📅 September 8, 2019

HOW TO: Find Social Media Accounts by Username

an easy way to find usernames across social media networks

Over the time you’ve created quite a few profiles on different services and, chances are, you used the same username for all of them.  ( hopefully not the same password – never use the same password everywhere. Use a password manager like KeePass or Bitwarden ).

It’s definitely a good idea to audit your username(s) and delete those profiles if you’re not using them anymore. And to make your job easier, you can hunt down your username(s) across a vast list of services using Sherlock.

Continue reading “HOW TO: Find Social Media Accounts by Username”

📅 March 18, 2013

Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell

Exploding the Phone tells this story in full for the first time. It traces the birth of long-distance communication and the telephone, the rise of AT&T’s monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell’s Achilles’ heel.

Exploding-the-Phone-The-Untold-Story-of-the-Teenagers-and-Outlaws-who-Hacked-Ma-Bel-FSMdotCOMBefore smartphones, back even before the Internet and personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world’s largest machine: the telephone system.

Starting with Alexander Graham Bell’s revolutionary “harmonic telegraph,” by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before.

But the network had a billion-dollar flaw, and once people discovered it, things would never be the same.

Exploding the Phone tells this story in full for the first time. It traces the birth of long-distance communication and the telephone, the rise of AT&T’s monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell’s Achilles’ heel.
Continue reading “Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell”

📅 October 26, 2011

Siri Ported To The iPod Touch [video]

Two enterprising young hackers, euwars and rud0lf77, are the ones who put Siri on the iPod, and you can see the results of their labor in this video…

Two enterprising young hackers, euwars and rud0lf77, are the ones who put Siri on the iPod, and you can see the results of their labor in the video after the break. Of course, Apple’s servers still aren’t as friendly as the virtual voice assistant, so Siri’s latest cameo remains a silent one — but some Siri’s better than none, right?

Continue reading “Siri Ported To The iPod Touch “

📅 October 15, 2011

Siri Ported To The iPhone 4 [video]

The port of the sultry voice assistant was accomplished by using the 4S Siri and Springboard files, and some serious elbow grease, no doubt.

The port of the sultry voice assistant was accomplished by using the 4S Siri and Springboard files, and some serious elbow grease, no doubt. As you can see in the video below, it’s far from perfect, but it can recognize spoken commands without issue.

Continue reading “Siri Ported To The iPhone 4 “

📅 November 3, 2009

Hacker Hijacks iPhones, Asks For Ransom While Exposing Security Vulnerability

What happens, when you don’t know what you’re dealing with or you just don’t listen? Well, let me paint you a pretty picture…

Despite all the charts, there’s a significant number of jailbroken iDevices in the world. There are thousands of iPhone sites and blogs on this magnificent www that do the same damn thing: they review apps.On the other hand, we ( we’re not alone ) are dedicating our precious site to help you people staying trouble-free ( among providing you super duper cool things like this new weather lockscreen theme ). What happens, when you don’t know what you’re dealing with or you just don’t listen? Well, let me paint you a pretty picture:

Continue reading “Hacker Hijacks iPhones, Asks For Ransom While Exposing Security Vulnerability”