Can you "hack" an elevator, so that it will bypass "pickup calls"?

1 Answer

Answer :

I remember reading this a while back (linked from lifehacker) but it hasn’t worked for me so far! http://www.i-hacked.com/content/view/186/48/ some good comments about whether it works on lifehacker http://lifehacker.com/205918/send-the-elevator-directly-to-your-floor

Related questions

Description : So what finally happened with/to the Ashley Madison site?

Last Answer : Probably someone got paid off via an off shore account and now it’s business as usual.

Description : What are the differences between threat, vulnerability, and consequence in the context of cybersecurity?

Last Answer : Those are academic terms, or possibly professional cybersecurity lingo. I'm a software developer, but have only done a few projects in cybersecurity, and I don't follow the academic or industry terminology very ... Update, or a DDOS attack. Could be ignorant users who don't know what they're doing.

Description : Are corporations and goverment agencies helpless against hackers for ransom?

Last Answer : If they can get through the Anti-virus programs and the firewalls then yup.

Description : IF 2016 presidential found invalid, what's up legally?

Last Answer : Well, I would assume we’d then fire the asshole who never should have won in the first place, and proceed from there.

Description : I am hacked and need some help!

Last Answer : You might want to either take it to a repair shop or pay someone to come to your home to check it out connected to your service provider. It's NOT going to be cheap; but what you're ... hacker who might love the challenge of figuring out what your hackers are doing & enjoy shutting them down!!!

Description : In which scenarios fraudulent credit card transaction may not be reversed?

Last Answer : One scenario is when you child makes an online purchase on your credit card.

Description : Can they bug our cellphones like that?

Last Answer : answer:Possible? Yes. Does it happen? Probably. Scared?

Description : Ashley Madison is a 'dating' site for married couples that want to cheat on their spouses. Apparently they have been hacked and the hacker is threatening to release all 37 million names, unless the site closes up shop. Is this good or bad?

Last Answer : While I don’t condone what people do on that site. I find it weird that our right wing friends say we all have a free will to go through life with, yeah sure as long as it meets their views,if it doesn’t then they will force theirs on you, pretty cool huh?

Description : Someone hacked my facebook?

Last Answer : You can change your password if you can answer the secret question. You can’t change the secret answer. You might have to make another account. Best to tell all you your contacts not to send you any money and that to be careful with your old (hacked) account.

Description : A question for Computer Scientists: How feasible is an "offensive firewall"?

Last Answer : answer:Very feasible, you can fire off just about anything you want with existing firewalls and software for whatever conditions you want to look for. But it has the same risk/reward as any attack. You don’t get a pass for attacking a government network because they probed your network first.

Description : How to report hackers on Runescape?

Last Answer : answer:I believe there’s a contact link somewhere on the support site. If you can tell them your original password as proof that you really own the account they’ll probably give it back to you. I hope you have set a bank pin, so even if the hackers got your account, they can’t empty your bank.

Description : Any idea of the repercussions if I attack a site that is hosting images of protesters in Iran and asking for their identity?

Last Answer : I don’t know, but if it is a site as you describe it to be, I would applaud you! (Best not to get caught, though and be proud in private – by yourself, knowing that I would be proud of you if I knew.)

Description : To snoop or not to snoop.

Last Answer : how old is she?

Description : Do you still have to remember usernames with "SuperGenPass"? what about password lenght requirements that are diff on diff sites, also: any alternatives you guys use that's 100% hacker safe?

Last Answer : answer:i just use the same…i don’t care that people see me on empornium etc. but ofcourse, everything will never be fully hackproof…

Description : Why was there so little media coverage of the Colonial pipeline hack?

Last Answer : Nor Cal gas prices have nothing to do with the temporary shortage on the East Coast. The gasoline delivery is not that connected. There was plenty of coverage of the Colonial hack, ... the gasoline deliveries. Colonial turned off the pipeline because they were afraid clients would be undercharged.

Description : How to hack phone ? One of my close relatives uses 1200 rupees per month on the phone. I don't know how much it costs. But what does he do ? And for this I want to put an app on his phone. Who will tell me what he does , who he talks to, etc. Is there any app ? You know .. so he doesn't notice

Last Answer : No. There are no such apps. However, for how much money is being spent on SIM and how it is being spent, the SIM service provider can take the service from the company for some money.

Description : Question for women: if you're at the back of a crowded elevator and the door opens, would you prefer that all the men cram to the side so you can get off first, or should people exit according to their natural position in the elevator, meaning you would exit closer to last?

Last Answer : I think anyone can answer this question, not only women. If I was on an elevator, we would get off in the natural order; whoever is in front gets off first. Chivalry is dead.

Description : A woman is sitting in her hotel room when there is a knock at the door. She opened the door to see a man whom she had never seen before. He said 'oh I'm sorry, I have made a mistake, I ... . The woman went back into her room and phoned security. What made the woman so suspicious of the man? -Riddles

Last Answer : You don't knock on your own hotel room door.

Description : What is your favorite hack regarding P and G's Dawn?

Last Answer : I know that Dawn, or most any liquid dishwashing detergent, can be used to create a homemade icepack. You put it in a Ziploc bag (I would double bag it). When you freeze it it stays pliable.

Description : Is it possible to hack someone's phone account and cut off their access to their own phone?

Last Answer : It can be done to some extent, for a limited time, depending on how much access the hacker has to what devices and information, and on how long it takes the victim to notice and to ... themself, the company may end up believing them and unblocking the phone and blocking the stolen phone instead.

Description : What’s your favourite fast food hack / off-menu meal?

Last Answer : I don’t think this answers the question but an unconventional combo which is good is Dipping chips (fries) into curry like Chicken Tikka Masala.

Description : Are paper ballots hack proof?

Last Answer : In my opinion they are just as likely to be tampered with.

Description : Is it unethical or immoral to hack slot machines to guarantee a win?

Last Answer : I say it’s unethical or immoral because you enter a space where morons pump money into the machines based on the rules and you take the morons’ money by breaking the rules. I say it is a little less unethical or immoral because you are taking money from the pockets of degenerate casino operators.

Description : Your information and I.D. gets harvested from a major hack from someplace you do business with, how much can anyone really take from you?

Last Answer : Currently, about $3.78. But my bank is awesome about reversing unauthorised purchases.

Description : Why has the word "hack" replaced the work "tip"?

Last Answer : The internet. Bet that’s where you read it.

Description : What do hackers get when they hack a Facebook profile?

Last Answer : For one thing, many people use the same password for multiple websites.

Description : Should I use the identity theft service provided after the Blue Cross/Excellus hack?

Last Answer : answer:Change all your passwords and IMO take a pass on Kroll . We have reviewed Identity Theft Shield and found that it offers solid identity theft recovery support for victims but takes no ... reviews of similar services below for our top-ranked alternatives: Link for review of ID Theft services

Description : Jar Jar Abrams and his entire team of hack writers have been killed by terrorists freedom fighters. You are put in charge of producing the next Star Trek movie. Who will you hire to direct, and who will you hire to write the script?

Last Answer : Warner Herzog. Vince Gilligan

Description : Can a person hack your smartphone?

Last Answer : answer:Yes of course it can be hacked. Of course this depends heavily upon the type of smartphone you have. Basically, whether you have an iPhone or not. This is because iPhones are MUCH more defensible ... t be dumb browsing the web (same applies for PC behavior). And you'll be fine. Cheerio!

Description : What harm could a hacker do if they hack your Google glasses?

Last Answer : Oh gawd… they could force me to watch My Little Pony reruns! A fate worse than death.

Description : Should you be able to hack back at the hacker?

Last Answer : self defence usually only works if you can show that all other options, like retreat, have already been exhausted. which in this case is having an impenetrable defence. And besides, I do not ... on the road? They are not an important reason enough to endanger traffic by braking or swiveling.)

Description : Was Thomas Kinkade a talented painter, or overmarketed hack?

Last Answer : Meh, that painting doesn’t do anything for me. I’d rate his work 4.5/10

Description : With my e-mail handle alone how can a hacker hack my password?

Last Answer : answer:By guessing. If you are using real words that are found in a dictionary then you are susceptible to a dictionary attack where a program try's to log on to your account using ... anonymous hacked the emails of a computer security company employed by the US government by doing exactly that.

Description : Who would hack Sesame Street?

Last Answer : Because they’re assholes.

Description : How does a Hacker hack?

Last Answer : I do not know and wouldn’t presume to tell you if I did. But I think the first step has something to do with selling your soul to the debil.

Description : Can someone hack your computer if they have your ip address ?

Last Answer : answer:Can someone hack your computer if they have your ip address ? No. What are some ways I can protect my comp from being hacked ? Don’t download any funny emails.

Description : Why would someone try to hack into my Facebook Acct?

Last Answer : a lot of people use vpns to mask their real ip when trying this type of thing. they use a certain kind of software to make it look like they are from one place when they are really from ... with you, but facebook hackings originate almost always from people you know or people out to scar your rep

Description : Do you know how to hack computers?

Last Answer : Everything on the internet can be hacked and it is always happening. If you learn how the computers communicate and the different options for getting into others on the web then you can hack things. I never do except when asked to by my superiors.

Description : Can I hack and extend my Macbook's power cord?

Last Answer : Yes, if you're prepared to do it right using a soldering iron and heat-shrink tubing. If you have no experience with this kind of thing you might think twice. For starters, find out how many ... work. Making a super-long cable, however, might create too much resistance or capacitance in the line.

Description : Can I hack a dead cell phone by putting special programs on it's Micro SD card?

Last Answer : you can put DSL on an SD card, just look it up..all you need is 35mb of free space format the card using fat32. Not sure it would run through a cell phone but maybe, you could try it. DSL is cool though and super fast.

Description : Did someone hack fluther for April Fool's!

Last Answer : That’s BEN you FEWL! bow down to Poseidon GOD of the SEA!

Description : Is there any way I can load backup copies of wii games on my wii without a hack or mod?

Last Answer : Not with firmware 3.4. You could look into downgrading, but that’s kinda risky. This article is worth a look.

Description : How do u hack maid marian?

Last Answer : link

Description : Psp firmware hack?

Last Answer : Pandora I’m not exactly sure where, but I’ve seen a lot of places online.

Description : Does anyone else occasionally hack up small bits of cottage cheese-like stuff? What is it?

Last Answer : I had this problem a year or two ago but it disappeared. I think it just popped up when I was traveling and my sinuses couldn't handle the crazy changes. I'm pretty sure mine was from sinus ... to infections. The gross cottage cheese stuff had the same smell as an infection. eww. i feel for you.

Description : Has anyone tried the "hack the iPhone" to get ringtones?

Last Answer : answer:I've tried it; though it looks complicated, of's really very simple and definitely works, Best of luck.

Description : Is there a way to hack a cell phone to turn it from verizon to sprint?

Last Answer : there is no way to do that because they operate on different signals, I beleive. It’s like how you can’t use a GSM phone with a non-GSM provider, although I beleive sprint is something totally different (and totally worse).

Description : Does the new iPod nano have Internet capabilatyies without having to hack it?

Last Answer : answer:No, it doesn’t have a network card, so you can’t. Maybe there will come cards which connect via the iPod dockconnector, but don’t count on it. By the way: your battery will drain sooner because of power consumption.

Description : What was the last hack/trick/tip you got off the internet that left you scratching your head and thinking “WTF?”

Last Answer : Burlap sacks for growing outside this summer.

Description : Is it possible to hack the Sidekick LX?

Last Answer : answer: