Your browser does not seem to support CSS. If images appear below, please disregard them.
Business based articles.
Articles on the topic of Electronics.
Articles on Gaming.
Articles geared towards teaching you how to preform tasks.
Articles on the Linux or Unix Operating Systems.
Mac
Articles on the Mac Operating Systems.
Miscellaneous articles
Articles on Mobile Computing.
Information which is a great read, but not current.
Technology based articles.
Articles delving into telecommunications systems.
Articles on Web Development & Coding.
Articles on the Windows Operating System.
▼ Sponsored Links ▼
▲ Sponsored Links ▲

The 20 Latest Articles

How to Build a 3-Way Phone
Step by Step 1) You will need two different lines for this. okay first take off both of the boxes covering the wires 2) Take the green and red from each box and attach a wire to each of these one wir
The Poor Man's 2600 Hertz
Hey all you phreakers! Bet you didn't know about this! It's The Poor Man's 2600 Hertz!! What the hell could I be talking about!?!? Well, let's say you're really hard up (not in your usual sense, this
alt.locksmithing FAQ
Put together from postings by [email protected] (Joe Spike Ilacqua), and [email protected] (Henry Schaffer), with a major data collection effort by [email protected] (Scott Anguish). Edited by hes. Tr
Free vending machine goods
We all know those snack machines, coin machines, soda machines that allow dollar bills to be excepted. Here is a quick and easy way get all of those items for free and sometimes also making money at t
The Art of Lock Picking: Lockpicking II
So you want to be a criminal. Well, if you want to be like James Bond and open a lock in fifteen seconds, then go to Hollywood, because that is the only place you are ever going to do it. Even experie
The Art of Lock Picking: Lockpicking I: Cars and Assorted Other Locks
Lockpicking I: Cars and Assorted Other Locks While the basic themes of lockpicking and uninvited entry have not changed much in the last few years, some modern devices and techniques have appeared on
Using a Wired XBox 360 Controller as a Mouse in Windows
Using a Wired XBox 360 Controller as a Mouse in Windows What You'll Need: 1. A Wired XBox 360 Controller 2. Drivers from Microsoft (Should be automatically downloaded from Windows Update when you plug
VMS Managers Manual
VMS System Managers Manual ORDER NUMBER AA-LA00A-TE Typed in by: Guardian Of Time This Manual provides the basic concepts and procedures for VMS system management; it is especially inteded for manager
VAXs
A profile on vax's, compiled by blind justice and dr. Insanity ------------------------------------[basicinfo]--------------------------------- Vax systems are almost always unix based. There are seve
The Basics of Hacking II: Vax's Unix
Unix is a trademark of bell labs (and you know what that means) Welcome to the basics of hacking ii: vax's and unix. In this article, we discuss the unix system that runs on the various vax systems. I
VAX-VMS Accounts
Accounts to try if you wanna enter into a VAX/VMS ::::::::::::::::::::::::::::::::::::::::::::::::: Of course you can recognize a VAX when after the connection is made u listen to a BEEP and u see som
VAX Computer Systems
What's Hacking? A series by David Lightman SPECIAL ISSUE VAX COMPUTER SYSTEMS This is a requested discussion from Jolly Bardsman's Pub Tavern at (XXX) XXX-XXXX. If you have any requests, send me mail
VAX Computer Systems 1-7
What's Hacking? A series by David Lightman SPECIAL ISSUE VAX COMPUTER SYSTEMS This is a requested discussion from Jolly Bardsman's Pub Tavern at (XXX) XXX-XXXX. If you have any requests, send me mail
VAX VMS hacking
The following text file is to be used when hacking the VAXVVMS systems. I recommend hacking these systems cause they always have good shit to mess up. Most VAXVVMS systems are easily found at colleges
VAX VMS Authorize Utility
Using the VAX/VMS Authorize Utility Written by Line Shadow on 09/10/88 A Telecom Computer Security Bulletin File Volume One, Number 1, File 9 of 12 ----------------------------------------------------
Tron Box
------------------R-----F---- I I I I I I I I- (C) (C) (C) I I I I- I I I I ----------------------------- (C)=CAPACITOR F =FUSE R =RESISTOR I,- ARE WIRE PARTS LIST: (3) ELECTROLYTIC CAPACITORS RATED A
Translation Directory
The Legion of Doom/Legion of Hackers Presents 1-800-NNX Translation Directory January 1, 1989 ******************************************************************************* This list was obtained dir
The making of a hacker
The Making Of A Hacker by Framstag of West Germany June 2, 1989 Prologue For None VMS Users DECnet is the network for DEC machines, in most cases you can say VAXes. DECnet allows you to do: - e-mail -
The Remote Newsletter Vol. 2
The Remote Informer Editors: Tracker, Norman Bates, and Ye Cap'n September 26, 1987 Issue: 02 Brought to you by the 'new' TUFF: The Underground Fone Federation ----------------------------------------
The Remote Newsletter Vol. 5
The Remote Informer Newsletter! November TRI Issue: 05 The Editors: Tracker, Ye Cap'n, Norman Bates, and The Reporter = ATT Rates = WASHINGTON -- American Telephone Telegraph Co. proposed Tuesday to
▼ Sponsored Links ▼
▲ Sponsored Links ▲
For the best viewing experience please update your browser to Chrome, Firefox, or Opera