Posts

Showing posts from November, 2020

Going through, bypassing and breaking locks, and passwords and more

 Lockpicking Going along all combinations -Counting from 1 to 999 or 9999. 0001 to 9999. -Turning a wheel before that wheel after it turned 10 times for example. Last, furthest wheel turns the most. Iron thread lowered into certain combination locks, and tapping it until goes down when turning the wheel(s). Then synchronised turns, if needed at all. Certain combination locks. Pulling and most or least resistance. Certain clicking sounds. Stethoscope. For certain combination locks. -Round one -Or probe Extra: An acoustic frequency spectrum analyser. Certain peaks (different). When turning the wheel(s). Padlock sham Flat screwdriver in and turning it -Certain cases Making a second key. -Fast mold also possible. - A very small camera and light. Which has a reinforced cable so it can be put into things. To watch inside. To watch the mechanism. - Drilling the key hole - Torch cutter Metal saw Metal drills -Tungsten carbide drills Hammer -Just destroying it Club hammer Sledgehammer Hamme...

Breaking a combination lock the long way, three digits

001 To 009 010 To 019 To 100 101 To 109 110 To 119 120 To 129 To 199 200 To 209 210 To 219 Then to 999 theorethically

Getting knowledge about all kinds of firearms and being able to use and understand any firearm

 Getting knowledge about all kind of firearms and being able to use and understand any firearm. Being able to use and understand any firearm, fast. Also when no experience with that model. - Some importances: Undoing safety, cocking, magazine release, reloading and more Maybe retractable rear stocks or foldable rear stocks Getting used to different kinds of sights Getting used to different kinds of recoil Troubleshooting - Extra:  Field stripping them al

Harder to pass by and or pass by unseen, due to the kind and amount of locks

2-3 locks. Or padlocks. Different kind of locks. Much different kind of locks or padlocks. Maybe a very strong and unique one. One with a completely different kind of key, and near completely closed of. They might have experience with one, but not with all of them. They might have the tools to open one, without leaving evidence, but not for all of them. - (sometimes it's not that hard to break through, but atleast then it's known someone was inside) -

Which parts of a car are most strong, ballistic resistant to take cover behind

Which parts of a car are most strong, ballistic resistant to take cover behind.  When shots are being fired and for firing shots back. Car forwards Car sideways Car diagonal And very sometimes it might be different which parts are most strong.

Some internet michiefs to internet problems to internet crimes

Some internet michiefs to internet problems to internet crimes. Mainly it depends on how it is done. Deep fake videos -With speech which is not from that person -And or a changed face. Deep fake audio -Voice replication - Fake photos. Where the face is changed. - Fake messaging files. Fake conversation files. -Which have been modified.  Opened with notebook. And changed. - Fake and illegal forms of doxing, or doxxing Publicly broadcasting false information about a person or organisation.  -The information and or screenshots might be changed with software. -And or files were put there by the person doing the doxing, beforehand Done for: Inflicting a bad name, harassment, (online) shaming,  mental harm, blackmailing, extortions, coercions.  Or trying to get an individual harmed, tortured or killed. Sometimes also for vigilante (fake police like) versions of justice. - Fake accounts, with identity theft.  -For destroying a persons reputation -Or to do illegal thing...