Roof And Tunnel Hacking
   HOME
*





Roof And Tunnel Hacking
Roof and tunnel hacking is the unauthorized exploration of roof and utility tunnel spaces. The term carries a strong collegiate connotation, stemming from its use at MIT and at the U.S. Naval Academy, where the practice has a long history. It is a form of urban exploration. Some participants use it as a means of carrying out collegiate pranks, by hanging banners from high places or, in one notable example from MIT, placing a life-size model police car on top of a university building. Others are interested in exploring inaccessible and seldom-seen places; that such exploration is unauthorized is often part of the thrill. Roofers, in particular, may be interested in the skyline views from the highest points on a campus. On August 1, 2016, Red Bull TV launched the documentary series ''URBEX – Enter At Your Own Risk'', that also chronicles roof and tunnel hacking. Vadding Vadding is a verb which has become synonymous with urban exploration. The word comes from MIT where, for a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Pipe (material)
A pipe is a tubular section or hollow cylinder, usually but not necessarily of circular cross-section, used mainly to convey substances which can flow — liquids and gases (fluids), slurries, powders and masses of small solids. It can also be used for structural applications; hollow pipe is far stiffer per unit weight than solid members. In common usage the words ''pipe'' and ''tube'' are usually interchangeable, but in industry and engineering, the terms are uniquely defined. Depending on the applicable standard to which it is manufactured, pipe is generally specified by a nominal diameter with a constant outside diameter (OD) and a schedule that defines the thickness. Tube is most often specified by the OD and wall thickness, but may be specified by any two of OD, inside diameter (ID), and wall thickness. Pipe is generally manufactured to one of several international and national industrial standards. While similar standards exist for specific industry applicati ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Microwave Radiation
Microwave is a form of electromagnetic radiation with wavelengths ranging from about one meter to one millimeter corresponding to frequencies between 300 MHz and 300 GHz respectively. Different sources define different frequency ranges as microwaves; the above broad definition includes both UHF and EHF ( millimeter wave) bands. A more common definition in radio-frequency engineering is the range between 1 and 100 GHz (wavelengths between 0.3 m and 3 mm). In all cases, microwaves include the entire SHF band (3 to 30 GHz, or 10 to 1 cm) at minimum. Frequencies in the microwave range are often referred to by their IEEE radar band designations: S, C, X, Ku, K, or Ka band, or by similar NATO or EU designations. The prefix ' in ''microwave'' is not meant to suggest a wavelength in the micrometer range. Rather, it indicates that microwaves are "small" (having shorter wavelengths), compared to the radio waves used prior to microwave tech ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Burglar Alarm
A security alarm is a system designed to detect intrusion, such as unauthorized entry, into a building or other areas such as a home or school. Security alarms used in residential, commercial, industrial, and military properties protect against burglary (theft) or property damage, as well as personal protection against intruders. Security alerts in neighborhoods show a connection with diminished robbery. Car alarms likewise help protect vehicles and their contents. Prisons also use security systems for the control of inmates. Some alarm systems serve a single purpose of burglary protection; combination systems provide fire and intrusion protection. Intrusion-alarm systems are combined with closed-circuit television surveillance (CCTV) systems to record intruders' activities and interface to access control systems for electrically locked doors. There are many types of security systems. Homeowners typically have small, self-contained noisemakers. These devices can also be complica ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Radio Broadcast
Radio broadcasting is transmission of audio (sound), sometimes with related metadata, by radio waves to radio receivers belonging to a public audience. In terrestrial radio broadcasting the radio waves are broadcast by a land-based radio station, while in satellite radio the radio waves are broadcast by a satellite in Earth orbit. To receive the content the listener must have a broadcast radio receiver (''radio''). Stations are often affiliated with a radio network which provides content in a common radio format, either in broadcast syndication or simulcast or both. Radio stations broadcast with several different types of modulation: AM radio stations transmit in AM ( amplitude modulation), FM radio stations transmit in FM (frequency modulation), which are older analog audio standards, while newer digital radio stations transmit in several digital audio standards: DAB (digital audio broadcasting), HD radio, DRM ( Digital Radio Mondiale). Television broadcasti ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Burglarious Instruments
Lock picking is the practice of unlocking a lock by manipulating the components of the lock device without the original key. Although lock-picking can be associated with criminal intent, it is an essential skill for the legitimate profession of locksmithing, and is also pursued by law-abiding citizens as a useful skill to learn, or simply as a hobby ( locksport). In some countries, such as Japan, lock-picking tools are illegal for most people to possess, but in many others, they are available and legal to own as long as there is no intent to use them for criminal purposes. History Locks by definition secure or fasten something with the intention that access is possible only with the matching key. Despite this, criminal lock picking likely started with the first locks. Famed locksmith Alfred Charles Hobbs said in the mid-1800s: Professional and recreational lock picking also has a long history. King Louis XVI of France (1754–1793) was a keen designer, picker, and ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Burglary
Burglary, also called breaking and entering and sometimes housebreaking, is the act of entering a building or other areas without permission, with the intention of committing a criminal offence. Usually that offence is theft, robbery or murder, but most jurisdictions include others within the ambit of burglary. To commit burglary is to ''burgle'', a term back-formed from the word ''burglar'', or to ''burglarize''. Etymology Sir Edward Coke (1552–1634) explains at the start of Chapter 14 in the third part of ''Institutes of the Lawes of England'' (pub. 1644), that the word ''Burglar'' ("''or the person that committeth burglary''"), is derived from the words ''burgh'' and ''laron'', meaning ''house-thieves''. A note indicates he relies on the ''Brooke's case'' for this definition. According to one textbook, the etymology originates from Anglo-Saxon or Old English, one of the Germanic languages. (Perhaps paraphrasing Sir Edward Coke:) "The word ''burglar'' comes from the two Ge ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Trespassing
Trespass is an area of tort law broadly divided into three groups: trespass to the person, trespass to chattels, and trespass to land. Trespass to the person historically involved six separate trespasses: threats, assault, battery, wounding, mayhem (or maiming), and false imprisonment. Through the evolution of the common law in various jurisdictions, and the codification of common law torts, most jurisdictions now broadly recognize three trespasses to the person: assault, which is "any act of such a nature as to excite an apprehension of battery";''Johnson v. Glick'', battery, "any intentional and unpermitted contact with the plaintiff's person or anything attached to it and practically identified with it"; and false imprisonment, the " or of freedom from restraint of movement".''Broughton v. New York'', 37 N.Y.2d 451, 456–7 Trespass to chattel does not require a showing of damages. Simply the "intermeddling with or use of … the personal property" of another gives caus ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

A History Of Hacks And Pranks At MIT
A, or a, is the first Letter (alphabet), letter and the first vowel of the Latin alphabet, Latin alphabet, used in the English alphabet, modern English alphabet, the alphabets of other western European languages and others worldwide. Its name in English is English alphabet#Letter names, ''a'' (pronounced ), plural English alphabet#Letter names, ''aes''. It is similar in shape to the Greek alphabet#History, Ancient Greek letter alpha, from which it derives. The Letter case, uppercase version consists of the two slanting sides of a triangle, crossed in the middle by a horizontal bar. The lowercase version can be written in two forms: the double-storey a and single-storey ɑ. The latter is commonly used in handwriting and fonts based on it, especially fonts intended to be read by children, and is also found in italic type. In English grammar, "English articles, a", and its variant "English articles#Indefinite article, an", are Article (grammar)#Indefinite article, indefinite arti ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  



MORE