Consumertronics
Combined Online Catalog Framed: www.consumertronics.net/index2.htm Unframed: .../index1.html P.O. Box 23097, ABQ, NM 87192, USA FAX (call first (7-day, 24-hr)): (call to schedule) VOICE ( 9-5 MST): 505-321-1034 ![]() Or write down order on paper, add it up + S/H, Mail/Email (TXT/JPG/GIF format) to us. PAYMENT: Payment must be made by Postal Money Order (PMO) in U.S. dollars, made to: Consumertronics, or by U.S. Cash. Do not pay us by any other way. (Any unauthorized form of payment will be a nonrefundable donation to us) Before placing order, please inquire with us by email as to Item cost and availability. 2024 Catalog on 1G Flash Drive (only $39 (includes USA S/H)) |
wizguru Hardware Sales! 1000+ Items! ![]() ...tell your friends! policies.htm | |
USA
site - No cookies - No spyware - No adware - No trojans - No viruses -
No worms - No spam - No pop-ups We Respect Your Privacy - We do NOT Monitor nor Track Your Activities Online, nor Share Your Data |
Major
Discounts all for Products on this Website: 15%
OFF all Orders over $79, or 10%
OFF for all Orders over $49 effective immediately and until changed
here! Please order today! (No
other types of discounts apply except $2.00 OFF for all online/mail/fax orders).
Short of money? We can also accept trades (mostly electronic
parts, test equip., computers) =>
NOTE: Some of the technology products described herein are controversial so WE CANNOT GUARANTEE LATER AVAILABILITIES. Everything we sell is sold for legal educational and-or entertainment purposes only under the Policies of this Catalog (e.g. to help you protect yourself from crimes). Consumertronics assumes no responsibility for anything it publishes. If you are a minor, please consult with your parent or legal guardian for guidance.
Blacklisted 411 Magazine is back!
Recall a decade or so ago that, Blacklisted 411 Magazine, 2600
Magazine and Tap were the best freedom-loving hacker and phreaker magazines.
Now in a very similar format as before - what I personally find to be just as
exciting and informative as ever - Blacklisted 411 Magazine is back! They are
at: www.blacklisted411.net, and at P.O.
Box 2506, Cypress, CA 90630. (again, as policy, we never
recommend for or against another business or product, no matter how strongly
we feel about it).
A: The "acrylic box." The "all system security." The "analog voice." The "aqua box."
Answering Machine: The "answering machine abuse." The "answering machine abuses." The "answering machine accessory." The "answering machine accessories." The "answering machine boxes." The "answering machine boxing." The "answering machine bugs." The "answering machine bypasses." The "answering machine casing." The "answering machine charges." The "answering machine cheats." The "answering machine circuits." The "answering machine controllers." The "answering machine switchers." The "answering machine switches." The "answering machine descramblers." The "answering machine circuit designs." The "answering machine color boxes." The "answering machine companies." The "answering machine costs." The "answering machine countermeasures." The "answering machine crime." The "answering machine crimes." The "answering machine defeats." The "answering machine designs." The "answering machine device." The "answering machine devices." The "answering machine equipment." The "answering machine fraud." The "answering machine fraud countermeasures." The "answering machine frauds." The "answering machine hacks." The "answering machine hackers." The "answering machine harassment." The "answering machine hardware." The "answering machine invasion of privacy." The "answering machine operation." The "answering machine operators." The "answering machine pirates." The "answering machine phreaker." The "answering machine phreakers." The "answering machine phreaking." The "answering machine privacy." The "answering machine products." The "answering machine scam." The "answering machine scams." The "answering machine security." The "answering machine security system." The "answering machine service." The "answering machine services." The "answering machine social engineering." The "answering machine science project." The "answering machine science projects." The "answering machine scramblers." The "answering machine special projects." The "answering machine spoofs." The "answering machine spoofing." The "answering machine spying." The "answering machine system abuses." The "answering machine stalking." The "answering machine strategy." The "answering machine strategies." The "answering machine surveillance." The "answering machine survival." The "answering machine systems." The "answering machine system bypasses." The "answering machine system countermeasures." The "answering machine system crime." The "answering machine system crimes." The "answering machine system defeats." The "answering machine system privacy." The "answering machine system vulnerability." The "answering machine system vulnerabilities." The "answering machine tactic." The "answering machine tactics." The "answering machine taps." The "answering machine tapping." The "answering machine technique." The "answering machine techniques." The "answering machine technology." The "answering machine technologies." The "answering machine tempest methods." The "answering machine tutorials." The "answering machine vulnerability." The "answering machine vulnerabilities." The "automatic number identification."
B-E: The "beige box." The "black box." The "black boxes." The "black boxing." The "Blacklisted 411 Magazine." The "blast box." The "blotto box." The "blue box." The "blue boxes." The "blue boxing." The "bridging heads." The "brown box." The "bud box." The "bugged answering machine." The "bugged cellphone." The "bugged fax." The "bugged payphones." The "bugged phones." The "bugged telephones." The "bugging answering machines." The "bugging cellphones." The "bugging faxes." The "bugging payphones." The "bugging phones." The "bugging telephones." The "busy tone." The "call blocking." The "call forwarding." The "caller id." The "caller id defeats." The "caller id security." The "caller id vulnerabilities." The "caller identity." The "caller identity defeats." The "caller identity security." The "caller identity vulnerabilities." The "call waiting." The "Captain Crunch." The "cell towers." The "central office terminal." The "chartreuse box." The "cheese box." The "chrome box." The "clear box." The "CNG band stop filters." The "CNG beeps." The "CNG codes." The "CNG detection." The "CNG filters." The "CNG notch filters." The "CNG tone detection." The "color box." The "copper box." The "crime fighting." The "crimson box." The "dark box." The "dayglo box." The "dial tone." The "digital lines." The "digital phone lines." The "digital signal level." The "digital voice." The "diverter box." The "DLOC box." The "dual tone multi-frequency tones." The "dumpster diving." The "dumpster diving."
The "end fax spam." The "end fax spammers." The "end fax spamming." The "end junk faxes." The "end spam faxes." The "end unsolicited faxes." The "end unsolicited junk faxes." The "end unsolicited spam faxes." The "electronic serial number." The "extender box."
Cellphone: The "cellphone abuse." The "cellphone abuses." The "cellphone accessory." The "cellphone accessories." The "cellphone areas." The "cellphone bands." The "cellphone bill." The "cellphone bills." The "cellphone boxes." The "cellphone boxing." The "cellphone bugs." The "cellphone bypasses." The "cellphone casing." The "cellphone charges." The "cellphone cheats." The "cellphone circuits." The "cellphone circuit designs." The "cellphone color box." The "cellphone color boxes." The "cellphone company." The "cellphone companies." The "cellphone costs." The "cellphone countermeasures." The "cellphone coverage." The "cellphone crime." The "cellphone crimes." The "cellphone defeats." The "cellphone descramblers." The "cellphone designs." The "cellphone device." The "cellphone devices." The "cellphone equipment." The "cellphone frequencies." The "cellphone fraud." The "cellphone fraud countermeasures." The "cellphone frauds." The "cellphone hacks." The "cellphone hackers." The "cellphone harassment." The "cellphone hardware." The "cellphone invasion of privacy." The "cellphone long distance." The "cellphone operation." The "cellphone operators." The "cellphone pirates." The "cellphone phreaker." The "cellphone phreakers." The "cellphone phreaking." The "cellphone privacy." The "cellphone products." The "cellphone relays." The "cellphone receivers." The "cellphone scam." The "cellphone scams." The "cellphone scramblers." The "cellphone security." The "cellphone security system." The "cellphone service." The "cellphone services." The "cellphone sites." The "cellphone social engineering." The "cellphone science project." The "cellphone science projects." The "cellphone sites." The "cellphone special projects." The "cellphone spoofs." The "cellphone spoofing." The "cellphone spying." The "cellphone system abuses." The "cellphone stalking." The "cellphone strategy." The "cellphone strategies." The "cellphone surveillance." The "cellphone survival." The "cellphone systems." The "cellphone system bypasses." The "cellphone system countermeasures." The "cellphone system crime." The "cellphone system crimes." The "cellphone system defeats." The "cellphone system privacy." The "cellphone system vulnerability." The "cellphone system vulnerabilities." The "cellphone system security." The "cellphone tactic." The "cellphone tactics." The "cellphone taps." The "cellphone tapping." The "cellphone technique." The "cellphone techniques." The "cellphone technology." The "cellphone technologies." The "cellphone tempest methods." The "cellphone tones." The "cellphone towers." The "cellphone transmissions." The "cellphone tutorials." The "cellphone vulnerability." The "cellphone vulnerabilities."
Cellular: The "cellular abuse." The "cellular abuses." The "cellular accessory." The "cellular accessories." The "cellular areas." The "cellular bands." The "cellular bill." The "cellular bills." The "cellular boxes." The "cellular boxing." The "cellular bugs." The "cellular bypasses." The "cellular casing." The "cellular charges." The "cellular cheats." The "cellular circuits." The "cellular circuit designs." The "cellular color box." The "cellular color boxes." The "cellular company." The "cellular companies." The "cellular costs." The "cellular countermeasures." The "cellular coverage." The "cellular crime." The "cellular crimes." The "cellular defeats." The "cellular descramblers." The "cellular designs." The "cellular device." The "cellular devices." The "cellular equipment." The "cellular frequencies." The "cellular fraud." The "cellular fraud countermeasures." The "cellular frauds." The "cellular hacks." The "cellular hackers." The "cellular harassment." The "cellular hardware." The "cellular invasion of privacy." The "cellular long distance." The "cellular operation." The "cellular operators." The "cellular pirates." The "cellular phreaker." The "cellular phreakers." The "cellular phreaking." The "cellular privacy." The "cellular products." The "cellular relays." The "cellular receivers." The "cellular scam." The "cellular scams." The "cellular scramblers." The "cellular security." The "cellular security system." The "cellular service." The "cellular services." The "cellular sites." The "cellular social engineering." The "cellular science project." The "cellular science projects." The "cellular sites." The "cellular special projects." The "cellular spoofs." The "cellular spoofing." The "cellular spying." The "cellular system abuses." The "cellular stalking." The "cellular strategy." The "cellular strategies." The "cellular surveillance." The "cellular survival." The "cellular systems." The "cellular system bypasses." The "cellular system countermeasures." The "cellular system crime." The "cellular system crimes." The "cellular system defeats." The "cellular system privacy." The "cellular system vulnerability." The "cellular system vulnerabilities." The "cellular system security." The "cellular tactic." The "cellular tactics." The "cellular taps." The "cellular tapping." The "cellular technique." The "cellular techniques." The "cellular technology." The "cellular technologies." The "cellular tempest methods." The "cellular tones." The "cellular towers." The "cellular transmissions." The "cellular tutorials." The "cellular vulnerability." The "cellular vulnerabilities."
Cellular Phone: The "cellular phone abuse." The "cellular phone abuses." The "cellular phone accessory." The "cellular phone accessories." The "cellular phone areas." The "cellular phone bands." The "cellular phone bill." The "cellular phone bills." The "cellular phone boxes." The "cellular phone boxing." The "cellular phone bugs." The "cellular phone bypasses." The "cellular phone casing." The "cellular phone charges." The "cellular phone cheats." The "cellular phone circuits." The "cellular phone circuit designs." The "cellular phone color box." The "cellular phone color boxes." The "cellular phone company." The "cellular phone companies." The "cellular phone costs." The "cellular phone countermeasures." The "cellular phone coverage." The "cellular phone crime." The "cellular phone crimes." The "cellular phone defeats." The "cellular phone descramblers." The "cellular phone designs." The "cellular phone device." The "cellular phone devices." The "cellular phone equipment." The "cellular phone frequencies." The "cellular phone fraud." The "cellular phone fraud countermeasures." The "cellular phone frauds." The "cellular phone hacks." The "cellular phone hackers." The "cellular phone harassment." The "cellular phone hardware." The "cellular phone invasion of privacy." The "cellular phone long distance." The "cellular phone operation." The "cellular phone operators." The "cellular phone pirates." The "cellular phone phreaker." The "cellular phone phreakers." The "cellular phone phreaking." The "cellular phone privacy." The "cellular phone products." The "cellular phone relays." The "cellular phone receivers." The "cellular phone scam." The "cellular phone scams." The "cellular phone scramblers." The "cellular phone security." The "cellular phone security system." The "cellular phone service." The "cellular phone services." The "cellular phone sites." The "cellular phone social engineering." The "cellular phone science project." The "cellular phone science projects." The "cellular phone sites." The "cellular phone special projects." The "cellular phone spoofs." The "cellular phone spoofing." The "cellular phone spying." The "cellular phone system abuses." The "cellular phone stalking." The "cellular phone strategy." The "cellular phone strategies." The "cellular phone surveillance." The "cellular phone survival." The "cellular phone systems." The "cellular phone system bypasses." The "cellular phone system countermeasures." The "cellular phone system crime." The "cellular phone system crimes." The "cellular phone system defeats." The "cellular phone system privacy." The "cellular phone system vulnerability." The "cellular phone system vulnerabilities." The "cellular phone system security." The "cellular phone tactic." The "cellular phone tactics." The "cellular phone taps." The "cellular phone tapping." The "cellular phone technique." The "cellular phone techniques." The "cellular phone technology." The "cellular phone technologies." The "cellular phone tempest methods." The "cellular phone tones." The "cellular phone towers." The "cellular phone transmissions." The "cellular phone tutorials." The "cellular phone vulnerability." The "cellular phone vulnerabilities."
Cordless Phone: The "cordless phone abuse." The "cordless phone abuses." The "cordless phone accessory." The "cordless phone accessories." The "cordless phone bands." The "cordless phone bill." The "cordless phone bills." The "cordless phone boxes." The "cordless phone boxing." The "cordless phone bugs." The "cordless phone bypasses." The "cordless phone casing." The "cordless phone charges." The "cordless phone cheats." The "cordless phone circuits." The "cordless phone circuit designs." The "cordless phone color box." The "cordless phone color boxes." The "cordless phone companies." The "cordless phone costs." The "cordless phone countermeasures." The "cordless phone crime." The "cordless phone crimes." The "cordless phone defeats." The "cordless phone descramblers." The "cordless phone designs." The "cordless phone device." The "cordless phone devices." The "cordless phone equipment." The "cordless phone frequencies." The "cordless phone fraud." The "cordless phone fraud countermeasures." The "cordless phone frauds." The "cordless phone hacks." The "cordless phone hackers." The "cordless phone harassment." The "cordless phone hardware." The "cordless phone invasion of privacy." The "cordless phone operation." The "cordless phone operators." The "cordless phone pirates." The "cordless phone phreaker." The "cordless phone phreakers." The "cordless phone phreaking." The "cordless phone privacy." The "cordless phone products." The "cordless phone receivers." The "cordless phone scam." The "cordless phone scams." The "cordless phone scramblers." The "cordless phone security." The "cordless phone security system." The "cordless phone service." The "cordless phone services." The "cordless phone sites." The "cordless phone social engineering." The "cordless phone science project." The "cordless phone science projects." The "cordless phone special projects." The "cordless phone spoofs." The "cordless phone spoofing." The "cordless phone spying." The "cordless phone system abuses." The "cordless phone stalking." The "cordless phone strategy." The "cordless phone strategies." The "cordless phone surveillance." The "cordless phone survival." The "cordless phone systems." The "cordless phone system security." The "cordless phone tactic." The "cordless phone tactics." The "cordless phone taps." The "cordless phone tapping." The "cordless phone technique." The "cordless phone techniques." The "cordless phone technology." The "cordless phone technologies." The "cordless phone tempest methods." The "cordless phone tones." The "cordless phone tutorials." The "cordless phone vulnerability." The "cordless phone vulnerabilities."
Fax: The "fax abuse." The "fax abuses." The "fax accessory." The "fax accessories." The "fax attacks." The "fax boxes." The "fax boxing." The "fax bugs." The "fax bypasses." The "fax casing." The "fax charges." The "fax cheats." The "fax circuits." The "fax codes." The "fax CNG beeps." The "fax CNG codes." The "fax CNG detection." The "fax CNG tone detection." The "fax commo." The "fax communications." The "fax crime countermeasures." The "fax counterfeiting." The "fax denial of service."The "fax descramblers." The "fax circuit designs." The "fax color boxes." The "fax companies." The "fax compression." The "fax costs." The "fax counterfeiting." The "fax countermeasures." The "fax crime." The "fax crimes." The "fax decryption." The "fax defeats." The "fax designs." The "fax device." The "fax devices." The "fax encryption." The "fax equipment." The "fax fraud." The "fax fraud countermeasures." The "fax frauds." The "fax hacks." The "fax hackers." The "fax harassment." The "fax hardware." The "fax interceptions." The "fax interference." The "fax invasion of privacy." The "fax modems." The "fax on demand services." The "fax operation." The "fax operators." The "fax pirates." The "fax phreaker." The "fax phreakers." The "fax phreaking." The "fax port codes." The "fax port transfer codes." The "fax privacy." The "fax products." The "fax protocols." The "fax sabotage." The "fax scam." The "fax scams." The "fax scramblers." The "fax security." The "fax security system." The "fax servers." The "fax service." The "fax services." The "fax social engineering." The "fax science project." The "fax science projects." The "fax special projects." The "fax spoofs." The "fax spoofing." The "fax spying." The "fax stalking." The "fax strategy." The "fax strategies." The "fax surveillance." The "fax survival." The "fax systems." The "fax system bypasses." The "fax system countermeasures." The "fax system crime." The "fax system crimes." The "fax system defeats." The "fax system privacy." The "fax system vulnerability." The "fax system vulnerabilities." The "fax system security." The "fax tactic." The "fax tactics." The "fax taps." The "fax tapping." The "fax technique." The "fax techniques." The "fax technology." The "fax technologies." The "fax tempest methods." The "fax tones." The "fax transfer codes." The "fax transfers." The "fax tutorials." The "fax vulnerability." The "fax vulnerabilities."
Fax Machine: The "fax blasters." The "fax blasting." The "fax business." The "fax control methods." The "fax controllers." The "fax filter designs." The "fax filter methods." The "fax filter techniques." The "fax filtering methods." The "fax filtering techniques." The "fax machine abuse." The "fax machine abuses." The "fax machine accessory." The "fax machine accessories." The "fax machine boxes." The "fax machine boxing." The "fax machine bugs." The "fax machine bypasses." The "fax machine casing." The "fax machine charges." The "fax machine cheats." The "fax machine circuits." The "fax machine descramblers." The "fax machine circuit designs." The "fax machine color boxes." The "fax machine companies." The "fax machine costs." The "fax machine countermeasures." The "fax machine crime." The "fax machine crimes." The "fax machine defeats." The "fax machine designs." The "fax machine device." The "fax machine devices." The "fax machine equipment." The "fax machine fraud." The "fax machine fraud countermeasures." The "fax machine frauds." The "fax machine hacks." The "fax machine hackers." The "fax machine harassment." The "fax machine hardware." The "fax machine invasion of privacy." The "fax machine modifications." The "fax machine operation." The "fax machine operators." The "fax machine pirates." The "fax machine phreaker." The "fax machine phreakers." The "fax machine phreaking." The "fax machine privacy." The "fax machine products." The "fax machine scam." The "fax machine scams." The "fax machine security." The "fax machine security system." The "fax machine service." The "fax machine services." The "fax machine social engineering." The "fax machine science project." The "fax machine science projects." The "fax machine scramblers." The "fax machine special projects." The "fax machine spoofs." The "fax machine spoofing." The "fax machine spying." The "fax machine system abuses." The "fax machine stalking." The "fax machine strategy." The "fax machine strategies." The "fax machine surveillance." The "fax machine survival." The "fax machine systems." The "fax machine system bypasses." The "fax machine system countermeasures." The "fax machine system crime." The "fax machine system crimes." The "fax machine system defeats." The "fax machine system privacy." The "fax machine system vulnerability." The "fax machine system vulnerabilities." The "fax machine tactic." The "fax machine tactics." The "fax machine taps." The "fax machine tapping." The "fax machine technique." The "fax machine techniques." The "fax machine technology." The "fax machine technologies." The "fax machine tempest methods." The "fax machine tones." The "fax machine tutorials." The "fax machine vulnerability." The "fax machine vulnerabilities." The "fax machines." The "fax spammers." The "fax spamming." The "fax switchers." The "fax switches."
F-G: The "family radio service." The "fiber optic cable." The "fight crime." The "filter fax spam." The "filter fax spammers." The "filter fax spamming." The "filter junk faxes." The "filter spam faxes." The "filter unsolicited faxes." The "filter unsolicited junk faxes." The "filter unsolicited spam faxes." The "filter out fax spam." The "filter out fax spammers." The "filter out fax spamming." The "filter out junk faxes." The "filter out spam faxes." The "filter out unsolicited faxes." The "filter out unsolicited junk faxes." The "filter out unsolicited spam faxes." The "free long distance calls." The "free long distance phone calls." The "free long distance telephone calls." The "free payphone calls." The "free overseas calls." The "free phone calls." The "free telephone calls." The "full-duplex." The "general mobile radio service." The "gold box." The "green box."
H: The "half-duplex." The "high tech books." The "hi-tech books." The "high tech consultants." The "hi-tech consultants." The "high tech consulting." The "hi-tech consulting." The "high tech manuals." The "hi-tech manuals." The "high tech offers." The "hi-tech offers." The "high tech products." The "hi-tech products." The "high tech publications." The "hi-tech publications." The "high tech services." The "hi-tech services." The "high tech security books." The "hi-tech security books." The "high tech security consultants." The "hi-tech security consultants." The "high tech security consulting." The "hi-tech security consulting." The "high tech security manuals." The "hi-tech security manuals." The "high tech security offers." The "hi-tech security offers." The "high tech security products." The "hi-tech security products." The "high tech security publications." The "hi-tech security publications." The "high tech security services." The "hi-tech security services." The "high tech survival books." The "hi-tech survival books." The "high tech survival consultants." The "hi-tech survival consultants." The "high tech survival consulting." The "hi-tech survival consulting." The "high tech survival manuals." The "hi-tech survival manuals." The "high tech survival offers." The "hi-tech survival offers." The "high tech survival products." The "hi-tech survival products." The "high tech survival publications." The "hi-tech survival publications." The "high tech survival services." The "hi-tech survival services." The "how to build a blackbox." The "how to build a black box." The "how to build a bluebox." The "how to build a blue box." The "how to build a cheesebox." The "how to build a cheese box." The "how to build an orangebox." The "how to build an orange box." The "how to build a phone box." The "how to build a phone color box." The "how to build a redbox." The "how to build a red box." The "how to build a silverbox." The "how to build a silver box." The "how to build blackboxes." The "how to build black boxes." The "how to build blueboxes." The "how to build blue boxes." The "how to build cheeseboxes." The "how to build cheese boxes." The "how to build orangeboxes." The "how to build orange boxes." The "how to build phone boxes." The "how to build phone color boxes." The "how to build redboxes." The "how to build red boxes." The "how to build silverboxes." The "how to build silver boxes."
I-O: The "infinity box." The "internet phone scams." The "internet telephone calls." The "jack box." The "light box." The "line interface unit." The "lineman's handsets." The "lineman's test sets." The "line switch unit." The "long distance bill." The "long distance charges." The "long distance costs." The "lunch box." The "ma bell." The "magenta box." The "mauve box." The "missing calls." The "neon box." The "noise box." The "off-hook problems." The "olive box." The "orange box." The "orange boxes." The "orange boxing."
PAA-PAX: The "party box." The "pearl box." The "pink box." The "purple box."
Pager: The "pager abuse." The "pager abuses." The "pager accessory." The "pager accessories." The "pager beeper manual." The "pager boxes." The "pager boxing." The "pager bugs." The "pager bypasses." The "pager casing." The "pager charges." The "pager cheats." The "pager circuits." The "pager descramblers." The "pager circuit designs." The "pager color boxes." The "pager companies." The "pager costs." The "pager countermeasures." The "pager crime." The "pager crimes." The "pager defeats." The "pager designs." The "pager device." The "pager devices." The "pager equipment." The "pager fraud." The "pager fraud countermeasures." The "pager frauds." The "pager hacks." The "pager hackers." The "pager harassment." The "pager hardware." The "pager invasion of privacy." The "pager operation." The "pager operators." The "pager pirates." The "pager phreaker." The "pager phreakers." The "pager phreaking." The "pager privacy." The "pager products." The "pager scam." The "pager scams." The "pager security." The "pager security system." The "pager service." The "pager services." The "pager social engineering." The "pager science project." The "pager science projects." The "pager scramblers." The "pager special projects." The "pager spoofs." The "pager spoofing." The "pager spying." The "pager system abuses." The "pager stalking." The "pager strategy." The "pager strategies." The "pager surveillance." The "pager survival." The "pager systems." The "pager system bypasses." The "pager system countermeasures." The "pager system crime." The "pager system crimes." The "pager system defeats." The "pager system privacy." The "pager system vulnerability." The "pager system vulnerabilities." The "pager tactic." The "pager tactics." The "pager taps." The "pager tapping." The "pager technique." The "pager techniques." The "pager technology." The "pager technologies." The "pager tempest methods." The "pager tones." The "pager tutorials." The "pager vulnerability." The "pager vulnerabilities."
Payphone: The "payphone abuse." The "payphone abuses." The "payphone bill." The "payphone bills." The "payphone boxes." The "payphone boxing." The "payphone bugs." The "payphone bypasses." The "payphone casing." The "payphone charges." The "payphone cheats." The "payphone circuits." The "payphone circuit designs." The "payphone color box." The "payphone color boxes." The "payphone color boxing." The "payphone color box defeats." The "payphone company." The "payphone companies." The "payphone costs." The "payphone color box countermeasures." The "payphone countermeasures." The "payphone crime." The "payphone crimes." The "payphone defeats." The "phone descramblers." The "payphone designs." The "payphone device." The "payphone devices." The "payphone equipment." The "payphone fraud." The "payphone fraud countermeasures." The "payphone frauds." The "payphone hacks." The "payphone hackers." The "payphone harassment." The "payphone hardware." The "payphone invasion of privacy." The "payphone long distance." The "payphone operation." The "payphone operators." The "payphone pirates." The "payphone phreaker." The "payphone phreakers." The "payphone phreaking." The "payphone privacy." The "payphone scam." The "payphone scams." The "phone scramblers." The "payphone security." The "payphone security system." The "payphone service." The "payphone services." The "payphone social engineering." The "payphone special projects." The "payphone spoofs." The "payphone spoofing." The "payphone spying." The "payphone system abuses." The "payphone stalking." The "payphone strategy." The "payphone strategies." The "payphone surveillance." The "payphone survival." The "payphone systems." The "payphone system bypasses." The "payphone system countermeasures." The "payphone system crime." The "payphone system crimes." The "payphone system defeats." The "payphone system privacy." The "payphone system vulnerability." The "payphone system vulnerabilities." The "payphone system security." The "payphone system security bypasses." The "payphone system security countermeasures." The "payphone system security defeats." The "payphone system security vulnerabilities." The "payphone tactic." The "payphone tactics." The "payphone taps." The "payphone tapping." The "payphone technique." The "payphone techniques." The "payphone technology." The "payphone technologies." The "payphone tempest methods." The "payphone tones." The "payphone tutorials." The "payphone vulnerability." The "payphone vulnerabilities."
PBX: The "pbx abuse." The "pbx abuses." The "pbx boxes." The "pbx boxing." The "pbx bugs." The "pbx bypasses." The "pbx casing." The "pbx charges." The "pbx cheats." The "pbx circuits." The "pbx descramblers." The "pbx circuit designs." The "pbx color boxes." The "pbx companies." The "pbx costs." The "pbx countermeasures." The "pbx crime." The "pbx crimes." The "pbx defeats." The "pbx designs." The "pbx device." The "pbx devices." The "pbx equipment." The "pbx fraud." The "pbx fraud countermeasures." The "pbx frauds." The "pbx hacks." The "pbx hackers." The "pbx harassment." The "pbx hardware." The "pbx invasion of privacy." The "pbx operation." The "pbx operators." The "pbx pirates." The "pbx phreaker." The "pbx phreakers." The "pbx phreaking." The "pbx privacy." The "pbx products." The "pbx scam." The "pbx scams." The "pbx security." The "pbx security system." The "pbx service." The "pbx services." The "pbx social engineering." The "pbx science project." The "pbx science projects." The "pbx scramblers." The "pbx special projects." The "pbx spoofs." The "pbx spoofing." The "pbx spying." The "pbx system abuses." The "pbx stalking." The "pbx strategy." The "pbx strategies." The "pbx surveillance." The "pbx survival." The "pbx systems." The "pbx system bypasses." The "pbx system countermeasures." The "pbx system crime." The "pbx system crimes." The "pbx system defeats." The "pbx system privacy." The "pbx system vulnerability." The "pbx system vulnerabilities." The "pbx tactic." The "pbx tactics." The "pbx taps." The "pbx tapping." The "pbx technique." The "pbx techniques." The "pbx technology." The "pbx technologies." The "pbx tempest methods." The "pbx tones." The "pbx tutorials." The "pbx vulnerability." The "pbx vulnerabilities."
Phone: The "phone abuse." The "phone abuses." The "phone accessory." The "phone accessories." The "phone bill." The "phone billing." The "phone bills." The "phone boxes." The "phone boxing." The "phone controllers." The "phone line controllers." The "phone bug detectors." The "phone bugs." The "phone bypasses." The "phone call length limiters." The "phone cards." The "phone casing." The "phone charges." The "phone cheats." The "phone circuits." The "phone circuit designs." The "phone color box." The "phone color boxes." The "phone color boxing." The "phone color box defeats." The "phone company." The "phone companies." The "phone costs." The "phone color box countermeasures." The "phone countermeasures." The "phone crime." The "phone crimes." The "phone defeats." The "phone designs." The "phone device." The "phone devices." The "phone dtmf decoders." The "phone dtmf encoders." The "phone equipment." The "phone fraud." The "phone fraud countermeasures." The "phone frauds." The "phone hacks." The "phone hackers." The "phone harassment." The "phone hardware." The "phone invasion of privacy." The "phone line controllers." The "phone line privacy." The "phone line security." The "phone line simulators." The "phone lines." The "phone long distance."
The "phone operation." The "phone operators." The "phone pirates." The "phone phreaker." The "phone phreakers." The "phone phreaking." The "phone privacy." The "phone products." The "phone scam." The "phone scams." The "phone safety." The "phone security." The "phone security system." The "phone service." The "phone services." The "phone simulators." The "phone social engineering." The "phone science project." The "phone science projects." The "phone special projects." The "phone spoofs." The "phone spoofing." The "phone spying." The "phone system abuses." The "phone stalking." The "phone strategy." The "phone strategies." The "phone surveillance." The "phone line switchers." The "phone line switches." The "phone switchers." The "phone switches." The "phone survival." The "phone systems." The "phone system bypasses." The "phone system countermeasures." The "phone system crime." The "phone system crimes." The "phone system defeats." The "phone system privacy." The "phone system vulnerability." The "phone system vulnerabilities." The "phone system security." The "phone system security bypasses." The "phone system security countermeasures." The "phone system security defeats." The "phone system security vulnerabilities." The "phone tactic." The "phone tactics." The "phone tap detectors." The "phone taps." The "phone tapping." The "phone technique." The "phone techniques." The "phone technology." The "phone technologies." The "phone tempest methods." The "phone tones." The "phone tutorials." The "phone vulnerability." The "phone vulnerabilities."
PHR-PZ: The "phreaking countermeasures." The "phreaking phones." The "phreaking telephones." The "pulse amplitude modulated." The "pulse code modulated." The "pulse frequency modulated."
Q-T: The "rainbow box." The "razz box." The "red box." The "red boxes." The "red boxing." The "remote terminal." The "ring tone."
The "scarlet box." The "science project." The "science project." The "shoulder surfing." The "silent fax machines." The "silver box." The "silver boxes." The "silver boxing." The "social engineer." The "social engineering." The "special projects." The "static box." The "stop fax spam." The "stop fax spammers." The "stop fax spamming." The "stop junk faxes." The "stop spam faxes." The "stop unsolicited faxes." The "stop unsolicited junk faxes." The "stop unsolicited spam faxes." The "switch box." The "synchronous optical networks."
The "tan box." The "tapped answering machine." The "tapped cellphone." The "tapped fax." The "tapped payphones." The "tapped phones." The "tapped telephones." The "tapping answering machines." The "tapping cellphones." The "tapping faxes." The "tapping payphones." The "tapping phones." The "tapping telephones." The "theft of services." The "theft of fax services." The "theft of pager services." The "theft of payphone services." The "theft of pbx services." The "theft of phone services." The "theft of telephone services." The "theft of voice mail services." The "toll free calls." The "toll free numbers." The "toll fraud devices." The "toll frauds." The "tolled calls." The "tron box." The "TV cable box."
Telephone: The "telephone abuse." The "telephone abuses." The "telephone accessory." The "telephone accessories." The "telephone bill." The "telephone bills." The "telephone boxes." The "telephone boxing." The "telephone bugs." The "telephone bypasses." The "telephone casing." The "telephone charges." The "telephone cheats." The "telephone circuits." The "telephone circuit designs." The "telephone color box." The "telephone color boxes." The "telephone color boxing." The "telephone color box defeats." The "telephone company." The "telephone companies." The "telephone controllers." The "telephone line controllers." The "telephone costs." The "telephone color box countermeasures." The "telephone countermeasures." The "telephone crime." The "telephone crimes." The "telephone descramblers." The "telephone defeats." The "telephone designs." The "telephone device." The "telephone devices." The "telephone equipment." The "telephone fraud." The "telephone fraud countermeasures." The "telephone frauds." The "telephone hacks." The "telephone hackers." The "telephone harassment." The "telephone hardware." The "telephone invasion of privacy." The "telephone lines." The "telephone long distance." The "telephone operation." The "telephone operators." The "telephone pirates." The "telephone phreaker." The "telephone phreakers." The "telephone phreaking." The "telephone privacy." The "telephone products." The "telephone scam." The "telephone scams." The "telephone science project." The "telephone science projects." The "telephone security." The "telephone security system." The "telephone service." The "telephone services." The "telephone social engineering." The "telephone scramblers." The "telephone special projects." The "telephone spoofs." The "telephone spoofing." The "telephone spying." The "telephone stalking." The "telephone strategy." The "telephone strategies." The "telephone surveillance." The "telephone survival." The "telephone line switchers." The "telephone line switches." The "telephone switchers." The "telephone switches." The "telephone system." The "telephone system abuses." The "telephone system bypasses." The "telephone system countermeasures." The "telephone system crime." The "telephone system crimes." The "telephone system defeats." The "telephone system privacy." The "telephone system vulnerability." The "telephone system vulnerabilities." The "telephone system security." The "telephone system security bypasses." The "telephone system security countermeasures." The "telephone system security defeats." The "telephone system security vulnerabilities." The "telephone tactic." The "telephone tactics." The "telephone taps." The "telephone tapping." The "telephone technique." The "telephone techniques." The "telephone technology." The "telephone technologies." The "telephone tempest methods." The "telephone tones." The "telephone tutorials." The "telephone vulnerability." The "telephone vulnerabilities."
Voice Mail: The "voice mail abuse." The "voice mail abuses." The "voice mail boxes." The "voice mail boxing." The "voice mail bugs." The "voice mail bypasses." The "voice mail casing." The "voice mail charges." The "voice mail cheats." The "voice mail descramblers." The "voice mail circuit designs." The "voice mail color boxes." The "voice mail companies." The "voice mail costs." The "voice mail countermeasures." The "voice mail crime." The "voice mail crimes." The "voice mail defeats." The "voice mail designs." The "voice mail device." The "voice mail devices." The "voice mail equipment." The "voice mail fraud." The "voice mail fraud countermeasures." The "voice mail frauds." The "voice mail hacks." The "voice mail hackers." The "voice mail harassment." The "voice mail hardware." The "voice mail invasion of privacy." The "voice mail operation." The "voice mail operators." The "voice mail pirates." The "voice mail phreaker." The "voice mail phreakers." The "voice mail phreaking." The "voice mail privacy." The "voice mail products." The "voice mail scam." The "voice mail scams." The "voice mail security." The "voice mail security system." The "voice mail service." The "voice mail services." The "voice mail social engineering." The "voice mail science project." The "voice mail science projects." The "voice mail scramblers." The "voice mail special projects." The "voice mail spoofs." The "voice mail spoofing." The "voice mail spying." The "voice mail system abuses." The "voice mail stalking." The "voice mail strategy." The "voice mail strategies." The "voice mail surveillance." The "voice mail survival." The "voice mail systems." The "voice mail system bypasses." The "voice mail system countermeasures." The "voice mail system crime." The "voice mail system crimes." The "voice mail system defeats." The "voice mail system privacy." The "voice mail system vulnerability." The "voice mail system vulnerabilities." The "voice mail tactic." The "voice mail tactics." The "voice mail taps." The "voice mail tapping." The "voice mail technique." The "voice mail techniques." The "voice mail technology." The "voice mail technologies." The "voice mail tempest methods." The "voice mail tones." The "voice mail tutorials." The "voice mail vulnerability." The "voice mail vulnerabilities."
U-Z: The "unsolicited faxes." The "unsolicited junk faxes." The "unsolicited spam faxes." The "violet box." The "voice frequency signals." The "voice quality." The "white box." The "wireless phone." The "wireless phones." The "wireless technology." The "wireless technologies." The "wireless telephone." The "wireless telephones." The "yellow box."
HARDWARE & SPECIAL SERVICES (for
legal educational and/or entertainment purposes only)! Our exciting
books and manuals are described on our Online Catalog webpage: www.consumertronics.net/index2.htm.
Many of these include comprehensive circuit diagrams and functional descriptions.
We designed and built here almost all of these circuits (and many, many more),
and sold them as our Off-the-Shelf Hardware and Special Projects.
We no longer sell functional hardware that we make. We do sell nonfunctional
hardware of what we used to make - mostly electronic
(www.consumertronics.net/oshpast.html) strictly as
salvage: www.consumertronics.net/salvage.html (LIMITED
QUANTITIES REMAINING! - once sold there will be no more! - buy all you need
as soon as possible - before they are all forever gone!), and also strictly
as very realistically-looking models, mockups, replicas and novelties as SPECIAL
PROJECTS: www.consumertronics.net/spaf-spp.html.
NOTE: For salvage and SP hardware, while priced very low compared to the original
functional versions, we provide no guarantees, support, user manuals, schematics,
batteries or refunds (Special Projects also does consulting and research
services).
HARDWARE
SALES: We also sell functional hardware which others make as surplus
and salvage: For comprehensive list of 10,000s of item types we Sell, Buy and
Trade for (including in exchange for our popular books and manuals), see our
popular: ABQ-Techzonics
- 1,000,000 integrated circuits (ICs) + 1,000,000 other small electronic parts
+ plus electronic test equipment + many other high-tech electronic and non-electronic
Items.
LONE
STAR CONSULTING, INC. (7250 N. Mesa, Suite C, PMB 70, El Paso, TX 79912, 915-474-0334, www.lonestarconsultinginc.com) makes
customized device types much closer than any other company we know of to the
popular and exciting functional device types we used to make and sell as Special
Projects and Off-the-Shelf Hardware - plus many other device types - plus extensive
invention prototyping and invention consulting services - plus they
also sell Historical Diagrams for many controversial device types! Their device
types are described at ==> LONE
STAR CONSULTING, INC. NOTE: We are not LONE
STAR CONSULTING, INC. Neither one owns the other, is a subsidiary
of the other, or is responsible for the other. Should you wish to do business
with Lone Star Consulting, Inc., please contact them DIRECTLY as you would any
other business (as with all purchases one makes, you should check out all available
sources for items of interest). Furthermore, Lone Star Consulting, Inc. has
an excellent free tutorial on mind control
and electronic attacks (if you go to it, please return here):
FREE
MIND CONTROL /ELECTRONIC ATTACK TUTORIAL. As policy, we never recommend
or endorse for or against any other company, product or service - even if you
find a link for it on our webpages. (Our privacy and other policies
are at: www.consumertronics.net/policies.htm).
OTHER
SPECIAL SERVICES: NO AC ADAPTER EQUIPMENT
RESCUE: Lost or broken AC Power Adapter to your valuable equipment
too hard to replace? We have 100s of AC adapters, and may be able to help: www.consumertronics.net/no-adapter-rescue.htm.
INTERNET AUCTION SERVICES: We also
offer Net Auction/Sales Services (eBay, Amazon.com, Craigslist, ABQ-Techzonics,
etc.) for your stuff that you don't need so much any more but are just too busy
to sell yourself: www.consumertronics.net/netauctions.htm.
HOME/OFFICE TUTORING SERVICES: We
also offer home and office tutoring services (Albuquerque, NM only): www.consumertronics.net/tutorservices.pdf.
PROFESSIONAL PERSONAL PROPERTY APPRAISALS:
We also offer Professional Property Appraisal Services (non-Real Estate): www.consumertronics.net/ppa/.
COMPUTER SERVICING: Need to get your
computer or software repaired, installed, modified, upgraded, updated, tuned-up,
or lost data retrieved? Computer damaged by or inflicted with viruses, worms,
trojan horses, adware/spyware, popups, other malware, and/or spam? Let us computer
geeks confidentially service your computer hardware and software needs: www.consumertronics.net/compservice.htm.
LEGAL RESEARCH SERVICES: Need/interested
in being educated about civil or criminal legal topics important to you? Let
us provide you relatively very low cost legal research. John Williams is an
experienced lay litigant (District Court + Appeals Court), lecturer of "pro
se" law, and a prolific legal researcher, legal author and legal publisher
of legal books (we are not licensed attorneys and we don't offer legal advice,
legal opinion or legal claims; New Mexico residents only): www.consumertronics.net/legalresearch.htm.echzonics.
OTHER
SPECIAL SERVICES: INTERNET AUCTION SERVICES:
We also offer Net Auction Services (eBay, iOffer, Yahoo!, etc): www.consumertronics.net/netauctions/.
PROFESSIONAL PERSONAL PROPERTY APPRAISALS:
We also offer Professional Property Appraisal Services (non-Real Estate): www.consumertronics.net/ppa/.
COMPUTER SERVICING: Need to get your
computer or software repaired, installed, modified, upgraded, updated, tuned-up,
or lost data retrieved? Computer damaged by or inflicted with viruses, worms,
trojan horses, adware/spyware, popups and/or spam? Let us computer geeks confidentially
service your computer hardware and software needs: www.consumertronics.net/compservice.htm.
LEGAL RESEARCH SERVICES: Need/interested
in being educated about civil or criminal legal topics important to you? Let
me provide you relatively very low cost legal research. I am an experienced
lay pro se litigant (District Court + Appeals Court), lecturer of pro se law,
and a prolific researcher, writer and publisher of legal books (I am not an
attorney and I don't offer legal advice; New Mexico residents only): www.consumertronics.net/legalresearch.htm.
LONE
STAR CONSULTING, INC. (7250 N. Mesa, Suite C, PMB 70, El Paso, TX 79912, 915-474-0334) does much of the incredible and exciting
functional hardware we used to make - mostly electronic (plus many other similar
items we did not previously make - plus they also sell Historical Diagrams
for much of their Hardware types!), described at: www.lonestarconsultinginc.com/devices.htm
(not a hotlink). NOTE: We are not LONE
STAR CONSULTING, INC. Neither one owns the other, is a subsidiary
of the other, or is responsible for the other. Should you wish to do business
with them, please contact them DIRECTLY (as with all purchases
one makes, you should check out all available sources for the item of interest).
As policy, we never recommend or endorse for or against any other company, product
or service. (Our privacy and other policies are at:
www.consumertronics.net/policies.htm).
IMAGE SPONSORED BY: Consumertronics Lone Star Consulting, Inc. ABQ-Techzonics REPRINT POW-MIA IMAGE=> ON YOUR WEBSITE |
Copyright © 1998-2024, Consumertronics. All rights reserved.
NOTE: By policy, we
never recommend for or against, approve or disapprove, sponsor, endorse, support,
guarantee, or take any responsibility for any of the content of any non-Consumertronics
webpage, website, advertisement, publication or other statement EVEN IF WE HAVE
PROVIDED A HOTLINK TO IT. And by policy, we never recommend for or against,
approve or disapprove, sponsor, endorse, support, guarantee, or assume any liability
or any other responsibility for any non-Consumertronics company, product or
service EVEN IF WE HAVE PROVIDED A HOTLINK TO IT and EVEN IF WE HAVE DISCUSSED
IT OR INFORMED YOU ABOUT IT on a webpage, or by phone, email, mail or fax, or
by any other means of communications. For more information on our policies,
please refer to our policies.htm webpage.
Test Source Links only (no visitor use): Source-1,
Source-2, Source-3,
Source-4,
Source-5,
Source-6,
Source-7,
Source-10,
Source-11