Research Group.','','N',52,'',2.000,0),(2458,170,'The Dawn of the Crypto Age',1295,'Discusses the \"beginnings of a new era of advancement in civilization and the human race\" - the crypto revolution.','','N',54,'',3.000,0),(2459,170,'Account Hack: Anyone Can Be a Victim',1123,'Discusses the author\'s experience with a PayPal account being compromised and how he dealt with it.','','N',57,'',1.000,0),(2460,170,'Fiction: The Stars Are Tomorrow',1296,'Chapter One.','','N',58,'',3.000,0),(2461,170,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2467,170,'Letters',15,'Dear 2600','Furthermore, The Word on Meetings, The Fight for Justice, On Payphones, Queries, Kindle Karma, Weird Mail, New Stuff, Advice Needed, Digital Editions, Turning Point.','N',34,'Conceptions',1.000,0),(2468,170,'LEAKED DOCUMENTS',346,'Discusses and prints an IRS document.','','N',31,'LEAKED DOCUMENTS DEPARTMENT',1.000,0),(2557,174,'The New Normal',2,'Discusses the use of fear, anger and uncertainty to justify spying and collecting data on everyone and the demonizing of encryption.','','N',4,'',2.000,0),(2558,174,'The Best Way to Share a Treasure Map',1270,'Discusses a Python program that will encrypt and split a file for example into 5 parts where any 3 will recreate the entire file.','','A',6,'',4.000,0),(2559,174,'USBkill - A Program for the Very Paranoid Computer User',1163,'Discusses a program call USBkill which will shut down a computer if it detects any changes to it\'s attached USB devices.','','N',10,'',2.000,0),(2560,174,'Circumventing Chrome and Firefox\'s Third Party Cookie Block',1072,'Discusses a method of bypassing Firefox and Chrome\'s default third party cookie setting.','','N',12,'',1.000,0),(2561,174,'TELECOM INFORMER',7,'Discusses the history of wireless communications technologies and standards in North America that have led to VoLTE (Voice over LTE).','','N',13,'',2.000,0),(2562,174,'Pushing the Limits',346,'Discusses the anonymous author\'s experience beta testing various hardware and software products.','','N',15,'',2.000,0),(2563,174,'Romeo Tango Oscar',1297,'Discusses the author\'s experiences as a Radio Telephone Operator with the U.S. Army in Viet Nam in 1969.','','N',17,'',3.000,0),(2564,174,'Yull Encryption',1298,'Discusses the Yull encryption program.','','N',20,'',4.000,0),(2565,174,'A Brief Cryptanalysis of Yull',1299,'Discusses a brief analysis of the Yull encryption program\'s Andromeda cipher.','','N',24,'',2.000,0),(2566,174,'HACKER PERSPECTIVE',1300,'Discusses techniques collectively referred to as \"tradecraft\" and examples of their real world use.','','N',26,'',3.000,0),(2567,174,'How to Get Free Gogo In-Flight Internet Access',256,'Discusses a method of obtaining free Internet Access on an American Airlines flight.','','N',29,'',1.660,0),(2568,174,'Accessing Admin Privileges: A Quest Through One of Mac\'s Backdoors',1301,'Discusses two methods of obtaining administrator privileges on a Macintosh OS X computer - requires physical access.','','N',30,'',1.330,0),(2569,174,'Perspectives on Cyber Security',1302,'Discusses how little computer security has improved over the past few decades and suggests new approaches.','References \'Bugging a Room with an IP Phone\'..','N',32,'',2.000,0),(2570,174,'The Splotchgate Saga',346,'Discusses the copyright trolls at License Compliance Services/Trunk Archive and their attempt to get (ie. extort) a settlement payment from 2600 Magazine.','','N',34,'',2.000,0),(2571,174,'Hackerspaces: A Definition',1303,'Discusses how the author found and learned about a local hackerspace.','','N',48,'',2.000,0),(2572,174,'You Gotta Learn From This, Kid',1274,'Discusses a credentials leakage vulnerability in Firefox.','','N',50,'',1.000,0),(2573,174,'The Limits of Open Source Hardware',1304,'Discusses the open source hardware movement - what and why it exists and where it is and may go.','','N',51,'',1.000,0),(2574,174,'EFFECTING DIGITAL FREEDOM',1305,'Discusses ALPRs (automated license plate recognition systems), their widespread use and abuse.','','N',52,'Defending Privacy on the Roads',2.000,0),(2575,174,'Rewriting History',1306,'Discusses the WARC (Web ARChive) format and the potential to misuse it.','','N',54,'',2.500,0),(2576,174,'The Herculean Task of Making a Documentary on the History of Computer Hacking',1307,'Discusses some of the history of hacking the author is interested in making into a documentary.','','N',56,' The Herculean Task of Making a Documentary on the History of Computer Hacking (Part 1)',2.500,0),(2577,174,'Fiction: Hacking the Naked Princess 0xF',1161,'The fifteenth chapter of the newest Dev Manny, Information Technology Private Investigator story \"Hacking the Naked Princess\"','','N',59,'Dev Manny, Information Technology Private Investigator \"Hacking the Naked Princess\"',2.000,0),(2578,174,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2579,174,'Letters',15,'Dear 2600','Ideas, Article Feedback, Humble Requests, Meeting Mania, Splotchgate Comments, Random Thoughts, Experiences, Suggestions, Observations, Questions, HOPE Tickets.','N',36,'Proclamations',12.000,0),(2603,176,'The Powers That Want to Be',2,'Discusses the FBI\'s demand that Apple subvert the security of their phones and the implications and consequences of doing that.','','N',4,'',2.000,0),(2604,176,'Scraping for Cache, or It\'s Not Piracy If You Left It Out in the Open',1308,'Discusses a bash script to download Google cached content of an online edition of a McGraw Hill textbook.','','A',6,'',2.500,0),(2605,176,'Hacking Using Parse Database Injection',1309,'Discusses a new form of web site hacking discovered through the Blackbaud website management software.','','N',8,'',1.500,0),(2606,176,'Hardware Hacking - Protecting Dev\' Board I/O by Hacking an Alarm Panel',1176,'Discusses methods for interfacing digital and analog i/o ports with external signals and details a cost-effective method of using any alarm panel for obtaining suitable protection.','References article \"Hardware Hacking - An Introduction via Dev\' Boards\". (..)','N',10,'',3.000,0),(2607,176,'TELECOM INFORMER',7,'Discusses the author\'s training for fiber splicing.','Anecdotal, no technical info.','N',13,'',2.000,0),(2608,176,'My President Twitter Bot Experiment',1310,'Discusses a PHP/MySQL chatterbot - a fake automated Twitter account.','','A',15,'',1.000,0),(2609,176,'Defense Against the Black Arts of Forensics',480,'Discusses some methods of protecting your computer from someone with physical access.','','N',16,'',1.500,0),(2610,176,'A Plan 9 Primer',1311,'Discusses the Plan 9 operating system developed at Bell Labs in the 1980s.','','N',17,'',1.500,0),(2611,176,'Chesslin',1312,'Discusses a sizecoding exercise to code a playable chess engine in 256 bytes.','','A',19,'',3.000,0),(2612,176,'Exploiting HTML - Making Your Browser a Vegetable',1313,'Discusses a simple web page that can quickly fill your browser with new tabs.','','A',22,'',2.000,0),(2613,176,'Exif Location Recon with Python',1314,'Discusses using Python to extract Exchangeable image file format (Exif) information.','','A',24,'',2.000,0),(2614,176,'HACKER PERSPECTIVE',1315,'Discusses the author\'s experiences with hacking and how it\'s changed him.','','N',26,'The Hacker Perspective',2.000,0),(2615,176,'Eleventh Graders and Nuclear Bombs',1316,'Discusses the author\'s experience teaching an 11th grade programming class.','','N',29,'',1.000,0),(2616,176,'Which Do We Prefer: Neanderthals or Hackers?',1144,'Discusses the current responses to what hackers do and what the author believes the response should be.','','N',30,'',1.000,0),(2617,176,'One Little Pig',1317,'Discusses the author\'s packet crafting tool called PIG (Packet Intruder Generator).','','N',31,'',1.660,0),(2618,176,'Password and Mobility Security: Something Needs to Be Done',1318,'Discusses mobile devices and passwords use referencing the 2014 Consumer Reports nationwide survey.','','N',32,'',1.330,0),(2619,176,'Another Solution to the USBKill.py Problem',1319,'Discusses a bash script from Ninja OS which will shut down a computer if the OS drive is unplugged.','References article \"USBkill - A Program for the Very Paranoid Computer User\". (..)\r\nIRC #ninjaos channel on irc.freenode.net','A',48,'',2.000,0),(2620,176,'Software Validation',1320,'Discusses general concepts of securing a computer with some specific tools mentioned.','pgp = EE5F 99EB E8A8 89AE 1BAF ED64 C9D6 A901 0E89 A3D8','N',51,'',2.000,0),(2621,176,'EFFECTING DIGITAL FREEDOM',1321,'Discusses Digital Rights Management (DRM), copyright and the Digital Millennium Copyright Act (DMCA).','','N',52,'DRM Law Keeps Copyright Stuck in the Past',2.000,0),(2622,176,'Reconnaissance at Spa World',158,'Discusses the electronic locker system used at Spa World in Centreville, Virginia.','','N',54,'',2.250,0),(2623,176,'My Local Weather Observations',1322,'Discusses a security problem in the 0915TRX AcuLink Internet Bridge.','','N',56,'',0.750,0),(2624,176,'Fiction: The Bee in Van Pelt Park',1323,'A short story.','','N',57,'',4.000,0),(2625,176,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2626,176,'Letters',15,'Dear 2600','Being Published, Help!, Observations, A Breach of Note, Thoughts of HOPE, Just Asking..., News from Meetings, Gratitude.','N',34,'Peer Review',14.000,0),(2671,179,'Politics Comes Calling',2,'Discusses what a Donald Trump presidency may mean for hackers.','','N',4,'',2.000,0),(2672,179,'Pre-Surveillance of Law Enforcement Using Targeted Advertising',1324,'Discusses using search engine targeted advertising to determine if someone (like law enforcement) is searching for you.','','N',6,'',2.000,0),(2673,179,'Abandoned Routers: Forgotten, But Not Gone',1291,'Discusses the author finding an old wifi access point using default password and settings as a reminder to check for same on your own network.','','N',8,'',1.000,0),(2674,179,'Card Transactions Explained',1209,'Discusses how credit and ATM card transactions work with an emphasis on credit union systems.','','N',9,'',3.000,0),(2675,179,'To Hack an Uber',1072,'Discusses a potential method to get free Uber rides.','','N',12,'',1.000,0),(2676,179,'TELECOM INFORMER',7,'Discusses the use of VoIP and cloud pbx services to route calls anywhere on the planet cheaply.','','N',13,'',2.000,0),(2677,179,'Hacking Malaysian Routers',1325,'Discusses how the author found at least 10,000 vulnerable routers using the Telekom Malaysia ISP.','','N',15,'',2.000,0),(2678,179,'Nigrum Libro Interceptis: Secundae',1283,'Discusses the Jynx-Kit Userland Rootkit and a method for masking and protecting the LD_PRELOAD environment variable.','References article \'Nigrum Libro Interceptis\'. (..)','A',17,'',5.660,0),(2679,179,'$35 Hacking Machine',1326,'Discusses setting up a Raspberry Pi Linux system.','','N',23,'',1.500,0),(2680,179,'Accidentally Logging In As Admin',97,'Discusses poorly written websites and their lack of security.','','N',24,'',1.500,0),(2681,179,'HACKER PERSPECTIVE',353,'Discusses the authors experiences going thru life as a hacker.','','N',26,'The Hacker Perspective',3.000,0),(2682,179,'Gaming Ingress',1327,'Discusses methods to cheat when playing the Ingress game.','','N',29,'',3.000,0),(2683,179,'Learning Hacking via MinecraftEdu',1328,'Discusses hacking for the Minecraft game.','','N',32,'',1.330,0),(2684,179,'Typing Fractions in Emails and Text Files',21,'Discusses the telegraph required format for typing fractions.','','N',33,'',0.660,0),(2685,179,'Surfing the Web Safely and Anonymously with Whonix',1243,'Discusses the Whonix Operating System which uses Tor.','','N',48,'Surfing the Web Safely and Anonymously Experimenting with the Whonix Operating System',2.250,0),(2686,179,'How I Socially Engineered a Job',1044,'Discusses social engineering a Human Resources department after being an idiot.','','N',50,'',0.750,0),(2687,179,'Why We Need Privacy Rights',1329,'Discusses reasons why privacy is needed in a free society.','','N',50,'',0.660,0),(2688,179,'EFFECTING DIGITAL FREEDOM',1321,'Discusses the U.S. patent systems and efforts to reform it.','','N',52,'EFFECTING DIGITAL FREEDOM The Patent Reform Gridlock: Let\'s Pick Bigger Fights',2.000,0),(2689,179,'Free Windows',1330,'Discusses a method of getting Microsoft Windows operation systems for free with a focus on Windows 10.','','N',54,'',2.000,0),(2690,179,'The Top Ten Reasons Why Hackers Should Get a Ham Radio License',1331,'Discusses exactly what the title says.','','N',56,'',2.500,0),(2691,179,'Fiction: Hacking the Naked Princess 0x10-0x11',1161,'The sixteenth and seventeenth chapters of the newest Dev Manny, Information Technology Private Investigator story \"Hacking the Naked Princess\"','','N',58,'Dev Manny, Information Technology Private Investigator \"Hacking the Naked Princess\"',2.500,0),(2692,179,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2693,179,'Letters',15,'Dear 2600','Hacker News, Hacker Queries, Hacker Mentality, Hacker Gatherings, Hacker Followups, Hacker Observations, Hacker Requests, Hacker Targets, Hacker Offerings.','N',34,'GLORY',14.000,0),(2713,181,'Promises',2,'Discusses the hacker promise as exemplified by The Eleventh HOPE.','','N',4,'',2.000,0),(2714,181,'Hacking for Knowledge',1278,'Discusses installing Ubuntu 12.04 LTS.','','N',6,'',4.000,0),(2715,181,'MOV Before You JMP',1332,'Discusses the importance of assembly language in finding vulnerabilities and writing exploits.','','N',10,'',1.000,0),(2716,181,'It\'s Security, Stupid',1333,'Discusses the Freedom Online Coalition and the fundamental rejection of the notion that security requires a sacrifice of individual rights.','','N',11,'It\'s Security, Stupid Challenging the Notion That Security Costs Us Our Rights',1.000,0),(2717,181,'Freedom of Thought',1329,'Discusses that even with socialization all thoughts are free and can\'t be taken from you.','','N',12,'',1.000,0),(2718,181,'TELECOM INFORMER',7,'Discusses damage to copper/land lines from disasters and the inevitable retirement of such equipment.','','N',13,'',2.000,0),(2719,181,'A Captive Portal Puzzle at Sea',1334,'Discusses bypassing the captive portal on a cruise ship.','','N',15,'',2.000,0),(2720,181,'Spyware Techniques',1335,'Discusses the concepts and principles of spyware creation, includes sample code in C# and C++.','Pages 17-20 and 54-57.','A',17,'',8.000,0),(2721,181,'Building DIY Community Mesh Networks',1336,'Discusses meshnets including existing community mesh networking projects, picking hardware, meshing software and putting it together.','','N',21,'',2.500,0),(2722,181,'Musical Monstrosities',1313,'Discusses hacking or \"circuit bending\" a musical toy electronic organ called the Xorgon.','','N',24,'',2.000,0),(2723,181,'HACKER PERSPECTIVE',1337,'Discusses what the author believes a hacker/hacking is and where it began for him.','','N',26,'The Hacker Perspective',3.000,0),(2724,181,'The PirateBox',1338,'Discusses the PirateBox a DIY anonymous offline file-sharing and communications system.','','N',29,'',2.000,0),(2725,181,'How to Google Bomb Someone',1339,'Discusses ways to game Google\'s search methods used to present Search Engine Results PageS (SERPS).','','N',31,'How to Google Bomb Someone or Rick Santorum\'s Sticky Situation',3.000,0),(2726,181,'Verizon\'s HOPE Scam',346,'Discusses the Verizon rip off to get a traditional landline for the social engineering panel at the Eleventh HOPE.','','N',47,'',1.000,0),(2727,181,'The Easiest Way to Break Into a Bank',1340,'Discusses the default online banking account access of TD Bank in New York.','','N',48,'',1.000,0),(2728,181,'Hacking Amazon E-Books with Spy Style',1341,'Discusses a tool written in AppleScript to convert an E-Book to text.','','N',49,'',3.000,0),(2729,181,'EFFECTING DIGITAL FREEDOM',1321,'Discusses the FCC\'s upcoming decision on the \"Unlock the Box\" proposal.','','N',52,'Effecting Digital Freedom Copyright Is Not a Trump Card',1.000,0),(2730,181,'A Parallel President on Twitter',1342,'Discusses a Twitter bot the author wrote using PHP.','','N',58,'',3.000,0),(2731,181,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2732,181,'Letters',15,'Dear 2600','Offerings, Meeting Updates, Getting Involved, Curiosity, New Stuff, Corporate Fallout, Following Up, Acknowledgment, Political Intrigue, The Eleventh HOPE.','N',34,'synergy',13.000,0),(2755,183,'Dark Bubbles',2,'Discusses how people tend to associate only with people they agree with, the November election and electoral college, and how hackers can help.','','N',4,'',2.000,0),(2756,183,'Rescuing Fake Memory Devices',1343,'Discusses an eBay scam that sells SD cards, flash drives, and similar memory devices as having more memory than they actually do, and suggests what to do about it.','','N',6,'',1.500,0),(2757,183,'Having Fun with In-Store Chromecast',1344,'Discusses possible methods of gaining access to a Best Buy wifi network and a suggestion for what to do with it.','','N',7,'',1.500,0),(2758,183,'The Coca-Cola Blacklist',1313,'Discusses the 2015 Share A Coke campaign and lists a lot of the things that have been blacklisted.','','N',9,'',3.000,0),(2759,183,'Bypassing Privileges with Oracle Database Express Edition',1345,'Discusses using an Oracle XE 11g Release 2 instance to bypass certain DBA enforced rules.','','N',12,'',1.000,0),(2760,183,'TELECOM INFORMER',7,'Discusses Canada\'s mobile phone service and the phasing out of the CDMA network on 01/31/2017.','','N',13,'',2.000,0),(2761,183,'Using Discord Servers to HTTP Flood',1189,'Discusses a DoS attack using the Discord voice/text chat application.','','N',15,'',1.000,0),(2762,183,'Successful Network Attacks - Phase One',1329,'Discusses the five phases of a network attack with detailed discussion of Phase One: Reconnaissance.','','N',16,'',2.000,0),(2763,183,'Spying Across Borders in the Age of Email',1346,'Discusses the unauthorized access of one of the email accounts linked to the author\'s research.','','N',18,'',6.000,0),(2764,183,'InfoSec at Its Worst, OPSEC at Its Best',1301,'Discusses the methods used to obtain all of his mothers passwords.','','N',24,'',2.000,0),(2765,183,'HACKER PERSPECTIVE',1347,'Discusses the author\'s life as a hacker.','','N',26,'The Hacker Perspective',3.000,0),(2766,183,'Can Security Be Built into Pure Data?',1348,'Discusses a proposal for a secure XML standard.','','N',29,'',1.000,0),(2767,183,'mcquery.js - a Web Scraper for Disc Golf Players',1349,'Discusses a program to web scrape the Innova web site for availability of the McPro Roc3 special golf disk.','','A',30,'',3.750,0),(2768,183,'KBChat - Private, Encrypted Chat via KBFS',1350,'Discusses the kbchat.sh script that allows encrypted chat using the Keybase service.','','A',48,'',2.000,0),(2769,183,'2600 Leak Department',346,'Shows a document which looks like it is used by scammers pretending to be the IRS.','','N',50,'',1.000,0),(2770,183,'Memory Lane',346,'Display a New Jersey Bell document concerning calls to Washington, DC.','','N',51,'',1.000,0),(2771,183,'EFFECTING DIGITAL FREEDOM',1351,'Discusses five things tech companies must do before January 20.','','N',52,'',2.000,0),(2772,183,'Rotten Apples: OS X 101',1352,'Discusses the history and structure of Apple\'s recent operating systems and some of the security features.','References article Accessing Admin Privileges: A Quest Through One of Mac\'s Backdoors. (..)','N',54,'',1.500,0),(2773,183,'Automatic Contest Winning via Selenium',1353,'Discusses some Python code to automate contest code redemption using Selenium and Twitter.','','A',55,'',1.500,0),(2774,183,'The One About That File Server',1354,'Discusses a tech support story the author has told.','','N',57,'',1.000,0),(2775,183,'Fiction: Hacking the Naked Princess 0x12',1161,'The eighteenth (0x12) chapter of the newest Dev Manny, Information Technology Private Investigator story \"Hacking the Naked Princess\"','','N',58,'Dev Manny, Information Technology Private Investigator \"Hacking the Naked Princess\" ',2.660,0),(2776,183,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2777,183,'Letters',15,'Dear 2600','General Inquiries, Contributions, Liberation, Scrutiny, Electorials, Events, Digital Editions, Fun with Calendars, More Dialogue, The Bounty, Appreciation, Something New, Issues, The Wonderful World of Meetings, Observed, Knowledge Lost.','N',34,'CROSSFIRE',14.000,0),(2803,185,'A Price for Truth',2,'Discusses some threats to hackers and technology from past and current administrations and the $10,000 offer for Trump\'s tax return.','','N',4,'',2.000,0),(2804,185,'New U.K. Surveillance Laws - Time to Get Serious About Security',1355,'Discusses the Investigatory Powers Bill and several ways to protect yourself from such government spying.','','N',6,'',2.000,0),(2805,185,'Voices in the Sky: Satellite Communication Methods',1304,'Discusses methods satellite operators use to communicate with satellites and spacecraft, security issues and the future of laser communications.','','N',8,'',1.500,0),(2806,185,'Lockbox PIN Code Generator',1356,'Discusses a python program to create a pin list to crack a supra key box.','','A',9,'',1.500,0),(2807,185,'A Lock with the Key Next to It',1357,'Discusses the lack of network security at the author\'s middle school.','','N',11,'',1.000,0),(2808,185,'Hacking Free Wi-Fi on Delta Flights',1358,'Discusses a method of obtaining free Internet on Delta flights.','','N',12,'',0.500,0),(2809,185,'TELECOM INFORMER',7,'Discusses Internet and cellphone services in Myanmar.','','N',13,'',2.000,0),(2810,185,'Telephones from Space',1313,'Discusses scanning (hand scanning or exchange scanning) and some of the phone numbers found.','','N',15,'',2.000,0),(2811,185,'Longing for the Past',1359,'Discusses the author\'s obsession with telecommunications and computing history.','','N',17,'',1.000,0),(2812,185,'Getting Inspired as a Student',1360,'Discusses Black Hat Europe 2016 held last November in London which the author attended on a studentship.','','N',18,'',1.000,0),(2813,185,'Google Auto-Fill Suggestions, Politics, and Magic',1054,'Discusses Google auto-fill suggestion results for political people','','N',19,'',5.500,0),(2814,185,'The Inner Circle... Part One',346,'ASCII data of ? - not sure what this is or why there is no explanation.','','N',22,'',4.000,0),(2815,185,'HACKER PERSPECTIVE',1361,'Discusses how trust is established between people and comparatively between computers.','','N',26,'The Hacker Perspective',3.000,0),(2816,185,'Software Cracking with dotPeek',1362,'Discusses the dotPeek 1.5 decompiler and using it with 5 Lives Studio\'s Satellite Reign.','','N',29,'',1.000,0),(2817,185,'Ignore Your .env - Browsing Environment Files on GitHub',1363,'Discusses some interesting information found by searching GitHub.','','N',30,'',1.000,0),(2818,185,'Obfuscating Torrent Traffic',1364,'Discusses LayerProx and the socks5 support module the author wrote to proxy BitTorrent traffic.','','S',31,'',1.000,0),(2819,185,'Successful Network Attacks - Phase Two',1329,'Discusses use of a number of tools to probe a network for any vulnerabilities and appropriate defenses.','','N',32,'Successful Network Attacks - Phase Two Network Scanning',2.000,0),(2820,185,'White House Phone Numbers',346,'The title says it all.','','N',48,'',1.000,0),(2821,185,'How to Improve Zone Protection in Burglary Alarms',1365,'Discusses a hardwired zone control panel input that provides enhanced security against compromise attacks with the zone loop.','See issue 34:2 Letters section p.44 for comments by Monican about possible errors in the schematics.','N',49,'',3.000,0),(2822,185,'EFFECTING DIGITAL FREEDOM',1366,'Discusses the movement to encrypt the web with https and Let\'s Encrypt and Certbot.','','N',52,'EFFECTING DIGITAL FREEDOM We\'re Halfway to Encrypting the Entire Web',1.000,0),(2823,185,'Validating Software Validation',1095,'Discusses several ideas to circumvent the checksumming of files presented in the Ben Kenobi article.','References article \"Software Validation\". (..)','N',56,'',1.500,0),(2824,185,'Thoughts on Phoenix Project II',1367,'Discusses some OS, hardware, software and management alternatives to the \"Hacking for Knowledge\" article.','References article \"Hacking for Knowledge\". (..)','N',58,'',1.000,0),(2825,185,'Those Coca Cola Freestyle Machines in Crew Mode',1368,'Discusses how to put the Coca Cola Freestyle machine into \"Crew\" mode.','','N',59,'',1.000,0),(2826,185,'321 Studios Revisited',1369,'Discusses the software company 321 Studios whose main product was DVD X Copy.','','N',60,'',1.000,0),(2827,185,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2828,185,'Letters',15,'Dear 2600','Contributions, Distribution, Meetings, Storm Warning, A Look Back, Feedback, Asking, Leaks, The Future, The Marketplace, Observation, Further Info, More Eleventh HOPE Feedback','N',34,'REACTIONS',14.000,0),(2852,187,'The Power of the Press',2,'Discusses journalism and the press, how things are changing but the core fundamentals and importance have remained the same.','','N',4,'',2.000,0),(2853,187,'The Censorship Resistant Internet: How to Run a Tor Hidden Service',1370,'Discusses how to run a censorship resistant Tor hidden service.','First of four part series.','N',6,'The Censorship Resistant Internet Part 1: How to Run a Tor Hidden Service (a.k.a. .onion)',4.000,0),(2854,187,'Converting the Voter Database and Facebook into a Google for Criminals',1371,'Discusses using the Ohio voter database to link with Facebook information.','Author has \"redacted some of the secret sauce that makes this work\".','N',10,'',2.000,0),(2855,187,'Hacktivism to End Human Trafficking and Modern Day Slavery',1355,'Discusses the human trafficking industry\'s use of the dark web and advocates hacking them.','','N',12,'',1.000,0),(2856,187,'TELECOM INFORMER',7,'Discusses how political circumstances have affected the telcom country codes and infrastructure.','','N',13,'',2.000,0),(2857,187,'How Rogue One Taught Me Not to Be a Bad Guy',1372,'Discusses thinking about ethics and morality in the work the author does in the tech industry.','','N',15,'',2.500,0),(2858,187,'A Declaration of Independence for Cyberspace',1329,'Discusses cyberspace independence, section I Definition of Terms and section II Declaration of independence for the protection of information flow and rights listed.','','N',17,'',1.500,0),(2859,187,'Demonsaw: Bypassing Anonymity Utilizing Social Engineering',1373,'Discusses Demonsaw (an information sharing application) and a method of possibly determining the IP of a user.','','N',19,'',1.330,0),(2860,187,'Creating an Automated Open Wi-Fi Traffic Capturing Tool for Under $20',1374,'Discusses building a Pi Zero device to automatically capture the traffic from the most active open Wi-Fi within range.','','A',20,'Pineapple Pi - Creating an Automated Open Wi-Fi Traffic Capturing Tool for Under $20',3.660,0),(2861,187,'0x8bc4 Before You 0xffe0',244,'Discusses assembly, machine code and layers of abstraction and their use in exploitation.','','N',24,'',2.000,0),(2862,187,'HACKER PERSPECTIVE',1225,'Discusses the influences, milestones and experiences in the Author\'s life as a hacker.','','N',26,'The Hacker Perspective',3.000,0),(2863,187,'My Perspective',1375,'Discusses living in a surveillance society and what is necessary to maintain and promote privacy.','','N',29,'',2.000,0),(2864,187,'OPTingOUT',1376,'Discusses the author\'s attempt to delete his facebook account.','','N',31,'',1.000,0),(2865,187,'Analog vs. Digital Living: Real Solutions to Absolute Anonymity and Privacy',1148,'Discusses running the Tails OS on an Acer Chromebook for basic anonymity, privacy and computer security.','','N',32,'Analog vs. Digital Living: Get Off the Grid & Still Stay Connected to the World-Real Solutions to Absolute Anonymity and Privacy',2.000,0),(2866,187,'EFFECTING DIGITAL FREEDOM',1377,'Discusses the EFA (Electronic Frontier Alliance) a grassroots network working to educate people about their digital rights.','','N',46,'Building Digital Safety Skills in Your Community',1.000,0),(2867,187,'Building a Better Screen Locker for GNU/Linux',1378,'Discusses the goals of a screen locker and builds one from existing source code.','','A',47,'',5.000,0),(2868,187,'CITIZEN ENGINEER',1379,'Discusses some recent patent law court decisions and the expiration of the mp3 patent.','','N',52,'',1.750,0),(2869,187,'VR Trumpers',1380,'Discusses virtual reality and Donald Trump supporters.','','N',54,'',1.330,0),(2870,187,'Successful Network Attacks - Phase Three',1329,'Discusses several modes of gaining access to a network and common defenses.','','N',55,'Gaining Access',1.660,0),(2871,187,'Advice from the Socially Engineered',1381,'Discusses some general social engineering principles and strategies.','','N',57,'',1.000,0),(2872,187,'Internet Thoughts',1382,'Discusses the Internet and the need to keep it free as in freedom.','','N',58,'',0.660,0),(2873,187,'Fiction: Hacking the Naked Princess 0x13',1161,'The nineteenth (0x13) chapter of the newest Dev Manny, Information Technology Private Investigator story \"Hacking the Naked Princess\"','','N',59,'Dev Manny, Information Technology Private Investigator \"Hacking the Naked Princess\"',2.000,0),(2874,187,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2898,187,'Letters',15,'Dear 2600','Stickers, Corporate Culture, Further Info, Concerns, Meeting Updates, Taking Action, Inquiries, Article Responses.','N',34,'CHORUS',12.000,0),(2924,189,'Acts of Courage',2,'Discusses the current political environment in the United States.','','N',4,'Acts of Courage Take Courage',2.000,0),(2925,189,'Bypass Your ISP\'s DNS and Run A Private OpenNIC Server',1336,'Discusses running your own Domain Name System server using OpenNIC to help maintain your privacy.','','N',6,'',2.000,0),(2926,189,'PHP Backdoors',1383,'Discusses PHP backdoors under Wordpress and simple ways to write your own with examples.','','A',8,'',3.000,0),(2927,189,'Inseparable: The Intersectionality of Hacking and Politics',1384,'Discusses some of the intersections between hacking and politics.','','N',11,'',2.000,0),(2928,189,'TELECOM INFORMER',7,'Discusses Signaling System 7 (SS7), one of multiple extremely serious vulnerabilities in the U.S. telecommunications network.','','N',13,'',2.000,0),(2929,189,'Enhancing SQL Injection With Stored Procedures',1335,'Discusses how to enhance SQL injection by using stored procedures (including undocumented ones) in Microsoft SQL Server.','','N',15,'',2.500,0),(2930,189,'How to Get Nearly Free Travel from Scotrail',1385,'Discusses a possible method to get free rail transit on Scotrail in Scotland.','','N',17,'',0.500,0),(2931,189,'(learn (LISP))',1386,'Discusses the LISP language including history, dialects and some basic programming concepts.','','N',18,'',3.660,0),(2932,189,'Reverse Engineering Electronic Letter and Number Toys',1387,'Discusses some interesting findings from reverse engineering pinout patterns from four toys.','','N',21,'',1.330,0),(2933,189,'How to Hack Your Way to a Guilt-Free, Political Ideology',1245,'Discusses forming a political ideology from the literal ground up that serves everyone.','Assume Eyenot and eyenot are the same author.','N',23,'',2.000,0),(2934,189,'The Problem with IT Certifications and Their Contribution to the Devaluation of Technology',1302,'Discusses the degrading of IT certifications and argues for more passion and out of the box mindset in IT professionals.','','N',25,'',1.000,0),(2935,189,'HACKER PERSPECTIVE',1106,'Discusses the author\'s hacker origin story.','','N',26,'',3.000,0),(2936,189,'A Little Brother\'s Manifesto',1388,'Discusses government mass surveillance and back-dooring of software and online services as the driver of resistance.','','N',29,'',1.000,0),(2937,189,'A Test Harness for Fuzzing Font Parsing Engines in Web Browsers',1389,'Discusses a cross-platform test harness written in Python that assists the user in searching for vulnerabilities in web browsers.','Book references:\r\nChris Anley et al, \"The Shellcoder\'s Handbook: Discovering and Exploiting Security Holes, 2nd edition, Wiley Publishing, 2007.\r\nJustin Seitz, Gray Hat Python: Python Programming for Hackers and Reverse Engineers, No Starch Press, 2009','C',30,'',4.000,0),(2938,189,'EFFECTING DIGITAL FREEDOM',1321,'Discusses the SESTA act currently in congress and Section 230 which protects free speech online.','','N',46,'',1.000,0),(2939,189,'Confessions of a (for Now Not So Successful) Bug Bounty Hunter',1332,'Discusses some of the pitfalls of trying to get bug bounties.','','N',47,'',2.000,0),(2940,189,'To Care or Not to Care',1390,'Discusses vulnerabilities in the author\'s high school computer system and it\'s iTALIC software.','','N',49,'',1.000,0),(2941,189,'Scrape Textbooks, Save Money',1391,'Discusses an AppleScript that uses the Kindle.app to take pictures of every page of a book.','','A',50,'',1.000,0),(2942,189,'googlecomp.py: The Complete Google Autocomplete Script',1357,'Discusses a python script to return the first autocomplete result of a google search.','Assume ckjbgames and Ckjbgames are the same.','A',51,'',1.000,0),(2943,189,'CITIZEN ENGINEER',1379,'Discusses setting up an ad blocker DNS server using the pi-hole software and a Raspberry Pi or other low-cost single-board computer.','','N',52,'',2.000,0),(2944,189,'Obfuscating Biopolitics: A Theoretical Primer for Cyborgs and Other Concerned Citizens',1392,'Discusses how \"biopolitics\" may be subverted using tactics of digital obfuscation.','Citations\r\nDillon, M., and Lobo-Guerrero, L. Biopolitics of Security in the 21st Century : An Introduction (2008) Review of International Studies Vol. 34, No. 2\r\nLatour, B. We Have Never Been Modern (1991)\r\nThacker, Eugene. The Global Genome: Biotechnology, Politics and Culture (2005)','N',54,'',4.000,0),(2945,189,'Debt Journey',1284,'Discusses debt collection of student loans, mortgage and credit cards and some tips and suggestions if you\'re in debt.','','N',58,'',1.000,0),(2946,189,'Successful Network Attacks - Phase Four',1329,'Discusses general guidelines for maintaining access and common defenses.','','N',59,'Maintaining Access',1.000,0),(2947,189,'Splatter',1393,'Discusses the Trump election.','','N',60,'',1.000,0),(2948,189,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2949,189,'Letters',15,'Dear 2600','Administrivia, Following Up, Inquiring Minds, More on Meetings, Contrition, Other Cultures, Political Views, Observations, Projects.','N',34,'Mob Rule',11.660,0),(2971,191,'Credit Denial',2,'Discusses data leaks and breaches including the egregious Equifax incident and the government protecting the company rather than punishing it.','','N',4,'',2.000,0),(2972,191,'Using dnscat2 for Encrypted C&C over DNS',1389,'Discusses the process of setting up and using dnscat2.','','N',6,'',3.000,0),(2973,191,'Educating Friends and Family About Online Security',1394,'Discusses tips on how to get people engaged in the vital topic of personal freedom in the Digital Age.','','N',9,'',2.000,0),(2974,191,'Creating Strong and Easy to Remember Passwords',1395,'Discusses a simple technique for creating passwords that is both strong and easy to remember.','','N',11,'',1.000,0),(2975,191,'Don\'t You Have a Smart Watch Yet?',21,'Discusses pairing a smart watch with a phone for easier two-factor authentication.','','N',12,'Don\'t You Have a Smart Watch Yet? It Will Make Your Email Security That Much Easier To Deal With',1.000,0),(2976,191,'TELECOM INFORMER',7,'Discusses the Rural Electrification Act which was the foundation of universal service and how the FCC has gutted that concept and net neutrality.','','N',13,'',2.000,0),(2977,191,'What Happens When WHOIS Data Is Made Public',1356,'Discusses the current WHOIS privacy issues and a proposed replacement called Registration Directory Service (RDS).','','N',15,'',3.500,0),(2978,191,'Deauthing the Neighbors, or Ring Theory',1396,'Discusses one option in','','N',18,'',0.500,0),(2979,191,'Nightmare on E Street (Modem and Me Against the World)',1397,'Discusses the author\'s never ending saga with her Internet connection, modem(s) and wifi network.','','N',19,'',7.000,0),(2980,191,'HACKER PERSPECTIVE',1398,'Discusses the five traits the author has which defines him as a hacker.','','N',26,'The Hacker Perspective',2.500,0),(2981,191,'Quantum Computers and Bitcoin',1257,'Discusses the history, current situation, trends, likely future developments and predictions about quantum computers and digital currencies.','','N',29,'',2.000,0),(2982,191,'I Want to Be a Hacker....',1399,'Discusses a list of activities to help those looking to become professional pentesters/security researchers/security engineers.','','N',31,'',3.000,0),(2983,191,'EFFECTING DIGITAL FREEDOM',1400,'Discusses Section 702 of the FISA Amendments Act and the bills to reauthorize it by 12/31/2017.','','N',46,'NSA Spying Is Up for Re-Election',1.000,0),(2984,191,'Conventionalist Theory of Reference in Comparison to Programming Language',1309,'Discusses Gareth Evans\' conventionalist theory of reference and the computer programming language javascript.','References \"The Causal Theory of Names\" p18.','N',47,'A Semantic and Pragmatic Analysis',2.500,0),(2985,191,'Down and Out in a Land of Script Kiddies',1401,'A poem.','','N',49,'(or How I Learned to Stop Phreaking and Love Ma Bell)',1.500,0),(2986,191,'Dispelling a Breach Rumor',1402,'Discusses the rumor of the sudo command being compromised in Ninja OS.','','N',51,'',1.000,0),(2987,191,'CITIZEN ENGINEER',1379,'Discusses some of the many open software stacks for hardware devices.','','N',52,'',2.000,0),(2988,191,'The Russian Hacking Diatribe, and Why It Is Complete Agitprop Nonsense',1403,'Discusses the \"So-Called\" evidence for Russian Hacking of the DNC, RNC and the U.S. election.','','N',54,'(And, No, I\'m Not a Trump Supporter)',3.000,0),(2989,191,'Successful Network Attacks - Phase Five',1329,'Discusses general methods for hiding the attack and common defenses.','','N',57,'Covering Tracks',1.500,0),(2990,191,'Fiction: Hacking the Naked Princess 0x14',1161,'The twentieth (0x14) chapter of the newest Dev Manny, Information Technology Private Investigator story \"Hacking the Naked Princess\"','','N',59,'Dev Manny, Information Technology Private Investigator \"Hacking the Naked Princess\"',2.000,0),(2991,191,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(2992,191,'Letters',15,'Dear 2600','Payphones, Articles, Other Mediums, Old Tech, Digital Print, Misdirection of Efforts, Offers, Accomplishments, Meetings, Queries, Suggestions, Observations.','N',34,'Megaphone',12.000,0),(3015,193,'Embracing Empowerment',2,'Discusses the ongoing #MeToo (sexual abuse and assault) movement.','','N',4,'',2.000,0),(3016,193,'The Secrecy and Security of the Special Counsel',1404,'Discusses Special Counsel Robert Mueller investigation and some of the technological vulnerabilities and threats his team must be facing.','','N',6,'',3.000,0),(3017,193,'What Programming Language Should I Learn? Why Not All of Them?',1303,'Discusses the basics that most programming languages have in common.','','N',9,'',2.000,0),(3018,193,'Breaking Standards',1341,'Discusses using old non-standard floppy/disk image formats or steganography to conceal data.','','N',11,'',2.000,0),(3019,193,'TELECOM INFORMER',7,'Discusses SS7 (Signaling System 7), some history, issues and problems and the current FCC review.','References article TELECOM INFORMER. (..)','N',13,'',2.000,0),(3020,193,'How to Run an I2P Hidden Service',1370,'Discusses I2P (the Invisible Internet Project) and running an I2P hidden service.','References article Part 1. (..)','N',15,'The Censorship Resistant Internet Part 2: How to Run an I2P Hidden Service',4.500,0),(3021,193,'Bitcoin or Bit Con? One Newbie\'s Adventures in Cryptoland',1405,'Discusses the author\'s experience with using Bitcoin.','','N',19,'',3.500,0),(3022,193,'The Case of the Murderous AI',1406,'Discusses working on natural language processing and tells a cautionary tale.','','N',23,'',2.000,0),(3023,193,'In Defense of the Net',1407,'Discusses how net neutrality is in the best interests of U.S. Defense and Intelligence Agencies.','','N',25,'Why U.S. Defense and Intelligence Agencies Have a Vested Interest in Preserving Net Neutrality and How They Can Help Protect It',1.000,0),(3024,193,'HACKER PERSPECTIVE',1408,'Discusses the author\'s experiences growing up as a hacker and a prediction for the future of hacking.','','N',26,'',3.000,0),(3025,193,'A Review of CopperheadOS',1409,'Discusses CopperheadOS (COS) a smartphone operating system based on the Android Open Source Project (ASOP) with a focus on security and privacy.','','N',29,'',2.500,0),(3026,193,'SSH Keys and Challenges in Enterprise Environments',1220,'Discusses the Secure Shell protocol (SSH-2) used to authenticate remote computers via password or public key authentication.','','N',31,'',1.500,0),(3027,193,'Unlocking the Secret of Keys',1410,'Discusses the master keying system and a few tricks with Simplex locks.','','N',33,'',1.000,0),(3028,193,'EFFECTING DIGITAL FREEDOM',1411,'Discusses John Perry Barlow\'s vision and writings, co-founder of the EFF (Electronic Frontier Foundation). RIP.','','N',46,'Remembering Joh Perry Barlow',1.000,0),(3029,193,'Hacking Our Attitudes (The Key to Being a Better Attitude Trumper)',423,'Discusses political attitudes, opinions and discourse.','References article VR Trumpers. (..)','N',47,'',1.750,0),(3030,193,'Historic Hacking',1412,'Discusses computer mainframe and keypunch machine programming in the late 1970s - with pictures.','','N',49,'',3.000,0),(3031,193,'CITIZEN ENGINEER',1379,'Discusses building a \"Google Authenticator\" time-based one time password device using the ESP8266 Feather and Python.','','N',52,'Make Your Own Two-Factor Authentication Hardware Device',2.000,0),(3032,193,'Bluetooth Hacking 101',1335,'Discusses the Bluetooth standard including versions, protocols, security modes, attacks and tools.','','N',54,'',3.500,0),(3033,193,'Hidden ISPs',505,'Discusses three companies that provide mobile 4G hotspot plans.','','N',57,'',1.500,0),(3034,193,'Extrapolating Phone Numbers Using Facebook and PayPal',1413,'Discusses a method to obtain someone\'s phone number from Facebook and PayPal.','','N',59,'',0.750,0),(3035,193,'The Free Flow of Information',1329,'Discusses several examples of researchers sharing their knowledge for the betterment of all mankind.','','N',60,'',1.000,0),(3036,193,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(3037,193,'Letters',15,'Dear 2600','Article Feedback, Observations, Random Questions, Meeting Updates, Critique, Following Up, Issues, Discoveries.','N',34,'Advisories',12.000,0),(3038,194,'Celebrate the Difference',2,'Discusses differences of opinion, debate, keeping an open mind, respect and encouraging individual thought and difference.','','N',4,'',2.000,0),(3039,194,'A N00b\'s Guide to the Dark Web',1259,'Discusses what the Dark Web is and how Tor (The Onion Router network) is used to access it.','','N',6,'',2.500,0),(3040,194,'The IPv6 Delusion',1266,'Discusses the slow implementation of IPv6.','','N',8,'',3.500,0),(3041,194,'TELECOM INFORMER',7,'Discusses the some of the technical issues with a potential telecommunications company merger.','','N',13,'',2.000,0),(3042,194,'How to Be a Guitar Hero, IRL',1414,'Discusses using an electric guitar used with the \"Rocksmith 2014\" software by Ubisoft and an online community called CustomsForge. Includes instructions for using custom DLCs (downloadable content) and info on NoCableLauncher.','','N',15,'',5.500,0),(3043,194,'Even Restaurants Need InfoSec',1123,'Discusses the Wi-Fi setup of a Chinese restaurant in Grand Rapids, Michigan the author visited.','','N',20,'',1.500,0),(3044,194,'Serial Number Cracking For Fun and Profit',1415,'Discusses a specialized tamper proof label and how it could be counterfeited.','Example bash script.','A',22,'',3.000,0),(3045,194,'Automating a Police State',1416,'Discusses automated camera tickets and argues they are leading us towards a police state.','','N',25,'',1.000,0),(3046,194,'HACKER PERSPECTIVE',1417,'Discusses some of the author\'s college experiences with a brand new DEC PDP 11/70 system.','','N',26,'The Hacker Perspective',3.000,0),(3047,194,'Brute Forcing a Car Door with Math',1374,'Discusses using a De Bruijn sequence on an automobile\'s keypad door lock to open it.','Includes small perl script.','A',29,'',3.000,0),(3048,194,'Hack(ed), the Earth',1418,'Discusses the requirement to have a cell phone to access many Internet sites these days and the loss of anonymity that implies.','','N',32,'',1.000,0),(3049,194,'EFFECTING DIGITAL FREEDOM',1411,'Discusses S.B. 315, a computer crime bill in Georgia that passed in the state legislature but was vetoed by the governor.','','N',46,'Grassroots Effort Kills Bad Computer Crime Bill in Georgia',1.000,0),(3050,194,'A Hacker Adventure in Urban Exploration',1419,'Discusses exploring an abandoned building - with pictures (terrible quality though).','','N',47,'',3.500,0),(3051,194,'Beyond the Scare-Mongering',1360,'Discusses the ZeroNights conference in Moscow, Russia.','','N',50,'',0.500,0),(3052,194,'CITIZEN ENGINEER',1379,'Discusses hacking a classic Nintendo R.O.B. Robot.','','N',52,'',2.000,0),(3053,194,'Re-Purposing Old Technology and Ideas for Fun and Emotional Profit',1420,'Discusses the reuse and adaptation of older technologies.','','N',54,'or Get Off My Lawn, You Technological Whipper Snappers!',2.330,0),(3054,194,'Hacking: Quick and Easy',1421,'Discusses a simplistic hack in four steps: 1. Choosing a Job, 2. Gathering the Tools, 3. Selecting a Targen. 4. SQL injection.','','N',56,'',1.000,0),(3055,194,'Thoughts On Cryptocurrency',1422,'Discusses how crypto currency mining has rekindled the author\'s love of life, discovery and exploration.','','N',57,'',0.750,0),(3056,194,'Fiction: Hacking the Naked Princess 0x15',1161,'The twenty-first (0x15) chapter of the newest Dev Manny, Information Technology Private Investigator story \"Hacking the Naked Princess\"','','N',58,'Dev Manny, Information Technology Private Investigator \"Hacking the Naked Princess\"',2.750,0),(3057,194,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',61,'',1.000,0),(3058,194,'Letters',15,'Dear 2600','Creative Applications, Political Intrigue, Contributors, Donors, Meeting News, The Hacker Spirit, Drama, Visibility, Being Alert, Requests, Responses.','N',34,'Routines',12.000,0),(3082,196,'Injustice for All',2,'Discusses some b.s. and drama that supposedly happened at the Circle of Hope conference.','','N',4,'',2.000,0),(3083,196,'Digital Sanctuary Cities',1423,'Discusses local and community efforts to check federal surveillance.','','N',6,'',2.000,0),(3084,196,'Removing eBook DRM without OCR or GUIs',1424,'Discusses removing the DRM of eBooks from the command line.','','A',8,'',2.000,0),(3085,196,'A Carrier Pigeon Revisited',1425,'Discusses the message Joseph B. Zekany was attempting to decode in the referenced article.','References article \'Decoding a Carrier Pigeon\'. (..)','N',10,'',2.000,0),(3086,196,'The Evolution of Ran$omware',1426,'Discusses some of the historical cyber threats from the 1990s to the present.','','N',12,'',1.000,0),(3087,196,'TELECOM INFORMER',7,'Discusses the cooling systems for the Central Office.','','N',13,'',2.000,0),(3088,196,'Hackers to the Rescue! (Maybe)',1427,'Discusses the authors view of the current political climate and what needs to be done about it.','','N',15,'',1.500,0),(3089,196,'Book Review: The Art of Invisibility',1428,'Discusses the book \"The Art of Invisibility\" by Kevin Mitnick published by Little, Brown and Co.','','N',16,'',0.500,0),(3090,196,'GDPR - Active Empowerment vs. Passive Consumerism',1429,'Discusses the European Union\'s General Data Protection Regulation (GDRP) and what we have learned.','','N',17,'',1.660,0),(3091,196,'A Characteristic Study of IoT Botnets: Understanding the Design and Behavior',1430,'Discusses an empirical analysis of Internet of Things (IoT) botnets to understand their design, architecture and operations.','Rehashed Circle of Hope talk.','N',19,'',7.000,0),(3092,196,'HACKER PERSPECTIVE',1431,'Discusses some of the author\'s experiences with the hacker perspective.','','N',26,'',3.000,0),(3093,196,'Ms. Reality Winner is an American Dissident',1432,'Discusses the whistle blower case of Reality Winner.','','N',29,'',1.500,0),(3094,196,'More Ways to View Hacking',1433,'Discusses hackers and politics.','','N',30,'',2.500,0),(3095,196,'EFFECTING DIGITAL FREEDOM',1411,'Discusses the US Telecom trade association\'s FCC petition to end the requirement to share their copper infrastructure at established, affordable rates.','','N',46,'The ISP Chokehold on Internet Access Must End',1.000,0),(3096,196,'Totalitarian Control: How We Used PowerShell to Manipulate User Behavior',1435,'Discusses a PowerShell script to enforce user login for file sync.','','A',47,'',1.500,0),(3097,196,'What Do Lawyers and Hackers Have in Common?',1436,'Discusses the similarities between the legal profession and hacking.','','N',48,'',1.500,0),(3098,196,'No Country for Incarcerated Hackers',1315,'Discusses some of the author\'s experiences in prison.','','N',50,'',2.000,0),(3099,196,'CITIZEN ENGINEER',1379,'Discusses the assistive technology community.','','N',52,'',2.000,0),(3100,196,'Bypassing Email Anti-Spam Filters',1437,'Discusses a security engagement phishing test and the solution used to get past the client\'s spam filter.','','N',54,'',1.500,0),(3101,196,'Hacker History: MDT or \"The Mass Depopulation Trio\"',1403,'Discusses the author\'s hacking background and claims the fabrication of Mel\'s Hole.','','N',55,'',1.500,0),(3102,196,'Testing Your l337 h4x0r skillz Safely and Legally',1374,'Discusses Capture the Flag (CTF) and websites available to challenge you hacking skills.','','N',58,'',1.000,0),(3103,196,'Gone Phishin\'',1438,'Discusses the use and abuse of sudo (superuser do or substitute user do).','','N',59,'',2.000,0),(3104,196,'HACKER HAPPENINGS',346,'List of upcoming events of interest to hackers.','','N',1,'',1.000,0),(3105,196,'Letters',15,'Dear 2600','Thoughts on Articles, Annoyances, Queries, Observed, Meeting Issues, Manifesto, Reconnecting, The Circle of HOPE Feedback.','N',34,'Testimonials',12.000,0); /*!40000 ALTER TABLE `Articles` ENABLE KEYS */; UNLOCK TABLES; -- -- Dumping data for table `Authors` -- LOCK TABLES `Authors` WRITE; /*!40000 ALTER TABLE `Authors` DISABLE KEYS */; INSERT INTO `Authors` VALUES (1,'Not Assigned',NULL,NULL,'Initial value.'),(2,'Emmanuel Goldstein','Eric Corley','letters@2600.com','Editor/Owner.'),(3,'dual',NULL,NULL,NULL),(4,'OSIN',NULL,NULL,NULL),(5,'Barrett Brown','','Barrett.Brown@gmail.com','I\'ve assumed Barret D. Brown and Barrett Brown are the same author.'),(6,'ZoeB',NULL,NULL,NULL),(7,'The Prophet',NULL,NULL,NULL),(8,'zeitgeist',NULL,NULL,NULL),(9,'MS-Luddite',NULL,NULL,NULL),(10,'Element.Crying',NULL,'Element.Crying@Gmail.com',NULL),(11,'Vitaminion',NULL,'vitaminion@gmail.com',NULL),(12,'mOther',NULL,NULL,NULL),(13,'PriesT',NULL,'priestinaround@gmail.com',NULL),(14,'ilikenwf',NULL,'parwok@gmail.com',NULL),(15,'Readers',NULL,NULL,'Letters to the editor.'),(16,'Nick Farr',NULL,'nickfarr@hacdc.org',NULL),(17,'m0untainrebel',NULL,'m0untainrebel@riseup.net',NULL),(18,'Atom Smasher',NULL,'atom@smasher.org','pgp = 762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808'),(19,'MasterChen','','infoinject@gmail.com',''),(20,'Frater Perdurabo',NULL,NULL,NULL),(21,'The Cheshire Catalyst','Richard Cheshire','cheshire@2600.com','Former publisher of the TAP Newsletter. I\'ve assumed \"The Cheshire Catalyst\" and \"Cheshire Catalyst\" are the same author.'),(22,'briatych',NULL,NULL,NULL),(23,'Dragorn',NULL,NULL,NULL),(24,'glider','','','I\'ve assumed Glider and glider are the same author.'),(25,'suN8Hclf',NULL,'suN8Hclf@vp.pl',NULL),(26,'Dr. Zoltan',NULL,'drzoltan@drzoltan.com',NULL),(27,'Peter Wrenshall','','987654321@hush.ai',''),(28,'malpelo93',NULL,'malpelo93@gmail.com',NULL),(29,'Terry Stenvold',NULL,'thebmxr@gmail.com',NULL),(30,'Tim',NULL,NULL,NULL),(31,'Carbide','','','I\'ve assumed Carbide and carbide are the same author.'),(34,'ntbnnt',NULL,NULL,NULL),(35,'Derneval R. Rodrigues Da Cunha','','curupira@2600.com','I\'ve assumed Derneval and Derneval R. Rodrigues Da Cunha are the same author.'),(36,'Gr@ve_Rose','','graverose@mail.com',''),(37,'Sai Emrys',NULL,'2600@saizai.com','AIM: #ca2600: saizai\r\nGPG: 0xAFF1F292'),(39,'Uriah C.',NULL,NULL,NULL),(40,'sc0ut64',NULL,'sc0ut64@yahoo.ca',NULL),(41,'Barry Wels',NULL,NULL,NULL),(42,'Aaron',NULL,NULL,NULL),(43,'Plasticman',NULL,NULL,NULL),(44,'L0j1k',NULL,'l0j1k@l0j1k.net',NULL),(45,'Acrobatic','','jbnunn@gmail.com',''),(46,'Jacob P. Silvia',NULL,'jacob.silvia@gmail.com',NULL),(47,'drlecter',NULL,NULL,NULL),(48,'Turgon',NULL,NULL,NULL),(49,'Porter Payne',NULL,NULL,NULL),(50,'J.R. Vela',NULL,'jrvela@aristasol.com',NULL),(51,'SiliconeClone',NULL,NULL,NULL),(52,'The Thomps',NULL,NULL,NULL),(53,'Agent Zer0',NULL,'agentzr0@gmail.com',NULL),(54,'glutton','','','I\'ve assumed Glutton and glutton are the same author.'),(55,'Kn1ghtl0rd','','kn1ghtl0rd@hotmail.com\r\nKn1ghtl0rd@kn1ghtl0rd.org',''),(56,'phundie',NULL,'phundie@yahoo.com',NULL),(57,'xinit',NULL,NULL,NULL),(58,'silic0nsilence',NULL,'2600@silic0nsilence',NULL),(59,'He-Who-Must-Not-Be-Named',NULL,NULL,NULL),(60,'AtomicRhino',NULL,'AnAtomicRhino@gmail.com',NULL),(61,'Martin Eberhard',NULL,NULL,NULL),(62,'Anonymous','','','I\'ve assumed anonymous and Anonymous are the same author.'),(63,'Akasha',NULL,NULL,NULL),(64,'Plux',NULL,NULL,NULL),(65,'reid','','','I\'ve assumed Reid and reid are the same author.'),(66,'Andreas Rietzler',NULL,'Andreas.Rietzler@uni-konstanz.de',NULL),(67,'Dionysus',NULL,NULL,NULL),(68,'Variable Rush','Bradley Hall','variablerush@gmail.com',NULL),(69,'Casandro',NULL,NULL,NULL),(70,'black_death',NULL,'blackdeathx@gmail.com',NULL),(73,'WillPC',NULL,'willpc@hushmail.com',NULL),(75,'GutBomb',NULL,NULL,NULL),(76,'Phatbot',NULL,'chunkylover37@gmail.com',NULL),(77,'Erik Paulsen',NULL,NULL,NULL),(78,'Mercereau',NULL,NULL,'aka dohboy.'),(79,'satevia',NULL,NULL,NULL),(80,'Rop Gonggrijp',NULL,NULL,NULL),(81,'Cronicl3','','cronicl3@gmail.com',''),(82,'Estragon',NULL,NULL,NULL),(83,'stderr',NULL,'stderr.dev@gmail.com',NULL),(84,'Alt229',NULL,NULL,NULL),(85,'Agent5',NULL,NULL,NULL),(86,'Anonymous Chi-Town Hacker',NULL,NULL,NULL),(87,'Gausss VanSant',NULL,NULL,NULL),(88,'sail0r',NULL,'sail0r@creepjoint.net','IRC #2600 via ICQ 490590026.'),(89,'S. Pidgorny',NULL,NULL,NULL),(90,'Scotty Fitzgerald',NULL,NULL,NULL),(91,'Tessian','','tessian@gmail.com',''),(92,'Silent Strider',NULL,NULL,NULL),(93,'Poacher',NULL,NULL,NULL),(94,'Darkarchives',NULL,NULL,NULL),(95,'Paradox',NULL,NULL,NULL),(96,'forgotten247','','','I\'ve assumed Forgotten247 and forgotten247 are the same author.'),(97,'Metalx1000','Kris Occhipinti','metalx1000@yahoo.com',''),(98,'Cliff',NULL,NULL,NULL),(99,'Isreal',NULL,NULL,NULL),(100,'DieselDragon',NULL,'Hyperspeed666@gmail.com',NULL),(101,'Kartikeya Putra',NULL,'alienbaby@freaknetwork.in',NULL),(102,'Bre Prettis',NULL,NULL,NULL),(103,'Ik',NULL,NULL,NULL),(104,'Half Life',NULL,'halflife811@gmail.com',NULL),(105,'Ian Murphy',NULL,'back_space@hackermail.com','aka Backspace'),(106,'Pappy',NULL,NULL,NULL),(107,'Yimir',NULL,'roi_noir@hotmail.com',NULL),(108,'Unanimously Anonymous',NULL,NULL,NULL),(109,'=-virus-=',NULL,NULL,NULL),(110,'Tony Hepo',NULL,NULL,NULL),(111,'Milton Bradley',NULL,NULL,NULL),(112,'gLoBus',NULL,NULL,NULL),(113,'Zilg0',NULL,'Zilg0@trashmail.net',NULL),(114,'You',NULL,NULL,NULL),(115,'Agent Smith',NULL,NULL,NULL),(116,'Dagfari',NULL,NULL,NULL),(117,'PhreakerD7',NULL,NULL,NULL),(118,'Donoli',NULL,NULL,NULL),(119,'krt',NULL,NULL,NULL),(120,'b1tl0ck',NULL,NULL,NULL),(121,'MS3FGX','Tom Nardi','MS3FGX@gmail.com','Current Research and Projects'),(122,'route',NULL,NULL,NULL),(123,'Geospart',NULL,NULL,NULL),(124,'The Termionic Overlord',NULL,NULL,NULL),(125,'Ariel Saia',NULL,NULL,NULL),(126,'Kousu',NULL,'kousue@gmail.com',NULL),(127,'daColombian',NULL,'jmwco@blazemail.com',NULL),(128,'Evil Wrangler',NULL,NULL,NULL),(129,'Akurei',NULL,NULL,NULL),(130,'Mitch Altman',NULL,NULL,NULL),(131,'Sidge.2 & Bimmerfan',NULL,NULL,NULL),(132,'Franz Kafka',NULL,NULL,NULL),(133,'Toni-Sama',NULL,NULL,NULL),(134,'SickCodeMonkey',NULL,NULL,NULL),(135,'Marxc2001',NULL,NULL,NULL),(136,'Witchlight',NULL,NULL,NULL),(137,'Azohko',NULL,NULL,NULL),(138,'Passdown',NULL,NULL,NULL),(139,'DBTC',NULL,NULL,NULL),(140,'quel',NULL,NULL,NULL),(141,'Acidus','','acidus@msblabs.org\r\nAcidus@resnet.gatech.edu','Most Significant Bit Labs'),(142,'Zaphraud',NULL,NULL,NULL),(143,'Major Lump',NULL,'MajorLump@hotmail.com',NULL),(144,'Cadet Crusher',NULL,NULL,NULL),(145,'Xyzzy',NULL,NULL,NULL),(146,'John Smith',NULL,NULL,NULL),(147,'Bill Squire',NULL,NULL,'aka BillSF'),(148,'EvilBrak',NULL,'evilbrak@yahoo.com',NULL),(149,'Natas',NULL,'natas@oldskoolphreak.com',NULL),(150,'Alex Muentz, Esq.',NULL,'lex@successfulseasons.com',NULL),(151,'Tom from New England',NULL,NULL,'aka Mr. Icom'),(152,'SLEZ',NULL,NULL,NULL),(153,'James Penguin',NULL,'jamespenguin@gmail.com',NULL),(154,'valnour',NULL,NULL,'I\'ve assumed Valnour is the same author.'),(155,'comfreak',NULL,NULL,NULL),(156,'Toby Zimmerer',NULL,NULL,NULL),(157,'Cristian',NULL,NULL,NULL),(158,'The Piano Guy',NULL,NULL,NULL),(159,'Rick Davis',NULL,NULL,NULL),(160,'Comspec - Sigma Nu',NULL,NULL,NULL),(161,'Dale Thorn',NULL,'d_t_h_o_r_n@yahoo.com',NULL),(162,'Royal',NULL,'anonymousroyal@gmail.com',NULL),(163,'Pirho',NULL,NULL,NULL),(164,'Phillip Torrone',NULL,'fill@2600.com',NULL),(165,'Byron Bussey',NULL,NULL,NULL),(166,'c-dollar',NULL,NULL,NULL),(167,'ax0n',NULL,'ax0n@h-i-r.net',NULL),(168,'Joseph Battaglia',NULL,'sephail@2600.com',NULL),(169,'cipz',NULL,'cipz@lv2600.com',NULL),(170,'Kcahon',NULL,NULL,NULL),(171,'Tokachu',NULL,'tokachu@gmail.com',NULL),(172,'\\/indic8tr',NULL,NULL,NULL),(173,'noir','','noir.na@gmail.com',''),(174,'Arcade One',NULL,NULL,NULL),(175,'Edward Stoever',NULL,'edward@database-expert.com',NULL),(176,'undergr0und n1nja',NULL,NULL,NULL),(177,'chr0nicxb0red0m',NULL,'mediscript4540@hotmail.com',NULL),(178,'Ray Dios Haque',NULL,'rayhaque@gmail.com',NULL),(179,'Dexterous1',NULL,NULL,NULL),(180,'GurtDotCom',NULL,NULL,NULL),(181,'Mark Abene',NULL,NULL,'aka Phiber Optik'),(182,'Sakuramboo',NULL,NULL,NULL),(183,'Moebius Strip',NULL,NULL,NULL),(184,'Dr. Apocalypse',NULL,'dr.apocalypse@gmail.com',NULL),(185,'Ghostie',NULL,NULL,NULL),(186,'dNight',NULL,'d_night@comcast.net',NULL),(187,'Particle Bored',NULL,NULL,NULL),(188,'b0rn_slippy',NULL,NULL,NULL),(189,'Battery',NULL,'Battery@chicago2600.net',NULL),(190,'alokincilo',NULL,NULL,NULL),(191,'Insert Name Here',NULL,NULL,NULL),(192,'Sibios',NULL,'sibios@gmail.com',NULL),(193,'WagStaff',NULL,NULL,NULL),(194,'Bruce Schneier',NULL,NULL,NULL),(195,'c0z',NULL,NULL,NULL),(196,'kaigeX',NULL,NULL,NULL),(197,'Simon Templer',NULL,NULL,NULL),(198,'David Ip',NULL,'auto209182@hushmail.com',NULL),(199,'David Norman',NULL,NULL,NULL),(200,'mirrorshades',NULL,'poj28qe02@sneakmail.com',NULL),(201,'FxYxIxE',NULL,NULL,NULL),(202,'Xen',NULL,'xenuhdo@gmail.com',NULL),(203,'Bryan Elliott',NULL,NULL,NULL),(204,'Michael Saarna',NULL,NULL,NULL),(205,'Andrew Smith',NULL,NULL,NULL),(206,'iSEPIC',NULL,NULL,NULL),(207,'Henry Q. Buther',NULL,NULL,NULL),(208,'Savage Monkey',NULL,NULL,NULL),(209,'Squealing Sheep',NULL,NULL,NULL),(210,'modman','','modman@optonline.net',''),(211,'iNSiDER',NULL,NULL,NULL),(212,'Black Ratchet','','blackratchet@blackratchet.org',''),(213,'graphak',NULL,NULL,NULL),(214,'Rob',NULL,NULL,NULL),(215,'Don',NULL,NULL,NULL),(216,'windwaker',NULL,'windwaker101@gmail.com',NULL),(217,'FreeRider',NULL,NULL,NULL),(218,'J.M.',NULL,NULL,NULL),(219,'blakmac',NULL,'blakmac@gmail.com',NULL),(220,'Mister Bojangles',NULL,'cougar.slayer@gmail.com',NULL),(221,'Jonathan Pamplin',NULL,'j.pamplin@gmail.com',NULL),(222,'greyarea',NULL,'greyarea@phreaksandgeeks.com',NULL),(223,'BreakDecks',NULL,NULL,NULL),(224,'dopamine','Aubrey Ellen Shomo',NULL,NULL),(225,'0vid',NULL,NULL,NULL),(226,'subphreeky',NULL,'subphreeky@yahoo.com',NULL),(227,'Shawn Frederick',NULL,'waxycast@hotmail.com',NULL),(228,'CeeJay',NULL,NULL,NULL),(229,'Stephonovich',NULL,NULL,NULL),(230,'Thorn',NULL,'thorn2600@yahoo.com',NULL),(231,'t_ratv',NULL,NULL,NULL),(232,'Mystic','','mystic@lostways.com',''),(233,'El Rey',NULL,NULL,NULL),(234,'stankdawg','','stankdawg@stankdawg.com\r\nStankDawg@hotmail.com','I\'ve assumed stankdawg and StankDawg are the same author.'),(235,'Eprom Jones',NULL,NULL,NULL),(236,'Dit and Dah',NULL,NULL,NULL),(237,'Apratt',NULL,NULL,NULL),(238,'st4r_runner',NULL,NULL,NULL),(239,'A5an0',NULL,NULL,NULL),(240,'striker',NULL,NULL,NULL),(241,'BrothaReWT',NULL,NULL,NULL),(242,'A0nRkjk=',NULL,NULL,NULL),(243,'divarin',NULL,NULL,NULL),(244,'XlogicX','','XlogicX@phx2600.com\r\ndrkhypnos314@hotmail.com\r\nNo.Axiom@gmail','drkhypnos314@hotmail.com used in 21:1 and 26:1.\r\nNo.Axiom@gmail used in 29:1.'),(245,'Seal',NULL,NULL,NULL),(246,'Inglix the Mad',NULL,NULL,NULL),(247,'SystemDownfall and Worm',NULL,'Systemdownfall@blueoxidine.com',NULL),(248,'FocusHacks',NULL,NULL,NULL),(249,'JFast',NULL,NULL,NULL),(250,'Daniel',NULL,'daniels@stud.cs.uit.no',NULL),(251,'SistemRoot',NULL,NULL,NULL),(252,'Morcheeba',NULL,NULL,NULL),(253,'J.V.',NULL,'evilpope@thepopeisevil.com',NULL),(254,'chiLL p3ngu1n',NULL,NULL,NULL),(255,'george',NULL,NULL,NULL),(256,'Big Bird',NULL,NULL,NULL),(257,'Luckycan',NULL,NULL,NULL),(258,'solemneyed',NULL,NULL,NULL),(259,'JackAceHole',NULL,NULL,NULL),(260,'Trent Bradley',NULL,NULL,'aka Blue Collar Camel'),(261,'Pyscho',NULL,NULL,NULL),(262,'Muskrat',NULL,NULL,NULL),(263,'Bob Krinkle',NULL,NULL,NULL),(264,'dk00',NULL,NULL,NULL),(265,'The AntiLuddite',NULL,NULL,NULL),(266,'Redbird',NULL,'redbird@2600.com',NULL),(267,'clorox',NULL,NULL,NULL),(268,'VileSYN',NULL,NULL,NULL),(269,'Kong',NULL,NULL,NULL),(270,'Moby Disk',NULL,NULL,NULL),(271,'H2007',NULL,NULL,NULL),(272,'RSG',NULL,NULL,NULL),(273,'Josh D',NULL,NULL,NULL),(274,'Bac',NULL,NULL,NULL),(275,'Aristotle',NULL,NULL,NULL),(276,'Chess',NULL,NULL,NULL),(277,'DarKry',NULL,'darkry@gmail.com',NULL),(278,'LoungeTab',NULL,'LoungeTab@hotmail.com',NULL),(279,'DJ Williams',NULL,NULL,NULL),(280,'uberpenguin',NULL,'uberpenguin@hotpop.com',NULL),(281,'wishbone',NULL,NULL,NULL),(282,'skilar',NULL,'skilar@linux.net',NULL),(283,'Anonymous Author',NULL,NULL,'MDG: d03d3293cd954af6bccd53eac5d828fc'),(284,'Patrick Madigan',NULL,NULL,NULL),(285,'Sam Nitzberg',NULL,'sam@iamsam.com',NULL),(286,'David Dunn','','unbr34k4bl3@gmail.com',''),(287,'HOMA',NULL,NULL,NULL),(288,'Suicidal',NULL,NULL,NULL),(289,'Mojo',NULL,NULL,NULL),(290,'Barfbag',NULL,'barfbag@theblankpages.com',NULL),(291,'Samjack',NULL,NULL,NULL),(292,'slummin',NULL,NULL,NULL),(293,'Frater Ignotius',NULL,'unknown@paranoia.no',NULL),(294,'tele',NULL,NULL,NULL),(295,'spite',NULL,'Spite_fowl@yahoo.com',NULL),(296,'jumbobrian',NULL,'jumbobrian@yahoo.com',NULL),(297,'bill','','','AKA fsu_tkd90'),(298,'Fernando',NULL,NULL,NULL),(299,'MeGaBiTe1',NULL,'megabite1@hotmail.com',NULL),(300,'max_9909',NULL,'max_9909@yahoo.com',NULL),(301,'Zourick',NULL,NULL,NULL),(302,'slick0',NULL,NULL,NULL),(303,'SDMX',NULL,NULL,NULL),(304,'arse',NULL,NULL,NULL),(305,'akaak',NULL,NULL,NULL),(306,'Gruggni',NULL,NULL,NULL),(307,'shinohara',NULL,'shinohara@ziplip.com',NULL),(308,'Chris Johnson',NULL,NULL,NULL),(309,'L. Gallion',NULL,NULL,NULL),(310,'Solthae',NULL,NULL,NULL),(311,'SARain',NULL,NULL,NULL),(312,'Eoban',NULL,'eoban@eoban.com',NULL),(313,'Toby','','toby@richards.net','I\'ve assumed Toby and toby are the same author.'),(314,'b-bstf',NULL,NULL,NULL),(315,'wideband dreamer',NULL,NULL,'a.k.a. dark spectrum'),(316,'Sairys',NULL,NULL,NULL),(317,'MobiusRenoire',NULL,NULL,NULL),(318,'JK','','','I\'ve assumed JK and jk are the same author.'),(319,'Wrangler',NULL,NULL,NULL),(320,'Galahad',NULL,'galahad@galahadhq.com',NULL),(321,'Stik',NULL,NULL,NULL),(322,'TRM',NULL,NULL,NULL),(323,'Irving Washingon',NULL,'thedarkshirt@hotmail.com',NULL),(324,'Jesters8',NULL,'Jesters8@yahoo.com',NULL),(325,'TOneZ2600',NULL,NULL,NULL),(326,'Grandmaster Plague',NULL,NULL,NULL),(327,'TEV',NULL,NULL,NULL),(328,'dave',NULL,NULL,NULL),(329,'CronoS@OlympoS',NULL,NULL,NULL),(330,'J. P. Arnold',NULL,NULL,NULL),(331,'I. O. Hook',NULL,NULL,NULL),(332,'k0nk',NULL,NULL,NULL),(333,'Kevin T. Blakley',NULL,NULL,NULL),(334,'Michael Hampton',NULL,NULL,'Homeland Stupidity'),(335,'Chris Dickinson',NULL,NULL,NULL),(336,'KellyKeeton.com',NULL,NULL,NULL),(337,'enferex',NULL,'mattdavis9@gmail.com','A 757 Labs Effort'),(338,'frameloss',NULL,NULL,NULL),(339,'hypo',NULL,NULL,NULL),(340,'D4vedw1n',NULL,NULL,NULL),(341,'scamorama',NULL,NULL,NULL),(342,'linear','','','United Phone Losers'),(343,'Virgil Griffith',NULL,NULL,NULL),(344,'Lex Neva',NULL,NULL,NULL),(345,'Sigma',NULL,NULL,NULL),(346,'No Author Specified',NULL,NULL,NULL),(347,'Felixalias',NULL,NULL,NULL),(348,'Ethernium57',NULL,NULL,NULL),(349,'haxadecimal',NULL,NULL,NULL),(350,'Leviathan',NULL,NULL,NULL),(351,'Professor L',NULL,NULL,NULL),(352,'Juraj Bednar',NULL,'ca@jurajbednar.com',NULL),(353,'Screamer Chaotix',NULL,'screamer@hackermind.net',NULL),(354,'Lucky225','','lucky225@2600.com\r\nLucky225@hotmail.com\r\nLucky225@verizonfears.com',''),(355,'0x20Cowboy',NULL,NULL,NULL),(356,'RaT_HaCk',NULL,'RaT_HaCk@net-troy.com',NULL),(357,'decoder',NULL,'decoder@oldskoolphreak.com',NULL),(358,'methodic',NULL,'methodic@libpcap.net',NULL),(359,'Xphile',NULL,NULL,NULL),(360,'sunpuke',NULL,NULL,NULL),(361,'Darlok',NULL,NULL,NULL),(362,'Schnarf',NULL,NULL,NULL),(363,'Joseph B. Zekany',NULL,NULL,NULL),(364,'The Pissed Off One Armed Man',NULL,NULL,NULL),(365,'Shiv Polarity',NULL,'shivPolarity@myrealbox.com',NULL),(366,'Lirakis',NULL,NULL,NULL),(367,'mojomonkee',NULL,NULL,NULL),(368,'X3N0X',NULL,NULL,NULL),(369,'Shawn F.',NULL,NULL,NULL),(370,'dead_pilgrim',NULL,NULL,NULL),(371,'redxlegion','R. Kirk Noble','redxlegion@yahoo.com','Red Legion'),(372,'C.B. Cates',NULL,NULL,NULL),(373,'C3llph','','','I\'ve assumed C3llph and c3llph are the same author.'),(374,'Shade',NULL,NULL,NULL),(375,'Kairi Nakatsuki',NULL,'kairi@phreaker.net',NULL),(376,'bland_inquisitor','','bland_inquisitor@hotmail.com','I\'ve assumed bland_inquisitor and Bland Inquisitor are the same author.'),(377,'Jimmy Yu',NULL,NULL,NULL),(378,'The Dark Shirt',NULL,NULL,NULL),(379,'atoma',NULL,NULL,NULL),(380,'_cHiCkEn_',NULL,NULL,NULL),(381,'The Rev. Dr. Jackal-Headed-God',NULL,NULL,NULL),(382,'superbeast',NULL,NULL,NULL),(383,'Dark Spectrum',NULL,NULL,NULL),(384,'minion',NULL,NULL,NULL),(385,'Charles',NULL,NULL,NULL),(386,'Rev. Karn',NULL,NULL,'ZenLogic/Freebooter'),(387,'osiris188',NULL,'Updates81@hotmail.com',NULL),(388,'Epiphany and J0hny_Lightning',NULL,'j0hnylightning@hotmail.com\r\nepiphany@port7alliance.com',NULL),(389,'ddShelby',NULL,NULL,NULL),(390,'Spyrochaete',NULL,NULL,NULL),(391,'FragSpaz',NULL,'fragspaz@fragspaz.com',NULL),(392,'Plazmatic Shadow',NULL,'plaz@kevinsnet.com',NULL),(393,'Bill Melater',NULL,'retaleMlliB@hotmail.com',NULL),(394,'Chris Shiflett',NULL,'chris@shiflett.org',NULL),(395,'Gr3y t0qu3',NULL,'greytoque@paladindesign.ca',NULL),(396,'Maniac_Dan',NULL,NULL,NULL),(397,'c0ld_b00t',NULL,NULL,NULL),(398,'D. Foetus',NULL,NULL,NULL),(399,'Kr@kH3d (DFxC)',NULL,NULL,NULL),(400,'Live_wire',NULL,NULL,NULL),(401,'0/V3_3y3d_/V\\0/Vst3r',NULL,'haxor2600@mailcity.com',NULL),(402,'area_51',NULL,NULL,NULL),(403,'phantasm',NULL,'phantasm@textbox.net',NULL),(404,'Alex Daniel',NULL,NULL,NULL),(405,'The Flatline',NULL,NULL,NULL),(406,'Straightface',NULL,'straightfacegangsta@excite.com',NULL),(407,'di0nysus',NULL,NULL,NULL),(408,'Tom Morrow 3.0',NULL,NULL,NULL),(409,'kaige',NULL,'kaigex@yahoo.com','Is kaigeX the same author?'),(410,'Eric',NULL,NULL,NULL),(411,'Code0',NULL,NULL,NULL),(412,'Mangaburn',NULL,'mangaburn@ziplip.com',NULL),(413,'Mark12085',NULL,NULL,NULL),(414,'LiquidBinary',NULL,NULL,NULL),(415,'psyk0mantis',NULL,'digital_shad0w@hotmail.com',NULL),(416,'Khoder bin Hakkin',NULL,NULL,NULL),(417,'Kris Olson',NULL,NULL,NULL),(418,'Mr. Glenn Frog',NULL,NULL,NULL),(419,'iCe799',NULL,'ice799@linuxmail.org',NULL),(420,'Derek P. Moore',NULL,NULL,NULL),(421,'unformed',NULL,NULL,NULL),(422,'HJH',NULL,NULL,NULL),(423,'dufu','','','I\'ve assumed Dufu and dufu are the same author.'),(424,'David Nicol',NULL,NULL,NULL),(425,'Iconoclast',NULL,'phosgene@setec.org\r\niconoclast@thepentagon.com',NULL),(426,'Thermofish (JW)',NULL,NULL,NULL),(427,'Boris Loza',NULL,NULL,NULL),(428,'docburton',NULL,NULL,NULL),(429,'Grifter',NULL,'grifter@staticdischarge.org',NULL),(430,'Tazz Shippensburg',NULL,NULL,NULL),(431,'Ben Mccorkle',NULL,NULL,NULL),(432,'AcidFlame',NULL,'flameacid@hotmail.com',NULL),(433,'Cunning Linguist',NULL,'cunninglinguist@hushmail.com',NULL),(434,'diabolik',NULL,'diabolik@nitric.net',NULL),(435,'Steven Kreuzer',NULL,'skreuzer@mac.com',NULL),(436,'Elf Qrin',NULL,NULL,NULL),(437,'Captain B',NULL,NULL,NULL),(438,'dalai',NULL,'dalai@swbt.net','A Traumatized Production'),(439,'Pankaj Arora',NULL,'pankajarora@paware.com',NULL),(440,'hairball',NULL,'hairball@illgotten.net',NULL),(441,'g00gleminer',NULL,'g00gleminer@fiberia.com',NULL),(442,'Chris Brynes',NULL,NULL,'JEAH Communications, LLC'),(443,'Javier O.',NULL,'javier@yahoo.com',NULL),(444,'Pete',NULL,NULL,NULL),(445,'dual_parallel',NULL,'dual_parallel@hotmail.com',NULL),(446,'Suicidal_251',NULL,NULL,NULL),(447,'Wumpus Hunter',NULL,NULL,NULL),(448,'angelazaharia',NULL,NULL,NULL),(449,'Rob Rohan',NULL,NULL,NULL),(450,'netfreak',NULL,NULL,NULL),(451,'Elite158',NULL,NULL,NULL),(452,'horrid',NULL,NULL,NULL),(453,'mennonite',NULL,NULL,NULL),(454,'Nv',NULL,NULL,NULL),(455,'dknfy',NULL,'dknfy@hotmail.com',NULL),(456,'A.W.M.',NULL,NULL,NULL),(457,'xile',NULL,NULL,NULL),(458,'Clovis',NULL,NULL,NULL),(459,'Braddock Gaskill',NULL,'braddock@braddock.com',NULL),(460,'The Walrus',NULL,NULL,NULL),(461,'Pack Rat Sam',NULL,NULL,NULL),(462,'HoTsAbI',NULL,'hotsabi@yahoo.com',NULL),(463,'phobik',NULL,NULL,NULL),(464,'SnakeByte',NULL,'SnakeByte@kryptocrew.de',NULL),(465,'Plex Inphiniti',NULL,NULL,NULL),(466,'Sean Whalen',NULL,'arpspoof@gmx.net',NULL),(467,'Darbycrsh',NULL,NULL,NULL),(468,'Nickels 1',NULL,NULL,NULL),(469,'deadkode',NULL,'deadkode@phreaker.net',NULL),(470,'Dark Overlord of the DoC','','',''),(471,'Achilles Outlaw, Ph.D.',NULL,NULL,NULL),(472,'Dr. Leovinus',NULL,NULL,NULL),(473,'J-Fast',NULL,NULL,NULL),(474,'Golden_Eternity',NULL,NULL,NULL),(475,'Hi_Risc',NULL,NULL,'aka ASB'),(476,'Stephen Thomas',NULL,'stephenthomas@rampantsolutions.com',NULL),(477,'The Datapharmer',NULL,'c11h15no2@yahoo.com',NULL),(478,'m0rtis',NULL,NULL,NULL),(479,'Amatus',NULL,NULL,NULL),(480,'Alex',NULL,NULL,NULL),(481,'ThinkT4nk','','thinkt4nk@cyberarmy.com',''),(482,'Todd Garrison',NULL,NULL,NULL),(483,'L14',NULL,NULL,NULL),(484,'Mr. Brownstone',NULL,NULL,NULL),(485,'Loki',NULL,NULL,NULL),(486,'Lumikant',NULL,NULL,NULL),(487,'Durkeim the Withered God',NULL,NULL,NULL),(488,'Chris Silva',NULL,NULL,NULL),(489,'Trailblazer',NULL,'trailblazer@usa.com',NULL),(490,'Thuull',NULL,NULL,NULL),(491,'6M AL',NULL,NULL,NULL),(492,'Lunius',NULL,NULL,NULL),(493,'Chris McKinstry',NULL,NULL,NULL),(494,'TC',NULL,NULL,NULL),(495,'W1nt3rmut3',NULL,'mut3@oldskoolphreak.com',NULL),(496,'Papa Doc History',NULL,NULL,NULL),(497,'annie niemoose',NULL,NULL,NULL),(498,'autocode',NULL,NULL,NULL),(499,'Phocks',NULL,'phocks@site-forge.com',NULL),(500,'6-Pack',NULL,NULL,NULL),(501,'Deviant Ollam',NULL,NULL,NULL),(502,'cbsm2009',NULL,NULL,NULL),(503,'Fantacmet',NULL,NULL,NULL),(504,'der_m',NULL,NULL,NULL),(505,'KES',NULL,NULL,NULL),(506,'The Philosopher',NULL,'philosopher2600@gmail.com','IRC on 2600net in #2600, #telephreak and #telephony. Telephreak BBS at telnet://bbs.telephreak.org'),(507,'RussianBlue',NULL,NULL,NULL),(508,'shotintoeternity',NULL,'shotintoeternity@gmail',NULL),(509,'Jason Scott',NULL,NULL,NULL),(510,'Brendan Griffiths',NULL,NULL,NULL),(511,'IntlOrange',NULL,NULL,NULL),(512,'Julian Todd',NULL,NULL,NULL),(513,'CRCF',NULL,NULL,NULL),(514,'ChrisJohnRiley',NULL,NULL,NULL),(515,'phishphreek',NULL,'phishphreek@gmail.com',NULL),(516,'Aesun',NULL,NULL,NULL),(517,'copycat',NULL,NULL,NULL),(518,'Dspanky',NULL,NULL,'Blue Collar Hacker\'s Union'),(519,'Sam Morse',NULL,'sigint98@yahoo.com',NULL),(520,'FaultySignal9',NULL,NULL,NULL),(521,'CaS',NULL,'cas@globalhacking.com',NULL),(522,'Renaldo',NULL,NULL,NULL),(523,'LeXeR',NULL,NULL,NULL),(524,'Common Knowledge',NULL,NULL,NULL),(525,'xdroop',NULL,NULL,NULL),(526,'Also Sprach Zarathustra',NULL,NULL,NULL),(527,'canyoumatrix',NULL,'canyoumatrix@yahoo.com',NULL),(528,'Sect0r F4ailure',NULL,NULL,NULL),(529,'rys',NULL,NULL,NULL),(530,'Waphle/Managahtzul',NULL,NULL,NULL),(531,'Hiemlich VonScootertraus the 53rd',NULL,NULL,NULL),(532,'Silvio Manuel',NULL,NULL,NULL),(533,'BrotherBen',NULL,NULL,NULL),(534,'Brent Ranney',NULL,NULL,NULL),(535,'Dean Swift',NULL,NULL,NULL),(536,'fU9A5i',NULL,NULL,NULL),(537,'ASM_dood',NULL,NULL,NULL),(538,'DEFT',NULL,'deft@payze.com',NULL),(539,'CSS',NULL,NULL,NULL),(540,'Megatron',NULL,NULL,NULL),(541,'Cxi~',NULL,NULL,NULL),(542,'Static',NULL,'static@mentalwaste.8m.com',NULL),(543,'KireC',NULL,NULL,NULL),(544,'AgentK',NULL,'kent@tegels.org',NULL),(545,'princessopensource',NULL,NULL,NULL),(546,'Munzenfernsprechermann',NULL,NULL,NULL),(547,'Javaman',NULL,NULL,NULL),(548,'Zarathustra',NULL,NULL,NULL),(549,'Deamtime',NULL,NULL,NULL),(550,'Crim, Redomega',NULL,NULL,NULL),(551,'Dr.Clue',NULL,'dr.clue@grond.demon.co.uk',NULL),(552,'Xprotocol',NULL,NULL,NULL),(553,'obitus',NULL,'obitus@marmoset.net',NULL),(554,'Pip Macki',NULL,NULL,NULL),(555,'Kevin Mitnick',NULL,NULL,NULL),(556,'guinsu',NULL,NULL,NULL),(557,'Phrostbyte',NULL,NULL,NULL),(558,'Astroman66',NULL,NULL,NULL),(559,'magus',NULL,'securid@terrorists.net',NULL),(560,'xenox',NULL,NULL,NULL),(561,'Chatreaux',NULL,NULL,NULL),(562,'silicon kill',NULL,NULL,NULL),(563,'Jinx',NULL,'Jinx@grapplers.com',NULL),(564,'EchoMirage',NULL,'webmaster@echomirage.com',NULL),(565,'Lord Xarph',NULL,'xarph@blueneptune.com',NULL),(566,'ccsucks',NULL,NULL,NULL),(567,'skrooyoo',NULL,NULL,NULL),(568,'~sn0crash',NULL,'sn0crash@DigitalPhreak.net',NULL),(569,'Mandark',NULL,NULL,NULL),(570,'bober',NULL,NULL,NULL),(571,'Phredog',NULL,NULL,NULL),(572,'Number Six',NULL,NULL,NULL),(573,'Kurruppt2k',NULL,NULL,NULL),(574,'Seuss',NULL,NULL,NULL),(575,'MMX',NULL,NULL,NULL),(576,'Maverick(212)',NULL,NULL,NULL),(577,'Slatan',NULL,NULL,NULL),(578,'Android',NULL,NULL,NULL),(579,'Black Axe',NULL,NULL,NULL),(580,'Jim Nieken',NULL,NULL,NULL),(581,'Jim Johnstone',NULL,NULL,NULL),(582,'Bob',NULL,NULL,NULL),(583,'Raz',NULL,NULL,NULL),(584,'Prototype Zero',NULL,'prototype0@collegeclub.com',NULL),(585,'PayLay',NULL,'paylay666@yahoo.com',NULL),(586,'Ulf of VSU',NULL,NULL,NULL),(587,'THX1138',NULL,NULL,NULL),(588,'The Abstruse One',NULL,NULL,NULL),(589,'ElecRage',NULL,NULL,NULL),(590,'Lobo The Duck',NULL,NULL,NULL),(591,'CYB D8RG/ASM',NULL,NULL,NULL),(592,'/bin/laden',NULL,NULL,NULL),(593,'TELEgodzilla',NULL,NULL,NULL),(594,'-theJestre-',NULL,'jestre@usa.net',NULL),(595,'skwp',NULL,NULL,NULL),(596,'HeadTrip',NULL,NULL,NULL),(597,'Hacks',NULL,'hacks@rocketmail.com',NULL),(598,'Madjestr',NULL,NULL,NULL),(599,'Hex',NULL,NULL,NULL),(600,'MIFF','','','I\'ve assumed miff and MIFF are the same author.'),(601,'Happy Harry',NULL,NULL,NULL),(602,'radiat',NULL,NULL,NULL),(603,'nux',NULL,NULL,NULL),(604,'J-lite',NULL,NULL,NULL),(605,'saint',NULL,'saint@peachworld.com',NULL),(606,'root access',NULL,'blakvortex@juno.com',NULL),(607,'Demonologist',NULL,NULL,NULL),(608,'rift',NULL,NULL,NULL),(609,'JediMaster666',NULL,'jedimaster666@hotmail.com',NULL),(610,'DJ Tazz',NULL,NULL,NULL),(611,'jaundice',NULL,NULL,NULL),(612,'Zenstick',NULL,NULL,NULL),(613,'HyTek',NULL,NULL,NULL),(614,'Clawz',NULL,NULL,NULL),(615,'Thomas Icom/IIRG','','ticom@iirs.com\r\nticom@2600.com','voicemail: 4266\r\nCybertek\r\nI\'ve assumed Thomas Icom and Thomas Icom/IIRG are the same author as they have the same email address.'),(616,'johnk',NULL,NULL,NULL),(617,'Luna',NULL,NULL,NULL),(618,'Sikdogg',NULL,NULL,NULL),(619,'darknite',NULL,'darknite@kurir.net\r\ndarknite@brigade.ml.org',NULL),(620,'Outlawyr',NULL,NULL,'Attorney at Law'),(621,'Friedo',NULL,'friedo@interport.net',NULL),(622,'rain.forest.puppy',NULL,'rfpuppy@iname.com',NULL),(623,'Flack',NULL,'flack@theshop.net',NULL),(624,'Kingpin',NULL,'kingpin@l0pht.com\r\nkingpin@2600.com','L0pht Heavy Industries\r\n617\r\nRDT Syndicate'),(625,'Kermit the Hog',NULL,NULL,NULL),(626,'EZ Freeze',NULL,NULL,NULL),(627,'VmasterX',NULL,NULL,NULL),(628,'Catatonic Dismay',NULL,NULL,NULL),(629,'Phineas Phreak',NULL,NULL,NULL),(630,'Mr. Curious',NULL,NULL,NULL),(631,'Khypoa',NULL,NULL,NULL),(632,'Fencer','','fencer@nudist.org\r\nfencer@privateer.org','I\'ve assumed fencer and Fencer are the same author.'),(633,'nex',NULL,NULL,NULL),(634,'MSD',NULL,NULL,NULL),(635,'kriminal 3nigma',NULL,NULL,NULL),(636,'Fever',NULL,'a_fever@juno.com',NULL),(637,'Black Ice',NULL,NULL,NULL),(638,'deth6',NULL,NULL,'of the Bullz On Parade'),(639,'J.P.',NULL,NULL,NULL),(640,'Armageddon',NULL,NULL,NULL),(641,'m0tion',NULL,NULL,NULL),(642,'Phunda Mental',NULL,NULL,NULL),(643,'D-Recz',NULL,NULL,NULL),(644,'Datum Fluvius',NULL,NULL,NULL),(645,'Crossbar',NULL,NULL,NULL),(646,'thirdhorse',NULL,NULL,NULL),(647,'Informagnet',NULL,NULL,NULL),(648,'Ex-Eleven',NULL,NULL,NULL),(649,'jeremy',NULL,NULL,NULL),(650,'Democritus',NULL,NULL,'\"Father of Materialism\"'),(651,'Konceptor',NULL,'konceptor@hotmail.com',NULL),(652,'digital/Digital',NULL,'digitaldigital@darkcore.com',NULL),(653,'Tom Modern',NULL,NULL,NULL),(654,'Phluck',NULL,NULL,NULL),(655,'Krellis','','krellis@the-pentagon.com',''),(656,'Axon',NULL,NULL,NULL),(657,'The IMC',NULL,'imc@kingcontent.com',NULL),(658,'Sundance Bean',NULL,NULL,NULL),(659,'kasper',NULL,'kasper@supernova.digital-galaxy.net',NULL),(660,'DrNick',NULL,NULL,NULL),(661,'Dr.Seuss of the OCPP',NULL,NULL,NULL),(662,'DataStorm',NULL,'havok@tfs.net',NULL),(663,'Archive',NULL,NULL,NULL),(664,'the Rainer',NULL,NULL,NULL),(665,'vandal',NULL,NULL,NULL),(666,'Tempest',NULL,NULL,NULL),(667,'Jeff Vorzimmer',NULL,NULL,NULL),(668,'Sadena Meti',NULL,NULL,NULL),(669,'MRCALAXY',NULL,NULL,NULL),(670,'Alien Time Agent, Seraf & Waldo',NULL,NULL,NULL),(671,'Section8',NULL,NULL,NULL),(672,'a corporate sucka\' no longa\'',NULL,NULL,NULL),(673,'Mbuna',NULL,NULL,NULL),(674,'Nathan Dorfman',NULL,'nathan@senate.org',NULL),(675,'found by Seraf',NULL,NULL,NULL),(676,'Crash 24601',NULL,NULL,NULL),(677,'PorT666 and ChaosMakeR InC.',NULL,NULL,NULL),(678,'A.M.',NULL,NULL,NULL),(679,'Mr. Opossum',NULL,NULL,NULL),(680,'Champ77',NULL,NULL,NULL),(681,'MiLtRoNi',NULL,NULL,NULL),(682,'Met-Enkeph',NULL,NULL,NULL),(683,'Fidel Castro',NULL,NULL,NULL),(684,'Agent Steal','','agentsteal@usa.net',''),(685,'PhranSyS Drak3',NULL,NULL,NULL),(686,'TtJ',NULL,NULL,NULL),(687,'semiobeing',NULL,NULL,NULL),(688,'ChezeHead',NULL,NULL,NULL),(689,'Napa-Candidate',NULL,NULL,NULL),(690,'Big Brother',NULL,NULL,NULL),(691,'Sciri',NULL,'sciri@L0phT.com',NULL),(692,'Phiber Optik',NULL,NULL,NULL),(693,'tersIan',NULL,NULL,NULL),(694,'Dave Mathews',NULL,NULL,NULL),(695,'Seraf',NULL,'seraf@2600.com',NULL),(696,'VaxBuster',NULL,NULL,NULL),(697,'N-Tolerant',NULL,NULL,NULL),(698,'Syringe',NULL,NULL,NULL),(699,'Ryan',NULL,'ryan@2600.com',NULL),(700,'blueski-mask and the wrapper',NULL,NULL,NULL),(701,'Bernie S.','Ed Cummings',NULL,'I\'ve assumed BernieS and Bernie S. are the same author.'),(702,'InVerse [MoS]',NULL,NULL,NULL),(703,'GT',NULL,NULL,NULL),(704,'Chocolate Phoetus',NULL,NULL,NULL),(705,'DETHMaster',NULL,NULL,NULL),(706,'F. Leader',NULL,NULL,NULL),(707,'Threc',NULL,'threc@li.net',NULL),(708,'Hans Gegen',NULL,NULL,NULL),(709,'Dennis Fiery',NULL,NULL,NULL),(710,'Justin Petersen',NULL,NULL,'aka Agent Steal'),(711,'Noam Chomski',NULL,NULL,'NYMPHO New York Metropolitan Phreak Hack Organization'),(712,'Equant',NULL,NULL,NULL),(713,'Billsf',NULL,NULL,NULL),(715,'Local Loop',NULL,NULL,NULL),(716,'Schlork',NULL,NULL,NULL),(717,'Frequency Man','','','(FreqMan)'),(718,'Secret Squirrel',NULL,NULL,NULL),(719,'Ted Perver',NULL,NULL,NULL),(720,'Bernz',NULL,NULL,NULL),(721,'rdpzza',NULL,NULL,NULL),(722,'Scott Skinner',NULL,NULL,NULL),(723,'Keyser Soze',NULL,NULL,NULL),(724,'D-Day',NULL,NULL,NULL),(725,'Douglas Berdeaux',NULL,'douglas@weaknetlabs.com',NULL),(726,'Tim Kulp',NULL,NULL,'(cloak13)'),(727,'Bryce Verdier',NULL,NULL,NULL),(728,'Faz and caphrim007',NULL,NULL,NULL),(729,'J. P. Armstrong',NULL,'jp@hackmiami.org',NULL),(730,'hostileapostle',NULL,NULL,NULL),(731,'Johannes Grenzfurthner',NULL,NULL,NULL),(732,'Metaranha',NULL,NULL,NULL),(733,'Mister Cool',NULL,NULL,NULL),(734,'GhostRydr',NULL,NULL,NULL),(735,'Sam Bowne','','sbowne@ccsf.edu',''),(736,'Bavs',NULL,NULL,NULL),(737,'John Bayne',NULL,'stephan@scandinode.com',NULL),(738,'VXO',NULL,NULL,NULL),(739,'GantMan',NULL,NULL,NULL),(740,'Steve Rives',NULL,NULL,NULL),(741,'Golem of Sprague',NULL,NULL,NULL),(742,'Active Matrix',NULL,NULL,NULL),(743,'Chillin\' Bit Boy',NULL,NULL,NULL),(744,'PsychoWeasel',NULL,NULL,NULL),(745,'Kris',NULL,NULL,NULL),(746,'DayEight',NULL,NULL,NULL),(747,'maldoror','','','I\'ve assumed Maldoror and maldoror are the same author.'),(748,'Baxlyder',NULL,NULL,NULL),(749,'JS',NULL,NULL,NULL),(750,'Jason Fairlane',NULL,'jfair@2600.com',NULL),(751,'Comhack International',NULL,NULL,NULL),(752,'Frog',NULL,NULL,NULL),(753,'Dr. Kolos',NULL,NULL,NULL),(754,'TheCrow',NULL,'thecrow@iconn.net',NULL),(755,'Mister Galaxy',NULL,'MRGALAXY@AOL.COM',NULL),(756,'Mr. Natural',NULL,NULL,NULL),(757,'Simple Nomad',NULL,NULL,NULL),(758,'TDi',NULL,NULL,NULL),(759,'Rebel',NULL,NULL,NULL),(760,'No comment and Crash Test Idiot',NULL,NULL,NULL),(761,'Big Lou',NULL,NULL,NULL),(762,'RedBoxChiliPepper',NULL,NULL,NULL),(763,'Loogie',NULL,NULL,NULL),(764,'Clark W. Griswold',NULL,NULL,NULL),(765,'Ice',NULL,NULL,NULL),(766,'~Me',NULL,NULL,NULL),(767,'Mike Larsen',NULL,NULL,NULL),(768,'Blue Whale',NULL,NULL,NULL),(769,'Gregory Gilliss',NULL,NULL,NULL),(770,'Dr. Delam',NULL,NULL,NULL),(771,'Veg',NULL,NULL,NULL),(772,'Case',NULL,NULL,NULL),(773,'Dr. No',NULL,NULL,NULL),(774,'The Shepherd',NULL,NULL,NULL),(775,'Impending Dhoom',NULL,NULL,NULL),(776,'Bootleg',NULL,NULL,NULL),(777,'The Majik Man',NULL,NULL,NULL),(778,'Trap',NULL,NULL,NULL),(779,'Commander Crash',NULL,NULL,NULL),(780,'The Roach',NULL,NULL,NULL),(781,'Swarthy',NULL,NULL,NULL),(782,'Hudson',NULL,NULL,NULL),(783,'Dastar Com',NULL,NULL,NULL),(784,'Tio Mate Jones',NULL,NULL,NULL),(785,'Roger Harrison',NULL,NULL,NULL),(786,'Darlo Okasi',NULL,NULL,NULL),(787,'Bisect Skull Gas',NULL,NULL,NULL),(788,'Adam Young',NULL,NULL,NULL),(789,'Helen Gone',NULL,NULL,NULL),(790,'Ice of Spidex',NULL,NULL,NULL),(791,'Mr. Galaxy',NULL,NULL,NULL),(792,'Ray Nonte',NULL,NULL,NULL),(793,'Mantis King',NULL,NULL,NULL),(794,'VOM',NULL,NULL,NULL),(795,'Prowler',NULL,NULL,NULL),(796,'Kitsune',NULL,NULL,NULL),(797,'Enigma',NULL,NULL,NULL),(798,'Danny Burstein',NULL,'dannyb@panix.com',NULL),(799,'Michael Wilson',NULL,NULL,NULL),(800,'Code-Cafe',NULL,NULL,NULL),(801,'Les Inconnu',NULL,NULL,NULL),(802,'Mr. Bungle',NULL,NULL,NULL),(803,'Voyager',NULL,NULL,NULL),(804,'Sonic Life',NULL,NULL,NULL),(805,'The Roving Eye',NULL,NULL,NULL),(806,'Paranoia',NULL,NULL,NULL),(807,'Wonko the Inane',NULL,NULL,NULL),(808,'Autolycus',NULL,NULL,NULL),(809,'Palindrome',NULL,NULL,NULL),(810,'EighT BaLL',NULL,NULL,NULL),(811,'Toxic Avenger',NULL,NULL,NULL),(812,'Q',NULL,NULL,NULL),(813,'The Camelback Juggler',NULL,NULL,NULL),(814,'Floyd Lloyd',NULL,NULL,NULL),(815,'snes',NULL,NULL,NULL),(816,'Packet Rat',NULL,NULL,NULL),(817,'Shidoshi',NULL,NULL,NULL),(818,'Kevin Crow',NULL,NULL,NULL),(819,'DeVillage Fool',NULL,NULL,NULL),(820,'Leonardo Brandson',NULL,NULL,NULL),(821,'Paul Bergsman',NULL,NULL,NULL),(822,'Parity Check',NULL,NULL,NULL),(823,'Xam Killroy',NULL,NULL,NULL),(824,'Kevin Daniel',NULL,NULL,NULL),(825,'MuscleHead',NULL,NULL,NULL),(826,'Roberto Verzola',NULL,NULL,NULL),(827,'Cap\'n Dave',NULL,NULL,NULL),(828,'Mr. Upsetter',NULL,NULL,NULL),(829,'GateDancer and Shrike',NULL,NULL,NULL),(830,'Michael E. Marotta',NULL,NULL,NULL),(831,'Simson L. Garfinkel',NULL,NULL,NULL),(832,'Veghead',NULL,NULL,NULL),(833,'Remote Control',NULL,NULL,NULL),(834,'910',NULL,NULL,NULL),(835,'Tech Rat',NULL,NULL,NULL),(836,'The Bard',NULL,NULL,NULL),(837,'Walter S. Jaffee',NULL,NULL,NULL),(838,'FyberLyte',NULL,NULL,NULL),(839,'The Judicator of D.C.',NULL,NULL,NULL),(840,'W. Ritchie Benedict',NULL,NULL,NULL),(841,'Peter Rabbit',NULL,NULL,NULL),(842,'Hyperborean Menance',NULL,NULL,NULL),(843,'Orb',NULL,NULL,NULL),(844,'U.R. Source',NULL,NULL,NULL),(845,'Hakim',NULL,NULL,NULL),(846,'Drewl/Salivate',NULL,NULL,NULL),(847,'Cruise-CTRL',NULL,NULL,NULL),(848,'Stephen J. Resz',NULL,NULL,NULL),(849,'Dr. Bloodmoney',NULL,NULL,NULL),(850,'Judas Gerard',NULL,NULL,NULL),(851,'Echo',NULL,NULL,NULL),(852,'Crisp G.R.A.S.P.',NULL,NULL,NULL),(853,'The 999',NULL,NULL,NULL),(854,'Romula Velcro',NULL,NULL,NULL),(855,'Charlie Zee',NULL,NULL,NULL),(856,'The Phoenix',NULL,NULL,NULL),(857,'Dr. Clayton Phorester',NULL,NULL,NULL),(858,'Paco Xander Nathan',NULL,NULL,NULL),(859,'Dr. Williams',NULL,NULL,NULL),(860,'Bayonet',NULL,NULL,NULL),(861,'The Dark Knight',NULL,NULL,NULL),(862,'NeurAlien',NULL,NULL,NULL),(863,'GCMS MechWarriors',NULL,NULL,NULL),(864,'Roving Eye',NULL,NULL,NULL),(865,'Cray-Z Phreaker',NULL,NULL,NULL),(866,'Swinging Man',NULL,NULL,NULL),(867,'Count Zero',NULL,NULL,NULL),(868,'Infiltrator',NULL,NULL,NULL),(869,'The Devil\'s Advocate',NULL,NULL,NULL),(870,'Al Capone',NULL,NULL,NULL),(871,'New York Telephone Company',NULL,NULL,NULL),(872,'Phord Prefect',NULL,NULL,NULL),(873,'The Masked Avocado',NULL,NULL,NULL),(874,'The Fed',NULL,NULL,NULL),(875,'Night Ranger',NULL,NULL,NULL),(876,'Paranoid Panda',NULL,NULL,NULL),(877,'Frosty of the GCMS',NULL,NULL,NULL),(878,'Mad Scientist',NULL,NULL,NULL),(879,'Keyboard Jockey',NULL,NULL,NULL),(880,'The Monk',NULL,NULL,NULL),(881,'Midnight Caller',NULL,NULL,NULL),(882,'Alien X',NULL,NULL,NULL),(883,'Felipe Rodriquez and Rop Goggrij',NULL,NULL,NULL),(884,'Dust',NULL,NULL,NULL),(885,'Esper',NULL,NULL,NULL),(886,'Marshall Plann',NULL,NULL,NULL),(887,'Colonel Walter E. Kurtz',NULL,NULL,NULL),(888,'Craig Neidorf',NULL,NULL,NULL),(889,'PW',NULL,NULL,NULL),(890,'Chris Hibbert',NULL,NULL,NULL),(891,'The Dead Cow and NB',NULL,NULL,NULL),(892,'Condor Woodstein',NULL,NULL,NULL),(893,'DC',NULL,NULL,NULL),(894,'Dr. Abuse',NULL,NULL,NULL),(895,'MCI Mouse',NULL,NULL,NULL),(896,'Net Runner',NULL,NULL,NULL),(897,'The Paranoid Panda',NULL,NULL,NULL),(898,'The Infidel',NULL,NULL,NULL),(899,'Kevin',NULL,NULL,NULL),(900,'New Hack City',NULL,NULL,NULL),(901,'Jake \"The Snake\"',NULL,NULL,NULL),(902,'Lord Thunder',NULL,NULL,NULL),(903,'Noah Clayton',NULL,NULL,NULL),(904,'1000 Spiderwebs of Might',NULL,NULL,NULL),(905,'Crazed Luddite & Murdering Thug',NULL,NULL,NULL),(906,'Gordon Meyer and Jim Thomas',NULL,NULL,NULL),(907,'Violence',NULL,NULL,NULL),(908,'The Plague',NULL,NULL,NULL),(909,'The \"Q\"',NULL,NULL,NULL),(910,'Phantom Phreaker and Doom Prophe',NULL,NULL,NULL),(911,'B/Square and Mr. Upsetter',NULL,NULL,NULL),(912,'Tamlyn Gam',NULL,NULL,NULL),(913,'Lurch',NULL,NULL,NULL),(914,'Aritstotle',NULL,NULL,NULL),(915,'Micro Surgeon','','','West Coast Phreaks'),(916,'Larry P.',NULL,NULL,NULL),(917,'Peter Bruce',NULL,NULL,NULL),(918,'Jeff Gray',NULL,NULL,NULL),(919,'Paul Estev',NULL,NULL,NULL),(920,'Red Knight',NULL,NULL,'Phreakers/Hackers Underground Network'),(921,'Scott Statton',NULL,NULL,'@ The Telecom Digest'),(922,'Bob Page',NULL,NULL,'University of Lowell Computer Science Department.'),(923,'E. Solomenko',NULL,NULL,NULL),(924,'John Drake',NULL,NULL,NULL),(925,'Lou Scannon',NULL,NULL,NULL),(926,'Phucked Agent 04',NULL,NULL,NULL),(927,'The Glitch',NULL,NULL,NULL),(930,'Almon Strowger Jr.',NULL,NULL,'(No, not the real one)'),(931,'Tommy',NULL,NULL,NULL),(932,'iphelix',NULL,NULL,NULL),(933,'Mr. Curious / DoPi',NULL,NULL,NULL),(934,'Annalee Newitz',NULL,NULL,NULL),(935,'dolst',NULL,NULL,NULL),(936,'Lilith',NULL,NULL,NULL),(937,'SigFLUP',NULL,'pantsbutt@gmail.com',NULL),(938,'L00dHum',NULL,NULL,NULL),(939,'mr_cow',NULL,NULL,NULL),(940,'Desert_Fox and 6|21|3|11',NULL,NULL,NULL),(941,'Ross M. Greenberg',NULL,NULL,NULL),(942,'J.R. \"Bob\" Dobbs',NULL,NULL,NULL),(943,'The Rancid Grapefuit',NULL,NULL,NULL),(944,'Thunder Seven',NULL,NULL,NULL),(945,'VM Guru',NULL,NULL,NULL),(946,'Captain Zap',NULL,NULL,NULL),(947,'Lex Luthor','','','and The Legion of Doom/Hackers'),(948,'Dave Taylor',NULL,NULL,NULL),(949,'Hal from Rome',NULL,NULL,NULL),(950,'The Disk Jockey',NULL,NULL,NULL),(951,'The LNA Master',NULL,NULL,NULL),(952,'Mr. Icom',NULL,NULL,NULL),(953,'Staff',NULL,NULL,NULL),(954,'Mac+',NULL,NULL,NULL),(955,'The Greek',NULL,NULL,NULL),(956,'Hank',NULL,'Hank@Taunivm.Bitnet',NULL),(957,'Wintermute',NULL,NULL,NULL),(958,'Al Fresco',NULL,NULL,NULL),(959,'Dan Murphy',NULL,NULL,NULL),(960,'Mel Beckman',NULL,NULL,NULL),(961,'Rex Valve',NULL,NULL,NULL),(962,'nynex phreak',NULL,NULL,NULL),(963,'Thee Joker',NULL,NULL,NULL),(964,'Texas Toad',NULL,NULL,NULL),(965,'No Severence',NULL,NULL,NULL),(966,'The Veteran Cosmic Rocker',NULL,NULL,NULL),(967,'Mike Yuhas',NULL,NULL,NULL),(968,'The Marauder','','','and The Legion of Doom\r\nPhoneline Phantoms'),(969,'Dan Foley',NULL,NULL,NULL),(970,'Mainstream America',NULL,NULL,NULL),(971,'The Videosmith',NULL,NULL,NULL),(972,'John Freeman',NULL,NULL,NULL),(973,'The Lineman',NULL,NULL,NULL),(974,'Legion of Hackers',NULL,NULL,NULL),(975,'Roland Dutton',NULL,NULL,NULL),(976,'Mike Agranoff',NULL,NULL,NULL),(977,'The Hobbit',NULL,NULL,NULL),(978,'Bill From RNOC','','','Legion of Doom'),(979,'Sir William',NULL,NULL,NULL),(980,'Lord Phreaker',NULL,NULL,NULL),(982,'The Mole',NULL,NULL,NULL),(984,'Bruce Alston',NULL,NULL,NULL),(985,'John Anderson',NULL,NULL,NULL),(986,'MAD!',NULL,NULL,NULL),(987,'The Dragyn',NULL,NULL,NULL),(988,'The Kid & Co.',NULL,NULL,NULL),(989,'Baalzebub',NULL,NULL,NULL),(990,'Chester Holmes',NULL,NULL,NULL),(991,'The Alaskan Phreak',NULL,NULL,NULL),(992,'The Researcher',NULL,NULL,NULL),(993,'Ford Prefect',NULL,NULL,NULL),(994,'Silent Switchman',NULL,NULL,NULL),(995,'The Shadow',NULL,NULL,NULL),(996,'Jim Wood',NULL,NULL,NULL),(997,'Howard',NULL,NULL,NULL),(998,'Forest Ranger',NULL,NULL,NULL),(999,'The Knights of Shadow',NULL,NULL,NULL),(1000,'Orson Buggy',NULL,NULL,NULL),(1001,'AX MURDERER',NULL,NULL,NULL),(1002,'Paul G. Estev',NULL,NULL,NULL),(1003,'Bioc Agent 003',NULL,NULL,NULL),(1004,'Bob Gamma',NULL,NULL,NULL),(1005,'The CGI Guy',NULL,NULL,NULL),(1006,'Firemonger',NULL,NULL,NULL),(1007,'Mike Salerno',NULL,NULL,NULL),(1008,'Paul D. Lehrman',NULL,NULL,NULL),(1009,'Electric Moon',NULL,NULL,NULL),(1010,'Mark Bluebox',NULL,NULL,NULL),(1011,'Gorgeous_G',NULL,NULL,NULL),(1012,'kawarimono','','kawarimono@bigpond.com',''),(1013,'Da New Ment0r','','','of PhoeniX.RisinG.GrouP'),(1014,'Keeng Tusk',NULL,NULL,NULL),(1015,'Lnkd.com?2600',NULL,NULL,NULL),(1016,'The Third Man',NULL,NULL,NULL),(1017,'pantos','','','I\'ve assumed Pantos and pantos are the same author.'),(1018,'Decora',NULL,NULL,NULL),(1019,'fobg',NULL,NULL,NULL),(1020,'11001001',NULL,NULL,NULL),(1021,'Tzu Tzu Metals',NULL,NULL,NULL),(1023,'Minishark',NULL,NULL,NULL),(1024,'EvilGold',NULL,NULL,NULL),(1025,'Ron Overdrive',NULL,NULL,NULL),(1026,'BitRobber','','BitRobber@gmail.com',''),(1027,'alleyrat',NULL,NULL,NULL),(1028,'Pan','','2600feedback@sensoryresearch.net','Pan is a connoisseur of interactive computing, science and education. He lives somewhere.'),(1029,'The Funkster Deluxe','','funk@forethought.net',''),(1030,'Twisted Uterus','','twisteduterus@gmail.com',''),(1031,'ZoDiaC13',NULL,NULL,NULL),(1032,'excessive | offnetwork',NULL,NULL,NULL),(1033,'Brian Detweiler',NULL,NULL,NULL),(1034,'p4nt05',NULL,NULL,NULL),(1035,'The Skog',NULL,NULL,NULL),(1036,'t0sspint',NULL,NULL,NULL),(1037,'ternarybit','','austindcc@gmail.com',''),(1038,'Non-Sequential',NULL,NULL,NULL),(1039,'Jared DeWitt',NULL,NULL,NULL),(1040,'Yan Tan Tethera',NULL,NULL,NULL),(1041,'Kim Moser',NULL,NULL,NULL),(1042,'Wavesonics',NULL,NULL,NULL),(1043,'R. Toby Richards',NULL,NULL,NULL),(1044,'Oddacon T. Ripper','','','Assume Oddacon T Ripper and Oddacon T. Ripper are the same author.'),(1045,'Farhan Al-Muradabadi',NULL,NULL,NULL),(1046,'Digicon',NULL,NULL,NULL),(1047,'MiracleMax',NULL,NULL,NULL),(1048,'Sacha Moufarrege',NULL,NULL,NULL),(1049,'Anthony',NULL,NULL,NULL),(1050,'xorcist','','xorcist@gmx.net',''),(1051,'therippa',NULL,NULL,NULL),(1052,'Azazel',NULL,NULL,NULL),(1053,'kliq',NULL,NULL,NULL),(1054,'Ry0ki',NULL,NULL,NULL),(1055,'John W5EME',NULL,NULL,NULL),(1056,'spynuclear','','spynuclear@yahoo.com',''),(1057,'ScatteredFrog',NULL,NULL,NULL),(1058,'Strawberry Akhenaten',NULL,NULL,NULL),(1059,'Triscal Islington',NULL,NULL,NULL),(1060,'DarX',NULL,NULL,NULL),(1061,'BY3M@N',NULL,NULL,NULL),(1062,'Sandwich',NULL,NULL,NULL),(1063,'windpunk','','','I\'ve assumed Windpunk and windpunk are the same author.'),(1064,'Purkey',NULL,NULL,NULL),(1065,'The Guy Who Was In Craig Neidorf\'s Spanish Class And Had No Idea','','',''),(1066,'Sheep Slapper','','sheep.slapper@gmail.com',''),(1067,'Geo Spoof','','geospoof@gmail.com',''),(1068,'Oakcool',NULL,NULL,NULL),(1069,'Lifeguard',NULL,NULL,NULL),(1070,'Max Vendor',NULL,NULL,NULL),(1071,'K3ntucky',NULL,NULL,NULL),(1072,'Armando Pantoja',NULL,NULL,NULL),(1073,'Israel',NULL,NULL,NULL),(1074,'Katherine Cook',NULL,NULL,NULL),(1075,'Triad@Efnet',NULL,NULL,NULL),(1076,'Michael Morin',NULL,NULL,NULL),(1077,'aestetix',NULL,NULL,NULL),(1078,'DGM',NULL,NULL,NULL),(1079,'Rolf',NULL,NULL,NULL),(1080,'Micah Lee',NULL,NULL,NULL),(1081,'riemann',NULL,NULL,NULL),(1082,'Asim Zaman',NULL,NULL,NULL),(1083,'kr',NULL,NULL,NULL),(1084,'mrcaffeine','','mrcaffeine@network0.org',''),(1085,'Pipefish','','pipefish@anonymousspeech.com\r\nemail@pipefish.me',''),(1086,'b3ard',NULL,NULL,NULL),(1087,'th3linguist','','th3linguist@googlemail.com',''),(1088,'KC',NULL,NULL,NULL),(1089,'Beyond',NULL,NULL,NULL),(1090,'Malf0rm3dx & Megalos',NULL,NULL,NULL),(1091,'pnorton',NULL,NULL,NULL),(1093,'twopointfour','','twopointfour@riseup.net',''),(1094,'Suborbital','','suboorbital@gmail.com',''),(1095,'Malvineous',NULL,NULL,NULL),(1096,'A Sayler',NULL,NULL,NULL),(1097,'Moral Grey Area Cat',NULL,NULL,NULL),(1098,'Johnny Fusion','','','=11811='),(1099,'Bruce Sutherland','','','(z3r043x)'),(1100,'Terrible Doe',NULL,NULL,NULL),(1101,'P9a3',NULL,NULL,NULL),(1102,'General Disarray','','G3neral.Disarray@gmail.com',''),(1103,'flippy',NULL,NULL,NULL),(1104,'Josiah McGurty',NULL,NULL,NULL),(1105,'papill0n',NULL,NULL,NULL),(1106,'Master Chen','','infoinject@gmail.com',''),(1107,'Graig Stephenson','','cstephen907@gmail.com',''),(1108,'bluelander','','bluelander@lavabit.com',''),(1109,'raphidae','','raphidae@EFNet',''),(1110,'Ashes',NULL,NULL,NULL),(1111,'Alex Nocenti','','','aka MrPockets'),(1113,'goldcove',NULL,NULL,NULL),(1114,'bTrack3r2003',NULL,NULL,NULL),(1117,'Tiffany Strauchs Rad',NULL,NULL,NULL),(1119,'Snugglepuff','','snugglepuff@operamail.com',''),(1120,'PTKitty',NULL,NULL,NULL),(1121,'Ninja_of_Comp',NULL,NULL,NULL),(1122,'Seeker7','','seeker8306@gmail.com',''),(1123,'lg0p89',NULL,NULL,NULL),(1130,'Pat D.',NULL,NULL,NULL),(1131,'Joshua Dick','','josh@joshdick.net',''),(1132,'Tim K',NULL,NULL,NULL),(1133,'Austin Lott',NULL,NULL,NULL),(1134,'StarckTruth',NULL,NULL,NULL),(1135,'tcstool','','tcstool@gmail.com',''),(1136,'Wananapaoa Uncle',NULL,NULL,NULL),(1137,'Jacob',NULL,NULL,NULL),(1138,'Gregory Porter','','greg.e.porter@gmail.com','backfromthemovies.blogspot.com'),(1139,'Lone.Geek',NULL,NULL,NULL),(1140,'gosein',NULL,NULL,NULL),(1141,'Douglas Spink','','wrinko@hushmail.com',''),(1142,'Donald Carter','','donny.carter76@gmail.com',''),(1143,'DMUX',NULL,NULL,NULL),(1144,'Paul Abramson',NULL,NULL,NULL),(1145,'Awake31337',NULL,NULL,NULL),(1146,'Piyter Hurd',NULL,NULL,NULL),(1147,'MS3',NULL,NULL,NULL),(1148,'DocSlow',NULL,NULL,NULL),(1149,'Daniel Ayoub','','daniel@ayoub.it',''),(1150,'D351',NULL,NULL,NULL),(1151,'Chip Ninja',NULL,NULL,NULL),(1152,'jk31214',NULL,NULL,NULL),(1153,'Merl',NULL,NULL,NULL),(1154,'Teague Newman',NULL,NULL,NULL),(1155,'JIOMNKA',NULL,NULL,NULL),(1156,'ellG147',NULL,NULL,NULL),(1157,'Cap\'n Zilog','','capnzilog@moshimail.com',''),(1158,'10cke',NULL,NULL,NULL),(1159,'Everett Vinzant',NULL,NULL,NULL),(1160,'OMK',NULL,NULL,NULL),(1161,'Andy Kaiser',NULL,NULL,NULL),(1162,'[Name Withheld]',NULL,NULL,NULL),(1163,'Aaron Grothe','','ajgrothe@yahoo.com',''),(1164,'markb',NULL,NULL,NULL),(1165,'UAVman aka DeathNinja McSex',NULL,NULL,NULL),(1166,'Phredd','','fredm70@gmail.com',''),(1167,'C P',NULL,NULL,NULL),(1168,'Dimitri',NULL,NULL,NULL),(1169,'Josephus Alexander',NULL,NULL,NULL),(1170,'Andy Phillips','','andyphillips99@gmail.com',''),(1171,'Doug Sibley',NULL,NULL,NULL),(1172,'Pasikrata',NULL,NULL,NULL),(1173,'Mr.Icom (Ticom)','','ticom.new.england@gmail.com',''),(1174,'R. Stevens and A. Blum',NULL,NULL,NULL),(1175,'David Morgan',NULL,NULL,NULL),(1176,'Sarlacii',NULL,NULL,NULL),(1177,'Tahu363',NULL,NULL,NULL),(1178,'Malandraj3m',NULL,NULL,NULL),(1179,'\"ain\'tDigitalDATTruth\"','','',''),(1181,'Hal Wigoda','','hal.wigoda@gmail.com',''),(1182,'OWA',NULL,NULL,NULL),(1183,'chap0','','contact.chap0@gmail.com',''),(1184,'Synystr',NULL,NULL,NULL),(1185,'SPitBalls',NULL,NULL,NULL),(1187,'Kevin Morris',NULL,NULL,NULL),(1188,'mcandre',NULL,NULL,NULL),(1189,'xnite','','xnite@xnite.org',''),(1190,'Ryan Daley',NULL,NULL,NULL),(1191,'D.B. LeConte-Spink',NULL,NULL,NULL),(1192,'GoodHart','Mike Keller','',''),(1193,'Rob T Firefly','','','Reviewer website'),(1194,'^SUBv',NULL,NULL,NULL),(1195,'W.D. Woods',NULL,NULL,NULL),(1196,'lanrat',NULL,NULL,NULL),(1197,'TJ',NULL,NULL,NULL),(1198,'Shikhin Sethi','','draumer.shikhin@gmail.com',''),(1199,'Shea Silverman','','shea@sheasilverman.com',''),(1200,'G Dorking',NULL,NULL,NULL),(1201,'Pierre LC',NULL,NULL,NULL),(1202,'Cybermouse',NULL,NULL,NULL),(1203,'B4tm@n',NULL,NULL,NULL),(1204,'Bad Bobby\'s Basement Bandits','','',''),(1205,'Hristo (Izo) Gueorguiev',NULL,NULL,NULL),(1206,'Sh0kwave',NULL,NULL,NULL),(1207,'DarkAudax',NULL,NULL,NULL),(1208,'TJ Loposser',NULL,NULL,NULL),(1209,'Donald Blake',NULL,NULL,NULL),(1210,'elib7ronic','','tim@elibronic.ca',''),(1211,'Eightkay',NULL,NULL,NULL),(1212,'Chris Lane','','chris@chris-allen-lane.com','twitter.com/chrisallenlane'),(1213,'Frank Buss','','fb@frank-buss.de',''),(1214,'Ronin',NULL,NULL,NULL),(1215,'Uriah Christensen',NULL,NULL,NULL),(1216,'Rick Conlee','','rick.conlee@gmail.com',''),(1217,'Brandon',NULL,NULL,NULL),(1218,'Antonio Ortega Jr.',NULL,NULL,NULL),(1219,']{nightVision',NULL,NULL,NULL),(1220,'Patric Schmitz',NULL,NULL,NULL),(1221,'Zellie Y. Thomas',NULL,NULL,NULL),(1222,'Brainwaste',NULL,NULL,NULL),(1223,'Tyler Behling',NULL,NULL,NULL),(1224,'l0cke',NULL,NULL,NULL),(1225,'0rbytal','','0rbytal@burntmail.com',''),(1226,'Klaatu',NULL,NULL,NULL),(1227,'Scott Arciszewski',NULL,NULL,NULL),(1228,'John Thibault',NULL,NULL,NULL),(1229,'Samuel A. Bancroft','','SamuelBancroft@gmx.com',''),(1230,'R. B.',NULL,NULL,NULL),(1231,'Andy G (@vxhex)',NULL,NULL,NULL),(1232,'King Flathead',NULL,NULL,NULL),(1233,'Clutching Jester',NULL,NULL,NULL),(1234,'Matt Davis (enferex)','','mattdavis9@gmail.com',''),(1235,'Alva Ray',NULL,NULL,NULL),(1236,'Freaky',NULL,NULL,NULL),(1237,'sam',NULL,NULL,NULL),(1238,'r00tNinjas: 0rbytal & blerbl','','0rbytal@burntmail.com\r\ntheblerbl@gmail.com',''),(1239,'Robert B. Schofield',NULL,NULL,NULL),(1240,'Brett Stevens',NULL,NULL,NULL),(1241,'Spacedawg',NULL,NULL,NULL),(1242,'Michael Post',NULL,NULL,NULL),(1243,'Jim L',NULL,NULL,NULL),(1244,'Tyler Frisbee',NULL,NULL,NULL),(1245,'eyenot',NULL,NULL,NULL),(1246,'ook','','','Ook'),(1247,'Toilet Fixer 555C',NULL,NULL,NULL),(1248,'Jason Sherman',NULL,NULL,NULL),(1249,'Darwin',NULL,NULL,NULL),(1250,'water + Lasix = #1',NULL,NULL,NULL),(1251,'Edster @ 2600 Dublin',NULL,NULL,NULL),(1252,'Kevin R. Coombes','','kevin.r.coombes@gmail.com',''),(1253,'James Kracht',NULL,NULL,NULL),(1254,'DreamsForMortar',NULL,NULL,NULL),(1255,'Ishan Raval',NULL,NULL,NULL),(1256,'Vera Ranieri',NULL,NULL,NULL),(1257,'Dave D Rave',NULL,NULL,NULL),(1258,'Yuval tisf Nativ and Tom Zahov',NULL,NULL,NULL),(1259,'Kim Crawley','','','Twitter: @kim_crawley'),(1260,'Peter C. Gravelle','','peter.c.gravelle+2600@gmail.com',''),(1261,'DKN',NULL,NULL,NULL),(1262,'EndlessFapping',NULL,NULL,NULL),(1263,'Shadow E. Figure',NULL,NULL,NULL),(1264,'GerbilByte',NULL,NULL,NULL),(1265,'Prisoner #6',NULL,NULL,NULL),(1266,'David Crowe','','David.Crowe@cnp-wireless.com',''),(1267,'nachash','','nachash@observers.net',''),(1268,'Overall',NULL,NULL,NULL),(1269,'Derek Kurth','','dkurth@gmail.com',''),(1270,'Mike','','mike@tofet.net',''),(1271,'metaknight',NULL,NULL,NULL),(1272,'Maven',NULL,NULL,NULL),(1273,'Brian Van Stedum','','brianvanstedum@gmail.com',''),(1274,'Buanzo','Arturo Busleiman','buanzo@buanzo.com.ar',''),(1275,'secuid0',NULL,NULL,NULL),(1276,'Parker Higgins',NULL,NULL,NULL),(1277,'5MEODMT6APB',NULL,NULL,NULL),(1278,'Jerry',NULL,NULL,NULL),(1279,'Jon Schipp','','','Author website'),(1280,'E Squared',NULL,NULL,NULL),(1281,'TFE Buy a.k.a. The Man',NULL,NULL,NULL),(1282,'Eve S. Gregory',NULL,NULL,NULL),(1283,'the xorcist','','xorcist@sigaint.org',''),(1284,'Pic0o',NULL,NULL,NULL),(1285,'The Slakker',NULL,NULL,NULL),(1286,'Cooper Quintin',NULL,NULL,NULL),(1287,'wino_admin',NULL,NULL,NULL),(1288,'Ilyke Maasterd',NULL,NULL,NULL),(1289,'J. Savidan',NULL,NULL,NULL),(1290,'mmx3',NULL,NULL,NULL),(1291,'musashi42',NULL,NULL,NULL),(1292,'2dedd54f25ae2730225e6f1b8968fda5','','','Full Nome De Plume: 2dedd54f25ae2730225e6f1b8968fda52f0831ce'),(1293,'Agent T.W. Lee','','','Interzone Intelligence'),(1294,'Jacob Hoffman-Andrews',NULL,NULL,NULL),(1295,'CANNON C.',NULL,NULL,NULL),(1296,'LexIcon',NULL,NULL,NULL),(1297,'2-6 India',NULL,NULL,NULL),(1298,'Ronald Gans',NULL,NULL,NULL),(1299,'Erobos (Simmons)',NULL,NULL,NULL),(1300,'Kevin Patterson',NULL,NULL,NULL),(1301,'NerveGas Jr.',NULL,NULL,NULL),(1302,'Super Ells',NULL,NULL,NULL),(1303,'RAMGarden',NULL,NULL,NULL),(1304,'Monican',NULL,NULL,NULL),(1305,'Dave Maass',NULL,NULL,NULL),(1306,'Steffen Fritz','','sfnfrz2600@gmail.com',''),(1307,'Michael Lee Nirenberg','','restraining.order.ltd@gmail.com',''),(1308,'Charlton Trezevant','','ct@ctis.me',''),(1309,'Evan D\'Elia','','',''),(1310,'R.B.',NULL,NULL,NULL),(1311,'B. Boehler',NULL,NULL,NULL),(1312,'Baudsurfer/Red Sector Inc.',NULL,NULL,NULL),(1313,'Dent','','dentedfun@gmail.com\r\ndentedfun@protonmail.ch',''),(1314,'Michael L. Kelley Jr.',NULL,NULL,NULL),(1315,'Ghost Exodus',NULL,NULL,NULL),(1316,'revx','','revx@omnomzom.com',''),(1317,'Rafael Santiago','','voidbrainvoid@gmail.com',''),(1318,'Stephen Comeau',NULL,NULL,NULL),(1319,'Jack D Ripper',NULL,NULL,NULL),(1320,'Ben Kenobi','','benkenobi@sdf.org','Per 33:3 p.41 benkenobi@ruggedinbox.com service gone.'),(1321,'Elliot Harmon',NULL,NULL,NULL),(1322,'The Knight Owl',NULL,NULL,NULL),(1323,'Marshall Edwards',NULL,NULL,NULL),(1324,'Deflagrati0n',NULL,NULL,NULL),(1325,'Keith',NULL,NULL,NULL),(1326,'InsideJob',NULL,NULL,NULL),(1327,'-Me',NULL,NULL,NULL),(1328,'King V',NULL,NULL,NULL),(1329,'Daelphinux',NULL,NULL,NULL),(1330,'fooCount1',NULL,NULL,NULL),(1331,'Chris, AB3YS',NULL,NULL,NULL),(1332,'Vuk Ivanovic','','vuk.ivanovic9000@gmail.com',''),(1333,'Mallory Knodel et al','','','Sacha van Geffen, Stefania Milan, and Camille Francois.'),(1334,'IceQUICK',NULL,NULL,NULL),(1335,'Chuck Easttom','','chuck@chuckeasttom.com','website: www.ChuckEastom.com'),(1336,'Mike Dank','','famicoman@gmail.com',''),(1337,'Scott Everard',NULL,NULL,NULL),(1338,'SideFx',NULL,NULL,NULL),(1339,'Garrett Mickley',NULL,NULL,NULL),(1340,'Anne',NULL,NULL,NULL),(1341,'bartitsu59',NULL,NULL,NULL),(1342,'Richard Vardit',NULL,NULL,NULL),(1343,'Tau_Zer0',NULL,NULL,NULL),(1344,'lol-md4','','lol-md4@riseup.net',''),(1345,'Chris Rucker','','','Data Scientist'),(1346,'Rodrigo Ruiz and Rogerio Winter','','rodrigosruiz@outlook.com\r\nrogwinter@gmail.com',''),(1347,'Byeman',NULL,NULL,NULL),(1348,'Wyatt Lee',NULL,NULL,NULL),(1349,'Brenden Hyde',NULL,NULL,NULL),(1350,'Samuel Hofius',NULL,NULL,NULL),(1351,'Erica Portnoy and Elliot Harmon',NULL,NULL,NULL),(1352,'Secure Panda','','this.is.a.secure.panda@gmail.com',''),(1353,'Kyle Bradshaw',NULL,NULL,NULL),(1354,'Sydney Greenstreet',NULL,NULL,NULL),(1355,'Dr. G',NULL,NULL,NULL),(1356,'Victor',NULL,NULL,NULL),(1357,'Ckjbgames',NULL,NULL,NULL),(1358,'David Libertas',NULL,NULL,NULL),(1359,'Nick',NULL,NULL,NULL),(1360,'StMerry',NULL,NULL,NULL),(1361,'Jack Beltane',NULL,NULL,NULL),(1362,'redstarx',NULL,NULL,NULL),(1363,'casi',NULL,NULL,NULL),(1364,'Filip Kalebo','','','aka flipchan'),(1365,'Cezary Jaronczyk','','Cjjconsultant4@gmail.com\r\n','Authors website'),(1366,'Gennie Gebhart',NULL,NULL,NULL),(1367,'GI_Jack',NULL,NULL,NULL),(1368,'M0ebiusStrip',NULL,NULL,NULL),(1369,'Nordog',NULL,NULL,NULL),(1370,'p4bI0','','2.6k@uzy.me',''),(1371,'Anthony Russell','','','Twitter: @DotNetRussell'),(1372,'Jameson Hampton',NULL,NULL,NULL),(1373,'Hristo I. Gueorguiev','','','web site: hristogueorguiev.com'),(1374,'Br@d',NULL,NULL,NULL),(1375,'Buckminister Emptier',NULL,NULL,NULL),(1376,'Kernal Seiden',NULL,NULL,NULL),(1377,'Soraya Okuda and Elliot Harmon',NULL,NULL,NULL),(1378,'idk',NULL,NULL,NULL),(1379,'ladyada and fill','','ladyada@alum.mit.edu\r\nfill@2600.com',''),(1380,'Jeffrey H. MacLachlan',NULL,NULL,NULL),(1381,'Infra Read',NULL,NULL,NULL),(1382,'Jared J. Estes',NULL,NULL,NULL),(1383,'Dave Jericho',NULL,NULL,NULL),(1384,'Josephus',NULL,NULL,NULL),(1385,'TheGeek',NULL,NULL,NULL),(1386,'John Skilbeck',NULL,NULL,NULL),(1387,'B. Ramsey',NULL,NULL,NULL),(1388,'Qrag','','qragrqsha@tznvy.pbz\r\nqragrqsha@cebgbaznvy.pu',''),(1389,'James Fell','','james.fell@tartaruslabs.com',''),(1390,'deadbeat0',NULL,NULL,NULL),(1391,'th0tnet',NULL,NULL,NULL),(1392,'Emma Stamm',NULL,NULL,NULL),(1393,'Alan Sondheim',NULL,NULL,NULL),(1394,'BirdPerson',NULL,NULL,NULL),(1395,'Andova Begarin',NULL,NULL,NULL),(1396,'Snocone',NULL,NULL,NULL),(1397,'Emily Saunders',NULL,NULL,NULL),(1398,'Gazza',NULL,NULL,NULL),(1399,'Ricki Burke',NULL,NULL,NULL),(1400,'David Ruiz',NULL,NULL,NULL),(1401,'tyrus568',NULL,NULL,NULL),(1402,'GI Jack',NULL,NULL,NULL),(1403,'Doc Slow',NULL,NULL,NULL),(1404,'Alexander Urbelis','','alex@blackstone-law.com','f/k/a Neon Samurai'),(1405,'XtendedWhere',NULL,NULL,NULL),(1406,'Ted Benson',NULL,NULL,NULL),(1407,'davemitchell',NULL,NULL,NULL),(1408,'Marc Lighter',NULL,NULL,NULL),(1409,'Ron Porter','','ron@jadero.com',''),(1410,'James Hunter',NULL,NULL,NULL),(1411,'Jason Kelley',NULL,NULL,NULL),(1412,'Huntech',NULL,NULL,NULL),(1413,'Karan Saini',NULL,NULL,NULL),(1414,'J. J. Styles','','jjstyles0001@gmail.com','aka 0ptiKaL I1usioN'),(1415,'MrGhostValley',NULL,NULL,NULL),(1416,'Corey Kahler',NULL,NULL,NULL),(1417,'Christy Ramsey',NULL,NULL,NULL),(1418,'Michaleen Garda',NULL,NULL,NULL),(1419,'Quidnarious Gooch',NULL,NULL,NULL),(1420,'John Q. Sample',NULL,NULL,NULL),(1421,'haplesscheese',NULL,NULL,NULL),(1422,'Frizzank',NULL,NULL,NULL),(1423,'Connor Kennedy',NULL,NULL,NULL),(1424,'lol-md5','','lol-md5@riseup.net',''),(1425,'David Savage Lightman',NULL,NULL,NULL),(1426,'Jason Loggins',NULL,NULL,NULL),(1427,'Major Mule',NULL,NULL,NULL),(1428,'paulml',NULL,NULL,NULL),(1429,'ndf',NULL,NULL,NULL),(1430,'Aditya K Sood and Rohit Bansal',NULL,NULL,NULL),(1431,'Mevyc','','mevycfla@gmail.com',''),(1432,'Marc Ronell',NULL,NULL,NULL),(1433,'Bobby Joe Snyder',NULL,NULL,NULL),(1434,'',NULL,NULL,NULL),(1435,'Sum Ynggai',NULL,NULL,NULL),(1436,'Michael Ravnitzky',NULL,NULL,NULL),(1437,'Sentient',NULL,NULL,NULL),(1438,'Columbo',NULL,NULL,NULL); /*!40000 ALTER TABLE `Authors` ENABLE KEYS */; UNLOCK TABLES; -- -- Dumping data for table `Chapters` -- LOCK TABLES `Chapters` WRITE; /*!40000 ALTER TABLE `Chapters` DISABLE KEYS */; INSERT INTO `Chapters` VALUES (1,1,1,'Stories and Adventures',3),(2,1,2,'The Last Days of Ma Bell',21),(3,1,3,'New Toys to Play With',65),(4,1,4,'The Early Days of the Net',119),(5,1,5,'Corporate History',157),(6,1,6,'Raids',179),(7,1,7,'The Hacker Philosophy',207),(8,2,8,'Pop Culture and the Hacker World',233),(9,2,9,'The Computer Revolution',277),(10,2,10,'Learning to Hack Other Things',313),(11,2,11,'More Hacker Stories and Adventures',381),(12,2,12,'The Changing of the Telephone',421),(13,2,13,'Hackers and the Law',491),(14,3,14,'The Lawsuits',573),(15,3,15,'Still More Hacker Stories',601),(16,3,16,'A New Era of Telephony',651),(17,3,17,'Retail Hacking',691),(18,3,18,'Toys of the 21st Century',731); /*!40000 ALTER TABLE `Chapters` ENABLE KEYS */; UNLOCK TABLES; -- -- Dumping data for table `Issues` -- LOCK TABLES `Issues` WRITE; /*!40000 ALTER TABLE `Issues` DISABLE KEYS */; INSERT INTO `Issues` VALUES (1,'Spring',1988,'Page 11 has a Bell of Pennsylvania add, page 29 shows an RCI bill, page 39 has a State of Florida Public Service Commission letter, that are not in the index.','FrontCoverImages/Spring1988.gif','BackCoverImages/Spring1988.gif',1,5,NULL,48),(2,'Summer',1988,'Page 43 has a phone photo by John Drake that is not in the index.','FrontCoverImages/Summer1988.gif','BackCoverImages/Summer1988.gif',2,5,NULL,48),(3,'Autumn',1988,'Page 19 has an advertisement from New York Telephone, page 22 and 23 have a memo about unauthorized DOCMASTER access reprinted from w.o.r.m. 1.5, page 33 has a funny fax, page 39 has artwork by J.R. Dobbs, page 40 has an employee memo from Illinois Bell, that are not in the index.','FrontCoverImages/Autumn1988.gif','BackCoverImages/Autumn1988.gif',3,5,NULL,48),(4,'Winter',1988,'Page 2 has a National Telephone Company, Limited bulletin, page 18 has a copy of an Operator Assistance Network bill, page 33 has an AT&T direct dial service notice, that are not in the index.','FrontCoverImages/Winter1988.gif','BackCoverImages/Winter1988.gif',4,5,'',48),(5,'Spring',1989,'Page 1 has an Allied Communications Publication, page 7 has a Department of Defense notice about telephone use, that are not in the index.','FrontCoverImages/Spring1989.gif','BackCoverImages/Spring1989.gif',1,6,NULL,48),(6,'Summer',1989,'Page 1 has a security bulletin from Grumman, page 9 has a \"PHONE POLICE\" flyer, page 17 has a Red Box flyer, that are not in the index.','FrontCoverImages/Summer1989.gif','BackCoverImages/Summer1989.gif',2,6,NULL,48),(7,'Autumn',1989,'Page 31 shows a fax received by 2600, page 35 has a British Telecom Ad, page 44 prints a Defense Department phone book\'s telephone tips, that are not in the index.','FrontCoverImages/Autumn1989.gif','BackCoverImages/Autumn1989.gif',3,6,NULL,48),(8,'Winter',1989,'Page 39 and 40 have a comic and humorous picture that are not in the index.','FrontCoverImages/Winter1989.gif','BackCoverImages/Winter1989.gif',4,6,NULL,48),(9,'Spring',1990,'Page 11 has an Operation Sundevil map and a brain wave spoof, page 22 has a funny offer and an interesting fax, that are not in the index.','FrontCoverImages/Spring1990.gif','BackCoverImages/Spring1990.gif',1,7,'',48),(10,'Summer',1990,'','FrontCoverImages/Summer1990.gif','BackCoverImages/Summer1990.gif',2,7,'',48),(11,'Autumn',1990,'Page 35 has a \"check\" and an AT&T document that are not listed in the index.','FrontCoverImages/Autumn1990.gif','BackCoverImages/Autumn1990.gif',3,7,NULL,48),(12,'Winter',1990,'Page 4 and 45 are blank and not \"hacking scandal\" as the index indicates, page 31 has a funny advertisement sent in by a reader, page 40 has a notice from NYNEX, that are not in the index.','FrontCoverImages/Winter1990.gif','BackCoverImages/Winter1990.gif',4,7,'',48),(13,'Spring',1991,'Page 10 has a letter from Pepsi, page 18 has a TymCard/IQ, INC ad and comment, page 30 has a blank US District Court document, page 35 has a letter from a Texas Prison, that are not in the index.','FrontCoverImages/Spring1991.gif','BackCoverImages/Spring1991.gif',1,8,'',48),(14,'Summer',1991,'Page 6 has the breakdown of costs for the 911 document fiasco, page 13 shows pictures from a neo-Nazi computer game, page 34 has a \"proprietary\" phone company document page, that are not in the index.','FrontCoverImages/Summer1991.gif','BackCoverImages/Summer1991.gif',2,8,NULL,48),(15,'Autumn',1991,'Page 21 has a letter from TRW, page 42 has \'More Exciting Prison News\' that are not in the index.','FrontCoverImages/Autumn1991.gif','BackCoverImages/Autumn1991.gif',3,8,'',48),(16,'Winter',1991,'Page 4 has a picture of a building with 2600 address, page 20 has an example of a scam, page 21 has USPS Hacking Corrections and page 38 has a beer logo and what L.O.D. really stands for, that are not in the index.','FrontCoverImages/Winter1991.gif','BackCoverImages/Winter1991.gif',4,8,'\"They are satisfying their own appetite to know something that is not theirs to know.\" - Asst. District Attorney Don Ingraham',48),(17,'Spring',1992,'Page 7 displays some LAPD computer messages, page 20 display a scam to look out for, and are not in the index.','FrontCoverImages/Spring1992.gif','BackCoverImages/Spring1992.gif',1,9,'\"They are satisfying their own appetite to know something that is not theirs to know.\" - Asst. District Attorney Don Ingraham',48),(18,'Summer',1992,'Page 36 and 37 has a Bellcore letter and 2600 response that is not in the index.','FrontCoverImages/Summer1992.gif','BackCoverImages/Summer1992.gif',2,9,'\"The back door program included a feature that was designed to modify a computer in which the program was inserted so that the computer would be destroyed if someone accessed it using a certain password.\" - United States Department of Justice, July 1992',48),(19,'Autumn',1992,'Page 7 has the top ten scams of 1991, page 8 has an AT&T letter sent to \"Minor Threat\", page 11 has an AT&T fraud claim form, page 12 has a letter from Phone Management Enterprises, page 18 has NYNEX Telephone Service Allowance info, page 23 has info from China, page 39 has info on Meridian Mail hotel voice mail system, that are not in the index.','FrontCoverImages/Autumn1992.gif','BackCoverImages/Autumn1992.gif',3,9,'\"The back door program included a feature that was designed to modify a computer in which the program was inserted so that the computer would be destroyed if someone accessed it using a certain password.\" - United States Department of Justice, July 1992',48),(20,'Winter',1992,'Page 15 has a PTI Model 60 Prison Phone ad, page 16 has a Concern for Calcutta ad, page 23 has a 800 Numbers ad, page 39 has a letter from NYNEX, page 40 has a 900 number ad, not in the index.','FrontCoverImages/Winter1992.gif','BackCoverImages/Winter1992.gif',4,9,'\"The back door program included a feature that was designed to modify a computer in which the program was inserted so that the computer would be destroyed if someone accessed it using a certain password.\" - United States Department of Justice, July 1992',48),(21,'Spring',1993,NULL,'FrontCoverImages/Spring1993.gif','BackCoverImages/Spring1993.gif',1,10,'\"The Secret Service didn\'t do a good job in this case. We know no investigation took place. Nobody gave concern as to whether statutes were involved. We know there was damage.\" - Judge Sparks, Steve Jackson vs. Secret Service, January 28, 1993',48),(22,'Summer',1993,NULL,'FrontCoverImages/Summer1993.gif','BackCoverImages/Summer1993.gif',2,10,'\"The Secret Service didn\'t do a good job in this case. We know no investigation took place. Nobody gave concern as to whether statutes were involved. We know there was damage.\" - Judge Sparks, Steve Jackson vs. Secret Service, January 28, 1993',48),(23,'Autumn',1993,'Page 37 contains a correction to a schematic from the last issue that is not in the index.','FrontCoverImages/Autumn1993.gif','BackCoverImages/Autumn1993.gif',3,10,'\"At this time the Secret Service has no reason to believe that the suspect(s) in its investigation, or the plaintiff in this case, are aware of the nature of the Secret Service\'s investigation, who is under investigation by the Secret Service, what information is in the possession of the Secret Service, or who has provided information to the Secret Service in regard to this matter.\" - Secret Service affidavit responding to CPSR Freedom of Information Act request concerning the breakup of the November 1992 Washington DC 2600 Meeting',48),(24,'Winter',1993,'Page 13 has a letter from Ohio Bell, page 14 has a letter from a Sherrifs Department, that are not in the index.','FrontCoverImages/Winter1993.gif','BackCoverImages/Winter1993.gif',4,10,'\"At this time the Secret Service has no reason to believe that the suspect(s) in its investigation, or the plaintiff in this case, are aware of the nature of the Secret Service\'s investigation, who is under investigation by the Secret Service, what information is in the possession of the Secret Service, or who has provided information to the Secret Service in regard to this matter.\" - Secret Service affidavit responding to CPSR Freedom of Information Act request concerning the breakup of the November 1992 Washington DC 2600 Meeting',48),(25,'Spring',1994,NULL,'FrontCoverImages/Spring1994.gif','BackCoverImages/Spring1994.gif',1,11,NULL,48),(26,'Summer',1994,'Page 13 has info about the First U.S. Hacker Congress Hackers On Planet Earth (HOPE) that is not in the index.','FrontCoverImages/Summer1994.gif','BackCoverImages/Summer1994.gif',2,11,'\"Our experience has found that the best way to hurt a computer offender is to take away his toys. Computers are expensive items, and young offenders in particular may be unable to replace them. The seizure of the offender\'s computer by police also immediately and dramatically brings home the consequences of computer crime in a way that interjudicial proceedings cannot match. The knowledge that the seized computer system will be retained by law enforcement hastens the realization that the offender must change his lifestyle.\" - Kenneth Rosenblatt from \"Deterring Computer Crime\" as published in \"Prosecutor\'s Brief\", Summer 1989',48),(27,'Autumn',1994,'Page 7 contains two letters detailing corporate computer foulups, page 10 has a poster directed at phreaking, page 16 has a NYNEX memo, that are not in the index.','FrontCoverImages/Autumn1994.gif','BackCoverImages/Autumn1994.gif',3,11,'\"A pretty face can hide an evil mind. Be careful what you say - you\'ll give yourself away.\" - Johnny Rivers, \"Secret Agent Man\"',48),(28,'Winter',1994,'Page 11 contains a letter from the US Department of Justice, page 23 lists the funding for EFF and page 40 has a letter from Rop Gonggijp former editor of Hack-Tic that are not in the index.','FrontCoverImages/Winter1994.gif','BackCoverImages/Winter1994.gif',4,11,'\"He\'s an absolutely appalling influence on young men who fall for the glamorization of crime he publishes.\" - Hacker Prosecutor Gail Thackeray on Emmanuel Goldstein',48),(29,'Spring',1995,'Page 22 contains a copy of an military email and page 47 has an AT&T Megasystems memo not included in the index.','FrontCoverImages/Spring1995.gif','BackCoverImages/Spring1995.gif',1,12,'\"There are an estimated 35,000 hackers in the U.S. and their community is growing by an estimated 10 percent annually. They are not isolated individuals, slaving away in a vacuum; hackers have established formal operations within every metropolitan city in North America. Hackers communicate via compromised Internet gateways, long-distance calls stolen from corporate victims and through about 1,300 underground bulletin boards across the U.S. This infrastructure collects and disburses a constant flow of stolen calling-card information, corporate voice-mail-access data, compromised PBX DISA-port numbers, hackable modems, cloned cellular telephones and cellular-phone IDs.... The threat to U.S. businesses also has recently taken a new direction, due to hackers\' growing numbers and maturity. Security investigations have confirmed that known hackers are employed within Fortune 500 firms, which know nothing about the individuals\' prior activities. The risk to U.S. bisinesses is clear: What will happen when one of these hacker\'s employment is terminated? Will the individual destroy or damage the company\'s voice/data networks, release vital information about these networks to other hackers, or plant the seeds of future destruction in company systems? Time will tell.\" - unbridled paranoia from The Organized Hackerhood, part of McDonnell Douglas\' internal security newsletter leaked to us by an inside hacker.',60),(30,'Summer',1995,'Page 17 contains a letter from AT&T, page 26 and 27 contain documents referencing the Bernie S. case that are not in the index.','FrontCoverImages/Summer1995.gif','BackCoverImages/Summer1995.gif',2,12,'\"In a dramatic confirmation of how vulnerable Defense Department computers connected to the Internet actually are, the Defense Information Systems Agency revealed that it has conducted mock attacks on more then 8,000 DOD computers over the last two years. The DISA team successfully broke into more than 88 percent of the computers. Less than 5 percent even realized they had been attacked.\" - Federal Computer Week, February 6, 1995.',60),(31,'Autumn',1995,'Page 13 an flyer for the Boston 2600 meetings that is not in the index.','FrontCoverImages/Autumn1995.gif','BackCoverImages/Autumn1995.gif',3,12,'\"The threat that contemporary electronic intruders pose to the PSN [Public Switched Network] is rapidly changing and is significant. As a result of their increasing knowledge and sophistication, electronic intruders amy have a significant impact upon national security and emergency preparedness (NS/EP) telecommunications, because more than 90 percent of U.S. Government telecommunications services are provided by commercial carriers. ...technological changes and market forces in the domestic telecommunications industry are fueling a trend toward increasing automation and downsizing of staff. Consequently, there are now greater numbers of current and former telecommunications employees who may be disgruntled than at any time in recent years. These individuals should be viewed as a potential threat to NS/EP telecommunications.\" - The Electronic Intrusion Threat to National Security and Emergency Preparedness Telecommunications, published by National Communications System of Arlington, VA and leaked to us by a disgruntled employee.',60),(32,'Winter',1995,'Pages 10 and 11 contain an alleged AOL memo, that is not in the index.','FrontCoverImages/Winter1995.gif','BackCoverImages/Winter1995.gif',4,12,'\"All speech is not protected by the First Amendment.\" - Senator Arlen Specter (R-Pa.)',56),(33,'Spring',1996,'Page 8 contains a copy of a letter from MCI and page 21 contains Nokia 100 series telephone programming instructions that are not in the index.','FrontCoverImages/Spring1996.gif','BackCoverImages/Spring1996.gif',1,13,'\"It\'s not a computer crime to break into someone\'s system and just look around.\" - Susan Lloyd, a spokesperson for the FBI\'s Washington DC field office as quoted in the March 10, 1996 Boston Herald.',56),(34,'Summer',1996,NULL,'FrontCoverImages/Summer1996.gif','BackCoverImages/Summer1996.gif',2,13,'\"If we\'re going to live in this kind of world, we\'re going to have to link the intelligence world with law enforcement.\" - Senator Sam Nunn (D., Ga.) on a proposal to give the CIA power to begin domestic monitoring of U.S. citizens.',60),(35,'Autumn',1996,'Page 54 and 55 show pictures of hacked web sites and are not in the index.','FrontCoverImages/Autumn1996.gif','BackCoverImages/Autumn1996.gif',3,13,'\"Attacks on Defense computer systems are a serious and growing threat. The exact number of attacks cannot be readily determined because only a small portion are actually detected and reported. However, Defense Information Systems Agency (DISA) data implies that Defense may have experienced as many as 250,000 attacks last year. DISA information also shows that attacks are successful 65 percent of the time, and that the number of attacks is doubling each year, as Internet use increases along with the sophistication of \'hackers\' and their tools.\" - General Accounting Office report entitled \"Computer Attacks at Department of Defense Pose Increasing Risks\". It was later disclosed that the estimates were based on staged attacks from within the military.',60),(36,'Winter',1996,'Page 40 discusses an AT&T check that is not in the index.','FrontCoverImages/Winter1996.gif','BackCoverImages/Winter1996.gif',4,13,'\"Some of the computer attack tools, such as SATAN, are now so user-friendly that very little computer experience or knowledge is required to launch automated attacks on systems. Also, informal hacker groups, such as the 2600 club, the Legions of Doom, and Phrackers Inc., openly share information on the Internet about how to break into computer systems. This open sharing of information combined with the availability of user-friendly and powerful attack tools makes in relatively easy for anyone to learn how to attack systems or to refine their attack techniques.\" - General Accounting Office report entitled \"Computer Attacks at Department of Defense Pose Increasing Ricks\". The only names they got right in this quote were SATAN and Internet.',60),(37,'Spring',1997,'Page 12 shows an interesting book cover, page 26 shows an internal NYNEX Mobile memo, page 43 shows an exploit of INN, page 46 shows an addendum to Cracking AskSam in previous issue, none of which are in the index.','FrontCoverImages/Spring1997.gif','BackCoverImages/Spring1997.gif',1,14,'\"They have this myth that they are the cool guys and the cool guys always win over the suits. But the fact is that they are half-socialized, post-adolescents with serious ethical and moral boundary problems.\" - Mike Godwin of the Electronic Frontier Foundation commenting on hackers to the Associated Press, April 2, 1996.',60),(38,'Summer',1997,NULL,'FrontCoverImages/Summer1997.gif','BackCoverImages/Summer1997.gif',2,14,'\"They\'re self-described nerds, using one word names like \"Mudge\" or \"Dark Tangent\" and dressing all in black.\" - The Associated Press in a July 12, 1997 report using their insight to describe hackers at the Defcon conference.',60),(39,'Autumn',1997,'Page 18 displays a fax, 22 displays a confidential memo ripped in two, page 29 displays an FOIA response.','FrontCoverImages/Autumn1997.gif','BackCoverImages/Autumn1997.gif',3,14,'\"First and foremost, every White House person who has got access to classified information knows that you should not ever transmit any classified material either by cellulor phone, non-protected phone, or by beeper. That is drilled into us fairly well. And as a general proposition, we are alerted to the sensitivity of all electronic communications - walkie-talkies, cellular phones, and beepers. And I think there are probably some staffers who now had a fairly painful reminder that these are indeed public transmissions. So their private matters are now more widely known. It probably will be a useful deterrent.\" - White House Press Secretary Mike McCurry commenting September 22, 1997 on the release by 2600 staffers of White House pager transmissions. He seems to agree with us that these are indeed \"public transmissions.\" Maybe he can get the word to Louis Freeh.',60),(40,'Winter',1997,NULL,'FrontCoverImages/Winter1997.gif','BackCoverImages/Winter1997.gif',4,14,'\"As a matter of policy, AT&T safeguards customer information from unauthorized access. It is also our policy to allow business customers to access their account-billing records to check the accuracy of their records and to request changes, as necessary, by using an automated system. Until now, questions such as yours have never come up, so we want to thank you very much for bringing your concerns to our attention.\" - an AT&T media relations representative responding to a member of the Privacy Forum\'s (www.vortex.com) revelation that their automated service intended to reveal the owner of a telephone number dialed on a customer\'s bill instead revelas anyone\'s number at anytime to anyone, listed or unlisted.',60),(41,'Spring',1998,NULL,'FrontCoverImages/Spring1998.gif','BackCoverImages/Spring1998.gif',1,15,'\"What Kevin Mitnick is about is creating a mythology of a hacker threat and using that threat to expand the government\'s statutory authority and increase its wiretapping capability. Find me an individual who was hurt. Find me a company that was hurt. The most you can say is that some companies had to close security holes... and arguably they would have had to do that anyway.\" - Mike Godwin, staff counsel for the Electronic Freedom Foundation.',60),(42,'Summer',1998,'Page 11 has information about an FBI ANSIR fax, page 21 has a 3Com security advisory, page 22 has information on the Sentex Ovation System, page 24 has an AT&T letter and page 25 has a lawsuit threatening letter from the International Churches of Christ that are not in the index.','FrontCoverImages/Summer1998.gif','BackCoverImages/Summer1998.gif',2,15,'\"At this moment I do not have a personal relationship with a computer... it got so confusing, as to what was on the computer, what wasn\'t on the computer, what was on the hard drive, what was on the soft drive, that it made it easier for me just to do my work with pen and pencil.\" - Attorney General Janet Reno, May 24, 1998.',60),(43,'Autumn',1998,'Page 55 contains a fax from a user that is not in the index.','FrontCoverImages/Autumn1998.gif','BackCoverImages/Autumn1998.gif',3,15,'\"This is not a tool we should take seriously, or our customers should take seriously.\" - Edmund Muth of Microsoft, reacting to the release of Back Orifice, a program that attacks Windows 95/98 with a vengeance, by the Cult of the Dead Cow, as reported in the New York Times. We should point out that they said this BEFORE the program was released.',60),(44,'Winter',1998,NULL,'FrontCoverImages/Winter1998.gif','BackCoverImages/Winter1998.gif',4,15,'\"We will not engage in any assaults or hostile physical contact, physical intimidation, verbal threats of physical harm or violence, or any other actions that are threatening or hostile in nature. We will not carry weapons onto company property, in company vehicles, or while conducting company business, even if we have a permit or license to carry them.\" - Page 17 of the Bell Atlantic Code of Business Conduct.',60),(45,'Spring',1999,'This issue is dedicated to the memory of Walter. August, 1985 to March, 1999.','FrontCoverImages/Spring1999.gif','BackCoverImages/Spring1999.gif',1,16,'\"We already are seeing the first wave of deliberate cyber attacks - hackers break into government and business computers, stealing and destroying information, raiding bank accounts, running up credit card charges, extorting money by threats to unleash computer viruses.\" - President Bill Clinton, the most powerful man on earth, declaring war on hackers in a speech at the National Academy of Sciences, 1/22/99.',60),(46,'Summer',1999,NULL,'FrontCoverImages/Summer1999.gif','BackCoverImages/Summer1999.gif',2,16,'\"Public disclosure and dissemination of the victim loss letters was clearly designed to cause additional injury to the victims of defendant\'s conduct or to cause such victims embarrassment or ridicule.\" - 5/6/99, from a motion filed by the prosecution in the Kevin Mitnick case after letters obtained by 2600 were made public - these letters claimed that Mitnick, simply by looking at some source code, managed to cost cellular phone companies several hundred million dollars, a huge figure that was never reported to the companies\' stockholders, as is required by law.',60),(47,'Autumn',1999,'Page 47 contains news of the shutdown of Satellite Watch News by DirecTV.','FrontCoverImages/Autumn1999.gif','BackCoverImages/Autumn1999.gif',3,16,'\"He is a strange, in some senses pathetic, misguided human being. I don\'t hold a lot of confidence that he will turn his life around.\" - Mitnick prosecutor David Schindler, now heading for a lucrative position in the law firm Latham & Watkins, on the subject of Kevin Mitnick, as quoted in the Los Angeles Times 8/16/99.',60),(48,'Winter',1999,'Page 42 contains a DOJ letter concerning Kevin Mitnick that is not in the index.','FrontCoverImages/Winter1999.gif','BackCoverImages/Winter1999.gif',4,16,'\"Hacking can get you in a whole lot more trouble than you think and is a completely creepy thing to do.\" - DOJ web page aimed at kids to discourage hacking (www.usdoj.gov/kidspage/do-dont/reckless.htm)',60),(49,'Spring',2000,NULL,'FrontCoverImages/Spring2000.gif','BackCoverImages/Spring2000.gif',1,17,'\"If we have to file a thousand lawsuits a day, we\'ll do it.\" - Jack Valenti, head of the MPAA, referring to the steps they will take to silence those spreading the DeCSS source code.',60),(50,'Summer',2000,'Page 46 article has no title, should be \"The Privacy Box\".','FrontCoverImages/Summer2000.gif','BackCoverImages/Summer2000.gif',2,17,'\"Posting information about MPAA\'s anti-privacy operations and techniques will make that information easily available to those engaged in, or planning for, digital piracy of individual works.\" - MPAA\'s \"Director of Anti-Priacy, Worldwide\" Kenneth A. Jacobsen in a filing to the court to prevent the media and the public from learning what they ar saying in pre-trail depositions. He really did say \"anti-privacy operations\" in his filing. Freudian slip? You decide.',60),(51,'Autumn',2000,'Page 12 is a letter from CBS, Page 22 is a letter from Warner Brothers and page 42 is a letter from Microsoft that are not in the index.','FrontCoverImages/Autumn2000.gif','BackCoverImages/Autumn2000.gif',3,17,'\"Anyone wishing to make lawful use of a particular movie may buy or rent a videotape, play it, and even copy all or part of it with readily available equipment.\" - Judge Lewis A. Kaplan\'s way of dealing with the fact that it\'s virtually impossible to do this with a DVD - his apparent solution is to just go back and use old technology that isn\'t subject to insane laws.',60),(52,'Winter',2000,'Page 53 is a note about registering host names for fun that is not in the index.','FrontCoverImages/Winter2000.gif','BackCoverImages/Winter2000.gif',4,17,'\"I think any time you expose vulnerabilities it\'s a good thing.\" - United States Attorney General Janet Reno, May 2000 in response to security breaches uncovered by federal agents.',60),(53,'Spring',2001,NULL,'FrontCoverImages/Spring2001.gif','BackCoverImages/Spring2001.gif',1,18,'\"Why is it perfectly legal to post a diagram of how to build a bomb on the net, but you can\'t post a code that descrambles DVDs?\" - The March 3, 2001 edition of \"Boondocks\", a daily comic strip written and drawn by Aaron McGruder and seen in newspapers all over the country. It devoted three days to the DeCSS controversy and, unlike virtually all news reports, got the story right.',60),(54,'Summer',2001,NULL,'FrontCoverImages/Summer2001.gif','BackCoverImages/Summer2001.gif',2,18,'\"Handing over the digital spectrum, or for that matter the Internet, to private power - that\'s a huge blow against democracy. In the case of the Internet, it\'s a particularly dramatic blow against democracy because this was paid for by the public. How undemocratic can you get? Here is a major instrument, developed by the public - first part of the Pentagon, and then universities and the National Science Foundation - handed over in some manner that nobody knows to private corporations who want to turn it into an instrument of control. They want to turn it into a home shopping center. You know, where it will help them convert you into the kind of person they want. Namely, someone who is passive, apathetic, sees their life only as a matter of having more commodities that they don\'t want. Why give them a powerful weapon to turn you into that kind of a person? Especially after you paid for the weapon? Well, that\'s what\'s happening right in front of our eyes.\" - Noam Chomksy, linguist and political dissident, from an interview with the Boston Phoenix in 1999.',60),(55,'Autumn',2001,NULL,'FrontCoverImages/Autumn2001.gif','BackCoverImages/Autumn2001.gif',3,18,'\"We all have to fight against the hacker community.\" - Judy Elder of Microsoft Canada, as quoted by the CBC, July 31, 2001.',60),(56,'Winter',2001,NULL,'FrontCoverImages/Winter2001.gif','BackCoverImages/Winter2001.gif',4,18,'\"Publication that is deemed to be a threat to legitimate penological objectives.\" - State of Washington Department of Corrections, 2001.',60),(57,'Spring',2002,NULL,'FrontCoverImages/Spring2002.gif','BackCoverImages/Spring2002.gif',1,19,'\"I realize that this bill basically says you can tap someone\'s phone for jaywalking, and normally I would say, \'No way.\' But after what happened on September 11th, I say screw \'em.\" - Dana Lee Dembrow, Democratic member of the Maryland House of Delegates explaining her approval of a new bill that would greatly expand the ability of authorities to monitor e-mail and telephone traffic. Jaywalkers beware.',60),(58,'Summer',2002,NULL,'FrontCoverImages/Summer2002.gif','BackCoverImages/Summer2002.gif',2,19,'\"People who go to places of worship, people who go to libraries, people who are in chat rooms, are going to have \'Big Brother\' listening in even though there\'s no evidence that they are involved in anything illegal whatsoever.\" - Laura Murphy, spokeswoman for the American Civil Liberties Union on the new surveillance powers given to the FBI.',60),(59,'Autumn',2002,'Page 13 has a copy of a letter from Direct Media America and page 24 a copy of a letter from Comcast that are not in the index.','FrontCoverImages/Autumn2002.gif','BackCoverImages/Autumn2002.gif',3,19,'\"What amazes me is that there are thousands of people who could have been whistle-blowers, from the boards of directors to corporate insiders to the accounting firms to the lawyers working for these firms to the credit-rating agencies. All these people! Would a despotic dictatorship have been more efficient in silencing them and producing the perverse incentives for them all to keep quiet? The system is so efficient that there\'s total silence. I mean, the Soviet Union had enough dissidents to fill Gulags.\" - Ralph Nader on the continuing corporate crime wave in the United States.',60),(60,'Winter',2002,'Page 11 has a copy of a check with an explanation, page 14 has a copy of a letter from the U.S. Department of Justice, page 24 has info about questionable Sprint billing practices, that are not in the index.','FrontCoverImages/Winter2002.gif','BackCoverImages/Winter2002.gif',4,19,'\"Voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is tell them they are being attacked, and denounce the peacemakers for lack of patriotism and exposing the country to danger. It works the same in any country.\" - Hermann Goering, Hitler\'s designated successor, before being sentenced to death at the Nuremberg trials.',60),(61,'Spring',2003,'Page 23 is a copy of a Warner Bros. letter that is not in the index.','FrontCoverImages/Spring2003.gif','BackCoverImages/Spring2003.gif',1,20,'\"...the essence of the evil government is that it anticipates bad conduct on the part of its citizens. Any government which assumes that the population is going to do something evil has already lost its franchise to govern. The tacit contract between a government and the people governed is that the government will trust the people and the people will trust the government. But once the government begins to mistrust the people it is governing, it loses its mandate to rule because it is no longer acting as a spokesman for the people, but is acting as an agent of persecution.\" - Philip K. Dick',60),(62,'Summer',2003,'Page 13 has a picture of an Internet payphone and page 29 a picture of a \"Homeland Security\" business truck that are not in the index.','FrontCoverImages/Summer2003.gif','BackCoverImages/Summer2003.gif',2,20,'\"Television taught people to watch \'Friends\' rather than have friends. Today, relatively little of our leisure time is spent interacting with other people. Now we spend it observing machines.\" - Robert B. Putnam, author of Bowling Alone',60),(63,'Autumn',2003,'Page 8 has a picture courtesy of Internet Qatar that is not in the index.','FrontCoverImages/Autumn2003.gif','BackCoverImages/Autumn2003.gif',3,20,'\"I do know I\'m ready fo the job. And, if not, that\'s just the way it goes.\" - George W. Bush, August 21, 2000',60),(64,'Winter',2003,'Page 25 has a picture of an interesting ad that is not in the index.','FrontCoverImages/Winter2003.gif','BackCoverImages/Winter2003.gif',4,20,'\"No one realized that the pumps that delivered fuel to the emergency generators were electric.\" - Angel Feliciano, representative of Verizon workers explaining why Verizon\'s backup power failed during the August 14 blackout causing disruption to the 911 service.',60),(65,'Spring',2004,NULL,'FrontCoverImages/Spring2004.gif','BackCoverImages/Spring2004.gif',1,21,'\"We have never had vulnerabilities exploited before the patch was known.\" - David Aucsmith, head of technology at Microsoft\'s security business and technology unit, February 2004.',60),(66,'Summer',2004,NULL,'FrontCoverImages/Summer2004.gif','BackCoverImages/Summer2004.gif',2,21,'\"Men are only as good as their technical development allows them to be.\" - George Orwell',60),(67,'Autumn',2004,NULL,'FrontCoverImages/Autumn2004.gif','BackCoverImages/Autumn2004.gif',3,21,'\"We are stunned that RealNetworks has adopted the tactics and ethics of a hacker to break into the iPod, and we are investigating the implications of their actions under the DMCA and other laws.\" - Apple Computer in an apparent reversal of their \"think different\" marketing strategy, July 29, 2004',60),(68,'Winter',2004,NULL,'FrontCoverImages/Winter2004.gif','BackCoverImages/Winter2004.gif',4,21,'\"We cannot simply suspend or restrict civil liberties until the War of Terror is over, because the War on Terror is unlikely ever to be truly over.\" - Judge Gerald Tjoflat of the 11th U.S. Circuit Court of Appeals, October 15, 2004.',60),(69,'Spring',2005,NULL,'FrontCoverImages/Spring2005.gif','BackCoverImages/Spring2005.gif',1,22,'\"If tyranny and oppression come to this land, it will be in the guise of fighting a foreign enemy.\" - James Madison',64),(70,'Summer',2005,NULL,'FrontCoverImages/Summer2005.gif','BackCoverImages/Summer2005.gif',2,22,'\"No government can be long secure without a formidable opposition.\" - Benjamin Disraeli',64),(71,'Autumn',2005,NULL,'FrontCoverImages/Autumn2005.gif','BackCoverImages/Autumn2005.gif',3,22,'\"The good news is - and it\'s hard for some to see it now - that out of this chaos is going to come a fantastic Gulf Coast, like it was before. Out of the rubbles of Trent Lott\'s house - he\'s lost his entire house - there\'s going to be a fantastic house. And I\'m looking forward to sitting on the porch.\" - George W. Bush, touring hurricane damage that at press time was estimated to have killed thousands of people, Sept. 2, 2005',64),(72,'Winter',2005,'Page 61 has the Easter Egg Hunt contest results with a complete list of the Easter Eggs in Freedom Downtime, that is not in the index.','FrontCoverImages/Winter2005.gif','BackCoverImages/Winter2005.gif',4,22,'\"Value your freedom, or you will lost it, teaches history. \'Don\'t bother us with politics,\' respond those who don\'t want to learn.\" - Richard Stallman',64),(73,'Spring',2006,NULL,'FrontCoverImages/Spring2006.gif','BackCoverImages/Spring2006.gif',1,23,'\"Unthinking respect for authority is the greatest enemy of truth.\" - Albert Einstein',64),(74,'Summer',2006,NULL,'FrontCoverImages/Summer2006.gif','BackCoverImages/Summer2006.gif',2,23,'\"Are you telling me that tens of millions of Americans are involved with al Qaeda?\" - Senator Patrick Leahy in response to recent revelations that the NSA has been secretly attempting to create a database of every call ever made within U.S. borders.',64),(75,'Autumn',2006,NULL,'FrontCoverImages/Autumn2006.gif','BackCoverImages/Autumn2006.gif',3,23,'\"An internet was sent by my staff at 10 o\'clock in the morning Friday. I got it yesterday. Why?\" - Senator Ted Stevens displaying his knowledge of the Internet earlier this summer in a speech designed to help defeat the network neutrality initiative.',64),(76,'Winter',2006,NULL,'FrontCoverImages/Winter2006.gif','BackCoverImages/Winter2006.gif',4,23,'\"It has become appallingly obvious that our technology has exceeded our humanity.\" - Albert Einstein',68),(77,'Spring',2007,NULL,'FrontCoverImages/Spring2007.gif','BackCoverImages/Spring2007.gif',1,24,'\"The production of too many useful things results in too many useless people.\" - Karl Marx',68),(78,'Summer',2007,NULL,'FrontCoverImages/Summer2007.gif','BackCoverImages/Summer2007.gif',2,24,'\"Once a new technology rolls over you, if you\'re not part of the steamroller, you\'re part of the road.\" - Stewart Brand',68),(79,'Autumn',2007,NULL,'FrontCoverImages/Autumn2007.gif','BackCoverImages/Autumn2007.gif',3,24,'\"The price good men pay for indifference to public affairs is to be ruled by evil men.\" - Plato',68),(80,'Winter',2007,NULL,'FrontCoverImages/Winter2007.gif','BackCoverImages/Winter2007.gif',4,24,'\"First they ignore you, then they laugh at you, then they fight you, then you win.\" - Mahatma Gandhi',68),(81,'Spring',2008,NULL,'FrontCoverImages/Spring2008.gif','BackCoverImages/Spring2008.gif',1,25,'\"The bigger the lie, the more they believe.\" - Bunk',68),(82,'Summer',2008,NULL,'FrontCoverImages/Summer2008.gif','BackCoverImages/Summer2008.gif',2,25,'\"There\'s no place like HOPE.\" - random Last HOPE attendee, July 2008',68),(83,'Autumn',2008,NULL,'FrontCoverImages/Autumn2008.gif','BackCoverImages/Autumn2008.gif',3,25,'\"We live in a society exquisitely dependent on science and technology, in which hardly anyone knows anything about science and technology.\" - Carl Sagan',68),(84,'Winter',2008,NULL,'FrontCoverImages/Winter2008.gif','BackCoverImages/Winter2008.gif',4,25,'\"I think we agree, the past is over.\" - George W. Bush',68),(85,'Spring',2009,NULL,'FrontCoverImages/Spring2009.gif','BackCoverImages/Spring2009.gif',1,26,'\"It\'s not just enough to change the players. We\'ve gotta change the game.\" - Barack Obama',68),(86,'Summer',2009,NULL,'FrontCoverImages/Summer2009.gif','BackCoverImages/Summer2009.gif',2,26,'\"The future is here. It\'s just not evenly distributed yet.\" - William Gibson',68),(87,'Autumn',2009,NULL,'FrontCoverImages/Autumn2009.gif','BackCoverImages/Autumn2009.gif',3,26,'\"There is no need for any individual to have a computer in their home.\" - Ken Olsen, president, Digital Equipment Corp., 1977',68),(89,'Winter',2009,NULL,'FrontCoverImages/Winter2009.gif','BackCoverImages/Winter2009.gif',4,26,'\"The most exciting phrase to hear in science, the one that heralds the most discoveries, is not \'Eureka!\' but \'That\'s funny...\'\" - Isaac Asimov',68),(92,'December',1987,NULL,'FrontCoverImages/December1987.gif','BackCoverImages/December1987.gif',12,4,NULL,24),(93,'November',1987,'Page 2 (and part of 10/21) has info from 2600, Page 11 has a copy of a letter from MCI Telecommunications and some comments, pages 14 and 15 are ads.','FrontCoverImages/November1987.gif','BackCoverImages/November1987.gif',11,4,'',24),(94,'October',1987,'Page 2 has info from 2600, that is not in the index.','FrontCoverImages/October1987.gif','BackCoverImages/October1987.gif',10,4,'',24),(103,'September',1987,'Page 2 (and part of 16) has info from 2600, that is not in the index.','FrontCoverImages/September1987.gif','BackCoverImages/September1987.gif',9,4,'',24),(104,'August',1987,'Page 16 has a letter from Telenet Communications Corporation, page 17 has a bill from US Sprint, that are not in the index.','FrontCoverImages/August1987.gif','BackCoverImages/August1987.gif',8,4,NULL,24),(105,'July',1987,'Page 2 (and part of 20) has info from 2600, page 9 announces the 2600 answer the phone contest, page 17 has some 1950\'s telephone company propaganda, that are not in the index.','FrontCoverImages/July1987.gif','BackCoverImages/July1987.gif',7,4,'',24),(106,'June',1987,'Page 2 has info from 2600, that is not in the index.','FrontCoverImages/June1987.gif','BackCoverImages/June1987.gif',6,4,'',24),(107,'May',1987,'Page 2 has info from 2600, that is not in the index.','FrontCoverImages/May1987.gif','BackCoverImages/May1987.gif',5,4,'',24),(108,'April',1987,'Page 2 has info from 2600, that is not in the index.','FrontCoverImages/April1987.gif','BackCoverImages/April1987.gif',4,4,'',24),(109,'March',1987,'Page 2 has info from 2600, that is not in the index.','FrontCoverImages/March1987.gif','BackCoverImages/March1987.gif',3,4,'',24),(110,'February',1987,'Page 2 has info from 2600, page 9 has a comic, that are not in the index.','FrontCoverImages/February1987.gif','BackCoverImages/February1987.gif',2,4,'',24),(111,'January',1987,'Page 2 (and part of 21) has info from 2600, Page 17 has a picture of a British Telecom card-reader phone, that are not in the index.','FrontCoverImages/January1987.gif','BackCoverImages/January1987.gif',1,4,'',24),(112,'December',1986,NULL,'FrontCoverImages/December1986.gif','BackCoverImages/December1986.gif',12,3,NULL,8),(113,'November',1986,NULL,'FrontCoverImages/November1986.gif','BackCoverImages/November1986.gif',11,3,NULL,8),(114,'October',1986,NULL,'FrontCoverImages/October1986.gif','BackCoverImages/October1986.gif',10,3,NULL,8),(115,'September',1986,NULL,'FrontCoverImages/September1986.gif','BackCoverImages/September1986.gif',9,3,NULL,8),(116,'August',1986,NULL,'FrontCoverImages/August1986.gif','BackCoverImages/August1986.gif',8,3,NULL,8),(117,'July',1986,NULL,'FrontCoverImages/July1986.gif','BackCoverImages/July1986.gif',7,3,NULL,8),(118,'June',1986,NULL,'FrontCoverImages/June1986.gif','BackCoverImages/June1986.gif',6,3,NULL,8),(119,'May',1986,NULL,'FrontCoverImages/May1986.gif','BackCoverImages/May1986.gif',5,3,NULL,8),(120,'April',1986,NULL,'FrontCoverImages/April1986.gif','BackCoverImages/April1986.gif',4,3,NULL,8),(121,'March',1986,NULL,'FrontCoverImages/March1986.gif','BackCoverImages/March1986.gif',3,3,NULL,8),(122,'February',1986,NULL,'FrontCoverImages/February1986.gif','BackCoverImages/February1986.gif',2,3,NULL,8),(123,'January',1986,NULL,'FrontCoverImages/January1986.gif','BackCoverImages/January1986.gif',1,3,NULL,8),(124,'December',1985,NULL,'FrontCoverImages/December1985.gif','BackCoverImages/December1985.gif',12,2,NULL,8),(125,'November',1985,NULL,'FrontCoverImages/November1985.gif','BackCoverImages/November1985.gif',11,2,NULL,8),(126,'October',1985,NULL,'FrontCoverImages/October1985.gif','BackCoverImages/October1985.gif',10,2,NULL,8),(127,'September',1985,NULL,'FrontCoverImages/September1985.gif','BackCoverImages/September1985.gif',9,2,NULL,8),(128,'August',1985,NULL,'FrontCoverImages/August1985.gif','BackCoverImages/August1985.gif',8,2,NULL,8),(129,'July',1985,NULL,'FrontCoverImages/July1985.gif','BackCoverImages/July1985.gif',7,2,NULL,8),(130,'June',1985,NULL,'FrontCoverImages/June1985.gif','BackCoverImages/June1985.gif',6,2,NULL,8),(131,'May',1985,NULL,'FrontCoverImages/May1985.gif','BackCoverImages/May1985.gif',5,2,NULL,8),(132,'April',1985,NULL,'FrontCoverImages/April1985.gif','BackCoverImages/April1985.gif',4,2,NULL,6),(133,'March',1985,NULL,'FrontCoverImages/March1985.gif','BackCoverImages/March1985.gif',3,2,NULL,6),(134,'February',1985,NULL,'FrontCoverImages/February1985.gif','BackCoverImages/February1985.gif',2,2,NULL,6),(135,'January',1985,NULL,'FrontCoverImages/January1985.gif','BackCoverImages/January1985.gif',1,2,NULL,6),(136,'December',1984,NULL,'FrontCoverImages/December1984.gif','BackCoverImages/December1984.gif',12,1,NULL,6),(137,'November',1984,NULL,'FrontCoverImages/November1984.gif','BackCoverImages/November1984.gif',11,1,NULL,6),(138,'October',1984,NULL,'FrontCoverImages/October1984.gif','BackCoverImages/October1984.gif',10,1,NULL,6),(139,'September',1984,NULL,'FrontCoverImages/September1984.gif','BackCoverImages/September1984.gif',9,1,NULL,6),(140,'August',1984,NULL,'FrontCoverImages/August1984.gif','BackCoverImages/August1984.gif',8,1,NULL,6),(141,'July',1984,NULL,'FrontCoverImages/July1984.gif','BackCoverImages/July1984.gif',7,1,NULL,6),(142,'June',1984,NULL,'FrontCoverImages/June1984.gif','BackCoverImages/June1984.gif',6,1,NULL,6),(143,'May',1984,NULL,'FrontCoverImages/May1984.gif','BackCoverImages/May1984.gif',5,1,NULL,6),(144,'April',1984,NULL,'FrontCoverImages/April1984.gif','BackCoverImages/April1984.gif',4,1,NULL,6),(145,'March',1984,NULL,'FrontCoverImages/March1984.gif','BackCoverImages/March1984.gif',3,1,NULL,6),(146,'February',1984,NULL,'FrontCoverImages/February1984.gif','BackCoverImages/February1984.gif',2,1,NULL,6),(147,'January',1984,NULL,'FrontCoverImages/January1984.gif','BackCoverImages/January1984.gif',1,1,NULL,6),(148,'Spring',2010,'','FrontCoverImages/Spring2010.gif','BackCoverImages/Spring2010.gif',1,27,'\"Knowledge is power. Power corrupts. Study hard, be evil\". - Unknown',68),(149,'Summer',2010,'Page 26 has a call for \'The Hacker Perspective\' articles and pages 50-51 are the Leaked Document Department and displays an IRS document, these are not in the index.','FrontCoverImages/Summer2010.gif','BackCoverImages/Summer2010.gif',2,27,'\"Everything that is really great and inspiring is created by the individual who can labor in freedom.\" - Albert Einstein',68),(150,'Autumn',2010,'','FrontCoverImages/Autumn2010.gif','BackCoverImages/Autumn2010.gif',3,27,'\"When a great truth once gets abroad in the world, no power on earth can imprison it, or prescribe its limits, or suppress it. It is bound to go on till it becomes the thought of the world.\" - Frederick Douglass',68),(151,'Winter',2010,'Page 19 has full page ad for the new 2600 electronic version.','FrontCoverImages/Winter2010.gif','BackCoverImages/Winter2010.gif',4,27,'\"Security is mostly a superstition. It does not exist in nature, nor do the children of men as a whole experience it. Avoiding danger is not safer in the long run than outright exposure. Life is either a daring adventure, or nothing.\" - Helen Keller',68),(152,'Spring',2011,'','FrontCoverImages/Spring2011.gif','BackCoverImages/Spring2011.gif',1,28,'\"The United States continues to help people in oppressive Internet environments get around filters, stay one step ahead of the censors, the hackers, and the thugs who beat them up or imprison them for what they say online.\" - Hilary Clinton, 15 February 2011',68),(153,'Summer',2011,'','FrontCoverImages/Summer2011.gif','BackCoverImages/Summer2011.gif',2,28,'\"If journalism is good, it is controversial by it\'s nature.\" - Julian Assange',68),(154,'Autumn',2011,'','FrontCoverImages/Autumn2011.gif','BackCoverImages/Autumn2011.gif',3,28,'\"Knowing is not enough; we must apply. Being willing is not enough; we must do.\" - Leonardo da Vinci',68),(155,'Winter',2011,NULL,'FrontCoverImages/Winter2011.gif','BackCoverImages/Winter2011.gif',4,28,'\"Nowadays people know the price of everything and the value of nothing.\" - Oscar Wilde=',68),(156,'Spring',2012,'','FrontCoverImages/Spring2012.gif','BackCoverImages/Spring2012.gif',1,29,'\"The surest way to corrupt a youth is to instruct him to hold in higher esteem those who think alike than those who think differently.\" - Friedrich Nietzsche',68),(157,'Summer',2012,'','FrontCoverImages/Summer2012.gif','BackCoverImages/Summer2012.gif',2,29,'\"The Department of Justice does not endorse the organizations or views represented by this site and takes no responsibility for, and exercises no control over, the accuracy, accessibility, copyright or trademark compliance or legality of the material contained on this site.\" Message on the Department of Justice website that appears when a visitor clicks on a link. This same agency routinely shuts down websites because of links they find objectionable.',68),(158,'Autumn',2012,'','FrontCoverImages/Autumn2012.gif','BackCoverImages/Autumn2012.gif',3,29,'\"If you only knew the magnificence of the 3, 6 and 9, then you would have the key to the universe.\" - Nikola Tesla',68),(159,'Winter',2012,'','FrontCoverImages/Winter2012.gif','BackCoverImages/Winter2012.gif',4,29,'\"The best way to predict the future is invent it.\" - Alan Kay',68),(160,'Spring',2013,'','FrontCoverImages/Spring2013.gif','BackCoverImages/Spring2013.gif',1,30,'\"Be curious. Read widely. Try new things. What people call intelligence just boils down to curiosity.\" - Aaron Swartz',68),(161,'Summer',2013,'','FrontCoverImages/Summer2013.gif','BackCoverImages/Summer2013.gif',2,30,'\"I fear the day when the technology overlaps with our humanity. The world will only have a generation of idiots.\" - Attributed to Albert Einstein',68),(162,'Autumn',2013,'Page 64/65 contains A Response to \"Perfect Encryption - Old Style!\" by Phil instead of staff page and house ad. See (..)','FrontCoverImages/Autumn2013.gif','BackCoverImages/Autumn2013.gif',3,30,'',68),(163,'Winter',2013,'Index indicates an article \"Identity and Encryption Verification\" that doesn\'t exist.','FrontCoverImages/Winter2013.gif','BackCoverImages/Winter2013.gif',4,30,'\"If we can\'t understand the policies and the programs of our government, we cannot grant our consent in regulating them.\" - Edward Snowden',68),(164,'Spring',2014,'','FrontCoverImages/Spring2014.gif','BackCoverImages/Spring2014.gif',1,31,'\"Everybody gets so much information all day long that they lose their common sense.\" - Gertrude Stein, 1946.',68),(165,'Summer',2014,'','FrontCoverImages/Summer2014.gif','BackCoverImages/Summer2014.gif',2,31,'\"If you don\'t want to be replaced by a computer, don\'t act like one.\" - Physicist Arno Penzias, 1978',68),(166,'Autumn',2014,'','FrontCoverImages/Autumn2014.gif','BackCoverImages/Autumn2014.gif',3,31,'\"The thought of an entire population using computer terminals, not just the technologically literate minority, is truly revolutionary.\" 2600 in 1987',68),(167,'Winter',2014,'','FrontCoverImages/Winter2014.gif','BackCoverImages/Winter2014.gif',4,31,'\"There will come a time when it isn\'t \'They\'re spying on me through my phone\' anymore. Eventually, it will be \'My phone is spying on me.\'\" - Philip K. Dick, circa 1970s',68),(168,'Spring',2015,'','FrontCoverImages/Spring2015.gif','BackCoverImages/Spring2015.gif',1,32,'\"Journalism is printing what someone else does not want printed. Everything else is public relations\" - George Orwell',68),(169,'Summer',2015,'','FrontCoverImages/Summer2015.gif','BackCoverImages/Summer2015.gif',2,32,'\"The most technologically efficient machine that man has ever invented is the book.\" - Northrop Frye',68),(170,'Autumn',2015,'Magazine index page 2 missing LEAKED DOCUMENTS article.','FrontCoverImages/Autumn2015.gif','BackCoverImages/Autumn2015.gif',3,32,'\"There is very little that you will encounter in life that has not been infused with bullshit.\" - Jon Stewart, 2015',68),(174,'Winter',2015,'','FrontCoverImages/Winter2015.gif','BackCoverImages/Winter2015.gif',4,32,'\"We live in a society exquisitely dependent on science and technology, in which hardly anyone knows anything about science and technology.\" - Carl Sagan',68),(176,'Spring',2016,'Page 28 is a full page add for the eleventh HOPE.','FrontCoverImages/Spring2016.gif','BackCoverImages/Spring2016.gif',1,33,'\"The first condition of progress is the removal of censorship.\" - George Bernard Shaw',68),(179,'Summer',2016,'','FrontCoverImages/Summer2016.gif','BackCoverImages/Summer2016.gif',2,33,'\"We used to say a man\'s home is his castle. Today, a man\'s phone is his castle.\" - Edward Snowden',68),(181,'Autumn',2016,'','FrontCoverImages/Autumn2016.gif','BackCoverImages/Autumn2016.gif',3,33,'\"I have so many websites. I have them all over the place. I hire people, they do a website. It costs me $3.\" - Donald Trump',68),(183,'Winter',2016,'','FrontCoverImages/Winter2016.gif','BackCoverImages/Winter2016.gif',4,33,'\"If the government is taken over by evil, hackers will be indispensable friends fighting for our freedom.\" - xphreak',68),(185,'Spring',2017,'','FrontCoverImages/Spring2017.gif','BackCoverImages/Spring2017.gif',1,34,'\"Hacking is bad and it shouldn\'t be done. But look at the things that were hacked. Look at what was learned from that hacking.\" Donald Trump',68),(187,'Summer',2017,'','FrontCoverImages/Summer2017.gif','BackCoverImages/Summer2017.gif',2,34,'\"Truth is stranger than fiction, but it is because Fiction is obliged to stick to possibilities; Truth isn\'t\" - Mark Twain, 1897',68),(189,'Autumn',2017,'','FrontCoverImages/Autumn2017.gif','BackCoverImages/Autumn2017.gif',3,34,'\"I\'m here because I\'m a refugee.\" - Google co-founder Sergey Brin, 2017',68),(191,'Winter',2017,'','FrontCoverImages/Winter2017.gif','BackCoverImages/Winter2017.gif',4,34,'\"If I had to do it all over again, I would know a hell of a lot more about cybersecurity.\" - Donna Brazile',68),(193,'Spring',2018,'','FrontCoverImages/Spring2018.gif','BackCoverImages/Spring2018.gif',1,35,'\"Will the Internet become a theater, crowded with all of Humanity, where demagogic institutions cry \'fire\' every time they wish to incite a mob? Will the Global Village be dominated, like so many other small towns, by schadenfreudal busybodies who build their own self-esteem from the wreckage of others whose reputations they\'ve destroyed? So far, this has not happened because most of those in Cyberspace had a sense of responsibility about the preservation of a social contract that, however vague, was precious to us all. But what can be done about entities like Congress, who have neither a sense of the social contract nor enough stake in its preservation to motivate self-restraint?\" John Perry Barlow',68),(194,'Summer',2018,'','FrontCoverImages/Summer2018.gif','BackCoverImages/Summer2018.gif',2,35,'\"Are you a one or a zero?\" - Mr. Robot',68),(196,'Autumn',2018,NULL,'FrontCoverImages/Autumn2018.gif','BackCoverImages/Autumn2018.gif',3,35,NULL,68); /*!40000 ALTER TABLE `Issues` ENABLE KEYS */; UNLOCK TABLES; -- -- Dumping data for table `KeywordXref` -- LOCK TABLES `KeywordXref` WRITE; /*!40000 ALTER TABLE `KeywordXref` DISABLE KEYS */; INSERT INTO `KeywordXref` VALUES (1,1,1270),(2,6,1271),(3,7,1272),(4,4,1276),(5,8,1277),(6,4,1278),(7,5,1279),(8,10,1280),(9,9,1280),(10,11,1282),(11,12,1283),(12,15,1284),(13,14,1284),(14,17,1285),(15,2,1295),(16,18,1286),(17,4,1287),(18,19,1288),(19,22,1290),(20,21,1290),(21,23,1291),(22,15,1292),(23,13,1294),(24,20,1289),(25,25,1274),(26,4,1281),(27,26,1275),(28,27,1273),(29,28,1293),(30,4,1267),(31,5,1247),(33,30,1248),(34,29,1248),(35,1,1246),(36,22,1249),(37,30,1250),(38,5,1250),(39,19,1251),(40,32,1252),(41,33,1253),(42,34,1254),(43,35,1255),(44,29,1256),(45,5,1256),(46,33,1257),(47,36,1257),(49,37,1258),(51,31,1259),(52,5,1260),(53,38,1261),(54,2,1296),(55,39,1262),(56,40,1263),(57,5,1263),(58,4,1264),(59,31,1265),(60,4,1265),(61,4,1266),(63,41,1268),(64,13,1269),(65,1,1223),(66,42,1224),(67,42,1225),(68,32,1226),(69,43,1227),(70,44,1228),(71,46,1229),(72,45,1230),(73,31,1231),(74,5,1231),(75,47,1232),(77,4,1233),(78,10,1234),(79,9,1234),(80,4,1235),(81,48,1236),(82,24,1237),(83,49,1237),(84,51,1238),(85,50,1239),(86,42,1240),(87,4,1240),(89,52,1241),(90,30,1242),(91,53,1243),(92,13,1244),(93,4,1245),(94,31,1245),(95,2,1297),(96,1,1198),(97,52,1199),(98,29,1200),(99,54,1201),(100,43,1202),(101,55,1203),(102,56,1204),(103,34,1205),(104,57,1206),(105,6,1207),(107,5,1208),(108,32,1209),(109,58,1210),(110,4,1211),(111,60,1212),(112,59,1213),(113,2,1298),(114,61,1214),(115,5,1214),(116,62,1215),(117,20,1216),(118,48,1217),(119,22,1218),(120,49,1219),(121,63,1220),(122,65,1221),(123,64,1222),(124,1,1172),(125,42,1173),(126,31,1174),(127,32,1175),(128,43,1176),(129,74,1177),(130,37,1178),(131,67,1299),(132,66,1299),(133,20,1300),(134,31,1300),(135,49,1301),(136,5,1302),(137,43,1303),(138,17,1304),(139,32,1305),(140,41,1306),(141,35,1307),(142,12,1308),(143,10,1309),(144,9,1309),(145,69,1310),(146,70,1311),(147,68,1312),(148,44,1313),(149,2,1322),(150,6,1314),(151,32,1315),(152,32,1316),(153,20,1317),(154,72,1318),(155,73,1319),(156,4,1320),(158,13,1321),(159,1,1299),(160,37,1179),(161,75,1180),(162,9,1181),(163,4,1182),(164,4,1183),(165,42,1184),(166,76,1185),(167,76,1186),(168,77,1187),(169,67,1188),(170,4,1189),(171,2,1323),(172,4,1190),(173,43,1191),(174,78,1192),(175,22,1193),(176,5,1194),(177,22,1194),(178,4,1195),(179,41,1196),(180,72,1197),(181,1,1150),(182,74,1151),(183,41,1151),(184,4,1152),(185,79,1304),(186,43,1154),(187,79,1155),(188,76,1156),(189,77,1157),(190,4,1158),(191,77,1159),(192,4,1160),(193,80,1161),(194,81,1162),(195,42,1163),(196,10,1164),(197,9,1164),(198,32,1165),(199,41,1166),(200,81,1167),(201,4,1168),(202,81,1169),(203,82,1170),(204,79,1171),(205,2,1324),(206,42,1153),(207,1,1128),(210,41,1129),(211,45,1130),(212,4,1131),(213,43,1132),(214,49,1133),(215,37,1134),(216,83,1135),(217,41,1136),(218,30,1136),(219,84,1137),(220,85,1138),(221,86,1138),(222,87,1138),(223,33,1139),(224,9,1140),(225,43,1141),(226,88,1142),(227,2,1325),(228,89,1143),(229,41,1144),(230,90,1145),(231,91,1318),(232,78,1146),(233,5,1147),(234,92,1148),(235,44,1149),(236,57,1149),(237,1,1107),(238,43,1108),(239,4,1109),(240,29,1110),(241,22,1111),(242,43,1112),(243,64,1113),(244,57,1114),(245,6,1115),(246,29,1116),(247,64,1116),(248,22,1117),(249,19,1117),(250,4,1118),(251,4,1119),(252,18,1120),(253,74,1121),(254,2,1326),(255,93,1122),(256,4,1123),(257,5,1124),(258,64,1125),(259,4,1126),(260,4,1127),(261,1,1087),(262,95,1088),(263,33,1089),(264,4,1090),(265,43,1091),(266,4,1092),(267,4,1093),(268,22,1094),(269,4,1094),(270,4,1095),(271,4,1096),(272,33,1097),(273,94,1126),(274,29,1098),(275,19,1099),(276,2,1327),(277,32,1100),(278,32,1101),(279,4,1102),(280,66,1103),(281,96,1103),(282,4,1104),(283,29,1105),(284,48,1106),(285,16,1285),(286,1,1068),(287,4,1069),(288,97,1069),(289,60,1070),(290,43,1071),(291,52,1071),(292,32,1072),(293,4,1073),(294,77,1074),(295,4,1075),(296,4,1076),(297,5,1077),(298,99,1078),(299,4,1079),(300,10,1080),(301,2,1328),(302,29,1081),(303,5,1082),(304,48,1083),(305,59,1083),(306,48,1084),(307,69,1084),(308,57,1085),(309,41,1086),(310,1,1046),(311,5,1047),(312,97,1048),(313,52,1049),(314,48,1049),(315,5,1050),(316,43,1051),(317,5,1052),(318,32,1053),(319,80,1053),(320,100,1054),(321,99,1055),(322,4,1056),(323,4,1057),(324,59,1057),(325,95,1058),(326,101,1059),(327,2,1329),(328,61,1060),(329,89,1062),(330,6,1063),(331,4,1064),(332,4,1065),(333,81,1061),(334,32,1061),(335,4,1066),(336,102,1067),(337,1,1024),(338,29,1025),(339,41,1025),(340,103,1026),(341,5,1027),(342,4,1028),(343,29,1029),(344,4,1030),(345,52,1030),(346,84,1031),(347,100,1032),(348,42,1033),(349,5,1034),(350,79,1035),(351,39,1036),(352,57,1037),(353,41,1037),(354,2,1330),(355,32,1038),(356,77,1039),(357,33,1040),(358,5,1040),(359,4,1041),(360,4,1042),(361,4,1043),(362,22,1044),(363,5,1045),(364,19,1045),(365,1,999),(366,102,1000),(367,41,1001),(368,5,1002),(369,104,1002),(370,5,1003),(371,78,1004),(372,7,1005),(373,105,1006),(374,69,1005),(375,41,1007),(376,57,1007),(377,4,1008),(378,4,1009),(379,43,1010),(380,80,1010),(381,41,1011),(382,4,1012),(383,5,1013),(384,2,1331),(385,81,1014),(386,22,1015),(387,102,1016),(388,5,1017),(389,99,1018),(390,41,1019),(391,90,1020),(392,32,1021),(393,5,1022),(394,32,1023),(395,1,975),(396,25,976),(397,25,977),(398,25,978),(399,4,979),(400,106,980),(401,95,981),(402,4,981),(403,107,982),(404,107,983),(405,41,984),(406,57,985),(407,4,986),(408,74,987),(409,80,987),(410,9,988),(411,4,989),(412,4,990),(413,2,1332),(414,77,991),(415,74,992),(416,4,993),(417,19,994),(418,31,994),(419,46,995),(420,5,996),(421,46,997),(422,77,998),(423,1,955),(424,93,956),(425,4,957),(426,4,958),(427,42,959),(428,108,960),(429,4,961),(430,22,962),(431,109,963),(432,77,964),(433,84,965),(434,25,966),(435,4,967),(436,110,968),(437,111,969),(438,2,1333),(439,102,970),(440,29,971),(441,41,972),(442,77,973),(443,106,974),(444,1,935),(445,43,936),(446,22,937),(447,87,937),(448,22,938),(449,4,938),(450,4,939),(451,5,940),(452,77,941),(453,102,942),(454,22,943),(455,29,944),(456,77,945),(457,93,946),(458,2,1334),(459,112,947),(460,5,948),(461,4,949),(462,4,950),(463,41,951),(464,57,951),(465,46,952),(466,49,953),(467,78,953),(468,4,954),(469,1,915),(470,81,916),(471,20,917),(472,57,917),(473,19,918),(474,75,919),(475,4,920),(476,5,921),(477,5,922),(478,41,923),(479,106,924),(480,5,925),(481,4,926),(482,31,927),(483,77,928),(484,2,1335),(485,4,929),(486,4,930),(487,22,931),(488,110,932),(489,5,933),(490,74,934),(491,1,900),(492,102,901),(493,77,902),(494,37,903),(495,111,904),(496,74,905),(497,46,906),(498,44,906),(499,77,907),(500,77,908),(501,112,909),(502,113,910),(503,2,1336),(504,52,911),(505,41,912),(506,29,913),(507,105,914),(508,1,879),(509,101,880),(510,4,881),(511,4,882),(512,74,883),(513,5,883),(514,74,884),(515,5,884),(516,5,885),(517,32,886),(518,5,887),(519,5,888),(520,5,889),(521,32,890),(522,46,891),(523,5,892),(524,2,1337),(525,5,893),(526,30,893),(527,30,894),(528,4,895),(529,61,896),(530,10,896),(531,42,897),(533,75,898),(534,5,899),(535,22,1357),(536,41,1339),(537,81,1340),(538,43,1341),(539,80,1342),(540,43,1343),(541,77,1344),(542,10,1345),(543,103,1345),(544,41,1346),(545,77,1347),(546,5,1348),(547,81,1349),(548,80,1350),(549,94,1350),(550,99,1351),(551,41,1352),(552,40,1353),(553,4,1353),(554,12,1354),(555,23,1355),(556,4,1355),(557,6,1356),(558,99,1356),(559,4,1357),(560,81,1358),(561,4,1358),(562,32,1358),(563,22,1359),(564,13,1360),(565,1,1338),(566,114,1361),(567,2,1362),(568,1,861),(569,77,862),(570,115,863),(571,116,864),(572,4,864),(573,80,865),(574,48,866),(575,22,867),(576,22,868),(577,22,869),(578,43,870),(579,29,871),(580,80,871),(581,105,872),(582,78,872),(583,86,872),(584,2,1363),(585,41,873),(586,4,874),(587,22,874),(588,19,875),(589,4,876),(590,79,876),(591,4,877),(592,77,878),(593,1,839),(594,22,840),(595,30,841),(596,5,841),(597,30,842),(598,5,843),(599,77,844),(600,77,845),(601,117,846),(602,5,846),(603,41,847),(604,46,848),(605,32,849),(606,4,850),(607,19,851),(608,77,852),(609,74,853),(610,2,1364),(611,118,854),(612,77,855),(613,33,856),(614,80,856),(615,10,857),(616,41,858),(617,119,859),(618,77,860),(619,1,821),(620,63,822),(621,78,823),(622,24,823),(623,32,824),(624,95,824),(625,120,825),(626,74,826),(627,48,827),(628,30,828),(629,64,829),(630,46,830),(631,5,831),(632,30,832),(633,2,1365),(634,22,833),(635,22,834),(636,118,835),(637,19,836),(638,6,837),(639,4,838),(640,1,785),(641,4,786),(642,41,787),(643,77,788),(644,41,789),(645,9,790),(646,38,791),(647,23,792),(648,48,793),(649,77,794),(650,117,795),(651,31,795),(652,102,796),(653,77,797),(654,70,798),(655,61,799),(656,2,1366),(657,77,800),(658,41,801),(659,113,799),(660,80,802),(661,80,803),(662,121,803),(663,1,764),(664,43,765),(665,52,765),(666,43,766),(667,122,793),(668,122,767),(669,32,768),(670,39,769),(671,39,770),(672,5,771),(673,77,772),(674,32,773),(675,56,774),(676,77,775),(677,74,776),(678,2,1367),(679,77,777),(680,30,778),(681,30,779),(682,30,780),(683,4,782),(684,4,783),(685,123,784),(686,1,745),(687,22,746),(688,49,747),(689,24,747),(690,77,748),(691,77,781),(692,33,749),(693,80,750),(694,43,751),(695,6,751),(696,77,752),(697,43,753),(698,80,754),(699,74,754),(700,4,755),(701,43,756),(702,52,756),(703,34,757),(704,2,1368),(705,77,758),(706,70,759),(707,32,760),(708,123,761),(709,61,762),(710,41,763),(711,1,726),(712,77,727),(713,48,728),(714,25,729),(715,5,729),(716,77,730),(717,77,731),(718,124,732),(719,6,733),(720,6,734),(721,83,735),(722,4,735),(723,43,736),(724,2,1370),(725,41,1369),(726,30,737),(727,39,738),(728,4,739),(729,80,740),(730,4,741),(733,5,742),(734,4,743),(735,77,744),(736,41,708),(737,1,707),(738,24,709),(739,43,710),(740,48,711),(741,80,711),(742,61,712),(743,80,713),(744,40,713),(745,4,714),(746,30,715),(747,80,715),(748,77,716),(749,125,717),(750,30,718),(751,77,719),(752,2,1371),(753,5,720),(754,77,721),(755,31,722),(756,77,723),(757,4,724),(758,4,725),(759,1,687),(760,41,688),(761,4,689),(762,56,690),(763,5,691),(764,61,692),(765,61,693),(766,9,693),(767,77,694),(768,106,695),(769,30,696),(770,63,697),(771,14,697),(772,2,1372),(773,77,698),(774,127,699),(775,77,700),(776,6,701),(777,4,702),(778,4,703),(779,4,704),(780,22,705),(781,41,706),(782,1,671),(783,52,672),(785,43,674),(786,70,675),(787,77,676),(788,106,677),(789,31,677),(790,4,678),(791,41,679),(793,2,1373),(794,4,681),(797,30,683),(798,4,683),(799,32,683),(801,64,682),(802,4,682),(803,41,680),(804,43,684),(805,77,685),(806,106,686),(807,1,655),(808,128,656),(809,129,657),(810,41,658),(811,79,659),(812,4,660),(813,41,661),(814,31,661),(815,4,662),(816,77,663),(817,2,1374),(819,130,664),(820,77,665),(821,63,666),(822,3,667),(823,46,668),(824,77,669),(825,77,670),(826,1,804),(827,100,805),(828,77,806),(829,88,807),(830,77,808),(831,134,809),(832,22,810),(833,126,810),(834,126,811),(835,9,812),(836,56,813),(837,2,1375),(838,19,814),(839,6,815),(840,43,815),(841,4,816),(842,4,817),(843,30,818),(844,77,819),(845,131,820),(846,1,1376),(847,48,1377),(848,48,1378),(849,32,1378),(850,131,1379),(851,101,1379),(852,43,1380),(853,77,1381),(854,5,1382),(855,132,1382),(856,133,1383),(857,132,1384),(858,101,1385),(859,5,1386),(860,132,1386),(861,99,1387),(862,33,1387),(863,4,1388),(864,77,1389),(865,5,1390),(866,77,1391),(867,12,1392),(868,2,1399),(869,48,1393),(870,41,1393),(871,4,1394),(872,41,1394),(873,132,1394),(874,133,1395),(875,22,1395),(876,29,1396),(877,133,1396),(878,122,1397),(879,114,1398),(880,1,637),(881,80,638),(882,133,638),(883,19,639),(884,89,640),(885,133,641),(886,5,641),(887,3,642),(888,41,642),(889,77,643),(890,32,644),(891,77,645),(892,4,646),(893,77,647),(894,3,648),(895,2,1400),(896,6,649),(897,88,650),(898,77,651),(899,46,652),(900,126,653),(901,4,654),(902,1,621),(903,31,622),(904,4,623),(905,77,624),(906,43,625),(907,77,626),(908,63,627),(909,131,628),(910,33,629),(911,41,630),(913,2,1401),(914,23,631),(915,64,632),(916,77,633),(917,23,634),(918,61,635),(919,77,636),(920,1,603),(921,41,604),(922,119,605),(923,77,606),(924,6,607),(925,132,607),(926,4,608),(927,77,609),(928,41,610),(929,33,611),(930,6,612),(931,33,612),(932,29,613),(933,74,613),(934,2,1402),(935,135,614),(936,81,615),(937,80,616),(938,4,616),(939,126,617),(940,4,618),(941,6,619),(942,126,620),(943,1,583),(944,33,584),(945,77,585),(946,126,586),(947,41,587),(948,126,588),(949,41,589),(950,41,590),(951,41,1403),(952,48,591),(953,110,592),(954,4,593),(955,4,594),(956,32,594),(957,19,595),(958,2,1404),(959,61,596),(960,126,597),(961,6,598),(962,19,599),(963,30,600),(964,77,601),(965,56,602),(966,1,566),(967,4,567),(968,41,568),(969,6,569),(970,6,570),(971,132,570),(972,126,571),(973,77,572),(974,43,573),(975,43,574),(976,72,575),(977,2,1405),(978,77,576),(979,77,577),(980,64,578),(981,6,579),(982,6,580),(983,43,581),(984,4,582),(985,1,550),(987,136,551),(988,41,552),(989,131,553),(990,6,554),(991,4,555),(992,30,555),(993,6,556),(994,106,557),(995,89,558),(996,80,559),(997,71,560),(998,6,561),(999,126,562),(1000,126,1406),(1001,2,1407),(1002,43,563),(1003,131,563),(1004,137,564),(1005,77,565),(1006,138,564),(1007,1,533),(1008,31,534),(1009,41,534),(1010,126,535),(1011,136,536),(1012,137,536),(1013,126,537),(1014,133,538),(1015,77,539),(1016,113,540),(1017,77,541),(1018,137,541),(1019,106,542),(1020,2,1408),(1021,77,543),(1022,126,544),(1023,136,545),(1024,41,546),(1025,77,547),(1026,43,548),(1027,132,548),(1028,112,549),(1029,1,520),(1030,77,521),(1031,136,522),(1032,136,523),(1033,126,523),(1034,105,524),(1035,74,525),(1036,106,525),(1037,80,526),(1038,63,527),(1039,137,527),(1040,88,528),(1041,2,1409),(1042,43,529),(1043,14,530),(1044,72,531),(1045,5,532),(1046,132,532),(1047,1,501),(1048,77,502),(1049,132,502),(1050,77,503),(1051,4,504),(1052,77,505),(1053,43,506),(1054,4,507),(1055,77,508),(1056,132,508),(1057,4,509),(1058,137,509),(1059,89,510),(1060,30,511),(1061,77,512),(1062,77,513),(1063,2,1410),(1064,88,514),(1065,130,515),(1066,136,516),(1067,24,517),(1068,137,517),(1069,6,518),(1070,48,519),(1071,137,519),(1072,1,484),(1073,74,485),(1074,74,486),(1075,106,486),(1076,136,487),(1077,105,488),(1078,137,488),(1079,41,489),(1080,117,490),(1081,130,491),(1082,43,492),(1083,136,492),(1084,6,493),(1085,132,493),(1086,6,494),(1087,77,495),(1088,2,1411),(1089,136,496),(1090,136,497),(1091,136,498),(1092,89,499),(1093,126,500),(1094,1,467),(1095,43,468),(1096,30,469),(1097,77,470),(1098,4,471),(1099,137,471),(1100,6,472),(1101,77,473),(1102,136,474),(1103,5,475),(1104,6,476),(1105,30,477),(1106,41,477),(1107,5,478),(1108,61,478),(1109,2,1412),(1110,77,479),(1111,6,480),(1112,74,481),(1113,77,482),(1114,43,483),(1115,1,450),(1116,43,451),(1117,43,452),(1118,126,453),(1119,6,454),(1120,43,454),(1121,77,455),(1122,43,456),(1123,29,457),(1124,80,457),(1125,81,458),(1126,64,459),(1127,137,459),(1128,41,460),(1129,77,461),(1130,2,1413),(1131,136,462),(1132,126,463),(1133,136,1414),(1134,41,464),(1135,138,464),(1136,77,465),(1137,72,466),(1138,1,435),(1139,136,436),(1140,77,437),(1141,6,438),(1142,106,439),(1143,43,440),(1144,77,441),(1145,43,442),(1146,131,442),(1147,136,443),(1148,43,444),(1149,77,445),(1150,2,1415),(1151,48,446),(1152,35,447),(1153,135,448),(1154,77,449),(1155,1,425),(1156,88,426),(1157,126,427),(1158,5,429),(1159,6,428),(1160,4,430),(1161,96,431),(1162,131,432),(1163,2,1416),(1164,72,433),(1165,126,434),(1166,1,413),(1167,30,414),(1168,43,415),(1169,42,416),(1170,77,417),(1171,130,418),(1172,131,418),(1173,136,419),(1174,43,420),(1175,43,421),(1176,2,1417),(1177,80,422),(1178,77,423),(1179,72,424),(1180,1,399),(1181,136,400),(1182,32,401),(1183,74,402),(1184,138,402),(1185,72,403),(1186,4,404),(1187,74,404),(1188,136,405),(1189,132,405),(1190,77,406),(1191,19,407),(1192,136,408),(1193,2,1418),(1194,81,409),(1195,72,410),(1196,123,411),(1197,6,412),(1198,1,385),(1199,130,386),(1200,43,387),(1201,6,388),(1202,4,389),(1203,6,390),(1204,4,391),(1205,137,391),(1206,4,392),(1207,137,392),(1208,2,1419),(1209,43,393),(1210,136,393),(1211,43,394),(1212,77,395),(1213,32,396),(1214,4,397),(1215,137,397),(1216,123,398),(1217,1,367),(1218,88,368),(1219,4,369),(1220,1,1420),(1221,4,1421),(1222,29,1421),(1223,22,1422),(1224,136,1423),(1225,133,1424),(1226,43,1425),(1227,136,1426),(1228,89,1427),(1229,77,1428),(1230,4,1429),(1231,136,1430),(1232,77,1431),(1233,132,1431),(1234,94,1432),(1235,77,1384),(1236,31,1433),(1237,4,1434),(1238,22,1434),(1239,12,1435),(1240,2,1445),(1241,57,1436),(1242,41,1436),(1243,41,1437),(1244,77,1438),(1245,22,1439),(1246,41,1439),(1247,23,1440),(1248,19,1441),(1249,132,1441),(1250,136,1442),(1251,136,1443),(1252,114,1444),(1253,44,370),(1254,43,371),(1255,6,372),(1256,30,373),(1257,6,374),(1258,77,375),(1259,132,375),(1260,4,376),(1261,137,376),(1262,136,377),(1263,77,378),(1264,6,379),(1265,6,380),(1266,2,1446),(1267,6,381),(1268,32,381),(1269,6,382),(1270,19,382),(1271,30,383),(1272,4,384),(1273,1,354),(1274,118,355),(1275,6,356),(1276,32,357),(1277,43,358),(1278,57,359),(1279,57,360),(1280,77,361),(1281,4,362),(1282,137,362),(1283,2,1447),(1284,77,363),(1285,43,364),(1286,33,365),(1287,33,366),(1288,1,341),(1289,43,342),(1290,136,343),(1291,77,344),(1292,6,345),(1293,4,346),(1294,137,346),(1295,4,347),(1296,132,347),(1297,6,348),(1298,6,349),(1299,100,349),(1300,132,349),(1301,100,493),(1302,43,350),(1303,77,351),(1304,2,1448),(1305,6,352),(1306,77,353),(1307,1,326),(1308,126,327),(1309,72,328),(1310,4,329),(1311,33,329),(1312,77,330),(1313,29,331),(1314,41,332),(1315,77,333),(1316,43,334),(1317,2,1449),(1318,3,335),(1319,74,335),(1320,99,336),(1321,89,337),(1322,30,338),(1323,5,339),(1324,123,340),(1325,1,313),(1326,3,314),(1327,81,315),(1328,77,316),(1329,120,317),(1330,137,317),(1331,6,318),(1332,43,319),(1333,2,1450),(1334,3,320),(1335,43,321),(1336,6,322),(1337,32,323),(1338,4,324),(1339,137,324),(1340,139,325),(1341,1,300),(1342,3,301),(1343,5,302),(1344,4,303),(1345,136,304),(1346,33,305),(1347,6,306),(1348,77,307),(1349,2,1451),(1350,89,308),(1351,77,309),(1352,5,310),(1353,72,311),(1354,43,312),(1355,1,289),(1356,6,290),(1357,132,290),(1358,77,291),(1359,6,292),(1360,43,292),(1361,2,1452),(1362,33,293),(1363,77,294),(1364,5,1453),(1365,6,295),(1366,43,296),(1367,123,297),(1368,72,298),(1369,43,299),(1370,1,277),(1371,5,278),(1372,120,279),(1373,137,279),(1374,131,280),(1375,43,280),(1376,140,281),(1377,19,282),(1378,43,283),(1379,2,1454),(1380,4,284),(1381,132,284),(1382,32,285),(1383,126,285),(1384,126,286),(1385,72,287),(1386,123,288),(1387,139,288),(1388,1,263),(1389,131,264),(1390,43,265),(1391,33,266),(1392,6,266),(1393,77,267),(1394,6,268),(1395,19,269),(1396,6,270),(1397,52,271),(1398,2,1455),(1399,41,272),(1400,72,273),(1401,4,274),(1402,80,275),(1403,133,276),(1404,1,251),(1405,43,252),(1406,6,252),(1407,6,253),(1408,138,254),(1409,138,1456),(1410,43,255),(1411,41,256),(1412,136,257),(1413,99,258),(1414,2,1457),(1415,6,259),(1416,120,260),(1417,72,261),(1418,101,262),(1419,1,235),(1420,6,236),(1421,43,237),(1422,136,238),(1423,77,239),(1424,136,240),(1425,6,241),(1426,131,242),(1427,2,1458),(1428,6,243),(1429,6,244),(1430,6,245),(1431,72,246),(1432,136,247),(1433,123,248),(1434,123,1459),(1435,120,249),(1436,136,250),(1437,1,222),(1438,6,223),(1439,6,224),(1440,6,1460),(1441,6,225),(1442,136,226),(1443,32,227),(1444,6,228),(1445,6,229),(1446,2,1461),(1447,80,230),(1448,88,231),(1449,123,232),(1450,112,233),(1451,72,234),(1452,1,208),(1453,130,209),(1454,6,210),(1455,43,211),(1456,33,212),(1457,3,213),(1458,72,1462),(1459,123,1463),(1460,77,214),(1461,2,1464),(1462,39,215),(1463,136,216),(1464,43,217),(1465,123,218),(1466,3,219),(1467,6,220),(1468,19,220),(1469,43,221),(1470,43,199),(1471,77,200),(1472,136,201),(1473,77,202),(1475,43,204),(1476,2,1465),(1477,43,205),(1478,77,1466),(1479,139,206),(1480,6,207),(1481,3,1467),(1482,72,1468),(1483,77,1469),(1484,77,203),(1485,6,190),(1486,77,191),(1487,6,192),(1488,77,193),(1489,88,194),(1490,33,1470),(1491,2,1471),(1492,43,195),(1493,38,196),(1494,77,197),(1495,33,1472),(1496,43,1473),(1497,72,198),(1498,76,178),(1499,130,179),(1500,43,180),(1501,77,181),(1502,131,182),(1503,77,183),(1504,99,184),(1505,72,185),(1506,2,1474),(1507,6,186),(1508,43,187),(1509,43,188),(1510,6,189),(1511,5,168),(1513,141,169),(1514,6,170),(1515,139,171),(1516,3,172),(1517,123,173),(1518,2,1475),(1519,136,174),(1520,43,175),(1521,99,176),(1522,6,177),(1523,99,160),(1524,6,160),(1525,6,161),(1526,43,161),(1527,77,162),(1530,43,163),(1531,43,1476),(1532,72,1476),(1533,72,1477),(1534,2,1478),(1535,6,164),(1536,43,164),(1537,48,164),(1538,77,165),(1539,123,166),(1540,6,167),(1541,3,146),(1542,3,147),(1543,3,148),(1544,141,149),(1545,6,150),(1546,89,151),(1547,39,152),(1548,6,153),(1549,2,1479),(1550,43,154),(1551,6,154),(1552,138,155),(1553,77,156),(1554,37,157),(1555,72,158),(1556,6,159),(1557,131,132),(1558,72,133),(1559,130,134),(1560,99,135),(1561,77,136),(1563,77,138),(1564,2,1480),(1566,77,137),(1567,43,139),(1568,6,140),(1569,77,141),(1570,3,142),(1571,6,143),(1572,6,144),(1573,131,145),(1574,1,122),(1575,37,123),(1576,5,124),(1577,48,125),(1578,131,125),(1579,6,126),(1580,2,1481),(1581,6,127),(1582,77,128),(1583,77,129),(1584,6,130),(1585,41,131),(1586,1,109),(1587,111,110),(1588,33,111),(1589,72,112),(1590,6,113),(1591,6,114),(1592,126,115),(1593,6,116),(1594,2,1482),(1595,89,117),(1596,43,117),(1597,72,118),(1598,123,119),(1599,6,120),(1600,131,121),(1601,131,102),(1602,33,102),(1603,141,103),(1604,72,104),(1605,2,1483),(1606,3,101),(1607,39,105),(1608,138,105),(1609,39,106),(1610,80,107),(1611,43,108),(1612,96,92),(1613,41,93),(1614,6,94),(1615,6,95),(1616,77,96),(1618,77,98),(1619,72,99),(1620,77,100),(1621,2,97),(1622,6,82),(1623,43,83),(1625,43,85),(1626,131,85),(1627,6,86),(1628,2,1484),(1630,142,84),(1631,6,87),(1632,6,88),(1633,6,89),(1634,136,90),(1635,72,91),(1636,33,74),(1637,33,75),(1638,142,76),(1639,33,77),(1640,33,78),(1643,6,80),(1644,2,1485),(1645,72,81),(1646,131,63),(1647,33,63),(1648,6,64),(1649,6,65),(1650,6,66),(1651,6,1486),(1652,89,67),(1653,6,67),(1654,72,68),(1655,2,1487),(1656,77,69),(1657,72,70),(1658,29,71),(1659,6,72),(1660,123,73),(1661,43,56),(1662,33,56),(1663,72,57),(1664,6,58),(1665,143,59),(1666,137,59),(1667,143,79),(1668,137,79),(1669,6,60),(1670,2,1488),(1671,6,61),(1672,136,62),(1673,43,43),(1674,136,44),(1675,114,45),(1676,43,46),(1677,6,47),(1678,72,48),(1679,6,49),(1680,2,1489),(1681,6,50),(1682,6,51),(1683,6,52),(1684,6,53),(1685,6,54),(1686,43,55),(1687,77,1490),(1688,143,35),(1689,137,35),(1690,6,36),(1691,6,37),(1692,89,37),(1693,2,1491),(1694,70,38),(1695,6,39),(1696,43,40),(1701,123,42),(1702,77,1492),(1703,72,30),(1704,138,31),(1705,26,32),(1706,2,1493),(1707,6,33),(1708,72,34),(1710,146,22),(1711,146,41),(1712,3,673),(1713,146,673),(1714,43,23),(1715,138,24),(1716,89,25),(1717,2,1494),(1718,43,26),(1719,142,27),(1720,6,28),(1721,123,29),(1722,43,15),(1723,6,15),(1724,19,16),(1725,6,17),(1726,33,17),(1727,72,18),(1728,6,19),(1729,6,20),(1730,2,1495),(1731,6,21),(1732,43,9),(1733,1,1496),(1734,144,1497),(1735,57,1497),(1736,22,1498),(1737,42,1499),(1738,102,1499),(1739,7,1500),(1740,48,1500),(1741,6,1501),(1742,42,1502),(1743,48,1503),(1744,14,1504),(1745,74,1504),(1746,99,1505),(1747,65,1506),(1748,137,1506),(1749,136,1507),(1750,12,1508),(1751,2,1517),(1752,32,1509),(1753,28,1510),(1754,10,1510),(1755,145,1511),(1756,136,1511),(1757,137,1511),(1758,9,1512),(1759,19,1513),(1760,136,1514),(1761,4,1514),(1762,13,1515),(1763,114,1516),(1764,3,10),(1765,3,11),(1766,6,12),(1767,77,13),(1768,2,1518),(1769,6,14),(1770,56,1),(1771,143,2),(1772,137,2),(1773,77,4),(1774,141,5),(1776,77,3),(1777,2,1520),(1778,77,6),(1779,72,7),(1780,6,8),(1781,77,1537),(1782,143,1538),(1783,137,1538),(1784,43,1539),(1785,6,1540),(1786,2,1541),(1787,43,1542),(1788,99,1543),(1789,8,1543),(1790,43,1544),(1791,143,1546),(1792,137,1546),(1793,141,1545),(1794,131,1547),(1795,56,1548),(1796,123,1892),(1797,43,1549),(1798,2,1550),(1799,141,1551),(1800,43,1552),(1801,43,1553),(1802,43,1554),(1803,80,1555),(1804,141,1556),(1805,2,1557),(1806,6,1558),(1807,77,1559),(1808,80,1606),(1809,6,1607),(1810,43,1608),(1811,6,1609),(1812,2,1610),(1813,77,1611),(1814,5,1894),(1815,131,1612),(1816,77,1613),(1817,6,1614),(1818,43,1615),(1819,139,1895),(1820,123,1616),(1821,4,1617),(1822,137,1617),(1823,43,1618),(1824,2,1619),(1825,99,1620),(1826,77,1896),(1827,6,1621),(1828,6,1622),(1829,43,1623),(1830,2,1625),(1831,43,1624),(1832,141,1626),(1833,43,1627),(1834,6,1628),(1835,6,1629),(1836,43,1630),(1837,80,1631),(1838,2,1632),(1839,4,1633),(1840,137,1633),(1841,6,1634),(1842,43,1635),(1843,6,1636),(1844,80,1637),(1845,2,1638),(1846,77,1639),(1847,6,1640),(1848,77,1641),(1849,141,1642),(1850,43,1643),(1851,6,1644),(1852,2,1645),(1853,72,1646),(1854,123,1897),(1855,13,1647),(1856,6,1648),(1857,43,1649),(1858,6,1650),(1859,2,1651),(1860,142,1652),(1861,6,1653),(1862,43,1654),(1863,43,1655),(1864,2,1656),(1865,43,1657),(1866,77,1658),(1867,123,1898),(1868,123,1899),(1869,6,1659),(1870,4,1660),(1871,137,1660),(1872,43,1661),(1873,43,1900),(1874,43,1662),(1875,89,1662),(1876,2,1663),(1877,6,1664),(1878,43,1665),(1879,43,1666),(1880,77,1667),(1881,72,1668),(1882,2,1669),(1883,80,1670),(1884,72,1671),(1885,43,1672),(1886,80,1673),(1887,72,1674),(1888,2,1675),(1889,141,1676),(1890,77,1677),(1891,72,1678),(1892,6,1679),(1893,70,1680),(1894,72,1681),(1895,2,1682),(1896,6,1683),(1897,6,1684),(1898,72,1685),(1899,43,1686),(1900,6,1687),(1901,141,1688),(1902,72,1689),(1903,2,1690),(1904,6,1691),(1905,72,1692),(1906,138,1693),(1907,6,1694),(1908,72,1695),(1909,2,1696),(1910,6,1697),(1911,72,1698),(1912,4,1699),(1913,137,1699),(1914,6,1700),(1915,72,1701),(1916,2,1702),(1917,6,1703),(1918,72,1704),(1919,41,1705),(1920,5,1706),(1921,137,1706),(1922,123,1707),(1923,72,1708),(1924,2,1709),(1925,6,1710),(1926,41,1710),(1927,72,1711),(1928,6,1712),(1929,77,1713),(1930,72,1714),(1931,2,1715),(1932,6,1716),(1933,6,1901),(1934,72,1717),(1935,143,1718),(1936,137,1718),(1937,19,1719),(1938,6,1719),(1939,72,1720),(1940,2,1721),(1941,131,1722),(1942,141,1723),(1943,131,1723),(1944,72,1724),(1945,6,1725),(1946,6,1726),(1947,143,1727),(1948,72,1728),(1949,2,1729),(1950,72,1730),(1951,141,1731),(1952,72,1732),(1953,143,1733),(1954,136,1734),(1955,41,1735),(1956,72,1736),(1957,2,1737),(1958,6,1738),(1959,72,1739),(1960,141,1740),(1961,6,1741),(1962,72,1742),(1963,2,1743),(1964,6,1744),(1965,72,1745),(1966,77,1746),(1967,6,1747),(1968,72,1748),(1969,77,1749),(1970,141,1750),(1971,72,1751),(1972,143,1752),(1973,6,1753),(1974,6,1754),(1975,43,1755),(1976,72,1756),(1977,2,1757),(1978,6,1758),(1979,72,1759),(1980,6,1760),(1981,6,1761),(1982,6,1762),(1983,143,1763),(1984,72,1764),(1985,2,1765),(1986,6,1766),(1987,77,1767),(1988,72,1768),(1989,143,1769),(1990,77,1770),(1991,6,1771),(1992,141,1772),(1993,72,1773),(1994,2,1774),(1995,136,1775),(1996,72,1776),(1997,141,1777),(1998,141,1778),(1999,72,1779),(2000,141,1780),(2001,131,1781),(2002,141,1781),(2003,141,1782),(2004,141,1783),(2005,143,1784),(2006,77,1785),(2007,72,1786),(2008,2,1787),(2009,126,1788),(2010,72,1789),(2011,6,1790),(2012,141,1791),(2013,77,1792),(2014,123,1793),(2015,72,1794),(2016,2,1902),(2017,6,1795),(2018,72,1796),(2019,136,1797),(2020,6,1798),(2021,72,1799),(2022,2,1800),(2023,6,1801),(2024,6,1802),(2025,32,1803),(2026,143,1804),(2027,72,1805),(2028,2,1903),(2029,147,1806),(2030,141,1807),(2031,6,1808),(2032,6,1809),(2033,72,1810),(2034,2,1811),(2035,6,1812),(2036,57,1812),(2037,6,1813),(2038,70,1814),(2039,6,1815),(2040,72,1816),(2041,2,1817),(2042,6,1818),(2043,72,1819),(2044,32,1820),(2045,6,1820),(2046,143,1821),(2047,72,1822),(2048,2,1823),(2049,77,1824),(2050,1,1825),(2051,134,1826),(2052,6,1828),(2053,72,1829),(2054,2,1830),(2055,77,1831),(2056,6,1832),(2057,6,1833),(2058,6,1834),(2059,72,1835),(2060,2,1836),(2061,6,1837),(2062,99,1838),(2063,6,1839),(2064,72,1840),(2065,2,1841),(2066,6,1842),(2067,6,1843),(2068,6,1844),(2069,72,1845),(2070,6,1846),(2071,2,1847),(2072,6,1848),(2073,43,1849),(2074,123,1850),(2075,72,1851),(2076,136,1904),(2077,2,1852),(2078,6,1853),(2079,88,1854),(2080,134,1855),(2081,72,1856),(2082,6,1857),(2083,2,1858),(2084,131,1859),(2085,80,1860),(2086,6,1861),(2087,72,1862),(2088,43,1863),(2089,6,1863),(2090,2,1864),(2091,6,1865),(2092,6,1866),(2093,6,1867),(2094,72,1868),(2095,43,1869),(2096,29,1870),(2097,134,1870),(2098,43,1871),(2099,134,1872),(2100,72,1873),(2101,6,1874),(2102,43,1875),(2103,6,1875),(2104,99,1876),(2105,43,1877),(2106,72,1878),(2107,77,1879),(2108,147,1880),(2109,140,1881),(2110,6,1882),(2111,72,1883),(2112,70,1884),(2113,43,1886),(2114,6,1885),(2115,1,1887),(2116,77,1888),(2117,72,1889),(2118,6,1890),(2119,6,1891),(2120,1,1905),(2121,48,1906),(2122,41,1906),(2123,101,1906),(2124,5,1907),(2125,91,1908),(2126,136,1909),(2127,43,1910),(2128,48,1911),(2129,40,1912),(2130,143,1913),(2131,48,1913),(2132,137,1913),(2133,32,1914),(2134,99,1915),(2135,99,1916),(2136,4,1917),(2137,97,1917),(2138,48,1918),(2139,131,1918),(2140,136,1919),(2141,2,1928),(2142,99,1920),(2143,45,1921),(2144,106,1922),(2145,74,1922),(2146,4,1923),(2147,61,1924),(2148,148,1925),(2149,21,1383),(2150,91,1383),(2151,133,1926),(2152,21,1926),(2153,91,1926),(2154,114,1927),(2155,1,1929),(2156,25,1930),(2157,13,1931),(2158,6,1932),(2159,6,1933),(2160,19,1933),(2161,43,1934),(2162,43,1935),(2163,6,1935),(2164,59,1936),(2165,136,1936),(2166,38,1937),(2167,46,1938),(2168,136,1938),(2169,136,1939),(2170,99,1940),(2171,41,1941),(2172,5,1942),(2173,22,1942),(2174,6,1943),(2175,68,1944),(2176,2,1955),(2177,55,1945),(2178,48,1945),(2179,6,1946),(2180,6,1947),(2181,136,1947),(2182,25,1948),(2183,48,1948),(2184,13,1949),(2185,77,1950),(2186,44,1951),(2187,71,1952),(2188,130,1952),(2189,5,1953),(2190,114,1954),(2191,1,1956),(2192,4,1957),(2193,33,1958),(2194,149,1959),(2195,43,1960),(2196,32,1961),(2197,110,1962),(2198,64,1963),(2199,87,1964),(2200,99,1965),(2203,136,1967),(2204,19,1967),(2205,118,1967),(2206,151,1968),(2207,2,1976),(2208,77,1969),(2209,77,1970),(2210,19,1971),(2211,4,1972),(2212,150,1966),(2213,106,1966),(2214,4,1973),(2215,6,1973),(2216,4,1974),(2217,114,1975),(2218,1,1977),(2219,31,1978),(2220,138,1978),(2221,136,1979),(2222,22,1980),(2223,127,1980),(2224,87,1980),(2225,81,1981),(2226,43,1982),(2227,136,1983),(2228,69,1984),(2229,19,1985),(2230,4,1985),(2231,126,1986),(2232,99,1987),(2233,136,1988),(2234,136,1989),(2235,10,1989),(2236,103,1990),(2237,2,2002),(2238,77,1991),(2239,150,1992),(2240,59,1993),(2241,126,1994),(2242,131,1995),(2243,94,1996),(2244,136,1997),(2245,20,1998),(2246,136,1999),(2247,71,2000),(2248,114,2001),(2249,1,2003),(2250,44,2004),(2251,44,2005),(2252,41,2005),(2253,152,2006),(2254,43,2007),(2255,153,1924),(2256,153,2008),(2257,99,2009),(2258,72,2010),(2259,154,2011),(2260,69,2011),(2261,131,1996),(2262,131,2012),(2263,40,2013),(2264,105,2014),(2265,103,2015),(2266,20,2016),(2267,99,2017),(2268,74,2018),(2269,80,2018),(2270,5,2019),(2271,74,2020),(2272,80,2020),(2273,2,2029),(2274,48,2021),(2275,39,2022),(2276,77,2023),(2277,22,2024),(2278,148,2025),(2279,74,2026),(2280,80,2026),(2281,30,2027),(2282,136,2027),(2283,114,2028),(2284,155,2025),(2285,1,2030),(2286,32,2031),(2287,136,2032),(2288,22,2033),(2289,58,2034),(2290,43,2035),(2291,19,2036),(2292,87,2036),(2293,48,2037),(2294,130,2039),(2295,136,2040),(2296,99,2041),(2297,89,2042),(2298,136,2042),(2299,4,2038),(2300,4,2044),(2301,2,2053),(2302,101,2045),(2303,48,2046),(2304,89,2043),(2305,156,2047),(2306,54,2048),(2307,78,2049),(2308,77,2050),(2309,49,2051),(2310,114,2052),(2311,1,2054),(2312,143,2055),(2313,25,2055),(2314,5,2056),(2315,149,2057),(2316,59,2057),(2317,100,2058),(2318,104,2059),(2319,32,2060),(2320,5,2061),(2321,77,2062),(2322,99,2063),(2323,136,2064),(2324,83,2065),(2325,5,2066),(2326,136,2066),(2327,2,2076),(2328,19,2067),(2329,152,2067),(2330,19,2068),(2331,19,2069),(2332,5,2069),(2333,41,2070),(2334,80,2070),(2335,42,2071),(2336,137,2071),(2337,94,2072),(2338,13,2074),(2339,114,2075),(2340,77,2073),(2341,1,2077),(2342,136,2078),(2343,42,2079),(2344,25,2079),(2345,80,2080),(2346,22,2081),(2347,136,2081),(2348,120,2082),(2349,136,2082),(2350,43,2083),(2351,149,2086),(2352,10,2087),(2353,61,2087),(2354,118,2088),(2355,110,2089),(2356,48,2090),(2357,32,2091),(2358,136,2092),(2359,37,2095),(2360,99,2093),(2361,94,2094),(2362,77,2085),(2363,94,2084),(2364,99,2096),(2365,61,2097),(2366,32,2098),(2367,2,2108),(2368,136,2099),(2369,130,2100),(2370,113,2101),(2371,19,2102),(2374,69,2103),(2375,44,2104),(2376,136,2105),(2377,77,2106),(2378,114,2107),(2379,1,2109),(2380,144,2110),(2381,118,2111),(2382,104,2112),(2383,32,2113),(2384,43,2114),(2385,97,2115),(2386,77,2116),(2387,143,2117),(2388,25,2117),(2389,136,2118),(2390,136,2119),(2391,106,2120),(2392,23,2121),(2393,99,2122),(2394,43,2123),(2395,19,2123),(2396,31,2124),(2397,8,2125),(2398,32,2125),(2399,10,2126),(2400,9,2126),(2401,2,2136),(2402,77,2127),(2403,39,2128),(2404,61,2129),(2405,157,2130),(2406,133,2131),(2407,77,2132),(2408,94,2133),(2409,77,2134),(2410,114,2135),(2411,1,2137),(2412,148,2138),(2413,101,2139),(2414,37,2139),(2415,29,2140),(2416,24,2141),(2417,43,2142),(2418,113,2143),(2419,113,2144),(2420,113,2145),(2421,35,2146),(2422,39,2147),(2423,99,2148),(2424,19,2149),(2425,24,2149),(2426,77,2150),(2427,2,2159),(2428,4,2151),(2429,77,2152),(2430,89,2153),(2431,5,2153),(2432,19,2154),(2433,118,2155),(2434,77,2156),(2435,13,2157),(2436,114,2158),(2437,1,2160),(2438,131,2161),(2439,148,2162),(2440,101,2162),(2441,77,2163),(2442,43,2164),(2443,19,2164),(2444,77,2165),(2445,149,2166),(2446,77,2167),(2447,56,2168),(2448,32,2169),(2449,136,2170),(2450,99,2171),(2451,156,2172),(2452,77,2173),(2453,2,2181),(2454,3,2174),(2455,10,2175),(2456,136,2175),(2457,29,2176),(2458,22,2176),(2459,89,2177),(2460,136,2178),(2461,136,2179),(2462,32,2179),(2463,114,2180),(2464,1,2182),(2465,130,2183),(2466,158,2184),(2467,155,2185),(2468,136,2186),(2469,19,2187),(2470,136,2188),(2472,159,2189),(2473,2,2203),(2474,103,2190),(2475,131,2190),(2476,77,2191),(2477,77,2192),(2478,99,2193),(2479,7,2194),(2480,48,2194),(2481,160,2194),(2482,5,2195),(2483,78,2196),(2484,23,2197),(2485,72,2198),(2486,86,2199),(2487,41,2200),(2488,137,2200),(2489,13,2201),(2490,114,2202),(2491,1,2204),(2492,4,2205),(2493,44,2205),(2494,4,2206),(2495,44,2206),(2496,161,2207),(2497,149,2208),(2498,43,2209),(2499,32,2210),(2500,94,2211),(2501,99,2212),(2502,123,2213),(2503,133,2214),(2504,52,2215),(2505,113,2216),(2506,77,2217),(2507,2,2225),(2508,37,2218),(2509,4,2219),(2510,32,2220),(2511,77,2221),(2512,143,2222),(2513,162,2223),(2514,114,2224),(2515,1,2226),(2516,25,2227),(2517,97,2229),(2518,77,2230),(2519,43,2231),(2520,61,2232),(2521,61,2233),(2522,32,2234),(2523,80,2235),(2524,77,2228),(2525,138,2236),(2526,99,2237),(2527,41,2238),(2528,33,2239),(2529,90,2240),(2530,41,2240),(2531,77,2241),(2532,41,2242),(2533,2,2251),(2534,123,2243),(2535,77,2244),(2536,34,2245),(2537,99,2246),(2538,97,2247),(2539,130,2248),(2540,13,2249),(2541,114,2250),(2542,1,2252),(2543,163,2253),(2544,163,2254),(2545,99,2255),(2546,77,2256),(2547,80,2257),(2548,43,2258),(2549,19,2259),(2550,29,2260),(2551,77,2261),(2552,77,2262),(2553,6,2263),(2554,99,2264),(2555,24,2265),(2556,41,2266),(2557,2,2275),(2558,20,2267),(2559,149,2268),(2560,41,2268),(2561,32,2268),(2562,41,2269),(2563,69,2269),(2564,130,2269),(2565,41,2270),(2566,164,2271),(2567,99,2272),(2568,33,2272),(2569,13,2273),(2570,114,2274),(2571,1,2276),(2572,103,2277),(2573,10,2277),(2574,48,2278),(2575,7,2278),(2576,77,2279),(2577,43,2280),(2578,131,2281),(2579,7,2282),(2580,22,2283),(2581,99,2284),(2582,93,2285),(2583,32,2285),(2584,99,2286),(2585,165,2287),(2586,162,2287),(2587,57,2288),(2588,79,2289),(2589,2,2296),(2590,99,2290),(2591,4,2291),(2592,48,2292),(2593,48,2293),(2594,13,2294),(2595,114,2295),(2596,1,2297),(2597,131,2298),(2598,25,2299),(2599,57,2300),(2600,42,2301),(2601,137,2301),(2602,77,2302),(2603,43,2303),(2604,77,2304),(2605,90,2305),(2606,166,2306),(2607,77,2307),(2608,99,2308),(2609,4,2309),(2610,149,2310),(2611,2,2318),(2612,83,2311),(2613,77,2312),(2614,77,2313),(2615,23,2314),(2616,64,2314),(2617,41,2315),(2618,13,2316),(2619,114,2317),(2620,1,2319),(2621,131,2320),(2622,77,2321),(2623,43,2322),(2624,77,2323),(2625,5,2324),(2626,41,2325),(2627,32,2326),(2628,162,2327),(2629,41,2328),(2630,99,2329),(2631,77,2330),(2632,41,2331),(2633,2,2339),(2634,5,2332),(2635,77,2333),(2636,41,2334),(2637,77,2335),(2638,41,2336),(2639,13,2337),(2640,114,2338),(2641,1,2340),(2642,77,2341),(2643,42,2342),(2644,5,2342),(2645,43,2343),(2646,77,2344),(2647,3,2345),(2648,31,2345),(2649,5,2346),(2650,77,2347),(2651,77,2348),(2652,99,2349),(2653,110,2350),(2654,101,2351),(2655,2,2360),(2656,31,2352),(2657,139,2353),(2658,81,2354),(2659,88,2355),(2660,21,2356),(2661,167,2356),(2662,71,2357),(2663,130,2357),(2664,41,2358),(2665,114,2359),(2666,1,2361),(2667,39,2362),(2668,99,2363),(2669,44,2364),(2670,43,2365),(2671,168,2366),(2672,3,2367),(2673,136,2368),(2674,74,2369),(2675,126,2370),(2676,22,2371),(2677,99,2372),(2678,131,2373),(2679,136,2374),(2680,77,2375),(2681,2,2384),(2682,71,2376),(2683,77,2377),(2684,66,2378),(2685,48,2379),(2686,6,2380),(2687,37,2381),(2688,13,2382),(2689,114,2383),(2690,1,2385),(2691,55,2386),(2692,17,2387),(2693,43,2388),(2694,58,2389),(2695,134,2390),(2696,10,2391),(2697,86,2392),(2698,87,2392),(2699,99,2393),(2700,5,2394),(2701,32,2395),(2702,5,2396),(2703,2,2406),(2704,136,2397),(2705,5,2398),(2706,5,2399),(2707,66,2400),(2708,136,2401),(2709,99,2402),(2710,158,2403),(2711,93,2404),(2712,114,2405),(2713,1,2407),(2714,43,2408),(2715,48,2408),(2716,77,2409),(2717,6,2410),(2718,43,2411),(2719,99,2412),(2722,5,2413),(2723,31,2413),(2724,99,2414),(2725,74,2415),(2726,77,2416),(2727,2,2425),(2728,77,2417),(2729,17,2418),(2730,48,2419),(2731,74,2420),(2732,74,2421),(2733,128,2422),(2734,13,2423),(2735,114,2424),(2736,1,2440),(2737,157,2441),(2738,48,2442),(2739,118,2443),(2740,57,2444),(2741,43,2445),(2742,77,2446),(2743,43,2447),(2744,126,2448),(2745,8,2449),(2746,101,2449),(2747,99,2450),(2748,136,2451),(2749,136,2452),(2750,77,2468),(2751,169,2454),(2752,2,2467),(2753,77,2455),(2754,89,2456),(2755,86,2457),(2756,77,2458),(2757,77,2459),(2758,13,2460),(2759,114,2461),(2760,1,2557),(2761,57,2558),(2762,41,2559),(2763,77,2560),(2764,43,2561),(2765,77,2562),(2766,77,2563),(2767,57,2564),(2768,57,2565),(2769,101,2566),(2770,5,2567),(2771,5,2568),(2772,41,2569),(2773,113,2570),(2774,2,2579),(2775,12,2571),(2776,41,2572),(2777,155,2573),(2778,131,2574),(2780,170,2575),(2781,33,2576),(2782,13,2577),(2783,114,2578),(2784,1,2603),(2785,5,2604),(2786,41,2605),(2787,155,2606),(2788,43,2607),(2789,161,2608),(2790,20,2609),(2791,143,2610),(2792,77,2611),(2793,136,2612),(2794,74,2613),(2795,99,2614),(2796,77,2615),(2797,77,2616),(2798,133,2617),(2799,19,2618),(2800,2,2626),(2801,41,2619),(2802,41,2620),(2803,61,2621),(2804,77,2622),(2805,77,2623),(2806,13,2624),(2807,114,2625),(2808,1,2671),(2809,52,2672),(2810,41,2673),(2811,77,2674),(2812,136,2675),(2813,43,2676),(2814,5,2677),(2816,5,2678),(2817,31,2678),(2818,162,2679),(2819,41,2680),(2820,99,2681),(2821,77,2682),(2822,5,2683),(2823,77,2684),(2824,2,2693),(2825,48,2685),(2826,7,2685),(2827,32,2686),(2828,48,2687),(2829,77,2688),(2830,136,2689),(2831,77,2690),(2832,13,2691),(2833,114,2692),(2834,1,2713),(2835,143,2714),(2836,74,2715),(2837,77,2717),(2838,43,2718),(2839,136,2719),(2840,102,2720),(2841,171,2721),(2842,155,2722),(2843,99,2723),(2844,77,2724),(2845,25,2725),(2846,11,2725),(2847,41,2716),(2848,48,2716),(2849,2,2732),(2850,77,2726),(2851,136,2727),(2852,5,2728),(2853,113,2729),(2854,94,2730),(2855,114,2731),(2856,1,2755),(2857,77,2756),(2858,136,2757),(2859,77,2758),(2860,4,2759),(2861,43,2760),(2862,118,2761),(2863,126,2762),(2864,41,2762),(2865,41,2763),(2866,44,2764),(2867,99,2765),(2868,77,2766),(2869,77,2767),(2870,2,2777),(2871,57,2768),(2872,92,2768),(2873,172,2769),(2874,173,2770),(2875,131,2771),(2876,143,2772),(2877,77,2774),(2878,13,2775),(2879,114,2776),(2880,77,2773),(2881,1,2803),(2882,48,2804),(2883,174,2805),(2884,37,2806),(2885,41,2807),(2886,5,2808),(2887,43,2809),(2888,6,2810),(2889,6,2811),(2890,41,2812),(2891,25,2813),(2892,77,2814),(2893,99,2815),(2894,135,2816),(2895,5,2817),(2896,49,2818),(2897,14,2819),(2898,41,2819),(2899,2,2828),(2900,77,2820),(2901,101,2821),(2902,131,2822),(2903,41,2823),(2904,143,2824),(2905,77,2825),(2906,61,2826),(2907,33,2826),(2908,114,2827),(2909,1,2852),(2910,7,2853),(2911,48,2854),(2912,94,2855),(2913,43,2856),(2914,77,2857),(2915,77,2858),(2916,48,2859),(2917,126,2860),(2918,74,2861),(2919,99,2862),(2920,48,2863),(2921,59,2864),(2922,69,2865),(2923,48,2865),(2924,2,2898),(2925,48,2866),(2926,41,2867),(2927,155,2868),(2928,96,2869),(2929,41,2870),(2930,32,2871),(2931,80,2872),(2932,13,2873),(2933,114,2874),(2934,1,2924),(2935,23,2925),(2936,4,2926),(2937,96,2927),(2938,43,2928),(2939,5,2929),(2940,136,2930),(2941,74,2931),(2942,77,2932),(2943,77,2933),(2944,77,2934),(2945,99,2935),(2946,131,2936),(2947,133,2937),(2948,2,2949),(2949,114,2948),(2950,94,2938),(2951,41,2939),(2952,5,2940),(2953,5,2941),(2954,25,2942),(2955,48,2943),(2956,162,2943),(2957,23,2943),(2958,77,2944),(2959,77,2945),(2960,41,2946),(2961,96,2947),(2962,1,2971),(2963,23,2972),(2964,105,2972),(2965,131,2973),(2966,44,2974),(2967,175,2975),(2968,43,2976),(2969,48,2977),(2970,136,2978),(2971,77,2979),(2972,99,2980),(2973,71,2981),(2974,77,2982),(2976,131,2983),(2977,77,2984),(2978,77,2985),(2979,77,2986),(2980,155,2987),(2981,72,2988),(2982,2,2992),(2983,41,2989),(2984,13,2990),(2985,114,2991),(2986,1,3015),(2987,41,3016),(2988,74,3017),(2989,103,3018),(2990,43,3019),(2992,176,3020),(2993,163,3021),(2994,77,3022),(2995,66,3023),(2996,99,3024),(2997,143,3025),(2998,78,3026),(2999,112,3027),(3000,2,3037),(3001,33,3028),(3002,96,3029),(3003,33,3030),(3004,148,3032),(3005,30,3033),(3006,175,3031),(3007,5,3034),(3008,77,3035),(3009,114,3036),(3010,1,3038),(3011,55,3039),(3012,7,3039),(3013,150,3040),(3014,43,3041),(3015,77,3042),(3016,22,3043),(3017,77,3044),(3018,131,3045),(3019,99,3046),(3020,5,3047),(3021,131,3048),(3022,2,3058),(3023,33,3050),(3024,114,3051),(3025,155,3052),(3026,96,3049),(3027,155,3053),(3028,5,3054),(3029,13,3056),(3030,114,3057),(3031,77,3055),(3032,1,3082),(3033,131,3083),(3034,61,3084),(3035,130,3085),(3037,43,3087),(3038,96,3088),(3039,123,3089),(3040,48,3090),(3042,177,3091),(3043,99,3092),(3045,178,3093),(3046,77,3094),(3047,2,3105),(3048,30,3095),(3049,3,3086),(3050,77,3096),(3051,88,3097),(3052,77,3098),(3053,77,3099),(3054,110,3100),(3055,33,3101),(3056,5,3102),(3057,31,3103),(3058,114,3104); /*!40000 ALTER TABLE `KeywordXref` ENABLE KEYS */; UNLOCK TABLES; -- -- Dumping data for table `Keywords` -- LOCK TABLES `Keywords` WRITE; /*!40000 ALTER TABLE `Keywords` DISABLE KEYS */; INSERT INTO `Keywords` VALUES (1,'Editorial','An article that expresses the opinion of the editor, editorial board, or publisher.','http://en.wikipedia.org/wiki/Editorial'),(2,'Letters','Letter to the editor, sent to 2600 about issues of concern to the readers.','http://en.wikipedia.org/wiki/Letters_to_the_editor'),(3,'Virus','Computer virus, a computer program that can copy itself and infect a computer without permission or knowledge of the user.','http://en.wikipedia.org/wiki/Computer_virus'),(4,'Exploit','A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.','http://en.wikipedia.org/wiki/Exploit_(computer_security)'),(5,'Hack','A clever or quick fix to a computer program problem, or to a clumsy or inelegant solution to a problem. The term is also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable. The general media also uses this term to describe the act of illegally breaking into a computer, better described as cracking.','http://en.wikipedia.org/wiki/Hack_(technology)'),(6,'Phreaking','A slang term coined to describe the activity of a subculture of people who study, experiment with, or explore telecommunication systems.','http://en.wikipedia.org/wiki/Phreaking'),(7,'Tor','The Onion Router\r\n(anonymity network)\r\nhttp://www.torproject.org/','http://en.wikipedia.org/wiki/Tor_(anonymity_network)'),(8,'Pen Testing','Penetration testing, a method of evaluating the security of a computer system or network by simulating an attack by a malicious user.','http://en.wikipedia.org/wiki/Pen_testing'),(9,'Ripping','The process of copying audio or video content to a hard disk or other media.','http://en.wikipedia.org/wiki/Ripping'),(10,'MP3','MPEG-1 Audio Layer 3, a digital audio encoding format using a form of lossy data compression.','http://en.wikipedia.org/wiki/Mp3'),(11,'SEO','Search engine optimization is the process of improving the volume and quality of traffic to a web site from search engines via \"natural\" (\"organic\" or \"algorithmic\") search results.','http://en.wikipedia.org/wiki/Search_engine_optimization'),(12,'Hackerspace','A hackerspace or hackspace (from Hacker and Space) is a real (as opposed to virtual) place where people with common interests, usually in science, technology, or digital or electronic art can meet, socialise and collaborate.','http://en.wikipedia.org/wiki/Hackerspace'),(13,'Fiction','The telling of stories which aren\'t real.','http://en.wikipedia.org/wiki/Fiction'),(14,'Port Scanning','Searching network host(s) for open port(s).','http://en.wikipedia.org/wiki/Port_scanning'),(15,'OS fingerprinting','Process of determining the operating system (OS)/server software used by a remote system.','http://en.wikipedia.org/wiki/OS_fingerprinting'),(16,'Remote Scripting','A technology which allows scripts running inside a browser to exchange information with a server.','http://en.wikipedia.org/wiki/Remote_Scripting'),(17,'Scripting','A programming language that controls a software application.','http://en.wikipedia.org/wiki/Scripting'),(18,'Disguise','To alter the appearance or hide the identity of someone/thing.',NULL),(19,'Cellphone','Also called a mobile phone and handphone, is an electronic device used for mobile telecommunications (mobile telephony, text messaging or data transmission) over a cellular network of specialized base stations known as cell sites.','http://en.wikipedia.org/wiki/Mobile_phone'),(20,'Forensics','A branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.','http://en.wikipedia.org/wiki/Computer_forensics'),(21,'WEP','Wired Equivalent Privacy is a deprecated algorithm to secure IEEE 802.11 wireless networks.','http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy'),(22,'Wireless Networks','Refers to any type of computer network that is wireless, typically using radio waves.','http://en.wikipedia.org/wiki/Wireless_networks'),(23,'DNS','Domain Name System, Internet system to translate names into IP addresses.','http://en.wikipedia.org/wiki/Domain_Name_System'),(24,'Firewall','Hardware/software designed to prevent unauthorized electronic access to a networked computer system.','http://en.wikipedia.org/wiki/Firewall'),(25,'Google','An American public corporation, earning revenue from advertising related to its Internet search, e-mail, online mapping, office productivity, social networking, and video sharing services. They also track people\'s internet use and blatantly disregard personal privacy!','http://en.wikipedia.org/wiki/Google'),(26,'800 number','A special telephone number, in that the called party is charged the cost of the calls by the telephone carrier, instead of the calling party.','http://en.wikipedia.org/wiki/800_numbers'),(27,'Cyberspace','The online world of computer networks and especially the Internet.','http://en.wikipedia.org/wiki/Cyberspace'),(28,'Music','The art of ordering tones or sounds in succession, in combination, and in temporal relationships to produce a composition having unity and continuity.','http://en.wikipedia.org/wiki/Music'),(29,'Network','A group of interconnected computers.','http://en.wikipedia.org/wiki/Computer_network'),(30,'ISP','Internet service provider - a company which offers their customers access to the Internet.','http://en.wikipedia.org/wiki/ISP'),(31,'Linux','A Unix-like computer operating system family which uses the Linux kernel and the GNU system utilities and libraries.','http://en.wikipedia.org/wiki/Linux'),(32,'Social Engineering','The art of manipulating people into performing actions or divulging confidential information.','http://en.wikipedia.org/wiki/Social_engineering_(security)'),(33,'History','A record or narrative description of past events.','http://en.wikipedia.org/wiki/History'),(34,'Security Tools','Computer programs useful for maintaining/assessing security on computers and networks.','http://sectools.org/'),(35,'Mind-Body','The interrelationship between physical and mental health.','http://en.wikipedia.org/wiki/Mind-body_connection'),(36,'Graffiti','Images or lettering scratched, scrawled, painted or marked in any manner on property.','http://en.wikipedia.org/wiki/Graffiti'),(37,'Lock Picking','The art of unlocking a lock by analyzing and manipulating the components of the lock device, without the original key.','http://en.wikipedia.org/wiki/Lock_Picking'),(38,'Honeypot','A trap set to detect or deflect attempts at unauthorized use of information systems.','http://en.wikipedia.org/wiki/Honeypot_(computing)'),(39,'Password Cracking','The process of discovering the plaintext of an encrypted computer password.','http://en.wikipedia.org/wiki/Password_cracking'),(40,'Javascript','A scripting language widely used for client-side web development.','http://en.wikipedia.org/wiki/Javascript'),(41,'Computer Security','The protection of information from theft or corruption, or the preservation of availability.','http://en.wikipedia.org/wiki/Computer_Security'),(42,'VoIP','Voice Over Internet Protocol - the transmission technologies for delivery of voice communications over the Internet.','http://en.wikipedia.org/wiki/Voip'),(43,'Telecommunications','The assisted transmission of signals over a distance for the purpose of communication.','http://en.wikipedia.org/wiki/Telecommunications'),(44,'Passwords','A secret word or string of characters that is used for authentication, to prove identity or gain access to a resource.','http://en.wikipedia.org/wiki/Passwords'),(45,'RFID','Radio-Frequency IDentification - an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.','http://en.wikipedia.org/wiki/Rfid'),(46,'Barcode','A bar code is an optical machine-readable representation of data.','http://en.wikipedia.org/wiki/Barcode'),(47,'April Fools\' Day','A day marked by the commission of hoaxes and other practical jokes of varying sophistication on friends, family members, enemies and neighbors.','http://en.wikipedia.org/wiki/April_Fools%27_Day'),(48,'Privacy','The ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively.','http://en.wikipedia.org/wiki/Privacy'),(49,'Proxy','A computer system or an application program that services the requests of its clients by forwarding requests to other servers.','http://en.wikipedia.org/wiki/Proxy_server'),(50,'Stacking','A gang signal made with the hands.','http://en.wikipedia.org/wiki/Gang_signal'),(51,'Alias','An assumed name (pseudonym).',NULL),(52,'Surveillance','Monitoring the behavior of people, objects or processes.','http://en.wikipedia.org/wiki/Surveillance'),(53,'Wikipedia','The free encyclopedia that anyone can edit.','http://en.wikipedia.org/wiki/Wikipedia'),(54,'Warez','Refers primarily to copyrighted works traded in violation of copyright law.','http://en.wikipedia.org/wiki/Warez'),(55,'Darknet','A private virtual network where users connect only to people they trust.','http://en.wikipedia.org/wiki/Darknet_(file_sharing)'),(56,'Satellite TV/radio','Television/radio delivered by the means of communications satellites.','http://en.wikipedia.org/wiki/Satellite_television\r\nhttp://en.wikipedia.org/wiki/Satellite_radio'),(57,'Encryption','The process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.','http://en.wikipedia.org/wiki/Encryption'),(58,'Electronic Voting','Is a term encompassing several different types of voting, embracing both electronic means of casting a vote and electronic means of counting votes.','http://en.wikipedia.org/wiki/Electronic_voting'),(59,'Facebook','A popular, free-access social networking website.','http://en.wikipedia.org/wiki/Facebook'),(60,'Paypal','An e-commerce business allowing payments and money transfers to be made through the Internet. They are a bunch of crooks whose service sucks!','http://en.wikipedia.org/wiki/Paypal'),(61,'DRM','Digital rights management - technologies which provide access control for digital media.','http://en.wikipedia.org/wiki/Digital_rights_management'),(62,'Drugs','Any chemical substance that, when absorbed into the body of a living organism, alters normal bodily function.','http://en.wikipedia.org/wiki/Drugs'),(63,'IDS','Intrusion Detection System - software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network.','http://en.wikipedia.org/wiki/Intrusion_detection_system'),(64,'Web Filtering','Software designed and optimized for controlling what content is permitted to a reader.','http://en.wikipedia.org/wiki/Web_filtering'),(65,'Multiboot','The act of installing multiple operating systems on a computer, and being able to choose which one to boot.','http://en.wikipedia.org/wiki/Multiboot'),(66,'Net Neutrality','A network that is free of restrictions on content, sites, or platforms, on the kinds of equipment that may be attached, and on the modes of communication allowed, as well as one where communication is not unreasonably degraded by other communication streams.','http://en.wikipedia.org/wiki/Net_Neutrality'),(67,'Election','A decision-making process by which a population chooses an individual to hold formal office.','http://en.wikipedia.org/wiki/Election'),(68,'craigslist','A central network of online communities, featuring free online classified advertisements and forums on various topics.','http://en.wikipedia.org/wiki/CraigsList'),(69,'Anonymity','The quality or state of being anonymous; anonymousness.','http://en.wikipedia.org/wiki/Anonymity'),(70,'Dumpster Diving','The practice of sifting through commercial or residential trash to find items that have been discarded by their owners, but which may be useful to the Dumpster diver.','http://en.wikipedia.org/wiki/Dumpster_Diving'),(71,'Quantum computing','A device for computation that makes direct use of quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data.','http://en.wikipedia.org/wiki/Quantum_computing'),(72,'News','The reporting of current information on television and radio, and in newspapers and magazines.','http://en.wikipedia.org/wiki/News'),(73,'Business Intelligence','(BI) refers to skills, knowledge, technologies, applications, quality, risks, security issues and practices used to help a business to acquire a better understanding of the market behavior and business context.','http://en.wikipedia.org/wiki/Business_Intelligence'),(74,'Computer Programming','The process of writing, testing, debugging/troubleshooting, and maintaining the source code of computer programs.','http://en.wikipedia.org/wiki/Computer_Programming'),(75,'File Sharing','The providing and receiving of digital files over a network, usually following the peer-to-peer (P2P) model, where the files are stored on and served by personal computers of the users.','http://en.wikipedia.org/wiki/File_Sharing'),(76,'2600','The Hacker Quarterly magazine.','http://en.wikipedia.org/wiki/2600:_The_Hacker_Quarterly'),(77,'Bit Bucket','Jargon for where lost computerized data has gone - used here as a miscellaneous category.','http://en.wikipedia.org/wiki/Bit_bucket'),(78,'SSH','Secure Shell is a network protocol that allows data to be exchanged using a secure channel between two networked devices.','http://en.wikipedia.org/wiki/Secure_Shell'),(79,'Obfuscation','Deliberately obfuscate code to conceal its purpose, to deter reverse engineering, or as a puzzle or recreational challenge for readers.','http://en.wikipedia.org/wiki/Obfuscation'),(80,'Internet','A global system of interconnected computer networks that interchange data by packet switching using the standardized Internet Protocol Suite (TCP/IP).','http://en.wikipedia.org/wiki/Internet'),(81,'Help Desk','An information and assistance resource that troubleshoots problems with computers or similar products.','http://en.wikipedia.org/wiki/Help_Desk'),(82,'iPod','A brand of portable media players designed and marketed by Apple Inc.','http://en.wikipedia.org/wiki/IPod'),(83,'Access Control','The ability to permit or deny the use of a particular resource by a particular entity.','http://en.wikipedia.org/wiki/Access_Control'),(84,'Application Software','Any tool that functions and is operated by means of a computer, with the purpose of supporting or improving the software user\'s work.','http://en.wikipedia.org/wiki/Application_software'),(85,'TLS','Tansport Layer Security Protocol and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide security and data integrity for communications over TCP/IP networks such as the Internet.','http://en.wikipedia.org/wiki/Transport_Layer_Security'),(86,'SSL','Secure Sockets Layer - see TLS - Transport Layer Security.','http://en.wikipedia.org/wiki/Transport_Layer_Security'),(87,'Man-in-the-middle','A form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection when in fact the entire conversation is controlled by the attacker.','http://en.wikipedia.org/wiki/Man-in-the-middle'),(88,'Law','A system of rules, enforced through a set of institutions, used as an instrument to underpin civil obedience, politics, economics and society.','http://en.wikipedia.org/wiki/Law'),(89,'RF','Radio frequency - a frequency or rate of oscillation within the range of about 3 Hz to 300 GHz.','http://en.wikipedia.org/wiki/Radio_frequency'),(90,'ATM','Automated teller machine is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller.','http://en.wikipedia.org/wiki/Automated_teller_machine'),(91,'WPA','Wi-Fi Protected Access is a certification program administered by the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks.','http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access'),(92,'Communication','The process to impart information from a sender to a receiver with the use of a medium.','http://en.wikipedia.org/wiki/Communication'),(93,'Technology','Usage and knowledge of tools and crafts, and how it affects an animal species\' ability to control and adapt to its environment.','http://en.wikipedia.org/wiki/Technology'),(94,'Hacktivism','The use of computers and computer networks as a means of protest to promote political ends or the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends.','http://en.wikipedia.org/wiki/Hacktivism'),(95,'Identity Theft','A term used to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits.','http://en.wikipedia.org/wiki/Identity_Theft'),(96,'Politics','The process by which groups of people make decisions.','http://en.wikipedia.org/wiki/Politics'),(97,'Cross-site Scripting','(XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users.','http://en.wikipedia.org/wiki/Cross-site_Scripting'),(99,'Hacker','One who discovers and implements a hack.','http://en.wikipedia.org/wiki/Hacker_(programmer_subculture)'),(100,'Caller ID','A telephone service, available on POTS lines, that transmits a caller\'s number to the called party\'s telephone equipment during the ringing signal, or when the call is being set up but before the call is answered.','http://en.wikipedia.org/wiki/Caller_id'),(101,'Physical Security','Measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media.','http://en.wikipedia.org/wiki/Physical_security'),(102,'Spyware','Computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user\'s interaction with the computer, without the user\'s informed consent.','http://en.wikipedia.org/wiki/Spyware'),(103,'Steganography','The art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message, a form of security through obscurity.','http://en.wikipedia.org/wiki/Steganography'),(104,'MAC address','Media Access Control address is a quasi-unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification.','http://en.wikipedia.org/wiki/MAC_address'),(105,'Remote access','Refers to remote desktop, remote terminal (like telnet) or any type of remote application (including remote browser).','http://en.wikipedia.org/wiki/Remote_desktop_software'),(106,'TCP/IP','Transmission Control Protocol (TCP) and/or Internet Protocol (IP), the set of communications protocols used for the Internet and other similar networks.','http://en.wikipedia.org/wiki/TCP/IP'),(107,'AIM','AOL Instant Messenger (AIM) is an instant messaging and presence computer program which uses the proprietary OSCAR instant messaging protocol and the TOC protocol to allow registered users to communicate in real time.','http://en.wikipedia.org/wiki/AOL_Instant_Messenger'),(108,'IP phone','Uses Voice over IP technologies to allow telephone calls to be made over an IP network.','http://en.wikipedia.org/wiki/IP_Phone'),(109,'WAP','Wireless Application Protocol is an open international standard for application layer network communications in a wireless communication environment.','http://en.wikipedia.org/wiki/Wireless_Application_Protocol'),(110,'Spam','The abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately.','http://en.wikipedia.org/wiki/Spam_(electronic)'),(111,'Magnetic stripe card','A type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card.','http://en.wikipedia.org/wiki/Magnetic_stripe_card'),(112,'Locksmithing','The science and art of making and defeating locks.','http://en.wikipedia.org/wiki/Locksmithing'),(113,'Copyright infringement','The unauthorized use of material that is covered by copyright law, in a manner that violates one of the copyright owner\'s exclusive rights.','http://en.wikipedia.org/wiki/Copyright_infringement'),(114,'Hacker Happenings','Conferences or events of interest to hackers.',NULL),(115,'Certificate Authority','A certificate authority or certification authority (CA) is an entity that issues digital certificates for use by other parties.','http://en.wikipedia.org/wiki/Certificate_authority'),(116,'RPC','Remote procedure call, a network protocol that allows a computer program running on one host to cause code to be executed on another host.','http://en.wikipedia.org/wiki/Remote_procedure_call'),(117,'Video game console','An interactive entertainment computer or electronic device that produces a video display signal which can be used with a display device (a television, monitor, etc.) to display a video game.','http://en.wikipedia.org/wiki/Video_game_console'),(118,'DoS','Denial-of-service attack is an attempt to make a computer resource unavailable to its intended users.','http://en.wikipedia.org/wiki/DoS'),(119,'Biometrics','Methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.','http://en.wikipedia.org/wiki/Biometrics'),(120,'Keystroke logging','Often called keylogging, is the practice of noting (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.','http://en.wikipedia.org/wiki/Keystroke_logging'),(121,'DHCP','Dynamic Host Configuration Protocol is a network application protocol used by devices (DHCP clients) to obtain configuration information for operation in an Internet Protocol network.','http://en.wikipedia.org/wiki/Dhcp'),(122,'Telemarketing','A method of direct marketing in which a salesperson solicits to prospective customers to buy products or services over the phone.','http://en.wikipedia.org/wiki/Telemarketing'),(123,'Book Review','A form of literary criticism in which a book is analyzed based on content, style, and merit.','http://en.wikipedia.org/wiki/Book_Review'),(124,'AppleTalk','A proprietary suite of protocols developed by Apple Inc for networking computers.','http://en.wikipedia.org/wiki/AppleTalk'),(125,'Pirate radio','Refers to illegal or unregulated radio transmissions.','http://en.wikipedia.org/wiki/Pirate_radio'),(126,'Reconnaissance','(also scouting) is a military and medical term denoting exploration conducted to gain information.','http://en.wikipedia.org/wiki/Reconnaissance'),(127,'ARP','Address Resolution Protocol (ARP) is the method for finding a host\'s link layer (hardware) address when only its Internet Layer (IP) or some other Network Layer address is known.','http://en.wikipedia.org/wiki/Address_Resolution_Protocol'),(128,'Cybercrime','Generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime.','http://en.wikipedia.org/wiki/Cybercrime'),(129,'PKI','Public Key Infrastructure is a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates.','http://en.wikipedia.org/wiki/Public_key_infrastructure'),(130,'Cryptography','(or cryptology) is the practice and study of hiding information.','http://en.wikipedia.org/wiki/Cryptography'),(131,'Big Brother','General term to describe any overly-inquisitive or overly-controlling authority figure or attempts by government to increase surveillance.','http://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)'),(132,'Hardware specific','Refers to a specific piece or pieces of hardware.',NULL),(133,'Hacking tool','A program/hardware designed to assist with hacking,','http://en.wikipedia.org/wiki/Hacking_tool'),(134,'email','Electronic mail is a method of exchanging digital messages using a store-and-forward model in which e-mail computer server systems accept, forward, deliver and store messages on behalf of users.','http://en.wikipedia.org/wiki/Email'),(135,'Software cracking','The modification of software to remove protection methods: copy protection, trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like nag screens and adware.','http://en.wikipedia.org/wiki/Software_cracking'),(136,'Mischief','A vexatious or annoying action, or, conduct or activity that playfully causes petty annoyance. ','http://en.wikipedia.org/wiki/Mischief'),(137,'Software specific','Refers to a specific version or versions of software.',NULL),(138,'UNIX','A computer operating system originally developed in 1969 by AT&T at Bell Labs. Today\'s Unix systems are split into various branches, developed over time by AT&T as well as various commercial vendors and non-profit organizations.','http://en.wikipedia.org/wiki/Unix'),(139,'Movie Review','The analysis and evaluation of films.','http://en.wikipedia.org/wiki/Movie_review'),(140,'War Dialing','A technique of using a modem to automatically scan a list of telephone numbers for computers, BBS systems and fax machines.','http://en.wikipedia.org/wiki/War_dialing'),(141,'BBS','A Bulletin Board System is a computer system running software that allows users to connect and log in to the system using a terminal program. Once logged in, a user can perform functions such as uploading and downloading software and data, reading news and bulletins, and exchanging messages with other users, either through electronic mail or in public message boards. ','http://en.wikipedia.org/wiki/Bulletin_Board_System'),(142,'Interview','A conversation between two or more people (the interviewer and the interviewee) where questions are asked by the interviewer to obtain information from the interviewee.','http://en.wikipedia.org/wiki/Interview'),(143,'Operating System','An interface between hardware and user which is responsible for the management and coordination of activities and the sharing of the resources of a computer, that acts as a host for computing applications run on the machine.','http://en.wikipedia.org/wiki/Operating_system'),(144,'Rootkit','A software system that consists of one or more programs designed to obscure the fact that a system has been compromised.','http://en.wikipedia.org/wiki/Root_kit'),(145,'Point of Sale','(POS) the hardware and software used for checkouts, the equivalent of an electronic cash register.','http://en.wikipedia.org/wiki/Point_of_sale'),(146,'Computer Worm','A self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network).','http://en.wikipedia.org/wiki/Computer_worm'),(147,'ARPANET','Advanced Research Projects Agency Network, created by the Defense Advanced Research Projects Agency (DARPA) of the United States Department of Defense, was the world\'s first operational packet switching network, and the predecessor of the contemporary global Internet.','http://en.wikipedia.org/wiki/Arpanet'),(148,'Bluetooth','A proprietary open wireless technology standard for exchanging data over short distances.','http://en.wikipedia.org/wiki/Bluetooth'),(149,'Phishing','The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. ','https://secure.wikimedia.org/wikipedia/en/wiki/Phishing'),(150,'IPv6','A version of the Internet Protocol that is designed to succeed Internet Protocol version 4 (IPv4) because it has a vastly larger address space.','https://secure.wikimedia.org/wikipedia/en/wiki/Ipv6'),(151,'Robotics','The engineering science and technology of robots, and their design, manufacture, application, and structural disposition.','https://secure.wikimedia.org/wikipedia/en/wiki/Robotics'),(152,'Geolocation','The identification of the real-world geographic location of an object, such as a radar, mobile phone or an Internet-connected computer terminal.','https://secure.wikimedia.org/wikipedia/en/wiki/Geolocation'),(153,'E-Book','An electronic book is a text and image-based publication in digital form produced on, published by, and readable on computers or other digital devices.','https://secure.wikimedia.org/wikipedia/en/wiki/E-book'),(154,'Electronic Money','Also known as e-currency, e-money, electronic cash, electronic currency, digital money, digital cash, digital currency, cyber currency - refers to money or scrip which is only exchanged electronically.','https://secure.wikimedia.org/wikipedia/en/wiki/Electronic_money'),(155,'Hardware Hacking','Includes building, rebuilding, modifying (modding), and creating electronic hardware, either to make it better, faster, to give it added features or to make it do something it was never intended to do.','https://secure.wikimedia.org/wikipedia/en/wiki/Hardware_hacking'),(156,'Cyberwar','Politically motivated hacking to conduct sabotage and espionage, a form of information warfare.','https://secure.wikimedia.org/wikipedia/en/wiki/Cyberwar'),(157,'Home Automation','Centralized control of lighting, HVAC, appliances, and other systems, to provide improved convenience, comfort, energy efficiency and security.','https://en.wikipedia.org/wiki/Home_automation'),(158,'Virtualization','Virtualization (or virtualisation) is the simulation of the software and/or hardware upon which other software runs.','http://en.wikipedia.org/wiki/Virtualization'),(159,'Web Crawler (spider)','','https://en.wikipedia.org/wiki/Web_crawler'),(160,'VPN','Virtual Private Network','https://en.wikipedia.org/wiki/Vpn'),(161,'Twitter','An online social networking service and microblogging service that enables its users to send and read text-based messages of up to 140 characters, known as \'tweets\'.','https://en.wikipedia.org/wiki/Twitter'),(162,'Raspberry Pi','A credit-card-sized single-board computer developed in the UK by the Raspberry Pi Foundation with the intention of promoting the teaching of basic computer science in schools.','https://en.wikipedia.org/wiki/Raspberry_Pi'),(163,'Bitcoin','A cryptocurrency where the creation and transfer of bitcoins is based on an open-source cryptographic protocol that is independent of any central authority.','https://en.wikipedia.org/wiki/Bitcoin'),(164,'Cloud computing','Colloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet','https://en.wikipedia.org/wiki/Cloud_computing'),(165,'Pivoting','Use of a compromised system to attack other systems.','https://en.wikipedia.org/wiki/Exploit_%28computer_security%29#Pivoting'),(166,'Android','An operating system based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablet computers. Initially developed by Android, Inc., which was purchased by Google.','https://en.wikipedia.org/wiki/Android_%28operating_system%29'),(167,'Wardriving','Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA).','https://en.wikipedia.org/wiki/Wardriving'),(168,'HTML5','HTML5 is a core technology markup language of the Internet used for structuring and presenting content for the World Wide Web.','https://en.wikipedia.org/wiki/HTML5'),(169,'Malware','Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems','https://en.wikipedia.org/wiki/Malware'),(170,'WARC','Web ARChive format','https://en.wikipedia.org/wiki/Web_ARChive'),(171,'Meshnet','A mesh network is a network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network.','https://en.wikipedia.org/wiki/Meshnet'),(172,'Internet Leak','An Internet leak occurs when a party\'s confidential information is released to the public on the Internet.','https://en.wikipedia.org/wiki/Internet_leak'),(173,'Historical Document','Historical documents are original documents that contain important historical information about a person, place, or event.','https://en.wikipedia.org/wiki/Historical_document'),(174,'Communications satellite','A communications satellite is an artificial satellite that relays and amplifies radio telecommunications signals via a transponder.','https://en.wikipedia.org/wiki/Communications_satellite'),(175,'Two-factor authentication.','A method of confirming a user\'s claimed identity by utilizing a combination of two different components (also known as 2FA).','https://en.wikipedia.org/wiki/2_factor_authentication'),(176,'I2P','The Invisible Internet Project (I2P) is an anonymous network layer that allows for censorship-resistant, peer to peer communication.','https://en.wikipedia.org/wiki/I2P'),(177,'Botnet','A number of Internet-connected devices, each of which is running one or more bots.','https://en.wikipedia.org/wiki/Botnet'),(178,'Whistleblower','A person who exposes any kind of information or activity that is deemed illegal, unethical, or not correct within an organization that is either private or public.','https://en.wikipedia.org/wiki/Whistleblower'); /*!40000 ALTER TABLE `Keywords` ENABLE KEYS */; UNLOCK TABLES; -- -- Dumping data for table `Links` -- LOCK TABLES `Links` WRITE; /*!40000 ALTER TABLE `Links` DISABLE KEYS */; INSERT INTO `Links` VALUES (1,1271,'http://dualisanoob.com','Author\'s web site.',NULL,'Ok','2008-11-04 13:58:57','N','Y','2009-07-25 15:11:01','O','http://dualisanoob.com',NULL,NULL),(2,1271,'http://www.bellsmind.net/Bells_Mind/Welcome.html','Despite what you may think, phreaking is not dead.',NULL,'Ok','2008-11-04 13:58:58','N','Y','2009-07-25 15:11:02','O','http://www.bellsmind.net/Bells_Mind/Welcome.html',NULL,NULL),(3,1270,'http://www.thelasthope.org','Hope 2008.',NULL,'Ok','2008-11-04 13:58:58','N','Y','2009-07-25 15:11:07','O','http://www.thelasthope.org',NULL,NULL),(4,1270,'http://www.thenexthope.org','Hope 2010.',NULL,'Ok','2008-11-04 13:58:59','N','Y','2009-07-25 15:11:09','O','http://www.thenexthope.org',NULL,NULL),(5,1276,'http://www.geisterstunde.org/widget','Code examples.',NULL,'Ok','2008-11-04 13:59:00','N','Y','2009-07-25 15:11:11','O','http://www.geisterstunde.org/widget',NULL,NULL),(6,1276,'http://geisterstunde.org/files','Screenshots and other things author has captured.',NULL,'Ok','2008-11-04 13:59:01','N','Y','2009-07-25 15:11:12','O','http://geisterstunde.org/files',NULL,NULL),(7,1276,'http://www.geisterstunde.org/widget/WidgetInspector.zip','Author\'s widget inspector tool.',NULL,'Ok','2008-11-04 13:59:01','N','Y','2009-07-25 15:11:13','O','http://www.geisterstunde.org/widget/WidgetInspector.zip',NULL,NULL),(8,1277,'http://en.wikipedia.org/wiki/Red_Team','Wikipedia definition.',NULL,'Ok','2008-11-04 13:59:02','N','Y','2009-07-25 15:11:16','O','http://en.wikipedia.org/wiki/Red_Team',NULL,NULL),(9,1279,'http://www.angusj.com/resourcehacker/','Resourcehacker web site.',NULL,'Ok','2008-11-04 13:59:03','N','Y','2009-07-25 15:11:22','O','http://www.angusj.com/resourcehacker/',NULL,NULL),(10,1280,'http://www.bleep.com/','MP3 purchase web site.',NULL,'Ok','2008-11-04 13:59:04','N','Y','2009-07-25 15:12:03','O','http://www.bleep.com/',NULL,NULL),(11,1281,'http://www.provantage.com/imation-18405-73MDS2J1.htm','Imation 18405',NULL,'Ok','2008-11-04 13:59:04','N','Y','2009-07-25 15:12:10','O','http://www.provantage.com/imation-18405-73MDS2J1.htm',NULL,NULL),(12,1281,'http://www.imation.com/support/drivers/ImationLOCK.exe','Lock.exe download location.',NULL,'Ok','2008-11-04 13:59:05','N','Y','2009-07-25 15:12:21','O','http://www.imation.com/support/drivers/ImationLOCK.exe',NULL,NULL),(13,1281,'http://www.runtime.org/data-recovery-software.htm/','GetBackDataForFat info.',NULL,'Ok','2008-11-04 13:59:05','N','Y','2009-07-25 15:12:26','O','http://www.runtime.org/data-recovery-software.htm/',NULL,NULL),(14,1282,'http://syndk8.net','Blackhat SEO resource.',NULL,'Ok','2008-11-04 13:59:06','N','Y','2009-07-25 15:12:33','O','http://syndk8.net',NULL,NULL),(15,1282,'http://bluehatseo.com','Link building/indexing service.',NULL,'Ok','2008-11-04 13:59:06','N','Y','2009-07-25 15:12:53','O','http://bluehatseo.com',NULL,NULL),(16,1282,'http://forums.digitalpoint.com','Whitehat forum.',NULL,'Ok','2008-11-04 13:59:10','N','Y','2009-07-25 15:13:02','O','http://forums.digitalpoint.com',NULL,NULL),(17,1282,'http://snippets.dzone.com/posts/show/3329/','PHP ping script.',NULL,'Ok','2008-11-04 13:59:12','N','Y','2009-07-25 15:13:06','O','http://snippets.dzone.com/posts/show/3329/',NULL,NULL),(18,1282,'http://getyacg.com/','Yet Another Content Generator.',NULL,'Ok','2008-11-04 13:59:12','N','Y','2009-07-25 15:13:23','O','http://getyacg.com/',NULL,NULL),(19,1283,'http://hackerspaces.org/','This website is for everyone who started or wants to start their',NULL,'Ok','2008-11-04 13:59:14','N','Y','2009-07-25 15:13:35','O','http://hackerspaces.org/',NULL,NULL),(20,1284,'http://insecure.org/','nmap.',NULL,'Ok','2008-11-04 13:59:15','N','Y','2009-07-25 15:13:50','O','http://insecure.org/',NULL,NULL),(21,1287,'http://wireless.att.com/','Wireless from AT&T website.',NULL,'Ok','2008-11-04 13:59:16','N','Y','2009-07-25 15:14:16','O','http://wireless.att.com/',NULL,NULL),(22,1274,'http://www.google-analytics.com/','Google analytics website.',NULL,'Ok','2008-11-04 13:59:18','N','Y','2009-07-25 15:14:24','O','http://www.google-analytics.com/',NULL,NULL),(23,1248,'http://tools.tampabay.rr.com','Change location (ie. tampabay) to your geographical region.',NULL,'Ok','2008-11-04 13:59:20','N','Y','2009-07-25 15:22:33','O','http://tools.tampabay.rr.com',NULL,NULL),(24,1249,'http://www.wayport.net/','Wayport website.',NULL,'Ok','2008-11-04 13:59:22','N','Y','2009-07-25 15:22:49','O','http://www.wayport.net/',NULL,NULL),(25,1249,'http://www.kaboodle.org/','Kaboodle website.',NULL,'Ok','2008-11-04 14:22:18','N','Y','2009-07-25 15:22:57','O','http://www.kaboodle.org/',NULL,NULL),(26,1249,'http://tmac.technitium.com/tmac/','Technitium MAC Address Changer.',NULL,'Ok','2008-11-04 13:59:23','N','Y','2009-07-25 15:23:00','O','http://tmac.technitium.com/tmac/',NULL,NULL),(27,1251,'http://www.nowsms.com/discus/messages/1/1103.html','This message board thread provides a detailed description and li',NULL,'Ok','2008-11-04 13:59:24','N','Y','2009-07-25 15:23:04','O','http://www.nowsms.com/discus/messages/1/1103.html',NULL,NULL),(28,1251,'http://www.nortel.com/solutions/wireless/collateral/nn117101.pdf','Nortel white paper for the NSS19 HLR platform.',NULL,'Ok','2008-11-04 13:59:24','N','Y','2009-07-25 15:23:05','O','http://www.nortel.com/solutions/wireless/collateral/nn117101.pdf',NULL,NULL),(29,1251,'http://www.eventhelix.com/RealtimeMantra/Telecom/','Detailed flowcharts of common GSM call flows and sequences.',NULL,'Ok','2008-11-04 13:59:25','N','Y','2009-07-25 15:23:19','O','http://www.eventhelix.com/RealtimeMantra/Telecom/',NULL,NULL),(30,1251,'http://en.wikipedia.org/wiki/GSM_services','Well-written Wikipedia article outlining consumer services avail',NULL,'Ok','2008-11-04 13:59:25','N','Y','2009-07-25 15:23:22','O','http://en.wikipedia.org/wiki/GSM_services',NULL,NULL),(31,1254,'http://www.hping.org','hping website.',NULL,'Ok','2008-11-10 08:38:22','N','Y','2009-07-25 15:23:26','O','http://www.hping.org',NULL,NULL),(32,1255,'http://conlangs.berkeley.edu','Language Creation Conference.',NULL,'Ok','2008-11-10 08:38:23','N','Y','2009-07-25 15:23:31','O','http://conlangs.berkeley.edu',NULL,NULL),(33,1257,'http://www.worldwideblackbookproject.com','Black book project website.',NULL,'Ok','2008-11-10 08:38:24','N','Y','2009-07-25 15:23:31','O','http://www.worldwideblackbookproject.com',NULL,NULL),(34,1258,'http://www.toool.nl/blackbag','Author\'s weblog.',NULL,'Ok','2008-11-10 08:38:25','N','Y','2009-07-25 15:24:02','O','http://www.toool.nl/blackbag',NULL,NULL),(37,1259,'http://www.truecrypt.com','Free open-source disk encryption software for Windows Vista/XP, ',NULL,'Ok','2008-11-10 08:38:26','N','Y','2009-07-25 15:24:03','O','http://www.truecrypt.com',NULL,NULL),(38,1259,'http://www.damnsmalllinux.org','Damns Small Linux distribution.',NULL,'Ok','2008-11-10 08:38:27','N','Y','2009-07-25 15:24:05','O','http://www.damnsmalllinux.org',NULL,NULL),(39,1259,'http://www.qemu.org','QEMU open source machine emulator and virtualizer.',NULL,'Ok','2008-11-10 08:38:29','N','Y','2009-07-25 15:24:06','O','http://www.qemu.org',NULL,NULL),(40,1261,'http://www.ncsl.org/programs/lis/CIP/hacklaw.htm','A compilation of the different U.S. state\'s computer laws.',NULL,'Ok','2008-11-13 17:38:05','N','Y','2009-07-25 15:24:19','O','http://www.ncsl.org/programs/lis/CIP/hacklaw.htm',NULL,NULL),(41,1262,'http://www.bigtrapeze.com/md5','Working model.',NULL,'Ok','2008-11-13 17:38:06','N','Y','2009-07-25 15:24:20','O','http://www.bigtrapeze.com/md5',NULL,NULL),(42,1265,'http://metasploit.com/users/hdm/tools/debian-openssl','Precomputed keys and further info.',NULL,'Ok','2008-11-13 17:38:07','N','Y','2009-07-25 15:24:23','O','http://metasploit.com/users/hdm/tools/debian-openssl',NULL,NULL),(43,1268,'http://www.channelregister.co.uk/2007/12/21/dwindling_antivirus_protection','Anti-virus protection gets worse.',NULL,'Ok','2008-11-13 17:38:07','N','Y','2009-07-25 15:24:33','O','http://www.channelregister.co.uk/2007/12/21/dwindling_antivirus_protection',NULL,NULL),(44,1268,'http://www.infoworld.com/cgi-bin/redirect?source=rss&url=http://www.infoworld.com/article/07/12/14/Unix-admin-tried-to-axe-power-grid_1.html','Unix admin tried to axe power grid.',NULL,'Ok','2008-11-13 17:38:08','N','Y','2009-07-25 15:24:39','O','http://www.infoworld.com/cgi-bin/redirect?source=rss&url=http://www.infoworld.com/article/07/12/14/Unix-admin-tried-to-axe-power-grid_1.html',NULL,NULL),(45,1268,'http://rootkit.com/newsread.php?newsid=778','Haxdoors of the Kaspersky Antivirus 6/7.',NULL,'Ok','2008-11-13 17:38:08','N','Y','2009-07-25 15:24:40','O','http://rootkit.com/newsread.php?newsid=778',NULL,NULL),(46,1268,'http://www.businessweek.com/technology/content/jun2005/tc20050617_1613_tc024.htm','Computers Insecure Security.',NULL,'Ok','2008-11-13 17:38:09','N','Y','2009-07-25 15:24:48','O','http://www.businessweek.com/technology/content/jun2005/tc20050617_1613_tc024.htm',NULL,NULL),(47,1224,'http://www.counterpath.com','X-Lite softphone.',NULL,'Ok','2008-11-25 10:18:24','N','Y','2009-07-25 15:25:19','O','http://www.counterpath.com',NULL,NULL),(48,1224,'http://www.voxalot.com','Free VoIP service provider',NULL,'Ok','2008-11-25 10:18:25','N','Y','2009-07-25 15:25:28','O','http://www.voxalot.com',NULL,NULL),(49,1224,'http://www.sipbroker.com','List of peer networks.',NULL,'Ok','2008-11-25 10:18:26','N','Y','2009-07-25 15:25:32','O','http://www.sipbroker.com',NULL,NULL),(51,1224,'http://www.ipkall.com','Free DID.',NULL,'Ok','2008-11-25 10:18:26','N','Y','2009-07-25 15:25:34','O','http://www.ipkall.com',NULL,NULL),(52,1224,'http://www.callcentric.com','VoIP service provider.',NULL,'Ok','2008-11-25 10:18:27','N','Y','2009-07-25 15:25:42','O','http://www.callcentric.com',NULL,NULL),(53,1224,'http://www.pennytel.com','VoIP service provider.',NULL,'Ok','2008-11-25 10:18:28','N','Y','2009-07-25 15:25:43','O','http://www.pennytel.com',NULL,NULL),(54,1224,'http://www.e164.org','ENUM registry.',NULL,'Ok','2008-11-25 10:18:28','N','Y','2009-07-25 15:25:44','O','http://www.e164.org',NULL,NULL),(55,1224,'http://www.voip-info.org','A nice repository of VoIP information.',NULL,'Ok','2008-11-25 10:18:30','N','Y','2009-07-25 15:25:46','O','http://www.voip-info.org',NULL,NULL),(56,1225,'http://freeworlddialup.com','FWD account.',NULL,'Ok','2008-11-25 10:18:31','N','Y','2009-07-25 15:25:47','O','http://freeworlddialup.com',NULL,NULL),(57,1225,'http://www.skype.com','VoIP service provider.',NULL,'Ok','2008-11-25 10:18:31','N','Y','2009-07-25 15:26:15','O','http://www.skype.com',NULL,NULL),(58,1225,'http://vital.pri.ee/PSTN','Skype VoIP adapter schematic.',NULL,'Ok','2008-11-25 10:18:33','N','Y','2009-07-25 15:26:19','O','http://vital.pri.ee/PSTN',NULL,NULL),(59,1227,'http://www.etccampaign.com','Equitable Telephone Charges campaign.',NULL,'Ok','2008-11-25 10:18:33','N','Y','2009-07-25 15:26:25','O','http://www.etccampaign.com',NULL,NULL),(60,1227,'http://www.globaltelllink.com','Largest provider of prison telephone services in US.',NULL,'Ok','2008-11-25 10:18:36','N','Y','2009-07-25 15:26:25','O','http://www.globaltelllink.com',NULL,NULL),(61,1227,'http://www.securustech.net','Securus Technologies (parent company of Correctional Billing Ser',NULL,'Ok','2008-11-25 10:18:36','N','Y','2009-07-25 15:26:30','O','http://www.securustech.net',NULL,NULL),(62,1227,'http://www.texasinmatephones.com','Texas Inmate Phones, manufacturer of the TIP 2000.',NULL,'Ok','2008-11-25 10:18:37','N','Y','2009-07-25 15:26:36','O','http://www.texasinmatephones.com',NULL,NULL),(63,1230,'http://infonomicon.org/rfid/Live%20Stores.xls','Spreadsheet of Walmart locations using RFID.',NULL,'Err','2009-01-07 14:58:24','N','N',NULL,'O','http://infonomicon.org/rfid/Live%20Stores.xls',NULL,NULL),(64,1230,'http://infonomicon.org/rfid/RFID%20Guidelines%20and%20Requirements.pdf','EPCC and Walmart mandates and guidelines.',NULL,'Err','2009-01-07 14:58:42','N','N',NULL,'O','http://infonomicon.org/rfid/RFID%20Guidelines%20and%20Requirements.pdf',NULL,NULL),(65,1230,'http://technoriversoft.com/doc/smartrfid.pdf','RFID coding schemes.',NULL,'Ok','2008-11-25 10:19:12','N','Y','2009-07-25 15:26:37','O','http://technoriversoft.com/doc/smartrfid.pdf',NULL,NULL),(66,1230,'http://infonomicon.org/rfid/epc-standards.pdf','Decoding EPC information.',NULL,'Err','2009-01-07 14:59:00','N','N',NULL,'O','http://infonomicon.org/rfid/epc-standards.pdf',NULL,NULL),(67,1231,'http://developers.sun.com/solaris/articles/lib_interposers.html','Debugging and Performance Tuning with Library Interposers.',NULL,'Ok','2008-11-26 14:34:38','N','Y','2009-07-25 15:26:51','O','http://developers.sun.com/solaris/articles/lib_interposers.html',NULL,NULL),(68,1231,'http://packetstormsecurity.org/UNIX/misc/fakedate-v1.0.tar.gz','Program to defeat time-locked demo-program protection.',NULL,'Ok','2008-11-26 14:34:38','N','Y','2009-07-25 15:26:52','O','http://packetstormsecurity.org/UNIX/misc/fakedate-v1.0.tar.gz',NULL,NULL),(69,1231,'http://neworder.box.sk/newsread.php?newsid=13857','Reverse Engineering with LD_PRELOAD.',NULL,'Ok','2008-11-26 14:34:39','N','Y','2009-07-25 15:27:01','O','http://neworder.box.sk/newsread.php?newsid=13857',NULL,NULL),(70,1231,'http://uberhip.com/godber/interception/index.html','Linux Function Interception.',NULL,'Ok','2008-11-26 14:34:39','N','Y','2009-07-25 15:27:02','O','http://uberhip.com/godber/interception/index.html',NULL,NULL),(71,1233,'http://www.silic0nsilence.com','Author\'s web site.',NULL,'Ok','2008-11-26 14:37:02','N','Y','2009-07-25 15:27:03','O','http://www.silic0nsilence.com',NULL,NULL),(72,1234,'http://www.allofmp3.com','MP3 web site.',NULL,'Ok','2008-12-25 10:51:14','N','Y','2009-07-25 15:30:33','O','http://www.allofmp3.com',NULL,NULL),(73,1234,'http://www.10minutemail.com','Temporary email web site.',NULL,'Ok','2008-11-30 09:45:58','N','Y','2009-07-25 15:30:33','O','http://www.10minutemail.com',NULL,NULL),(74,1235,'http://www.SearchFeed.com','Per click search engine advertiser.',NULL,'Ok','2008-11-30 09:45:59','N','Y','2009-07-25 15:30:39','O','http://www.SearchFeed.com',NULL,NULL),(75,1236,'http://ipid.shat.net','To get an idea about what websites/search engines know about you',NULL,'Ok','2008-11-30 09:46:00','N','Y','2009-07-25 15:30:40','O','http://ipid.shat.net',NULL,NULL),(76,1236,'http://www.worldprivacyforum.org','World Privacy Forum.',NULL,'Ok','2008-11-30 09:46:00','N','Y','2009-07-25 15:30:44','O','http://www.worldprivacyforum.org',NULL,NULL),(77,1237,'http://opennet.net/country/iran','Iran appears to be using Secure Computing filtering.',NULL,'Ok','2008-11-30 10:18:16','Y','Y','2009-07-25 15:30:59','O','http://www.opennetinitiative.net/studies/iran',NULL,NULL),(78,1237,'http://httpd.apache.org/docs','The Apache httpd documentation.',NULL,'Ok','2008-11-30 09:46:01','N','Y','2009-07-25 15:31:00','O','http://httpd.apache.org/docs',NULL,NULL),(79,1237,'http://addons.mozilla.org/en-US/firefox/addon/125','SwitchProxy Firefox plugin.',NULL,'Ok','2008-11-30 09:46:03','N','Y','2009-07-25 15:31:40','O','http://addons.mozilla.org/en-US/firefox/addon/125',NULL,NULL),(80,1237,'http://www.agroman.net/corkscrew','Corkscrew helper program.',NULL,'Ok','2008-11-30 09:46:04','N','Y','2009-07-25 15:31:41','O','http://www.agroman.net/corkscrew',NULL,NULL),(81,1239,'http://en.wikipedia.org/wiki/1-8-7','Section 187 of the California Penal Code is murder.',NULL,'Ok','2008-12-01 08:19:22','N','Y','2009-07-25 15:31:46','O','http://en.wikipedia.org/wiki/1-8-7',NULL,NULL),(82,1239,'http://www.youtube.com/watch?v=6B4MDVIsLN0','Latin Kings.',NULL,'Ok','2008-12-01 08:19:23','N','Y','2009-07-25 15:31:50','O','http://www.youtube.com/watch?v=6B4MDVIsLN0',NULL,NULL),(83,1239,'http://www.chicagogangs.org/index.php?pr=HAND_MAIN&nosessionkill=1','Hand Signs.',NULL,'Ok','2008-12-01 08:19:24','N','Y','2009-07-25 15:31:55','O','http://www.chicagogangs.org/index.php?pr=HAND_MAIN&nosessionkill=1',NULL,NULL),(84,1239,'http://www.youtube.com/watcth?v=V-4jJAK767E','Imperial Gangster.',NULL,'Ok','2008-12-01 08:19:25','N','Y','2009-07-25 15:31:57','O','http://www.youtube.com/watcth?v=V-4jJAK767E',NULL,NULL),(85,1239,'http://www.youtube.com/watcth?v=SiDaXAA5hyk','World\'s fastest \"Blood\" hand sign.',NULL,'Ok','2008-12-01 08:19:26','N','Y','2009-07-25 15:31:59','O','http://www.youtube.com/watcth?v=SiDaXAA5hyk',NULL,NULL),(86,1239,'http://jeroenarendsen.nl/2007/01/ms13-and-other-gangs-gestures','MS13 Stack.',NULL,'Ok','2008-12-25 10:51:15','N','Y','2009-07-25 15:32:10','O','http://jeroenarendsen.nl/2007/01/ms13-and-other-gangs-gestures',NULL,NULL),(87,1239,'http://www.youtube.com/watcth?v=1S2nBKQayVM','Chi Town Gangstaz.',NULL,'Ok','2008-12-01 08:19:27','N','Y','2009-07-25 15:32:12','O','http://www.youtube.com/watcth?v=1S2nBKQayVM',NULL,NULL),(88,1239,'http://www.youtube.com/watcth?v=qZOzIQkMwKc','MY NIGGA LIL B 5TACKIN BBBBBLLLLLAAAAATTTTT.',NULL,'Ok','2008-12-01 08:19:28','N','Y','2009-07-25 15:32:14','O','http://www.youtube.com/watcth?v=qZOzIQkMwKc',NULL,NULL),(89,1240,'http://www.snom.com/download/share/snom-Outlook-Addin.zip','Download the Snom Outlook add-in.',NULL,'Ok','2008-12-01 14:32:58','N','Y','2009-07-25 15:32:31','O','http://www.snom.com/download/share/snom-Outlook-Addin.zip',NULL,NULL),(90,1240,'http://wiki.snom.com/Outlook_Add_In','Snom add-in screenshots and configuration guidelines.',NULL,'Ok','2008-12-01 14:32:59','N','Y','2009-07-25 15:32:47','O','http://wiki.snom.com/Outlook_Add_In',NULL,NULL),(91,1241,'http://en.wikipedia.org/wiki/Data_retention','Wikipedia - Telecommunications data retention.',NULL,'Ok','2008-12-01 14:32:59','N','Y','2009-07-25 15:32:48','O','http://en.wikipedia.org/wiki/Data_retention',NULL,NULL),(92,1241,'http://www.breyers.de','Telecommunications Data Retention and Human Rights (1).',NULL,'Ok','2008-12-01 14:33:00','N','Y','2009-07-25 15:32:49','O','http://www.breyers.de',NULL,NULL),(93,1241,'http://www.tkg-verfassungsbeschwerde.de/data_retention_and_human_rights_essay.pdf','Telecommunications Data Retention and Human Rights (2).',NULL,'Ok','2008-12-01 14:33:01','N','Y','2009-07-25 15:32:51','O','http://www.tkg-verfassungsbeschwerde.de/data_retention_and_human_rights_essay.pdf',NULL,NULL),(94,1241,'http://europa.eu.int/eur-lex/lex/LexUriServ/site/en/oj/2006/1_105/1_10520060413en00540063.pdf','Doesn\'t look right, not sure what this is supposed to be.',NULL,'Ok','2008-12-01 14:33:03','N','Y','2009-07-25 15:32:52','O','http://europa.eu.int/eur-lex/lex/LexUriServ/site/en/oj/2006/1_105/1_10520060413en00540063.pdf',NULL,NULL),(95,1241,'http://ipjur.com/2007/01/german-government-passes-bill-for.php3','Patent Attorney Axel H Horns\' Blog on Intellectual Property Law.',NULL,'Ok','2008-12-01 14:33:05','N','Y','2009-07-25 15:32:57','O','http://ipjur.com/2007/01/german-government-passes-bill-for.php3',NULL,NULL),(96,1241,'http://conventions.coe.int/Treaty/en/Treaties/Html/009.htm','Protocol to the Convention for the Protection of Human Rights an',NULL,'Ok','2008-12-01 14:33:06','N','Y','2009-07-25 15:33:12','O','http://conventions.coe.int/Treaty/en/Treaties/Html/009.htm',NULL,NULL),(97,1241,'http://www.eurocop-police.org/pressreleases/press%20releases.htm','European Confederation of Police press releases.',NULL,'Ok','2008-12-01 14:33:06','N','Y','2009-07-25 15:33:24','O','http://www.eurocop-police.org/pressreleases/press%20releases.htm',NULL,NULL),(98,1241,'http://www.washingtonpost.com/wp-dyn/content/article/2005/11/05/AR2005110501366.html?nav-rss_technology','The FBI\'s Secret Scrutiny - the Washington Post.',NULL,'Ok','2008-12-01 14:33:07','N','Y','2009-07-25 15:33:36','O','http://www.washingtonpost.com/wp-dyn/content/article/2005/11/05/AR2005110501366.html?nav-rss_technology',NULL,NULL),(99,1241,'http://www.privacyinternational.org/article.shmtl?cmd%5B347%5D=x-347-537226','US Government accused of communications data retention and data ',NULL,'Ok','2008-12-01 14:33:09','N','Y','2009-07-25 15:33:40','O','http://www.privacyinternational.org/article.shmtl?cmd%5B347%5D=x-347-537226',NULL,NULL),(100,1241,'http://www.nytimes.com/2006/06/02/washington/02records.html?_r=2&oref=slogin&oref=slogin','NY Times article? - login required.',NULL,'Ok','2008-12-01 14:33:11','N','Y','2009-07-25 15:33:55','O','http://www.nytimes.com/2006/06/02/washington/02records.html?_r=2&oref=slogin&oref=slogin',NULL,NULL),(101,1241,'http://yro.slashdot.org/article.pl?sid=06/06/02/1238237','U.S. Government Demands ISP Data Retention - Slashdot.',NULL,'Ok','2008-12-01 14:33:11','N','Y','2009-07-25 15:34:21','O','http://yro.slashdot.org/article.pl?sid=06/06/02/1238237',NULL,NULL),(102,1241,'http://en.wikipedia.org/wiki/National_Security_Letter','Wikipedia - National Security Letter.',NULL,'Ok','2008-12-01 14:33:12','N','Y','2009-07-25 15:34:23','O','http://en.wikipedia.org/wiki/National_Security_Letter',NULL,NULL),(103,1241,'http://retroshare.sourceforge.net','RetroShare: secure communications with friends.',NULL,'Ok','2008-12-01 14:33:12','N','Y','2009-07-25 15:34:34','O','http://retroshare.sourceforge.net',NULL,NULL),(104,1241,'http://forum.i2p2.de','Invisible Internet Project forums.',NULL,'Ok','2008-12-01 14:33:13','Y','Y','2009-07-25 15:34:36','O','http://forum.i2p.de',NULL,NULL),(105,1245,'http://www.knoppix.net','Live Linux CD based on Debian GNU/Linux.',NULL,'Ok','2008-12-01 14:33:13','N','Y','2009-07-25 15:34:36','O','http://www.knoppix.net',NULL,NULL),(106,1199,'http://uk.geocities.com/osin1941',NULL,NULL,'Ok','2008-12-25 10:45:53','N','Y','2009-08-01 05:02:02','O','http://uk.geocities.com/osin1941',NULL,NULL),(107,1200,'http://www.olsr.org','olsrd - an adhoc wireless mesh routing demon.',NULL,'Ok','2008-12-25 11:05:13','N','Y','2009-08-01 05:02:10','O','http://www.olsr.org',NULL,NULL),(108,1200,'http://en.wikipedia.org/wiki/Birthday_paradox','The Birthday Problem/Paradox.',NULL,'Ok','2008-12-25 11:05:14','N','Y','2009-08-01 05:02:22','O','http://en.wikipedia.org/wiki/Birthday_paradox',NULL,NULL),(109,1200,'http://www.olsrexperiment.de','Large olsrd WLAN-mesh in Berlin (in German).',NULL,'Ok','2008-12-25 11:05:15','N','Y','2009-08-01 05:02:28','O','http://www.olsrexperiment.de',NULL,NULL),(110,1201,'http://www.kronikfilez.com','Warez forum.',NULL,'Ok','2008-12-25 14:42:23','N','Y','2009-08-01 05:02:32','O','http://www.kronikfilez.com',NULL,NULL),(111,1202,'http://www.nena.org','National Emergency Number Association.',NULL,'Ok','2008-12-25 14:42:24','N','Y','2009-08-01 05:02:35','O','http://www.nena.org',NULL,NULL),(112,1202,'http://www.qwest.com/wholesale/pcat/911.html','Qwest 911 interconnection and product offerings.',NULL,'Ok','2008-12-25 14:42:25','N','Y','2009-08-01 05:02:58','O','http://www.qwest.com/wholesale/pcat/911.html',NULL,NULL),(113,1203,'http://www.freenetproject.org','The Freenet Project.',NULL,'Ok','2008-12-25 14:42:26','N','Y','2009-08-01 05:03:04','O','http://www.freenetproject.org',NULL,NULL),(114,1203,'http://waste.sourceforge.net','WASTE is an anonymous, secure, and encrypted collaboration tool.',NULL,'Ok','2008-12-25 14:42:26','N','Y','2009-08-01 05:03:05','O','http://waste.sourceforge.net',NULL,NULL),(115,1204,'http://www.lyngsat.com','Lyngsat Satellite Index.',NULL,'Ok','2008-12-25 14:42:27','N','Y','2009-08-01 05:03:15','O','http://www.lyngsat.com',NULL,NULL),(116,1204,'http://www.satelliteguys.us/free-air-fta-discussion','Satelliteguys FTA/MPEG Forum.',NULL,'Ok','2008-12-25 14:42:28','N','Y','2009-08-01 05:03:31','O','http://www.satelliteguys.us/free-air-fta-discussion',NULL,NULL),(117,1205,'http://insecure.org/nmap','nmap - Network Mapper.',NULL,'Ok','2008-12-26 09:07:31','N','Y','2009-08-01 05:03:37','O','http://insecure.org/nmap',NULL,NULL),(118,1205,'http://www.thc.org/thc-amap','amap - Application Mapper.',NULL,'Ok','2008-12-26 09:07:33','N','Y','2009-08-01 05:03:38','O','http://www.thc.org/thc-amap',NULL,NULL),(119,1205,'http://www.hping.org','hping - tcp traceroute.',NULL,'Ok','2008-12-26 09:07:33','N','Y','2009-08-01 05:03:42','O','http://www.hping.org',NULL,NULL),(120,1205,'http://www.2600.com/code/222/grass.pl','Perl program (grass) to test firewalls.',NULL,'Ok','2008-12-26 09:07:34','N','Y','2009-08-01 05:03:42','O','http://www.2600.com/code/222/grass.pl',NULL,NULL),(121,1205,'http://www.vulnwatch.org/netcat','Netcat - \"Swiss Army Knife\" of network tools.',NULL,'Err','2009-01-07 15:00:01','N','N',NULL,'O','http://www.vulnwatch.org/netcat',NULL,NULL),(122,1205,'http://www.nta-monitor.com/tools/ike-scan','ike-scan - ISAKMP and IPSec scanning.',NULL,'Ok','2008-12-26 09:08:36','N','Y','2009-08-01 05:03:47','O','http://www.nta-monitor.com/tools/ike-scan',NULL,NULL),(123,1206,'http://www.experts-exchange.com','Experts Exchange.',NULL,'Ok','2008-12-26 09:08:37','N','Y','2009-08-01 05:06:19','O','http://www.experts-exchange.com',NULL,NULL),(126,1208,'http://www.sandisk.com/Retail/Default.aspx?CatID=1411','SanDisk U3 LaunchPad Installer.',NULL,'Ok','2008-12-26 09:08:37','N','Y','2009-08-01 05:06:43','O','http://www.sandisk.com/Retail/Default.aspx?CatID=1411',NULL,NULL),(127,1208,'http://www.magiciso.com','Magic ISO Maker.',NULL,'Ok','2008-12-26 09:08:38','N','Y','2009-08-01 05:06:50','O','http://www.magiciso.com',NULL,NULL),(128,1208,'http://www.dohboy.com','The Dohboy (author\'s web site).',NULL,'Ok','2008-12-26 09:08:38','N','Y','2009-08-01 05:06:50','O','http://www.dohboy.com',NULL,NULL),(129,1219,'http://pydns.sourceforge.net','PyDNS - Python DNS module.',NULL,'Ok','2008-12-29 11:07:15','N','Y','2009-08-01 05:06:51','O','http://pydns.sourceforge.net',NULL,NULL),(130,1219,'http://www.hare.demon.co.uk/smtps.py','A simple, extensible Python SMTP Server.',NULL,'Ok','2008-12-29 11:07:15','N','Y','2009-08-01 05:06:52','O','http://www.hare.demon.co.uk/smtps.py',NULL,NULL),(131,1219,'http://pexpect.sourceforge.net','Pexpect - Python module for spawning child applications.',NULL,'Ok','2008-12-29 11:07:16','N','Y','2009-08-01 05:06:53','O','http://pexpect.sourceforge.net',NULL,NULL),(132,1220,'http://sl.mvps.org/docs/802dot1x.htm','Getting Around 802.1x Port-based Network Access Control Through',NULL,'Ok','2008-12-29 11:26:12','N','Y','2009-08-01 05:06:54','O','http://sl.mvps.org/docs/802dot1x.htm',NULL,NULL),(133,1220,'http://www.microsoft.com/technet/security/guidance/gryptographyetc/peap_1.mspx','Securing Wireless LANs with PEAP and Passwords.',NULL,'Ok','2008-12-29 11:21:44','N','Y','2009-08-01 05:06:59','O','http://www.microsoft.com/technet/security/guidance/gryptographyetc/peap_1.mspx',NULL,NULL),(134,1220,'http://www.microsoft.com/technet/security/prodtech/windowsserver2003/pkiwire/swlan.mspx','Securing Wireless LANs with Certificate Services.',NULL,'Ok','2008-12-29 11:21:46','N','Y','2009-08-01 05:07:02','O','http://www.microsoft.com/technet/security/prodtech/windowsserver2003/pkiwire/swlan.mspx',NULL,NULL),(135,1220,'http://insecure.org/nmap','Nmap - Free Security Scanner for Network Exploration.',NULL,'Ok','2008-12-29 11:21:46','N','Y','2009-08-01 05:07:04','O','http://insecure.org/nmap',NULL,NULL),(136,1220,'http://inetcat.net/software/nbtscan.html','NBTScan - NetBIOS Name Network Scanner.',NULL,'Ok','2008-12-29 11:21:47','N','Y','2009-08-01 05:07:05','O','http://inetcat.net/software/nbtscan.html',NULL,NULL),(137,1222,'http://www.buzzsurf.com/surfatwork','How to Bypass Most Firewall Restrictions and Access the Internet',NULL,'Ok','2008-12-29 11:36:47','N','Y','2009-08-01 05:07:07','O','http://www.buzzsurf.com/surfatwork',NULL,NULL),(138,1173,'http://www.metalinkltd.com/downloads.php','SIPp/SIP Bomber - SIP Flooding.',NULL,'Ok','2009-01-05 10:03:15','N','Y','2009-08-01 05:10:35','O','http://www.metalinkltd.com/downloads.php',NULL,NULL),(139,1173,'http://www.hackingvoip.com/tools/inviteflood.tar.gz','INVITE Flooder - SIP Flooding.',NULL,'Ok','2009-01-05 10:03:16','N','Y','2009-08-01 05:10:36','O','http://www.hackingvoip.com/tools/inviteflood.tar.gz',NULL,NULL),(140,1173,'http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip/index.html','PROTOS - SIP test suite.',NULL,'Ok','2009-01-05 10:03:16','N','Y','2009-08-01 05:10:42','O','http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip/index.html',NULL,NULL),(141,1173,'http://www.hackingvoip.com/sec_tools.html','RTP Insert Sound/RTP Mix Sound.',NULL,'Ok','2009-01-05 10:03:17','N','Y','2009-08-01 05:10:44','O','http://www.hackingvoip.com/sec_tools.html',NULL,NULL),(142,1173,'http://www.hackingvoip.com/tools/vlanping.tar.gz','VLANPing download.',NULL,'Ok','2009-01-05 10:03:17','N','Y','2009-08-01 05:10:44','O','http://www.hackingvoip.com/tools/vlanping.tar.gz',NULL,NULL),(143,1176,'http://www.telephreak.org','Asterisk PBX with free voicemail and conference bridges.',NULL,'Ok','2009-01-05 11:12:13','N','Y','2009-08-01 05:10:47','O','http://www.telephreak.org',NULL,NULL),(144,1176,'http://www.askcalea.com','FBI\'s CALEA website.',NULL,'Ok','2009-01-05 11:12:14','N','Y','2009-08-01 05:10:49','O','http://www.askcalea.com',NULL,NULL),(145,1300,'http://foremost.sourceforge.net','Foremost file recovery program.',NULL,'Ok','2009-01-06 06:38:41','N','Y','2009-07-24 13:18:02','O','http://foremost.sourceforge.net',NULL,NULL),(146,1300,'http://Linux.die.net/man/1/dd','Man page for dd - convert/copy a file.',NULL,'Ok','2009-01-06 06:38:42','N','Y','2009-07-24 13:18:12','O','http://Linux.die.net/man/1/dd',NULL,NULL),(147,1300,'http://Linux.die.net/man/8/mount','Man page for mount - mount a file system.',NULL,'Ok','2009-01-06 06:38:42','N','Y','2009-07-24 13:18:12','O','http://Linux.die.net/man/8/mount',NULL,NULL),(148,1300,'http://www.knoppix.org','Knoppix Linux Live CD.',NULL,'Ok','2009-01-06 06:38:43','N','Y','2009-07-24 13:18:19','O','http://www.knoppix.org',NULL,NULL),(149,1301,'http://sourceforge.net/projects/poxy','PHProxy - a web HTTP proxy.',NULL,'Ok','2009-01-06 06:38:43','N','Y','2009-07-24 13:19:03','O','http://sourceforge.net/projects/poxy',NULL,NULL),(150,1303,'http://www.callbeforeyoudig.org','One-Call Utility Notification Center for the Pacific Northwest.',NULL,'Ok','2009-01-06 06:38:44','N','Y','2009-07-24 13:19:10','O','http://www.callbeforeyoudig.org',NULL,NULL),(151,1303,'http://www.arkema-inc.com/index.cfm?pag=633','Description of termite-resistant cable sheathing.',NULL,'Ok','2009-01-06 06:38:44','N','Y','2009-07-24 13:19:15','O','http://www.arkema-inc.com/index.cfm?pag=633',NULL,NULL),(152,1303,'http://gothamist.com/2008/01/31/nitrogen_tanks.php','Article on nitrogen tanks in New York City.',NULL,'Ok','2009-01-06 06:38:45','N','Y','2009-07-24 13:19:41','O','http://gothamist.com/2008/01/31/nitrogen_tanks.php',NULL,NULL),(153,1303,'http://www.psihq.com/iread/strpgrnd.htm','NEC (National Electrical Code) for grounding.',NULL,'Ok','2009-01-06 06:38:45','N','Y','2009-07-24 13:19:44','O','http://www.psihq.com/iread/strpgrnd.htm',NULL,NULL),(154,1303,'http://www.sundance-communications.com/cgi-bin/ultimatebb.cgi?ubb=get_topic;f=31;t=000009;p=0','Message board thread on proper grounding of punch-down blocks.',NULL,'Ok','2009-01-06 06:38:48','N','Y','2009-07-24 13:20:02','O','http://www.sundance-communications.com/cgi-bin/ultimatebb.cgi?ubb=get_topic;f=31;t=000009;p=0',NULL,NULL),(155,1304,'http://php-functions.com','Use some common PHP-Functions online.',NULL,'Ok','2009-01-06 06:55:48','N','Y','2009-07-24 13:20:07','O','http://php-functions.com',NULL,NULL),(156,1307,'http://www.hopistar.org','Author\'s web site.',NULL,'Ok','2009-01-06 06:55:48','N','Y','2009-07-24 13:20:10','O','http://www.hopistar.org',NULL,NULL),(157,1308,'http://www.Thingiverse.com','Digital designs for physical objects.',NULL,'Ok','2009-01-06 06:55:50','N','Y','2009-07-24 13:20:24','O','http://www.Thingiverse.com',NULL,NULL),(158,1308,'http://www.brepettis.com','Author\'s web site.',NULL,'Ok','2009-01-06 06:55:50','N','Y','2009-07-24 13:20:31','O','http://www.brepettis.com',NULL,NULL),(159,1308,'http://www.nycresistor.com','New York City hackerspace.',NULL,'Ok','2009-01-06 06:55:51','N','Y','2009-07-24 13:20:52','O','http://www.nycresistor.com',NULL,NULL),(160,1309,'http://www.rocbattle.com','Roc Battle.com buy/sell beats (mp3).',NULL,'Ok','2009-01-06 06:55:51','N','Y','2009-07-24 13:20:57','O','http://www.rocbattle.com',NULL,NULL),(161,1310,'http://www.dmoz.org/Computers/Internet/Access_Providers/Unix_Shell_Providers/Free_Shells','List of free ssh accounts.',NULL,'Ok','2009-01-06 07:30:17','N','Y','2009-07-24 13:21:00','O','http://www.dmoz.org/Computers/Internet/Access_Providers/Unix_Shell_Providers/Free_Shells',NULL,NULL),(162,1310,'http://www.google.com/Top/Computers/Internet/Access_Providers/Unix_Shell_Providers/Free_Shells','List of free ssh accounts.',NULL,'Ok','2009-01-06 06:55:53','N','Y','2009-07-24 13:21:01','O','http://www.google.com/Top/Computers/Internet/Access_Providers/Unix_Shell_Providers/Free_Shells',NULL,NULL),(163,1310,'http://jaguar.garo.fil.be','Garo\'s free shell accounts.',NULL,'Ok','2009-01-06 06:55:54','N','Y','2009-07-24 13:21:03','O','http://jaguar.garo.fil.be',NULL,NULL),(164,1310,'http://www.appgate.com/products/80_MindTerm/110_MindTerm_Download/index.php','MindTerm ssh java web applet.',NULL,'Ok','2009-01-06 07:03:33','N','Y','2009-07-24 13:21:19','O','http://www.appgate.com/products/80_MindTerm/110_MindTerm_Download/index.php',NULL,NULL),(165,1310,'http://rumkin.com/tools/ssh','Host for ssh java web applet.',NULL,'Ok','2009-01-06 06:55:56','N','Y','2009-07-24 13:21:22','O','http://rumkin.com/tools/ssh',NULL,NULL),(166,1312,'http://demo1.proxysplit.com','Proxy server.',NULL,'Ok','2009-01-06 07:08:03','N','Y','2009-07-24 13:21:30','O','http://demo1.proxysplit.com',NULL,NULL),(167,1317,'http://searchwincomputing.techtarget.com/tip/0,289483,sid68_gci1194144,00.html','How to recover data from corrupt NTFS boot sectors.',NULL,'Ok','2009-01-06 07:25:12','N','Y','2009-07-24 13:21:41','O','http://searchwincomputing.techtarget.com/tip/0,289483,sid68_gci1194144,00.html',NULL,NULL),(168,1319,'http://www.oracle.com/technology/index.html','Oracle Technology Network.',NULL,'Ok','2009-01-06 07:30:17','N','Y','2009-07-24 13:21:47','O','http://www.oracle.com/technology/index.html',NULL,NULL),(169,1180,'http://www.p2plawsuits.com','Have Questions About a P2P Lawsuit?',NULL,'Ok','2009-01-06 10:07:55','N','Y','2009-08-01 05:10:51','O','http://www.p2plawsuits.com',NULL,NULL),(170,1181,'http://www.dragonforce.com','Example web site.',NULL,'Ok','2009-01-06 14:29:31','N','Y','2009-08-01 05:11:05','O','http://www.dragonforce.com',NULL,NULL),(171,1181,'http://www.dieseldragon.co.uk','Author\'s web site.',NULL,'Ok','2009-01-06 14:29:32','N','Y','2009-08-01 05:11:07','O','http://www.dieseldragon.co.uk',NULL,NULL),(172,1183,'http://sugarmama.virginmobileusa.com','Virgin Mobile Sugar Mama.',NULL,'Ok','2009-01-06 14:47:49','N','Y','2009-08-01 05:11:07','O','http://sugarmama.virginmobileusa.com',NULL,NULL),(173,1184,'http://www.betateilchen.de','UTStarcom resources.',NULL,'Ok','2009-01-06 14:51:31','N','Y','2009-08-01 05:11:08','O','http://www.betateilchen.de',NULL,NULL),(174,1184,'http://web.quick.cz/lake/f1000_faq.htm','UTStarcom F1000 FAQ.',NULL,'Ok','2009-01-06 14:51:32','N','Y','2009-08-01 05:11:10','O','http://web.quick.cz/lake/f1000_faq.htm',NULL,NULL),(175,1188,'http://dagfari.net','Author\'s web site.',NULL,'Ok','2009-01-07 10:48:24','N','Y','2009-08-01 05:11:13','O','http://dagfari.net',NULL,NULL),(176,1190,'http://www.wifimaps.com','Our mission is to provide access to location-based Wi-Fi data.',NULL,'Ok','2009-01-07 11:25:37','N','Y','2009-08-01 05:11:16','O','http://www.wifimaps.com',NULL,NULL),(177,1192,'http://en.wikipedia.org/wiki/Secure_Shell','Wikipedia Secure Shell.',NULL,'Ok','2009-01-07 14:54:30','N','Y','2009-08-01 05:11:20','O','http://en.wikipedia.org/wiki/Secure_Shell',NULL,NULL),(178,1193,'http://www.legislature.mi.gov/(S(1012dymlulehirfw14cruj55))/mileg.aspx?page=getObject&objectName=mc1-752-795','Fraudulent Access to Computer Systems Act, Michigan USA.',NULL,'Ok','2009-01-07 14:54:31','N','Y','2009-08-01 05:11:22','O','http://www.legislature.mi.gov/(S(1012dymlulehirfw14cruj55))/mileg.aspx?page=getObject&objectName=mc1-752-795',NULL,NULL),(179,1193,'http://www.gencourt.state.nh.us/rsa/html/LXII/638/638-17.htm','New Hampshire Title LXII Criminal Code, USA.',NULL,'Ok','2009-01-07 14:54:32','N','Y','2009-08-01 05:11:22','O','http://www.gencourt.state.nh.us/rsa/html/LXII/638/638-17.htm',NULL,NULL),(180,1193,'http://www.opsi.gov.uk/si/si2006/20061032.htm','Communications Act of 2003, United Kingdom.',NULL,'Ok','2009-01-07 14:54:33','N','Y','2009-08-01 05:11:24','O','http://www.opsi.gov.uk/si/si2006/20061032.htm',NULL,NULL),(181,1193,'http://www.opsi.gov.uk/acts/en2003/2003en21.htm','Communications Act of 2003, United Kingdom.',NULL,'Ok','2009-01-07 15:00:03','N','Y','2009-08-01 05:11:27','O','http://www.opsi.gov.uk/acts/en2003/2003en21.htm',NULL,NULL),(182,1193,'http://www.opsi.gov.uk/acts/acts1990/UKpga_19900018_en_1.htm','Computer Misuse Act of 1990, United Kingdom.',NULL,'Ok','2009-01-07 14:54:34','N','Y','2009-08-01 05:11:29','O','http://www.opsi.gov.uk/acts/acts1990/UKpga_19900018_en_1.htm',NULL,NULL),(183,1194,'http://www.buffalotech.com/support/getfile/?U2KG54_1-01-02-0002.zip','Buffalo drivers download.',NULL,'Ok','2009-01-07 15:08:17','N','Y','2009-08-01 05:11:30','O','http://www.buffalotech.com/support/getfile/?U2KG54_1-01-02-0002.zip',NULL,NULL),(184,1194,'http://dlsvr01.asus.com/pub/ASUS/wireless/WL-167g/Utility_2933.zip','ASUS WWL-167g configuration utility.',NULL,'Err','2009-01-07 15:08:19','N','N',NULL,'O','http://dlsvr01.asus.com/pub/ASUS/wireless/WL-167g/Utility_2933.zip',NULL,NULL),(185,1194,'http://rt2x00.serialmonkey.com','rt2x00 Open Source Project drivers.',NULL,'Ok','2009-01-07 15:08:19','N','Y','2009-08-01 05:11:30','O','http://rt2x00.serialmonkey.com',NULL,NULL),(186,1194,'http://masscat.afraid.org/ninds/rt2570.php','masscat modified driver.',NULL,'Ok','2009-01-07 15:08:20','N','Y','2009-08-01 05:11:34','O','http://masscat.afraid.org/ninds/rt2570.php',NULL,NULL),(187,1194,'http://davr.org/ds2/demos/','Official DS Downloadable WMB Demos.',NULL,'Ok','2009-01-07 16:50:57','N','Y','2009-08-01 05:11:45','O','http://davr.org/ds2/demos/',NULL,NULL),(188,1194,'http://wiki.akkit.org/Downloadable_DS_Demos','Downloadable DS Demos.',NULL,'Ok','2009-01-07 16:50:57','N','Y','2009-08-01 05:11:51','O','http://wiki.akkit.org/Downloadable_DS_Demos',NULL,NULL),(189,1196,'http://www.firstamendmentcenter.org/news.aspx?id=15702','First Amendment Center.',NULL,'Ok','2009-01-08 08:18:21','N','Y','2009-08-01 05:11:53','O','http://www.firstamendmentcenter.org/news.aspx?id=15702',NULL,NULL),(190,1196,'http://www.innopacusers.org','Innovative Users Group.',NULL,'Ok','2009-01-08 08:24:00','N','Y','2009-08-01 05:11:59','O','http://www.innopacusers.org',NULL,NULL),(191,1196,'http://www.iii.com','Innovative Interfaces: Trusted Library Technology and Services.',NULL,'Ok','2009-01-08 08:18:22','N','Y','2009-08-01 05:11:59','O','http://www.iii.com',NULL,NULL),(192,1196,'http://www.iii.com/products/millennium_ils.shtml','Innovative Interfaces : Millennium ILS.',NULL,'Ok','2009-01-08 08:23:28','Y','Y','2009-08-01 05:11:59','O','http://www.iii.com/mill/index.shtml',NULL,NULL),(193,1153,'http://www.dd-wrt.com','DD-WRT and BrainSlayer.',NULL,'Ok','2009-01-08 13:04:33','N','Y','2009-08-01 05:13:20','O','http://www.dd-wrt.com',NULL,NULL),(194,1153,'http://www.ipcop.org','IPCop crew.',NULL,'Ok','2009-01-08 13:04:34','N','Y','2009-08-01 05:13:28','O','http://www.ipcop.org',NULL,NULL),(195,1155,'http://www.sourcecop.com','Source Cop.',NULL,'Ok','2009-01-08 13:31:11','N','Y','2009-08-01 05:13:32','O','http://www.sourcecop.com',NULL,NULL),(196,1160,'http://www.valuepointnet.com','Value Point Networks.',NULL,'Ok','2009-01-08 14:18:05','N','Y','2009-08-01 05:13:38','O','http://www.valuepointnet.com',NULL,NULL),(197,1161,'http://web.archive.org','Internet Archive \"Wayback Machine\".',NULL,'Ok','2009-01-08 14:27:17','N','Y','2009-08-01 05:14:15','O','http://web.archive.org',NULL,NULL),(198,1161,'http://www.mattparnell.com/arch.html','Author\'s findings from article.',NULL,'Ok','2009-01-08 14:27:47','N','Y','2009-08-01 05:14:15','O','http://www.mattparnell.com/arch.html',NULL,NULL),(199,1161,'http://www.mattparnell.com','Author\'s website.',NULL,'Ok','2009-01-08 14:27:48','N','Y','2009-08-01 05:14:16','O','http://www.mattparnell.com',NULL,NULL),(200,1161,'http://www.mattparnell.com/forums','Author\'s forums.',NULL,'Ok','2009-01-08 14:28:13','N','Y','2009-08-01 05:14:16','O','http://www.mattparnell.com/forums',NULL,NULL),(201,1164,'http://www.httpwatch.com/download','HttpWatch Free Version Download.',NULL,'Ok','2009-01-08 16:29:25','N','Y','2009-08-01 05:14:26','O','http://www.httpwatch.com/download',NULL,NULL),(202,1164,'http://code.google.com/p/httpguidedog','HTTPGuideDog Fireflox plugin.',NULL,'Ok','2009-01-08 16:29:26','N','Y','2009-08-01 05:14:30','O','http://code.google.com/p/httpguidedog',NULL,NULL),(203,1164,'http://www.Pandora.com','Pandora Radio.',NULL,'Ok','2009-01-08 16:29:26','N','Y','2009-08-01 05:14:44','O','http://www.Pandora.com',NULL,NULL),(204,1165,'http://www.youtube.com/watch?v=II_-QcW4Q4I','Darren Brown dog track video.',NULL,'Ok','2009-01-09 10:40:29','N','Y','2009-08-01 05:14:49','O','http://www.youtube.com/watch?v=II_-QcW4Q4I',NULL,NULL),(205,1168,'http://www.whipplehill.com','Whipple Hill - School websites.',NULL,'Ok','2009-01-09 13:19:41','N','Y','2009-08-01 05:14:51','O','http://www.whipplehill.com',NULL,NULL),(206,1170,'http://www.andybrain.com/archive/journey_to_the_center_of_an_ebook.htm','Free ebooks, libraries and text reading software.',NULL,'Ok','2009-01-09 13:19:42','N','Y','2009-08-01 05:14:55','O','http://www.andybrain.com/archive/journey_to_the_center_of_an_ebook.htm',NULL,NULL),(207,1170,'http://docs.info.apple.com/article.html?artnum=61131','Using your iPod as a storage drive.',NULL,'Ok','2009-01-09 13:19:43','N','Y','2009-08-01 05:15:30','O','http://docs.info.apple.com/article.html?artnum=61131',NULL,NULL),(208,1170,'http://www.ambience.sk/ipod-ebook-creator/ipod-book-notes-text-conversion.php','iPod eBook Creator- convert books into iPod notes.',NULL,'Ok','2009-01-09 13:19:44','N','Y','2009-08-01 05:15:44','O','http://www.ambience.sk/ipod-ebook-creator/ipod-book-notes-text-conversion.php',NULL,NULL),(209,1170,'http://www.tomsci.com/book2pod','Mac OS: Book2Pod.',NULL,'Ok','2009-01-09 13:19:45','N','Y','2009-08-01 05:15:53','O','http://www.tomsci.com/book2pod',NULL,NULL),(210,1170,'http://www.sturm.net.nz/website.php?Section=iPod+Programs&Page=iPodLibrary','Windows OS: iPodLibrary.',NULL,'Ok','2009-01-09 13:19:46','N','Y','2009-08-01 05:16:04','O','http://www.sturm.net.nz/website.php?Section=iPod+Programs&Page=iPodLibrary',NULL,NULL),(211,1170,'http://www.oreillynet.com/pub/a/mac/2006/12/12/ipod-notes-above-and-beyond.html','iPod Notes: Above and Beyond.',NULL,'Ok','2009-01-09 13:19:47','N','Y','2009-08-01 05:16:17','O','http://www.oreillynet.com/pub/a/mac/2006/12/12/ipod-notes-above-and-beyond.html',NULL,NULL),(212,1170,'http://www.macdevcenter.com/pub/a/mac/2006/11/28/building-interactive-ipod-experiences.html','Building Interactive iPod Experiences.',NULL,'Ok','2009-01-09 13:19:47','N','Y','2009-08-01 05:16:28','O','http://www.macdevcenter.com/pub/a/mac/2006/11/28/building-interactive-ipod-experiences.html',NULL,NULL),(213,1170,'http://homepage.mac.com/applelover/text2ipodx/text2ipodx.html','Text2iPod X.',NULL,'Ok','2009-01-09 13:19:48','N','Y','2009-08-01 05:16:31','O','http://homepage.mac.com/applelover/text2ipodx/text2ipodx.html',NULL,NULL),(214,1170,'http://www.andybrain.com','Author\'s web site.',NULL,'Ok','2009-01-09 13:19:48','N','Y','2009-08-01 05:16:32','O','http://www.andybrain.com',NULL,NULL),(228,1129,'http://www.spidynamics.com/spilabs/education/whitepapers/SQLinjection.html','SQL Injection Whitepaper.',NULL,'Ok','2009-01-12 08:21:34','N','Y','2009-08-01 05:18:55','O','http://www.spidynamics.com/spilabs/education/whitepapers/SQLinjection.html',NULL,NULL),(229,1129,'http://www.spidynamics.com/assets/documents/Blind_SQLInjection.pdf','Blind SQL Injection.',NULL,'Ok','2009-01-12 08:21:36','N','Y','2009-08-01 05:18:56','O','http://www.spidynamics.com/assets/documents/Blind_SQLInjection.pdf',NULL,NULL),(230,1129,'http://www.oreilly.com/catalog/websec2/index.html','Web Security and Privacy.',NULL,'Ok','2009-01-12 08:21:38','N','Y','2009-08-01 05:19:06','O','http://www.oreilly.com/catalog/websec2/index.html',NULL,NULL),(231,1129,'http://www.xed.ch/lwm/securitynotes.html','Perl CGI Security Notes.',NULL,'Ok','2009-01-12 08:21:38','N','Y','2009-08-01 05:19:07','O','http://www.xed.ch/lwm/securitynotes.html',NULL,NULL),(232,1129,'http://xss-proxy.sf.net','XXS-Proxy.',NULL,'Ok','2009-01-12 08:21:39','N','Y','2009-08-01 05:19:09','O','http://xss-proxy.sf.net',NULL,NULL),(233,1129,'http://www.msblabs.org/talks','Phuture of Phishing.',NULL,'Err','2009-01-12 08:21:40','N','N',NULL,'O','http://www.msblabs.org/talks',NULL,NULL),(234,1129,'http://namb.la/popular/tech.html','MySpace.com Virus.',NULL,'Ok','2009-01-12 08:21:40','N','Y','2009-08-01 05:19:09','O','http://namb.la/popular/tech.html',NULL,NULL),(235,1129,'http://sandsprite.com/Sleuth/papers/RealWorld_XSS_1.html','Real World XXS.',NULL,'Ok','2009-01-12 08:21:41','N','Y','2009-08-01 05:19:10','O','http://sandsprite.com/Sleuth/papers/RealWorld_XSS_1.html',NULL,NULL),(236,1129,'http://www.spidynamics.com/spilabs/education/presentations/billyhoffman-web_appworms_viruses.pdf','Web Application Worms and Viruses.',NULL,'Ok','2009-01-12 08:21:42','N','Y','2009-08-01 05:19:11','O','http://www.spidynamics.com/spilabs/education/presentations/billyhoffman-web_appworms_viruses.pdf',NULL,NULL),(237,1129,'http://www.msblabs.org/tinydisk','TinyDisk.',NULL,'Err','2009-01-12 08:21:43','N','N',NULL,'O','http://www.msblabs.org/tinydisk',NULL,NULL),(238,1129,'http://www.msblabs.org','Author\'s web site.',NULL,'Ok','2009-01-12 08:21:43','N','Y','2009-08-01 05:19:12','O','http://www.msblabs.org',NULL,NULL),(239,1131,'http://www.livejournal.com','LiveJournal.',NULL,'Ok','2009-01-12 08:35:29','N','Y','2009-08-01 05:19:24','O','http://www.livejournal.com',NULL,NULL),(240,1133,'https://www.proxyweb.net','Proxy Web.',NULL,'Err','2009-01-12 14:30:31','N','N',NULL,'O','https://www.proxyweb.net',NULL,NULL),(241,1133,'https://megaproxy.com','Mega Proxy.',NULL,'Err','2009-01-12 14:33:38','N','N',NULL,'O','https://megaproxy.com',NULL,NULL),(242,1133,'https://proxify.com','Proxify.','','Ok','2009-01-12 14:33:38','Y','Y','2010-10-20 10:15:48','O','https://www.proxify.com','',''),(243,1133,'http://proxyway.com/www/free-proxy-server-list.html','List of proxies.',NULL,'Ok','2009-01-12 14:33:39','N','Y','2009-08-01 05:19:35','O','http://proxyway.com/www/free-proxy-server-list.html',NULL,NULL),(244,1133,'http://tools.rosinstrument.com/proxy','Another list of proxies.',NULL,'Ok','2009-01-12 14:33:39','N','Y','2009-08-01 05:19:43','O','http://tools.rosinstrument.com/proxy',NULL,NULL),(245,1133,'http://www.zensur.freerk.com','HOWTO bypass Internet Censorship.',NULL,'Ok','2009-01-12 14:33:40','N','Y','2009-08-01 05:19:55','O','http://www.zensur.freerk.com',NULL,NULL),(246,1133,'http://peterrost.blogspot.com/2007/01/top-ten-methods-to-access-blocked.html','Top Ten methods to access blocked websites.',NULL,'Ok','2009-01-12 14:33:40','N','Y','2009-08-01 05:20:08','O','http://peterrost.blogspot.com/2007/01/top-ten-methods-to-access-blocked.html',NULL,NULL),(247,1133,'http://www.webstuffscan.com/2006/11/23/how-to-access-blocked-websites-top-10','How to access blocked websites - Top 10.',NULL,'Ok','2009-01-12 14:33:41','N','Y','2009-08-01 05:20:12','O','http://www.webstuffscan.com/2006/11/23/how-to-access-blocked-websites-top-10',NULL,NULL),(248,1135,'http://www.dkaccess.com/English/Telephone_Entry/1835-065-F-8-05.pdf','DoorKing operating manual.',NULL,'Err','2009-01-12 14:53:17','N','N',NULL,'O','http://www.dkaccess.com/English/Telephone_Entry/1835-065-F-8-05.pdf',NULL,NULL),(249,1135,'http://www.doorking.com','DoorKing web site.',NULL,'Ok','2009-01-12 14:53:18','N','Y','2009-08-01 05:20:22','O','http://www.doorking.com',NULL,NULL),(250,1137,'http://www.itronix.com','GoBook Manufacturer.',NULL,'Ok','2009-01-13 08:09:38','N','Y','2009-08-01 05:20:24','O','http://www.itronix.com',NULL,NULL),(251,1137,'http://www.gobookiii.com/gb3/features.htm','GoBook Hardware Specs.',NULL,'Ok','2009-01-13 08:09:39','N','Y','2009-08-01 05:20:27','O','http://www.gobookiii.com/gb3/features.htm',NULL,NULL),(252,1140,'http://sdp.ppona.com','SDP Multimedia.',NULL,'Ok','2009-01-13 10:30:27','N','Y','2009-08-01 05:20:37','O','http://sdp.ppona.com',NULL,NULL),(253,1143,'http://www.radioreference.com','Radio Reference.',NULL,'Ok','2009-01-13 13:44:04','N','Y','2009-08-01 05:20:42','O','http://www.radioreference.com',NULL,NULL),(254,1143,'http://gullfoss2.fcc.gov/reports/index.cfm','FCC General Menu Reports.',NULL,'Err','2009-01-13 13:44:04','N','N',NULL,'O','http://gullfoss2.fcc.gov/reports/index.cfm',NULL,NULL),(255,1146,'http://en.wikipedia.org/wiki/Tunneling_protocol','Wikipedia Tunneling Protocols.',NULL,'Ok','2009-01-13 14:15:09','N','Y','2009-08-01 05:20:45','O','http://en.wikipedia.org/wiki/Tunneling_protocol',NULL,NULL),(256,1146,'http://lifehacker.com/software/home-server/geek-to-live--set-up-a-personal-home-ssh-server-205090.php','SSH server setup.',NULL,'Ok','2009-01-13 14:15:09','N','Y','2009-08-01 05:21:12','O','http://lifehacker.com/software/home-server/geek-to-live--set-up-a-personal-home-ssh-server-205090.php',NULL,NULL),(257,1146,'http://www.chiark.greenend.org.uk/~sgtatham/putty','PuTTY and Plink downloads.',NULL,'Ok','2009-01-13 14:15:10','N','Y','2009-08-01 05:21:14','O','http://www.chiark.greenend.org.uk/~sgtatham/putty',NULL,NULL),(258,1146,'http://portableapps.com/apps/internet/firefox_portable','Firefox Portable.',NULL,'Ok','2009-01-13 14:15:10','N','Y','2009-08-01 05:21:20','O','http://portableapps.com/apps/internet/firefox_portable',NULL,NULL),(259,1146,'https://addons.mozilla.org/en-US/firefox/addon/4327','NeoFox IE 6.','','Ok','2009-01-13 14:15:11','Y','Y','2010-10-20 10:03:43','O','https://addons.mozilla.org/firefox/4327','',''),(260,1146,'https://addons.mozilla.org/en-US/firefox/addon/31','Firesomething.','','Ok','2009-01-13 14:15:11','Y','Y','2010-10-20 10:03:58','O','https://addons.mozilla.org/firefox/31','',''),(261,1146,'http://www.bamm.gabriana.com/cgi-bin/download.pl/package/ieiconsxp.xpi','Internet Explorer XP Icons.',NULL,'Ok','2009-01-13 14:15:12','N','Y','2009-08-01 05:22:10','O','http://www.bamm.gabriana.com/cgi-bin/download.pl/package/ieiconsxp.xpi',NULL,NULL),(262,1148,'http://uk.geocities.com/osin1941/app/app.html','Full source code for application discussed.',NULL,'Ok','2009-01-13 14:30:05','N','Y','2009-08-01 05:22:13','O','http://uk.geocities.com/osin1941/app/app.html',NULL,NULL),(263,1149,'http://www.winguides.com/security/password.php','Password generator.',NULL,'Ok','2009-01-13 14:35:25','N','Y','2009-08-01 05:22:59','O','http://www.winguides.com/security/password.php',NULL,NULL),(264,1149,'http://randpass.com','Another password generator.',NULL,'Ok','2009-01-13 14:35:26','N','Y','2009-08-01 05:23:31','O','http://randpass.com',NULL,NULL),(265,1149,'http://www.mark.vcn.com/password','More advanced password generator.',NULL,'Ok','2009-01-13 14:35:27','N','Y','2009-08-01 05:23:33','O','http://www.mark.vcn.com/password',NULL,NULL),(266,1149,'http://www.grc.com/passwords.htm','Another more advanced password generator.',NULL,'Ok','2009-01-13 14:35:29','N','Y','2009-08-01 05:23:48','O','http://www.grc.com/passwords.htm',NULL,NULL),(267,1108,'http://www.symbian.com','Symbian.',NULL,'Ok','2009-01-19 07:33:18','N','Y','2009-08-01 05:26:10','O','http://www.symbian.com',NULL,NULL),(268,1108,'http://www.microsoft.com/windowsmobile','Windows Mobile.',NULL,'Ok','2009-01-19 07:33:18','N','Y','2009-08-01 05:26:42','O','http://www.microsoft.com/windowsmobile',NULL,NULL),(269,1108,'http://www.pentest.co.uk','BTScanner by PenTest.',NULL,'Ok','2009-01-19 07:36:28','N','Y','2009-08-01 05:26:49','O','http://www.pentest.co.uk',NULL,NULL),(270,1108,'http://trifinite.org/trifinite_stuff_blooover.html\r\n','Blooover.',NULL,'Ok','2009-01-19 07:36:28','N','Y','2009-08-01 05:26:50','O','http://trifinite.org/trifinite_stuff_blooover.html\r\n',NULL,NULL),(271,1109,'http://www.firstclass.com','FirstClass Collaboration Suite.',NULL,'Ok','2009-01-19 11:36:01','N','Y','2009-08-01 05:26:53','O','http://www.firstclass.com',NULL,NULL),(272,1117,'http://computerhistory.org','Computer History Museum.',NULL,'Ok','2009-01-19 11:36:02','N','Y','2009-08-01 05:27:03','O','http://computerhistory.org',NULL,NULL),(273,1117,'http://tinyurl.com/y6k3z8','CVS Camera Hack.',NULL,'Ok','2009-01-19 11:36:03','N','Y','2009-08-01 05:27:05','O','http://tinyurl.com/y6k3z8',NULL,NULL),(274,1117,'http://ladyada.net/make/wavebubble','Open source cellphone and wifi jammer.',NULL,'Ok','2009-01-19 11:36:03','N','Y','2009-08-01 05:27:13','O','http://ladyada.net/make/wavebubble',NULL,NULL),(275,1117,'http://tinyurl.com/y8ap66','Active Denial System (ADS weapon).',NULL,'Ok','2009-01-19 11:36:04','N','Y','2009-08-01 05:27:18','O','http://tinyurl.com/y8ap66',NULL,NULL),(276,1119,'http://www.openwall.com/passwords/microsoft-windows-nt-2000-xp-2003','Password recovery programs.',NULL,'Ok','2009-01-19 14:37:06','N','Y','2009-08-01 05:27:20','O','http://www.openwall.com/passwords/microsoft-windows-nt-2000-xp-2003',NULL,NULL),(277,1121,'http://www.newlisp.org','NewLISP web site.',NULL,'Ok','2009-01-19 14:37:07','N','Y','2009-08-01 05:27:23','O','http://www.newlisp.org',NULL,NULL),(278,1121,'http://newlisper.blogspot.com','NewLISPer blog.',NULL,'Ok','2009-01-19 14:37:08','N','Y','2009-08-01 05:27:28','O','http://newlisper.blogspot.com',NULL,NULL),(279,1121,'http://www.nodep.nl/newlisp','Norman\'s code snippets (newLISP).',NULL,'Ok','2009-01-19 14:37:09','N','Y','2009-08-01 05:27:29','O','http://www.nodep.nl/newlisp',NULL,NULL),(280,1123,'http://www.giantfood.com/bonuscard','Giant Food Bonus Card web site.',NULL,'Err','2009-01-20 09:33:51','N','N',NULL,'O','http://www.giantfood.com/bonuscard',NULL,NULL),(281,1124,'http://teknikill.net/bbs','IMfree hacking forum.',NULL,'Ok','2009-01-20 09:43:06','N','Y','2009-08-01 05:27:30','O','http://teknikill.net/bbs',NULL,NULL),(282,1124,'http://maximized.com/download/freeware/scriptsforitunes/setup.exe','iTunes scripts.',NULL,'Ok','2009-01-20 09:43:07','N','Y','2009-08-01 05:27:31','O','http://maximized.com/download/freeware/scriptsforitunes/setup.exe',NULL,NULL),(283,1126,'http://www.korea-dpr.com/cgi-bin/simpleforum.cgi','Korean Friendship Association.',NULL,'Ok','2009-01-20 10:18:41','N','Y','2009-08-01 05:27:32','O','http://www.korea-dpr.com/cgi-bin/simpleforum.cgi',NULL,NULL),(284,1127,'http://voicemail.k7.net','K7.net free web-based voicemail/fax service.',NULL,'Ok','2009-01-20 10:24:59','N','Y','2009-08-01 05:27:37','O','http://voicemail.k7.net',NULL,NULL),(285,1088,'http://pe.usps.com/text/DMM300/602.htm','Domestic Mail Manual.',NULL,'Ok','2009-01-27 11:05:36','N','Y','2009-08-01 05:28:55','O','http://pe.usps.com/text/DMM300/602.htm',NULL,NULL),(286,1089,'http://www.phrack.org','Phrack.',NULL,'Ok','2009-01-27 11:26:54','N','Y','2009-08-01 05:28:59','O','http://www.phrack.org',NULL,NULL),(287,1089,'http://www.cryptome.org','Cryptome.',NULL,'Ok','2009-01-27 11:26:59','N','Y','2009-08-01 05:28:59','O','http://www.cryptome.org',NULL,NULL),(288,1090,'http://www.database-expert.com/oracle_back_door_part2.asp','Additional code from article.',NULL,'Ok','2009-01-27 11:27:00','N','Y','2009-08-01 05:29:02','O','http://www.database-expert.com/oracle_back_door_part2.asp',NULL,NULL),(289,1096,'http://www.polyphonic-ringtones-logos.co.uk','Example site author used in article.',NULL,'Err','2009-01-27 14:35:52','N','N',NULL,'O','http://www.polyphonic-ringtones-logos.co.uk',NULL,NULL),(290,1096,'http://64.202.114.141/2tonez/en/uk/polyringtones/indie/2','Second ring tone site that worked.',NULL,'Err','2009-01-27 14:35:52','N','N',NULL,'O','http://64.202.114.141/2tonez/en/uk/polyringtones/indie/2',NULL,NULL),(291,1096,'http://www.monstertones.com','Third ring tone site that worked.',NULL,'Ok','2009-01-27 14:35:53','N','Y','2009-08-01 05:29:16','O','http://www.monstertones.com',NULL,NULL),(292,1096,'http://www.mobileringtonez.com','Fourth ring tone site that worked.',NULL,'Ok','2009-01-27 14:35:53','N','Y','2009-08-01 05:29:31','O','http://www.mobileringtonez.com',NULL,NULL),(293,1099,'http://www.symbian.com','Symbian.',NULL,'Ok','2009-01-28 08:00:06','N','Y','2009-08-01 05:29:31','O','http://www.symbian.com',NULL,NULL),(294,1099,'http://www.microsoft.com/windowsmobile','Windows Mobile 5.',NULL,'Ok','2009-01-28 08:00:07','N','Y','2009-08-01 05:30:04','O','http://www.microsoft.com/windowsmobile',NULL,NULL),(295,1103,'http://www.theyrule.net','They Rule.',NULL,'Ok','2009-01-28 08:12:05','N','Y','2009-08-01 05:30:06','O','http://www.theyrule.net',NULL,NULL),(296,1103,'http://freeculture.org/chapters/chapters.php','Free Culture Chapter.',NULL,'Ok','2009-01-28 08:12:06','N','Y','2009-08-01 05:30:13','O','http://freeculture.org/chapters/chapters.php',NULL,NULL),(297,1105,'http://motorola.canopywireless.com/support/community','Wireless Broadband Community Forums.',NULL,'Ok','2009-01-28 08:22:38','N','Y','2009-08-01 05:30:17','O','http://motorola.canopywireless.com/support/community',NULL,NULL),(298,1106,'http://www.smoothwall.org','SmoothWall Express.',NULL,'Ok','2009-01-28 08:27:11','N','Y','2009-08-01 05:36:21','O','http://www.smoothwall.org',NULL,NULL),(299,1106,'http://www.kgb.to','Squid ACL (access control list).',NULL,'Ok','2009-01-28 08:27:12','N','Y','2009-08-01 05:36:25','O','http://www.kgb.to',NULL,NULL),(300,1070,'http://www.paypalwarning.com','PayPal Problems.',NULL,'Ok','2009-02-02 09:06:26','N','Y','2009-08-01 05:37:06','O','http://www.paypalwarning.com',NULL,NULL),(301,1070,'http://www.paypalsucks.com','No PayPal.',NULL,'Ok','2009-02-02 09:06:27','N','Y','2009-08-01 05:37:12','O','http://www.paypalsucks.com',NULL,NULL),(302,1071,'http://www.askcalea.org','FBI information page for telecommunications carriers.',NULL,'Ok','2009-02-02 10:45:43','N','Y','2009-08-01 05:37:14','O','http://www.askcalea.org',NULL,NULL),(303,1071,'http://cryptome.sabotage.org/fbi-flexguide2.htm','CALEA deployment guide for packet mode communications.',NULL,'Ok','2009-02-02 10:45:44','N','Y','2009-08-01 05:37:21','O','http://cryptome.sabotage.org/fbi-flexguide2.htm',NULL,NULL),(304,1071,'http://www.ss8.com','SS8 : The Architects of Intercept.',NULL,'Ok','2009-02-02 10:45:45','N','Y','2009-08-01 05:37:24','O','http://www.ss8.com',NULL,NULL),(305,1078,'http://www.schneier.com/crypto-gram.html','Crypto-Gram newsletter.',NULL,'Ok','2009-02-02 14:10:24','N','Y','2009-08-01 05:37:26','O','http://www.schneier.com/crypto-gram.html',NULL,NULL),(306,1079,'http://www.musictoday.com','Music Today.',NULL,'Ok','2009-02-02 14:10:25','N','Y','2009-08-01 05:37:36','O','http://www.musictoday.com',NULL,NULL),(307,1080,'http://www.heartagram.com','HIM band.',NULL,'Ok','2009-02-02 14:10:25','N','Y','2009-08-01 05:38:13','O','http://www.heartagram.com',NULL,NULL),(308,1080,'http://www.warnerbrosrecords.com/artists','Warner Brothers Records.',NULL,'Ok','2009-02-02 14:11:37','Y','Y','2009-08-01 05:38:15','O','http://www.warnerbrosrecords.com/find.php',NULL,NULL),(309,1084,'http://www.netsecurity.org/article.php?id=764','A Simple Guide to Securing USB Memory Sticks.',NULL,'Ok','2009-02-02 14:43:09','N','Y','2009-08-01 05:38:16','O','http://www.netsecurity.org/article.php?id=764',NULL,NULL),(310,1084,'http://www.stealthsurfer.biz','Stealth Ideas Inc.',NULL,'Ok','2009-02-02 14:43:09','N','Y','2009-08-01 05:38:22','O','http://www.stealthsurfer.biz',NULL,NULL),(311,1085,'http://www.faqs.org/docs/Linux-HOWTO/Loopback-Encrypted-Filesystem-HOWTO.html','Linux Loopback Encrypted Filesystem How To.',NULL,'Ok','2009-02-02 15:05:06','N','Y','2009-08-01 05:38:23','O','http://www.faqs.org/docs/Linux-HOWTO/Loopback-Encrypted-Filesystem-HOWTO.html',NULL,NULL),(312,1085,'http://www.digitalhermit.com/~kwan/kernel.html','Rebuild Linux kernel How To.',NULL,'Err','2009-02-02 15:05:06','N','N',NULL,'O','http://www.digitalhermit.com/~kwan/kernel.html',NULL,NULL),(313,1085,'http://uk.geocities.com/osin1941/encryptfs.html','Author\'s web site.',NULL,'Ok','2009-02-02 15:05:06','N','Y','2009-08-01 05:38:26','O','http://uk.geocities.com/osin1941/encryptfs.html',NULL,NULL),(314,1086,'http://deekayen.net','Author\'s web site.',NULL,'Ok','2009-02-02 15:05:08','N','Y','2009-08-01 05:38:31','O','http://deekayen.net',NULL,NULL),(315,1046,'http://www.hope.net','HOPE conference.',NULL,'Ok','2009-02-10 14:40:16','N','Y','2009-08-01 05:40:40','O','http://www.hope.net',NULL,NULL),(316,1047,'http://tinyurl.com','TinyURL.',NULL,'Ok','2009-02-10 14:40:17','N','Y','2009-08-01 05:40:45','O','http://tinyurl.com',NULL,NULL),(317,1047,'http://unxutils.sourceforge.net','wget.',NULL,'Ok','2009-02-10 14:40:17','N','Y','2009-08-01 05:40:49','O','http://unxutils.sourceforge.net',NULL,NULL),(318,1047,'http://www.hexworkshop.com','Hex Workshop.',NULL,'Ok','2009-02-10 14:40:18','N','Y','2009-08-01 05:40:50','O','http://www.hexworkshop.com',NULL,NULL),(319,1047,'http://tinyurl.com/84wyu','Test JPEG Image File.',NULL,'Err','2009-02-10 14:40:19','N','N',NULL,'O','http://tinyurl.com/84wyu',NULL,NULL),(320,1047,'http://tinyurl.com/3eqr','Open Directory Redirection Provider Listing.',NULL,'Ok','2009-02-10 14:40:20','N','Y','2009-08-01 05:40:56','O','http://tinyurl.com/3eqr',NULL,NULL),(321,1047,'http://neworder.box.sk','Author\'s web site',NULL,'Ok','2009-02-10 14:43:46','N','Y','2009-08-01 05:41:08','O','http://neworder.box.sk',NULL,NULL),(322,1049,'http://www.timesonline.co.uk/newspaper/0,,176-1869818,00.html','Sunday Times article.',NULL,'Ok','2009-02-11 09:49:02','N','Y','2009-08-01 05:41:11','O','http://www.timesonline.co.uk/newspaper/0,,176-1869818,00.html',NULL,NULL),(323,1049,'http://www.guk.co.uk','?.',NULL,'Err','2009-02-11 09:49:02','N','N',NULL,'O','http://www.guk.co.uk',NULL,NULL),(324,1049,'http://www.e-plate.com','e-plate RFID solutions.',NULL,'Ok','2009-02-11 09:49:03','N','Y','2009-08-01 05:41:18','O','http://www.e-plate.com',NULL,NULL),(325,1049,'http://www.auroraserv.co.uk','?.',NULL,'Err','2009-02-11 09:49:22','N','N',NULL,'O','http://www.auroraserv.co.uk',NULL,NULL),(326,1049,'http://www.efestivals.co.uk/news/050807a.shtml','eFestivals guide to festivaling.',NULL,'Err','2009-02-11 09:49:23','N','N',NULL,'O','http://www.efestivals.co.uk/news/050807a.shtml',NULL,NULL),(327,1049,'http://www.publications.parliament.uk/pa/cm200304/cmselect/cmhaff/130/13007.htm','Parliament Publications and Records.',NULL,'Ok','2009-02-11 09:49:24','N','Y','2009-08-01 05:41:53','O','http://www.publications.parliament.uk/pa/cm200304/cmselect/cmhaff/130/13007.htm',NULL,NULL),(328,1049,'http://www.identix.com','L-1 Identity Solutions.',NULL,'Ok','2009-02-11 09:49:24','N','Y','2009-08-01 05:42:02','O','http://www.identix.com',NULL,NULL),(329,1049,'http://news.bbc.co.uk/2/hi/uk_news/magazine/4035285.stm','BBC News Magazine article.',NULL,'Ok','2009-02-11 09:49:25','N','Y','2009-08-01 05:42:24','O','http://news.bbc.co.uk/2/hi/uk_news/magazine/4035285.stm',NULL,NULL),(330,1051,'http://www.freeworlddialup.com','Free World Dialup.',NULL,'Ok','2009-02-11 10:01:50','N','Y','2009-08-01 05:42:25','O','http://www.freeworlddialup.com',NULL,NULL),(331,1052,'http://www.hawkingtech.com','Hawking web site.',NULL,'Ok','2009-02-11 10:09:04','N','Y','2009-08-01 05:42:46','O','http://www.hawkingtech.com',NULL,NULL),(332,1052,'http://www.uclinux.org','uClinux Embedded Linux Microcontroller Project.',NULL,'Ok','2009-02-11 10:09:05','N','Y','2009-08-01 05:42:49','O','http://www.uclinux.org',NULL,NULL),(333,1052,'http://www.uclibc.org','Lightweight C standard library.',NULL,'Ok','2009-02-11 10:09:06','N','Y','2009-08-01 05:42:51','O','http://www.uclibc.org',NULL,NULL),(334,1052,'http://zaphot.tmx24.de/board/index.php','German NAX hacking BB.',NULL,'Err','2009-02-11 10:09:07','N','N',NULL,'O','http://zaphot.tmx24.de/board/index.php',NULL,NULL),(335,1058,'http://yourfavorite.com/checkwriter/verify.htm','Routing Tool.',NULL,'Ok','2009-02-11 13:42:17','N','Y','2009-08-01 05:42:56','O','http://yourfavorite.com/checkwriter/verify.htm',NULL,NULL),(336,1060,'http://www.the-fifth-hope.org','EFF\'s speeches from Fifth Hope.',NULL,'Ok','2009-02-12 07:12:03','N','Y','2009-08-01 05:42:58','O','http://www.the-fifth-hope.org',NULL,NULL),(337,1060,'http://www.negativland.com/intprop.html','Negativland and Steve Albini.',NULL,'Err','2009-02-12 07:12:03','N','N',NULL,'O','http://www.negativland.com/intprop.html',NULL,NULL),(338,1063,'http://www.blackratchet.org','Author\'s web site.',NULL,'Ok','2009-02-12 07:30:39','N','Y','2009-08-01 05:42:59','O','http://www.blackratchet.org',NULL,NULL),(339,1063,'http://www.stromcarlson.com','Strom Carlson\'s web site.',NULL,'Ok','2009-02-12 07:30:39','N','Y','2009-08-01 05:43:01','O','http://www.stromcarlson.com',NULL,NULL),(340,1063,'http://www.yapl.org','Yet Another Payphone List.',NULL,'Ok','2009-02-12 07:30:40','N','Y','2009-08-01 05:43:02','O','http://www.yapl.org',NULL,NULL),(341,1063,'http://www.payphone-directory.org','ElJefe\'s Payphone Directory.',NULL,'Ok','2009-02-12 07:30:40','N','Y','2009-08-01 05:43:05','O','http://www.payphone-directory.org',NULL,NULL),(342,1063,'http://www.payphone-project.com/','Payphone Project.',NULL,'Ok','2009-02-12 07:32:29','N','Y','2009-08-01 05:43:15','O','http://www.payphone-project.com/',NULL,NULL),(343,1063,'http://www.phoneswarm.com','Phone Swarm.',NULL,'Ok','2009-02-12 07:30:41','N','Y','2009-08-01 05:43:21','O','http://www.phoneswarm.com',NULL,NULL),(344,1065,'http://www.nirsoft.net/utils/mspass.html','MessenPass.',NULL,'Ok','2009-02-12 07:42:26','N','Y','2009-08-01 05:43:25','O','http://www.nirsoft.net/utils/mspass.html',NULL,NULL),(345,1065,'http://www.nirsoft.net/utils/mailpv.html','Mail PassView.',NULL,'Ok','2009-02-12 07:42:27','N','Y','2009-08-01 05:43:27','O','http://www.nirsoft.net/utils/mailpv.html',NULL,NULL),(346,1065,'http://www.nirsoft.net/utils/pspv.html','Protected Storage PassView.',NULL,'Ok','2009-02-12 07:42:27','N','Y','2009-08-01 05:43:27','O','http://www.nirsoft.net/utils/pspv.html',NULL,NULL),(347,1065,'http://www.nirsoft.net/utils/network_password_recovery.html','Network Password Recovery.',NULL,'Ok','2009-02-12 07:43:13','N','Y','2009-08-01 05:43:28','O','http://www.nirsoft.net/utils/network_password_recovery.html',NULL,NULL),(348,1066,'http://www.xmpp.org','XMPP protocol and RFC.',NULL,'Ok','2009-02-12 08:10:29','N','Y','2009-08-01 05:43:30','O','http://www.xmpp.org',NULL,NULL),(349,1027,'http://www.hifi-remote.com/files/tools','Software mentioned in article.',NULL,'Ok','2009-02-17 11:17:57','N','Y','2009-08-04 17:20:11','O','http://www.hifi-remote.com/files/tools',NULL,NULL),(350,1027,'http://controlremote.sourceforge.net','RemoteMaster program.',NULL,'Ok','2009-02-17 11:17:57','N','Y','2009-08-04 17:20:21','O','http://controlremote.sourceforge.net',NULL,NULL),(351,1027,'http://www.hifi-remote.com/forums/dload.php','Device Section of JP1 forum.',NULL,'Ok','2009-02-17 11:17:59','N','Y','2009-08-04 17:20:34','O','http://www.hifi-remote.com/forums/dload.php',NULL,NULL),(352,1028,'http://www.page33.tk','Author\'s web site.',NULL,'Ok','2009-02-17 11:28:43','N','Y','2009-08-04 17:20:37','O','http://www.page33.tk',NULL,NULL),(353,1030,'http://www.sharpmail.co.uk','Fake SMS site.',NULL,'Ok','2009-02-17 11:55:20','N','Y','2009-08-04 17:21:10','O','http://www.sharpmail.co.uk',NULL,NULL),(354,1031,'http://www.voipinfo.org','Tutorial and Configuration examples.',NULL,'Ok','2009-02-17 12:01:18','N','Y','2009-08-04 17:21:15','O','http://www.voipinfo.org',NULL,NULL),(355,1031,'http://www.geisterstunde.org','Authors web site.',NULL,'Ok','2009-02-17 12:01:19','N','Y','2009-08-04 17:21:20','O','http://www.geisterstunde.org',NULL,NULL),(356,1033,'http://www.freeworlddialup.com','Free World Dialup.',NULL,'Ok','2009-02-17 14:03:50','N','Y','2009-08-04 17:21:21','O','http://www.freeworlddialup.com',NULL,NULL),(357,1033,'http://bellsmind.net','Bell\'s Mind.',NULL,'Ok','2009-02-17 14:03:51','N','Y','2009-08-04 17:21:21','O','http://bellsmind.net',NULL,NULL),(358,1033,'http://www.ipkall.com','ip kall - Free IP Calling.',NULL,'Ok','2009-02-17 14:03:51','N','Y','2009-08-04 17:21:27','O','http://www.ipkall.com',NULL,NULL),(359,1033,'http://spooftel.com','Spoof Tel - Worlds Leader in Caller ID Spoofing.',NULL,'Ok','2009-02-17 14:03:52','N','Y','2009-08-04 17:22:00','O','http://spooftel.com',NULL,NULL),(360,1033,'http://camophone.com','camophone.com domain for sale.',NULL,'Ok','2009-02-17 14:03:52','N','Y','2009-08-04 17:22:01','O','http://camophone.com',NULL,NULL),(361,1033,'http://xten.com','xten forwards to CounterPath.',NULL,'Ok','2009-02-17 14:03:53','N','Y','2009-08-04 17:22:25','O','http://xten.com',NULL,NULL),(362,1033,'http://sipphone.com','SIP Phone.',NULL,'Ok','2009-02-17 14:03:54','N','Y','2009-08-04 17:22:31','O','http://sipphone.com',NULL,NULL),(363,1033,'http://terracall.com','terracall.com.',NULL,'Ok','2009-02-17 14:03:54','N','Y','2009-08-04 17:22:31','O','http://terracall.com',NULL,NULL),(364,1033,'http://calluk.com','calluk.com forwards to wikipedia?!?.',NULL,'Ok','2009-02-17 14:03:55','N','Y','2009-08-04 17:22:34','O','http://calluk.com',NULL,NULL),(365,1033,'http://uk2me.com','uk2me.com domain for sale.',NULL,'Ok','2009-02-17 14:03:56','N','Y','2009-08-04 17:22:34','O','http://uk2me.com',NULL,NULL),(366,1033,'http://vonage.com','Vonage Internet Phone Service.',NULL,'Ok','2009-02-17 14:03:58','N','Y','2009-08-04 17:23:47','O','http://vonage.com',NULL,NULL),(367,1033,'http://asterisk.org','Open Source PBX.',NULL,'Ok','2009-02-17 14:03:59','N','Y','2009-08-04 17:24:10','O','http://asterisk.org',NULL,NULL),(368,1037,'http://sion.quickie.net/keysigning.txt','Efficient Group Key Signing Method.',NULL,'Ok','2009-02-17 14:26:43','N','Y','2009-08-04 17:24:12','O','http://sion.quickie.net/keysigning.txt',NULL,NULL),(369,1037,'http://en.wikipedia.org/wiki/Alice_and_Bob','Wikipedia: Alice and Bob.',NULL,'Ok','2009-02-17 14:25:37','N','Y','2009-08-04 17:24:17','O','http://en.wikipedia.org/wiki/Alice_and_Bob',NULL,NULL),(370,1037,'http://atom.smasher.org/links','Author\'s web site links.',NULL,'Ok','2009-02-17 14:25:39','N','Y','2009-08-04 17:24:25','O','http://atom.smasher.org/links',NULL,NULL),(371,1045,'http://homepage.mac.com/jrc/contrib/mobile_office/AppleUSBCDCDriverPatch.pkg.tar','Modem driver patch download.',NULL,'Ok','2009-02-17 16:43:17','N','Y','2009-08-04 17:24:28','O','http://homepage.mac.com/jrc/contrib/mobile_office/AppleUSBCDCDriverPatch.pkg.tar',NULL,NULL),(372,1045,'http://homepage.mac.com/jrc/contrib/tzones','Instructions for bluetooth phones.',NULL,'Ok','2009-02-17 16:43:21','N','Y','2009-08-04 17:24:48','O','http://homepage.mac.com/jrc/contrib/tzones',NULL,NULL),(373,1045,'http://www.taniwha.org.uk','USB cable connected modem script.',NULL,'Ok','2009-02-17 16:43:22','N','Y','2009-08-04 17:25:01','O','http://www.taniwha.org.uk',NULL,NULL),(374,1045,'http://www.taniwha.org.uk/gprs.html','APN provider information.',NULL,'Ok','2009-02-17 16:43:22','N','Y','2009-08-04 17:25:03','O','http://www.taniwha.org.uk/gprs.html',NULL,NULL),(375,1045,'http://www.howardforums.com','Forum for questions.',NULL,'Ok','2009-02-17 16:43:23','N','Y','2009-08-04 17:25:54','O','http://www.howardforums.com',NULL,NULL),(376,1045,'http://groups.yahoo.com/group/maccellphone','Yahoo forum for questions.',NULL,'Ok','2009-02-17 16:43:27','N','Y','2009-08-04 17:26:25','O','http://groups.yahoo.com/group/maccellphone',NULL,NULL),(377,1000,'http://www.acesoft.net/download.htm','Tracks Eraser Pro.',NULL,'Ok','2009-02-23 10:24:50','N','Y','2009-08-04 17:35:28','O','http://www.acesoft.net/download.htm',NULL,NULL),(378,1000,'http://www.microsoft.com/technet/security/tools/mbsahome.mspx','Microsoft Baseline Security Analyzer.',NULL,'Ok','2009-02-23 10:25:59','N','Y','2009-08-04 17:35:36','O','http://www.microsoft.com/technet/security/tools/mbsahome.mspx',NULL,NULL),(379,1001,'http://freshmeat.net/browse/245','Web Log Analysis Programs.',NULL,'Ok','2009-02-23 10:31:24','N','Y','2009-08-04 17:36:33','O','http://freshmeat.net/browse/245',NULL,NULL),(380,1002,'http://coffer.com/mac_find','MAC assignment finder.',NULL,'Ok','2009-02-23 10:37:02','N','Y','2009-08-04 17:37:49','O','http://coffer.com/mac_find',NULL,NULL),(381,1003,'http://groups.yahoo.com/group/PRO-83','PRO-83 Yahoo Group.',NULL,'Ok','2009-02-23 17:00:48','N','Y','2009-08-04 17:38:19','O','http://groups.yahoo.com/group/PRO-83',NULL,NULL),(382,1003,'http://kb9ukd.com/camera/2004/041126-Pro83/index.html','Additional pictures.',NULL,'Ok','2009-02-23 17:00:49','N','Y','2009-08-04 17:38:32','O','http://kb9ukd.com/camera/2004/041126-Pro83/index.html',NULL,NULL),(383,1003,'http://www.tokoam.com/semiconductors/pdF/tk10931v.pdf','TOKO TK10931V.',NULL,'Ok','2009-02-24 07:55:53','N','Y','2009-08-04 17:38:33','O','http://www.tokoam.com/semiconductors/pdF/tk10931v.pdf',NULL,NULL),(384,1004,'http://www.openssh.org','OpenSSH.',NULL,'Ok','2009-02-23 17:00:50','N','Y','2009-08-04 17:38:37','O','http://www.openssh.org',NULL,NULL),(385,1004,'http://www.macssh.com','MacSSH.',NULL,'Ok','2009-02-23 17:00:51','N','Y','2009-08-04 17:38:39','O','http://www.macssh.com',NULL,NULL),(386,1004,'http://www.chiark.greenend.org/uk/~sgtatham/putty','PuTTY.',NULL,'Ok','2009-02-23 17:00:51','N','Y','2009-08-04 17:38:40','O','http://www.chiark.greenend.org/uk/~sgtatham/putty',NULL,NULL),(387,1005,'http://tor.freehaven.net/dist','Tor download.',NULL,'Ok','2009-02-24 08:02:29','N','Y','2009-08-04 17:38:52','O','http://tor.freehaven.net/dist',NULL,NULL),(388,1005,'http://www.monkey.org/~provos/libevent','libevent download.',NULL,'Ok','2009-02-24 08:02:29','N','Y','2009-08-04 17:38:55','O','http://www.monkey.org/~provos/libevent',NULL,NULL),(389,1005,'http://www.publicproxyservers.com','Proxy servers.',NULL,'Ok','2009-02-24 08:02:30','N','Y','2009-08-04 17:39:04','O','http://www.publicproxyservers.com',NULL,NULL),(390,1005,'http://checkip.dyndns.org','Check your IP address.',NULL,'Ok','2009-02-24 08:02:31','N','Y','2009-08-04 17:39:04','O','http://checkip.dyndns.org',NULL,NULL),(391,1006,'http://sources.redhat.com/cygwin/setup.exe','Cygwin.',NULL,'Ok','2009-02-24 08:16:50','N','Y','2009-08-04 17:39:09','O','http://sources.redhat.com/cygwin/setup.exe',NULL,NULL),(392,1006,'http://www.agroman.net/corkscrew','Corkscrew.',NULL,'Ok','2009-02-24 08:16:51','N','Y','2009-08-04 17:39:11','O','http://www.agroman.net/corkscrew',NULL,NULL),(393,1006,'http://www.rdesktop.org','rdesktop client.',NULL,'Ok','2009-02-24 08:16:51','N','Y','2009-08-04 17:39:15','O','http://www.rdesktop.org',NULL,NULL),(394,1007,'http://www.softwinter.com','Sentry 2020.',NULL,'Ok','2009-02-24 08:22:12','N','Y','2009-08-04 17:39:25','O','http://www.softwinter.com',NULL,NULL),(395,1007,'http://www.tweakxp.com/tweakutility/','Microsoft Tweek UI.',NULL,'Ok','2009-02-24 08:24:11','Y','Y','2009-08-04 17:39:49','O','http://www.tweakxp.com/tweak31.aspx',NULL,NULL),(396,1010,'http://www.nefc.com/2004_Downloads/FTTP_NEFC_2004.zip','Verizon Fiber Powerpoint Presentation.',NULL,'Ok','2009-02-24 08:52:26','N','Y','2009-08-04 17:39:50','O','http://www.nefc.com/2004_Downloads/FTTP_NEFC_2004.zip',NULL,NULL),(397,1011,'http://www.sysinternals.com','Auturuns.',NULL,'Ok','2009-02-24 08:52:29','N','Y','2009-08-04 17:39:55','O','http://www.sysinternals.com',NULL,NULL),(398,1015,'http://www.cygwin.com','Cygwin.',NULL,'Ok','2009-02-24 10:42:06','N','Y','2009-08-04 17:39:59','O','http://www.cygwin.com',NULL,NULL),(399,1015,'http://www.chiark.greenend.org.uk/~sgtatham/putty','Putty.',NULL,'Ok','2009-02-24 10:43:31','N','Y','2009-08-04 17:40:02','O','http://www.chiark.greenend.org.uk/~sgtatham/putty',NULL,NULL),(400,1015,'http://www.analogx.com/contents/download/network/proxy.htm','AnalogX Proxy.',NULL,'Ok','2009-02-24 10:42:07','N','Y','2009-08-04 17:40:40','O','http://www.analogx.com/contents/download/network/proxy.htm',NULL,NULL),(401,1015,'http://www.squid-cache.org','Squid.',NULL,'Ok','2009-02-24 10:42:09','N','Y','2009-08-04 17:40:53','O','http://www.squid-cache.org',NULL,NULL),(402,1016,'http://www.neuber.com','Security Task Manager.',NULL,'Ok','2009-02-24 10:52:26','N','Y','2009-08-04 17:41:21','O','http://www.neuber.com',NULL,NULL),(403,1016,'http://www.cexx.org','LSPfix.',NULL,'Ok','2009-02-24 10:52:27','N','Y','2009-08-04 17:41:32','O','http://www.cexx.org',NULL,NULL),(404,1016,'http://research.microsoft.com/research/pubs/view.aspx?type=Technical%20Report&id=775','Microsoft article on Rootkit attacks.',NULL,'Ok','2009-02-24 10:52:29','N','Y','2009-08-04 17:41:40','O','http://research.microsoft.com/research/pubs/view.aspx?type=Technical%20Report&id=775',NULL,NULL),(405,1017,'http://imageshack.us','Image Shack.',NULL,'Ok','2009-02-24 10:52:29','N','Y','2009-08-04 17:42:00','O','http://imageshack.us',NULL,NULL),(406,1022,'http://www.cs.uit.no/~daniels/PingTunnel','Ping Tunnel.',NULL,'Ok','2009-02-24 11:14:13','N','Y','2009-08-04 17:42:09','O','http://www.cs.uit.no/~daniels/PingTunnel',NULL,NULL),(407,976,'http://www.google.com/intl/xx-hacker/','Google Hacker Translator.',NULL,'Ok','2009-03-02 09:07:46','N','Y','2009-08-07 17:04:23','O','http://www.google.com/intl/xx-hacker/',NULL,NULL),(408,978,'http://clsc.net/research/google-302-page-hijack.htm','Page Hijack Exploit.',NULL,'Ok','2009-03-02 09:18:36','N','Y','2009-08-07 17:04:33','O','http://clsc.net/research/google-302-page-hijack.htm',NULL,NULL),(409,978,'http://en.wikipedia.org/wiki/Pagerank','Wikipedia PageRank article.',NULL,'Ok','2009-03-02 09:18:36','N','Y','2009-08-07 17:04:43','O','http://en.wikipedia.org/wiki/Pagerank',NULL,NULL),(410,982,'http://cvs.sourceforge.net/viewcvs.py/gaim/gaim/doc/Attic/PROTOCOL?rev=1.4','AMI protocol documentation.',NULL,'Err','2009-03-02 10:25:45','N','N',NULL,'O','http://cvs.sourceforge.net/viewcvs.py/gaim/gaim/doc/Attic/PROTOCOL?rev=1.4',NULL,NULL),(411,984,'http://insecure.org/nmap','NMap.',NULL,'Ok','2009-03-02 10:37:03','N','Y','2009-08-07 17:04:52','O','http://insecure.org/nmap',NULL,NULL),(412,985,'http://www.protware.com','ProtWare Html Guardian.',NULL,'Ok','2009-03-02 10:46:23','N','Y','2009-08-07 17:04:56','O','http://www.protware.com',NULL,NULL),(413,985,'http://www.antssoft.com/htmlprotector','AntsSoft Html Protector.',NULL,'Ok','2009-03-02 10:46:24','N','Y','2009-08-07 17:05:04','O','http://www.antssoft.com/htmlprotector',NULL,NULL),(414,985,'http://www.aevita.com/web/lock/samples.htm','Aevita Software Html Encrypt and Password Protect.',NULL,'Ok','2009-03-02 10:46:24','N','Y','2009-08-07 17:05:07','O','http://www.aevita.com/web/lock/samples.htm',NULL,NULL),(415,985,'http://www.guymal.com/nospam_email_link.php','Guymal\'s text encryption utility.',NULL,'Ok','2009-03-02 10:46:25','N','Y','2009-08-07 17:05:14','O','http://www.guymal.com/nospam_email_link.php',NULL,NULL),(416,985,'http://javascript.about.com/library/blenc.htm','Free html encrypting package.',NULL,'Ok','2009-03-02 10:46:25','N','Y','2009-08-07 17:05:37','O','http://javascript.about.com/library/blenc.htm',NULL,NULL),(417,986,'http://www.nirsoft.net','Nir Sofer website.',NULL,'Ok','2009-03-02 10:55:41','N','Y','2009-08-07 17:05:45','O','http://www.nirsoft.net',NULL,NULL),(418,986,'http://www.forensicideas.com','Protected Storage Explorer.',NULL,'Ok','2009-03-02 10:55:41','N','Y','2009-08-07 17:05:50','O','http://www.forensicideas.com',NULL,NULL),(419,986,'http://www.oxid.it','Cain & Abel.',NULL,'Ok','2009-03-02 10:55:42','N','Y','2009-08-07 17:06:06','O','http://www.oxid.it',NULL,NULL),(420,986,'http://lastbit.com/wse/default.asp','Secret Explorer.',NULL,'Ok','2009-03-02 10:55:43','N','Y','2009-08-07 17:06:14','O','http://lastbit.com/wse/default.asp',NULL,NULL),(421,987,'http://www.activestate.com','ActiveState Perl.',NULL,'Ok','2009-03-02 14:10:39','N','Y','2009-08-07 17:06:53','O','http://www.activestate.com',NULL,NULL),(422,987,'http://www.CPAN.org','Comprehensive Perl Archive Network.',NULL,'Ok','2009-03-02 14:10:39','N','Y','2009-08-07 17:06:55','O','http://www.CPAN.org',NULL,NULL),(423,989,'http://www.lapl.org','Los Angeles Public Library.',NULL,'Ok','2009-03-02 14:21:35','N','Y','2009-08-07 17:06:57','O','http://www.lapl.org',NULL,NULL),(424,989,'http://reserve.lapl.org/cgi-bin/libadmin.exe','Login for reservation web application.',NULL,'Err','2009-03-02 14:21:35','N','N',NULL,'O','http://reserve.lapl.org/cgi-bin/libadmin.exe',NULL,NULL),(425,990,'http://en.paradisepoker.com/','Paradise Poker News.',NULL,'Ok','2009-03-02 14:37:12','Y','Y','2009-08-07 17:08:25','O','http://www.paradisepoker.com/news.html',NULL,NULL),(426,990,'http://www.paradisepoker.com/blackjack.html','Paradise Poker Blackjack Rules.',NULL,'Err','2009-03-02 14:29:11','N','N',NULL,'O','http://www.paradisepoker.com/blackjack.html',NULL,NULL),(427,990,'http://www.wizardofodds.com/blackjack','Wizard of Odds: Basic Strategy.',NULL,'Ok','2009-03-02 14:29:12','N','Y','2009-08-07 17:08:26','O','http://www.wizardofodds.com/blackjack',NULL,NULL),(428,990,'http://www.wizardofodds.com/blackjackhouse-edge-calculator.html','Wizard of Odds: House Advantage Calculator.',NULL,'Ok','2009-03-02 14:29:13','N','Y','2009-08-07 17:08:26','O','http://www.wizardofodds.com/blackjackhouse-edge-calculator.html',NULL,NULL),(429,992,'http://www.dot.tk','DotTK.',NULL,'Ok','2009-03-02 14:53:31','N','Y','2009-08-07 17:09:43','O','http://www.dot.tk',NULL,NULL),(430,992,'http://www.bluecollarcamel.net/articles','Author\'s web site.',NULL,'Err','2009-03-02 14:53:31','N','N',NULL,'O','http://www.bluecollarcamel.net/articles',NULL,NULL),(431,993,'http://watson3.voicestream.com','T-Mobile intranet.',NULL,'Ok','2009-03-02 16:42:09','N','Y','2009-08-07 17:09:49','O','http://watson3.voicestream.com',NULL,NULL),(432,997,'http://www.barcodesinc.com','Barcode Generator.',NULL,'Ok','2009-03-02 17:01:45','N','Y','2009-08-07 17:10:10','O','http://www.barcodesinc.com',NULL,NULL),(433,998,'http://www.audiovox.com','Car Security and Remote Start Systems.',NULL,'Ok','2009-03-09 08:39:40','N','Y','2009-08-07 17:10:10','O','http://www.audiovox.com',NULL,NULL),(434,956,'http://www.2600.com/mta','2600 Metrocard Project.',NULL,'Ok','2009-03-09 08:39:42','N','Y','2009-08-07 17:12:49','O','http://www.2600.com/mta',NULL,NULL),(435,960,'http://www.cisco.com/en/US/products/hw/phones/ps379/products_tech_note09186a0080094584.shtml\r\n','Converting a Cisco 7940/7960 CallManager Phone to a SIP Phone.',NULL,'Ok','2009-03-09 09:01:58','Y','Y','2009-08-07 17:12:50','O','http://www.cisco.com/warp/public/788/voip/handset_to_sip.html',NULL,NULL),(436,960,'http://www.cisco.com/en/US/products/sw/voicesw/ps2156/products_administration_guide_chapter09186a00801d1988.html','Monitoring Cisco SIP IP Phones.',NULL,'Err','2009-03-09 09:01:58','N','N',NULL,'O','http://www.cisco.com/en/US/products/sw/voicesw/ps2156/products_administration_guide_chapter09186a00801d1988.html',NULL,NULL),(437,960,'http://www.cisco.com/en/US/products/sw/voicesw/ps2156/products_administration_guide_chapter09186a0080087511.html','Getting Started with Your Cisco SIP IP Phone.',NULL,'Err','2009-03-09 09:01:59','N','N',NULL,'O','http://www.cisco.com/en/US/products/sw/voicesw/ps2156/products_administration_guide_chapter09186a0080087511.html',NULL,NULL),(438,960,'http://www.voip-info.org/wiki-Asterisk%20phone%20cisco%2079xx','Configuring Cisco 79xx phones with Asterisk.',NULL,'Ok','2009-03-09 09:02:00','N','Y','2009-08-07 17:12:54','O','http://www.voip-info.org/wiki-Asterisk%20phone%20cisco%2079xx',NULL,NULL),(439,962,'http://www.coffer.com/mac_find','MAC address vendor lookup.',NULL,'Ok','2009-03-09 09:14:04','N','Y','2009-08-07 17:12:59','O','http://www.coffer.com/mac_find',NULL,NULL),(440,963,'http://www.wap3gx.com','WAP3GX gateway.',NULL,'Ok','2009-03-09 10:49:46','N','Y','2009-08-07 17:13:02','O','http://www.wap3gx.com',NULL,NULL),(441,963,'http://www.waptunnel.com','Free public WAP gateway.',NULL,'Ok','2009-03-09 10:49:46','N','Y','2009-08-07 17:13:02','O','http://www.waptunnel.com',NULL,NULL),(442,963,'http://www.howardforums.com','WAP forum.',NULL,'Ok','2009-03-09 10:49:50','N','Y','2009-08-07 17:13:31','O','http://www.howardforums.com',NULL,NULL),(443,963,'http://wap.google.com','Google\'s wireless WML page.',NULL,'Ok','2009-03-09 10:49:50','N','Y','2009-08-07 17:13:32','O','http://wap.google.com',NULL,NULL),(444,963,'http://wireless.mapquest.com','Wireless Mapquest.',NULL,'Ok','2009-03-09 10:51:29','Y','Y','2009-08-07 17:13:42','O','http://wireless.mapquest.com/aolmq_wml',NULL,NULL),(445,963,'http://wap.superpages.com/cgi/cs_client.cgi','Wireless Superpages.',NULL,'Ok','2009-03-09 10:49:51','N','Y','2009-08-07 17:13:45','O','http://wap.superpages.com/cgi/cs_client.cgi',NULL,NULL),(446,963,'http://www.trillian.cc','Trillian Pro.',NULL,'Ok','2009-03-09 10:49:51','N','Y','2009-08-07 17:14:25','O','http://www.trillian.cc',NULL,NULL),(447,963,'http://www.iknow.ca/imeverywhere','I.M. Everywhere.',NULL,'Ok','2009-03-09 10:49:52','N','Y','2009-08-07 17:14:26','O','http://www.iknow.ca/imeverywhere',NULL,NULL),(448,965,'http://www.blockbuster.com','Blockbuster.',NULL,'Ok','2009-03-09 10:59:26','N','Y','2009-08-07 17:16:22','O','http://www.blockbuster.com',NULL,NULL),(449,965,'http://www.bluecube.com','BlueCube.',NULL,'Ok','2009-03-09 10:59:35','N','Y','2009-08-07 17:16:30','O','http://www.bluecube.com',NULL,NULL),(450,966,'https://www.google.com/accounts/NewAccount','Google account sign up.','','Ok','2009-03-09 11:02:37','Y','Y','2010-10-20 11:06:05','O','http://services.google.com/urlconsole/controller','',''),(451,966,'http://www.google.com/support/webmasters/bin/answer.py?answer=164734','Goggle\'s Listing Removal Resource.','','Ok','2009-03-09 11:02:42','Y','Y','2010-10-20 10:49:27','O','http://www.google.com.gr/remove.html','',''),(452,967,'http://phenoelit.de','Hijetter.',NULL,'Ok','2009-03-09 11:28:45','N','Y','2009-08-07 17:16:54','O','http://phenoelit.de',NULL,NULL),(453,968,'http://dodgit.com','Disposable email site.',NULL,'Ok','2009-03-09 11:28:46','Y','Y','2009-08-07 17:16:56','O','http://dodgeit.com',NULL,NULL),(454,968,'http://mailinator.com','Another disposable email site.',NULL,'Ok','2009-03-09 11:28:46','N','Y','2009-08-07 17:17:03','O','http://mailinator.com',NULL,NULL),(455,968,'http://willhackforfood.biz','Free temporary email site.',NULL,'Ok','2009-03-09 11:28:47','N','Y','2009-08-07 17:17:09','O','http://willhackforfood.biz',NULL,NULL),(456,970,'http://www.majorgeeks.com/download4086.html','CWSchredder.',NULL,'Ok','2009-03-09 11:45:33','N','Y','2009-08-07 17:17:19','O','http://www.majorgeeks.com/download4086.html',NULL,NULL),(457,970,'http://www.safer-networking.org/en/download/index.html','Spybot S&D.',NULL,'Ok','2009-03-09 11:45:33','N','Y','2009-08-07 17:17:30','O','http://www.safer-networking.org/en/download/index.html',NULL,NULL),(458,970,'http://www.majorgeeks.com/download506.html','Adaware SE.',NULL,'Ok','2009-03-09 11:45:34','N','Y','2009-08-07 17:17:34','O','http://www.majorgeeks.com/download506.html',NULL,NULL),(459,970,'http://www.webroot.com/wb/downloads/index.php','SpySweeper.',NULL,'Ok','2009-03-09 11:46:42','N','Y','2009-08-07 17:17:57','O','http://www.webroot.com/wb/downloads/index.php',NULL,NULL),(460,970,'http://www.spychecker.com/program/hijackthis.html','HijackThis.',NULL,'Ok','2009-03-09 11:45:35','N','Y','2009-08-07 17:18:03','O','http://www.spychecker.com/program/hijackthis.html',NULL,NULL),(461,970,'http://www.spychecker.com/program/kazaagone.html','KazaaBegone.',NULL,'Err','2009-03-09 11:45:35','N','N',NULL,'O','http://www.spychecker.com/program/kazaagone.html',NULL,NULL),(462,970,'http://www.litepc.com/ieradicator.html','IEeradicator.',NULL,'Ok','2009-03-09 11:45:36','N','Y','2009-08-07 17:18:04','O','http://www.litepc.com/ieradicator.html',NULL,NULL),(463,971,'http://zoran.net/wm_resources/netcat_hobbit.asp','Netcat reference.',NULL,'Err','2009-03-09 13:35:07','N','N',NULL,'O','http://zoran.net/wm_resources/netcat_hobbit.asp',NULL,NULL),(464,971,'http://www.securityfocus.com/tools/137','SecurityFocus Netcat.',NULL,'Ok','2009-03-09 13:35:08','N','Y','2009-08-07 17:18:12','O','http://www.securityfocus.com/tools/137',NULL,NULL),(465,973,'http://www.fcc.gov','FCC.',NULL,'Ok','2009-03-09 13:36:26','N','Y','2009-08-07 17:18:14','O','http://www.fcc.gov',NULL,NULL),(466,974,'http://ipv6tb.he.net','Hurricane Electric.',NULL,'Ok','2009-03-09 13:35:09','N','Y','2009-08-07 17:18:19','O','http://ipv6tb.he.net',NULL,NULL),(467,974,'http://www.hexago.com','Hexago.',NULL,'Ok','2009-03-09 13:35:18','N','Y','2009-08-07 17:18:32','O','http://www.hexago.com',NULL,NULL),(468,974,'http://www.ipv6.bieringer.de','IPv6 test web site.',NULL,'Err','2009-03-09 13:35:19','N','N',NULL,'O','http://www.ipv6.bieringer.de',NULL,NULL),(470,942,'http://www.lavasoft.de','Ad-Aware.',NULL,'Ok','2009-03-16 10:36:56','N','Y','2009-08-07 17:20:12','O','http://www.lavasoft.de',NULL,NULL),(471,942,'http://www.safer-networking.org','SpyBot Search & Destroy.',NULL,'Ok','2009-03-16 10:36:57','N','Y','2009-08-07 17:20:31','O','http://www.safer-networking.org',NULL,NULL),(472,942,'http://www.symantec.com','Norton Anti-Virus.',NULL,'Ok','2009-03-16 10:36:58','N','Y','2009-08-07 17:20:38','O','http://www.symantec.com',NULL,NULL),(473,942,'http://www.javacoolsoftware.com','SpyWare Guard and SpyWare Blaster.',NULL,'Ok','2009-03-16 10:36:58','N','Y','2009-08-07 17:20:49','O','http://www.javacoolsoftware.com',NULL,NULL),(474,942,'http://www.panicware.com','Pop Up Stopper Free Edition.',NULL,'Ok','2009-03-16 10:36:58','N','Y','2009-08-07 17:20:53','O','http://www.panicware.com',NULL,NULL),(475,942,'http://www.msn.com','MSN Pop Up Stopping Toolbar.',NULL,'Ok','2009-03-16 10:36:59','N','Y','2009-08-07 17:21:25','O','http://www.msn.com',NULL,NULL),(476,942,'http://www.zonelabs.com','ZoneAlarm Firewall.',NULL,'Ok','2009-03-16 10:37:00','N','Y','2009-08-07 17:22:25','O','http://www.zonelabs.com',NULL,NULL),(477,943,'http://www.realvnc.com','Real VNC.',NULL,'Ok','2009-03-16 10:48:06','Y','Y','2009-08-07 17:22:39','O','http://www.realvnc.org',NULL,NULL),(478,943,'http://www.snort.org','Snort.',NULL,'Ok','2009-03-16 10:45:43','N','Y','2009-08-07 17:22:52','O','http://www.snort.org',NULL,NULL),(479,943,'http://www.snort-wireless.org','Snort Wireless.',NULL,'Ok','2009-03-16 10:45:43','N','Y','2009-08-07 17:22:54','O','http://www.snort-wireless.org',NULL,NULL),(480,943,'http://www.pgpi.org','PGP.',NULL,'Ok','2009-03-16 10:45:44','N','Y','2009-08-07 17:22:56','O','http://www.pgpi.org',NULL,NULL),(481,943,'http://www.gnupg.org','Gnu Privacy Guard.',NULL,'Ok','2009-03-16 10:45:45','N','Y','2009-08-07 17:23:00','O','http://www.gnupg.org',NULL,NULL),(482,943,'http://www.insecure.org','NMap.',NULL,'Ok','2009-03-16 10:45:46','N','Y','2009-08-07 17:23:14','O','http://www.insecure.org',NULL,NULL),(483,943,'http://www.nessus.org','Nessus.',NULL,'Ok','2009-03-16 10:45:46','N','Y','2009-08-07 17:23:32','O','http://www.nessus.org',NULL,NULL),(484,943,'http://www.iamsam.com','Author\'s website.',NULL,'Ok','2009-03-16 10:49:45','N','Y','2009-08-07 17:23:32','O','http://www.iamsam.com',NULL,NULL),(485,946,'http://msdn.microsoft.com/library','Microsoft MSDN.',NULL,'Ok','2009-03-16 11:16:00','N','Y','2009-08-07 17:23:33','O','http://msdn.microsoft.com/library',NULL,NULL),(486,946,'http://www.w3.org','WWW Consortium.',NULL,'Ok','2009-03-16 11:16:00','N','Y','2009-08-07 17:23:35','O','http://www.w3.org',NULL,NULL),(487,946,'http://www.faqs.org/rfcs/rfc-titles.html','RFCs.',NULL,'Ok','2009-03-16 11:16:00','N','Y','2009-08-07 17:23:36','O','http://www.faqs.org/rfcs/rfc-titles.html',NULL,NULL),(488,946,'http://muffin.doit.org','Muffin.',NULL,'Ok','2009-03-16 11:16:01','N','Y','2009-08-07 17:23:39','O','http://muffin.doit.org',NULL,NULL),(489,946,'http://netcat.sourceforge.net','Netcat.',NULL,'Ok','2009-03-16 11:16:01','N','Y','2009-08-07 17:23:39','O','http://netcat.sourceforge.net',NULL,NULL),(490,946,'http://www.php.net','PHP.',NULL,'Ok','2009-03-16 11:16:02','N','Y','2009-08-07 17:23:45','O','http://www.php.net',NULL,NULL),(491,946,'http://www.knoppix.net','Knoppix Linux.',NULL,'Ok','2009-03-16 11:16:02','N','Y','2009-08-07 17:23:46','O','http://www.knoppix.net',NULL,NULL),(492,946,'http://www.tldp.org','Linux guide.',NULL,'Ok','2009-03-16 11:16:03','N','Y','2009-08-07 17:23:48','O','http://www.tldp.org',NULL,NULL),(493,946,'http://www.gentoo.org','Gentoo Linux.',NULL,'Ok','2009-03-16 11:16:03','N','Y','2009-08-07 17:24:03','O','http://www.gentoo.org',NULL,NULL),(494,953,'http://www.hbx.us/shells/index.php','Free Shell Project.',NULL,'Err','2009-03-16 14:09:25','N','N',NULL,'O','http://www.hbx.us/shells/index.php',NULL,NULL),(495,953,'http://www.cygwin.com','Windows Cygwin.',NULL,'Ok','2009-03-16 14:09:26','N','Y','2009-08-07 17:24:06','O','http://www.cygwin.com',NULL,NULL),(496,954,'http://bisqwit.iki.fi/barcode.html','Online barcode generator.',NULL,'Ok','2009-03-16 14:14:36','N','Y','2009-08-07 17:24:07','O','http://bisqwit.iki.fi/barcode.html',NULL,NULL),(497,917,'http://stegfs.sourceforge.net','StegFS.',NULL,'Ok','2009-03-23 07:42:55','N','Y','2009-08-07 17:24:39','O','http://stegfs.sourceforge.net',NULL,NULL),(498,917,'http://www.pgpi.org','PGPDisk.',NULL,'Ok','2009-03-23 07:42:56','N','Y','2009-08-07 17:24:41','O','http://www.pgpi.org',NULL,NULL),(499,919,'http://bitconjurer.org/BitTorrent','Bit Torrent official homepage.',NULL,'Ok','2009-03-23 07:51:51','N','Y','2009-08-07 17:24:43','O','http://bitconjurer.org/BitTorrent',NULL,NULL),(500,921,'http://www.dvddecrypter.com','DVD Decrypter.',NULL,'Ok','2009-03-23 08:05:57','N','Y','2009-08-07 17:24:46','O','http://www.dvddecrypter.com',NULL,NULL),(501,921,'http://flaskmpeg.sourceforge.net/','FLASK MPEG.',NULL,'Ok','2009-03-23 08:08:23','Y','Y','2009-08-07 17:24:46','O','http://www.flaskmpeg.net',NULL,NULL),(502,921,'http://www.microsoft.com','Microsoft - search for \"Media Encoder\".',NULL,'Ok','2009-03-23 08:06:21','N','Y','2009-08-07 17:24:54','O','http://www.microsoft.com',NULL,NULL),(503,921,'http://forum.nokia.com','Nokia Multimedia Encoder.',NULL,'Ok','2009-03-23 08:06:27','N','Y','2009-08-07 17:25:15','O','http://forum.nokia.com',NULL,NULL),(504,922,'http://spymac.com','Spymac 1 GB.',NULL,'Ok','2009-03-23 08:14:55','N','Y','2009-08-07 17:26:03','O','http://spymac.com',NULL,NULL),(505,922,'http://rediff.com','Rediff 1GB.',NULL,'Ok','2009-03-23 08:15:02','N','Y','2009-08-07 17:26:12','O','http://rediff.com',NULL,NULL),(506,922,'http://hotmail.com','Hotmail 250 MB.',NULL,'Ok','2009-03-23 08:15:09','N','Y','2009-08-07 17:26:17','O','http://hotmail.com',NULL,NULL),(507,922,'http://mail.yahoo.com','Yahoo! 100 MB.',NULL,'Ok','2009-03-23 08:15:12','N','Y','2009-08-07 17:26:47','O','http://mail.yahoo.com',NULL,NULL),(508,922,'http://ilia.ws/archives/15_Gmail_as_an_online_backup_system.html','Another backup system.',NULL,'Ok','2009-03-23 08:15:14','N','Y','2009-08-07 17:27:02','O','http://ilia.ws/archives/15_Gmail_as_an_online_backup_system.html',NULL,NULL),(509,923,'http://www.phpclasses.org/browse/package/514.html','PHP netgeoclass.',NULL,'Ok','2009-03-23 08:24:18','N','Y','2009-08-07 17:27:37','O','http://www.phpclasses.org/browse/package/514.html',NULL,NULL),(510,923,'http://www.whois.sc','IP locator.',NULL,'Ok','2009-03-23 08:24:25','N','Y','2009-08-07 17:27:41','O','http://www.whois.sc',NULL,NULL),(511,923,'http://www.atstake.com/research/tools/network_utilities','Netcat.',NULL,'Ok','2009-03-23 08:24:31','N','Y','2009-08-07 17:27:47','O','http://www.atstake.com/research/tools/network_utilities',NULL,NULL),(512,923,'http://www.onlamp.com/pub/a/onlamp/2003/05/29/netcat.html','O\'Reilly\'s OnLamp.',NULL,'Ok','2009-03-23 08:24:34','N','Y','2009-08-07 17:28:00','O','http://www.onlamp.com/pub/a/onlamp/2003/05/29/netcat.html',NULL,NULL),(513,923,'http://ettercap.sf.net','Ethercap.',NULL,'Ok','2009-03-23 08:24:40','N','Y','2009-08-07 17:28:04','O','http://ettercap.sf.net',NULL,NULL),(514,923,'http://fink.sf.net','Fink.',NULL,'Ok','2009-03-23 08:24:45','N','Y','2009-08-07 17:28:11','O','http://fink.sf.net',NULL,NULL),(515,924,'http://www.bieringer.de/linux/IPv6','Linux IPv6 HOWTO.',NULL,'Ok','2009-03-23 08:30:25','N','Y','2009-08-07 17:28:56','O','http://www.bieringer.de/linux/IPv6',NULL,NULL),(516,924,'http://www.microsoft.com','Search for \'Introduction to IPv6\' by Joseph Davies.',NULL,'Ok','2009-03-23 08:30:29','N','Y','2009-08-07 17:29:00','O','http://www.microsoft.com',NULL,NULL),(517,924,'http://support.nokia.com','Reference Guides for Nokia IPSO.',NULL,'Ok','2009-03-23 08:30:37','N','Y','2009-08-07 17:29:01','O','http://support.nokia.com',NULL,NULL),(518,929,'http://www.leightronix.com','Leightronix Control Products.',NULL,'Ok','2009-03-23 11:41:55','N','Y','2009-08-07 17:29:06','O','http://www.leightronix.com',NULL,NULL),(519,931,'http://www.iamsam.com','Author\'s web site.',NULL,'Ok','2009-03-23 11:42:00','N','Y','2009-08-07 17:29:07','O','http://www.iamsam.com',NULL,NULL),(520,901,'http://www.gainpublishing.com','GAIN/Gator.',NULL,'Ok','2009-03-30 11:11:59','N','Y','2009-08-07 17:29:41','O','http://www.gainpublishing.com',NULL,NULL),(521,901,'http://www.newfreeware.com/internet/711','Newton Knows Best.',NULL,'Ok','2009-03-30 11:12:00','N','Y','2009-08-07 17:29:47','O','http://www.newfreeware.com/internet/711',NULL,NULL),(522,901,'http://www.lavasoftusa.com','Adaware from Lavasoft.',NULL,'Ok','2009-03-30 11:12:03','N','Y','2009-08-07 17:30:05','O','http://www.lavasoftusa.com',NULL,NULL),(523,901,'http://www.cexx.org','Counterexploitation.',NULL,'Ok','2009-03-30 11:12:03','N','Y','2009-08-07 17:30:10','O','http://www.cexx.org',NULL,NULL),(524,901,'http://www.claria.com','Gator parent company Claria Corporation',NULL,'Ok','2009-03-30 11:14:44','N','Y','2009-08-07 17:30:17','O','http://www.claria.com',NULL,NULL),(525,902,'http://www.criticalmassmedia.com','Critical Mass Media.',NULL,'Ok','2009-03-30 11:26:17','N','Y','2009-08-07 17:30:27','O','http://www.criticalmassmedia.com',NULL,NULL),(526,904,'http://www.yak.net/acidus','Author\'s web site (Most Significant Bit).',NULL,'Ok','2009-03-30 11:43:58','N','Y','2009-08-07 17:30:28','O','http://www.yak.net/acidus',NULL,NULL),(527,904,'http://www.phrack.org/issues.html?issue=37&id=6#article\r\n','Card-O-Rama: Magnetic Stripe Technology and Beyond.',NULL,'Ok','2009-03-30 11:49:59','Y','Y','2009-08-07 17:30:36','O','http://www.phrack.org/phrack/37/P37-06',NULL,NULL),(528,904,'http://www.gae.ucm.es/padilla/extrawork/stripe.html','Luis Padilla Visdomine.',NULL,'Err','2009-03-30 11:44:02','N','N',NULL,'O','http://www.gae.ucm.es/padilla/extrawork/stripe.html',NULL,NULL),(529,904,'http://www.blackmarket-press.net/info/plastic/magstripe/card_tech/3IFD.pdf','Interface a TTL Magcard Reader to the PC Game port.',NULL,'Ok','2009-03-30 11:44:03','N','Y','2009-08-07 17:30:47','O','http://www.blackmarket-press.net/info/plastic/magstripe/card_tech/3IFD.pdf',NULL,NULL),(530,904,'http://www.logix4u.cjb.net','Logix 4 U homepage.',NULL,'Err','2009-03-30 11:45:03','N','N',NULL,'O','http://www.logix4u.cjb.net',NULL,NULL),(531,907,'http://www.cl.cam.ac.uk/~mgk25/iso-time.html','Markus Kuhn web page.',NULL,'Ok','2009-03-30 13:08:13','N','Y','2009-08-07 17:30:57','O','http://www.cl.cam.ac.uk/~mgk25/iso-time.html',NULL,NULL),(532,908,'http://www.transitv.com','Transit TV.',NULL,'Ok','2009-03-30 13:26:59','N','Y','2009-08-07 17:31:05','O','http://www.transitv.com',NULL,NULL),(533,908,'http://www.transitv.com/network3/wht_papr/3000-CDI-002-003.pdf','Transit TV White Paper.',NULL,'Err','2009-03-30 13:26:59','N','N',NULL,'O','http://www.transitv.com/network3/wht_papr/3000-CDI-002-003.pdf',NULL,NULL),(534,909,'http://www.omnilock.com','Omni Locks.',NULL,'Ok','2009-03-30 13:27:00','N','Y','2009-08-07 17:31:14','O','http://www.omnilock.com',NULL,NULL),(535,909,'http://www.passwordrecoverytools.com/','AccentSoft Office/Access password recovery.',NULL,'Ok','2009-03-30 13:30:52','Y','Y','2009-08-07 17:31:15','O','http://www.passwordrecoverytools.com/en/office.shtml',NULL,NULL),(536,910,'http://www.iroffer.org','iroffer.',NULL,'Ok','2009-03-30 13:44:52','N','Y','2009-08-07 17:31:23','O','http://www.iroffer.org',NULL,NULL),(537,910,'http://www.packetnews.org','XDCC search engine.',NULL,'Err','2009-03-30 13:45:52','N','N',NULL,'O','http://www.packetnews.org',NULL,NULL),(538,910,'http://www.nforce.nl','.nfos archive.',NULL,'Ok','2009-03-30 13:45:52','N','Y','2009-08-07 17:31:25','O','http://www.nforce.nl',NULL,NULL),(539,910,'http://www.isonews.com','Seized by federal government.',NULL,'Err','2009-03-30 13:46:20','N','N',NULL,'O','http://www.isonews.com',NULL,NULL),(540,910,'http://www.vcdquality.com','For movies specifically.',NULL,'Ok','2009-03-30 13:46:22','N','Y','2009-08-07 17:31:33','O','http://www.vcdquality.com',NULL,NULL),(541,910,'http://www.fxp.nl','fxp stuff.',NULL,'Ok','2009-03-30 13:46:22','N','Y','2009-08-07 17:31:33','O','http://www.fxp.nl',NULL,NULL),(542,910,'http://www.jtpfxp.net','Large archive of fxp/script kiddie tutorials.',NULL,'Ok','2009-03-30 13:46:23','N','Y','2009-08-07 17:31:37','O','http://www.jtpfxp.net',NULL,NULL),(543,910,'http://www.downhillbattle.org','Fuck the FIAA!.',NULL,'Ok','2009-03-30 13:46:25','N','Y','2009-08-07 17:31:46','O','http://www.downhillbattle.org',NULL,NULL),(544,911,'http://www.tentacle.franken.de/papers/hiddencams.pdf','How to Find Hidden Cameras.',NULL,'Ok','2009-03-30 13:58:29','N','Y','2009-08-07 17:31:54','O','http://www.tentacle.franken.de/papers/hiddencams.pdf',NULL,NULL),(545,882,'http://www.IMChaos.com','IMChaos.',NULL,'Ok','2009-04-06 08:39:40','N','Y','2009-08-07 17:33:33','O','http://www.IMChaos.com',NULL,NULL),(546,883,'http://free.prohosting.com','Free web hosting with CGI support.',NULL,'Ok','2009-04-06 08:43:21','N','Y','2009-08-07 17:33:35','O','http://free.prohosting.com',NULL,NULL),(547,883,'http://lwp.linpro.no/lwp','Info on LWP and libwww-perl modules.',NULL,'Ok','2009-04-06 08:43:23','N','Y','2009-08-07 17:33:41','O','http://lwp.linpro.no/lwp',NULL,NULL),(548,889,'http://info.astrian.net/jargon/terms/w/war_dialer.html','Definition from the Jargon Dictionary.',NULL,'Err','2009-04-06 10:14:16','N','N',NULL,'O','http://info.astrian.net/jargon/terms/w/war_dialer.html',NULL,NULL),(549,889,'http://www.compu-america.com/prodLG.jsp?prodId=f083b8fb22.1','Palm V modem Product page.',NULL,'Err','2009-04-06 10:14:16','N','N',NULL,'O','http://www.compu-america.com/prodLG.jsp?prodId=f083b8fb22.1',NULL,NULL),(550,889,'http://www.atstake.com/research/tools/info_gathering','TBA.',NULL,'Ok','2009-04-06 10:14:17','N','Y','2009-08-07 17:33:42','O','http://www.atstake.com/research/tools/info_gathering',NULL,NULL),(551,889,'http://www.atstake.com/research/tools/info_gathering/tba_handbook.pdf','TBA Handbook.',NULL,'Ok','2009-04-06 10:14:17','N','Y','2009-08-07 17:33:43','O','http://www.atstake.com/research/tools/info_gathering/tba_handbook.pdf',NULL,NULL),(552,892,'http://xbox-linux.sf.net','xbox-linux web site.',NULL,'Ok','2009-04-06 10:26:31','N','Y','2009-08-07 17:33:44','O','http://xbox-linux.sf.net',NULL,NULL),(553,892,'http://www.sourceforge.net/projects/xbox-linux','Source Forge project page.',NULL,'Ok','2009-04-06 10:26:33','N','Y','2009-08-07 17:34:33','O','http://www.sourceforge.net/projects/xbox-linux',NULL,NULL),(554,895,'http://www.secunia.com','Secunia.',NULL,'Ok','2009-04-06 10:56:46','N','Y','2009-08-07 17:34:48','O','http://www.secunia.com',NULL,NULL),(555,1339,'http://tinyurl.com/atapwd','atapwd.exe.',NULL,'Ok','2009-04-09 07:51:01','N','Y','2009-07-24 13:22:18','O','http://tinyurl.com/atapwd',NULL,NULL),(556,1339,'http://tinyurl.com/cmrrse','Center for Magnetic Recording Research.',NULL,'Ok','2009-04-09 07:51:05','N','Y','2009-07-24 13:22:20','O','http://tinyurl.com/cmrrse',NULL,NULL),(557,1339,'http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml','HDDErase.exe.',NULL,'Ok','2009-04-09 07:53:09','N','Y','2009-07-24 13:22:29','O','http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml',NULL,NULL),(558,1339,'http://www.deadondemand.com','Dead On Demand Digital Shredder.',NULL,'Ok','2009-04-09 07:51:06','N','Y','2009-07-24 13:22:30','O','http://www.deadondemand.com',NULL,NULL),(559,1339,'http://www.vogon-investigation.com/password-cracker.htm','Vogon Password Cracker Pod.',NULL,'Ok','2009-04-09 07:53:10','N','Y','2009-07-24 13:22:40','O','http://www.vogon-investigation.com/password-cracker.htm',NULL,NULL),(560,1342,'http://www.KellyKeeton.com','Author\'s web site.',NULL,'Ok','2009-04-09 08:00:59','N','Y','2009-07-24 13:22:43','O','http://www.KellyKeeton.com',NULL,NULL),(561,1343,'http://tariffs.qwest.com:8000/Q_Tariffs/index.htm','Qwest tariff library.',NULL,'Ok','2009-04-09 08:01:00','N','Y','2009-07-24 13:22:45','O','http://tariffs.qwest.com:8000/Q_Tariffs/index.htm',NULL,NULL),(562,1343,'http://serviceguide.att.com/servicelibrary/consumer/ext/index.cfm','AT&T tariff library.',NULL,'Ok','2009-04-09 08:02:16','N','Y','2009-07-24 13:22:54','O','http://serviceguide.att.com/servicelibrary/consumer/ext/index.cfm',NULL,NULL),(563,1343,'http://www22.verizon.com/tariffs','Verizon tariff library.',NULL,'Ok','2009-04-09 08:01:01','N','Y','2009-07-24 13:23:25','O','http://www22.verizon.com/tariffs',NULL,NULL),(564,1343,'http://tariffs.net/hawaiiantel','Hawaiian Telecom tariff library.',NULL,'Ok','2009-04-09 08:01:02','N','Y','2009-07-24 13:23:31','O','http://tariffs.net/hawaiiantel',NULL,NULL),(565,1343,'http://www.tariffnet.com','Pay site that tracks tariffs.',NULL,'Ok','2009-04-09 08:01:04','N','Y','2009-07-24 13:23:38','O','http://www.tariffnet.com',NULL,NULL),(566,1343,'http://www.puc.state.or.us','Oregon PUC.',NULL,'Ok','2009-04-09 08:01:04','N','Y','2009-07-24 13:23:44','O','http://www.puc.state.or.us',NULL,NULL),(567,1343,'http://www.utc.wa.gov','Washington Utilities and Transportation Commission.',NULL,'Ok','2009-04-09 08:01:06','N','Y','2009-07-24 13:23:55','O','http://www.utc.wa.gov',NULL,NULL),(568,1345,'http://www.mp3-tech.org/programmer/frame_header.html','Author\'s web site.',NULL,'Ok','2009-04-09 08:20:17','N','Y','2009-07-24 13:23:59','O','http://www.mp3-tech.org/programmer/frame_header.html',NULL,NULL),(569,1345,'http://le-hacker.org/hacks/mpeg-drafts/11172-3.pdf','MP3\' Tech.',NULL,'Ok','2009-04-09 08:20:19','N','Y','2009-07-24 13:24:08','O','http://le-hacker.org/hacks/mpeg-drafts/11172-3.pdf',NULL,NULL),(570,1345,'http://en.wikipedia.org/wiki/MP3','MPEG Part 3 Audio.',NULL,'Ok','2009-04-09 08:20:19','Y','Y','2009-07-24 13:24:13','O','http://en.wikipedia.com/en/wiki/MP3',NULL,NULL),(571,1345,'http://en.wikipedia.org/wiki/ASCII','MP3 Wikipedia.',NULL,'Ok','2009-04-09 08:20:20','Y','Y','2009-07-24 13:24:16','O','http://en.wikipedia.com/en/wiki/ASCII',NULL,NULL),(572,1345,'http://en.wikipedia.org/wiki/Uuencoding','ASCII Wikipedia.',NULL,'Ok','2009-04-09 08:20:20','Y','Y','2009-07-24 13:24:17','O','http://en.wikipedia.com/en/wiki/Uuencoding',NULL,NULL),(573,1345,'http://www.petitcolas.net/fabien/steganography/mp3stego','Uuencoding Wikipedia.',NULL,'Ok','2009-04-09 08:20:21','N','Y','2009-07-24 13:24:29','O','http://www.petitcolas.net/fabien/steganography/mp3stego',NULL,NULL),(574,1347,'http://www.google.com/radioautomation/index.html','Google Automation Home.',NULL,'Ok','2009-04-09 09:31:02','N','Y','2009-07-24 13:24:31','O','http://www.google.com/radioautomation/index.html',NULL,NULL),(575,1347,'http://www.google.com/radioautomation/productshardware.html','Google \"Green Machine\".',NULL,'Ok','2009-04-09 09:31:02','N','Y','2009-07-24 13:24:33','O','http://www.google.com/radioautomation/productshardware.html',NULL,NULL),(576,1347,'http://stations.dmarc.net/Console/NextPlays.aspx?c=WXYZ-FM&tz=EST&n=1&a=TAS','Replace WXYZ/FM with your favorite station.',NULL,'Ok','2009-04-09 09:29:31','N','Y','2009-07-24 13:24:48','O','http://stations.dmarc.net/Console/NextPlays.aspx?c=WXYZ-FM&tz=EST&n=1&a=TAS',NULL,NULL),(577,1348,'http://www.etext.org','Etext Archives.',NULL,'Ok','2009-04-09 09:32:36','N','Y','2009-07-24 13:24:49','O','http://www.etext.org',NULL,NULL),(578,1348,'http://www.scour.com','Scour website.',NULL,'Ok','2009-04-09 09:32:37','N','Y','2009-07-24 13:25:26','O','http://www.scour.com',NULL,NULL),(579,1348,'http://www.autohotkey.com','AutoHotKey.',NULL,'Ok','2009-04-09 09:32:37','N','Y','2009-07-24 13:25:29','O','http://www.autohotkey.com',NULL,NULL),(580,1350,'http://www.phonelosers.net','Author\'s web site.',NULL,'Ok','2009-04-09 09:35:14','N','Y','2009-07-24 13:25:36','O','http://www.phonelosers.net',NULL,NULL),(581,1350,'http://www.handsoff.org','Hands Off The Internet (Industry sponsored fake!).',NULL,'Ok','2009-04-09 09:35:16','N','Y','2009-07-24 13:25:46','O','http://www.handsoff.org',NULL,NULL),(582,1350,'http://www.netcompetition.org','NetCompetition (Industry sponsored fake!).',NULL,'Ok','2009-04-09 09:35:16','N','Y','2009-07-24 13:25:53','O','http://www.netcompetition.org',NULL,NULL),(583,1350,'http://www.savetheInternet.com','Save the Internet Coalition (sign petition).',NULL,'Ok','2009-04-09 09:35:19','N','Y','2009-07-24 13:25:54','O','http://www.savetheInternet.com',NULL,NULL),(584,1350,'http://www.openInternetcoalition.com','Open Internet Coalition.',NULL,'Ok','2009-04-09 09:35:20','N','Y','2009-07-24 13:26:02','O','http://www.openInternetcoalition.com',NULL,NULL),(585,1350,'http://www.google.com/help/netneutrality.html','A Guide to Net Neutrality for Google Users.',NULL,'Ok','2009-04-09 09:36:43','N','Y','2009-07-24 13:26:05','O','http://www.google.com/help/netneutrality.html',NULL,NULL),(586,1350,'http://en.wikipedia.org/wiki/Network_neutrality','Google discusses it\'s support for Net Neutrality.',NULL,'Ok','2009-04-09 09:36:20','N','Y','2009-07-24 13:26:08','O','http://en.wikipedia.org/wiki/Network_neutrality',NULL,NULL),(587,1350,'http://en.wikipedia.org/wiki/Network_neutrality_in_the_United_States','Google discusses it\'s support for Net Neutrality 2.',NULL,'Ok','2009-04-09 09:36:21','N','Y','2009-07-24 13:26:10','O','http://en.wikipedia.org/wiki/Network_neutrality_in_the_United_States',NULL,NULL),(588,1350,'http://www.opencongress.org/bill/110-h5353/show','H.R. 5353 Internet Freedom Preservation Act of 2008.',NULL,'Ok','2009-04-09 09:36:21','N','Y','2009-07-24 13:26:56','O','http://www.opencongress.org/bill/110-h5353/show',NULL,NULL),(589,1352,'http://secondlife.com','Second Life.',NULL,'Ok','2009-04-09 09:39:57','N','Y','2009-07-24 13:27:14','O','http://secondlife.com',NULL,NULL),(590,1352,'http://secondlife.com/currency','Lindex currency exchange.',NULL,'Ok','2009-04-09 09:40:00','N','Y','2009-07-24 13:28:04','O','http://secondlife.com/currency',NULL,NULL),(591,1352,'https://secure-web0.secondlife.com/account/request.php','Second Life password retrieval page.',NULL,'Ok','2009-04-09 09:40:00','N','Y','2009-07-24 13:28:42','O','https://secure-web0.secondlife.com/account/request.php',NULL,NULL),(592,1352,'http://www.doxpara.com/?p-1024','Dan Kiminsky DSN cache poisoning vulnerability.',NULL,'Ok','2009-04-09 09:40:03','N','Y','2009-07-24 13:29:52','O','http://www.doxpara.com/?p-1024',NULL,NULL),(593,1352,'http://www.schneier.com/blog/archives/2005/02/the_curse_of_th.html','Essay about how easy it is to find the answer to secret question',NULL,'Ok','2009-04-09 09:40:03','N','Y','2009-07-24 13:29:58','O','http://www.schneier.com/blog/archives/2005/02/the_curse_of_th.html',NULL,NULL),(594,1352,'http://blog.secondlife.com/2006/09/08/urgent-security-announcement','Second Life security breach.',NULL,'Ok','2009-04-09 09:40:04','N','Y','2009-07-24 13:31:54','O','http://blog.secondlife.com/2006/09/08/urgent-security-announcement',NULL,NULL),(595,1354,'http://hacklab.to','Toronto - HackLabTO.',NULL,'Ok','2009-04-09 09:44:13','N','Y','2009-07-24 13:32:12','O','http://hacklab.to',NULL,NULL),(596,1354,'http://foulab.org','Montreal - FOULAB.',NULL,'Ok','2009-04-09 09:44:13','N','Y','2009-07-24 13:32:17','O','http://foulab.org',NULL,NULL),(597,1354,'http://256.makerslocal.org','Huntsville - Makers Local 256.',NULL,'Ok','2009-04-09 09:44:14','N','Y','2009-07-24 13:32:50','O','http://256.makerslocal.org',NULL,NULL),(598,1354,'http://machineproject.com','Los Angeles - Machine Project.',NULL,'Ok','2009-04-09 09:44:15','N','Y','2009-07-24 13:32:53','O','http://machineproject.com',NULL,NULL),(599,1354,'https://www.noisebridge.net/wiki/Noisebridge','San Francisco - Noisebridge.',NULL,'Ok','2009-07-15 14:47:17','Y','Y','2009-07-24 13:33:12','O','https://noisebridge.net',NULL,NULL),(600,1354,'http://www.hacdc.org','HacDC.',NULL,'Ok','2009-04-09 09:45:17','N','Y','2009-07-24 13:33:23','O','http://www.hacdc.org',NULL,NULL),(601,1354,'http://hacclearwater.wikia.com/wiki/HacClearwater','Clearwater - HacClearwater.',NULL,'Ok','2009-04-09 09:45:18','N','Y','2009-07-24 13:33:32','O','http://hacclearwater.wikia.com/wiki/HacClearwater',NULL,NULL),(602,1354,'http://miters.mit.edu','Boston - MITERS.',NULL,'Ok','2009-04-09 09:45:19','N','Y','2009-07-24 13:33:42','O','http://miters.mit.edu',NULL,NULL),(603,1354,'http://sfcomplex.org','Santa Fe - Santa Fe Complex.',NULL,'Ok','2009-04-09 09:45:20','N','Y','2009-07-24 13:34:03','O','http://sfcomplex.org',NULL,NULL),(604,1354,'http://nycresistor.com','Brooklyn - NYC Resistor.',NULL,'Ok','2009-04-09 09:45:22','N','Y','2009-07-24 13:34:26','O','http://nycresistor.com',NULL,NULL),(605,1354,'http://www.eyebeam.org','New York City - Eyebeam.',NULL,'Ok','2009-04-09 09:45:23','N','Y','2009-07-24 13:34:33','O','http://www.eyebeam.org',NULL,NULL),(606,1354,'http://www.carrborocoworking.com','Carrboro Creative Coworking.',NULL,'Ok','2009-04-09 09:51:48','N','Y','2009-07-24 13:34:44','O','http://www.carrborocoworking.com',NULL,NULL),(607,1354,'http://www.thehacktory.org','Philadelphia - The Hacktory.',NULL,'Ok','2009-04-09 09:45:25','N','Y','2009-07-24 13:34:51','O','http://www.thehacktory.org',NULL,NULL),(608,1354,'http://dc401.org/site','Providence - DC401.',NULL,'Ok','2009-04-09 09:45:25','N','Y','2009-07-24 13:34:55','O','http://dc401.org/site',NULL,NULL),(609,1354,'http://www.actlab.utexas.edu','Austin - ACTLab.',NULL,'Ok','2009-04-09 09:45:26','N','Y','2009-07-24 13:35:01','O','http://www.actlab.utexas.edu',NULL,NULL),(610,1354,'http://saturdayhouse.org','Seattle - Saturday House.',NULL,'Ok','2009-04-09 09:45:27','N','Y','2009-07-24 13:35:05','O','http://saturdayhouse.org',NULL,NULL),(611,1354,'http://bucketworks.org','Milwaukee - Bucketworks.',NULL,'Ok','2009-04-09 09:45:29','N','Y','2009-07-24 13:35:59','O','http://bucketworks.org',NULL,NULL),(612,1361,'http://www.notacon.org','Notacon 6.',NULL,'Ok','2009-04-09 10:07:16','N','Y','2009-07-24 13:36:04','O','http://www.notacon.org',NULL,NULL),(613,1361,'http://www.chicagocon.com','ChicagoCon.',NULL,'Ok','2009-04-09 10:07:17','N','Y','2009-07-24 13:36:07','O','http://www.chicagocon.com',NULL,NULL),(614,1361,'http://layerone.info','LayerOne.',NULL,'Ok','2009-04-09 10:07:20','N','Y','2009-07-24 13:36:14','O','http://layerone.info',NULL,NULL),(615,1361,'http://shakacon.org','Shakacon.',NULL,'Ok','2009-04-09 10:07:21','N','Y','2009-07-24 13:36:20','O','http://shakacon.org',NULL,NULL),(616,1361,'http://www.toorcamp.org','ToorCamp.',NULL,'Ok','2009-04-09 10:07:23','N','Y','2009-07-24 13:36:34','O','http://www.toorcamp.org',NULL,NULL),(617,1361,'http://www.defcon.org','Defcon 17.',NULL,'Ok','2009-04-09 10:07:24','N','Y','2009-07-24 13:36:40','O','http://www.defcon.org',NULL,NULL),(618,1361,'http://har2009.org','Hacking at Random.',NULL,'Ok','2009-04-09 10:07:26','N','Y','2009-07-24 13:36:44','O','http://har2009.org',NULL,NULL),(619,1361,'http://www.sec-t.org','SEC-T.',NULL,'Ok','2009-04-09 10:07:27','N','Y','2009-07-24 13:36:51','O','http://www.sec-t.org',NULL,NULL),(620,1361,'http://ccc.de','Chaos Communication Congress.',NULL,'Ok','2009-04-09 10:07:27','N','Y','2009-07-24 13:36:59','O','http://ccc.de',NULL,NULL),(621,862,'http://www.modernbio.com/ind9.htm','Modern Biology, Inc. IND-9.',NULL,'Err','2009-04-13 07:47:42','N','N',NULL,'O','http://www.modernbio.com/ind9.htm',NULL,NULL),(622,862,'http://www.modernbio.com/TableOContents.htm','Modern Biology, Inc. catalog.',NULL,'Ok','2009-04-13 07:47:42','N','Y','2009-08-14 17:22:29','O','http://www.modernbio.com/TableOContents.htm',NULL,NULL),(623,862,'http://www.terrificscience.org/lessonexchange/PACTPDF/GlowingEcoli.pdf','E. coli transgenic protocol.',NULL,'Ok','2009-04-13 07:47:43','N','Y','2009-08-14 17:22:34','O','http://www.terrificscience.org/lessonexchange/PACTPDF/GlowingEcoli.pdf',NULL,NULL),(624,862,'http://shopping.discover.com/stores/servlet/ProductDisplay?catalogId=10000&storeId=10000&productId=53965','Discovery Channel kit.',NULL,'Err','2009-04-13 07:48:07','N','N',NULL,'O','http://shopping.discover.com/stores/servlet/ProductDisplay?catalogId=10000&storeId=10000&productId=53965',NULL,NULL),(625,862,'http://www.investigen.com/products.html','Investigen kits.',NULL,'Ok','2009-04-13 07:48:08','N','Y','2009-08-14 17:22:34','O','http://www.investigen.com/products.html',NULL,NULL),(626,862,'http://ncbi.nlm.nih.gov','GenBank or LocusLink.',NULL,'Err','2009-04-13 07:49:08','N','N',NULL,'O','http://ncbi.nlm.nih.gov',NULL,NULL),(627,862,'http://www.bdbiosciences.com/clontech','Clontech.',NULL,'Ok','2009-04-13 07:49:09','N','Y','2009-08-14 17:23:04','O','http://www.bdbiosciences.com/clontech',NULL,NULL),(628,862,'http://www1.qiagen.com/Products/Transfection/TransfectionReagents','Qiagen.',NULL,'Ok','2009-04-13 07:49:11','N','Y','2009-08-14 17:23:12','O','http://www1.qiagen.com/Products/Transfection/TransfectionReagents',NULL,NULL),(629,862,'http://www.qbiogene.com/literature/protocols/gene-expression/pdf/p-adeno-express.pdf','QBiogene.',NULL,'Err','2009-04-13 07:52:34','N','N',NULL,'O','http://www.qbiogene.com/literature/protocols/gene-expression/pdf/p-adeno-express.pdf',NULL,NULL),(630,862,'http://www.glofish.com','GFP zebrafish.',NULL,'Ok','2009-04-13 07:49:12','N','Y','2009-08-14 17:23:16','O','http://www.glofish.com',NULL,NULL),(631,862,'http://a32.lehman.cuny.edu/molbio_course/Basic_techniques.htm','Biology class.',NULL,'Err','2009-04-13 07:49:13','N','N',NULL,'O','http://a32.lehman.cuny.edu/molbio_course/Basic_techniques.htm',NULL,NULL),(632,863,'http://www.jurajbednar.com','Author\'s web site.',NULL,'Ok','2009-04-13 08:03:47','N','Y','2009-08-14 17:23:17','O','http://www.jurajbednar.com',NULL,NULL),(633,863,'http://certs.ipsca.com','ipsCA.',NULL,'Ok','2009-04-13 08:03:48','N','Y','2009-08-14 17:23:46','O','http://certs.ipsca.com',NULL,NULL),(634,865,'http://www.robotstxt.org','Robotstxt.org.',NULL,'Ok','2009-04-13 08:17:08','N','Y','2009-08-14 17:23:48','O','http://www.robotstxt.org',NULL,NULL),(635,865,'http://www.searchengineworld.com/robots/robots_tutorial.htm','Robots.txt tutorial.',NULL,'Err','2009-04-13 08:17:08','N','N',NULL,'O','http://www.searchengineworld.com/robots/robots_tutorial.htm',NULL,NULL),(636,866,'http://www.civil-liberties.com/soc_security/forms/bank_not.pdf','Notice to banks regarding use of SSN.',NULL,'Err','2009-04-13 08:24:22','N','N',NULL,'O','http://www.civil-liberties.com/soc_security/forms/bank_not.pdf',NULL,NULL),(637,866,'http://www.cardenroll.com','Stored value card.',NULL,'Err','2009-04-13 08:25:24','N','N',NULL,'O','http://www.cardenroll.com',NULL,NULL),(638,866,'http://www.privacyrights.org','Privacy info.',NULL,'Ok','2009-04-13 08:25:24','N','Y','2009-08-14 17:23:53','O','http://www.privacyrights.org',NULL,NULL),(639,866,'http://www.privacy.ca.gov','Privacy laws in California.',NULL,'Ok','2009-04-13 08:25:26','N','Y','2009-08-14 17:24:04','O','http://www.privacy.ca.gov',NULL,NULL),(640,867,'http://standards.ieee.org/regauth/oui/oui.txt','Manufacturer MAC address.',NULL,'Ok','2009-04-13 10:06:50','N','Y','2009-08-14 17:24:13','O','http://standards.ieee.org/regauth/oui/oui.txt',NULL,NULL),(641,869,'http://www.netstumbler.com','Mini Stumbler.',NULL,'Ok','2009-04-13 10:13:41','N','Y','2009-08-14 17:24:23','O','http://www.netstumbler.com',NULL,NULL),(642,869,'http://www.pocketwarrior.org','Pocket Warrior.',NULL,'Err','2009-04-13 10:14:41','N','N',NULL,'O','http://www.pocketwarrior.org',NULL,NULL),(643,869,'http://www.net-troy.com/drivers','Net-Troy Intersil Reference Driver.',NULL,'Ok','2009-04-13 10:14:43','N','Y','2009-08-14 17:24:23','O','http://www.net-troy.com/drivers',NULL,NULL),(644,869,'http://www.cirond.com','Pocket Winc.',NULL,'Err','2009-04-13 10:15:43','N','N',NULL,'O','http://www.cirond.com',NULL,NULL),(645,869,'http://www.airscanner.com','Air Scanner.',NULL,'Ok','2009-04-13 10:15:43','N','Y','2009-08-14 17:24:27','O','http://www.airscanner.com',NULL,NULL),(646,869,'http://www.cam.com','VxUtil.',NULL,'Ok','2009-04-13 10:15:43','N','Y','2009-08-14 17:24:29','O','http://www.cam.com',NULL,NULL),(647,869,'http://www.resco-net.com','Resco Explorer.',NULL,'Ok','2009-04-13 10:15:44','N','Y','2009-08-14 17:24:33','O','http://www.resco-net.com',NULL,NULL),(648,871,'http://www.hping.org','HPing.',NULL,'Ok','2009-04-13 10:29:35','N','Y','2009-08-14 17:24:36','O','http://www.hping.org',NULL,NULL),(649,871,'http://dark-intentions.net/files/icmp.txt','ICMP types/codes.',NULL,'Err','2009-04-13 10:29:43','N','N',NULL,'O','http://dark-intentions.net/files/icmp.txt',NULL,NULL),(650,875,'http://www.uniquesw.com','DCT4 Calculator.',NULL,'Err','2009-04-13 11:03:03','N','N',NULL,'O','http://www.uniquesw.com',NULL,NULL),(651,875,'http://gsmsearch.com/faq/nokiaflasher.html','Nokia unlocking FAQ.',NULL,'Ok','2009-04-13 11:03:03','N','Y','2009-08-14 17:24:39','O','http://gsmsearch.com/faq/nokiaflasher.html',NULL,NULL),(652,875,'http://www.nokiafree.org','Nokia unlocking message boards.',NULL,'Ok','2009-04-13 11:03:04','N','Y','2009-08-14 17:24:40','O','http://www.nokiafree.org',NULL,NULL),(653,875,'http://www.howardforums.com','General Wireless message board.',NULL,'Ok','2009-04-13 11:03:05','N','Y','2009-08-14 17:24:59','O','http://www.howardforums.com',NULL,NULL),(654,875,'http://www.wirelessadvisor.com','General Wireless message board 2.',NULL,'Ok','2009-04-13 11:03:06','N','Y','2009-08-14 17:25:05','O','http://www.wirelessadvisor.com',NULL,NULL),(655,876,'http://www.weblockpro.com','Weblock Pro.',NULL,'Ok','2009-04-13 11:13:13','N','Y','2009-08-14 17:25:06','O','http://www.weblockpro.com',NULL,NULL),(656,878,'http://careers.citicards.com','Citibank collection careers.',NULL,'Ok','2009-04-13 11:19:52','N','Y','2009-08-14 17:25:12','O','http://careers.citicards.com',NULL,NULL),(657,840,'http://www.linux-wlan.com/linux-wlan','linux-wlan.',NULL,'Ok','2009-04-20 07:09:12','N','Y','2009-08-14 17:26:04','O','http://www.linux-wlan.com/linux-wlan',NULL,NULL),(658,840,'http://www.kismetwireless.net','Kismet.',NULL,'Ok','2009-04-20 07:09:13','N','Y','2009-08-14 17:26:08','O','http://www.kismetwireless.net',NULL,NULL),(659,840,'http://airsnort.shmoo.com','AirSnort.',NULL,'Ok','2009-04-20 07:09:13','N','Y','2009-08-14 17:26:09','O','http://airsnort.shmoo.com',NULL,NULL),(660,841,'http://www.coxbusiness.com/acceptableusepolicy.pdf\r\n','Cox T.O.S.',NULL,'Ok','2009-04-20 07:17:49','Y','Y','2009-08-14 17:26:09','O','http://www.cox-internet.com/terms.html',NULL,NULL),(661,843,'http://www.shellfront.org','shellfront.org.',NULL,'Ok','2009-04-20 07:27:15','N','Y','2009-08-14 17:26:14','O','http://www.shellfront.org',NULL,NULL),(662,843,'http://www.shellscape.org','Shellscape software.',NULL,'Ok','2009-04-20 07:27:16','N','Y','2009-08-14 17:26:21','O','http://www.shellscape.org',NULL,NULL),(663,843,'http://shells.loose-screws.com','Shells.loose-screws.com.',NULL,'Ok','2009-04-20 07:27:16','N','Y','2009-08-14 17:26:22','O','http://shells.loose-screws.com',NULL,NULL),(664,843,'http://shell-shocked.org','shell-shocked.',NULL,'Ok','2009-04-20 07:27:17','N','Y','2009-08-14 17:26:28','O','http://shell-shocked.org',NULL,NULL),(665,845,'http://www.projectmayo.com','DIVX.',NULL,'Err','2009-04-20 07:34:18','N','N',NULL,'O','http://www.projectmayo.com',NULL,NULL),(666,845,'http://www.divx-digest.com','DVD2AVI.',NULL,'Ok','2009-04-20 07:34:19','N','Y','2009-08-14 17:26:31','O','http://www.divx-digest.com',NULL,NULL),(667,845,'http://www.tmpgenc.net','TMPGEnc.',NULL,'Ok','2009-04-20 07:34:20','N','Y','2009-08-14 17:26:35','O','http://www.tmpgenc.net',NULL,NULL),(668,846,'http://www.xbox-scene.com','Xbox articles, FAQs links.',NULL,'Ok','2009-04-20 09:38:17','N','Y','2009-08-14 17:26:53','O','http://www.xbox-scene.com',NULL,NULL),(669,846,'http://www.gamebuy.com','Purchase Xbox modchip.',NULL,'Ok','2009-04-20 09:38:17','N','Y','2009-08-14 17:26:53','O','http://www.gamebuy.com',NULL,NULL),(670,846,'http://www.xemulation.com','Xbox emulation information.',NULL,'Ok','2009-04-20 09:38:18','N','Y','2009-08-14 17:26:57','O','http://www.xemulation.com',NULL,NULL),(671,850,'http://www.nongnu.org/cvs/','CVS website.',NULL,'Ok','2009-04-20 10:26:31','Y','Y','2009-08-14 17:26:57','O','http://www.cvshome.org',NULL,NULL),(672,854,'http://www.stankdawg.com','Shouts 1.',NULL,'Ok','2009-04-20 10:44:31','N','Y','2009-08-14 17:27:00','O','http://www.stankdawg.com',NULL,NULL),(673,854,'http://www.oldskoolphreak.com','Shouts 2.',NULL,'Ok','2009-04-20 10:44:32','N','Y','2009-08-14 17:27:11','O','http://www.oldskoolphreak.com',NULL,NULL),(674,856,'http://access.ncsa.uiuc.edu/Releases/04.24.03_NCSA_Celeb.html','',NULL,'Err','2009-04-20 10:59:03','N','N',NULL,'O','http://access.ncsa.uiuc.edu/Releases/04.24.03_NCSA_Celeb.html',NULL,NULL),(675,856,'http://www.blooberry.com/indexdot/history/browsers6.htm','Browser History timeline',NULL,'Ok','2009-04-20 10:59:05','N','Y','2009-08-14 17:27:14','O','http://www.blooberry.com/indexdot/history/browsers6.htm',NULL,NULL),(676,856,'http://www.cc.ukans.edu/~grobe/earlylynx.html','',NULL,'Err','2009-04-20 10:59:06','N','N',NULL,'O','http://www.cc.ukans.edu/~grobe/earlylynx.html',NULL,NULL),(677,856,'http://www.eotl.org','End of the Line LP Mud',NULL,'Ok','2009-04-20 10:59:08','N','Y','2009-08-14 17:27:16','O','http://www.eotl.org',NULL,NULL),(678,857,'http://www.vorbis.com','Ogg Vorbis.',NULL,'Ok','2009-04-20 11:07:36','N','Y','2009-08-14 17:27:20','O','http://www.vorbis.com',NULL,NULL),(679,857,'http://www.xiph.org','Xiph.org foundation.',NULL,'Ok','2009-04-20 11:07:37','N','Y','2009-08-14 17:27:21','O','http://www.xiph.org',NULL,NULL),(680,859,'http://www.foodserve.com','Food Service Solutions.',NULL,'Ok','2009-04-20 11:22:00','N','Y','2009-08-14 17:27:30','O','http://www.foodserve.com',NULL,NULL),(681,859,'http://www.morpho.com','Morpho, Inc.',NULL,'Ok','2009-04-20 11:22:01','N','Y','2009-08-14 17:27:36','O','http://www.morpho.com',NULL,NULL),(682,860,'http://page33.port5.com','Author\'s web site.',NULL,'Err','2009-04-20 11:27:09','N','N',NULL,'O','http://page33.port5.com',NULL,NULL),(683,860,'http://www.burk.com/support/support_gsc3000.html','GSC3000.',NULL,'Ok','2009-04-20 11:27:10','Y','Y','2009-08-14 17:27:37','O','http://www.burk.com/support/manuals/GSC3000.pdf',NULL,NULL),(684,822,'http://www.activestate.com','ActiveState Perl.',NULL,'Ok','2009-05-04 10:05:45','N','Y','2009-08-14 17:29:01','O','http://www.activestate.com',NULL,NULL),(685,823,'http://www.vandyke.com','SecureCRT/VShell.',NULL,'Ok','2009-05-04 10:14:08','N','Y','2009-08-14 17:29:01','O','http://www.vandyke.com',NULL,NULL),(686,823,'http://www.ssh.com','SSH Secure Shell.',NULL,'Ok','2009-05-04 10:14:09','N','Y','2009-08-14 17:29:30','O','http://www.ssh.com',NULL,NULL),(687,823,'http://www.wingate.com','Wingate SOCS 5 Proxy.',NULL,'Ok','2009-05-04 10:14:10','N','Y','2009-08-14 17:29:49','O','http://www.wingate.com',NULL,NULL),(688,824,'http://www.vonage.com','Vonage VoIP.',NULL,'Ok','2009-05-04 10:17:02','N','Y','2009-08-14 17:30:22','O','http://www.vonage.com',NULL,NULL),(689,825,'http://www.keykatcher.com','KeyKatcher.',NULL,'Ok','2009-05-04 10:24:16','N','Y','2009-08-14 17:30:32','O','http://www.keykatcher.com',NULL,NULL),(690,825,'http://www.oopic.com','The Object-Oriented PIC.',NULL,'Ok','2009-05-04 10:24:17','N','Y','2009-08-14 17:30:35','O','http://www.oopic.com',NULL,NULL),(691,826,'http://www.php.net','PHP.',NULL,'Ok','2009-05-04 10:31:03','N','Y','2009-08-14 17:30:41','O','http://www.php.net',NULL,NULL),(692,826,'http://www.cs.virginia.edu/~lcc-win32','lcc-win32.',NULL,'Ok','2009-05-04 10:31:51','N','Y','2009-08-14 17:30:42','O','http://www.cs.virginia.edu/~lcc-win32',NULL,NULL),(693,826,'http://www.pcre.org','PCRE.',NULL,'Ok','2009-05-04 10:31:04','N','Y','2009-08-14 17:30:43','O','http://www.pcre.org',NULL,NULL),(694,827,'http://www.davee.com/scanrec/index.html','Scanrec.',NULL,'Ok','2009-05-04 10:36:28','N','Y','2009-08-14 17:30:44','O','http://www.davee.com/scanrec/index.html',NULL,NULL),(695,827,'http://inopo.freeweb.supereva.it/radio/VoxRecorder/index.htm','Vox Recorder.',NULL,'Ok','2009-05-04 10:36:30','N','Y','2009-08-14 17:30:46','O','http://inopo.freeweb.supereva.it/radio/VoxRecorder/index.htm',NULL,NULL),(696,827,'http://www.sagebrush.com/recall.htm','RecAll.',NULL,'Ok','2009-05-04 10:36:31','N','Y','2009-08-14 17:30:48','O','http://www.sagebrush.com/recall.htm',NULL,NULL),(697,830,'http://www.barcodesinc.com/generator/barcode','UPC/EAN Barcode Label Printer.',NULL,'Ok','2009-05-04 10:54:18','N','Y','2009-08-14 17:30:55','O','http://www.barcodesinc.com/generator/barcode',NULL,NULL),(698,831,'http://www.asahi-net.or.jp/~vr4m-ikw/Global/download.html','Madonote.',NULL,'Ok','2009-05-04 11:00:31','N','Y','2009-08-14 17:30:57','O','http://www.asahi-net.or.jp/~vr4m-ikw/Global/download.html',NULL,NULL),(699,832,'http://www.snapfiles.com/shareware/server/swftpserver.html','FTP servers.',NULL,'Ok','2009-05-04 11:08:43','Y','Y','2009-08-14 17:31:23','O','http://www.webattack.com/freeware/server/fwftpserver.shtml',NULL,NULL),(700,832,'http://www.guildftpd.com','guildftpd.',NULL,'Ok','2009-05-04 11:04:50','N','Y','2009-08-14 17:31:28','O','http://www.guildftpd.com',NULL,NULL),(701,832,'http://www.myserver.org','Dynamic DNS.',NULL,'Ok','2009-05-04 11:04:51','N','Y','2009-08-14 17:31:35','O','http://www.myserver.org',NULL,NULL),(702,834,'http://www.oreillynet.com/cs/weblog/view/wlg/448','Pringles Yagi.',NULL,'Ok','2009-05-04 11:41:35','N','Y','2009-08-14 17:31:41','O','http://www.oreillynet.com/cs/weblog/view/wlg/448',NULL,NULL),(703,834,'http://www.turnpoint.net/wireless/cantennahowto.html','How To Build A Tin Can Waveguide WiFi Antenna.',NULL,'Ok','2009-05-04 11:41:36','N','Y','2009-08-14 17:31:45','O','http://www.turnpoint.net/wireless/cantennahowto.html',NULL,NULL),(704,834,'http://www.seattlewireless.com','Seattle Wireless antenna.',NULL,'Ok','2009-05-04 11:41:37','N','Y','2009-08-14 17:31:47','O','http://www.seattlewireless.com',NULL,NULL),(705,835,'http://grc.com','Reference grc.com.',NULL,'Ok','2009-05-04 11:47:01','N','Y','2009-08-14 17:31:55','O','http://grc.com',NULL,NULL),(706,835,'http://www.webopedia.com','Reference webopedia.com.',NULL,'Ok','2009-05-04 11:47:02','N','Y','2009-08-14 17:33:13','O','http://www.webopedia.com',NULL,NULL),(707,835,'http://hyppy.zapto.org','Author\'s web site.',NULL,'Ok','2009-05-04 11:48:14','N','Y','2009-08-14 17:33:16','O','http://hyppy.zapto.org',NULL,NULL),(708,838,'http://nu2.nu/bootcd','Bootable CD info.',NULL,'Ok','2009-05-04 13:25:57','N','Y','2009-08-14 17:33:18','O','http://nu2.nu/bootcd',NULL,NULL),(709,838,'http://www.licenturion.com/xp/fully-licensed-wpa.txt','Describes Windows XP algorithm to generate keys.',NULL,'Ok','2009-05-04 13:25:58','N','Y','2009-08-14 17:33:19','O','http://www.licenturion.com/xp/fully-licensed-wpa.txt',NULL,NULL),(710,838,'http://extremetech.com/article2/0,3973,11222,00.asp','Windows Product Activiation info.',NULL,'Ok','2009-05-04 13:25:58','N','Y','2009-08-14 17:33:43','O','http://extremetech.com/article2/0,3973,11222,00.asp',NULL,NULL),(711,838,'http://www.microsoft.com/piracy/mpa.aspx\r\n','Microsoft piracy/WPA issue.',NULL,'Ok','2009-05-04 13:31:43','Y','Y','2009-08-14 17:33:44','O','http://www.microsoft.com/piracy/basics/activation/windowsxpsp1.asp',NULL,NULL),(712,786,'http://www.solutions.fi/index.cgi/news_2001_11_08?lang=eng','Original vulnerability report.',NULL,'Err','2009-05-11 08:36:32','N','N',NULL,'O','http://www.solutions.fi/index.cgi/news_2001_11_08?lang=eng',NULL,NULL),(713,786,'http://www.microsoft.com/windows/ie/downloads/critical/q313675/default.asp','Microsoft Q313675 security patch.',NULL,'Ok','2009-05-11 08:36:34','N','Y','2009-08-14 18:05:18','O','http://www.microsoft.com/windows/ie/downloads/critical/q313675/default.asp',NULL,NULL),(714,786,'http://shiflett.org/demos/passport_hacking_revisited','Author\'s interactive demonstration.',NULL,'Ok','2009-05-11 08:36:35','N','Y','2009-08-14 18:05:38','O','http://shiflett.org/demos/passport_hacking_revisited',NULL,NULL),(715,790,'http://www.afterdawn.com/software/video_software/dvd_rippers/smartripper.cfm','Smartripper.',NULL,'Ok','2009-05-11 10:14:24','N','Y','2009-08-14 18:06:29','O','http://www.afterdawn.com/software/video_software/dvd_rippers/smartripper.cfm',NULL,NULL),(716,790,'http://www.afterdawn.com/software/video_software/dvd_rippers/dvd2avi.cfm','dvd2avi.',NULL,'Ok','2009-05-11 10:14:24','N','Y','2009-08-14 18:06:42','O','http://www.afterdawn.com/software/video_software/dvd_rippers/dvd2avi.cfm',NULL,NULL),(717,790,'http://www.afterdawn.com/software/video_software/dvd_rippers/tmpgenc.cfm','tmpgenc.',NULL,'Ok','2009-05-11 10:14:25','N','Y','2009-08-14 18:06:53','O','http://www.afterdawn.com/software/video_software/dvd_rippers/tmpgenc.cfm',NULL,NULL),(718,790,'http://members.cox.net/beyeler/bbmpeg.html','bbMPEG.',NULL,'Ok','2009-05-11 10:14:26','N','Y','2009-08-14 18:06:54','O','http://members.cox.net/beyeler/bbmpeg.html',NULL,NULL),(719,790,'http://www.adaptec.com/worldwide/support/driverdetail.html?cat=/Product/ASPI-4.70&filekey=aspi_v470.exe','Adaptec ASPI driver.',NULL,'Ok','2009-05-11 10:14:27','N','Y','2009-08-14 18:07:00','O','http://www.adaptec.com/worldwide/support/driverdetail.html?cat=/Product/ASPI-4.70&filekey=aspi_v470.exe',NULL,NULL),(720,794,'http://www.newbrunswickunited.com','New Brunswick United Antifraud Division.',NULL,'Ok','2009-05-11 11:29:07','N','Y','2009-08-14 18:07:01','O','http://www.newbrunswickunited.com',NULL,NULL),(721,794,'http://www.ancestry.com','Social Security Death Index.',NULL,'Ok','2009-05-11 11:29:07','N','Y','2009-08-14 18:07:49','O','http://www.ancestry.com',NULL,NULL),(722,794,'http://www.netronline.com/public_records.htm','Property Tax Records.',NULL,'Ok','2009-05-11 11:29:08','N','Y','2009-08-14 18:09:17','O','http://www.netronline.com/public_records.htm',NULL,NULL),(723,795,'http://sourceforge.net/project/showfiles.php?group_id=54192','Ed\'s xbox linux.',NULL,'Ok','2009-05-11 11:34:57','N','Y','2009-08-14 18:09:52','O','http://sourceforge.net/project/showfiles.php?group_id=54192',NULL,NULL),(724,795,'http://warmcat.com/milksop/index.html','CheapLPC.',NULL,'Ok','2009-05-11 11:34:58','N','Y','2009-08-14 18:09:53','O','http://warmcat.com/milksop/index.html',NULL,NULL),(725,795,'http://xbox-linux.sourceforge.net','xbox-linux.',NULL,'Ok','2009-05-11 11:34:59','N','Y','2009-08-14 18:09:54','O','http://xbox-linux.sourceforge.net',NULL,NULL),(726,795,'http://Xboxhacker.net','XboxHacker BBS.',NULL,'Ok','2009-05-11 11:34:59','N','Y','2009-08-14 18:10:00','O','http://Xboxhacker.net',NULL,NULL),(727,796,'http://zonelabs.com','Zone Alarm.',NULL,'Ok','2009-05-11 11:38:10','N','Y','2009-08-14 18:10:57','O','http://zonelabs.com',NULL,NULL),(728,796,'http://grc.com/optout.htm','GRC Opt-out.',NULL,'Ok','2009-05-11 11:38:12','N','Y','2009-08-14 18:11:11','O','http://grc.com/optout.htm',NULL,NULL),(729,796,'http://lavasoftusa.com','Ad-Aware.',NULL,'Ok','2009-05-11 11:38:14','N','Y','2009-08-14 18:11:31','O','http://lavasoftusa.com',NULL,NULL),(730,798,'http://www142.nortelnetworks.com/bvdoc/alteon/isd_ssl/050125.C.pdf','Alteon Users Guide.',NULL,'Ok','2009-05-11 11:47:41','N','Y','2009-08-14 18:11:41','O','http://www142.nortelnetworks.com/bvdoc/alteon/isd_ssl/050125.C.pdf',NULL,NULL),(731,798,'http://www.kontron.com/techlib/manuals/PCI-946-1_and_P3S440BX_manual.pdf','Teknor Applicom PCI-946-1 Hardware Guide.',NULL,'Ok','2009-05-11 11:47:43','N','Y','2009-08-14 18:11:58','O','http://www.kontron.com/techlib/manuals/PCI-946-1_and_P3S440BX_manual.pdf',NULL,NULL),(732,801,'http://www.deepfreezeusa.com','DeepFreeze.',NULL,'Ok','2009-05-11 12:04:11','N','Y','2009-08-14 18:12:15','O','http://www.deepfreezeusa.com',NULL,NULL),(733,802,'http://www.ngthomas.co.uk/dice.html','Dice.',NULL,'Ok','2009-05-11 13:55:18','Y','Y','2009-08-14 18:12:17','O','http://www.ngthomas.co.uk/dice.htm',NULL,NULL),(734,802,'http://reptile.rug.ac.be/~coder/sniffit/sniffit.html','Sniffit.',NULL,'Err','2009-05-11 13:46:54','N','N',NULL,'O','http://reptile.rug.ac.be/~coder/sniffit/sniffit.html',NULL,NULL),(735,802,'http://www.gnu.org/software/wget/wget.html','wget (Linux).',NULL,'Ok','2009-05-11 13:55:18','N','Y','2009-08-14 18:12:18','O','http://www.gnu.org/software/wget/wget.html',NULL,NULL),(736,802,'http://space.tin.it/computer/hherold','wget (Win32).',NULL,'Ok','2009-05-11 14:04:18','N','Y','2009-08-14 18:12:25','O','http://space.tin.it/computer/hherold',NULL,NULL),(737,802,'http://windump.polito.it','WinDump.',NULL,'Ok','2009-05-11 13:47:56','N','Y','2009-08-14 18:12:39','O','http://windump.polito.it',NULL,NULL),(738,766,'http://www.trainfo.com','Telcordia LERG Routing Guide.',NULL,'Ok','2009-05-18 07:32:42','N','Y','2009-08-14 18:13:00','O','http://www.trainfo.com',NULL,NULL),(739,766,'http://www.telcordia.com','Telcordia Notes on the Networks SR-2275.',NULL,'Ok','2009-05-18 07:32:43','N','Y','2009-08-14 18:13:10','O','http://www.telcordia.com',NULL,NULL),(740,769,'http://www.elcomsoft.com/prs.html','',NULL,'Ok','2009-05-18 07:50:23','N','Y','2009-08-14 18:13:18','O','http://www.elcomsoft.com/prs.html',NULL,NULL),(741,779,'http://www.ritlabs.com/tinyweb','TinyWeb.',NULL,'Ok','2009-05-18 10:44:33','N','Y','2009-08-14 18:13:19','O','http://www.ritlabs.com/tinyweb',NULL,NULL),(742,781,'http://www.signco-eds.com\r\n','Electronic Display Systems.',NULL,'Ok','2009-05-18 10:44:34','Y','Y','2009-08-14 18:13:19','O','http://www.eds.chiefind.com',NULL,NULL),(743,782,'http://www.libdex.com/vendor/epixtech,_inc_.html','List of libraries using Dynix.',NULL,'Err','2009-05-18 10:58:47','N','N',NULL,'O','http://www.libdex.com/vendor/epixtech,_inc_.html',NULL,NULL),(744,746,'http://www.netstumbler.com','NetStumbler.',NULL,'Ok','2009-05-25 07:09:46','N','Y','2009-08-14 18:13:52','O','http://www.netstumbler.com',NULL,NULL),(745,746,'http://www.kismetwireless.net','Kismet.',NULL,'Ok','2009-05-25 07:09:48','N','Y','2009-08-14 18:13:55','O','http://www.kismetwireless.net',NULL,NULL),(746,746,'http://www.remote-exploit.org','Wellenreiter.',NULL,'Ok','2009-05-25 07:09:48','N','Y','2009-08-14 18:14:08','O','http://www.remote-exploit.org',NULL,NULL),(747,746,'http://airsnort.shmoo.com','Airsnort.',NULL,'Ok','2009-05-25 07:09:49','N','Y','2009-08-14 18:14:09','O','http://airsnort.shmoo.com',NULL,NULL),(748,746,'http://www.nocat.net','NoCat.',NULL,'Ok','2009-05-25 07:09:50','N','Y','2009-08-14 18:14:13','O','http://www.nocat.net',NULL,NULL),(749,746,'http://www.nycwireless.net','NYCWireless.',NULL,'Ok','2009-05-25 07:09:51','N','Y','2009-08-14 18:14:29','O','http://www.nycwireless.net',NULL,NULL),(750,746,'http://www.bawia.net','BAWIA.',NULL,'Err','2009-05-25 07:24:28','N','N',NULL,'O','http://www.bawia.net',NULL,NULL),(751,746,'http://www.personaltelco.net','PersonalTelco.',NULL,'Ok','2009-05-25 07:09:54','N','Y','2009-08-14 18:14:42','O','http://www.personaltelco.net',NULL,NULL),(752,748,'http://www.zappadoodle.com','Zappadoodle.',NULL,'Err','2009-05-25 07:22:34','N','N',NULL,'O','http://www.zappadoodle.com',NULL,NULL),(753,752,'http://www.prism.gatech.edu/~gte344p/NCR-ATM.pdf','NCR PersonaS 88 ATM System Description.',NULL,'Err','2009-05-25 07:48:44','N','N',NULL,'O','http://www.prism.gatech.edu/~gte344p/NCR-ATM.pdf',NULL,NULL),(754,752,'http://www.bankersx.com/home.html','The Bankers Exchange.',NULL,'Ok','2009-05-25 07:47:59','N','Y','2009-08-14 18:14:44','O','http://www.bankersx.com/home.html',NULL,NULL),(755,753,'http://www.itu.int','Telecommunications Union.',NULL,'Ok','2009-05-25 07:53:25','N','Y','2009-08-14 18:15:26','O','http://www.itu.int',NULL,NULL),(756,753,'http://www.cia.gov/cia/publications/factbook/index.html','CIA Reference.',NULL,'Ok','2009-05-25 07:53:26','N','Y','2009-08-14 18:16:31','O','http://www.cia.gov/cia/publications/factbook/index.html',NULL,NULL),(757,753,'http://www.telsysint.com','Telephone Systems International S.A.',NULL,'Err','2009-05-25 07:54:26','N','N',NULL,'O','http://www.telsysint.com',NULL,NULL),(758,755,'http://www.phrack.org/issues.html?issue=56\r\n','Phrack article \"Things To Do In Cisco Land When You\'re Dead\".',NULL,'Ok','2009-05-25 08:09:11','Y','Y','2009-08-14 18:16:35','O','http://www.phrack.org/phrack/56',NULL,NULL),(759,755,'http://secinf.net/info/fw/cisco/add.html#routing','Cisco info.',NULL,'Ok','2009-05-25 08:07:36','N','Y','2009-08-14 18:16:35','O','http://secinf.net/info/fw/cisco/add.html#routing',NULL,NULL),(760,755,'http://www.mksecure.com/defpw','Default Passwords.',NULL,'Err','2009-05-25 08:13:42','N','N',NULL,'O','http://www.mksecure.com/defpw',NULL,NULL),(761,755,'http://hackersplayground.org/papers/crack-cisco-passwords.txt','Break Type 7 Passwords.',NULL,'Err','2009-05-25 08:13:42','N','N',NULL,'O','http://hackersplayground.org/papers/crack-cisco-passwords.txt',NULL,NULL),(762,759,'http://www.26000slc.org','Author\'s web site.',NULL,'Err','2009-05-25 08:47:32','N','N',NULL,'O','http://www.26000slc.org',NULL,NULL),(763,762,'http://judiciary.senate.gov/special/input_form.cfm?comments=1','Senate Judiciary Committee comment form.',NULL,'Err','2009-05-25 11:25:19','N','N',NULL,'O','http://judiciary.senate.gov/special/input_form.cfm?comments=1',NULL,NULL),(764,762,'http://www.digitalconsumer.org/cbdtpa/cbdtpa-inf.html','Send automatic fax to Congress.',NULL,'Err','2009-05-25 11:25:20','N','N',NULL,'O','http://www.digitalconsumer.org/cbdtpa/cbdtpa-inf.html',NULL,NULL),(765,762,'http://thomas.loc.gov','Get Current Status.',NULL,'Ok','2009-05-25 11:25:21','N','Y','2009-08-14 18:16:37','O','http://thomas.loc.gov',NULL,NULL),(766,727,'http://store.yahoo.com/2600hacker','plug, plug...',NULL,'Ok','2009-06-01 07:13:37','N','Y','2009-08-14 18:17:19','O','http://store.yahoo.com/2600hacker',NULL,NULL),(767,728,'http://www.leader.ru/secure/who.html','Holmes/Who.',NULL,'Ok','2009-06-01 07:39:51','N','Y','2009-08-14 18:17:30','O','http://www.leader.ru/secure/who.html',NULL,NULL),(768,728,'http://www.anonymizer.com/snoop.cgi','Anonymizer snoop.',NULL,'Err','2009-06-01 07:39:52','N','N',NULL,'O','http://www.anonymizer.com/snoop.cgi',NULL,NULL),(769,728,'http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dn_voices_webmen/html/webmen052797.asp','Cookies with Your Coffee.',NULL,'Ok','2009-06-01 07:39:54','N','Y','2009-08-14 18:17:31','O','http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dn_voices_webmen/html/webmen052797.asp',NULL,NULL),(770,728,'http://www.netscape.com/newsref/std/cookie_spec.html','Netscape Cookie Spec.',NULL,'Ok','2009-06-01 07:39:55','N','Y','2009-08-14 18:17:32','O','http://www.netscape.com/newsref/std/cookie_spec.html',NULL,NULL),(771,728,'http://www.rfc.net/rfc2109.html','RFC 2109.',NULL,'Err','2009-06-01 07:40:55','N','N',NULL,'O','http://www.rfc.net/rfc2109.html',NULL,NULL),(772,728,'http://www.Securityspace.com/s_survey/dataman.200112/webbug.html','Security Space.',NULL,'Ok','2009-06-01 07:41:12','N','Y','2009-08-14 18:17:35','O','http://www.Securityspace.com/s_survey/dataman.200112/webbug.html',NULL,NULL),(773,728,'http://www.privacyfoundation.org/privacywatch/report.asp?id=54&action=0','Privacy Foundation.',NULL,'Ok','2009-06-01 07:41:13','N','Y','2009-08-14 18:17:36','O','http://www.privacyfoundation.org/privacywatch/report.asp?id=54&action=0',NULL,NULL),(774,728,'http://mackraz.com/trickybit/readreceipt','Bugged email demo.',NULL,'Ok','2009-06-01 07:41:16','N','Y','2009-08-14 18:17:36','O','http://mackraz.com/trickybit/readreceipt',NULL,NULL),(775,728,'http://www.eff.org/Privacy/Marketing/web_bug.html','Web Bug FAQ.',NULL,'Ok','2009-06-01 07:41:17','N','Y','2009-08-14 18:17:38','O','http://www.eff.org/Privacy/Marketing/web_bug.html',NULL,NULL),(776,728,'http://www.bugnosis.org/examples.html','Web bug gallery.',NULL,'Err','2009-06-01 07:41:18','N','N',NULL,'O','http://www.bugnosis.org/examples.html',NULL,NULL),(777,728,'http://www.bugnosis.org','Web bug detector plug-in for IE.',NULL,'Ok','2009-06-01 07:41:18','N','Y','2009-08-14 18:17:40','O','http://www.bugnosis.org',NULL,NULL),(778,728,'http://tools.rosinstrument.com/proxy/','Proxy servers.',NULL,'Ok','2009-07-15 08:48:59','N','Y','2009-08-14 18:17:46','O','http://tools.rosinstrument.com/proxy/',NULL,NULL),(779,728,'http://www.all-nettools.com/pr.htm','Proxy server check.',NULL,'Ok','2009-06-01 07:41:21','N','Y','2009-08-14 18:17:49','O','http://www.all-nettools.com/pr.htm',NULL,NULL),(780,728,'http://www.anonymyth.com','Anonymyth.',NULL,'Ok','2009-06-01 07:41:22','N','Y','2009-08-14 18:17:58','O','http://www.anonymyth.com',NULL,NULL),(781,728,'http://www.orangatango.com/home/index-ns.html','Orangatango.',NULL,'Ok','2009-06-01 07:41:22','N','Y','2009-08-14 18:17:58','O','http://www.orangatango.com/home/index-ns.html',NULL,NULL),(782,728,'http://www.rewebber.com','Rewebber.',NULL,'Err','2009-06-01 07:42:23','N','N',NULL,'O','http://www.rewebber.com',NULL,NULL),(783,728,'http://www.anon.de','Another Rewebber.',NULL,'Ok','2009-06-01 07:42:26','N','Y','2009-08-14 18:18:03','O','http://www.anon.de',NULL,NULL),(784,728,'http://anonymouse.org','Anonymouse.',NULL,'Ok','2009-10-04 11:12:02','Y','Y','2009-10-04 11:18:52','O','http://@nonymouse.com',NULL,'lines=210HTTP/1.1 200 OK
Date: Sun, 04 Oct 2009 15:12:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
p3p: CP=\"CAO PSA OUR\"
Set-Cookie: SessionID=9d1e90d1-9cfa-48ca-a601-6f469e651cfd; path=/
Set-Cookie: VisitorID=1e0c49bd-8348-4a30-98fe-618de1a68ac4&Exp=10/4/2012 8:12:02 AM; expires=Thu, 04-Oct-2012 15:12:02 GMT; path=/
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 9483


Return Value: 0
'),(785,728,'http://www.anonymizer.com','Anonymizer.',NULL,'Ok','2009-06-01 07:42:28','N','Y','2009-08-14 18:18:33','O','http://www.anonymizer.com',NULL,NULL),(786,728,'http://www.siegesoft.com','SiegeSoft.',NULL,'Ok','2009-06-01 07:42:29','N','Y','2009-08-14 18:18:36','O','http://www.siegesoft.com',NULL,NULL),(787,728,'https://ssl.dizum.com/help/remailer.html','Remailer.',NULL,'Err','2009-06-01 07:42:30','N','N',NULL,'O','https://ssl.dizum.com/help/remailer.html',NULL,NULL),(788,728,'http://security.tao.ca/email.shtml','List of Remailers.',NULL,'Err','2009-06-01 07:42:31','N','N',NULL,'O','http://security.tao.ca/email.shtml',NULL,NULL),(789,729,'http://www.google.com','Google.',NULL,'Ok','2009-06-01 07:56:36','N','Y','2009-08-14 18:18:37','O','http://www.google.com',NULL,NULL),(790,730,'http://www.switchboard.com','Switchboard.',NULL,'Ok','2009-06-01 08:06:03','N','Y','2009-08-14 18:18:44','O','http://www.switchboard.com',NULL,NULL),(791,730,'http://www.switchboard.com/bin/cginbr.dll?ID=500683995&MEM=1&FUNC=MORE&TYPE=1007','Switchboard example.',NULL,'Ok','2009-06-01 08:06:04','N','Y','2009-08-14 18:18:46','O','http://www.switchboard.com/bin/cginbr.dll?ID=500683995&MEM=1&FUNC=MORE&TYPE=1007',NULL,NULL),(792,731,'http://c0nstruk7.hypermart.net','AVS presets.',NULL,'Err','2009-06-01 08:12:10','N','N',NULL,'O','http://c0nstruk7.hypermart.net',NULL,NULL),(793,732,'http://www.apple.com/appleshareip/text/downloads.html','AppleShare client.',NULL,'Err','2009-06-01 09:21:33','N','N',NULL,'O','http://www.apple.com/appleshareip/text/downloads.html',NULL,NULL),(794,732,'http://homepage.mac.com/skreuzer','AppleShare client patch.',NULL,'Err','2009-06-01 09:21:33','N','N',NULL,'O','http://homepage.mac.com/skreuzer',NULL,NULL),(795,732,'http://happiness.dhs.org/software/macfspwd/macfspwd.c','macfspwd.c.',NULL,'Err','2009-06-01 09:21:34','N','N',NULL,'O','http://happiness.dhs.org/software/macfspwd/macfspwd.c',NULL,NULL),(796,733,'http://www.ElfQrin.com','Author\'s website.',NULL,'Ok','2009-06-01 09:25:56','N','Y','2009-08-14 18:18:51','O','http://www.ElfQrin.com',NULL,NULL),(797,1369,'http://www.swbt.net/~dalai','Author\'s web site.',NULL,'Err','2009-06-01 09:56:05','N','N',NULL,'O','http://www.swbt.net/~dalai',NULL,NULL),(798,739,'http://www.phenoelit-us.org/dpl/dpl.html\r\n','Default Password List.',NULL,'Ok','2009-06-01 10:11:47','Y','Y','2009-08-14 18:18:51','O','http://www.phenoelit.de/dpl/dpl.html',NULL,NULL),(799,740,'http://www.JEAH.net','Author\'s website.',NULL,'Ok','2009-06-01 10:19:09','N','Y','2009-08-14 18:18:56','O','http://www.JEAH.net',NULL,NULL),(800,741,'http://www.nmap.org','nmap.',NULL,'Ok','2009-06-01 10:25:22','N','Y','2009-08-14 18:19:02','O','http://www.nmap.org',NULL,NULL),(801,744,'http://www.gilat.com','Gilat-to-Home.',NULL,'Ok','2009-06-01 10:59:21','N','Y','2009-08-14 18:19:06','O','http://www.gilat.com',NULL,NULL),(802,744,'http://www.radioshackpos.com','Radio Shack POS.',NULL,'Ok','2009-06-01 10:59:22','N','Y','2009-08-14 18:19:07','O','http://www.radioshackpos.com',NULL,NULL),(803,708,'http://www.trauma-inc.com','Author\'s website.',NULL,'Err','2009-06-01 11:04:05','N','N',NULL,'O','http://www.trauma-inc.com',NULL,NULL),(804,708,'http://www.vitanuova.com','Vita Nuova.',NULL,'Ok','2009-06-01 11:04:06','N','Y','2009-09-07 07:40:46','O','http://www.vitanuova.com',NULL,NULL),(805,707,'http://www.fuckgeneralmotors.com','Ford case website.',NULL,'Err','2009-06-08 06:57:43','N','N',NULL,'O','http://www.fuckgeneralmotors.com',NULL,NULL),(806,711,'http://www.wired.com/news/technology','Website discusses in article.',NULL,'Ok','2009-06-08 07:14:51','N','Y','2009-09-07 07:41:03','O','http://www.wired.com/news/technology',NULL,NULL),(807,715,'http://www.coyotelinux.com','Coyote Linux.',NULL,'Ok','2009-06-08 07:36:45','N','Y','2009-09-07 07:41:19','O','http://www.coyotelinux.com',NULL,NULL),(808,717,'http://www.nrgkitz.com','Lots of useful info, transmitters, amps, etc.',NULL,'Ok','2009-06-08 07:49:21','N','Y','2009-09-07 07:41:24','O','http://www.nrgkitz.com',NULL,NULL),(809,717,'http://www.ramseyelectronics.com','High quality products if you have a fat wallet...',NULL,'Ok','2009-06-08 07:49:22','N','Y','2009-09-07 07:41:42','O','http://www.ramseyelectronics.com',NULL,NULL),(810,721,'http://www.cenatek.com','RAM disk program.',NULL,'Ok','2009-06-08 17:10:26','N','Y','2009-09-07 07:42:00','O','http://www.cenatek.com',NULL,NULL),(811,722,'http://www.samba.org','Samba.',NULL,'Ok','2009-06-09 08:10:18','N','Y','2009-09-07 07:42:01','O','http://www.samba.org',NULL,NULL),(812,722,'http://www.nsfocus.com/english/homepage/sa_05.htm','Win95 file sharing security hole.',NULL,'Err','2009-06-09 08:10:21','N','N',NULL,'O','http://www.nsfocus.com/english/homepage/sa_05.htm',NULL,NULL),(813,687,'http://www.eff.org','EFF.',NULL,'Ok','2009-06-15 06:59:34','N','Y','2009-09-07 07:42:37','O','http://www.eff.org',NULL,NULL),(814,687,'http://www.freesklyarov.org','Free Dmitry Sklyarov.',NULL,'Ok','2009-06-15 06:59:35','N','Y','2009-09-07 07:42:39','O','http://www.freesklyarov.org',NULL,NULL),(815,688,'http://www.fortres.com','Fortres.',NULL,'Ok','2009-06-15 07:10:02','N','Y','2009-09-07 07:42:47','O','http://www.fortres.com',NULL,NULL),(816,689,'http://www.peacefire.org/security/iecookies','IE cookie vulnerability.',NULL,'Ok','2009-06-15 07:18:02','N','Y','2009-09-07 07:42:48','O','http://www.peacefire.org/security/iecookies',NULL,NULL),(817,689,'http://www.microsoft.com/technet/security/bulletin/ms00-033.asp','Microsoft security patch.',NULL,'Ok','2009-06-15 07:18:04','N','Y','2009-09-07 07:42:56','O','http://www.microsoft.com/technet/security/bulletin/ms00-033.asp',NULL,NULL),(818,690,'http://www.directv.com','DirecTV.',NULL,'Ok','2009-06-15 07:31:09','N','Y','2009-09-07 07:44:02','O','http://www.directv.com',NULL,NULL),(819,690,'http://www.hackhu.com','Was DSS resource now DirecTV Office of Signal Integrity.',NULL,'Ok','2009-06-15 07:31:10','N','Y','2009-09-07 07:44:03','O','http://www.hackhu.com',NULL,NULL),(820,690,'http://www.dssunderground.com','DSS underground.',NULL,'Err','2009-06-15 07:32:10','N','N',NULL,'O','http://www.dssunderground.com',NULL,NULL),(821,690,'http://www.dsschat.com','DSS chat.',NULL,'Ok','2009-06-15 07:32:11','N','Y','2009-09-07 07:44:11','O','http://www.dsschat.com',NULL,NULL),(822,693,'http://www.xiph.org/paranoia','cdparanoia.',NULL,'Ok','2009-06-15 07:51:03','N','Y','2009-09-07 07:44:12','O','http://www.xiph.org/paranoia',NULL,NULL),(823,695,'http://kalug.lug.net/coding/nettools/index.html','spoof.',NULL,'Err','2009-06-15 08:08:30','N','N',NULL,'O','http://kalug.lug.net/coding/nettools/index.html',NULL,NULL),(824,697,'http://www.kryptocrew.de/snakebyte','Author\'s web site.',NULL,'Err','2009-06-15 13:28:54','N','N',NULL,'O','http://www.kryptocrew.de/snakebyte',NULL,NULL),(825,698,'http://www.ifit.com','Automated workouts.',NULL,'Ok','2009-06-15 13:39:11','N','Y','2009-09-07 07:44:24','O','http://www.ifit.com',NULL,NULL),(826,698,'http://safesexplus.com/pages/SSP_Converter.html','i-ready sexual devices.',NULL,'Err','2009-06-15 13:39:11','N','N',NULL,'O','http://safesexplus.com/pages/SSP_Converter.html',NULL,NULL),(827,699,'http://web.syr.edu/~sabuer/arpoison','ARPoison.',NULL,'Err','2009-06-15 13:45:42','N','N',NULL,'O','http://web.syr.edu/~sabuer/arpoison',NULL,NULL),(828,699,'http://ettercap.sourceforge.net','Ettercap.',NULL,'Ok','2009-06-15 13:45:42','N','Y','2009-09-07 07:44:32','O','http://ettercap.sourceforge.net',NULL,NULL),(829,699,'http://www.robertgraham.com/pubs/sniffingfaq.html','Sniffing FAQ.',NULL,'Err','2009-06-15 13:46:12','N','N',NULL,'O','http://www.robertgraham.com/pubs/sniffingfaq.html',NULL,NULL),(830,703,'http://vnibankcard.com/products/verifone-pinpad1000.htm','VeriFone PinPad.',NULL,'Err','2009-06-15 14:10:40','N','N',NULL,'O','http://vnibankcard.com/products/verifone-pinpad1000.htm',NULL,NULL),(831,703,'http://axxesstech.com/qs/default.htm','Axxess Technologies Quick-Scribe.',NULL,'Err','2009-06-15 14:10:41','N','N',NULL,'O','http://axxesstech.com/qs/default.htm',NULL,NULL),(832,704,'http://www.kodak.com/cgi-bin/webWhereToBuy.pl?form=nameOnly&productGroupCode=27','Where To Find Kodak Picture Maker.',NULL,'Ok','2009-06-15 14:17:17','N','Y','2009-09-07 07:44:34','O','http://www.kodak.com/cgi-bin/webWhereToBuy.pl?form=nameOnly&productGroupCode=27',NULL,NULL),(833,705,'http://www.bawug.org','Bay Area Wireless Users Group.',NULL,'Ok','2009-06-15 14:24:41','N','Y','2009-09-07 07:44:38','O','http://www.bawug.org',NULL,NULL),(834,705,'http://www.surfandsip.com','Coffee Shop Internet Access.',NULL,'Ok','2009-06-15 14:24:42','N','Y','2009-09-07 07:44:44','O','http://www.surfandsip.com',NULL,NULL),(835,705,'http://www.wi2600.org/mediawhore/nf0/wireless','www.we2600.org.',NULL,'Err','2009-06-15 14:24:43','N','N',NULL,'O','http://www.wi2600.org/mediawhore/nf0/wireless',NULL,NULL),(836,705,'http://grouper.ieee.org/groups/802/11','IEEE 802.11 standardization group.',NULL,'Ok','2009-06-15 14:26:19','N','Y','2009-09-07 07:44:49','O','http://grouper.ieee.org/groups/802/11',NULL,NULL),(837,671,'http://fuckgeneralmotors.com','Ford case link.',NULL,'Err','2009-06-22 07:14:25','N','N',NULL,'O','http://fuckgeneralmotors.com',NULL,NULL),(838,671,'http://www.hope.net','HOPE conference.',NULL,'Ok','2009-06-22 07:14:26','N','Y','2009-09-07 07:45:27','O','http://www.hope.net',NULL,NULL),(839,671,'http://www.h2k2.net','H2K2.',NULL,'Ok','2009-06-22 07:14:27','N','Y','2009-09-07 07:45:32','O','http://www.h2k2.net',NULL,NULL),(840,672,'http://www.robertgraham.com/carnivore/foia_documents.html','Robert Graham\'s Carnivore FAQ.',NULL,'Err','2009-06-22 07:15:19','N','N',NULL,'O','http://www.robertgraham.com/carnivore/foia_documents.html',NULL,NULL),(841,674,'http://www.swbt.net/~dalai','Author\'s web site.',NULL,'Err','2009-06-22 07:39:46','N','N',NULL,'O','http://www.swbt.net/~dalai',NULL,NULL),(842,674,'http://www.swbt.net/~dalai/bell/bell.html','Additional info from Author.',NULL,'Err','2009-06-22 07:39:46','N','N',NULL,'O','http://www.swbt.net/~dalai/bell/bell.html',NULL,NULL),(843,677,'ftp://ftp.porcupine.org/pub/security/tcp_wrappers_7.6.BLURB','TCP Wrappers intro (FTP).',NULL,'Ok','2009-06-22 08:01:32','N','Y','2009-09-07 07:45:33','O','ftp://ftp.porcupine.org/pub/security/tcp_wrappers_7.6.BLURB',NULL,NULL),(844,677,'http://www.linuxdoc.org/HOWTO/IPCHAINS-HOWTO.html','IPCHAINS-HOWTO.',NULL,'Err','2009-06-22 08:01:32','N','N',NULL,'O','http://www.linuxdoc.org/HOWTO/IPCHAINS-HOWTO.html',NULL,NULL),(845,677,'http://www.linuxdoc.org/LDP/LG/issue46/pollman/tcpwrappers.html','TCP wrappers.',NULL,'Err','2009-06-22 08:01:33','N','N',NULL,'O','http://www.linuxdoc.org/LDP/LG/issue46/pollman/tcpwrappers.html',NULL,NULL),(846,677,'http://www.bhodisoft.com/tech/nhf/ipchains-vs.-hosts.deny.html','Current version of this document.',NULL,'Ok','2009-06-22 08:04:31','Y','Y','2009-09-07 07:45:34','O','http://www.bhodisoft.com/bswopes/nhf/ipchains-vs.-hosts.deny.html',NULL,NULL),(850,682,'http://www.fortres.com','Fortres Grand Corporation.',NULL,'Ok','2009-06-22 15:03:20','N','Y','2009-09-07 07:45:43','O','http://www.fortres.com',NULL,NULL),(851,682,'http://amatus.doesnotexist.com','Author\'s web site.',NULL,'Err','2009-06-22 15:03:20','N','N',NULL,'O','http://amatus.doesnotexist.com',NULL,NULL),(852,682,'http://packetstorm.securify.com/0004exploits/Fortres4-analysis.txt','Frost_Byte code.',NULL,'Err','2009-06-22 15:03:20','N','N',NULL,'O','http://packetstorm.securify.com/0004exploits/Fortres4-analysis.txt',NULL,NULL),(853,686,'http://www.websitez.com','Windoze users (whois?).',NULL,'Ok','2009-06-22 17:03:43','N','Y','2009-09-07 07:45:44','O','http://www.websitez.com',NULL,NULL),(854,686,'http://samspade.org','Sam Spade.',NULL,'Ok','2009-06-22 17:03:44','N','Y','2009-09-07 07:45:45','O','http://samspade.org',NULL,NULL),(855,686,'ftp://ftp.ee.lbl.gov/traceroute.tar.gz','traceroute package.',NULL,'Ok','2009-06-22 17:04:44','N','Y','2009-09-07 07:45:47','O','ftp://ftp.ee.lbl.gov/traceroute.tar.gz',NULL,NULL),(856,686,'http://www.insecure.org/nmap','nmap.',NULL,'Ok','2009-06-22 17:04:46','N','Y','2009-09-07 07:46:02','O','http://www.insecure.org/nmap',NULL,NULL),(857,686,'http://www.solarwinds.net','SolarWinds Pinger.',NULL,'Ok','2009-06-22 17:04:48','N','Y','2009-09-07 07:46:36','O','http://www.solarwinds.net',NULL,NULL),(858,686,'http://www.ipswitch.com','WS_Ping Pro Pack.',NULL,'Ok','2009-06-22 17:04:49','N','Y','2009-09-07 07:46:38','O','http://www.ipswitch.com',NULL,NULL),(859,686,'http://www.nwpsw.com','NetScan tools.',NULL,'Ok','2009-06-22 17:04:52','N','Y','2009-09-07 07:46:40','O','http://www.nwpsw.com',NULL,NULL),(860,686,'http://www.wwdsi.com','SAING.',NULL,'Ok','2009-06-22 17:04:53','N','Y','2009-09-07 07:46:41','O','http://www.wwdsi.com',NULL,NULL),(861,686,'http://www.l0pht.com/~weld/netcat','NetCat.',NULL,'Err','2009-06-22 17:04:54','N','N',NULL,'O','http://www.l0pht.com/~weld/netcat',NULL,NULL),(862,686,'http://www.securityfocus.com','PortPro and PortScan.',NULL,'Ok','2009-06-22 17:04:54','N','Y','2009-09-07 07:46:46','O','http://www.securityfocus.com',NULL,NULL),(863,686,'http://www.insecure.org/nmap/nmap-fingerprinting-article.html','TCP/IP stack design.',NULL,'Ok','2009-06-22 17:04:57','N','Y','2009-09-07 07:47:01','O','http://www.insecure.org/nmap/nmap-fingerprinting-article.html',NULL,NULL),(864,686,'http://www.insecure.org/cgi-bin/nmap-submit.cgi','Update nmap O/S signatures.',NULL,'Ok','2009-06-22 17:04:59','N','Y','2009-09-07 07:47:16','O','http://www.insecure.org/cgi-bin/nmap-submit.cgi',NULL,NULL),(865,686,'http://www.marko.net/cheops','Cheops.',NULL,'Err','2009-06-22 17:05:02','N','N',NULL,'O','http://www.marko.net/cheops',NULL,NULL),(866,656,'http://www.usdoj.gov/criminal/cybercrime/searching.html','Department of Justice (DOJ) computer search guidelines.',NULL,'Ok','2009-06-29 07:38:31','Y','Y','2009-09-07 07:47:39','O','http://www.cybercrime.gov/searchmanual.htm',NULL,NULL),(867,659,'http://msdn.microsoft.com/scripting/default.htm?/scripting/vbscript/download/vbsdown.htm','Windows Script Encoder.',NULL,'Err','2009-06-29 08:09:44','N','N',NULL,'O','http://msdn.microsoft.com/scripting/default.htm?/scripting/vbscript/download/vbsdown.htm',NULL,NULL),(868,659,'http://www.klaphek.nl','Klaphek.',NULL,'Ok','2009-06-29 08:09:44','N','Y','2009-09-07 07:47:47','O','http://www.klaphek.nl',NULL,NULL),(869,659,'http://www.virtualconspiracy.com/content/scrdec/intro','srcdec.',NULL,'Ok','2009-06-29 08:09:45','N','Y','2009-09-07 07:47:48','O','http://www.virtualconspiracy.com/content/scrdec/intro',NULL,NULL),(870,660,'http://www.advants.com','Advants Terminals.',NULL,'Ok','2009-06-29 08:19:46','N','Y','2009-09-07 07:47:50','O','http://www.advants.com',NULL,NULL),(871,660,'http://www.netshift.com','Netshift.',NULL,'Ok','2009-06-29 08:19:47','N','Y','2009-09-07 07:48:04','O','http://www.netshift.com',NULL,NULL),(872,660,'http://www.uk.research.att.com/vnc','VNC.',NULL,'Err','2009-06-29 08:19:47','N','N',NULL,'O','http://www.uk.research.att.com/vnc',NULL,NULL),(873,662,'http://www.quickaid.com','QuickAID Internet stations.',NULL,'Ok','2009-06-29 10:39:18','N','Y','2009-09-07 07:48:11','O','http://www.quickaid.com',NULL,NULL),(874,663,'http://www.billboardliberation.com','Billboard Liberation Front.',NULL,'Ok','2009-06-29 10:46:44','N','Y','2009-09-07 07:48:18','O','http://www.billboardliberation.com',NULL,NULL),(875,668,'http://opensource.lineo.com/cuecat','tatooable version.',NULL,'Err','2009-06-29 11:35:13','N','N',NULL,'O','http://opensource.lineo.com/cuecat','http://web.archive.org/web/20010813121121/oss.lineo.com/cuecat/',NULL),(876,668,'http://www.ma2600.org/index.php?page=declaw','More information.',NULL,'Ok','2009-06-29 11:35:14','N','Y','2009-09-07 07:48:20','O','http://www.ma2600.org/index.php?page=declaw',NULL,NULL),(877,668,'http://www.lineo.com','Software for :CueCat.',NULL,'Ok','2009-06-29 11:35:14','N','Y','2009-09-07 07:48:22','O','http://www.lineo.com',NULL,NULL),(878,668,'http://www.ma2600.org','Software for :CueCat.',NULL,'Ok','2009-06-29 11:35:15','N','Y','2009-09-07 07:48:23','O','http://www.ma2600.org',NULL,NULL),(879,669,'http://www.utp-online.com','UTP.',NULL,'Ok','2009-06-29 11:42:51','N','Y','2009-09-07 07:48:26','O','http://www.utp-online.com',NULL,NULL),(880,669,'http://www.ittag.com','IT&T.',NULL,'Ok','2009-06-29 11:42:52','N','Y','2009-09-07 07:48:31','O','http://www.ittag.com',NULL,NULL),(881,670,'http://www.amazon.fr','Cybertraque - French version.',NULL,'Ok','2009-06-29 11:51:23','N','Y','2009-09-07 07:48:48','O','http://www.amazon.fr',NULL,NULL),(882,805,'http://www.verizonfears.com','Author\'s web site.',NULL,'Ok','2009-07-06 07:02:57','N','Y','2009-08-14 17:34:13','O','http://www.verizonfears.com',NULL,NULL),(883,805,'http://lab.digitol.net/callerid.html','Spoob Open Source Orangebox.',NULL,'Err','2009-07-06 07:02:58','N','N',NULL,'O','http://lab.digitol.net/callerid.html',NULL,NULL),(884,805,'http://www.artofhacking.com/orange.htm','Shareware \"Software Orange Box\" for Windows.',NULL,'Err','2009-07-06 07:03:30','N','N',NULL,'O','http://www.artofhacking.com/orange.htm',NULL,NULL),(885,805,'http://www.codegods.net/cidmage','CIDMAGE.',NULL,'Err','2009-07-06 07:04:01','N','N',NULL,'O','http://www.codegods.net/cidmage',NULL,NULL),(886,805,'http://www.testmark.com/develop/tml_callerid_cnt.html','Caller ID info.',NULL,'Err','2009-07-06 07:05:01','N','N',NULL,'O','http://www.testmark.com/develop/tml_callerid_cnt.html',NULL,NULL),(887,806,'http://www.chrismckinstry.com','Author\'s web site.',NULL,'Err','2009-07-06 07:18:40','N','N',NULL,'O','http://www.chrismckinstry.com',NULL,NULL),(888,809,'http://www.openpgp.org','OpenPGP.',NULL,'Ok','2009-07-06 13:46:24','N','Y','2009-08-14 17:34:19','O','http://www.openpgp.org',NULL,NULL),(889,809,'http://mixmaster.sourceforge.net','Mixmaster.',NULL,'Ok','2009-07-06 13:46:24','N','Y','2009-08-14 17:34:21','O','http://mixmaster.sourceforge.net',NULL,NULL),(890,809,'http://www.skuz.net/potatoware/reli','Reliable.',NULL,'Err','2009-07-06 13:46:25','N','N',NULL,'O','http://www.skuz.net/potatoware/reli',NULL,NULL),(891,809,'http://quicksilver.skuz.net','QuickSilver.',NULL,'Err','2009-07-06 13:46:25','N','N',NULL,'O','http://quicksilver.skuz.net',NULL,NULL),(892,809,'http://www.skuz.net/potatoware/jbn2','Jack B. Nymble.',NULL,'Err','2009-07-06 13:46:26','N','N',NULL,'O','http://www.skuz.net/potatoware/jbn2',NULL,NULL),(893,809,'http://www.geocities.com/SiliconValley/Byte/6176/macmixmaster.html','MiXfiT.',NULL,'Err','2009-07-06 13:46:26','N','N',NULL,'O','http://www.geocities.com/SiliconValley/Byte/6176/macmixmaster.html',NULL,NULL),(894,809,'http://www.pgpi.org','PGP International.',NULL,'Ok','2009-07-06 13:46:28','N','Y','2009-08-14 17:34:23','O','http://www.pgpi.org',NULL,NULL),(895,809,'http://www.gnupg.org','GPG.',NULL,'Ok','2009-07-06 13:46:29','N','Y','2009-08-14 17:34:27','O','http://www.gnupg.org',NULL,NULL),(896,809,'http://anon.efga.org/Remailers','Electronic Frontier Georgia (EFGA).',NULL,'Ok','2009-07-06 13:46:31','N','Y','2009-08-14 17:34:28','O','http://anon.efga.org/Remailers',NULL,NULL),(897,809,'http://www.publius.net/rlist.html','List of remailers.',NULL,'Ok','2009-07-06 13:46:33','N','Y','2009-08-14 17:34:31','O','http://www.publius.net/rlist.html',NULL,NULL),(898,809,'https://riot.EU.org/anon/pubring.mix','insecure pubring.mix.',NULL,'Err','2009-07-06 13:47:35','N','N',NULL,'O','https://riot.EU.org/anon/pubring.mix',NULL,NULL),(899,809,'https://riot.EU.org/anon/type2.list','insecure type2.list.',NULL,'Err','2009-07-06 13:48:36','N','N',NULL,'O','https://riot.EU.org/anon/type2.list',NULL,NULL),(900,809,'https://riot.EU.org/anon/pubring.asc','insecure pubring.asc.',NULL,'Err','2009-07-06 13:49:36','N','N',NULL,'O','https://riot.EU.org/anon/pubring.asc',NULL,NULL),(901,809,'http://mixmaster.shinn.net/stats','Shinn.',NULL,'Err','2009-07-06 13:49:37','N','N',NULL,'O','http://mixmaster.shinn.net/stats',NULL,NULL),(902,809,'http://www.nuther-planet.net/farout/stats','FarOut.',NULL,'Ok','2009-07-06 13:49:39','N','Y','2009-08-14 17:34:32','O','http://www.nuther-planet.net/farout/stats',NULL,NULL),(903,809,'http://www.privacyresources.org/frogadmin/Main.html','Frog.',NULL,'Err','2009-07-06 13:49:39','N','N',NULL,'O','http://www.privacyresources.org/frogadmin/Main.html',NULL,NULL),(904,809,'http://www.tahina.priv.at/~cm/stats','Austria.',NULL,'Ok','2009-07-06 13:49:42','N','Y','2009-08-14 17:34:34','O','http://www.tahina.priv.at/~cm/stats',NULL,NULL),(905,809,'http://www.eskimo.com/~turing/remailer/stats','Computer Cryptology.',NULL,'Ok','2009-07-06 13:49:43','N','Y','2009-08-14 17:34:55','O','http://www.eskimo.com/~turing/remailer/stats',NULL,NULL),(906,809,'http://lexx.shinn.net/cmeclax/gumdatni.html','Cmeclax (Shinn mirror).',NULL,'Err','2009-07-06 13:49:43','N','N',NULL,'O','http://lexx.shinn.net/cmeclax/gumdatni.html',NULL,NULL),(907,809,'http://riot.eu.org/anon/doc/nym.html','Create a nym instructions.',NULL,'Err','2009-07-06 13:50:43','N','N',NULL,'O','http://riot.eu.org/anon/doc/nym.html',NULL,NULL),(908,809,'http://www.sendfakemail.com/~raph/remailer-list.html','Additional info.',NULL,'Ok','2009-07-06 13:50:45','N','Y','2009-08-14 17:35:00','O','http://www.sendfakemail.com/~raph/remailer-list.html',NULL,NULL),(909,809,'http://www.theargon.com','Additional info.',NULL,'Ok','2009-07-06 13:50:46','N','Y','2009-08-14 17:35:01','O','http://www.theargon.com',NULL,NULL),(910,812,'http://www.3dnews.ru/download/dvd/smart-ripper','SmartRipper.',NULL,'Ok','2009-07-06 14:16:10','N','Y','2009-08-14 17:36:08','O','http://www.3dnews.ru/download/dvd/smart-ripper',NULL,NULL),(911,812,'http://www.digital-digest.com/dvd/downloads/dvdx.html','DVDx.',NULL,'Ok','2009-07-06 14:16:11','N','Y','2009-08-14 17:36:11','O','http://www.digital-digest.com/dvd/downloads/dvdx.html',NULL,NULL),(912,812,'http://www.vcdeasy.org','VCDEasy.',NULL,'Ok','2009-07-06 14:16:13','N','Y','2009-08-14 17:36:13','O','http://www.vcdeasy.org',NULL,NULL),(913,812,'http://www.vcdhelp.com','VCDHelp.',NULL,'Ok','2009-07-06 14:16:14','N','Y','2009-08-14 17:36:17','O','http://www.vcdhelp.com',NULL,NULL),(914,812,'http://www.321studios.com/support.htm','321 Software troubleshooting.',NULL,'Ok','2009-07-06 14:16:17','N','Y','2009-08-14 17:36:17','O','http://www.321studios.com/support.htm',NULL,NULL),(915,813,'http://www.yak.net/acidus','Author\'s web site',NULL,'Ok','2009-07-06 14:24:46','N','Y','2009-08-14 17:36:19','O','http://www.yak.net/acidus',NULL,NULL),(916,815,'http://www.freeconference.com','Free conference calls.',NULL,'Ok','2009-07-06 14:36:57','N','Y','2009-08-14 17:37:00','O','http://www.freeconference.com',NULL,NULL),(917,816,'http://www.ibuyspyportal.com/DesktopDefault.aspx','IBuySpy Portal Framework.',NULL,'Err','2009-07-06 14:47:42','N','N',NULL,'O','http://www.ibuyspyportal.com/DesktopDefault.aspx',NULL,NULL),(918,816,'http://www.asp.net','ASP.NET.',NULL,'Ok','2009-07-06 14:47:43','N','Y','2009-08-14 17:37:31','O','http://www.asp.net',NULL,NULL),(919,817,'http://www.salon.com','salon.com.',NULL,'Ok','2009-07-06 14:53:14','N','Y','2009-08-14 17:38:00','O','http://www.salon.com',NULL,NULL),(920,818,'http://www.directupdate.net','Direct Update.',NULL,'Ok','2009-07-06 14:58:23','N','Y','2009-08-14 17:38:11','O','http://www.directupdate.net',NULL,NULL),(921,818,'http://www.dnsq.org','DNSQ.',NULL,'Ok','2009-07-06 14:58:23','N','Y','2009-08-14 17:38:12','O','http://www.dnsq.org',NULL,NULL),(922,818,'http://www.realvnc.com','VNC.',NULL,'Ok','2009-07-06 14:58:24','N','Y','2009-08-14 17:38:27','O','http://www.realvnc.com',NULL,NULL),(923,818,'http://www.uk.research.att.com/vnc','ATT VNC.',NULL,'Err','2009-07-06 14:58:24','N','N',NULL,'O','http://www.uk.research.att.com/vnc',NULL,NULL),(924,1377,'http://www.donotcall.gov','Do Not Call Registry.',NULL,'Ok','2009-07-08 03:14:30','N','Y','2009-07-24 13:38:29','O','http://www.donotcall.gov',NULL,NULL),(925,1377,'http://www.optoutprescreen.com','Opt-Out Prescreen.',NULL,'Ok','2009-07-08 03:14:33','N','Y','2009-07-24 13:38:45','O','http://www.optoutprescreen.com',NULL,NULL),(926,1377,'http://www.acxiom.com/opt-out-request-form','Acxicom Opt-Out.',NULL,'Ok','2009-07-08 03:14:35','N','Y','2009-07-24 13:39:15','O','http://www.acxiom.com/opt-out-request-form',NULL,NULL),(927,1377,'http://www.dmachoice.org','Direct Marketing Association.',NULL,'Ok','2009-07-08 03:14:38','N','Y','2009-07-24 13:39:33','O','http://www.dmachoice.org',NULL,NULL),(928,1377,'http://www.privacyatchoicepoint.com/optout_ext.html','Choicepoint.',NULL,'Ok','2009-07-08 04:31:24','N','Y','2009-07-24 13:39:37','O','http://www.privacyatchoicepoint.com/optout_ext.html',NULL,NULL),(929,1377,'http://www.411.com','411.',NULL,'Ok','2009-07-08 03:14:40','N','Y','2009-07-24 13:39:52','O','http://www.411.com',NULL,NULL),(930,1377,'http://whitepages.aol.com','AOL Whitepages.',NULL,'Ok','2009-07-08 03:14:43','N','Y','2009-07-24 13:40:12','O','http://whitepages.aol.com',NULL,NULL),(931,1377,'http://www.phonenumber.com','PhoneNumber.com.',NULL,'Ok','2009-07-08 03:14:45','N','Y','2009-07-24 13:40:19','O','http://www.phonenumber.com',NULL,NULL),(932,1377,'http://www.whitepages.com','Whitepages.',NULL,'Ok','2009-07-08 03:14:45','N','Y','2009-07-24 13:40:27','O','http://www.whitepages.com',NULL,NULL),(933,1377,'http://www.anywho.com/help/privacy_list.html','anywho.com.',NULL,'Ok','2009-07-08 03:17:32','N','Y','2009-07-24 13:40:33','O','http://www.anywho.com/help/privacy_list.html',NULL,NULL),(934,1377,'http://yahoo.intelius.com/optout.php','people.yahoo.com.',NULL,'Ok','2009-07-08 03:14:47','N','Y','2009-07-24 13:40:33','O','http://yahoo.intelius.com/optout.php',NULL,NULL),(935,1377,'http://find.person.superpages.com','find.person.superpages.com.',NULL,'Ok','2009-07-08 03:14:49','N','Y','2009-07-24 13:41:00','O','http://find.person.superpages.com',NULL,NULL),(936,1377,'http://switchboard.intelius.com/optout.php','switchboard.intelius.com.',NULL,'Ok','2009-07-08 03:14:52','N','Y','2009-07-24 13:41:31','O','http://switchboard.intelius.com/optout.php',NULL,NULL),(937,1377,'http://www.zabasearch.com/block_records/block_by_mail.php','zabasearch.com.',NULL,'Ok','2009-07-08 03:14:52','N','Y','2009-07-24 13:41:32','O','http://www.zabasearch.com/block_records/block_by_mail.php',NULL,NULL),(938,1377,'http://www.reversephonedetective.com/optout/optout.php','reversephonedetective.com.',NULL,'Ok','2009-07-08 03:14:53','N','Y','2009-07-24 13:41:34','O','http://www.reversephonedetective.com/optout/optout.php',NULL,NULL),(939,1377,'http://www.daplus.us/remove.aspx','daplus.us.',NULL,'Ok','2009-07-08 03:14:54','N','Y','2009-07-24 13:41:43','O','http://www.daplus.us/remove.aspx',NULL,NULL),(940,1377,'http://www.peoplefinders.com/privacy.aspx','peoplefinders.com.',NULL,'Ok','2009-07-08 03:15:04','N','Y','2009-07-24 13:41:44','O','http://www.peoplefinders.com/privacy.aspx',NULL,NULL),(941,1377,'http://www.ussearch.com/consumer/optout/submitOptout.do','ussearch.com.',NULL,'Ok','2009-07-08 03:15:05','N','Y','2009-07-24 13:42:02','O','http://www.ussearch.com/consumer/optout/submitOptout.do',NULL,NULL),(942,1377,'http://www.classmates.com/cmo/user/remove','classmates.com.',NULL,'Ok','2009-07-08 03:15:07','N','Y','2009-07-24 13:42:06','O','http://www.classmates.com/cmo/user/remove',NULL,NULL),(943,1377,'http://poboxes.usps.com/poboxonline/search/landingPage.do','Search for PO Boxes in your area.',NULL,'Ok','2009-07-08 03:15:08','N','Y','2009-07-24 13:42:17','O','http://poboxes.usps.com/poboxonline/search/landingPage.do',NULL,NULL),(944,1377,'http://www.merriam-webster.com/dictionary/name','\"name\" definition.',NULL,'Ok','2009-07-08 03:15:08','N','Y','2009-07-24 13:42:30','O','http://www.merriam-webster.com/dictionary/name',NULL,NULL),(945,1380,'http://www.toorcamp.org','ToorCamp.',NULL,'Ok','2009-07-08 04:03:41','N','Y','2009-07-24 13:42:42','O','http://www.toorcamp.org',NULL,NULL),(946,1380,'http://www.boostmobile.com','Boost Mobile.',NULL,'Ok','2009-07-08 04:03:41','N','Y','2009-07-24 13:42:53','O','http://www.boostmobile.com',NULL,NULL),(947,1380,'http://webaugur.com/matt/files/nextel/techover.pdf','Motorola iDEN technical specification.',NULL,'Ok','2009-07-08 04:03:42','N','Y','2009-07-24 13:43:02','O','http://webaugur.com/matt/files/nextel/techover.pdf',NULL,NULL),(948,1380,'http://idenphones.motorola.com/iden/support/downloads/Motorola_End_User_Driver_Installation_2.8.0.zip','Windows iDEN driver download.',NULL,'Ok','2009-07-08 04:04:57','N','Y','2009-07-24 13:43:08','O','http://idenphones.motorola.com/iden/support/downloads/Motorola_End_User_Driver_Installation_2.8.0.zip',NULL,NULL),(949,1381,'http://www.loc.gov','Library of Congress.',NULL,'Ok','2009-07-08 04:08:51','N','Y','2009-07-24 13:43:17','O','http://www.loc.gov',NULL,NULL),(950,1383,'http://wiki.remote-exploit.org','Backtrack wiki page.',NULL,'Ok','2009-07-08 04:08:52','N','Y','2009-07-24 13:43:17','O','http://wiki.remote-exploit.org',NULL,NULL),(951,1383,'http://forums.remote-exploit.org','Backtrack forums.',NULL,'Ok','2009-07-08 04:08:53','N','Y','2009-07-24 13:43:28','O','http://forums.remote-exploit.org',NULL,NULL),(952,1383,'http://www.remote-exploit.org/backtrack_download.html','Backtrack ISO download.',NULL,'Ok','2009-07-08 04:08:54','N','Y','2009-07-24 13:43:39','O','http://www.remote-exploit.org/backtrack_download.html',NULL,NULL),(953,1383,'http://www.isobuster.com','IsoBuster.',NULL,'Ok','2009-07-08 04:08:54','N','Y','2009-07-24 13:43:45','O','http://www.isobuster.com',NULL,NULL),(954,1383,'http://www.aircrack-ng.org','aircrack.',NULL,'Ok','2009-07-08 04:08:56','N','Y','2009-07-24 13:44:22','O','http://www.aircrack-ng.org',NULL,NULL),(955,1383,'http://www.oxid.it','Cain & Abel.',NULL,'Ok','2009-07-08 04:08:58','N','Y','2009-07-24 13:44:32','O','http://www.oxid.it',NULL,NULL),(956,1383,'http://www.nessus.org','Nessus.',NULL,'Ok','2009-07-08 04:08:59','N','Y','2009-07-24 13:44:43','O','http://www.nessus.org',NULL,NULL),(957,1383,'http://www.metasploit.com','Metasploit Framework.',NULL,'Ok','2009-07-08 04:08:59','N','Y','2009-07-24 13:44:47','O','http://www.metasploit.com',NULL,NULL),(958,1383,'http://www.wireshark.org','Wireshark.',NULL,'Ok','2009-07-08 04:09:00','N','Y','2009-07-24 13:44:56','O','http://www.wireshark.org',NULL,NULL),(959,1386,'http://thebeamz.com','The Beamz.',NULL,'Ok','2009-07-08 04:12:31','N','Y','2009-07-24 13:45:00','O','http://thebeamz.com',NULL,NULL),(960,1386,'http://www.threechords.com/hammerhead','Hammerhead.',NULL,'Ok','2009-07-08 04:12:34','N','Y','2009-07-24 13:45:06','O','http://www.threechords.com/hammerhead',NULL,NULL),(961,1386,'http://audacity.sourceforge.net','Audacity.',NULL,'Ok','2009-07-08 04:12:34','N','Y','2009-07-24 13:45:12','O','http://audacity.sourceforge.net',NULL,NULL),(962,1387,'http://www.textfiles.com','Author\'s web site.',NULL,'Ok','2009-07-08 04:13:28','N','Y','2009-07-24 13:45:14','O','http://www.textfiles.com',NULL,NULL),(963,1390,'http://www.undemocracy.com','Authors web site with UN documents/info.',NULL,'Ok','2009-07-08 04:16:10','N','Y','2009-07-24 13:45:22','O','http://www.undemocracy.com',NULL,NULL),(964,1391,'https://wiki.har2009.org/','HAR 2009.','','Ok','2009-07-08 04:17:37','Y','Y','2010-10-20 08:52:29','O','https://www.har2009.org','',''),(965,1391,'http://www.ccc.de','Chaos Computer Club d\'Hambourg (CCCH).',NULL,'Ok','2009-07-08 04:17:38','N','Y','2009-07-24 13:45:31','O','http://www.ccc.de',NULL,NULL),(966,1391,'http://www.transfert.net/French-hacker-sued-by-an','Larsen news 1.',NULL,'Ok','2009-07-08 04:17:39','N','Y','2009-07-24 13:45:37','O','http://www.transfert.net/French-hacker-sued-by-an',NULL,NULL),(967,1391,'http://www.bugbrother.com/archives/larsen/larsen.htm','Larsen news 2.',NULL,'Ok','2009-07-08 04:17:41','N','Y','2009-07-24 13:45:38','O','http://www.bugbrother.com/archives/larsen/larsen.htm',NULL,NULL),(968,1391,'http://cryptome.info/larsen091200.htm','Larsen news 3.',NULL,'Ok','2009-07-08 04:17:42','N','Y','2009-07-24 13:45:39','O','http://cryptome.info/larsen091200.htm',NULL,NULL),(969,1391,'http://crcf.rebelz.org','crcf.rebelz.org (no longer online).',NULL,'Err','2009-07-08 04:17:43','N','N',NULL,'O','http://crcf.rebelz.org',NULL,NULL),(970,1391,'http://14frs128.site.voila.fr','Larsen\'s web site 1.',NULL,'Ok','2009-07-08 04:17:44','N','Y','2009-07-24 13:45:48','O','http://14frs128.site.voila.fr',NULL,NULL),(971,1391,'http://astronautique21.site.voila.fr','Larsen\'s web site 2.',NULL,'Ok','2009-07-08 04:42:30','N','Y','2009-07-24 13:45:57','O','http://astronautique21.site.voila.fr',NULL,NULL),(972,1392,'http://realraum.at','Graz - Realraum.',NULL,'Ok','2009-07-08 04:26:58','N','Y','2009-07-24 13:46:26','O','http://realraum.at',NULL,NULL),(973,1392,'http://www.happylab.at','Vienna - HappyLab.',NULL,'Ok','2009-07-08 04:27:00','N','Y','2009-07-24 13:47:09','O','http://www.happylab.at',NULL,NULL),(974,1392,'http://metalab.at','Vienna - Metalab.',NULL,'Ok','2009-07-08 04:27:02','N','Y','2009-07-24 13:47:49','O','http://metalab.at',NULL,NULL),(975,1392,'http://hsb.wikidot.com','Brussels - Hackerspace Brussels.',NULL,'Ok','2009-07-08 04:27:02','N','Y','2009-07-24 13:48:00','O','http://hsb.wikidot.com',NULL,NULL),(976,1392,'http://www.molekula.org','Rijeka - Molekula.',NULL,'Ok','2009-07-08 04:31:26','N','Y','2009-07-24 13:48:09','O','http://www.molekula.org',NULL,NULL),(977,1392,'http://www.satama.org','Helsinki - Satama.',NULL,'Ok','2009-07-08 04:27:04','N','Y','2009-07-24 13:48:11','O','http://www.satama.org',NULL,NULL),(978,1392,'http://www.hackerzvoice.net','Saint Quen - HackerzVoice.',NULL,'Ok','2009-07-08 04:27:05','N','Y','2009-07-24 13:48:22','O','http://www.hackerzvoice.net',NULL,NULL),(979,1392,'http://www.ccac.rwth-aachen.de','Aachen - Computer Club an der RWTH Aaacen e.V.',NULL,'Ok','2009-07-08 04:27:07','N','Y','2009-07-24 13:48:26','O','http://www.ccac.rwth-aachen.de',NULL,NULL),(980,1392,'http://bootlab.org','Berlin - Bootlab.',NULL,'Ok','2009-07-08 04:27:08','N','Y','2009-07-24 13:48:27','O','http://bootlab.org',NULL,NULL),(981,1392,'http://c-base.org','Berlin - c-base.',NULL,'Ok','2009-07-08 04:27:09','N','Y','2009-07-24 13:48:34','O','http://c-base.org',NULL,NULL),(982,1392,'http://berlin.ccc.de','Berlin - Chaos Computer Club Berlin.',NULL,'Ok','2009-07-08 04:27:12','N','Y','2009-07-24 13:49:04','O','http://berlin.ccc.de',NULL,NULL),(983,1392,'http://m21.hyte.de','Berlin - Raumfahrtagentur.',NULL,'Ok','2009-07-08 04:27:15','N','Y','2009-07-24 13:50:23','O','http://m21.hyte.de',NULL,NULL),(984,1392,'http://www.das-labor.org','Bochum - Das Labor.',NULL,'Ok','2009-07-08 04:27:17','N','Y','2009-07-24 13:50:27','O','http://www.das-labor.org',NULL,NULL),(985,1392,'http://netzladen.org','Bonn - Netzladen.',NULL,'Ok','2009-07-08 04:27:19','N','Y','2009-07-24 13:50:33','O','http://netzladen.org',NULL,NULL),(986,1392,'http://koeln.ccc.de','Cologne - C4.',NULL,'Ok','2009-07-08 04:27:21','N','Y','2009-07-24 13:50:36','O','http://koeln.ccc.de',NULL,NULL),(987,1392,'http://www.chaostreff-dortmund.de','Dortmund - Chaosraum.',NULL,'Ok','2009-07-08 04:27:23','N','Y','2009-07-24 13:50:44','O','http://www.chaostreff-dortmund.de',NULL,NULL),(988,1392,'http://duesseldorf.ccc.de','Dusseldorf - Chaosdorf.',NULL,'Ok','2009-07-08 04:27:24','N','Y','2009-07-24 13:50:52','O','http://duesseldorf.ccc.de',NULL,NULL),(989,1392,'http://www.hamburg.ccc.de','Hamburg - Chaos Computer Club.',NULL,'Ok','2009-07-08 04:27:26','N','Y','2009-07-24 13:51:07','O','http://www.hamburg.ccc.de',NULL,NULL),(990,1392,'http://www.cciz.de','Itzehoe - CC Itzehoe.',NULL,'Ok','2009-07-08 04:27:27','N','Y','2009-07-24 13:51:10','O','http://www.cciz.de',NULL,NULL),(991,1392,'http://entropia.de','Karlsruhe - Entropia.',NULL,'Ok','2009-07-08 04:27:30','N','Y','2009-07-24 13:51:15','O','http://entropia.de',NULL,NULL),(992,1392,'http://sublab.org','Leipzig - Sublab.',NULL,'Ok','2009-07-08 04:31:30','N','Y','2009-07-24 13:51:22','O','http://sublab.org',NULL,NULL),(993,1392,'http://muc.ccc.de','Munich - Muc3.',NULL,'Ok','2009-07-08 04:27:31','N','Y','2009-07-24 13:51:25','O','http://muc.ccc.de',NULL,NULL),(994,1392,'http://www.k4cg.org','Nuremberg - K4CG.',NULL,'Ok','2009-07-08 04:27:33','N','Y','2009-07-24 13:51:37','O','http://www.k4cg.org',NULL,NULL),(995,1392,'http://wiki.chaos-paderborn.de','Paderborn - chaos@paderborn.',NULL,'Ok','2009-07-08 04:27:35','N','Y','2009-07-24 13:51:39','O','http://wiki.chaos-paderborn.de',NULL,NULL),(996,1392,'http://www.lugr.de','Regensburg - LUGR.',NULL,'Ok','2009-07-08 04:27:37','N','Y','2009-07-24 13:51:50','O','http://www.lugr.de',NULL,NULL),(997,1392,'http://feint.subsignal.org','Weimar - FEiNT.',NULL,'Ok','2009-07-08 04:27:40','N','Y','2009-07-24 13:52:04','O','http://feint.subsignal.org',NULL,NULL),(998,1392,'http://tog.ie','Dublin - TOG.',NULL,'Ok','2009-07-08 04:27:42','N','Y','2009-07-24 13:52:19','O','http://tog.ie',NULL,NULL),(999,1392,'http://www.verdebinario.org','Cosenza - Verdebinario.',NULL,'Ok','2009-07-08 04:27:43','N','Y','2009-07-24 13:52:20','O','http://www.verdebinario.org',NULL,NULL),(1000,1392,'http://hacklaviva.net','Porto - Hacklaviva.',NULL,'Ok','2009-07-08 04:27:44','N','Y','2009-07-24 13:52:30','O','http://hacklaviva.net',NULL,NULL),(1001,1392,'http://www.ns-linux.org','Novi Sad - LUGoNS.',NULL,'Ok','2009-07-08 04:27:45','N','Y','2009-07-24 13:52:58','O','http://www.ns-linux.org',NULL,NULL),(1002,1392,'http://www.kiberpipa.org','Ljubljana - Kiberpipa.',NULL,'Ok','2009-07-08 04:27:48','N','Y','2009-07-24 13:53:13','O','http://www.kiberpipa.org',NULL,NULL),(1003,1392,'http://forskningsavd.se','Malmo - Forskningsavdelningen.',NULL,'Ok','2009-07-08 04:27:53','N','Y','2009-07-24 13:53:34','O','http://forskningsavd.se',NULL,NULL),(1004,1392,'http://www.mechatronicart.ch','Zurich - MechArtLab.',NULL,'Ok','2009-07-08 04:27:54','N','Y','2009-07-24 13:53:36','O','http://www.mechatronicart.ch',NULL,NULL),(1005,1392,'http://theskiff.org','Brighton - The Skiff.',NULL,'Ok','2009-07-08 04:27:56','N','Y','2009-07-24 13:53:50','O','http://theskiff.org',NULL,NULL),(1006,1393,'http://lcamtuf.coredump.cx','Michal Zalewski (Revisionist).',NULL,'Ok','2009-07-08 04:34:05','N','Y','2009-07-24 13:53:54','O','http://lcamtuf.coredump.cx',NULL,NULL),(1007,1393,'http://www.sans.org/readming_room','Larry Pesce (metadata the silent killer).',NULL,'Ok','2009-07-08 04:34:07','N','Y','2009-07-24 13:53:57','O','http://www.sans.org/readming_room',NULL,NULL),(1008,1393,'http://www.sno.phy.queensu.ca/~phil/exiftool','Phil Harvey (Exiftool).',NULL,'Ok','2009-07-08 04:34:08','N','Y','2009-07-24 13:53:58','O','http://www.sno.phy.queensu.ca/~phil/exiftool',NULL,NULL),(1009,1394,'http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html','Reference 1 (faq).',NULL,'Ok','2009-07-08 04:43:49','N','Y','2009-07-24 13:53:58','O','http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html',NULL,NULL),(1010,1394,'http://www.actiontec.com','Reference 2 (actiontec).',NULL,'Ok','2009-07-08 04:43:51','N','Y','2009-07-24 13:54:02','O','http://www.actiontec.com',NULL,NULL),(1011,1394,'http://www.actiontec.com/products/product.php?pid=41','Reference 3 (actiontec router).',NULL,'Ok','2009-07-08 04:43:51','N','Y','2009-07-24 13:54:08','O','http://www.actiontec.com/products/product.php?pid=41',NULL,NULL),(1012,1394,'http://www.kismetwireless.net','Reference 4 (kismet).',NULL,'Ok','2009-07-08 04:43:52','N','Y','2009-07-24 13:54:11','O','http://www.kismetwireless.net',NULL,NULL),(1013,1394,'http://opensource.actiontec.com','Reference 5 (actiontec open source).',NULL,'Ok','2009-07-08 04:43:53','N','Y','2009-07-24 13:54:20','O','http://opensource.actiontec.com',NULL,NULL),(1014,1394,'http://www.dd-wrt.com','Reference 6 (dd-wrt).',NULL,'Ok','2009-07-08 04:43:54','N','Y','2009-07-24 13:54:21','O','http://www.dd-wrt.com',NULL,NULL),(1015,1394,'http://www.dd-wrt.com/wiki/index.php/Kismet_Server/Drone','Reference 7 (dd-wrt drone).',NULL,'Ok','2009-07-08 04:43:54','N','Y','2009-07-24 13:54:34','O','http://www.dd-wrt.com/wiki/index.php/Kismet_Server/Drone',NULL,NULL),(1016,1394,'http://www.torproject.org','Reference 8 (tor).',NULL,'Ok','2009-07-08 04:43:55','N','Y','2009-07-24 13:54:45','O','http://www.torproject.org',NULL,NULL),(1017,1395,'http://www.wigle.net','Wireless Geographic Logging Engine.',NULL,'Ok','2009-07-08 04:49:15','N','Y','2009-07-24 13:54:47','O','http://www.wigle.net',NULL,NULL),(1018,1395,'http://www.detected.org','First third-party plugin.',NULL,'Ok','2009-07-08 04:49:15','N','Y','2009-07-24 13:54:51','O','http://www.detected.org',NULL,NULL),(1019,1395,'http://www.kismetwireless.net','Kismet.',NULL,'Ok','2009-07-08 04:49:16','N','Y','2009-07-24 13:54:51','I','http://www.kismetwireless.net',NULL,NULL),(1020,1397,'http://en.wikipedia.org/wiki/Telephone_recording_laws','Wikipedia: Telephone Recording Laws.',NULL,'Ok','2009-07-08 04:51:43','N','Y','2009-07-24 13:54:54','O','http://en.wikipedia.org/wiki/Telephone_recording_laws',NULL,NULL),(1021,1397,'http://donotcall.gov','Do Not Call List.',NULL,'Ok','2009-07-08 04:51:44','N','Y','2009-07-24 13:54:55','O','http://donotcall.gov',NULL,NULL),(1022,1397,'http://en.wikipedia.org/wiki/Caller_ID_spoofing','Wikipedia: Caller ID spoofing.',NULL,'Ok','2009-07-08 04:51:44','N','Y','2009-07-24 13:54:56','O','http://en.wikipedia.org/wiki/Caller_ID_spoofing',NULL,NULL),(1023,1397,'http://en.wikipedia.org/wiki/Social_engineering_(security)','Wikipedia: Social engineering.',NULL,'Ok','2009-07-08 04:51:45','N','Y','2009-07-24 13:54:58','O','http://en.wikipedia.org/wiki/Social_engineering_(security)',NULL,NULL),(1024,1397,'http://onsamehost.com','OnSameHost.com.',NULL,'Ok','2009-07-08 04:51:45','N','Y','2009-07-24 13:55:04','O','http://onsamehost.com',NULL,NULL),(1025,1397,'http://whois.net','Whois.',NULL,'Ok','2009-07-08 04:51:47','N','Y','2009-07-24 13:55:06','O','http://whois.net',NULL,NULL),(1026,1397,'http://switchboard.com','Switchboard.com.',NULL,'Ok','2009-07-08 04:51:48','N','Y','2009-07-24 13:55:13','O','http://switchboard.com',NULL,NULL),(1027,1397,'http://kepler.sos.ca.gov','California Secretary of State.',NULL,'Ok','2009-07-08 04:51:48','N','Y','2009-07-24 13:55:15','O','http://kepler.sos.ca.gov',NULL,NULL),(1028,1397,'http://cr.ocgov.com/fbn/index.asp','Fictitious Business Name search.',NULL,'Err','2009-07-08 04:51:50','N','N',NULL,'O','http://cr.ocgov.com/fbn/index.asp','http://web.archive.org/web/20070802081822/http://cr.ocgov.com/fbn/index.asp',NULL),(1029,1397,'http://www.courtinfo.ca.gov/forms/fillable/sc100.pdf','California civil court form SC-100.',NULL,'Ok','2009-07-08 04:54:43','N','Y','2009-07-24 13:55:16','O','http://www.courtinfo.ca.gov/forms/fillable/sc100.pdf',NULL,NULL),(1030,1397,'http://saizai.livejournal.com/tag/tcpa','Author\'s blog.',NULL,'Ok','2009-07-08 04:51:50','N','Y','2009-07-24 13:55:39','O','http://saizai.livejournal.com/tag/tcpa',NULL,NULL),(1031,1397,'http://www.courtinfo.ca.gov/selfhelp/smallclaims','California Courts Self-Help Center.',NULL,'Ok','2009-07-08 04:55:43','N','Y','2009-07-24 13:55:45','O','http://www.courtinfo.ca.gov/selfhelp/smallclaims',NULL,NULL),(1032,1398,'http://www.defcon.org','Defcon 17.',NULL,'Ok','2009-07-08 04:59:42','N','Y','2009-07-24 13:55:51','O','http://www.defcon.org',NULL,NULL),(1033,1398,'http://www.plumbercon.org','PlumberCon.',NULL,'Ok','2009-07-08 04:59:43','N','Y','2009-07-24 13:55:56','O','http://www.plumbercon.org',NULL,NULL),(1034,1398,'http://har2009.org','Hacking at Random.',NULL,'Ok','2009-07-08 04:59:45','N','Y','2009-07-24 13:56:01','O','http://har2009.org',NULL,NULL),(1035,1398,'http://www.sec-t.org','SEC-T.',NULL,'Ok','2009-07-08 04:59:47','N','Y','2009-07-24 13:56:07','O','http://www.sec-t.org',NULL,NULL),(1036,1398,'http://www.lugradio.org','LugRadio.',NULL,'Ok','2009-07-08 04:59:48','N','Y','2009-07-24 13:56:21','O','http://www.lugradio.org',NULL,NULL),(1037,1398,'http://ccc.de','Chaos Communication Congress.',NULL,'Ok','2009-07-08 04:59:49','N','Y','2009-07-24 13:56:29','O','http://ccc.de',NULL,NULL),(1038,1350,'http://www.savetheinternet.com/blog','Current headlines/analysis','From addendum.','Ok','2009-07-08 05:04:58','N','Y','2009-07-24 13:37:01','A','http://www.savetheinternet.com/blog',NULL,NULL),(1039,637,'http://natwestsucks.com','natwestsucks.com.',NULL,'Ok','2009-07-13 07:06:28','N','Y','2009-09-07 07:49:35','O','http://natwestsucks.com',NULL,NULL),(1040,637,'http://standardcharteredsucks.com','standardcharteredsucks.com.',NULL,'Err','2009-07-13 07:06:30','N','N',NULL,'O','http://standardcharteredsucks.com',NULL,NULL),(1041,637,'http://walmartcanadasucks.com','walmartcanadasucks.com.',NULL,'Err','2009-07-13 07:06:35','N','N',NULL,'O','http://walmartcanadasucks.com',NULL,NULL),(1042,638,'http://whois.geektools.com','whois proxy.',NULL,'Ok','2009-07-13 07:20:07','N','Y','2009-09-07 07:49:37','O','http://whois.geektools.com',NULL,NULL),(1043,639,'http://bcu.n3.net','Author\'s web site.',NULL,'Ok','2009-07-13 07:24:55','N','Y','2009-09-07 07:49:49','O','http://bcu.n3.net',NULL,NULL),(1044,640,'http://gullfoss2.fcc.gov','Frequency directory.',NULL,'Ok','2009-07-13 07:32:15','N','Y','2009-09-07 07:49:49','O','http://gullfoss2.fcc.gov',NULL,NULL),(1045,641,'http://decafe.hypermart.net','Decafe Pro.',NULL,'Err','2009-07-13 07:40:35','N','N',NULL,'O','http://decafe.hypermart.net',NULL,NULL),(1046,641,'http://freshmeat.net','Look for Java decompilers here.',NULL,'Ok','2009-07-13 07:40:36','N','Y','2009-09-07 07:50:26','O','http://freshmeat.net',NULL,NULL),(1047,642,'http://subseven.slak.org','Sub7 home page.',NULL,'Err','2009-07-13 07:45:53','N','N',NULL,'O','http://subseven.slak.org',NULL,NULL),(1048,642,'http://www.icq.com','ICQ Notify.',NULL,'Ok','2009-07-13 07:45:54','N','Y','2009-09-07 07:51:06','O','http://www.icq.com',NULL,NULL),(1049,643,'http://fuckgeneralmotors.com','Domain disputed.',NULL,'Ok','2009-07-13 07:49:37','N','Y','2009-09-07 07:51:08','O','http://fuckgeneralmotors.com',NULL,NULL),(1050,652,'http://www.digitalconvergence.com','Digital:Convergence.',NULL,'Err','2009-07-15 11:36:49','N','N',NULL,'O','http://www.digitalconvergence.com',NULL,NULL),(1051,654,'http://www.winpcap.org/windump/','windump.',NULL,'Ok','2009-07-13 15:03:56','Y','Y','2009-09-07 07:51:10','O','http://netgroup-serv.polito.it/windump',NULL,NULL),(1052,621,'http://www.indymedia.org','Independent Media.',NULL,'Ok','2009-07-19 12:02:43','N','Y','2009-09-07 07:52:01','O','http://www.indymedia.org',NULL,NULL),(1053,621,'http://www.eff.org/support','Support the EFF.',NULL,'Ok',NULL,'Y','Y','2009-09-07 07:52:24','O','http://www.eff.org/support/joineff.html',NULL,NULL),(1054,623,'http://www.cybertimesoftware.com','Cybertime Software.',NULL,'Ok','2009-07-19 12:13:47','N','Y','2009-09-07 07:52:30','O','http://www.cybertimesoftware.com',NULL,NULL),(1055,625,'http://register.sprinthome.com','Sprint MAC registration.',NULL,'Err','2009-07-20 07:26:00','N','N',NULL,'O','http://register.sprinthome.com',NULL,NULL),(1056,625,'http://videogames.yahoo.com','gamesdomain.com.',NULL,'Ok','2009-07-20 07:28:40','Y','Y','2009-09-07 07:52:48','O','http://www.gamesdomain.com',NULL,NULL),(1057,625,'http://mssjus.www.conxion.com','conxion.com.',NULL,'Err','2009-07-20 07:26:48','N','N',NULL,'O','http://mssjus.www.conxion.com',NULL,NULL),(1058,625,'https://service.sprint.com','Sprint ION Control Center (Dashboard).',NULL,'Ok','2009-07-20 07:30:20','Y','Y','2009-09-07 07:53:20','O','https://www.sidm.sprint.com',NULL,NULL),(1059,630,'http://www.great-books.com','Digital books.',NULL,'Ok','2009-07-20 08:13:21','N','Y','2009-09-07 07:53:24','O','http://www.great-books.com',NULL,NULL),(1060,630,'http://www.esoterichydroponics.com','Hydroponics.',NULL,'Ok','2009-07-20 08:13:23','N','Y','2009-09-07 07:53:24','O','http://www.esoterichydroponics.com',NULL,NULL),(1061,630,'http://www.ganja.co.uk','Seeds.',NULL,'Ok','2009-07-20 08:29:08','Y','Y','2009-09-07 07:53:34','O','http://www.pukkaseeds.com',NULL,NULL),(1062,630,'http://www.huntertools.com','Power tools.',NULL,'Err','2009-07-20 08:18:43','N','N',NULL,'O','http://www.huntertools.com',NULL,NULL),(1063,630,'http://www.gandalf.user.xirium.com','Author\'s web site.',NULL,'Err','2009-07-20 08:15:28','N','N',NULL,'O','http://www.gandalf.user.xirium.com',NULL,NULL),(1064,630,'http://www.rbsworldpay.com','WorldPay PLC.',NULL,'Ok','2009-07-20 08:19:04','Y','Y','2009-09-07 07:54:47','O','http://www.worldpay.com',NULL,NULL),(1065,630,'http://www.victoriawine.co.uk','Victoria Wine.',NULL,'Err','2009-07-20 08:16:13','N','N',NULL,'O','http://www.victoriawine.co.uk',NULL,NULL),(1066,630,'http://www.datacash.com','DataCash.',NULL,'Ok','2009-07-20 08:16:10','N','Y','2009-09-07 07:54:52','O','http://www.datacash.com',NULL,NULL),(1067,630,'http://www.altavista.com','AltaVista.',NULL,'Ok','2009-07-20 08:16:28','N','Y','2009-09-07 07:54:54','O','http://www.altavista.com',NULL,NULL),(1068,630,'http://go.com','InfoSeek.',NULL,'Ok','2009-07-20 08:20:41','Y','Y','2009-09-07 07:55:02','O','http://infoseek.go.com',NULL,NULL),(1069,631,'http://inettools.com','DNScape.',NULL,'Err','2009-07-20 13:53:42','N','N',NULL,'O','http://inettools.com',NULL,NULL),(1070,631,'http://www.simplelogic.com/Siple/net_utils/NsLookup.asp','NsLookup.',NULL,'Err','2009-07-20 13:54:09','N','N',NULL,'O','http://www.simplelogic.com/Siple/net_utils/NsLookup.asp',NULL,NULL),(1071,631,'http://www.elcafe.com/man/man1/nslookup.1.html','Linux nslookup man page.',NULL,'Err','2009-07-20 13:53:18','N','N',NULL,'O','http://www.elcafe.com/man/man1/nslookup.1.html',NULL,NULL),(1072,631,'http://www.trumphurst.com/dnsocx/nslookup.php','Trumphurst Ltd. nslookup.',NULL,'Ok','2009-07-20 13:55:25','Y','Y','2009-09-07 07:55:04','O','http://www.trumphurst.com/dnsocx/nslookup.phtml',NULL,NULL),(1073,632,'http://www.2600.com','Example of blocked URL.',NULL,'Ok','2009-07-20 14:02:36','N','Y','2009-09-07 07:55:04','O','http://www.2600.com',NULL,NULL),(1074,632,'http://3479379686','URL converted to decimal.',NULL,'Ok','2009-07-20 14:02:44','N','Y','2009-09-07 07:55:05','O','http://3479379686',NULL,NULL),(1075,633,'http://pacer.psc.uscourts.gov/psco/cgi-bin/register.pl\r\n','PACER registration form.',NULL,'Ok','2009-07-20 14:09:42','Y','Y','2009-09-07 07:55:05','O','http://pacer.psc.uscourts.gov/regform.html',NULL,NULL),(1076,634,'http://www.dns.net/dnsrd','DNS stuff.',NULL,'Ok','2009-07-20 14:19:33','N','Y','2009-09-07 07:55:06','O','http://www.dns.net/dnsrd',NULL,NULL),(1077,634,'http://www.dns.net/dnsrd/tools.html','host.',NULL,'Ok','2009-07-20 14:19:23','N','Y','2009-09-07 07:55:06','O','http://www.dns.net/dnsrd/tools.html',NULL,NULL),(1078,634,'http://insecure.org/','nmap.',NULL,'Ok','2009-07-20 14:21:17','Y','Y','2009-09-07 07:55:21','O','http://www.insecure.org',NULL,NULL),(1079,634,'http://www.dns.net/dnsrd/mark/wintools.html','Windows users.',NULL,'Ok','2009-07-20 14:21:20','N','Y','2009-09-07 07:55:23','O','http://www.dns.net/dnsrd/mark/wintools.html',NULL,NULL),(1080,636,'http://www.allelec.com/VGALCD.html','LCD screens cheap.',NULL,'Err','2009-07-20 14:38:39','N','N',NULL,'O','http://www.allelec.com/VGALCD.html',NULL,NULL),(1081,636,'http://riskable.youknowwhat.com/car.html','Riskable car computer.',NULL,'Err','2009-07-20 14:38:28','N','N',NULL,'O','http://riskable.youknowwhat.com/car.html',NULL,NULL),(1082,636,'http://rehmi.www.media.mit.edu/people/rehmi/HackMan0.4.html','Hackman wearable computer.',NULL,'Err','2009-07-20 14:38:11','N','N',NULL,'O','http://rehmi.www.media.mit.edu/people/rehmi/HackMan0.4.html',NULL,NULL),(1083,636,'http://wearables.www.media.mit.edu/projects/wearables','MIT wearable computers.',NULL,'Err','2009-07-20 14:37:54','N','N',NULL,'O','http://wearables.www.media.mit.edu/projects/wearables',NULL,NULL),(1084,636,'http://dir.yahoo.com/Computers_and_Internet/Mobile_Computing/Wearable_Computers','Yahoo wearable computers.',NULL,'Err','2009-07-20 14:37:33','N','N',NULL,'O','http://dir.yahoo.com/Computers_and_Internet/Mobile_Computing/Wearable_Computers',NULL,NULL),(1085,636,'http://www.eio.com','Surplus electronics.',NULL,'Ok','2009-07-20 14:37:12','N','Y','2009-09-07 07:55:28','O','http://www.eio.com',NULL,NULL),(1086,636,'http://www.igadget.com/igadget/cartelevisions.html','Mainstream prices.',NULL,'Err','2009-07-20 14:37:02','N','N',NULL,'O','http://www.igadget.com/igadget/cartelevisions.html',NULL,NULL),(1087,636,'http://globe-mart.com/electron/powerinverters/statpower/PW-300.htm','Power inverter.',NULL,'Err','2009-07-23 08:09:07','N','N',NULL,'O','http://globe-mart.com/electron/powerinverters/statpower/PW-300.htm',NULL,'lines=413HTTP/1.0 200 OK
Date: Thu, 23 Jul 2009 12:08:17 GMT
Server: Apache
X-Powered-By: PHP/5.2.0-8+etch15
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 23 Jul 2009 12:08:17 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: tu=5376227cde5290888b86c8be46498eca; expires=Tue, 31-Dec-2019 23:00:00 GMT; path=/; domain=globe-mart.com; httponly
Vary: User-Agent,Accept-Encoding
Content-Type: text/html
X-Cache: MISS from 353153
Connection: close

Return Value: 0
'),(1090,605,'http://www.hidglobal.com','HID.',NULL,'Ok','2009-07-25 10:43:52','N','Y','2009-09-07 07:56:15','O','http://www.hidglobal.com',NULL,'lines=539HTTP/1.1 200 OK
Date: Sat, 25 Jul 2009 14:43:50 GMT
Server: Apache/2.2.9 (FreeBSD) mod_ssl/2.2.9 OpenSSL/0.9.8e DAV/2 PHP/5.2.8 with Suhosin-Patch
X-Powered-By: PHP/5.2.8
X-Pingback: http://www.hidglobal.com/wordpress/xmlrpc.php
Set-Cookie: PHPSESSID=enigu1nun24f8blgpnknr5i2p3; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.1//EN\" \"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd\">
<html>
<head>
Return Value: 0
'),(1091,605,'http://www.Biometrics2000.com','Biometrics2000.com.',NULL,'Err','2009-07-25 10:43:53','N','N',NULL,'O','http://www.Biometrics2000.com',NULL,'lines=15HTTP/1.1 404 Not Found
Content-type: text/html

<html><head>
<title>404 Not Found</title>
<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\">
<script>
var value;
value = \'se\';
document.location = \'htt\' + \'p://wwwz.\'
+ \'websearch.verizon.net/\' + value + \'arch?qg=www.biometrics2000.com&r\' +
\'n=Wq0QpCR0uvb8cFC&rg=\';
</script>
</head>
<body>404 Not Found</body></html>
Return Value: 0
'),(1092,605,'http://www.l1id.com/pages/17','Identix.',NULL,'Ok','2009-07-25 10:45:55','Y','Y','2009-09-07 07:56:23','O','http://www.identix.com',NULL,'lines=1062HTTP/1.1 200 OK
Date: Sat, 25 Jul 2009 14:45:53 GMT
Server: Apache/2.2.8 (Unix) Phusion_Passenger/2.2.2
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.2
X-Runtime: 126
ETag: \"58a282875351ea66c27b487ebf4f4ebd\"
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _session_id=b6cea71e907c50322853a19096adc85d; path=/; HttpOnly
Content-Length: 28665
Status: 200
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.1//EN\" \"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd\">

<html xmlns=\"http://www.w3.org/1999/xhtml\" xml:lang=\"en\">
Return Value: 0
'),(1093,605,'http://Iris-scan.com','Info about biometrics.',NULL,'Ok','2009-07-25 10:43:56','N','Y','2009-09-07 07:56:25','O','http://Iris-scan.com',NULL,'lines=19HTTP/1.1 200 OK
Date: Sat, 25 Jul 2009 14:43:54 GMT
Server: Oversee Webserver v1.3.18
Set-Cookie: parkinglot=1; domain=.iris-scan.com; path=/; expires=Sun, 26-Jul-2009 14:43:54 GMT
Transfer-Encoding: chunked
Content-Type: text/html


<html>
<head>
<title>iris-scan.com</title><meta name=\"keywords\" content=\"iris-scan.com\"><meta name=\"description\" content=\"iris-scan.com\"><meta name=\"robots\" content=\"INDEX, FOLLOW\"><meta name=\"revisit-after\" content=\"10\"><meta http-equiv=\"Content-Type\" content=\"text/html; charset=iso-8859-1\">
</head>
<frameset rows=\"100%,*\" frameborder=\"no\" border=\"0\" framespacing=\"0\">
<frame src=\"http://searchportal.information.com?epl=00830091QUdfCQtRCwFSA1JQDEMBXA5rFFIFUEUEEwgTXFdZUAxbWgNVXFhaRghDTxBbBAgdAlsLEQJqXgVcAg0LDwY\">
</frameset>
Return Value: 0
'),(1094,605,'http://biometrics.cse.msu.edu','Info about biometrics.',NULL,'Ok','2009-07-25 10:45:56','Y','Y','2009-09-07 07:56:40','O','http://biometics.cse.msu.edu',NULL,'lines=424HTTP/1.1 200 OK
Date: Sat, 25 Jul 2009 14:45:46 GMT
Server: Apache/2.2.9 (Debian) DAV/2 PHP/5.2.6-1+lenny3 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Last-Modified: Fri, 17 Jul 2009 13:35:59 GMT
ETag: \"16ac1d0-5784-46ee6de5ccdc0\"
Accept-Ranges: bytes
Content-Length: 22404
Content-Type: text/html

<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4. Transitional//EN\">
<html>
<head>
<title>BIOMETRICS RESEARCH - PRIP MSU</title>
<meta name=\"description\" content=\"Projects and Publications in Biometrics at Michigan State University\">
<meta name=\"keywords\" content=\"biometrics,fingerprint,hand geometry, speaker verification,face location,multibiometrics\">
Return Value: 0
'),(1095,605,'http://www.dogpile.com','Find stuff yourself.',NULL,'Ok','2009-07-25 10:43:59','N','Y','2009-09-07 07:56:51','O','http://www.dogpile.com',NULL,'lines=868HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Sat, 25 Jul 2009 14:43:57 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Set-Cookie: ASP.NET_SessionId=cb3ol155vj1phnvfkpdog255; path=/
Set-Cookie: DomainSession=TransactionId=28d9cc5b8a844f208f3bb486f50cca01&SessionId=9d1e823364de4bcfb4deb486f50cca01&ActionId=5383cc0192844735a888b486f50cca01&CookieDomain=.dogpile.com; domain=.dogpile.com; expires=Sat, 25-Jul-2009 15:03:57 GMT; path=/
Set-Cookie: DomainUserProfile=AnonymousId=6da9fb1678584b8aaf01b486f50cca01&LastSeenDateTime=7/25/2009 2:43:57 PM&IssueDateTime=7/25/2009 2:43:57 PM&CookieDomain=.dogpile.com; domain=.dogpile.com; expires=Mon, 01-Jul-2109 14:43:57 GMT; path=/
Cache-Control: no-cache, no-store
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 43877
Vary: Accept-Encoding, User-Agent
Return Value: 0
'),(1096,610,'http://www.ddj.com/architect/184413795','Chuck Newman\'s \"Sharing Too Much\".',NULL,'Ok','2009-07-25 11:31:44','Y','Y','2009-09-07 07:56:53','O','http://www.webtechniques.com/archives/2000/04/newman',NULL,'lines=2302HTTP/1.1 200 OK
Date: Sat, 25 Jul 2009 15:31:40 GMT
Server: Apache
Cache-Control: no-cache, max-age=0
Expires: Sat, 25 Jul 2009 15:31:40 GMT
Last-Modified: Tue, Jan 27 2099 23:59:59 GMT
Pragma: no-cache
X-ATG-Version: ATGPlatform/7.2 [ DASLicense/0 DPSLicense/0 ]
Set-Cookie: JSESSIONID=EZQBO5TAWFIMIQSNDLRSKHSCJUNN2JVN; path=/
Content-Type: text/html
Transfer-Encoding: chunked
Vary: Accept-Encoding, User-Agent



Return Value: 0
'),(1097,613,'ftp://ftp.ee.lbl.gov/libpcap-0.4.tar.Z','libpcap 0.4 ftp.',NULL,'Err','2009-07-25 13:50:00','N','N',NULL,'O','ftp://ftp.ee.lbl.gov/libpcap-0.4.tar.Z',NULL,'lines=1curl: (19) RETR response: 550
Return Value: 19
'),(1098,613,'http://www.faqs.org/rfcs/','RFC Database.',NULL,'Ok','2009-07-25 13:55:09','N','Y','2009-09-07 07:56:53','O','http://www.faqs.org/rfcs/',NULL,'lines=255HTTP/1.1 200 OK
Date: Sat, 25 Jul 2009 17:55:07 GMT
Server: Apache/2.2
Vary: Accept-Encoding,User-Agent
Content-Length: 7760
Connection: close
Content-Type: text/html




Internet RFC/FYI/STD/BCP Archives