{"title":"2010-2019","description":"","products":[{"product_id":"spring-2015","title":"Spring 2015","description":"\u003cul\u003e\n\u003cli\u003eNous Défions Tout\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSo, You Want to Be a Darknet Drug Lord....\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eOut of the Box Survival - A Guide to PowerShell Basics\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBrazil's Electronic Voting Booth\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEvolution of a Hack\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBleeper - Downloading Full-length Preview MP3s from bleep.com\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Enterprise, the Subverted PKI Trust Relationship, and You\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWYSE Moves\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eOffice Talk or Social Engineering?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eArchiving ComiXology\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMcAfee Family Protection - Epic Fail!\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAbusing the Past\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHacking the HandLink Gateway\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eOhio Prison IT Security from the Inside\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHacking For Knowledge\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eLinux Containers for Event Training\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAre Smart Meters the End-All?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1209748113,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/cover.jpg?v=1429482345"},{"product_id":"winter-2014-2015","title":"Winter 2014-2015","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eTools for a New Future\u003c\/li\u003e\n\u003cli\u003ePassword Cracking in the Modern Age\u003c\/li\u003e\n\u003cli\u003eWhat Do Ordinary People Think a Hacker Is?\u003c\/li\u003e\n\u003cli\u003eSecurity Behavior\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eFormat De-Shifting\u003c\/li\u003e\n\u003cli\u003eSimplocker Gonna Get'cha\u003c\/li\u003e\n\u003cli\u003eHome Depot Hacks\u003c\/li\u003e\n\u003cli\u003eLeeching Music From YouTube For Fun, Learning, and Profit\u003c\/li\u003e\n\u003cli\u003eRecon on Disney's Magic Band\u003c\/li\u003e\n\u003cli\u003eHow Portable Can Wi-Fi Get?\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eThe Surveillance Kings: Who's Really Behind Who's Watching Us\u003c\/li\u003e\n\u003cli\u003eTaking Your Work Home After Work\u003c\/li\u003e\n\u003cli\u003eThe Perils of Lackadaisical Updates\u003c\/li\u003e\n\u003cli\u003eCrypto Systems Which Resist Quantum Computers\u003c\/li\u003e\n\u003cli\u003eThe 21st Century Hacker Manifesto\u003c\/li\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003cli\u003eAre You the Consumer, or the Product?\u003c\/li\u003e\n\u003cli\u003eGenerating Phone Numbers\u003c\/li\u003e\n\u003cli\u003eHacking Dudley\u003c\/li\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 0xB-0xC\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1210969813,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/31-4_cover.jpg?v=1429508260"},{"product_id":"autumn-2014","title":"Autumn 2014","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eA Tale of Many Hackers\u003c\/li\u003e\n\u003cli\u003eThe Demoscene - Code, Graphics, and Music Hacking\u003c\/li\u003e\n\u003cli\u003eBugging a Room with an IP Phone\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eHack the Track: Put Your Money Where Your 0wn Is!\u003c\/li\u003e\n\u003cli\u003eLinux Pwned - Just Not By Me\u003c\/li\u003e\n\u003cli\u003eWriting Buffer Overflows for Non-Programmers\u003c\/li\u003e\n\u003cli\u003eRemailing with USPS\u003c\/li\u003e\n\u003cli\u003eForensic Bioinformatics Hacks\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eSpam: Where Does It Come From?\u003c\/li\u003e\n\u003cli\u003eCheckmate or How I Bypassed Your Security System with a Shoe String and Hanging File Folder the Morning After You Upgraded It\u003c\/li\u003e\n\u003cli\u003eInstalling Debian on a Macbook Pro without rEFInd or Virtual Machines\u003c\/li\u003e\n\u003cli\u003eFilm Review: Die Gstettensaga: A Call to Class Consciousness for Hackers\u003c\/li\u003e\n\u003cli\u003eXfinite Absurdity: True Confessions of a Former Comcast Tech Support Agent\u003c\/li\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003cli\u003eCovert War-Driving with WiGLE\u003c\/li\u003e\n\u003cli\u003eQuantum Computers for Code Breaking\u003c\/li\u003e\n\u003cli\u003eInfoSec and the Electrical Grid: They Go Together Like Peas and Carrots\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1210976289,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/3q14-cover.jpg?v=1429508475"},{"product_id":"summer-2014","title":"Summer 2014","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eWatching the Watchers\u003c\/li\u003e\n\u003cli\u003eSabotage The System: Encryption as Surveillance State Monkey Wrench\u003c\/li\u003e\n\u003cli\u003eCrossover: Where Metal and Hacking Met and Mixed\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eFun With the Minuteman III Weapon System - Part Three\u003c\/li\u003e\n\u003cli\u003eFun with Data Entropy Attacks\u003c\/li\u003e\n\u003cli\u003eNetwork Condom\u003c\/li\u003e\n\u003cli\u003eYippie Ki-Yay: Social Engineering and Film\u003c\/li\u003e\n\u003cli\u003eHack Your House\u003c\/li\u003e\n\u003cli\u003eCorporate Security and Chinese Hacking\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eExperiences of a Hobo Security Consultant\u003c\/li\u003e\n\u003cli\u003e\"My Precious...\" (Apple)\u003c\/li\u003e\n\u003cli\u003eHacking the SanDisk Connect Wireless Media Drive\u003c\/li\u003e\n\u003cli\u003eToilet Hacking\u003c\/li\u003e\n\u003cli\u003e\"Good Afternoon. This is Your Fake AV Calling.\"\u003c\/li\u003e\n\u003cli\u003eFuture Visions\u003c\/li\u003e\n\u003cli\u003eClosing the Schism Between Hackers and the Law\u003c\/li\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 10\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1210978833,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/cv1_cv4_hacker312_cover.jpg?v=1429508662"},{"product_id":"spring-2014","title":"Spring 2014","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eThirty Years On\u003c\/li\u003e\n\u003cli\u003eLessons from \"Secret\" History\u003c\/li\u003e\n\u003cli\u003eGoogle's Two-Factor Authentication: The Sneaky Trust Feature\u003c\/li\u003e\n\u003cli\u003eIdentity and Encryption Verification\u003c\/li\u003e\n\u003cli\u003eAsterisk: The Busy Box\u003c\/li\u003e\n\u003cli\u003eUsing Square to Obtain Dollars at a Reasonable Rate\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eRobbing the Rich Using Bitcoin\u003c\/li\u003e\n\u003cli\u003eThe Night the ATM Went Down on Me\u003c\/li\u003e\n\u003cli\u003eAndroid Reversing Bootcamp\u003c\/li\u003e\n\u003cli\u003eHacking Commercial Maytag Washers and Dryers\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eAccessing Data Structures in a Randomized Address Space\u003c\/li\u003e\n\u003cli\u003eA Little Excitement Never Hurt Anybody!\u003c\/li\u003e\n\u003cli\u003eBrute-forcing PIN Code Keypads Using Combinatorial Mathematics\u003c\/li\u003e\n\u003cli\u003eBuilding a Community Forum\u003c\/li\u003e\n\u003cli\u003eWhy IMDB Got a Captcha\u003c\/li\u003e\n\u003cli\u003eAt Home Malware (and Online Ads) Protection\u003c\/li\u003e\n\u003cli\u003eAutomated Target Acquisition\u003c\/li\u003e\n\u003cli\u003eFiction: Lock and Key\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1210984493,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/31q1-cover.jpg?v=1429509122"},{"product_id":"season-year","title":"Winter 2013-2014 (only available in our DOWNLOAD section)","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eDissent or Descent\u003c\/li\u003e\n\u003cli\u003eID3 Tag Messages\u003c\/li\u003e\n\u003cli\u003ePrivacy - A New Hope Through Tails\u003c\/li\u003e\n\u003cli\u003eFun with the Minuteman III Weapon System - Part Two\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eThe Many Vulnerabilities of Verity Parental Control\u003c\/li\u003e\n\u003cli\u003eAnonymity and You, Firefox 17 Edition\u003c\/li\u003e\n\u003cli\u003eWi-Fi Security: Attack and Defense\u003c\/li\u003e\n\u003cli\u003eThe Maturation Cycle of a Hacker\u003c\/li\u003e\n\u003cli\u003eThere is \u003ci\u003eNever\u003c\/i\u003e a Free Lunch\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eCYS Using a Pi to Pivot\u003c\/li\u003e\n\u003cli\u003ePretty Good Privacy\u003c\/li\u003e\n\u003cli\u003eHacking Your Mother Tongue to Obfuscate your Encryption\u003c\/li\u003e\n\u003cli\u003eThe Growing Schism Between Hackers and the Law\u003c\/li\u003e\n\u003cli\u003eNetcam: Basics and Vulnerabilities\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eAll I Want is Total Freedom\u003c\/li\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 7-9\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212436453,"sku":"","price":4.99,"currency_code":"USD","in_stock":false}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/cv1_cv4-hacker304-cover.jpg?v=1429848989"},{"product_id":"copy-of-season-year","title":"Autumn 2013","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eThe Right to Know\u003c\/li\u003e\n\u003cli\u003eAn Introduction to Bitcoin\u003c\/li\u003e\n\u003cli\u003eBitcoin: The Hacker Currency?\u003c\/li\u003e\n\u003cli\u003eInquiring Minds = Hacker = Design Engineer\u003c\/li\u003e\n\u003cli\u003eHacking The Apple Collective\u003c\/li\u003e\n\u003cli\u003eInternet Trolls\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eControlling the Information Your Android Apps Send Home\u003c\/li\u003e\n\u003cli\u003eU-verse Networking\u003c\/li\u003e\n\u003cli\u003eScamming the Scammer: A Fun Way to Respond to a 419 Scam\u003c\/li\u003e\n\u003cli\u003eThe Art of War and What IT Professionals Can Learn from It\u003c\/li\u003e\n\u003cli\u003eAccess Tandem Codes and the Hidden Phone Network\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003ePalo Alto NGFW Insider\u003c\/li\u003e\n\u003cli\u003eIdentity Management and Its Role in Security Strategy of Enterprise Environments\u003c\/li\u003e\n\u003cli\u003eDefeating Forensic Attacks on Full Disk Encryption\u003c\/li\u003e\n\u003cli\u003eBank Notes\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eRelax, We Bought Security\u003c\/li\u003e\n\u003cli\u003eClouds, Clouds, Clouds\u003c\/li\u003e\n\u003cli\u003eLights, Camera, Hack\u003c\/li\u003e\n\u003cli\u003eFiction: The Error\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212436637,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/SnowdenCover.jpg?v=1429837902"},{"product_id":"copy-of-copy-of-season-year","title":"Summer 2013","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eThe Road to Safety\u003c\/li\u003e\n\u003cli\u003eSplunking the Google Dork\u003c\/li\u003e\n\u003cli\u003eFun with the Minuteman III Weapon System\u003c\/li\u003e\n\u003cli\u003eMy First Blackhat\u003c\/li\u003e\n\u003cli\u003eHow to Create and Operate a Temporary Free Autonomous Zone\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eA Broad Spectrum of DRM\u003c\/li\u003e\n\u003cli\u003eGetting Free Media - All Without Torrents!\u003c\/li\u003e\n\u003cli\u003eA Beginner's Guide to Social Engineering\u003c\/li\u003e\n\u003cli\u003eWhy Your Grandparents Don't Like the Internet\u003c\/li\u003e\n\u003cli\u003eWhat Made Unix Great and Why the Desktop is in Such Bad Shape\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003e0-Day Adventures\u003c\/li\u003e\n\u003cli\u003eHow a Prehistoric Hacker Got Started\u003c\/li\u003e\n\u003cli\u003eThe Weather Outside is Frightful\/Bulls-eye on the Banks - Again\u003c\/li\u003e\n\u003cli\u003eExploiting the Postal Service Address System for Personal Gain\u003c\/li\u003e\n\u003cli\u003eA World without Security\u003c\/li\u003e\n\u003cli\u003eBook Review: \u003ci\u003ePirate Cinema\u003c\/i\u003e\n\u003c\/li\u003e\n\u003cli\u003eCyber Attacks on Equities Markets\u003c\/li\u003e\n\u003cli\u003eStatic Code Analysis Using Watchtower\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eTracking Users on Trustworthy Sources\u003c\/li\u003e\n\u003cli\u003eA Response to \"Perfect Encryption - Old Style!\"\u003c\/li\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 6\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212436949,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/cover_4b514393-ac76-4c56-840d-4a76409a974c.jpg?v=1429853640"},{"product_id":"copy-of-copy-of-copy-of-season-year","title":"Spring 2013","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eA Lost Promise\u003c\/li\u003e\n\u003cli\u003eGuest Networks: Protection Less Than WEP?\u003c\/li\u003e\n\u003cli\u003ePractical Cryptanalysis\u003c\/li\u003e\n\u003cli\u003eTwitter For Fun and Profit\u003c\/li\u003e\n\u003cli\u003eWarning for Ye Olde Bank - Don't Do This!\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eSocial Engineering: Tactics for Prevention\u003c\/li\u003e\n\u003cli\u003eExtra-Legal Harassment\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eBook Review: \u003ci\u003eExploding the Phone\u003c\/i\u003e\n\u003c\/li\u003e\n\u003cli\u003eFiddler - Never Trust the Client\u003c\/li\u003e\n\u003cli\u003eU.S. Department Of State Loves Mexico\u003c\/li\u003e\n\u003cli\u003eHypercapitalism and Its Discontents\u003c\/li\u003e\n\u003cli\u003eFun with Base Math\u003c\/li\u003e\n\u003cli\u003eCracking Push-Button Locks\u003c\/li\u003e\n\u003cli\u003eBrute Force Access\u003c\/li\u003e\n\u003cli\u003eThe Usage of the Assumption Technique in Social Engineering\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eDev'ing an OS\u003c\/li\u003e\n\u003cli\u003eLearning, Hacking, and the Raspberry Pi\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212437217,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp131.gif?v=1429852810"},{"product_id":"copy-of-copy-of-copy-of-copy-of-season-year","title":"Winter 2012-2013","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eStorm Clouds\u003c\/li\u003e\n\u003cli\u003eBasic Code Breaking\u003c\/li\u003e\n\u003cli\u003eAn Overview of the Security Benefits Offered by Desktop Virtualization\u003c\/li\u003e\n\u003cli\u003eHardware Hacking - An Introduction Via Dev' Boards\u003c\/li\u003e\n\u003cli\u003eHacking Walgreens Photo Processing Machines\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eC is for Camouflage\u003c\/li\u003e\n\u003cli\u003eA Method to Spider Sites Like Indeed.com with Teleport Pro\u003c\/li\u003e\n\u003cli\u003eSteganography over Covert Channels: Implementation and Government Response\u003c\/li\u003e\n\u003cli\u003eNew Ways of Ranking Documents\u003c\/li\u003e\n\u003cli\u003eHacking Dirt\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eThe Security Funnel: When OpenVPN Meets Tor\u003c\/li\u003e\n\u003cli\u003eTactical Teensy Rapid Recon\u003c\/li\u003e\n\u003cli\u003eAn Alternate Method for Creating an SSH Tunnel with PuTTY and Squid\u003c\/li\u003e\n\u003cli\u003eHow to Survive a DNS Attack\u003c\/li\u003e\n\u003cli\u003eThe Breach That Wasn't\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eWordpress Exploit Immunization\u003c\/li\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 3-5\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212439005,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/wi121.gif?v=1429848941"},{"product_id":"copy-of-copy-of-copy-of-copy-of-copy-of-season-year","title":"Autumn 2012","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eThe Eyes Have It\u003c\/li\u003e\n\u003cli\u003eTechnology at the Federal Bureau of Prisons\u003c\/li\u003e\n\u003cli\u003eUsing Bluetooth Devices as an Additional Security Measure in Linux\u003c\/li\u003e\n\u003cli\u003eHackers Indispensable for Volunteer Groups\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eThe Quadcopter Crash Course\u003c\/li\u003e\n\u003cli\u003eSpear Phishing at a Bank - A Hard Lesson Learned\u003c\/li\u003e\n\u003cli\u003eRestoring Honest Elections\u003c\/li\u003e\n\u003cli\u003eHackers in Space\u003c\/li\u003e\n\u003cli\u003eHacking Apple's System\u003c\/li\u003e\n\u003cli\u003eFundamental Flaws in Online and Phone Ordering\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eBeware the Cyber Weapons Industrial Complex\u003c\/li\u003e\n\u003cli\u003eXML Automated Gambling\u003c\/li\u003e\n\u003cli\u003eStuxnet: An Analysis\u003c\/li\u003e\n\u003cli\u003eHow to Leech from Spotify\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eRadio Redux\u003c\/li\u003e\n\u003cli\u003ePhysical Security Threat from Hotel WiFi\u003c\/li\u003e\n\u003cli\u003eA Nice, Hot, Socially Engineered Meal\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212439217,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/fa121.gif?v=1429837821"},{"product_id":"copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-season-year","title":"Summer 2012","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eScales of Inequality\u003c\/li\u003e\n\u003cli\u003eBluetooth Hunter's Guide\u003c\/li\u003e\n\u003cli\u003eSecurity by Obscurity = Insecurity\u003c\/li\u003e\n\u003cli\u003eBuilding a Cat-5 Cable Tap\u003c\/li\u003e\n\u003cli\u003eNGFW - Not Grandpa's Firewall\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eA Counterpoint to \"The Piracy Situation\"\u003c\/li\u003e\n\u003cli\u003eThe Piracy Situation: The Devil's Advocate\u003c\/li\u003e\n\u003cli\u003eWhy is Piracy Still Allowed?\u003c\/li\u003e\n\u003cli\u003eThe New Age of the Mind\u003c\/li\u003e\n\u003cli\u003eBuilding the Better Brute Force Algorithm\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eFirewall Your iPhone\u003c\/li\u003e\n\u003cli\u003eMemoir of a Tech Writer: The Art of Leverage\u003c\/li\u003e\n\u003cli\u003eSay It Ain't So Verizon\u003c\/li\u003e\n\u003cli\u003eHacking Climate Change With WeatherLink\u003c\/li\u003e\n\u003cli\u003eBaofeng UV-3R: The Cheapest Dual-Band Ham Radio HT\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eMetaphasic Denial of Service Attacks\u003c\/li\u003e\n\u003cli\u003eNever Be ON TIME Again!\u003c\/li\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 1 \u0026amp; 2\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212439409,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/su121.gif?v=1429853604"},{"product_id":"copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-season-year","title":"Spring 2012","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eGame Changing\u003c\/li\u003e\n\u003cli\u003eA PHP Rootkit Case Study\u003c\/li\u003e\n\u003cli\u003eDenial of Service 2.0\u003c\/li\u003e\n\u003cli\u003eSpoofing MAC Addresses on Windows\u003c\/li\u003e\n\u003cli\u003eGroupMe: A Modern Approach to Social Engineering\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eCuriosity Killed the Cat\u003c\/li\u003e\n\u003cli\u003eStupid 9-Volt Tricks\u003c\/li\u003e\n\u003cli\u003eSo... I Bought a Chromebook\u003c\/li\u003e\n\u003cli\u003eHacking Giveaway of the Day\u003c\/li\u003e\n\u003cli\u003eHow to Avoid the Online Dating Scam\u003c\/li\u003e\n\u003cli\u003eRTF... TOS\u003c\/li\u003e\n\u003cli\u003eDomain and Security\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eTowards a Hacker Friendly Mobile World\u003c\/li\u003e\n\u003cli\u003eLinuxLive... Save Me\u003c\/li\u003e\n\u003cli\u003eThe Major Flaw of Pentesting\u003c\/li\u003e\n\u003cli\u003eFree Music: The Quest for the MP3\u003c\/li\u003e\n\u003cli\u003eAn EMP Flash - It All Stops\u003c\/li\u003e\n\u003cli\u003eLearning from Stratfor: Extracting a Salt from an MD5 Hash\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eControl4 and Home Automation\u003c\/li\u003e\n\u003cli\u003eBackdooring with Metasploit\u003c\/li\u003e\n\u003cli\u003eMy Grandpa's Books Never More!\u003c\/li\u003e\n\u003cli\u003eInsurgent Technology: In WikiLeaks' Wake\u003c\/li\u003e\n\u003cli\u003eThe Pros and Cons of Courses\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212439689,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp121.gif?v=1429852768"},{"product_id":"copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-season-year","title":"Winter 2011-2012 (only available in our DOWNLOAD section)","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eMovements\u003c\/li\u003e\n\u003cli\u003eGoogle Temphptations\u003c\/li\u003e\n\u003cli\u003eFree Phone Numbers with Google Voice\u003c\/li\u003e\n\u003cli\u003eAbuse Reports Still Work\u003c\/li\u003e\n\u003cli\u003eMAC Spoofing Your Way to Free Internet\u003c\/li\u003e\n\u003cli\u003eHacking Refog Keylogger\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eWho is Anonymous?\u003c\/li\u003e\n\u003cli\u003eProperty Acquisition - For Free?\u003c\/li\u003e\n\u003cli\u003eLet's Feed the Phishes\u003c\/li\u003e\n\u003cli\u003eBypassing Universal Studio's MP3 Security the EZ Way\u003c\/li\u003e\n\u003cli\u003eInternal Denial of Service with Fork and Malloc Bombs\u003c\/li\u003e\n\u003cli\u003eWhitelisting with Gmail\u003c\/li\u003e\n\u003cli\u003eEye Spy\u003c\/li\u003e\n\u003cli\u003eHow to Social Engineer Your Local Bank\u003c\/li\u003e\n\u003cli\u003eLaptop Repair, Customer Beware\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eMore Active Gamers Should Become Activist Hackers\u003c\/li\u003e\n\u003cli\u003eSimplex Locks: Illusion of Security, Version 2.0\u003c\/li\u003e\n\u003cli\u003eHacking Is in the Blood\u003c\/li\u003e\n\u003cli\u003eSupport for Cable Providers? Why?\u003c\/li\u003e\n\u003cli\u003ePre-Texting-R-Us\u003c\/li\u003e\n\u003cli\u003ePirating the Caribbean\u003c\/li\u003e\n\u003cli\u003ePerfect Encryption - Old Style!\u003c\/li\u003e\n\u003cli\u003eThe Piracy Situation\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eAnonymity and the Internet in Canada\u003c\/li\u003e\n\u003cli\u003eElegant Password Generation with Oplop\u003c\/li\u003e\n\u003cli\u003eHacking the Winn-Dixie Survey\u003c\/li\u003e\n\u003cli\u003eSwitch\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212440025,"sku":"","price":4.99,"currency_code":"USD","in_stock":false}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/wi111.gif?v=1429848909"},{"product_id":"copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-season-year","title":"Autumn 2011 (only available in our DOWNLOAD section)","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eAwakenings\u003c\/li\u003e\n\u003cli\u003eIntroduction to Chrome OS\u003c\/li\u003e\n\u003cli\u003eBypassing Shell Restrictions\u003c\/li\u003e\n\u003cli\u003ePhishing on an iDevice\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eNetwork Anonymity Through \"MAC Swapping\"\u003c\/li\u003e\n\u003cli\u003eBoth Sides of the Story\u003c\/li\u003e\n\u003cli\u003eVideo Game Hacking\u003c\/li\u003e\n\u003cli\u003eHacking Alt Detection in Second Life\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eHow to Spoof Another User in MindAlign\u003c\/li\u003e\n\u003cli\u003eAccess Control: A Fancy Facade\u003c\/li\u003e\n\u003cli\u003eGo Daddy Shared Hosting Review\u003c\/li\u003e\n\u003cli\u003eLogging and Analysis with Your GPS-enabled Phone\u003c\/li\u003e\n\u003cli\u003eCellphone, Keys, Wallet? Check!\u003c\/li\u003e\n\u003cli\u003eMobile Hacking: Really\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eAsterisk, The Gatekeeper\u003c\/li\u003e\n\u003cli\u003eWear a White Hat\u003c\/li\u003e\n\u003cli\u003eHow I Got Firefox to Accept the Tel Tag for Phone Calls\u003c\/li\u003e\n\u003cli\u003eFiction: Kill Switch\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212440121,"sku":"","price":4.99,"currency_code":"USD","in_stock":false}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/fa111.gif?v=1429837804"},{"product_id":"copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-season-year","title":"Summer 2011","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eProgress Report\u003c\/li\u003e\n\u003cli\u003eDealing with Credit Card Companies\u003c\/li\u003e\n\u003cli\u003eDetecting and Tracking Stealth Satellites\u003c\/li\u003e\n\u003cli\u003ePen Testing from a Mile Away\u003c\/li\u003e\n\u003cli\u003eSecuring Online Voting\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eMobile Hacking with Android\u003c\/li\u003e\n\u003cli\u003eHow I Escaped Google\u003c\/li\u003e\n\u003cli\u003eAdd a User with Root Privileges Non-Interactively\u003c\/li\u003e\n\u003cli\u003eSimple RSA Encryption\u003c\/li\u003e\n\u003cli\u003eBooze, Nosiness, and City Terminals\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eHow to Protect Your Car from Radio Jammers\u003c\/li\u003e\n\u003cli\u003ePOCSAG and Radio Privacy\u003c\/li\u003e\n\u003cli\u003eAuditing the MiFi2200\u003c\/li\u003e\n\u003cli\u003eHiding the Hacker Instinct\u003c\/li\u003e\n\u003cli\u003eStarting a Path to Modern Database Privacy\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eA Brief Guide to Black Edition XP\u003c\/li\u003e\n\u003cli\u003eThe Many Uses of SSH Tunnels\u003c\/li\u003e\n\u003cli\u003eSenatorial Courtesy Plates - An Inside Look\u003c\/li\u003e\n\u003cli\u003eFishing with Squid\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212440249,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/su111.gif?v=1429853576"},{"product_id":"copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-season-year","title":"Spring 2011","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eA World Spinning\u003c\/li\u003e\n\u003cli\u003ePassword (In)security?\u003c\/li\u003e\n\u003cli\u003ePassword Bypassing and Clearing\u003c\/li\u003e\n\u003cli\u003eHow Good is Geolocation?\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eWhy I Like E-Books\u003c\/li\u003e\n\u003cli\u003eWhat is a Hacker?\u003c\/li\u003e\n\u003cli\u003eWho is Anonymous or How to Troll the Media for Fun and Profit\u003c\/li\u003e\n\u003cli\u003eHow to Accept Payments Anonymously - A Digital Currency Guide\u003c\/li\u003e\n\u003cli\u003eHow to Find Out What the Government Knows About You\u003c\/li\u003e\n\u003cli\u003eBypassing Javascript Timers or How I Learned to Stop Waiting and Love the Variable\u003c\/li\u003e\n\u003cli\u003eRemote Login Made Easy\u003c\/li\u003e\n\u003cli\u003eTwo Party Covert Communication Over MSN Messenger System Using Emoticons\u003c\/li\u003e\n\u003cli\u003eVirtual Anti-Forensics\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eSecrets of the Spider\u003c\/li\u003e\n\u003cli\u003eThe Lessons Learned on a Training Site\u003c\/li\u003e\n\u003cli\u003eWriting Bots for Modern Websites\u003c\/li\u003e\n\u003cli\u003eWhere Have All Our Secrets Gone?\u003c\/li\u003e\n\u003cli\u003eLDAP Directory Servers: TMI!\u003c\/li\u003e\n\u003cli\u003eComputers: With and Without\u003c\/li\u003e\n\u003cli\u003eAutomatic Usage of Free Wi-Fi\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eCoding Bots and Hacking Wordpress\u003c\/li\u003e\n\u003cli\u003eAbusing the Cloud\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212440433,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp111.gif?v=1429852706"},{"product_id":"copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-season-year","title":"Winter 2010-2011","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eChanging Landscapes\u003c\/li\u003e\n\u003cli\u003eBash Bash Bash!\u003c\/li\u003e\n\u003cli\u003eHow to Cheat at Foursquare\u003c\/li\u003e\n\u003cli\u003eThe (Obvious?) Dangers of Free WiFi\u003c\/li\u003e\n\u003cli\u003eThe Buck Stops Here: Inside AT\u0026amp;T's Tier 2 Tech Support\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eVarious Vulnerabilities in the UPS Shipping System\u003c\/li\u003e\n\u003cli\u003eOde to the United States Postal Service\u003c\/li\u003e\n\u003cli\u003eAndroid, You Broke My Heart\u003c\/li\u003e\n\u003cli\u003eCorporate Reconnaisance for the Anti-Social\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eAnti-Satellite (ASAT) System for Dumbasses\u003c\/li\u003e\n\u003cli\u003eThe Trouble with the \"Digital\" Music Industry\u003c\/li\u003e\n\u003cli\u003eInvisible ASCII: A Poor Person's Steganography\u003c\/li\u003e\n\u003cli\u003eEMR Interception and the Future of Computer Hacking\u003c\/li\u003e\n\u003cli\u003eThe Joy of IPv6\u003c\/li\u003e\n\u003cli\u003eDormitory Phishing\u003c\/li\u003e\n\u003cli\u003eHow to Find Information on People Using the Internet\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003ePhun with FOIA\u003c\/li\u003e\n\u003cli\u003eiBahn Hotel Site Kiosks and How to Pwn One\u003c\/li\u003e\n\u003cli\u003eRAM Dumping\u003c\/li\u003e\n\u003cli\u003eWho's Got Your Vote?\u003c\/li\u003e\n\u003cli\u003eVulnerabilities in Quantum Computers\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212441005,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/wi101.gif?v=1429848888"},{"product_id":"copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-season-year","title":"Autumn 2010","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eConflict in the Hacker World\u003c\/li\u003e\n\u003cli\u003eRead All About It! Online Security and Paid Newspaper Content\u003c\/li\u003e\n\u003cli\u003eOld School Hacking\u003c\/li\u003e\n\u003cli\u003eHow I Learned to Stop Worrying and Spam the Scammers\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eForgeries, Branding, and Network Theory in the Digital Playground\u003c\/li\u003e\n\u003cli\u003eSPAM Simplified\u003c\/li\u003e\n\u003cli\u003eHacking Out\u003c\/li\u003e\n\u003cli\u003eMan in the Middle Attack\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003cli\u003eIPv6 Connection Hijacking and Scanning\u003c\/li\u003e\n\u003cli\u003eGmail and SMS Gateway Fun\u003c\/li\u003e\n\u003cli\u003eMoving from Robotics to Artificial Intelligence\u003c\/li\u003e\n\u003cli\u003eSeven Things \"Hackers\" Did Right\u003c\/li\u003e\n\u003cli\u003eLife Without Walls: Circumventing Your Home Security System\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eHow to Turn Local Admin into Domain Admin\u003c\/li\u003e\n\u003cli\u003ePanasonic Phreaking in the New Age\u003c\/li\u003e\n\u003cli\u003eHacking and Securing the Tandberg C20\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212441389,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/fa101.gif?v=1429837785"},{"product_id":"copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-season-year","title":"Summer 2010","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eThe Hacker Dialogue\u003c\/li\u003e\n\u003cli\u003eHacking Google Analytics\u003c\/li\u003e\n\u003cli\u003eMy Second Implant\u003c\/li\u003e\n\u003cli\u003eFree Encrypted 3G Web Access on T-Mobile Smartphones\u003c\/li\u003e\n\u003cli\u003eWhy Cell May Die in a Modern Hacker's World\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eCall the World for Free\u003c\/li\u003e\n\u003cli\u003eHow to Create Mass Hysteria on a College Campus Using Facebook\u003c\/li\u003e\n\u003cli\u003eEducational Wireless Honeypots\u003c\/li\u003e\n\u003cli\u003eI'm Not a Number\u003c\/li\u003e\n\u003cli\u003eHow I Scored the Avaya PBX Init Password\u003c\/li\u003e\n\u003cli\u003eWhy You Need a Grimoire\u003c\/li\u003e\n\u003cli\u003e(Potential) Laptop Recovery\u003c\/li\u003e\n\u003cli\u003eHacking Boingo Wireless\u003c\/li\u003e\n\u003cli\u003eHow AT\u0026amp;T Data Plans Work (and How to Make Them Stop Working)\u003c\/li\u003e\n\u003cli\u003eCasual Encounters of the Third Kind: A Bayesian Classifier for Craigslist\u003c\/li\u003e\n\u003cli\u003eOutline for a Simple Darkserver and\/or Darknet\u003c\/li\u003e\n\u003cli\u003eGoog411 Skype Hack\u003c\/li\u003e\n\u003cli\u003eHacking Autodialer Telephone Access Systems\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eWritten in Spam\u003c\/li\u003e\n\u003cli\u003eRoll-your-own Automated System Restore Discs\u003c\/li\u003e\n\u003cli\u003eGrazing Voicemail Passwords\u003c\/li\u003e\n\u003cli\u003ePrivate Key Exchange Using Quantum Physics\u003c\/li\u003e\n\u003cli\u003eHow to Overwrite JUNOS Proprietary Code\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212441581,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/su101.gif?v=1429853549"},{"product_id":"copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-copy-of-season-year","title":"Spring 2010","description":"\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd\u003e\n\u003cul\u003e\n\u003cli\u003eCloudy Skies\u003c\/li\u003e\n\u003cli\u003eInsecurities in Emergency Rescue\u003c\/li\u003e\n\u003cli\u003eAJAX Hacking for the Discerning Pro Wrestling Fanatic\u003c\/li\u003e\n\u003cli\u003eA Little Fish in a Big Pond\u003c\/li\u003e\n\u003cli\u003eThe Grey Hat Manifesto\u003c\/li\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003cli\u003eNo Sale for You!\u003c\/li\u003e\n\u003cli\u003eCrazyGeorge - Security Through Obscurity\u003c\/li\u003e\n\u003cli\u003eBartPE: A Portable Microsoft Windows\u003c\/li\u003e\n\u003cli\u003eInfluential Angles\u003c\/li\u003e\n\u003cli\u003eHACKER PERSPECTIVE: Bill From RNOC\u003c\/li\u003e\n\u003cli\u003eThe Hacker Enigma: Positives, Negatives and Who Knows?\u003c\/li\u003e\n\u003cli\u003eAn Introduction to CSRF Attacks\u003c\/li\u003e\n\u003cli\u003eThe Voyager Library Information System\u003c\/li\u003e\n\u003cli\u003e\"Print Me?\" Why, Thank You!\u003c\/li\u003e\n\u003cli\u003eMy First Hack\u003c\/li\u003e\n\u003cli\u003eDr. Jekyll and Mr. PayPass\u003c\/li\u003e\n\u003cli\u003eWriting a Small Port Checker in C in 40 Lines (or Less)\u003c\/li\u003e\n\u003cli\u003eProcurve Switch Hacking\u003c\/li\u003e\n\u003cli\u003eTRANSMISSIONS\u003c\/li\u003e\n\u003cli\u003eBluetooth Hacking Primer\u003c\/li\u003e\n\u003cli\u003eSimple How-to on Wireless and Windows Cracking, Part 2\u003c\/li\u003e\n\u003cli\u003eHACKER HAPPENINGS \u003cbr\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":1212441857,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/sp101.gif?v=1429852681"},{"product_id":"summer-2015","title":"Summer 2015 (only available in our DOWNLOAD section)","description":"\u003cul\u003e\n\u003cli\u003eOld and New Together\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eI Tapped That... Tapping a Nationwide Telecommunications Network\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eUse Your 3D-Capable TV to View 3D Stills of Your Own Making\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Phone Story\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eChiron and Me: Hacking Astronomy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eNigrum Libro Interceptis\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eLibrary Security\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDecoding a Carrier Pigeon\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAttitude Adjustment: How to Keep Your Job\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eOut of the Box Survival, Part Two\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCoding as a Foundational Skill\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Plea for Simplicity\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eRansomware Still Active and Looking for Victims\/Volunteers\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 0xD-0xE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":6222353473,"sku":"","price":4.99,"currency_code":"USD","in_stock":false}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/32-2_Cover.jpg?v=1441099265"},{"product_id":"autumn-2015","title":"Autumn 2015","description":"\u003cul\u003e\n\u003cli\u003eThe Hacker Image\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Primer on Home Automation (and How Easy It Can Be)\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDangerous Clouds\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eUnexpected Denial Of Service\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Convenient Method for Cloud Storage with Preserved Privacy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAshley Madison Military Sites\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Technology at QPDC\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eOpen Source Repository Abuse\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMy Voice Is My Key\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFun with Billing Forms and International Debit Cards\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eGoing Nuclear - A Tale of Revenge\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eLEAKED DOCUMENTS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMalware Attacks - Leave Those Banks Alone\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMr. Robot - A Ray of Light in a Very Dark World\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCruising the Wideband Spectrum\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Dawn of the Crypto Age\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAccount Hack: Anyone Can Be a Victim\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: The Stars Are Tomorrow\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":7271543681,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/32-3_Cover.jpg?v=1444760473"},{"product_id":"winter-2015-2016","title":"Winter 2015-2016","description":"\u003cul\u003e\n\u003cli\u003eThe New Normal\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Best Way to Share a Treasure Map\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eUSBkill - A Program for the Very Paranoid Computer User\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCircumventing Chrome and Firefox's Third Party Cookie Block\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003ePushing the Limits\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eRomeo Tango Oscar\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eYull Encryption\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Brief Cryptanalysis of Yull\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow to Get Free Gogo In-Flight Internet Access\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAccessing Admin Privileges: A Quest Through One of Mac's Backdoors\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003ePerspectives on Cyber Security\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Splotchgate Saga\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHackerspaces: A Definition\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eYou Gotta Learn From This, Kid\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Limits of Open Source Hardware\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eRewriting History\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Herculean Task of Making a Documentary on the History of Computer Hacking\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 0xF\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":13799252231,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/32-4_Cover.jpg?v=1452743419"},{"product_id":"spring-2016","title":"Spring 2016 (only available in our DOWNLOAD section)","description":"\u003cul\u003e\n\u003cli\u003eThe Powers That Want to Be\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eScraping for Cache, or It's Not Piracy If You Left It Out in the Open\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHacking Using Parse Database Injection\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHardware Hacking - Protecting Dev' Board I\/O by Hacking an Alarm Panel\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMy President Twitter Bot Experiment\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDefense Against the Black Arts of Forensics\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Plan 9 Primer\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eChesslin\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eExploiting HTML - Making Your Browser a Vegetable\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eExif Location Recon with Python\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEleventh Graders and Nuclear Bombs\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWhich Do We Prefer: Neanderthals or Hackers?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eOne Little Pig\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003ePassword and Mobility Security: Something Needs to Be Done\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAnother Solution to the USBKill.py Problem\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSoftware Validation\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eReconnaissance at Spa World\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMy Local Weather Observations\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: The Bee in Van Pelt Park\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":18744123591,"sku":"","price":4.99,"currency_code":"USD","in_stock":false}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/33-1_Cover.jpg?v=1459920433"},{"product_id":"summer-2016","title":"Summer 2016","description":"\u003cul\u003e\n\u003cli\u003ePolitics Comes Calling\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003ePre-Surveillance of Law Enforcement Using Targeted Advertising\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAbandoned Routers: Forgotten, But Not Gone\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCard Transactions Explained\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTo Hack an Uber\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHacking Malaysian Routers\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eNigrum Libro Interceptis: Secundae\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003e$35 Hacking Machine\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAccidentally Logging In As Admin\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eGaming Ingress\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eLearning Hacking via MinecraftEdu\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTyping Fractions in Emails and Text Files\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSurfing the Web Safely and Anonymously with Whonix\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow I Socially Engineered a Job\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWhy We Need Privacy Rights\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFree Windows\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Top Ten Reasons Why Hackers Should Get a Ham Radio License\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 0x10-0x11\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":24610987335,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/33-2_Cover.jpg?v=1468217044"},{"product_id":"autumn-2016","title":"Autumn 2016","description":"\u003cul\u003e\n\u003cli\u003ePromises\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHacking for Knowledge\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMOV Before You JMP\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eIt's Security, Stupid\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFreedom of Thought\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Captive Portal Puzzle at Sea\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSpyware Techniques\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBuilding DIY Community Mesh Networks\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMusical Monstrosities\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe PirateBox\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow to Google Bomb Someone\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eVerizon's HOPE Scam\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Easiest Way to Break Into a Bank\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHacking Amazon E-Books with Spy Style\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Parallel President on Twitter\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":32196203079,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/33-3_Cover.jpg?v=1476084297"},{"product_id":"winter-2016-2017","title":"Winter 2016-2017 (only available in our Download Section)","description":"\u003cul\u003e\n\u003cli\u003eDark Bubbles\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eRescuing Fake Memory Devices\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHaving Fun with In-Store Chromecast\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Coca-Cola Blacklist\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBypassing Privileges with Oracle Database Express Edition\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eUsing Discord Servers to HTTP Flood\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSuccessful Network Attacks - Phase One\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSpying Across Borders in the Age of Email\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eInfoSec at Its Worst, OPSEC at Its Best\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCan Security Be Built into Pure Data?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003emcquery.js - a Web Scraper for Disc Golf Players\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eKBChat - Private, Encrypted Chat via KBFS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003e2600 Leak Department\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMemory Lane\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eRotten Apples: OS X 101\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAutomatic Contest Winning via Selenium\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe One About That File Server\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 0x12\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":36444075399,"sku":"","price":4.99,"currency_code":"USD","in_stock":false}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/Cover_c9b7ae77-ec47-4080-9e5a-1db77a71abde.jpg?v=1484208147"},{"product_id":"spring-2017","title":"Spring 2017","description":"\u003cul\u003e\n\u003cli\u003eA Price for Truth\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eNew U.K. Surveillance Laws - Time to Get Serious About Security\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eVoices in the Sky: Satellite Communication Methods\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eLockbox PIN Code Generator\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Lock with the Key Next to It\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHacking Free Wi-Fi on Delta Flights\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTelephones from Space\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eLonging for the Past\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eGetting Inspired as a Student\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eGoogle Auto-Fill Suggestions, Politics, and Magic\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Inner Circle... Part One\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSoftware Cracking with dotPeek\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eIgnore Your .env - Browsing Environment Files on GitHub\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eObfuscating Torrent Traffic\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSuccessful Network Attacks - Phase Two\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWhite House Phone Numbers\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow to Improve Zone Protection in Burglary Alarms\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eValidating Software Validation\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThoughts on Phoenix Project II\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThose Coca Cola Freestyle Machines in Crew Mode\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003e321 Studios Revisited\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":41594361619,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/1q17Cover.jpg?v=1491809979"},{"product_id":"summer-2017","title":"Summer 2017","description":"\u003cul\u003e\n\u003cli\u003eThe Power of the Press\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Censorship Resistant Internet: How to Run a Tor Hidden Service\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eConverting the Voter Database and Facebook into a Google for Criminals\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHacktivism to End Human Trafficking and Modern Day Slavery\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow Rogue One Taught Me Not to Be a Bad Guy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Declaration of Independence for Cyberspace\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDemonsaw: Bypassing Anonymity Utilizing Social Engineering\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCreating an Automated Open Wi-Fi Traffic Capturing Tool for Under $20\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003e0x8bc4 Before You 0xffe0\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMy Perspective\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eOPTingOUT\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAnalog vs. Digital Living: Real Solutions to Absolute Anonymity and Privacy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBuilding a Better Screen Locker for GNU\/Linux\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eVR Trumpers\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSuccessful Network Attacks - Phase Three\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAdvice from the Socially Engineered\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eInternet Thoughts\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 0x13\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":46485075475,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/34-2_Cover.jpg?v=1500019430"},{"product_id":"autumn-2017","title":"Autumn 2017","description":"\u003cul\u003e\n\u003cli\u003eActs of Courage\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBypass Your ISP's DNS and Run A Private OpenNIC Server\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003ePHP Backdoors\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eInseparable: The Intersectionality of Hacking and Politics\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEnhancing SQL Injection With Stored Procedures\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow to Get Nearly Free Travel from Scotrail\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003e(learn (LISP))\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eReverse Engineering Electronic Letter and Number Toys\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow to Hack Your Way to a Guilt-Free, Political Ideology\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Problem with IT Certifications and Their Contribution to the Devaluation of Technology\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Little Brother's Manifesto\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Test Harness for Fuzzing Font Parsing Engines in Web Browsers\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eConfessions of a (for Now Not So Successful) Bug Bounty Hunter\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTo Care or Not to Care\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eScrape Textbooks, Save Money\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003egooglecomp.py: The Complete Google Autocomplete Script\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eObfuscating Biopolitics: A Theoretical Primer for Cyborgs and Other Concerned Citizens\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDebt Journey\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSuccessful Network Attacks - Phase Four\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSplatter\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":52708143379,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/34-3_Cover.jpg?v=1507219692"},{"product_id":"winter-2017-2018","title":"Winter 2017-2018 (only available in our DOWNLOAD section)","description":"\u003cul\u003e\n\u003cli\u003eCredit Denial\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eUsing dnscat2 for Encrypted C\u0026amp;C over DNS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEducating Friends and Family About Online Security\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCreating Strong and Easy to Remember Passwords\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDon't You Have a Smart Watch Yet?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWhat Happens When WHOIS Data Is Made Public\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDeauthing the Neighbors, or Ring Theory\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eNightmare on E Street (Modem and Me Against the World)\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eQuantum Computers and Bitcoin\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eI Want to Be a Hacker....\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eConventionalist Theory of Reference in Comparison to Programming Language\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDown and Out in a Land of Script Kiddies\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDispelling a Breach Rumor\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Russian Hacking Diatribe, and Why It Is Complete Agitprop Nonsense\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSuccessful Network Attacks - Phase Five\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 0x14\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":5107756892197,"sku":"","price":4.99,"currency_code":"USD","in_stock":false}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/34-4_Cover_2601fa06-244e-4f25-8b2b-3823be6d9568.jpg?v=1515019441"},{"product_id":"spring-2018","title":"Spring 2018","description":"\u003cul\u003e\n\u003cli\u003eEmbracing Empowerment\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Secrecy and Security of the Special Counsel\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWhat Programming Language Should I Learn? Why Not All of Them?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBreaking Standards\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow to Run an I2P Hidden Service\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBitcoin or Bit Con? One Newbie's Adventures in Cryptoland\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Case of the Murderous AI\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eIn Defense of the Net\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Review of CopperheadOS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSSH Keys and Challenges in Enterprise Environments\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eUnlocking the Secret of Keys\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHacking Our Attitudes (The Key to Being a Better Attitude Trumper)\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHistoric Hacking\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBluetooth Hacking 101\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHidden ISPs\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eExtrapolating Phone Numbers Using Facebook and PayPal\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Free Flow of Information\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":7472921509943,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/cover_cc3a9c45-4d03-46bc-ba1e-37cbbfa33d73.jpg?v=1523386983"},{"product_id":"summer-2018","title":"Summer 2018","description":"\u003cul\u003e\n\u003cli\u003eCelebrate the Difference\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA N00b's Guide to the Dark Web\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe IPv6 Delusion\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow to Be a Guitar Hero, IRL\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEven Restaurants Need InfoSec\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSerial Number Cracking For Fun and Profit\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAutomating a Police State\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBrute Forcing a Car Door with Math\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHack(ed), the Earth\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Hacker Adventure in Urban Exploration\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBeyond the Scare-Mongering\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eRe-Purposing Old Technology and Ideas for Fun and Emotional Profit\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHacking: Quick and Easy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThoughts On Cryptocurrency\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 0x15\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":8461821444151,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/35-2cover.jpg?v=1531425308"},{"product_id":"autumn-2018","title":"Autumn 2018","description":"\u003cul\u003e\n\u003cli\u003eInjustice for All\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDigital Sanctuary Cities\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eRemoving eBook DRM without OCR or GUIs\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Carrier Pigeon Revisited\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Evolution of Ran$omware\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHackers to the Rescue! (Maybe)\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBook Review: The Art of Invisibility\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eGDPR – Active Empowerment vs. Passive Consumerism\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Characteristic Study of IoT Botnets: Understanding the Design and Behavior\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMs. Reality Winner is an American Dissident\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMore Ways to View Hacking\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTotalitarian Control: How We Used PowerShell to Manipulate User Behavior\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWhat Do Lawyers and Hackers Have in Common?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eNo Country for Incarcerated Hackers\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBypassing Email Anti-Spam Filters\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHacker History: MDT or \"The Mass Depopulation Trio\"\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTesting Your l337 h4x0r skillz Safely and Legally\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eGone Phishin'\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":12719624388663,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/35-3_Cover-Web.jpg?v=1539246592"},{"product_id":"winter-2018-2019","title":"Winter 2018-2019","description":"\u003cul\u003e\n\u003cli\u003eTaking Back Ownership\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003e1979 Plus 40 Years\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAV1: One Giant Leap for Video-Kind\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eYITM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSocial Engineering from Prison\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Brief Tunneling Tutorial\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eQuantum Computers and Privacy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHacking the School System\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Reading of the AI Hype Meter\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThumbcache.db Primer\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSorting It All Out: The Long Lost Bastard Children of the United States Postal Service\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eConfiguration Negligence: Who is Responsible?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFacts About Honesty\/Integrity Tests and Interviews\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBook Review: Surveillance Valley: The Secret Military History of the Internet\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBook Review: Ten Arguments for Deleting Your Social Media Accounts Right Now\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eModem and Me: The Loose Ends\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Fork() in the Road\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMaking an Informed Business Decision Using Public Financial Records\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTo the Unknown Hacker\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHacking in a Slow Job Market\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 0x16\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":12961032765495,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/cover_2028a7a7-8ea4-48e3-9c21-dfb66ab1d81e.jpg?v=1547576869"},{"product_id":"spring-2019","title":"Spring 2019","description":"\u003cul\u003e\n\u003cli\u003ePreserving the Future\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eReverse Engineering Android Apps\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAndroid Smartphone Secret Codes: Revealed\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow to Make Your eBooks Inheritable\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWeb Scraping Scripts\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003ePerforming a MacGyver to Call Anyplace Home\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBlast Accusations for Cybersecurity Intel\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBe a Good BitTorrent Citizen\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Guide to ALKEMI\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSecond-Generation Quantum Computers\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eIn-Browser Cryptojacking: An Old Threat in a New Guise\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSo You Want to Be a Coder\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eLights Out! Guerilla Radio\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWhy You Should Always Give out Your Telephone Number with the Area Code\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWe Just Called Them Dialers\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBook Review: Weapons of Math Destruction\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":13582354546743,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/36-1_Cover.jpg?v=1554677975"},{"product_id":"summer-2019","title":"Summer 2019","description":"\u003cul\u003e\n\u003cli\u003eConvictions\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003ePorting IoT Malware to Windows\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThere Is No Magic in the Clouds\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDank Kush or Fleet Vehicles?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow to Defeat Intelligence Tests\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eConnecting to the Internet for Free Using Iodine\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBook Review: Broad Band: The Untold Story of the Women Who Made the Internet\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWe Will Rock You\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Hacker Mindset or How We Can Move the World\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eLet's Just Call It BitCon\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Madness Debate (or How I Got Locked out of My Computer)\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMechanical Keyboards\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Multiple Persona Theory of Digital Secrecy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMini Mate - Rescuing Hardware from the Graveyard\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eGet Those Digits\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003ePotential VPN Attacks\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWorking for an ISP\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 0x17\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":14284939329591,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/36-2_Cover.jpg?v=1562660756"},{"product_id":"new-issue","title":"Autumn 2019 PDF Version","description":"After purchasing, you will get a download link. You will also get this link via email.\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003eCONTENTS:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eOur Audacity\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFully Homomorphic Encryption and Privacy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWho Is Watching Us?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Mysteries of the Hidden Internet\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBreaking DirecTV's DVR Authentication\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMachine Rhapsody in 2099\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eIntroduction to Computer Viruses - Example in Windows Powershell\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAll You Need Is... Air\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTwitter the Enemy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eOnline Thrift Stores Have Your Data\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eActive Defenses for Industrial Espionage\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Infocalypse\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBook Review: The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBook Review: A People's History of Computing in the United States\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Case Against Certified Ethical Hacking\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThoughts on Account Enumeration\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eArduino-Based Burglary Zone Input Tester - An Experimental Design for Testing Hardwired Connected Sensors\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003e\"Information is Neutral\" and Other Social Myths\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":30308928487479,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/2600_3q19_DigitalEdition.png?v=1667113147"},{"product_id":"autumn-2019","title":"Autumn 2019","description":"\u003cul\u003e\n\u003cli\u003eOur Audacity\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFully Homomorphic Encryption and Privacy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWho Is Watching Us?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Mysteries of the Hidden Internet\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBreaking DirecTV's DVR Authentication\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMachine Rhapsody in 2099\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eIntroduction to Computer Viruses - Example in Windows Powershell\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAll You Need Is... Air\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTwitter the Enemy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eOnline Thrift Stores Have Your Data\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eActive Defenses for Industrial Espionage\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Infocalypse\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBook Review: The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBook Review: A People's History of Computing in the United States\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Case Against Certified Ethical Hacking\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThoughts on Account Enumeration\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eArduino-Based Burglary Zone Input Tester - An Experimental Design for Testing Hardwired Connected Sensors\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003e\"Information is Neutral\" and Other Social Myths\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":30361457754167,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/3q19-cover.jpg?v=1570505959"},{"product_id":"new-issue-pdf-winter-2019-2020","title":"Winter 2019-2020 PDF Version","description":"After purchasing, you will get a download link. You will also get this link via email.\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003eCONTENTS:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eFrom the Ashes\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eIndustrial Control with Modbus\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eIdeas Behind Site Reliability Engineering\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCyberspelunking\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSteganographic Filesystems\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDeath of a Scene\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBody Key-Logging\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eRehabilitation Center - (Attacker's) Mission Complete\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow to Get Free Wi-Fi Anywhere\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWhat is Hacking?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMaximizing Privacy in a Digital World\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDo-It-Yourself Cloudflare on a Budget\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBook Review: Artificial Intelligence: A Very Short Introduction\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eReflections on Hackers\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003ePass the Cookie and Pivot to the Clouds\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 0x18\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eStudent Privacy by Practice - Not by Policy (fixing our mistake)\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":31554610855991,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/2600_4q19_DigitalEdition.png?v=1667113246"},{"product_id":"winter-2019-2020","title":"Winter 2019-2020","description":"\u003cul\u003e\n\u003cli\u003eFrom the Ashes\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eIndustrial Control with Modbus\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eIdeas Behind Site Reliability Engineering\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCyberspelunking\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSteganographic Filesystems\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDeath of a Scene\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBody Key-Logging\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eRehabilitation Center - (Attacker's) Mission Complete\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow to Get Free Wi-Fi Anywhere\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWhat is Hacking?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMaximizing Privacy in a Digital World\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDo-It-Yourself Cloudflare on a Budget\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBook Review: Artificial Intelligence: A Very Short Introduction\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eReflections on Hackers\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003ePass the Cookie and Pivot to the Clouds\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 0x18\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eStudent Privacy by Practice - Not by Policy (fixing our mistake)\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e\u003ca href=\"\/collections\/subscriptions-renewals\"\u003eSubscribe to 2600\u003c\/a\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":31554623897655,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/36-4_Cover-small_21be4451-3549-42b0-a4fb-69a0f17b6be1.jpg?v=1579206060"},{"product_id":"complete-2019-pdf-version","title":"Complete 2019 PDF Collection","description":"\u003cp\u003eThis is an entire year's worth of issues as they were originally printed and in fully searchable, non-DRM PDF format.\u003c\/p\u003e\n\u003cp\u003eThis collection includes all 272 pages from 2019 in their original layout. If this is successful, we will expand this to additional years.\u003c\/p\u003e\n(As soon as you purchase this collection, you will get a download link. You will also get this link via email.)\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":31779874406455,"sku":"","price":14.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/2019-pdf-collection.jpg?v=1586935823"},{"product_id":"spring-2019-pdf-version","title":"Spring 2019 PDF Version","description":"After purchasing, you will get a download link. You will also get this link via email.\n\u003cp data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eCONTENTS:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003ePreserving the Future\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eReverse Engineering Android Apps\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eAndroid Smartphone Secret Codes: Revealed\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow to Make Your eBooks Inheritable\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWeb Scraping Scripts\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003ePerforming a MacGyver to Call Anyplace Home\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBlast Accusations for Cybersecurity Intel\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBe a Good BitTorrent Citizen\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eA Guide to ALKEMI\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSecond-Generation Quantum Computers\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eIn-Browser Cryptojacking: An Old Threat in a New Guise\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eSo You Want to Be a Coder\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eLights Out! Guerilla Radio\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWhy You Should Always Give out Your Telephone Number with the Area Code\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWe Just Called Them Dialers\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBook Review: Weapons of Math Destruction\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":39995005730871,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/2600_1q19_DigitalEdition.png?v=1667112987"},{"product_id":"summer-2019-pdf-version","title":"Summer 2019 PDF Version","description":"After purchasing, you will get a download link. You will also get this link via email.\n\u003cp data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eCONTENTS:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eConvictions\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003ePorting IoT Malware to Windows\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThere Is No Magic in the Clouds\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eDank Kush or Fleet Vehicles?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHow to Defeat Intelligence Tests\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eConnecting to the Internet for Free Using Iodine\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eBook Review: Broad Band: The Untold Story of the Women Who Made the Internet\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWe Will Rock You\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Hacker Mindset or How We Can Move the World\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eLet's Just Call It BitCon\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Madness Debate (or How I Got Locked out of My Computer)\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMechanical Keyboards\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eThe Multiple Persona Theory of Digital Secrecy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eMini Mate - Rescuing Hardware from the Graveyard\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eGet Those Digits\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003ePotential VPN Attacks\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eWorking for an ISP\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eFiction: Hacking the Naked Princess 0x17\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\n\u003cli\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":39995006484535,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/2600_2q19_DigitalEdition.png?v=1667113060"},{"product_id":"spring-2018-pdf-version","title":"Spring 2018 PDF Version","description":"After purchasing, you will get a download link. You will also get this link via email.\n\u003cp data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eCONTENTS:\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEmbracing Empowerment\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eThe Secrecy and Security of the Special Counsel\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eWhat Programming Language Should I Learn? Why Not All of Them?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eBreaking Standards\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHow to Run an I2P Hidden Service\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eBitcoin or Bit Con? One Newbie's Adventures in Cryptoland\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eThe Case of the Murderous AI\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eIn Defense of the Net\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eA Review of CopperheadOS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eSSH Keys and Challenges in Enterprise Environments\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eUnlocking the Secret of Keys\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHacking Our Attitudes (The Key to Being a Better Attitude Trumper)\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHistoric Hacking\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eBluetooth Hacking 101\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHidden ISPs\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eExtrapolating Phone Numbers Using Facebook and PayPal\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eThe Free Flow of Information\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003e \u003c\/p\u003e\n\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":39995321778231,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/1q18_Chips_MEME-FINAL-DigitalEdition.png?v=1667703874"},{"product_id":"summer-2018-pdf-version","title":"Summer 2018 PDF Version","description":"After purchasing, you will get a download link. You will also get this link via email.\n\u003cp data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eCONTENTS:\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCelebrate the Difference\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eA N00b's Guide to the Dark Web\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eThe IPv6 Delusion\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHow to Be a Guitar Hero, IRL\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEven Restaurants Need InfoSec\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eSerial Number Cracking For Fun and Profit\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eAutomating a Police State\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eBrute Forcing a Car Door with Math\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHack(ed), the Earth\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eA Hacker Adventure in Urban Exploration\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eBeyond the Scare-Mongering\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eRe-Purposing Old Technology and Ideas for Fun and Emotional Profit\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHacking: Quick and Easy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eThoughts On Cryptocurrency\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eFiction: Hacking the Naked Princess 0x15\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003e \u003c\/p\u003e\n\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":39995321843767,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/2q18_Facebook_Final_Digital_Editionl.png?v=1667703807"},{"product_id":"autumn-2018-pdf-version","title":"Autumn 2018 PDF Version","description":"After purchasing, you will get a download link. You will also get this link via email.\n\u003cp data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eCONTENTS:\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eInjustice for All\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eDigital Sanctuary Cities\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eRemoving eBook DRM without OCR or GUIs\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eA Carrier Pigeon Revisited\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eThe Evolution of Ran$omware\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHackers to the Rescue! (Maybe)\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eBook Review: The Art of Invisibility\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eGDPR – Active Empowerment vs. Passive Consumerism\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eA Characteristic Study of IoT Botnets: Understanding the Design and Behavior\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eMs. Reality Winner is an American Dissident\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eMore Ways to View Hacking\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eTotalitarian Control: How We Used PowerShell to Manipulate User Behavior\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eWhat Do Lawyers and Hackers Have in Common?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eNo Country for Incarcerated Hackers\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eBypassing Email Anti-Spam Filters\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHacker History: MDT or \"The Mass Depopulation Trio\"\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eTesting Your l337 h4x0r skillz Safely and Legally\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eGone Phishin'\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003e \u003c\/p\u003e\n\u003cbr\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":39995321909303,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/3q18_3D_gun_FINAL-DIGITAL_EDITION.png?v=1667703775"},{"product_id":"winter-2018-2019-pdf-version","title":"Winter 2018-2019 PDF Version","description":"After purchasing, you will get a download link. You will also get this link via email.\n\u003cp data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eCONTENTS:\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eTaking Back Ownership\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003e1979 Plus 40 Years\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eAV1: One Giant Leap for Video-Kind\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eYITM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eSocial Engineering from Prison\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eA Brief Tunneling Tutorial\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eTELECOM INFORMER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eQuantum Computers and Privacy\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHacking the School System\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eA Reading of the AI Hype Meter\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHACKER PERSPECTIVE\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eThumbcache.db Primer\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eSorting It All Out: The Long Lost Bastard Children of the United States Postal Service\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eConfiguration Negligence: Who is Responsible?\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEFFECTING DIGITAL FREEDOM\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eFacts About Honesty\/Integrity Tests and Interviews\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eBook Review: Surveillance Valley: The Secret Military History of the Internet\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eBook Review: Ten Arguments for Deleting Your Social Media Accounts Right Now\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eModem and Me: The Loose Ends\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCITIZEN ENGINEER\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eA Fork() in the Road\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eMaking an Informed Business Decision Using Public Financial Records\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eTo the Unknown Hacker\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHacking in a Slow Job Market\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eFiction: Hacking the Naked Princess 0x16\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eHACKER HAPPENINGS\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003ePlus LETTERS and MARKETPLACE\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003e \u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":39995321942071,"sku":"","price":4.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/4q18_Digital_Edition-FINAL-fixed.png?v=1667703733"},{"product_id":"complete-2018-pdf-collection","title":"Complete 2018 PDF Collection","description":"\u003cp\u003eThis is an entire year's worth of issues as they were originally printed and in fully searchable, non-DRM PDF format.\u003c\/p\u003e\n\u003cp\u003eThis collection includes all 272 pages from 2018 in their original layout. If this is successful, we will expand this to additional years.\u003c\/p\u003e\n(As soon as you purchase this collection, you will get a download link. You will also get this link via email.)\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e","brand":"2600 Magazine","offers":[{"title":"Default Title","offer_id":40016721215543,"sku":"","price":14.99,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0837\/3445\/products\/2018-pdf-collection.jpg?v=1668298557"}],"url":"https:\/\/store.2600.com\/collections\/2010-2015\/conference_hope_16+format_mp4+hope.oembed","provider":"2600 Magazine","version":"1.0","type":"link"}