Agents of the Revolution
  • Content count

  • Joined

  • Last visited

  • Days Won


Everything posted by Booter

  1. Yes
  2. From the rules/guidelines: 3. DEFINITION OF "HACKING" Hacking is about production, not destruction; it involves curiosity, research, analysis, knowledge, the creation of new ideas, the discovery of amazing breakthroughs, and the sharing of information with those who will use it responsibly. Hacking is not illegal activity. The Digital Dawg Pound and the Binary Revolution Forums will not take any responsibility for your actions, nor do we condone any sort of illegal activity, especially in the name of hacking. ::Topic closed - Booter::
  3. #2 I believe.
  4. PLA

    I'd like to bid on your job, and cactus.
  5. If you want to remove the virii without software you're going to have to do some registry editing. Which, if you don't know the names of all the files and where it is rooted at will be damn near impossible to get rid of.
  6. Get payphone numbers while you're there, and if possible, find out which ones ACCEPT incoming calls.
  7. Can anyone confirm that this works? I don't really live in an area where these crosswalk buttons are around.
  8. I jumped in there about 1/2 hour ago and no one was there.
  9. I'll probally begin scanning some this weekend myself. Could someone post an updated list of what's left to scan?
  10. Let's you view search trends by keywords and also compare them. It's interesting to compare two keywords and see how they correlate with each other. Like taxes and suicide. Google Trends
  11. Went ahead and merged the two topics, as the results are interesting from the Google Trends and the threads are related.
  12. I just did a quick search and posted 2 of them. There are a ton of them. Search for "PS2 modding".
  13. Shortly after Skynet is created would be my best guess, or when Joshua strings together CPE1704TKS.
  14. I would highly suggest searching through these forums as they contain a ton of information. Search for topics that interest you and you would like to know more about. I also would suggest venturing over to and checking out some his tutorials as well.
  15. It should be F10, but if it isn't try Del or F2.
  16. I moved the first post to the Newbie HQ FAQ. It was a good post and instead of just pinning this thread I thought it would easier just to add it into the Newbie FAQ.
  17. Or you could add it to the Newbie FAQ which is already pinned. It's sort of covered there anyway but not exactly.
  18. The password may have been changed but I verified with danowoz because I don't have a gmail account and the secret question can not be changed. So if you can't remember the answer to your secret question then you may just need to give them a call, explain the situation, and hope they give you access back to 'your' account.
  19. net send <computer name> "message" net send all "message" - (This broadcasts the message to everyone on the network) you can use a command in notepad like 'net send ComputerLab01 Hey everyone, I'm about to get suspended'. You can then copy and paste that command hundreds of times. Save as a .bat. Then just open the file.
  20. I'm still very new to the phone side of things myself. However, I found that when I did the Jenny Scan and came across any odd sounds I hadn't heard of before to ask questions to people in the know. BlackRatchet and others were a big help with this, and help me to continually learn about the Telco industry. As long as your willing to read and learn then you will gain quite a bit of knowledge just from these forums. If a certain 'phreaking' topic perks your interest then just search for it on the forums.
  21. I've heard it also, but I think it's just a bit of lag on the Asterisk box.
  22. You can occasionally find convenient stores with ATM's that aren't encrypted and run off the stores wifi. You can scan for a connection via PSP, but don't fuck with it even though they don't have a WEP key. I had to inform the store at the front of my neighborhood of this and they brought someone out the next day to upgrade the software of the ATM.
  23. They regularly monitor traffic, if a certain server spikes on the graphs suddenly for traffic then the NOC takes a closer look at the traffic, and will deal with it accordingly (that's a quick version).
  24. I happen to know the company too! And yes, they'll knock out the attack rather quickly.