Skip to content


Articles tagged for: how to hack a load in tm

March 27, 2014

Hackers use text messaging to make ATMs dispense cash

We’ve seen different ways of how hackers gain control of an ATM to steal money in the past, but Symantec’s blog post reports of a recent method to make ATMs dispense cash and it just involves a text message. They added that one of the main reasons ATMs are easily hacked is because of the […]

October 06, 2012

BlackBerry JamHack 2012 launches across Asia Pacific

Research In Motion (RIM) announced its first simultaneous Asia Pacific (APAC) wide Hackathon called the BlackBerry JamHack.

September 27, 2012

More PH government websites have been hacked!

After so many failed attempts to have the recently passed Anti-Cybercrime law be reviewed, some of our fellow countrymen just had enough of the crap and decided to take matters into their own hands by hacking multiple government websites and placing their banner on it. As the saying goes, “Action speaks louder than words”.

August 21, 2008

Free trip to Yahoo! Open Hack Day in California

Yahoo! Philippines is serious about promoting web development and technology innovation in the country that it has sponsored quite a number of efforts locally — from University Hack Days, Yahoo! Developers Network to BarCamp Manila.

April 07, 2008

Massive Blog Hackery Exposed

Tony of DJI talks about an unexpected outcome from TailRank’s River, a blog monitoring service. A large number of blogs turned out to have been hacked to promote spammy content and affiliate links.

January 05, 2008

No Hacking Involved in DOJ and Enchanted Kingdom Websites

Been receiving emails from readers and fellow bloggers about the alleged hacking of 3 government agency websites, namely the DOJ, PNP-CIDG and ITECC. Investigations were being done by PLDT (or Infocom, the webhost), the DOJ and the management of Enchanted Kingdom. What would have seemed like a hack was actually a server glitch.

October 29, 2007

Leopard for PC hacked on Launch Day

The ever expected launch of Apple’s OS X 10.5 (codenamed Leopard) was met with alot of enthusiasm. On top of that, there have been reports of the new OS flying around some torrent sites.

June 07, 2007

Site Hacking and Contingency Plans

Every once in a while, I’d receive text messages or emails from bloggers and website owners asking for advice whenever their site is hacked. Being a blogger myself running dozens of sites and also a web hosting provider, hacking/cracking and other exploits are not new to me. We’ve experienced them on so many occasions and […]

December 27, 2006

Google Code Search used to hack blogs/websites

There were a lot of buzz before about the Google Code Search among programmers and coders. There were also announcements from software vendors like vBulletin that copies of their software can be downloaded from sites of legitimate license holders. All you gotta do was do a search of the software and all vB copies uploaded […]

March 02, 2014

WiFi Networks vulnerable to virus attacks, study shows

A group of talented individuals over at the University of Liverpool, spearheaded by Network Security Professor Allan Marshall, has developed a virus called Chameleon which not only can infiltrate “poorly managed” Routers and Access Points, but also effectively spread to other wireless devices, particularly in a dense populated area where Wi-Fi networks are abundant.

February 25, 2014

Privacy-focused Blackphone official specs and pricing

We’ve previously reported about the smartphone that focuses primarily on its user’s privacy. Now, as it was announced at MWC, the Blackphone‘s specs has been unveiled together with its official price.

September 17, 2013

What we think of the iPhone 5S & 5C

Apple’s new products are bound to arrive before Christmas and a lot of eyes are over it. We’ve been receiving a lot of questions and arguments if one should get the iPhone 5S, the 5C (especially), or something else. Well, here’s our take; this is what we think of the iPhone 5S & 5C.

July 30, 2013

Should the Philippines build a Cyber Army?

Cyber threats are real. Countries like the U.S., Iran, North Korea and China have been subjects numerous times when it comes to cyber security, warfare and espionage. While we’re not as big and as powerful as those countries, do you think we should also develop a way to defend our country from cyber attacks?

April 13, 2013

What is Bitcoin?

Been hearing about Bitcoin lately? If that’s the case, you might have asked yourself the question above. If you’ve just tuned in like me, here’s a graphical explanation of what is Bitcoin and how it works.

November 30, 2012

RIM focuses on apps in preparation for BB10

In line with the upcoming launch of the BlackBerry 10, RIM has recently announced the new name of the BlackBerry App World which is now called BlackBerry World. Of course, rebranding their app market isn’t gonna be enough to elevate the OS to the next level. So what will? Investing heavily on the devs to […]

September 17, 2012

Anti-Cybercrime Law: What you can or cannot do?

News of the passing of the Anti-Cybercrime Law sent shivers to a lot of people, and for good reason. There’s also a lot of confusion about what people can or cannot say or do because of this law. We’ll try to outline this for you.

August 29, 2012

How-to: SIM unlock a Galaxy Note GT-N7000

If you got yourself a SIM-locked Galaxy Note (just like I did) and decide to use a different SIM from another telco other than what it came with, here’s a guide on how to SIM unlock your Samsung Galaxy Note (GT-N7000).

July 20, 2012

Paragon Android app lets you play with external HDDs

The Paragon Software Group is well-known for its hard drive management tools so it comes to no surprise that they’ve ventured into the popular sea of Android devices.

July 16, 2012

Russian “In-App Purchasing” trick got Apple’s attention

In the past, in-app purchasing (IAP) hacks has only been available for jailbroken iDevices. But recently, a Russian hacker developed an ingenious way to bring that work around without the jailbreak.

July 11, 2012

Android 4.1 Source Code now out

Google finally hands over Android 4.1 to the AOSP (Android Open Source Project), currently though, the only proprietary binaries available for devs to feast on are the the ones meant for the Galaxy Nexus and Google’s newly-announced Nexus 7 Tablet.

May 08, 2012

Cherry Mobile Magnum 2X Review

We know that this may be out-dated by all standards but we never really had the chance to do a full review of the dual-core smartphone from Cherry Mobile locally known as the Magnum 2X. Now that we have a review unit from the Philippine-based cellphone manufacturer, we thought to give it a fair airtime.

January 21, 2012

Brewing Anti-Online Piracy Bill in the Philippines

TechLocal.com reports that there is a brewing plan for a bill to combat online piracy in the Philippines. A group is said to be lobbying in congress and the senate to pass a bill similar to SOPA or PIPA.

July 11, 2011

Acer Iconia Tab A500 is cheapest Honeycomb tablet

We’ve been playing with the Acer Iconia Tab A500 for over a week now and I must say this is a pretty decent Honeycomb tablet and probably the cheapest dual-core tablet in the Philippines with street prices as low as Php18,500.

December 12, 2010

HTC Desire HD Review

The HTC Desire HD is one of the most anticipated superphone this year and it’s coming to town in time for Christmas (or so they say). Check out our full review of the Desire HD after the jump.

February 01, 2009

The day Google broke the Web

There was some sort of mass panic last night when Google was spewing a warning “this site may harm your computer” on all their search results. People search on Google were shocked and confused as if the search engine itself was hacked.

Results for: how to hack a load in tm