hahahah amol hacked ur ip address

Sign by Danasoft - For Backgrounds and Layouts


Amol Bhure (ultra l33t) was born in Maharashtra, Seventh July Of Nineteen Hundred Nineteen Ninety A.D. He's currently pursuing his B.E in Bangalore. A cyber Security Professional, Hacker, Designer, Programmer. Keen interest in hacking and network security and he developed several techniques of defending and defacing websites. He's of the opinion that people should learn this art to prevent any cyber attacks. Currently Amol works as a member of 'Null International', Bangalore chapter as a network security guy. Apart from this, he has done internships at YAHOO! India, AMAZON India, etc. He has also attended various International conferences like NullCon GOA, c0c0n, ClubHack, Defcon , SecurityByte, ICFoCS, OWASP, etc.. He is certified with RHCE, LPT, CEH v7, SCJP, AFCEH. In programming he knows stuffs on C, C++, C# , JAVA (SCJP), .NET , and PHP. Additionally he knows few hardware languages like HDL, VHDL, Verilog, Embedded Micro controller Programming. He has been featured on google hall of fame. Amol was named a "India's top 10 hacker" by google. "World's top 50 hacking blog" by google.

Daily Page Views

Saturday, December 11, 2010

PHONE PHREAKING the beginning of hacking

PHONE PHREAKING the beginning of hacking

                                                                  post by-  vamshi (F5T0rn@d0)
P hone phreaking is said to be the beginning of hacking because in 1970's telephone system was the major techonology like computer technology now. Actually phone phreaking is a technique through which we can do free calls throughout the world. During the 1970's, the phone phreaks or phone hackers appeared: they learned ways to hack the telephonic system and make phone calls for free. Phone phreaking was like a revolutionary in those days and now we will learn something about famous phone phreaks like John drapper (caption chrunch), Denny Teresi and kevin metnick. Phone phreaks found many ways for making calls for free and one such method is through captian chrunch vessele ,through this vessele phone phreaks would vessele through the phone and they will get the acknowledgement from the phone company .The reason behind using this captian chrunch vessele is that in 1970's telephone companies have changed to automatic switching system from manual telephone operator switching system . In manual telephone operator switching system phone phreaking was not possible because some third person will be connecting both destination and source, so phone phreaking was impossible in manual systems. But in automatic telephone switching system it is quite easy to do phone phreaking because automatic telephone switching system was based on some unique sounds with specific frequencies and if we blow the vessel into the phone with around 2600 hz we will get an acknowledgement from the phone company that we are ready to process the call . In number pad telephone systems a specific tone is dedicated to every number, So John Draper built a 'blue box' that could generate these specific tones and the Esquire magazine published an article on how to build them. Inspired by this discovery, two kids, Steve Wozniak and Steve Jobs, decided to sell these blue boxes, starting a business friendship which resulted in the founding of Apple. Getting their laughs and skills from hacking and cracking into primitive computers and exploiting the Arpanet (predecessor to the internet), by doing so they created the path to wonder world of hacking. These two (john drapper and kevin metnick ) great intellectuals of computer world are inventors of word hacking . For john drapper hacking is all about experimenting and for kevin metnick hacking is all about passion.

Picture of BLUE BOX:-
    After 1970 the computer engineers have encountered a counter culture in the computer feild and they called it has hacking and referred it has ART OF EXPLOITATION .In 1980 computer hacking was treated has cool thing to do and it was not a crime. But after the arrest of kevin mitinick laws got changed and hacking was made as criminal act.
According to me the people who calling themselves have hacker are not hackers because hacking is all about inventing new things. But these people are not inventing anything but using the invented things for exploiting the system's and they are just declaring themselves has great hackers .But great hackers are those people who invent things and penetrate into the other system by their own exploitations but now a day’s everything is available on Google, these SOCALLED hackers are just downloading them and exploiting the system and calling themselves has hackers. This article is dedicated to kevin mitinck and john draper who had given a meaning to the word of “Hacking“and created a path to wonder world of hacking so that there off springs could follow them. Hat's off to these two people.
Post a Comment