{"title":"2000-2009","description":"","products":[{"product_id":"spring-2000","title":"Spring 2000 (only available in our DOWNLOAD section)","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eThe Next Chapter\u003c\/li\u003e\n\u003cli\u003eA Taste of Freedom\u003c\/li\u003e\n\u003cli\u003eHow to Stay a Sysadmin\u003c\/li\u003e\n\u003cli\u003eMilitary Computer Secrets\u003c\/li\u003e\n\u003cli\u003eSecuring Web Sites With ASP\u003c\/li\u003e\n\u003cli\u003eStill More on Siprnet\u003c\/li\u003e\n\u003cli\u003eFinding and Exploiting Bugs\u003c\/li\u003e\n\u003cli\u003eAll About Securid\u003c\/li\u003e\n\u003cli\u003eYour Internet Birthday\u003c\/li\u003e\n\u003cli\u003eMake Spammers Work For You\u003c\/li\u003e\n\u003cli\u003eTaking Advantage of Alladvantage\u003c\/li\u003e\n\u003cli\u003eAT\u0026amp;T's Gaping Hole\u003c\/li\u003e\n\u003cli\u003eCellular Networks Detailed\u003c\/li\u003e\n\u003cli\u003eHow PSX Copy Protection Works\u003c\/li\u003e\n\u003cli\u003eFun at Circuit City\u003c\/li\u003e\n\u003cli\u003eHow to Build a Coffee Box\u003c\/li\u003e\n\u003cli\u003eThe Sprint PCS Network\u003c\/li\u003e\n\u003cli\u003eHow to Get Banned From Your ISP\u003c\/li\u003e\n\u003cli\u003eBuild, Don't Buy, Your Next Computer\u003c\/li\u003e\n\u003cli\u003eHow Does That DSS Card Really Work?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212454529,"sku":"","price":4.99,"currency_code":"USD","in_stock":false}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp001.gif?v=1429852391"},{"product_id":"spring-2001","title":"Spring 2001","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eSigns of Hope\u003c\/li\u003e\n\u003cli\u003ePolice Searches of Computers\u003c\/li\u003e\n\u003cli\u003eThe Future of PKI\u003c\/li\u003e\n\u003cli\u003ePHP\/CGI Vulnerabilities and Abuses\u003c\/li\u003e\n\u003cli\u003eBreaking the Windows Script Encoder\u003c\/li\u003e\n\u003cli\u003eLiberating Advants Terminals\u003c\/li\u003e\n\u003cli\u003eA Romp Through System Security\u003c\/li\u003e\n\u003cli\u003eHacking QuickAid Internet Stations\u003c\/li\u003e\n\u003cli\u003eThe Billboard Liberation Front\u003c\/li\u003e\n\u003cli\u003eComputing With The Fabric of Reality\u003c\/li\u003e\n\u003cli\u003eSecrets of Electronic Shelf Labels\u003c\/li\u003e\n\u003cli\u003eAnomaly Detection Systems, Part II\u003c\/li\u003e\n\u003cli\u003eThe Anna Kournikova Virus\u003c\/li\u003e\n\u003cli\u003eDeclawing Your :CueCat\u003c\/li\u003e\n\u003cli\u003eScum\u003c\/li\u003e\n\u003cli\u003e\"Takedown\" Taken Down \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212455081,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp011.gif?v=1429852422"},{"product_id":"spring-2002","title":"Spring 2002","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eTime To Care\u003c\/li\u003e\n\u003cli\u003eTransaction Based Systems\u003c\/li\u003e\n\u003cli\u003eHow to Regain Privacy on the Net\u003c\/li\u003e\n\u003cli\u003eStupid Google Tricks\u003c\/li\u003e\n\u003cli\u003eNeat Stuff with Switchboard.com\u003c\/li\u003e\n\u003cli\u003ePoor Man's 3d\u003c\/li\u003e\n\u003cli\u003eAppletalk Security Secrets\u003c\/li\u003e\n\u003cli\u003eThe Definitive Guide to Phreak Boxes\u003c\/li\u003e\n\u003cli\u003eThe Bungee Box\u003c\/li\u003e\n\u003cli\u003eCampusWide Wide Open\u003c\/li\u003e\n\u003cli\u003eIdiocy in the Telcos\u003c\/li\u003e\n\u003cli\u003eCreative Cable Modem Configuration\u003c\/li\u003e\n\u003cli\u003eFun Password Facts\u003c\/li\u003e\n\u003cli\u003eDefeating Network Address Translation\u003c\/li\u003e\n\u003cli\u003eNSI Abuse\u003c\/li\u003e\n\u003cli\u003eThe Threat of a Lazy Admin\u003c\/li\u003e\n\u003cli\u003eA Script for the Right Click Suppressed\u003c\/li\u003e\n\u003cli\u003eRetail Hardware Revisited\u003c\/li\u003e\n\u003cli\u003eMore Radio Shack Facts \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212456065,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp021.gif?v=1429852450"},{"product_id":"spring-2003","title":"Spring 2004","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eTwenty Years After\u003c\/li\u003e\n\u003cli\u003eTaking Advantage of Physical Access\u003c\/li\u003e\n\u003cli\u003eBypassing Minor Website Security\u003c\/li\u003e\n\u003cli\u003eExploiting AIM Screen Name Loggers\u003c\/li\u003e\n\u003cli\u003eUsing Perl to Defeat Provider Restrictions\u003c\/li\u003e\n\u003cli\u003eA Simple But Effective Spanner in Your AVS\u003c\/li\u003e\n\u003cli\u003eHacking the Hilton\u003c\/li\u003e\n\u003cli\u003eCruise Cracking\u003c\/li\u003e\n\u003cli\u003eA Sprint PCS Trick\u003c\/li\u003e\n\u003cli\u003eHacking a Mercedes Benz with a Universal Remote\u003c\/li\u003e\n\u003cli\u003eThe $40 Hardware War Dialer\u003c\/li\u003e\n\u003cli\u003eSerial Number Security\u003c\/li\u003e\n\u003cli\u003eBarcode Tricks\u003c\/li\u003e\n\u003cli\u003eInstalling Debian on your Unmodded Xbox\u003c\/li\u003e\n\u003cli\u003eUncapper's Paradise\u003c\/li\u003e\n\u003cli\u003eInside Adelphia\u003c\/li\u003e\n\u003cli\u003eSubverting Non-Secure Login Forms\u003c\/li\u003e\n\u003cli\u003eSetting Your Music Free: iTunes Music Sans DRM\u003c\/li\u003e\n\u003cli\u003eVonage Broadband Security Risk\u003c\/li\u003e\n\u003cli\u003eSharing Your Life on a Peer-to-Peer Network\u003c\/li\u003e\n\u003cli\u003eMSN Redirect Scan \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212456845,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp041.gif?v=1429852523"},{"product_id":"spring-2005","title":"Spring 2006","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003e2600... 2006... 2060\u003c\/li\u003e\n\u003cli\u003eFilesharing using TinyURL.com\u003c\/li\u003e\n\u003cli\u003eXSS'ing MySpace.com\u003c\/li\u003e\n\u003cli\u003eUnited Kingdom: The State of Surveillance\u003c\/li\u003e\n\u003cli\u003eMaking Rover Fart\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eHacking the HNAS1 Network Attached Storage Unit\u003c\/li\u003e\n\u003cli\u003eHacking 2600.com\u003c\/li\u003e\n\u003cli\u003eDirect Inward System Access and Caller ID Spoofing\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: The Cheshire Catalyst\u003c\/li\u003e\n\u003cli\u003eHacking PCReservation\u003c\/li\u003e\n\u003cli\u003eHacking the Facebook\u003c\/li\u003e\n\u003cli\u003eThe Price of Convenience: Our Identities\u003c\/li\u003e\n\u003cli\u003eHighlighting the Holes\u003c\/li\u003e\n\u003cli\u003eThe DRM Plan\u003c\/li\u003e\n\u003cli\u003eThe Secrets of Cingular Wireless\u003c\/li\u003e\n\u003cli\u003eTECHNO-EXEGESIS\u003c\/li\u003e\n\u003cli\u003eNot Quite Dead Yet\u003c\/li\u003e\n\u003cli\u003eSchool Connections\u003c\/li\u003e\n\u003cli\u003eiPod Sneakiness\u003c\/li\u003e\n\u003cli\u003eA Look at Jabber\/XMPP\u003c\/li\u003e\n\u003cli\u003eSpyware - The Ever Changing Threat\n\u003cp\u003ePlus LETTERS, MARKETPLACE, and the 2600 PUZZLE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212457657,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp061.gif?v=1429852577"},{"product_id":"spring-2004","title":"Spring 2003","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eNot in Our Name\u003c\/li\u003e\n\u003cli\u003eANI and Caller ID Spoofing\u003c\/li\u003e\n\u003cli\u003eA Hacker Goes to Iraq\u003c\/li\u003e\n\u003cli\u003eGetting Busted - Military Style\u003c\/li\u003e\n\u003cli\u003eUnsolicited Mail\u003c\/li\u003e\n\u003cli\u003eAnonymous E-mail Using Remailers\u003c\/li\u003e\n\u003cli\u003eFun with 802.11b at Kroger's\u003c\/li\u003e\n\u003cli\u003eBest Buy Insecurities\u003c\/li\u003e\n\u003cli\u003eRipping Movies from DVD to CD-R\u003c\/li\u003e\n\u003cli\u003eXM - The Flawed Future of Radio\u003c\/li\u003e\n\u003cli\u003eA First Look at Virgin Mobile\u003c\/li\u003e\n\u003cli\u003eCreating Delay in the New Age\u003c\/li\u003e\n\u003cli\u003eIbuyspy Portal Software\u003c\/li\u003e\n\u003cli\u003eDefeating salon.com's Premium Content\u003c\/li\u003e\n\u003cli\u003eFun with Hosting on your Cable\/DSL\u003c\/li\u003e\n\u003cli\u003eKeyboard Theory for the New Age Phreak\u003c\/li\u003e\n\u003cli\u003eA Glimpse at the Future of Computing \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212459985,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp031.gif?v=1429852493"},{"product_id":"spring-2006","title":"Spring 2005","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eEnemy of the People\u003c\/li\u003e\n\u003cli\u003eNew York City's MTA Exposed\u003c\/li\u003e\n\u003cli\u003eElectronic Application Insecurity\u003c\/li\u003e\n\u003cli\u003eBaking Cookies\u003c\/li\u003e\n\u003cli\u003eVoice Over Internet Protocol\u003c\/li\u003e\n\u003cli\u003eHacking Cisco IP Phones\u003c\/li\u003e\n\u003cli\u003eDecrypting WS_FTP.ini Passwords\u003c\/li\u003e\n\u003cli\u003eHunting Wifi Leeches\u003c\/li\u003e\n\u003cli\u003eUnlocking the Power of WAP\u003c\/li\u003e\n\u003cli\u003eBackdoor Exits from the US Military\u003c\/li\u003e\n\u003cli\u003eBlockbuster's Compass - Setting Sail for Port Bureaucracy\u003c\/li\u003e\n\u003cli\u003eHow to Get Out of Google\u003c\/li\u003e\n\u003cli\u003eHP Printers: The Hidden Threat\u003c\/li\u003e\n\u003cli\u003eDisposable Email Vulnerabilities\u003c\/li\u003e\n\u003cli\u003eMagnetic Stripe Reading\u003c\/li\u003e\n\u003cli\u003eComplete Scumware Removal\u003c\/li\u003e\n\u003cli\u003eMore Fun with Netcat\u003c\/li\u003e\n\u003cli\u003ePotential Vulnerabilities in Shared Systems\u003c\/li\u003e\n\u003cli\u003eInside the Emergency Alert System\u003c\/li\u003e\n\u003cli\u003eIPv6 Redux\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212460373,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp051.gif?v=1429852550"},{"product_id":"spring-2007","title":"Spring 2007","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eChallenges\u003c\/li\u003e\n\u003cli\u003eUnderstanding Web Application Security\u003c\/li\u003e\n\u003cli\u003eRFID: Radio Freak-me-out Identification\u003c\/li\u003e\n\u003cli\u003eExploiting LiveJournal.com with Clickless SWF XSS\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eAvoiding Internet Filtering\u003c\/li\u003e\n\u003cli\u003eHacking Your Own Front Door\u003c\/li\u003e\n\u003cli\u003eDorking the DoorKing\u003c\/li\u003e\n\u003cli\u003eSecurity Holes at Time Warner Cable\u003c\/li\u003e\n\u003cli\u003eHacking My Ambulance\u003c\/li\u003e\n\u003cli\u003eSSL MITM Attacks on Online Poker Software\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Bill Squire\u003c\/li\u003e\n\u003cli\u003eRipping MMS Streams\u003c\/li\u003e\n\u003cli\u003eBackspoofing 101\u003c\/li\u003e\n\u003cli\u003eCan I Read Your Email?\u003c\/li\u003e\n\u003cli\u003eStalking the Signals\u003c\/li\u003e\n\u003cli\u003eGoDaddy.com Insecurity\u003c\/li\u003e\n\u003cli\u003eHubots: New Ways of Attacking Old Systems\u003c\/li\u003e\n\u003cli\u003eNetwork Ninjitsu: Bypassing Firewalls and Web Filters\u003c\/li\u003e\n\u003cli\u003eHacking a Major Technical School's Website\u003c\/li\u003e\n\u003cli\u003eCovert Communications Channels\u003c\/li\u003e\n\u003cli\u003eHow to Cripple the FBI\n\u003cp\u003ePlus LETTERS, MARKETPLACE, and the 2600 PUZZLE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212460957,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp071.gif?v=1429852608"},{"product_id":"spring-2008","title":"Spring 2008","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eThe Whole World's Watching\u003c\/li\u003e\n\u003cli\u003eVhreaking with VoxALot\u003c\/li\u003e\n\u003cli\u003eDirt-Cheap Phone Calls - The VoIP Way\u003c\/li\u003e\n\u003cli\u003eGaming AT\u0026amp;T Mobility\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003ePassword Memorization Mnemonic\u003c\/li\u003e\n\u003cli\u003eHacking Two-Dimensional Barcodes\u003c\/li\u003e\n\u003cli\u003eDissecting the EPC: RFID for the Commercial Sector\u003c\/li\u003e\n\u003cli\u003eEavesdropping with LD_PRELOAD\u003c\/li\u003e\n\u003cli\u003eApril Fools' Day, the Hacker Way\u003c\/li\u003e\n\u003cli\u003eRemember CompUSA\u003c\/li\u003e\n\u003cli\u003eDownloading MP3s for Free\u003c\/li\u003e\n\u003cli\u003eSwindling From SearchFeed\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Martin Eberhard\u003c\/li\u003e\n\u003cli\u003eBypassing a Restrictive Internet Proxy\u003c\/li\u003e\n\u003cli\u003eShadow Life\u003c\/li\u003e\n\u003cli\u003eWalk with Me, Talk with Me\u003c\/li\u003e\n\u003cli\u003eFun With the Snom Outlook Add-on\u003c\/li\u003e\n\u003cli\u003eThe EU Directive on Data Retention: Surveillance 2.0\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eInformation Flow on Campus: A Closer Look at Wikipedia\u003c\/li\u003e\n\u003cli\u003eStory: To Kill an Atomic Subwoofer\u003c\/li\u003e\n\u003cli\u003eUses for Knoppix\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212461469,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp081.gif?v=1429852632"},{"product_id":"spring-2009","title":"Spring 2009","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eYear 26\u003c\/li\u003e\n\u003cli\u003eATA Security Exposed\u003c\/li\u003e\n\u003cli\u003eOutsourced\u003c\/li\u003e\n\u003cli\u003eAnnoying Dormitory Phones\u003c\/li\u003e\n\u003cli\u003erobots.txt Mining Script for the Lazy\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eSurfing Without a Board\u003c\/li\u003e\n\u003cli\u003eMP3s: A Covert Means of Distributing Information\u003c\/li\u003e\n\u003cli\u003eCatching an iPod Thief Using Forensic Evidence\u003c\/li\u003e\n\u003cli\u003eInside Google Radio\u003c\/li\u003e\n\u003cli\u003eScour: Paid to Search, Again?\u003c\/li\u003e\n\u003cli\u003eBattling the Fanuc Data Panel\u003c\/li\u003e\n\u003cli\u003eNetwork Neutrality Simplified\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Virgil Griffith\u003c\/li\u003e\n\u003cli\u003eSecond Life Hacking\u003c\/li\u003e\n\u003cli\u003eExploiting Price Matching Through Javascript Injection\u003c\/li\u003e\n\u003cli\u003eHACKER SPACES - NORTH AMERICA\u003c\/li\u003e\n\u003cli\u003eDNS Spoofing on a LAN\u003c\/li\u003e\n\u003cli\u003eAn Astronomer's Perspective on Hacking\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eSocial Engineering HP for Fun and Profit\u003c\/li\u003e\n\u003cli\u003eThe Last 1000 Feet\u003c\/li\u003e\n\u003cli\u003eStory: The Particle\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212461817,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp091.gif?v=1429852658"},{"product_id":"summer-2000","title":"Summer 2000","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\u003c\/td\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eMadness\u003c\/li\u003e\n\u003cli\u003eThe Art of System Profiling\u003c\/li\u003e\n\u003cli\u003eA Brief Intro to Biometrics\u003c\/li\u003e\n\u003cli\u003eFun With TDOC\u003c\/li\u003e\n\u003cli\u003eStrange Abuses For Your Home Phone\u003c\/li\u003e\n\u003cli\u003eMore Advantages of Alladvantage\u003c\/li\u003e\n\u003cli\u003eOver The Verizon?\u003c\/li\u003e\n\u003cli\u003eSecuring ASP: A Deeper Cut\u003c\/li\u003e\n\u003cli\u003eJello Biafra: Hacker Ambassador\u003c\/li\u003e\n\u003cli\u003eHacking The Three Holed Payphone\u003c\/li\u003e\n\u003cli\u003ePacket Analysis and Header Sniffers\u003c\/li\u003e\n\u003cli\u003eA Simple Hex Hack\u003c\/li\u003e\n\u003cli\u003eSecrets of Dell\u003c\/li\u003e\n\u003cli\u003eHow Domains Are Stolen\u003c\/li\u003e\n\u003cli\u003ePlaying With Dominos\u003c\/li\u003e\n\u003cli\u003eJava Applet Hacking\u003c\/li\u003e\n\u003cli\u003eThe Privacy Box\u003c\/li\u003e\n\u003cli\u003eA Student's Privacy Security Survey \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212463633,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/su001.gif?v=1429853229"},{"product_id":"summer-2001","title":"Summer 2001","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eThe Broken Wheels of Justice\u003c\/li\u003e\n\u003cli\u003eWhat is Carnivore, Really?\u003c\/li\u003e\n\u003cli\u003eExtra Polymorphic Worms\u003c\/li\u003e\n\u003cli\u003eEverything Your Parents Told You About ESS was a Lie\u003c\/li\u003e\n\u003cli\u003eMichigan Memos\u003c\/li\u003e\n\u003cli\u003eHow To Become a Hacker Saint\u003c\/li\u003e\n\u003cli\u003eMisconceptions About TCP Wrappers\u003c\/li\u003e\n\u003cli\u003eHacking an NT 4 Domain from the Desktop - Revisited\u003c\/li\u003e\n\u003cli\u003ePopular Myths on Password Authentication\u003c\/li\u003e\n\u003cli\u003eExploring HPUX Password Schemes\u003c\/li\u003e\n\u003cli\u003eAOL At School\u003c\/li\u003e\n\u003cli\u003eFun With Fortres\u003c\/li\u003e\n\u003cli\u003eAT\u0026amp;T At Home\u003c\/li\u003e\n\u003cli\u003eThe New AT\u0026amp;T Network\u003c\/li\u003e\n\u003cli\u003eTell Me; Uses and Abuses\u003c\/li\u003e\n\u003cli\u003eSnooping the Stack \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212464441,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/su011.gif?v=1429853255"},{"product_id":"summer-2002","title":"Summer 2002","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eFair Use and Abuse\u003c\/li\u003e\n\u003cli\u003eThe Comprehensive Guide to 802.11B Wireless Networks\u003c\/li\u003e\n\u003cli\u003eHow to Break Through a Proxy or Firewall\u003c\/li\u003e\n\u003cli\u003eA Nasty NT Bug\u003c\/li\u003e\n\u003cli\u003eA Look Back\u003c\/li\u003e\n\u003cli\u003eGrab That Cache\u003c\/li\u003e\n\u003cli\u003eThe End of an Era\u003c\/li\u003e\n\u003cli\u003eNCR ATMs - Aurum Ex Machina\u003c\/li\u003e\n\u003cli\u003eThe Afghan Phone System\u003c\/li\u003e\n\u003cli\u003eYet Another Way to Defeat URL Filters\u003c\/li\u003e\n\u003cli\u003eGetting Into Cisco Routers\u003c\/li\u003e\n\u003cli\u003eA New Era of Telecommunications Surveillance\u003c\/li\u003e\n\u003cli\u003eWeb Server Discovery Tool\u003c\/li\u003e\n\u003cli\u003eYour Eyes Have Just Been Sold\u003c\/li\u003e\n\u003cli\u003eDumpster Diving: One Man's Trash\u003c\/li\u003e\n\u003cli\u003eMind Tricks\u003c\/li\u003e\n\u003cli\u003eReview: Hacker Culture\u003c\/li\u003e\n\u003cli\u003eCBDTPA: Yet Another Privacy Concern\u003c\/li\u003e\n\u003cli\u003eNull Sessions and Enumeration \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212464773,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/su021.gif?v=1429853279"},{"product_id":"summer-2003","title":"Summer 2003","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eDisrespecting the Law\u003c\/li\u003e\n\u003cli\u003eRoll Your Own IIS Intrusion Detection System\u003c\/li\u003e\n\u003cli\u003eTraversing the Corporate Firewall\u003c\/li\u003e\n\u003cli\u003eStaying Anonymous in the Information Age\u003c\/li\u003e\n\u003cli\u003eHardware Key Logging\u003c\/li\u003e\n\u003cli\u003ePeeling Grapes\u003c\/li\u003e\n\u003cli\u003eMicrophones, Laptops, and Supertaps\u003c\/li\u003e\n\u003cli\u003eOptimum Online and You\u003c\/li\u003e\n\u003cli\u003eCyber Cafe Software Security\u003c\/li\u003e\n\u003cli\u003eA Coupon Trick\u003c\/li\u003e\n\u003cli\u003eHacking the Look\u003c\/li\u003e\n\u003cli\u003eHosting an FTP Server on Cable\/DSL Routers\u003c\/li\u003e\n\u003cli\u003eMcWireless Exposed\u003c\/li\u003e\n\u003cli\u003e802.11b Reception Tricks\u003c\/li\u003e\n\u003cli\u003eDistributed Reflective Denial of Service Attacks\u003c\/li\u003e\n\u003cli\u003eFun with the Nokia 3360\/3361\u003c\/li\u003e\n\u003cli\u003eWhy Redboxing Still Works (sorta)\u003c\/li\u003e\n\u003cli\u003eXploiting XP \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212465301,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/su031.gif?v=1429853305"},{"product_id":"summer-2004","title":"Summer 2004","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eMirroring the Future\u003c\/li\u003e\n\u003cli\u003eScumware, Spyware, Adware, Sneakware\u003c\/li\u003e\n\u003cli\u003eClearChannel's Dirty Little Secret\u003c\/li\u003e\n\u003cli\u003eImpromptu Lock Picks\u003c\/li\u003e\n\u003cli\u003eMagstripe Interfacing - A Lost Art\u003c\/li\u003e\n\u003cli\u003eListening Via Linux\u003c\/li\u003e\n\u003cli\u003ePasswords on a Cue Cat\u003c\/li\u003e\n\u003cli\u003eThe Global Date Format\u003c\/li\u003e\n\u003cli\u003eBehind the Scenes of ITEC and the Milwaukee Bus System\u003c\/li\u003e\n\u003cli\u003eOmni Locks and Stupid Politics\u003c\/li\u003e\n\u003cli\u003eA Guide to Internet Piracy\u003c\/li\u003e\n\u003cli\u003eConsumer Spookware vs. Your Castle\u003c\/li\u003e\n\u003cli\u003eA Lesson on Trust\u003c\/li\u003e\n\u003cli\u003eFun With Netcat\u003c\/li\u003e\n\u003cli\u003eThe Lantronix SCS 1620: An Unpublicized Goldmine \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212465685,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/su041.gif?v=1429853353"},{"product_id":"summer-2005","title":"Summer 2005","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eOne Step Forward, Two Steps Back\u003c\/li\u003e\n\u003cli\u003eHacking Google AdWords\u003c\/li\u003e\n\u003cli\u003eHacking Google Map's Satellite Imagery\u003c\/li\u003e\n\u003cli\u003eGooglejacking by Example\u003c\/li\u003e\n\u003cli\u003eHome Depot's Lousy Security\u003c\/li\u003e\n\u003cli\u003eSYN-ful Experiment\u003c\/li\u003e\n\u003cli\u003eThe University of Insecurity\u003c\/li\u003e\n\u003cli\u003eCreating AIM Mayhem\u003c\/li\u003e\n\u003cli\u003eAIM Eavesdropping Hole\u003c\/li\u003e\n\u003cli\u003eNetwork Vigilantism Using Port 113\u003c\/li\u003e\n\u003cli\u003eHacking Encrypted HTML\u003c\/li\u003e\n\u003cli\u003ePasswords from Windows\u003c\/li\u003e\n\u003cli\u003eData Mining with Perl\u003c\/li\u003e\n\u003cli\u003eA Yahoo! Restriction Defeated\u003c\/li\u003e\n\u003cli\u003eSpying on the Library\u003c\/li\u003e\n\u003cli\u003eParadisePoker.com Blackjack Cracked\u003c\/li\u003e\n\u003cli\u003eWhere Have all the Implants Gone?\u003c\/li\u003e\n\u003cli\u003eAdding Sub-Domain Support to Your Free DotTK Domain\u003c\/li\u003e\n\u003cli\u003eGetting More from T-Mobile\u003c\/li\u003e\n\u003cli\u003eRemote Unix Execution Via a Cell Phone\u003c\/li\u003e\n\u003cli\u003eNCR: Barcodes to Passwords\u003c\/li\u003e\n\u003cli\u003eDefeating BitPim Restrictions\u003c\/li\u003e\n\u003cli\u003eFun with School ID Numbers\u003c\/li\u003e\n\u003cli\u003eRemote Secrets Revealed\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212466097,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/su051.gif?v=1429853379"},{"product_id":"summer-2006","title":"Summer 2006","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eWhom Shall We Blame?\u003c\/li\u003e\n\u003cli\u003eMore on Hacking Facebook\u003c\/li\u003e\n\u003cli\u003eGetting Screwed by PayPal\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eHacking the System\u003c\/li\u003e\n\u003cli\u003eEasy Access to T-Mobile and Cingular Accounts\u003c\/li\u003e\n\u003cli\u003eEgo Surfing\u003c\/li\u003e\n\u003cli\u003ePublic Access\u003c\/li\u003e\n\u003cli\u003eBreaking Mac OS X Program Security\u003c\/li\u003e\n\u003cli\u003eGPOs and Group Policy: Just Say No!\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Bruce Schneier\u003c\/li\u003e\n\u003cli\u003eMusic Today\u003c\/li\u003e\n\u003cli\u003eHacking Warner Brothers Records\u003c\/li\u003e\n\u003cli\u003eNetwork Administrators: Why We BREAK Harsh Rules\u003c\/li\u003e\n\u003cli\u003eHaving Fun with Cookies\u003c\/li\u003e\n\u003cli\u003eTECHNO-EXEGESIS\u003c\/li\u003e\n\u003cli\u003eRoll Your Own StealthSurfer II Privacy Stick\u003c\/li\u003e\n\u003cli\u003eUsing Loopback-Encrypted Filesystems on JumpDrives\u003c\/li\u003e\n\u003cli\u003eAn Argument Against MD5 Authentication\n\u003cp\u003ePlus LETTERS, MARKETPLACE, and the 2600 PUZZLE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212466621,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/su061.gif?v=1429853402"},{"product_id":"summer-2007","title":"Summer 2007","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eRemaining Relevant\u003c\/li\u003e\n\u003cli\u003eDiscovering Vulns\u003c\/li\u003e\n\u003cli\u003eThe Shifty Person's Guide to 0wning Tire Kingdom\u003c\/li\u003e\n\u003cli\u003eEnhancing Nortel IP Phones with Open Source Software\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eDeobfuscation\u003c\/li\u003e\n\u003cli\u003eGetting 2600 the Safe Way\u003c\/li\u003e\n\u003cli\u003eFun at the Airport\u003c\/li\u003e\n\u003cli\u003eHacking Xfire\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Mitch Altman\u003c\/li\u003e\n\u003cli\u003eValuepoint\u003c\/li\u003e\n\u003cli\u003eInternet Archaeology\u003c\/li\u003e\n\u003cli\u003eHacking Answers by Gateway\u003c\/li\u003e\n\u003cli\u003eVoIP Cellphones: The Call of the Future\u003c\/li\u003e\n\u003cli\u003ePandora Hack - Get Free MP3s\u003c\/li\u003e\n\u003cli\u003eAdventures in Behavioral Linguistics\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eAn ISP Story\u003c\/li\u003e\n\u003cli\u003eHacking Whipple Hill with XSS\u003c\/li\u003e\n\u003cli\u003eHaunting the MS Mansion\u003c\/li\u003e\n\u003cli\u003eReading ebooks on an iPod\u003c\/li\u003e\n\u003cli\u003eJava Reverse Engineering\n\u003cp\u003ePlus LETTERS, MARKETPLACE, and the 2600 PUZZLE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212467025,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/su071.gif?v=1429853428"},{"product_id":"summer-2008","title":"Summer 2008","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eThe Best of Times\u003c\/li\u003e\n\u003cli\u003eDon't \"Locate Me\"\u003c\/li\u003e\n\u003cli\u003eExploring Road Runner's Internal Network\u003c\/li\u003e\n\u003cli\u003eHacking Wireless Networks with Windows\u003c\/li\u003e\n\u003cli\u003eThe HughesNet FAP\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eHacking Society\u003c\/li\u003e\n\u003cli\u003eThirteen Years of Starting a Hacker Scene\u003c\/li\u003e\n\u003cli\u003eHPing (The Part I Forgot)\u003c\/li\u003e\n\u003cli\u003eMeditation for Hackers: All-Point Techniques\u003c\/li\u003e\n\u003cli\u003eFun with Network Friends\u003c\/li\u003e\n\u003cli\u003eHacking: A Graffiti Writer's Perspective\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Barry Wels\u003c\/li\u003e\n\u003cli\u003eA Portable Encrypted Linux System for Windows\u003c\/li\u003e\n\u003cli\u003eMac Address Changer\u003c\/li\u003e\n\u003cli\u003eCapturing Botnet Malware Using a Honeypot\u003c\/li\u003e\n\u003cli\u003eCracking with the Webtionary\u003c\/li\u003e\n\u003cli\u003eJavaScript Password DOMination\u003c\/li\u003e\n\u003cli\u003eSpirits 2000 Insecurity\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eThe Geek Squad\u003c\/li\u003e\n\u003cli\u003eBank of America Website Flaw\u003c\/li\u003e\n\u003cli\u003eWhy is This Computer Connected to the Internet?\u003c\/li\u003e\n\u003cli\u003eStory: Message of the Day\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212467417,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/su081.gif?v=1429853474"},{"product_id":"summer-2009","title":"Summer 2009","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eNot The Enemy\u003c\/li\u003e\n\u003cli\u003eRegaining Privacy in a Digital World\u003c\/li\u003e\n\u003cli\u003eThe Security-Conscious Uncle\u003c\/li\u003e\n\u003cli\u003eWhy the \"No-Fly List\" is a Fraud\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eFinding Information in the Library of Congress\u003c\/li\u003e\n\u003cli\u003eHacking the DI-524 Interface\u003c\/li\u003e\n\u003cli\u003eSimple How-to on Wireless and Windows Cracking\u003c\/li\u003e\n\u003cli\u003eIf You Can't Stand the Heat, Hack the Computers!\u003c\/li\u003e\n\u003cli\u003eSecurity: Truth Versus Fiction\u003c\/li\u003e\n\u003cli\u003eHacking the Beamz\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Jason Scott\u003c\/li\u003e\n\u003cli\u003eiTunes Stored Credit Card Vulnerability\u003c\/li\u003e\n\u003cli\u003eZipcar's Information Infrastructure\u003c\/li\u003e\n\u003cli\u003eThe How and Why of Hacking the U.N.\u003c\/li\u003e\n\u003cli\u003eListen to Radio Hackers!\u003c\/li\u003e\n\u003cli\u003eHACKER SPACES - EUROPE\u003c\/li\u003e\n\u003cli\u003eAbusing Metadata\u003c\/li\u003e\n\u003cli\u003eVerizon FIOS Wireless Insecurities\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eUsing Network Recon to Solve a Problem\u003c\/li\u003e\n\u003cli\u003eSuing Telemarketers for Fun and Profit\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212467781,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/su091.gif?v=1429853519"},{"product_id":"autumn-2000","title":"Autumn 2000","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cbr\u003e\n\u003cul\u003e\n\u003cli\u003eA Summer of Trials\u003c\/li\u003e\n\u003cli\u003eKernel Modification Using LKMs\u003c\/li\u003e\n\u003cli\u003eHow to Hack Cybertime Software\u003c\/li\u003e\n\u003cli\u003eTarget Advertising\u003c\/li\u003e\n\u003cli\u003eAn Introduction to Sprint ION\u003c\/li\u003e\n\u003cli\u003eThe GeoSpatial Revolution\u003c\/li\u003e\n\u003cli\u003eAnomaly Detection Systems\u003c\/li\u003e\n\u003cli\u003eHunting the Paper Carnivore\u003c\/li\u003e\n\u003cli\u003eThe Making of a Pseudo Felon\u003c\/li\u003e\n\u003cli\u003eFlaws in Outsourced ECommerce Systems\u003c\/li\u003e\n\u003cli\u003eFinding a Target Using DNS Lookups\u003c\/li\u003e\n\u003cli\u003eAnother Way to Defeat URL Filters\u003c\/li\u003e\n\u003cli\u003eAccessing Federal Court Records\u003c\/li\u003e\n\u003cli\u003eZone Scanning\u003c\/li\u003e\n\u003cli\u003eDeCSS in Words\u003c\/li\u003e\n\u003cli\u003eBuild a Car Computer \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212469513,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/fa001.gif?v=1429837585"},{"product_id":"autumn-2001","title":"Autumn 2001","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cbr\u003e\n\u003cul\u003e\n\u003cli\u003eConsequences\u003c\/li\u003e\n\u003cli\u003eDeconstructing a Fortres\u003c\/li\u003e\n\u003cli\u003ePassport Hacking\u003c\/li\u003e\n\u003cli\u003eHow to Decrypt DirecTV\u003c\/li\u003e\n\u003cli\u003eCode Red 2\u003c\/li\u003e\n\u003cli\u003eThe Ultimate DRM Hack\u003c\/li\u003e\n\u003cli\u003eDecloqing Copy Protection\u003c\/li\u003e\n\u003cli\u003eHacking Time\u003c\/li\u003e\n\u003cli\u003eMyths about TCP Spoofing\u003c\/li\u003e\n\u003cli\u003ePlaying with Qwest DSL\u003c\/li\u003e\n\u003cli\u003eDefeating Intrusion Detection Systems\u003c\/li\u003e\n\u003cli\u003eCompromising Internet Appliances\u003c\/li\u003e\n\u003cli\u003eAn Introduction to ARP Spoofing\u003c\/li\u003e\n\u003cli\u003eOffset Hacking\u003c\/li\u003e\n\u003cli\u003eThe Invisible Box\u003c\/li\u003e\n\u003cli\u003eBypassing Cisco Router Passwords\u003c\/li\u003e\n\u003cli\u003eHacking Retail Hardware\u003c\/li\u003e\n\u003cli\u003eHacking Kodak Picture Maker\u003c\/li\u003e\n\u003cli\u003eNetjacking for Complete Idiots\u003c\/li\u003e\n\u003cli\u003eExploiting Intelligent Peripherals \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212469749,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/fa011.gif?v=1429837604"},{"product_id":"autumn-2002","title":"Autumn 2002","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cbr\u003e\n\u003cul\u003e\n\u003cli\u003eFreedom's Biggest Enemy\u003c\/li\u003e\n\u003cli\u003eLawfully Authorized Electronic Surveillance\u003c\/li\u003e\n\u003cli\u003eThe Mysterious World of the Lerg\u003c\/li\u003e\n\u003cli\u003eTelezapper, Telemarketers, and the TCPA\u003c\/li\u003e\n\u003cli\u003eA Password Grabbing Attempt\u003c\/li\u003e\n\u003cli\u003eAdvanced Password Recovery\u003c\/li\u003e\n\u003cli\u003eFun Password Facts Revisited\u003c\/li\u003e\n\u003cli\u003eHacking on Vacation\u003c\/li\u003e\n\u003cli\u003eYour Guide to Target\u003c\/li\u003e\n\u003cli\u003eOutsmarting Blockbuster\u003c\/li\u003e\n\u003cli\u003eThe New Card Up DirecTV's Sleeve\u003c\/li\u003e\n\u003cli\u003eThe Pewter Box\u003c\/li\u003e\n\u003cli\u003eHow to Log URL Request Strings\u003c\/li\u003e\n\u003cli\u003eA History of \"31337SP34K\"\u003c\/li\u003e\n\u003cli\u003eHardware Broadband Client Monitoring - an Overview\u003c\/li\u003e\n\u003cli\u003eHow to Set Up a Free (Secure) Web Server at Home Behind Your Cable Modem and Get Away With It\u003c\/li\u003e\n\u003cli\u003eA Word of Warning from a Caught Uncapper\u003c\/li\u003e\n\u003cli\u003eHacking Electronic Message Centers\u003c\/li\u003e\n\u003cli\u003eBreaking Down the Dynix Door\u003c\/li\u003e\n\u003cli\u003eThe Current State of E-commerce Security\u003c\/li\u003e\n\u003cli\u003eReview: The Art of Deception \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212470177,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/fa021.gif?v=1429837623"},{"product_id":"autumn-2003","title":"Autumn 2003","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eFeeding the Frenzy\u003c\/li\u003e\n\u003cli\u003eGetting to Know Your Neighbors\u003c\/li\u003e\n\u003cli\u003eServers on a Ghetto ISP\u003c\/li\u003e\n\u003cli\u003eMore Methods for Hosting FTP on Broadband\u003c\/li\u003e\n\u003cli\u003eHacking the Look: Revisited\u003c\/li\u003e\n\u003cli\u003eCase Mods Made Easy\u003c\/li\u003e\n\u003cli\u003eDVDs on a Pocket PC\u003c\/li\u003e\n\u003cli\u003eMore Xbox Fun and Mischief\u003c\/li\u003e\n\u003cli\u003eShopping for a Security Flaw? Try Retail\u003c\/li\u003e\n\u003cli\u003eTroubling Target\u003c\/li\u003e\n\u003cli\u003eBlockbuster Tricks\u003c\/li\u003e\n\u003cli\u003eWebhacking with CVS\u003c\/li\u003e\n\u003cli\u003eBasics of Cellular Number Portability\u003c\/li\u003e\n\u003cli\u003eThe Hacker Diet\u003c\/li\u003e\n\u003cli\u003eFeather.c\u003c\/li\u003e\n\u003cli\u003eDenial of Service Attacks, Tools of the Tools\u003c\/li\u003e\n\u003cli\u003eFrequency Theory for the Phone Hacker\/Musician\u003c\/li\u003e\n\u003cli\u003eA Trip Down Memory Lane\u003c\/li\u003e\n\u003cli\u003eFinding Ogg - Audio Evangelism\u003c\/li\u003e\n\u003cli\u003eInfidelity in the Information Age\u003c\/li\u003e\n\u003cli\u003eThe Threat of Biometrics\u003c\/li\u003e\n\u003cli\u003eGentner GSC3000 for Total Morons \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212470921,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/fa031.gif?v=1429837641"},{"product_id":"autumn-2004","title":"Autumn 2004","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eLearning Curve\u003c\/li\u003e\n\u003cli\u003eIn the Belly of the Beast\u003c\/li\u003e\n\u003cli\u003eAnti-Forensics: Make Secrets Stay Secret\u003c\/li\u003e\n\u003cli\u003eDigital CDMA Cloning\u003c\/li\u003e\n\u003cli\u003eBit Torrent - The Future of the Internet?\u003c\/li\u003e\n\u003cli\u003eThe Insecurity of PHP Includes\u003c\/li\u003e\n\u003cli\u003eMovies on a Phone\u003c\/li\u003e\n\u003cli\u003eFree Encrypted Backups\u003c\/li\u003e\n\u003cli\u003eLaptop Security\u003c\/li\u003e\n\u003cli\u003eIntroduction to IPv6\u003c\/li\u003e\n\u003cli\u003eHacking Soda Machines\u003c\/li\u003e\n\u003cli\u003eMurphy Oil (Wal-Mart) Fueling Stations\u003c\/li\u003e\n\u003cli\u003eThe Big Picture - Linux is Approved!\u003c\/li\u003e\n\u003cli\u003eHow to Hack the Lottery\u003c\/li\u003e\n\u003cli\u003eThe Leightronix TCD\/IP\u003c\/li\u003e\n\u003cli\u003eDecoding Blockbuster\u003c\/li\u003e\n\u003cli\u003eWarwalking in Times Square\u003c\/li\u003e\n\u003cli\u003eFight Spam with JavaScript\u003c\/li\u003e\n\u003cli\u003efc.exe to the Rescue\u003c\/li\u003e\n\u003cli\u003eA Simple Solution to Dynamic IP Tracking \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212471197,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/fa041.gif?v=1429837668"},{"product_id":"autumn-2005","title":"Autumn 2005","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eQuestions\u003c\/li\u003e\n\u003cli\u003eData Destruction, Covering Your Tracks, and MBSA\u003c\/li\u003e\n\u003cli\u003eStupid Webstat Tricks\u003c\/li\u003e\n\u003cli\u003eA Randomizing WiFi MAC Address AP Hopper\u003c\/li\u003e\n\u003cli\u003eFun with the PRO-83\u003c\/li\u003e\n\u003cli\u003eGetting More out of SSH\u003c\/li\u003e\n\u003cli\u003eUsing Tor and SSH Tunneling\u003c\/li\u003e\n\u003cli\u003eReverse Remote Access\u003c\/li\u003e\n\u003cli\u003eSecuring a Drive\u003c\/li\u003e\n\u003cli\u003eJavascript Injection\u003c\/li\u003e\n\u003cli\u003eClimbing the SonicWall\u003c\/li\u003e\n\u003cli\u003eVerizon Fios - Fiber to the Home\u003c\/li\u003e\n\u003cli\u003eImproving Stealth With Autoruns\u003c\/li\u003e\n\u003cli\u003eSQL Exploits\u003c\/li\u003e\n\u003cli\u003eHexing the Registry\u003c\/li\u003e\n\u003cli\u003eNot Working at a Call Center\u003c\/li\u003e\n\u003cli\u003eSecuring Your Wireless Network\u003c\/li\u003e\n\u003cli\u003eThe Continuing War on Spyware\u003c\/li\u003e\n\u003cli\u003eHacking Image Shack\u003c\/li\u003e\n\u003cli\u003eI Am Not a Hacker\u003c\/li\u003e\n\u003cli\u003eSecurity Pitfalls for Inexperienced Web Designers\u003c\/li\u003e\n\u003cli\u003eA Peek Inside a Simple ATM Machine\u003c\/li\u003e\n\u003cli\u003eHow to Get Responses Through Deception\u003c\/li\u003e\n\u003cli\u003eThe Ancient Art of Tunneling, Rediscovered\u003c\/li\u003e\n\u003cli\u003eForging an Identity\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212471837,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/fa051.gif?v=1429837688"},{"product_id":"autumn-2006","title":"Autumn 2006","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eHope and Fear\u003c\/li\u003e\n\u003cli\u003eIdentity Theft: Misinformation Can Be Your Friend\u003c\/li\u003e\n\u003cli\u003eWhere Have The Philes Gone?\u003c\/li\u003e\n\u003cli\u003eA Back Door to Your Oracle Database\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eHacking Flickr\u003c\/li\u003e\n\u003cli\u003eFun with the Sears POS\u003c\/li\u003e\n\u003cli\u003eNever Pay for WiFi Again!\u003c\/li\u003e\n\u003cli\u003eHacking MySpace Using Common Sense\u003c\/li\u003e\n\u003cli\u003eRingtone Download Folliez\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Mark Abene aka Phiber Optik\u003c\/li\u003e\n\u003cli\u003eInsecurity at Pep Boys\u003c\/li\u003e\n\u003cli\u003eMobile Devices - Current and Future Security Threats\u003c\/li\u003e\n\u003cli\u003eHacking the System: Useful Connections\u003c\/li\u003e\n\u003cli\u003eTECHNO-EXEGESIS\u003c\/li\u003e\n\u003cli\u003eOwnage by AdSense\u003c\/li\u003e\n\u003cli\u003eInformation's Imprisonment\u003c\/li\u003e\n\u003cli\u003eSingapore Library Mischief\u003c\/li\u003e\n\u003cli\u003eMonitoring Motorola Canopy with Windows XP and MRTG\u003c\/li\u003e\n\u003cli\u003eAttacking Third Party Tracking\n\u003cp\u003ePlus LETTERS, MARKETPLACE, and the 2600 PUZZLE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212472437,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/fa061.gif?v=1429837707"},{"product_id":"autumn-2007","title":"Autumn 2007","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003ePolitics\u003c\/li\u003e\n\u003cli\u003eVoIP Security: Shit or Get Off the POTS\u003c\/li\u003e\n\u003cli\u003eGetting More Out of Your College Linux System\u003c\/li\u003e\n\u003cli\u003eSocial Engineering and Pretexts\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eLanguage Nonspecific: Back to Fundamentals\u003c\/li\u003e\n\u003cli\u003eFront Door Hacking: Redux\u003c\/li\u003e\n\u003cli\u003eA Penny For Your Laptop\u003c\/li\u003e\n\u003cli\u003eThe RIAA's War on Terror\u003c\/li\u003e\n\u003cli\u003eFree Files from Flash\u003c\/li\u003e\n\u003cli\u003eTarget: For Credit Card Fraud\u003c\/li\u003e\n\u003cli\u003eHow to Get More from Your Sugar Mama\u003c\/li\u003e\n\u003cli\u003eOwning UTStarcom F1000\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: YOU\u003c\/li\u003e\n\u003cli\u003eHacking 2600 Magazine Authors\u003c\/li\u003e\n\u003cli\u003eDesigning a Hacker Challenge\u003c\/li\u003e\n\u003cli\u003eHacking an Election\u003c\/li\u003e\n\u003cli\u003eHow to Cheat Goog411\u003c\/li\u003e\n\u003cli\u003eHacking the Buffalo Air Station Wireless Router\u003c\/li\u003e\n\u003cli\u003eThe Thrill of Custom Caller ID Capabilities\u003c\/li\u003e\n\u003cli\u003eSecuring Your Traffic\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eHacking the Nintendo WiFi USB Connector\u003c\/li\u003e\n\u003cli\u003eFun with International Internet Cafes\u003c\/li\u003e\n\u003cli\u003eThe Trouble with Library Records\u003c\/li\u003e\n\u003cli\u003eThe Life and Death of an American Help Desk Agent\n\u003cp\u003ePlus LETTERS, MARKETPLACE, and the 2600 PUZZLE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212472677,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/fa071.gif?v=1429837726"},{"product_id":"autumn-2008","title":"Autumn 2008","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eThe Last Shall Be First\u003c\/li\u003e\n\u003cli\u003eBell's Mind Markup Language\u003c\/li\u003e\n\u003cli\u003eThe TORminator\u003c\/li\u003e\n\u003cli\u003eThe State of Cyberspace and Cyberwar\u003c\/li\u003e\n\u003cli\u003eWatching the Watchers\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eApple Dashboard Widget Insecurity\u003c\/li\u003e\n\u003cli\u003ePenetration Testing: The Red Team Way\u003c\/li\u003e\n\u003cli\u003eFaxCore AUID Exploit\u003c\/li\u003e\n\u003cli\u003eResHacking Windows Vista Games\u003c\/li\u003e\n\u003cli\u003eRipping MP3s from Bleep\u003c\/li\u003e\n\u003cli\u003eImation Insecurities\u003c\/li\u003e\n\u003cli\u003eBlackhat SEO: Exploiting the Dumb Masses to Make a Profit\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Nick Farr\u003c\/li\u003e\n\u003cli\u003eSpoofing Banners with Open Source Servers\u003c\/li\u003e\n\u003cli\u003eA Different Kind of Remote Scripting\u003c\/li\u003e\n\u003cli\u003eSix Quick Points of Disguise\u003c\/li\u003e\n\u003cli\u003eAT\u0026amp;T Wireless Customer Information\u003c\/li\u003e\n\u003cli\u003eSetting Up Your Mobile Phone for International Dialing\u003c\/li\u003e\n\u003cli\u003eUSB Antiforensics\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eBe Your Own DDNS Service Using PHP\u003c\/li\u003e\n\u003cli\u003eDiscovering Firewalls\u003c\/li\u003e\n\u003cli\u003eHacking Music\u003c\/li\u003e\n\u003cli\u003eStory: Sleeper\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212473089,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/fa081.gif?v=1429837746"},{"product_id":"autumn-2009","title":"Autumn 2009","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eHacking In Tents\u003c\/li\u003e\n\u003cli\u003eExploiting University Students using Rogue Access Points\u003c\/li\u003e\n\u003cli\u003eCatching a Laptop Thief\/WiFi Hacker\u003c\/li\u003e\n\u003cli\u003eAttacking a Blind Spot\u003c\/li\u003e\n\u003cli\u003eHow to Almost Hide Your Digital Identity While Port Scanning\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eHello! Google Calling\u003c\/li\u003e\n\u003cli\u003ePost-Apocalyptic Communications\u003c\/li\u003e\n\u003cli\u003eRoll Your Own Hive Mind\u003c\/li\u003e\n\u003cli\u003eFree DirecTV on Frontier\u003c\/li\u003e\n\u003cli\u003eFree Trials - Avoid Giving Out Your Credit Card Number\u003c\/li\u003e\n\u003cli\u003eIf You Can't Stand the Heat, Hack the Computers! (Part 2)\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Johannes Grenzfurthner\u003c\/li\u003e\n\u003cli\u003eGranny Loves Linux!\u003c\/li\u003e\n\u003cli\u003eCracking WPA - PSK\u003c\/li\u003e\n\u003cli\u003eHACKER SPACES - THE REST OF THE WORLD\u003c\/li\u003e\n\u003cli\u003eHard Disk Encryption, No Excuses\u003c\/li\u003e\n\u003cli\u003eMicrosoft, Please Salt My Hash!\u003c\/li\u003e\n\u003cli\u003eHow to Get Free Loans From American Express\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eSSL DNSSEC\u003c\/li\u003e\n\u003cli\u003eTethering the Samsung SCH-R450 on MetroPCS\u003c\/li\u003e\n\u003cli\u003e\"Borrowing\" the CustomInk.com Vector Library\u003c\/li\u003e\n\u003cli\u003eHacking Your Hospital Bed\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212473389,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/fa091.gif?v=1429837762"},{"product_id":"winter-2000-2001","title":"Winter 2000-2001","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cbr\u003e\n\u003cul\u003e\n\u003cli\u003eDirection\u003c\/li\u003e\n\u003cli\u003eIntroduction to Snooping Around\u003c\/li\u003e\n\u003cli\u003eBellSouth's Mobitex Network\u003c\/li\u003e\n\u003cli\u003eAn Introduction to Radio Scanning\u003c\/li\u003e\n\u003cli\u003eMore Java Fun\u003c\/li\u003e\n\u003cli\u003eSub7 - Usage, Prevention, Removal\u003c\/li\u003e\n\u003cli\u003eThis Issue's Featured Lawsuit Threat\u003c\/li\u003e\n\u003cli\u003eGet Anyone's Credit Report For Free\u003c\/li\u003e\n\u003cli\u003eMicrosoft's Hook and Sinker\u003c\/li\u003e\n\u003cli\u003eHacking an NT Domain from the Desktop\u003c\/li\u003e\n\u003cli\u003eThe DVD Paper Chain\u003c\/li\u003e\n\u003cli\u003ePolymorphism Script\u003c\/li\u003e\n\u003cli\u003eConfusing ANI and Other Phone Tricks\u003c\/li\u003e\n\u003cli\u003eJury Nullification and The Hacker\u003c\/li\u003e\n\u003cli\u003eCop Proof\/Laptops\u003c\/li\u003e\n\u003cli\u003eRadio Shack's Newest Giveaway\u003c\/li\u003e\n\u003cli\u003eDissecting Shaw's Systems\u003c\/li\u003e\n\u003cli\u003eHacking Free ISPs Using WinDump \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212476089,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/wi001.gif?v=1429848632"},{"product_id":"winter-2001-2002","title":"Winter 2001-2002","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cbr\u003e\n\u003cul\u003e\n\u003cli\u003e2001-2002\u003c\/li\u003e\n\u003cli\u003eThe Security of the Inferno OS\u003c\/li\u003e\n\u003cli\u003eBlack Ice Defender - a Personal Firewall\u003c\/li\u003e\n\u003cli\u003eThe Future of Enhanced 911\u003c\/li\u003e\n\u003cli\u003eBehind the Scenes on a Web Page\u003c\/li\u003e\n\u003cli\u003eCracking Clever Content\u003c\/li\u003e\n\u003cli\u003eRight Click Suppression\u003c\/li\u003e\n\u003cli\u003eFun with Radio Shack\u003c\/li\u003e\n\u003cli\u003eBuilding a Floppy Based Router\u003c\/li\u003e\n\u003cli\u003eBuild a Wooden Computer\u003c\/li\u003e\n\u003cli\u003eHarnessing the Airwaves\u003c\/li\u003e\n\u003cli\u003eSecrets of Rogers @Home\u003c\/li\u003e\n\u003cli\u003eBasics on Answering Machine Hacking\u003c\/li\u003e\n\u003cli\u003eHacking the Highway\u003c\/li\u003e\n\u003cli\u003eHow to Hack from a Ram Disk\u003c\/li\u003e\n\u003cli\u003eHacking with Samba\u003c\/li\u003e\n\u003cli\u003eFun Facts about Wal-mart\u003c\/li\u003e\n\u003cli\u003eIIS - Far from Unhackable\u003c\/li\u003e\n\u003cli\u003eExamining Student Databases \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212476561,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/wi011.gif?v=1429848660"},{"product_id":"winter-2002-2003","title":"Winter 2002-2003","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cbr\u003e\n\u003cul\u003e\n\u003cli\u003ePositivity\u003c\/li\u003e\n\u003cli\u003ePassport Hacking Revisited\u003c\/li\u003e\n\u003cli\u003eLazy Exchange Admins\u003c\/li\u003e\n\u003cli\u003eWarspying\u003c\/li\u003e\n\u003cli\u003eCD Media Data Destruction\u003c\/li\u003e\n\u003cli\u003eHow to Make a DVD Backup\u003c\/li\u003e\n\u003cli\u003eHoneypots: Building the Better Hacker\u003c\/li\u003e\n\u003cli\u003eDNS Redirection Stopped\u003c\/li\u003e\n\u003cli\u003eMore on Telemarketing\u003c\/li\u003e\n\u003cli\u003eCracking Voter Fraud\u003c\/li\u003e\n\u003cli\u003eLinux on the Xbox\u003c\/li\u003e\n\u003cli\u003eRemoving Spyware and Adware\u003c\/li\u003e\n\u003cli\u003eExposing the Coinstar Network\u003c\/li\u003e\n\u003cli\u003eA Dumpster Diving Treasure\u003c\/li\u003e\n\u003cli\u003eDMCA vs. DMCRA\u003c\/li\u003e\n\u003cli\u003e.ncsc.mil (144.51.x.x)\u003c\/li\u003e\n\u003cli\u003eA Brief Introduction to Deepfreeze\u003c\/li\u003e\n\u003cli\u003eBeating Download Manager Protection\u003c\/li\u003e\n\u003cli\u003eDHCP is Your Friend! \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212477181,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/wi021.gif?v=1429848682"},{"product_id":"winter-2003-2004","title":"Winter 2003-2004","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eParanoia vs. Sanity\u003c\/li\u003e\n\u003cli\u003eHacking the Genome\u003c\/li\u003e\n\u003cli\u003eWhom Do You Trust?\u003c\/li\u003e\n\u003cli\u003eSystem Profiling Through RPC\u003c\/li\u003e\n\u003cli\u003eRobots and Spiders\u003c\/li\u003e\n\u003cli\u003eLiving Without an SSN\u003c\/li\u003e\n\u003cli\u003eMore Fun With Wireless Hacking\u003c\/li\u003e\n\u003cli\u003eWEP: Not For Me\u003c\/li\u003e\n\u003cli\u003eWar Driving with a Pocket PC\u003c\/li\u003e\n\u003cli\u003eVerizon's Call Intercept\u003c\/li\u003e\n\u003cli\u003eFun With Hping\u003c\/li\u003e\n\u003cli\u003eRemote Computing Secured\u003c\/li\u003e\n\u003cli\u003eDISA, Unix Security, and Reality\u003c\/li\u003e\n\u003cli\u003eHacking the \"Captivate\" Network\u003c\/li\u003e\n\u003cli\u003eUnlocking GSM Handsets\u003c\/li\u003e\n\u003cli\u003eUnlocking WebLock Pro\u003c\/li\u003e\n\u003cli\u003eHoles in Windows 2003 Server\u003c\/li\u003e\n\u003cli\u003eHow to Mess with Citibank Collections \u003cbr\u003e \u003cbr\u003e \u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212477613,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/wi031.gif?v=1429848713"},{"product_id":"winter-2004-2005","title":"Winter 2004-2005","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eStick Around\u003c\/li\u003e\n\u003cli\u003eHacking CDMA PRLs\u003c\/li\u003e\n\u003cli\u003eAn Old Trick for a New Dog - WiFi and MITM\u003c\/li\u003e\n\u003cli\u003eVulnerabilities in Subscription Wireless\u003c\/li\u003e\n\u003cli\u003eBest Buy's Uber Insecurity\u003c\/li\u003e\n\u003cli\u003eHijacking Auto-Run Programs\u003c\/li\u003e\n\u003cli\u003eCatching Credit Card Fraud through Steganography\u003c\/li\u003e\n\u003cli\u003eAd-Ware: The Art of Removal\u003c\/li\u003e\n\u003cli\u003eTracking Wireless Neighbors\u003c\/li\u003e\n\u003cli\u003eBackdooring the NAT'ed Network\u003c\/li\u003e\n\u003cli\u003eElectronic Warfare\u003c\/li\u003e\n\u003cli\u003eGrokking for Answers\u003c\/li\u003e\n\u003cli\u003eHacking LaGard ComboGard Locks\u003c\/li\u003e\n\u003cli\u003eAVS Spanner Addendum\u003c\/li\u003e\n\u003cli\u003eHow to Own Star Search\u003c\/li\u003e\n\u003cli\u003eHacking Ticketmaster\u003c\/li\u003e\n\u003cli\u003ePractical Paranoia\u003c\/li\u003e\n\u003cli\u003eBuilding Cheap ID Cards\u003c\/li\u003e\n\u003cli\u003eHotspot Tunneling\u003c\/li\u003e\n\u003cli\u003eSelfcheckout or ATM?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212479013,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/wi041.gif?v=1429848740"},{"product_id":"winter-2005-2006","title":"Winter 2005-2006","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003ePreserving the Magic\u003c\/li\u003e\n\u003cli\u003eNetwork Administrators: Why We Make Harsh Rules\u003c\/li\u003e\n\u003cli\u003ePractical Web Page Steganography\u003c\/li\u003e\n\u003cli\u003eHacking a JP1 Remote Control\u003c\/li\u003e\n\u003cli\u003eThe RedBox DVD Kiosk\u003c\/li\u003e\n\u003cli\u003ePunking the Watchers\u003c\/li\u003e\n\u003cli\u003eHow to Track Any UK GSM Mobile Phone\u003c\/li\u003e\n\u003cli\u003eAn Introduction to the Asterisk PBX\u003c\/li\u003e\n\u003cli\u003eSpoofing Your Charge Number\u003c\/li\u003e\n\u003cli\u003ePhone System Loopholes Using VoIP\u003c\/li\u003e\n\u003cli\u003ePhysically Accessing Your Apartment with Skype\u003c\/li\u003e\n\u003cli\u003eObfuscation and Encoding in PHP\u003c\/li\u003e\n\u003cli\u003eAPOP Email Protocol - MDS Challenge\/Response\u003c\/li\u003e\n\u003cli\u003ePGP Key Signing Observations\u003c\/li\u003e\n\u003cli\u003ePersuasiveness and Social Engineering\u003c\/li\u003e\n\u003cli\u003eThe Real Electronic Brain Implantation Enhancement\u003c\/li\u003e\n\u003cli\u003eObserving the Lottery\u003c\/li\u003e\n\u003cli\u003eSears Portrait Insecurities\u003c\/li\u003e\n\u003cli\u003eKodak Secrets and Wal-Mart Fun\u003c\/li\u003e\n\u003cli\u003eThe Workings of a Kodak Picture Maker\u003c\/li\u003e\n\u003cli\u003eWiMax, AT\u0026amp;T Style\u003c\/li\u003e\n\u003cli\u003eCheap Mobile Internet for Your PowerBook\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212479973,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/wi051.gif?v=1429848776"},{"product_id":"winter-2006-2007","title":"Winter 2006-2007","description":"now with MORE PAGES THAN EVER!\n\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eTransition\u003c\/li\u003e\n\u003cli\u003eMobile Devices - Current and Future Security Threats\u003c\/li\u003e\n\u003cli\u003eFirstClass Hacking\u003c\/li\u003e\n\u003cli\u003eNetwork Administrators: Rules Rationale\u003c\/li\u003e\n\u003cli\u003eWi-Fi Hunting: Basic Tools and Techniques\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eCircumventing the DoD's SmartFilter\u003c\/li\u003e\n\u003cli\u003eAlgorithmic Encryption Without Math\u003c\/li\u003e\n\u003cli\u003eRed Boxing Revealed for the New Age\u003c\/li\u003e\n\u003cli\u003eHow to Get Around Cable\/DSL Lockdowns\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Phillip Torrone\u003c\/li\u003e\n\u003cli\u003eLibrary Self-Checkout Machine Exploit\u003c\/li\u003e\n\u003cli\u003eFun with Novell\u003c\/li\u003e\n\u003cli\u003eHow to Build a Book Safe\u003c\/li\u003e\n\u003cli\u003eNetwork Programming and Distributed Scripting with newLISP\u003c\/li\u003e\n\u003cli\u003eTECHNO-EXEGESIS\u003c\/li\u003e\n\u003cli\u003eGasJack - Hijacking Free Gasoline\u003c\/li\u003e\n\u003cli\u003eMotorola IMfree as a Wireless iTunes Remote\u003c\/li\u003e\n\u003cli\u003eThe Not-So-Great Firewall of China\u003c\/li\u003e\n\u003cli\u003eHactivism in the Land Without a Server\u003c\/li\u003e\n\u003cli\u003eK7: Free [for the taking] Voicemail\n\u003cp\u003ePlus LETTERS, MARKETPLACE, and the 2600 PUZZLE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212480653,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/wi061.gif?v=1429848800"},{"product_id":"winter-2007-2008","title":"Winter 2007-2008","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eThe More Things Change...\u003c\/li\u003e\n\u003cli\u003ePower Trip\u003c\/li\u003e\n\u003cli\u003eBuilding Your Own Networks\u003c\/li\u003e\n\u003cli\u003ePirates of the Internet\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eDarknets\u003c\/li\u003e\n\u003cli\u003eScanning the Skies\u003c\/li\u003e\n\u003cli\u003eEssential Security Tools\u003c\/li\u003e\n\u003cli\u003eDecoding Experts-Exchange.com\u003c\/li\u003e\n\u003cli\u003eAn Introduction to Beige Boxing\u003c\/li\u003e\n\u003cli\u003eHacking the SanDisk U3\u003c\/li\u003e\n\u003cli\u003eExploring AT\u0026amp;T's Wireless Account Security\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Rop Gonggrijp\u003c\/li\u003e\n\u003cli\u003e(More) Fun with Novell\u003c\/li\u003e\n\u003cli\u003ePayPal Hurts\u003c\/li\u003e\n\u003cli\u003eFacebook Applications Revealed\u003c\/li\u003e\n\u003cli\u003eHacking Windows Media DRM\u003c\/li\u003e\n\u003cli\u003eThe Noo World\u003c\/li\u003e\n\u003cli\u003eForensics Fear\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eCracked Security at the Clarion Hotel\u003c\/li\u003e\n\u003cli\u003eBuilding Your Own Safe, Secure SMTP Proxy\u003c\/li\u003e\n\u003cli\u003eZero-Knowledge Intrusion\u003c\/li\u003e\n\u003cli\u003eBooting Many Compressed Environments on a Laptop\u003c\/li\u003e\n\u003cli\u003eAvoid Web Filtering with SSH Tunneling\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212481309,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/wi071.gif?v=1429848824"},{"product_id":"winter-2008-2009","title":"Winter 2008-2009","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eBeginnings\u003c\/li\u003e\n\u003cli\u003eIntroduction to Forensic Data Recovery\u003c\/li\u003e\n\u003cli\u003eHacking Dubai and More Internet Proxy Loopholes\u003c\/li\u003e\n\u003cli\u003eCalling Comdial\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eDe-obfuscating Scripting Languages\u003c\/li\u003e\n\u003cli\u003eSocial Engineering the Stock Market\u003c\/li\u003e\n\u003cli\u003eMaking Your Windows Box A Little More Secure\u003c\/li\u003e\n\u003cli\u003eHack Thyself\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Bre Pettis\u003c\/li\u003e\n\u003cli\u003eBeating the System to Get Beats\u003c\/li\u003e\n\u003cli\u003eAnonymous SSH at the Library\u003c\/li\u003e\n\u003cli\u003eTrashing Gone Wrong in Switzerland\u003c\/li\u003e\n\u003cli\u003eThis Posting Has Been Flagged For Removal\u003c\/li\u003e\n\u003cli\u003eImproved Mnemonic Password Policy\u003c\/li\u003e\n\u003cli\u003ePappy's Cheese Box\u003c\/li\u003e\n\u003cli\u003eHacking for Beer\u003c\/li\u003e\n\u003cli\u003eGaming Gamestop\u003c\/li\u003e\n\u003cli\u003eVulnerabilities in the Corporate Sector\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eBusiness Intelligence\u003c\/li\u003e\n\u003cli\u003eHacking WebCT\u003c\/li\u003e\n\u003cli\u003eStory: Conspiracy\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212482089,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/wi081.gif?v=1429848845"},{"product_id":"winter-2009-2010","title":"Winter 2009-2010","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eSmart Regression\u003c\/li\u003e\n\u003cli\u003ePwning Past Whole Disk Encryption\u003c\/li\u003e\n\u003cli\u003eL33ching the L33chers: Using a Portable Wireless Network\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eHacking Tor's Control Protocol\u003c\/li\u003e\n\u003cli\u003eHack T-Mobile Prepaid Messaging and T-Zones\u003c\/li\u003e\n\u003cli\u003eCalling Comdial Part 2\u003c\/li\u003e\n\u003cli\u003eUnderground Physical Network\u003c\/li\u003e\n\u003cli\u003eUnderstanding Hacking Tools with Socket Programming\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Annalee Newitz\u003c\/li\u003e\n\u003cli\u003eHey Adobe! Leave My Boot Loader Alone!\u003c\/li\u003e\n\u003cli\u003eRevenge is a Dish Best Served Cold\u003c\/li\u003e\n\u003cli\u003eHACKER SPACES - NEW FOREIGN\u003c\/li\u003e\n\u003cli\u003eSocial Engineering from a New Perspective\u003c\/li\u003e\n\u003cli\u003eA Simple Technique for Drum 'n' Bass\u003c\/li\u003e\n\u003cli\u003eRetail Automation - ABS\u003c\/li\u003e\n\u003cli\u003eConnecting to streamtheworld Audio Stream Directly\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eThe Importance of Hacking Your School's Network\u003c\/li\u003e\n\u003cli\u003eFiction: Shakedown\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212482657,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/wi091.gif?v=1429848865"}],"url":"https:\/\/store.2600.com\/collections\/2000-2009\/conference_hope_16+2020.oembed","provider":"2600 Magazine","version":"1.0","type":"link"}