• therefore rendering blue boxes obsolete. Phreaking has since become closely linked with computer hacking. Phreaking began in the 1960s when it was discovered...
    36 KB (4,451 words) - 11:30, 24 July 2024
  • While phreaking is the process of exploiting telephone networks, it is used here because of its connection to eavesdropping. Van Eck phreaking of CRT...
    12 KB (1,438 words) - 09:31, 25 September 2024
  • However, very few physical specimens of phreaking boxes are actually the color for which they are named. Most phreaking boxes are electronic devices which...
    7 KB (328 words) - 15:02, 18 July 2024
  • Thumbnail for Blue box
    Esquire magazine. Suddenly, many more people wanted to get into the phone phreaking culture spawned by the blue box, and it furthered the fame of Captain...
    46 KB (6,593 words) - 23:23, 20 September 2024
  • obsolete with the widespread conversion of post-pay phones to pre-pay operation. Phreaking boxes "Clear box plans" - 1984 text file on the clear box...
    2 KB (259 words) - 18:23, 27 June 2024
  • Thumbnail for John Draper
    John Draper (category Phreaking)
    signaling. This change rendered the toy whistles and blue boxes useless for phreaking purposes. The whistles are considered collectible souvenirs of a bygone...
    18 KB (2,044 words) - 16:55, 26 September 2024
  • A red box is a phreaking device that generates tones to simulate inserting coins in pay phones, thus fooling the system into completing free calls. In...
    5 KB (612 words) - 07:28, 22 March 2023
  • recipient, was similarly affected by the demise of mechanical switching. Phreaking Rosenbaum, Ron (October 1971). "Secrets of the Little Blue Box". Esquire...
    3 KB (367 words) - 17:43, 19 February 2024
  • Thumbnail for Beige box (phreaking)
    In phone phreaking, a beige box is a device that is technically equivalent to a telephone company lineman's handset — a telephone fitted with alligator...
    3 KB (340 words) - 22:21, 10 May 2024
  • Center for Genomic Gastronomy. Retrieved 24 March 2020. "Food Phreaking". Food Phreaking. Retrieved 25 March 2020. Tigner, Amy L.; Carruth, Allison (2017)...
    10 KB (978 words) - 23:37, 15 December 2023
  • Joybubbles (category Phreaking)
    successful plan to get a job by purposely getting arrested for phreaking. Phone phreaking and specifically Joybubbles were the subject of "A Call from Joybubbles"...
    11 KB (1,121 words) - 18:54, 17 August 2024
  • news concerning the computer "underground." With origins in the phone phreaking community and late 20th-century counterculture, 2600 and its associated...
    11 KB (1,134 words) - 16:12, 3 April 2024
  • gold Gold Box, a series of video games of 1988 to 1992 Gold box (phreaking), a phreaking box to create a bridge between two telephone lines This disambiguation...
    224 bytes (67 words) - 14:44, 10 November 2022
  • Thumbnail for Charles III
    2011. "The Camillagate Tapes". Textfiles.com (phone transcript). Phone Phreaking. 18 December 1989. Archived from the original on 1 July 2010.; "Royals...
    250 KB (20,100 words) - 18:46, 4 October 2024
  • The gold box is a phreaking box whose function is to create a bridge between two telephone lines. In its basic operation, the user calls one of the lines...
    1 KB (159 words) - 22:00, 15 April 2023
  • Blue box is an early phreaking tool that simulates a telephone operator's dialing console. Blue box may also refer to: Link Trainer or Blue Box, a flight...
    1 KB (218 words) - 17:05, 20 May 2023
  • Thumbnail for Hacker
    the Jargon File reports that considerable overlap existed for the early phreaking at the beginning of the 1970s. An article from MIT's student paper The...
    40 KB (4,246 words) - 07:50, 2 August 2024
  • In Phreaking, the green box was a device whose function was to manipulate the coin collection mechanism of payphones. It employed three of the MF (multi-frequency)...
    5 KB (658 words) - 01:24, 22 March 2020
  • Thumbnail for Anonymous (hacker group)
    Part of a series on Computer hacking History Phreaking Cryptovirology Hacking of consumer electronics List of hackers Hacker culture and ethic Hackathon...
    174 KB (15,620 words) - 06:28, 25 September 2024
  • scene, or computer underground. It initially developed in the context of phreaking during the 1960s and the microcomputer BBS scene of the 1980s. It is implicated...
    55 KB (5,981 words) - 21:25, 14 August 2024
  • Thumbnail for Steve Jobs
     21–32. Isaacson 2011, p. 31. Brennan 2013, pp. 1–11. "How Blue Box Phone Phreaking Put Steve Jobs and Woz on the Road to Apple". Esquire. October 15, 2015...
    201 KB (20,168 words) - 00:15, 4 October 2024
  • Thumbnail for Steve Wozniak
    Wozniak's blue box design earned him the nickname "Berkeley Blue" in the phreaking community. Wozniak has credited watching Star Trek and attending Star...
    115 KB (10,433 words) - 20:21, 7 October 2024
  • Phone Losers of America (category Phreaking)
    (PLA) is an internet prank call community founded in 1994 as a phone phreaking and hacking e-zine. Today the PLA hosts a prank call podcast called the...
    7 KB (525 words) - 20:04, 11 October 2024
  • 2600 may refer to: 2600 hertz, the audio tone used in phreaking to gain control of telephone networks 2600: The Hacker Quarterly, a magazine named after...
    641 bytes (116 words) - 18:10, 16 May 2024
  • Part of a series on Computer hacking History Phreaking Cryptovirology Hacking of consumer electronics List of hackers Hacker culture and ethic Hackathon...
    58 KB (6,545 words) - 14:44, 11 October 2024
  • signaling, the systems proved vulnerable to misuse and fraud by phone phreaking with devices such as a blue box. Multifrequency signaling is a technological...
    6 KB (789 words) - 22:53, 13 September 2024
  • Thumbnail for Social engineering (security)
    activities to be monitored and leaked. Susan Headley became involved in phreaking with Kevin Mitnick and Lewis de Payne in Los Angeles, but later framed...
    27 KB (2,962 words) - 17:21, 11 October 2024
  • The Secret History of Hacking (category Phreaking)
    starts by reviewing the concept and the early days of phreaking, featuring anecdotes of phreaking experiences (often involving the use of a blue box) recounted...
    3 KB (302 words) - 22:33, 5 September 2024
  • security, with discussions of prime numbers, modular arithmetic, and Van Eck phreaking. According to Stephenson, the title is a play on Necronomicon, the title...
    28 KB (3,418 words) - 22:42, 7 October 2024
  • Thumbnail for J. K. Rowling
    Practices Act Hacked Off Operation Glade Operation Motorman Phone hacking Phreaking Politico-media complex Regulation of Investigatory Powers Act 2000 Social...
    197 KB (19,107 words) - 03:08, 13 October 2024