<![CDATA[HackerStickers RSS Feed]]> http://beta.hackerstickers.com/blog Thu, 26 Nov 2015 17:43:37 GMT Thu, 26 Nov 2015 17:43:37 GMT LemonStand <![CDATA[Travel Hacks: Bypassing the front desk checkin line for DEFCON]]> http://beta.hackerstickers.com/blog/posttravel-hacks-bypassing-the-front-desk-checkin-line-for-defcon http://beta.hackerstickers.com/blog/posttravel-hacks-bypassing-the-front-desk-checkin-line-for-defcon Thu, 21 May 2015 00:00:00 GMT Travel Hacks: Bypassing the front desk checkin line for DEFCON

First timers or returning DEFCON attendees will love this hack. Picture 20,000 people trying to check into their hotel rooms at the same time. Even though everyone isn’t checking in all at the same time you can bet if you don’t get in early or a day into the con you will be spending part of the time waiting in line, not to get into the convention but to check into your hotel room. You could be spending time hanging out with your friends, exploring the hotel or meeting new people.  (Disclaimer: Not free hack, but worth it to many!)

You may have seen the lines dedicated to the high rollers (people who gamble a lot) or the VIPs of the hotel/casino. The lines are non existent for them, that agent is there just waiting to help people of higher status. Without spending countless hours at the casino tables you will be hard pressed to gain access to that line even with extreme social engineering skills.

Let me introduce FoundersCard, an elite online entrepreneur network with offers and deals tailored to those who travel, do business, and those with a taste for good lifestyle. This hack isn’t to get you past the line for free but for those who value their time and can actually use the other offers in the network it’s just an added perk. To join you have to have a referral from someone already in the network. Normally around 500.00/yr fee they run promotions getting people in for around 300-400.

Here’s my link to join: https://founderscard.com/membership?code=FCNICHOLAS682

One of the member perks offered is Caesars Total Reward - Complimentary Diamond Total Rewards® Status. This is the benefit that will get you into the diamond lounge with a dedicated checkin team. Last year at the Rio the checkin line wrapped around for hours, just off to the left was a fancy door labeled diamond lounge, stepping through the doors transported you away from the crazy casino noises to a nice relaxing lounge. Within minutes we were checked into the room and on our way.  The ballys/paris where defcon is this year is also a Caesars casino so this benefit works there.

Other Diamond Total Rewards Perks:
-Access to Diamond Lounges.*
-Access to Priority lines at hotel check-in, restaurants, casino cages and the Total Rewards Center.
-Use of VIP Reservations Hotline.
-Diamond Aspirations eligibility.
-Receive 20% discounts at casino gift shops.**

You could always try the hundred dollar handshake with someone to bypass the line :)

Posted in: news

<![CDATA[2015 Information Security Conference Events Calendar]]> http://beta.hackerstickers.com/blog/post2015-information-security-conference-events-calendar http://beta.hackerstickers.com/blog/post2015-information-security-conference-events-calendar Fri, 28 Nov 2014 00:00:00 GMT As we head towards holidays and the last tech Conferences begin to wind down, it becomes once again time for our annual events list. As we discover more about the future of information security the amount of important  issues and topics seem to multiply tenfold. Be sure to attend at least one of the conferences in order to stay in the loop and keep up with latest happenings in the tech world. As information security becomes an ever increasingly more important issue, the more its sparking people curiousity, so be sure to register as early as you can for these events to ensure you secure you ticket and accomadations. If we've missed any events please contact us and let us know. Until next, Happy Holidays, and Happy New Year!


Jan 5-8

International Conference on Cybersecurity 

NewYork City, NY



January 7-9  2015

Real World Cryptography Workshop

London, UK



January 16 – 18, 2015


Washington, DC, 




January 19, 2015

BSides Columbus

Columbus, OH 




January 26 – 28, 2015

AppSec California

 Santa Monica, CA, 




 February 5 – 6, 2015 

Suits and Spooks Washington DC






February 9 – 11, 2015

ICISSP 2015 

Angers, Loire Valley, France 




February 15, 2015

Kaspersky SAS 

Cancun, Mexico   





February 16 – 19, 2015

13th USENIX Conference on File and Storage Technologies  

Santa Clara, CA,





Feb 10-12, 2015, 

Social Media Strategies Summit: Las Vegas 2015

Las Vegas, NV





March 18-20, 2015, 


Vancouver, British Columbia 




March 12-13, 2015

Bsides  Austin,






March  23-25, 2015, 

Infosec World

Orlando, FL





March 27-28, 2015, 

Women in CyberSec,

 Atlanta, GA




April 20, 2015,

RSA Conference

San Francisco





April 7 – 9, 2015

Cyber and Information Security Research Conference 2015

Oak Ridge National Laboratory, Oak Ridge, TN




April 11, 2015

BSides Nashville

Nashville, TN, USA





April 12, 2015

Cyber Secure Pakistan

Islamabad, Pakistan





April 11 – 12, 2015

BSides Orlando, Florida

Orlando, Florida, United States





April 14 – 16, 2015

IAPP Europe Data Protection Intensive 2015

London, UK





 April 28 – 29, 2015

Conference Title: Defensive Cyberspace Operations & Intelligence (DCOI)

Washington D.C., USA 




May 4 – 6, 2015 

Conference Title: 12th USENIX Symposium on Networked Systems Design and Implementation

Oakland, CA, USA




May 14 – 15, 2015


Chicago, United States





May 16, 2015

BSides Chicago 

Chicaog, IL, USA





May 18 – 20, 2015

36th IEEE Symposium on Security and Privacy

San Jose, CA, United States





May 29 – 30, 2015

BSides Puerto Rico

Puerto Rico





June 23-26, 2015,

Boston, MA,





June 2 – 4, 2015

InfoSec Europe

Olympia, London, UK





June 3, 2015

BSides London

London, UK




June 8 – 11, 2015

National Homeland Security Conference

Philadelphia, USA




June 8 – 11, 2015

Security & Risk Management Summit

National Harbor, MD, USA




June 12 – 24, 2015


 New Orleans, LA, USA




June 23 – 26, 2015


Long Beach, CA, USA




July 2 – 3, 2015

14th European Conference on Cyber Warfare and Security ECCWS

Hatfield, United Kingdom




July 16-17, 2015

Converge Detroit 

Detroit, MI, USA




August 1 – 6, 2015

Black Hat | USA

Las Vegas, USA




 August 6 – 9, 2015


Las Vegas, NV, USA




August 12 – 14, 2015

24th USENIX Security Symposium

Washington, DC, USA




 August 30 – September 2, 2015

HTCIA Conference

Orlando, FL, USA




September 22 – 25, 2015

AppSec USA (OWASP National Conference)

San Francisco, CA, USA




September 22 – 23, 2015

Concise Courses

Miami, FL, USA




October 9-10, 2015


Grand Rapids, MI, USA




October 13 – 16, 2015

CyberSec Connection 2015

Phoenix TS, Columbia, MD, USA



Posted in: news

<![CDATA[2014 Holiday Shipping Schedules & Dates]]> http://beta.hackerstickers.com/blog/postholiday-shipping-schedule http://beta.hackerstickers.com/blog/postholiday-shipping-schedule Fri, 21 Nov 2014 00:00:00 GMT Getting your warez in time for the Holidays is important!

We love that you want HackerStickers.com to be a part of your gifts this season and we want to make sure you get everything in time! We’ve setup a shipping calendar to let you know about the dates to keep in mind in order to get your shipments in time!

When you checkout you will have these options, just because a rate is lower doesn’t mean its the best option if you are working against a deadline. Get to know our methods:

Express Mail - Fastest
Priority Mail - Faster
First Class - Regular
Parcel Post - Tug Boat Slow

  • Sunday
  • Monday
  • Tuesday
  • Wednesday
  • Thursday
  • Friday
  • Saturday
  • 30Sunday
  • 1Monday
  • 2Tuesday

    Last day to send Priority Mail International for Christmas

  • 3Wednesday
  • 4Thursday
  • 5Friday
  • 6Saturday
  • 7Sunday
  • 8
  • 9
  • 10

    Last day to send Express International for Christmas

  • 11
  • 12
  • 13
  • 14
  • 15

    Last day to send Parcel Post for Christmas

  • 16

    Last day to send to Military for Christmas

  • 17

    Last day to send international mail for Christmas

  • 18
  • 19
  • 20

    Last day to send First Class & Priority Mail for Christmas

  • 21
  • 22
  • 23

    Last day to send Priority Express Mail for Christmas

  • 24
  • 25


  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 1
  • 2
  • 3

Posted in: news

<![CDATA[PhreakNIC 18 Hacker & Phreaker Convention in Nashville, TN]]> http://beta.hackerstickers.com/blog/postphreaknic-18-hacker-and-phreaker-convention-in-nashville-tn http://beta.hackerstickers.com/blog/postphreaknic-18-hacker-and-phreaker-convention-in-nashville-tn Mon, 20 Oct 2014 00:00:00 GMT PhreakNIC - Nashville, TN - Calling all Hackers & Phreaks - Oct 30-Nov 2, 2014

Centrally located in Nashville, TN, the gathering of hackers and freaks at what is known as PhreakNIC is celebrating its 18th year. This years celebration is held Oct 30th-Nov 2nd at Millennium Maxwell House (2025 Rosa L. Parks Blvd. Nashville, TN, 37228-1505). PhreakNIC has a great lineup of speakers and workshops including programming, security, makerspaces, crypto challenges, lego contests, gaming, linux installs, halloween celebrations and music.

Registration is open for 30.00 a person, if you haven’t been to Nashville, TN yet there is a plethora of great food and music to accompany your hacker con!


Posted in: news

<![CDATA[Pack your bags, we’re going to DerbyCon 2014!]]> http://beta.hackerstickers.com/blog/postpack-your-bags-were-going-to-derbycon-2014 http://beta.hackerstickers.com/blog/postpack-your-bags-were-going-to-derbycon-2014 Wed, 10 Sep 2014 00:00:00 GMT Nothing like a quick trip to Kentucky to talk hacking and security than doing so in the bourbon state. I’ve been to Kentucky before, but never for DerbyCon! The stars never aligned properly but this year we’re making it happen. We’re packing our bags and bringing a unique selection of gear that we will be showcasing at our table at DerbyCon. So if you plan on going make sure you stop by and say hi, sport your t-shirts and gear and take a photo with us :)

DerbyCon 4.0 will be held in Louisville, KY September 24th-28th 2014. This hacking event has training events the first few days then rocks it with the main show. Last year they say DerbyCon had over 2000 people so we're excited to see what 2014 brings!


Posted in: news

<![CDATA[DEFCON 22 Recap & Aftermath]]> http://beta.hackerstickers.com/blog/postdefcon-22-recap-and-aftermath http://beta.hackerstickers.com/blog/postdefcon-22-recap-and-aftermath Wed, 13 Aug 2014 00:00:00 GMT Greetings from HackerStickers and welcome to all the new visitors to the site. We invite you to bookmark the site and join our mailing list to get notified of new hardware and shirts we add to our site as well as promotions and coupon codes!

It was awesome meeting all the new people this year and seeing friendly faces we’ve met over the years!  Many of the shirts we brought sold out, luckily we found some of the shirts that were in boxes we had lost until we tore down the booth, these shirts were added online and are available to you!

We had quite a few people ask if we accepted bitcoin at the conference. I want to tell you a little story about bitcoin and our steps to accepting it on our site. We had hired a developer to do a plugin for our shopping cart software for Mt. Gox, we had gotten it all setup and ready to fire up the payment method until the following day Mt.Gox crumbled. Besides our development and time we didn’t lose anything as many of you did when the site went offline. We’re indeed looking to accept bitCoin again but need to select someone who isn’t going anywhere anytime soon!

We had two DEF CON 22 designed shirts this year. One titled Cirque du Hack created by a local artist which depicted the key figure front and center with the circus of hackers surrounding him with the large building in the background along with the big tops. The second shirt was titled DELTA (Typography) which featured the DEFCON name spelled out with NATO phonetic alphabet with GPS coordinates and dates under it and the 22 large to the right. Both of these shirts were a hit along with the Uncle Sam - You are all being watched and the Brain Circuitry design t-shirt.

LockPicking101.com was front and center at HackerStickers.com with Squelchtone (LP101 Admin) and Mr. Picks (LP101 Founder) standing by the lock pick board teaching people how to pick locks and improve their technique. Lock picking is a natural fit in the hacker community because of the physical security aspect and wanting/needing to learn how the mechanics work and trying to hack (pick) the locks to open. A new Lock Picking 101 shirt was also released with a vintage style design titled ‘Locks Picked Here’. ..

Posted in: news

<![CDATA[Hacker Convention in New Orleans - NoLaCon]]> http://beta.hackerstickers.com/blog/posthacker-convention-in-new-orleans-nolacon http://beta.hackerstickers.com/blog/posthacker-convention-in-new-orleans-nolacon Fri, 25 Jul 2014 00:00:00 GMT Hacker conferences are annual occurrence all over the world, but very few give you the opportunity to experience charisma of the New Orleans. My first encounter with Big Easy came by way of a marketing trip many years ago, and ever since then, I've kept returning almost every year. It may have something to do with the great food, or maybe it’s the to-go drink cups you get when you want to leave a bar and wander around the town. Maybe it’s the alluring aura of the town and liveliness of the residents that keeps me coming back. In a way, New Orleans is very similar to Las Vegas, except it's more compact. You don’t have to take taxis everywhere, or walk those city miles (casino blocks) to get from one place to another. Everything is local the night life, the architecture, the history, it's all there.



So now that we know the city is well worth visiting, let’s talk about NoLaCon (June 19-22 2014). In their first year, Nolacon, a conference geared towards hackers and security experts alike, was ran flawlessly. Housed in the gorgeous Sheraton Hotel on Canal Street, located practically in the center of the French Quarter. The speaker lineup was superb, and the intimate environment allowed for extended time periods to answer question and pick the brains of the fellow hackers. If you missed the conference, take a look at the speaker lineup on NolaCon.com to see what happened, including the different training events and villages that were set up for the event weekend.

Would we go back? In a heartbeat! Not only does HackerStickers love supporting the community and being involved, but we really did enjoy this conference and look forward to next year's event!

Posted in: news

<![CDATA[Hacker Magazines]]> http://beta.hackerstickers.com/blog/posthacker-magazines http://beta.hackerstickers.com/blog/posthacker-magazines Mon, 07 Apr 2014 00:00:00 GMT Hacker magazines can’t be tough to find, so HackerStickers has done all the work for you and compiled a list of the most popular and informative hacker themed magazines, ezines, and news sites.

Hacker News Monthly

The Hacker News (THN) is a downloadable monthly magazine that focuses on primarily on cyber security.

Make Magazine

Make Magazine is a bi-monthly print magazine appealing primarily to the DIY and crafts audience. However, they often regularly include electronic hacks and cool tech projects.

2600: The Hacker Quarterly

2600 is a quarterly print magazine is a much more political magazine then most of the other magazines on list. They regularly discuss issues of privacy, the media, and free speech, while still relating and speaking directly to their hacker audience.

SC Magazine

SC Magazine is e-zine/news site geared towards IT security professional. It keeps all interested up to date on the latest security breaches, IT software, and related news.

PenTest Magazine

PenTest Magazine is a weekly downloadable IT security magazine. Much like SC Magazine, PenTest audience is mostly IT professionals, but PenTest content centers around penetration testing. Every issue features IT experts sharing their knowledge about penetration testing, in addition to IT security news.


Hakin9 is weekly downloadable magazine covering everything hacker related from IT security to breaking into computer systems. They have tons of tutorials for the beginning hacker or for the hacker looking to learn new techniques.

The Ethical Hacker Network

The Ethical Hacker Network is a free online magazine for IT particularly for those seeking to advance in the field of IT. This site features access to certification programs and educational events.

Hacker Journal

Hacker Journal is a free ezine/news site featuring IT security related content.

Hacker Monthly

Hacker Monthly is a monthly print magazine featuring many well written and entertaining articles on a broad array of topic. The primary audience are programmers, and start-up founders.



Posted in: news

<![CDATA[2014 HackerStickers Tech/Security Convention and Conferences Calendar]]> http://beta.hackerstickers.com/blog/post2014-techsecurity-convention-and-conferences-calendar http://beta.hackerstickers.com/blog/post2014-techsecurity-convention-and-conferences-calendar Mon, 03 Mar 2014 00:00:00 GMT Last year, for the first time, we posted a calendar of Tech/Security conventions and events for  the year, we recieved so much great feedback on the post that we've decided to make it an annual tradition. The first thing you'll notice about this year's list is it features a bit more events then last year and I pretty sure we can partially have Edward Snowden and Glen Greenwald to thank for that. Without further ado, here is the 2014 edition of HackerStickers Convention and Conferences Calendar. If you know of a convention or event that we have missed and  you would  like included in this list, please email us the information at sales@hackerstickers.com with the subject of 'Convention List' and include details in the format we have below!



February 24 – 28, 2014

RSA Conference USA 2014

Where: Moscone Center, San Francisco, United States


February 27, 2014

Trustworthy Technology Conference

AMC Metreon Theatre, San Francisco, California, United States





March 12 – 14, 2014

CanSecWest 2014

Sheraton Wall Centre Hotel, Vancouver, British Columbia, Canada



March 20 – 21, 2014

Security B-Sides Austin

 WinGate Williamson Conference Center Round Rock, Austin, Texas, United States


March 24 – 25, 2014

9th International Conference on Cyber Warfare and Security ICCWS-2014

Purdue University, West Lafayette, Indiana, United States


March 31 – April 2, 2014

Ignite 2014

Where: The Cosmopolitan, Las Vegas, United States




April 3, 2014

NSA Hawaii

Wahiawa, Hawaii, United States



Date: April 5 – 6, 2014

BSides Orlando

Orlando, Florida, United States



Date: April 5 – 6, 2014

BSides Puerto Rico

Puerto Rico


April 7 – 9, 2014

InfoSec World

Disney Contemporary Resort, Orlando, Florida, United States



April 4-6

A&G 7

Northern Kentucky Convention Center, Covington, Kentucky, United States



April 8 – 10, 2014


Marriott Tremont, Boston, Massachusets, United States



April 10 – 13, 2014

Notacon 2014

Cleveland, Ohio, United States



April 11 – 12, 2014

1st National Women in Cybersecurity Conference

Nashville, Tennesee, United States



April 17, 2014

Suits and Spooks

San Francisco, California, United States


April 4 – 6, 2014 

InfoSec Southwest 2014

Austin, Texas, United States



April 25, 2014


Chicago, Illinois, United States



April 27 – May 2, 2014

The United States Cyber Crime Conference

National Conference Center, DC Metro Area, United States



April 27 – 30, 2014

30th Annual Conference of the International Association of Professional Security Consultants (IAPSC)

Where: Omni Hotel, New Orleans, Louisiana, USA



April 28 – 30, 2014

2014 National Cyber Crime Conference

Where: Four Points Sheraton, Norwood, Massachusets, United States



May 9 – 10, 2014

BSides Boston

Where: Boston, Massachusetts, United States



May 14, 2014

35th IEEE Symposium on Security and Privacy

San Jose, California, United States



May 15 – 16, 2014

Infiltrate 2014

Miami, Florida, United States



May 16 – 18, 2014

CarolinaCon 10

North Carolina, United States



May 17, 2014

BSides Nashville

Nashville, Tennesee, United States



May 19, 2014

Conference Title: National Homeland Security Conference

Philadelphia, Pennysylvania, United States


June 25 - 28, 2014

Shakacon Security Conference 2014

Honolulu, Hawaii, United States



June 1 – 4, 2014

Sixteenth Annual International Techno Security Conference

Myrtle Beach Marriott Resort, South Carolina, United States


June 10-12, 2014    

E3Electronic Entertainment Expo (E3)

Los Angeles Convention Center, California, United States



June 13 – 15, 2014


Hyatt Regency Indianapolis, Indiana, United States



June 17 – 18, 2014

SC Congress Toronto

Metro Convention Center, Toronto, Ontario, Canada



June 19-22, 2014


Sheraton New Orleans Hotel, New Orleans, United States



June 23 – 26, 2014

Security & Risk Management Summit

Where: National Harbor, MD (Washington, D.C. area), USA



June 23 – 29, 2014

REcon 2014

Hyatt Regency Montreal, Montreal, Quebec, Canada



July 12 – 24, 2014

PST2014 International Conference on Privacy, Security and Trust (PST)

Where: Toronto, Ontario, Canada



July 18 – 20, 2014

Hope X

Hotel Pennsylvania, New York City, United States



August 2 – 7, 2014

Black Hat | USA

Las Vegas, Nevada, United States



August 5 – 6, 2014

BSides Las Vegas

Las Vegas, Nevada, United States



August 7 – 10, 2014


Rio Hotel and Casino, Las Vegas, Nevada, United States



August 17 – 21, 2014

CRYPTO 2014 (34rd International Cryptology Conference)

University of California, Santa Barbara (UCSB), California, United States



August 20 – 22, 2014

23rd USENIX Security Symposium

San Diego, California, United States



September 9-12


Sands Expo and Convention Center, Las Vegas, United States


September 24 – 26, 2014

VB2014 – 24th Virus Bulletin International Conference

Seattle, WA, USA



October 16 -20 2014

Toorcon 2014

San Diego, CA, United States



October 4, 2014

2014 Workshop on Supporting Diversity in Systems Research

Broomfield, CO, United States



October 6, 2014

11th USENIX Symposium on Operating Systems Design and Implementation

Broomfield, CO, United States



October 17, 2014

Hacker Halted

Atlanta, Georgia, USA



October 20 – 22, 2014

SecTor (Security Training and Conference)

Toronto, Ontario, Canada



October 21 – 24, 2014


Austin, Texas, United States



October 29 – 30, 2014

CyberMaryland Conference

Baltimore Convention Center, Maryland, United States



November 9 – 14, 2014

28th Large Installation System Administration Conference

Seattle, Washington, United States



November 19 – 21, 2014

ISACA North America ISRM Conference

Las Vegas, Nevada, USA


Posted in: news

<![CDATA[2014 - Full Steam Ahead!]]> http://beta.hackerstickers.com/blog/post2014-hackers http://beta.hackerstickers.com/blog/post2014-hackers Mon, 30 Dec 2013 00:00:00 GMT 2014 - Full Steam Ahead!

This past year has been full of excitement at Hacker Stickers! We’ve released a great set of new designs and have been rolling out the DEF CON 21 swag to our site. In the upcoming weeks you will notice a plethora of the DEFCON 21 shirt designs hit the site, make sure you bookmark the page and check back often as the sizes and quantities are limited! We will also be introducing the new line up for 2014 designs and products.

We will be setting up popup shops throughout the tech conferences this year, in the past you have seen us at DEF CON, Toorcon, and LayerOne! We will be making announcements as we get closer but are planning to have a shop at HOPE in NYC in July 2014 as well as a few others!

From the whole team at HackerStickers.com, we want to thank you and wish you a joyous and hackerish new year!

Keep safe and encrypted this year!


Posted in: news

<![CDATA[2013 Holiday Shipping Schedules & Dates]]> http://beta.hackerstickers.com/blog/post2013-holiday-shipping-schedules-and-dates http://beta.hackerstickers.com/blog/post2013-holiday-shipping-schedules-and-dates Tue, 10 Dec 2013 00:00:00 GMT Getting your warez for the Holidays!

HackerStickers loves that you love gifting our goods for the holidays and we want to make sure you get the goods in time for your Christmas and the holidays surrounding!

Know your shipping methods & shipping times!

Express Mail - Fastest
Priority Mail - Faster
First Class - Regular
Parcel Post - Tug Boat Slow

  • Sunday
  • Monday
  • Tuesday
  • Wednesday
  • Thursday
  • Friday
  • Saturday
  • 1Sunday
  • 2Monday
  • 3Tuesday

    Last day to send Priority Mail International for Christmas

  • 4Wednesday
  • 5Thursday
  • 6Friday
  • 7Saturday
  • 8Sunday
  • 9
  • 10
  • 11

    Last day to send Express International for Christmas

  • 12
  • 13

    Last day to send Parcel Post for Christmas

  • 14
  • 15
  • 16
  • 17

    Last day to send to Military for Christmas

  • 18

    Last day to send international mail for Christmas

  • 19

    Last day to send First Class Mail for Christmas

  • 20

    Last day to send Priority Mail for Christmas

  • 21
  • 22
  • 23

    Last day to send Express Mail for Christmas

  • 24
  • 25


  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 1
  • 2
  • 3
  • 4

We offer all different shipping options on HackerStickers.com but its important to take into account how soon you need your shipment. With the holiday rush things start to get bogged down at the post office so that shipping method you normally use may take a little longer.

First off, lets talk about parcel post -- It's slow and there isn't any sort of tracking on it. Depending on where you are from our shipping location will depend on how quickly the package moves, and even with that… is it worth the dollar or two you are saving on shipping?

First Class is the most common way to ship items when it weighs under a certain amount but during the season it slows down a bit, and the closer you get to Christmas the slower and more risky it gets to get to the destination in time. Order now to ensure quick shipment and avoid the rush!

Priority Mail - This is our favorite, its a decent price and it gets the package to you pretty darn quick - usually within 1-3 days. But keep in mind you still want to order sooner than later as it gets closer to Christmas you want to ensure the geeks in your life get your gifts in time!

Express Mail - Drop everything the post office is doing and deliver that package to you! It's way more expensive but a good method to get items to you in a rush! Sometimes you just need the items fast and thats the end of it -- this is the method you want!


Posted in: news

<![CDATA[12 Christmas Gift Ideas for the Tech Lover]]> http://beta.hackerstickers.com/blog/post12-days-of-christmas http://beta.hackerstickers.com/blog/post12-days-of-christmas Mon, 09 Dec 2013 00:00:00 GMT With so many tech innovations it can be tough to pick out that perfect gift for the tech lovers on your gift list. HackerStickers has made it a little easier but highlighting some of the must­have gifts this holiday season. We’ve scoured the internet for the most popular and innovative tech products, assuring no matter what gift idea you choose you’re going to be praised for gift­giving prowess.

12 days of christmas at HackerStickers
Click to view full image

AR Drone Parrot Quadcopter: Now you can scare the crap out your neighbors with your own personal remote controlled drone. Laser guided Hellfire missiles not included. 

3D Systems Sense: The possibilities are endless with this 3D scanner, through cubify.com or with your personal 3D printer you can 3D print a replication of anything or anybody. 

Apple Mac Pro: Faster, quieter, smaller, and more powerful than anything on the market.

Key Llama Usb Keystroke Recorder: Back up" those keystrokes, this bad boy intercepts and logs all keystrokes

Hacker Mug: The perfect gift for your favorite hacker. 

Hard Drive Clock: Spruce up the office with this stunning clock made from a recycled hard drive.

Microsoft Xbox One: The next­gen juggernaut is a revolutionary gaming console that’s also double as a home entertainment system.

Oculus Rift: The latest and most innovative game console you’ve probably never heard about. The Rift revolutionizes and reinvigorates the virtual reality video game genre pushing the limits of player interaction. 

Sony Playstation Four: The fourth edition of the Playstation delivers unbelievably real graphics and features a new and improved Dual­Shock controller newly equipped with a touch screen that affords even more succinct gameplay options. 

Uncuff Links: The perfect gift for that cousin who can’t stay out jail. 

Fitbit Force: The latest fitness band from Fitbit tracks your daily activity, calories burned, and sleep activity. The Force helps you set fitness goals and achieve them.

Sensoria Fitness Socks: The Sensoria Fitness track everything your average fitness band does except the tracks weight distribution and helps correct injury producing running patterns.


Posted in: news

<![CDATA[Ten Years of Tech : 2003 - 2013]]> http://beta.hackerstickers.com/blog/postten-years-of-tech-infograph-2003-2013 http://beta.hackerstickers.com/blog/postten-years-of-tech-infograph-2003-2013 Tue, 22 Oct 2013 00:00:00 GMT Within the past ten years of tech,  the world's undergone a hyperspeed evolution of unmatched proportions. Technolgy is no longer a novelty, but a necessity engranined at every stratum of our lives. Inventions that were the next big thing are already yesterday's news. Compact disc that dethroned cassette tapes as the primary audio format over 25 years ago, has finally been replaced by mp3's. The cellular phone market once dominated by Nokia, now worships at the altar of Apple.. The capabilities of smartphones now mirror that of full-fledged pc's. The average person now becomes a celebrity in a matter minutes via Youtube. Twitter proven a hundred and forty characters is more than enough to get your point across and Facebook has introduced a level of social connections that both incredibly intimate and extremely isolating. Meanwhile as we our endulge our technology addiction, we're becoming more aware its at the cost of our privacy. Our information is everywhere, and for easily accessible with the right amount of tech savvy,  for the right price or by certain three letter organizations. This is Hacker Stickers recap of the last 10 years of Tech.

Click to view fullsize



  • Itunes Music store goes  online and effectively  ends the tenure of  the  compact disc as the  primary medium for music.
  • My Space becomes the first  widely used social media site.


  • Facebook launches as a simple website allowing  college students  to connect.
  • Mozilla releases the FIrefox web browser


  • Pandora launches it internet radio website, presenting a new level personalization never before seen.
  • Youtube  launches and makes it possible for anyone to get there 15 minutes of fame  by uploading a video.
  • Microsoft officially releases the
    Xbox 360, which has become one of Microsoft’s best selling products of all time


  • Twitter revolutionizes social media, using only 140 characters.
  • Nintendo’s Wii revamps the video game industry with its motion-based controller system.
  • Julian Assange immediately gains both infamy and praise with the launch of the Wikileaks website.


  • Apple changes the spector of the smartphone market and subsequentlythe entire world with the introduction of the Iphone.


  • Google launches Chrome
  • Netflix streaming goes online
  • Google brings Android, its open source mobile OS into the marketplace, creating a compettitive OS to  battle Apple’s iOs.


  • Spotify goes online allowing users to listen to entire albums without having to pirate or purchase the music.
  • Instagram, a simple app for sharing photos becomes the next platform for social interaction.
  • Apple maintains furthers their reputation as tech trendsetters engineering the tablet craze with the original Ipad.


  • Microsoft’s Windows 8 new interface inspires a trend new trend of flat graphics and bright colors throughout the world of multimedia.
  • The buzz around the Apple Iphone is bolstered by the announcement of Siri, a voice controlled personal assitant that responds to user just like a normal human would


  • Edward Snowden leaks revealthe existence of the NSA surveillance program code-named PRISM.





Posted in: news

<![CDATA[DEF CON 21 & Hacker Stickers Pop-Up Shop!]]> http://beta.hackerstickers.com/blog/postdef-con-21-and-hacker-stickers-pop-up-shop http://beta.hackerstickers.com/blog/postdef-con-21-and-hacker-stickers-pop-up-shop Tue, 27 Aug 2013 00:00:00 GMT We love hacker conferences! It's a great way for us to meet new people and learn about the latest in the hacking and security scene. This year was another great year and the folks at DEF CON know how to throw a conference! This year was another year at the RIO Hotel & Casino in Las Vegas, NV. and seemed to be even larger than previous years!

We arrived to Las Vegas a few days early to ensure the hotel staff had our signage to hang over our booth at our pop-up shop in the conference vendor area! We used our awesome signage from last year but customized it with the latest promotions and swag! Yup the same sign as seen in the DEF CON 20 Documentary -- The folks at the hotel weren't able to take it down until after we left so much of it got destroyed but we were able to recycle quite a bit of it after a goon gave us a heads up of its location!

The Hacker Sticker pop-up shop was cube shaped booth with our inventory in the center so we could get access to everything quickly! We had a whole side of our booth devoted to previous years DEF CON official swag (a great way to get official DEF CON swag without waiting in lines!). Our lineup included the Lock Picking 101 gear, Irvine Underground shirts, lock picks, t-shirts, sweatshirts, hacking hardware, caffeinated goodies, stickers, hats, glassware, and our limited edition pins!

We'd like to give special shout-outs and thanks to the DEF CON team, goons, staff and those who remain hidden behind the curtains making the conference run so well including the security goons, swag shop and vendor teams. Special thanks to the Hacker Stickers and IVU folks who helped make everything happen and our artists who turn ideas into something solid every year that you love to sport. And a special thank you to you, our customers, who keep our ideas thriving!


Posted in: news

<![CDATA[Dumpster Diving - A Hackers Playground]]> http://beta.hackerstickers.com/blog/postdumpster-diving-for-hackers http://beta.hackerstickers.com/blog/postdumpster-diving-for-hackers Fri, 07 Jun 2013 00:00:00 GMT Dumpster diving for source information is a forgotten method with timeless value. However, with the increasing integration of the internet into our everyday lives, in addition to people’s naive willingness to fork over personal/private information through social media, dumpster diving has lost much of its former popularity to less invasive methods of data extractions, such as phishing and spoofing. Amazingly, in the face of ever growing threat of identity theft, many people still lack a keen understanding of what type of information is sensitive and potential ramification of said information falling into the wrong hands. Even though popularity of dumpster diving has waned greatly since its heyday,  the enormity of key information and useful merchandise being thrown in the trash regularly demands a resurgence of this forgotten past time.

A smart and planned approach to dumpster diving can yield a treasure trove of rewards for the diligent diver, ranging from usernames and passwords to brand new software or books. The type of rewards depends heavily on the location of the dumpster. Don’t jump into the McDonalds dumpster unless you’re looking for old Big Mac’s and Chicken McNuggets. Alternatively, if you were to go diving in the dumpster of a tech company, your efforts could be rewarded with hard drives, usb’s, and potentially even exclusive industry software manuals. For this reason, it's extremely important to first know what type of trinkets you’re specifically  in search of. Scout the location, and make sure you know what day and time the trash gets picked up, that is unless you want to your story to end up, here. Know your rights and know who's property you're on and the legality of it all.

Now for the common sense stuff. Dumpsters are a haven for germs that could result in you becoming very ill. Take the necessary precautions to protect yourself from infection by wearing layers, dark colors preferably black, heavy duty work gloves and shoes with tough soles to prevent nail or needle punctures. A small knife would great utensil for opening trash  bags as you’re sifting through. As a preventative measure, its advisable to tuck your pants into your boots creating a barrier against insects. A medical mask would be a great choice, because  at the very least it helps with the smell. Additionally, dumpsters are sometimes inhabited by rodents of all types, consequently its a good  idea to bring along a large stick for poking through the garbage before you hop in.
Good luck and happy dumpster diving!

Let's talk dumpster diving at this post - https://www.facebook.com/photo.php?fbid=478995492180571&set=a.378582048888583.92427.274059206007535

Posted in: news

<![CDATA[The Stars of the Movie Hackers - Where Are They Now?]]> http://beta.hackerstickers.com/blog/postmovie-hackers-actors-where-are-they-now http://beta.hackerstickers.com/blog/postmovie-hackers-actors-where-are-they-now Fri, 10 May 2013 00:00:00 GMT
Hackers hit the movie screens way back in 1995, when the internet was still in its infancy, and computer hackers were a little known subculture. The film told the story of famed hacker  "Zero Cool" aka Dade Murphy, known for an infamous crashing of 1,507 systems, an offense which earned him a ban from or operating a computer until he was eighteen. Post 18th birthday,  Dade, eventually meets a group of hackers at his new school, and enters into a rivalry with Kate "Acid Burn" Libby. Joey, the novice of the group, inadvertently uncovers The Plague's scheme to steal 25 million dollars from his company. This prompts the Plague to enlists the Secret Service  under false pretenses, in order to protect prevent his scheme from being discover. Thus a race ensues, as the Dade and his cohorts attempt to reveal The Plague's plot before the Secret Service catches up to them and put all of them in jail. Oh yeah and it features a young actress named Angelina Jolie is in it too.

Dade "Zero Cool" Murphy
Jonny Lee Miller

Right after starring in Hackers, Miller played Sick Boy in the heavily acclaimed film, Trainspotting. He then went on to appear in box office duds  Dracula 2000(2000), Mindhunters(2004), and Aeon Flux(2005). However, recently he's gotten more buzz, after appearing alongside Johnny Depp in the movie adaptation of Dark Shadows. He is also get rave reviews reprising the role of Sherlock Holmes on the number one new television series, Elementary.

Kate "Acid Burn" Libby
Angelina Jolie

If you don't know what ever happened to the girl that played "Acid Burn", you've probably being living under a rock for the last decade.  Academy Award, Golden Globe, and SAG award- winner, Jolie has  held a constant present on the silver screen for seemingly since for nearly twenty years. Outside of acting, Jolie's recieved tons of press for her highly publicized marriages, first to Hackers co-star Jonny Lee Miller, then to Billy Bob Thornton, and finally to Brad Pitt. She's former Goodwill Ambassador for the UN and mother of six children. So yeah, she's been busy.

Joey Pardella
Jesse Bradford

At the time of Hacker's debut on the big screen, Jesse Bradford had earned a lot of attention for his role as Aaron in the Steven Soderbergh film King of Hill(1993). However, Bradfords career trajectory as serious actor never came into fruition. After Hackers he went on to star in the film Romeo + Juliet with Leonardo Di Caprio and Clair Danes,  later appearing in the comedies Cherry Falls, Bring It On, and the creepy thriller Swimfan alongside Erika Christensen. Today, he plays Chris on the ABC television comedy series Guys With Kids.

Emmanuel "Cereal Killer" Goldstein 
Matthew Lillard

Its very rare that you find an actor that has  appeared in more than one cult film. Matthew Lillard has appeared in four, Serial Mom, Hackers, Scream, and perhaps the most popular of the four SLC Punk. Besides his roles in cult films, Lillard performance as Shaggy in the two live-action Scooby Doo films has established him as the modern voice of Shaggy. He's acted as the voice of Shaggy in the animated series Scooby Doo! Mystery Incorporated for the last the three seasons, as well as in numerous straight to DVD animated films for the Scooby Doo franchise. Most recently, Lillard made his directorial debut with the film Fat Kid Rules the World at SXSW where it received very positive reviews. The film even received a 3.5 out of 4 stars from the late Roger Ebert.

Paul "Lord Nikon" Cook
Laurence Mason

In the film Hackers(2004) Laurence Mason played the very eccentric hacker with the photographic memory. Since then, Mason has gone on to have reoccurring roles on crime related television series The Shield and Prison Break. His most notable role as of late, however,  is as Matthew McConaughey's driver, Earl. in the box office success The Lincoln Lawyer.

Ramon "The Phantom Phreak"' Sanchez
Renoly Santiago

Renoly Santiago made a blockbuster debut co-starring in Dangerous Minds with Michelle Pfifer, which he immediately followed with major roles in Hackers and Con-Air. Following those movies he appeared in a number of off-Broadway productions under very notable directors. He made his Brodway debut in the production of The Capeman in which his performance as  Tony Hernandez earned him a nomination for a Drama Desk Award from the press for Outstanding Featured Performance in a Musical. Santiago also owns a writing credit for Bring in the Morning…A Wake-Up Call' which starred Lauryn Hill. Currently, Santiago is writing songs for his debut bilingual album.

Eugene "The Plague" Belford
Fisher Stevens

Fisher Stevens played the role of the sinister "Plague" in Hackers. Since then, Stevens has made a guest appearance  on a number of  comedic television series, including Fraiser, Its Always Sunny in Philadelphia, Ugly  Betty, and  Californication. Proving his range, he's also appeared in about an equal amount of  television dramas including Medium, Numb3rs, Law and Order: Criminal Intent, Lost, and the Mentalist. His recent acting credits include One for the Money with Katherine Heigl.

Posted in: news

<![CDATA[Hacker Magazine StaticUsers '97 Discovered and Now Scanned]]> http://beta.hackerstickers.com/blog/posthackermagazine-staticusers97 http://beta.hackerstickers.com/blog/posthackermagazine-staticusers97 Sat, 04 May 2013 00:00:00 GMT StaticUsers '97 Magazine for Hackers Geeks Social Engineering Security

StaticUsers '97 was a printed zine (short for magazine) targeted to the underground scene focusing on hacking, security, social engineering, and coding. During the time there were only a few magazines geared towards the high-tech minded folks including Blacklisted!411, 2600 and Iron Feather Journal.

The brainchildren behind StaticUsers '97 were a group of friends from high school in Las Vegas, NV -- home to DEF CON (largest hacker conference) with articles contributed by writers around the world.

Download StaticUsers '97 Magazine PDF Free
 1. Special Thanx
 2. The True Meaning of a Hacker - Templer
 3. Live Social Engineering by Sdphreak
 4. Hacking a Mac by AntAdam
 5. Hacking a Mac Part 2 by AntAdam
 6. The Foolproof Helper by Barren Soul
 7. What's a Phreak?
 8. Become a Lineman with Ease
 9. A Phreaking Question
10. Crystals by LowTek
11. Wanna Port Surf?
12. Setting up Unix Trap Door by sh
13. Tricks of the Trade
14. The Story of the Accidental Con by SD phreak
15. What's an ANSI bomb by CyberWes
16. Few Notes About Eve Dongles by Dr. Qwerty
17. Rainman Scripting
18. Axis Security by Revelation
19. Subscription Page

The goal of the publication was to be subscription based with printed magazines released every other month with supporting newsletters sent out every two weeks. Although the publication ended after the first issue it is kept to preserve some history with grammar errors and typos included!

What were you doing 16 years ago?

Posted in: news

<![CDATA[Conventions in 2013 of Interest to Hackers, Gamers, Geeks, Nerds and Security Experts]]> http://beta.hackerstickers.com/blog/postconventions-2013-interest-hackers-gamers-geeks-nerds-security-experts http://beta.hackerstickers.com/blog/postconventions-2013-interest-hackers-gamers-geeks-nerds-security-experts Tue, 02 Apr 2013 00:00:00 GMT Sometimes keeping track of all the different conferences can be a pain and before you know it you've missed the show. Here is list of some of the major security, technology and gaming conventions taking place this year. If you know of a convention we missed that you would  like included in this list, please email us the information at sales@hackerstickers.com with the subject of 'Convention List' and include details in the format we have below!

April 5-7
A&G Ohio
Cincinnati, Ohio
Animation and Gaming Ohio (A&G Ohio) is a convention ran by the fans, for the fans. It not only includes Japanese animation, but American animation as well. Gaming is also incorporated with the signature events and the massive game room A&G has to offer. The focus of A&G Ohio is to bring the unexpected as well as something new and different. -Upcomingcons.com

April 26–
Chicago, Illinois

April 27


Philadelphia, Pennyslvania HACK is an open call for technology-based projects. Inviting participation from designers and artists working for/ with hacker spaces / maker spaces. We are encouraging collaborative works for submission, but this is not a requirement. We are asking for a range of works: From 2D to 3D works, applications, wearable’s, installation, objects, and performances. Works from groups or individuals not associated with hacker / maker spaces will be considered for submission as well.

May 21-23
CITA 2013
Las Vegas, Nevada
Presented by CTIA–The Wireless Association®, the proven authority leading the mobile movement since 1984, CTIA 2013 will continue to illuminate the future by showcasing the leaders, ideas and experiences transforming our dynamic industry. -CTIA2013.com

May 24-26
Houston, Texas
Comicpalooza is an international comic festival, featuring films, art, memorabilia and celebrity appearances. This year Comicpalooza coincides with GalatiCon and the two will work together to provide a dual experience for both sci-fi and comic book fans.

May 28-31
Boston, Massachusetts
A must-attend for every AnDevCon developer. Come learn with hundreds of experienced developers and engineers like you attending more than 75 classes 100% focused on Android development.Hang out and network with colleagues and our expert speakers at coffee breaks, lunches and our fabulous Attendee Reception. More than 45 companies will be exhibiting or sponsoring AnDevCon Boston – previous exhibitors include Google, Amazon, GroupOn, Sony, Adobe, Samsung, Qualcomm, TapJoy, RIM, AT&T, Barnes & Noble, HTC, Intel and dozens of others.

June 2013
The quintessential conference for Mac developers. Here developers get the latest news on the newest Apple hardware and software as well as the rare chances to communicate with  Apple programmers and receive direct feedback.

June 11-13
Electronic Entertainment Expo (E3)
Los Angeles, California
E3 draws tens of thousands of professionals to experience the future of interactive entertainment. The most influential people leading the most innovative companies in the industry attend E3 to see groundbreaking new technologies and never-before-seen products for computers, video game consoles, handheld systems, mobile and social, and the Internet.-E3Expo.com

July 27- August 1
Black Hat USA
Las Vegas, Nevada
Black Hat USA is the show that sets the benchmark for all other security conferences. This year Black Hat returns for its 16th year to Las Vegas, join them as they bring together the brightest in the world for six days of learning, networking, and skill building.

August 1-4
Las Vegas, Nevada
One of the worlds largest and longest-running hacking conventions.

August 15-18
GenCon Indy
Indianapolis, Indiana
The longest running and best-attended, gaming convention in the world returns to Indianapolis. Come see gaming icons, authors and artist. This year there's more events and an expanded Family Fun Pavilion.

August 29- September 1
Minneapolis, Minnesota
Meta Con is a massively multi-genre convention hosted annually in Minnesota, bringing together thousands of fans for a geeky celebration featuring anime, sci-fi, steampunk, gaming, and more. Sponsors range from groups like the Twin Cities Game Fest running games all weekend, and local Amtgard boffer weapon groups. Guests have ranged from the world-renown to local celebrities. Thousands of people are expected to attend MetaCon.

November 5-8
ACM Conference on Computer and Communications Security
Berlin, Germany
The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference brings together information security researchers, practitioners, developers, and users from all over the world to explore cutting-edge ideas and results. It provides an environment to conduct intellectual discussions. -SigSac.Org

November 8-9
Anaheim, California
Blizzard returns with their annual convention after a year long hiatus. This year's convention will feature in-depth discussion with with Blizzard game developers and artists, the global finals of Blizzard eSports, contests, and most importantly hands-on play time with the latest version of Blizzard's games.

December 9-13
New Orleans, Louisiana

December 13-14
Blue Hat v12
Richmond, Washington
BlueHat v12 educates Microsoft engineers and executives on current and emerging security threats in an effort to help address security issues in Microsoft products and services and protect customers.

Posted in: news

<![CDATA[Seeking Brand Ambassadors/Video Reviewers]]> http://beta.hackerstickers.com/blog/postseeking-brand-ambassadorsvideo-reviewers http://beta.hackerstickers.com/blog/postseeking-brand-ambassadorsvideo-reviewers Mon, 18 Mar 2013 00:00:00 GMT Are you a big fan of HackerStickers.com? Do you have tons of our gear and want more?
HackerStickers is looking for few a select brand ambassador to create video reviews for our products in exchange for free swag.   

    •    Experience creating and editing videos for Youtube, including adding watermarks.
    •    Be a fan of technology and gadgets.

If you're interested send us a video of you reviewing one of your favorite HackerStickers.com products or any video you've created recently to sales@HackerStickers.com.

Posted in: news

<![CDATA[A Hackers Fascination with Lock-Picking]]> http://beta.hackerstickers.com/blog/posta-hackers-fascination-with-lock-picking http://beta.hackerstickers.com/blog/posta-hackers-fascination-with-lock-picking Fri, 15 Mar 2013 00:00:00 GMT It's human nature to wonder how things work. As children we're in a constant state of curiosity, we began as toddlers presented with the task of correctly placing geometrically shaped pegs into their corresponding holes. It is here where we first learn every object has it proper place. As we get older our inquiring mind becomes obsessed with investigating how things work. We become amateur surgeons, dissecting the toaster or the television, carefully examining its parts, before attempting to reconstruct it's in proper working order.

Many of us hackers found ourselves romanced into hacking by our unyielding thirst to understand computers and technology. We found ourselves reinvigorated with the curiosity of our childhood, enthralled, with the fact that we were finally being presented with a subject whose level of complexity perfectly challenged our enthusiastic inquisitiveness. Seems only natural that hackers would be interested in locks and physical security. Lock-picking is essentially the kinesthetic equivalent of hacking. As hackers, we are aware of the vulnerabilities of the cyber securities enacted to protect our virtual valuables. Locksmiths are equally aware of the vulnerabilities within the physical securities we've constructed to protect our tangible valuables. It's at this junction of security and vulnerability where the two crafts of find common ground.

The second level on Maslow's Hierarchy of Needs is security. Perhaps the most indicative detail of human history that proves Maslow correct is the consistent presence of locks dating back to the earliest civilizations. If one were to follow the evolution of locks, one would immediately notice that over time locks have become increasingly more complex. I would formally wonder what was the catalyst that spurred the evolution of locks, only to find the answer staring at me in the mirror. Hackers! The first hackers where the crafty fellows who figured out how to pick locks. Motives aside, their intuitiveness was commendable to say the least, and essentially built the tradition to which we all belong.

There is some inherent pleasure for hacker to successfully pick a lock, more so than that of a person of probably any other background. I would compare it to the pleasure an architect might get from building a bird house from scratch. There is something viscerally satisfying about mechanical completion of task normally done mentally or virtually. Even if hackers take on lock-picking may always remain on a hobbyist level, it still strengthens our understanding of physical security and provides a refreshing feeling of accomplishment when you feel the pins in the lock meet the sheer line and the lock turns and opens.

See our collection of Lock pick tools, Visable Cutaway for Practice ,17pc LockPick Set, 5pc Bump Keys Set and Handcuff Keys.

Posted in: news