$2600 Magazine
Downloads & Information
    World's Largest Undocumented $2600 Distribution Site    

Eric Corley
Your Threat Model Just Changed






Hackers Then

"We are creating a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity."

    --- Quote from John Perry Barlow in A Declaration of the Independence of Cyberspace on February 8, 1996.


"Long live the underground!  When the underground is gone, when the people's will to resist overbearing government and kneejerk morality is gone...
Then, shall I be able to declare America dead."

    --- Quote from Jello Biafra, a frequent HOPE speaker.


"If liberty means anything at all, it means the right to tell people what they do not want to hear."

    --- Quote from George Orwell (Eric A. Blair [1903-1950])


"Anyone who stands up for what he believes in is an inspiration.  That's the spirit of a hacker, and it's the spirit of an individual."

    --- Quote from Evil Corley during an Off The Hook broadcast.  (I don't remember which one.)


"It's a question of freedom of speech, something that has stood up for the last couple hundred years, and I think the Internet should definitely continue the tradition."

    --- Quote from Evil Corley on Off The Hook, June 18, 1996.


"... Freedom of speech, on the other hand, is something that is universally sought after and recognized as valuable."

    --- Quote from a reply to a letter by William R. Epp in Vol. 18, No. 3.


"As you probably know it you've read our pages before, we have some major issues with entities who abuse power and intimidate individuals..."

    --- Quote from a reply to a letter by "anonymous" in Vol. 20, No. 2.


"Unthinking respect for authority is the greatest enemy of truth."

    --- Quote from Albert Einstein used in Vol. 23, No. 1.


"The first condition of progress is the removal of censorship."

    --- Quote from George Bernard Shaw used in Vol. 33, No. 1.


"9.) I will aid the voiceless in obtaining a voice and help them evade censorship so they too can enjoy the fundamental human rights of free speech."

    --- Quote from Ghost Exodus (Jesse McGraw) in his article "No Country for Incarcerated Hackers" in Vol. 35, No. 3


"Recognizing the content of the wikileaks.org website is the subject of concern to a variety of individuals and nations, we nevertheless believe it must be subject to the same laws and policies of availability as all Internet sites.  Free expression should not be restricted by governmental or private controls over computer hardware or software, telecommunications infrastructure, or other essential components of the Internet."

    --- Quote by The Internet Society from the article entitled "The Internet Society on the Wikileaks issue" in their membership newsletter.



Cult of the Dead Cow - Freedom






Hackers Now

CENSOR!  ATTACK!  BAN!  DELETE!  SHUN!  CANCEL!  DEPLATFORM!  SHUT IT DOWN!!!!!!!!!!!



Cult of the Dead Cow - Fascism


What Would Jello Do?  Sell-out and become a tool for the Deep State & One Percent.


2600 Kicked Off of YouTube for Sarcastic Remark  $2600 has now felt what many other YouTube content providers have felt after being censored for a seemingly meaningless, off-the-cuff remark.


        
War is peace.
Freedom is slavery.
Ignorance is strength.


    


"By means of ever more effective methods of mind-manipulation, the democracies will change their nature; the quaint old forms -- elections, parliaments, Supreme Courts and all the rest -- will remain.  The underlying substance will be a new kind of non-violent totalitarianism.  All the traditional names, all the hallowed slogans will remain exactly what they were in the good old days.  Democracy and freedom will be the theme of every broadcast and editorial.  ...  Meanwhile the ruling (((oligarchy))) and its highly trained elite of soldiers, policemen, thought-manufacturers and mind-manipulators will quietly run the show as they see fit."

    --- Aldous Huxley, Brave New World, 1958.


    


"At press time, Parler was no longer in service.  We're not mourning its loss and don't believe it ever offered anything of value.  We would certainly like to see alternative social media sites that aren't batshit crazy, as having everyone using only a couple of different sites is far from ideal."

    --- Quote from a reply to a letter by "Jason" in Vol. 37, No. 4.  Ironic, as $2600 is one of the most "batshit crazy" publications out there...


"Someone in this group reported me and got my account blocked for 24 hours over something that wasn't even that serious.  I'm unhappy about that and I've never ever had someone do something so petty."

"I keep getting muted from the 2600 group without explanation.  What am I doing wrong here?"

"Unfortunately, I've been blocked for seven days from posting for no apparent reason.  I would like to read the guidelines as suggested, but when I go to read them, it says the post has been removed or deleted.  Can someone please send me the guidelines and, if possible, tell me which I violated?  I thought I posted a supportive humorous meme, but I'd like to follow the rules."

    --- Letters in issue Vol. 37, No. 4 regarding censorship of posts (and users) on the $2600 Faceberg groups.


"We believe in science.  We support removing fascists from platforms.  We want monopolies broke up.  And we demand accountability.  Saying these things really pissed a lot of people off.  So we're saying them again in case we missed anyone."

    --- Quote from a $2600 Twitter post in May 27, 2021.  $2600 Magazine openly attacks the scientific method, believes that men can become pregnant or turn into women if they chop off their pee-pee, openly supported (and voted for) the fascist Obama and Biden regimes, profits from complaints about the government's mess of the breakup of AT&T or has never once mentioned the "Federal Reserve" as they slowly increase the price of their magazine to $9, and doesn't want anyone to show an ID to vote, but they do use IDs (and encryption) on their own computer networks.


"... Nowadays, Off The Hook is filled with sycophants who dare not disagree with political views, no matter how misguided, or he will scream at them.  Literally.  The only personality brave enough to even attempt to disagree and reason with him at times is Alex (whom I applaud), but even his attempts are half-hearted and shouted down."

    --- Quote from a letter by "J.X." in Vol. 38., No. 3 discussing their views on what Off The Hook and 2600 have turned into.


    

PepeEvil Corley and the One Percent are an existential threat to our democracy and must be stopped at any cost.

They are currently engaging in the greatest assault on our freedoms which we have ever seen.  

What we're seeing with $2600 today is far more nefarious, as well-organized (((groups))) seek to influence massive amounts of people with fear, hatred, false information, and an unhealthy sense of paranoia.  They encourage violence and want a far less democrat system in place, one where they reap the benefits and those who aren't like them are kept from having any power, to put it mildly.

[update soon]



Thought Puzzle

  1. Jonathan Littman writes a book about Kevin Poulsen called The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen.  It is full of lies, distortions, invented facts, and both minor and major technical errors.  It makes Kevin Poulsen look bad.  There are no movies, protests, bumper stickers, T-shirts, or defaced websites.  Imagine if someone wrote a book about YOU with the subtitle including the words "twisted life and crimes..."
  2. "Furthering the humiliation, the press, as a general rule, will not be concerned with presenting the truth.  They will print what suits them and often omit many relevant facts.  If you have read any of the 5 books I am covered in you will no doubt have a rather jaded opinion of me.  Let me assure you that if you met me today you would quickly see that I am quite likable and not the villain many (especially Jon Littman) have made me out to be.  You may not agree with how I lived my life, but you wouldn't have any trouble understanding why I chose to live it that way.  Granted I've made my mistakes, growing up has been a long road for me.  Nevertheless, I have no shortage of good friends.  Friends that I am immensely loyal to.  But if you believe everything you read you'd have the impression that Mitnick is a vindictive loser, Poulsen a furtive stalker, and I a two faced rat.  All of those assessments would be incorrect."

        --- Quote from Justin T. Petersen (Agent Steal) in his "Everything a Hacker Needs to Know About Getting Busted by the Feds" in Phrack Magazine Issue #52.

  3. Katie Hafner and John Markoff write a book about Kevin Mitnick called Cyberpunk: Outlaws and Hackers on the Computer Frontier.  It is full of lies, distortions, invented facts, and both minor and major technical errors.  It makes Kevin Mitnick look bad.  The "hacker" community, lead by $2600 Magazine, explodes in a riot of seething protests, rants, and defaced websites.
  4. Jonathan Littman next writes a book about Kevin Mitnick called The Fugitive Game: Online with Kevin Mitnick.  It is full of lies, distortions, invented facts, and both minor and major technical errors.  It makes Kevin Mitnick look good.  The "hacker" community loves this book because it "shows the true story."  They don't, however, ever seem to mention the lies of Littman's Kevin Poulsen book.  Hmm...
  5. Kevin Mitnick gets caught hacking while using his modified Oki 900 cellular phone.  The reverse engineering and initial experimentation the Oki 900 is based around the work done by Mark K. Lottor and Tsutomu Shimomura.  They were true hackers in the original spirit.
  6. Tsutomu Shimomura and John Markoff write a book about the tracking and capturing of Kevin Mitnick called Takedown: The Pursuit and Capture of Kevin Mitnick.  Ignoring the fact that Tsutomu was actually there, witnessed everything, and pulled off some very clever hacks - $2600 Magazine jumps on him, screaming he's a fraud.  They lead the charge for the kiddies to harass his personal life.
  7. Jeff Goodell writes a book about Kevin Mitnick called The Cyberthief and the Samurai.  This book tries to stay neutral and calls bullshit on both the Markoff and Littman versions of the "tracking Mitnick" story.  Markoff wanted to capture Mitnick so he could write a book about that, and Littman wanted to keep Mitnick "on the run" so he could write a book about that.
  8. $2600 Magazine now uses Kevin Mitnick as their main cash cow.  Anybody else attempting to profit (as they see it) from Mitnick's story is immediately demonized.  The peak of this cash cow is the release of the movie Freedom Downtime ($30).  It's embarrassingly retarded.  The point of the movie is to attack both Shimomura and Markoff, while ignoring the people Mitnick harassed.  Freedom of speech and freedom of the press apparently only apply to $2600 Magazine now.



Relevant Notes & Links

  1. Index and Article Listing  For most early issues of $2600 Magazine.
  2. HOPE Conference Audio  Direct MP3 downloads from the Horny Old Pedophiles Everywhere conferences.
  3. Freedom Downtime ($30)  Kevin Mitnick "fakeumentary" by the idiots at $2600 Magazine.  Save yourself $30.00 on Evil Corley's favorite cash cow and protect your wallet from one of the most greedy profiteering gluttons.
  4. Off The Hook Audio  All past Off The Hook propaganda broadcasts downloadable from a single webpage.
  5. The Best of $2600: A Hacker Odyssey  Links to some of the articles which appear in this cash cow.
  6. The Art of Intrusion  No, no profit motive here at all.  His lawyers and Corley didn't whip up any publicity.  Remember: When Kevin exploits the Open Records Act he's a hero.  When others do it, it's like the end of the world.
  7. Ghost in the Wires  Kevin Mitnick's own version of events surrounding his tracking and arrest.
  8. GOBBLES Security - $2600's Secrets  Members nwonknu, Stephen Watt, and Silvio Cesare reveal some of $2600 Magazine's dirty little secrets at DEFCON 10.  (3M MP3)  (Complete Speech on YouTube)
  9. The Truth Almost Slips Out  November 23, 1994 episode of Off The Hook with Phiber Optik.  (75k MP3)
  10. Surveillance Audio Excerpt  From outside Evil Corley's Victorian mansion in Sekauket, New York - which was paid for by selling other people's old BBS files.
  11. Kevin Mitnick Prank Call #1  (206k MP3)
  12. Kevin Mitnick Prank Call #2  (374k MP3)
  13. Kevin Mitnick Prank Call #3  Turns into a pretty good plug for his book!  (1.3M MP3)
  14. Kevin Mitnick Prank Call #4  (517k MP3)
  15. Hackers '95  Erik Bloodaxe (Chris Goggans) gives his thoughts on $2600 Magazine and HOPE  (YouTube)
  16. HOPE Bumper Sticker  August 1994.
  17. $2600 Collective's Live Journal  Keep track of these idiots.
  18. "Free Kevin" Mailing List Archive  (members.tripod.com/~empallin/Free_Kevin_Mitnick)
  19. Windows '95 Start-Up Screen  Displays the yellow "Free Kevin" banner.  (Install as C:\LOGO.SYS for this to work.)  (Free Kevin Icons)
  20. Free Kevin T-Shirt  Make a T-shirt - print this image onto a T-shirt transfer and iron it on.
  21. Free Kevin Mitnick Now!
  22. "Free Kevin" Sticker on a Patch Panel
  23. Partial "Free Kevin" Flyer  (17k PDF)
  24. Corley Reviews the Mitnick Movie Script  (Alternate)  (Second Version)
  25. The Art of Being Pwnd
  26. John D. Nunes' Mailbox  Member of Mitnick Security Consulting.  Courtesy of the Phrack High Council.
  27. I hope this works
    
    %% No, it didn't. It got to PHC!
    
  28. Zero For 0wned - Issue #1  Contains their attack against $2600's IRC network.
  29. www.DefensiveThinking.com Defacement  Quite amusing actually.
  30. www.mitsec.com Defacement  "What a pity security specialists!!"
  31. SummerCon '89 Poster  June 23-25, 1989.  Hosted by Phrack, Inc.  Did $2600 Magazine steal this design for their T-shirt?
  32. Information Wants to be Free?  Phrack, Issue #44 editorial.
  33. Amusing Quotes and General Media Whoring  by Macki
  34. Good Info on Jello Biafra  Eric Reed Boucher, $2600's "Hacker Ambassador."  A clueless, hypocritical, rich, selfish, gay idiot who profits from other people's work and lives in a million dollar house.  No wonder Evil Corley likes him!
  35. The Secret Service vs. Bernie S.  Internet Underground article on the Edward E. Cummings (Bernie S.) case.  Includes details you may not have heard on Off The Hook.
  36. Gray Areas Magazine Review the First HOPE  August 13-14, 1994 at Hotel Pennsylvania in New York City.
  37. Kevin Mitnick Prison Release Pictures  Pictures from the press conference Kevin Mitnick held after his release from prison.  Can you guess who's in the background milking the Mitnick cash cow?
  38. Notwork Mirror  From around 1998.  This is where Emmanuel teaches teenage boys about "penetration."
  39. New York Hackers See Breaking Into Computers as a Healthy Thing  New York Times article from June 14, 1998.
  40. IIRG's Radio Show: Byte Me  Complete nine show MP3 archive.
  41. $2600 Staff Audio Panel  Audio from the 1997 Beyond HOPE cash cow.  Listen for them admitting: using another person's office and office supplies to make their little newsletter (so much for rights & privacy!), them admitting they steal and profit from other people's old BBS files, and them admitting they use voice mail systems to avoid listening to their customers - while complaining when other companies do the same thing.  (YouTube)
  42. Reviews and Comments on H2K2  You won't see these mentioned in $2600 Magazine!
  43. Greg Newby Hypocrisy  One of the $2600/HOPE idiots.  He's whining about the U.N. sanctions against Iraq during the 1990s.  If the U.N. removed Saddam back then, there would be no need for sanctions.  Also note the rant against the Kosovo bombings.  Not helping those Muslims being killed by the Serbs was one of the excuses cited by the 9/11 terrorists.  Oh, the irony!
  44. GIST Communications  David Ruderman, one of the co-founders of $2600 Magazine, is their Vice President of Technology (Mirror).  GIST Communications received several million dollars (Mirror) in financial backing from Neptuno G.m.b.H.  Remember this whenever $2600 Magazine complains they have no money.  Hah!
  45. A Night in New Jack City on First Friday  'Our Misadventures with Emmanuel Goldstein during and after the New York 2600 Meeting'.  A hilarious story by The Men from Mongo.
  46. Evil Corley ♥ Autojack  "Do you like movies about gladiators?"
  47. John Draper  a.k.a. Captain Crunch.  He's a regular HOPE and DEFCON attendee.  Watch out for his "Crunch Squats" and "massages" if you are under 18.
  48. ToorCon - No Moar Crunchberries Plz  Captain Crunch meets GreenDiamond at ToorCon.
  49. Encyclopedia Dramatica Entry for Captain Crunch
  50. Emmanuel Goldstein Trading Card  As featured in ~EL8, Issue #1.
  51. Emmanuel Goldstein Linux Kernel Module  As featured in PHC's Phrack Magazine, Issue #62.
  52. The True Story of Emmanuelle Goldstein and Erik Corley  Funny story from HoE #90.
  53. Emmanuel Goldstein vs. Danny Partridge  Funny USENET post by netrunnr (Shoshi Wong).
  54. The Day Emmanuel Died  And he wasn't even informed...
  55. Stop Paying for 2600!  RBCP's USENET thread from PLA Magazine, Issue #44.
  56. alt.2600 USENET Creation Message  December 1, 1993.  From Len Rose (Terminus).
  57. alt.26000/#hack FAQ  Beta Revision .012 by Voyager
  58. Evil Corley Interview from PhreakNIC 4  By Iron Feather.  Try not to throw up!  (2.4M MP3)
  59. Kevin Mitnick Interview on Info.Sec.Radio  Both parts of the August 21, 2000 interview by Dean Turner.  Try not to throw up!  (11.6M MP3)
  60. $2600's guinessrecords.com Mirror  More of their "Free Kevin" propaganda.  (Legal Threat)
  61. Legal Threat from General Motors  Legal threat against $2600 for the domain f*ckgeneralmotors.com.
  62. Off The Hook Farewell  Good speech about $2600 Magazine's propaganda and a final goodbye from Izaac Falken.
  63. TELECOM Digest & Archives  $2600 Magazine stole a lot of this information for their little magazine.
  64. 2600.org and 2600 Magazine Refused Press Coverage of OracleWorld  Oh no!  What are they going to do now?  (Note all the spelling errors.)
  65. OracleWorld 2003 S.F. Day 3 Was Explosive!  Why... they'll call in a bomb threat!  How "elite" of them.  (Arrest Info)
  66. Hackers Expose Vulnerability in White House Security  $2600 Magazine did something mildly amusing, and probably illegal.  They intercepted White House Communications Agency GOLAY pager traffic back in April 1997.
  67. $2600 Magazine Twitter  Magazine-related info.
  68. $2600 Magazine Faceberg
  69. Evil Corley's Twitter  Follow his mental breakdown!
  70. Victims of Communism Foundation  Don't let $2600 Magazine do this to you!
  71. Communist Body Count  Over 150 million people were killed because of people like Evil Corley.



Steve Rombom Information

[Per Critical Race [Semite] Theory, Steve Rombom is a Jewish supremacist and domestic terrorist.  His tribe ran the African slave trade and auctions for cotton workers in the southern states and also ran the sweatshops utilizing that cotton in the northern states.  They undermine and subvert countries by controlling their politicians, financial systems, schools, and media.  Communism and Marxism-Leninism are also Jewish supremacist ideologies which led to the deaths of millions of Gentiles.]

  1. Pallorium: A Figment of Steve Rombom's Imagination  Satirical website.
  2. California Court of Appeal Documents  Which summarize Steven Rombom's attempt to suppress Lubomyr Prytulak's Ukrainian archive website.  Lubomyr Prytulak ran a website which chronicled the murder of millions of Ukrainian citizens in the 1930s-1940s by the (((NKVD))) and other war crimes and human rights violations they committed.
  3.       
    Lviv Massacre in 1941 by the hands of the (((NKVD)))

    Additional Information:

    1. Steven Rambam (Rombom) Shakedown for $25,000
    2. The Jewish Show Trial of Julius Viel
    3. Smart to Lie to the L.A. Superior Court?
    4. Top 25 Investigators of the Century Hoax
    5. Should Edmund Pankau Be Off the List Too?
    6. The Invisible Ink of the Internet
    7. Did You Get Permission to Call Yourself "Rambam"?
    8. Why Didn't You Sue Robert I. Friedman?  "Perhaps [Steve] Rombom's tough guy obsession began in psychiatric institutions where he spent eight years of his youth, according to court documents.  Rombom denies he has ever been institutionalized."
    9. Efraim Zuroff Doesn't Believe You Either
    10. Why Did You Drag Mr. and Mrs. Rombom Into Rambam vs. Prytulak?
    11. You Sanitized the Bleecker Street Shoot-Out  "I think [Irv] Rubin and [Steve] Rombom went to [Mordechai] Levy's to rub him out."
    12. Mike Wallace's Dark Secret  Debunking the propaganda in the February 2, 1997 Mike Wallace/Steve Rombom 60 Minutes interview.
    13. Oy Vey, Make My Day  Fear and loathing in the Jewish underground.
    14. Publicity Stunt: Rambam-Abella Fifty Confessions Hoax
    15. Irwin Cotler Collaboration with Steven Rambam
    16. Material Relating to Steven Rambam (Rombom), Brooklyn Private Investigator
    17. The Great Holocaust Trial - 1985  Mentally-unstable members of the Jewish Defense League physically attacked Ernst Zundel, all because Zundel provided evidence the "holocaust" didn't happen the way the (((history books))) proclaimed.
    18. Testimony of Dr. Rudolf Vrba in the 1985 Trial of Ernst Zundel  Dr. Rudolph Vrba claimed to be the "only" person to escape from Auschwitz and wrote a book in the early 1960s about his experiences.  Many years later, in court, Vrba admitted that he had never actually seen any "homicidal gas chambers."
    19. Whitewashing Hate Crimes  J Magazine attempts to stand up for the JDL domestic terrorist group.  (Mirror)
    20. Earl Krugel  JDL extremist who tried to kill Congressmen Darrell Issa in 2001.
    21. JDL Threat Against David Cole  Researcher David Cole severely was beaten (YouTube censors it!  [Mirror #1, Mirror #2]) at least three times by Jewish Defense League thugs after a $25,000 bounty was placed on him by (((Irv Rubin))).
    22. Recently Released FBI File Suggests Rappers 2Pac and Eazy-E Were Threatened and Extorted  by the JDL!  (FBI File)
    23. FBI Files on Tupac Shakur Murder Show He Received Death Threats From Jewish Gang  Files state that Jewish Defense League had extorted money from 'various rap music stars' by making 'death threats' and then offering protection for a fee.  (Mirror)

  4. Steve Rambam's Secret History in Court Documents and Newspaper Articles  "Steve Rambam" is a regular at HOPE and on Off The Hook.  (Original)
  5. The Secret Life of Steve Rambam, Private Eye - An Opinion Page  Very interesting information on Steven Paul Rombom.  Older mirror of the steverombom.org website.
  6. JDL & JDO Militia Operating in New York  Usual Democrat anti-gun suspects suspiciously quiet...
  7. The Zionist Terror Network
  8. Additional Documents:

      
Steve Rombom Will Kill You if You're the Wrong Race

Former JDL terrorist Steve Rombom is trying to cover up Lubomyr Prytulak's research of the intentional starvation and unthinkable genocide of millions of innocent Gentiles in Eastern Europe and Russia during the 1930s - all at the hands of his fellow (((Bolsheviks))), (((Marxist-Leninists))), and eventually (((Communists))).

The Steven Rombom lawsuit is part shakedown, and part attempt to suppress discussion of the Rambam-Abella Fifty Confessions Hoax.  A fuller understanding of this hoax requires an acquaintance not only with Steven Rombom, but also with two of his co-conspirators - Irving Abella and F. David Radler.

There are NO museums, reparations, apologies, or even Hollywood movies dedicated to this deliberate genocide.  We must never forget the policies of collectivization which were responsible for the Holodomor!

Steve Rombom also refuses to help tracked down any of these "God's Chosen" war criminals and murderers, many of whom are still alive today.  (Video #1)  (Video #2)

    

"And us, the Jews?  An Israeli student finishes high school without ever hearing the name 'Genrikh Yagoda,' the greatest Jewish murderer of the 20th Century, the GPU's deputy commander and the founder and commander of the NKVD.  Yagoda diligently implemented Stalin's collectivization orders and is responsible for the deaths of at least 10 million people.  His Jewish deputies established and managed the Gulag system.  After Stalin no longer viewed him favorably, Yagoda was demoted and executed, and was replaced as chief hangman in 1936 by Yezhov, the 'bloodthirsty dwarf.'"

    --- December 21, 2006 quote from Sever Plocker in his article "Stalin's Jews" discussing some of history's greatest murderers.  (Mirror #1, Mirror #2)




Other Hacking Magazines

What makes a good hacker magazine?  Not having the number "2600" on the cover is a good start.

  1. Jason Scott's Textfiles.com  Newer hacking textfiles and 'zines.
  2. Jason Scott's Textfiles.com - Magazines  Huge archive of old hacking textfiles and 'zines.
  3. Phrack, Inc.  The legendary Phrack.  More content in one issue, than all issues of $2600 combined.
  4. Uninformed  Informative information for the uninformed.
  5. Saqueadores Edición Técnica (SET) E-Zine  Spanish hacker magazine.
  6. HackWire  Hacker news, a daily e-zine for hackers and computer security experts.
  7. The Collusion Webzine  Exploring technology and culture from a hacker's perspective.
  8. Butchered From Inside  Electronic publication of free speech and distribution written by the Italian hacker community.
  9. Hackin9  International magazine about hacking and IT security.
  10. Infiltration  Main journal for urban exploration.
  11. Telecom-munists Monthly  Funny phreak magazine: "we want stupid shit and stupid shit only".
  12. Page 33 'Zine  Hacking magazine, also in PDF format.
  13. Phr33k4z0iD'z & 13370 phr34k0 h34d5  Newer, detailed phreaking 'zine.
  14. Private Line  A journal of inquiry into the telephone system.
  15. Patterns of Recognition  New hack/phreak 'zine, funny stories.
  16. iGlitch 'Zine  A new Macintosh and security 'zine.
  17. Hacking Etc.  New 'zine in PDF format.
  18. (IN)SECURE Magazine  Freely available digital security magazine in PDF format.
  19. .aware eZine  Short-lived 'zine with solid technical information.
  20. O3 Magazine  The open-source enterprise data networking magazine.
  21. Tux Magazine  The first and only magazine for the new Linux user.
  22. Ethertech Global Industries  Awesome new hack/phreak e-zine.
  23. Hackszine
  24. Analog.5  Analog.5 is a hacking e-zine designed by the Hak5 community, for the Hak5 community.
  25. ODDREE: The Slacker Journal  ODDREE is a free technical journal for hackers, slackers, and nerds.  It exists only in digital form and is distributed mainly by means of bit-torrent web sites..
  26. NODE Zine  New, independently created 'zine for the NODE community.  It contains many of the subjects we talk about here; decentralization and P2P technologies, open-source, do-it-yourself tutorials and hardware design, cutting edge technology and more.
  27. tmp.0ut  New magazine for ELF-lovers.
  28. Paged Out!  Free experimental (one article == one page) technical magazine about programming (especially programming tricks!), hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics.
  29. Anarchivism - Printed Zine Archive

Archived Locally

  1. X.25 Magazine  Russian hacking 'zine.
  2. Da HaX0r BrUtHeRz NeWZlEtTeR
  3. ~el8 Magazine  Support pr0j3kt m4yh3m!
  4. B4B0 Magazine  The B4B0 Party Programme
  5. The Brotherhood of Warez  Phear BoW!@#$%!
  6. K-1ine  Excellent Canadian hack/phreak 'zine.
  7. PHANTASY  Newsletter of the International Information Retrieval Guild (IIRG)
  8. Informatik Journal  Hacker 'zine published by a couple of young punks from Texas.
  9. Frequency  Inside the hacker mind.
  10. Napalm E-Zine  Napalm is an e-zine devoted to computer security, with a healthy dose of music, news, and ethics.
  11. Cybertek / TICOM 'Zine / Dystonaut Back Issues  The Cyberpunk Technical Journal
  12. YIPL / TAP Magazine Back Issues  Both "old" and "new" versions.  Considered the first "hacker" newsletter.
  13. TEL Magazine Back Issues  Telephone Electronics Line.  1970s printed phreaking newsletter, by Teletronics.
  14. PHC's Phrack Magazine  Version of Phrack put out by the Phrack High Council.
  15. International Journal of Proof-of-Concept or Get The F*ck Out  Ridiculously awesome hacker 'zine by Manul Laphroaig (pastor@phrack.org)
  16. Binary Revolution Magazine  Printed alternative to $2600.
  17. Blacklisted! 411  Both print and online magazine from the 1980s/1990s which is was back again.
  18. Hack-Tic Magazine Archive  Legendary printed Dutch hacker magazine from the 1990s.
  19. 't Klaphek Magazine  Another magazine for Dutch speaking hackers and phreakers.
  20. Phreakers Hackers Underground Network (P/HUN) Newsletter  By Red Knight of the 'Hackers Den' BBS.
  21. DIG Magazine  Online and printed magazine from the Digital Information Group (DIG).
  22. root zine  Small printed hacker magazine by Mutter from the 1990s.  (Still looking for issues...)
  23. Phone Punx Magazine  Cool little phreaking 'zine by Mohawk of the Ocean County Phone Punx, only three issues though?
  24. Digital Phreak P1mps  The DPP is a loose association of hackers, phreaks, coders, and some other friends from IRC (#p1mp on EFnet).  DPP originally started out in 1996 as a pseudo-hacking magazine that ended up being a skript-kiddy forum.  Although there was some good material published, the 'zine never gained too much respect.  From Wisconsin?!
  25. The HAVOC Technical Journal  Technical hacking and phreaking magazine by Scud-O, a HAVOC Bell Systems' Publication.
  26. Go Null Yourself  New hacker 'zine by sToRm and m0nkee.  Lots of good original content and old-school hacking vibe.



"You can't stop P2P technology nor prevent the spread of alternative media - unless people allow it to happen."

    --- Reply to a letter in $2600 Magazine Vol. 21, No. 4.


"We continue to maintain that there is nothing at all illegal about making your own copy of something you own."

    --- Reply to a letter in $2600 Magazine Vol. 19, No. 3.


"For the record, and for the benefit of some people (like certain corporations and judges) who can't understand why a hacker magazine has a copyright, we encourage people to send our articles to other people."

    --- Reply to a letter in $2600 Magazine Vol. 17, No. 3.


"It's amazing to us that people actually think they have to do this.  This constitutes personal use - you have every right to use excerpts of a publication in such a manner without asking permission."

    --- Reply to a letter in $2600 Magazine Vol. 19, No. 1 asking about copying articles.


"Several years ago it would have been almost unheard of for a corporation to bully someone into submission on the Net using nothing but its might.  Today we seem to hear of a new case every day."

    --- Editorial in $2600 Magazine Vol. 17, No. 2.


[idiot]

"Hmm...  I think I'll start a 'hacker' magazine with articles written by other people but I'll keep the profits to myself.  I'll refuse to take any personal responsibility and blame all my problems on someone else!  When sales are sagging, I'll ask Hollywood to make a movie about me and my teenage boy posse, then claim I'm being 'suppressed,' while actively supporting truly corrupt politicians and the One Percent.  LOL!  While bitching about the telephone company selling long distance service, I'll sell T-shirts, hats, DVDs, and stickers!  I'll spend 25% of each issue complaining about how dumb everyone else is, but I won't ever mention the word 'thanks' to those people who helped me to get where I am today!  Slap a six seven eight dollar price tag on it and sue anyone giving it away for free!  I'll never have to get a real job!"

1984 (Vol. 01)        1985 (Vol. 02)        1986 (Vol. 03)        1987 (Vol. 04)        1988 (Vol. 05)

1989 (Vol. 06)        1990 (Vol. 07)        1991 (Vol. 08)        1992 (Vol. 09)        1993 (Vol. 10)

1994 (Vol. 11)        1995 (Vol. 12)        1996 (Vol. 13)        1997 (Vol. 14)        1998 (Vol. 15)

1999 (Vol. 16)        2000 (Vol. 17)        2001 (Vol. 18)        2002 (Vol. 19)        2003 (Vol. 20)

2004 (Vol. 21)        2005 (Vol. 22)        2006 (Vol. 23)        2007 (Vol. 24)        2008 (Vol. 25)

2009 (Vol. 26)        2010 (Vol. 27)        2011 (Vol. 28)        2012 (Vol. 29)        2013 (Vol. 30)

2014 (Vol. 31)        2015 (Vol. 32)        2016 (Vol. 33)        2017 (Vol. 34)        2018 (Vol. 35)

2019 (Vol. 36)        2020 (Vol. 37)        2021 (Vol. 38)        2022 (Vol. 39)        2023 (Vol. 40)



$2600 Magazine
Download Back Issues



(Note: Some source code examples won't match the printed versions as they were edited & cleaned-up to correct for minor syntax or formatting errors.)

  $2600 Magazine Volume 1, Number 1 (January 1984)

  1. AHOY!  - Introduction to $2600 and editorial
  2. FBI Goes After ADS Hackers  - Tactics and sources of a FBI raid involving IBM's Audio Distribution System (ADS)
  3. 2600 Flash
    • GTE Raids Still Have Many Unanswered Questions - Computer Owners Concerned
    • AT&T Credit Cards Make Debut
    • Wireless Phones Spell Trouble
    • 1984 Arrives in Hong Kong

  4. The Truth Behind Those 9999 Numbers  - Info on the services provided by the 800-9XX-9999 numbers, by Mark Bluebox
  5. White House Phone List  - Phone numbers to various White House offices
  6. FBI Goes After ADS Hackers (cont.)  - Tactics and sources of a FBI raid, continued

$2600 Magazine Volume 1, Number 2 (February 1984)

  1. Hacking on Telenet  - Beginner's guide to GTE's Telenet system and a command overview, by Evil Corley
  2. ESS: Orwell's Prophecy  - Info on the new ESS offices and how they operate, by BIOC Agent 003 (Donald Burgio)
  3. 2600 Flash
    • Times Changing for Directory Assistance
    • No Hacking While Flying, Please
    • Trick of the Month
    • Death Star Cards Spell Woe
    • ADS Investigation Moved?

  4. Some Thoughts on "Garbage Picking"  - How to dig through garbage for information and some notes on cross-talk
  5. Letters  - (none given) (California)
  6. Country Codes & City Code Formats  - Long-distance country and routing codes

$2600 Magazine Volume 1, Number 3 (March 1984)

  1. The Constitution of a Hacker  - A look into the hacker's mind, by Evil Corley
  2. Alternate Long-Distance - A Guide to MCI  - An overview of MCI long-distance operations, by Evil Corley
  3. 2600 Flash
    • 718 is Coming!
    • Supercomputer Dial-Ups
    • Wiretap City
    • Students Cause Havoc in Computer
    • The Person Numbers
    • Furthermore...

  4. The First Atomic Bomb: A True Tale  - Story of Enrico Fermi and an asleep operator
  5. MILNET Hosts  - Military host addresses available on the ARPANET

$2600 Magazine Volume 1, Number 4 (April 1984)

  1. Whose Strike Was That Anyway?  - Info and analysis the 1983 AT&T strike
  2. The Trouble With Telemail  - Security holes in GTE Telemail, by Evil Corley  (Similar Article)
  3. 2600 Flash
    • Bell Credit Card Abuse Soars
    • Electronics Create Portable Prisons
    • 414's Plead Guilty
    • Teller Machine Crime Coming
    • Free Information in Trouble
    • A Word on Wiretapping

  4. A True Saga of Teleconferencing  - Story on telephone conferences and a bust, by Electric Moon
  5. MCI Access Numbers  - List of numbers to access MCI mail
  6. Old Phone Book Ads  - Collage of old telephone company cartoons on how to use the phone

$2600 Magazine Volume 1, Number 5 (May 1984)

  1. The Simple Pleasures of a Step Office  - Story of dialing (and sounds) on/to a step-by-step office, by Mr. French
  2. IBM's Audio Distribution System Sure Can Be Fun!  - Info on the IBM ADS voice message system, by Evil Corley
  3. 2600 Flash
    • A 414 is Silenced - Others Indicted
    • Long-Distance Option Timetable
    • Intelpost an Astronomical Failure
    • Victory for Wiretap Victims
    • Bank Records Aren't So Private

  4. The Woes of Having a Small-Time Rural Phone Company  - Problems with independent phone companies, by Mr. French
  5. Defense Data Network  - DDN addresses
  6. Easylink Numbers  - DDN addresses, continued / Easylink dial-ups

$2600 Magazine Volume 1, Number 6 (June 1984)

  1. ARPANET Hopping: America's Newest Pastime  - Overview of ARPANET and related commands, by Evil Corley
  2. Electronic Switching Advances  - ESS calling features and some potential drawbacks
  3. 2600 Flash
    • No More Free Info
    • 2600 Writer Indicted
    • Computer Threat Causes Chaos in Albany
    • E-COM is Going Away
    • AT&T Limits Use of Their Credit Card
    • FCC Actions

  4. The Dark and Tragic Side of the Great Break-Up  - Smaller companies may give poorer service, by Mr. French
  5. Letters  - Quasi Moto (Michael Danseglio, Orlando, FL), Awfully Curious
  6. E-COM Dial-Ups  - E-COM dial-up numbers
  7. New York Telephone "Letter of Doom"  - Letter which says your lines are under surveillance by law enforcement

$2600 Magazine Volume 1, Number 7 (July 1984)

  1. "Look Out, He's Got a Computer!"  - Newspaper stories and a defense of computer hackers, by Evil Corley
  2. MCI Mail: The Adventure Continues  - Overview of the faulty MCI Mail computer network, by Evil Corley
  3. 2600 Flash
    • Look Out For Sidney!
    • Bell to AT&T: Get Lost!
    • Five Arrested in Phone Fraud
    • An Official Crackdown on Hackers
    • Pay Telephones Deregulated
    • "You Must First Dial a One..."
    • Information News

  4. Introducing the Clear Box!  - The "clear box"for post-payphones, by Mr. French
  5. Letters  - Curious, RC
  6. TRW: Big Business is Watching You  - Overview of the TRW Information Services and how to run your own TRW credit reports

$2600 Magazine Volume 1, Number 8 (August 1984)

  1. But How Does It Work?  - A simple, but detailed, explanation of how the phone system works, by BIOC Agent 003
  2. Privacy Lost  - Book review of David Burnham's Rise of the Computer State: The Threat to Our Freedoms, Our Ethics and Our Democratic Process
  3. 2600 Flash
    • Big Brother No Longer Watching Miami
    • Computers Seized as Summer Games Begin
    • House: Hacking is Bad
    • More PC Jr's, Less Z-100's for Soviets
    • Federal Express Offers "E-Mail"
    • ITT Wiping Out Fee
    • 800 Directories Now Available
    • Ice Cream Chain Aides Selective Service

  4. Be Nice to Your Telco  - Tricks to play on your local phone company
  5. Letters  - Agent Orange, Miserable in Philadelphia, John Gregg
  6. CN/A List  - List of Customer Name/Address contact numbers
  7. The Hacker's Guide to Area Code  - A simple scheme to help "map out" exchanges in your area

$2600 Magazine Volume 1, Number 9 (September 1984)

  1. History of British Phreaking  - Guide to U.K. phone systems, by Lex Luthor (Vincent Louis Gelormine [TKOS][LOD/H], Rogue Fed, Tamarac, Florida)
  2. More on Trashing  - Proper techniques on digging through garbage, The Kid & Co. and The Shadow (David Flory, Dan Foley, Shadow 2600)
  3. 2600 Flash
    • NSA Doesn't Feel Secure
    • Another Hacker Story
    • AT&T Faces Serious Money Problem
    • Private Directories Soon to be Available

  4. A Friend in High Places  - Story of telecommunication fun and a friendly operator, by Mr. French
  5. Letters  - AZ
  6. IBM ADS Directory  - List of IBM's Audio Distribution System access numbers
  7. Telephone Company Letter  - Need to subscribe to Touch-Tone service

$2600 Magazine Volume 1, Number 10 (October 1984)

  1. Getting Caught: Hacker's View  - Story of a raided hacker and the effects on his life
  2. Vital Ingredients: Switching Centers and Operations  - Description of the different central office operations and classifications, by BIOC Agent 003
  3. 2600 Flash
    • NSA Wants Better Phones
    • Oh No, Not Again!
    • Victimized by Crime Computers
    • Sears Satellite Network
    • Loopholes Around Wiretap Laws
    • IBM is Buying ROLM!
    • 911 Suspect Hung Up

  4. Letters  - Crystal Palace, The Animal, kd, The National Center for Computer Crime Data
  5. Contacting the Gestapo  - New York Telephone security numbers
  6. Old Phone Book Ads  - Some telephone company cartoons on how to use the phone

$2600 Magazine Volume 1, Number 11 (November 1984)

  1. Exploring Caves in TRAVELNET  - Exploring the General Motor's TRAVELNET computer network / phone extender
  2. Fun With Fortress Fones  - Technical info on Western Electric single-slot coin telephones  (Coin Crafts' Manual)
  3. 2600 Flash
    • Computer Foul-ups Hurt Social Security
    • Phones in the Sky
    • Another FBI Computer File
    • Use of Wiretaps at Record Pace
    • 818 Here to Stay
    • One We Somehow Missed
    • In Addition...

  4. Letters  - Howard A. Karten (Randolph, MA), Fire Monger, The Trojan Horse
  5. Carrier Identification Codes  - Alphabetical listing of Independent Carrier (IC) and Carrier Identification Codes (CIC) / Feature Group D 3-digit PIC codes
  6. MCI Mail Targets 2600  - Letter from MCI

$2600 Magazine Volume 1, Number 12 (December 1984)

  1. A Time for Reflection  - A look back over the year, by Paul G. Estev
  2. MCI Mail and Easylink Updates  - Electronic mail horror stories and billing problems
  3. The Scariest Number in the World  - Story (fake?) about calling the president's bomb shelter, by Mr. French
  4. 2600 Flash
    • Computer Makes it Easy for Reagan
    • Penetrating the Pentagon by Phone
    • First of the "Superminis"
    • Students Bog Down Computer
    • SBS Offers Toll-Free Service
    • Electronic Jail All Screwed Up
    • Video Telephone Invention
    • Federal Telephone System Update

  5. Subscriber Comments  - Reader survey responses
  6. Electronic Mail Systems  - List and price comparisons of some electronic mail and voice mail services
  7. Dial-It Numbers  - Funny phone numbers, by Paul D. Lehrman

$2600 Magazine Volume 2, Number 1 (January 1985)

  1. Those Horrible Hackers Strike Again  - Newsweak media report of hackers
  2. Wiretapping and Divestiture: A Lineman Speaks Out  - Phreaking story from a telco lineman, by The Shadow
  3. Getting In the Back Door  - Back door access to various DEC operating systems (TOPS/VMX), by Mike Salerno
  4. Information Bureau  - $2600 phone bill, our thanks, and other notices.
  5. 2600 Flash
    • IRS Wants Access to Telco Data
    • GEISCO's New Toys
    • GTE Hit By Divestiture
    • Fascist Computer Network
    • A Challenge to Hackers
    • In Addition...

  6. Letters  - Jay Bloombecker (Los Angeles, CA), The GCI Guy (Alaska), John Sengelaub (Wantagh, New York), Sector 17, Bob Gamma, Father, Insomniac
  7. BITnet Topology  - Graphic of the BITnet network layout.

$2600 Magazine Volume 2, Number 2 (February 1985)

  1. The Theory of Blue Boxing  - How Blue Boxing works and a bit about their history, by BIOC Agent 003
  2. Trashing Alaska Style  - Central office dumpster diving story in Alaska, by The GCI Guy
  3. Surveying the COSMOS  - Beginner's guide to Bellcore's Computer System for Main Frame Operations (COSMOS), by The Fire Monger
  4. 2600 Flash
    • Phreak Roundups
    • TRW Breached By Non-Hackers
    • This Month's Mischief and Mayhem
    • AT&T Keeps "800" Data to Self

  5. Letters  - Mad as Hell, The Crazy Man, SJ, Another Hacker (Binghamton, New York), KC, DB (San Jose, CA), James (Scottsdale, AZ)
  6. 2600 Bulletin Board Online  - Info on the Private Sector BBS
  7. Acronym List  - List of common telco acronyms, by The Shadow

$2600 Magazine Volume 2, Number 3 (March 1985)

  1. Nazi BBS a Challenge to Hackers  - "Hackers" who want to restrict freedom of speech
  2. Are You a Phreak???  - Humorous review of phreaking, by Bob Gamma
  3. How to Get Into a C.O.  - Getting a tour of a telco central office, by The Kid & Co.
  4. 2600 Flash
    • The Next Step in Custom Calling
    • Industrial Espionage Seminar
    • Kenyan Payphones Prove Popular
    • This Month's Troublemakers
    • A Mechanical Hacker
    • Redemption for a Hacker
    • I.R.S. Computers Screw Up
    • Computel Does Exist

  5. Letters  - Animal, The Shadow, Kazematic, GR, BIOC Agent 003, Mikhail Gorbachev, HK, Hunter Alexander
  6. Interesting Phone Numbers  - Fun phone numbers
  7. How to Use the Dial Telephone  - 'burr-burr-burr' and 'buzz-buzz-buzz'
  8. CN/A Numbers  - Customer Name & Address phone number list
  9. The Cipher Disk  - Cipher wheel from the NSA

$2600 Magazine Volume 2, Number 4 (April 1985)

  1. What a White Box Can Do  - How to build and use a portable DTMF tone generator
  2. A Phone Phreak Scores  - Social engineering and phreaking story
  3. Hacking Packard  - Hacking HP-2000s, by BIOC Agent 003
  4. 2600 Flash
    • At the Last Stroke...
    • Good Apples for the Soviets
    • Hackers Go Free
    • Robot Kills Man
    • 'Santa Fraud'
    • Overseas Pirates
    • Real Life WarGames?
    • Silver Pages
    • Other News

  5. Letters  - Puzzled, Chuck Linder, Informed as Hell, (none given), (none given)
  6. Hosts by Location  - ARPANET MILNET host locations

$2600 Magazine Volume 2, Number 5 (May 1985)

  1. People Express to be Hacked to Pieces  - Hacking the People Express Touch-Tone reservation system, by Paul G. Estev
  2. How to Run a Successful Teleconference  - Complete guide to ALLIANCE teleconferencing, by The Shadow
  3. 2600 Flash
    • 414 Bust
    • Police Hacker Cleared
    • Dial-a-Directory
    • Reagan Hangs Upon Kids
    • MCI Goes to U.K.
    • Yellow Scam
    • "Crackers" Cracked
    • Carrier Choosing Time
    • Mystery Transistor

  4. ALLIANCE Teleconferencing  - Diagram of the steps needed to setup an ALLIANCE teleconference
  5. Letters  - (none given), The Crazy Man
  6. Inmate Payphone Ad

$2600 Magazine Volume 2, Number 6 (June 1985)

  1. A Guide to the Israeli Phone System  - The phone system in Israel
  2. Sherwood Forest Shut Down by Secret Service  - Sherwood Forest II & III BBSes raided for posting credit card numbers
  3. Some Words on Hacker Morality  - Don't sell other people's BBS files
  4. Review: Out of the Inner Circle: A Hacker's Guide to Computer Security  - Book review of Bill Landreth's Out of the Inner Circle: A Hacker's Guide to Computer Security
  5. 2600 Flash
    • Bell Didn't Invent Phone?
    • Porno Phone Service Busted
    • IRS Drives Telcos to Drink
    • Jersey Wins Wiretap Race Again
    • AT&T Computer Caught Stealing
    • Say Goodbye to Meter Readers
    • Thai Phone Books a Hot Issue
    • New Tracking Device for Cars
    • Problems for New Payphones
    • TINA Message Service
    • AT&T Contractual Obligations
    • "Call Me" Card

  6. Letters  - (none given), Rusty Diode, (none given), The Silver Sabre
  7. 800 Prefix List  - List of 800-NXXs by state, by Ax Murderer
  8. Systematically Speaking  - Goodbye to meter readers, Thai phone book, tracking devices, TINA "Call Me" card.
  9. Sherwood Forest: Intro to Hacking  - Beginner guide to computer hacking, by The Knights of Shadow

$2600 Magazine Volume 2, Number 7 (July 1985)

  1. Interesting Things to Do on a DEC-20  - Commands and hacking info for a DEC-20, by The Knights of Shadow
  2. Banking From Your Terminal - A Look at PRONTO  - A look at electronic banking and Chemical Bank's PRONTO banking system, by Orson Buggy
  3. 2600 Flash
    • $2 Billion Error
    • ITT Crackdown
    • GTE Sprint Cheats Customer
    • Listening In on Cellular Phones
    • More Phone Fraud
    • Computers Monitor Truckers
    • Missing Children's Faces Displayed

  4. Letters  - (none given), (none given) (Birmingham, Alabama), (none given) (Gulfport, MO), (none given)
  5. MILNET TAC Dial-Ups  - MILNET dial-ups
  6. Systematically Speaking  - MCI goes optical, 100% ESS, GTE bigger than AT&T

$2600 Magazine Volume 2, Number 8 (August 1985)

  1. Seized!  $2600's computer bulletin board "Private Sector" is implicated in raid on Jersey hackers, by Paul G. Estev  (New York Times Story)
  2. The Threat to Us All  - Editorial on BBS raids and seizures, by Evil Corley
  3. 2600 Flash
  4. Moving Satellites... What Was Really Going On?  - Point-by-point correction of the New Jersey prosecutors fallacious charges and debunking the "hackers moving satellites" myths, by Paul G. Estev
  5. Why Computers Get Snatched  - Why BBSes get raided
  6. Some Important Questions to Ask  - Who is responsible for BBSes and provocative questions about these events
  7. How Can Sysops Protect Themselves?  - How to protect your BBS from raids, by Evil Corley

$2600 Magazine Volume 2, Number 9 (September 1985)

  1. A Guide to VMS  - Beginner's guide to DEC's VAX/VMS systems, by Lex Luthor
  2. The Infinity Transmitter - An Old Bug That Had Its Time  - How the infinity transmitter phone tap works, by Howard
  3. Reaching Out on Your Own  - Using a "Blue Box" to simulate Busy Line Verification (BLV) conditions, by Forest Ranger (John Thomas)
  4. Pursuit for People  - Info on Telenet's PC Pursuit computer-to-computer link-up service, by Paul G. Estev
  5. 2600 Flash
    • Phone-in Registration for College
    • Trouble With 800 "Word Numbers"
    • War Game Addict
    • Hacker Extortionist Caught
    • Pitcairn Island Now On AT&T Net
    • Private Sector Update
    • Dick Tracy Toys Are Closing In
    • Directory Assistance By Computer
    • Pest Control
    • Bell Propaganda Films
    • Europe Standardizing Telecoms

  6. Letters  - D.J., SEVOX, Talbot, (none given), W.U. Friend
  7. Telenet Directory  - Telenet address scan and banners, by Lex Luthor
  8. Systematically Speaking  - Dick Tracy toys, computer directory assistance, Bell propaganda films, Europe standardizing telcoms.

$2600 Magazine Volume 2, Number 10 (October 1985)

  1. And They Call US Crooks?  - Getting ripped off consulting telcos and why he can't sell his expertise, by Silent Switchman
  2. An Interesting Diversion  - How call diverters work and are abused, by Lord Phreaker
  3. More Info on VMS  - Second part to the beginner's guide to DEC's VAX/VMS systems, by Lex Luthor
  4. 2600 Flash
    • Computer Elections Examined
    • Two Inch Thick Bill
    • Navy Calls Dial-a-Porn
    • Navy Phone Phreaks Nabbed
    • Phone Booth Captures Man
    • Telco Rats On Government
    • Hackers Have Big Business Scared
    • Fiber-Optic Network For Du Pont
    • Campaign Contributions On-Line
    • AT&T Info Charges Upheld
    • More Use of Phone Computers
    • More Divestiture Woes

  5. Letters  - L.L., The Long Distance Voyager and The Knight in White Satin, Person, Lord Phreaker
  6. Blue Box Plans  - Schematic for a Blue Box, by Ford Prefect (Steve Richardson)
  7. The New AT&T Hostagephone System  - Ad for a hostage negotiation phone
  8. Systematically Speaking  - Hackers scare business, DuPont bypasses telco, computer campaign info, phone computer's divestiture woes

$2600 Magazine Volume 2, Number 11 (November 1985)

  1. RSTS: A Trick or Two  - Hacking info for the DEC's RSTS operating system, by The Marauder (Todd Lawrence, Email #2)
  2. Here's the Secret!  - Non-supervised (no billing) loop-around test lines on a GTE GTD5, by Silent Switchman
  3. The History of ESS  - The history of the Western Electric ESS, by Lex Luthor
  4. 2600 Flash
    • Columnist Attacks AT&T
    • No Dial-it Calls for Feds
    • Dial-it Sex Numbers Argued
    • Big Deal for Little Town
    • Springsteen Mania
    • Avoid Phones in Storms!
    • Rural Customers Denied Access
    • Police Dept. Wants Cellular Phones
    • Toll-free From Where?
    • Pacific Cable Planned
    • Free Kiddie Dial-It Calls
    • AT&T to Read E-Mail

  5. Equal Access May Not Be "Equal" to Modems  - Billing problems with autodialers, by The Shadow
  6. Letters  - HAL-9000/Beast 666, Lord Phreaker, a.e., Worried Phreak
  7. Test Numbers  - List of telco plant test numbers, by The Shadow (Shadow 2600 - Dave Flory - died 1989)
  8. The Early Phreak Days  - Story of phreaking in the 1960s, by Jim Wood
  9. Systematically Speaking  - Avoid phones in storms, rural unequal access, police cellular phones, toll-free from where?, AT&T to read email

$2600 Magazine Volume 2, Number 12 (December 1985)

  1. Our Wishes For '86 And Beyond  - Editorial on telco improvements, by Evil Corley
  2. Fun With COSMOS  - Additional info on Bellcore's COSMOS, by Lex Luthor
  3. 2600 Flash
    • Telco Service Spawns Racist Banter
    • French Phones Renumbered
    • BB Watching Without Regulation
    • Fawcett Phone Bill Too Big
    • Inmates Handle Information Calls
    • No More Redialing?
    • Cityphone Has The Answer
    • Super Crisis Alert System
    • Super Payphone
    • Phones at High and Low Speeds
    • AT&T Offers E-Mail
    • Dreams of GEnie
    • German Phone System Stagnant

  4. Survey Results  - Results from the $2600 reader survey  (Page 2)
  5. More Than 1500 BBS Numbers  - Big list of BBS numbers
  6. Systematically Speaking  - AT&T email, German phones, super payphone

$2600 Magazine - Volume 3, Number 1 (January 1986)

  1. Private Sector Returning  - Return of $2600's Private Sector BBS, by Evil Corley
  2. Divestiture: What Happened?  - Info on some confusing aspects of the AT&T breakup, by Evil Corley
  3. 2600 Flash
    • AT&T Does It Again
    • Five Aliens Hung Up
    • Technology Nabs Hooky Players
    • Home Computer Attacks Falwell
    • Another Astronomical Phone Bill
    • Dial-A-Porn Update
    • Phone Booth Wins Again
    • New Payphones Confuse Callers
    • Security Software
    • Your Own Private Centrex
    • New VAX Announced
    • Cray Maneuvers
    • Overcharge Hunters Needed
    • Phone Service via Radio Shack

  4. Letters  - Ford Prefect, Arab149, The Creature, The Grub (Canada)
  5. Blue Box Programs  - TI-99, Commie 64, Atari code for generating MF tones, by Ford Prefect (Steve Richardson)
  6. Systematically Speaking  - Confusing payphones, code abuse software, Centrex features in your house, VAX8650, overcharge hunters

$2600 Magazine - Volume 3, Number 2 (February 1986)

  1. VMS - The Series Continues  - Additional info on hacking DEC's VAX/VMS systems, by Lex Luthor
  2. It Could Happen To You!  - Story of phone phreaks harassing other phreaks
  3. Dial Back Security  - Info on how "dial back" security works and some ways to defeat it
  4. 2600 Flash
    • Teenagers "Abuse" Party Line
    • A Unique Obscene Caller
    • The Scoop on Pen Registers
    • Reporters Steal Swiss Phones
    • Payphone Causes Panic
    • Sprint Unites with US Telecom
    • Write Protect Tabs Wrong
    • Bell Atlantic & MCI Collaborate
    • Cellular Phones in England
    • Infrared Beeper Will Find You
    • Electronic Tax Returns Are Here
    • Acoustic Trauma

  5. Letters  - Artful Dodger, Field Support, Fellow in Utah, John J. Williams, Mojave Dessert
  6. Interesting Phone Numbers  - Interesting phone number list
  7. Systematically Speaking  - Spring and US Tel merge, write protect tabs wrong, Bell Atlantic chooses MCI, cellular phones in England, infrared beeper, electronic tax returns, acoustic trauma

$2600 Magazine - Volume 3, Number 3 (March 1986)

  1. An Overview of AUTOVON and Silver Boxes  - Info on the Department of Defense's AUTOVON phone system and how it uses those extended DTMF tones
  2. An American Express Phone Story  - Story about hacking the toll-free charge card authorization number, by Chester Holmes
  3. Final Words on VMS  - Security info and tips on DEC's VAX/VMS systems, by Lex Luthor
  4. 2600 Flash
    • Hacker Zaps Computer Marquee
    • Soviets Denied Computer Access
    • Who Called The Shuttle?
    • New Ways Of Stealing Data
    • Computer Password Kept Secret
    • Satellite Jammers Jammed
    • TASS News Service
    • Soviet Computer Update
    • Dial The Yellow Pages
    • Northern To Destroy COs
    • There Are More Phones Than Ever

  5. Letters  - Corporation, Dissenting Opinion, DIAL, Various People, Scan Man, A Subscriber in Pa.
  6. This Month at 2600  - Private Sector's return, Computel and Compuserve, Telepub '86, a postal miracle
  7. Systematically Speaking  - Jamming satellites, TASS news service, Soviet computer update, dialing the Yellow Pages, Northern Telecom to destroy COs, more phones than ever

$2600 Magazine - Volume 3, Number 4 (April 1986)

  1. RSTS for Beginners  - Beginner's guide to RSTS/E on DEC PDPs, by The Marauder
  2. Mobile Phones - Theory & Construction  - Info on Improved Mobile Telephone Service (IMTS) and building your own dialer, by The Researcher
  3. 2600 Flash
    • British Phonebooth Wedding
    • Man Worries About Sprint Bill
    • Bad Tenant Databases
    • Car Breathalyzers
    • Phone Phreak Fined
    • Marcos Phones For Free
    • 617 Will Be Divided
    • Congress Chooses AT&T
    • Baby Bells Don't Pay AT& Bills
    • Equal Access 800 Drawbacks
    • Encryption Provides Signature
    • Directory Assistance Failure
    • Dial "00" For Operator

  4. Letters  - A Reader, Ben Harroll, (none given), Heyzeus Arguillis, NYNEX Phreak (Charles Andrew Hope)
  5. A Story of Eavesdropping  - Listening to conversations during World War 2
  6. This Month at 2600  - Transcripts of the Private Sector raid, more on Computel
  7. Systematically Speaking  - 617 to be divided, Congress chooses AT&T, Baby Bells don't pay AT&T bills, equal access 800s, data encryption, DA failure, AT&T loses its zero

$2600 Magazine - Volume 3, Number 5 (May 1986)

  1. Exploits in Operator Hell  - Harassing the operators in Alaska, by The Alaskan Phreak (TAP)
  2. The Computel Scoop  - Info on the magazine Computel which was believed to be related to TEL
  3. 2600 Flash
    • Bellcore Publications Go Public
    • US and France Link Phones
    • Computer Grammar
    • Shower Phone?
    • Cellular Modem
    • High Tech Parking Meters
    • Congressional Computer
    • Wrestlemania Pins Bell
    • Sting Boards on the Rise
    • American Network Fears Hackers
    • Free Pay-Phones Plague New Jersey
    • Bogota, Columbia Gets Extra Digit
    • Patients May Get To Keep Phones
    • Beware of Hacker Terrorists

  4. Letters  - MM (Dublin, Ireland), MS, The Doctor, J in Boston, WP, The Hooded Claw, Unlisted Number
  5. AUTOVON Translations  - Translations for AUTOVON numbers, by The Creature
  6. Systematically Speaking  - Wrestlemania pins Bell, sting boards on the rise, American Network fears hackers, free payphones plague New Jersey, disposable phones, hacker terrorists
  7. Boxing on ITT / SBS Skyline  - Boxing tips and code info

$2600 Magazine - Volume 3, Number 6 (June 1986)

  1. Computer Crime Review  - Review of a report from The National Center for Computer Crime Data
  2. How to Hack a Pick  - Beginner's guide to hacking the Pick operating system
  3. Review: The Computer Underground  - Book review of M. Harry's The Computer Underground, by John Drake (Mark Bennett)
  4. 2600 Flash
    • New York's Computer Law
    • $6,829 Phone Bill
    • Big Computer Crime Pays
    • Public Phone Secrecy
    • Capitol Hill Hacker
    • Citibank Money Games
    • Hands Across Telenet
    • Kiev Calling Clogged
    • NYNEX Bumps Southwestern Bell
    • Stock Market Crash
    • "Ed Quinn Cell Site"
    • Let's Move To France!

  5. Letters  - Twilight Zone The Phreaker (London, England), JN (Illinois), Lord Peter Wimsey, Dr. William Wainwright, John Smith Hacker, Seagull, PV, (none given), Right Track
  6. Special AT&T Services  - Various phone numbers
  7. Resources Guide  - Various groups and publications on computer security
  8. Systematically Speaking  - Hands across Telenet, calling Kiev, NYNEX bumps off Southwestern Bell, stock market crash, cell site names, videophones

$2600 Magazine - Volume 3, Number 7 (July 1986)

  1. Violating a VAX  - Trojan horses, obtaining passwords, and other VAX/VMS hacking tips, by Baalzebub
  2. The Free Phones of Philly  - Skyline providing free long-distance from payphones, by Chester Holmes
  3. 2600 Flash
    • Town on Hold During Strike
    • Prisoners Break Law
    • Hacker Degrees?
    • New Jersey Tops Taps
    • Ex-Fed Tapped
    • SS Numbers Returned To Citizens
    • Computers Strike Again!
    • Federal Employees "Tracked"
    • AT&T Selling Payphones!
    • Automated Operators Coming
    • Cellular Dial-By-Voice
    • New British Phone Service
    • No Data Protection for Hong Kong
    • 74,000 Calls to Fraud Line
    • Federal Phone Failure
    • Indiana Telco Threatens AT&T

  4. Letters  - Shadow 2600 and Kid & Co., Howard, kl, Untitled, SF
  5. Country Codes  - Country code list from Telecom Digest
  6. Systematically Speaking  - AT&T selling payphones, automated operators, cellular dial-by-voice, new British phone service, no data protection for Hong Kong, Congressional fraud hotline, federal phone failures, Indiana telco threatens AT&T

$2600 Magazine - Volume 3, Number 8 (August 1986)

  1. Knowing UNIX  - UNIX hacking tips, sending email, and some simple C code, by The Kid & Co.
  2. A Trip To England  - Phreaking story from England, by John Drake
  3. 2600 Flash
    • Phone Fraud in Governor's House
    • BB Watching VDT Operators
    • LD Companies Strike Back
    • Leave Our Poles Alone!
    • Phone Booths Mauled Then Stolen
    • The Ghost in the Machine
    • USSR Computer Hungry
    • ATM's in China!
    • Cash Machines Are Popular
    • TV Blue Boxes
    • New Chip Helps Sprint
    • Government Phone Fate?
    • Rural Radio Phones
    • "Debugging" Phones

  4. Letters  - The Stopper, Rees Morrison (Scarsdale, New York), j, Stake Out
  5. Carrier Access Codes  - List of 10xxx PIC codes  (Updated List)
  6. NPA Exchange Count  - List of area codes and the number of exchanges in each
  7. Systematically Speaking  - USSR computers, ATMs in China, NYCE, TV Blue Boxes, government phones, rural phone radios

$2600 Magazine - Volume 3, Number 9 (September 1986)

  1. Some Facts on Supervision  - Information on phone call answer supervision signals, by The Kid & Co.
  2. RCI & DMS-100 Bugs  - Long-distance extender bug
  3. Another Stinger is Stung  - Another sting BBS operated by John Maxfield and Mike Wendland of WDIV TV.
  4. 2600 Flash
    • NSA Drops DES
    • Hackers On Shortwave
    • BB Traffic Cop
    • Crosstalk Saves Old Lady
    • Indian Phones Under Siege
    • "Signature" On Video Transmitters
    • FBI Shopping List
    • Poor Connection Starts Bomb Scare
    • GTE Sprint Overbills
    • FCC Gives Away "Resource"
    • AT&T Best For Hackers
    • Portable VAXes!!!
    • Computer Clothing
    • Message On the Move
    • Call Rejection In Natchez

  5. Letters  - Lord Phreaker, TCCFBT, Joshua Falkon, Friends in faraway places, Curious, Captain Zorg, Hal-9000/Beast 666
  6. Interesting Numbers of Winnipeg  - Fun phone numbers in Canada  (Page 2)
  7. Systematically Speaking  - GTE Sprint overbills, AT&T ranks #1, portable VAXes, call rejection

$2600 Magazine - Volume 3, Number 10 (October 1986)

  1. Death of a Payphone  - Payphone secrets and how to mess up a payphone, by MAD!
  2. Trashing: America's Source for Information  - How to dig through phone company garbage for information, by The Dragyn  (Steven Nygard, Austin, Texas)
  3. 2600 Flash
    • FBI Investigates Coffee Machine
    • CIS Copyrights Public Software
    • Navy Software Available
    • HBO Encryption Broken
    • Pennant Ties Up Phones
    • Security Can Kill Creativity
    • Indiana "Fones" Are Gone
    • Electronic Tax Returns
    • Software Makers Crash BBS
    • Poor Service An Understatement
    • Rural Ultraphones
    • Local Toll-Free Numbers
    • ESS Goes To Taiwan
    • NSA Wants a New Chip

  4. Letters  - Psycho (California), Wolfgang Amadeus Mozart, Crazy Eight, Long-Distance Voyager, Wize owl (Hilo, HI), Mr. Tracer, Het Kap, Bernie S.
  5. Interesting London Numbers  - Fun phone numbers
  6. Systematically Speaking  - Electronic tax returns, software makers crash BBS, ICN, Ultraphone, ESS in Taiwan, NSA wants new chip
  7. Ancient Bell Labs Advertisement  - Bell System Ad for Touch-Tone signaling

$2600 Magazine - Volume 3, Number 11 (November 1986)

  1. ICN - More Than a Bargain  - Info on Independent Communication Network phone service, by John Freeman and Evil Corley
  2. Mastering the Networks  - Info on some of the larger computer networks (ARPANET, BITnet, etc.) and their email syntax, by John Anderson
  3. 2600 Flash
    • Voice of Reagan Tortures Patients
    • FBI Actions Anger Parents
    • "Q" and "Z" Controversy Rages
    • More Banks Link Arms
    • Sprint - Too Many Customers
    • More Magic Buttons
    • New Payphone Service for Michigan
    • Nickname Listings In Small Town
    • Computer College

  4. Letters  - Amadeus, Frustrated in Miami, Reader on the Pacific, Private Sector Subscriber, Any Mouse, NYNEX Phreak
  5. British BBS Numbers  - BBS number list for the U.K.
  6. Wrath of God Strikes 2600  - They really are the dumbest people on the planet
  7. Systematically Speaking  - Bank link arms, Sprint has too many customers, new payphones, nickname listing, computer college

$2600 Magazine - Volume 3, Number 12 (December 1986)

  1. Cellular Telephones - How They Work  - How Improved Mobile Telephone Service (IMTS) cellular phones work, by Bruce Alston
  2. Things We're Not Supposed To Know About  - Info on the Captain Midnight (John R. MacDougall) HBO hack, by Sir William
  3. 2600 Flash
    • How Not to be Rejected
    • Phreaks Tie Up Lines
    • North Carolina #1 in Hacking
    • International Hacking
    • Computers Threaten Privacy
    • Telco Says "Pay for Tones"
    • Loophole in Wiretap Law
    • Free Directories For Bigwigs
    • PC Pictures
    • Fingerprint Identification System
    • Buy My Wires
    • Navigate With A CD
    • IBM Braille Compatible
    • Who Wants To Be Swept?

  4. Letters  - John Freeman (Ann Arbor, MI), BA, TOTE (Rio Piedras, Puerto Rico), Bernie S., Michael Marr (Dublin, Ireland), (none given)
  5. Net Mail Sites  - Networks carrying electronic mail
  6. Systematically Speaking  - Free directories, fingerprint ID system, navigating with CDs, sweeping for bugs


  $2600 Magazine - Volume 4, Number 1 (January 1987)

  1. TAP: The Legend is Dead  - Info on the ending of the TAP newsletter, by The Cheshire Catalyst  (Robert Osband, Titusville, Florida, N4SCY, Twitter, Facebook)
  2. Stumbling Into Control on a VMS  - VMS hacking tutorial, by The Mole
  3. Telecom Informer  - British Telecom info, by Dan Foley (David Flory, The Shadow, Shadow 2600)
  4. Illegal Megahertz  - Analog cellular frequencies
  5. Letters
    • Beepers  - da
    • GTE Telcos  - Arthur Dent
    • Preacher Hams  - Phil
    • Student Restrictions  - An "English Soccer Fan"
    • An Acronym Maker  - The Gladiator
    • More TAP Woes  - Arab149
    • 800 Directories  - Cocopelli
    • Searching for ANI  - Also frustrated in PA

  6. Phone News  - Phone news
  7. 2600 Marketplace

  $2600 Magazine - Volume 4, Number 2 (February 1987)

  1. Hugo Cornwall Interview  - Interview with Peter Sommer, (a.k.a. Hugo Cornwall), Britain's most famous hacker/author, by John Drake
  2. COSMOS Guide  - Overview of Bellcore's Computer System for Main Frame Operations (COSMOS) frame/OE management system, by Sir William  (Page 2, Page 3, Page 4)
  3. Telecom Informer  - Phreaking news, by Dan Foley
  4. Nasty Business  - MCI and Sprint letters
  5. Letters
    • Some Suggestions  - The Perpetrator
    • Some Numbers  - Silver Bandit
    • On Cellular Phones  - The New Age Phreaker
    • ANI Trouble  - (none given)

  6. Book Review: The Hacker's Handbook  - Book review of Hugo Cornwall's The Hacker's Handbook, by Roland Dutton
  7. New Developments  - Touch-Tone (DTMF) service charges
  8. Book Review: Automatic Teller Machines III  - Book review of Consumertronics' Automatic Teller Machines III, by Lord Phreaker
  9. 2600 Marketplace

  $2600 Magazine - Volume 4, Number 3 (March 1987)

  1. The Ballad of Captain Crunch  - Folksong about John Draper, by Mike Agranoff  (Boonton, NJ)
  2. A Guide to Equal Access  - Overview of the AT&T breakup and PIC codes, by The Hobbit (Al Walker)  (Getting the Most Out of Equal Access)
  3. Telecom Informer  - Phreaking news, by Dan Foley
  4. The Wonderful World of COSMOS  - Detailed information on using Bellcore's COSMOS, by Bill from RNOC
  5. Letters
    • An Envelope Please  - Bob Gamma
    • Comments...  - AH
    • And More Comments...  - Bernie S.
    • An Experience to Share  - The Sultan
    • Words of Agreement  - DE
    • Words of Caution  - Ben Harroll (San Diego, CA)
    • A Response  - John J. Williams
    • More on ICN  - Jim A. (Montana)

  6. 2600 Marketplace

  $2600 Magazine - Volume 4, Number 4 (April 1987)

  1. Computel Put to Sleep  - Computel hacking magazine out of business
  2. Hacking PC Pursuit  - Using PC Pursuit out-dials on Telenet, by The Cheshire Catalyst
  3. Telecom Informer  - Phreaking news, by Dan Foley
  4. CN/A List  - Customer Name & Address number list
  5. Letters
    • Communication  - (none given)
    • More ANI's  - JA (Florida)
    • Comments  - Kirk (California)
    • French Loophole  - The Cote D'Azur
    • Stuck on Busy  - F.B.
    • Praise  - (none given)
    • Criticism  - RDM (Texas)
    • Advice  - A Reader
    • A Warning  - (none given) Newark, NJ
    • Coin Test  - Box Tester
    • More Resources  - Het Kapittel
    • In Reply  - MAC???

  6. Goings On  - Various news bits
  7. 2600 Marketplace

  $2600 Magazine - Volume 4, Number 5 (May 1987)

  1. More VAX Tricks  - VAX/VMS hacking tips and code for password grabber and generator, by Mainstream America
  2. The Meaning of CLASS  - Info on Custom Local Area Signaling Service (CLASS), by The Videosmith  (Ronnen Miller, Philadelphia, PA)
  3. Telecom Informer  - AT&T's E-Card and the 959 test exchange, by John Freeman
  4. Phoning From Europe  - European phone systems, by The Lineman
  5. Telenet Guide  - Telenet address directory, The Legion of Hackers
  6. Letters
    • New Toys  - Bernie S.
    • Explain Yourselves  - Izzy Hear
    • Needs Blue Box Program  - Edward Dean Jones
    • Access Still Unequal  - IHR
    • Reaching Out  - EH
    • More on VAX  - The Carolina Beachcomber

  7. FAX: A New Hobby  - FAX machine info and receiving RF faxes, by Bernie S. (Edward Elliot Cummings, DOB: 02-26-1962, N3KOW)
  8. 2600 Marketplace
  9. Review: Duophone CPA-1000  - Inexpensive telephone "pen register" from Radio Shack, by Evil Corley

  $2600 Magazine - Volume 4, Number 6 (June 1987)

  1. Allnet: A Horror Story  - Allnet scam, by Mike Yuhas
  2. Paging for Free  - Free voice paging, by Bernie S.
  3. TSPS Guide  - Hackers guide to the AT&T Traffic Service Position System (TSPS) console, by The Marauder
  4. Telecom Informer  - Phreaking news, by Dan Foley
  5. Letters
    • A Mystery  - Silicon Rat and the Mice
    • In Reply  - John J. Williams
    • Military Madness  - MDLP
    • More Publications  - Tabula Rasa
    • Additional Facts  - The Librarian
    • Autovon Info  - Rusty Diode
    • Visions of Doom  - Hex Converter
    • Words of Praise  - BBQ

  6. 2600 Marketplace

  $2600 Magazine - Volume 4, Number 7 (July 1987)

  1. Cellular Phone Fraud and Where It's Headed  - Overview of cellular phone cloning, by Bernie S.
  2. How Phone Phreaks Are Caught  - How code abusers are caught, by No Severence
  3. Telecom Informer  - Phone news, by Evil Corley
  4. Letters
    • On Disclaimers  - MAC???
    • Texas Toll Fraud  - The Hooded Claw
    • Suggestions, Comments  - The RAM
    • A Horrible Problem  - JD

  5. 2600 Exposes New York Telephone  - Unfair telephone company Touch-Tone charges
  6. 2600 Marketplace
  7. Saudi Arabian BBSes  - List of public BBSes in Saudi Arabia, by Veteran Cosmic Rocker

  $2600 Magazine - Volume 4, Number 8 (August 1987)

  1. The Summer Games of '87  - Editorial
  2. TRW Credentials  - TRW credit history and their lack of security, by Rex Valve
  3. Phone Numbers  - Interesting phone number, by NYNEX phreak (Charles Hope)
  4. Telecom Informer  - Phone news, by Evil Corley
  5. FBI Revealed  - Review of Glen L. Roberts' The FBI Project Newsletter and The FBI and Your BBS newsletters, by Evil Corley
  6. AT&T Submarine Map  - How to social engineer submarine (underwater, intercontinental) cable system charts, by Bernie S.
  7. Capturing Passwords  - DEC Control Language (DCL) script for capturing VAX/VMS passwords, by Texas Toad
  8. Letters
    • CNA/CPA Questions  - Samuel Rubin
    • ITT Switching  - The Primal Wombat
    • Hotline Numbers  - Frank B.
    • Monitoring Cellular  - Stingray
    • An Experience  - The Sorcerer
    • Phone Literacy  - Audio O'Sirkit

  9. A Hacker Survey  - Reader survey of hackers, by Evil Corley
  10. 2600 Marketplace

  $2600 Magazine - Volume 4, Number 9 (September 1987)

  1. Worldnet: Getting Closer Every Day  - Overview of early ARPAnet, BITNET, and UUCP networks, by Hank@Taunivm.Bitnet (Hank Nussbacher)
  2. Operating With Difficulty  - New York Telephone operator troubles, by Wintermute (Peter Zatloukal)
  3. Telecom Informer  - Phone news, by Al Fresco
  4. English Dial-It Service  - Recordings and announcement list for England, by John Drake
  5. Letters
    • Notes and Replies  - Rainer Mueller
    • An Explanation  - The Sorcerer
    • Newsstand Update  - Curious
    • Misinformation? Us?  - Worried and Upset in Arizona

  6. 2600 Marketplace
  7. Review: CO Magazine  - Review of a good telecom monthly journal, by Dan Murphy

  $2600 Magazine - Volume 4, Number 10 (October 1987)

  1. New York's IMAS  - Integrated Mass Announcement System overview, by Mac+
  2. Telco's Response  - Telco response to Touch-Tone fee, by Bruce Reisman
  3. Telecom Informer  - Phone news, by Evil Corley
  4. International NUA's  - Tymenet and Telenet Network User Addresses (NUA), by The Greek
  5. South African BBSes  - South Africa BBS list, by The Greek
  6. Letters
    • Verification and Tracing  - Joshua Falkon
    • Missing Blue Box Chip  - KM
    • BBS Numbers  - HAL 9000/Beast 666
    • Getting Started  - JS
    • Private Sector Style  - (none given)
    • More on Disclaimers  - John J. Williams
    • And More  - N.E. Mouse
    • British Payphones  - John Drake

  7. Those Silly Codes  - Bellcore Common Language Location Identification (CLLI) code information
  8. 2600 Marketplace
  9. Contest Results

  $2600 Magazine - Volume 4, Number 11 (November 1987)

  1. 2600 Bulletin Boards  - BBS ad
  2. Hacking IBM's VM/CMS System - Part 1  - IBM 43XX-series and 30XX-series VM/CMS info, by Lex Luthor
  3. Social Security Prefixes  - Prefix to state mappings, by The Disk Jockey
  4. Listening In: Catch Me If You Can!  - Monitoring satellite phone calls, by The LNA Master
  5. Review: Government Radio Frequencies  - Book review of Tom Kneitel's The "Top Secret" Registry of U.S. Government Radio Frequencies, by Mr. Icom
  6. Telecom Informer  - Phone news, by Staff
  7. Letters
    • Double Beepers  - Bob from Los Angeles
    • Why No Boxing?  - Franken Gibe (Texas)
    • Apple Hacking  - The Rifter
    • More How-To Articles  - Tabula Rasa
    • A New Source  - E.H.
    • Pen Registers  - Samuel Rubin
    • Unique Projects  - John Nix
    • TAP is Dead!  - D.L. (New York)

  8. 2600 Marketplace

  $2600 Magazine - Volume 4, Number 12 (December 1987)

  1. Important News  - Editorial
  2. Hacking IBM's VM/CMS System - Part 2  - IBM 43XX-series and 30XX-series VM/CMS info, by Lex Luthor
  3. Telecom Informer  - Phone news
  4. All About BLV  - AT&T TSPS Busy Line Verification (BLV) information, by Phantom Phreaker
  5. Social Interaction With Phones  - Stories about phones in our culture, by Dave Taylor
  6. Letters
    • Switch-Hook Dialing  - JS (Dallas, TX)
    • Pen Registers  - Norman Bates
    • Evil Happenings  - Pala Jones
    • Canadian Questions  - PG (Toronto, Canada)
    • The Truth Revealed  - The Cheshire Catalyst
    • Ingenious Solution  - Sgt. Pepper of Texas
    • How Do Inmates Do It?  - The Hooded Claw
    • BBS Thoughts  - P.A.Z.
    • The Missing Chip  - (none given)
    • Yet Another Telco Ripoff  - Mary M. (Cornland, IA)

  7. Roman Hacking  - Overseas tales of hacking and phreaking, by Hal from Rome
  8. 2600 Marketplace
  9. Long-Distance Horror Tales  - MCI tale of trying to set up a long-distance carrier

  $2600 Magazine - Volume 5, Number 1 (Spring 1988)

  1. Monitoring Phone Calls With a TVRO  - Listen in on international telephone calls using a satellite receiver
  2. More on VM/CMS  - VM/CMS article corrections and additional info, by VM Guru
  3. Weathertrak Codes  - Codes for a telephone weather system
  4. An Interpretation of Computer Hacking  - An interpretation of computer hacking by a complete fraud, by Captain Zap (Ian A. Murphy, DOB: 01-25-1957)
  5. Private Sector Scam Revisited  - Evidence from the Private Sector raid
  6. Letters
    • More Secrets  - Doom
    • Encouraging Words  - A Friend in Texas
    • Still More Secrets  - (none given)
    • A Very Special Number  - (none given)
    • Tales of Hackers  - The Hooded Claw
    • Advice Wanted  - (none given)
    • Of Phones and Politics  - Skinhead Steve and The Boy
    • More on the 8038  - (none given)
    • REMOB Hunting  - MH (Uniondale, New York)
    • The Global Village  - The NATO Association

  7. A ROLM Catastrophe  - ROLM telephone system troubles
  8. Happenings  - Various news bits
  9. 2600 Marketplace
  10. AT&T/BOC Routing Codes  - Routing codes used during Blue Boxing

  $2600 Magazine - Volume 5, Number 2 (Summer 1988)

  1. Allnet's Legal Problems  - Allnet lawsuit
  2. A Solution To Viruses  - Protection from computer viruses, by Ross M. Greenberg
  3. How to Write a Virus  - How to write a computer virus, by The Plague
  4. Building a Red Box  - Schematic for a actual working Red Box, by R.J. "Bob" Dobbs  (Vance Morgan)
  5. A Reader's Reply To Captain Zap  - Reader replies to Captain Zap's drivel, by Rancid Grapefruit  (Bruce Fancher, DOB: 04-13-1971)
  6. Letters
    • Reactions to Zap  - Murdering Thug and The Boy!, The Shadow, Yevgeny Zamyatin
    • Gripes and Feedback  - Natuerlich!
    • A Useful Trick  - (none given)
    • "Deluxe" Call Waiting  - GH
    • New Falwell Numbers  - A True Believer
    • What is Sprint Up To?  - Cray-Z Phreaker

  7. 2600 Marketplace
  8. Fun Phone Numbers  - List of various interesting phone numbers, by Thunder Seven  (Page 2, Page 3)

  $2600 Magazine - Volume 5, Number 3 (Fall 1988)

  1. Outside Loop Info  - Telephone outside loop distribution plant overview, by Phucked Agent 04
  2. Cellular Phones  - Update on cellular phones, by The Glitch
  3. Who Was Strowger?  - Info on Almon Strowger, by Almon Strowger Jr. (No, not the real one)
  4. Communications Update  - Various news bits
  5. A Map of the 516 NPA  - List of exchanges in 516
  6. Red Box Program  - Commodore 64 BASIC program for generating Red Box tones, by Tommy (Art of Hacking, BBS, Website, Victoria, British Columbia)
  7. Canadian Numbers  - Canada WATS, by Tommy
  8. Letters
    • The Schematic  - The Bug Brother #1
    • The Virus  - Jonathan Porath, Paul van Hattum (Holland), Tommy
    • The Chip  - Rubber Soul (Toronto, Ontario)
    • Another ANI  - The Soldier
    • BLV Tidbits  - The Zeppelin
    • What's The Point?  - (none given)
    • Questions  - J.D.
    • Another Scam  - Doug Porter (Tucson, AZ)
    • Anti-Gay Offensive  - CH

  9. 2600 Marketplace

  $2600 Magazine - Volume 5, Number 4 (Winter 1988-1989)

  1. The Internet Worm Story  - Detailed technical information on the Robert Morris Internet worm, by Bob Page  (Santa Cruz, California)
  2. MCI: The Phone Company with a Lot of Explaining to Do  - MCI troubles and being switched to their service without notice, by Evil Corley
  3. Hacker's Guide to UNIX  - Info on hacking UNIX systems, by Red Knight (Phreakers/Hackers Underground Network)
  4. Overhearing Phone Calls  - Monitoring telephone calls on a scanner or TV  (Page 2, Page 3, Page 4, Page 5)
  5. Letters
    • Some Ideas  - (none given)
    • Articles & Boards  - SW
    • Need Info  - Handel
    • AT&T Nightmare  - Cray-Z Phreaker
    • Call Forwarding  - JH
    • Observations  - Phantom Phreaker

  6. Soviet Operators  - What it is like to be a Soviet telephone operator, by E. Solomenko  (Page 2, Page 3, Page 4)
  7. Chaos Computer Club  - Interview with several members of the Chaos Computer Club, by John Drake
  8. 2600 Marketplace
  9. Hardwiring Free Calls  - Info on what is now called "Beige Boxing," by Dr. Williams  (Hardwiring Your Way In)
  10. Review: Tune In On Phone Calls  - Book review of Tom Kneitel's Tune In On Telephone Calls, by Lou Scannon

  $2600 Magazine - Volume 6, Number 1 (Spring 1989)

  1. Hackers in Jail  - Editorial  (Kevin Mitnick hacked NORAD!?)
  2. The Wonders of UNIX  - More info on hacking UNIX systems - part 2, by Red Knight (Phreakers/Hackers Underground Network)
  3. 800 & 900 Exchanges  - 1-800 and 1-900 translation table, by Scott Statton (N1GAK)
  4. Letters
    • WarGames Dialer  - Phloyd Scaari
    • More ANI's  - RR, (none given), KH
    • Blue Box Questions  - Santa Claus, Boxed In (Texas)
    • A Scary Tale  - The Disk Jockey (Douglas Mason, DOB: 12-29-1967)

  5. How Payphones Really Work  - Detailed info on how payphones work, by The Infidel
  6. News From Around
    • Ripoffs & Scams
    • Long-Distance Censorship
    • Foul-ups & Blunders
    • Abuse....
    • Mischief Makers

  7. 2600 Marketplace

  $2600 Magazine - Volume 6, Number 2 (Summer 1989)

  1. Remember...  - Editorial
  2. A Guide to PRIMOS  - User guide to the PRIMOS operating system, by Violence (Yesmar)
  3. 201 Exchange List  - List of NXXs in the 201 NPA (Northern New Jersey), by The Infidel
  4. Scanning for Calls  - Monitoring cordless phones, by Mr. Upsetter (Jason Hillyard)
  5. Letters
    • The South African Phreak Crisis  - (none given)
    • Payphone Query  - Uncle Ho
    • UNIX Made Easy  - The Micron
    • Did You Know?  - Name Withheld
    • Notes and Info  - S. Fox, Mr. Upsetter, PG
    • Crossbar Trick  - JWC
    • Stories Wanted  - JJ Buck Bloombecker
    • Tuning In Calls  - Cyber Punk
    • Austrian Phreaking  - WM
    • Just Say No  - Phil
    • A Myriad of Questions  - (none given)

  6. Tips on Trashing  - How to dig through garbage, by Dr. Williams
  7. A Sprint Story  - Story of a Sprint security raid against a code kiddie, by Larry P. (Larry Phreaker)
  8. Spanish Phones  - Overview of the phone system in Spain which originally appeared in England's Financial Times, by Peter Bruce  (Page 2)
  9. A Summer Worm  - Similar Robert Morris' Internet worm ADA source code, by Jeff Gray
  10. 2600 Marketplace
  11. Reviews  - Reviews of George Zeller's book The 1989 Pirate Radio Directory and the "new" TAP, by Paul Estev and Evil Corley

  $2600 Magazine - Volume 6, Number 3 (Fall 1989)

  1. Competition: It's the Next Best Thing to Being There  - NYNEX Strike editorial
  2. Grade "A" Hacking  - University Applications Processing Center (UAPC) information, by The Plague
  3. Galactic Hacker Party  - Hacker con in Amsterdam
  4. British Telecom's Guilty Conscience  - Letter to British Telecom customers  (Page 2)
  5. The Death of COSMOS?  - Some info on Bellcore/Telcordia SWITCH, the COSMOS replacement system
  6. What's Going On
    • Technological Marvels
    • Hacker Spies
    • NYNEX Bigotry
    • Dial-It News
    • Payphone Choices
    • Overseas Access
    • News from the U.K.
    • One Less Choice
    • Privacy?  What's That?
    • Hackers In Trouble
    • Hacker Fun
    • Telco Literature
    • Calling Card Tutorials
    • Another Telco Ripoff
    • Technology Marches Back
    • And Finally

  7. The Secrets of 4TEL REMOBS  - Info on the Teradyne 4TEL loop testing system used by GTE, by Doom Prophet  (Ferrod Sensor, Trouble Verify)
  8. Letters
    • Mobile Telephone Info  - Koo Iyo Do
    • Southern ANI  - John
    • ROLM Horrors  - gmw
    • A Nagging Question  - The Apple Worm
    • A Request  - (none given) (Grand Rapids, Michigan)
    • Another Request  - THOR
    • The Call-Waiting Phone Tap  - (none given)
    • Interesting Numbers  - (none given), LK
    • UNIX Hacking  - fin
    • Intelligent Payphones  - Mr. Upsetter
    • Retarded Payphones  - Incarcerated

  9. REMOBS  - Information on the infamous Remote Observation Systems, by The Infidel
  10. GTE Horrors  - Misc info on GTE and their operations, by Silent Switchman and Mr. Ed Angry
  11. Voice Mail Hacking  - Hacking voice mail systems, by Aristotle  (Kevin P. Jones, Louisville, Kentucky)
  12. Punching Payphones  - How to "punch" payphones, like in WarGames, for free local calls, by Micro Surgeon / West Coast Phreaks
  13. Useful Frequencies  - DTMF and Special Information Tone (SIT) frequencies
  14. 2600 Marketplace
  15. Carrier Access Codes  - 10XXX PIC codes

  $2600 Magazine - Volume 6, Number 4 (Winter 1989)

  1. The AT&T Story  - Editorial
  2. Our Ever-Changing World
    • Morris Found Guilty
    • Real Damage
    • Jailed For Incompetence?
    • New Technology
    • And Things To Play With
    • Ripoff City
    • Calling London
    • Sprint Is Watching
    • Equal Access For All
    • German Democratic Phones
    • Too Much Chatter

  3. NYNEX Central Office Data  - CLLIs and info for NYNEX COs, by The Plague (Special thanks to Kornflake Killer)
  4. PRIMOS, Part Two  - User guide to the PRIMOS operating system, by Violence
  5. Building a Silver Box  - Build an extended DTMF keypad (A, B, C, D tones), by Mr. Upsetter
  6. Letters
    • Help Needed  - Concerned (Syracuse, NY)
    • Interesting Facts  - The Renegade of Pittsburgh
    • More Frequencies  - MM (Rutherford, NJ)
    • Numbers Needed  - MC (Van Nuys, CA)
    • BBS Question  - Greg (New York)
    • Comments/Suggestions  - HC (Phoenix, AZ)
    • COCOT Hacking  - (none given) (Akron, OH)
    • GTE Mysteries  - H. (Manhattan Beach, CA)
    • On Being Traced  - The CPU Raider
    • Information  - KS (Pittsburgh, PA), DS (Rocky Point, NY), AG (San Bernardino, CA)
    • Life's Little Moments  - F.M. "Cordless"
    • Fun Numbers  - The Seeker (Chris Hufnagel, New York, NY)
    • Words of Thanks  - ???
    • How?  - WAFB (Knob Noster, MO)
    • Hacker Clubs  - BK (Syracuse, New York)
    • Another Rip-Off Story  - Dr. Williams (Washington State)

  7. 2600 Marketplace
  8. Area Code/Exchange Count  - Exchange count for each NPA
  9. UAPC Update  - Update on the story of New York kids changing their grades, by The Plague

[emmanuel2]

"Remember, much of $2600 is written by YOU, our readers."

But the profits go into MY wallet!  Suckers!


  $2600 Magazine - Volume 7, Number 1 (Spring 1990)

  1. For Your Protection  - Editorial
  2. Facts About MIZAR  - Info on the MIZAR recent change memory management system, by The "Q"
  3. How Blue Boxers Are Caught  - Info on Signal Irregularity (SIGI) reports under a #1A ESS, by Phantom Phreaker and Doom Prophet (Ferrod Sensor)
  4. Build a Touch-Tone Decoder  - Schematic for a DTMF decoder, by B/Square and Mr. Upsetter
  5. Silver Box Born in U.K.  - Using the extended DTMF tones in the U.K., by Tamlyn Gam
  6. Listening In via VHF  - Monitoring marine wireless phone conversations, by Mr. Upsetter
  7. News Update
    • Morris Sentenced
    • Albania Callable
    • MCI Insecurity
    • New York Tel Rate Increase
    • Furthermore

  8. Letters
    • Clarifying REMOBS  - MOD!
    • Who's Listening?  - WH (New York)
    • Blue Box Chip  - Mr. Upsetter
    • Bug Wanted  - Charlie Brown
    • Questions and Info  - GB
    • Yet Another Threat  - fin
    • Red Box Woes  - Curious, (none given) (Rhode Island)
    • Suggestions and Questions  - Redneck 1 (San Luis Obispo, CA), Satisfied Customer, An Overseas Fan, Somewhere in the Midwest
    • Hotel Phones  - DB (New York, New York)
    • The Facts on 10698  - The County Man
    • More Network 2000 Ripoffs  - The Iron Warrior
    • Sensitive Material  - A Dedicated Subscriber

  9. The 911 Document  - Review of the infamous BellSouth Practice 660-225-104SV (E911 document), by Evil Corley
  10. Fun at the 2600 Meeting  - New York 2600 meeting apparently under surveillance  (Page 2)
  11. DNIC Codes  - Data Network Identification Codes (DNIC) for X.25 packet networks
  12. 2600 Marketplace
  13. The 707 Area Code  - List of exchanges in 707, by Lurch
  14. Review: The Cuckoo's Egg  - Book review of Clifford Stoll's The Cuckoo's Egg, by Dr. Williams

  $2600 Magazine - Volume 7, Number 2 (Summer 1990)

  1. A Bittersweet Victory  - Editorial
  2. The Neidorf/Phrack Trial  - Day-by-day overview of the Craig Neidorf trial, by Gordon Meyer and Jim Thomas
  3. An Interview With Craig Neidorf  - Interview with Craig Neidorf about the trial
  4. What is the EFF?  - Info on the Electronic Frontier Foundation
  5. Negative Feedback  - Different option on the Craig Neidorf trial
  6. PRIMOS Conclusion  - Information on the PRIMOS computer system and PRIMENET, by Violence
  7. An Introduction to COCOTs  - Information on Customer Owned Coin Operated Telephone (COCOT) payphones, by The Plague  (Similar Article)
  8. Letters
    • Hunting for Wiretaps  - none given (San Francisco, CA)
    • Comments  - Fred (Wilmington, Delaware), none given (Milwaukee, WI)
    • On Government Raids  - STM, DB
    • For the Record  - The Acronym King
    • Questions  - Simpson, BM, JI (Iceland), Jeff, none given (Guerneville, CA)
    • Protection from Eavesdroppers  - RG
    • 2600 Compromising Ideals?  - Disgusted Hacker
    • An Unusual Request  - Rick Saiffer
    • Free Phone Calls  - Mr. Upsetter, Birmingham

  9. News Update  - Various new bits
  10. 2600 Marketplace

  $2600 Magazine - Volume 7, Number 3 (Fall 1990)

  1. Caller ID: The Facts  - Information on caller ID, by Jake "The Snake"
  2. Network 2000 Saga Continues  - Network 2000 signing people up to Sprint
  3. Dorothy Denning Interview  - Interview with Dr. Dorothy Denning on the defense of Craig Neidorf, by Dr. Williams  (Additional Info)
  4. New Revelations From Bellsouth  - Technical information on Bellsouth Dialed Number Recorders (DNR), by Evil Corley  (Page 2)
  5. Things You Shouldn't Know  - Secret Service Fraud Division information on ATM fraud
  6. Defeating Trap Tracing  - Using calling cards and how to handle telco security calls, by Lord Thunder  (Page 2)
  7. Letters
    • Questions  - Snoopy, JB (Ontario, Canada), Confused in Kentucky, Ashley (United Kingdom)
    • Information  - Roy, S.D., Mr. Upsetter, EH, D
    • Information Needed  - Dr. Williams
    • Complaint/Response  - Rainbow Warrior
    • The COCOT Article  - Halo Jones, Dan (Denver, CO), R.S. Grucz, Guyler Magruder (Singapore)
    • Prison Phones  - C. Rebel
    • Privacy Preservation  - Reverend Doktor (Matthew X. Economou), Norman Appleton
    • Wiretap Clarification  - Alan M. Kaplan (Las Vegas, NV)
    • A Modern Proposal  - Dr. Deviant
    • Neidorf Defense Fund  - Jeff Hunter (Temple of the Screaming Electron)
    • Which Decoder Chip?  - none given (Akron, OH)
    • General Observations  - NB (Rhode Island)

  8. Converting a Tone Dialer into a Red Box  - The infamous Radio Shack tone dialer (Model #43-141) into a Red Box conversion article, by Noah Clayton
  9. Build a Telephone Induction Coil  - Make an inductive telephone pickup coil, by 1000 Spiderwebs of Might  (Coil Picture)
  10. The Definitive ANAC Guide  - List of Automatic Number Announcement Circuit (ANAC) numbers
  11. 2600 Marketplace
  12. An Algorithm for Credit Cards  - Code for credit card checksum verification, by Crazed Luddite and Murdering Thug
  13. Facts and Rumors  - News bits from the Atlanta LoD trial.

  $2600 Magazine - Volume 7, Number 4 (Winter 1990-1991)

  1. A Political Hacking Scandal  - Hacking Democrats
  2. The Hacker Reading List  - List of hacker magazines, books, and mailing lists, by Dr. Williams
  3. Central Office Operations  - Overview of the inside and outside plant, by Agent Steal (Justin T. Petersen, DOB: 07-28-1960)
  4. More Leaked Documents  - Amusing document from a telephone operator's supervisor manual
  5. 1-900-STOPPER: Anatomy of a Rip-Off  - Info on the 1-900-STOPPER number  (Similar Article)
  6. Letters
    • COCOT Troubles  - KM
    • Future Surveillance  - fin (Minnesota)
    • Why Did You Do It?  - Questmaster (Santa Barbara, CA), Kenton A. Hoover
    • Questions  - Rob (Woodmere, NY)
    • BBS Troubles  - The Spectre (St. Paul, MN), Charlie Tuna (Kokomo, IN)
    • Another Method  - Mr. T.
    • Suggestions  - The Concerned!
    • Technical Suggestions  - AP (Oakland, CA)
    • Caller ID Override  - Pete (Akron, OH)
    • A Phone Company Tour  - Mitch (Cincinnati, OH)
    • Assorted Thoughts  - Keyboard Jockey, The Disco Strangler (South River, NJ)
    • COCOT Info  - (none given, Waterbury, CT), The Martyr and The Mute & Bach Wai

  7. Winning Reader Entry  - Letter contest winners on counter the negative negative articles about hackers, by TELEgodzilla & unknown
  8. The Word in the Street  - Various news bits
  9. 2600 Marketplace

[gold2]

"Never gaze at a man, not even in passing."

"A member of Al Qaeda might assume you are gay, and all gays are an abomination before Allah."

Maybe the source of Evil Corley's anger is because he was rejected from joining Al Qaeda?


  $2600 Magazine - Volume 8, Number 1 (Spring 1991)

  1. In Pursuit of Knowledge: An Atari 520ST Virus  - Atari 520ST virus code for the GEMDOS operating system, by The Paranoid Panda
  2. The Terminus of Len Rose  - Story of Len Rose's bust, by Craig Neidorf
  3. Soviet BBS List  - Dial-up list for various Soviet BBSes
  4. What's Up?
    • Identifying Callers
    • Person Identification
    • Credit Release
    • Credit Due
    • Modern Times
    • Whose Scam Is It?
    • Eternal Vigilance
    • Illegal Networks
    • EFF Lawsuit
    • Prodigy Invading Privacy?

  5. Letters  - Reader Feedback Time
    • Some Suggestions  - Mr. Upsetter, TT (Palo Alto, CA), Larry (New York), SM
    • What Could It Be?  - Mad Scientist
    • Info Needed  - JN (New York)
    • Compliments  - Carl Flach (San Leandro, CA)
    • Mysteries  - Flaming Carrot, (none given, New Mexico)
    • Observations  - Danny (Harlem, NY)
    • General Complaints  - Predator
    • Payphone Question  - TG PA
    • Frustration  - TG (Mt. Vernon, NY)
    • AT&T Special Deal  - Noah Clayton
    • Telco Rip-Off  - RG (Los Angeles, CA)
    • Information  - Boxholder (Walnut Creek, CA), The Butler, Jeopardy Jim (Jim Vichench, Stroke Information)
    • Hacking 101  - S.C. (California)
    • A Technical Explanation  - Count Zero
    • COCOT Observations  - George W. (Camden, NJ)
    • A Disagreement  - Vernon J. Grant (Ely, NV)

  6. UNIX Password Hacker  - Source code for a crypt() brute-forcer, by The Infidel
  7. Looking Up IBM Passwords  - IBM CMS 3.0 password grabber for non-privileged users, by Kevin Mitnick (DOB: 08-06-1963)
  8. Internet Outdials  - List of Internet modem out-dials and how to use them, by Kevin
  9. 2600 Marketplace
  10. The New LEC Order  - Excellent article on modern Bell Operating Company (BOC) recent change and service order systems, by New Hack City

  $2600 Magazine - Volume 8, Number 2 (Summer 1991)

  1. Where Have All the Hackers Gone  - Editorial
  2. Magnetic Stripes  - Magnetic stripe card reader schematic from Hack-Tic Issues #8/#9/#10, by Dr. Abuse
  3. Death of NYNEX Business Centers  - Info on NYNEX changes, by Anonymous
  4. Hacker News  - Info on Len Rose's prison sentencing for sending AT&T source code over a telephone
  5. Building a Tone Tracer  - Build a tone generator for inductive probe line tracers, by Mr. Upsetter  (Page 2)
  6. Hacking MCIMAX  - Using a MCI product computer to access their MAX database, by MCI Mouse
  7. Inspect Implementation  - Security problems in Digital's EASYnet and using INSPECT, by Condor Woodstein (Kevin Mitnick?)  (Page 2, Page 3, Page 4)
  8. More on the CLASS Struggle  - Bellcore internal document on CLASS telephone service features
  9. Letters  - The Letters Section
    • UNIX Password Hacker  - rj, DP, NEXUS 6
    • Another 2600 Meeting  - (none given)
    • Access From Korea  - Marooned in the ROK
    • Red Box Notes  - Larry (New York, NY), TH (Ventura, CA)
    • UNIX BBSes  - LT
    • Interfacing With Mainframe  - MAG (Saudi Arabia)
    • Send A Message  - Dark Overlord
    • Caller ID Questions  - MB, BK (Bethesda, MD), KB (Austin, TX)
    • C&P Info Needed  - The Monk (Arlington, VA)
    • More Hackerphobia  - Peter The Great
    • Information Sources  - CH (Los Angeles, CA), H. Rochim, Flatline
    • On "Breaking In"  - Scott Alexander (San Francisco, CA)
    • Very Concerned  - Quantom (Austin, TX)
    • Interesting Numbers  - Number 204 (Las Vegas, NV)
    • COCOT Theories  - Antonin Qwerty (Philadelphia, PA)
    • Valuable Lessons  - T.15 (Quebec, Canada)
    • Hacking Water  - RF (Hiller, PA)
    • Numbers  - American Anarchy (Virginia)
    • Another MCI Rip-Off  - GR (Libertyville, IL)
    • The Value of 2600  - CH (New York)
    • Disturbing Observations  - DB (Flushing, NY)

  10. Some New Frequencies  - Info on new analog cellular frequencies, by Bernie S.
  11. 411  - News about phone companies
    • Regulating Scams
    • AT&T Wants The World
    • Advances in the U.K.
    • New Services
    • Corporate Litigation
    • COCOT and PBX Features
    • Story of the Year
    • Another Great 900 Number
    • Japanese Numbers
    • Customs of the U.S.A.
    • The Outages
    • Another Outage
    • Caller ID Pushers

  12. 2600 Marketplace
  13. When Hackers Ride Horses: A Review of Cyberpunk  - Book review of Katie Hafner and John Markoff's Cyberpunk, includes an interesting reply from Kevin Mitnick, by The Devil's Advocate
  14. Outdials  - List of PC Pursuit and Datapac modem out-dials on Tymenet, by Net Runner
  15. Prisoner Update  - Letter from The Leftist (Frank Darden, Email #2, Email #3, Ft. Lauderdale, FL / Norcross, GA)

  $2600 Magazine - Volume 8, Number 3 (Fall 1991)

  1. Why Won't They Listen?  - Editorial
  2. Simplex Locks: An Illusion of Security  - Infamous article on the poor security of Simplex locks - which everyone knew already, by Scott Skinner and Evil Corley
  3. The Hacker Video  - Video of Dutch hackers entering a U.S. military computer system, by Evil Corley
  4. Protecting Your SSN  - Protecting your Social Security number from con artists, by Chris Hibbert
  5. COCOT Numbers  - List of COCOT phone numbers in New England and Washington D.C., by NB & The Dead Cow
  6. Letters  - Pages of Letters
    • Where One Hacker Went  - (I used to be) Lex Luthor
    • Technical Questions  - MC (Austin, TX)
    • Raw Data  - The Militant Midget, Arkansas Coin Collector, GS (Seattle, Washington)
    • FAXers Beware  - SC (Hollywood, FL)
    • Prodigy Far From Gifted  - Big Al (Brooklyn, NY)
    • General Questions  - Wilson Longline (New York)
    • Red Box News  - Pete in Akron
    • Suggestions/Questions  - RN (Lake Forest, IL), Midnight Caller, KS (Saskatoon, Canada), GS (Ottawa, Canada), SS
    • Caller ID Decoders  - Bernie S.
    • Hacking UNIX Passwords  - SJ (New Haven, CT)
    • Voice Mail Fun  - Nick (Newcastle, England)

  7. Tidbits  - Various news bits
  8. USPS Hacking  - Postal bar code hacking, by The Devil's Advocate
  9. Psychology in the Hacker World  - Inside the hacker mindset, by Condor Woodstein (Kevin Mitnick?)  (Page 2, Page 3)
  10. 2600 Marketplace
  11. More Conversion Tricks  - More tips for converting those Radio Shack dialers into Red Boxes, by DC  (Plagiarized from an article by Count Zero)
  12. Useful UNIX Programs  - Simple hacker-related C source code, by Marshall Plann

  $2600 Magazine - Volume 8, Number 4 (Winter 1991-1992)

  1. Computer Security at the Bureau of Prisons  - SENTRY computer system security statement before the Subcommittee on Government Information, by Richard J. Hankinson (Deputy Inspector General, Office of the Inspector General)
  2. Stuff You Should be Interested In
    • Dutch Hacker Raids  - by Fellpe Rodriquez & Rop Gonggrijp
    • More AT&T Confusion
    • Progression
    • Regression

  3. Crypt() Source  - C source code to the UNIX crypt() function, by Dust  (Bern, Switzerland)
  4. Birth of a Low-Tech Hacker  - Story of an older hacker in India, by The Roving Eye
  5. Mobile Frequencies  - List of VHF radiophone frequencies, by Esper
  6. Simplex Update and Corrections/ USPS Hacking Corrections  - Error corrections in the last issue
  7. POSTNET Programs  - Source code for generating POSTNET bar codes, by Marshall Plann
  8. Letters  - The Letter Bag
    • Government Nonsense  - AB (Sacramento, CA)
    • Various Bits of Info  - The Crankster Gangster & Tweaky Bird, MG
    • Hacking School  - MOE
    • Modem Voyage  - CH
    • Questions  - LH (San Diego, CA), John, John, E, RA (Virginia)
    • Abuse of SSN's  - RH (Tacoma, Washington)
    • Private Eye View  - PW
    • Call For Info  - (none given)
    • On Virus Books  - Phat Phreddy Phreak (Dan DiCenso)
    • Long-Distance Trouble  - Danny (New York)
    • Dutch COCOTs  - Jack-o (Hengelo, Holland)
    • Cellular Eavesdropping  - Matt B. (Somerset, MA)
    • COCOT Experimentation  - Kingpin
    • Credit Wanted  - Count Zero
    • POSTNET Corrections  - Black Fox (New York, NY)
    • On Prodigy  - Lawrence (New York), Jon Radel (Reston, VA)
    • Reading ANI  - Pete at AU
    • Red Box Warning  - BillSF
    • Reading Stripes  - Trigger (Santa Ana, CA)
    • Lock Your Terminal  - Cray-Z Phreaker
    • Russian Technology  - KT (Moscow, Russia)

  9. Class Features  - Overview of some custom calling features, by Colonel Walter E. Kurtz 75 Clicks from the bridge
  10. COCOT Corner  - Examples from a COCOT database, various notes on payments and installation
  11. An Appeal For Help  - Help pay Craig Neidorf legal defense fund, by Craig Neidorf  (Page 2)
  12. Gulf War Printer Virus  - Info on that stupid "Gulf War Printer Virus" April Fool's hoax, by Anonymous
  13. 2600 Marketplace
  14. U.S. Phone Companies Face Built-In Privacy Hole  - Security hole in a switches Busy Line Verification (BLV) function
  15. Monitoring Devices  - Simple FM wireless transmitter schematics, by BillSF  (Bill Squire, Amsterdam, Holland)
  16. Human Database Centers  - Various credit bureaus and database agencies, by PW

  $2600 Magazine - Volume 9, Number 1 (Spring 1992)

  1. An MS-DOS Virus  - MS-DOS .COM infecter virus x86 assembly code, by Paranoid Panda
  2. A Batch Virus  - Virus using DEBUG and EDLIN from a BATCH file, by Frosty of the GCMS  (Robert E. Jones, Long Beach, MO)
  3. Virus Scanners Exposed  - How virus scanners work and ways to bypass them, by Dr. Delam
  4. Hacking WWIV  - Different techniques for hacking the WWIV BBS software package
  5. Using a Silver Box  - Access ACD debug features using the extended DTMF tones, by Mad Scientist
  6. Fun Frequencies  - Secret Service and Disney frequencies
  7. UNIX Password Hacker  - An alternate approach to UNIX password cracking which hides your activity, by Keyboard Jockey
  8. How to Take Apart a Payphone  - How to take apart a payphone, by The Monk
  9. Letters  - The Letters
    • Caller ID Info  - Rich
    • POSTNET Questions  - BB (Woodbridge, VA), LM (Berkeley, CA), Anonymous
    • Info  - MT (Baton Rogue, LA), Taran King (Randy Tishler), Dr. Delam, SGC (New Jersey)
    • Searching for Answers  - The H. (Los Angeles, CA)
    • COCOT Updates  - NB, Juan Valdez (Washington D.C.), TELEgodzilla
    • A Mag Strip Future  - Mr. Upsetter
    • Technological Marvels  - Henry H. Lightcap (Seattle, Washington)
    • Transmitter Bits  - T^2 (Germany), BillSF (Amsterdam, Holland)
    • Clarifications  - Bill, Number 204 (Las Vegas, NV), DC (Loomis, CA)
    • Why They're Watching  - Dispater
    • Breaking Into The Scene  - The Information Junkie
    • Questions  - The Iron Warrior
    • Outraged  - P.O.

  10. The Australian Phone System  - Overview of the phone system in Australia, by Midnight Caller
  11. A Way to Catch Peepers  - C source code to log finger requests, by Alien X
  12. Review: Steve Jackson's Hacker  - Game review of Steve Jackson Games' Hacker: The Computer Crime Card Game
  13. Simplex Locations  - List of universities, colleges, schools, etc. which use Simplex locks
  14. 2600 Marketplace
  15. News Updates
    • Big Brother
    • International News
    • New Technology
    • Troublemakers
    • Opportunists
    • Observations
    • Regulations

  16. Fascinating Fone Fun  - Interesting phone numbers, by Frosty of the GCMS

  $2600 Magazine - Volume 9, Number 2 (Summer 1992)

  1. On the Road Again: Portable Hacking  - Guide to portable computers and mobile hacking, by The Masked Avocado
  2. Hitchhiker's Guide to the Phone System: Phreaking in the Nineties  - Modern phone systems and phreaking, by BillSF
  3. Demon Dialer Review  - Review of the Hack-Tic demon dialer, by The Devil's Advocate
  4. Bellcore's Plans for Caller ID  - Caller ID info from Bellcore TA-NWT-000030
  5. Fun Things to Know  - Various news bits
  6. Here We Go Again  - More information about the Secret Service and "hacker" arrests, mostly the New York kiddies
  7. Letters  - Here They Are
    • Trouble to Come  - Maelstrom 517
    • Enhanced Exaggerations  - Danny (New York)
    • Mag Strip Update  - SE (Minnesota)
    • Scanning Results  - FD (Atlanta, GA), Name Withheld, David
    • At Wit's End  - CB (Colorado)
    • crypt() Correction  - SJ (California)
    • Simplex Sightings  - Albatross
    • Wanted  - Birdman (Tennesse)
    • Monitoring Problems  - Vid Kid (Minnesota)
    • Cellular Frequencies  - 6025 (Scotland)
    • What the NSA Does  - Someone (Somewhere)
    • Prisoner News  - PW (Washington)
    • Mystery Calls  - Sitting Duck
    • The Prodigy Side  - Steve Heln (White Plains, NY)

  8. Defeating *69  - Tips to defeat the *69 automatic callback feature, by Bernie S.
  9. The View of a Fed  - Story from a government computer security man, by The Fed
  10. Review: Devouring Fungus  - Book review of Karla Jenning's book The Devouring Fungus, by W. Ritchie Benedict
  11. 2600 Marketplace
  12. Voice Mail Hacking  - Hacking voice mail boxes, by Night Ranger (G. Batson)

  $2600 Magazine - Volume 9, Number 3 (Fall 1992)

  1. Hacking AmiExpress  - Security holes under this popular Amiga BBS software and a way to grab passwords and display them in ASCII borders, by Swinging Man
  2. Defeating Callback Verification  - Neat trick to defeat BBS callback modem verification, by Dr. Delam
  3. Shopper's Guide to COCOTs  - Guide to COCOT payphones, by Count Zero (John Lester)
  4. Film Review: Sneakers  - Review of the movie Sneakers, by Evil Corley
  5. A Simple Virus in C  - Sample source code for a DOS-based overwriting virus that attacks all EXE files in the directories off the main C: directory, by Infiltrator
  6. Book Review: The Hacker Crackdown  - Book review of Bruce Sterling's The Hacker Crackdown, by The Devil's Advocate
  7. Letters  - I/O
    • Blue Box Questions  - MD (Sheboygan, WI), Phrankenstein
    • Assorted Comments  - DC
    • Sheer Frustration  - T^2 (Germany)
    • Mild Encryption  - Danny (New York)
    • Cable Hacking  - Lawrence (New York, NY), Anonymous
    • A Phone Mystery  - The Psychedelic Sloth (Paul Bradley, Oregon)
    • Info  - Erreth Akbe/Energy!
    • Many Questions  - The Ronin (Pennsylvania), Clark Kent (Ames, IA)
    • An Opinion  - TC (Blauvelt, NY)
    • The Facts on ACD  - Kingpin (Brookline, MA)
    • Cellular Mystery  - MM (Nova Scotia, Canada)
    • Call For Data  - The Azure Mage
    • Call For Info  - JS (Philadelphia, PA)
    • Call For Help  - TB (New Jersey)
    • A Choke Tip  - The Prophet
    • Mail Problems  - RD (Austin, TX)
    • Comments From Abroad  - EL (Faulconbridge, Australia), DF (Milan, Italy)
    • BBS Update  - Guy Nohrenberg (Canoga Park, CA)
    • Voice Mail Question  - Puzzled

  8. Hacking on the Front Line  - Good article on early 1990s computer hacking, by Al Capone
  9. How to Use the Dial Telephone  - New York Telephone document on how to properly dial a phone
  10. 2600 Marketplace
  11. Getting Started  - Getting started in hacking, by Phord Prefect
  12. Toll Fraud: What the Big Boys Are Nervous About  - Overview of the Toll Fraud Prevention Committee (TFPC), by Count Zero
  13. 2600 Meetings

  $2600 Magazine - Volume 9, Number 4 (Winter 1992-1993)

  1. Hackers in a World of Malls  - Info on the Pentagon City Mall 2600 meeting being busted up by the Secret Service
  2. Cipher Fun  - Overview of simple encryption ciphers, by Peter Rabbit
  3. Beginner's Guide to Minitel  - Some info on the French Minitel network, by NeurAlien
  4. Vehicle Identification Numbers  - Guide to VINs
  5. Secret Service Sites  - List of Secret Service field offices, by GCMS MechWariors
  6. Letter From Prison  - Letter from a whiny hacker in prison and brute-forcing Spring card codes
  7. Growth of a Low-Tech Hacker  - Hacking in a low-technology atmosphere, by The Roving Eye
  8. High Tech Happenings
    • The Hacker "Threat"
    • Foulups and Blunders
    • Advances in Technology
    • Abuse of Power
    • Numbers

  9. Letters  - feedback
    • Federal Issues  - Albatross
    • Credit Problems  - D (Nederland, TX), BR (Hamilton, Ontario), Pacoid
    • What a Surprise  - JL (Tampa, FL)
    • More Simplex Shenanigans  - Cray-Z Phreaker
    • In Defense of the Demon Dialer  - Hack-Tic
    • Slow Learners  - Dan
    • Data  - Sarlo (Chicago, IL), Tremoto, Happy Reader and Reporter, MA (Baton Rouge, LA), Digital Bear (Canada), Naddy (Germany), Sp00f
    • Scanner Observations  - Anon.
    • Where is TAP?  - IRC (Torrance, CA)
    • Book References  - WT (Santa Barbara, CA)
    • VMS Fun  - Alien Hacker
    • Answering Machine Hacking  - SPaDe (Montebello, CA)
    • A Request  - The Har (Denver, CO)
    • Bellcore Threats  - Valis (West Orange, NJ)
    • Caller ID Hoodwinking  - Gabriel
    • Hardware Lock Info Needed  - The Pizza Maker Hacker
    • Japanese Phone Tricks  - Japanese Subscriber
    • Assorted Info  - Scott (Buena Park, CA)
    • 2600 Meeting Adventures  - Techno Caster
    • Answers  - Scott R. (Huntsville, Alabama)

  10. Toll Fraud of the Past  - An official Bell System document on "Blue Boxing" and toll fraud.  (Page 2, Page 3)
  11. AT&T Office List  - List of AT&T offices and switching stations covering Connecticut, Delaware, D.C., Maryland, Maine, Massachusetts, New Jersey, and New Hampshire
  12. 2600 Marketplace
  13. More Telco Leaks  - Southwestern Bell computers and dial-ups
  14. Review: Speach Thing  - Review of a Convox add-on voice module, by Cray-Z Phreaker
  15. 2600 Meetings

  $2600 Magazine - Volume 10, Number 1 (Spring 1993)

  1. Cellular Magic  - Detailed cellular phone system overview, by Bootleg  (Mike Beketic)
  2. Trouble in the White House  - Story of White House phone system trouble, by Charlie Zee
  3. Beige Box Construction  - How to build a Beige Box which is a little more complex than others, by The Phoenix  (Page 2)
  4. Descrambling Cable  - Cable scrambling and the infamous Radio Shack descrambler, by Dr. Clayton Phorester
  5. Secret Service on Trial  - Court report from the Steve Jackson Games trial, by Paco Xander Nathan
  6. One Angry Judge  - One man's Steve Jackson Games trial perspective and how the judge turned against the Secret Service, by Scott Skinner
  7. Letters  - Letters of Merit
    • Cordless Questions  - Happy Reader (North Dakota)
    • Bypassing Restrictions  - Major Tom (Ari Braginsky, Champaign, IL)
    • More Simplex Stories  - A Fly on the Wall, Pez (Lafayette, LA)
    • Mysteries  - Annom, DG (U.K.), Maelstrom 517
    • Hacking Passwords  - MR
    • That Bell Computer  - layden02, The Road Warrior
    • Correction  - CA
    • Info  - CL (Holmdel, NJ), JR (Kingsburg, CA), The Tick (Arizona), Avalar, Ken, Misha, Mr. Upsetter
    • Red Box Questions  - Frustrated in Berkeley
    • Data in the Air  - The Winged Plecenta (Oregon)
    • Questions  - JG, TW (Binghamton), MJ (Massachusetts), SB (Massachusetts), Freaked-out Feyodor, AB (New York), JL (Shoreham, New York), Brendog
    • Fixing Your Credit  - DC Credit
    • Surprising Facts  - JM
    • Spanish Connection  - GMV (Motril-Granada, Spain)
    • BBS Info  - JCB (Concord, North Carolina)
    • Evil Payphones  - Inhuman (Arlington, VA)
    • Access to 2600  - The Apple II Evangelist (Jane Lee, Palos Verdes, CA)
    • Rolling Stone Corrections  - TELEgodzilla!
    • Special Phone  - TL (Tempe, AZ)
    • Seeking Virus BBSes  - YFNH (Your Friendly Neighborhood Hacker)

  8. Acronyms  - Acronyms list a-g, by Echo
  9. A Study of Hackers  - Article about hackers and setting up a honeypot, by Dr. Williams
  10. 2600 Marketplace
  11. Getting Your File  - Getting your FBI or credit report files, by Bayonet
  12. Lawsuit Filed Against Secret Service  - Legal action taken on behalf of the Washington D.C. $2600 meeting incident.
  13. British News  - Various news information from Britain, by The Dark Knight (John Abercrombie)
  14. 2600 Meetings

  $2600 Magazine - Volume 10, Number 2 (Summer 1993)

  1. A Guide to the 5ESS  - Very detailed guide to the Lucent #5 ESS, by Crisp G.R.A.S.P.
  2. British Credit Holes  - Potential credit card security holes and ways to bypass the "Data Protection Act"
  3. High School Hacking  - School PS/2 computer and Novell system security holes, by The 999
  4. DTMF Decoder Review  - Review of the MoTron TDD-8 DTMF decoder, by Les Inconnu (Sydney, Australia)
  5. Meeting Advice  - How to have a $2600 meeting and how to protect them from disruption, by Parity Check and Romula Velcro
  6. More Acronyms  - Acronyms list h-r, by Echo
  7. Letters  - Printable Letters
    • Mall Fallout  - The Knight of Ni (New Jersey), Knight Klone (Atlanta, GA)
    • Beginner Questions  - JC (Canada), Dial Tone (Nevada City, CA)
    • Defeating Hardware Locks  - The Public, Arclight (Fullerton, CA)
    • Telco Fascists  - NA (Sacramento, CA), M
    • Info  - John Wesley Harding (New Jersey), Frion Man (Los Angeles, CA), Static (Washington), Mouse Balls, MW (Ohio), Martian, Clovis
    • Freedom of the Press  - Mike
    • Equal Access?  - userid@temple
    • Help Needed  - Reuben (New York, NY)
    • Cable Potential  - Master Quickly
    • On Beige Boxing  - Andrew Sharaf (Brooklyn, NY)
    • Unlisted Directories  - SDW (Fort Lauderdale, FL)
    • Callback Defeat  - MJ (California)
    • Another Way to Fix Credit  - ES (Hollywood, CA)
    • Another Simplex Story  - The Flea (Lexington, KY)
    • Red Box Tones  - PB (Deerfield, MA)
    • Female Hackers  - A-Gal (Florida)
    • COCOT Question  - DW (Providence, RI)
    • New York's 890 Exchange  - The Sheperd (Brooklyn, NY)
    • The Best ANAC  - Non-Stop Phone Phreak
    • A Special Request  - Matthew (Los Angeles, CA)

  8. AT&T's Pages  - Additional addresses to various AT&T offices and switching stations covering New York, Pennsylvania, Puerto Rico, Rhode Island, Vermont, Virginia, and West Virginia
  9. Assorted Videos from Commonwealth Films  - Software piracy video reviews, by Evil Corley
  10. 2600 Marketplace
  11. Toll Fraud Device  - Red Box schematic using a Texas Instruments TCM5089 tone encoder IC.  (Page 2)
  12. ANSI Bomb  - How to use and install a DOS ANSI bomb, by Mister Galaxy  (Patrick Harvey, Atlanta, GA, BBS Documentary)
  13. News Update  - Steve Jackson declared innocent!
  14. 2600 Meetings

  $2600 Magazine - Volume 10, Number 3 (Fall 1993)

  1. Hacking at the End of the Universe  - Editorial
  2. The Wheel Cipher  - How to use Jefferson's wheel cipher, by Peter Rabbit
  3. True Colors  - Detailed technical overview of the various phone phreak "color" boxes, by BillSF
  4. Caller ID Technicalities  - Technical information on Caller ID, by Hyperborean Menace
  5. Congress Takes a Holiday  - Evil Corley testifies before Congress
  6. UNIX Job Openings  - UNIX hacking/Trojan horse tips, by Orb  (Norman Richards)  (Page 2)
  7. Meeting Mania  - More November 1992 Washington D.C. $2600 meeting info and Secret Service FOIA documents
  8. Never Erase the Past  - Review of LoD's Hack/Phreak BBS Message Base Project, by Evil Corley
  9. Hacking Honesty Tests  - How honest and integrity test work, by U.R. Source
  10. Letters  - Never Before Printed Letters
    • Foreign Charge Phones  - Clovis
    • Hacker Info  - Crewcut
    • Reading List  - The Theoretician (Dana Beal)
    • Telco Ripoffs  - Sp00f!
    • Seen the Light  - A New Reader in Las Vegas
    • Hacking An Intercom  - The H. (Los Angeles, CA)
    • AT&T Irony  - PB at UT
    • Locked Out  - AH (Texas)
    • New Long-Distance Services  - Bill Bossiere, Telemanagement Systems of America (New Orleans, LA)
    • Evil Engineers  - Almost Anonymous
    • Los Angeles Numbers  - Red Wizard, (none given, Santa Ana, CA)
    • Governmental Mystery  - Baked Alaska
    • Numbers  - Boredom Prevails (Richmond)
    • Cellular Mystery  - ED (San Francisco, CA)
    • Disney Details  - IT (San Diego, CA)
    • Are We Neglecting IBM?  - KR (Little Rock, Arkansas)
    • Lack of Understanding  - Captain Poison (Puerto Rico), Tech
    • Review Update  - Les Inconnu (Sydney, Australia)
    • High School Hacking  - The Noid (Jason Chilton), Soylent Green, Haghard
    • Telco UNIX Trap  - A Maryland Hacker
    • Bookstore Trouble  - trader, J
    • Rumor Quelling  - Sue
    • Problem Solving  - LL, Saladin
    • Cellular Criticism  - Mark Uber

  11. Password Cracking Software  - Review of Access Data Recovery NTPASS Password Cracking Software, by Hakim
  12. Changing Your Grades on a High School Computer  - Hacking a school using Pupil Attendance and Records System (PARS), by Drewl/Salivate (A. Shafer)
  13. Overview of DSS1  - Review of ISDN Digital Subscriber Signaling System 1, by Cruise-CTRL
  14. Book Review: Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals  - Book review of Paul Mungo's Approaching Zero, by Stephen J. Resz
  15. Protecting Your Virus from Evil Detectors  - Short piece of assembly code to add to your viral code to "encrypt" the virus until run time, by Dr. Bloodmoney
  16. 2600 Marketplace
  17. More Cellular Fun  - Info on cell cloning, by Judas Gerard
  18. The Last of the Acronym List  - Acronyms list s-x (no y or z), by Echo
  19. 2600 Meetings

  $2600 Magazine - Volume 10, Number 4 (Winter 1993-1994)

  1. Hackers in Jail, Part Two  - Editorial
  2. Cellular Phone Biopsy  - Detailed cellular phone memory operations, by Kingpin (Joe Grand)
  3. Elementary Switching  - Basics of phone switching and signaling systems, by 910
  4. Know Your Switch  - Tricks to listen for to determine the type of telco switch (ESS, DMS) you are on or calling, by Rebel
  5. Hacking Smartphone  - Info on the RBOC's Smartphone, by Tech Rat
  6. High School Mac Hack  - Hacking Appleshare and using ResEdit at schools, by The Bard
  7. Hacking Computer Shows  - Get into computer shows for free, by Walter S. Jaffee  (Page 2)
  8. NYNEX Voice Mail  - Voice mail phone numbers for various NYNEX central offices
  9. The Magical Tone Box  - Overview of using an ISD1000A digital voice recorder IC to create a Red Box or Blue Box, by FyberLyte
  10. Letters  - Letters to Remember
    • Fun Telco Numbers  - Beetle Bailey (Arcadia, CA), MacGyver (Clearwater, FL), Uncle Waldo
    • Hacking Traffic Lights  - Lone Wolf (Atlanta, GA)
    • Past Hacker Prime?  - Darkhold Page (Pittsburgh, PA)
    • Info and Questions  - Whistler, Will Chung (San Luis Obispo, CA), Pipo Communications (Pollack Pines, CA)
    • Potential Discovery  - Maldoror (Florida)
    • Security Concerns  - Radiation X (California), Bleed The Freak
    • Starting a Meeting  - Johnny "The Quarter" Burpo (New York)
    • Questions  - M (Great Neck, New York), DY (Weston Ontario), Owen (Halifax, U.K.)
    • Why Hack Cable?  - A-$tring (Lenexa, Kansas)
    • How to Learn About Your CO  - Hook (Belmont, MA)
    • Observations  - The Lung (California)
    • New Technology  - Julian (Cleveland, OH)
    • Modem Back Door  - Antoch
    • Foreign Payphone Flash  - LN
    • How to Really Abuse a Payphone  - Peter (Manchaca, TX)
    • Technology Moves Backwards  - Martin
    • Corrections  - Jeff, King of Birds (Chapel Hill, CA)
    • Red Box Concerns  - Anoon, Nexus, Concerned
    • How Easy It Is  - CopKiller (Bethesda, MD), Erreth Akbe
    • Bypassing Restrictions  - Lost and regulated in NB, Canada
    • A Way Around Caller ID?  - Levendis (Deron Staffen)
    • School Phone System  - lexis
    • 2600 Wins Over Class  - BG (Georgetown, TX)
    • The Honesty Test  - The Vampire Gabrielle

  11. Passageways to the Internet  - College Internet dial-ups
  12. More Meeting Advice  - $2600 meeting advice and how to fight back if the government tries to prevent you from attending one, by The Judicator of D.C.
  13. Book Review: Virtual Reality  - Review of Howard Rheingold's Virtual Reality, by W. Ritchie Benedict
  14. Digital Locks  - List of the 1287 possible combinations for Digital-brand locks
  15. 2600 Marketplace
  16. News Roundup
    • Foulups and Blunders
    • Touch-Tone Registration
    • Electronic Mayhem
    • The Latest From The U.K.
    • Collect Your Wits
    • Fantasy World
    • Start The Insanity!
    • Insuring Profits
    • New Numbers
    • Journalistic Integrity
    • The Joy of New Technology
    • Caller ID News
    • Corporate Ideas
    • Tidbits

  17. 2600 Meetings

  $2600 Magazine - Volume 11, Number 1 (Spring 1994)

  1. Crime Waves  - Editorial
  2. Build a DTMF Decoder  - Hardware DTMF decoder using the Teltone 8870 DTMF receiver and code for recording the data via a Commodore 64/Vic-20, by Xam Killroy
  3. NYNEX Cards  - Info on NYNEX coin-operated telephone change cards, by Kevin Daniel
  4. Hacking Health  - How to hack Stairmaster 4000 aerobic equipment, by MuscleHead
  5. Software Piracy  - Another viewpoint on software piracy, by Roberto Verzola  (Page 2)
  6. Coping With Cable Denial  - Info on various cable TV scrambling systems, by Cap'n Dave
  7. Cellular Telephone Experimenters Kit Review  - Review of Mark Lottor's CTEK for the Oki 900 cell phone, by Mr. Upsetter  (Page 2)
  8. FOIA Facts and Fiction  - How to use the Freedom of Information Act (FOIA), by GateDancer and Shrike
  9. Letters  - Letterbox
    • Comments  - Big Wind
    • Hacker Understanding  - Scudder
    • Novell Nosing  - Digital Enigma (Cottonwood, CA)
    • NYNEX Negativity  - Happy in 212 Land
    • Reader Abuse  - Guy At The Desk (Ty Osborn, The Office BBS)
    • Questions  - BO (Cortlandt Manor, NY), Leroy Chism, Randy Ramone
    • The Dark Side  - Pissed Off In Houston
    • The Far Side  - One very displeased former subscriber
    • Payphone Fun  - Neophyte1138 (Ohio), Tim (San Diego, CA), TcP, Death Adder
    • Quarter Variations  - Kingpin
    • Prison Phone Project  - Wag
    • Government Data  - AO (Arizona)
    • Cellular Chatter  - Tech-No Wiz (Columbus, OH)
    • More Corporate Outrage  - James F. Walker (Loveland, CO)
    • Individual Outrage  - Richard Finch (Glendale, AZ, U.S. National Crime BBS, 602-846-4470)
    • Exiled Hacker  - Ares (Hacker's Hospice)
    • Pointers  - Trout (William S. Gillingham)
    • Fighting Back  - Bellsouth Baboon (Atlanta, GA, Reply)
    • Governmental Suggestions  - Randy815 (Dallas, TX)
    • Phiber Parallel  - Racer X
    • Correction  - Aleph One (Elias Levy)
    • Phone Company Charges  - David

  10. Blue Boxing Revisited - CCITT System #5  - Blue Boxing under CCITT #5 and the basics of that type of signaling, by Kevin Crow
  11. A Gift From Hallmark  - Building a Red Box using the internal electronics of a Hallmark talking card, by Bernie S.
  12. 10XXX  - Info on 10XXX Primary Independent Carrier (PIC) codes, by The Prophet  (Babu Mengelepouti, Seattle, Washington)
  13. Not Much Good News Here  - Laws on "phone hackers" and seizing their equipment, Clipper Chip info
  14. 2600 Marketplace
  15. Michigan Access  - MSUnet and Michnet dial-up access numbers, by Tonto of 517
  16. Book Reviews: Secrets of a Superhacker, UNIX Security  - Reviews of The Knightmare's (Dennis Fiery) book Secrets of a Superhacker and Derek Arnold's UNIX Security: A Practical Tutorial, by Michael E. Marotta and Simson L. Garfinkel
  17. British Trojan  - Story of installing a login-grabbing Trojan horse in college environment, by Veghead
  18. The Chrome Box  - Box to active the 3M Opticom traffic control systems, by Remote Control
  19. 2600 Meetings

  $2600 Magazine - Volume 11, Number 2 (Summer 1994)

  1. Hackers on Planet Earth  - Editorial about the first HOPE conference
  2. Life Under GTD5  - Detailed info on a GTD5 under GTE, also has info on the Proctor Test Set, by Zaphraud (Jason Kennerly)  (Page 2, Page 3, Page 4, Page 5, Page 6)
  3. The Joys of Voice Mail  - Info on hacking voice mail systems and password guessing, by snes
  4. Foiling the Finger Command / Playing With Your Fingers  - Overview of some of potentially sensitive information Finger can reveal and how to "back finger" a person, by Packet Rat (Tim Russo) and Shidoshi
  5. Cordless Fun  - How to listen to 49 MHz analog cordless phones, by Noam Chomski (New York Metropolitan Phreak Hack Organization [NYMPHO])  (Similar Article)
  6. Admins Without a Clue  - Collection of quotes from various system admins, by Kevin Crow
  7. Hacking Prodigy  - How to change your Prodigy ID, by DeVillage Fool
  8. Hacking the Small Stuff  - Info on hacking ATMs, calculators, vending machines, by Leonardo Branson
  9. Letters  - Letters to Read By
    • A Busy Connection  - Reuben (New York, NY)
    • Touch-Tone Tall Tales  - Power Spike
    • Improving Grades  - Brian, Black Night (Ohio)
    • Regression  - Fred
    • Car Tracking  - Tommy B.
    • How to be Honest  - V.A. Szell (Seattle, Washington)
    • High School Notes  - VicProphit, Number 6 (Bellevue, Washington), Deus/The Black Night/Silver Dragon/Pixel Threat/Zippy the WaterGod/The Unnamed One
    • Fighting Traffic  - flip (Ohio)
    • Become Your Own Admin  - Toaster (Narragansett, Rhode Island), Primitive Morales (Processed World)
    • Passing Numbers  - Ethan (Stanford), DD (Somerset, MA), Diashi (New York)
    • Red Box Rumors  - The Borg (Cleveland, OH)
    • Those Three Tones  - Empress
    • Cellular Mystery  - JV (Reston, VA)
    • Thoughts On Congress  - Gregg Giles (Oregon), John
    • Defending the 64  - Commodore Hacker
    • Tyranny in Church  - The Roadkill
    • Availability  - Hermit the Herman (David Johnson), sciri
    • Secrecy  - Somewhere in Kansas
    • Seen the Light  - An isolated feeling guy in Portland, Oregon
    • IBM Hacking  - Powercell (Hartford, CT)
    • Long Arm of the Secret Service  - Juan Valdez (Cambridge, MA)
    • Call Forwarding Tricks  - CM (Attlehoro, MA), LN (Minneapolis, MN)
    • Prodigy Savings  - George
    • Hungry For Knowledge  - Emory T. Suchau
    • Fighting the Slime  - RG (Los Angeles, CA)
    • Secrets of a Super Hacker  - JB (Habay-La-Nevue, Belgium)
    • Thoughts  - PB (Wayland, MA)

  10. DTMF Decoder  - DTMF decoder hardware/software for a Commie 64 or Vic 20, by Paul Bergsman  (Merion Station, PA, N3PSO)
  11. Monitoring Keystrokes  - Story of recording keystrokes using DEPL under DOS, by Dr. Delam
  12. 2600 Marketplace
  13. Facts  - News bits
  14. Detecting Corporate Leaks  - How businesses detect leaks and restrict data, by Parity Check
  15. 2600 Meetings

  $2600 Magazine - Volume 11, Number 3 (Fall 1994)

  1. Opening Doors  - Editorial
  2. Monitoring U.S. Mail  - USPS barcode information, by Paranoia
  3. Irish Telephones  - The Irish telephone system Telecom Eireann, by Wonko the Inane
  4. The Ghost Board  - Hidden bulletin board systems, by Autolycus
  5. Hacking Netcash  - Hacking online money, by Palindrome
  6. Welcome to MEL  - Southwestern Bell Mechanized Employee Locator (MEL), by EighT BaLL
  7. Generating an ESN  - How ESNs are generated, by Maldoror
  8. The Ten Dollar Red Box  - Instructions for turning a "talking" Hallmark card into a working Red Box, by Toxic Avenger  (Jeff Burchell)
  9. How to Listen In  - Very detailed overview of common audio surveillance hardware and techniques, by Q (Alan Hoffman)
  10. Letters  - Vocals
    • Worrisome Questions  - Susan
    • Defeating Call Return  - Emperor (San Francisco, CA)
    • Info  - Quinton McHale (Seneca, IL), WW (Austin, TX), Norm D'Plume
    • More Questions  - (none given)
    • Privacy Violation  - Anonymous
    • Meetings  - Frank (Kansas City, MO)
    • Reader Reunion  - Mike (Chicago, IL)
    • A Strange Number  - John Q Public, Zappy (Atlanta, GA), Mr. Asshole (San Francisco, CA)
    • Inside Info  - King of Spam
    • Strange Situation  - Marcus
    • Replies to Readers  - Da Phigzter (PHiGAN/6o2), .gKo. (DTMF: AB67)
    • Cordless Clarification  - Gladshiem
    • Mac Hacks  - Xausii, Space Rogue (617) (Christopher Thompson, Lowell, MA)
    • Sick ATMs  - (none given, London)
    • Lowdown on Lojack  - CARTWHEEL
    • Still More Questions  - Clear Plastic Raincoat from Seattle
    • On Piracy  - SM (Morgan Hills, CA)
    • On Honesty  - A.R. Weeks (New York, NY)
    • Northern Hacking  - DrP (Medicine Hat, Alberta)
    • Satellite Mystery  - Alcatraz (Pt. Pleasant Beach, NJ)
    • Red Light Cameras  - An Unprintable Symbol (California)
    • Security Concerns  - lexis
    • Security Lapses  - Colostomy Bagboy (Paskell "Geno" Paris, Washington)
    • Contradictions  - Problem Child (Las Vegas, NV)
    • Hacker Sites?  - Roger Harrison (Long Island, NY)
    • Help Needed  - Lady Penelope (London, England)

  11. Living on the Front Line  - Compromised Internet hosts  (Page 2)
  12. News Items
  13. Breaking Windows  - Bypass Windows screen savers, by The Camelback Juggler
  14. 2600 Marketplace
  15. Internet World Guide  - List of the 2-letter Internet domains into countries
  16. Software Review  - The Supervisor Series for VMS, by Floyd Lloyd
  17. 2600 Meetings

  $2600 Magazine - Volume 11, Number 4 (Winter 1994-1995)

  1. Inspiration  - Editorial
  2. Bypassing Protec  - How to defeat the Protec hard drive protection program, includes a Turbo Pascal boot sector copying program, by Michael Wilson
  3. More Key Capturing  - Tips on capturing keystrokes and passwords for various operating systems, by Code-Cafe
  4. Digital Telephony Passes  - Info and sensationalism on the Digital Telephony Bill
  5. The Risks of War Dialing  - Legal problems you might run into war dialing, by Dr. Delam  (Page 2)
  6. Cellular Hardware & Electronics  - Detailed information on cellular phone PROMs/EPROMs and the data they hold, by Kingpin
  7. Australian Update  - Info on Australia's phone and cellular system, by Les Inconnu
  8. Letters  - Right Letters
    • Missing The Point  - Deeply Shrouded & Quiet
    • Handy Tip  - DMG (Cherry Hill, NJ)
    • Problem  - Harlequin
    • HOPE Memories  - Dave (Hofstra)
    • Scantron Tricks  - Jonathan
    • Schematic Problems  - The Camelback Juggler
    • Fun With Sound  - AK47/[GZ] (Arkansas)
    • A Little History  - Fart Wino
    • Ottawa Fun Phone Facts  - The Bishop (Ottawa, Canada)
    • Wanted  - Geert (Rochester, New York), Spartacus
    • Info  - FP (Long Island, New York), Atticus, BW, Paul (New Jersey), Morning Wood
    • Mystery Number  - Bruce
    • Questions  - Anonymous
    • MetroCard Update  - Red Balaclava (Jeopardy Jim)
    • Highway Strangeness  - Son of Holocaust Survivor Redhead
    • More Hacker Persecution  - Mr. Hallmark (Rochester, New York), Majic (Maryland)
    • 800-433-3210 Update  - Presto
    • Payphone Tribulation  - Weasel
    • More Window Tricks  - Brother Orbis
    • More Mac Tricks  - Mr. Blackhood
    • Followup  - John Q Public
    • True Hacker Spirit  - JL (Highland, CA)
    • More On Honesty  - U.R. Source
    • Help Needed  - Dr. X
    • Hacker Graffiti  - JV (New York)
    • Take Responsibility  - Brad Peebles (North Palm Beach, FL)
    • Phone Boxes  - Cat in the Hat (Warner Robins, GA)
    • Inexcusable  - Particle Man (Arlington, VA)
    • International Tale of Woe  - Fabian (Long Island, NY)
    • Cable Affirmation  - James S. Allen (Office of Cable Theft)

  9. VT Hacking  - DEC VT100/200/220-series computer (dumb) terminal information and login spoofer/password grabber, by Mr. Bungle
  10. Janitor Privileges  - Security problems hiring outside janitors, by Voyager (Will Spencer)
  11. Net Surfing Techniques  - Internet surfing tools and tricks, by Sonic Life
  12. News Update
  13. 2600 Marketplace
  14. Reviews: Network Security, Information Warfare, and Unauthorized Access  - Review of Steven Shaffer's book Network Security, and Winn Schwartau's book Information Warfare, and the video Unauthorized Access by Annaliza Savage
  15. 2600 Meetings

  $2600 Magazine - Volume 12, Number 1 (Spring 1995)

  1. The World vs. Kevin Mitnick  - Editorial
  2. The Gold Card  - Holland PTT-Telecom pre-paid phone cards and how to make your own reader/writer, by Hack-Tic
  3. Facts on ATM Camera Security  - Overview of ATM surveillance cameras and debunking some of the myths, by Kitsune
  4. Cellular Interception Techniques  - Different methods for the interception of analog cellular phones, by Thomas Icom
  5. Letters  - The Better Letters
    • More Bookstore Fun  - Seventh Son
    • Piracy Proposal  - Daveed Shachar (Israel)
    • Eastern Europe Scene  - The MacMan (Carl B. Constantine, Budapest)
    • Locked Up  - ATM Bandit, Phafnir, The Cryptic Prognosticator
    • Bits of Info  - Zeek (Major) (Colorado), Skimmer (Cambridge, MA)
    • Digital Correction  - Spook
    • Intercept Tones  - Scott (Buena Park, CA)
    • Monitoring Mail  - Drew
    • Red Box Problem  - Pestilence
    • ATM Fun  - Kilobyter (Flushing, New York)
    • True Hackers  - Edison Carter (M.D. Spangler)
    • Mystery Computer  - William Tell
    • Source of Income  - CMS (Santa Rosa, CA)
    • Strange Numbers  - Jason (Boise, ID)
    • New Technology  - Bitslicer
    • Conscientious Trashers  - "Hackers for a Cleaner Planet"
    • Satellite Theory  - Daughter of a Satellite Engineer
    • A Fun Project  - Quasinym (Peter Garver?)
    • Mystery Number  - Tony Sharp
    • TV Garbage  - Puppet Master
    • Hacking Airphones  - Empress (Georgia) (Similar Info)
    • Mac Attack  - Rev. Mr. DNA
    • Computer Numbers  - The Phantasm (Jim Brinkerhoff)
    • Fun With Cordless Phones  - Radio Man, Tom

  6. Hacking in Brazil  - State of computer hacking in Brazil and notes about the local BBS scene, by Derneval (Ribeiro Rodrigues)
  7. Hacking Tandy/Casio Pocket Computer  - Using the Tandy PC-6, by Sam Nitzberg  (Eatontown, NJ)
  8. Hacking the Tandy Zoomer/Casio Z-7000 ZPDA  - Using the Tandy ZPDA, by Enigma
  9. 500 Exchange Guide  - List of NXXs in 1-500 land
  10. Pager Major  - Shoulder-surfing a pager terminal password, by Danny Burstein
  11. 2600 Marketplace
  12. West Side Hacker: Masters of Deception  - Book review of Joshua Quittner & Michelle Slatalla's Masters of Deception, by Scott Skinner
  13. Assorted News
  14. Leaking Cables  - British cable company problems and leaks
  15. 2600 Meetings

  $2600 Magazine - Volume 12, Number 2 (Summer 1995)

  1. The Bernie S. Saga  - Editorial
  2. New Anti-Viral Technologies  - How to protect your virus from anti-virus software, by Adam Young
  3. The Gender Snooper  - Cool little project involving a wireless serial port data transmitter to intercept low-speed RS-232 data going to things like modems, by Commander Crash
  4. ATM Tricks  - Diebold ATM tricks, by Helen Gone
  5. Citibank ATM Fun  - Playing with the ATMs at Citibank, by Ice of Spides
  6. Day of the Hacker  - How a Wildcat BBS was hacked with a trick PKUNZIP.BAT and infected COMMAND.COM, by Mr. Galaxy
  7. Diverters  - How call diverters (forwarding) work, by Ray Nonte
  8. Hacking the AS/400  - How the AS/400 works, by Mantis King
  9. Letters  - "Letters are the cornerstone of any civilized society."
    • Privacy Concern  - Anonymous in MD
    • Hacker Techniques  - Pumpkin Smasher (Natchitoches, LA), Mickey and Mallory, Wicker Man (DeKalb, IL), Streaker
    • War Dialing  - Clint Sare (Texas), Lineman
    • Numbers  - TAG (Sheridan, Oregon), Mike, Major Zeek
    • Data  - Airwolf (Twin Cities, Minnesota)
    • Questions  - GF
    • Pirate Alert  - Red 5! and Hellbender
    • Answers  - Name and Address withheld, Gump (Sacramento, CA)
    • Bookstore Stories  - The Black Carpet (Bay Area, CA), Pestilence/517
    • Caller ID Question  - Chester-Buzz
    • Lack of Security  - Another Thought Criminal
    • NYNEX Outrage  - Scammed in NY
    • Advice  - Fortunate Sun, Lincoln
    • On ATM's  - Kamakize (Virginia)
    • Spin Control  - The Black Panther
    • Handy Tip  - BillSF

  10. Radio Reviews  - Review of some frequency counter and scanner gear, including the Optoelectronics' Scout, R10A, APS104, Universal M-400 decoder, and AOR AR8000 receiver, by Blue Whale
  11. War Dialing  - Interesting wardialing stories from a small town in Canada and an autodialer script for Qmodem, by VOM  (Canada)
  12. Coping with Cable Denial 2  - Jerrold 450 cable converter hack, by Prowler
  13. 2600 Marketplace
  14. News Items  - Mitnick trial starts
  15. NPA List  - List of area codes (1995), including all the weird ones
  16. 2600 Meetings

  $2600 Magazine - Volume 12, Number 3 (Fall 1995)

  1. No More Secrets  - Editorial
  2. Stealth Trojans  - Source code for a stealth DOS Trojan horse and "stealth" disk I/O access, by Commander Crash
  3. Military Madness  - The true story of my experiences as a paid hacker for the military
  4. T-Shirt Follies  - Washington D.C. $2600 meeting problems and harassment wearing a $2600 T-shirts, by The Roach
  5. Macintosh Key Capturing  - Source code for a Mac keystroke recorder, by Swarthy
  6. Just Say No  - Build a "NO-Box" which is like an improved "gold box" (switchable second line), by Hudson
  7. COCOT Experimenter's Resource Guide  - Very detailed guide to various technical details about COCOT phones, by Dastar Corn
  8. Letters  - Language is a Virus From Outer Space
    • Harassment  - African Herbsman (Lexington, Kentucky), Roger Blake, Little Alex (Michigan), sam (Berkeley), Fast Lover (Houston, TX)
    • Information  - Ether, Dali Lamer, Curious and Anonymous (Los Angeles, CA), pbixby, Matthew Kassin, FkPigMan (Pittsburgh, PA)
    • Telco Brains  - Neo Zeed of 201, TTJ
    • Article Feedback  - (none given), Rokket Man, LACR01X, Bloodshot (Mt. Vernon, NY)
    • Numbers and Addresses  - McPhrie, Veg
    • Censorship  - Disgusted
    • Discovery  - Katfish
    • Wanted  - Nameless
    • Mac Infiltration  - Maud'Dib (Silicon Pirates)
    • On Diverters  - MASTER JSW, Anakin
    • ATM Fun  - The Final Chasm, ATM Dude
    • Advice  - Law Hack (Los Angeles, CA)
    • Causing Confusion  - tfg
    • Fear of Subscribing  - John Doe
    • Yet More Bookstore Fun  - John Lowe (Memphis, TN), Ford
    • German Payphones  - THX-1138 (Raleigh, NC)
    • HOPE Repercussions  - Mr. Pink (San Marcus, CA)

  9. Mutation Engine Demystified  - Understanding virus mutation code, by Tio Mate Jones
  10. ISDN Overview  - Technical overview of ISDN services, by Roger Harrison
  11. DTMF Decoder Review  - Review of a MoTron TM-16A+ DTMF decoder, by Blue Whale
  12. Hacking a Police Interrogation  - Tips on surviving a police interrogation, by Darlo Okasi  (Page 2)
  13. 2600 Marketplace
  14. Breaking Windows 2  - Defeating Windows screen saver passwords, by Bisect Skull Gas
  15. Movie Reviews: The Net and Hackers  - Movie reviews of The Net and Hackers, by Evil Corley and Thee Joker (Jason)  (Hackers Transcript)
  16. 2600 Meetings

  $2600 Magazine - Volume 12, Number 4 (Winter 1995-1996)

  1. Speech Control  - Editorial
  2. What Happens on the AT&T Side  - AT&T long-distance operator info, by Crash 24601
  3. AOL Censored Wordlist  - AOL internal memo for rules on the use of certain words.
  4. News Updates
  5. A Spoofing Odyssey  - How jsz, Shade, Len Rose?, and others on #hack used Robert T. Morris' IP spoofing vulnerability to attack Shimomura's system for Kevin Mitnick, by Gregory Gilliss
  6. Infiltrating Disney  - Very inaccurate Disney World secrets, by Dr. Delam
  7. Sniffing Ethernet  - Overview of DOS utilities for monitoring Ethernet traffic, by Veg
  8. Bypassing DOS/Windows Security  - How to bypass the security on DOS/Windows machines, by Case
  9. Understanding VeriFone Machines  - VeriFone machine info, by Dr. No
  10. Pakistani Phones  - Info on the Pakistani phone system, by The Shepherd
  11. Letters  - Thoughts of the Reader
    • Fraid Not  - madh, Avi Drissman (Farmington Hills, MI)
    • Questions  - Psycho, Proteus (Babylon, NY)
    • Clarification  - Lucas, Fastchrlie
    • The Master Plan  - The Silicon Phoenix/810
    • Words of Thanks  - Lady Penelope (London, England), Checkerboard Phox (Kevin Phillips, Memphis, TN), SLUMBRBAK of the forest, Joel (Orange County, CA)
    • Mac Trix  - The Invincible in MD, Equant (Tucson, AZ)
    • Privacy Regained  - DayEight, Jerry
    • Of ANACs and ANIs  - Kevin (Memphis, TN), Percival
    • Viral Stuff  - Problematic 29
    • Brazilian Hackers  - kazi (Brazil)
    • The Truth About Mitnick  - Daniel
    • On Bernie S.  - King B, Data Recall
    • Possible Warning  - J.R.
    • AOL Hell  - Mark
    • Destruction and Theft  - TD, LIG (Life is Good)
    • Hacker Perceptions  - se7en (Christian Valor, San Francisco, CA)
    • Answers  - Bell Buddah
    • Speech Confinement  - angchay twenty-fidy
    • Bookstore Stories  - Harmony, MRB (Boca Raton, FL)
    • Standing Up  - Feyd, Tunnel Vision
    • Pet Peeves  - Stickman, Hacked, Cracked, and Phracked
    • Shocking News  - GoatBoy
    • Back Pack Hack  - The Cat's Meow
    • Problem Stealing Money  - Riddler
    • Contacts Wanted  - Joey Jay Weinman (Texarkana, TX)
    • Info  - David Smith (Las Vegas, NV), CMS (Santa Rosa, CA)
    • Opening Doors  - The Laughing Cow

  12. .COM File Infecter  - Source code to a .COM file infecter, by Impending Dhoom
  13. Understanding the Hacker  - Editorial, by Bootleg
  14. Scanning Space  - Military satellite, NASA, and Air Force radio frequencies, by The Majik Man
  15. AOL Syndrome  - Using AOL's FTP space to host files via HTTP, by Kris
  16. 2600 Marketplace
  17. Hacking NetWare  - Hacking Novell NetWare, by Trap
  18. Cashing in on Mitnick: The Fugitive Game  - Oh, the irony!!!  Book reviews of Jonathan Littman's The Fugitive Game and Tsutomu Shimomura's Takedown, by Scott Skinner
  19. 2600 Meetings

  $2600 Magazine - Volume 13, Number 1 (Spring 1996)

  1. Caught in the Web  - Editorial
  2. Tap Alert  - Simple phone tap detector, by No Comment and Crash Test Idiot  (Text)
  3. A Page of Revenge  - Pager demon dialer ideas for Quick Basic, by Big Lou
  4. Unshredding the Evidence  - How to unshred paper evidence, by Datum Fluvius
  5. Confessions of a Beige Boxer  - Funny story, by RedBoxChiliPepper (Brad Carter, MySpace)
  6. Macs at Ease  - Bypassing AtEase on school Macintosh computers, by Loogie
  7. Sharp Cash Trix  - Sharp ER-3100 cash register information and how to open the cash drawer, by Dennis Fiery (Knightmare)
  8. Hacking Doors  - Apartment telephone security system holes and intercepting their DTMF codes, by Clark W. Griswald
  9. Hacking Caller ID Boxes  - Extend the memory on caller ID boxes, by Dave Mathews (Dallas, TX)
  10. The Alaskan Phone System  - Info on the phone system in Alaska with a hacker point-of-view, by Ice
  11. Avoiding Suspicion  - How to avoid looking and acting suspicious, by -Me
  12. Letters  - Where the Letters Are
    • Opening More Doors  - RB (San Francisco, CA)
    • Eastern Europeans  - Hrvoje Vukovic (Croatia)
    • ANAC Change  - woodrat
    • Points on Interrogation  - The Prophet, System Default, Robin Scurr (White Lake, MI)
    • Bernie S. Fallout  - Name Withheld, Mike W., TcP (Denver, CO), Mario (Canada), Adam Schoenfeld
    • Military Miscellany  - Cockroach, Disappointed in our Government
    • Spanish ANI  - The Mad Tapper (Ringwood, IL)
    • Cellular Prisoner  - Jeremy G. Cushing (Alphabits, Arrest Info)
    • Highway Weirdness  - Jus Jizzen (Phoenix, AZ), King Otar
    • Meeting Questions  - Joshua, Skywarp (London, U.K.), Frank M.
    • Info  - anonymous, PhreakHolio (Colorado Springs, CO), The Mighty Pantharen (N. Vancouver, Canada)
    • Corrections  - b00da (Philadelphia, PA)
    • Reality?  - Meth
    • Radio Shack Fun  - Biohazard
    • Unfriendly Payphones  - Michael H.
    • Questions  - NeVeR \FluX/, M
    • The Winter Cover  - Christian (Germany), Dereks, fuLcrum (Miami, FL)
    • Fun On Planes  - Particle Man (203)
    • Repression and Hackers  - Brian Martin (Australia)
    • AOL Hell  - YUKYUK
    • Credentials on Credentials  - Gebby
    • Crippled 911  - Ben Stock
    • Disney Critique  - Michele Warner, The Imagineer
    • An Edward A. Smith Theory  - some guy
    • Cincinnati Bell Nightmare  - Mr iNSaNiTY
    • Understanding the Hacker  - Sevangels
    • 56K ISDN Link  - ThePawn (New Jersey)
    • Netware Nonsense  - Gandolf
    • Words of Praise  - The Cyber Hitchhiker
    • Words of Shame  - E.W.L., Dr. No

  13. Motorola Cellular Guide  - Motorola cellular phone information, by Mike Larsen
  14. 2600 Marketplace  - CAP'N CRUNCH WHISTLES. Brand new, only a few left
  15. Hackers '95 Review  - Review of Phon-E and R.F. Burns' film Hackers '95, by Blue Whale
  16. 2600 Meetings

  $2600 Magazine - Volume 13, Number 2 (Summer 1996)

  1. Guided Perceptions  - Editorial
  2. Flood Warning  - SYN flood code for IP spoofing or denial-of-service attacks, by Jason Fairlane
  3. Scanning Australia  - Toll-free carrier scan (0014-800-12[456]-XXXX) for Australia, by Comhack International
  4. Imaginary Friends  - Getting phone service with fake ID by supplying the credit bureaus (TRW, Equifax, etc.) with false information, by Frog
  5. A Tale of Two Cities  - Overview of the telephone system in Sarajevo, by Dr. Kolos
  6. How to Create Encryption  - Overview of creating your own software (DOS) encryption tips, by TheCrow  (Jack Mott, Greenwich, Connecticut)
  7. Secret Codes  - PowerBASIC script for communicating in secret, by Mister Galaxy
  8. Consumer Hazards  - Online shopping security and how to protect your credit card info, by Mr. Natural
  9. RCONSOLE Hacking  - How to extract Novell RCONSOLE passwords from packet sniffer logs to gain access to NetWare's server console, by Simple Nomad (Mark Loveless)
  10. Letters  - The Search for Extraterrestrial Letters
    • Clueless Mac Users  - Z (Sacramento, CA)
    • Clueless IBM People  - Starz N Strifez
    • Clueless Idiots  - EliTe ProTocOl
    • Finding 2600  - DavesDead (Hoboken, NJ)
    • And very very Grateful  - s6killer (Corpus Christi, TX), I Gate
    • Inspirational Speech  - Bottomless
    • Secret Service Reactions  - Active Matrix, Captain Hook (Sacramento, CA)
    • Fun Numbers  - Cache $$$ (Boston, MA) Scott, Vitamin X (Bethlehem, NH), TRON (Santa Rosa, CA)
    • Hiding Files  - Greg Guerin (Mesa, AZ), Flatliner
    • Phone Card Hacking  - Uri (Jerusalem, Israel)
    • Stupid Questions  - ben
    • Pirate Radio  - CrIcKeT
    • Privacy Invasion  - hell-boy, Raymond
    • Hidden TV Worlds  - Airwolf (Minnesota)
    • The Truth Revealed  - The Propagandist, I.M. Free (Milwaukee, WI)
    • Eyes in the Sky  - Tek
    • AOL Purgatory  - RazorBack
    • Warnings  - Max, F (Denver, CO)
    • PSI Horrors  - Space Shot
    • Info Wanted  - Raul (Houston, TX)
    • The Marketplace  - The Omega Man (Austin, TX)
    • People Tagging  - Druid, D.Q. (Stamford, CT)
    • Danger on the Highway  - Waxan Dwane (New Jersey)
    • Prisoners  - Jon R. Spatz (Pottsville, PA), Zero

  11. 2600 Marketplace
  12. FlightLink Fun  - Continental Airlines' FlightLink computer information, which is a computer on the back of each seat capable of accessing the Internet, sending a fax, check stock quotes, and playing computer games by TDi
  13. NYNEX Regression  - Smart payphone problems in New York City, by Rebel
  14. Starting a Hacker Scene  - How to start a local hacker scene, by Derneval
  15. And Justice for All  - Transcript of the Edware E. Cummings (Bernie S.) sentencing from March 5, 1996.
  16. 2600 Meetings

  $2600 Magazine - Volume 13, Number 3 (Fall 1996)

  1. Fallout  - Editorial
  2. Searches and Arrests  - Your rights during a search or arrest, by Keyser Soze  (Page 2)
  3. Hacking the SCC OS  - Hacking tips for the SCC business management software (not the telco system), by D-Day
  4. Security Through the Mouse  - Bypass keystoke recording with this clever program which allows mouse clicks in your password, by Steve Rives  (Email)
  5. Brazilian Phone System  - Overview of the landline and cellular phone systems in Brazil, by Derneval
  6. The Dial Pulser  - Turbo BASIC code for a 2600 Hz single-frequency pulser (a.k.a. Captain Crunch whistle), by Golem of Sprague
  7. GI CFT2200 Power Box  - Overview of the General Instrument CFT2200 cable box, by Active Matrix
  8. GTE Voice Prompts  - Codes to generate each of the voice recordings, by Chillin' Bit Boy
  9. HP LX200  - Hacking with the HP LX200 portable computer, by PsychoWeasel
  10. Maximum WOW!  - Compuserve nation-wide PPP Internet service information, by Kris
  11. Hack Your High School  - Tips for hacking your school's computer, by DayEight  (Ryan Stevens)
  12. Federal BBSes  - Government BBSes, by Anonymous
  13. Hacking the SR1000 PBX  - Hacking the Cortelco SR1000 PBX system, by maldoror
  14. Building the Cheese Box  - Build a phone line diverter box using a Parallax BASIC Stamp, by Thomas Icom
  15. Letters  - Going Totally Postal
    • The Cincinnati Nightmare  - Craig A. Finseth, Judicator of DC, Mickle, Feanor (Fargo), Benjamin (New Jersey)
    • 2600 Groups  - Michael J. C. G., The Rippa
    • Airplanes  - Bishop (Maple Ridge, British Columbia))
    • That Question Again  - Jimp
    • Phone Shutdown  - PyroLite (Barry Bowling)
    • Corrections  - Cannibal
    • Boat News  - Phillip Phlop
    • Mac Hiding  - Josh M. McKee (Corvallis, Oregon)
    • Submission  - SN0WBLiND
    • Numbers  - foX mulder, Shadowdancer, cybersurfer, Ruthless Dictator, rolando rojas
    • Mystery Computer  - cookiesnatcher
    • Novell Hacking  - Dusty
    • Security Concern  - Ginchy
    • Canceling AOL  - Eribake
    • NSA Tracking  - Montauk
    • The Red Box Issue  - Cesar, Rev. Doktor S-bo (Steve Johnston), mthed
    • Malfunction  - Vader187
    • Off The Hook  - Mr. B.
    • Free Communication  - MA
    • Words of Thanks  - C.S Spankford (Seattle, Washington), DFW
    • Applying Knowledge  - Dr. Bob (Dr. Bob Testen, Germantown, MD)
    • Coin Collection  - Anonymous
    • Trouble  - alien13
    • On The Inside  - Cpt. Kirk
    • Retail Madness  - Jamez Bond
    • Update  - MRGALAXY
    • Suspicion  - Redial
    • Videotext  - MLiq
    • Chip Implants  - OddBall
    • Hacker Defense  - Charr
    • Battling *69  - Ty Osborn
    • Cash Registers  - Spydir Man (Phoenix, AZ)
    • Disney Facts  - Line Noise (Orlando, FL)
    • Crazy Phone  - PoT-UsA
    • Paranoia  - Ben (Wichita, KS)

  16. Spoofing Cellular Service  - Overview of cellular ESN cloning, by Baxlyder
  17. Reprogramming Data  - NAM programming info for various Autovox cellular phones, by JS
  18. The Weird World of AOL  - Various AOL Terms of Service violations
  19. 2600 Marketplace
  20. PHF Exploit  - Using the infamous Apache PHF web server exploit, by fencer
  21. 2600 Meetings

  $2600 Magazine - Volume 13, Number 4 (Winter 1996-1997)

  1. Knowledge is Strength  - Editorial
  2. Toward More Secrets  - Info on today's cryptography, by Seraf  (Dominick LaTrappe)
  3. Backcountry Phones  - Info on rural phone systems, Optaphones, by Equant  (Nathan Hendler, Tucson, AZ)
  4. Chipcards Explained  - Detailed information on chipcards, by BillSF  (Page 2, Page 3, Page 4, Page 5, Page 6)
  5. Biggest Mac Mistakes  - Securing Mac computer networks, by The Guy Who Was In Craig Neidorf's Spanish Class And Had No Idea
  6. Craft Access Terminal  - Info on outside plant Craft Access Terminals and the Craft Access System, by Local Loop
  7. Cracking askSam  - How to bypass askSam database password protection, by Datum Fluvius  (Missing Table)
  8. Snooping via MS-Mail  - Snoop on email using MS-Mail, by Schlork
  9. Letters  - Your Letter Could Be Here
    • The Ruling Class  - Socrates, Josh (Abilene, TX), Hype (Mississippi)
    • Folklore  - Wussfish
    • Finding People  - Asmodeus (McKinney, TX)
    • Info Needed  - Jorge (Uruguay), Geert (Holland), DoubleZeroOne (Texas), Yosemite Sam
    • Encryption  - Data Stream, Azazel, Anonymous, WinSocker
    • Questions  - thedespised, Merlin (Anchorage, AK)
    • Holes  - charr (Atlanta, GA)
    • On Cluelessness  - Zyklon B
    • Observations  - Dr. Delam, xphreak, Desaparecido (San Francisco, CA), NG (New Jersey), Ammon, Rosey (Canada), president@whorehouse.gov, CF (Alameda, CA)
    • New Stuff  - xorsystm (Eric), TheFetish To Heresy
    • Numbers  - sisifis (Illinois), Captain Video, Michael (Germany)
    • Corporate Hacking  - Jack Stuart
    • A Word of SYN  - meem, George
    • Oops  - Gordon
    • More FlightLink Facts  - +universal cytixn+
    • Bernie S. Thoughts  - Kevin
    • Our Hypocrisy  - Sean Emerson (Goleta, CA)
    • Upgrade  - MRGALAXY
    • A Freer Juno  - phunhertz
    • Cable Notes  - Platypus Man
    • Gambling Hack  - Guz
    • PHF Exploit  - Astraea
    • Monopolistic Motion  - (orbital) (Nashville, TN)
    • A Fun Federal Story  - love 357
    • Disturbing News  - Rich D.
    • Porn Sting Update  - BD (Denver, CO)
    • NYNEX Neighbor Problems  - Guard of the Gate (Massachusetts)

  10. Subscriber Network Interfaces  - Info on telephone network interfaces, by Frequency Man (FreqMan)
  11. Unfriendly Numbers  - List of 800-numbers that charge, by Secret Squirrel (Michael Jacobus)
  12. How to Steal Things  - How to steal stuff, by Ted Perver (J.J. Styles [a.k.a. 0ptiKal ilusioN, a.k.a. Zot the Avenger])
  13. Social Engineering via Video  - Use video tools and techniques to social engineer information, by Bernz  (David Noah Bernick, Email #2)
  14. 2600 Marketplace
  15. Defeating the W95 Screen Saver  - How to extract a Windows 95 screen saver password, by rdpzza
  16. Book Review: Anarchy Online  - Review of Charles Platt's book Anarchy Online, by Scott Skinner
  17. 2600 Meetings

  $2600 Magazine - Volume 14, Number 1 (Spring 1997)

  1. Enough is Enough  - Editorial
  2. Hacking LED Signs  - How to hack those scrolling LED signs, by Bernie S.
  3. Use Your Skills to Escape Boot Camp  - How to get out of boot camp, by InVerse
  4. Poor Man's Access  - Provides remote shell access on UNIX servers, by GT
  5. Consequences of .GOV/.MIL Hacking  - What happens when you hack .gov/.mil sites, by Chocolate Phoetus
  6. More PHF Fun  - Script to search for the Apache PHF exploit, by ChezeHead
  7. Credit Card Numbers via Calculators  - How to generate credit card numbers on a TI-82 calculator, by DETHMaster (Jesse Curry)
  8. Paper Evidence  - How to properly destroy paper evidence, by F. Leader
  9. Cellular Programming Data  - More CT-352/3, CP-170, Technophone 901, CT-100/101/200/201, EZ400 NAM programming notes, by Threc (Dustin Darcy)
  10. Downsizing Insurance  - How to avoid being fired and collecting "payback" data, by Hans Gegen
  11. Letters  - Letters That Don't Suck
    • Dealing With Parents  - edoban, FEENIX aka The Ebola Virus, fordyman, Ace Lightning
    • Subscribing vs. Newsstands  - jetman
    • A Real Clever Trick  - ameba
    • Tale of Woe  - Jeff
    • Number Fun  - CIA, Darkman, Saiine, CrACKeD (Tucson, AZ), BStone, JN, Rokket Man
    • Technological Marvels  - Phreakner
    • Big Brother  - Wes "Holodoc" Mills
    • Frequencies  - Desaparecido (Bryan Robert Cowan, Sacramento, CA, DOB: 11-27-1974)
    • School Terror  - Socrates
    • Exciting Updates  - sw, Josh M. McKee
    • Bernie S. Feedback  - CYBERJE, POEE Chaplin (J. Weiss), Armitage Shanks, MBG
    • Video Boxing  - =NSNiPER=, NeoCzar, Pyrojax (ShwaG)
    • Exorcising AOL  - Sevangels
    • Newbies  - ZeBoK, OpieX
    • PHF Findings  - Zeed
    • Web Reaction  - KH, Anonymous
    • Submitting Stuff  - (i), Jack T. Dragon
    • 2600 Name Dispute  - Mr. Kiddie Pr0n
    • 2600 Sells Out  - Brain Child
    • Cable/Web Thoughts  - Eli the Bearded
    • Praise  - sgtpepper
    • More on Disney  - Moonpanther, GB (Georgia)
    • Cellular Spoofing  - WinterMute
    • Implants  - /dev/null
    • More on the Mystery Computer  - Viral Messiah (Mike, Jamestown, KY)
    • Credit Fraud  - scrap
    • Bookstore News  - Phun and Gamez (Emporia, KS), /dev/thug
    • On Stealing Things  - Artifice, charr (Atlanta, GA), Dorsey Morrow, Jr.
    • Mischief in the Subway  - Madeagle
    • Psychic Rip-Off  - DT
    • Radio Show Online  - Zaph32 (Dallas, TX)
    • One For Kevin  - Venshea, MD
    • Inspiration  - SodaPhish (Corey J. Steele)
    • Phone Weirdness  - grim, Procell
    • 2600 Meeting Mishaps  - Cesaro (Toronto, Canada), Crumb (Buffalo, NY)
    • Military Hacker  - Mainframe
    • Punctuation Problems  - Niel Ians
    • Mac Hiding  - Total Idiot
    • The Other Side  - (unreadable signature on a fax)
    • Evil Ex Strikes Hacker  - MANOWAR (Orangeville, Ontario, Canada)
    • Serious Concerns  - Shadodin

  12. How to Hack Tech Support  - How to talk on the phone, by Dennis Fiery (Knightmare)
  13. Letter from Prison  - Letter from Agent Steal
  14. The Other Kevin Book  - Book review of Jonathan Littman's The Watchman, by Noam Chomski
  15. 2600 Marketplace
  16. How to Legally Use a Red Box  - Use the audio tone output of a Red Box to control things, by Kingpin
  17. 2600 Meetings

  $2600 Magazine - Volume 14, Number 2 (Summer 1997)

  1. The Neverending Story  - Editorial
  2. Cable Modem Security Holes  - Monitoring cable modem traffic, by Sciri  (Sean Sosik-Hamor, Twitter, Pelham, New Hampshire)
  3. GSM Comes to North America  - Detailed overview of the GSM cellular phone system, by Phiber Optik  (Mark Abene, Elmhurst, NY)
  4. The Wonders of Net2Phone  - How to use Net2Phone, by tersIan
  5. Those Pesky Mylar Strips  - Info on the Mylar strips in currency, by Dave Mathews
  6. Fortezza: The Next Clipper?  - Sensational overview of a new encryption protocol, by Seraf
  7. Fast-Food Phun  - Harassing fast food drive-thru operators, by VaxBuster (Bio)
  8. Tricks and Treats of the AUTOVON  - How to use AUTOVON, by N-Tolerant
  9. Omnipoint in New York City  - List of Omnipoint cell sites in NY, by Syringe
  10. Letters  - Lucky Letters
    • Injustices  - The Hemroid, Kurt, Hellnite, Anonymous (Ocala, FL), X-Ion Noize
    • Numbers  - Josh, Memory Overflow, No Name, Joe Mama, Mindkiller, Legba, Saab, No Name, Ted Merriman
    • Off The Hook  - Brendon
    • Commentary  - YT
    • Social Engineering  - IFP (Iowa), Privacy Freak in MI, KpTone
    • Defaming Our Good Name  - greg
    • Info  - RBCP
    • Meetings  - Anonymous (New Jersey), The Hunter, Syphon Siege (Buffalo, NY), Low Tek (Rick Merced, CNN Interview, Atlanta, GA)
    • Hacked Web Sites  - Boris
    • Mystery  - wire fatigue
    • The AOL People  - Magus, Viral Tonic (Response)
    • The AOL Rules  - JediHamster (Xander)
    • How Dare You  - Fraas
    • More School Stupidity  - bryan
    • The Decline of 2600  - pokis
    • An Australian Nightmare  - Cochrane
    • Corrections  - BillSF, Kaptain Kangaroo
    • LED Sign Update  - Da Findler Man
    • Spy Hacking  - S
    • Clueless  - Bear
    • Hopeless  - Nameless
    • Pointless  - Rhyme-Chai
    • COCOT Mysteries  - Cheeto
    • Phone Tapping  - Mwaahh
    • Condoning Fraud  - the trailer park hero
    • Thanks for the Virus  - MiSguiDeD
    • Dangerous Info  - Tim Leary
    • Arcade Facts  - James R. Twine
    • Don't Steal Us  - ISP Sales Snake
    • Supervised Release Hell  - Minor Threat (Chris Lamprecht, Austin, TX))
    • Cellular Call Trace  - KOADALAN
    • The Mitnick Case  - TC (Ft. Leavenworth, KS)

  11. Defeating HTTP Access Control  - How to defeat web blocking, by Ryan (Ryan Nelson)
  12. The Ins-and-Outs of MetroCard Gold  - Technical details of the MetroCard system, by blueski-mask and the wrapper  (Page 2)
  13. 2600 Marketplace
  14. News Summary
  15. 2600 Meetings

  $2600 Magazine - Volume 14, Number 3 (Fall 1997)

  1. Sobering Facts  - Editorial
  2. Busted! A Complete Guide to Getting Caught  - What to do if you are busted by the feds, by Agent Steal (Contributions and editing by Minor Threat [Chris Lamprecht])
  3. Hacking FedEx  - Overview of FedEx computer systems and security (The Beast = SecurID), by PhranSyS Drak3 (Brian Taylor)
  4. Defeating *67 With Omnipoint  - Defeat caller ID blocking using the Omnipoint GSM network, by TtJ
  5. How to be a Real Dick on IRC  - Hacking and taking over IRC channels, by semiobeing
  6. Brute Forcing the World  - Ideas for brute-force password hacking, by ChezeHead
  7. Hacking the Vote  - Potential voting holes and loopholes, by A-Napa Candidate
  8. The E-ZPass System  - Overview of the E-ZPass toll pass system, by Big Brother
  9. Letters  - We Printed Your Letter!
    • True Hacking  - banaker
    • Fun At Barnes & Noble  - Black Jaguar, anonymous, Barnes & Noble Financial Center (Westbury, New York)
    • Righteous Hacking  - Bomber Chick, Katfish
    • Replies  - Imran Ahmed a.k.a. Eric Blair, kingpin, Deranged
    • A Challenge  - Clive
    • Questions  - StLSD2000, Phracture, scott, CP
    • The End?  - Ripped Off by NYNEX
    • Critic's Corner  - sTs, Orion, TC (Fort Leavenworth, KS)
    • Mitnick Fallout  - Phip-C, DM & NightShadow, fiNrod (Montgomery, AL)
    • Circuitry  - Crampet
    • Suggestions  - Steven, sb
    • Problems  - [Name Obliterated], MaRTiAs, sryob
    • Improvements  - Mutter
    • Numbers  - Ydeologi (Marshall Votta), DJinOK, A., Spillage (Orange, CT), Mwaaah, Jonny Deth
    • Uh Oh  - josmo
    • Fixing Juno  - BuPhoo, cap.n_crack
    • Offended  - Absinthia Vibrato
    • Notes From The Military  - Jungle Bob
    • For The Record  - The *REAL* NeoCzar
    • Meeting Problems  - CW Extreme, Flipliquid, Checkmate
    • Beyond Hope Aftermath  - mattj, D.
    • IRC Woe  - havok
    • USA Still #1  - elw00d
    • Gee Whiz  - Adam768L and Da Violator
    • Singapore Connection  - Joe a.k.a. DaemonX
    • Free Video Games  - PaulT
    • Clarification  - Ether Bunny, TheEtch
    • PCS Mystery  - Matt D.

  10. 2600 Marketplace
  11. News Summary
  12. Secrets of Walmart  - Overview of a Walmart phone systems and the different extensions, by Pirho  (Gregory Jones, New York, New York, MySpace)
  13. 2600 Meetings

  $2600 Magazine - Volume 14, Number 4 (Winter 1997-1998)

  1. Remember the Future  - Editorial
  2. Your Very Own Backhoe  - Perl script to create a backdoor daemon which copies a root shell into /tmp, by miff
  3. The Medical Information Bureau  - Getting medical information from insurance companies, by Crash 24601 (Matt D. Cox)
  4. Some 800-555 Fun  - 800-555 carrier scan, by PorT666 and ChaosMakeR InC.
  5. TCP/IP Basics and Shortcomings  - Overview of TCP/IP and some potential vulnerabilities, by Nathan Dorfman
  6. The Ominous GETS  - Overview of the Government Emergency Telecommunication Service (GETS)
  7. The Potential of Mobil Speedpass  - Info and dissection of a Mobil Speedpass card, by A.M.
  8. Telco/Government Cooperations  - How the government gets a wiretap warrant, by Mr. Opossum  (Page 2)
  9. How to Get Away With Things on GeoCities  - How to hide files on GeoCities to bypass their restrictions, by Champ77 (Website)
  10. The Argentinian Phone System  - Info on the phone system in Argentina, by Derneval (Derneval R. Rodrigues, Brazil)
  11. How to Hack a Virtual Pet  - How to hack and experiment with "virtual" pets, by MiLtRoNi
  12. Letters  - Letters to Captivate You
    • Criminal Advice  - Mr. Swervon (Michigan)
    • Newbie Advice  - Vic Sinclair, Spekter (Atlanta, GA)
    • Defining Our Purpose  - Dominus Omniae, Joe A
    • Getting Caught  - onyxfr0g, RM
    • Equal Access  - No Name No City Please
    • Questions  - Night Words, Silicon Mage, T.C.
    • New Facts  - Virtu-Al, Somewhere in Maryland
    • Help Needed  - Head-aches in Arlington, kyle, Jakob14246463526390210, JR
    • Next Letter  - Kurt
    • Reactions  - The Mad Hacker, Lee, phreakout, Tp, H.M. Murdock (Pennsylvania), Archmage, Nathan, John b Cannon, joshua, Anonymous, Austin, Citrus, phil, Hernan (Brazil), Seraf, Nitron
    • Croatian Hacking  - Electrik Monk, Anonymous
    • Critique  - DS
    • Meetings  - xxxxxx, The Phrkman and Cybrthuug (Lewisville, TX)
    • Boston Transit  - Anonymous in Boston
    • Norwegian Payphones  - Jostein Nygaard (Norway)
    • Information  - Dr.Seuss, Eric Albert
    • Criminal Actions  - Dan
    • Canadian Stuff  - dj.tazz@earthling.net (Canada), Members of RoK, Jim S [416] (Canada)
    • Access Problems  - MuSo (Florida)
    • Words on Cable Modems  - William
    • Suggestion  - Jim
    • Military Recruits  - Mortis, ToxicShock
    • The Anarchy Debate  - TDecius
    • Miscellaneous Feedback  - Boanne
    • Apology  - DETHMaster, Roy Haskins

  13. Spying on Yahoo  - 1,000 random Yahoo! search strings captured via a security hole
  14. Hack Your Head  - Overview of legal stimulants and drugs, by Met-Enkeph (Evan Eveland)
  15. Noggin Cracking  - Cracking software without any tools and just using your brain, by Fidel Castro
  16. Sun's Nasty Little List  - Sun Microsystem's "Denied and Restricted Parties List" (i.e. no sales) list  (Page 2, Page 3)
  17. 2600 Marketplace
  18. 2600 Meetings

  $2600 Magazine - Volume 15, Number 1 (Spring 1998)

  1. Message Sent  - Editorial
  2. The Defense Switched Network  - Info on the Defense Switched Network, by DataStorm
  3. More on Military Phones  - Info on military phone systems, by Archive
  4. The Mysteries of SIPRNET  - Overview of the Secure Internet Protocol Router (SIPR) network, by the Ruiner (Ian Reddy, Canada)
  5. ANI2 - The Adventure Continues  - Automatic Number Identification (ANI) II digits are two-digit pairs sent with the originating telephone number.  These digits identify the type of originating station, by vandal
  6. Eggdropping  - How IRC eggdrops work, by Tempest  (Partial)
  7. Naming Exchanges  - How old phone exchanges were named, by Jeff Vorzimmer (Texas)
  8. Hack the Hardware  - Hacking SuperStack hubs, by Sadena Meti (David Emiley)
  9. Day of the Office Assault  - Office pranks, by MRGALAXY
  10. Defeating CyberPatrol  - How to bypass CyberPatrol, by Franz Kafka
  11. CGI Flaws  - Security flaws in CGI scripts, by Friedo (Mike Friedman)
  12. A Brief History of Postal Hacking  - Funny (spoof?) history of trying to mail for free, by Alien Time Agent, Seraf, and Waldo
  13. Letters
    • Plea For Help  - Sly
    • Infos  - PhatKat, Packrat, anonymous, MR, D-Recz, Super Sharp Shooter (Ottawa, Canada), skwp, Chris (d7), Rev. Smoov
    • Finances  - AcidHawk, Tuxedo Mask (Aaron, Ciba Mamoru, Phoenix, AZ)
    • Arcade Memories  - Semaj31273 (James R. Twine, Goffstown, New Hampshire)
    • Random Questions  - Tim, zuggy, Dave, Meglomaniac, SaLT, Phreakin in Phoenix, boardfreak, ALC, The Computer Junkie
    • A Big Misprint  - Sith
    • More Newbie Bitching  - PaKo, Jade
    • Clarifications  - James S. Kaplan (KG7FU), philosopher, Christos Paraskeyopoulos (Christos Paraskevopoulos?)
    • Criticism  - Ultra Sonic, KnIgHtMaRe
    • More on Anarchists  - MALICO
    • AOL People  - Khan SW, JJ (Johnny Blaze)
    • Facts  - Allin, Donoli, Anonymous, codefreez (Eric, Mountain View, CA)
    • Independent Browsing  - VirtualToaster (Merritt Burrus, MySpace)
    • Bookstore Computers  - Ranma, Istra
    • Clampdown  - Greythorne The Technomancer
    • More IRC Abuse  - Calis
    • On Mitnick  - candyman, Silicon Mage (Neufeld)
    • Posers  - TDK (Urbana, IL)
    • 800 Fun  - FoNeCoRd
    • Military Insight  - I3ullseye (Dave Maynor, Spokane, Washington), annsan
    • Encryption and the US  - A member of the TMC  (Note:  The Canadian government is filled with spies)
    • Hassles  - Anonymous, tennis ball, Resol Etile
    • More Privacy Lost  - mix
    • Wow  - zigzag
    • Suggestion  - soldado
    • Weirdness  - Anonymous
    • New Meetings  - I)ruid (Forth Worth, TX)
    • Drugs  - informagnet, Dr. S
    • Cable Modem Facts  - TyPEsCAN

  14. Hacking a BBS with DOS  - BBS security, by Section8
  15. How to Get the Better of Best Buy  - Best Buy computer network info, by Mbuna
  16. Setting up UNIX Trapdoors  - How to hide your entry on UNIX systems, by Nathan Dorfman (Email #2)
  17. 2600 Marketplace
  18. Not a Secret  - Military can't figure out DOS
  19. News Update
  20. 2600 Meetings

  $2600 Magazine - Volume 15, Number 2 (Summer 1998)

  1. Lies  - Editorial
  2. Where Long-Distance Charges Come From  - Detailed tabulation of where long-distance phone charges come from, by The Prophet (Babu Mengelepouti)
  3. Facts About Cable Modems  - Technical info on cable ISPs and modems, by jeremy
  4. What is ICA?  - Overview of the Citrix Independent Computing Architecture thin-client protocol, by Democritus "Father of Materialism"
  5. A Newbie Guide to NT4.0  - Beginner guide to Windows NT 4.0, by Konceptor
  6. Build a Modem Diverter  - Divert an incoming modem line to another line, by digital/Digital
  7. The Tyranny of Project LUCID  - Info on Advanced Technologies' LUCID "international justice" computer system, by Tom Modern
  8. Hacking Lasertag  - Hacking the LaserStorm games, by johnk
  9. Fun With Java  - Playing around with JavaScript, by Ray Dios Haque
  10. Millennium Payphones  - Overview of Nortel Millennium payphones, by Phluck
  11. How to Hack Your ISP  - Overview of some basic UNIX security and exploits, by Krellis
  12. Gameguru Hacking  - How to hack the demo copy of Game Guru, by Axon
  13. Letters
    • Questions  - Payphone, reid, Anonymous in Minnesota, Callme Ishmael, kris, Bendzick, PbH, Asher
    • Newsstand Update  - Javelin, John Doe
    • Meetings  - twisted circuits, Flash, Dr. Doolittle
    • Disturbing News  - Ruiner (New Times BBS), M Davis a.k.a. SemiSpy
    • Online Idiots  - Dave, The Informant
    • Software Concerns  - Schrooner, Greyhare
    • Random Info  - Luke, Allin, SilverStream, FIXatioN, Mark Iannucci, Soul Implosion, phiberphit, Desaparecido, Flinx, skwp, Citrus, Mastery
    • More Fun In Stores  - Corvi42 (Trisan Nixon, Toronto, Ontario), Carole
    • 2600 Problems  - Kevin Brown, Eric B. AKA Flyable George, SYCO, Dave Kiddell, Catt, Disappointed
    • Comments  - Dr. Psycho, JJ
    • Pleasantries?  - DramaDame, Briareos
    • Mitnick  - klineline, *69, ed
    • Head Hacking Advice  - Malico, kevin g
    • Clarification  - Atrifix (Matt Atrifix), K. Ruff
    • Bookstore Monopolies  - R.J. Eleven
    • Credit Due  - Nothingg
    • Phone Exchange History  - Stealth Ricochete
    • A Suggestion  - F.E.D.-D.E.F.
    • The Generation Gap  - curtis in cali
    • More on FYROM  - MJ Mastermind (Athens, Greece)
    • A Nagging Question  - Trend_Killa

  14. Fingerprinting at the Precinct  - Story of being fingerprinted at the NYPD 44th Precinct and the computer system they used, by The IMC
  15. Inter-Tel Phone Systems  - Hacking Inter-Tel phone systems, by Sundance Bean
  16. Security Through "Secure"  - Program to watch process IDs vi ps aux to determine if they exceeding a set limit, by kasper
  17. Tips on Generating Fake ID  - Info on getting or making fake IDs, by DrNick (Ben Polen)
  18. More on DSN  - Overview of the Defense Switched Network, by Dr. Seuss of the OCPP
  19. 2600 Marketplace
  20. 2600 Meetings

  $2600 Magazine - Volume 15, Number 3 (Fall 1998)

  1. Progress  - Editorial
  2. Homemade TCP Packets  - Perl script for crafting spoofed or corrupted TCP/IP packets, by miff
  3. Socket Programming for Fun and Profit  - Beginner info and code for TCP/IP socket programming, by darknite
  4. Blasting Sound  - Simple shell script for generating annoying audio, by Slatan
  5. Back Orifice Tutorial  - How to use and install Back Orifice, by skwp (Yan Pritzker)
  6. How to Probe a Remote Network  - Port scanning overview, by Armageddon
  7. Hack Your Console  - Hacking video game consoles and making game backups, by m0tion (James Wiggins, Email, Columbia, SC)
  8. Cushioned Encryption and Deniability  - Overview of different encryption techniques, by Phunda Mental
  9. The Backyard Phreaker  - Beginner phreaking info and terminal box information, by D-Recz
  10. Expanding Caller ID Storage  - Increase the memory on a CIDCO Model PA caller ID box, by Datum Fluvius
  11. CLLI Codes Explained  - Info on the Bellcore Common Language Location Identification (CLLI) codes, by Crossbar
  12. Hacking RESNET  - Hacking Residence Hall Networks on a college campus, by jk
  13. Letters
    • Warning  - Lucy aka Baudewiser
    • Store Section  - Bluebell, N8, 4U2PN, flatline, Op_Code, Pixelated!, entropic, GW, Allegra
    • Help Needed  - JD (West Columbia, SC)
    • Identity Problems  - SaaWeetie
    • Mitnick Feedback  - Phlight, Wheetabix, Columbus, OH, MW (Solon, OH), Malkor, God of Dirt, mcd, D-Recz
    • Church People  - free radical, harris (Greece)
    • Generic Feedback  - Skippie the Ageless Hippie, Outlawyr, squarechin, ccure, Wraith, Keen, Alan M, Mac
    • Clarifications  - Cathode Ray, CKG, TS, Chris, xChEWx, iZRaXXX, Whirlwind, emory, MMX Killa
    • Curious  - Skeet, Neurotik
    • Numbers  - Infect
    • Career Move  - triplogik
    • Surprised?  - KB
    • Questions  - RepoMonster, VxPLaToNiUM, Nathan Hendler, Malbushsa, Arag0rn
    • Incidents  - Net X, datapleX (Daniel M. Robertson), darkrazor, SkidMarx (Gregory L. Marx), Tuxedo Mask, Zero_Null
    • Facts  - hhiggins, Lord Mistical (Cincinnati, OH), Louis Blue, Vex Hardline (Zen Master Vex)
    • MetroCard Fun  - Loggia
    • Fun Sites  - KRaZy d0h
    • Still More FYROM Fun  - Varelides Marios (An angry Greek)

  14. Screwing With Blockbuster Video  - Messing with Blockbuster, by Hiemlich VonScontertraus the 53rd
  15. Screwing With MovieFone  - Messing with MovieFone, by thirdhorse (Chris Miller)
  16. Screwing With Radio Shack & Compaq  - Messing with Radio Shack and Compaq, by Informagnet
  17. Trunking Communications Monitoring  - Monitoring information for trunked radio communications, by TELEgodzilla
  18. More on SIPRNet  - Info on the government's Secure Internet Protocol Router Network (SIPRNet), by Ex-Eleven (John Tate)
  19. 2600 Marketplace
  20. 2600 Meetings

  $2600 Magazine - Volume 15, Number 4 (Winter 1998-1999)

  1. The Victor Spoiled  - Editorial, plus Mitnick case update
  2. A Touch Memory Primer  - Detailed overview of Dallas iButton Touch Memory devices, by Kingpin
  3. The Facts of SSN  - Social Security number info and prefix guide, by Kermit the Hog
  4. A Guide to VMS'pionage  - Hacking OpenVMS, by EZ Freeze
  5. Samba: Lion King or Software Suite?  - Overview and security of Samba shares and the SMB protocol, by VmasterX (Ron Belcher)
  6. Copper Pair Color Coding  - 25-pair color code, by Catatonic Dismay
  7. A Security Hole at S-CWIS  - Computer security holes in Student Campus Wide Information Service, by Phineas Phreak  (Bryan Finger)
  8. Pocket Connectivity for Frugal Hackers  - Hacking with the Sharp Zaurus 3500X, by Mr. Curious
  9. Fun With NetWare 5  - Hacking Novell NetWare 5, by Khyron (Claude Johnson)
  10. Become a Radio Ninja  - Radio hacking and how to get your ham license, by Javaman  (Adam J. O'Donnell, PhD Dissertation)
  11. Cable Modem Security  - MAC address security with cable modems , by Fencer (Dr. Faubert)
  12. How to Handle the Media  - How to properly deal with talking to the media about hacking subjects, by nex
  13. 800-555 Carriers  - 1-800-555-XXXX modem carrier scan, by MSD
  14. Letters  - NON SPAM
    • More on "Free" Software  - (none given)
    • Data  - Pigano, nobody, Mark Milgrom, Nighthawk, KC, Shahn
    • Questions  - Rav0n, analyzer, smokescreen, Matt, Keebler, the medik, NAME, KLoWN, RANT-o-MATIC, RANT-o-MATIC, vsr600, Envision (Anaheim, CA), TydiLFuX (Wisconsin)
    • Radio Shack Antics  - Jestah (Orlando, FL)
    • Fun on the Phone  - NERO, Knotfil, Innominate (Buffalo, NY)
    • Religious Advice  - Patrick, Deryc, Riddler
    • Scary Stuff  - jagxr
    • Injustices  - wrath, Toxygenn, hex
    • Olympic Fun  - Informagnet
    • Miscellaneous Mitnick  - denileofservice, Anthony T. aka SYCO, TetterkeT (Jonathan M. Wilcox), exhalibut, Shawn Morris, Timba Wulf, Eppie, snachbot, Little Bobby, Telephreak, Pago, Jade, DaRkSiDe (Richmond, Indiana), Desaparecido, Baaaa (Waltham, MA)
    • Fingerprinting  - The Fryar
    • Barnes & Noble Feedback  - J.A. Hasse, Bendar the Barbarian, cloak, Rachael (Chapel Hill, North Carolina)
    • Between The Lines  - Pete
    • Help Needed  - morbus, Col Pete
    • Hotmail Fun  - Feng Laser
    • Non-Subscriber  - Sandy
    • 2600 To The Rescue  - jeff
    • In Defense of Microsoft  - Count Zero Int
    • Clarifications  - Spoon, StuntPope, Dustin Decker, Rave669, Archive, D-Recz, Cslide, Frank (Seattle, Washington), Shaggy Dan, Frogman
    • An Offer  - st
    • Military Madness  - Dippy (Virginia), Virtual Vandal (Detroit, MI)
    • Thoughts and Reflections  - BurningWorld (New York), fl00dland, WG (Friday Harbor, Washington)

  15. Why Anonymous Phone Cards Aren't  - Laws that can reveal phone card info and FBI testimony
  16. The Cryptography of Today  - Modern computer encryption, by kriminal 3nigma
  17. Hacking the Atcom Cyberbooth  - Hacking airport kiosks, by Fever
  18. Le Firewall  - How firewalls work and Checkpoint Firewall-1 3.0b information, by Black Ice
  19. Phreaking in the Midwest  - Phreaking story and information for Midwest states, specifically Illinois, by deth6 of the Bullz On Parade
  20. How to Hide From Netscape  - Clearing your Netscape web browser cache and history, by J.P. (John Pierce "J.P." Cummins)
  21. 2600 Marketplace
  22. 2600 Meetings


  TAKEDOWN:

    Number of crimes documented : 2
     Number of meals documented : 42

  $2600:

     Number of good articles : 2
      Number of TinyPedoAds® : 42

[littleboys]


  $2600 Magazine - Volume 16, Number 1 (Spring 1999)

  1. The Big Time  - Editorial
  2. Tracking Your Vehicles with AVI & ETTM  - Detailed info on Electronic Tolls and Traffic Management (ETTM) toll systems, by Thomas Icom
  3. Cracking the Time-Banc System  - Hacking the Time-Banc employee time system and its default password, by johnk
  4. A Retail Target  - Overview of the Target retail store computer systems, by Luna
  5. Wreaking Havoc with NetBus  - Take control of a remote host using NetBus, by Sikdogg
  6. More Socket Programming for Fun and Profit  - Overview and code examples for TCP/IP socket programming and example code for a Window 95 NetBIOS nuker, by Darknite
  7. Internet Peering  - Info and politics on "behind-the-scenes" Internet linking, by The Prophet
  8. Fun With Tripwire  - How to bypass the Tripwire checksum-based computer security system, by Estragon
  9. A Hacker's Guide to Getting Busted  - What to do if you are busted, by Outlawyr (Mark Weissburg, Faceberg, Chicago, IL)  (Page 2, Page 3, Page 4, Page 5, Page 6)
  10. Letters  - Express Yourself
    • Fun At The Retailers  - Paladine, cili_ra/bit, Anonymous, a|chEmist, gabo, gLyKOgen
    • Tracking Clive  - Reapyr, Lakota
    • Blockbuster Facts  - mark h, DiGi_TaL
    • Concerns  - ICON, KaptainKool (Brett Johnson), DVS, Uneasy Rider, LiquidCache (Jason Murphy, DOB: 04-08-1984), Central Intelligence Agent #23642
    • Bookstores  - Jack Dangers, L.A.N.-master (Elgin, IL), Ray Dios Haque (United Phreak Syndicate), Simple Nomad, gonzo
    • Phone Exploration  - Dave, msdaisey, matrix bomb, Telesis, Liquid Fire, pokesmote/Lindsay^, maxm0use (Owosso, MI)
    • Praise  - Dre, Kanemura, Jean Dupree, Schism, SPECOP002
    • Mitnick Reactions  - Dr. K, C.D., Phone Bandit, Phrostbyte
    • Foreign Interests  - Fransico Franca Arraes, marko c, Pabst
    • Security Issues  - chown 2ME, comet
    • ADSL Report  - Perogie
    • Questions  - Quantex, Savage, OkornO99, Satire, Cooldek, Phredde
    • Hacking Moviefone  - killerclown
    • Federal Interest  - jason head
    • Color Coding  - Joe630 (Ben Sherman), todd, Seuss
    • The Newbie Threat  - ddhd
    • SSN Corrections  - Loki128, Gareth Davies, fin, Zool, teclo, Charlie
    • Netscape Issues  - defen, t.d.m.
    • Hackers At War  - Splat, Rue-the-Day
    • Y2K  - Zack
    • Observations  - Frosty, MSD, SD, John Q Sample, Rev. Randall Tin-ear (Randall Fleming)
    • Cable Modems  - James Carlson (Lexington, MA)
    • Netware Feedback  - godbox, Buzz

  11. SS7 Explained  - An overview of Signaling System No. 7, by Friedo
  12. Network Scanning with Nmap  - General overview and scanning tips for using Nmap, by rain.forest.puppy  (Jeff Forristal)
  13. News Update  - Various news bits
  14. Hacking a Sony PlayStation  - Installing a PlayStation mod chip so it will play copied games, by Flack  (Robert Patrick O'Hara, Yukon, Oklahoma, DOB: 08-22-1973)
  15. 2600 Marketplace
  16. 2600 Meetings

  $2600 Magazine - Volume 16, Number 2 (Summer 1999)

  1. A Culmination of Efforts  - Editorial
  2. Securing Your Linux Box  - Steps to help secure your new Linux installation, by miff
  3. More on SIPRNet  - Overview of the Secure Internet Protocol Router Network (SIPRNet) used by the U.S. military, by Happy Harry
  4. Hacking AS/400  - Discusses the IBM AS/400 mainframe including pre-set user IDs, default password policy and some useful commands, by radiat
  5. Fun at Costco  - Hacking Costco's AS/400, by nux
  6. Brute-Forcer for Tracer  - Brute-forcer for Tracer unit control hardware found at most big stores, by J-lite
  7. Broad Band via the Earth  - Broadband radio/data transmissions using the Earth as a conductor, by saint (David)
  8. Secrets of Copy Protection  - How various hardware and software copy protection schemes work, by root access (Data War)
  9. How Parents Spy on Their Children  - Computer usage spy programs and One Tough Computer Cop software, by Demonologist
  10. The Future of IPV6  - How IPv6 works in comparison to IPv4, by rift
  11. Letters  - Chatter
    • Offerings  - flatline, Douglas
    • Revelations  - ZeROLogiKz (Michigan), ronwarren, Justin, Rufus T. Firefly, charr (Atlanta, GA)
    • Responses  - Ethan LaPan, Fencer
    • Fun Numbers  - maxm0use (Owosso, MI), Remy, PhuzzBoi, Mike
    • Secrets  - ethan (army.mil)
    • Gripes  - ICE breaker, RGBKnight, K2, shinobi, Matt Lesko
    • Tales of Injustice  - marbike, Outbreak
    • Retail Tips  - Fredrick 860, Sylex
    • Cries for Help  - TOPACE12
    • Flush Out Religion  - Joe Sixpack
    • Mischief  - Anonymous, the ninth name is NOD
    • Clarification  - baalse, Lucky225, NoDiCe, Elite
    • Supplemental Info  - Corey, ts, Corban, Scoop, rain.forest.puppy, MMX, Justin (Memphis, TN), Anonymous, Charon, F00bar98, matt, techs, The WildCard & |SC|
    • Military Mentality  - aeglemann, USN Sailor & ModG, Surreal
    • Education  - Made in DNA
    • Miscellaneous Mitnick  - RomeoW, Static-Pulse, Payphone, Chris, David, Ed in CT, toneboy1700, EchoMirage
    • Mysteries  - shine, niceroova)
    • Foreboding  - SLATAN, Mars
    • Feedback  - pArtYaNimaL, olsonjv, tk, brm, Grey Ghost, oolong, First_Incision, mgs21, Phred, xdissent, r0uter
    • Advice  - LeeTKuRp of HoC, Karen, CorLan
    • Pure Stupidity  - pretzelboy
    • Reassurance  - (none given)
    • General Weirdness  - ICON
    • Chutzpah  - Robin S (White Lake, MI)

  12. How to Keep Parents From Spying  - Tips minors can use to prevent parents from monitoring their activities, by JediMaster666 (Phillip Benoit)
  13. Food for Your Brain  - Finding personal info about people using info available from things like IRC, by DJ Tazz
  14. Adventures With Neighborhood Gates  - How security gates in gated communities work, by jaundice
  15. Internal Hacking  - Story of a person hacking an internal computer system to try and get a raise, by Zenstick
  16. Batch vs. Interactive  - Overview of the different types of computer processing systems, by StankDawg  (David Blake)
  17. Manipulating the Aspect  - Hacking the Aspect ACD call center system, by HyTeK
  18. Pushbutton Lock Hacking  - Info on Benton T2 model DL2700 and DL2750 push-button locks, by Clawz
  19. 2600 Marketplace
  20. 2600 Meetings

  $2600 Magazine - Volume 16, Number 3 (Fall 1999)

  1. Slow Motion  - Editorial
  2. Upload Bombing  - Web server attack exploiting CGI holes by pretending to be a web browser uploading a file, by Ulf of VSU
  3. Killing a File  - How to thoroughly remove a file from a computer, by THX1138
  4. The Terrorist of Orange, Texas  - Story from Texas about a high school student labeled a potential "terrorist," by The Abstruse One (Jason Byrons)
  5. ITS Prison Phones  - Info about the Inmate Telephone System, by ElecRage (John Schang)
  6. Infiltrating MediaOne  - Cracking MediaOne Express - the password is "password," by Lobo The Duck
  7. PalmPilot's Canadian Red Box  - PalmPilot program for generating Red Box tones used in Canadian payphones, by CYB0RG/ASM
  8. Forging Ping Packets  - C source code to forge ICMP echo requests under *BSD, by /bin/laden
  9. Trunking Communications Monitoring - Part 2  - More info on monitoring trunked radio systems, by TELEgodzilla
  10. Internet Radio Stations  - Running a Internet "radio" station, by -theJestre- (Chris Marland)
  11. Quantum Hacking  - Info on quantum computer hacking and the OpenQubit project, by skwp  (Yan Pritzker)
  12. Protel COCOTs  - Info on hacking Protel COCOT payphones with the dial-up feature, by HeadTrip
  13. Assorted Disney Fun / More Disney Fun  - Disney crap, by Hacks and Madjestr
  14. Letters  - Enunciations
    • Clarifications  - Barcode, RS, still nobody, Falcon, twiztid, joe cool, John Belushi, rj, Meth_od, Sunshine
    • Venom  - None of your Damn Business., alex
    • Guilt By Association  - icon, napalm, artiedeco
    • Retail Hacking  - KeMo BoY, caesar gaius caligula, Drifter, Yerba AKA Willy L., xprotocol
    • Phone Trickery  - payphone, Jonathan Fredericksen, Iineside, SSTcobra (Atlanta, GA), Loggia, Rolan
    • Dissatisfaction  - Dementia, Entropic (Dallas, TX), M0leBrain, cookiesnatcher
    • Free Kevin  - crypto, Lord Maestro, Brother Inferior, Fire Drake, Skyppey the Hyppey (Canada), Joe Blow
    • Foreign Phones  - Psychedelia, MD_Yugo_NSM
    • Conspiracies  - name withheld because I can't think of a good one, FeuErWanD, namib1234, ghostriter, john doe
    • Discoveries  - Weber, EKo, admintemplate_, finn, Calis, BBrain (Boston, MA), timm
    • Hunting For 2600  - Phreakilation, SAR, GB
    • Y2K  - RB, R.B.
    • Game Playing  - Mike (Seattle, Washington), AllOut99, mad cow disease
    • Corporate Expansion  - james hall
    • Hiding Things  - SCUDS
    • Info Wanted  - caffeine, tnsecure, Bazz
    • Stealing  - SpeedDRaven (Carl J. "Byron" Speed)
    • Ad Policy  - Eric W.
    • Secrets  - Seraf

  15. An Overview of Cellemetry  - Wireless telemetry technology designed to monitor, control, and track anything that is worth being monitored, controlled, and tracked, by Jinx (Johnny)
  16. Solaris x86 for Plants  - Overview of installing Solaris 7 on an Intel x86-base system, by Javaman  (Adam J. O'Donnell)
  17. Eleetisms  - How to talk like an idiot, by Hex (Jarrod Eyamie)
  18. 2600 Marketplace
  19. 2600 Meetings

  $2600 Magazine - Volume 16, Number 4 (Winter 1999-2000)

  1. Violence, Vandals, Victims  - Editorial
  2. Accessing Forbidden NTFS Drives  - Circumvent security on a Windows NT machine by booting from a Trinux Linux floppy, by Number Syx  (Chris Stoddard)
  3. Security Through NT? Not Likely  - Security holes in Windows NT and Microsoft networking, by Kurruppt2k  (DOB: 05-01-1986)
  4. Countermeasures Revisited  - Use a milliwatt plant test number and inductive probe to find phone taps or extensions, by Seuss
  5. DATUs - The Tool of the New Age Phreak  - Detailed info on Harris DATUs, by MMX
  6. Messing With Staples  - Harassing old ladies at a Staples store, by Maverick(212)
  7. I Own Your Car!  - Car company story and infiltrating a "restricted" area (Chrysler PT Cruiser), by Slatan
  8. Telco-Babble  - Phone wiring color and bundle info, by Android
  9. An Intro to Paging Networks and POCSAG/FLEX Interception  - Monitoring pager networks, by Black Axe  (Email)
  10. Hack the Media  - Fighting today's media con artists and trying to get the truth out, by Jim Nieken
  11. Letters  - People Who Can't Keep Quiet
    • Inequities  - Ackbar,
    • The Politics of Hacking  - Desaparecido, phillip, TeckX3, Major Motoko
    • Difference of Opinion  - Jeffrey Seelman (Milwaukee, WI), Da "Sleep"
    • Mitnick  - EchoMirage, skaboy, Don L, CherryPie,BADJRM, matt, Darth_tampon, Suicidal
    • Stupidity  - kipple, Jack O'Lantern, Dr. Bagpipes, c. edward kelso, Arcoddath (Scotland), Anubis
    • Handy Stuff To Know  - J. Arthur Ballarat (Los Angeles, CA), mad kow diseez
    • The High Cost of Learning  - gpf, hightechno, Valen
    • Mysteries  - drdoom, Jack
    • Hotmail Hijinks  - Shaun (Memphis, TN)
    • Retail Tips  - WillyL. AKA Verba, SenorPuto, creature, kAoS, Sirblime, Loggia, dannyh, Sir Reginald, Wisbing he was back in New York, ScOOter, emdeo, Eil, SAR, hidden101, CaS
    • Suggestions  - Black Knight, Russ, sureshot
    • Ripoff  - Larry, errorshutoff, Dumah, Snot Gnome, Shawn, Dissolution X, Graphix, Websurfer
    • Questions  - Val, Infinet
    • MTV  - Skanarchist (Eddie), i_ball, techx3, UnclePhester9600
    • Barnes & Noble Memo Found?  - Mangaburn, Dawn Bates (Muskegon, MI)
    • Fun Stuff  - Slack Packet
    • Stories of the Past  - Brien

  12. How to Create New Urban Legends  - Creating your own myths and urban legends and how people manipulate the truth, by Jim Johnstone
  13. Hacking Explorer (the car)  - Hacking Ford Explorers' keyless entry system, by Bob
  14. Net Nanny Nonsense  - How Net Nanny works and stuff, by Raz
  15. Why Red Boxing Doesn't Work  - Death of Automated Coin Toll Service (ACTS), by The Prophet
  16. Spoofing Call Waiting ID  - Simple little trick to send fake caller ID data during the call waiting phase, by Lucky225  (Jered Morgan)
  17. The Sprint Integrated On Demand Network  - Info on Sprint's Integrated On Demand (ION), by Prototype Zero
  18. Understanding Microsoft Exchange  - Overview of Microsoft's Exchange server and potential exploits, by PayLay
  19. 2600 Marketplace
  20. 2600 Meetings

  $2600 Magazine - Volume 17, Number 1 (Spring 2000)

  1. The Next Chapter  - Editorial  (css-auth.tar.gz)
  2. A Taste of Freedom  - Post-prison letter from Kevin Mitnick, by Kevin Mitnick  (Picture 1, Picture 2)
  3. How to Stay a Sysadmin  - Tips for computer system admins to prevent burnout, by Shade (Paul A. Watson, Resume)
  4. Military Computer Secrets  - Military computer (Naval Aviation Logistics Command Management Information Systems [NALCOMIS]) tidbits, by Suicidal
  5. Securing Web Sites With ASP  - ASP code to secure a web page, by guinsu
  6. Still More on SIPRNet  - More info on SIPRNet and some of the hardware used, by Phrostbyte (Kevin Wahl)
  7. Finding and Exploiting Bugs  - Searching software and code for potential bugs and security holes, by Astroman66 (Andrew Lance)
  8. All About SecurID  - Overview of RSA's SecurID, by magus (Steven Beverly)  (Page 2)
  9. SecurID  - Info on the SecurID protocol and real-world usage, by xenox  (Page 2)
  10. Your Internet Birthday  - Privacy reasons for giving out a "fake" birthday when filling out forms on the Internet, by The Cheshire Catalyst
  11. Make Spammers Work For You  - Spamming spammers - "human ping of death," by Chatreaux
  12. Taking Advantage of All Advantage  - Exploiting the All Advantage system which pays you to surf the Internet, by silicon kill
  13. AT&T's Gaping Hole  - Free phone service with AT&T wireless service, by Jinx
  14. Cellular Networks Detailed  - Detailed info on various cellular protocols, by EchoMirage
  15. Letters  - We're Listening
    • Alien Intelligence  - CgK
    • Bookstores  - Downsouth, Anonymous Barnes and Noble Music Seller, quash
    • Adventures in School  - Xkaliber, P2129 - the student formerly known as Kevin, phil, gopher the contradictory, Microkiller
    • Discoveries  - darky0da, casey, Handle6015, Mongo, brain, robert, Dr. K, carls_pub
    • Kevin Free  - Koishii, KuNg, Chris from Chrisconsin, ASZ, Rave669, VinceC, r00t_Canal
    • More on SecurID  - Kingpin
    • More Fun in Retail  - Anguirus, The Wedge, cashmolia, MustardMan, Phelix, cashmolia, Jack A. VanWoerkom, squatex
    • Anti-Venom  - The Devil
    • Additional Details  - netsplit, Cilo, Platinum Dragon
    • Defeating Corporate Advertising  - orn, Alpha
    • Help Needed  - xequalsl, Dan Wheeler, Lubdub
    • State of the Hacker World  - Pestilent, Mind Plague of The Committee, JL, phiber_life, Quantum Knight
    • Positive Developments  - ph0x
    • Idiocy  - wNdozCRASH, tacit
    • Humor  - Rick
    • Forbidden Exchanges  - .244
    • The MPAA Lawsuit  - Michael F. Nudell, Punker04, Anonymous (London), Apocalyse, Wayne, Pay_No_Attention_To_That_Man_Behind_The_Curtain!
    • Y2K Issues  - Desaparecido, AssMonkey, Gustaf, CubanPete
    • Facts on NT  - RickDogg
    • Irony  - Knightsabre
    • Free Stuff  - Twist
    • Question  - scorchmonkE
    • 2/6/00  - MeSSerSchMiTT (David or The "RUSSIAN" as I get called in USA school), Rhymezor
    • DoS Cluebags  - Keith Gardner, Andrew, Cooter, Jason (Louisiana)

  16. How PSX Copy Protection Works  - How PlayStation copy protection works, by Lord Xarph  (Tod Weitzel, San Jose, California)
  17. Fun at Circuit City  - Harass old ladies at Circuit City, by ccsucks
  18. How to Build a Coffee Box  - Combine a Beige Box and Brown Box, by skrooyoo  (Page 2)
  19. The Sprint PCS Network  - Tech info on the Sprint PCS cellular network, by ~sn0crash
  20. How to Get Banned From Your ISP  - How to be stupid, by Mandark
  21. Build, Don't Buy, Your Next Computer  - How to build a computer a quality computer system, by bober
  22. How Does That DSS Card Really Work?  - Brief overview and technical details of the operation of DirecTV DSS cards, by Phredog
  23. 2600 Marketplace
  24. 2600 Meetings

  $2600 Magazine - Volume 17, Number 2 (Summer 2000)

  1. Madness  - Editorial
  2. The Art of System Profiling  - Identifying operating systems and networks on the Internet, by Thuull  (Page 2)
  3. A Brief Intro to Biometrics  - Overview of on biometric-based physical security systems, by Cxi~
  4. Fun With TDOC  - Information on the Tennessee Department of Corrections computer network and the Tennessee Offender Management Information System (TOMIS) system, by Anonymous
  5. Strange Abuses For Your Home Phone  - Info on a Conair HAC SW8260 phone, by Static (Brandon Malzahn)
  6. More Advantages of All Advantage  - More info on All Advantage and how to disable ads, by KireC
  7. Over the Verizon?  - List of Internet domains registered by Verizon
  8. Securing ASP: A Deeper Cut  - How to secure ASP-based websites, by AgentK (Kent Tegels)
  9. Jello Biafra: Hacker Ambassador  - Clueless, rich, hypocritical, media whore - sounds just like Evil Corley, by princessopensource (Shana Skaletsky)
  10. Hacking the Three Holed Payphone  - Old payphone hacks and information, by Munzenfernsprechermann
  11. Packet Analysis and Header Sniffers  - General overview of packet sniffing for header identification and a low-level Internet protocol overview, by Javaman  (Adam J. O'Donnell)
  12. Letters  - Dangerous Thought Section
    • Clarification  - Kevin V (Trenton, OH), Treker, Einstein, Mark, Transmissions from the South
    • Getting Around Stupidity  - Dr Jest, Karr0t T0p (Kristoffer William Marshall, DOB: 05-13-1984), phil, sonnik, GhettoBlaster (Jason Louisiana)
    • Discoveries  - Squee, Allin, Elektr0chr0nik, bill
    • Car Talk  - Devil Moon, The Artful Dodger
    • Annoyances  - thegeek (Glasgow, Scotland), Funk Strings, 2MnYiDiZ, ryan
    • Retail Tips  - SnoFlak, gasfumes, Cybah
    • Additional Info  - Immolation, mbve, Qwertydvorak, DAR
    • Dealing With The MPAA  - Scott, Sys Edit, mr. blonde, Mr. Roboto, Jedi's Chaos, Daewoo, g00fy, steven az (heretidpogo)
    • The Mitnick Case  - Sienne (805), Technomatrix, Speedk0re (Gary Kuhlman, Irvine, CA)
    • Fun With Cable Companies  - RootX11, jjjack, Rizzn Do'Urden (Mark Hopkins)
    • Info Needed  - Popeye
    • School Update  - Izubachi, Eric S., Code_WarriorX, cs0074life, Blooder, ICMP
    • Criticisms  - Patrick, cryptofreq, The_36th_Chamber, dustbert
    • Helping New People  - Notmyrealhandle
    • Ideas  - MrBid
    • Injustices  - Anthrax, SHemp5150 (Shaun Kemp), KoDo, diss0nance
    • Starting a New Meeting  - NuLL vaLue, neurophilter
    • Praise  - Dave (New York, New York), Da Clyde, 3_trinity_3 (Shawn McCullough, San Antonio, TX)
    • ANAC Number  - Goop, PaleronD
    • Media Misrepresentation  - phil
    • The Staples Threat  - Cielo, Maverick212
    • Y2K  - Mojo
    • True Security  - pulse (Tony Brown)
    • Listening In  - zzflop
    • Female Hackers  - MiStReSS DiVA (aka-Beui)
    • Desperate  - From a Wanna be Hacker
    • The Verizon Threat  - majickmutex

  13. A Simple Hex Hack  - Registry hex editing (date editing) and the tools to use, by Zarathustra
  14. Secrets of Dell  - Secrets of Dell tech support, by Deamtime
  15. How Domains Are Stolen  - The potential for domain name hijacking, by Crim, Redomega
  16. Playing With Dominos  - Explaining some of the more confusing points about Lotus Notes, by Dr. Clue
  17. Java Applet Hacking  - Exploit password protected web pages via information revealed inside a Java archive, by Xprotocol
  18. The Privacy Box  - Prevent phone extension pick up, by obitus  (Page 2)
  19. A Student's Privacy Security Survey  - Survey of private student information at various colleges and how it is protected, by Pip Macki (Mike S.)
  20. 2600 Marketplace
  21. 2600 Meetings

  $2600 Magazine - Volume 17, Number 3 (Fall 2000)

  1. A Summer of Trials  - Editorial
  2. Kernel Modification Using LKMs  - Detailed article on creating hidden loadable modules to alter a running Linux kernel, by dalai  (Josh D.)
  3. How to Hack CyberTime Software   - Admin password hack for CyberTime - a Internet usage time management system, by Waphle
  4. Target Advertising  - Advertising notes and how advertising can be seen as propaganda, by Hieimlich VonScootertraus the 53rd
  5. An Introduction to Sprint ION  - Overview of Sprint's Integrated On Demand (ION) Network voice and data system, by The Prophet  (Similar Article)
  6. The GeoSpatial Revolution  - Using Geographical Information Systems and the data they provide, by Silvio Manuel
  7. Anomaly Detection Systems  - Using active intrusion detection systems, by Thuull
  8. Hunting the Paper Carnivore  - A look at the FBI's Carnivore email scanning system and how it infringes on our rights, by BrotherBen
  9. The Making of a Pseudo Felon  - Hacking story of a person caught scanning for "codes," by Brent Ranney
  10. Flaws in Outsourced ECommerce Systems  - Potential security problems with E-commerce sites, by Dean Swift
  11. Letters  - Reader Droppings
    • How Verizon Sucks  - Jeff, Kendall, Filthytot, Alterego, AM, Trouble Maker from WayBack
    • More Corporate Intimidation  - 7h3 31337 pHr34k4r0id, LoC, dot, robin, J-Fast, Secret Squirrel
    • Answers  - drakiel
    • IRC Bitching  - Muckraker, FLAMEcow
    • H2K Videos  - Hedgecore
    • Questions  - Phuct, kamal abbas, Theseus, Wolf
    • DeCSS/MPAA/DMCA  - Matt, Anonymous in Ireland, William, beezle, Brad Brown, phil, Decius 6i5 (Tom Cross), Scott, William Ryan, happitree, oddyOphile (Portland, Oregon, DOB: 05-10-1974), Quikfuze, Blanked Out, Woody
    • Misconceptions  - phx
    • More Info  - SLATAN, Will, Dave (Adelaide, Australia), jeremy, Cafeeen Boy, Mr. Roboto, Bowman, Court Jester, WStend, Immolation, kram12085, guinsu
    • Bypassing Napster  - Hedgecore
    • Mitnick  - illii, ReNt12596, Bill Dahab
    • Reprinting Stuff  - Jason Benton
    • The Old Days  - Akolade
    • More Government Stupidity  - Chad Ziccardi
    • Bookstores  - vesparado
    • Observations  - SuperHacker@aoI.com, COMTek, watice, Aulophobe (Phoenix, AZ), Kevin V. (Trenton, OH), Luminol, Stealth Ricochet, Queen Ann
    • Lotto Fever  - b0b126, DigitalZero
    • The Dangers of Info  - rootx11
    • Phone Problems  - Maria, Roark, Silverspartan
    • Schools  - Anonymous Hacker in England, SwordMage, YorNamHere, Herbert, SSGohan, Tweeter
    • Fast Food Facts  - Big Mac
    • Credit Files  - LoAN RAnGER (Colorado)

  12. Finding a Target Using DNS Lookups  - man nslookup, by fU9A5i
  13. Another Way to Defeat URL Filters  - Use a host's IP decimal equivalent to bypass web filters, by ASM_dood
  14. Accessing Federal Court Records  - Getting access to various court records and the Public Access to Court Electronic Records (PACER) systems, by Iconoclast
  15. Zone Scanning  - Tips for scanning an entire network by only choosing the "important" machines, by DEFT
  16. DeCSS in Words  - DeCSS is protected speech but the Pledge of Allegiance is not - figure that one out!  (Gallery of CSS Descramblers)
  17. Build a Car Computer   - Build a computer/MP3 system for your car, by Megatron
  18. 2600 Marketplace
  19. 2600 Meetings

  $2600 Magazine - Volume 17, Number 4 (Winter 2000-2001)

  1. Direction  - Editorial
  2. Introduction to Snooping Around  - Overview of basic Internet host snooping and network probing, by copycat
  3. BellSouth's Mobitex Network  - Technical information and general overview of BellSouth's Mobitex wireless data networks, by Dspanky  (Dave)
  4. An Introduction to Radio Scanning  - Detailed guide to the basics of radio scanners, searching for new frequencies, and signal analysis, by Sam Morse
  5. More Java Fun  - Ideas for decompiling Java applets and trying to obtain passwords via <PARAM>, by FaultySignal9
  6. Sub7 - Usage, Prevention, Removal  - Info on the Sub7 script kiddie remote administration Trojan program, by CaS
  7. Get Anyone's Credit Report For Free  - Getting (other people's) credit card reports, by Ranaldo
  8. Microsoft's Hook and Sinker  - Microsoft Certified Systems Engineer (MCSE) info and questions, by LeXeR
  9. Hacking an NT Domain from the Desktop  - Messing with Windows NT via the command line and adding yourself tot he local admin group, by Hi_RISC
  10. The DVD Paper Chain  - DVD manufacturing info, by Common Knowledge
  11. Polymorphism Script  - Demonstration of polymorphism in a Perl script, by xdroop  (David Mackintosh, Ottawa, Canada Twitter)
  12. Letters  - Postal Prose
    • Clarifications  - D. Lopez, p4
    • Exciting News  - Katia S. McKeever (Foster City, CA)
    • The DeCSS Case  - MaD-HaTTeR, Dan, Reverend Lust, Ned Flanders, aUd10phY|, eggo, Pete Davis, carpman, DG, Tony, rootx11 (Farhan Khan), Michael, Weez, jys_f, Harry, Nitehawk, KisP, n3xu56 (Sam K.), Mistral, Jakob (Denmark), hiredgun
    • Hacker Ethics  - Lizard, Mannequin, joshstout
    • Newbies  - DreyDay_33 (New York, New York)
    • Hacker Fashion  - Downsouth
    • Scary News  - Katia S. McKeever
    • New Projects  - s0ny, CaseTheWig
    • Discoveries  - buster, Colin, Kyoya san, matt (anonymous), Mr. DNA, JEM, zzflop, Dan, Big Shooter, NaterZ, Bob
    • Questions  - mpower, mheyes, catfood, S0J073RO, Paper
    • Parallels of Oppression  - Cambalache20
    • Takedown Spotting  - Camandrett (Argentina)
    • More Corporate Evil  - B.R., Byran, Rebilacx (Matt, DOB: 03-08-1980), The Dude (iamnotahacker), BizarreOne
    • Annoying News  - Brigit Blomme (Foster City, CA)
    • Further Info  - Daewoo, narce
    • Suggestions  - arc, Pestaline, RevZer0
    • General Feedback  - Manic Velocity (Salt Lake City, UT), Viaticus, KoDo, HamAZ, Enzo, TBOTe, maldoror, Stark, Phil
    • The Politics of Change  - BATTERY, phillippe, chrisbid, Prehistoric Net-Guy
    • Schools  - Aragoren, Sekicho-sensei, data refill, student #3594, JoePunk102
    • Microsoftheadedness  - Hermit, CB, Agentskye101, jesus X
    • Spreading the Word  - Kent
    • Not News At All  - Katia S. McKeever

  13. Confusing ANI and Other Phone Tricks  - Explains how to bypass CLASS services, spoof ANI to AT&T 800 numbers, and make free untraceable calls, by Lucky225
  14. Jury Nullification and The Hacker  - Jury tricks and why hackers can make good jurists and to just say "not guilty" to bullsh!t charges, by Also Sprach Zarathustra
  15. Cop Proof Laptops  - Police car laptop computers like the PCMobile by CYCOMM, by Common Knowledge
  16. Radio Shack's Newest Giveaway  - :CueCat info and usage tips, by canyoumatrix
  17. Dissecting Shaw's Systems  - Cash register info for Shaw's supermarkets and manager login information, by Sect0r F4ilure
  18. Hacking Free ISPs Using WinDump  - Hacking free dial-up ISPs and viewing the login information with WinDump, by rya
  19. 2600 Marketplace
  20. 2600 Meetings

[cash_cow]

"Psst...  Hey Kevin!  Listen to me and we can both pull in six-figures a year by scaring teenage boys."


  $2600 Magazine - Volume 18, Number 1 (Spring 2001)

  1. Signs of Hope  - Editorial
  2. Police Searches of Computers  - Procedure for police searches and warrants, by Todd Garrison  (Denver, COo, MySpace, Band Info)
  3. The Future of PKI  - Overview of the Public Key Infrastructure (PKI) for credit and smart cards, by Elite158
  4. PHP/CGI Vulnerabilities and Abuses  - Common security holes with PHP and Perl scripts, by L14
  5. Breaking the Windows Script Encoder  - How to defeat and decode the infamous Windows Script Encoder, by Mr. Brownstone
  6. Liberating Advants Terminals  - Bugs in Advants Internet kiosks, by Loki
  7. A Romp Through System Security  - Overview of locally and remotely securing your Linux system, by Lumikant with help from Zarium
  8. Hacking QuickAid Internet Stations  - Bugs in QuickAid Internet kiosks, by Durkeim the Withered God
  9. The Billboard Liberation Front  - People with too much time on their hands
  10. Computing with the Fabric of Reality  - Overview of quantum-based computers and their applications for defeating public-key crypto, by Chris Silva aka Sarah Jane Smith
  11. Letters  - SMS
    • Politics  - Lisa J., Ben Stragnell, Chris S.
    • Random Questions  - MiStReSS DiVA, Frank R. (San Antonio, TX), Equinox, Keyser Soze (Chris V.), Wax, muthu, EmptySet, Boneman, D'artagnon, haux, Philter (Chicago, IL), CyberInferno
    • Ideas  - Phredog@Work, Reverand_Daddy, DragonByte
    • Info Hungry  - Screeching Weasel
    • Random Fear  - Brad
    • Harassment  - Nate, Sam 'E', RagnSep, MajickMutex (Jenn), KNP, Corv
    • Cluelessness  - Parin, Randy Ford, Screamer Chaotix (Connecticut), SellOut
    • Observations  - C...., *31337*, Kyle, ~otacon~, RevZer0, Three, Mad Pyrotechnologist (Eric Schmiedl), Trigga Bistro, Your Mom, tnt419 (Tom M. Brady, MySpace, Toledo, OH), zerolemons, noire (Colorado), Eric, kju, almightycoop, Biohazard51 (DOB: 05-28-1988), Xian, zeitgeist (Germany), hemlock, Weez, patrick, rootx11, Sir_Poet, shader, gan0n
    • Discoveries  - Kal, Robb (Ireland), Splices
    • Memories  - Stevie B a.k.a. Blue Lightning
    • Fighting Back  - Scott, rene gonzalez, Marina Brown (MGN)
    • Voting Ideas  - SiON42, cstoll, Michael, anon
    • Article Feedback  - reuven, Tim, v-dick
    • Fun in the Stores  - xcham, AquaGlow
    • Legal Questions  - Joseph, Hy Stress
    • Advice  - noname
    • Technological Nightmares  - Xerxes2695, Jeffery, ^CircuiT^, Dalai, The_Chaotic_1 (Joseph, Email, DOB: 03-14-1985)
    • Offerings  - Simon Jester
    • From The Inside  - James, Eric Burns

  12. Secrets of Electronic Shelf Labels  - Overview of supermarket LCD price labels, by Trailblazer (Paul)
  13. Anomaly Detection Systems, Part II  - Intrusion detection under Linux, by Thuull
  14. The Anna Kournikova Virus  - Overview of the Anna Kournikova Virus, by 6M AL
  15. Declawing Your :CueCat  - Removing the serial number from your :CueCat, by Lunius
  16. Scum  - Realistic-looking "fake" bill
  17. Takedown Taken Down  - Only $2600 Magazine can distort the truth about Kevin Mitnick and profit from him, by Evil Corley  (Scan: Page 1, Page 2)
  18. 2600 Marketplace
  19. 2600 Meetings

  $2600 Magazine - Volume 18, Number 2 (Summer 2001)

  1. The Broken Wheels of Justice  - Editorial
  2. What is Carnivore, Really?  - Overview of the FBI's Carnivore electronic interception program, by Achilles Outlaw, Ph.D.
  3. Extra Polymorphic Worms  - Update to xdroop's polymorphism script article and ideas to bypass detecting systems, includes example Java code, by Dr. Leovinus
  4. Everything Your Parents Told You About ESS Was a Lie  - Wow!  A good phone article!, by dalai  (Page 2, Page 3)
  5. Michigan Memos  - Internal memos from Ameritech and Ford
  6. How to Become a Hacker Saint  - Wow!  A stupid article!, by J-Fast
  7. Misconceptions About TCP Wrappers  - Overview of using and securing TCP Wrappers rules and what to watch out for, by Golden_Eternity  (Blake R. Swopes, Ventura County, California, GitHub)
  8. Hacking an NT 4 Domain from the Desktop - Revisited  - Scripts to gain administrative rights on Windows NT a email or crack the passwords, by Hi_Risc (a.k.a. ASB)
  9. Popular Myths on Password Authentication  - How to chose secure passwords, by Stephen Thomas
  10. Exploring HPUX Password Schemes  - Overview of the "Trusted Systems" protected password database scheme under HPUX 10.x, by Alex
  11. Letters  - The Inbox
    • DeCSS Fallout  - gc, Anonymous Reader, Clown Father, Xerock, Avon, yonder, jeff weems, djeaux, Brian
    • Bypassing Restrictions  - mkr08, HacKz_jEEveZ, F.H., Av1d
    • Spying  - R Otterbine, The_Chaotic_1
    • School Stupidity  - Wetwarez, Newzweak, Phredog, Sam S., mr self destruct
    • Real World Stupidity  - dc66, Tizal, The Colonel, zeigeist, phobik, Chewie, Joe, Ray
    • Appreciation  - TwistedGreen (Donna Murawski, Windsor, Ontario), civilsurveydraft, nomad, Danny, Waldo, Cunning Linguist (Jeff Strauss), Ford Prefect, Sate, Thomas
    • Individual Perspectives  - KHD, Gil Young, kate, kaH220
    • Clarification  - kaige, Shadow Freq, Mike Walton, Qblade, Anonymous, Jeff, Dan, Scabby, Mike
    • Questions  - Neo, IM_Ruse, Mike G., SPAMLord, BillyNo, IceBlast, Double Helix, grant welch, Mikko, Peter, Kn0w, quatre
    • Corporate Stupidity  - 7h3 31337 pHr34k4z0id, Tony, Newspimp, niihon, litze, Thomas
    • Discoveries  - LazerBeamX, ryanx7, Cyrus, Morn_Star, SkorpiosDeath, toast666
    • Issue Problems  - doug, I1269U, Jizzbug
    • Napster Alternatives  - Shawn
    • Counterpoint  - Bob, Steve
    • An Idea  - My Name is Joe!
    • Voter Education  - Poll Watcher
    • A Call To Arms  - ICFN PMP

  12. AOL At School  - Overview of the AOL at School program, by The Datapharmer
  13. Fun With Fortres  - Messing with Fortres 101 Windows security program, by Amatus  (David Barksdale, Email #2)
  14. AT&T At Home  - Info on AT&T @Home Internet services, by m0rtis (Daniel R. Wright)
  15. The New AT&T Network  - Overview of AT&T's long-distance network updates after the article "ANI Spoofing" appeared, by Lucky225
  16. Tell Me: Uses and Abuses  - Using and abusing the Tell Me wake up call services, by Screamer Chaotix  (Bridgeport, CT, Email #1, Email #2, Hackermind, Frequency Archive)
  17. Snooping the Stack  - Snooping around the Internet, by ThinkT4nk  (Ryan McGowan, St. Louis, Missouri, Email #2)
  18. 2600 Marketplace
  19. 2600 Meetings

  $2600 Magazine - Volume 18, Number 3 (Fall 2001)

  1. Consequences  - Editorial
  2. Deconstructing a Fortres  - Overview of Fortres 101 version 4 security software and some potential ideas for bypassing it, by Acidus  (Billy Hoffman, Atlanta, Georgia, Pic, Blog)
  3. Passport Hacking  - This article introduces a security vulnerability in Microsoft Passport, specific details explaining how to compromise a user's Passport account as well as example code, by Chris Shiflett
  4. How to Decrypt DirecTV  - How to decode DirecTV satellite signals using H-cards, by Clovis (Louis Edward Trumpbour)
  5. Code Red 2  - Or how to anonymously get root on 250,000 machines overnight by remotely accessing Code Red infected computers, by Braddock Gaskill  (Baltimore, Maryland, Email, W3BCV)
  6. Republishing the Rules - The Ultimate DRM Hack  - Overview of the different types of Digital Rights Management (DRM) systems, by The Walrus
  7. DecloQing Copy Protection  - Patch to cdparanoia to bypass the MediaCloQ anti-ripping feature, by Pack Rat Sam
  8. Hacking Time  - Overview and hacking potential Qqest Model ETC dial-up time clock machines, by HoTsAbI
  9. Myths about TCP Spoofing  - Some myths surrounding IP spoofing attacks being able to cover your tracks, by Grandmaster Plague (Evan Sparks)
  10. Playing with Qwest DSL  - Overview of Qwest DSL Internet service, by phobik
  11. Defeating Intrusion Detection Systems  - Tips and Perl scripts for port scanner that can defeat certain IDS settings or work over proxies, by SnakeByte  (Eric Sesterhenn)
  12. Letters  - Fine Print
    • People Power  - zenunit
    • The Mass Culture  - psycho-mantis, Spacemonkey6945
    • Scams  - Slam
    • Politics  - Jonathan Fredericksen
    • Guns  - clvr_handl, Tozetre, Don, William R. Epp (Email #1)
    • Questions  - Adam J., Steven, Gzamay, jeff, Conscience, studin, E, Alexander, R3dO (Lithuania), Reinaldo, IncogX (Marcus Anderson), argie1607, Marc
    • Concerns  - Gino, Net Admin, stufff, Pete, Doc Kennedy
    • More Info  - Hugh G. Rection, phix, hanoverfist, Ben Sherits, bd, Rogue, EnochRoot, ryno
    • Injustices  - chromosome fortyseven, fuzzhack, kloXTicToX, Sab0tage, Ben, DiabolicEdict (Lewisville, TX), Joe Newman, tek_guy, Crazy K
    • Data  - Dco, medik
    • Appreciation  - JohnG54429, Josef Trimpert, Akolade, ratner, Omega Red, iceplant999 (Paul), Michael Piacsek (South Africa)
    • Article Feedback  - Eric Lippert, ive
    • Surprises  - binary, Iamnoone, Bill
    • Quest For Knowledge  - Interested, covertuw, David R.
    • Satellite Watch  - Burgy, Mangaburn, brian
    • A Handy Tip  - Anthony
    • The Evils of Microsoft  - Avon, Iceplant999, Daewoo
    • Just Plain Evil  - Speed Racer
    • Just Plain Stupid  - lunius
    • An Idea  - Trent

  13. Compromising Internet Appliances  - Hacking Internet connected household appliances, by Plex Inphiniti
  14. An Introduction to ARP Spoofing  - Good overview of ARP spoofing, a method of exploiting the interaction of IP and the Ethernet protocols, by Sean Whalen  (Slides)
  15. Offset Hacking  - Story of a person "banned" for apparently using in-memory hex editing during a game of EverQuest, by Darbyersh
  16. The Invisible Box  - The Invisible Box will make it so that when you pick up an extension phone on your phone line, any of those "in-use" lights that alert if an extension phone is picked up won't light, by Lucky225
  17. Bypassing Cisco Router Passwords  - How to bypass the passwords on a Cisco 2500/2600 router, by Nickels 1  (Additional Info)
  18. Hacking Retail Hardware  - Hacking point-of-sale terminals, by dual_parallel  (Mike, Phoenix, Arizona)
  19. Hacking Kodak Picture Maker  - Tips to obtain the printing or setup passwords on a Kodak picture kiosk, by deadkode
  20. Netjacking for Complete Idiots  - Hijacking 802.11b connections, by Dark Overlord of the DoC  (Peter M. Shipley, DOB: 09-30-1965, Berkeley, CA)
  21. Exploiting Intelligent Peripherals  - HP JetDirect printer hacking, by Screamer Chaotix
  22. 2600 Marketplace
  23. 2600 Meetings

  $2600 Magazine - Volume 18, Number 4 (Winter 2001-2002)

  1. 2001-2002  - Editorial
  2. The Security of the Inferno OS  - Security semantics of Vita Nuova's Inferno OS, by dalai
  3. Black Ice Defender - a Personal Firewall  - Overview and install how-to for Black Ice Defender, by Suicidal_251
  4. The Future of Enhanced 911  - Implementing cellular E911 and GPS location, by Wumpus Hunter
  5. Behind the Scenes on a Web Page  - Very detailed overview of how a web server works and the client/server relationship, by angelazaharia (Angela Zaharia)
  6. Cracking Clever Content  - How to bypass Clever Content, by Tokachu
  7. Right-Click Suppression  - Code to add right-click suppression to your webpage and how to bypass it, by Rob Rohan
  8. Fun With Radio Shack  - Info on Radio Shack Internet kiosks, by Cunning Linguist  (Jeff Strauss)
  9. Building a Floppy Based Router  - Build a small router from a floppy drive with Coyote Linux, by netfreak
  10. Build a Wooden Computer  - Build a wood computer case, by Elite158 (Joerg Kurt Wegner)
  11. Harnessing the Airwaves  - Introduction and overview of low-power "pirate" radio, by Mark12085 (Mark)
  12. Secrets of Rogers @Home  - Behind the scenes at @Home, by Gr@ve_Rose (Sean Murray-Ford)
  13. Basics on Answering Machine Hacking  - More information on hacking answering machines, by horrid
  14. Letters  - Still Legal Thoughts
    • Ideas  - Mitchell_pgh (Richard Mitchell), FlashARK, Tresser McKay
    • Prison Life  - //buddha
    • School Life  - christian, risus sardonicus, bb_student, Maniac_Dan, DeftonesGuy0183
    • Corporate Life  - Hex
    • Observations  - fuzzy, mAd-1, Muchocaca, Silent, Chase "Michael Kenyon" Brown, Osi44 (Argentina), Evil_Monkey, Yonder, lord ice, Johnny C., Cody, DJBusyB (MySpace), Anon O Mous, Mark12085, Felix, Andrew Holt, mickeym
    • Politics  - G. Conterio, American citizen residing abroad
    • Con Jobs  - ns, sxpert
    • Morale Boosts  - S, David Middleton (Cobra2411, Philadelphia, PA), LanZfreak
    • More Info  - No Name, g0 seigen, meowmixman, Lucifier Messiah (Anarkick Systems), Anonymous, Phate, Kingpin, Cudabean
    • Quest For Knowledge  - dmitry kostyuk
    • Old School Perspective  - Primenumber
    • Film Update  - DQ
    • Hacker Pedestals  - chris s
    • Questions  - sk, Halo Nine, Zach, K0ldshadow, Phaceoff, Ghost007, Lunchbox (a.k.a. King of Lag)
    • Signs of Hope  - Silent Transgressor, Sean
    • Thoughts on 9/11  - Thinking, voice of reason, Re-LoaD, Waldo (East Lansing, MI), The_Chaotic_1, joeman, A C, RenderMan (Brad Haines), noire, Island Boy
    • Response To Criticism  - DarkBlayd, Phyt3b4ck
    • Legal Nonsense  - Danny, Sazook, Dan, pa
    • Suggestions For Newbies  - Funkstrings
    • More on Telemarketing  - Vengul Ator
    • Camera Crap  - CyBeRJaK
    • Labels  - The Zygote Killa

  15. Hacking the Highway  - Hacking those trailer road signs, by mennonite  (Page 2)
  16. How to Hack from a Ram Disk  - Setting up and running programs in a RAM disk, by Nv
  17. Hacking with Samba  - Hacking Samba servers, by dknfy  (Page 2)
  18. Fun Facts About Walmart  - Walmart customer terminals and pharmacy computers, by A.W.M.
  19. IIS - Far from Unhackable  - Finding and hacking Microsoft web servers, by xile
  20. Examining Student Databases  - Security checking university student databases, by Screamer Chaotix
  21. 2600 Marketplace
  22. 2600 Meetings

  $2600 Magazine - Volume 19, Number 1 (Spring 2002)

  1. Time To Care  - Editorial
  2. Transaction-Based Systems  - Overview and potential security holes in transaction-based (online) ordering systems, by StankDawg
  3. How to Regain Privacy on the Net  - Stopping cookies, web bugs, spyware, etc., by Boris Loza
  4. Stupid Google Tricks  - How to search using Google, by Particle Bored (Cory Bys)
  5. Neat Stuff with Switchboard.com  - Searching for private information with Switchboard.com, by Cunning Linguist  (Jeff Strauss)
  6. Poor Man's 3D  - How to make cheap 3D glasses for use in WinAmp, by diabolik
  7. AppleTalk Security Secrets  - Security on AppleTalk networks, by Steven Kreuzer
  8. The Definitive Guide to Phreak Boxes  - Brief overview of each the phone phreak's "color" boxes, by Elf Qrin  (Valerio Capello)
  9. The Bungee Box  - Simple modification to add a retractable cord to your Beige Box, by Captain B
  10. CampusWide Wide Open  - Very good article on the AT&T/Blackboard CampusWide ID card system and a potential security exploit, by Acidus
  11. Idiocy in the Telcos  - Confusion for customer's using directory assistance with today's phone companies, by The Cheshire Catalyst
  12. Letters  - Backtalk
    • Signs of Hope  - Breto, avatar
    • Higher Education  - A7th, StMike
    • Help Wanted  - Mingus, Asbigassex@aol.com, HSFk2
    • Corrupting Youth  - ex_chronos (Reno, NV)
    • Miscellaneous Info  - ~dissoluten, Empty Set, Raleigh Cross, Revanant, Doodle, Random Jubatus (Jeremy Whelchel)
    • Answers Needed  - Rick Olson (Fluffy, Vista, CA), Johnny, haux, Bill Boyle, Anti-Christ, lop, Drew, SuperGuido, Crim, Kaoslord (Guillermo Roditi, Fort Lauderdale, FL)
    • Complaints  - john smith (California), tHr13z3, Binary Burnout
    • Worries  - Mr. Brown, 3-Com, Silent
    • Ideas  - Drwar
    • More Politics  - Mike S. Lorrey (Retroman), Jon McLaughlin, Joseph McLeod, SKZ
    • Observations  - noire, Gustaf, psyk0mantis, bluness, Herman, Cody Beeson (Yuma, AZ), DephKon1 (Phil Nolan, Will Ohmsford), dougk_ff7 (Doug Kelly), Suicidal, Phookadude (Patrick Moore, Topeka, KS), Two Avocados
    • The World of Retail  - TheDude (Sacramento, CA)
    • Injustice  - Scott Moulton (Court Case), ht, Anthony D. Bower, Johnny Slash, Nicolai, Sunfist, Ghent (Branden Hancock), johnnyfulcrum (Johnny Fulcrum), Polar Mike, Jeremy M Lang
    • Corporate Corruption  - ~toast666, vidic0n (Canada), Robert Williams, c0d3wr3ck3r (Eric), nomotion, Dash Interrupt, Brad
    • Article Feedback  - MSM, Kurt Winter, ascii32, ted, P4R4d0x, Scott, Emre Yucel (amoeba1911, Cincinnati, OH), InternetGoddess, Steven Richards
    • Tracking Terrorists  - Chris, Dan

  13. Creative Cable Modem Configuration  - Cable modem and DOCIS information, by Pankaj Arora
  14. Fun Password Facts  - Different password combinations, by hairball (New Kensington, PA)
  15. Defeating Network Address Translation  - Routing ports behind a NAT, by g00gleminer
  16. NSI Abuse  - Network Solutions not following their own rules, by Chris Byrnes
  17. The Threat of a Lazy Admin  - Secure both sides of your network, by Javier O. (Javier Ortega)
  18. A Script for the Right-Click Suppressed  - Example Perl script to grab images, or other files, from websites which block right-clicks, by Pete
  19. Retail Hardware Revisited  - Kmart rules, by dual_parallel
  20. More Radio Shack Facts  - Internet connection and store information at Radio Shack, by c3llph
  21. 2600 Marketplace
  22. 2600 Meetings

  $2600 Magazine - Volume 19, Number 2 (Summer 2002)

  1. Fair Use and Abuse  - Editorial
  2. The Comprehensive Guide to 802.11b Wireless Networks  - Good overview of the 802.11 (Wi-Fi) wireless protocol and networks, by Dragorn  (Michael Kershaw, Email, GitHub)
  3. How to Break Through a Proxy or Firewall  - How to break through a firewall using SSH tunneling, by unformed
  4. A Nasty NT Bug  - How to kill a NT machine, by HJH
  5. A Look Back  - Story of old hacker days, by Dufu  (Joe Agro, Millington, New Jersey)
  6. Grab That Cache  - Perl script to collect and view images in your web browser's cache, by David Nicol  (Kansas City, Missouri)
  7. The End of an Era  - AT&T's retirement (or not) of ACTS and the end of Red Boxing as we know it, by Lucky225
  8. NCR ATMs - Aurum Ex Machina  - Detailed overview of the computer and operating system in NCR PersonaS88 ATMs, by Acidus
  9. The Afghan Phone System  - The phone system in Afghanistan, by Iconoclast
  10. Yet Another Way to Defeat URL Filters  - Program to bypass URL filtering by generating "decimal" versions of IP addresses, by ThermoFish  (James Wood, Bristow, Virginia)
  11. Getting Into Cisco Routers  - Attacking Cisco routers, by Grandmaster Plague
  12. A New Era of Telecommunications Surveillance  - Overview of telecommunications surveillance, by The Prophet
  13. Web Server Discovery Tool  - Scanner for ports serving websites, by Boris Loza (Toronto, Canada)
  14. Letters  - Input
    • Darwin Awards  - CrashPlastic, JohnnyD, Carter (U.K.), John Fannin, THE COMMON SENCE!, Nick Fury, Fisqual, RW
    • Questions  - Ricardo (Brazil), marblehead, MW, gomma, fallout, psi, Mark12085
    • Privacy Issues  - Godless Phreak, bear, thoughtcrime
    • Feedback  - gir, Buster Doney, Silent, Rat, Grey Frequency (New York, DOB: 09-03-1978, Twitter), lunius, ThieF, Klep, James, Mike K, Ninjak, fremont_dslam (Fremont, CA), blind, littlegreenguy, Suicidal, Kronikal, Czar Donic, Junglee, Aaron, Kristopher Barrett, Manic Velocity, CK
    • Trash  - captain_b
    • Revenge  - deadkode, brujo
    • Help  - Terrance, Adam from Ontario, Alice
    • 4/1/2  - Bob Smellicular, Nothing None
    • Education  - Wild Karrde (Cottage Grove, Oregon), Windwalker
    • Weird Stuff  - soloha
    • Fun Stuff  - Gary (Japan)
    • More Info  - maldoror (Tampa, FL), Bildo, phlux, drew
    • Issues  - vroman, Craig, jesse s., American Citizen Living Abroad
    • Retail  - DEESil, fuzzhack, Angela, Moon Knight, Signal9, Neo Retrospect
    • Solutions  - husam, quel
    • More Corporate Abuse  - Peter
    • Observations  - drenehtsral (Lar Friend, Ithaca, New York), William Rudek, Erovi, zanar (Australia), Rabid, Super-Fly, pa, phobik, Methaline, xcham, aimfan69

  15. Your Eyes Have Just Been Sold  - Info on web ads, by docburton
  16. Dumpster Diving: One Man's Trash  - How to dig through garbage, by Grifter (Salt Lake City, UT)
  17. Mind Tricks  - How to intimidate people, by Tazz Shippensburg
  18. Review: Hacker Culture  - Book review of Douglas Thomas' Hacker Culture, by Ben McCorkle  (Marion, OH)
  19. CBDTPA: Yet Another Privacy Concern  - Info on the Consumer Broadband and Digital Television Promotion Act, by area_51
  20. Null Sessions and Enumeration  - Info on Windows null sessions, by AcidFlame
  21. 2600 Marketplace
  22. 2600 Meetings

  $2600 Magazine - Volume 19, Number 3 (Fall 2002)

  1. Freedom's Biggest Enemy  - Editorial
  2. Lawfully Authorized Electronic Surveillance  - Communications Assistance for Law Enforcement Act overview and notes, by Mystic  (Andrew Lowe, Santa Cruz, California)
  3. The Mysterious World of the LERG  - Definitions of some Local Exchange Routing Guide (LERG) terms, by Tom Morrow 3.0
  4. TeleZapper, Telemarketers, and the TCPA  - General overview of the TeleZapper device and some tips on how to stop being contacted by telemarketers, by bland_inquisitor
  5. A Password Grabbing Attempt  - Perl script to generate a fake "error message" in an attempt to capture the user's password, by Gr@ve_Rose
  6. Advanced Password Recovery  - Password cracking tips, by Galahad  (PDF)
  7. Fun Password Facts Revisited  - sex, god, etc, by kaige
  8. Hacking on Vacation  - Disney World ticket, computer, network information, by Eric
  9. Your Guide to Target  - Target store and cash register computer systems, by Code0
  10. Outsmarting Blockbuster  - Social engineering Blockbuster, by Maniac_Dan (Dan McAloon)
  11. The New Card Up DirecTV's Sleeve  - Info on DirecTV satellite cards, by Mangaburn
  12. The Pewter Box  - Turn an old hard drive into a speaker, by Mark12085
  13. How to Log URL Request Strings  - How to display and log all URL requests from Internet Explorer 6.0, by LiquidBinary  (Mike Leonguerrero)
  14. Letters  - Missives
    • Discoveries  - Eric, NilObject, BF, fatdave (MySpace, De Forest, WI), Jonathan, drlecter
    • Meeting Issues  - Blue Canary (Laguna Niguel, CA)
    • Ideas  - Elstun, Bac, David Parker, Jeremy
    • Unease  - 24CORE, Wyatt, David, cerebrum86 (DOB: 07-16-1986), Nicker (Canada), GnuHal & GnuWopr (Spain), Hualon, Peter (j0lt) Truth
    • Getting Around the System  - NcongruNt (John Menke, Austin, TX, MySpace, DOB: 09-16-1978), Folkert van Heusden (Netherlands), Doug
    • Words of Thanks  - nuclear_decay, strupp, Galaxyhq, Mobius, Fr33d0mFiteR, Zapphire, Netrunner
    • Critique  - Greg (Golden, CO), execute aka Ex3cut3, Chris, rootx11
    • The Hacker Ethic  - anonymous, Rob T. Firefly (Rob Vincent, MySpace)
    • Questions  - ng, sergio, Cybersavior, tyg0n, Tony, 'Notary Public', Steve, Chris Hanks, Razorface, drlecter, James
    • Problems  - echolon, Jeff (London, Ontario), VanEck, your_uncle_vinny (Maine), Wendy (Lakeland, FL)
    • The School System  - ThyF, PSX00 (Michael J. Moro, Waukesha, WI), JavaJacker (Dallas, TX), MacAllah
    • Something Positive  - Veg, JL (Arvada, CO), Y2kbug, bernz, bradsnet, Buzzter66 (Houston, TX), James
    • Further Info  - Karl, Andrew, rook, Fractal, Ion, Steven, Jennifer, Toph

  15. A History of "31337SP34K"  - Explaining to a new generation of hakkerz into what "elite speak" is, where it came from, and when (and if) to use it, by StankDawg
  16. Hardware Broadband Client Monitoring - an Overview  - Monitoring DSL traffic, by psyk0mantis
  17. How to Set Up a Free (Secure!) Web Server at Home  - Hiding servers on cable/DSL, by Khoder bin Hakkin
  18. A Word of Warning from a Caught Uncapper  - Story of a caught cable modem uncapper, by Kris Olson
  19. Hacking Electronic Message Centers  - Hacking electronic signs, by Mr. Glenn Frog
  20. Breaking Down the DYNIX Door  - How to harass those poor old librarians, by iCe799  (Security Info)
  21. The Current State of E-Commerce Security  - E-commerce security issues, by Derek P. Moore
  22. Review: The Art of Deception  - Book review of Kevin Mitnick's The Art of Deception, by Evil Corley
  23. 2600 Marketplace
  24. 2600 Meetings

  $2600 Magazine - Volume 19, Number 4 (Winter 2002-2003)

  1. Positively  - Editorial
  2. Passport Hacking Revisited  - Vulnerability in Microsoft Passport, by Chris Shiflett (Brooklyn, New York, Twitter)
  3. Lazy Exchange Admins  - Security holes in Microsoft Exchange servers, by ddShelby (George M., Savannah, GA)
  4. Warspying  - Portable receiver for wireless X10 cameras, by Particle Bored  (Additional Info)
  5. CD Media Data Destruction  - How to destroy CDs, by Gr3y t0qu3
  6. How to Make a DVD Backup  - How to rip, copy, and encode DVDs, by Maniac_Dan  (PDF)
  7. Honeypots: Building the Better Hacker  - Overview of using computer honeypots and how they may not always be practical in stopping (or exposing) a really dedicated attacker, by Bland Inquisitor
  8. DNS Redirection Stopped  - VB script to check IP-to-DNS mappings, by c0ld_b00t
  9. More on Telemarketing  - More tricks for defeating telemarketers, by D. Foetus (D.L. Jones)
  10. Cracking Voter Fraud  - How to prevent fake voter registrations, by Kr@kH3d (DFxC, Dominick)
  11. Linux on the Xbox  - How to install Linux on an Xbox, by Live_wire
  12. Removing Spyware and Adware  - man rm, by 0/\/3_3y3d_/\/\0/\/st3r
  13. Exposing the Coinstar Network  - Overview of the Coinstar change machine network, by area_51
  14. A Dumpster Diving Treasure  - Neat finds (Alteon iSD-100) in the garbage, by phantasm (Robert Davies)
  15. DMCA vs. DMCRA  - Ramblings, by Alex Daniel
  16. Letters  - Blather
    • Spreading News  - NoSpahm, Keith, scott, Sardonicus, cybernard
    • Terrorism Related Issues  - Tresser, jmu, Herman, PLMN, Lectoid, Surfgods, LordKhamul, Hells-own, Kr00lee-O
    • Dumpster Diving  - Paddy, Nomad, Stinky
    • Feedback  - Traveler, XiChimos, joe, Bob M., Eil, Charles, Shadowfax0 (Kingston, Ontario), hawk2000, Poetics, Nietzsche, JaMm3r, Rob T. Firefly, Jason Argonaut, Resurrection20
    • Injustice Department  - deejayred2001 (Templeton, CA), Matt, Evnglion, im_source, Dune Tanaka, Todd
    • Thoughts On Piracy  - I1269U (Leilan, Harrisburg, PA)
    • Questions  - Super-Fly, In a TrAnCe, QuietShadow (Liz), Phate_2k2, Quiet Riot, ddShelby, Ganja51 (Kris Blommel, Rosemount, Minnesota), Tony
    • Observations  - Freddy, Quebec, Mark, The Nibbler, Spooky Chris, jesse, christopher, jasonburb, jmk, Radarjam, sunzi, Cambalache20, k1d0n, derrick
    • Tale From The Past  - John K.
    • Retail World  - Zac T., XiChimos, acj626 (Arleigh, Austell, GA), pinchepunk (J.M, Chicago, IL)
    • Parallels  - Sparkster
    • A New Project  - Poetics, Elf Qrin
    • Critique  - AGE_18, Dave D.
    • Significant Developments  - RusH, fstratto (Frank Stratton, Urbana, IL)
    • Defining Hackers  - f0x deacon
    • Reaching Out  - Nyght

  17. .ncsc.mil (144.51.x.x)  - man dig
  18. A Brief Introduction to DeepFreeze  - How the DeepFreeze blocking software works, by The Flatline
  19. Beating Download Manager Protection  - Defeating file blocking on the web, by Straightface
  20. DHCP is Your Friend!  - How to configure DHCP, by di0nysus
  21. 2600 Marketplace
  22. 2600 Meetings

    [iboughtit1]    

New $2600 Magazine T-Shirt Ideas


  $2600 Magazine - Volume 20, Number 1 (Spring 2003)

  1. Not In Our Name  - Editorial
  2. ANI and Caller ID Spoofing  - Very detailed article on the commons methods to spoof the Calling Party Number (CPN) parameter and even ANI, by Lucky225
  3. A Hacker Goes to Iraq  - Computer info from Iraq, by Chris McKinstry  (Mindpixel, Wikipedia Entry)
  4. Getting Busted - Military Style  - Overview of the Uniform Code of Military Justice, by TC
  5. Unsolicited Mail  - Spam from SIPRNET, propaganda
  6. Anonymous E-Mail Using Remailers  - How to use and stay anonymous using E-mail remailers, by angelazaharia
  7. Fun With 802.11b at Kroger's  - Using the wireless network at Kroger's, by Kairi Nakatsuki
  8. Best Buy Insecurities  - How to access the Internet via computers at Best Buy, by WInt3rmut3
  9. Ripping Movies from DVD to CD-R  - How to rip DVDs, by Solthae
  10. XM - The Flawed Future of Radio  - Basic technical overview of the XM Satellite Radio service, by Acidus
  11. Letters  - Babble
    • The War on Stupidity  - JF (Texas), shaggyeightball (Harold Backer), eigenvalue (Canada), 2600 Reader
    • Random Observations  - kyoung, Tom, CaptainJ, TwinZero, rOb, dougk ff7, Phake, Victor Hugo, Herman, Abstract, Robert (Johannesburg, South Africa), squid, confusedbee (Elizabeth J. Clayton, Toronto, Canada, DOB: 01-22-????), fremont_dslam, eyenot (Gabriel Arthur Petrie), scott (West Nyack, New York), Aaron, (none given), dominatus, chaos985 (William Harry, Email #1, Email #2, West Palm Beach, FL, DOB: 11-30-????), 2600reader
    • Meetings  - x, cs, Oversight
    • Security  - DWD, Poetics, DVNT
    • New Projects  - Jari (Finland), Ghent
    • Inquiries  - kayvan, root, InfrHck, x8ou;##5, Ray, Mark, osiris, kaspel (New York, New York), alan
    • New Feedback  - ByteEnable (Austin, TX), Jester (New Jersey), Aaron, Kimberly, Anewname (Toronto, Canada), glenn, cOld.bOOt, TheTechnophile
    • Response to Old Feedback  - Kyle, JohnnylS (San Diego, CA), Zeitgeist, Blake, CableTick, Lunacite, Jon
    • Bypassing Security  - LMB
    • Problem Solving  - Pi, Siece, Pete
    • Cover Comments  - BC, CrzyDragn, Leprkan, f
    • An Accomplishment  - Adam
    • More on Telemarketing  - TimBER
    • Discoveries  - Poetics & Stealth5325 (Steve), Osiris, DriZakE, EBone, N (United Kingdom)
    • Suggestions  - DarkSide
    • Dangerous Info  - Beowulf

  12. A First Look at Virgin Mobile  - Technical overview of the Virgin Mobile cellular carrier, by The Prophet
  13. Creating Delay in the New Age  - Using 3-way calling to recreate the old sound of tandem stacking, by Screamer Chaotix
  14. IBuySpy Portal Software  - Overview of the Microsoft's IBuySpy web portal software, by Papa Doc
  15. Defeating Salon.com's Premium Content  - View Salon web pages without paying for them, by annie niemoose
  16. Fun With Hosting on Your Cable/DSL  - How to host servers on your cable or DSL connection, by Toby (Ryan Toby Richards)
  17. Keyboard Theory for the New Age Phreak  - Neat concept linking piano keys to telephone tones, by autocode
  18. A Glimpse at the Future of Computing  - Ramblings, by Phocks (Joshua Birtles)
  19. 2600 Marketplace
  20. 2600 Meetings

  $2600 Magazine - Volume 20, Number 2 (Summer 2003)

  1. Disrespecting the Law  - Editorial
  2. Roll Your Own IIS Intrusion Detection System  - Detect attacks on an IIS web server, by The Rev. Jackal-Headed-God  (Corey Ehmke, Bloomingdale, Illinois)
  3. Traversing the Corporate Firewall  - How to pass non-HTTP traffic through a firewall, by superheast
  4. Staying Anonymous in the Information Age  - Social engineering tips for obtaining private information and also some tips on how you can protect yourself, by Lucky225
  5. Hardware Key Logging  - Overview of operation of hardware key logging devices, like the KeyKatcher keystroke logger, by XlogicX  (Eric Davisson, Email)
  6. Peeling Grapes  - Peeling back website security, by Bryan Elliott
  7. Microphones, Laptops, and Supertaps  - Security problems with computer microphones, by Dark Spectrum (Wideband Dreamer)
  8. Optimum Online and You  - Using Optimum Online cable ISP services and how they block or filter incoming traffic, by Screamer Chaotix
  9. Cyber Cafe Software Security  - Cyber cafe software overview, by minion
  10. A Coupon Trick  - Story of generating your own UPC code on a coupon to increase its value, by Charles
  11. Hacking the Look  - Tips using Resource Hacker to tweak the look of your Windows system, by Rev. Edward E. Karn  (ZenLogic)
  12. Hosting a FTP Server on Cable/DSL Routers  - How to host servers on a cable or DSL connection, by osiris188
  13. Letters  - Voices
    • Sensitive Info  - f0urtyfive (Matt Mills), brian
    • Handy Tips  - Jason Argonaut, favdog
    • Policy  - Gloria, Captain B, Pi, No Name
    • Dealing With Opposition  - anonymous, Brian
    • Defining Terms  - fyrwurxx (Austin D.), fyrwurxx, revanant
    • The Law  - tack, Magelus, Jeremy, KoDo
    • Letter Responses  - encrypted, Lookat ThatThar, TC, blanch, p3rl_junki3, Ninjalicious (Jeff Chapman), darkism, dhax, area_51, drlecter, Walter
    • Web Feedback  - Scared in Iowa, demothenes (Mesa, AZ), Talofa, Inacho
    • Unlearn  - Screamer Chaotix, JPK, Amanda, Camille, Meriana, Christina
    • Random Observations  - fremont dslam, Weex, Scott, Sunfist, Jonathan, NeuRd, Procyrus (Ohio), J, Ivan, anonymous, Zen Lunatic, Mark Sadler, Mr. "of Lag"
    • Economics  - Lamerjoe, J. Miller
    • Misconceptions  - brian botkiller (MySpace)
    • Article Clarifications  - Toby, Marc Wallace, Firehazard, Matt, Jim, Papa Doc, Flat Line, Lucky225, Stormbringer (William Smith)
    • Clearing Blockages  - Skazz, Bullet, Logix

  14. McWireless Exposed  - McDonald's Wi-Fi networks, by Epiphany (Darien S. Acosta) and J0hny_Lightning
  15. 802.11b Reception Tricks  - Hardware tips to improve 802.11b networking, by ddShelby
  16. Distributed Reflective Denial of Service Attacks  - Overview of the dangers of newer DRDoS attacks which exploit the TCP 3-way handshake and how networks are potentially vulnerable to them, by Spyrochaete  (Brian, DJ Brian Damage)
  17. Fun With the Nokia 3360/3361  - Test and debug modes for the Nokia 3361 phone, by FragSpaz
  18. Why Red Boxing Still Works (sorta)  - It appears possible to Red Boxing off operators, by Plazmatic Shadow (Kevin Leacock)
  19. Xploiting XP  - Good overview of the techniques required to get around Windows XP serial numbers and activation, by Bill Melater
  20. 2600 Marketplace
  21. 2600 Meetings

  $2600 Magazine - Volume 20, Number 3 (Fall 2003)

  1. Feeding the Frenzy  - Editorial
  2. Getting to Know Your Neighbors  - Wireless network hacking, by Shiv Polarity
  3. Servers on a Ghetto ISP  - Hiding servers on cable/DSL connection, by Lirakis (Eric Tamme, New Rochelle, New York)
  4. More Methods for Hosting FTP on Broadband  - Methods for running (and hiding) a FTP server on cable/DSL connection, by Apratt
  5. Hacking the Look: Revisited  - How to install alternatives to the stock Windows Explorer desktop, by mojomonkee  (Brian Connolly)
  6. Case Mods Made Easy  - Make your computer look pretty, by X3N0X
  7. DVDs on a Pocket PC  - Play DVDs on a Pocket PC, by Shawn Frederick
  8. More Xbox Fun and Mischief  - Xbox hardware modifications, by spite
  9. Shopping for a Security Flaw? Try Retail  - Security holes in retail stores, by dead_pilgrim
  10. Troubling Target  - Target store computer systems, by redxlegion  (Red Legion, DOB: 08-21-????, Michigan)
  11. Blockbuster Tricks  - How to avoid late fees, by C.B. Cates
  12. Webhacking with CVS  - Look for info in CVS directories, by methodic  (Tony Lambiris)
  13. Basics of Cellular Number Portability  - How cellular number portability works, by C3llph
  14. The Hacker Diet  - How to eat good, by Shade
  15. Feather.c  - C code to preserve a program's atime and mtime after execution, by Kairi Nakatsuki
  16. Letters  - Articulated Gibberish
    • Article Feedback  - rFmAn, Matt M., Austrailian Knight, shaggyeightball, Tonio K., Scott (New Jersey), Analog666, mojomonkee, Al, JL, D1vr0c (David Crowe), mAineAc, Jim, Eeviac
    • Confusion  - Manga, netj, Sph1nx
    • Newbies  - MarBle, Henry (Germany), Drake Smith, Joseph, Thierry (Africa)
    • Have You Heard?  - Jesse W., PhrenicGermal (Thomas Hodges, Winfield, IL, DOB: 11-29-????), MacAllah
    • Taking Action  - Patrick
    • Observations  - Satch379, SeKToR, Spua7, Dave C, John Tate, CPUHaxxer, aaron t, Eric
    • Keep The Faith  - tWiST, c0l0r3dfr34k (Anthony, DOB: 02-22-1984), Bob
    • The Past  - walt, kdg, Fruber
    • Destructiveness  - Lord Kahless
    • The Quest For Knowledge  - slax0r (Eric Agan, South Bend, Indiana), Brainwaste, Helen
    • Piracy Prevention  - semicerebral, eigenvalue
    • Insecurity  - tr, osiris, Big B. Statz
    • Suggestions  - drlecter, Ion, PCBootlegger, scissorjammer (Alex Rakoczy, DOB: 12-07-1986), Concerned Grandma
    • The Authorities  - Performaman, Alan (The Hague, Netherlands, Note:  The Taliban receives their money from drug sales in Holland and Western Europe)
    • Concerns  - Caps Lock, Sam, Martin
    • Chastising the Ignorant  - leetkurp (Atlantic City, NJ)
    • A Sign of Hope  - theXorcist

  17. Denial of Service Attacks, Tools of the Tools  - Overview of how denial-of-service attacks work and some of the tools capable of causing them, by bland_inquisitor
  18. Frequency Theory for the Phone Hacker/Musician  - How audio frequencies in the phone system and music are spectrally related, by The Piano Guy  (Gary Rimar, Bloomfield Hills, Michigan, and Arlington, Virginia)
  19. A Trip Down Memory Lane  - Story of using the early browsers and chat utilities on the Internet, by Jimmy Yu
  20. Finding Ogg - Audio Evangelism  - Info on the OGG audio format, by The Dark Shirt (Irving Washington, London, U.K.)
  21. Infidelity in the Information Age: How I Caught My Cheating Girlfriend  - Story on how deleted info really isn't, by atoma
  22. The Threat of Biometrics  - Overview of the MorphoTouch biometrics system installed at a school, by _cHiCkEn_ (Pennsylvania)
  23. Gentner GSC3000 for Total Morons  - Info on the Gentner GSC3000 radio station control hardware, by blakmac (Blake MacArthur)
  24. 2600 Marketplace
  25. 2600 Meetings

  $2600 Magazine - Volume 20, Number 4 (Winter 2003-2004)

  1. Paranoia vs. Sanity  - Editorial
  2. Hacking the Genome  - The creation of Genetically Modified Organisms (GMOs) is now within the ability of a knowledgeable and dedicated hacker, by Professor L
  3. Whom Do You Trust? - Issues of Several CAs Authentication Mechanisms  - SSL overview and the author was able to trick Certification Authorities (CA) to issue him a certificate, when they really shouldn't have, by Juraj Bednár  (Slovak Republic, Email, GitHub, Twitter, )
  4. System Profiling Through RPC  - Overview of probing, and/or exploiting, hosts via open RPC daemons, by Screamer Chaotix
  5. Robots and Spiders  - How Internet spiders (search engine crawlers) work, loopholes, and potential security issues, by StankDawg
  6. Living Without a SSN  - How to avoid giving out your Social Security number on credit card applications, by Lucky225
  7. More Fun With Wireless Hacking  - Quick notes on Wi-Fi hacking and the dangers of using WEP encryption, by VileSYN  (Dennis Brown)
  8. WEP: Not For Me  - Story of a person scanning for Wi-Fi devices and finding lots of open Access Points, includes a list of default logins & password, by 0x20Cowboy
  9. War Driving with a Pocket PC  - How to use a Pocket PC and "Mini Stumbler" to wardrive Wi-Fi access points, by RaT_HaCk
  10. Verizon's Call Intercept  - Overview and loopholes in Verizon's call intercept service, by decoder (William Quinn)
  11. Fun With Hping  - How to use Hping, a program which allows you to create arbitrary packets with all types of options, by methodic
  12. Remote Computing Secured  - How to secure Virtual Network Computing (VNC) using SSH and SSL, by Xphile
  13. Letters  - Speech
    • Getting Around the System  - Evil Alex, Rifkey, Khoder bin Hakkin
    • Miscellaneous Fact  - SFG
    • New Ideas  - Erik, Chris
    • The State of Education  - richard, Muttski, lord_stinkington (South Carolina), alex (a.k.a. Suge, Florida), Sheff-Boy-RD (Adam Sheff)
    • Military Readers  - Neo, Noname, PhatMan (Canada), karniv0re, Cpl Grimes
    • Miscommunication  - Regards
    • Further Info  - DeadPainter, Anonymous, miniz003, Slacksoft, hbob, mrbrown8 (Curtis J. Brown), Sparklx, Somar, Taurus Bulba, Hroly
    • Misdeed  - Paul
    • Pointed Questions  - TrIpAnDaNce, magnum0711, Marcelo Barb (Brazil), Ken
    • Call For Help  - Professor_Ling
    • The Issue of Piracy  - fH, martianpenguin (DOB: 12-03-1985), Jeff, Hooky1963
    • Some Clarifications  - Mark A. McBride (Evans, GA), Colonel Panic (John S. Albert, KC9EQK), D1vr0c, Poetics, phresno
    • Spreading Knowledge  - Robert (Portland, Oregon)
    • Food For Thought  - Blair (California), Code Dark, nameless, SoftwarePir@te, Jon, Anonymous
    • Info Needed  - Mike, Scott, Uncle Dust, Elvis Carter-Abbot
    • Ominous Developments  - czarandom, Iz
    • Annoying Problems  - Daniel, Erik, zs (Zachary Smith), sandman10_99, Lily
    • Appreciation  - ReDLiNe135, Tarball Gunzip
    • Reader Advice  - Stone Wolf, Chris, crypto
    • Stories of Insecurity  - Cory K., Zardoz

  14. DISA, UNIX Security, and Reality  - Department of Defense UNIX specifications, by sunpuke (Robert Escue, Virginia Beach, VA)
  15. Hacking the "Captivate" Network  - Overview of the Captivate screens mounted in some elevators and how to connect to their wireless network, by Darlok
  16. Unlocking GSM Handsets  - How to unlock some common GSM handsets for use on other cellular phone carriers, by The Prophet
  17. Unlocking WebLock Pro  - How to defeat the WebLock Pro HTML source protection system, by Schnarf
  18. Holes in Windows 2003 Server  - Setup Manager overview, passwords are standard LAN Manager hash capable of being attacked by John the Ripper, by Joseph B. Zekany (Zucchini)
  19. How to Mess with Citibank Collections  - Tips and tricks for messing with (and avoiding) Citibank's collection centers, by The Pissed Off One Armed Man
  20. 2600 Marketplace
  21. 2600 Meetings

  $2600 Magazine - Volume 21, Number 1 (Spring 2004)

  1. Twenty Years After  - Editorial
  2. Taking Advantage of Physical Access  - Physical security for your computer, by Evil Wrangler
  3. Bypassing Minor Website Security  - How to defeat right-click suppression, content saving, cookies, logging, by Galahad
  4. Exploiting AIM Screen Name Loggers  - Exploit to gain admin access to any IMChaos account by spoofing the AIM Browser Window, by Stik
  5. Using Perl to Defeat Provider Restrictions  - Using a couple of Perl CGIs to alert you if your dynamic IP is changed, by TRM
  6. A Simple but Effective Spanner in Your AVS  - Trick program to defeat an anti-virus scanner (Symantec, McAffe, etc.) by covertly deleting the EXE or other required operating files, by Irving Washington
  7. Hacking the Hilton  - Using the high-speed Internet connection at Hilton Hotels, by Estragon
  8. Cruise Cracking  - Carnival Cruise computer network overview, by Jesters8 (Stephen)
  9. A Sprint PCS Trick  - Via Sprint PCS: op-divert to "ANI Fail," then supply the target's number.  It's also possible to uncover the target's PIN via their voicemail settings, by quel
  10. Hacking a Mercedes Benz with a Universal Remote  - Use an universal IR remote control to record the "Lock," "Unlock," and "Trunk Release" infrared codes used on older Mercedes Benz vehicles, by TOneZ2600  (Corey Friedman)
  11. The $40 Hardware War Dialer  - Palm V PDA plus a Palm modem and Kingpin's TBA software to create a low-cost war dialer, by Grandmaster Plague
  12. Serial Number Security  - Why software serial numbers should not be out in the open, by TEV
  13. Barcode Tricks  - How to read and edit UPC barcodes, by XlogicX
  14. Installing Debian on Your Unmodded Xbox  - How to install Linux on your Xbox, by dave
  15. Letters  - Mind Exercises
    • Assorted Questions  - Jason, Andrew, tchnprgrmr (Ceda, Jacksonville, FL), Alexey (Russia), Multivac_Kleenex, N,cow, moviestardog04, Jerry, Phreakinphun
    • Con Game  - Darkstorm777 (Steven Caputo, Email #1, Chicago, IL)
    • Random Feedback  - Osama, Anton, Performaman, Amit Jain, Adam Rzepka, FTE, gabriel aaron, Digital_Cowboy, uberphreak, Enonymous, Ian Johnson (jwoulf, LiveJournal), The Fallen One, rainwater5 (Scott), Eric M., Mike Neary, drlecter (Weston George), Blimpieboy, Witchlight, Karlman Rovetounge, Daniac, NGTV|3
    • Help Offered  - loco freak
    • Observations  - MoJo, darkpo3t (Daniel Hmeidan, DOB: 02-19-????), Poetics, Jim_Steele (San Francisco, CA), jake, drlecter, SAR, Louie, lint, Stephen
    • Military Readership  - d0rk, misterjager, MegaGeek, slack_pizza_guy, jim, E8Q
    • A Problem  - ALI
    • The Power of Ignorance  - the_heretic, AltSp4c3Ctrl, John Anon, thesuavel, sunami, ieMpleH, mord
    • Tips  - College_Student
    • Meeting Trouble  - Kaosaur
    • From the Other Side  - rewt, Rafin
    • The Music Industry  - Jakob Larson
    • More Bookstore Hijinks  - Cygnwulf, MG48s
    • Thoughts on Terrorism  - drlecter, Lindsey The Boy
    • To Clarify  - Lawrence, ZeroSpam
    • Mentoring  - Billy, Radix
    • Working Around the System  - Nathan

  16. Uncapper's Paradise  - Overview of uncapping your shell-enabled cable modem (SURFboard SB2100) by adding IP filters or changing the HFC MAC address automatically to a random address, by CronoS@OlympoS  (Ertan Kurt)
  17. Inside Adelphia  - Outside plant overview and info for an Adelphia CATV/Internet installation, by J. P. Arnold
  18. Subverting Non-Secure Login Forms  - PHP code to spoofing login forms (and capture passwords) on IE 5.0, 5.5, and 5.0, by I. O. Hook
  19. Setting Your Music Free: iTunes Music Sans DRM  - Use Apple's own provided tools to convert AACs to DRM-free WAV/MP3 files, by k0nk
  20. Vonage Broadband Phone Service  - Potential network security vulnerabilities in the Vonage VoIP service (and Cisco ATA-186) and their inability to care, by Kevin T. Blakley
  21. Sharing Your Life on a Peer-to-Peer Network  - Be careful what you put on the Interweb, by Kong
  22. MSN.com Redirect Scan  - Scanning the different sites MSN can redirect users to, by StankDawg
  23. 2600 Marketplace
  24. 2600 Meetings

  $2600 Magazine - Volume 21, Number 2 (Summer 2004)

  1. Mirroring the Future  - Editorial
  2. Scumware, Spyware, Adware, Sneakware  - Overview of the latest spyware and how to remove it, by shinohara
  3. ClearChannel's Dirty Little Secret  - Behind the scenes at a ClearChannel radio station, by Chris Johnson (Bellows Falls, Vermont)
  4. Impromptu Lock Picks  - Make lockpicks out of household items, by L. Gallion
  5. Magstripe Interfacing - A Lost Art  - Very detailed (and updated) article on the properties of magnetic stripe cards and how to build your own reader, by Acidus
  6. Listening via Linux  - Source code for a simple port listener (server), by Solthae
  7. Passwords on a :CueCat  - Use your :CueCat and a random bar code as a fairly secure password, by SARain
  8. The Global Date Format  - The "correct" way to write dates (Year/Month/Day/Hour/Minute/Second) or ISO-8601, by Richard Cheshire
  9. Behind the Scenes of ITEC and the Milwaukee Bus System  - Info on the video displays in buses, by Eoban  (Eoban Binder, Bloomington, Indiana, Faceberg, Twitter, GitHub)
  10. Omni Locks and Stupid Politics  - Story of an Omni Lock adventure, by R. Toby Richards
  11. A Guide to Internet Piracy  - How to be a warez kid, by b-bstf (Andrew Smith)
  12. Letters  - Verbal Constructs
    • Reference Material  - Twiggs, Scott, XsnipaX (Aurora, CO)
    • Gratitude  - The Piano Guy, SillyCatOwner, mg48s, Redukt, Closer (Greenville, SC), Nick
    • Questions  - AB, Zero Cool (Pakistan), kenneth, Charles, ass goblin, Rick, Lynn
    • Meetings  - iostreamz (Frank, Miami, FL), Tsun
    • Tricks  - infrared, Brendan Bogosian
    • Complaints  - Jeff, Vladinator, S, Joshua, Shortfuse, Dr. Smack
    • More Info  - w1nt3rmut3, Matthew "Blueleaf" Capone, vectorsigma, daste73 (Stephen J. Heeney, Pennsylvania), Unlocked, ScottVR, SJKJRX
    • Satellite Radio  - M@, Stormbringer
    • Call For Info  - Miles, mustangdriver504
    • More From The Military  - Caps Locks
    • Positive Stuff  - scotwr, Steaming Martyr
    • Submissions  - mike, Anon Ymous, drlecter
    • Warnings  - eyenot, mixmaster, Sysopny, crazypete, Ben Franklin, RT
    • Stupid Stuff  - Fairy Fock, sephail, Maniac_Dan, Ash (Ashmit), The Great Belzoni, Clint, Gigabyte_GRynd3R (Massachusetts)
    • Homeland Security  - Lee Colleton (Flickr, Seattle, Washington), Prospero
    • Redirecting  - Steve Duch
    • Observations  - Mugulord, Pablo, Michael J. Ferris, Micheal, autocode, Bryan, DRAHZ (Arlington, VA), cycoanalytikal (Marty, Lawton, OK, DOB: 07-18-????), Simon Shadow, Greg Gowen (Corrales, New Mexico)

  13. Consumer Spookware vs. Your Castle  - Fake article on surveillance hazards, by Dark Spectrum (Wideband Dreamer)
  14. A Lesson on Trust  - Story of hacking a school network, by Sairys
  15. Fun With Netcat  - Neat tricks with Netcat, by MobiusRenoire  (Weylin Burgett, Mt. Vernon, OH)
  16. The Lantronix SCS1620: An Unpublicized Gold Mine  - Command info for the Lantronix SCS1620 secure console servers, by JK
  17. 2600 Marketplace
  18. 2600 Meetings

  $2600 Magazine - Volume 21, Number 3 (Fall 2004)

  1. Learning Curve  - Editorial
  2. In the Belly of the Beast  - Story of working at AOL and an overview of their internal network security, by slummin
  3. Anti-Forensics: Make Secrets Stay Secret  - Hiding data on a Windows machine, by Frater Ignotius
  4. Digital CDMA Cloning  - Cloning a Kyocera 2235 CDMA phone, by tele
  5. Bit Torrent - The Future of the Internet?  - Overview of the Bit Torrent protocol, by spite
  6. The Insecurity of PHP Includes  - Security holes in PHP include files, by jumbobrian  (Brian DeFreitas, San Leandro, CA, Faceberg)
  7. Movies on a Phone  - Play DVDs on a PDA or cell phone, by bill
  8. Free Encryption Backup  - Use Google Mail to store encrypted files, by Fernando
  9. Laptop Security  - Scripts you can use to remotely access your laptop if it's ever stolen and a few tips to protect your data, by Fernando
  10. Introduction to IPv6  - Overview of the IPv6 protocol, by Gr@ve_Rose
  11. Hacking Soda Machines  - Debug menus on soda machines, by MeGaBiTe1  (Email)
  12. Murphy Oil (Walmart) Fueling Stations  - Info on Murphy Oil computer systems, by max_9909
  13. The Big Picture - Linux is Approved!  - Update to the DISA article, by Zourick
  14. How to Hack the Lottery  - How do you hack the lottery?  I can sum up the answer to this question in two words; "don't play," by StankDawg
  15. Letters  - Troublemakers
    • Clearing Things Up  - nima (Denmark), Mark
    • Expanding on Thoughts  - Rujo-king, FredTheMole, Cameron, generationxyu (James Longstreet), aguilanegra (Mateo E. Nares), Mannequin, w00tpro, ieMpleH, Jarett M, Jacob, ree, jazzy, Michael J. Ferris, OpenDNA, Copyaj, quel, DarkLight, Shadowfox, Goldman of Chaos (Matthew Goldman), The Gillig Phantom
    • Discoveries  - Wildkat, Dave (New Jersey)
    • Idiocy  - PCracer51, No Name, Wildrobo, Steve Shaw (Tennesse), BBV, PsychOcrazY
    • Security Holes  - Chthon, a.texas, FreshFeesh (Christopher Wright), ericc
    • Randomness  - Thomas
    • Red Flags  - Jynx, Brian the Fist (Howard Feldman)
    • Interpreting Covers  - coolguy, demosthenes, RTFM Noriega, vyxenangel
    • Scams  - Al3xTr3b3K, Andrew, SystemX
    • Making Change  - Mike, qw0ntum (Shaddi Hasan)
    • Observations  - Juan in Aztlan, Judas Iscariot, John, Beaver, Lori, t3st_s3t (Email, BinRev Profile), ReEk0n, Haleon, Miles, KPR, fyrwurxx, mike s., Alex K, Steven Jackson (Joliet, IL)
    • General Queries  - Tap, hb0b, Beowulf, Pierre, Hiten, Servus Casandro (Christian Berger)

  16. The Leightronix TCD/IP  - Info and commands for Leightronix video control hardware, by slick0  (MySpace)
  17. Decoding Blockbuster  - Blockbuster bar code info, by SDMX
  18. Warwalking in Times Square  - Wireless access points in Times Square, by Sam Nitzberg
  19. Fight Spam with JavaScript  - How to hide your email address with JavaScript, by arse
  20. FC.EXE to the Rescue  - Neat article on cracking Windows-program passwords, by akaak
  21. A Simple Solution to Dynamic IP Tracking  - How to track your dynamic IP, by Gruggni (DOB: 02-09-1975)
  22. 2600 Marketplace
  23. 2600 Meetings

  $2600 Magazine - Volume 21, Number 4 (Winter 2004-2005)

  1. Stick Around  - Editorial
  2. Hacking CDMA PRLs  - Hacking Preferred Roaming Lists, by The Prophet  (Audio Version)
  3. An Old Trick for a New Dog: Wi-Fi and MITM  - Overview of Wi-Fi Man-in-the-Middle attacks, by uberpenguin (Matt Britt)
  4. Vulnerabilities in Subscription Wireless  - Wi-Fi MAC spoofing, by wishbone
  5. Best Buy's Uber Insecurity  - Info on Best Buy computer/network security, by skilar
  6. Hijacking Auto-Run Programs for Improved Stealth  - Hiding running processes under Windows, by Forgotten247 (Shawn Maschino)
  7. Catching Credit Card Fraud through Steganography  - Customize credit card charges to verify what you charge, by Anonymous Author MD5: d03d3293cd954af6bccd53eac5d828fc
  8. Ad-Ware: The Art of Removal  - Overview of spyware removing programs, by Patrick Madigan (Doylestown, PA)
  9. Tracking Wireless Neighbors  - How to monitor/track unwanted Wi-Fi users, by Sam Nitzberg
  10. Backdooring the NAT'ed Network  - Somebody read the Netcat manual, by David Dunn
  11. Electronic Warfare  - Overview of the different EW methods, by HOMA
  12. Grokking for Answers  - How to search the interweb, by Bryan Elliott
  13. Letters  - Back and Forth
    • Questions  - Deepen D. Shah (Livingston, NJ), Mike, Shell, Sheri Lowers, Carole, Nick (Florida), Sarma, LeStat, Andrew 0., Tabetha
    • Life's Little Experiences  - DemonEclipse, Austin D. (Washington), Alex (Massachusetts), Muhammad Adil
    • Discoveries  - Mr. Fairweather, LabGeek, Mike
    • Injustices  - Will, Black_Angel (Ligia Tinta), Tcc9mpl (Matt Lametta), Monkey Minister, Citron, waterboy382, Oz1980, Zacchini
    • Observations  - Narcess, Dr. Ultra Doom Laser, .:LOGIX:., Ryan, CSIN, TOneZ2600, jeff affiliate, Freakker, Hoser, Josh, OveRHaulT (Arvada, CO), 00 (Tampa, FL), Dufu, Anon, Shellcode, William, Brain Waste (New York, New York), Chris C.
    • Visibility  - niknak (Galway, Ireland), chris (Canada), Ruth (Puerto Rico), bookdrone
    • Additional Info  - Jon, brarsh, Redukt, BBVGoon2126, Crapinapale
    • Responses  - WhiteHat (Australia), Osi44 (Buenos Aires, Brazil), N@vi, BuffaloB, oZ, H, Paul, Dagfari, Evan, tutwabee  (Trey Hunner, San Diego, CA), Cabal Agent #1, Ellomdian
    • Gratitude  - Alexis, A little kid
    • Info Needed  - jjr, Jeff, PurpleSquid (Netherlands)

  14. Hacking LaGard ComboGard Locks  - How to reset the combination, by ax0n  (Noah Dunker, Olathe, Kansas, Blogspot, Resume)
  15. AVS Spanner Addendum  - A follow up to "A Simple but Effective Spanner in Your AVS" by Irving Washington in the 21:1 issue, by Suicidal
  16. How to Own Star Search  - How to make little kids cry, by StankDawg
  17. Hacking Ticketmaster  - Overview of the Ticketmaster system, by battery
  18. Practical Paranoia  - Encryption notes, by MoJo
  19. Building Cheap ID Cards  - Make your own bar code IDs with a :CueCat, by Barfbag  (Admin @ Team Blank)
  20. Hotspot Tunneling  - Hiding you Wi-Fi traffic, by Samjack
  21. Self-Checkout or ATM?  - Self-checkout machine bugs, by Bob Krinkle (Ryan R. Frederick)
  22. 2600 Marketplace
  23. 2600 Meetings

[emmgold2]

"Where's my six dollars?  I want my six dollars!"


  $2600 Magazine - Volume 22, Number 1 (Spring 2005)

  1. Enemy of the People  - Editorial
  2. New York City's MTA Exposed!  - Very detailed overview of New York City's Metro Transit Authority (MTA) fare collection system, by Redbird  (Joseph Battaglia, Fort Lee, New Jersey, K2BAT)
  3. Electronic Application Technology  - Bugs in computer employment application forms, by clorox
  4. Baking Cookies  - Browser cookie exploits, by VileSYN
  5. Voice Over Internet Protocol  - Brief overview of Time Warner's VoIP digital phone service, by Kong
  6. Hacking Cisco IP Phones  - Changing settings and info on Cisco 7940 & 7960 phones, by Moby Disk (William Garrison)
  7. Decrypting WS_FTP.ini Passwords  - How to decode the password string (PWD) used by WS_FTP95, by H2007
  8. Hunting Wi-Fi Leeches  - How to monitor for unauthorized wireless LAN access, by RSG
  9. Unlocking the Power of WAP  - How to configure Wireless Access Protocol (WAP) browsers and proxies for Internet access on your cellular phone, by Joshua Dick  (Marlborough, MA, Twitter, W1JDD)
  10. Backdoor Exits from the U.S. Military  - How to get beaten by a girl, by Bac
  11. Blockbuster's Compass - Setting Sail for Port Bureaucracy  - Overview of Blockbuster's new employee computer system, by Aristotle
  12. How to Get Out of Google  - How to block the Google web spider using meta tags in HTML files or robots.txt, by Chess  (Frank Coruzzi, Burnaby, British Colombia)
  13. HP Printers: The Hidden Threat  - Open ports on HP printers and identification using Nmap, by DarKry (Wife)
  14. Disposable Email Vulnerabilities  - Potential security concerns with using disposable email services and some ideas for starting your own, by StankDawg
  15. Magnetic Stripe Reading  - Very good article on homebrew magnetic stripe reader hardware & software, by Redbird
  16. Letters  - Exchanges
    • Research Results  - The Neuralogist, Dyslexic_Hippie, The Grand Master of Confusion (Texas), CatWithTheGatt (Email)
    • Further Info  - Ruth, chuck, Steve, Mouser_inc, haydenth (Thomas Hayden, Ann Arbor, MI), Mogus, Bob Krinkle
    • Questions  - 11x, David Oliver, Batman 24, Jason, DP, William, Dave, Black_Angel
    • Appeals  - DB
    • Utter Stupidity  - Public Display, gmitch
    • Appreciations  - marco (aka prime anarchist), Robbie Brewer, Rob Hundred
    • Security Issue  - Brian
    • Experiences  - aaron (Los Angeles, CA), MikeyB
    • Observations  - kyle, scotk, SystemDownfall, Doda McCheesle, Impact, Rifkey, p4p3r t1g3r, drlecter, Freezing Cold 2600 Fan (Ontario, Canada), Terry
    • Responses  - Alan Horkan (Dublin, Ireland), Jaypoc, Alop, BitPimp (Australia), sp1ke, (none given), Daniel Gray (Defiance, OH), The Stealthed One, Chaad, Skillcraft
    • Cover Letter  - anonymous, gmcsparran3 (Glen McSparran III, DOB: 09-13-1970), Faber, john2kx (DOB: 08-01-1981), jason, mr_bloko (Garrett Davis), Alex, miles bogus, DigitalDesperado, Martian
    • Critiques  - Rage1605 (Robert Pierucci)
    • Problems  - Phreakinphun, andehlu, Alop, ryan, Chris, Jon
    • Ideas  - Tommy (Maine)
    • Fighting Back  - saynotoid@gmail.com

  17. Complete Scumware Removal  - man lynx, by LoungeTab
  18. More Fun With Netcat  - Continuation to MobiusRenoire's article "Fun With Netcat" by using Netcat to scan for banners, as a quick FTP server, and to run commands on a remote system, by DJ Williams
  19. Potential Vulnerabilities in Shared Systems  - Overview of why you should have the proper file and directory permissions when using shared hosting services in order to not give out any confidential details, by st4r_runner
  20. Inside the Emergency Alert System  - Overview of the FCC's new emergency broadcast alert system, by Tokachu
  21. IPv6 Redux  - Examples of a setting up a IPv6 network, by Gr@ve_Rose
  22. 2600 Marketplace
  23. Puzzle  - A complete scan of #5 ESS RC input message manuals, no.. wait.. it's a f*cking crossword puzzle.  (Yes, I did the puzzle.. LOL!)
  24. 2600 Meetings

  $2600 Magazine - Volume 22, Number 2 (Summer 2005)

  1. One Step Forward, Two Steps Back  - Editorial
  2. Hacking Google AdWords  - Detailed overview of using Google's advertising program and concerns about their profit-driven censorship and hypocrisy, by StankDawg
  3. Hacking Google Map's Satellite Imagery  - How to combine multiple images on Google maps, by Morcheeba (John Maushammer)
  4. Googlejacking by Example  - Technique for Google results hijacking by using HTMP 302 redirects, by J. V.  (Justin Vieira)
  5. Home Depot's Lousy Security  - Huge security hole with Home Depot gift cards, by glutton  (Minneapolis, Minnesota, DOB: 10-12-????)
  6. SYN-ful Experiment  - Perl source code for a program to open a TCP port, useful for testing SYN packet issues on state-like firewalls, by Gr@ve_Rose
  7. The University of Insecurity  - Security problems when using easy-to-guess student IDs, by chiLL p3ngu1n
  8. Creating AIM Mayhem  - Manual AIM connections, by windwaker (Drew Blaisdell)
  9. AIM Eavesdropping Hole  - AOL Instant Messenger (AIM) conversations showing up on two clients, by george
  10. Network Vigilantism Using Port 113  - Testing and securing proper identd, by Tokachu
  11. Hacking Encrypted HTML  - How to use and bypass encrypted web pages, by Edward Stoever  (Glendale, California, Resume)
  12. Passwords from Windows  - How to retrieve passwords to various Windows utils, by Big Bird
  13. Data Mining with Perl  - Utilizing LWP modules in Perl to automate searching websites or even Google, by Luckycan  (Nick, Memphis, Tennessee, luckyallcan)
  14. A Yahoo! Restriction Defeated  - How to save high-res pictures from Yahoo!, by BreakDecks  (Alexander Vranas, Collierville, Tennessee, LinkedIn)
  15. Spying on the Library  - How to harass old ladies, by solemneyed (Scott Zimmer)
  16. ParadisePoker.com Blackjack Cracked  - Neat trick (and observation) to exploit Internet poker, by JackAceHole
  17. Letters  - Artillery
    • In Search Of  - Cohen (Eugene, Oregon), Dave, smes (Spam Man Sam, Kelowna B.C., Canada), l0gic (Vancouver, B.C., Canada)
    • Questions  - Aurature, InfernalStorm, tamsto (Serbia), Gary B. Ticked, Brian, Jason, A Little Boy from China, Orchid
    • Feedback  - Dave Puype, Crash the Greenhat (Email #1, Email #2, DOB: 02-07-1983), drlecter, Shardin 359, xzanu, Loyal reader (Florida), Brian Detweiler, TraktorGrl, Brian Detweiler, MegaGeek, Hsiao-Ling Liao (Taiwan), Dan, Emoticon, Leprechaun
    • Meeting Issues  - Chris, James (Louisville, Kentucky), Rashid, Allan, eyeconoclast, ht, Eric Blair, Advent Systems, Don Johnson, James Turner
    • Conundrums  - Tangled Web, Himi Jendrix (Connecticut)
    • Suggestions  - windwaker, CSIN, Joe37
    • Electronic Voting  - Semantic, Bor Onx, Joe Domenici (Austin, TX)
    • Contribution  - mAcfreAk
    • Witnessed  - Anarchivist (Karen), MLG
    • Letters From Prison  - Tony Sparx, Stormbringer
    • Further Info  - dan0111, Woodzy, FxChiP (Zach, Pittsburgh, PA, MySpace, DOB: 03-17-1987), noir, Nicholas, Shortfuse, ax0n, ssinformer, OWA, D3vUS
    • Curiosity  - hendon40 (DOB: 07-02-????)
    • Corporate Secrets  - Please don't use my name, Kaos
    • Security Issues  - dbax, anonymous, meatwad, Alop, MS3FGX, Bob, SSSSSSSS

  18. Where Have all the Implants Gone?  - Paranoid rantings, by Estragon
  19. Adding Sub-Domain Support to Your Free DotTK Domain  - PHP script to add sub-domains to your free dot.tk hosting service, by Trent Bradley  (Blue Collar Camel)
    • Code: dottk.php  DotTK Free Sub-Domain Script v1.02

  20. Getting More from T-Mobile  - Overview of customer accounts on T-Mobile, by Psycho
  21. Remote UNIX Execution via a Cell Phone  - How to execute shell scripts remotely via cellular phone email messages, by Muskrat
  22. NCR: Barcodes to Passwords  - Create override barcodes for self-checkouts, by Bob Krinkle
  23. Defeating BitPim Restrictions  - Defeat BitPim file copy restrictions, by dk00
  24. Fun With School ID Numbers  - Create your own barcodes to alter a school or other ID card, by gLoBuS
  25. Remote Secrets Revealed  - Programming Toyota car remote controls, by The AntiLuddite
  26. 2600 Marketplace
  27. Puzzle
  28. 2600 Meetings

  $2600 Magazine - Volume 22, Number 3 (Fall 2005)

  1. Questions  - Editorial
  2. Data Destruction, Covering Your Tracks, and MBSA  - Removing web browser history's, cookies, and Microsoft Baseline Security Analyzer, by El Rey
  3. Stupid WebStat Tricks  - Overview of using HTTP statistics packages and some potential security holes in leaving them in an open directory, by StankDawg
  4. A Randomizing Wi-Fi MAC Address AP Hopper  - Perl script to program your Wi-Fi adapter with a random hardware (MAC) address via ifconfig, by Eprom Jones
  5. Fun With the PRO-83  - Radio Shack PRO-83 scanner overview and discriminator tap mod, by Dit and Dah
    • Pictures
    • PRO-83 Keypad Tricks  (Note that "PowerHouse Communications" is a fraud who just took the keypad codes from the BC246T/PRO-83 service manual and expanded on them a bit, then whines and pouts if you make a copy of is little document...

  6. Getting More Out of SSH  - man ssh, by Apratt (Aaron)
  7. Using Tor and SSH Tunneling  - Overview of installing and using Tor onion routing, plus an idea to combine it with SSH tunneling for increased security, by OSIN
  8. Reverse Remote Access  - Remote access through a firewall using Windows, by st4r_runner
  9. Securing a Drive  - Using Sentry 2020 on an external USB hard drive, by Dr. Apocalypse  (PDF)
  10. JavaScript Injection  - Detailed overview of a JavaScript-injecting exploit in an online form, by A5an0
  11. Climbing the SonicWall  - Info on SonicWall and SonicOS, by Kn1ghtl0rd  (David, MySpace)
  12. Verizon FiOS - Fiber to the Home  - Fiber to the home service in New York city, by striker
  13. Improving Stealth With AutoRuns  - Rename and replace AutoRun DLLs to hide programs, by BrothaReWT
  14. SQL Exploits  - Common SQL security holes, by A0nRkjk=
  15. Hexing the Registry  - Manually hex edit the Windows XP registry, by divarin  (Lisa Webber)
  16. Letters  - Words from You
    • Devious Plots  - anonymous, Shah Chopzillian (Canada)
    • Random Questions  - B.H.K. Chanaka (Sri Lanka), CalebLeo1 (Owensboro, Kentucky, MySpace, Email, DOB: 08-09-1986), Steven, Jeff, Henry (U.K.), Andrew, George, Duciniti, Dave, Black_Angel, Jeff
    • Security Holes  - Anonymous, KJ
    • Observations  - john, Dr. Apocalypse, 5+3v3 D4v3, theXorcist, -ht, Krazy, Sam, Digital_Cowboy, thedave, Mixfever, e-tipper
    • Responses  - TackGentry (Benji Gray), kip, forrest hoover, kingconga, El Jefe (Zak), Ovid, Dufu, RustyOldBoat (Greg, Australia), GeekBoy, MetroTek, paper tiger, Andrew, MS, Shadow0049, redjen, Shadow Walker, concerned reader, Lews Therin (Ryan T. Barber), Witchlight, Proud Female Geek, Alan, GulfstreamXo, Metal Cutter, pyroburner69
    • Advice  - *s00p3r sKri8s*, A Big Corporate Tool
    • Help Needed  - anina, WiseCracker, Marina
    • Dept. of Injustice  - Screamer Chaotix, fallen (Jake Tungate, Raytown, MO, Website #2), pukethecat, Luke, David
    • Memories  - Mudwasp (Sydney, Australia), CWA1108
    • Reestablishing Contact  - Woodstock, CD, jay (Norton, MA)

  17. Not Working at a Call Center  - Story of working at a call center and tips how to avoid work after taking breaks, by XlogicX
  18. Securing Your Wireless Network  - How to secure your wireless connection, by Seal  (Julien McArdle)
  19. The Continuing War on Spyware  - man lynx, by Inglix the Mad
  20. Hacking Image Shack  - Perl script to automate grabbing random pictures hosted on Image Shack, by System Downfall and Worm
  21. I Am Not a Hacker  - Gayhat, by mirrorshades
  22. Security Pitfalls for Inexperienced Web Designers  - Securing Perl/PHP scripts and email addresses on web pages, by Savage Monkey
  23. A Peek Inside a Simple ATM Machine  - Overview of the internals of a Diebold Cash Source Plus 100 ATM, by FocusHacks  (Noah Dunker)
  24. How to Get Responses Through Deception  - Tell lies to get answers, by JFast
  25. The Ancient Art of Tunneling, Rediscovered  - Tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as Ping requests and replies, by Daniel  (Daniel Stødle, Tromsø, Norway, Email)
  26. Forging an Identity  - Getting a false ID, by SistemRoot
  27. 2600 Marketplace
  28. Puzzle
  29. 2600 Meetings

  $2600 Magazine - Volume 22, Number 4 (Winter 2005-2006)

  1. Preserving the Magic  - Editorial
  2. Network Administrators: Why We Make Harsh Rules  - Why network admins make the rules they do, by The Piano Guy (Gary Rimar)
  3. Practical Web Page Steganography  - Implementing steganography in HTML, by glutton
  4. Hacking a JP1 Remote Control  - Using the JP1 connection on a remote control, by J.M.  (Similar Article)
  5. The RedBox DVD Kiosk  - Hacking the DVD rental kiosks at McDonald's, by blakmac
  6. Punking the Watchers  - Defeating Windows Messenger snooping, by Mister Bojangles
  7. How to Track Any U.K. GSM Mobile Phone  - How to track cellular phones on the U.K. GSM system, by Jonathan Pamplin  (Similar Article)
  8. An Introduction to the Asterisk PBX  - Introduction to setting up and using Asterisk under Linux, by zeitgeist  (Christoph Eicke)
  9. Spoofing Your Charge Number  - Proof that is actually possible to change the Charge Number parameter when spoofing calls, by greyarea
  10. Phone System Loopholes Using VoIP  - Tricks for calling using VoIP, by BreakDecks
  11. Physically Accessing Your Apartment with Skype  - Access an apartment building callbox by call forwarding to a voicemail message containing the proper DTMF code via Skype, by dopamine  (Aubrey Ellen Shomo, born Justin Michael Shomo, Denver, Colorado, Resume)
  12. Obfuscation and Encoding in PHP  - Overview of the author's Phonic64 script, which will obfuscate PHP code by turning it into "nearly-sensible gibberish," by Bryan Elliott
  13. APOP Email Protocol - MDS Challenge/Response  - Overview of the Authenticated Post Office Protocol and how it uses MD5 hashes for a challenge/response instead of "in the clear" passwords, by Ovid
  14. PGP Key Signing Observations  - Social systems are the weakest link in PGP, by Atom Smasher
  15. Letters  - Writewords
    • Questions  - Nate, Kn1ghtl0rd, Buzzbros2002 (Shawn), LiRM, Tenchuu
    • New Ideas  - Impact, Beowulf, ph4n7oMphr34k
    • General Feedback  - SAM, Merlin, Colin, glutton, phil, jpeg v1rus, Mike, George The Pancake, Luke, Matt Dreyer, alphabot, savaticus, Anthony
    • Advice  - Javier (Spain), Harry, Phillip, Adria
    • Guidelines  - Byte Stealer, Jake, Triad, Andy
    • Responses  - ProtoHippy, SamStone, Jeff
    • Responses to Responses  - Ryan, oleDB, Josh D., Maniac_Dan
    • The Corporate World  - Jon, Golden Helix, Anonymous, NetSurf, John YaYa, sting3r (Mike Jones), CEH
    • Evil Doings  - Toast-sama (J. Donovan), Selena, Ben, BugDave, Sab, Pizentios (Nick Peters, Brandon, Manitoba, DOB: 02-15-1983)
    • Homeland Security  - necco
    • Permissions  - Elegin, Uncle Wulf
    • Insecurity  - Gavin, Nick B.,
    • Offenses  - Stuart, Tim "Taiwanese" Liim (New Jersey), Ramasee, Chad
    • On The Inside  - RustyOldBoat, xoxo (New Zealand)
    • Discovery  - Tat

  16. Persuasiveness and Social Engineering  - How to be a good social engineerin' engineer, by subphreeky  (Jon Winder)
  17. The Real Electronic Brain Implantation Enhancement  - Info on brain implants, by Shawn Frederick
  18. Observing the Lottery  - Tracking lottery numbers and a "bug" in the ping-pong ball method, by CeeJay
  19. Sears Portrait Insecurities  - Security holes in Sears Portrait Studio, by Stephonovich  (Charleston, South Carolina)
  20. Kodak Secrets and Walmart Fun  - Harassing old ladies, by Thorn
  21. The Workings of a Kodak Picture Maker  - Kodak Picture Maker kiosk info, by t_ratv  (Michael, DOB: 10-03-1981, UW Stout)
  22. WiMax, AT&T Style  - Info on AT&T's WiMax equipment, by Pirho
  23. Cheap Mobile Internet for Your PowerBook  - Connecting a phone to your computer, by Mystic
  24. 2600 Marketplace
  25. Puzzle
  26. 2600 Meetings

  $2600 Magazine - Volume 23, Number 1 (Spring 2006)

  1. 2600... 2006... 2060  - Editorial
  2. Filesharing using TinyURL.com  - How to trade copies of $2600 Magazine using tinyurl.com, by mirrorshades  (Email)
  3. XSS'ing MySpace.com  - Cross Site Scripting (XSS) and JavaScript URL injection on MySpace.com, by FxYxIxE  (Page 2)
  4. United Kingdom: The State of Surveillance  - CCTV, ID info, license plate readers - Automatic Number Plate Recognition (ANPR) in the U.K., by Xen (Email)
  5. Making Rover Fart  - Make the Microsoft Search Assistant dog fart, by Bryan Elliott
  6. Telecom Informer  - Discusses how to add a second phone line to your house for less than $20 and with no monthly fee., by The Prophet
  7. Hacking the HNAS1 Network Attached Storage Unit  - Detailed overview of hacking the firmware on a Hawking Technologies NAS unit for HTTP and root shell access, by Michael Saarna
  8. Hacking 2600.com  - Messing around with 2600.com, by Andrew Smith
  9. Direct Inward System Access and Caller ID Spoofing  - Caller ID (CPN) spoofing using Asterisk, by iSEPIC  (Page 2)
  10. Hacker Perspective  - by The Cheshire Catalyst
  11. Hacking PCReservation  - Harassing old ladies in the library, by Henry Q. Buther
  12. Hacking the Facebook  - They are really desperate for articles, by Savage Monkey
  13. The Price of Convenience: Our Identities  - Identity theft info and lack of good prevention laws, by Squealing Sheep
  14. Highlighting the Holes  - Holes in security camera and key card physical security holes, by Modman
  15. Letters  - Sounding Board
    • Of Concern  - Hiro, Noli
    • Requests  - Dave L., pseudofed
    • An Idea  - Miles
    • Looking for Advice  - Pascal Cretain, phuoc yu, 88LoGan14
    • Inquiries  - Mike Moore, dt2ra711, Tim, Decay, zack, Peter, Cody, Jsnake, Brian, P3ngu1n, Death, Willie
    • Accolades  - Joe S., mic911, Part11, Queenie Marblebridge, N. Rajasekharam
    • Adventure  - DrahconMan
    • Stupid Stuff  - G Man in the Hole, Alop, M, XSnidalX (James), Death by Microsoft
    • Observations  - Monty G., Mattington, ch3rry, WiseCracker, Zachary, Undefined32
    • Critique  - I)ruid, SHR
    • Responses  - Kn1ghtl0rd, Phuzion, Simon Jester, aztek, Alexei Udal (Audal), Toots, Stormbringer
    • Security  - The Piano Guy, drlecter, deadman, comfreak, scott
    • Further Info  - DrBensina (DOB: 11-04-1982), Beowulf, Angry (not mad) Max, The Sarge

  16. The DRM Plan  - People who don't want you to copy their magazine arguing about Digital Rights Management, by Don
  17. The Secrets of Cingular Wireless  - Insider info at of customer service procedures at Cingular Wireless, formally AT&T Wireless, by The iNSiDER
  18. Techno-Exegesis  - Satellite/broadcast radio and DRM, by Joseph Battaglia
  19. Not Quite Dead Yet  - The current state of payphones, ACTS, and Red Boxing in the U.S., by Black Ratchet  (Ben Jackson)
  20. School Connections  - Obtaining free Internet service in school dorms, by graphak
  21. iPod Sneakiness  - Use an iPod and an AutoIt script to steal passwords and install software on someone's computer, by Rob
  22. A Look at Jabber/XMPP  - Discusses Google Talk and the vulnerability in Jabber client/servers using the Extensible Messaging and Presence Protocol (XMPP), by windwaker
  23. Spyware - The Ever Changing Threat  - General overview of spyware/malware, including new developments and understanding the spyware threat and how to defeat it, by FreeRider
  24. 2600 Marketplace
  25. Puzzle
  26. 2600 Meetings

  $2600 Magazine - Volume 23, Number 2 (Summer 2006)

  1. Whom Shall We Blame?  - Editorial
  2. More on Hacking Facebook  - Discusses a method of reading anything you want from a user's Faceberg profile regardless of their privacy settings, by b0rn_slippy
  3. Getting Screwed by PayPal  - Story of problems with (((PayPal))) when the person legitimately sold a laptop and the receiver disputed the purchase (with three simple words: "Not As Described," an obvious scam) causing him to lose over $600 and his fight to clear his name, by silic0nesilence  (Corey Mishler, Nyack, New York)
  4. Telecom Informer  - "NSA has admitted to illegally spying on virtually everyone in the U.S." - this is a flat out lie and isn't even technically possible.  Perfect example of the lies and sensationalism Evil Corley and his fascist faggot followers use to sell more magazines, by The Prophet
  5. Hacking the System  - Discusses the author's views on hacking society and includes a detailed example, by Moebius Strip
  6. Easy Access to T-Mobile and Cingular Accounts  - Accessing personal information on T-mobile phones by borrowing their phone, by Battery  (Chris Falco, Sycamore, IL)
  7. Ego Surfing  - Keeping track of who is searching for you (or others) on the Internet by using Google AdWords, by alokincilo
  8. Public Access  - Tricks on using locked down public access computers, by Insert Name Here
  9. Breaking Mac OS X Program Security  - Article on weaknesses in MCX and the XML files that MacOS uses to limit user privileges, by Sibios
  10. GPOs and Group Policy: Just Say No!  - Group Policy Objects management information under Microsoft Windows, by WagStaff
  11. Hacker Perspective  - by Bruce Schneier (Minneapolis, MN)  (Page 2)
  12. Music Today  - Holes in the Music Today hosting service by hijacking the chat program, by noir (Nick Arnott)
  13. Hacking Warner Brothers Records  - How to download the top three songs of most artists signed to Warner Brothers Records directly, by c0z
  14. Letters  - Jibber-Jabber
    • Experiences  - auto456565, Cleara, BigBrother, Acidevil, Mr. K
    • Input  - vyxenangel, Jeremy, runsetuid.root, Brad Hall
    • Suggestions  - ThrILL, nitromatt, CerealKiller, Pointilleux
    • Another View  - Digital_Cowboy
    • Responses  - windwaker, blakmac, Kaige, devnull, CJ, DZ, Nucow, FelixAlias, The Cheshire Catalyst, George, hypoboxer (Tom Brennan, Murfreesboro, TN, MySpace), Nick
    • More Info  - Aendrew, sc, meatwad
    • Advice Sought  - Imegabyte, Symantic, dNight, ansichart, Jeff
    • Disturbing Stuff  - O-nonymous, NoKaOi, webbles
    • Inquiries  - Philip, Dany, Zenmaster, Poetics, Shelly L., Uriah C.
    • Security Holes  - justin, Mark B., Sting3r
    • The Retail World  - Helack101 (DOB: 08-04-????), Nemo de Monet, Kevin

  15. Network Administrators: Why We BREAK Harsh Rules  - Why strict network rules are not always a good idea, by kaigeX
  16. Having Fun With Cookies  - Discusses uses and abuses of cookies in web applications, by Simon Templer (DOB: 11-30-????)
  17. Techno-Exegesis  - People who think the NSA actually cares about what they do, by Joseph Battaglia
  18. Roll Your Own StealthSurfer II Privacy Stick  - Private web surfing programs on a USB drive, by David Ip
  19. Using Loopback-Encrypted Filesystems on JumpDrives  - Using Linux kernel-based loopback filesystems (Loop-AES) to encrypt files on a USB JumpDrive, by OSIN
  20. An Argument Against MD5 Authentication  - Potential security holes with using JavaScript to MD5 hash passwords being sent over the Internet, by David Norman  (Orlando, Florida, Email)
  21. 2600 Marketplace
  22. Puzzle
  23. 2600 Meetings

  $2600 Magazine - Volume 23, Number 3 (Fall 2006)

  1. Hope and Fear  - Editorial
  2. Identity Theft: Misinformation Can Be Your Friend  - How to tweak your privacy and legal documents to keep your identity from being stolen by people like Kevin Mitnick, by Arcade One  (Page 2)
  3. Where Have The Philes Gone?  - Why today's "hackers" appear to be most clueless retards and profiteering sell-outs, by glutton  (Page 2, Page 3)
  4. A Back Door to Your Oracle Database  - Gaining DBA rights to an Oracle database and keeping those rights by creating a back door, by Edward Stoever
  5. Telecom Informer  - Alaskan phone system information, by The Prophet
  6. Hacking Flickr  - Do people actually do this crap?, by undergr0und n1nja
  7. Fun With the Sears POS  - Information on Sears Point-of-Sale terminals and how to crash them, by chr0nicxb0red0m
  8. Never Pay for Wi-Fi Again!  - MAC address tricks to get free wireless Internet access at coffee shops, hotels, by Ray Dios Haque
  9. Hacking MySpace Using Common Sense  - Discusses a method of taking over a MySpace account, by Dexterous1 (Chino Hills, CA)
  10. Ringtone Download Folliez  - How to get free ringtones, by GurtDotCom  (Garrett Kendrick)  (Page 2)
  11. Hacker Perspective  - by Mark Abene (Phiber Optik)  (Page 2)
  12. Insecurity at Pep Boys  - Network and terminal information at the Pep Boys car repair places, by Sakuramboo
  13. Mobile Devices - Current and Future Security Threats  - Known and potential security holes in today's mobile devices, smartphones, PDAs, etc., by Toby Zimmerer  (Page 2)
  14. Letters  - Written Expressions
    • On Privacy  - Rogaine Rebel, lup0, Robert Barat, eudemonist, Highdesert, Sim, Marxc2001, Capt Blah, Anonymous, C
    • Foreign Payphones  - D P, Ahmed M Attef
    • Interesting Facts  - Name Removed, Zeromatic (DOB: ??-??-1985), Neito, dodgydave, Soho, Wave_Rider_1899, Ashley, Kingpin
    • Questions  - Neo_Chalchas, BrakeDanceJ, John, Lenny Love the Hobo
    • Fighting Back  - Arcade One, R
    • From the Military  - doctor zoiby, Sgt. Paccerelli
    • Followups  - Black_Angel, Mike Smith, X-Man (Eric-Not), digitalFX, quel, AtomicRhino, Mingming5, Jeremy Moskowitz, Darren, eviscerator, Anonymous, Josh, R., Beowulf, SeLTiC, Second_Wave, Life Subscriber, CJ, Anymoose, BillSF
    • Blowing the Whistle  - dohboy, El Duderino
    • Exploration  - Phone Trick, Vince N., fortschreiten
    • HOPE Stuff  - Aaron, Doulos, Doda McCheesle

  15. Hacking the System: Useful Connections  - Discusses the cultivation, nurturing and maintenance of useful connections, assets and information, by Moebius Strip
  16. Techno-Exegesis  - Corporate attitude towards security, by Joseph Battaglia
  17. Ownage by AdSense  - Google AdSense information and loop-holes, by Natas
  18. Information's Imprisonment  - Freedom of speech restrictions (heh!) and digital rights in today's computer world, by Dr. Apocalypse and Matt Fillhart
  19. Singapore Library Mischief  - Harassing those old ladies in Singapore libraries, by Ghostie  (Additional Info)
  20. Monitoring Motorola Canopy with Windows XP and MRTG  - Monitoring Motorola Canopy wireless network equipment using Windows XP, by dNight (Chris O'Hara?, MySpace, DOB: 09-13-????)
  21. Attacking Third Party Tracking  - Prevent external party monitoring while on the Internet, by Particle Bored
  22. 2600 Marketplace
  23. Puzzle
  24. 2600 Meetings

  $2600 Magazine - Volume 23, Number 4 (Winter 2006-2007)

  1. Transition  - Editorial
  2. Mobile Devices - Current and Future Security Threats  - Same article as last month?, by Toby Zimmerer  (Page 2)
  3. FirstClass Hacking  - Overview and security holes in the FirstClass classroom software program, by Cristian
  4. Network Administrators: Rules Rationale  - How network admins develop their rules, by The Piano Guy (Gary Rimar)
  5. Wi-Fi Hunting: Basic Tools and Techniques  - Overview of the hardware and software needed to track down open Wi-Fi networks, by Rick Davis
  6. Telecom Informer  - Overview of the Japanese telephone and cellular networks, by The Prophet
  7. Circumventing the DoD's SmartFilter  - How to defeat firewall filtering rules on the Department of Defense's computer network, by Comspec - Sigma Nu
  8. Algorithmic Encryption Without Math  - DOS-based file encryption program which repositions the bits based on multiple encoding passes using one or more pseudo-random number generators, by Dale Thorn  (Email #2)
  9. Red Boxing Revealed for the New Age  - Red Boxing on ACTS is still possible with the proper routing, by Royal  (BinRev Profile, Email)
  10. How to Get Around Cable/DSL Lockdowns  - Getting around outgoing SMTP filters on cable/DSL lines by forwarding different ports, by Pirho
  11. Hacker Perspective  - by Phillip Torrone  (Page 2)  (Lady Ada's Jammer Info)
  12. Library Self-Checkout Machine Exploit  - How to harass those old lady librarians, by Byron Bussey
  13. Fun With Novell  - Novell/NetWare and GroupWise overview and security holes and how to use nwsend, by Cronicl3
  14. How to Build a Book Safe  - How to turn a hard cover book into a hidden safe, by c-dollar
  15. Network Programming and Distributed Scripting with newLISP  - Overview of TCP/IP network and socket programming using newLISP, by ax0n
  16. Letters  - Conversations
    • Suggestion  - aft
    • Reaction  - comfreak, Lex, X!U304d (Sean Street, Arlington, TX), Steve, P3ngu1n, An Unapologetic Neo-Luddite
    • Oppression  - Kevin, Serkit, Darkpr0, Barada, jasonB
    • Submission  - Sandro, Riccardo, Name Removed
    • Question  - vyxenangel, Paul Burden, Greg, ldgeitman, E1nstein, Clark Milholland (Carson City, NV), Raj, Squealing Sheep, Oral Seymour, Pac.Man, Samuel Reed
    • Prosecution  - Kristin, aft
    • Revolution  - aRevolutionist
    • Clarification  - jazzlup0, The Joker, Cynagen, G, Eric Smith, D10D3, BugDave
    • Proclamation  - Candycone
    • Information  - Anders, soursoles, Hawk82, Doda McCheesle, Crapinaple (Ryan, LiveJournal, DOB: 05-17-????), Jayster
    • Observation  - Adelain, Zaphod, GBM76010, Brian, knotknaught, Mike the Liar, chemdream, Marxc2001, Zaphod_B, ben
    • Provocation  - Tapi, gh0stb0t (Alex Love)
    • Appreciation  - Jason C.

  17. Techno-Exegesis  - Discusses the overuse of new technology and argues that old technology is often times more appropriate (with specific examples of RFID passports, red light cameras, voting machines, slide rules), by Joseph Battaaglia
  18. GasJack - Hijacking Free Gasoline  - Discusses a method of taking advantage of Giant Food store's gas station GasRewards promotion, by cipz (Jim)
  19. Motorola IMfree as a Wireless iTunes Remote  - Hacking the Motorola IMfree wireless instant messenger device into an iTunes remote control, by Kcahon
  20. The Not-So-Great Firewall of China  - Technical overview of how China blocks "harmful" websites and some techniques for defeating Internet censorship, by Tokachu
  21. Hacktivism in the Land Without a Server  - North Korea forum hacking of some sort using Korean Friendship Association, by \/indic8tr
  22. K7: Free [for the taking] Voicemail  - Free voicemail via K7, by noir
  23. 2600 Marketplace
  24. Puzzle
  25. 2600 Meetings

        

$2600 Magazine Future Covers


  $2600 Magazine - Volume 24, Number 1 (Spring 2007)

  1. Challenges  - Editorial
  2. Understanding Web Application Security  - Overview of JavaScript, SQL injection, and cross site scripting vulnerabilities and protection from attacks, by Acidus
  3. RFID: Radio Freak-me-out Identification  - Sensational piece on RFID technology by people who obviously never heard of binoculars, by Kn1ghtl0rd
  4. Exploiting LiveJournal.com with Clickless SWF XSS  - Cross-site scripting attack using Flash on LiveJournal.com, by Zaphraud  (Jason Kennerly)
  5. Telecom Informer  - Overview of the New Zealand phone systems, by The Prophet
  6. Avoiding Internet Filtering  - Using Google to bypass school web filtering, by Major Lump  (Alternate)
  7. Hacking Your Own Front Door  - Technical overview of bump keying, by Cliff
  8. Dorking the DoorKing  - Overview of DoorKing telephone entry systems, by Cadet Crusher
  9. Security Holes at Time Warner Cable  - Story of grabbing a Time Warner cable technician's authorization code to access tech.nyc.rr.com, by Xyzzy (Nathan Wallwork)
  10. Hacking My Ambulance  - Overview of the computer system used in American Medical Response ambulances, by anonymous
  11. SSL MITM Attacks on Online Poker Software  - Very well written technical article on Man-in-the-Middle (MITM) attacks and an overview and theory in using them against online poker websites, by John Smith  (Email, ICQ: 493690985,
    • SSL MITM Attacks on Online Poker Software  Original
    • CertChecker.java  Checks whether a host's SSL cert is valid.  Using this is simpler than "openssl s_client -connect <host>:<port> -showcerts" and is more scriptable.  This was used to validate an entire /19's worth of certs in the MITM article.

  12. Hacker Perspective  - by Bill Squire  (BillSF)  (Page 2, Page 3, Page 4)
  13. Ripping MMS Streams  - Saving Microsoft Media Streams (MMS) to you computer, by EvilBrak
  14. Backspoofing 101  - Detailed overview of the "backspoofing" technique to retrieve Caller ID CNAM information, by Natas
  15. Can I Read Your Email?  - Laws on who can legally read your email (besides Kevin Mitnick), by Alex Muentz, Esq.  (Similar Article)
  16. Letters  - Snippets
    • Queries  - Name Deleted, A. Saboteur, mr.bitworth, about:blank, The Laguna, Victor, d
    • Info  - Breto, Danielmoore, N0vus0piate, Bac, LocalLuminary (David Crosby), SN
    • Stories  - brill, Dave, Kevin, JZ
    • Danger  - dNight, ch3rry
    • Weirdness  - drlecter
    • Advice Sought  - Alexander Chase
    • Following Up  - Marcio, \8/, Dave, Duncan Smith, McViking, Troy
    • Gratitude  - Barry, Tr4/\/ce
    • Thoughts  - skoobedy, Computer Bandit, Exo, psion, Rev. Troy (SubGenius)
    • The Format  - Brian Heagney, Jeff, Inked Fingers, Adric, Iroe8, Jason, Ian
    • Sales  - sailboogu, CPeanutG, TwitcH, Johnson Hayes, Alfredo Octavio, Digit_01, Prof. Morris Sparks, F

  17. Stalking the Signals  - Using near-field receivers and "Signal Stalker" scanners, by Tom from New England  (Page 2, Page 3)
  18. GoDaddy.com Insecurity  - Security problems with GoDaddy's account information, by SLEZ
  19. Hubots: New Ways of Attacking Old Systems  - Human-based denial of service vulnerabilities with the possibility of distributed brute-forcing of ATM card PINs, by S. Pidgorny  (Svyatoslav "Slav" Pidgorny)
  20. Network Ninjitsu: Bypassing Firewalls and Web Filters  - Detailed methods of bypassing firewalls and web filtering using SSH tunneling, by James Penguin  (South Africa, Email, Website #2, Website #3, Deviant Art)
  21. Hacking a Major Technical School's Website  - Getting into an online college library by guessing student ID numbers, by valnour  (Bobby Burden, Tennessee)
  22. Covert Communications Channels  - Using JavaScript and HTML methods for covert communication over the Internet, by OSIN
  23. How to Cripple the FBI  - Why you should use encryption for your hard drive contents, by comfreak
  24. 2600 Marketplace
  25. Puzzle  Excerpt from Led Zeppelin's Communication Breakdown  (MP3)
  26. 2600 Meetings

  $2600 Magazine - Volume 24, Number 2 (Summer 2007)

  1. Remaining Relevant  - Editorial
  2. Discovering Vulns  - Introduction article on the different types of software vulnerabilities and how they are found, by Cliff
  3. The Shifty Person's Guide to 0wning Tire Kingdom  - Week long adventure story about Tire Kingdom and their network of AS400s, by The Thermionic Overlord
  4. Enhancing Nortel IP Phones with Open-Source Software  - Use DD-WRT with OpenVPN to use an IP phone at home as an extension of his office phone, by Ariel Saia
  5. Telecom Informer  - SMS Short Code numbers and the scams that typically revolve around them, by The Prophet
  6. Deobfuscation  - Reversing the obfuscation that SourceCop applies to PHP code, by Kousu  (Nick Guenther)
  7. Getting 2600 the Safe Way  - Overly paranoid person sets up ASP script to tell him when this crap comes out, by daColombian
  8. Fun at the Airport  - Security problems with TSA checkpoints, by Evil Wrangler  (TSA Screening Procedures)
  9. Hacking Xfire  - Tweaking the XFire games .INI files, including loading programs to create false game results, by Akurei
  10. Hacker Perspective  - by Mitch Altman  (Page 2, Page 3)
  11. Valuepoint  - Serious flaws in the Valuepoint wireless network service offered by many hotels, by Sidge.2 & Bimmerfan
  12. Internet Archaeology  - How to gather historical/hidden information from websites using archive.org, by ilikenwf  (Matt Parnell)
  13. Hacking Answers by Gateway  - How to get help from Gateway with pirated software, by Franz Kafka
  14. Letters  - Opinions
    • Suggestions  - L0j1k, MS3FGX
    • Complaints  - Guitarmaniax (Peter Huggins, MySpace), Minstrel, Jacqueline, mikes, A Fan, Ignacio, SiKing
    • Response to Articles  - aa2600 (Dave), dthron, JB, Ugg, Wgoodf (Dale Goodfellow, Edinburgh, U.K.), Wesley, Short Blonde, NYC Locksmith, Pat
    • Response to Letters  - S. Pidgorny, Hennamono (John English, Littlehampton, West Sussex, U.K.), OSIN OSIN
    • Injustice  - Xiver0m, Barron, Kristian
    • Observations  - FeTuS in MN, Randall, ThrILL (Orlando, FL), DJ Walker, justin, Ian 2.0
    • Taking Action  - Anon
    • Security Issuse  - lucidRJT
    • Store Issues  - Matthew, Raven, Ben
    • Questions  - Macavity, M, Davis

  15. VoIP Cellphones: The Call of the Future  - Different technologies being used to implement Voice over IP calling for cellphones, by Toni-Sama
  16. Pandora Hack - Get Free MP3s  - How to download MP3s that are streamed to you by the Pandora internet radio station, by SickCodeMonkey (David Huggins)  (Alternate)
  17. Adventures in Behavioral Linguistics  - People who are wishing really hard to have "Jedi mind tricks" in real life (Neuro-Linguistic Programming), by Marxc2001 (Mark Carney)
  18. Transmissions  - Advice for improving your operational security in situations where you should be more paranoid, by Dragorn
  19. An ISP Story  - Story about trying to help someone who is having their account compromised by unspecified MSN exploits, by Witchlight
  20. Hacking Whipple Hill with XSS  - Cross-site scripting vulnerability in some school's schedule management software by Whipple Hill, by Azohko
  21. Haunting the MS Mansion  - Windows XP system recovery using Norton Ghost 9 bootable CD, by Passdown
  22. Reading Ebooks on an iPod  - Different options for converting long text files into multiple linked "Notes" for viewing on an iPod, by DBTC  (Andy Kaiser, Grand Rapids, Michigan)
  23. Java Reverse Engineering  - Using a Java decompiler to make a key generator for Zend Studio, by quel
  24. 2600 Marketplace
  25. Puzzle  (Solution)  Data Matrix of HD-DVD/Blu-Ray AACS processing key: 0x09f911029d74e35bd84156c5635688c0
  26. 2600 Meetings

  $2600 Magazine - Volume 24, Number 3 (Fall 2007)

  1. Politics  - Editorial
  2. VoIP Security: Shit or Get Off the POTS  - Summary of the risks of implementing VoIP in an organization, by Reid
  3. Getting More Out of Your College Linux System  - I would recommend hanging onto this article so that you can present it to your school's IT staff when they round you up for being a nuisance on school-provided computers, by Silent Strider
  4. Social Engineering and Pretexts  - Store detective and private investigator gives anecdotal advice and stories about social engineering, by Poacher
  5. Telecom Informer  - History and purposes of PBX systems and their significance to phone phreaks, by The Prophet
  6. Language Nonspecific: Back to Fundamentals  - How once you learn one programming language, you can easily learn others, and why it doesn't matter what language you use as long as you understand what its logically doing, by Kn1ghtl0rd
  7. Front Door Hacking: Redux  - Another article on bump keying, by Darkarchives
  8. A Penny For Your Laptop  - Very simple vulnerability in the Kensington MicroSaver notebook lock - use a penny to add tension and spinning the dials until they stick, by Atom Smasher
  9. The RIAA's War on Terror  - Inaccurate story comparing anti-terror tactics to the (((RIAA's))), by Glider
  10. Free Files from Flash  - Tips for downloading Flash files directly by using a packet sniffer to get their exact URL, by DieselDragon  (Colin Blanchard, Farnborough, England, Blog, Twitter, YouTube Channel)
  11. Target: For Credit Card Fraud  - Former employee of Target discloses a whole host of problems with the stores' computer networks and details a method of obtaining register transaction logs, including credit card information, by Anonymous
  12. How to Get More from Your Sugar Mama  - How to cheat Virgin Mobile's Sugar Mama ad-supported free minutes program, as well as how to send free text messages through one of Virgin's web interfaces, by gLoBuS
  13. Owning UTStarcom F1000  - How to unlock the UTStarcom F1000 VoIP phone, by ZiLg0  (Jeremy Brosnahan, Craftsbury Common, Vermont)
  14. Hacker Perspective  - Results from the subscriber survey  (Page 2)
  15. Hacking 2600 Magazine Authors  - Security agent tracks down a $2600 Magazine author, by Agent Smith  (Possible Email)
  16. Designing a Hacker Challenge  - Hacker challenge designed to help you and your crew find out who is the best, and who dies like the rest, by glutton
  17. Hacking an Election  - Former employee of Elections Manitoba, gives a good description of how provincial elections work in Canada, by Dagfari (Dave Alexander)
  18. How to Cheat Goog411  - How to make free phone calls using Google's 411 service (1-800-GOOG411) by setting up "fake" businesses, by PhreakerD7  (Website #2, Twitter)
  19. Letters  - Yammering
    • Privacy  - A Broken Husband, Muddy
    • Safeguards  - inf3kT1D, AnOldFool
    • Submissions  - Michael, Tyler, ithilgore (Email), Josh, WC
    • Meetings  - Vince, MasterChen, John
    • Critique  - Jason Scott, Anonymous, Cliff, P3ngu1n, micah, Crazypete, D1vr0c, Nelson, Anonymous
    • Retail  - Michael, Justin, John, Trollaxor, Michael
    • Encryption  - Atom Smasher, SodaPhish
    • Questions  - dluvaisha, Elana, Haroon the Hacker (Grant Hayes), Zoran, Phail_Saph  (Email, BinRev Profile), Omid
    • Injustice  - The Invisible Man, carbide
    • Gratitude  - Jane Doe
    • Observations  - Rev. Troy, Arcade One, Jason, Mattew, Cyphertrex, acidie, ViSiOn

  20. Hacking the Buffalo Air Station Wireless Router  - Default passwords on Buffalo wireless routers, by Donoli
  21. The Thrill of Custom Caller ID Capabilities  - Discusses using caller ID for call routing to lower costs, simplify voice mail access and maintain a single number presence, by krt
  22. Securing Your Traffic  - How to tunnel all of your traffic through SSH, by b1tl0ck
  23. Transmissions  - Ethical implications of using open wireless access points, and then goes into the legal aspects of it, by Dragorn
  24. Hacking the Nintendo Wi-Fi USB Connector  - How to modify drivers and software for this device to unlock its use as a general purpose USB Wi-Fi device and access point, by MS3FGX  (Tom Nardi, Trenton, New Jersey)
  25. Fun With International Internet Cafes  - Disable the timer on an Internet cafe computer in Bangkok by removing it from the startup entries and rebooting, by route
  26. The Trouble with Library Records  - History behind INNOPAC, a popular library management system, by Barrett Brown
  27. The Life and Death of an American Help Desk Agent  - Good summary of the different tiers of support and their culture, by Geospart  (George Doscher, Jacksonville Beach, Florida, Twitter)
  28. 2600 Marketplace
  29. Puzzle  A PDF417 barcode containing a quote from Winston Churchill that was broadcast on October 1, 1939 and said, "It is a riddle, wrapped in a mystery, inside an enigma."  (He was talking about the USSR.)
  30. 2600 Meetings

  $2600 Magazine - Volume 24, Number 4 (Winter 2007-2008)

  1. The More Things Change...  - Editorial
  2. Power Trip  - Sensational article on using web cameras and remote UPS controls to secure your computer, by OSIN
  3. Building Your Own Networks  - Building secure networks modeled after FidoNet using OpenVPN, by Casandro  (Christian Berger, Germany)
  4. Pirates of the Internet  - Overview on who the people are behind the warez you download, by black_death  (Canada, Email #1, Email #2, DOB: 01-26-1989)
  5. Telecom Informer  - Overview of the Enhanced 911 system, by The Prophet
  6. Darknets  - How to create private, secure file sharing networks, by WillPC  (William Raffield, BinRev Profile #1, BinRev Profile #2)
  7. Scanning the Skies  - Overview of satellite receiving technology and receiving free analog video channels, by GutBomb  (Jason Merrill)
  8. Essential Security Tools  - Overview of common open-source network security tools, by Gr@ve_Rose
  9. Decoding Experts-Exchange.com  - Access websites by viewing the HTML source and ROT-13 the access key or answers, by Phatbot  (Derek Kurth)
  10. An Introduction to Beige Boxing  - Discusses Beige Boxing - which allows you to connect a phone, laptop or Palm Pilot to a landline, by Erik Paulsen
  11. Hacking the SanDisk U2  - Overview of the U3 Smart Drive partition layout and some example ISO files to create your own applications, by Mercereau  (Jonathan Mercereau, dohboy)
  12. Exploring AT&T's Wireless Account Security  - Discusses customer information that AT&T customer service representatives have, and how that information might be social-engineered out of them, by satevia  (Michael, Fullerton, California)
  13. Hacker Perspective  - by Rop Gonggrijp
  14. (More) Fun With Novell  - Article on hacking Novell, with no actual information on hacking Novell, by Cronicl3
  15. PayPal Hurts  - Article about how (((PayPal))) transaction reversals can cost recipients a lot of dough, by Estragon
  16. Facebook Applications Revealed  - Security implications of the new Faceberg application API, by stderr  (Kenny, BinRev Profile, Website, MySpace)
  17. Letters  - Declarations
  18. Hacking Windows Media DRM  - Using Windows Media Player 9 in debug mode and DRM2WMV to remove DRM protection from WMV video file, by Alt229  (Erin Scott, Arcadia/Sierra Madre, California)
  19. The Noo World  - Nootropic drug information, by Agent5
  20. Forensics Fear  - Information on Guidance Software's Encase Enterprise Edition and how to bypass it, by Anonymous Chi-Town Hacker
  21. Transmissions  - Various issues with privacy related to browsing, searching, and using various web sites, by Dragorn
  22. Cracked Security at the Clarion Hotel  - Story on keystroke loggers on the computers at a Clarion hotel, by Gauss VanSant
  23. Building Your Own Safe, Secure SMTP Proxy  - Python script to bypass SMTP restrictions on your network, by sail0r  (Email #2)
  24. Zero-Knowledge Intrusion  - Article on practical NIDS avoidance, by S. Pidgorny  (Svyatoslav "Slav" Pidgorny)
  25. Booting Many Compressed Environments on a Laptop  - Run multiple operating systems on a small hard drive by compressing them, by Scotty Fitzgerald  (Email #2)
  26. Avoid Web Filtering with SSH Tunneling  - Yet another SSH tunneling article!  Discusses a method of circumventing web filtering systems by disguising your SSH tunnel as a HTTPS connection, by Tessian  (Bensalem, PA)
  27. 2600 Marketplace
  28. Puzzle (Advertisements)
  29. 2600 Meetings

  $2600 Magazine - Volume 25, Number 1 (Spring 2008)

  1. The Whole World's Watching  - Editorial
  2. Vhreaking with VoxALot  - Defines common VOIP terms and describes how to set up a nearly free telephone system to make calls around the globe, by Jose Romeo Vela
  3. Dirt-Cheap Phone Calls - The VoIP Way  - Describes the author's VoIP setup and what he's learned from setting it up.  He was unable to discover a truly free setup, by SiliconeClone  (Swartz Creek, Michigan, MySpace)
  4. Gaming AT&T Mobility  - Discusses a number of methods and strategies for obtaining freebies/extras on your mobile phone bill from AT&T customer service, by The Thomps
  5. Telecom Informer  - Discusses the telephone systems in prison and how its a profit center for prisons and a ripoff for prisoners.  Also details a bit about the systems used and some of the rules imposed, by The Prophet
  6. Password Memorization Mnemonic  - Discusses a method of generating passwords that are easy to remember, by Agent Zer0 (Philadelphia, PA, MySpace)
  7. Hacking Two-Dimensional Barcodes  - Discusses 2D or matrix bar codes, details what they are, how they work and the types, by glutton
  8. Dissecting the EPC: RFID for the Commercial Sector  - Discusses the EPC and Gen2 standards for RFID, by Kn1ghtl0rd
  9. Eavesdropping with LD_PRELOAD  - Discusses a method of overloading shared libraries in user space to hijack function calls, by phundie
  10. April Fools' Day, the Hacker Way  - Discusses an April Fools Day joke done by the author, by xinit
  11. Remember CompUSA  - Details a method of obtaining CompUSA sales information (including credit card number, expiration date, etc) from an IMS terminal within the store, by silic0nsilence
  12. Downloading MP3s for Free  - Discusses a method of getting free MP3's by using the sign-up credit of the allofmp3.com site, by He-Who-Must-Not-Be-Named
  13. Swindling From SearchFeed  - Discusses a method of simulating user clicks on SearchFeed ads, by Atomic Rhino  (Matt McMillan, Ontario, Canada, DOB: 11-01-1983)
  14. Hacker Perspective  - by Martin Eberhard
  15. Bypassing a Restrictive Internet Proxy  - Explains how a proxy works, how to tunnel past it and shows how to configure your applications, by Anonymous
  16. Shadow Life  - Outlines the basic techniques of creating an alias, by Akasha
  17. Walk with Me, Talk with Me  - Discusses gang signs and suggests using for field phreaking or urban explorations, by phlux (Clinton Haller)
  18. Letters  - DISPATCHES
    • Random Bits  - A reader of 2600, Travis H., Michael J. Kowalski, Peter, chris, Tsun
    • Suggestions  - Bluecoat, Rodger, Bryce Lynch, Loki
    • Analysis  - s, Oisin O'Connell
    • Queries  - Michelle, Jeff Nunn, drlecter, j4ys0n, Cyph3r7, name, Jan, T.L./Retroactive, Andrew, Anonymous, granny, Widerstand, Jane Doe
    • "Surprised?"  - Unr3a1, HealWHans
    • Statements  - Asymptoted, A Depressed Soccer Mom, dave
    • Article Feedback  - Storm2439, Yawk, Anonymous, Jeff, Da Keet, Mike Diaz, virusrr, Darren McCall, The Jeff, David Barrios
    • Scams  - Warden1337 (Ontario, Canada), LoHan, Nagasenpai, GeekBoy, L33tphreak
    • Opportunity  - marie
    • Observations  - Rob G. (San Jose, CA), LongwoodGeek, Check Check, carbon/infowire, orPHan, J, Jeff, Eric Lee Elliott
    • Letter Feedback  - Cliff, hAshedmAn, Tony Zinnanti, "Thok", Paul
    • Sad News  - The Clone (Canada)

  19. Fun With the Snom Outlook Add-on  - Discusses a method of VoIP remote call initiation using the Snom Outlook add-in, by reid
  20. The EU Directive on Data Retention: Surveillance 2.0  - Discusses the European Union's retention policy for communication data.  Details the pros and cons (i.e. privacy vs sanity) and mentions direction U.S. is heading, by Andreas Rietzler
  21. Transmissions  - Discusses broadband service providers efforts to control the internet and the 'net neutrality' debate, by Dragorn
  22. Information Flow on Campus: A Closer Look at Wikipedia  - Discusses Wikipedia and how the editing process works.  Notes the process lends itself to bias and manipulation of information, by Barrett Brown
  23. Fiction: "To Kill an Atomic Subwoofer"  - Tells the story of how the author silenced a neighbors loud car stereo system, by Dionysus
  24. Uses for Knoppix  - Discusses the use of Knoppix to retrieve files from a Windows machine without having to login to it, by Variable Rush
  25. 2600 Marketplace
  26. 2600 Meetings

  $2600 Magazine - Volume 25, Number 2 (Summer 2008)

  1. The Best of Times  - Editorial
  2. Don't "Locate Me"  - Clever little hack for defeating Google Maps "Locate Me" feature via MAC manipulation, and the possibility of turning it around and tracking a target via their MAC, by Terry Stenvold  (Vancouver, Canada, Email)
  3. Exploring Road Runner's Internal Network  - Discusses how the Road Runner ISP internal network for static IP addresses is wide open, by Tim
  4. Hacking Wireless Networks with Windows  - Discusses how to access a wireless network that limits connectivity by using an existing computer's MAC address, by Carbide
  5. The HughesNet FAP  - Discusses a method of circumventing the download limits of the HughesNet satellite Internet service, by ntbnnt  (Nathan Bennett, Marion, North Carolina, MySpace)
  6. Telecom Informer  - Discusses the technology and standards of text messaging, by The Prophet
  7. Hacking Society  - Discusses how companies use holding actions (i.e. placing barriers and wasting your time) to manipulate customers and how to turn the tables on them, by Barrett Brown
  8. Thirteen Years of Starting a Hacker Scene  - Discusses the history of the Brazilian hacker scene and the E-zine Barata Eletrica, by Derneval
  9. HPing (The Part I Forgot)  - Discusses the hping tool from the basics of crafting TCP/UDP packets to advanced abilities like file transfer over ICMP, by Gr@ve_Rose
  10. Meditation for Hackers: All-Point Techniques  - Discusses meditation and several techniques for practicing the author's all-point method, by Sai Emrys  (Berkeley, CA, DOB: 01-12-1982)
  11. Fun With Network Friends  - Discusses a method of being able to view (in Firefox) the web sites someone on your network is viewing, by Uriah C.
  12. Hacking: A Graffiti Writer's Perspective  - Discusses the similarities between computer hacking and graffiti art, by sc0ut64
  13. Hacker Perspective  - by Barry Wels
  14. A Portable Encrypted Linux System for Windows  - Discusses how to create a portable Linux work environment using TrueCrypt and Damn Small Linux, by Aaron
  15. MAC Address Changer  - Discusses changing your MAC address to maintain your privacy on a network, provides a bash script to accomplish this easily, by Plasticman  (Steve)
  16. Capturing Botnet Malware Using a Honeypot  - Discusses how to set up a honeypot, and analyzes a botnet that infected the author's honeypot system, by L0j1k
    • Suggestions  - Nsane HAcker, Greg
    • Inquiries  - Carl, Tommy, redtape, Joseph, Mike, Liam/M/37 (Glasgow, Scotland), SAR, etsjobs, John, Eva, Z, Haestar, R, Phobus, Donna, Tom (Austria), [Name Deleted], erik, Acidevil, chris, Musique Maison, ero0cool
    • Observations  - f0xR4c3r, Padraig, tim, CJ Lorenz, rmpants, SiKing, Bob, Noli, Jigsaw, Barrett Brown, Peter DiGiovanni, Lo$er, aurfalien, Dr. C.
    • Critique  - Gunslinger, Chris A., Shocked998, Druid, indiana_lau, iivix (U.K.)
    • Projects  - dave, David, Breaker Boy, Inmate #210266
    • Responses  - Emperor, Omega_Iteration, Zach C., Exo, Rob, Peet the geek, Unr3a1, Ed, m0untainrebel, creepyinternetstalkerdude
    • Problems  - Morgan, route (Australia), Martha Adams, Krista (Fredericton, N.B., Canada), Sneak Email from a Vendor, Paddy, Markus (Austria), Nick (England), The Jeff, Max Rider
    • Good Things  - ExPhillyMM, Apathy, Israel Torres, Lex

  17. Cracking with the Webtionary  - Using Google and Yahoo! and other search engines to "light-force" crack MD5s with an (almost) infinite dictionary, by Acrobatic  (Jeff B. Nunn, Dallas, Texas, Website #2)
  18. JavaScript Password DOMination: Easy Password Retrieval Using JavaScript and the HTML  - Discusses a method of using JavaScript in a browser's address bar to display a password from a login form, by Jacob P. Silvia
  19. Spirits 2000 Insecurity  - Discusses the Spirits 2000 retail liquor store software suite including where employee and credit card information is stored, by drlecter (Weston George)
  20. Transmissions  - Discusses the history, circumstances and technical details of the OpenSSL flaw affecting many Debian-based Linux distributions, by Dragorn
  21. The Geek Squad  - Discusses using a keylogger to obtain access to the Geek Squad's customer database, by Turgon
  22. Bank of America Website Flaw  - Describes a security flaw in Bank of America's website which allows customer credit card statements to be viewed in some circumstances, by malpelo93
  23. Why is This Computer Connected to the Internet?  - Discusses the flawed rational for connecting many computers to the Internet unnecessarily and the potential catastrophic ramifications, by Porter Payne
  24. Fiction: "Message of the Day"  - Tells the story of how the author almost got arrested for hacking and ended up working as a security consultant, by Peter Wrenshall  (Hack - The Novel)
  25. 2600 Marketplace
  26. 2600 Meetings

  $2600 Magazine - Volume 25, Number 3 (Fall 2008)

  1. The Last Shall Be First  - Editorial
  2. Bell's Mind Markup Language  - Information on the Bell's Mind "phone scanning by hand" language to help in the creation and dissemination of phone number scanning data, by dual_parallel
  3. The TORminator  - Perl script to help identify which countries (IPs) are running the exit routers on the Tor network, by OSIN
  4. The State of Cyberspace and Cyberwar  - Sensational article on "fighting" in "cyberspace," by Barrett Brown
  5. Watching the Watchers  - How to prevent you computer from contacting/updating Google Analytics, by ZoeB
  6. Telecom Informer  - SMS/800 and SS7 information, by The Prophet
  7. Apple Dashboard Widget Insecurity  - Potential security vulnerabilities in Apple's Mac OS X 10.4 Dashboard widgets, including the ability to remotely execute unverified shell commands, by zeitgeist
  8. Penetration Testing: The Red Team Way  - Information on Red Team penetration testing, by MS-Luddite (M$ Luddite, Indiana, DOB: 02-13-1976)
  9. FaxCore AUID Exploit  - Security and password vulnerabilities and default passwords to the FaxCore system, by Element.Crying
  10. ResHacking Windows Vista Games  - Use ResHacker to alter Minesweeper as an example, by Vitaminion
  11. Ripping MP3s from Bleep  - Python script to direct-download full MP3 files from Bleep, by m0ther
  12. Imation Insecurities  - How to recover files, even after entering six bad passwords, on an Imation 18405 USB flash drive, by PriesT
  13. Blackhat SEO: Exploring the Dumb Masses to Make a Profit  - Information and tips for setting up your own "Blackhat Search Engine Optimizer" content-rich spam websites, by ilikenwf
  14. Hacker Perspective  - by Nick Farr  (Page 2)
  15. Spoofing Banners with Open-Source Servers  - Altering the server display banners when performing Nmap scans to fool OS fingerprinting, by m0untainrebel  (Asheville, North Carolina, Email, YouTube Channel
  16. A Different Kind of Remote Scripting  - Using SSH to execute remote commands and scripts, by Atom Smasher
  17. Letters  - Communications
    • Information  - macnutzj (Jason, Tennessee, DOB: 06-28-1981), R3t0DD, Bus boy
    • Meeting Issues  - Jem Tallon (Fargo, ND), Robert, DrF, TIA (Mayaguez, Puerto Rico), Eric (Alabama)
    • General Questions  - Alex (Switzerland), Kevin, Adam, Terry, KNiGHT, Oxilary, Anonymous, Matt, Andrew, Steph, daniel, Brian V.
    • Proclamations  - my apologies for not signing, Swinger (Holland), Trollaxor (Grant Hayes, Overland Park, KS) , jodi, Jeff, Homeless Hacker, Lord Pong
    • Help Needed  - Ian, Singa Crew (Singapore)
    • Experiences  - Micah, drlecter, Shai, Noah Schiffman (Charleston, SC - Video), S1m0nS3z (Pittsfield, MA), Cracker Spion (Sweden)
    • Best of 2600  - Hans, mikef, Jeff Strauss
    • Problems  - Viksa (New Delhi), Daniel, Terry Stenvold, Psion the GateKeeper (Harrison Township, MI)
    • Requests  - John, xemail, E
    • Contributions  - Dr. Rolf Freitag, bluSKR33N
    • Observations  - John, Dr. No (Germany), drlecter, PriesT, Oddlyeven (Sean Street, Arlington, TX), Sn00py, aurfalien, Manuel (New York, New York), PF, Norm
    • Gratitude  - 990.Tim, Max@MVCT, Marcio (Toronto, Canada), Kikidotstrange, Sebastian

  18. Six Quick Points of Disguise  - Physical disguise techniques, by MasterChen  (QuarterMasterChen, Las Vegas, Nevada, Email, Twitter)
  19. AT&T Wireless Customer Information  - Get a AT&T Wireless customer's personal information using only their phone number or last four digits of their Social Security number, by using that number when signing up to AT&T website portal, by Frater Perdurabo
  20. Setting Up Your Mobile Phone for International Dialing  - Overview of the phone number format for calling overseas and the proper use of the "+" symbol, by The Cheshire Catalyst
  21. USB Anti-Forensics  - Windows 2000/XP registry edits to defeat potential forensic attempts against removable USB media, by briatych
  22. Transmissions  - Wireless vulnerabilities and the weakness of WEP, by Dragorn
  23. Be Your Own DDNS Service Using PHP  - Create your own Dynamic DNS service with a few lines of PHP code, by glider
  24. Discovering Firewalls  - Using traceroute, hping2, and nc to detect firewalls on a network, by suN8Hclf
  25. Hacking Music  - Article on the aspects of hacking in making music, by Dr. Zoltan  (Dr. Zoltan Øbelisk, Sir Millard Mulch, Carl King, MySpace, YouTube Channel)
  26. Fiction: "Sleeper"  - Story about meeting a Russian sleeper agent while at school, by Peter Wrenshall
  27. 2600 Marketplace
  28. 2600 Meetings

  $2600 Magazine - Volume 25, Number 4 (Winter 2008-2009)

  1. Beginnings  - Editorial
  2. Introduction to Forensic Data Recovery  - How to recover deleted JPEGs using Foremost and Knoppix on an USB memory card, by Paradox
  3. Hacking Dubai and More Internet Proxy Loopholes  - How to bypass Internet restrictions using a proxy and getting free wireless at hotels in the United Arab Emirates, by forgotten247
  4. Calling Comdial  - CONVERSip EP300 tips and tricks using Nmap and Netcat to view or alter settings, by Metalx1000  (Kristofer Occhipinti, Naples, Florida, YouTube Channel, GitHub)
  5. Telecom Informer  - Telco outside plant cable and grounding information, by The Prophet
  6. De-Obfuscating Scripting Languages  - Decoding the various tricks used to hide HTML and PHP source, by Cliff
  7. Social Engineering the Stock Market  - Social engineering idea to lower the price of oil, by Israel
  8. Making Your Windows Box a Little More Secure  - General tutorial and information on how to secure Windows 2000, XP, and Vista, by DieselDragon
  9. Hack Thyself  - "Seeing yourself as the world's victim is profoundly disempowering and keeps you locked in a cycle of self-created pain and misery", by Kartikeya Putra  (Alex, Email #1, Email #2, Dallas, TX)
  10. Hacker Perspective  - by Bre Pettis  (Page 2)
  11. Beating the System to Get Beats  - Trick to remove the "audio watermarking" from RocBattle files, by Ik
  12. Anonymous SSH at the Library  - How to use a Java-based SSH client on Rutger's library computers, by carbide
  13. Trashing Gone Wrong in Switzerland  - Busted by the cops dumpster diving in Switzerland and why you should have a cover story, by PriesT
  14. This Posting has Been Flagged for Removal  - Information on how Craigslist flags its ads and how to bypass restrictions using a proxy, by Half Life
  15. Improved Mnemonic Password Policy  - Evil Corley likes to touch little boys (EClttlb), by Ian Murphy (Backspace)
  16. Letters  - Messages
  17. Pappy's Cheese Box  - VoIP-based phreaker's cheese box, by Pappy
  18. Hacking for Beer  - Use an alternate I.D. or turn "soda into beer" to purchase beer through a self-check-out system, by Yimir
  19. Gaming Gamestop  - How to get an extra 20% and cash when trading in video games at Gamestop, by Unanimously Anonymous
  20. Vulnerabilities in the Corporate Sector  - Retrieve data from the hard drives of used computers, by =-virus-=
  21. Transmissions  - WPA-TKIP vulnerability information and U.S. border searches, by Dragorn
  22. Business Intelligence  - How sales companies and businesses store data on their customers for later analysis, by Tony Hepo
  23. Hacking WebCT  - Information on the WebCT online class software and how to defeat restrictions, by Milton Bradley
  24. Fiction: "Conspiracy"  - Well, at least it's not a crossword puzzle, by Peter Wrenshall
  25. 2600 Marketplace
  26. 2600 Meetings

"Answer: Gets teenaged boys drunk at HOPE and sells other people's old BBS files."


  $2600 Magazine - Volume 26, Number 1 (Spring 2009)

  1. Year 26  - Editorial
  2. ATA Security Exposed  - Vulnerabilities in ATA hard drive password security and the proper way to erase a hard drive, Michael Hampton
  3. Outsourced  - Horror story of working at a technical support call center for a large ISP, by Witchlight
  4. Annoying Dormitory Phones  - Flaws in the pre-programmed phones at a Swiss university allow you to make calls without a phone card, by Chris Dickinson
  5. robots.txt Mining Script for the Lazy  - Script to make a website's robots.txt file "clickable," by Kelly R. Keeton  (Snoqualmie, Washington, K7MHI)
  6. Telecom Informer  - Overview of telco tariffs and public utility commissions, by The Prophet
  7. Surfing Without a Board  - Using a mouse to create a URL by clicking on single letters in Notepad, by XlogicX
  8. MP3s: A Covert Means of Distributing Information  - Hiding data in the unused portions of a MP3 file, by enferex  (Matt Davis, GitHub)
  9. Catching an iPod Thief Using Forensic Evidence  - Tracking down who stole his iPod by using the access log times, by Todd Garrison (frameloss)
  10. Inside Google Radio  - Overview of the SS32 radio automation system and Google Radio Automation, by hypo
  11. Scour: Paid to Search, Again?  - Trick using AutoHotKey to earn extra points via Scour, by D4vedw1n
  12. Battling the Fanuc Data Panel  - Story of a tech who needed to replace a GE Fanuc 1062 DataPanel and problems with the WinCFG software, by scamorama
  13. Network Neutrality Simplified  - A hacker who appears to support the fraud of "net neutrality," by linear
  14. Hacker Perspective  - by Virgil Griffith  (Page 2, Page 3)
  15. Second Life Hacking  - Discusses a case study of the insecurity of "Forgot your password?" type systems, by Lex Neva  (Additional Info)
  16. Exploiting Price Matching Through JavaScript Injection  - Discusses a method of modifying web pages with JavaScript so the page can be printed for price-matching discounts, by Sigma
  17. Hacker Spaces of North America  - List of hackerspaces in North America
  18. Letters  - Social Discourse
    • Random Advice  - Exothermicus (Denton, TX), Jesus Bonehead (Victoria, British Columbia)
    • Random Observation  - Clay (Lakeland, FL)
    • Random Remarks  - Neito, Jesus Montoya, R. Toby Richards
    • Random Questions  - DANIEL OBORI (Nigeria), Jason Liszkiewicz (Twitter, New York, New York), misterht01, userguid, The Scorpion, William, fakexsound (Marc DeAngelis, Massachusetts), cu florian hannemann, Art Smass (Santa Cruz, CA)
    • Random Problems  - Infinityx, Jack, John and Lissa (Jacksonville, FL), Colby, Arkhayne, Syntax, Robert Royer
    • Random Info  - Sync, R. Holden, Sync, Jeff, ulysses, Mr. Velleman (France)
    • Random Feedback  - Big G, Anonymous, Jason, Arethusa, Steven C. Jackson, CJ, Vandy, Michael, gHOst_Guard, Estragon, Shocked998, ZANAC, thinkt4nk, jus, bogaty, Pampaluz, Ben Edwards
    • Random Offer  - freakball

  19. DNS Spoofing on a LAN  - Discusses DNS spoofing and describes the steps necessary to accomplish it on your own network, by Felixalias
  20. An Astronomer's Perspective on Hacking  - Discusses some of the author's phreaking experiences and how being curious about things can lead you to unexpected results, by Ethernium57 (Omaha, Nebraska)
  21. Transmissions  - Discusses how simple it is to spoof wireless network access points to gain access to client machines using various tools and procedures and the lack of adequate defenses to protect against this attack, by Dragorn
  22. Social Engineering HP for Fun and Profit  - Discusses some weaknesses in the HP customer support system that could be taken advantage of, by haxadecimal
  23. The Last 1000 Feet  - Discusses the author's experience with getting Internet access to his newly built house after he found out the corporate ISPs didn't provide service in his area, by b1tl0ck
  24. Story: The Particle  - Tells the story of a couple of days in the life of a network support engineer and the strange occurrences that took place, by Leviahan
  25. Hacker Happenings
  26. 2600 Marketplace
  27. 2600 Meetings

  $2600 Magazine - Volume 26, Number 2 (Summer 2009)

  1. Not The Enemy  - Editorial
  2. Regaining Privacy in a Digital World  - Very good article on protecting your privacy in both the real-world and online, information on how to remove yourself from online "whitepage" listings, by 6-Pack
  3. The Security-Conscious Uncle  - Story of using social engineering to get the ATM PIN of a "security aware" uncle, by Deviant Ollam
  4. Why the "No-Fly List" is a Fraud  - Why harassing old ladies and White people at the airport doesn't work, by cbsm2009
  5. Telecom Informer  - Overview of the Motorola iDEN cellular protocol and the Nextel/Sprint saga, by The Prophet
  6. Finding Information in the Library of Congress  - Information on searching the Library of Congress website for hacker-related documents (and Area 51!), by Fantacmet  (Michael S. Dooley, Portland, Oregon, DOB: 02-12-1978, Email #2, YouTube Channel)
  7. Hacking the D-Link DI-524 Interface  - Information and a encryption bug fix using a web browser for the D-Link DI-524 wireless router, by der_m  (Jonathan Hadley, Lombard, Illinois, DOB: 01-06-????, MySpace)
  8. Simple How-To on Wireless and Windows Cracking (Part 1)  - Detailed overview on using a BackTrack USB boot disk, with the included airodump/aireplay/aircrack tools, for attacking WEP/WPA protected Wi-Fi networks, by KES
  9. If You Can't Stand the Heat, Hack the Computers! (Part 1)  - Hacking and exploring an OAS Heat Computer Model 6310 via modem dial-up and be your own Mr. Robot, by The Philosopher  (Email, New York, New York)
  10. Security: Truth Versus Fiction  - Essay about the author's real-life encounter with a university's student campus building security system, by RussianBlue
  11. Hacking the Beamz  - How to extract and edit the proprietary sound files used by the Beamz laser harp, by shotintoeternity  (Kevin Carter, Brooklyn, New York, Twitter)
  12. Hacker Perspective  - by Jason Scott (Jason Sadofsky, Boston, MA)
  13. iTunes Stored Credit Card Vulnerability  - Major security hole if the "one-click" purchase option is used under iTunes - even when password is changed, by Brendan Griffiths  (New York, New York)
  14. Zipcar's Information Infrastructure  - Overview of the Zipcar car sharing and car club service and some real-world experiences, by IntlOrange
  15. The How and Why of Hacking the U.N.  - How to grab PDF copies of meeting transcripts from the United Nations website, by Julian Todd  (Liverpool, England, Twitter)
  16. Listen to Radio Hackers!  - Active VHF and UHF frequencies used by hackers in the U.S. and the French hacker Larsen (Vincent Plousey), by CRCF  (Chaos Radio Club of France)
  17. Hacker Spaces of Europe  - Hackers spaces in Europe
  18. Letters  - reader reflections
  19. Abusing Metadata  - Information and privacy aspects on viewing any metadata information inside a variety of files, by ChrisJohnRiley (Heidenreichstein, Austria, Email, Twitter)
  20. Verizon FIOS Wireless Insecurities  - Major security problems in Verizon's default Actiontec Wi-Fi router configuration, by phishphreek
  21. Transmissions  - Overview and history of the author's Kismet program, by Dragorn
  22. Using Network Recon to Solve a Problem  - Story of using Nmap to identify problems on a misconfigured network, by Aesun
  23. Suing Telemarketers for Fun and Profit  - How to file (and win) a lawsuit against a telemarketer for violating you "Do Not Call" rights, by Sai Emrys  (Sanford, North Carolina, Twitter)
  24. Hacker Happenings
  25. 2600 Marketplace
  26. 2600 Meetings

  $2600 Magazine - Volume 26, Number 3 (Fall 2009)

  1. Hacking In Tents  - Editorial
  2. Exploiting University Students Using Rogue Access Points  - Story of a student at a college who would use "rogue" unauthorized access points to intercept wireless traffic of students and staff, by Anonymous
  3. Catching a Laptop Thief/Wi-Fi Hacker  - Script that monitor the output capture file from airodump-ng to search for a specified MAC address to identify a particular Wi-Fi card, by Douglas Berdeaux  (trevelyn, Twitter, Wikipedia, Pittsburgh, PA)
  4. Attacking a Blind Spot  - Ideas to use open network printers to scan or attack networks as they tend to not be as secure or will have open ports, by Tim Kulp (cloak13, Parkton, MD)
  5. How to Almost Hide Your Digital Identity While Port Scanning  - How to hide your source IP address when scanning a network using nmap -D, by Bryce Verdier
  6. Telecom Informer  - Overview of the different types of operator-handled (AT&T), station-to-station or person-to-person calls, by The Prophet
  7. Hello! Google Calling  - Overview of the the new Google Voice service and how to use it to protect your own phone number, for social engineering, or for pranks, by Trowel Faz  (Joe Klemencic) and caphrim007  (Tim Rupp, Aurora, Illinois)
  8. Post-Apocalyptic Communications  - Overview of potential amateur radio communication ideas for after Obama kills most of us, by J. P. Armstrong
  9. Roll Your Own Hive Mind  - How to use social networking sites like Faceberg, Twitter, MySpace, etc. to look for people with common interests, ax0n
  10. Free DirecTV on Frontier  - How to get free DirecTV service using an expired American Express gift card on Frontier Airlines, by Outlawyr
  11. Free Trials - Avoid Giving Out Your Credit Card Number  - Generate "fake," but numerically accurate, credit card numbers using the standard Luhn algorithm, by hostileapostle
  12. If You Can't Stand the Heat, Hack the Computers! (Part 2)  - Hacking and exploring an OAS Heat Computer Model 6310 via modem dial-up and be your own Mr. Robot, by The Philosopher
  13. Hacker Perspective  - by Johannes Grenzfurthner  (Page 2)
  14. Granny Loves Linux!  - Story of setting up a Linux system for his wife's parents and a granny, by Metaranha (Belleville, MI)
  15. Cracking WPA-PSK... with Aircrack-ng & BackTrack 3  - Detailed overview of a WPA-PSK attack using a BackTrack 3 live CD, by Mister Cool
  16. Hacker Spaces - The Rest of the World  - Hackers spaces in Asia and Australia/New Zealand
  17. Letters  - Vowels & Consonants
    • Building the Community  - Tuyishime Aimable (Rwanda), warlock (Dublin, Ireland), Joel (Florida), Lowery (California), Lowery, Jason, peter (Amsterdam), Zach, Prateek (India)
    • Ideas on Spreading Knowledge  - Travis H., Holden
    • New Information  - dmchale, katkat, ++divide_by_zero
    • All Sorts of Questions  - Brad, Leone263, Frank Moore (Australia), Michael, Nicolas, Apple Freak, iphelix, Scott Brown, Sai, Steven, Arnel, Julie, sc0ut, Son, Ray, Fiez
    • Interesting Observations  - eddiehaskell, sigflup, The Security Department, Golden Helix, UncleJesus, Mr. Fossey, Me, Levi del Valle (Sioux Falls, South Dakota), JZ, Jason
    • Cries for Help  - Steve, anonymous, anonymous, Jim, josh
    • General Feedback  - Gary, 3lan, yt, Ed Greenburg, Fiddles McHace, tavis, aurfalien, S, Clay, Israel, Ryau, Justin, Michael Gabriel, Fiducia

  18. Hard Disk Encryption, No Excuses  - Overview of TrueCrypt and why no one should have an unencrypted hard drive in today's society, by GhostRydr
  19. Microsoft, Please Salt My Hash!  - Security hold in Microsoft Windows as the password hashes are not salted, by Sam Bowne  (Twitter, San Francisco, California)
  20. Amazing Grace Period: How to Get Free Loans From American Express  - How to exploit the grace period of American Express credit cards to stay in good standing with them, by Bavs
  21. Transmissions  - Discusses how Wi-Fi is a throwback to the days of media shared networks and many vulnerabilities like session hijacking, by Dragorn
  22. SSL DNSSEC  - Implementing the Domain Name System Security Extension (DNSSEC) to add security the the DNS system and a comparison to SSL, John Bayne
  23. Tethering the Samsung SCH-R450 on MetroPCS  - Overview of the MetroPCS flat-rate CDMA service and hacking the Samsung SCH-R450 using serial command, by VXO
  24. "Borrowing" the CustomInk.com Vector Library  - How to download the vector images from the CustomInk online T-shirt design site, by GantMan  (YouTube)
  25. Hacking Your Hospital Bed  - Overview of the controls for the Stryker Secure II hospital bed and how to sneak out of it without setting of the alarm, by The Piano Guy (Gary Rimar)
  26. Hacker Happenings
  27. 2600 Marketplace
  28. 2600 Meetings

  $2600 Magazine - Volume 26, Number 4 (Winter 2009-2010)

  1. Smart Regression  - Editorial
  2. Pwning Past Whole Disk Encryption  - How to modify the init.img during Linux boot-up to copy a shadow file or shell script for bypassing disk encryption, by m0untainrebel
  3. L33ching the L33chers: Using a Portable Wireless Network  - How to set up a portable wireless network and the insecurity of public WLANS, by DieselDragon
  4. Telecom Informer  - Overview of YMAX Communications' MagicJack VoIP service and the Stratus gateway servers, by The Prophet
  5. Hacking Tor's Control Protocol  - How to enhance (or break) privacy by delving into Tor's internals, custom circuits of any size, and monitor every aspect of Tor activity, by iphelix
  6. Hack T-Mobile Prepaid Messaging and T-Zones  - Bypass T-Mobile pre-paid phone limitations by using web-by-email services and mobi.traffic.com, by Mr. Curious / DoPi
  7. Calling Comdial - Part 2  - How to record and playback VoIP calls using a packet sniffer like Ettercap, by Metalx1000
  8. Underground Physical Network  - Tips on how to setup a remote physical satellite "hacking" site or cache, by MasterChen
  9. Understanding Hacking Tools with Socket Programming  - Why understanding TCP socket programming is essential for any hacker, by Uriah C.
  10. Hacker Perspective  - by Annalee Newitz  (Page 2)
  11. Hey Adobe!  Leave My Boot Loader Alone!  - Info on how Adobe's copyright protection scheme overwrites you master boot record, and how to overcome and recover from this, by dolst  (Rob Gregory, Claremont, Virginia, YouTube Channel, Twitter)
  12. Revenge is a Dish Best Served Cold  - Story of student getting back at a bully in his class by using the "net send" command, by Valnour
  13. Hacker Spaces  - List of foreign (non-U.S.) hackerspaces.
  14. Letters  - Volleys
    • Meeting Stuff  - Michael Craft (Birmingham, Alabama), patgroove (Calgary, Canada), Richard (Vienna, Austria)
    • Inquirirs  - Mark C., ternarybit, Jane Doe, 7shots, John (Texas), Manny, BASE 400, Doug, sonnik, Guillaume (Santa Monica, CA), Wendell
    • Observations  - Barrett D. Brown, reconfigure (New York, New York), Nunook (Florida), Reader in Brooklyn, New York, Ankylosaurus, Rob, blackoperations, TheC0A7S (Andrew Coats, St. Louis, MO), The Webist, Michael J. Ferris
    • Requests  - Lyle, T
    • Grammer and Spelling  - Jeff, Adam
    • Feedback  - BattleBotBob, irperera, Virgil, Jason, sotsov, nevarDeath (Sand Springs, Oklahoma, DOB: 02-25-1985), Enygma, Brainwaste, Nicko, Michael E. Short (Rosharon, TX), corwin137, NS, jbh, Erik S.

  15. Social Engineering from a New Perspective  - Social engineering from a woman's perspective and some tools and tricks to use, by Lilith
  16. A Simple Technique for Drum 'n' Bass  - C routines for creating techno music and loops, by SigFLUP  (Thea, Email)
  17. Retail Automation: ABS  - Overview of the ABS point-of-sale system by Retail Automation and how to access its data files, by L00dHum
  18. Connecting to StreamTheWorld Audio Stream Directly  - How to connect to StreamTheWorld without using their client, but MMRadio instead, by mr_cow
  19. Transmissions  - Discussion on the security vulnerabilities with today's cellular phones, by Dragorn
  20. The Importance of Updating Your Computer and Hacking Your School's Network  - Exploiting the Windows RPC DCOM vulnerability to grab passwords (hashes) and then access a school grading computer, by Desert_Fox and 6|21|3|11
  21. Fiction: "Shakedown"  - Tells the story of a help desk technician who has to fly to a customer site because they believe they have a hacker and how he stumbles upon the true problem, by Peter Wrenshall
  22. Hacker Happenings
  23. 2600 Marketplace
  24. 2600 Meetings


  $2600 Magazine - Volume 27, Number 1 (Spring 2010)

  1. Cloudy Skies  - Editorial
  2. Insecurities in Emergency Rescue  - Lack of real security with the "EMS 2000" program used by many fire or EMS departments, by Metalx1000
  3. AJAX Hacking for the Discerning Pro Wrestling Fanatic  - How to use AJAX to bypass ads on websites which are aware of Adblock, by Gorgeous_G
  4. A Little Fish in a Big Pond  - Overview of the Netcomm 3G9W router used by BigPond and the fact that part of the WPA key is in the default SSID, by kawarimono@bigpond.com (Australia)
  5. The Grey Hat Manifesto  - Looks like someone got picked on in middle school, by Da New Ment0r of PhoeniX.RisingG.GrouP
  6. Telecom Informer  - Disabling incoming calls on payphones and a Tracfone overview, by The Prophet
  7. No Sale for You!  - Potential privacy issues with the Kroger Shoppers Card and other grocery store cards, by Keeng Tusk
  8. CrazyGeorge - Security Through Obscurity  - Hidden data and webpages on George Sodini's website, by Lnkd.com?2600  (Robert Simpson, Pittsburgh, PA)
  9. BartPE: A Portable Microsoft Windows  - How to create a fairly secure, and portable, Windows-like environment using Bart's Preinstalled Environment, by Peter Wrenshall
  10. Influential Angles  - Overview and examples of using social engineering techniques to get information out of people, by The Third Man (Scotland, U.K.)
  11. Hacker Perspective  - by David A. Buchwald (Bill from RNOC [LOD/H], Sigmund Fraud, Dabu Ch'wald, DOB: 09-04-1970)  (Page 2)
  12. The Hacker Enigma: Positives, Negatives and Who Knows?  - Stories of what happens if you co-workers catch on to you screwing around while you should be working, by pantos
  13. An Introduction to CSRF Attacks  - Overview of Cross-Site Request Forgery (CSRF) attacks and how to prevent them, by Paradox
  14. The Voyager Library Information System  - Overview of the Voyager Library Information System, their simple password schemes, and how much private information they store, by Decora
  15. "Print Me?" Why, Thank You!  - Overview of the PrintMe services available at many hotels and some potential security holes, by StankDawg
  16. Letters  - Speak
    • Inquiries  - Norm, Anonymous, adnan c, zkyp (Nigel, Utrecht, Holland), Allan (New York, New York), Sheeraz, Alex, nd, Anonymous in Ohio, Brainwaste
    • Meetings  - Blaine (West Virginia), Dustin (Omaha, Nebraska), Zook
    • A Way Out  - Anonymous
    • Suggestions  - Rusty, Cody Burris, Spider_J, Kaluce, Rebeka
    • Gratitude  - anonymous, Alex Meanberg, twEaKer, Chrome
    • Observations  - J Gonzalez, DMUX, Derf, Mattew, Titeotwawki, Robert, E85, Moose, Kyle (Baton Rouge, LA), Ash, Bob White (Atlanta, GA), Quarx, Hexagon Sun
    • Telephone Tidbits  - Norm, Grumble
    • Help Needed  - Leanardo, Bob (Newburgh, New York), Name Deleted
    • More Info  - Brian, Node42 (Germany), m0rebel, Kyle, Name Deleted

  17. My First Hack  - Story of a hacker in 1972 bypassing a phone dial lock by "flashing" the hook switch, by fobg
  18. Dr. Jekyll and Mr. PayPass  - How to remove the RFID chip in a Citizens Bank PayPass (or other) credit/debit card using only a paper hole punch, by 11001001
  19. Writing a Small Port Checker in C in 40 Lines (or Less)  - Quick code for a single-host port scanner in C, by Pantos
  20. Procurve Switch Hacking  - How to enter "test mode" on a HP ProCurve Ethernet switch, by Tzu Tzu Metals
  21. Transmissions  - Why I like print or "E-books can go to Hell," by Dragorn
  22. Bluetooth Hacking Primer  - This document is not a guide about actually attacking Bluetooth devices, but rather walks the reader through Bluetooth's basic principles of operation, and touches on the hardware and software setup required to start doing security related research, by MS3FGX
  23. Simple How-To on Wireless and Windows Cracking (Part 2)  - Update to Part 1 which appeared in the Summer 2009 issue, by KES
  24. Hacker Happenings
  25. 2600 Marketplace
  26. 2600 Meetings

  $2600 Magazine - Volume 27, Number 2 (Summer 2010)

  1. The Hacker Dialogue  - Editorial
  2. Hacking Google Analytics  - How to prevent Google Analytics from tracking your search data and how to view what they have already collected, by Minishark
  3. My Second Implant  - Story of a person who supposedly had a speaker implant near his ear, by Estragon
  4. Free Encrypted 3G Web Access on T-Mobile Smartphones  - Tricks to get Internet access on a T-Mobile phone if your subscriber plan doesn't allow it by using HTTPS proxies, by EvilGold  (Joe Sapienza, Lindenhurst, New York, YouTube Channel)
  5. Why Cell May Die in a Modern Hacker's World  - How free Wi-Fi, Skype, and VoIP services are competing with commercial cellular services, by Ron Overdrive  (Ronald A. Festa, New Jersey, KC2WQW)
  6. Telecom Informer  - Telecommunications industry in China and some info on Google Voice, by The Prophet
  7. Call the World for Free  - Using Universal International Freefone Numbers (UIFN) for toll-free international VoIP calling, by BitRobber
  8. How to Create Mass Hysteria on a College Campus Using Facebook  - Funny story of a person setting up fake Faceberg accounts for people at his college, by alleyrat  (Additional Info)
  9. Educational Wireless Honeypots  - Setting up an open Wi-Fi access point as a honeypot as a tool to tell users about wireless security, by Pan Goat  (Jaime Magiera, Ann Arbor, MI, MySpace)
  10. I'm Not a Number  - Overview of barcodes and the UPC system and the use in privacy invasion, by Poacher
  11. How I Scored the Avaya PBX Init Password  - An Avaya outsourcing partner handed my training class the most guarded password in IT.  This is what went down, by The Funkster Deluxe
  12. Why You Need a Grimoire  - How to use technical "black magic" in your hacking sessions, by Leviathan
  13. (Potential) Laptop Recovery  - Tips and tricks you can use to get your laptop back if it's stolen, including using the webcam, by Twisted Uterus
  14. Free Access on Boingo Wireless  - How to hack Boingo wireless hotspots to gain free Internet access, by ZoDiaC13 (Canada)
  15. How AT&T Data Plans Work (and How to Make Them Stop Working)  - Social engineering tricks to get out of a AT&T cellular data plan you don't want, by excessive | offnetwork
  16. Casual Encounters of the Third Kind: A Bayesian Classifier for Craigslist  - Using Bayesian filtering techniques on Craigslist to weed out spam messages, by Brian Detweiler
  17. Letters  - Textual Feedback
    • Discoveries  - Zachary Hanna (San Francisco, CA), Dufu, DieselDragon, Justin Nathans, Will, Justin Nathans, Jeff, Anonymous Coward, Malvineous (Adam Nielsen, Brisbane, Australia)
    • Beating the System  - Tom, Marc
    • Inquiring Minds  - Robert Bradbury, John Hilger, Aaron, D MADERAS, Ed, jitsutech, D MADERAS, Patrick Flynn, Jsnake
    • On Grammar  - Antix (John Kula), RWM, B
    • Contributions  - Glenn, Glenn Andreiev (DOB: 07-20-1961), Curtis (Renton, Washington), A Weapon of Mass Construction (Travis H.), Unknown, j, TPhreak
    • Ignorance  - user0010, Dr. Cadwell
    • Random Meeting Notes  - Froilan, Random/floodland, Vladinator
    • Further Comments  - Ian, Chow, Dammpa, Mr. Fright, circuitboardsurfer, Eric, Insomniaque
    • The Publishing World  - jefftheworld (Jeff Alyanak, Toronto, Ontario), Teddy, byeman, Colorado Codemonkey, defective, ColForbin (Jim Blanford), FunkFish, Robert James (Winnipeg, Canada)

  18. Outline for a Simple Darkserver and/or Darknet  - Creating underground encrypted data networks which can't be monitored, by p4nt05
  19. Goog411 Skype Hack  - How to use Goog411 to route a Skype call without using your SkypeOut minutes, by The Skog
  20. Hacking Autodialer Telephone Access Systems  - Overview of Mircom remotely programmable telephone access system, by Wrangler
  21. Leaked Document Department  - Funny IRS job aid for securely using a revolving door.
  22. Transmissions  - Overview of the Google StreetView Wi-Fi data collection scandal and how to prevent this, by Dragorn
  23. Written in Spam  - Nine poems written using only spam mail subject lines, by t0sspint (Sean Hausauer, Buffalo, NY, Twitter)
  24. Roll-Your-Own Automated System Restore Discs  - Homebrew data restoration disk using PING (Partimage Is Not Ghost) bootable Linux CD, by ternarybit
  25. Grazing Voicemail Passwords  - Overview of common voicemail passwords and tips on guessing them by using a collection of real-world passwords, by Non-Sequential
  26. Private Key Exchange Using Quantum Physics  - Overview of the BB84 protocol for quantum key distribution, by Jared DeWitt (Salt Lake City, UT)
  27. How to Overwrite JUNOS Proprietary Code  - Overwriting locked code and scripts on Juniper devices, by Anonymous
  28. Hacker Happenings
  29. 2600 Marketplace
  30. 2600 Meetings

  $2600 Magazine - Volume 27, Number 3 (Fall 2010)

  1. Conflict in the Hacker World  - Editorial
  2. Read All About It!  Online Security and Paid Newspaper Content  - How to save JPEGs of London Times online newspaper articles, by Yan Tan Tethera
  3. Old School Hacking  - Overview of some old school hacking techniques, tools, and hardware used at the time, by Kim Moser (New York, New York)
  4. How I Learned to Stop Worrying and Spam the Scammers  - Reverse spamming a website by automatically creating fake username/password data, by Wavesonics  (Adam Brown)
  5. Telecom Informer  - Overview of the China Mobile cellular phone system in China, by The Prophet
  6. Editing the Brand Image: Forgeries, Branding, and Network Theory in the Digital Playground  - Overview of fakes and forgeries in a digital world and how to prevent this with digital signatures and other tricks, by anonymous
  7. SPAM Simplified  - Overview of spam email and how it is created, spread, and how to prevent it, by bill (fsu_tkd90)
  8. Hacking Out  - How to bypass content filtering and restricted Internet access, by R. Toby Richards
  9. Man-in-the-Middle Attack  - Good overview of a Man-in-the-Middle attack to strip SSL data using tools provided in BackTrack (sslstrip, arpspoof, etc.), by Oddacon T. Ripper  (Dietrich Miller, Pacific, MO)
  10. Hacker Perspective  - by Barrett D. Brown  (Email #2)
  11. IPv6 Connection Hijacking and Scanning  - How to use radvd" to redirect IPv6 traffic to an arbitrary location and tips to perform practical IPv6 network scans, by Farhan Al-Muradabadi
  12. Gmail and SMS Gateway Fun  - Shell script for a SMS bomber using a Google Maill gateway, by Digicon
  13. Moving from Robotics to Artificial Intelligence  - General overview of the history of artificial intelligence and how it relates to modern robotics, by MiracleMax
  14. Letters  - Material for the Next Book
    • Ideas  - Anthony (Biloxi, MO), Dufu, John Trotter, Marshal820 (California)
    • Feedback  - Ross McCauley (McAlester, OK), Quaffi0, Joe Domenici (Austin, TX), Captain Cautious, Walter, CJ Lorenz, Macavity, Pete, Citizenwarrior
    • Continuation  - D1vr0c, Mystrix, Adam, Jean
    • Observations  - Titeotwawki, Ralf B., Mary, Justin, member popcornpanic, monakey, JapoCapo
    • Concerns  - Ech0, The Doctor, Botless (Oceanside, CA)
    • Inquiries  - Alexander, brian heagney, a ahmed, Unr3a1, Jane Doe, Pete, Shadowfox, Dan, william, Bob (London, England), Bradley, HowWeird
    • 2600 to the Rescue  - ScatteredFrog, AKH

  15. Seven Things Hackers Did Right  - Some of the concepts the 1995 movie Hackers appeared to get right, by glutton
  16. Life Without Walls: Circumventing Your Home Security System  - Story of bypassing a window alarm system using an old hard drive magnet, by Sacha Moufarrege
  17. Transmissions  - iPhone jail-breaking vulnerability and The Next HOPE speech overview, by Dragorn
  18. How to Turn Local Admin into Domain Admin  - Batch file to obtain domain admin privileges under Windows-based network servers, by David Dunn
  19. Panasonic Phreaking in the New Age  - Panasonic voice mail box/PBX overview and clever trick using the # key to obtain a dialtone-out, by Anthony
  20. Hacking and Securing the Tandberg C20  - Security concerns (no root password!) of the Tandberg C20 high-def video conferencing package, by xorcist (Niki)
  21. Hacker Happenings
  22. 2600 Marketplace
  23. 2600 Meetings

  $2600 Magazine - Volume 27, Number 4 (Winter 2010-2011)

  1. Changing Landscapes  - Editorial
  2. Bash Bash Bash!  - Overview of the Bash shell, using some of the built-in commands, and few example scripts, by Douglas Berdeaux
  3. How to Cheat at Foursquare  - Tweaking the Foursquarefox plugin to "fake" Foursquare check-ins, by therippa  (Error:  id="fsxlogin" should be id="fsfxlogin")
  4. The (Obvious?) Dangers of Free Wi-Fi  - Tips to protect yourself (and your connection) while using a "free" Wi-Fi network, by Azazel
  5. The Buck Stops Here: Inside AT&T's Tier 2 Tech Support  - Story from a person who works in AT&T's "Tier 2" technical support, by kliq
  6. Telecom Informer  - Overview of Japanese landline and cellular phone services, by The Prophet
  7. Various Vulnerabilities in the UPS Shipping System  - Potential bugs and tracking number vulnerabilities in the UPS shipping system, by Dufu
  8. Ode to the United States Postal Service  - Tips and tricks to use "General Delivery" for you mailing address and how to maintain some privacy, by Barrett Brown
  9. Android, You Broke My Heart  - Bugs with the Google Mail verification and how to get private information by forcing a reset in Android 1.6 (and lower) phones, by Ry0ki
  10. Corporate Reconnaissance for the Anti-Social  - Search tips and other techniques for obtaining private information on employees at your target business, by Azazel
  11. Hacker Perspective  - by John Harrington  (W5EME, Beaumont, Texas)  (Page 2)
  12. Anti-Satellite (ASAT) System for Dumbasses  - How to protect yourself from overhead surveillance satellites and ideas to jam their sensors, by spynuclear@yahoo.com
  13. The Trouble with the "Digital" Music Industry  - Problems with "digital-only" music and a potential bug in Amazon's checkout system, by ScatteredFrog (Sean, Chicago, IL)
  14. Invisible ASCII: A Poor Person's Steganography  - "Hiding" data in Windows by using non-standard (ALT + <number>) ASCII codes, by Strawberry Akhenaten  (Alamosa, CO)
  15. Letters  - Discussion Time
    • Query  - mohsen
    • Spreading the Word  - Maynard, j, George (George Hayes, Sugar Land, TX), Pro Virus (Simon Levesque), Prashant (India)
    • Coincidences?  - The Asseater, Drykath, Micheal
    • Exciting Offers  - cl0ckw0rk, David
    • Another Query or Two  - mohsen, Ben
    • Policy  - Handle Deleted, K, Jody, Nick Petty (iPen: Hacking with the iDevice), Steve, Bobby
    • Critique  - saizai (Sai Emrys), anonymous, The Piano Guy
    • Still More Grammar  - Robert Lynch, RWM
    • Infiltration  - Jeff, Barrett D. Brown
    • Fighting the Power  - Samuel, drlecter, Brian in Leawood
    • Yet Another Couple of Queries  - mohsen, Denis Gladysh
    • Addendum  - ternarybit, Jason
    • Advice Sought  - Salih, John, Cm0nster, nate
    • Challenges  - BBWolf, ghost
    • The Last of the Queries  - Feathered Serpent, Wes, Jack, m, mohsen

  16. EMR Interception and the Future of Computer Hacking  - Overview of van Eck-style electromagnetic radiation computer/CRT surveillance techniques, by Triscal Islington (Canada)
  17. The Joy of IPv6  - Why we should all start moving to IPv6 and some potential security problems, by Sam Bowne  (Additional Info)
  18. Dormitory Phishing  - Story of creating a fake "login" screen to track a Faceberg stalker, by anonymous
  19. How to Find Information on People Using the Internet  - Different ideas and websites to search for real names and email addresses on the Internet, by DarX (Darxius)
  20. Transmissions  - How the U.S. government is seizing or shutting down "pirate" websites, by Dragorn
  21. Phun with FOIA  - Information you need to fill out a Freedom of Information Act (FOIA) request, by BY3M@N
  22. iBahn Hotel Site Kiosks and How to Pwn One  - How to gain disk access and free Internet from a iBahn Internet kiosk at some hotels, by Sandwich
  23. RAM Dumping  - Dumping the contents of your computer RAM under Windows with Win32dd and how to search through it for any goodies like passwords, by Metalx1000
  24. Who's Got Your Vote?  - Potential voting vulnerability which would allow you at add a person's name to any petition, by windpunk
  25. Vulnerabilities in Quantum Computers  - Defeating quantum-based computer security by using a man-in-the-middle attack by someone who doesn't understand quantum cryptography, by Purkey
  26. Hacker Happenings
  27. 2600 Marketplace
  28. 2600 Meetings

Eric Corley Kiddie Finder


  $2600 Magazine - Volume 28, Number 1 (Spring 2011)

  1. A World Spinning  - Editorial
  2. Password (In)security?  - Article about the current state of password security using some real-world statistics and examples, by Sheep Slapper  (Stephen Lee Fischer, Moscow, Idaho)
  3. Password Bypassing and Clearing  - Bypassing password security on a computer you have physical access to by using the various Linux LiveCD distributions, by Metalx1000
  4. How Good is Geolocation?  - Overview of geolocation services, how accurate they are, and how spoof your location, by Geo Spoof
  5. Telecom Informer  - Local Number Portability (LNP), NPAC, and how the routing between offices takes place, by The Prophet
  6. Why I Like E-Books  - Some of the advantages (and disadvantages) to using e-books, including anonymity and defeating various means of censorship, by Oakcool  (Mateus Carvalho, Eugene, Oregon, Twitter)
  7. What is a Hacker?  - Looking into the mindset of a hacker, by Lifeguard
  8. Who is Anonymous or How to Troll the Media for Fun and Profit  - Clueless idiots on /b/ who are too stupid to do any real hacking - so they have to take out their sexual frustrations by DDoS various websites, by Anonymous
  9. How to Accept Payments Anonymously - A Digital Currency Guide  - Sensational overview on using "digital currency" and how to protect your monetary transactions and remain fairly anonymous, by Max Vendor
  10. How to Find Out What the Government Knows About You  - How to send in a Freedom of Information Act (FOIA) request to see what kind of information various government agencies have on you, by Variable Rush
  11. Bypassing JavaScript Timers or How I Learned to Stop Waiting and Love the Variable  - How to circumvent those JavaScript timers on websites like RapidShare by using Opera to edit and re-run the script, by K3ntucky
  12. Remote Login Made Easy  - Using services like LogMeIn and Dropbox to remotely access your computer, by GantMan
  13. Two Party Covert Communication Over MSN Messenger System Using Emoticons  - Using "smiley face" ASCII emoticons to represent binary data in order to pass small secret messages, by Armando Pantoja
  14. Virtual Anti-Forensics  - How to protect yourself against computer forensic examinations by running BackTrack in a virtual memory partition under a virtual machine, by Israel
  15. Hacker Perspective  - by Katherine Cook
  16. Secrets of the Spider  - Overview of a Perl web spider developed by the author to search for only certain data you want, by Triad@Efnet
  17. The Lessons Learned on a Training Site  - Story of the author finding various security holes in their company's training website, by Metalx1000
  18. Writing Bots for Modern Websites  - Creating a bot using the Watir Ruby library to manipulate JavaScript on a website, by Michael Morin
  19. Letters  - Non-Verbage
    • Gratitude  - r0Wn1, gui, WTL
    • Fun Facts  - InternetToughGuy, Nathan, Lucky225, Evan K., Justin & Audrey (Cincinnati, OH)
    • Letters from Prison  - Peter, Ghost Exodus (Jesse McGraw), W, Mark
    • Addendum  - therippa
    • Feedback  - Adam, Estragon, MotoFox, Gordy, chapo, Zach, Pete
    • Queries  - Top Sec, Maggie, Chris, p-lo, Andrew, Graham, Caboose, NABster, An Inquisitive Youth, Deviant Ollam, Joshua, Matthew, Haggis (Brisbane, Australia), psuedofed, Richard, HW, Jeffrey LaChord
    • On WikiLeaks  - Maybeso, Maybeso, Lucas, Anonymous, Stephen, B. Franklin
    • Wanted  - hidn shadows, Worried Mother
    • Discoveries  - The Cisco Kid, Anonymous
    • Grammar Words  - kyle w, drlecter, RWM, Jane Doe, Anonymous

  20. Where Have All Our Secrets Gone?  - How privacy in our world today is often compromised by ourselves, by aestetix  (meman2000, Baltimore, Maryland, Email #2, Twitter, LiveJournal)
  21. LDAP Directory Servers: TMI!  - Searching the logs of a Lightweight Directory Access Protocol (LDAP) server for cleartext passwords, by Leviathan
  22. Computers: With and Without  - How some hypothetical situations would be presented if there were no computers available in the world, by DGM
  23. Automatic Usage of Free Wi-Fi  - Bash script to randomize your MAC address and auto-connect to open Wi-Fi systems, by Rolf Freitag  (Ismaning, Germany)
  24. Transmissions  - Overview of what is required to sniff Bluetooth traffic and some low-cost hardware platforms to help accomplish this, by Dragorn
  25. Coding Bots and Hacking WordPress  - PHP and JavaScript code the automatically loads web pages, submits forms, and does sinister stuff, while looking like it's human, by Micah Lee  (San Francisco, California, Twitter, Blog, Website)
  26. Abusing the Cloud  - Using someone else's account with just their cell phone number on The Cloud public Wi-Fi systems, by riemann
  27. Hacker Happenings
  28. 2600 Marketplace
  29. 2600 Meetings

  $2600 Magazine - Volume 28, Number 2 (Summer 2011)

  1. Progress Report  - Editorial
  2. Dealing with Credit Card Companies  - Information you should have on hand should you need to cancel or obtain info from a credit card company, by The Piano Guy (Gary Rimar)
  3. Detecting and Tracking Stealth Satellites  - Beginning project of mounting a CCD camera to a telescope to monitor satellites, by spynuclear@yahoo.com
  4. Pen Testing from a Mile Away  - Modifying an old DirecTV satellite dish into a high-gain 2.4 GHz Wi-Fi antenna, by Asim Zaman
  5. Securing Online Voting  - Overview of what some website admins do to prevent people from "cheating" in online polls or voting, by kr
  6. Telecom Informer  - Trip to the DMZ in South Korea and information on the Korean phone systems, by The Prophet
  7. Mobile Hacking with Android  - Takes a look at the origins of Android, and a basic rundown on the Internal structure of the OS.  It then moves on to some choice software selections and details a real-world man in the middle attack using a rooted Android smartphone, by MS3FGX
  8. How I Escaped Google  - How to prevent your personal data from showing up on the Internet, by mrcaffeine
  9. Add a User with Root Privileges Non-Interactively  - How to append a UID=0 account to /etc/shadow without an interactive TTY, by Pipefish
  10. Simple RSA Encryption or Human Calculable Encryption  - Design a public & private key encryption system using only simple math and really small prime numbers, by b3ard
  11. Booze, Nosiness, and City Terminals  - Hacking public Internet terminals in Germany, by th3linquist (Blog, Twitter, Germany)
  12. Hacker Perspective  - by KC
  13. How to Protect Your Car from Radio Jammers  - How to be aware of people using radio frequency jammers to prevent wireless car alarms or door locks from properly activating, by Beyond
  14. Air Intercepted Messaging: A Revisit of POCSAG and Radio Privacy Issues  - Nice article on the art of pager interception and some of the software used, by Malf0rm3dx (Chris) & Megalos
  15. Auditing the MiFi2200  - Obtaining the stock encryption key on a Virgin Mobile MiFi2200 Hotspot, by pnorton (Paul Norton)
  16. Letters  - Voice of the People
    • Reaching Out  - D351
    • New Stuff  - Shadow, Adam
    • Meetings  - Sherlock Holmes, Vadym, Jesse, Peter (Netherlands), Paul, Icarus, jason (West Virginia)
    • Clarifications  - DR, carl, zarck, j, MadJo
    • Electronic Publishing  - The Atomic Ass, Michael, Thinkican, Brett, Jeremy, William
    • Curiosity  - Sasa, Richard
    • Observations  - drlecter, William, AnyPerson, Dan, Petar, Jeff, e-Z-e-kiel
    • Worries  - Chuck, Chuck
    • Experiences  - SanDogWeps, orPHan, nrKist, Ian, Dead Rabbit, Jimmy, Coyote, Twenty Six Hundred
    • Questions  - Bryan, false, Anonymous, DMUX, m m, Lane, eb, MyOwnMinerva, MyOwnMinerva, MyOwnMinerva, fives, Eric, Frank
    • WikiLeaks  - Terry, M3d1c473d, SysKoll, Polaris75
  17. Hiding the Hacker Instinct  - Story of bypassing a motion-activated locked door at his office and not wanting anyone to find out, by Phineas Phreak
  18. Starting a Path to Modern Database Privacy  - How to opt-out of some of the various Internet databases, by Barrett D. Brown
  19. Transmissions  - Instances of real-world "cyber wars," by Dragorn
  20. A Brief Guide to Black Edition XP  - Overview of Black Edition XP, a stripped down "hacker" version of Windows XP, by Oddacon T. Ripper
  21. The Many Uses of SSH Tunnels  - Tunneling data over SSH and using it to bypass content blocking, by twopointfour@riseup.net (Micah Lee)
  22. Senatorial Courtesy Plates - An Inside Look  - Government vehicle license plates in New Jersey and what they mean, by Dufu
  23. Fishing with Squid  - Setting up a Squid server to block ads and your privacy, by Suborbital
  24. Hacker Happenings
  25. 2600 Marketplace
  26. 2600 Meetings

  $2600 Magazine - Volume 28, Number 3 (Fall 2011)

  1. Awakenings  - Editorial
  2. Introduction to Chrome OS  - General overview of Google's ChromeOS, the CR-48 hardware, and the aspect of moving applications to a "cloud," by MS3FGX
  3. Bypassing Shell Restrictions  - Tricks for breaking out of a restrictive shell on a Dell Remote Access Controller, by Malvineous
  4. Phishing on an iDevice  - How to turn your iPhone into a trusted website to use for "phishing" exploits, by Jared DeWitt
  5. Telecom Informer  - Difference in Caller ID delivery in China and how it can be spoofed or unreliable, by The Prophet
  6. Network Anonymity Through "MAC Swapping"  - How maintain relative anonymity on a network by hiding or "spoofing" your hardware MAC address, by A Sayler
  7. Both Sides of the Story  - A few tips on what to do when in police custody or during a police interview, by Poacher
  8. Video Game Hacking  - Overview of some of the hardware and software tricks used to "hack" video games, by Moral Grey Area Cat
  9. Hacking Alt Detection in Second Life  - How to bypass zF RedZone's "alternate account" detection in Second Life using a simple cipher, by Johnny Fusion =11811=
  10. Hacker Perspective  - by Bruce Sutherland  (zer043x, Melbourne Beach, FL)  (Page 2)
  11. How to Spoof Another User in MindAlign  - How to "spoof" being another user on the MindAlign chat system, by Terrible Doe
  12. Access Control: A Fancy Facade  - Overview of "access control" techniques (automatic door locks, card readers, etc.) and some simple tricks which can be used to by them, by P9a3
  13. Go Daddy Shared Hosting Review  - Cross-site scripting vulnerabilities and other tricks to play with GoDaddy's shell access, by General Disarray
  14. Letters  - Utterances
    • Writing for Us  - Zook, Josiah, Juan, Ben, MS3FGX, Brandon
    • More on Meetings  - Alex K, Eric
    • Information  - DA, Phil, Owen, lg0p89, Kitty
    • Corporations  - Mark, Jeremy N., Kagehi.K
    • Digital 2600  - Jeremy, Ld00d, Christopher, Tim, Saskman, Captain V. Cautious
    • Projects  - Particle Bored, jag, treesurg
    • Inquiries  - RON, Squeeling Sheep, Kate, Darren M., Eric, James, D., kyle
    • Desperation  - Brenda, Stacey
    • Random Thoughts  - The Girl in the Corner, r0Wn1, J.B., Porky, Bpa, Case, nachash, E.T.A.G E.
    • Retorts  - CF 905, Variable Rush
    • Still More on WikiLeaks  - Name and Location Withheld by Request

  15. Logging and Analysis with Your GPS-enabled Phone  - Using the GPS data recorded on a HP webOS phone, by flippy
  16. Cellphone, Keys, Wallet?  Check!  - Story of someone who had their cell phone stolen and the run-around T-mobile have them, by Josiah McGurty  (Springfield, MO)
  17. Mobile Hacking: Really  - Installing Laika Linux on an Android phone to give access to command-line security/network tools, by papill0n
  18. Transmissions  - How computer security still hasn't really improved much over the years, by Dragorn
  19. Asterisk, The Gatekeeper  - Trick to use Asterisk to open a gate when a specific Caller ID is received, by MasterChen
  20. Wear a White Hat  - Discussing some of the recent high-profile "hacks" and how they may poorly reflect on the hacker community, by Sam Bowne
  21. How I Got Firefox to Accept the TEL Tag for Phone Calls  - How to get Firefox to interpret a "tel:" tag to bring up Skype when a link is clicked on, by The Cheshire Catalyst
  22. Fiction: "Kill Switch"  - Fictional story about how Internet censorship may come about and ways hackers could bypass those restrictions, by Leviathan
  23. Hacker Happenings
  24. 2600 Marketplace
  25. 2600 Meetings

  $2600 Magazine - Volume 28, Number 4 (Winter 2011-2012)

  1. Movements  - Editorial
  2. Google Temphptations  - Viewing PHP code by searching (site:*/*.php%3f*=*.php) for the .php~ backup files, by Craig Stephenson
  3. Free Phone Numbers with Google Voice  - How to setup and use Google Voice and a trick to use a "fake" account to obtain a phone number not traceable back to you, by bluelander
  4. Abuse Reports Still Work  - If you're consistent, filing an abuse complaint to an ISP will still work, by raphidae @ EFNet
  5. MAC Spoofing Your Way to Free Internet  - Change your MAC hardware address to one of a "paid" account and receive free wireless Internet access, by Ashes
  6. Hacking Refog Keylogger  - Overview of the Refog Keylogger software, how to detect it (MPK.exe), and where it stores its data, by Alex Nocenti (aka MrPockets)
  7. Telecom Informer  - Telecommunications equipment on the island of Palau, by The Prophet
  8. Who is Anonymous?  - Sensational overview of the "hackers" calling themselves "Anonymous," by aestetix
  9. Property Acquisition - For Free?  - Story of a person who wanted to intentionally live "homeless" and how to gain property by just paying the taxes or back taxes, by PTKitty
  10. Let's Feed the Phishes  - Python code to send fake phone numbers, passwords, other data, etc. back to "phishing" sites, by goldcove
  11. Bypassing Universal Studio's MP3 Security the EZ Way  - Using VLC to record audio streams and bypass DRM restrictions, by Akurei
  12. Internal Denial of Service with Fork and Malloc Bombs  - Combining a fork() bomb with a malloc() call to locally attack a host, by Israel
  13. Whitelisting with Gmail  - Setup two Google Mail accounts to provide a "white list" that only allows email from certain domains or email addresses, by R. Toby Richards
  14. Eye Spy  - Using the MobileChan app to monitor data sent by your phone, by Digicon
  15. How to Social Engineer Your Local Bank  - Social engineering trick to obtain the "daily authentication code" often used by banks, by Rob
  16. Laptop Repair, Customer Beware  - Obtaining personal information via the ASUS Repair Status Inquiry website, by bTrack3r2003
  17. Hacker Perspective  - by Tiffany Strauchs Rad  (Twitter)  (Page 2)
  18. More Active Gamers Should Become Activist Hackers  - Why there should be more video games with a political overtone, by Snugglepuff
  19. Simplex Locks: Illusion of Security, Version 2.0  - Massive security hole in Simplex locks in which a magnet can be used to open them, by Beyond
  20. Hacking is in the Blood  - Two brothers challenge each other to a lock opening contest and the hacker instinct kicks in, by Ninja_of_Comp
  21. Support for Cable Providers?  Why?  - Discussion on why content providers are not really out to limit what people see, by Seeker7
  22. Pre-Texting-R-Us  - "Pre-social engineering" tricks which can be used to steer the information you wish to gain, by lg0p89
  23. Letters  - General Assembly
    • Opportunity  - Galina Miklosic
    • Still More on Meetings  - ckrupp (Charleston, SC), Owen (Scotland), Marcel (Bangkok, Thailand), adam (United Kingdom), H1ghBr1d, Kenpo (Kentucky), Greg
    • Postscripts  - Louis (Canda), D1vr0c, DM, Lucas, Mystrix, D, Alan, Polaris75, Derf~!, Octo314, CASE
    • Wondering  - Josh, MS, Phil, Chris, DMUX, Brad, I, Alex K
    • Stories  - dr finesse, William Henry, Varbede
    • Requests  - Ray M., Andrew, R. Toby Richards, Lost in Cyberia
    • Disclosure  - Rev. Bermuda Jim O'Bedlam
    • Struggles  - "Phred", Particle Bored, Vinay, Tim, David, Byron Sonne (Brampton, Ontario)
    • More Observations  - D.S., Ld00d, Ray M., Kyle, Ray M., drlecter, Ashes, Ray M., Mangakid, Michael O'Cuir, E.T.A.G.E, Cyber Pinata, Josephus, CWTL
    • DRM Issues  - Leo, Rob

  24. Pirating the Caribbean  - Setting up an AutoRun CD to look like a legitimate video which actually collects information on the target host and FTPs it back to you, by Rob
  25. Perfect Encryption - Old Style!  - How to setup a "one-time pad" style of encryption using nothing but pen and paper, by Cliff
  26. The Piracy Situation  - Why the hacker community should be against piracy as it just brings about more laws and trouble, by R. Toby Richards
  27. Transmissions  - Cellular phone tracking via CarrierIQ and the problems it can cause, by Dragorn
  28. Anonymity and the Internet in Canada  - Internet privacy laws in Canada, by Pat D.
  29. Elegant Password Generation with Oplop  - Generating strong passwords with the Oplop password management system, by Joshua Dick
  30. Hacking the Winn-Dixie Survey  - Decoding the data at the bottom of a Winn-Dixie receipt, by Tim K
  31. Switch  - Story of underground urban exploration, by Austin Lott
  32. Hacker Happenings
  33. 2600 Marketplace
  34. 2600 Meetings

  $2600 Magazine - Volume 29, Number 1 (Spring 2012)

  1. Game Changing  - Editorial
  2. A PHP Rootkit Case Study  - Detailed technical analysis of a PHP rootkit installed on a university server, by StarckTruth
  3. Denial of Service 2.0  - Overview of the some of the newer Denial-of-Service techniques people are using and ways to prevent these attacks, by tcstool
  4. Spoofing MAC Addresses on Windows  - How to change the hardware MAC address of a network device using REGEDIT under Windows, by Wananapaoa Uncle
  5. GroupMe: A Modern Approach to Social Engineering  - Use Google voice to create a fake GroupMe account to spy on a target's GroupMe account, by Jacob
  6. Telecom Informer  - History of airplane phones and other in-flight services, by The Prophet
  7. Curiosity Killed the Cat  - Story of a person who almost go in trouble by checking his university's computers for XSS security holes, by Gregory Porter  (Email)
  8. Stupid 9-Volt Tricks  - Disassemble certain brands (Duracell or Energizer) of 9-volt batteries for a source of "AAAA"-size batteries, plus a good overview of battery capacity, by XlogicX
  9. So... I Bought a Chromebook  - First look at the Acer Chromebook running Google's ChromeOS, by MS3FGX
  10. Hacking Giveaway of the Day (GOTD)  - How to use Regfromapp and URL Snooper to bypass the software installation restrictions used by giveawayoftheday.com, by Lone.Geek
  11. How to Avoid the Online Dating Scam  - Story of a person who saved $50 by discovering a way to view profiles for free on online dating websites, by gosein
  12. RTF... TOS  - Tips on why you should carefully read a company/website's Terms of Service to protect your rights, by Douglas Spink  (Douglas Bryan LeConte-Spink, Twitter, Old Website)
  13. Domain and Security  - Why you should protect the domain transfer security of a website (and why many people don't), by Donald Carter
  14. Hacker Perspective  - by ternarybit  (Page 2)
  15. Towards a Hacker Friendly Mobile World  - Overview of wireless modules from Enfora and Simcom and the possibility of making your own phone, by Casandro
  16. LinuxLive... Save Me  - Recovering from a hardware crash or performing a quick pentest using the LinuxLive USB thumbdrive distribution, by D4vedw1n
  17. The Major Flaw of Pentesting  - Real-world example of a how a professional pentest team didn't perform some basic techniques and why educating people is the only real security solution, by Seeker7
  18. Free Music: The Quest for the MP3  - How to save streaming audio files directly to your computer using Audacity, by DMUX
  19. Letters  - Cables
    • Information  - Estragon, Master Chen, Chris, Pete, micha, California Paralegal
    • Challenges  - MS3FGX, ~D, Lifetime Subscriber
    • Meeting Stuff  - Scott, Mia, Alex (Canada), Antonio, Christian (Clearwater, FL), Peoria 2600, Nicolas, Alexander (San Francisco), Joe
    • Revelations  - X, Rob T. Firefly, Tyler
    • Inquires  - LTJ, Question, Ramasee, Brab, Ben, Chris, Keith, mastahyeti, mastahyeti, Sean, Danny, pleasantdinnermusic, Steve
    • Random Thoughts  - Kabuki, enterthefuture99, Freak1993, Lost in Cybera, Sybille, Jeff, Little Brother, putrid, Conor
    • The Crime of Knowledge  - stephen, Stephanie
    • Aggressive Prosecution  - Benjamin Fix Nichols, Kevin Patterson, Ghost Exodus (Jesse McGraw)
    • QR Fun  - JWS, Justin G.

  20. An EMP Flash - It All Stops  - The real possibility that an EMP attack could destroy anything electronic-based, by Paul Abramson
  21. Learning from Stratfor: Extracting a Salt from an MD5 Hash  - Overview of the process of analyzing the leaked Stratfor emails to determine the salt password used during the MD5 hash routine, by Acrobatic
  22. Transmissions  - General overview of the idea "licensed" software coders produce more secure and stable products, by Dragorn
  23. Control4 and Home Automation  - Potential security flaws in the Control4 home automation software which can be remotely exploited, by Awake31337
  24. Backdooring with Metasploit  - Example of using Metasploit to install a backdoor program into a .EXE program, by Oddacon T. Ripper
  25. My Grandpa's Books Never More!  - How to save money by scanning and sharing your college textbooks, by Windpunk
  26. Insurgent Technology: In WikiLeaks' Wake  - The bizarre, pseudo-intellectual ramblings from a person who doesn't realize that WikiLeaks is often used and abused by same globalists he claims to be "fighting," by Piyter Hurd
  27. The Pros and Cons of Courses  - Story of a person who attended various computer security courses and whether they are worth the money or not, by Seeker7
  28. Hacker Happenings
  29. 2600 Marketplace
  30. 2600 Meetings

  $2600 Magazine - Volume 29, Number 2 (Summer 2012)

  1. Scales of Inequality  - Editorial
  2. Bluetooth Hunter's Guide  - Straightforward guide that introduces the user to a number of Bluetooth scanning tools and methods, including Bluelog, by MS3FGX
  3. Security by Obscurity = Insecurity  - Security flaws in today's locks and how hackers are often better at finding security holes than high-paid "security experts," by DocSlow
  4. Building a Cat-5 Cable Tap  - Passive breakout cable for monitoring a Cat-5 Ethernet network, by Ashes  (This design may have impedance issues, add series 1k resistors if it effects the network)
  5. NGFW - Not Grandpa's Firewall  - Overview of the different types of network firewalls over the years and "next generation firewalls," by Daniel Ayoub  (Email)
  6. Telecom Informer  - Overview of the Iridium satellite phone system, by The Prophet
  7. A Counterpoint to "The Piracy Situation"  - Rebuttal to R. Toby Richards' "The Piracy Situation" in Vol. 28, No. 4, by D351
  8. The Piracy Situation: The Devil's Advocate  - Another rebuttal to R. Toby Richards' "The Piracy Situation," by Chip Ninja
  9. Why is Piracy Still Allowed?  - How piracy happens all the time in everyday life and there is no real attempt to stop it, by jk31214
  10. The New Age of the Mind  - Overview of upcoming biotech medical implants and dry-electrode EEG, by Merl
  11. Building the Better Brute-Force Algorithm  - Tips and character combinations for heuristic brute-forcing modern passwords to reduce the wait, by James Penguin
  12. Hacker Perspective  - Teague Newman  (Page 2)
  13. Firewall Your iPhone  - Blocking traffic sent secretly to Apple (and other sites) via your iPhone, by Лоика
  14. Memoir of a Tech Writer: The Art of Leverage  - Tips and techniques for technical writers to gain more exposure, by ellG147
  15. Letters  - Kindling
    • Missing Issues  - James, Enygma, Brainwaste (New York), BookeeNookeeLookee
    • Questions  - C. (Albuquerque, New Mexico), Bluz (Miami, FL), Dave, Phillip (Florida), Ulysse Carion, Legacy, Roel
    • Defeating the System  - Greg,
    • On Piracy  - Blue Ghost
    • Advice  - R. Toby Richards, Casandro, Mu
    • Social Engineering  - blanuxas
    • A Little Feedback  - John Lundin, M, Melissa, Feroz Salam, Scone, Valkuma Valkuma, Lifetime Subscriber
    • More Kindle Fun  - Immune, Erik Marshall
    • Article Issues  - Phil, Brian, Name Withheld, Michael, PTKitty
    • Opportunity  - Steven, RL, Accept Steven Leath's Invitation
    • Observations  - Mike (Cape Coral, FL), Brother Mouzone, Patrick, John Schmitt, Eric Botticelli, Mr. Glass, Ron, Lynn, Myq Morer, B
    • Prison Update  - Ghost Exodus (Jesse McGraw)

  16. Say It Ain't So Verizon  - Reset the password on Verizon FiOS routers without authorization and without physical access, by Pipefish  (Email)
  17. Hacking Climate Change With WeatherLink  - How to extract weather information from the WeatherLink cloud service, by Cap'n Zilog (Dallas Hodgson)
  18. Baofeng UV-3R: The Cheapest Dual-Band Ham Radio HT  - Review of the Baofeng UV-3R dual-band (2m & 70 cm) amateur radio transceiver and how to perform out-of-band modifications, by l0cke
  19. Transmissions  - Bugs in Google's updates to Android phones, by Dragorn
  20. Metaphasic Denial of Service Attacks  - Performing an advanced denial-of-service attack by using multiple attack vectors, techniques, and exploits, by Everett Vinzatt
  21. Never Be ON TIME Again!  - Simple wire jumper method to bypass the ON TIME vehicle ignition interrupt system, by OMK
  22. Fiction: "Hacking the Naked Princess" - Chapters 1 & 2  - First in a series of chapters from the newest "Dev Manny, Information Technology Private Investigator" story from the book Superliminal, by Andy Kaiser  (Grand Rapids, Michigan)
  23. Hacker Happenings
  24. 2600 Marketplace
  25. 2600 Meetings

  $2600 Magazine - Volume 29, Number 3 (Fall 2012)

  1. The Eyes Have It  - Editorial
  2. Technology at the Federal Bureau of Prisons  - Overview of the TRULINCS system used by the BOP and some info on the Set Tel phone systems used, by [Name Withheld]
  3. Using Bluetooth Devices as an Additional Security Measure in Linux  - Use Blue Proximity to lockdown you computer when a BlueTooth link is broken, by Aaron Grothe (Omaha, Nebraska)
  4. Hackers Indispensable for Volunteer Groups  - How hacker groups can help out and maintain the computer networks used by volunteer groups, by markb
  5. Telecom Informer  - What it took to get OpenBTS running at DEFCON and HOPE, by The Prophet
  6. The Quadcopter Crash Course  - Overview of the hardware requirements it takes to get your own quadcopter up and running, by UAVman (aka DeathNinja McSex)
  7. Spear Phishing at a Bank - A Hard Lesson Learned  - Story of how a targeted email looking like an anti-virus update tricked several bank employees, by lg0p89
  8. Restoring Honest Elections  - Potential techniques to avoid election fraud - which doesn't list showing a valid picture ID, by Phredd
  9. Hackers in Space  - The idea of using a homebrew array Low-Earth Orbit (LEO) satellites to bypass any Internet censorship, by MS3FGX
  10. Hacking Apple's System  - Story of a person who spilled coffee on his keyboard and was able to get it replaced under warranty by claiming it as "broken," by Big Bird
  11. Fundamental Flaws in Online and Phone Ordering  - Behind-the-scenes story of a person who works at a company which takes in phone and online orders and their lack of any real security, by C P
  12. Hacker Perspective  - by Dimitri  (Page 2)
  13. Beware the Cyber Weapons Industrial Complex  - How the computer security industry closely mirrors the "military industrial complex" and the increase in attack software, by Josephus Alexander
  14. XML Automated Gambling  - Examining and modifying XML scripts to manipulate your online casino odds, by Andy Phillips
  15. Letters  - Fundamental Interaction
    • Guidance  - Alex, TheAlpacalypse, xnite, D
    • Assorted Info  - Rudolph, Alynn, James, 616 Boomer, Charles
    • More on Meetings  - Low-res, Ellie, Sean, dave (aka alphabot), Malcom
    • Feedback  - E85, Mickeyshaft, Phil, R. Toby Richards, D1vr0c, grey Otaku, rob, pipefish, Anthony, Fernando, edilla, prattel, Kn@cker7, Neil (SM), Casandro, Justian17, Rod,
    • Words of Note  - Wintermute, Jen Fone, Kathryn, M
    • Just Asking  - Matt, Eric, john, A. Wolf, dr. ciphertext, Alana, BB, Michael, John, Sean, Kyle, Wirechief, Az, A Abdi,
    • Payphones  - Charles, Recently Relegated to the Cowboy State
    • Randomness  - Chief Totus and his little brother, Owens deBrasso, zenlunatic (Maryland), Jon M., E.T.A.G.E., Kamonra, blanuxas, matt

  16. Stuxnet: An Analysis  - Detailed analysis of the "Stuxnet" virus used to attack Iran's Windows-based PLCs, by Doug Sibley
  17. How to Leech from Spotify  - Using the Replay Music software to record and save free music from Spotify, by Pasikrata
  18. Transmissions  - What it took and the hardware used to build the network at HOPE Number 9, by Dragorn
  19. Radio Redux  - New techniques and hardware which is available to the radio hacker and a general overview of today's radio systems, by Mr. Icom (Ticom)
  20. Physical Security Threat from Hotel Wi-Fi  - Accessing free hotel Wi-Fi opens up the potential for your hotel room and key to obtained by others, by R. Stevens and A. Blum
  21. A Nice, Hot, Socially Engineered Meal  - Story of a person who ordered a pizza via GrubHub and didn't have to pay when he selected "cash," by Gregory Porter  (Email)
  22. Hacker Happenings
  23. 2600 Marketplace
  24. 2600 Meetings

  $2600 Magazine - Volume 29, Number 4 (Winter 2012-2013)

  1. Storm Clouds  - Editorial
  2. Basic Code Breaking  - by Joseph B. Zekany
  3. An Overview of the Security Benefits Offered by Desktop Virtualization  - by David Morgan
  4. Hardware Hacking - An Introduction Via Dev' Boards  - by sarlacii (Julian Houghton, Twitter)
  5. Hacking Walgreens Photo Processing Machines  - Use a "USB Switchblade" on a re-booted photo kiosk to gain potential remote access capabilities, by Tahu363
  6. Telecom Informer  - Overview of cellular phone femtocells, microcells, repeaters, and bidirectional amplifiers, by The Prophet
  7. C is for Camouflage  - Trick to switch between a camouflaged Windows Command Prompt screen and Windows Notepad to fool any teachers/watchers, by Malandraj3m
  8. A Method to Spider Sites Like Indeed.com with Teleport Pro  - by "ain'tDigitalDATTruth"
  9. Steganography Over Covert Channels: Implementation and Government Response  - by Hal Wigoda
  10. New Ways of Ranking Documents  - Idea to rank a document based on the amount of information you learn instead of its popularity, by Casandro
  11. Hacking Dirt  - Use a little ingenuity and Mother Nature to easily fix a blocked storm drain, by OWA
  12. Hacker Perspective  - by Lone.Geek (Page 2)
  13. The Security Funnel: When OpenVPN Meets Tor  - by Wananapaoa Uncle
  14. Tactical Teensy Rapid Recon  - by chap0 (Email, Twitter)
  15. Letters  - Intercepts
    • Propositions  - Lauren, Dave, Ryan
    • Inequity  - tony, Captain V. Cautious, linhat, ghostguard
    • Reader Thoughts  - ziroha, ziroha, Jeff, John Schmitt, Brad, Baby E, CptnKase, Bill, PT Kitty, Barrett D. Brown, Philip, byeman, ternarybit, Brainwaste
    • Listener Thoughts  - The Other John Draper (the one in Cardiff)
    • New Meeting  - Zach
    • In Need of Advice  - Anonymous, CoolHappyGuy, Penmeup, Andrew, Monica
    • Advice to Share  - No Name, R. Toby Richards
    • New Stuff  - Lost in Cyberia, Chris, l0tek, Brad
    • Miscellaneous  - Theo, Jessica, JonnyBear, PB, John, c, E.T.A.G.E., e, Steve

  16. An Alternate Method for Creating a SSH Tunnel with PuTTY and Squid  - by Synystr
  17. How to Survive a DNS Attack  - by SPitBalls
  18. The Breach That Wasn't  - How the mainstream media overreacted (and lied) about a security breach at City College of San Francisco, by Sam Bowne
  19. Transmissions  - Tragedy of SSL, by Dragorn
  20. WordPress Exploit Immunization  - by Seeker7
  21. Fiction: "Hacking the Naked Princess" - Chapters 3-5  - Chapters from the newest "Dev Manny, Information Technology Private Investigator" story from the book Superliminal, by Andy Kaiser
  22. Hacker Happenings
  23. 2600 Marketplace
  24. 2600 Meetings

  $2600 Magazine - Volume 30, Number 1 (Spring 2013)

  1. A Lost Promise  - Editorial
  2. Guest Networks: Protection Less Than WEP?  - Obtain Linksys "guest" Wi-Fi network passwords by stepping through all the defaults provided in their setup software files, by Kevin Morris
  3. Practical Cryptanalysis: Reversing Cisco Type 7 Password Hashes  - Potential security holes in the Cisco Type 7 password hash which opens Cisco routers to remote plaintext attacks, by mcandre  (Andrew Pennebaker, Fairfax, Virginia, Milwaukee, Wisconsin, GitHub)
  4. Twitter for Fun and Profit  - Create a Twitter botnet without the need to infect a host computer and the potential to profit from these "fake" tweets, by xnite  (Robert Whitney, Bloomington, Illinois, DOB: 05-12-1990, Twitter, GitLab, GitHub, Blog, Facebook)
  5. Warning for Ye Olde Bank: Don't Do This!  - Story of an almost successful fraudulent bank transfer which started via a fake fax message, by lg0p89
  6. Telecom Informer  - Story of using cellular and wireless Internet on a trip from South America to Antarctica and back to Holland, by The Prophet
  7. Social Engineering: Tactics for Prevention  - Overview of the techniques and tips used by social engineers and how you can prevent it from happening to you, by Ryan Daley
  8. Extra-Legal Harassment  - Real-world examples of governments harassing or spying on people and what you can do to protect yourself or fight back, by D.B. LeConte-Spink  (Douglas Spink, Fausty)
  9. Hacker Perspective  - by Mike Keller  (GoodHart)
  10. Book Review: Exploding the Phone  - Book review of Phil Lapsley's Exploding the Phone, by Rob T. Firefly  (Rob Vincent, New York, New York, Twitter, YouTube)
  11. Fiddler - Never Trust the Client  - Exploiting client-side security vulnerabilities in web form validation with the Fiddler web debugging proxy, by Andy Phillips
  12. U.S. Department of State Loves Mexico  - U.S. State Department bid for a potential surveillance site in Mexico, or more money for (((Verint))) from U.S taxpayers, by ^SUBv
  13. Hypercapitalism and Its Discontents  - Hacking and software piracy in the "new age" and why we should fight modern day (((oligarchs))), by W.D. Woods
  14. Fun With Base Math: A Primer on Base Numbering Systems  - Overview of mathematical operations which are not based on the standard base-10 system, by Fantacmet
  15. Letters  - SYMPTOMS
    • Propositions  - Javier (Spain), Geoffrey, Mu Dee
    • Commentary  - Wolverine Bates, angelsbrothelsgrandmalives, Anonymous
    • Information  - str8ball, Lithium187 (Bethlehem, PA), Elger "stitch" Jonker (Netherlands), Ultimate Peter
    • Observations  - David, Bishop 341-B, John Bajak, John R. Sullivan, Staticblac (Chris Berge)
    • Questions  - Charles, Tony (New Jersey), Anagbogu, Future Cyborg, Jack, Jake, Another Innocent Man in Prison, JT Simpson
    • Fun With Meetings  - Paul (Gwinnett County, GA), Philip (Johannesburg, South Africa), zkyp (Belgium), Tazmatt (Montreal, Canada), Ross (Melbourne, FL), Ross, Richard Cheshire, Derrick, Haskell
    • Reader Feedback  - D1vr0c, pipefish, Igner, Edson+, zenlunatic (Maryland), Jeff, Anymouse, Zek, Barrett D. Brown
    • Digital Issues   - Caleb Coffie, Karsten Anderson, Adam, n0tec, Andy, Alex W

  16. Cracking Push-Button Locks  - Overview of the Borg 3000-Series push-button lock and a bug which reduces them to only 120 possible combinations, by riemann  (U.K.)
  17. Brute-Force Access  - Brute-force the 4-digit admin password on a TRIPLEX DVR468RW CCTV DVR, by lanrat  (Ian D. Foster, San Diego, California, Twitter, GitHub)
  18. The Usage of the Assumption Technique in Social Engineering  - Example story of using "reverse" social engineering and the power of assumption to get what you want from a customer service rep, by TJ
  19. Transmissions  - The value of using open communities (Sourceforge, GitHub, Stack Exchange, IRC, forums, etc.) to expand the capabilities of today's hackers, by Dragorn
  20. Dev'ing an OS  - A basic understanding of what it takes to develop your own (small) x86 operating system complete with a bootloader, by Shikhim Sethi  (India, Email, GitHub, Twitter)
  21. Learning, Hacking, and the Raspberry Pi  - Overview of the Raspberry Pi GNU/Linux development board including some quick "overclocking" hacks, by Shea Silverman  (Orlando, Florida, Email, Twitter, Facebook)
  22. Hacker Happenings
  23. 2600 Marketplace
  24. 2600 Meetings

  $2600 Magazine - Volume 30, Number 2 (Summer 2013)

  1. The Road to Safety  - Editorial
  2. Splunking the Google Dork  - Overview of some automated scripts to improve Google searches for potential site security vulnerabilities, by G Dorking
  3. Fun With the Minuteman III Weapon System  - Quick overview of the LGM30G Intercontinental Ballistic Missle launch control system and a simple way to set off site security by throwing snowballs, by Bad Bobby's Basement Bandits
  4. My First Blackhat  - LOL story of having to serve a subpoena for a small claims court to a person he didn't know the physical address for, but was able to exploit some XSS holes in a website used by the "victim," by Pierre LC
  5. How to Create and Operate a Temporary Free Autonomous Zone  - A framework of protocols and techniques to organize a large, diverse group of individuals voluntarily gathered together for a shard purpose, and in a public space, by lifeguard
  6. Telecom Informer  - Overview of a cellular phone system in Holland and Thailand, and some info on CDMA450, by The Prophet
  7. A Broad Spectrum of DRM  - Story of discovering and altering the Windows Registry to bypass the DRM in Alawar Games, by Cybermouse
  8. Getting Free Media - All Without Torrents!  - Tips and tricks for using Google searches to find music (MP3s), or other files, freely available on open websites, by B4tm@n
  9. Tech Gets Better, Humans Do Not: A Beginner's Guide to Social Engineering  - General overview of the social engineering, phishing, shoulder-surfing, etc. attacks a person working in IT should know and be prepared for, by jk31214
  10. Why Your Grandparents Don't Like the Internet  - Story of the author's experience with older people not being comfortable with new technology or the Internet, and how hackers can help overcome that, by xnite
  11. What Made Unix Great and Why the Desktop is in Such Bad Shape  - Why modern operating systems and GUIs actually slow down system development with all their blot, and text-based systems rule, by Casandro
  12. Hacker Perspective  - by Hristo I. Gueorguiev
  13. 0-Day Adventures  - Story of an administrator who came across a 0-day Internet Explorer vulnerability (CVE-2012-4792) in the wild and his attempt to track down the origins, by Sh0kwave
  14. How a Prehistoric Hacker Got Started  - Journey of a hacker who started in the 1960s and has never looked back since, by DarkAudax
  15. The Weather Outside is Frightful  - Story about always being alert for ATM skimmers and other ATM security tips, by lg0p89
  16. Bulls-Eye on the Banks - Again  - Information about a Trojan/DDoS attempt focused on around 30 national banks, by lg0p89
  17. Exploiting the Postal Service Address System for Personal Gain  - Utilize slight address misspellings to bypass those "one free item per household" deals, by Tj Loposser
  18. A World Without Security  - If we lived in an ideal world, we wouldn't need computer security, but we don't, so we're stuck with these annoyances, by Donald Blake
  19. Letters  - autonomous consciousness
    • Reading and Writing  - B Nichols, pete, Jim, Provirus
    • Pitching In  - Nitin, Louie Ludwig, AP, Eric, gabe, Tim, Conan
    • Help Wanted  - S W, Reggie, Anonymous
    • Inquiring Minds  - muh2 muh2, nov112011, Toad, Gabriel, dave, Gabriel (Belo Horizonte, Brazil), Phil, Gabriel, Seth, Cortland, 616boomer, Grant, SS
    • Service Declined  - [none given], sendspace.com
    • Call to Action  - v, Anonymous, Brainwaste
    • More Meeting Mania  - Liam (Ewloe, Wales), farangbaa, Janelle, Jax (Helsinki, Finland), Ian
    • Responding  - Myq Morer, UserNotFound404, Jojlot, GoodHart, jlbesq, Micah Lee, Michael, D351, Tech Deprived Incarcerate, Robert
    • The Game of Justice  - Anonymous, Mike, Ghost Exodus (Jesse McGraw)
    • Memories  - Les Hogan, Trevor Pontz (a.k.a., acid phix)
    • Copy Protection, Trademarks, et al  - Broken Syntax, Christopher
    • Advice  - BudLightly, Geri Q

  20. Book Review: Pirate Cinema  - Book review of Cory Doctorow's Pirate Cinema, by elib7ronic
  21. Cyber Attacks on Equities Markets: The Real Threat of High Frequency Trading  - by Eightkay
  22. Static Code Analysis Using Watchtower  - Simple tool to locate potentially hazardous code (security audits) within a project, by Chris Lane  (Gainesville, Florida, Email, Twitter)
  23. Transmissions  - Polymath or dilettante, by Dragorn
  24. Tracking Users on Trustworthy Sources  - Even trustworthy websites can be exploited to obtain information (IP address, etc.) on its visitors via an embedded image, by xnite
  25. Perfect Encryption - Old Style!  - Overview of one-time pad encryption you can do by hand, with several examples are given, by Cliff
  26. Fiction: "Hacking the Naked Princess" - Chapter 6  - Chapter from the newest "Dev Manny, Information Technology Private Investigator" story from the book Superliminal, by Andy Kaiser
  27. Hacker Happenings
  28. 2600 Marketplace
  29. 2600 Meetings

  $2600 Magazine - Volume 30, Number 3 (Fall 2013)

  1. The Right to Know  - Editorial
  2. An Introduction to Bitcoin  - General overview of Bitcoin and how to use it for your transactions, by Frank Buss (Germany)
  3. Bitcoin: The Hacker Currency?  - Why hackers should look into using and supporting Bitcoin and it's potential to avoid federal interference, by Variable Rush
  4. Inquiring Minds = Hacker = Design Engineer  - Story of a person who prefers hardware hacking over software and why software hackers should give it a try, by sarlacii
  5. Hacking the Apple Collective  - Behind the scenes overview of how Apple run its store and the "Genius Bar", and how he became burned-out after awhile when Apple's charade was exposed, by Ronin
  6. Internet Trolls  - What is a troll and trolling?, by Sam Bowne
  7. Telecom Informer  - Overview of PBXs and the shift away from them, by The Prophet
  8. Controlling the Information Your Android Apps Send Home  - The potential dangers and security breaches (app permission changes, etc.) of having auto-updates on an Android phone, by Aaron Grothe
  9. U-verse Networking  - Overview of AT&T's U-verse (VDSL) by a tech support person, including bridge mode work-arounds, and dumb questions ask by customers, by Uriah Christensen
  10. Scamming the Scammer: A Fun Way to Respond to a 419 Scam  - Story of a person trying to "reverse scam" a Nigerian 419 scammer and tips to avoid being scammed yourself, by The Piano Guy (Gary Rimar)
  11. The Art of War and What IT Professionals Can Learn from It  - Relating Sun Tzu's Art of War to working in a modern IT environment, by Rick Conlee (Waterveliet, New York)
  12. Access Tandem Codes and the Hidden Phone Network  - Overview of access tandem codes to connect to different long-distance networks, and how to different remote test numbers and interesting recordings, by Brandon
  13. Hacker Perspective  - by Antonio Ortega, Jr.  (Page 2)
  14. Palo Alto NGFW Insider  - Technical details (Linux kernel, commands, and filesystems) of a Palo Alto Next Generation Firewall, by ]{nightVision
  15. Identity Management and Its Role in Security Strategy of Enterprise Environments  - Overview of Identity and Access Management (IDM or IDAM) in large enterprise environments and delegation responsibilities for security strategies, by Patric Schmitz
  16. Letters  - lore
    • Random Bits  - Jim L, Garry Wynne, lord.underdog, Scott, bob, Pete, Nate Brown, Neural Nut
    • Contributions  - James Kracht (MP3 #1, MP3 #2), Rasmus & Hanna, Tom (DSC_1196.jpg), Jesse, Jesse, D. Spink, follow_the_lea
    • Special Requests  - WS, Omi, zenlunatic (Maryland), Prince Nicholas Bailey (Denver, CO)
    • Continuations  - Barrett D. Brown, D1vr0c
    • Critiques  - Grace, John, iacode
    • Info Needed  - Jack, nick, james, Stephen, Chaoticpoison, Andrew, Joe, adam
    • Meeting News  - Curious in Philly, Jorge (Costa Mesa, CA), Jerrold, Richard Cheshire, Brandon (Hawley Wallenpaupack), Steve
    • Feedback  - Radagast, Kilby, Sean Murphy, t. heride, Jax, Blank Electron, Charles Parker II, RJC, pixter
    • On Privacy  - flax0r

  17. Defeating Forensic Attacks on Full Disk Encryption  - Tips for defeating modern forensic attacks (cold-boot, remanence attack, DMA attack, hibernation file attack, etc.) against full-disk encryption systems, by Mojo
  18. Bank Notes  - Story of a person working at a bank and receiving a potentially hostile email file (.EXE) attachment and his attempt to track down who was behind it, by lg0p89
  19. Transmissions  - Being hard to use is not a valid excuse for not using encryption, by Dragorn
  20. Relax, We Bought Security  - Story of a freelance security consultant and crazy things he's see during the time working and people who think they know more than they do, by Wananapaoa Uncle
  21. Clouds, Clouds, Clouds  - Why the cloud storage or applications are still a bad idea for small- to medium- businesses, by lg0p89
  22. Lights, Camera, Hack  - Hacking portrayed, or used in the making of, movies you may not have known about, by Gregory Porter  (Email)
  23. Fiction: "The Error"  - by Zellie Y. Thomas
  24. A Response to "Perfect Encryption - Old Style!"  - Phil
  25. Hacker Happenings
  26. 2600 Marketplace
  27. 2600 Meetings

  $2600 Magazine - Volume 30, Number 4 (Winter 2013-2014)

  1. Dissent or Descent  - Editorial
  2. ID3 Tag Messages  - Using and abusing the informal ID3 tag specification to hide "secret messages" in MP3 audio files, by Donald Blake
  3. Privacy - A New Hope Through Tails  - Overview of using the Tails secure Linux operating systems for increased privacy and security on the Internet, by Brainwaste
  4. Fun With the Minuteman III Weapon System - Part 2  - Intercepting basic nuclear missile communications, by Bad Bobby's Basement Bandits
  5. Telecom Informer  - Reminiscing about the days when there were many small, privately-owned telephone companies, by The Prophet
  6. The Many Vulnerabilities of Verity Parental Control  - Overview of the Verity Parental Control software and some tips to bypass it by using registry hacks, online proxies, and virtual machines, by Tyler Behling
  7. Anonymity and You, Firefox 17 Edition  - Discussing the Firefox vulnerability which effected Tory users' privacy and tips to maintain your online privacy, by l0cke
  8. Wi-Fi Security: Attack and Defense  - Examines the current state of Wi-Fi security with a practical emphasis on attack and defense methodology, by ternarybit
  9. The Maturation Cycle of a Hacker  - Story of the life-cycle of a hacker, by lg0p89
  10. There is Never a Free Lunch  - Why we should be weary of remote access computer support, as it may be a scam, by lg0p89
  11. Hacker Perspective  - by Synystr
  12. CYA Using a Pi to Pivot  - Setup a Raspberry Pi to mask your wireless Internet activity, by 0rbytal
  13. Pretty Good Privacy  - Overview of OpenPGP and using and install GnuPG to send and receive encrypted email, by Klaatu
  14. Hacking Your Mother Tongue to Obfuscate Your Encryption  - Using (or creating) a new language to further obscure your encrypted messages, by Israel
  15. Letters  - Communicatory Types
    • Queries  - Chris, bughardy, Damien, Michael, Anonymous, Nam, Auggy, Damien, Ruth, Derneval, Damien, herp derp, Danielle, Damien, Daniel, Yahia
    • Additional Info  - jim, Larry, Rachiee, Capt. Jay, rixter, K5TA, Brandon
    • Critical Observations  - phreakin5ess, Bobby Joe, XeNO, M. Piazza, apocalypic
    • Statements  - nealcamp, Dan, Justin, [please withhold my name], F.
    • On Meetings  - Lex, Pic0o (New York), B (Minnesota), Sebastian (South Carolina), Ill Protocol, TheCyberInstructor (Biloxi, MS), Mike (Philadelphia), Dr. MG Cyb3rSM3 (Israel)
    • Free Advice  - The /\postolic H/\cker, anon, (Australia), dILLHole
    • Horror Story from Hell  - Morgan
    • Future Plans  - Sam
    • Appreciation  - Gazza, Ian, J. (AC2LS), RAMGarden, Anonymous
    • Digital Divide  - June, Jota
    • HOPE X Tickets  - Lynn, Ether 9ine, Greg

  16. Black and White: The Growing Schism Between Hackers and the Law  - Why it doesn't pay to be a "whitehat," as it can turn around and haunt you, by Scott Arciszewski
  17. Netcam: Basics and Vulnerabilities  - Overview of potential security vulnerabilities and default passwords to several models of IP cameras, by John Thibault
  18. Transmissions  - Location spying, not just for governments anymore, by Dragorn
  19. All I Want is Total Freedom  - Tips to increase your personal privacy in real life and on the Internet, by lifeguard
  20. Fiction: "Hacking the Naked Princess" - Chapters 7-9  - Chapter from the newest "Dev Manny, Information Technology Private Investigator" story from the book Superliminal, by Andy Kaiser
  21. Hacker Happenings
  22. 2600 Marketplace
  23. 2600 Meetings

  $2600 Magazine - Volume 31, Number 1 (Spring 2014)

  1. Thirty Years On  - Editorial
  2. Lessons from "Secret" History - From Cable Vetting to Tempora  - Story of the history of "cable vetting" where intelligence agencies intercept cable messages between countries and its relation to the NSA spying scandals, by Poacher
  3. Google's Two-Factor Authentication: The Sneaky Trust Feature  - Overview of Google's two-factor authentication scheme and a potential exploit by using Google's "trusted computer" selection, by Samuel A. Bancroft
  4. Identity and Encryption Verification  - Overview of different methods of (PGP) fingerprint and public key verification as well as key signing parties, by xnite
  5. Asterisk: The Busy Box  - Script to use Asterisk to create a "Busy Box" so the target can't make or receive any phone calls, by MasterChen
  6. Using Square from Outside the U.S. to Obtain Dollars at a Reasonable Rate  - A scheme to bypass geolocation on Square where a person can pay themselves with a credit card in order to obtain dollars at an intermediate currency exchange for savings, by R. B.
  7. Telecom Informer  - Overview of the telephone companies and infrastructure in South America, by The Prophet
  8. Robbing the Rich Using Bitcoin  - Theoretical attack to obtain a target's Bitcoin wallet by brute-forcing weak passwords, by 0rbytal
  9. The Night the ATM Went Down on Me  - Story of using a ATM which crashed, and appeared to be running Windows XP, by The Piano Guy (Gary Rimar)
  10. Android Reversing Bootcamp  - Overview of reverse engineering Android apps and some of the tools you'll need, by Andy G  (Twitter)
  11. Hacking Commercial Maytag Washers and Dryers  - Overview of reprogramming Maytag washers in service mode to run for free, by KingFlathead
  12. Hacker Perspective  - by Clutching Jester
  13. Accessing Data Structures Located in a Randomized Address Space (ASLR)  - How to eliminate entropy and bring the universe back to the singularity.  Demonstrates by calling fork() to show that clones/forked processes will also share the same (compromised) randtbl in the shared memory space. by Matt Davis (enferex)
    • randhack_small.c
    • randhack  This is a proof of concept program that can access glibc's randtbl used for generating pseudo-random values.

  14. A Little Excitement Never Hurt Anybody!  - Breaking down the errors in a "From the IRS" spam/phishing letter, by lg0p89
  15. Letters  - VAPORS
    • Notations  - Malvineous, Samuel, T
    • Questions  - L, Rob, Saskman (Canada), Drax26, kmk, Glenn, John, Chuck, M Y, Norman, Eric Lee, Juan, Tina, zhangganghong18, Brainwaste, Michael
    • Accusations  - Simon (England), Lifetime Subscriber
    • Litigation  - Nick, Very Anonymous, Tyler, Phedre, ~justanothersubscriber
    • Clarification  - byeman, William, Bandersnatch
    • Donations  - T, Dennis
    • Contributions  - sol, flames
    • Investigations  - Jeremy, pathos.ethos, --handle-need-not-apply--, Bob Hardey's Mom, Malvineous, Chris
    • Observations  - Justin, DeepGeek, William, L0cke, CasperGemine, Boxholder
    • Versification  - Evan Krell, Neo Anderson
    • Convocations  - Johnson, youssef, B (Costa Rica), Matt (Michigan), S, S, Matt
    • Appreciation  - Anonymous, A loyal reader, Captain V. Cautious, Ed (Australia)

  16. Brute-Forcing PIN Code Keypads Using Combinational Mathematics  - The mathematics involved in brute-forcing a 4-digit PIN or keycode and a 10,003 digit number sequence to try, by Alva Ray
    • 4-Digit PIN Sequence  10,003 digits making up the shortest possible sequence containing all PIN codes between 0000 and 9999 exactly once.

  17. Building a Community Forum  - Overview of the tools and processes needed to create a hacking-related forum or online website, by Freaky
  18. Procedural Worlds, Statistical Analysis, Image Processing, and PRNG Exploitation for the Lulz - or Why IMDb Got a Captcha  - Detailed article describing the GNAA/Bantown troll attacks against IMDb to put Gayniggers from Outer Space into IMDb's Top 250, by sam
  19. At Home Malware (and Online Ads) Protection  - Script to grab a current list of malware or advertising hosts which are then blocked locally at the router, by Ashes
  20. Automated Target Acquisition  - Creating a "targeting list" by capturing the IP addresses of users who appear to be searching robots.txt for sekret files and directories, by 0rbytal and blerbl
  21. Fiction: "Lock and Key"  - by Robert B. Schofield
  22. Hacker Happenings
  23. 2600 Marketplace
  24. 2600 Meetings

  $2600 Magazine - Volume 31, Number 2 (Summer 2014)

  1. Watching the Watchers  - Editorial
  2. Sabotage the System: Encryption as Surveillance State Monkey Wrench  - by D. B. LeConte-Spink
  3. Crossover: Where Metal and Hacking Met and Mixed  - Brett Stevens
  4. Telecom Informer  - by The Prophet
  5. Fun With the Minuteman III Weapon System - Part 3  - "AHC Chicken", by Bad Bobby's Basement Bandits
  6. Fun With Data Entropy Attacks  - by Spacedawg
  7. Network Condom  - Python script to make raw network socket connections to a host/port to avoid possible malware/self-ownage, by Sh0kwave
  8. Yippie Ki-Yay: Social Engineering and Film  - by Gregory Porter  (Email)
  9. Hack Your House: Making the Most of Raspberry Pi  - by Michael Post
  10. Corporate Security and Chinese Hacking  - Lessons from the Mandiant report on Chinese espionage, by Jim L
  11. Hacker Perspective  - by Tyler Frisbee
  12. Experiences of a Hobo Security Consultant  - by eyenot
  13. "My Precious..." (Apple)  - by lg0p89
  14. Letters  - PUBLIC ADDRESS
    • Further Questions  - Yuval Nativ, RP, Daniel, Kevin, A curious person
    • Article Feedback  - The Professor, Estragon, Wolf Bronski
    • Random Thoughts  - Bill Miller, Sol, J Thompson
    • Communications  - Dave, Robert, Jerry
    • Information  -Tyler Frisbee, //j, Oliver, Chris
    • Meetings  - Brad, Richard Cheshire, Scott (Minnesota), David (Maryland), zenlunatic (Maryland), Stacy, Mike (Dallas, TX), Will (NameBrand) (Dallas, TX), Budo (London), Seymour (Sebring, FL), [Name Deleted], Jared (Seattle, WA), John (Wilmington, NC)
    • Letters on Letters  - Shocked998, Hunter, darwin
    • The Digests  - J, Varible Rush
    • Critique  - Chris, Sh0kwave
    • Experiences  - David, Screamer Chaotix, Pic0o, ghostguard, Margaret
    • New Stuff  - nico, Julia Wunder, Nick Grey, Charlotte & Jesse

  15. Hacking the SanDisk Connect Wireless Media Drive  - by ook
  16. Toilet Hacking  - by Toliet Fixer 555C
  17. "Good Afternoon. This is Your Fake AV Calling."  - by lg0p89
  18. Future Visions  - by Jason Sherman
  19. Closing the Schism Between Hackers and the Law  - by The Piano Guy
  20. Fiction: "Hacking the Naked Princess" - Chapter 0xA  - Chapter from the newest "Dev Manny, Information Technology Private Investigator" story from the book Superliminal, by Andy Kaiser
  21. Hacker Happenings
  22. 2600 Marketplace
  23. 2600 Meetings

  $2600 Magazine - Volume 31, Number 3 (Fall 2014)

  1. A Tale of Many Hackers  - Editorial
  2. The Demoscene - Code, Graphics, and Music Hacking  - by Darwin
  3. Bugging a Room With an IP Phone  - Using a NEC DT700-series VoIP handset, by Malvineous
  4. Telecom Informer  - by The Prophet
  5. Hack the Track: Put Your Money Where You 0wn Is!  - water + Lasix = #1
  6. Linux Pwned - Just Not By Me  - by Edster @ 2600 Dublin
  7. Writing Buffer Overflows for Non-Programmers  - by Ashes
  8. Remailing with USPS  - by Samuel A. Bancroft
  9. Forensic Bioinformatics Hacks  - by Kevin R. Coombes
  10. Hacker Perspective  - by James Kracht (Phoenix, AZ)
  11. Spam: Where Does It Come From?  - by lg0p89
  12. Checkmate  - Or how I bypassed your security system with a shoe string and hanging file folder the morning after you upgraded it, by DreamsForMortar
  13. Letters  - RX
    • Better Protection  - Bill
    • Electronic Editions  - David, Eden, Wolverine Bates
    • Sensitive Info  - edsimonlocksmith, Mike & Gary, Jeff, n n
    • Ignorance Campaign  - Facebook Member, Ben
    • Reader Response  - 2kSysOp, Malvineous, Charles, StarckTruth, Kyle, Deb M. (Grand Rapids, Michigan), Pic0o, Allan, Rick, Richard, Alan
    • Issues  - Barrett D. Brown, [none given], Alan, David, Tim
    • Gratitude  - Justin, Red Pill
    • Distributor Problem  - Mike, S, Luke, Norman King, Anonymous, Angela, Wolf
    • Inquiries  - RT, Niels, Filip, Emperor Aslan, Sanusi Monday O., Bast, Cromwell, Sam (Switzerland)
    • More on Meetings  - Overall (San Paulo, Brazil)
    • HOPE X  - HOPE X Writer #1, HOPE X Writer #2, HOPE X Writer #3, HOPE X Writer #4, HOPE X Writer #5

  14. Installing Debian on a MacBook Pro Without rEFInd or Virtual Machines  - by The Skog
  15. Film Review: Die Gstettensaga: The Rise of Eschenfriedl - A Call to Class Consciousness for Hackers  - Film review of Johannes Grenzfurthner's 2014 Austrian science fiction and fantasy film Die Gstettensaga: The Rise of Echsenfriedl, by Ishan Raval
  16. Xfinite Absurdity: True Confessions of a Former Comcast Tech Support Agent  - by kliq
  17. EFFecting Digital Freedom  - Patent troll, by Vera Ranieri
  18. Covert War-Driving With WiGLE  - by 0rbytal
  19. Quantum Computers for Code Breaking  - by Dave D'Rave
  20. InfoSec and the Electrical Grid: They Go Together Like Peas and Carrots  - by lg0p89
  21. Hacker Happenings
  22. 2600 Marketplace
  23. 2600 Meetings

  $2600 Magazine - Volume 31, Number 4 (Winter 2014-2015)

  1. Tools for a New Futher  - Editorial
  2. Password Cracking in the Modern Age  - by Yuval tisf Nativ and Tom Zahov
  3. What Do Ordinary People Think a Hacker Is?  - by Kim Crawley  (Toronto, Ontario, Canada, Twitter, LinkedIn)
  4. Security Behavior  - by Donald Blake
  5. Telecom Informer  - by The Prophet
  6. Format De-Shifting  - by Peter C. Gravelle
  7. Simplocker Gonna Get'cha  - by lg0p89
  8. Home Depot Hacks  - by DKN
  9. Leeching Music from YouTube for Fun, Learning, and Profit  - by Synystr
  10. Recon on Disney's Magic Band  - by EndlessFapping
  11. How Portable Can Wi-Fi Get?  - by The Piano Guy (Gary Rimar)
  12. Hacker Perspective  - by Shadow E. Figure
  13. The Surveillance Kings: Who's Really Behind Who's Watching Us  - by DocSlow
  14. Taking Your Work Home After Work  - Idea to copy "banned" data into a normal JPEG image so it will pass through a blocking firewall, by gerbilByte  (Mark C. Stott, U.K., Twitter, GitHub)
  15. The Perils of Lackadaisical Updates  - by lg0p89
  16. Letters  - verdicts
    • Curiosity  - David and Sarah, Undecodable Name, Renee, Mel, Dan, Willie, Liraz, Blake, Thom, Antony, Alexander, Chris, Steve E., Bryan
    • Deals  - Article Writer, Sangamon
    • Fun With Meetings  - Stephen, Stephen, Null (U.K.), Richard Cheshire
    • Some Facts  - Anonymous, A Friend of Freedom in Cottage Grove, The 3rd Bit, DaRkReD
    • Offerings  - S&T, Bruce, Pic0o, Solomon B. Kersey
    • Ideas  - Blake, Evan, Efthimis, A, Tyler
    • Rules of Publishing  - R, Gunnar, Robert
    • Article Comments  - Jim L, Brain the Fist (Canada), David (Email), Alex W, Ghost Exodus
    • More Observations  - Steve, Jeffrey, sueicloud, Dusty, K, John, ibid 11962, Odd Erling N. Eriksen, Swamp, John, D, joshua, Vel Co
    • Controversies  - David T., Jessica, Joethechemist
    • Speech  - Paschal
    • Thanks  - Anonymous
    • Help Needed  - John
    • Injustices  - Preston Vandeburgh, Justin L. Marino

  17. Crypto Systems Which Resist Quantum Computers  - by Dave D'Rave
  18. The 21st Century Hacker Manifesto  - by Prisoner #6
  19. EFFecting Digital Freedom  - by Vera Ranieri
  20. Are You the Consumer, or the Product?  - by The Piano Guy (Gary Rimar)
  21. Generating Phone Numbers  - by Samuel A. Bancroft
  22. Hacking Dudley  - by David Crowe
  23. Fiction: "Hacking the Naked Princess" - Chapters 0xB-0xC  - Chapters from the newest "Dev Manny, Information Technology Private Investigator" story from the book Superliminal, by Andy Kaiser
  24. Hacker Happenings
  25. 2600 Marketplace
  26. 2600 Meetings

  $2600 Magazine - Volume 32, Number 1 (Spring 2015)

  1. Nous Défions Tout  - (We Defy All Odds) Editorial
  2. So, You Want to Be a Darknet Drug Lord...  - by nachash
  3. Out of the Box Survival, Part One: A Guide to PowerShell Basics  - by Kris Occhipinti (Metalx1000)
  4. Telecom Informer  - by The Prophet
  5. Brazil's Electronic Voting Booth  - by Overall (Brazil)
  6. Evolution of a Hack  - by Uriah C.
  7. Bleeper - Downloading Full-Length Preview MP3s from bleep.com  - by Derek Kurth
  8. The Enterprise, the Subverted PKI Trust Relationship, and You  - by Mike
  9. Hacker Perspective  - by metaknight
  10. WYSE Moves  - by Maven
  11. Office Talk or Social Engineering  - by Gregory Porter  (Email)
  12. Archiving ComiXology  - by Ook
  13. Letters  - PONDERINGS
    • Opportunities  - David Wei, Happy Man, Amer, Christopher, Lee, Timothy Castro, J
    • Idealism  - Tom Cruise
    • Responses  - Estragon, Mistman the Magnificent, Neil N., ghostguard, David, Rob, Saskman, Delicious Cake, Russell Nomer
    • Facts and Theories  - Jay Jay, M.
    • More on 2600 Meetings  - Tim, Jim, Lou, Memo, Nolan (New Mexico), Matthew (Texas), Pic0o (Philadelphia, PA), TheGeek (Scotland)
    • Issues  - Richer Dumais, Bill Miller, gerbilByte, Craig
    • Free Expression  - StevieBohY, Joe, Rob, Joethechemist
    • Inquiries  - Joe, Josh (U.K.), Andrew, S, Chris, Ratish, Nick, Jon, Xaus, Josh, Adam, Brian, Milan, Brandon, stupedestrian, Brainwaste
    • Tribute  - Steve Mansfield-Devine

  14. McAfee Family Protection - Epic Fail!  - by Brian Van Stedum
  15. Abusing the Past  - by Buanzo
  16. Hacking the HandLink Gateway  - by secuid0
  17. EFFecting Digital Freedom  - by Parker Higgins
  18. Ohio Prison IT Security from the Inside  - by 5MEODMT6APB
  19. Hacking for Knowledge  - by Jerry
  20. Linux Containers for Event Training  - by Jon Schipp
  21. Are Smart Meters the End-All? or How I Learned to Love the IoT  - by lg0p89
  22. Hacker Happenings
  23. 2600 Marketplace
  24. 2600 Meetings

  $2600 Magazine - Volume 32, Number 2 (Summer 2015)

  1. Old and New Together  - Editorial
  2. I Tapped That... Tapping a Nationwide Telecommunications Network  - by E Squared
  3. Use Your 3D-Capable TV to View 3D Stills of Your Own Making  - by TFE Guy (a.k.a., The Man)
  4. A Phone Story  - by Anonymous
  5. Telecom Informer  - by The Prophet
  6. Chiron and Me: Hacking Astronomy  - by Eve S. Gregory
  7. Nigrum Libro Interceptis  - Overview of function overloading by using LD_PRELOAD.  includes examples to crack the time-lock of PV-Wave and how to steal passphrases from SSH, by xorcist
  8. Hacker Perspective  - by Pic0o
  9. Library Security  - by The Slakker
  10. Decoding a Carrier Pigeon  - by Joseph B. Zekany
  11. Letters  - DIAGNOSTICS
    • General Questions  - Keshuv, Derneval, Josh, Saskman (Canada), Ibid 11962, marie, Jonathan, Doug, Saleem, Pichaya (Thailand), Please15, Robert, Steve, S
    • Injustice  - Jason
    • Curiosity  - WorWin, J, stupedestrian
    • Meetings  - Marcelo, jk31214, Syn Ystr, Michael, Tyrion High Elf
    • Artwork  - Mike
    • Deep Thoughts  - Bill Miller
    • Help  - John, Anonymous
    • Contributions  - BTC, Lewis, Info, RON, Mined Phreak, Wolverine Bates, Wolverine Bates, Alan
    • Deeper Thoughts  - Bill Miller
    • Concerns  - NO-OP, David, Si M, Caz, Solomon B. Kersey
    • Sad Tidings  -AC (Partner)
    • Replies  - David Crowe, Captain Cautious, Ghost Exodus, Tia
    • Still Deeper Thoughts  - Bill Miller
    • Trouble  - Juan

  12. Attitude Adjustment: How to Keep Your Job  - by The Piano Guy (Gary Rimar)
  13. Out of the Box Survival, Part Two: A Guide to PowerShell Basics  - by Kris Occhipinti (Metalx1000)
  14. EFFecting Digital Freedom  - Creepy web tracking tricks, by Cooper J. Quintin
  15. Coding as a Foundational Skill  - by wino_admin
  16. A Plea for Simplicity  - by Casandro
  17. Ransomware: Still Active and Looking for Victims/Volunteers  - by lg0p89
  18. Fiction: "Hacking the Naked Princess" - Chapters 0xD-0xE  - Chapters from the newest "Dev Manny, Information Technology Private Investigator" story from the book Superliminal, by Andy Kaiser
  19. Hacker Happenings
  20. 2600 Marketplace
  21. 2600 Meetings

  $2600 Magazine - Volume 32, Number 3 (Fall 2015)

  1. The Hacker Image  - Editorial
  2. A Primer on Home Automation (and How Easy It Can Be)  - Story of setting up a Harmony Ultimate Home from Logitech for a computer-controlled home automation project, by Ilyke Maasterd
  3. Dangerous Clouds  - The dangers or storing all your data in remote cloud-based systems and how they often collect more data than government systems, by Donald Blake
  4. Unexpected Denial of Service  - Story of an admin who wrong a little program to check multiple systems after a upgrade, but ended up DoSing when they spawned JVM until an HTTP exception occurred, by J. Savidan  (France)
  5. A Convenient Method for Cloud Storage with Preserved Privacy  - Overview of using cloud-based services like Dropbox for storing files, but only if they are properly (client-side) encrypted, by Alva Ray
  6. Telecom Informer  - Discussing prison phone systems and contraband cell phones, by The Prophet
  7. Ashley Madison Military Sites  - Extracted .mil domains from the "Ashley Madison" website hack
  8. The Technology at QPDC  - Overview of the phone, computer, and door control systems at Queen Private Detention Center which is own by The GEO Group, Inc., by mmx3
  9. Open-Source Repository Abuse  - Discussion of some recent actual (and theoretical) attacks as a result of information posted (SSH keys, passwords, etc.) to open-source software repositories like GitHub, by Terrible Doe
  10. My Voice is My Key  - Story of a person hired to test the physical security of a company who gained access to secure area with just an empty cup and chit-chatting with a receptionist and security guard, by gerbilByte  (Twitter)
  11. Hacker Perspective  - by Brainwaste
  12. Fun With Billing Forms and International Debit Cards  - by musachi42
  13. Going Nuclear - A Tale of Revenge  - Story of getting revenge on a person who harassed the author's wife for helping a disable person.  End result: Don't be evil!, by 2dedd54f25ae2730225e6f1b8968fda52f0831ce
  14. Leaked Documents Department  - Internal IRS document still referencing "diskettes" and noting that screen savers can be "illegal software."
  15. Malware Attacks - Leave Those [Banks] Alone  - Overview of some of the malware attacks, like Tinba, targeting banks and personal information of the account holders, by lg0p89
  16. Letters  - CONCEPTIONS
    • Furthermore  - nfd9001, Brian from South Dakota, Pic0o, Buanzo (Argentina), Edson+, Marco, Brainwaste, Nick
    • The Word on Meetings  - Marthalamew, TheGeek (Glasgow), Tom (Alabama), Magacimaga (Turkey), Faqanda (Israel), Flipchan (Gothenburg, Sweden), TheGeek, Dennis (The Netherlands), Ex Tenebris Lux/Semper Technocrazy (Chico, CA), Philip (Pennslyvania), Richard, (Australia), Rebecca (Tacoma, WA), Sean, Rebeeca (Tacoma, WA)
    • The Fight for Justice  - John, token, HJT LED-Professionals (Germany), Jesse McGraw (Ghost Exodus), Dave
    • On Payphones  - Gerald (Cocos/Keeling Islands), Scott
    • Queries  - sm, Bill (Zip: 60553), Daniel L, nychacker, Bhaskar Das, Adam, Piper, Steven, Captain Cautious
    • Kindle Karma  - Josh, Steve T. in Manhattan, Saskman
    • Weird Mail  - A Subscriber, [We Are Not Printing Your Name], Red-Pill Guy
    • New Stuff  - Chris, B, James Raven
    • Advice Needed  - JEDLUP, jennifer
    • Digital Editions  - Bertram, Eric, Ruddy
    • Turning Point  - SideFx, A Paranoid Newbie Hacker Wanting to Find a Place to Belong

  17. Mr. Robot - A Ray of Light in a Very Dark World  - Discussion on USA Network's Mr. Robot and how it actually portrays realistic hacking and the hacker community in a decent light, by Evil Corley
  18. Cruising the Wideband Spectrum  - Combine a RTL-SDR with old analog communication receivers for your SIGINT setup, by Agent T.W. Lee / Interzone Intelligence
  19. EFFecting Digital Freedom  - Let's encrypt: scaling HTTPS and TLS to the whole Internet, by Jacob Hoffman-Andrews
  20. The Dawn of the Crypto Age  - by CANNON C.
  21. Account Hack: Anyone Can Be a Victim  - by lg0p89
  22. Fiction: "The Stars Are Tomorrow"  - by LexIcon
  23. Hacker Happenings
  24. 2600 Marketplace
  25. 2600 Meetings

  $2600 Magazine - Volume 32, Number 4 (Winter 2015-2016)

  1. The New Normal  - Editorial
  2. The Best Way to Share a Treasure Map  - by Mike
  3. USBkill - A Program for the Very Paranoid Computer User  - by Aaron Grothe
  4. Circumventing Chrome and Firefox's Third-Party Cookie Block  - by Armando Pantoja
  5. Telecom Informer  - by The Prophet
  6. Pushing the Limits  - by [No Author Given]
  7. Romeo Tango Oscar  - by Radio Telephone Operator, by 2-6 India
  8. Yull Encryption  - by Ronald Gans
  9. A Brief Cryptanalysis of Yull  - by Erebos (Simmons)
  10. Hacker Perspective  - by Kevin Patterson
  11. How to Get Free Gogo In-Flight Internet Access  - by Big Bird
  12. Accessing Admin Privileges: A Quest Through One of Mac's Backdoors  -
  13. Perspectives on Cyber Security  - by Super Ells
  14. The Splotchgate Saga  
  15. Letters  - Proclamations
    • Ideas  - Name Deleted, Hugo L., NerveGas Jr., jim
    • Article Feedback  - Josh, Smiley McGrouchpants, Webspider, Derneval Cunha, Phreak480 (Long Island, NY), Edgewater Sean, James E. Anderson (Cypher2), John
    • Humble Requests  - Vipin (West Delhi), The Prince, Jacob, L., Kalyan (Nepal)
    • Meeting Mania  - Mike (Melbourne, FL), Roo (Houston, TX), Ken (Canada), pi
    • Splotchgate Comments  - Matthew, Bill, Monday
    • Random Thoughts  - Tommy, Tommy, Tommy, Tommy, Tommy, Tommy, Tommy, Edware T, [phone number deleted]
    • Experiences  - Mike, David
    • Suggestions  - Emilie, Toby
    • Observations  - Code Jester, William, metal_cutter, Vernon
    • Questions  - Arthur, Robin, s, Owen, Mike M (Canada), Lucio, jeffrey, Rob
    • HOPE Tickets  - Jalil, Vladimir, Dan, S., Lauren, Robert, Melissa

  16. Hackerspaces: A Definition  - by RAMGarden  (Joshua Pritt, Melbourne, Florida, LinkedIn, Melbourne Makerspace)
  17. You Gotta Learn From This, Kid  - by Buanzo
  18. The Limits of Open-Source Hardware  - by Monican
  19. EFFecting Digital Freedom  - Defending privacy on the roads, by Dave Maass
  20. Rewriting History  - by Steffen Fritz
  21. The Herculean Task of Making a Documentary on the History of Computer Hacking (Part 1)  - by Michael Lee Nirenberg
  22. Fiction: "Hacking the Naked Princess" - Chapter 0xF  - Chapter from the newest "Dev Manny, Information Technology Private Investigator" story from the book Superliminal, by Andy Kaiser
  23. Hacker Happenings
  24. 2600 Marketplace
  25. 2600 Meetings

  $2600 Magazine - Volume 33, Number 1 (Spring 2016)

  1. The Powers That Want to Be  - Editorial
  2. Scraping for Cache, or It's Not Piracy If You Left It Out in the Open  - Shell script to scrape Google cache to retrieve a McGraw Hill textbook and compile the downloaded files into a single PDF, by Charlton Trezevant
  3. Hacking Using Parse Database Injection  - Potential method for hacking into a client's Parse database via hidden elements with the HTML code of the web page, by Evan D'Elia,
  4. Hardware Hacking - Protecting Dev' Board I/O by Hacking an Alarm Panel  - by Sarlacii
  5. Telecom Informer  - Overview of the techniques and politics of fiber cable splicing, by The Prophet
  6. My President Twitter Bot Experiment  - Overview of an experiment using a fake Twitter account (@CFKResponde) that responds using a custom made PHP/MySQL chatterbot in order to effect Argentina democracy, by R.B.
  7. Defense Against the Black Arts of Forensics  - by Alex
  8. A Plan 9 Primer  - by B. Boehler
  9. Chesslin  - A playable chess engine in 256 bytes (x86 assembly), by Baudsurfer / Red Sector Inc.
  10. Exploiting HTML - Making Your Browser a Vegetable  - Using JavaScript to constantly open a new website in a new tab, causing a constant flow of new tabs, or windows, to open - so many that you would not be able to close them faster than they opened, by Dent  (Email #2)
  11. EXIF Location Recon with Python  - Several example Python script to read Exchangeable Image File Format (EXIF) and GPS data in the embedded metadata of certain image file formats, by Michael L. Kelley, Jr.
  12. Hacker Perspective  - by Ghost Exodus  (Jesse William McGraw)
  13. Eleventh Graders and Nuclear Bombs  - by revx
  14. "Which Do We Prefer: Neanderthals or Hackers?"  - by Paul Abramson
  15. One Little Pig  - Rafael Santiago  (Rio de Janeiro/Sao Paulo, Brazil, GitHub)
  16. Password and Mobility Security: Something Needs to Be Done  - by Stephen Comeau
  17. Letters  - PEER REVIEW
    • Being Published  - Jim, R, M.E., Keith, Denis, Fred, Maxie, R, Phil, Nanjemoy, Michael, Jim, stupedestrian, Jason, Thomas
    • Observations  - D1vr0c, Mark (Robbinsdale, MN), k0k0mo, nuclear.decay, P, blockeduser, Jim L, D1vr0c, D1vr0c, James, Dave, Metaknight, Sypherone (James Anderson), John, RAMGarden
    • A Breach of Note  - Estragon
    • Thoughts of HOPE  - Larry, Scott, Sequoia, Dan, Daniel, Jason
    • Just Asking...  - John H., flames, Tom, sergio, JRJ, S. Mateen, Florin_Ercu, KingBoogieSwag
    • News from Meetings  - Pablo 0 (Buenos Aires), Fernando (Switzerland)
    • Gratitude  - Me

  18. Another Solution to the USBKill.py Problem  - A follow-up to "USBkill - A Program for the Very Paranoid Computer User" (32:4), here is the solution used in Ninja OS, a live operating system designed for USB drives, by Jack D Ripper
  19. Software Validation  - by Ben Kenobi
  20. EFFecting Digital Freedom  - DRM law keeps copyright stuck in the past, by Elliot Harmon
  21. Reconnaissance at Spa World  - by The Piano Guy (Gary Rimar)
  22. My Local Weather Observations  - by The Knight Owl
  23. Fiction: "The Bee in Van Pelt Park"  - by Marshall Edwards
  24. Hacker Happenings
  25. 2600 Marketplace
  26. 2600 Meetings

  $2600 Magazine - Volume 33, Number 2 (Summer 2016)

  1. Politics Comes Calling  - Editorial
  2. Pre-Surveillance of Law Enforcement Using Targeted Advertising  - Idea to use targeted advertising to determine if and when law enforcement office are using public search engines to check up on you, by Deflagrati0n
  3. Abandoned Routers: Forgotten, But Not Gone  - Security vulnerabilities in open Wi-Fi network with routers still set to their default settings, by musashi42  (Las Vegas, Nevada, Twitter, GitHub)
  4. Card Transactions Explained  - Detailed overview of what takes place during an ATM "card transaction," including the back-end software, by Donald Blake
  5. To Hack and Uber  - The Uber app uses the IMEI of the rider's phone for verification, and it's possible to easily change the IMEI with a free app to appear to be a different user or obtain "one free ride,' by Armando Pantoja
  6. Telecom Informer  - Political robocalls during the election season, by The Prophet
  7. Hacking Malaysian Routers  - Programming experiment to check the security of Internet routers in Malaysia.  Be your own NSA!, by Keith
  8. Nigrum Libro Interceptis: Secundae  - Overview of the Jynx-Kit userland rootkit which uses LD_PRELOAD to intercept relavant filesystem calls and to scrub certain material from those functions in order to hide files or directories completely, by xorcist
  9. $35 Hacking Machine  - Overview of setting up a Raspberry Pi 2 as a low-cost hacking machine, by InsideJob
  10. Accidentally Logging in as Admin  - Story of a work-related website implementing unsecure Visual Basic Script login forms, the validation for the login was done on the client side, by Metalx1000  (Kris Occhipinti)
  11. Hacker Perspective  - by Screamer Chaotix
  12. Gaming Ingress  - Overview of Ingress augmented reality mobile game and how it determines the user's location and potential ways to spoof or exploit this, by -Me
  13. Learning Hacking via MinecraftEdu  - Using the MinecraftEdu system to get kids interested in the concepts and logic needed for software programming languages, by KingV
  14. Typing Fractions in Emails and Text Files  - Using the proper ITU telegraph regulations to send numerical fractions in text, emails, or even Morse code.  (Example: one and a half would be: 1-1/2), by The Cheshire Catalyst
  15. Letters  - GLORY
    • Hacker News  - J (Podcast Link)
    • Hacker Queries  - general.bills, Lorena (Spain), Eric, Chris, Vaseleos, The Drunken Sniper ITA, hhlkjh, Mark
    • Hacker Mentality  - Laughing Man, Prozac Porridge, James, Paulie, Token
    • Hacker Gatherings  - Michael (Wisconsin), sfn (Germany), Jr., Coolest J (Greensboro, NC), David, MINDustry Official (Toronto, Canada), The Forgetful Buddha (Washington DC), null (Leeds), A (West Lafayette, IN)
    • Hacker Followups  - Natalie, Ben
    • Hacker Observations  - Bill, Stan, spencercarterfortworth, Pietro, rhydin, reply, Nick, Stewart.T, Jim, Anonymous, Darren, PG, A Modern Day Human Rights Activist (Yellowknife, Canada), Ghost Exodus (Jesse McGraw)
    • Hacker Requests  - h., Paul, Jim, Ana (Brazil)
    • Hacker Targets  - Lisa, Shaf, Chris, Loretta Haines, Mary Burns, Debbie Mayer
    • Hacker Offerings  - Jan (Belgium), Martha, Mogar

  16. Surfing the Web Safely and Anonymously: Experimenting with Whonix Anonymous Operating System  - Overview of installing and experimenting with the Whonix Anonymous Operating System, which is based on Debian and sends all your traffic through the Tor network, by Jim L
  17. How I Socially Engineered a Job  - Story of leaving a voicemail message for a company's recruiter after missinterpreting their initial job offer call, by Oddacon T. Ripper
  18. Why We Need Privacy Rights  - Why we need privacy in real-life and on the Internet and should always fight for privacy and freedom for everyone, by Daelphinux
  19. EFFecting Digital Freedom  - The patent reform gridlock: Let's pick bigger fights, by Elliot Harmon
  20. Free Windows  - A way to get a clean, free install of Windows 10 using their Media Creation Tool and AutoKMS tools, by fooCount1
  21. The Top Ten Reasons Why Hackers Should Get a Ham Radio License  - Reasons why hackers should get their ham radio licenses and utilize the airwaves to test out new, cutting-edge technology, and prevent them from being sold to corporations, by Chris  (AB3YS)
  22. Fiction: "Hacking the Naked Princess" - Chapters 0x10-0x11  - Chapter from the newest "Dev Manny, Information Technology Private Investigator" story from the book Superliminal, by Andy Kaiser
  23. Hacker Happenings
  24. 2600 Marketplace
  25. 2600 Meetings

  $2600 Magazine - Volume 33, Number 3 (Fall 2016)

  1. Promises  - Editorial
  2. Hacking for Knowledge  - Overview of the author's "Phoenix Project II" which involves installing Ubuntu 12.04 LTS on a surplus SuperMicro rack server, by Jerry
  3. MOV Before You JMP  - Why one must learn proper assembly code languages if they wish to write (and understand) exploits, by Vuk Ivanovic
  4. It's Security, Stupid  - Hypocritical idiots who talk about Internet "freedom," "security," and "rights" - while shutting down websites (and Twitter accounts) they don't like - just like the little fascists they are, by Mallory Knodel, Sacha van Geffen, Stefania Milan, and Camille Francois
  5. Freedom of Thought  - Everyone has the capacity of freedom of thought and those thoughts will keep you free and true and they cannot be taken away from you, by Daelphinux
  6. Telecom Informer  - Verizon's hesitancy to repair and replace copper outside plant after hurricanes and switch the customers to "wireless landline" systems - and the problems this caused for legacy systems like faxes/modems, alarm monitoring, 911, etc., by The Prophet
  7. A Captive Portal Puzzle at Sea  - Overview of some of the tools (Hans) and techniques (Tor/tunnels/proxies) for bypassing wireless network captive portals while on a cruise ship, by IceQUICK
  8. Spyware Techniques  - This article explores the concepts and principles of spyware creation.  Various techniques are given for both capturing data and for ensuring the spyware behaves in a manner least likely to be noticed, by Dr. Chuck Easttom  (Email #1, Email #2)
  9. Building DIY Community Mesh Networks  - Overview of the tools needed to build community wireless networks which can be independent of government rules, by Mike Dank  (Philadelphia, PA, Email, Mastodon)
  10. Musical Monstrosities  - Overview of the art of "circuit bending" - hacking musical toys to change their audio output or control, by Dent (Email #2)
  11. Hacker Perspective  - by Scott Everard
  12. The PirateBox  - Overview of a Raspberry Pi-based PirateBox, which is an anonymous way for people to communicate or exchange files, by SideFx
  13. How to Google Bomb Someone or Rick Santorum's Sticky Situation  - Overview of "Google bombing," which is a technique to force certain websites to the top of the search results, mostly for the lulz, by Garrett Mickley
  14. Letters  - Synergy
    • Offerings  - Samy, Joanne Shields, Kristyn, The Characters Didn't Come Through
    • Meeting Updates  - Jack (New Jersey), Aidan (England), asciib17 (Austin, TX), London Longenecker (Harrisburg, PA)
    • Getting Involved  - CH, Johnny Martyr, C, J, Mike, S, Eric, Pic0o, W (Connecticut), Alex W., RAMGarden
    • Curiosity  - tnx, Mike, John
    • New Stuff  - Pawe Krzaczkowski (Poland), Scooby Doo, david0509, Chad, Brainwaste
    • Corporate Fallout  - Kevin, Aldo Daniele Dominici, Big Guy 1000
    • Following Up  - GI motherf*cking Jack, D1vr0c, Henri, Squeeling Sheep, M, PG, NHM
    • Political Intrigue  - pink
    • The Eleventh HOPE  - The Eleventh HOPE Writer #1, The Eleventh HOPE Writer #2, The Eleventh HOPE Writer #3, The Eleventh HOPE Writer #4, The Eleventh HOPE Writer #5, The Eleventh HOPE Writer #6, The Eleventh HOPE Writer #7, The Eleventh HOPE Writer #8, The Eleventh HOPE Writer #9

  15. Verizon's HOPE Scam  - The problems of getting a traditional landline installed for the HOPE conference and being forced to pay for an entire month for three days of service, and a surprise $50 "shortfall" billing for not using their long distance service enough.  All-in-all, a $70 phone bill for a single one minute call to Connecticut!
  16. The Easiest Way to Break Into a Bank  - Apparently, everyone at TD Bank has a default password of the last 6-digits of your checkcard number, or even "123abc", by Anne
  17. Hacking Amazon E-Books with Spy Style  - Gives you the opportunity to use your Kindle content as you like and how to save any ebooks you may already have, by bartitsu59  (France)
  18. EFFecting Digital Freedom  - Copyright is not a trump card, by Elliot Harmon
  19. A Parallel President on Twitter  - Story of creating a "mirror" Twitter account of Argentina's president to allow their citizens to reply to the president's tweets without be blocked or censored, by Richard Vardit
  20. Hacker Happenings
  21. 2600 Marketplace
  22. 2600 Meetings

  $2600 Magazine - Volume 33, Number 4 (Winter 2016-2017)

  1. Dark Bubbles  - Editorial
  2. Rescuing Fake Memory Devices  - Many SD cards on Ebay are "fake," only providing a usable 8 GB of data, use H2testw.exe to verify them, by Tau_Zer0
  3. Having Fun With In-Store Chromecast  - Stream your own content to the demo TVs at Best Buy (PSK: blue1966) using Google Cast, lol-md4
  4. The Coca-Cola Blacklist  - List of banned words you can put on bottles for the "Share A Coke" campaign, by Dent
  5. Bypassing Privileges with Oracle Database Express Edition  - Create a link between two disparate database servers in order to cross validate row counts, by Chris Rucker, Data Scientist
  6. Telecom Informer  - Overview of the current Canadian phone system, and the problems carriers had switching from CDMA, by The Prophet
  7. Using Discord Servers to HTTP Flood  - Use the Discord voice/text chat app to launch a denial-of-service attack via their automatic HTTP link checking, by xnite
  8. Successful Network Attacks - Phase One: Reconnaissance  - Overview of the reconnaissance techniques one uses to identify and attack a computer network, by Daelphinux
  9. Spying Across Borders in the Age of Email  - "Jumping to conclusions" when an U.K. MoD IP address appear to access their email, by Rodrigo S. Ruiz and Rogerio Winter
  10. InfoSec at Its Worst, OPSEC at Its Best  - Story of reused passwords words to gain access to a blocked Wi-Fi setup, by NerveGas Jr.
  11. Hacker Perspective  - by Byeman
  12. Can Security be Built into Pure Data?  - The idea of building security directly into the XML language, by Wyatt Lee
  13. mcquery.js - A Web Scraper for Disc Golf Players  - Using NodeJS to design a "web scraper" to watch online auction sites for a particular golf disc, by Brenden Hyde
  14. Letters  - CROSSFIRE
    • General Inquiries  - Anonymous Teen, Steve, andrew, hardik hardik, C, Bill K, Steve W., db, Mark, lol-md4, TimInCT, Mike, Tad, Daniel, S, (no name given), C, P
    • Liberation  - massitakevin, Sky
    • Scrutiny  - NerveGas Jr., El Magistral
    • Electorials  - machghostine, Nick, Anonymouns, David, Piss Off Voter, Bc smith, Stymtex, Stan B.
    • Events  - Karl, Pic0o
    • Digital Editions  - skilbjo, Huckle Buck
    • Fun With Calendars  - Neil Howard, Chris
    • More Dialogue  - Pablo, josh cha
    • The Bounty  - P, Kurt
    • Appreciation  - William, A. S. A., John
    • Something New  - Stratman01, s1w4t
    • Issues  - Marc
    • The Wonderful World of Meetings  - Bachelet Lab, Jeff, Leon, R, stmerry, Braden
    • Observed  - Funkfish
    • Knowledge Lost  - Joe

  15. KBChat - Private, Encrypted Chat via KBFS  - Using the Keybase Filesystem (KBFS) to "chat" via shared folders with shell commands, by Samuel L. Hofius  (KF5GRD, Albuqerque, New Mexico)
  16. 2600 Leak Department  - What IRS agents are suppose to say in response to your questions.
  17. Memory Lane  - "Please Avoid Unnecessary Calls to Washington" - 1940s New Jersey Bell phone ad, Submitted by Anne Jackson
  18. EFFecting Digital Freedom  - Anti-Trump lies and propaganda - this is exactly why you shouldn't send money to the (((EFF))), by Erica Portnoy and Elliot Harmon
  19. Rotten Apples: OS X 101  - Overview of the kernel, file structure, and security features in OS X, by Secure Panda
  20. Automatic Contest Winning via Selenium  - Using the Selenium WebDriver to automate certain tedious tasks, like winning online contests, or Xbox Line code redemptions, by Kyle Bradshaw  (Skylled)
  21. The One About That File Server  - Story (urban legend?) of the reliability of pre-Windows/UNIX servers, even when nobody knows where they are, by Sydney Greenstreet
  22. Fiction: "Hacking the Naked Princess" - Chapter 0x12  - Chapter from the newest "Dev Manny, Information Technology Private Investigator" story from the book Superliminal, by Andy Kaiser
  23. Hacker Happenings
  24. 2600 Marketplace
  25. 2600 Meetings

  $2600 Magazine - Volume 34, Number 1 (Spring 2017)

  1. A Price for Truth  - Editorial
  2. New U.K. Surveillance Laws - Time to Get Serious About Security  - Draconian surveillance laws in the U.K. through the Investigatory Powers Bill in Nov. 2016, by Dr. G
  3. Voices in the Sky - Satellite Communication Methods  - Overview of the techniques and frequencies used by satellite for their uplink and downlinks, by Monican
  4. Lockbox PIN Code Generator  - Major security problems with Supra mechanical key lockboxes (only approx. 250 PINs!), by Victor
  5. A Lock With the Key Next to It  - Article discussing the insecurities (Win 7, using USB drives, using proxies, etc.) of the computer security at the author's middle school, by ckjbgames
  6. Hacking Free Wi-Fi on Delta Flights  - Get one hour free Internet by entering a random T-Mobile number and spoofing the browser User-Agent, by David Libertas
  7. Telecom Informer  - Three hour lunches (why your phone bill is so high) and the telephone system of Myanmar, by The Prophet
  8. Telephones from Space  - Introduction to telephone number (exchange) scanning, including example from 1-800-NXX-2600, by Dent  (Phreaky Dent, Email #2)
  9. Longing for the Past  - Story of a 15-year-old hacker who wishes he could go back into the past to the hacking days of the 1980s and 1990s, by Nick  (U.K.)
  10. Getting Inspired as a Student  - Story of information security students attending Black Hat Europe 2016 and being disappointed that the vendor hall was run by people with no technical background who only cared about sales, by StMerry
  11. Google Auto-Fill Suggestions, Politics, and Magic  - The possibility of Google auto-fill suggestion bombing to perform election interference, by Ry0ki
  12. The Inner Circle... Part One  - Voter registration records for Donald Trump's so-called "Inner Circle"
  13. Hacker Perspective  - by Jack Beltane  (Bay Village, Ohio, Twitter)
  14. Software Cracking with dotPeek  - Example of using JetBrain's dotPeek 1.5 to decompile DLLs to expose hidden software options in Satellite Reign or other games, by redstarx
  15. Ignore Your .env - Browsing Environment Files on GitHub  - Searching for potentially sensitive data in exposed environment variables on GitHut, by casi
  16. Obfuscating Torrent Traffic  - Using LayerProx to obfuscate BitTorrent traffic to fool DMCA-type blackmailers, by Filip Kälebo (a.k.a., flipchan, Sweden, GitHub)
    • LayerProx  A rebuild of marionette, encrypted proxy that simulates general webtraffic.

  17. Successful Network Attacks - Phase Two: Network Scanning  - Overview of probing a computer network for vulnerabilities or known weaknesses, by Daelphinux
  18. Letters  - REACTIONS
    • Contributions  - Gabrielle, Vanessa, Russell, Jason
    • Distribution  - John
    • Meetings  - L, notaspy (Vancouver, Canada), MG (Petaluma, CA), stmerry (Edinburgh, Scotland), Echo, Dinesh (Doa, India)
    • Storm Warning  - Name Deleted, Pissed off in Long Beach, California
    • A Look Back  - Dr. Dave, Darkmatter
    • Feedback  - kes, YTT, Sudarshan, brucerobin, John, Inquiring Mind, Kris, fooCount1, D1vr0c
    • Asking  - Stas (Belogorsk, Russia), Marko, Shazia, Moshean, WarmFuzzy, Jeff
    • Leaks  - Homeless Man, [Everything Redacted]
    • The Future  - Robert, Devlin, colForbin
    • The Marketplace  - X, F, Christy
    • Observation  - rick
    • Further Info  - Wolfgang_Von_Stinkbutt, Rodrigo Ruiz, Chris Berge
    • More Eleventh HOPE Feedback  - The Eleventh HOPE Writer #10, The Eleventh HOPE Writer #11, The Eleventh HOPE Writer #12, The Eleventh HOPE Writer #13, The Eleventh HOPE Writer #14

  19. White House Phone Numbers  List of both public and private White House phone numbers
  20. How to Improve Zone Protection in Burglary Alarms  - A novel design of a hardwired zone control panel or zone expander input of a burglary alarm, which provides an enhanced security level against compromise attack attempts or problems with the zone loop, by Cezary Jaronczyk  (Canada, Email)
  21. EFFecting Digital Freedom  - We're halfway to encrypting the entire web, by Gennie Gebhart  (San Francisco, California, Email, Twitter)
  22. Validating Software Validation  - The potential dangers of relying on checksumming (MD5, etc.) to validate files if the actual checksumming scheme is compromised first, by Malvineous
  23. Thoughts on Phoenix Project II  - Hardware and software tips for setting up your own pseudo-BBS/website in Linux, by GI_Jack
  24. Those Coca-Cola Freestyle Machines in Crew Mode  - Story and pictures of a Coca-Cola Freestyle soda machine left in "Crew Mode," by M0ebiusStrip
  25. 321 Studios Revisited  - Story of working with Robert H. Moore at 321 Studios and his DVD X Copy software, by /\/ordog
  26. Hacker Happenings
  27. 2600 Marketplace
  28. 2600 Meetings

  $2600 Magazine - Volume 34, Number 2 (Summer 2017)

  1. The Power of the Press  - Editorial
  2. The Censorship Resistant Internet - Part 1: How to Run a Tor Hidden Service  - Detailed overview of wetting up a .onion Tor-accessible website under GNU/Linux, by p4bl0  Pablo Rauzy  (France, Twitter, Blog)
  3. Converting the Voter Database and Facebook into a Google for Criminals  - Overview of the possibility of linking voter database records with a person's Faceberg page, by Anthony Russell  (Twitter)
  4. Hactivism to End Human Trafficking and Modern Day Slavery  - Using "hacktivism" to bring awareness to the approximate 30 million people currently enslaved in the world today, by Dr. G
  5. Telecom Informer  - Discussing the telephone system during the days of the Soviet Union and the illegal (((removal))) of Viktor Yanukovych, by The Prophet
  6. How Rogue One Taught Me Not to Be a Bad Guy  - Story of how hackers should be like the rebels in Rogue One in fighting an Empire of old Jewish men in crisp uniforms, by Jameson Hampton
  7. A Declaration of Independence for Cyberspace  - Ideas for a potential "Declaration of Independence" for users in "cyberspace" in order to protect the flow of information and their digital privacy, by Daelphinux
  8. Demonsaw: Bypassing Anonymity Utilizing Social Engineering  - Method to expose a person's IP address on "secure" chat networks, like Demonsaw, by posting links to third-party websites (YouTube) which log them, by Hristo I. Gueorguiev
  9. Pineapple Pi - Creating an Automated Open Wi-Fi Traffic Capturing Tool for Under $20  - Use a Raspberry Pi Zero and a TP-Link TL-WN722N to capture all the traffic on an open Wi-Fi network, by Br@d
  10. 0x8bc4 Before You 0xffe0  - General overview of CPU machine code and assembly language programming which are needed for stack-based buffer overflow exploits, by XlogicX
  11. Hacker Perspective  - by 0rbytal  (Twitter)
  12. My Perspective  - Article sharing the author's philosophy of how to deal with smartphones and other invasive technologies and the people who use them, by Buckminster Emptier
  13. OPTingOUT  - Discusses the apparent challenges in deleting social media account and how it can often take weeks to fully delete data - if at all, by Kernal Seiden
  14. Analog vs. Digital Living: Real Solutions to Absolute Anonymity and Privacy  - Get off the grid and still stay connected to the world.  Real solutions to absolute anonymity and privacy, by DocSlow
  15. Letters  - CHORUS SUROHC
    • Stickers  - stAtiC, Joe
    • Corporate Culture  - Megan, Ellie, Praful Mathur
    • Further Info  - Akalabeth, bobgerman, Laurie, NTGuardian, RAMGarden, Matthew Sacks, B, Pic0o
    • Concerns  - Tyson, Sikorina Bustamante Paco, ckjbgames, DM, Concerned lifelong 2600'er
    • Meeting Updates  - Travis, Phil, Richard Cheshire, stmerry, conscript, Robert, George (Los Angeles, CA), Mad Glitcher (Petaluma, CA), Carl (Arkansas), Fritz (Fargo, ND), Cristy (Italy)
    • Taking Action  - Terry, R, G (Idaho), An Avid Reader/Listener (~93), David
    • Inquiries  - R, J, Bertram, Warmfuzzy, SS, Kiraz, heavenligible, Phil, Jack, Dave (Dublin, Irelan)
    • Article Responses  - E85, Monican

  16. EFFecting Digital Freedom  - Building digital safety skills in your community, by Soraya Okuda and Elliot Harmon
  17. Building a Better Screen Locker for GNU/Linux  - Building a screen locker with slock which is reasonably resilient to local attackers who attempt to brute-force the password or install malware which the lock is engaged to log and exfiltrate the password, by idk
  18. Citizen Engineer  - Patently hacking, by Limor "Ladyada" Fried and Phillip Torrone
  19. VR Trumpers  - More evidence that Democrats are the dumbest people on the planet and "Trump Derangement Syndrome" is really no joke, by Jeffrey H. MacLachlan  (Milledgeville, Georgia, Email, Phone: 478-445-5571, Picture, LinkedIn, RateMyProfessor, 2018 Salary: $59863.87)
  20. Successful Network Attacks - Phase Three: Gaining Access  - The most difficult part of a computer network attack - getting access, by Daelphinux
  21. Advice from the Socially Engineered  - Advice for a successful social engineering attack by someone who was "social engineered," by Infra Read
  22. Internet Thoughts  - Some observations on what, and how bad, the Internet has become over the years, by Jared J. Estes
  23. Fiction: "Hacking the Naked Princess" - Chapter 0x13  - Chapter from the newest "Dev Manny, Information Technology Private Investigator" story from the book Superliminal, by Andy Kaiser
  24. Hacker Happenings
  25. 2600 Marketplace
  26. 2600 Meetings

  $2600 Magazine - Volume 34, Number 3 (Fall 2017)

  1. Acts of Courage  - Editorial
  2. Bypass Your ISP's DNS and Run a Private OpenNIC Server  - Take back your Internet privacy by using your own DNS server or a service like OpenNIC, by Mike Dank  (Philadelphia, PA, Email, Mastodon)
  3. PHP Backdoors  - How to hide a PHP backdoor payload by using ASCII-represented-binary to defeat any malware detectors, by Dave Jericho
  4. Inseparable: The Intersectionality of Hacking and Politics  - Overview of how it's now up to hackers to stop corrupt politicians, media, and governments, by Josephus
  5. Telecom Informer  - Talking about DNS vulnerabilities and their relationship to SS7 vulnerabilities, by The Prophet
  6. Enhancing SQL Injection With Stored Procedures  - How to enhance a SQL injection attack by using Stored Procedures in Microsoft SQL Server, by Dr. Chuck Easttom (Email)
  7. How to Get Nearly Free Travel from Scotrail  - Potential loophole for almost free rail travel from Scotland's Scotrail if you "lose" your card, by TheGeek
  8. (learn (LISP))  - LISP is the language of the gods.  It is the ultimate hacker's language, by John Skilbeck
  9. Reverse Engineering Electronic Letter and Number Toys  - Using electronic letter toys to teach kids or students on the aspects of reverse engineering, counting in binary, and electronics tinkering, by B. Ramsey
  10. How to Hack Your Way to a Guilt-Free, Political Ideology  - How not to fail for mainstream ideology and to instead form your own ideology from the ground up, by Eyenot
  11. The Problem with IT Certifications and Their Contribution to the Devaluation of Technology  - The general uselessness of "IT certifications" from places like CompTIA, and how they trick people into thinking they'll get jobs in the IT industry, by Super Ells
  12. Hacker Perspective  - by Master Chen
  13. A Little Brother's Manifesto  - Manifesto to support the EFF, the Tor browser, and strong encryption, by Qrag (Email #2)
  14. A Test Harness for Fuzzing Font Parsing Engines in Web Browsers  - This article presents a cross-platform test harness written in Python that assists the user in searching for vulnerabilities in web browsers, specifically by fuzzing their font parsing functionality.  The tool automates the delivery of test cases (font files in this context) into a web browser.  The creation of a corpus of mutated TTF font files suitable for use in fuzzing is also covered, by James Fell  (York, U.K., Email #2, GitHub)
  15. Letters  - MOB RULE
    • Administrivia  - John, A, lol-md4, Courtney, X (Ontario, Canada), Jim St, tiburonrepair, Andres
    • Following Up  - GI Jack, ShieldCurve, OWA, The Piano Guy, An Anonymous Pedo, Bearz
    • Inquiring Minds  - Robert, E, Medhat, A Meeting, Jim, moocru22, Adam, Patchmail, Phototrope, 73 fellow circuit benders, Robert, Brad, Paul
    • More on Meetings  - Skipper Blue, Skipper Blue, njones920 (Reno, NV), Sergey (Moscow, Russia), A. Roach (Baltimore, MD), Mark (U.K.), Richard Cheshire
    • Contrition  - G
    • Other Cultures  - whotopia, G
    • Political Views  - Jim in Virginia, Marcus, John F. Kennedy, Daniel
    • Observations  - karyse, Marc, Henry, Christy Dufrene, hydrogen
    • Projects  - Darkmatter, Joshua, Tiago (Lisbon, Portugal)

  16. EFFecting Digital Freedom  - Don't let Congress destroy what we've built, by Ellio Harmon
  17. Confessions of a (for Now Not So Successful) Bug Bounty Hunter  - Perspective of a software "bug" hunter who finds bugs for monetary rewards, and the draw backs that often includes, and to always have fun, by Vuk Ivanovic
  18. To Care or Not to Care  - Story of bypassing the iTALC classroom management and computer monitoring software by deleting a DLL, by deadbeat0
  19. Scrape Textbooks, Save Money  - AppleScript to open up the "Kindle.app" application on Mac OS X system which proceeds to photograph every page of your (preview) textbook, by th0tnet
  20. googlecomp.py: The Complete Google Autocomplete Script  - Command-line script to initiate the Google search "autocomplete" function, by ckjbgames
  21. Citizen Engineer  - I like your content, but your terms are not acceptable, by Limor "Ladyada" Fried and Phillip Torrone
  22. Obfuscating Biopolitics: A Theoretical Primer for Cyborgs and Other Concerned Citizens  - Subverting security practices which attempt to reinforce state and corporate control, by Emma Stamm
  23. Debt Journey  - Dealing with outstanding debts from credit cards, utilities, student loans, and tips to avoid debt collectors (they don't care about your situation!), by Pic0o
  24. Successful Network Attacks - Phase Four: Maintaining Access  - Tips for maintaining access (backdoors, etc.) after a successful hack and to look out for intrusion monitoring systems, by Daelphinux
  25. Splatter  - Applying "splatter semiotics" to our fast-paced world, by Alan Sondheim
  26. Hacker Happenings
  27. 2600 Marketplace
  28. 2600 Meetings

  $2600 Magazine - Volume 34, Number 4 (Winter 2017-2018)

  1. Credit Denial  - Editorial
  2. Using DNScat2 for Encrypted Command & Control Over DNS  - Overview of the process for setting up DNScat2, which allows an encrypted tunnel over the Internet by using DNS traffic, by James Fell
  3. Educating Friends and Family About Online Security  - Tips for getting NPCs and common folk to start using encryption and operation security while on the Internet, by BirdPerson
  4. Creating Strong and Easy to Remember Passwords  - Simple technique for creating passwords that are both strong and easy to remember, by Andova Begarin
  5. Don't You Have a Smart Watch Yet?  - It will make your email security that much easier to deal with by sending your "two-factor authentication" emails directly to your watch, by The Cheshire Catalyst
  6. Telecom Informer  - Cool little story about getting electrical power to rural Washington state locations, by The Prophet
  7. What Happens When WHOIS Data is Made Public  - Story of a person who intentionally left "accurate" personal information in their WHOIS entry - and how much spam they received, by Victor
  8. Deauthing the Neighbors, or Ring Theory  - Use a coaxial splitter, multiple antennas, and a few Python scripts to send 'deauths' to a neighbor's hogging Wi-Fi setup, by Snocone
  9. Nightmare on E Street (Modem and Me Against the World)  - Story of a person who had they Wi-Fi and cable modem hacked and the hoops they had to jump through to sort everything out, and how useless "tech support" can be, by Emily Saunders
  10. Hacker Perspective  - by Gazza
  11. Quantum Computers and Bitcoin  - The potential for future quantum computer to be able to mine Bitcoins, by Dave D'Rave
  12. I Want to Be a Hacker...  - Tips from a InfoSec recruiter on what they look for, if you're a hacker looking to sell out..., by Ricki Burke
  13. Letters  - MEGAPHONE
    • Payphones  - RB, E, Ben, Jeremiah
    • Articles  - TP, M, GI Jack: All American Zero, Future Published Writer, celcius water, Josephina Jones, David, jjstylesrocks
    • Other Mediums  - Gerald C, Former Admin
    • Old Tech  - Ryan
    • Digital Print  - Thomas, Devin, Neil
    • Misdirection of Efforts  - Wissbr, Michael, Watt wusiwudg
    • Offers  - Jorgen (Ukraine), KHRoN, Oliva Jones, Volunteer, Ellen, Ellen, James Willson, Ellen
    • Accomplishments  - Guy Zappulla, metaknight
    • Meetings  - Luciano (Argentina), Pablo from Buenos Aires, Argentina, Mark (Fort Lauderdale, FL), John Q. Sample, Jordan (Rogers, Arkansas), tus2600 (Tucson, AZ), Asmodeu (Wales, U.K.), genevieve (Vancouver, Canada), Spy604 (Vancouver, Canada), mal (Boston, MA), stmerry, David (Austin, TX), Mauro (Argentina), Brenda (asparagi) (Champaign-Urbana, IL)
    • Queries  - haranadh yanda, kaimmerali, Arun, Mistman the Magnificent, David, D3rLG
    • Suggestions  - AK, mtb great music mtb smothy lounge, Scott B
    • Observations  - Xenophule, Morti5 the MoUse/Alfson, akaky

  14. EFFecting Digital Freedom  - NSA spying is up for re-election, by David Ruiz
  15. Conventionalist Theory of Reference is Comparison to Programming Language  - A semantic and pragmatic analysis, by Evan D'Elia
  16. Down and Out in a Land of Script Kiddies  - Or how I learned to stop phreaking and love Ma Bell, by tyrus568
  17. Dispelling a Breach Rumor  - Squashing the rumor that Ninja OS had a compromised version of sudo, unless the signatures were hacked too..., by GI Jack
  18. Citizen Engineer  - Battle of the blobs, by Limor "Ladyada" Fried and Phillip Torrone
  19. The Russian Hacking Diatribe, and Why It Is Complete Agitprop Nonsense  - Surprisingly detailed article discussing Hillary Clinton's "Russia collusion" hoaxes she and her (((handlers))) created in order to undermine Trump during the 2016 U.S. presidential election, by Doc Slow
  20. Successful Network Attacks - Phase Five: Covering Tracks  - Overview of the steps necessary during a hack to clean up any logs or forge any IP or MAC (hardware) addresses, by Daelphinux
  21. Fiction: "Hacking the Naked Princess" - Chapter 0x14  - Chapter from the newest "Dev Manny, Information Technology Private Investigator" story from the book Superliminal, by Andy Kaiser
  22. Hacker Happenings
  23. 2600 Marketplace
  24. 2600 Meetings

  $2600 Magazine - Volume 35, Number 1 (Spring 2018)

  1. Embracing Empowerment  - Editorial
  2. The Secrecy and Security of the Special Counsel  - Overview of the types of security which are (or should be) used during the "special counsel" investigating Hillary Clinton's Russia hoax, by Alexander J. Urbelis  (f/k/a Neon Samurai)
  3. What Programming Language Should I Learn? Why Not All of Them?  - Why when learning a new programming language it should be one your personally find enjoyable, by RAMGarden
  4. Breaking Standards  - The potential of using older technology, or at least non-standard technology, to conceal your data, by bartitsu59  (France)
  5. Telecom Informer  - Story of spammers calling 911 PSAPs, problems with SS7 and access charges, by The Prophet
  6. The Censorship Resistant Internet - Part 2: How to Run an I2P Hidden Service  - Article explaining how to run censorship resistant services on the Internet, including the Invisible Internet Protocol, by p4bl0  (Pablo Rauzy
  7. Bitcoin or Bit Con?  One Newbie's Adventures in Cryptoland  - Story of a person using Bitcoins for the first time and the pitfalls (and service fees) they had, by XtendedWhere
  8. The Case of the Murderous AI  - Weird story of a PhD students working on natural language processing and teaching a computer to play videos games and "install software" like printer drivers, and they eventually found the "Shutdown" button, by Ted Benson
  9. In Defense of the Net  - Why U.S. defense and intelligence agencies have a vested interest in preserving Net Neutrality and how they can help protect it, by davemitchell
  10. Hacker Perspective  - by Marc Lighter
  11. A Review of CopperheadOS  - CopperheadOS is a smartphone operating system based on the Android Open-Source Project which is focused on security and privacy, by Ron Porter
  12. SSH Keys and Challenges in Enterprise Environments  - Overview of using SSH in an enterprise environment and security problems with people adding a colleague's SSH public key to another's authorized keys file, by Patric Schmitz
  13. Unlocking the Secret of Keys  - Story of finding a "master key" in a hardware store's garbage bin, by James Hunter
  14. Letters  - ADVISORIES
    • Article Feedback  - Ron, Neil, Patrick, KO, D1vr0c, Mom, F.B., Josephus, Scott
    • Observations  - Halestorm, FF, Bill, Codger, Robert (Akron, OH)
    • Random Questions  - GazetteMed, Mistman the Magnificent, Nicole Lewis, Nate, Kraag, Ricky, Zachariah, Bryan, Robert, Nicole Lewis, Lightning Tommy, Eric
    • Meeting Updates  - Michael, J, Morty (Astana, Kazakhstan), asparagi (Illinois), Morty, Reynold (Hawaii), Kevin (Tampa, FL), The Telephone Museum (Waltham, MA), 0xTrap, Haven Hash (Lima, Peru), ptz (Russia), Hawke (Spoka, WA), Matt (Connecticut), Christopher (Minnesota), marc (Boston, MA), Philip (Calgary, Canada)
    • Critique  - C, Lifetime Subscriber
    • Following Up  - Tim, Nick
    • Issues  - Matt, Ross (Ostrava, Czech Republic), Aaron
    • Discoveries  - chomito44, SideFx, sueicloud

  15. EFFecting Digital Freedom  - Remembering EFF-co-founder John Perry Barlow, by Jason Kelley
  16. Hacking Our Attitudes (The Key to Being a Better Attitude Trumper)  - Is $2600 lacking articles and writers that badly?, by Dufu
  17. Historic Hacking  - Story of a 57-year-old hacker and all the hardware he has used over the years, by Huntech
  18. Citizen Engineer  - Make your own two-factor authentication hardware device, by Limor "Ladyada" Fried and Phillip Torrone
  19. Bluetooth Hacking 101  - Overview of some of the utilities used in attacking or intercepting Bluetooth transmissions, by Dr. Chuck Easttom
  20. Hidden ISPs  - Information on using "smaller" ISPs to get better deals, no data caps, and increased privacy, by kes
  21. Extrapolating Phone Numbers Using Facebook and PayPal  - Exploit the "lost password" feature of certain websites to retrieve linked phone numbers of your target, by Karan Saini
  22. The Free Flow of Information  - The ultimate goal of hackers should be to release information freely to better help mankind, by Daelphinux
  23. Hacker Happenings
  24. 2600 Marketplace
  25. 2600 Meetings

  $2600 Magazine - Volume 35, Number 2 (Summer 2018)

  1. Celebrate the Difference  - Editorial
  2. A NOOb's Guide to the Dark Web  - General overview of using the Dark Web, or "hidden" websites only accessible by using Tor, Freenet, or I2P clients, by Kim Crawley
  3. The IPv6 Delusion  - Discussing the fact that it will take a very long time for all the IPv4 clients and servers to move to IPv6 only, by David Crowe
  4. Telecom Informer  - Pros and cons of telephone company mergers, by The Prophet
  5. How to be a Guitar Hero, IRL  - How to obtain Downloadable Content (DLC) for Rocksmith music video game using RSInjector, by J.J. Styles (a.k.a 0ptiKaL I1usioN)
  6. Even Restaurants Need InfoSec  - Potential dangers of using open Wi-Fi access point in public places, by lg0p89
  7. Serial Number Cracking for Fun and Profit  - Potential security hole in "secure" online labeling systems and a method of attack when armed with a valid serial to generate counterfeit labels, by MrGhostValley (Colorado, CO)
  8. Automating a Police State  - Potential dangers and privacy concerns with things like red-light cameras or license plate readers, by Corey Kahler
  9. Hacker Perspective  - by J. Christy Ramsey  (Carson City, Nevada, Email)
  10. Brute Forcing a Car Door with Math  - Overview of the de Bruijn sequence for cracking a 5-digit keypad code to unlock a vehicle, by Br@d
  11. Hack(ed), the Earth  - Discussing the fact that is seems like you need a phone (account) to access sites like Faceberg, Google, and other "major" Internet sites, and the privacy concerns it has, by Michaleen Garda  (Email #2)
  12. Letters  - ROUTINES
    • Creative Applications  - CW, Bobby Joe Snyder
    • Political Intrigue  - David S. Lightman, Hannibal, OWA, C F M
    • Contributors  - Mike, Nigel, TaN
    • Donors  - V
    • Meeting News  - Pablo (Brazil), A.K. (Holland), Jamey (Youngstown, OH), Super boy you (Kazakhstan), Sebastian (Wroclaw, Poland), Ian (Poland), Steve, Framework Conceptions (Austria), Brent (Boise, ID), Andi (Wales, U.K.), glitch, Ray (New Jersey)
    • The Hacker Spirit  - N, Jim, Richard Cheshire (Orlando, FL), sasse
    • Drama  - victor, Name Redacted
    • Visibility  - Kata Gazso, Bruce (Oklahoma City, OK), Kata Gazso, JG, Dokter, Kata Gazso, Albert, LC (Pennsylvania), Kata Gazso, Osama Mustafa, Curious
    • Being Alert  - Esteban, Emily, Bill Miller
    • Requests  - Some Buddy, Joseph
    • Responses  - gerry, Alexander, D1vr0c, Daniel, Rockey

  13. EFFecting Digital Freedom  - Grassroots effort kills bad computer crime bill in Georgia, by Jason Kelley
  14. A Hacker Adventure in Urban Exploration  - Discovering a little bit of phone history in a AT&T training center while on an exploration adventure, by Quidnarious Gooch
  15. Beyond the Scare-Mongering  - Attending the ZeroNights hacker conference in Moscow and why we shouldn't believe the (((media))) lies about Russia, by StMerry
  16. Citizen Engineer  - Hacking a classic Nintendo Robotic Operating Buddy (R.O.B) robot, by Limor "Ladyada" Fried and Phillip Torrone
  17. Re-Purposing Old Technology and Ideas for Fun and Emotional Profit  - Discussing the joy in hacking simple or older hardware and software devices, by John Q. Sample
  18. Hacking: Quick and Easy  - Beginner overview for performing a SQL injection attack on a target website, by haplesscheese
  19. Thoughts On Cryptocurrency