|
|
|
|
wifi pineapple + phone with hotspot = mobile hack server for walking around meijer hijacking connections |
|
|
|
|
cauz |
April 5, 2017, 7 p.m. |
|
|
|
Charles Eames |
The details are details. They make the product. The connections, the connections, the connections. It will in the end be these details that give the product its life. |
Nick D'Aloisio |
There is a generation of skimmers. It's not that they don't want to read in-depth content, but they want to evaluate what the content is before they commit time. Especially on a mobile phone - you don't have the phone, or cellular data, or screen size to be reading full-length content. |
Vincent Canby |
Hack fiction exploits curiosity without really satisfying it or making connections between it and anything else in the world. |
Daniel Baldwin |
For me, for the type of addict I am, when I start getting those swirly thoughts and stuff, and they talk about slippery places, slippery people and slippery things, you know, I need to - I needed to take my cell phone and eliminate all the phone numbers, change the phone numbers so no one I knew before could call me or reach me. |
Lisa Gansky |
The mobile Web, location-based services, inexpensive and pervasive mobile apps, and new sorts of opportunities to access cars, bikes, tools, talent, and more from our neighbors and colleagues will propel peer-to-peer access services into market. |
David Eagleman |
A typical neuron makes about ten thousand connections to neighboring neurons. Given the billions of neurons, this means there are as many connections in a single cubic centimeter of brain tissue as there are stars in the Milky Way galaxy. |
Penn Badgley |
I think pineapple is very sexy. It reminds me of bikinis and the beach. |
Richard Dawkins |
An Internet meme is a hijacking of the original idea. Instead of mutating by random change and spreading by a form of Darwinian selection, Internet memes are altered deliberately by human creativity. There is no attempt at accuracy of copying, as with genes - and as with memes in their original version. |
Shawn Fanning |
It was very early, and we were still like beta or alpha stage, and so we started receiving a ton of download. The server became overloaded, and that's when I realized that this had a huge market. |
Alison Jackson |
Among other things, I use a Samsung mobile phone, a very bad quality video camera, and an old Olympus with extremely bad Sigma lenses. |
|
|
we can use my wifi pineapple and stick it to the man that way
This post is a comment.
|
|
|
|
I had a dream that I set up a server in a Meijer and left it in plain sight and no one questioned why it was there and I used it for illegal activities.
|
|
|
|
Unsent Text On Mobile Counts As a Will, Australian Court Finds msmash 4 hours ago 91 A court in Australia has accepted an unsent, draft text message on a dead man's mobile phone as an official will. The 55-year-old man had composed a text message addressed to his brother, in which he gave "all that I have" to his brother and nephew. From a report: The Supreme Court in Brisbane heard the 55-year-old took his own life in October 2016, after composing a text addressed to his brother, which indicated his brother and nephew should "keep all that I have," because he was unhappy with this wife. A friend found the text message in the drafts folder of the man's mobile phone, which was found near his body. The unsent message detailed how to access the man's bank account details and where he wanted ...
|
|
|
|
One time I was walking down the sidewalk in Okemos and I saw an iPhone in the grass so I picked it up and it rang. I answered it and told the people that I had their phone and where I found it. They said they were 45 minutes away but they'd drive and come get it from me. I gave them the address of an abandoned house and told them to meet me there. This middle aged married couple showed up and gave me $20 dollars for the phone and thanked me and they acted so confused about how their phone ended up in Okemos. It sounded like they'd never even been there. Then I walked home.
|
|
|
|
sooo my boss installed a patch for our mail server. instructions said to create a back up. he didnt. it fucked up the whole email server so now none of our clients have email. then he decides he wants to move it to a new server. he can barely figure out how to EXTRACT A ZIP FILE. now he says he has a meeting and i have to fix all this and import it all to a brand new server. sweetnessss
|
|
|
|
Lawyers Are Sending Mobile Ads To Patients Sitting In Emergency Rooms
Patients sitting in emergency rooms, at chiropractors' offices and at pain clinics in the Philadelphia area may start noticing on their phones the kind of messages typically seen along highway billboards and public transit: personal injury law firms looking for business by casting mobile online ads at patients. The potentially creepy part? They're only getting fed the ad because somebody knows they are in an emergency room. The technology behind the ads, known as geofencing, or placing a digital perimeter around a specific location, has been deployed by retailers for years to offer coupons and special offers to customers as they shop. Bringing it into health care spaces, however, is raising alarm among privacy experts....
|
|
|
|
Using Wi-Fi To Count People Through Walls
Whether you're trying to figure out how many students are attending your lectures or how many evil aliens have taken your Space Force brethren hostage, Wi-Fi can now be used to count them all. The system, created by researchers at UC Santa Barbara, uses a single Wi-Fi router outside of the room to measure attenuation and signal drops. From the release: "The transmitter sends a wireless signal whose received signal strength (RSSI) is measured by the receiver. Using only such received signal power measurements, the receiver estimates how many people are inside the room -- an estimate that closely matches the actual number. It is noteworthy that the researchers do not do any prior measurements or calibration in the area of interest; their approach ...
|
|
|
|
Florida Man Arrested in SIM Swap Conspiracy 07 Aug 18
Police in Florida have arrested a 25-year-old man accused of being part of a multi-state cyber fraud ring that hijacked mobile phone numbers in online attacks that siphoned hundreds of thousands of dollars worth of bitcoin and other cryptocurrencies from victims.
On July 18, 2018, Pasco County authorities arrested Ricky Joseph Handschumacher, an employee of the city of Port Richey, Fla, charging him with grand theft and money laundering. I...
|
|
|
|
WPA2 Security Flaw Puts Almost Every Wi-Fi Device at Risk of Hijack, Eavesdropping
A security protocol at the heart of most modern Wi-Fi devices, including computers, phones, and routers, has been broken, putting almost every wireless-enabled device at risk of attack. From a report: The bug, known as "KRACK" for Key Reinstallation Attack, exposes a fundamental flaw in WPA2, a common protocol used in securing most modern wireless networks. Mathy Vanhoef, a computer security academic, who found the flaw, said the weakness lies in the protocol's four-way handshake, which securely allows new devices with a pre-shared password to join the network. That weakness can, at its worst, allow an atta...
|
|
|
|
Ideas with high relevance, terminology sharing have bold connections, contradictory or active debate show red connections, more commented/liked/shared/modified appear larger, more opaque while addenda and corollaries appear as cilia to the main cell.
This post is a comment.
|
|