2005
2004
![](https://blogmarks.net/screenshots/2004/11/01/255a5d419e87d55208b5ed113bcf2685.png)
Guide to Lock Picking
![](https://blogmarks.net/img/default-gravatar.gif)
The theory of lock picking is the theory of exploiting mechanical defects.
1970
I-Hacked.com Taking Advantage Of Technology - RFID Blocking Wallet
![](https://blogmarks.net/img/default-gravatar.gif)
With the proliferation of RFID devices and related privacy concerns, it seemed due time to create the RFID Blocking Duct Tape Wallet. There are many ways to prevent Radio Frequency ID tags from being transmitted from devices. I often use my work badge and school ID which both contain RFID tags. With drivers licenses, credit cards, and cash now beginning to contain RFID tags, why not create the wallet.
I-Hacked.com Taking Advantage Of Technology - RFID Blocking Wallet
![](https://blogmarks.net/img/default-gravatar.gif)
With the proliferation of RFID devices and related privacy concerns, it seemed due time to create the RFID Blocking Duct Tape Wallet. There are many ways to prevent Radio Frequency ID tags from being transmitted from devices. I often use my work badge and school ID which both contain RFID tags. With drivers licenses, credit cards, and cash now beginning to contain RFID tags, why not create the wallet.