Home
Articles
Search
Status
Best of 2600
Keywords
Links
Mirrors
  Open Source
Overview
SQL
PHP
Data

Articles

    prev next

Winter2005 cover image
Volume 22
Number 4
64 pages
Winter2005 back cover image
Quote: "Value your freedom, or you will lost it, teaches history. 'Don't bother us with politics,' respond those who don't want to learn." - Richard Stallman
Notes: Page 61 has the Easter Egg Hunt contest results with a complete list of the Easter Eggs in Freedom Downtime, that is not in the index.

Author
Nom de plume Jonathan Pamplin
Name
Email j.pamplin@gmail.com
Notes

Aritcle
Page Title How to Track Any UK GSM Mobile Phone (Without the User's Consent)
Synopsis Discusses a method of tracking the location of a mobile phone using the T-Mobile, Orange, 02 and Vodaphone networks in the UK.
Notes
Code None
Page 17
Pages 1
In Best of 2600 book? Yes, page 679, Section 3 (2000 and Beyond: A Changing Landscape), Chapter 16 (A New Era of Telephony)

Links
Ok on 02/17/2009 Fake SMS site. Original link
Original article Local copy on 08/04/2009 No archive.org

Addendum

Keywords
Exploit A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.    (more..)
Surveillance Monitoring the behavior of people, objects or processes.    (more..)