Jump to content

Movie Junkie

Beta Team Members
  • Posts

    1,374
  • Joined

  • Last visited

Everything posted by Movie Junkie

  1. I don't know if it's against the law to do it but it is against the law to call you if you're on a do not call list (except in certain circumstances). If a telemarketer calls me and he doesn't have the right to undr the law, well then, 'm going to blast away!
  2. He looks pleased...
  3. That's just what I am going to do.
  4. I don't know. It supposedly is real.
  5. Weekend Eating: Mobile Cooking with Suzzanna Decantworthy additional research: Sean McCleanaugh Many students, and other young people, have little in the way of cooking skills but can usually get their hands on a couple of mobile phones. So, this week, we show you how to use two mobile phones to cook an egg which will make a change from phoning out for a pizza. Please note that this will not work with cordless phones. To do this you will need two mobile phones - they do not have to be on the same network but you will need to know the number of one of them. The only other items you will need are: 1. An egg cup, (make sure that the egg cup is made of an insulating material such as China, wood or glass - plastic will do. DO NOT use stainless steel or other metal). 2. A radio, AM or FM - you can also use your hifi. 3. A table or other flat surface on which to place the phones and egg cup. You can place the radio anywhere in the room but you might as well put it on the table. How To Do It: 1. Take an egg from the fridge and place it in the egg cup in the centre of the table. 2. Switch on the radio or hifi and turn it up to a comfortable volume. 3. Switch on phone A and place it on the table such that the antenna (the pokey thing at the top) is about half an inch from the egg (you may need to experiment to get the relative heights correct - paperbacks are good if you have any - if not you may be able to get some wood off cuts from your local hardware shop). 4. Switch on phone B and ring phone A then place phone B on the table in a similar but complementary position to Phone A. 5. Answer phone A - you should be able to do this without removing it from the table. If not, don't panic, just return the phone to where you originally placed on the table. 6. Phone A will now be talking to Phone B whilst Phone B will be talking to Phone A. 7. Cooking time: This very much depends on the power output of your mobile phone. For instance, a pair of mobiles each with 2 Watts of transmitter output will take three minutes to boil a large free range egg. Check your user manual and remember that cooking time will be proportional to the inverse square of the output power for a given distance from egg to phone. 8. Cut out these instructions for future reference. Note: We cooked our egg during the evening using free local calls, if you were to cook an egg for lunch it would cost ?3.00 - not cheap but you do have the convenience.
  6. Microsoft is giving away free USB drives, at least as of the time of this writing. Click here: and then click on the "Valuable Information" panel on the right side. That takes you to a propaganda page; read the text, follow the instructions, and you then are taken to an extremely simple mini-quiz about what you just read. All but one of the answers is already filled in for you with the correct replies! (And the non-filled in answer is "two.") When you give the correct answers and enter your shipping address, MS promises to send you a USB flash drive filled with various information. You can read it or (of course) delete it and just use the empty drive. I have no idea how long this promotion will go on, but it's going on now so click on over and grab yourself a free flash drive.
  7. I've gotten several calls that had a phony caller ID show up. I now have a great solution for those telemarketers when they igonre the do-not-call lists I am on. I have purchased a VERY LOUD air horn. From now on whenever a telemarketer calls they will be getting a shot of that horn. I hope I cause some of those BASTARDS to go deaf!
  8. You got the story wrong db. It was because he was kicked in his niblets.
  9. Good find lfcrule.
  10. Thank you MJ (and everyone else who answered)! MJ, you seem to be a pro at this. What selection of programs would you recomend to cover ones needs for disk copying purposes? What Spinner said.
  11. According to the commercials it was just a little sprout anyway...
  12. Mar 1, 8:34 PM (ET) By PETER SVENSSON (AP) Rep. Tim Murphy, R-Penn., picks up his telephone handset in his office in the Cannon House Office... NEW YORK (AP) - Last fall, U.S. Rep. Tim Murphy's office started getting phone calls from constituents who complained about receiving recorded phone messages that bad-mouthed Murphy. The constituents were especially upset that the messages appeared to come from the congressman's own office. At least, that's what Caller ID said. "People thought we were making the calls," Murphy said. The calls, which the Pennsylvania Republican estimated in the thousands, were apparently placed with fake Caller ID. That has been possible for a long time, but it generally required special hardware and technical savvy. In the last few years, Caller ID spoofing has become much easier. Millions of people have Internet telephone equipment that can be set to make any number appear on a Caller ID system. And several Web sites have sprung up to provide Caller ID spoofing services, eliminating the need for any special hardware. For instance, Spoofcard.com sells a virtual "calling card" for $10 that provides 60 minutes of talk time. The user dials a toll-free number, then keys in the destination number and the Caller ID number to display. The service also provides optional voice scrambling, to make the caller sound like someone of the opposite sex. Caller ID spoofing appears to be legal, though many of its uses are not. The Federal Communications Commission has never investigated the issue, spokeswoman Rosemary Kimball said. Lance James, chief scientist at security company Secure Science Corp., said Caller ID spoofing Web sites are used by people who buy stolen credit card numbers. They will call a service such as Western Union, setting Caller ID to appear to originate from the card holder's home, and use the credit card number to order cash transfers that they then pick up. Exposing a similar vulnerability, Caller ID is used by credit-card companies to authenticate newly issued cards. The recipients are generally asked to call from their home phones to activate their cards. Some card companies maintain, however, that they use additional means to confirm new cards. And caller ID spoofing may not work for calls to 1-800 numbers, where the hardware can identify calls using a separate technology. Two spoofing services contacted by The Associated Press, Spoofcard.com and Telespoof.com, did not return messages seeking comment about their business. However, some of the five or so Web sites in the business don't appear to be completely unscrupulous: James said he had been hired by a few of them, which he would not name, to help stop the Western Union scam. Also, both Spoofcard.com and SpoofTel.com say they will surrender call logs to authorities in response to subpoenas. Spoofcard.com's site says the service is "intended for entertainment purposes only." Telephone companies can trace calls to their origin regardless of the Caller ID information they carry, but the process is laborious, especially since a call may be carried by several companies before reaching its destination. The fragmented nature of the telephone network also makes it technically difficult for the carriers to prevent spoofing. At Verizon Communications Inc. (VZ), security manager John Lewandowski said the company often gets complaints about fake Caller ID after a telemarketer has spoofed his number to cover his tracks. In a typical case, someone will be jarred in the middle of the night by repeated telemarketing calls. He checks Caller ID, calls the number - which is false - and starts "cussing out" the person at the other end of the line, Lewandowski said. "And that poor guy was asleep. It wasn't him at all," Lewandowski said. The company investigates and tracks down the callers, he added. Apart from fraud and telemarketing, Caller ID spoofing can be used for pranks and spying. In one case, SWAT teams surrounded a building in New Brunswick, N.J., last year after police received a call from a woman who said she was being held hostage in an apartment. Caller ID was spoofed to appear to come from the apartment. It's also easy to break into a cell phone voice mailbox using spoofing, because many systems are set to automatically grant entry to calls from the owner of the account. Stopping that requires setting a PIN code or password for the mailbox. In a slightly more complicated fashion, spoofing was part of the technique used by a hacker who broke into Paris Hilton's cell-phone voicemail in 2004, according to security consultant Kevin Mitnick, who said he was citing hacking sources. The hacker apparently called the celebrity socialite posing as a technical-support person from the carrier, and lured the password from her. That is known as a "pretext" call - someone poses on the phone as a customer, employee or even a regulator to obtain personal information from companies and individuals. And indeed, while Spoofcard.com contends that its service is for "entertainment purposes," it also notes that "Private Investigators will find Caller ID spoofing valuable for pretext calls." Robert Douglas, a privacy consultant in Colorado, testified before Congress last month that pretexters trade tips on finding the best spoofing services. Pretexters generally claim their practices are legal, as long as they don't involve financial information. A bill introduced in the Senate would make it illegal to pose as someone else to obtain phone records, or to buy records from phone company insiders. Douglas would like legislation against Caller ID spoofing as well, but there appears to be little interest in Washington. "If I'm paying extra for Caller ID, which I do ... there should be some ability on my part to believe what I'm getting," Douglas said. In Alaska, State Representative Bob Lynn has introduced a bill to make spoofing a misdemeanor. "False caller identification is more serious than pranks, or the annoyance of intrusive telemarketing," Lynn writes. "It facilitates fraud, and can be potentially deadly." However, it is unclear what effect the bill would have. As Lynn notes, Caller ID is a federal issue.
  13. Movie Junkie

    Baby Names

    A pregnant woman from Washington, D.C. gets in a car accident and falls into a deep coma. Asleep for nearly 6 months, when she wakes up she sees that she is no longer pregnant and frantically asks the doctor about her baby. The doctor replies, "Ma'am you had twins! a boy and a girl. Your brother from Maryland came in and named them." The woman thinks to herself, "No, not my brother... he's an idiot!" She asks the doctor, "Well, what's the girl's name?" "Denise." "Wow, that's not a bad name, I like it! What's the boy's name?" "Denephew."
  14. Ho Ho Ho Green Giant...
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.