Archive for May, 2006|Monthly archive page

How to “Unlock” Mobile Phones

In GSM, Hacking on May 30, 2006 at 12:42 pm

Most mobile phone handsets are “locked” to a particular network. That is, they are programmed only to work with the sim card they were originaly sold with. This can be frustratin if you wish to change your service provider! Of course, there are many retail outlets who can “unlock” your handset to accept all sim cards for a fee. But it is usually cheaper (and more useful) to be able to do this for yourelf!
Read the rest of this entry »


Police Stop and Search-Know Your Rights!

In Information, Privacy on May 29, 2006 at 12:37 pm

Over the past couple of years in the UK, laws have been introduced which allow the Police to stop and search anyone in a public place if they believe there is good reason to do so. They can also search your car, wether or not you are in it! Many believe this is a huge invasion of privacy and civil rights. The police and government state that it is in the interests of national security.
Read the rest of this entry »

How to deface websites-the legal way!

In Hacking on May 28, 2006 at 1:02 pm

Here’s a little trick you could try to impress your friends and convince them that you are a super hacker! Okay, so it doesn’t actually involve defacing a real website, but tricks the computer you are using into thinking that you have.
Read the rest of this entry »

Nokia “stealth” phones revealed

In GSM, Information on May 20, 2006 at 8:45 pm

Recently there have been a number of “Stealth” or “Spy” mobile phones coming on to the market which can (allegedly) be used to intercept calls and SMS. Readers of my blog may recall my recent post, Intercepting SMS/Text Messages in which I discussed a few of the possibilities for such use. After a bit more research into the subject, I can now detail more information on these “Stealth phones” and their uses.
Read the rest of this entry »

How to Deal With Phishing Emails

In Privacy, Security on May 18, 2006 at 1:16 pm

Recently a Phishing email somehow slipped through the net and landed in my inbox. Usually I would just ignore and delete them, but this one was particularly devious and would have tricked someone less vigilant into handing over their peronal details to a thief.
Read the rest of this entry »

Create Ninja Text!

In General, Internet on May 17, 2006 at 12:56 pm

Create your own Ninja Text on Fodey.com!

Here’s one I made earlier…


How to Turn Your Mobile Phone into a Covert Listening Device

In Espionage, GSM, Uncategorized on May 15, 2006 at 10:35 am

You may have heard of Nokia Spy Phones (or “Stealth” phones as they are sometimes known). Here are some examples. So how would you like to turn your own phone into a covert listening device? Here’s how&#8230.
Read the rest of this entry »

Intercepting SMS/Text messages

In GSM, Privacy on May 12, 2006 at 8:37 pm

I recently came across a company which claims to be able to provide a service to intercept text mesages from a specified number and pass on the details to a subscriber’s handset:
Read the rest of this entry »

Elevator/lift hacking

In General, Information on May 8, 2006 at 8:42 pm

Here are a few different tricks you can try the next time you are in an elevator/lift and are in a hurry!
Read the rest of this entry »

Kunoichi’s guide to increasing your blog traffic

In Blogging, Information on May 8, 2006 at 8:06 pm

Most bloggers want their blogs to attract as many visitors as possible. As a relatively new blogger (five months now) I realise the need to promote my blog(s) effectively in order to increase traffic to my site. So after some hard research, I have compiled this guide to help other bloggers achieve better statistics
Read the rest of this entry »