Search results

  1. Tomcat

    When the hardware gets chilled: monitoring NFC modules of ATMs

    Hello! I work at developing technologies for automating the maintenance of various hardware, including ATMs. In many engineering and technical fields, there is a concept of "monitoring". In IT, there is "simple monitoring", which usually implies tracking the behavior of software and its impact...
  2. Tomcat

    Call Kuzya: How We Recorded an FAQ for Engineers

    Every month we receive 20-50 thousand calls with questions about ATM maintenance. Most often, engineers call: to find out the status of the application, get access, check software versions, etc. Or collectors - to understand if there are any malfunctions on the ATM they are dissecting. The...
  3. Tomcat

    Voice Assistant on the Internet. Where Information Technology Leads Us.

    The article presents information about a new information technology on the Internet — a voice assistant. The forms, types, features and characteristics of voice assistants presented by different companies are studied. The voice assistant is defined as a new information technology of the current...
  4. Tomcat

    Install ATMs in severe frost, heat, metro and on all-terrain vehicles

    ATM on an all-terrain vehicle for a shift camp in Yakutia We service ATMs all over the country. In practice, there have been detective stories with dust in the metro, frosts beyond the Arctic Circle, power surges on the railway, and so on. Somewhere it is dry, somewhere it is damp, somewhere...
  5. Tomcat

    Touch Pin Pad and How It Works

    Hello everyone! Just a couple of years ago, Android POS and other payment terminals with a touch screen instead of a traditional keyboard were a rarity. But everything is changing, and now the usual terminals in many stores have become history forever. I have been repeatedly asked how keys are...
  6. Tomcat

    Why does envy bother you?

    You give in to envy, anger and everything that prevents you from working productively. “That’s why he earns $10,000/month and I don’t? He does almost nothing! It’s so simple!” From the outside everything looks simple. Below I will give some examples of destructive and envious thinking. From the...
  7. Tomcat

    Booking - working with landlords. Scam.

    1. We muddy the stealer - it can be purchased on thematic forums or chats in Telegram. There we encrypt the file with the stealer; It is important that the seller constantly updates his product and stays in touch. Beaches can buy some kind of “DCRat” (costs a penny) or use some leaked option...
  8. Tomcat

    The skill of self-disclosure - SE!

    Correct view This look can completely change your communication with a person, regardless of what gender they are. You will immediately make it clear that you came here for a specific purpose and will not leave until you achieve your goal. The decision here is made only by you and no one else...
  9. Tomcat

    Social engineering in action

    In this article I will tell you how social engineering is used in action, as well as other subtleties. This will be visual information that is used by some sellers. The information provided in this article is presented for educational purposes only. It is very important to understand that one...
  10. Tomcat

    10 Basic Rules of Social Engineering

    Here are ten basic rules of social engineering. Read them and you will be able to communicate confidently, correctly and, most importantly, effectively with everyone. So: Rule 1: Don't pressure the victim Some of the people you deal with are not stupid vegetables. They don't just want you to...
  11. Tomcat

    Shopify Сarding Manual

    Shopify is truly the most advanced and toughest merchant in relation to fraud. Merchant loves real hardware, and he practically doesn’t care about socks5 and ssh-tunnels, the main hardware and the unique fingerprint of the system. Fine and competent tuning of the system is very important. In...
  12. Tomcat

    How to build your own personal botnet and how much it costs

    Botnets (from the English “robot” and “network”, that is, “robot networks”) are one of the main and most popular tools of modern cybercrime. Computer networks, which consist of tens, hundreds of thousands and even millions of host machines infected with bot programs, automatically perform...
  13. Tomcat

    How to bypass OTP using Burp Suite?

    So, fasten your seat belts and get ready for a rollercoaster ride through OTP, Burp Suite, and the intriguing world of cybersecurity. Let's make learning online safety as easy as chatting with friends - after all, we're in this digital adventure together! Concept of OTP authentication Our...
  14. Tomcat

    Как найти или проверить бины США на Non-VBV, Auto-VBV + проверка миников CC

    Мне кажется вопрос про бины Auto-VBV и Non-VBV США звучит чуть ли не каждый день. Поэтому сегодня мы поговорим о том, как самостоятельно найти бины США этих типов, а также как проверить бины уже купленной карты. Что такое БИН? Бин — это первые 6 цифр любой карты, благодаря которым мы можем...
  15. Tomcat

    Bitcoin mixers TOP-21 [2024]: rating of the best Bitcoin mixers

    Bitcoin mixer is a service designed to anonymize transactions, with which you can reduce the traceability of your operations on the Bitcoin network. It is an application or website that accepts the user’s coins and mixes them with others. It happens like this: coins are split into many small...
  16. Tomcat

    How to Searching or Checking US BINS for Non-VBV, Auto-VBV + Checking CC mini deposits

    It seems to me that the question about autovbv and non vbv USA bins sounds almost every day. Therefore, today we will talk about how to independently find US bins of these types, as well as how to check the bin of an already purchased card. What is a BIN? Bin is the first 6 digits of any card...
  17. Tomcat

    Karpman triangle. SE.

    - I feel sooooo bad, just terrible, I don't want to leave the house, I don't want to at all, I constantly have a headache, I can't really do anything... Everything around me is against me, when will this all end? - Or maybe you should... - No, that won't help. - Or maybe then...? - Yes, I've...
  18. Tomcat

    How hackers work through Google Dorks

    What is Google Dork? Google Dork, also known as Google Dorking or Google Hacking, is a valuable resource for security researchers. For the average person, Google is simply a search engine used to search for text, images, videos, and news. However, in the world of information technology, Google...
  19. Tomcat

    Carding for the future

    When starting their journey, many carders are glowing with enthusiasm and believe that the carding they are doing will bear fruit. However, the lack of results or meager income become an obstacle to success and completely discourage the desire to continue. Stop at this point, breathe out and...
  20. Tomcat

    Why are some successful carders and others not?

    Becoming happy from a large amount of money in your pocket is most likely impossible, but buying something with this money that will make you happy for a while is a completely feasible task. And almost every modern carder knows about this, but even if everyone knows about it, life develops...
Top