I have a barely used twitter account. I looked at my profile for the first time this year and noticed I was following almost two thousand extra people. I changed my password (I used a password there I don't use elsewhere). As far as Spybot and Avast can tell me, I haven't gotten any unwelcome visitors. I'm more curious than worried, honestly. Was my twitter account hacked or is it possible to make a user follow someone without hacking into their account? Also, do I have to manually unfollow everyone or is there a quicker way to do it?
My (never rooted) Samsung Galaxy S4 has been exhibiting some strange behavior. How can I tell if I have a virus or if there's a more innocuous explanation? [more inside]
I think my Dad's gmail account got hacked while he was in Cambodia at the start of the month. We have no idea how. What should we do beyond changing the password and alerting the banks and credit card companies? [more inside]
My new phone's Bluetooth insists on automatically turning itself on without any authorization or configuration. Should I be concerned about vulnerability? [more inside]
Is there a way to ignore how you feel and just get things done regardless of whether you feel like doing it or not? I don't understand why I am having such a hard time doing the things that I used to do? I used to be able to get a lot of things done, and now I find myself resisting almost all the time. Is there a way to just stop paying attention to the fact that you don't feel good or that you are scared or a number of other emotions?
I'm a woman (mostly), and I'm the chairperson for our local hackerspace, we have female participants but it's a small minority... and we would really love to be more diverse. [more inside]
I've been rummaging around on Amazon looking for a bit of ready shaped silicone for a thing I'm trying to build and I keep running into containers and things that I have no idea what they are used for. [more inside]
I'm building a ADS-B monitoring system to send myself a text message when a 747-800 (B748) flies nearby. The system I have (RTL dongle w/ rtl_adsb or dump1090) works well at receiving but I'd like to avoid having to query any outside services, such as Flightaware's API, to get the aircraft type. I thought that since I'm already getting each aircraft's ICAO24 id number I should just be able to check that against a list of all the 747-800s in existence. It seems like most of these ICAO24 lists are hoarded either by plane spotters or commercial aviation companies. Where can I find such a list for free without doing a ton of legwork?
Next week (23-28 March) I will be in Warsaw, Poland. Help me understand the Technology Scene in Warsaw! [more inside]
My dad passed away on Friday, and my mom is eager to get into his computer (Song Vaio running Windows 7) and Blackberry (Bold). Both are password protected. Is there any way to change the password on each without wiping the data? I'm fairly computer literate, and my father will have every software disk he's ever received. We also have access to his email if that helps with the Blackberry. Thanks.
I am playing with an animatronic toy I got from a thrift shop. Before I started trying to hack it, there was a rocker switch that when pressed in one direction, made the head turn left, and when pressed in the other direction, made the head turn right. I have hooked this up to my arduino by replacing the switch with transistors, but the head now will only turn right. Without knowing exactly how the circuit board inside the toy works, is there enough information to figure out what I'm doing wrong? [more inside]
A fellow aspiring entrepreneur and friend of mine is in desperate need of help. Time is of the essence! Here's the story: Two years ago he created his own business that sells custom hand-made clothes and products. He owns a website and is on all of the normal social media. One of his most effective tools to connect with customers is through instagram. He's worked hard over the years to develop a fan base of over 27K followers. Mysteriously, last night this account was hacked. They changed the password, hacked the business email, and have taken control of the brand. This account is the business' main source of revenue and advertisement. Although he's trademarked the company and taken all the normal preventative measures, the admin. at instagram claims there's nothing they can do to help. Assuming this is true, what are his available options? Essentially, my friend's ship just got hijacked by some evil bastards and he's going to need a seal team to get it back. [more inside]
After the probably eighth hacking attack (and success) on my site in less than a year, I'm sick to death of using a platform that has to be updated on an hourly basis or get totally nuked by Moldavians. What platforms are relatively user-friendly for people who want to blog? [more inside]
For a long time I've thought that it would be a fun project to put together an electric bicycle. However I've been stymied by the cost and questionable quality of the existing kits, and the complications and compromises of the various DIY methods that are out there online. I have some ideas for how to go about making a cheap and simple electric bike, but I'll be the first to admit that I'm nobody's idea of an engineer so I thought I'd run some things by y'all and see what insights you have. [more inside]
My old, dormant Twitter account recently started sending out direct messages to everyone on my list with spammy stuff. This happened within the last hour, and I just deactivated the account. The password for the Twitter account is different than the password for the email account that I set it up with. The password on the Twitter account hadn't been changed, and no tweets were sent from it (only DMs). Is this likely a third party app jacking the Twitter account (and therefore isolated) or should I be concerned about the establishing email account as well? I ask because this is my primary gmail account.
A friend of mine bought a bunch of old payphones for an art project. A couple still had coins in them, as well a bunch of ripped up and folded lottery tickets. We're guessing this was some method for jamming/stealing money from the phones. We want to satisfy our curiosity with more details. Did some searching, can't find much other than this textfile, which seems not be exactly the same thing. Any ideas or leads? (NOTE: We don't want to ripoff what few remaining payphones there are. We just want to get to the bottom of the lotto tickets!)
I'm trying to find the title of an early 80s British hacker movie, and Google is no help at all. You'd think this would be simple. Everything I remember is inside. [more inside]
This last month, three of my family/friends had their Yahoo accounts hacked into with all sorts of unpleasantness ensuing. I'd like to save all my important info elsewhere. [more inside]
I'm looking for a book recommendation on the history of computer and internet security. [more inside]
I want to read about the dark side of the Internet, preferably in the form of a narrative. [more inside]
I am interested in the Internet of Things and would like to learn how to make machines, specifically appliances and the like, respond to sensor data, price signals, etc. Where do I start? Arduino? Zigbee? Is it even possible to augment a toaster or refrigerator or washing machine in this way? Specific book and/or website recommendations are appreciated. Thanks.
Help me block China [more inside]
Where's the profit in DDOS'ing IRC servers? [more inside]
Email Security: As the News International scandal unravels more cases of 'email hacking' are coming to light so I wanted to know the view of the hive on how easy it might be to hack into someone's email and tips on how to avoid being hacked. [more inside]
Hackers of MeFi, assemble! I have an undocumented serial protocol I want to reverse engineer - help me turn some mysterious bit strings into meaningful data. [more inside]
Help me solve a wifi mystery. A paid wifi hotspot near where I am staying is intermittently providing me with free access to the 'net. I would like to try to understand why this is happening so that I can (hopefully) replicate it at will from my devices. [more inside]
My WordPress site got hacked. Who can I pay to fix it? [more inside]
Where can I go to learn about Arduinos in New York City? [more inside]
Find true-life things that could make me paranoid that my cell phone could be hacked to spy on me. [more inside]
So despite being fairly knowledgeable about these sorts of things, I put on my own little "worst practices in computer security" seminar with my Mac Mini HTPC. And, surprise of surprises, it was compromised. Help me figure out if I've reversed the damage, won't you? [more inside]
How do I explain to my mom that her Yahoo email seems to be compromised, and what should I tell her to do about it? [more inside]
Do you have favorite off-menu items you are able to get at fast food restaurants? As an example, I like to get a hamburger, egg and cheese croissant for breakfast at Burger King. I am successful at about half the restaurants I try to order it at. Do you have anything offbeat or non-standard that you successfully order?
How can I learn to compartmentalize my feelings in order to focus and remain productive in times when I feel less than positive? [more inside]
Need a good movie or TV scene (available online or DVD) with unrealistic hacking.... the kind where parts of the password are obtained one bit at a time until at the perfect moment, the resource unlocks. [more inside]
Is it possible to unlock or jailbreak a verizon, samsung continuum, phone to make it useable with t-mobile? [more inside]
When did hacking acquire the patina of illegality? [more inside]
Someone hacked my twitter. Besides changing the password, what should I do? [more inside]
Any Book suggestions for my class that I'm teaching next semester: The course is titled "Personal Security in the Digital Age," basically it's an overview of computer security topics for undergraduate students. I am not requiring a textbook, but I like to give the students a list of books that could help them in the class, and might be good reads. So, what books do you suggest? (Course description and other books on the click) [more inside]
i got a wristband for this rock festival this weekend. i've never seen this kind of bracelet before. it's a one time woven wrist bracelet with a metal buckle that looks crimped. i want to get it off right now because it's cramping my wrists (as well as my style) but i don't want to cut it off. help? [more inside]
In light of the UK cell phone hacking scandal, in broad terms, how do you go about "hacking" a phone? How did the NotW get access to others voice mail? Software?
Someone has an idea to put to use an existing industrial machine that would expand its capabilities and reach other markets. At the moment there are 3 companies that manufacture this machine that he'd like to approach. [more inside]
What are some of the cheesiest on-screen 'hacking' scenes? [more inside]
Snot & Sickness Filter: I've had a hacking cough for years and I'm finally ready to get to the bottom of this. What do I need to ask my doctor? What avenues are smart to pursue? Anything I can do to calm it down in the short term? [more inside]
What are the legalities (in the United States) of browsing the contents of an "open folder" on a public website? [more inside]
Please suggest ways to make the most of a mostly-dormant Kindle. [more inside]
Help me increase my technology/computer knowledge and resourcefulness so I may help others in my community get the most out of digital tools. Or: How do I apply the DIY/empowering/hackerly approach to computing in a way that benefits others? [more inside]
Automated camera w/infrared for catching scofflaws (boom cars)? [more inside]
How can I document/print/transfer text messages from a Straighttalk LG220C phone? [more inside]
Have there been any high-profile examples where "My account was hacked" was the actual reason for an inflammatory/embarrassing/compromising message, email, or AskMe post, rather than just a lame excuse? [more inside]
Is there a contemporary equivalent to phreaking? Are there (dis)organized groups that steal bandwidth? [more inside]