Monday, March 5, 2012

Essential Ipad Games Which You Should Have:


Essential Ipad Games Which You Should Have:

10) Talking Tom 2:

Awesome app.It actually repeats what you speak.This cute cat can do much more funny stuff.By tapping its face,you can punch it.It gets frustrated if you touch its tail or toes.You can also slap it.But it would be a mean thing to do to a cute cat.It repeats what you say in a funny voice.Also similarly like the cat,there is talking Ben(dog),Parrot.etc.You can make it sleep by rubbing on its tummy gently.A cool app indeed.

9) Tap Tap Revenge 4:


Tap Tap,The name itself tells you.As you can see in the pic,according to the music beat,balls come down the ally and you have to tap them when it comes in the end,Its pure timing that matters.Millions of songs are available.You have to advance in levels to unlock cool songs.Awesome app to have it ipad.Its Fun+musik.

8)Labrinth HD:

This App is purely based on Motion Sensing.There is only 1 goal in this app.Put the ball in the hole.But the problem is obstacles and its a tough maze guys.Obstacles ranging from magnet,lasers,canon make this app more great.Be careful.Sit in a place and play.All the time you will be tilting the ipad and drawing in the air.lol.Another cool game.Lost of levels are there in full version.

7) Falling fred:
Fred is a cool character.But he wants to end his life and jumps from the tallest place possible.What can you do to save him?In this game you cant save him But you can control him.There is no Ending is this game.He will falling all the way down to infinity .But the sad thing is the obstacles in the way will cut,poke or even kill poor Fred.I got the high score of 1160.Its really tough guys.Dont underestimate it. But its never ending.There re many characters ranging from pop stars like beiber,gaga to osama bin laden.

6) Angry Birds:
The name itself tells.Almost everyone knows this game.So i Dont need to tell much.Its a superb game.

5) Paper toss 2.0

Its a Fun filled app.Toss the paper all over the place.But to earn points toss it into the bin.Easy but addictive.It will bring a smile on your face.Kewl app.Simple game.Noting much to tell more.

4) Nin Jump:
Its a very unique game.The Game looks simple but the obstacles which come on the path prevent you from advancing further.Frequent power ups makes the game more interesting.Perfect Timing also matters.One of the awesome game.Once you reach 6000,it is very difficult to advance.Full version has many cool themes.

3) Fruit Ninja:


One of the popular game available both in ipad,iphone,and android platforms.Slice all the vegetables and reach new scores.Slice fruits but not the bombs.Bombs frequently come and so be aware of it.Do combo slices and earn more points.Full Version offers more game modes while the free version has only classic mode.Superb Game indeed.

2) Jet Pack Joyride:

One of my favorite game.Many stuff to buy and new sectors make this game supppper.Tons of obstacles come in your way and it requires great skills to advance without crashing.Many power ups help you to score points.The Speed of the game picks up when you go beyond 3000.The everything will appear blur.You will lose if you blink.Tough but good and cool game.

1) Temple Run:

Ratings in ipad tell us how the game is .Over 9500+ people rated this game as 4+ and 5 stars.Awesome game.Words cant describe this game.THe best free version game ever.This game has no end.Tons of power ups and characters are also there.if you have an ipad,you must have this game.The game starts slowly but as you advance it turns into hell.You should use your fingers well.I bet you would like this game.

Saturday, February 11, 2012

The Remote Informer


##########################################################################
#                                                                        #
#                           The Remote Informer                          #
#                                                                        #
#------------------------------------------------------------------------#
#             Reader supported newsletter for the underworld             #
#------------------------------------------------------------------------#
#                                                                        #
#                    Editors: Tracker and Norman Bates                   #
#                                                                        #
#========================================================================#
# September 1987                                               Issue: 01 #
#========================================================================#
#                              The Headlines                             #
#------------------------------------------------------------------------#
#                     1) Introduction                                    #
#                     2) Hacking Sprint: The Easy Way                    #
#                     3) Rumors: Why spread them?                        #
#                     4) The New Sprint FON Calling Cards                #
#                     5) Automatic Number Identifier (ANI)               #
##########################################################################
         
                   Introduction
--------------------------------------------------------------------------
Welcome to the first issue of 'The Remote Informer'!  This newsletter
is reader supported.  If the readers of this newsletter do not help
support it, then it will end.  We are putting this out to help out the
ones that would like to read it.  If you are one of those who thinks they
know everything, then don't bother reading it.  This newsletter is not
anything like the future issues.  The future issues will contain several
sections, as long as reader input is obtained.  Below is an outline
overview of the sections in the future issues.

I/O Board (Input/Output Board)

The I/O Board is for questions you have, that we might be able to
answer or atleast refer you to someone or something.  We will be honest if
we cannot help you.  We will not make up something, or to the effect, just
to make it look like we answered you.  There will be a section in the I/O
Board for questions we cannot answer, and then the readers will have the
opportunity to answer it.  We will print anything that is reasonable in
the newsletter, even complaints if you feel like you are better than
everyone.

NewsCenter

This section will be for news around the underworld.  It will talk of
busts of people in the underworld and anything else that would be
considered news.  If you find articles in the paper, or something happens
in your local area, type it up, and upload it to one of the boards listed
at the end of the newsletter.  Your handle will be placed in the article.
If you do enter a news article, please state the date and from where you
got it.

Feature Section

The Feature Section will be the largest of the sections as it will be
on the topic that is featured in that issue.  This will be largely reader
input which will be sent in between issues.  At the end of the issue at
hand, it will tell the topic of the next issue, therefore, if you have
something to contribute, then you will have ample time to prepare your
article.

Hardware/Software Review
In this section, we will review the good and bad points of hardware
and software related to the underworld.  It will be an extensive review,
rather than just a small paragraph.

The Tops

This section will be the area where the top underworld BBS's, hacking
programs, modem scanners, etc. will be shown.  This will be reader
selected and will not be altered in anyway.  The topics are listed below.
Underworld BBS's (Hack, Phreak, Card, Anarchy, etc.)
Hacking programs for Hayes compatables
Hacking programs for 1030/Xm301 modems
Modem scanners for Hayes compatables
Modem scanners for 1030/Xm301 modems
Other type illegal programs
You may add topics to the list if enough will support it.

Tid Bits

This will contain tips and helpful information sent in by the users.
If you have any information you wish to contribute, then put it in a text
file and upload it to one of the BBS's listed at the end of the
newsletter.
Please, no long distance codes, mainframe passwords, etc.
We may add other sections as time goes by.  This newsletter will not
be put out on a regular basis.  It will be put out when we have enough
articles and information to put in it.  There may be up to 5 a month, but
there will always be at least one a month.  We would like you, the readers,
to send us anything you feel would be of interest to others, like hacking
hints, methods of hacking long distance companies, companies to card from,
etc.  We will maintain the newsletter as long as the readers support it.
That is the end of the introduction, but take a look at this newsletter,
as it does contain information that may be of value to you.
==========================================================================
                      Hacking Sprint: The Easy Way
-------------------------------------------------------------------------
                             By: Tracker

If you hack US Sprint, 950-0777 (by the way it is no longer GTE
Sprint), and you are fustrated at hacking several hours only to find one
or two codes, then follow these tips, and it will increase your results
tremendously.  First, one thing that Mr. Mojo proved is that Sprint will
not store more than one code in every hundred numbers.  (ex: 98765400 to
98765499 may contain only one code).   There may NOT be a code in that
hundred, but there will never be more than one.
Sprint's 9 digit codes are stored from 500000000 through 999999999.
In the beginning of Sprint's 950 port, they only had 8 digit codes.  Then
they started converting to 9 digit codes, storing all 8 digit codes
between 10000000 and 49999999 and all 9 digit codes between 500000000 and
999999999.  Sprint has since cancelled most 8 digit codes, although there
are a few left that have been denoted as test codes.  Occaisionally, I
hear of phreaks saying they have 8 digit codes, but when verifying them,
the codes were invalid.
Now, where do you start?  You have already narrowed the low and high
numbers in half, therefore already increasing your chances of good results
by 50 percent.  The next step is to find a good prefix to hack.  By the
way, a prefix, in hacking terms, is the first digits in a code that can be
any length except the same number of digits the code is.  (ex: 123456789
is a code.  That means 1, 12, 123, 1234, 12345, 123456, 1234567, and
12345678 are prefixes)  The way you find a good prefix to hack is to
manually enter a code prefix.  If when you enter the code prefix and a
valid destination number and you do not hear the ringing of the recording
telling you that the code is invalid until near the end of the number,
then you know the prefix is valid.  Here is a chart to follow when doing
this:
Code      - Destination    Range good codes exist
-------------------------------------------------
123456789 - 6192R           123400000 - 123499999
123456789 - 619267R         123450000 - 123459999
123456789 - 61926702R       123456000 - 123456999
123456789 - 6192670293R     123456700 - 123456799
-------------------------------------------------
( R - Denotes when ring for recording starts)
To prove
this true, I ran a test using OmniHack 1.3p, written by
Jolly Joe.  In this test I found a prefix where the last 3 digits were all
I had to hack.  I tested each hundred of the 6 digit prefix finding that
all but 4 had the ring start after the fourth digit was dialed in the
destination number.  The other four did not ring until I had finished the
entire code.  I set OmniHack to hack the prefix + 00 until prefix + 99.
(ex: xxxxxxy00 to xxxxxxy99: where y is one of the four numbers that the
ring did not start until the dialing was completed.)  Using this method, I
found four codes in a total of 241 attempts using ascending hacking (AKA:
Sequential).  Below you will see a record of my hack:
Range of hack            Codes found     Tries
----------------------------------------------
xxxxxx300 - xxxxxx399     xxxxxx350        50
xxxxxx500 - xxxxxx599     xxxxxx568        68
xxxxxx600 - xxxxxx699     xxxxxx646        46
xxxxxx800 - xxxxxx899     xxxxxx877        77
----------------------------------------------
Totals                     4 codes        241
As you see, these methods work.  Follow these guidlines and tips and
you should have an increase in production of codes in the future hacking
Sprint.  Also, if you have any hints/tips you think others could benefit
from, then type them up and upload them to one of the boards at the end of
the newsletter.
==========================================================================
                         Rumors: Why Spread Them?
--------------------------------------------------------------------------
                              By: Tracker
Do you ever get tired of hearing rumors?  You know, someone gets an
urge to impress others, so they create a rumor that some long distance
company is now using tracing equipment.  Why start rumors?  It only scares
others out of phreaking, and then makes you, the person who started the
rumor, look like Mr. Big.  This article is short, but it should make you
aware of the rumors that people spread for personal gain.  The best thing
to do is to denote them as a rumor starter and then leave it at that.  You
should not rag on them constantly, since if the other users cannot
determine if it is fact or rumor, then they should suffer the
consequences.
==========================================================================
                     The New Sprint FON Calling Cards
--------------------------------------------------------------------------
                               By: Tracker
US Sprint has opened up a new long distance network called the Fiber
Optic Network (FON), in which subscribers are given calling cards.  These
calling cards are 14 digits, and though, seem randomly generated, they are
actually encrypted.  The rumors floating around about people getting
caught using the Sprint FON calling cards are fact, not rumors.  The
reason people are getting caught is that they confuse the FON calling
cards with the local 950 port authorization codes.  If you will remember,
you never use AT&T calling cards from you home phone.  It has ANI
capability, which is not tracing, but rather the originating phone number
is placed on the bill as soon as the call is completed.  They know your
phone number when you call the 800 access port, but they do not record it
until your call is completed.  Also, through several of my hacks, I came
up with some interesting information surrounding the new Sprint network.
They are listed below.
800-877-0000
This number is for information on US Sprint's 800 calling card
service.  I have not played around with it, but I believe it is for
trouble or help with the FON calling cards.  I am not sure if it is for
subscribing to the FON network.
800-877-0002 - You hear a short tone, then nothing.
800-877-0003 - US Sprint Alpha Test Channel #1
800-877-(0004-0999)
When you call these numbers, you get a recording saying: "Welcome to
US Sprint's 1 plus service."  When the recording stops, if you hit the
pound key (#) you will get the calling card dial tone.
Other related Sprint numbers
800-521-4949   This is the number that you subscribe to US Sprint with.
You may also subscribe to the FON network on this number.  It will take 4
to 5 weeks for your calling card to arrive.
10777
This is US Sprint's equal access number.  When you dial this number,
you then dial the number you are calling, and it will be billed through US
Sprint, and you will receive their long distance line for that call.  Note
that you will be billed for calls made through equal access.  Do not
mistake it to be a method of phreaking, unless used from a remote
location.
If you are in US Sprint's 1+ service then call 1+700-555-1414, which
will tell you which long distance company you are using.  When you hear:
"Thank you for choosing US Sprint's 1 plus service," hit the pound key
(#), and then you will get the US Sprint dial tone.  This however is just
the same as if you are calling from your home phone if you dial direct, so
you would be billed for calls made through that, but there are ways to use
this to your advantage as in using equal access through a PBX.
==========================================================================
                   Automatic Number Identification (ANI)
--------------------------------------------------------------------------
                             By: Tracker

The true definition for Automatic Number Identification has not been
widely known to many.  Automatic Number Identification, (AKA: ANI), is the
process of the destination number knowing the originating number, which is
where you are calling from.  The method of achieving this is to send the
phone number that you are calling from in coded form ahead of the
destination number. Below is an example of this.
ANI Method
Dial: 267-0293
Sent: ********2670293
* - Denotes the originating number which is coded and sent before the
    number
As you noticed there are 8 digits in the coded number.  This is
because, at least I believe, it is stored in a binary-like form.
Automatic Number Identification means a limited future in phreaking. ANI
does not threaten phreaking very much yet, but it will in the near future.
A new switching system will soon be installed in most cities that are
covered by ESS, Electronic Switching System, now.
The system will have ANI capabilities which will be supplied to the
owners of phone lines as an›added extra.  The owner's phone will have
an LED read-out that will show the phone number of the people that
call you.  You will be able to block some numbers, so that people
cannot call you.  This system is in the testing stages currently, but will
soon be installed across most of the country.  As you see, this will
end a large part of phreaking, until we, the phreakers, can come up with
an alternative.  As I have been told by several, usually reliable,
people, this system is called ISS, which I am not sure of the meaning of
this, and is being tested currently in Rhode Island.
800 in-watts lines set up by AT&T support ANI.  The equipment to
decode an ANI coded origination number does not costs as much as you would
expect.  950 ports do not offer ANI capability, no matter what you have
been told.  The 950 ports will only give the city in which they are based,
this usually being the largest in the state, sometimes the capitol.
One last thing that I should tell you is that ANI is not related to
tracing.  Tracing can be done on any number whether local, 950, etc.  One
way around this, especially when dialing Alliance TeleConferencing, is to
dial through several extenders or ports.  ANI will only cover the number
that is calling it, and if you call through a number that does not support
ANI, then your number will never be known.
==========================================================================
                              The Disclaimer!
--------------------------------------------------------------------------

We, the editors, take no responsibility for your actions and use of
the information in this newsletter.  This newsletter is for informational
purposes only.  There will never be any long distance codes, passwords,
etc. in this newsletter.  If you are easily offended by telecommunication
discussions, then we suggest that you not read this newsletter.  But for
those who are truely interested in the information in this newsletter,
enjoy it.





A Guide to Hypnotism


A Guide to Hypnotism                    
      (Originally an Apple ][ file, forgive the uppercase!)

+-------------------+
! WHAT HYPNOTISM IS !
+-------------------+

HYPNOTISM, CONTRARY TO COMMON BELEIF, IS MERELY STATE WHEN YOUR MIND AND
BODY ARE IN A STATE OF RELAXATION AND YOUR MIND IS OPEN TO POSITIVE, OR
CLEVERLY WORDED NEGATIVE, INFLUENCES.  IT IS NOT A TRANCE WHERE YOU:
                  > ARE TOTALLY INFLUENCABLE.
                  > CANNOT LIE.
                  > A SLEEP WHICH YOU CANNOT WAKE UP FROM
                    WITHOUT HELP.
THIS MAY BRING DOWN YOUR HOPE SOMEWHAT, BUT, HYPNOTISM IS A POWERFUL FOR
SELF HELP, AND/OR MISCHEIF.

+-----------------------+
! YOUR SUBCONCIOUS MIND !
+-----------------------+

BEFORE GOING IN FURTHER, I'D LIKE TO STATE THAT HYPNOTISM NOT ONLY IS
GREAT IN THE WAY THAT IT RELAXES YOU AND GETS YOU (IN THE LONG RUN) WHAT
YOU WANT, BUT ALSO THAT IT TAPS A FORCE OF INCREDIBLE POWER, BELEIVE IT OR
NOT, THIS POWER IS YOUR SUBCONCIOUS MIND.
THE SUBCONCIOUS MIND ALWAYS KNOWS WHAT IS GOING ON WITH EVERY PART OF YOUR BODY,
EVERY MOMENT OF THE DAY.  IT PROTECTS YOU FROM NEGATIVE INFLUENCES,
AND RETAINS THE POWER TO SLOW YOUR HEARTBEAT DOWN AND STUFF LIKE THAT.
THE SUBCONCIOUS MIND HOLDS JUST ABOUT ALL THE INFO YOU WOULD LIKE TO KNOW
ABOUT YOURSELF, OR, IN THIS CASE, THE PERSON YOU WILL BE HYPNOTISING.
THERE ARE MANY WAYS TO TALK TO YOUR SUBCONCIOUS AND HAVE IT TALK BACK TO
YOU. ONE WAY IS THE OUJA BOARD, NO ITS NOT A SPIRIT, MERELY THE
MINDS OF THOSE WHO ARE USING IT.  ANOTHER, WHICH I WILL DISCUSS HERE,
IS THE PENDULUM METHOD.  OK, HERE IS HOW IT GOES.
FIRST, GET A RING OR A WASHER AND TIE IT TO A THREAD A LITTLE LONGER THAN
HALF OF YOUR FOREARM.  NOW, TAKE A SHEET OF PAPER AND DRAW A BIG CIRCLE IN
IT.  IN THE BIG CIRCLE YOU MUST NOW DRAW A CROSSHAIR (A BIG +).  NOW, PUT
THE SHEET OF PAPER ON A TABLE.  NEXT, HOLD THE THREAD WITH THE RING OR
WASHER ON IT AND PLACE IT (HOLDING THE THREAD SO THAT THE RING IS 1 INCH
ABOVE THE PAPER SWINGING) IN THE MIDDLE OF THE CROSSHAIR.  NOW, SWING
THE THREAD SO THE WASHER GOES UP AND DOWN, SAY TO YOURSELF THE WORD "YES"
NOW, DO IT SIDE TO SIDE AND SAY THE WORD "NO".
DO IT COUNTER CLOCKWISE AND SAY "I DON'T KNOW".
AND LASTLY, DO IT CLOCKWISE AND SAY "I DONT WANT TO SAY." NOW, WITH THE
THREAD BACK IN THE MIDDLE OF THE CROSSHAIR, ASK YOURSELF QUESTIONS AND
WAIT FOR THE PENDULUM TO SWING IN THE DIRECTION FOR THE ANSWER. (YES, NO,
I DONT KNOW OR I DONT WANNA SAY...). SOON, TO YOUR AMAZEMENT, IT WILL BE
ANSWERING QUESTIONS LIKE ANYTHING... LET THE PENDULUM ANSWER, DONT TRY..
WHEN YOU TRY YOU WILL NEVER GET AN ANSWER.  LET THE ANSWER COME TO YOU.

+-------------------------+
! HOW TO INDUCE HYPNOTISM !
+-------------------------+

NOW THAT YOU KNOW HOW TO TALK TO YOUR SUBCONCIOUS MIND, I WILL NOW TELL YOU
HOW TO GUIDE SOMEONE INTO HYPNOSIS. NOTE THAT I SAID GUIDE, YOU CAN NEVER,
HYNOTISE SOMEONE, THEY MUST BE WILLING. OK, THE SUBJECT MUST BE LYING OR
SITTING IN A COMFORTABLE POSITION, RELAXED, AND AT A TIME WHEN THINGS ARENT
GOING TO BE INTERRUPTED.
TELL THEM THE FOLLOWING OR SOMETHING CLOSE TO IT, IN A PEACEFUL, MONOTINOUS
TONE (NOT A COMMANDING TONE OF VOICE)

NOTE:  LIGHT A CANDLE AND PLACE IT SOMEWHERE WHERE IT CAN BE EASILY SEEN.

TAKE A DEEP BREATH THROUGH YOUR NOSE AND HOLD IT IN FOR A COUNT OF 8. NOW,
THROUGH YOUR MOUTH, EXHALE COMPLETELY AND SLOWLY. CONTINUED BREATHING LONG,
DEEP, BREATHS THROUGH YOUR NOSE AND EXHALING THROUGH YOUR MOUTH.  TENSE UP
ALL YOUR MUSCLES VERY TIGHT, NOW, COUNTING FROM TEN TO ONE, RELEASE THEM
SLOWLY, YOU WILL FIND THEM VERY RELAXED.  NOW, LOOK AT THE CANDLE, AS
YOU LOOK AT IT, WITH EVERY BREATH AND PASSING MOMEMENT, YOU ARE FEELING
INCREASINGLY MORE AND MORE PEACEFUL AND RELAXED.  THE CANDLES FLAME IS
PEACEFUL AND BRIGHT.
AS YOU LOOK AT IT I WILL COUNT FROM 100 DOWN, AS A COUNT, YOUR EYES WILL
BECOME MORE AND MORE RELAXED, GETTING MORE AND MORE TIRED WITH EACH
PASSING MOMENT."
NOW, COUNT DOWN FROM 100, ABOUT EVERY 10 NUMBERS SAY "WHEN I REACH XX YOUR
EYES (OR YOU WILL FIND YOUR EYES) ARE BECOMING MORE AND MORE TIRED."  TELL
THEM THEY MAY CLOSE THEIR EYES WHENEVER THEY FEEL LIKE IT.  IF THE PERSONS
EYES ARE STILL OPEN WHEN YOU GET TO 50 THEN INSTEAD OF SAYING
"YOUR EYES WILL.."
SAY "YOUR EYES ARE...".
WHEN THEIR EYES ARE SHUT SAY THE FOLLOWING. AS YOU LIE (OR SIT) HERE WITH
YOUR EYES COMFORTABLY CLOSE YOU FIND YOURSELF RELAXING MORE AND
MORE WITH EACH MOMENT AND BREATH.
THE RELAXATION FEELS PLEASANT AND BLISSFUL SO, YOU HAPPILY GIVE WAY TO
THIS WONDERFUL FEELING. IMAGINGE YOURSELF ON A CLOUD, RESTING PEACEFULLY,
WITH A SLIGHT BREEZE CARESSING YOUR BODY.  A TINGLING SENSASION BEGINS
TO WORK ITS WAY, WITHIN AND WITHOUT YOUR TOES, IT SLOWLY MOVES UP YOUR
FEET, MAKING THEM WARM, HEAVY AND RELAXED. THE CLOUD IS SOFT AND SUPPORTS
YOUR BODY WITH ITS SOFT TEXTURE, THE SCENE IS PEACEFUL AND ABSORBING,
THE PEACEFULNESS ABSORBS YOU COMPLETELY...
THE TINGLING GENTLY AND SLOWLY MOVES UP YOUR LEGS, RELAXING THEM.
MAKING THEM WARM AND HEAVY.  THE RELAXATION FEELS VERY GOOD, IT FEELS SO
GOOD TO RELAX AND LET GO. AS THE TINGLING CONTINUES ITS JOURNEY UP INTO
YOUR SOLAR PLEXUS, YOU FEEL YOUR INNER STOMACH BECOME VERY RELAXED.  NOW,
IT MOVES SLOWLY INTO YOUR CHEST, MAKING YOUR BREATHING RELAXED AS WELL.
THE FEELING BEGINS TO MOVE UP YOUR ARMS TO YOUR SHOULDERS, MAKING YOUR ARMS
HEAVY AND RELAXED AS WELL.  YOU ARE AWARE OF THE TOTAL RELAXATION YOU ARE
NOW EXPERIENCING, AND YOU GIVE WAY TO IT.  IT IS GOOD AND PEACEFUL, THE
TINGLING NOW MOVEVES INTO YOUR FACE AND HEAD, RELAXING YOUR JAWS, NECK, AND
FACIAL MUSCLES, MAKING YOUR CARES AND WORRIES FLOAT AWAY. AWAY INTO THE
BLUE SKY AS YOU REST BLISFUlLY ON THE CLOUD....
IF THEY ARE NOT RESPONSIVE OR YOU THINK THEY (HE OR SHE..) IS GOING TO
SLEEP, THEN ADD IN A "...ALWAYS CONCENTRATING UPON MY VOICE, INGORING ALL
OTHER SOUNDS.  EVEN THOUGH OTHER SOUNDS EXSIST, THEY AID YOU IN YOUR
RELAXATION..." THEY SHOULD SOON LET OUT A SIGH AS IF THEY WERE LETTING GO,
AND THEIR FACE SHOULD HAVE A "WOODENESS" TO IT, BECOMING FEATURLESS... NOW,
SAY THE FOLLOWING "....  YOU NOW FIND YOURSELF IN A HALLWAY, THE HALLWAY IS
PEACEFUL AND NICE. AS I COUNT FROM 10 TO 1 YOU WILL IMAGINE YOURSELF
WALKING FURTHER AND FURTHER DOWN THE HALL. WHEN I REACH ONE YOU WILL FIND
YOURSELF WHERE YOU WANT TO BE, IN ANOTHER, HIGHER STATE OF CONCIOUS AND
MIND. (COUNT FROM TEN TO ONE)....." DO THIS ABOUT THREE OR FOUR TIMES.
THEN, TO TEST IF THE SUBJECT IS UNDER HYPNOSIS OR NOT, SAY....
"...YOU FEEL A STRANGE SENSATION IN YOUR (ARM THEY WRITE WITH) ARM, THE
FEELING BEGINS AT YOUR FINGERS AND SLOWLY MOVES UP YOUR ARM, AS IT MOVES
THROUGH YOUR ARM YOUR ARM BECOMES LIGHTER AND LIGHTER, IT WILL SOON BE SO
LIGHT IT WILL .....  BECOMING LIGHTER AND LIGHTER WHICH EACH BREATH AND
MOMENT..."
THEIR FINGERS SHOULD BEGIN TO TWITCH AND THEN MOVE UP, THE ARM FOLLOWING,
NOW MY FRIEND, YOU HAVE HIM/HEP IN HYPNOSIS.  THE FIRST TIME YOU DO THIS,
WHILE HE/SHE IS UNDER SAY GOOD THINGS, LIKE:  "YOUR GOING TO FEEL GREAT
TOMORROW" OR "EVERY DAY IN EVERY WAY YOU WILL FIND YOURSELF BECOMING BETTER
AND BETTER".. OR SOME CRAP LIKE THAT... THE MORE THEY GO UNDER, THE DEEPER
IN HYPNOSIS THEY WILL GET EACH TIME YOU DO IT.

+----------------------------+
! WHAT TO DO WHEN HYPNOTISED !
+----------------------------+

WHEN YOU HAVE THEM UNDER YOU MUST WORD THINGS VERY CAREFULLY TO GET YOUR
WAY. YOU CANNOT SIMPLY SAY...  TAKE OFF YOUR CLOTHES AND FUCK THE PILLOW.
NO, THAT WOULD NOT REALLY DO THE TRICK. YOU MUST SAY SOMETHING LIKE....
"YOU FIND YOUR SELF AT HOME, IN YOUR ROOM AND YOU HAVE TO TAKE A SHOWER
(VIVIDLY DESCRIBE THEIR ROOM AND WHATS HAPPENING), YOU BEGIN TO TAKE OFF
YOUR CLOTHES..."  NOW, IT CANT BE THAT SIMPLE, YOU MUST KNOW THE PERSONS
HOUSE, ROOM, AND SHOWER ROOM. THEN DESCRIBE THINGS VIVIDLY AND TELL THEM
TO ACT IT OUT (THEY HAVE TO BE DEEPLY UNDER TO DO THIS...).  I WOULD JUST
SUGGEST THAT YOU EXPERIMENT A WHILE, AND GET TO KNOW HO; TO DO THINGS.

+-----------+
! WAKING UP !
+-----------+

WAKING UP IS VERY EASY, JUST SAY.. "...AS I COUNT FROM 1 TO 5 YOU WILL
FIND YOURSELF BECOMMING MORE AND MORE AWAKE, MORE AND MORE LIVELY.  WHEN
YOU WAKE UP YOU WILL FIND YOURSELF COMPLETELY ALIVE, AWAKE, AND REFRESHED.
MENTALLY AND PHYSICALLY, REMEMBERING THE PLEASANT SENSATION THAT HYPNOSIS
BRINGS...  WAKING UP FEELING LIKE A NEW BORN BABY, REBORN WITH LIFE AND
VIGOR, FEELING EXCELLENT. REMEMBERING THAT NEXT TIME YOU ENTER HYPNOSIS IT
WILL BECOME AN EVER INCREASING DEEPER AND DEEPER STATE THAN BEFORE.
1- YOU FEEL ENERGY COURSE THROUGHOUT YOUR LIMBS.
2- YOU BEGIN TO BREATHE DEEPLY, STIRRING.
3- BEGINING TO MOVE MORE AND MORE YOUR EYES OPEN, BRINGING YOU UP TO
FULL CONCIOUS.
4- YOU ARE UP,UP, UP AND AWAKENING MORE AND MORE.
5- YOU ARE AWAKE AND FEELING GREAT."

AND THATS IT!  YOU NOW KNOW HOW TO HYPNOTISE YOURSELF AND SOMEONE ELSE.
YOU WILL LEARN MORE AND MORE AS YOU EXPERIMENT.

                            --------------


Breaking Into Houses


Breaking Into Houses                          

Okay You Need:
1.  Tear Gas or Mace
2.  A BB/Pelet Gun
3.  An Ice Pick
4.  Thick Gloves

What You Do Is:

1.  Call the ###-#### of the house, or ring doorbell,  To find out if
    they're home.
2.  If they're not home then...
3.  Jump over the fence or walk through gate (whatever).
4.  If you see a dog give him the mace or tear gas.
5.  Put the gloves on!!!!!!!
6.  Shoot the BB gun slightly above the window locks.
7.  Push the ice-pick through the hole (made by the BB gun).
8.  Enter window.
9.  FIRST...Find the LIVING ROOM. (they're neat things there!).
10.  Then goto the Bed-room to get a pillow  case.  Put the goodies in
     the pillow case.
11.  Get out <-* FAST! -*>

Notes:   You should have certian targets worked out (like computers,
Radios, Ect.,Ect.).    Also <-* NEVER *-> Steal from your own
neigborhood. If you think they have an alarm...<-* FORGET IT! *->.

                 



Harmless Bombs


Harmless Bombs                                

To all those who do not wish to inflict bodily damage on their victims
but only terror.
These are weapons that should be used from high places.
1) The flour bomb.
Take a wet paper towel and pour a given amount of baking flour in
the center. Then wrap it up and put on a rubber band to keep it
together. When thrown it will fly well but when it hits, it covers
the victim with the flower or causes a big puff of flour which will
put the victim in terror since as far as they are concerned, some
strange white powder is all over them. This is a cheap method of
terror and for only the cost of a roll of paper towels and a bag of
flour you and your friends can have loads of fun watching people
flee in panic.
2) Smoke bomb projectile.
All you need is a bunch of those little round smoke bombs and a
wrist rocket or any sling-shot. Shoot the smoke bombs and watch the
terror since they think it will blow up!
3) Rotten eggs (good ones)
Take some eggs and get a sharp needle
and poke a small hole in the top of each one.
Then let them sit in a warm place for about a week. Then you've got a
bunch of rotten eggs that will only smell when they hit.
4) Glow in the dark terror.
Take one of those tubes of glow in the dark stuff and pour the
stuff on whatever you want to throw and when it gets on the victim,
they think it's some deadly chemical or a radioactive substance so
they run in total panic. This works especially well with flower
bombs since a gummy, glowing substance gets all over the victim.
5) Fizzling panic.
Take a baggie of a water-baking soda solution and seal it. (Make
sure there is no air in it since the solution will form a gas and
you don't want it to pop on you.) Then put it in a bigger plastic
bag and fill it with vinegar and seal it. When thrown, the two
substances will mix and cause a violently bubbling substance to go
all over the victim.
Updated-'94
                       




The Basics of Hacking II


The Basics of Hacking II            

Basics to know before doing anything, essential to your continuing
career as one of the elite in the country...  This article, "the
introduction to the world of hacking" is meant to help you by telling you
how not to get caught, what not to do on a computer system, what type of
equipment should I know about now, and just a little on the history, past
present future, of the hacker.

Welcome to the world of hacking! We, the people who live outside of the
normal rules, and have been scorned and even arrested by those from the
'civilized world', are becomming scarcer every day.  This is due to the
greater fear of what a good hacker (skill wise, no moral judgements
here)|can do nowadays, thus causing anti- hacker sentiment in the masses.
Also, few hackers seem to actually know about the computer systems they
hack, or what equipment they will run into on the front end, or what they
could do wrong on a system to alert the 'higher' authorities who monitor
the system. This article is intended to tell you about some things not to
do, even before you get on the system.  I will tell you about the new wave
of front end security devices that are beginning to be used on computers.
I will attempt to instill in you a second identity, to be brought up at
time of great need, to pull you out of trouble. And, by the way, I take no, repeat,
no, responcibility for what we say in this and the forthcoming articles.
Enough of the bullshit, on to the fun: after logging on your favorite bbs,
you see on the high access board a phone number!  It says it's a great
system to "fuck around with!" This may be true, but how many other people
are going to call the same number?  So:  try to avoid calling a number
given to the public. This is because there are at least every other
user calling, and how many other boards will that number spread to?
If you call a number far, far away, and you plan on going thru an
extender or a re-seller, don't keep calling the same access number
(I.E. As you would if you had a hacker running), this looks very suspicious
and can make life miserable when the phone bill comes in the mail.
Most cities have a variety of access numbers and services,
so use as many as you can. Never trust a change in the system...
The 414's, the assholes, were caught for this reason: when one of them
connected to the system, there was nothing good there.  The next time,
there was a trek game stuck right in their way!  They proceded to play said
game for two, say two and a half hours, while telenet was tracing them!
Nice job, don't you think?  If anything looks suspicious, drop the line
immediately!!  As in, yesterday!! The point we're trying to get accross is:
if you use a little common sence, you won't get busted.  Let the little
kids who aren't smart enough to recognize a trap get busted, it will take
the heat off of the real hackers. Now, let's say you get on a computer
system...  It looks great, checks out, everything seems fine.
Ok, now is when it gets more dangerous.  You have to know the computer
system to know what not to do.
Basically, keep away from any command something, copy a new file into the
account, or whatever!  Always leave the account in the same status you
logged in with.  Change *nothing*... If it isn't an account with priv's,
then don't try any commands that require them! All, yes all, systems are
going to be keeping log files of what users are doing, and that will
show up.  It is just like dropping a trouble-card in an ESS system,
after sending that nice operator a pretty tone.
Spend no excessive amounts of time on the account in one stretch.
Keep your calling to the very late night ifpossible, or during
business hours (believe it or not!).  It so happens
that there are more users on during business hours, and it is very
difficult to read a log file with 60 users doing many commnds every minute.
Try to avoid systems where everyone knows each other, don't try to bluff.
And above all:  never act like you own the system, or are the best there
is. They always grab the people who's heads swell... There is some very
interesting front end equipment around nowadays, but first let's
define terms... By front end, we mean any device that you must
pass thru to get at the real computer. There are devices that are made to
defeat hacker programs, and just plain old multiplexers.
To defeat hacker programs, there are now devices that pick up the phone
and just sit there...  This means that your device gets no carrier,
thus you think there isn't a computer on the other end.  The
only way around it is to detect when it was picked up.  If it pickes up
after the same number ring, then you know it is a hacker-defeater.
These devices take a multi-digit code to let you into the system.
Some are, in fact, quite sophisticated to the point where it
will also limit the user name's down, so only one name or set of names
can be valid logins after they input the code... Other devices input a
number code, and then they dial back a pre-programmed number for that code.
These systems are best to leave alone,
because they know someone is playing with their phone.  You may think "but
i'll just reprogram the dial-back." Think again, how stupid that is...
Then they have your number, or a test loop if you were just a little
smarter. If it's your number, they have your balls (if male...),
If its a loop, then you are screwed again, since those loops
are *monitored*. As for multiplexers...  What a plexer is supposed
to do is this:
The system can accept multiple users. We have to time share, so we'll let
the front-end processor do it...  Well, this is what a multiplexer does.
Usually they will ask for something like "enter class" or "line:".  Usually
it is programmed for a double digit number, or a four to five letter word.
There are usually a few sets of numbers it accepts, but those numbers also
set your 300/1200/2400 baud data type.
These multiplexers are inconvenient at best, so not to worry. A little
about the history of hacking: hacking, by my definition, means a great
knowledge of some special area. Doctors and lawyers
are hackers of a sort, by this definition.  But most often, it is
being used in the computer context, and thus we have a definition of
"anyone who has a great amount of computer or telecommunications
knowledge."  You are not a hacker because you have a list of codes...
Hacking, by my definition, has then been around only about 15 years.
It started, where else but, mit and colleges where they had computer
science or electrical engineering departments.
Hackers have created some of the best computer languages, the
most awesome operating systems, and even gone on to make millions.
Hacking used to have a good name, when we could honestly say
"we know what we are doing".  Now it means (in the public eye):
the 414's, ron austin, the nasa hackers, the arpanet hackers...
All the people who have been caught,
have done damage, and are now going to have to face fines and sentences.
Thus we come past the moralistic crap, and to our purpose:  educate the
hacker community, return to the days when people actually knew something...




Hacking Tutorial


Hacking Tutorial                    

What is hacking?
----------------
According to popular belief the term hacker and hacking was founded at mit
it comes from the root of a hack writer,someone who keeps "hacking" at
the typewriter until he finishes the story.a computer hacker would be
hacking at the keyboard or password works.

What you need:
--------------
To hack you need a computer equipped with a modem (a device that lets you
transmit data over phone lines) which should cost you from $100 to $1200.

How do you hack?
----------------
Hacking recuires two things:
1. The phone number
2. Answer to identity elements

How do you find the phone #?
----------------------------
There are three basic ways to find a computers phone number.
1. Scanning,
2. Directory
3. Inside info.

What is scanning?
-----------------
Scanning is the process of having a computer search for a carrier tone.
For example,the computer would start at (800) 111-1111 and wait for carrier
if there is none it will go on to 111-1112 etc.if there is a carrier it
will record it for future use and continue looking for more.

What is directory assictance?
-----------------------------
This way can only be used if you know where your target computer is. For this
example say it is in menlo park, CA and the company name is sri.

1. Dial 411 (or 415-555-1212)
2. Say "Menlo park"
3. Say "Sri"
4. Write down number
5. Ask if there are any more numbers
6. If so write them down.
7. Hang up on operator
8. Dial all numbers you were given
9. Listen fir carrier tone
10. If you hear carrier tone write down number, call it on your modem and your
    set to hack!
                       



Portable Grenade Launcher


Portable Grenade Launcher                    

If you have a bow, this one is for you. Remove the ferrule from an
aluminum arrow, and fill the arrow with black powder (I use grade
FFFF, it burns easy)and then glue a shotshell primer into the hole
left where the ferrule went. Next, glue a BB on the primer, and you
are ready to go! Make sure no one is nearby.... Little shreds of
aluminum go all over the place!!
                                   




Green Box Plans


Green Box Plans                              
Paying the initial rate in order to use a red box (on certain
fortresses) left a sour taste in many red boxers mouths, thus the
green box was invented. The green box generates useful tones such as
COIN COLLECT, COIN RETURN, AND RINGBACK. These are the tones that
ACTS or the TSPS operator would send to the CO when appropriate.
Unfortunately, the green box cannot be used at the fortress station but
must be used by the CALLED party.

Here are the tones:
COIN COLLECT     700+1100hz
COIN RETURN      1100+1700hz
RINGBACK         700+1700hz

Before the called party sends any of these tones, an operator realease
signal should be sent to alert the MF detectors at the CO.
This can be done by sending 900hz + 1500hz or a single 2600 wink (90 ms.)
Also do not forget that the initial rate is collected shortly before the
3 minute period is up. Incidentally, once the above MF
tones for collecting and returning coins reach the CO, they are
converted into an appropriate DC pulse (-130 volts for return and
+130 for collect). This pulse is then sent down the tip to the
fortress. This causes the coin relay to either return or collect the coins.
The alledged "T-network" takes advantage of this information.
When a pulse for coin collect (+130 VDC) is sent down the line,
it must be grounded somewhere. This is usually the yellow or black wire.
Thus, if the wires are exposed, these wires can be cut to prevent
the pulse from being grounded. When the three minute initial
period is almost up, make sure that the black and yellow wires are
severed, then hang up, wait about 15 seconds in case of a second
pulse, reconnect the wires, pick up the phone, and if all goes well,
it should be "JACKPOT" time.
                             


Generic Bomb


Generic Bomb                                  

1) Aquire a glass container
2) Put in a few drops of gasoline
3) Cap the top
4) Now turn the container around to coat the inner surfaces and then
evaporates
5) Add a few drops of potassium permanganate (<-Get this stuff from a
snake bite kit)
6) The bomb is detonated by throwing aganist a solid object.
*AFTER THROWING THIS THING RUN LIKE HELL THIS THING PACKS ABOUT 1/2
STICK OF DYNAMITE*

                           

Fuse Ignition Bomb


Fuse Ignition Bomb                        

A four strand homemade fuse is used for this. It burns like fury.
It is held down and concealed by a strip of bent tin cut from a can.
The exposed end of the fuse is dipped into the flare igniter. To use
this one, you light the fuse and hold the fire bomb until the fuse has
burned out of sight under the tin. Then throw it and when it breaks,
the burning fuse will ignite the contents.

                                 



Firebombs


Firebombs                                      

Most fire bombs are simply gasoline filled bottles with a fuel
soaked rag in the mouth (the bottle's mouth, not yours). The original
Molotov cocktail, and still about the best, was a mixture of one part
gasoline and one part motor oil. The oil helps it to cling to what it
splatters on.
Some use one part roofing tar and one part gasoline. Fire bombs
have been found which were made by pouring melted wax into gasoline.
             


Breaking into BBS Express


Breaking into BBS Express          

If you have high enough access on any BBS Express BBS you can get the
Sysop's password without any problems and be able to log on as him and do
whatever you like. Download the Pass file, delete the whole BBS, anything.
Its all a matter of uploading a text file and d/ling it from the BBS. You
must have high enough access to see new uploads to do this. If you can see
a file you just uploaded you have the ability to break into the BBS in a
few easy steps.
Why am I telling everyone this when I run BBS Express myself?
Well there is one way to stop this from happening and I want other Sysops
to be aware of it and not have it happen to them.
Breaking in is all based on the MENU function of BBS Express. Express
will let you create a menu to display different text files by putting the
word MENU at the top of any text file and stating what files are to be
displayed. But due to a major screw up by Mr. Ledbetter you can use this
MENU option to display the USERLOG and the Sysop's Passwords or anything
else you like. I will show you how to get the Sysop's pass and therefore
log on as the Sysop. BBs Express Sysop's have 2 passwords. One like
everyone else gets in the form of X1XXX, and a Secondary password
to make it harder to hack out the Sysops pass.
The Secondary pass is found in a file called SYSDATA.DAT.
This file must be on drive 1 and is therefore easy to get. All you have to
do is upload this simple Text file:

MENU
1
D1:SYSDATA.DAT

Ripoff time!

after you upload this file you d/l it non-Xmodem. Stupid Express thinks
it is displaying a menu and you will see this:

Ripoff time!

Selection [0]:

Just hit 1 and Express will display the SYSDATA.DAT file.OPPASS is where
the Sysop's Secondary pass will be. D1:USERLOG.DAT is where you will find
the name and Drive number of the USERLOG.DAT file. The Sysop might have
renamed this file or put it in a Subdirectory or even on a different
drive. I Will Assume he left it as D1:USERLOG.DAT. The other parts of this
file tell you where the .HLP screens are and where the LOG is saved and
all the Download path names.

Now to get the Sysop's primary pass you upload a text file like this:

MENU
1
D1:USERLOG.DAT

Breaking into Bedwetter's BBS

Again you then d/l this file non-Xmodem and you will see:

Breaking into Bedwetter's BBS

Selection [0]:

You then hit 1 and the long USERLOG.DAT file comes flying at you.
The Sysop is the first entry in this very long file so it is easy. You will
see:

SYSOP'S NAME        X1XXX
You should now have his 2 passwords.

There is only one easy way out of this that I can think of, and that is
to make all new uploads go to SYSOP level (Level 9) access only. This way
nobody can pull off what I just explained.
I feel this is a major Bug on Mr. Ledbetter's part. I just don't know why
no one had thought of it before. I would like to give credit to
Redline for the message he left on Modem Hell telling about this problem,
and also to Unka for his ideas and input about correcting it.


Auto Exhaust Flame Thrower


Auto Exhaust Flame Thrower                    

For this one, all you need is a car, a sparkplug, ignition wire and a
switch. Install the spark plug into the last four or five inches of
the tailpipeby drilling a hole that the plug can screw into easily.
Attach the wire (this is regular insulated wire) to one side of the
switch and to the spark plug. The other side of the switch is attached
to the positive terminal on the battery. With the car running, simply
hit the switch and watch the flames fly!!! Again be careful that no
one is behind you! I have seen some of these flames go 20 feet!!!

                 



How to Make Dynamite


How to Make Dynamite                        

Dynamite is nothing more than just nitroglycerin and a stablizing
agent to make it much safer to use.  For the sake of saving time, I
will abbreviate nitroglycerin with a plain NG.  The numbers
are percentages, be sure to mix these carefully and be sure to use the
exact amounts.  These percentages are in weight ratio, not volume.

no.  ingredients                 amount
---------------------------------------
#1   NG                          32
     sodium nitrate              28
     woodmeal                    10
     ammonium oxalate            29
     guncotten                    1
#2   NG                          24
     potassium nitrate            9
     sodium nitate               56
     woodmeal                     9
     ammonium oxalate             2
#3   NG                          35.5
     potassium nitrate           44.5
     woodmeal                     6
     guncotton                    2.5
     vaseline                     5.5
     powdered charcoal            6
#4   NG                          25
     potassium nitrate           26
     woodmeal                    34
     barium nitrate               5
     starch                      10
#5   NG                          57
     potassium nitrate           19
     woodmeal                     9
     ammonium oxalate            12
     guncotton                    3
#6   NG                          18
     sodium nitrate              70
     woodmeal                     5.5
     potassium chloride           4.5
     chalk                        2
#7   NG                          26
     woodmeal                    40
     barium nitrate              32
     sodium carbonate             2
#8   NG                          44
     woodmeal                    12
     anhydrous sodium sulfate    44
#9   NG                          24
     potassium nitrate           32.5
     woodmeal                    33.5
     ammonium oxalate            10
#10  NG                          26
     potassium nitrate           33
     woodmeal                    41
#11  NG                          15
     sodium nitrate              62.9
     woodmeal                    21.2
     sodium carbonate              .9
#12  NG                          35
     sodium nitrate              27
     woodmeal                    10
     ammonium oxalate             1
#13  NG                          32
     potassium nitrate           27
     woodmeal                    10
     ammonium oxalate            30
     guncotton                    1
#14  NG                          33
     woodmeal                    10.3
     ammonium oxalate            29
     guncotton                     .7
     potassium perchloride       27
#15  NG                          40
     sodium nitrate              45
     woodmeal                    15
#16  NG                          47
     starch                      50
     guncotton                    3
#17  NG                          30
     sodium nitrate              22.3
     woodmeal                    40.5
     potassium chloride           7.2
#18  NG                          50
     sodium nitrate              32.6
     woodmeal                    17
     ammonium oxalate              .4
#19  NG                          23
     potassium nitrate           27.5
     woodmeal                    37
     ammonium oxalate             8
     barium nitrate               4
     calcium carbonate             .5

Household equivalants for chemicles

It has come to my attention that many of these chemicles are
sold under brand names, or have household equivalants.  here is a list
that might help you out. Also, see elsewhere in this Cookbook for
a more complete listing............

acetic acid                vinegar
aluminum oxide             alumia
aluminum potassium sulfate alum
aluminum sulfate           alum
ammonium hydroxide         ammonia
carbon carbonate           chalk
calcium hypochloride       bleaching powder
calcium oxide              lime
calcium sulfate            plaster of paris
carbonic acid              seltzer
carbon tetrachloride       cleaning fluid
ethylene dichloride        Dutch fluid
ferric oxide               iron rust
glucose                    corn syrup
graphite                   pencil lead
hydrochloric acid          muriatic acid
hydrogen peroxide          peroxide
lead acetate               sugar of lead
lead tetrooxide            red lead
magnesium silicate         talc
magnesium sulfate          Epsom salts
naphthalene                mothballs
phenol                     carbolic acid
potassium bicarbonate      cream of tartar
potassium chromium sulf.   chrome alum
potassium nitrate          saltpeter
sodium dioxide             sand
sodium bicarbonate         baking soda
sodium borate              borax
sodium carbonate           washing soda
sodium chloride            salt
sodium hydroxide           lye
sodium silicate            water glass
sodium sulfate             glauber's salt
sodium thiosulfate         photographer's hypo
sulferic acid              battery acid
sucrose                    cane sugar
zinc chloride              tinner's fluid

Keep this list handy at all times. If you can't seem to get one
or more of the ingredients try another one.  If you still can't, you
can always buy small amounts from your school, or maybe from various
chemical companies.  When you do that, be sure to say as little as
possible, if during the school year, and they ask, say it's for a
experiment for school.
                 



Electronic Terrorism


Electronic Terrorism                        

It starts when a big, dumb lummox rudely insults you.  Being of a
rational, intelligent disposition, you wisely choose to avoid a
(direct) confrontation.  But as he laughs in your face, you smile
inwardly---your revenge is already planned.
Step 1:  follow your victim to his locker, car, or house.  Once you
have chosen your target site, lay low for a week or more,
letting your anger boil.
Step 2:  in the mean time, assemble your versatile terrorist
kit(details below.)
Step 3:  plant your kit at the designated target site on a monday
morning between the hours of 4:00 am and 6:00 am.  Include a
calm, suggestive note that quietly hints at the possibility
of another attack.  Do not write it by hand!  An example of
an effective note:
  "don't be such a jerk, or the next one will take off your
   hand.  Have a nice day."
Notice how the calm tone instills fear.  As if written by a
homicidal psychopath.
Step 5:  choose a strategic location overlooking the target site.  Try
to position yourself in such a way that you can see his facial contortions.
Step 6:  sit back and enjoy the fireworks! Assembly of the versatile,
economic, and effective terrorist kit #1: the parts you'll need are:
1) 4 aa batteries
2) 1 9-volt battery
3) 1 spdt mini relay (radio shack)
4) 1 rocket engine(smoke bomb or m-80)
5) 1 solar ignitor (any hobby store)
6) 1 9-volt battery connector


Step 1:  take the 9-volt battery and wire it through the relay's coil.
This circuit should also include a pair of contacts that when
separated cut off this circuit.  These contacts should be held together
by trapping them between the locker,mailbox, or car door.
Once the door is opened, the contacts fall apart and the 9-volt circuit
is broken, allowing the relay to fall to the closed postion
thus closing the ignition circuit. (If all this is confusing take a
look at the schematic below.)

Step 2:  take the 4 aa batteries and wire them in succession.
Wire the positive terminal of one to the negative terminal of another,
until all four are connected except one positive terminal and one negative
terminal.  Even though the four aa batteries only combine to create 6
volts, the increase in amperage is necessary to activate the solar
ignitor quickly and effectively.

Step 3:  take the battery pack (made in step 2) and wire one end of it
to the relay's single pole and the other end to one prong of the solar
ignitor.  Then wire the other prong of the solar ignitor back to the open
position on the relay.

Step 4:  using double sided carpet tape mount the kit in his locker,
mailbox, or car door. And last, insert the solar ignitor into the
rocket engine (smoke bomb or m-80).



Your kit is now complete!
     
        ---------><---------
        I    (CONTACTS)    I
        I                  I
        I                  -  (BATTERY)
        I                 ---
        I                  I
        I      (COIL)      I
        ------///////-------
          /-----------
         /           I
        /            I
       /             I
   (SWITCH) I        I
            I        I
            I       --- (BATTERY)
            I        -  ( PACK  )
            I       ---
            I        I
            I        I
            ---- -----
               I I
                *
         (SOLAR IGNITOR)




Friday, February 10, 2012

Ripping off Change Machines


Ripping off Change Machines                    

Have you ever seen one of those really big changer machines in airports
laundrymats or arcades that dispense change when you put in your 1 or 5
dollar bill?  Well then, here is an article for you.

1)  Find the type of change machine that you slide in your bill length
wise, not the type where you put the bill in a tray and then slide the
tray in!!!
2)  After finding the right machine, get a $1 or $5 bill.  Start crumpling
up into a ball.  Then smooth out the bill, now it should have a very wrinkly
surface.
3) Now the hard part.  You must tear a notch in the bill on the
left side about 1/2 inch below the little 1 dollar symbol (See Figure).
4) If you have done all of this right then take the bill and go out the
machine.  Put the bill in the machine and wait.  What should happen is:
when you put your bill in the machine it thinks everything is fine.
When it gets to the part of the bill with the notch cut out, the
machine will reject the bill and (if you have done it right)
give you the change at the same time!!! So, you end up getting your bill
back, plus the change!!  It might take a little practice, but once
you get the hang of it, you can get a lot of money!
                  !--------------------------------!            
                  !                                !
                  ! (1)         /-------\      (1) !
                  !             !       !          !
                  !             !  Pic. !          !
                  ! (1)  /\     \-------/      (1) !
                  !      !!                        !      
                  !-----/  \-----------------------!
                          \-------Make notch here. About 1/2 " down from (1)

P.S. Sorry for the "text work" but you should be able to get the
idea. Have fun!!!



Calcium Carbide Bomb


Calcium Carbide Bomb                      

This is EXTREMELY DANGEROUS. Exercise extreme caution.... Obtain some
calcium carbide. This is the stuff that is used in carbide lamps and
can be found at nearly any hardware store. Take a few pieces of this
stuff (it looks like gravel) and put it in a glass jar with some
water. Put a lid on tightly. The carbide will react with the water to
produce acetylene carbonate which is similar to the gas used in
cutting torches. Eventually the glass with explode from internal
pressure. If you leave a burning rag nearby, you will get a nice
fireball!
                       


Share it