Physical Security
Last Updated: 7/6/2013 11:26:18 PM




Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

Files are presented for prevention purposes only - The operator of this site will cooperate with law enforcement in tracking down and bringing to justice anyone who commits any crime with the information in this directory
cialtrop.txt
4442 bytes. by United States Central Intelligence Agency (2009)
The CIA on Caltrops

telacc~1.txt
10960 bytes. (1999)
Getting Physical Access to Server and Telecom Rooms
Countersecurity  
simplex.txt
24181 bytes.
5-button Simplex Locks
Countersecurity   Locksmithing  
sewer.jpg
55637 bytes.
A Bell manhole or sewer
Phreak System Info  
simplex2.txt
24749 bytes.
A list of all Simplex lock combinations
Countersecurity   Locksmithing  
atheft.txt
42304 bytes.
Auto Theft - a practical approach
Countersecurity  
trashis.txt
5893 bytes.
Basic Trashing Manual
Trashing  
library.txt
7015 bytes.
Beating the Library
Countersecurity  
trashing.txt
3892 bytes.
Bell Trashing
Trashing  
trashng.txt
6704 bytes.
Better Homes & Trashing
Trashing  
beycha.txt
7975 bytes.
Beyond Chapstick - More scantron methods
Countersecurity  
lausd.txt
28672 bytes.
Breaking into Los Angeles Schools
Countersecurity  
mdbmbtp.txt
3936 bytes. (1995)
British Telecom Bomb Threat Policy (Gotta love that IRA)
Countersecurity  
cmpheist.txt
5360 bytes.
Computer Heisting from Schools
Countersecurity  
drillpik.txt
1042 bytes.
Drill pick for locks
Countersecurity   Locksmithing  
ezpick.txt
1206 bytes.
Easy Lockpick
Countersecurity   Locksmithing  
dumpster.gif
112167 bytes.
Flyer distributed to Ameritech employees - "Dumpster Diving is a Real Threat!"
Trashing  
alarms.txt
2721 bytes.
Fun with Alarms
Countersecurity  
libraryo.txt
5888 bytes.
Getting free books and free EVERYTHING from the library
Countersecurity  
inrs.txt
9375 bytes.
Getting into R rated movies
Countersecurity  
adtrash1.txt
7440 bytes. (1999)
Hack Canada's Adventures in Trashing I
Trashing  
index~1.htm
3086 bytes. (1996)
Hackerz Guide to Lock Picking
Locksmithing  
hotwire.txt
838 bytes.
How to Hotwire a Car
Countersecurity  
b_e.txt
3114 bytes.
How to break into a house
Countersecurity  
ai-attma.txt
5889 bytes.
How to break into an AT&T Manhole and get away with it!
Countersecurity  
mastlock.txt
8163 bytes.
How to get/make master lock keys
Countersecurity   Locksmithing  
lockimpr.txt
1356 bytes.
How to impression a key lock
Countersecurity   Locksmithing  
shoplft2.txt
6439 bytes.
How to shoplift, part two. By ZiGGY
Countersecurity  
jockybox.txt
3587 bytes.
Jocky Boxing: Entering cars.
Countersecurity  
sslairs.txt
10190 bytes.
Known US Secret Service Offices - from 2600
Countersecurity  
lol_013.txt
37811 bytes.
Legions of Lucifer: A complete guide to car theft
Countersecurity  
dstrylox.txt
1746 bytes.
Lock Destruction
Countersecurity  
lockpick.txt
6319 bytes.
Lock Picking
Countersecurity   Locksmithing  
nrk12.txt
3533 bytes.
Lock Picking
Countersecurity   Locksmithing  
sanlock1.txt
33616 bytes.
Lock Picking File From Sanctuary
Countersecurity   Locksmithing  
sanlock2.txt
33437 bytes.
Lock Picking File From Sanctuary
Countersecurity   Locksmithing  
sanlock3.txt
13365 bytes.
Lock Picking File From Sanctuary
Countersecurity   Locksmithing  
lckpik.txt
3939 bytes.
Lock Picking by Black Cobra
Countersecurity   Locksmithing  
lockshop.txt
8982 bytes.
Lock Picking/Smithing Information
Countersecurity   Locksmithing  
lockerdx.txt
8068 bytes.
Locker Docs
Countersecurity   Locksmithing  
mitloc~1.pdf
521075 bytes. (1996)
MIT Guide to Lock Picking - Adobe Acrobat Format
Locksmithing  
mitloc~1.ps
818540 bytes. (1996)
MIT Guide to Lock Picking - Postscript Format
Locksmithing  
guide.zip
418642 bytes. (1997)
MIT Guide to Lock Picking - HTML Format
Countersecurity   Locksmithing  
master1.txt
8052 bytes.
Master Lock Picking File 1
Countersecurity   Locksmithing  
master2.txt
3439 bytes.
Master Lock Picking File 2
Countersecurity   Locksmithing  
master3.txt
1590 bytes.
Master Lock Picking File 3
Countersecurity   Locksmithing  
miracle.txt
7517 bytes.
Miracle Lock Picking
Countersecurity   Locksmithing  
ssfreq2.txt
6175 bytes.
More Secret Service Radio Frequencies
Countersecurity  
mt.txt
7059 bytes.
More Trashing-A Filthy Business
Trashing  
newlocks.txt
14370 bytes.
New lock mechanisms
Countersecurity   Locksmithing  
nrk94.txt
927 bytes.
Opening Post Office Boxes
Countersecurity   Locksmithing  
locks2.txt
7457 bytes.
Picking locks #2
Countersecurity   Locksmithing  
readmail.txt
3478 bytes.
Reading unopened mail
Countersecurity   Postal Scams  
survaili.txt
6623 bytes.
Remote surveillance by CCTV
Countersecurity  
robbing1.txt
10066 bytes.
Robbing Houses 1 of 3
Countersecurity  
robbing2.txt
7720 bytes.
Robbing Houses 2 of 3
Countersecurity  
robbing3.txt
15418 bytes.
Robbing Houses 3 of 3
Countersecurity  
burglar.txt
8377 bytes.
Robbing Houses for Phun and Profit
Countersecurity  
safepick.txt
4752 bytes.
Safe Cracking Via the "Sound" Method
Countersecurity   Locksmithing  
sscodes.txt
10958 bytes.
Secret Service Codenames - People, places, things.
Countersecurity  
ssfreq1.txt
4917 bytes.
Secret Service Radio Frequencies
Countersecurity  
shimming.txt
3590 bytes.
Shimming Doors
Countersecurity  
simplexl.txt
23601 bytes.
Simplex 5-button combination locks
Countersecurity   Locksmithing  
vidoetap.txt
2953 bytes.
Stealing videotapes
Countersecurity  
s_shack1.txt
9189 bytes.
Stop & Shop Hack Booklet #1
Countersecurity  
s_shack2.txt
8062 bytes.
Stop & Shop Hack Booklet #2
Countersecurity  
lps.txt
10285 bytes.
The Art of Lockpicking
Countersecurity   Locksmithing  
locksci.txt
9510 bytes.
The science of opening locks
Countersecurity   Locksmithing  
safesci.txt
10157 bytes.
The science of opening safes
Countersecurity   Locksmithing  
trash3.txt
3493 bytes.
Trashing Techniques
Trashing  
vas018.txt
5665 bytes.
VAS #18: How to make your own SlimJim
Countersecurity  
vas042.txt
50731 bytes.
VAS #42: Almost Everything You Ever Wanted To Know About Security
Countersecurity  
vas063.txt
4690 bytes.
VAS #63: Some good security books
Countersecurity  
vas083.txt
8440 bytes.
VAS #83: Proper theft techniques
Countersecurity  
vas089.txt
6337 bytes.
VAS #89: Late Night Revenue
Countersecurity  
vendkey.txt
828 bytes.
Vending Machine Keys
Countersecurity   Locksmithing  
(
blueline.gif
1206 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

contents.gif
278 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

flesh.jpg
2001 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

icon_key.gif
648 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

icon_s~1.gif
471 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

knot.gif
348 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-dbl~1.htm
2317 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f001.gif
7014 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f002.gif
7271 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f003.gif
5006 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f004.gif
3690 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f005.gif
4873 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f006.gif
5829 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f007.gif
4704 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f008.gif
3936 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f009.gif
4961 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f010.gif
4729 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f011.gif
4369 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f015.gif
4375 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f016.gif
3243 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f017.gif
3030 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f018.gif
3370 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f019.gif
4165 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-f020.gif
6208 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-ide~1.htm
1775 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-int~1.htm
3554 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-mag~1.htm
3028 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-m_n~1.htm
1656 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-pin~1.htm
5195 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-p_n~1.htm
1609 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-tip~1.htm
12422 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-too~1.htm
8265 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-tub~1.htm
4503 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

lp-waf~1.htm
4531 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

redbal~1.gif
870 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

warning.gif
884 bytes.
(Accessory file for The Hackers Guide to Lockpicking)

)
adt.txt
3935 bytes. (2001)
Programming ADT Alarms
Countersecurity  
elp.txt
1200 bytes. by Wyzewun (1999)
Fundamentals of Electronic Lockpicking
Countersecurity  
te2000.txt
6219 bytes. by Jenn (2001)
The Amtel 2000 Tele-Entry System
Countersecurity  
how%20~1.txt
2850 bytes. by Mr. Puff N Stuff
How to have a profitable ID business

nitemove.htm
308002 bytes. (1913)
Night Movements - translated from Japanese

spuncpc.txt
2077 bytes. by Ripmax (1994)
Spotting Undercover Police Cars (in Australia)
Local: Australia  
manhole.txt
4728 bytes.
How to break into an AT&T Manhole and get away with it!

qkroofin.txt
2054 bytes. (2001)
A Quick Word on Roofing

upl011.txt
40331 bytes. by Rufus T. Firefly (1999)
Shoplifting for Dummies

urbex.txt
2458 bytes. (2003)
Urban's Guide to UrbEx

nightime.txt
6253 bytes. (2003)
Safety in Night Time Activities

ddiving.txt
4196 bytes. by N. Willhite
Dumpster Diving

toolchck.doc
6144 bytes. (2001)
Tool Checklist for a Saboteur

(Ed. Note: Lists like this are actually rather dangerous... it is considered best practice to carry only the minimum required equipment on any kind of caper, so as to minimize the numerous risks involved in being overequipped, including reduced mobility, more to ditch or abandon in the event of a quick getaway, and the possibility of being suspected or accused of greater crimes than you intended based on what *could* have been done using all the extra crap you were caught with. Don't bring your fucking cellphone. It might ring at a bad time... )

lol, wtf?
1 Whoa, bro... Access denied for user 'root'@'localhost' (using password: NO)



The bar is open!

The new 10,000 drink recipe archive has arrived!

It's back! TUCoPS Text Archive

System Security - General Information - Countersecurity Techniques - Password Security - Internet - Broken Security Apps - Browsers - Web - Web Servers - Apache - IIS - Sites - Web Apps - CMS, Portals - e-Commerce - Blogs - Wiki - Guestbooks - Adminware - PHP - Web Forums - Popular Web Forums - Networks - Wireless - Unix - HP/UX - SGI - BSD - SCO - SunOS/Solaris - Unix-like Platforms - Cisco - Oracle - VMWare - Citrix - Network Appliances - Macintosh - Apple(multi) - HP(multi) - IBM(multi) - Microsoft(multi) - Handhelds - Games - Linux - Linux Apps A-M - Linux Apps N-Z - Red Hat/Fedora - Slackware - Debian - Mandriva/Mandrake - Gentoo - SuSE - Conectiva - Trustix - Ubuntu - Retro Linux - Antique Systems - Dialup BBSes Windows Windows Apps Windows Network Vulns
Telecom Security - General Telecom Security - Phreak Boxes - Major Cellular Brands - Other Cellular Brands - Cellular Misc. - Number Lists - Caller ID - Public Phones - Voice Mail - Asterisk - Technical System Info
/etc - Hardware Hacks - Crypto - Malware - PC Hacks - Radio Hacks - Television Hacks - Scams - Physical Security - Espionage - Privacy - Wetware Hacks - Hacker Counterculture - The Law - Totally Miscellaneous


Hardware 99
Are you working with older hardware like us? If you're using the same equipment we are, you probably need service information complete with vacuum tube pinouts and daily coal requirements. This archive isn't quite that old but it is a definite help to anyone who has a PC that is not brand-new anymore. And it's free!

It's Back!
PC Game Sniper 2007
Thousands of cheats, hints, hacks and walkthroughs for PC Games!

Food!
Our parent site, THC BBS, has returned and brought a huge new text archive with it, containing over 61,000 recipes! And like everything at the AOH complex, it's free!

Security and Computing Freedom Archives

InfoSec News 2005
InfoSec News 2006
InfoSec News 2007
InfoSec News 2008
InfoSec News 2009

InfoSec News 2010

PoliTech 2005
PoliTech 2006
PoliTech 2007
PoliTech 2008
PoliTech 2009


Over 4,000 default passwords
Updated Oct.02,2011



Bored? Play some Games!


Text files by
The Fixer, El Oscuro
AOH Staff
and AOH Contributors
!
Phone Sounds
More Phone Sounds
The Fixer's Phreak Box Review
Box Review Handy Index!
Orange Boxing FAQ
Beating Caller ID FAQ
S.O.B. Orange Box
(NEW Version 1.94 2009)

More Caller ID Info
Phrack, Inc.!
Latest (final???) Issue: #63

Updated Nov.26/2006
More Payphone Info

Click here to get it!


It's Back! Check it out now!
New Site: Things I Shot!
Put your cell cam to good use!

The Web Page You Have Reached is now...
This is a Recording (formerly The Web Page You Have Reached)
And you thought we had a lot of telephone sounds!

Rancho Nevada - the biggest, baddest, best BBS game ever written!


easter egg #71

Site design & layout copyright © 1986-2014 THC