1. Go to www.jajah.com
2. In "(1) My Phone Number:" Enter the phone number of the Cingular customer, say XYZ
3. In "(2) My Friend's Phone Number:" Enter your phone number
4. Then "(3) press Call"
5. Now hope that XYZ does not pick up the phone (Otherwise, you will have XYZ talking to you at the other end)
6. After a while you will get a call (this will show up as a call from XYZ)
7. Pick up the call and listen to the unheared voice message of XYZ
Step 5 is crutial one.
We have tried this for T-mobile and its secure. If XYZ is a t-mobile customer then all you will hear is the regular voice message menu, so you can leave a voice message. XYZ will see a missed call from his number and your voice message.
Very scary indeed
Because the dutch national elections are only 4 weeks away (November 22nd) 35 cities will revert to voting with paper ballots and a red pencil.
There is a strong opposition to electronic voting by a group of people that includes Rop Gonggrijp a a Dutch hacker and one of the founders of internet service provider XS4ALL. This groep is called We do Not Trust Voting Computers
Since my own arguments aren't working, I need documented proof to back it up.
Does anyone know of a guide to IT security that:
a) Is written for a non-technical audience, but is neither condescending nor overly "soft."
b) Defines the various terminology (trojan, virus, zombie, etc.) clearly
c) Explains what threats each security measure protects the user from
d) Uses cases and examples to demonstrate the before and after scenarios. i.e. "Jane's credit card number was intercepted via a non-encrypted connection. She started looking for the padlock symbol on her browser's status bar. Now, her credit card number looks like this: @*#(!@($)." (That's just an example, by the way.)
This can be either an online document or a print book.