phreak

(redirected from Phreaker)
Also found in: Dictionary, Encyclopedia.

phreak

n. a respelling of freak. You stupid freak! Why’d you do that?
References in periodicals archive ?
In an ironic twist that the company's ex phreaker CEO must surely appreciate on some level, iPhone hacker George Hotz has since been given a Nissan 350Z and three more iPhones as payment for the one he modified.
En esos anos, las companias telefonicas empezaban a reemplazar a las operadoras con sistemas mecanizados, manejados mediante sonidos, los cuales fueron descubiertos y replicados por los phreakers para realizar llamadas sin costo.
Having developed along with modern technology and drawing upon the methodology and discoveries generated by phreakers, a modern day "more serious twist on [that] old crime" has manifested itself in the practice of swatting.
The telephone cheats - known as phreakers - took over all 30 lines out of the offices.
Scott Klososky, the top-rated speaker at our first two ihousing conferences, did an in-depth study of the world of hackers, crackers, phreakers, and script kiddies.
Personal firewalls are almost required at this point, especially with people with high-speed connections to the Net," says Winn Schwartau, a computer security consultant and author of the book Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Destruction.
80] Silly pranks by hackers occasionally provided a bit of amusement, some telecom firms lost a bit of revenue from phreakers tricking their billing systems, and crackers would infrequently get past a few security firewalls in the Department of Defense, major university, or big-bank computer systems to create mischief.
Si es asi "Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorist and Wesapons of Mass Disruption", de Winn Schwartau, es para usted.
Kodak's provider will absorb costs incurred by phreakers if the problem is identified within a reasonable time (a month or two), but it's more likely to be Kodak's responsibility if it takes, say, six months.
However, preliminary inroads have already been made in a study of hackers and phreakers (Meyer 1989).