Search results
Results From The WOW.Com Content Network
The Touch-Tone Terrorists are actually one man, Pete Dzoghi, [1] who also goes by the name RePete.He purchased a series of 1-800 numbers, including ones that were one digit different from actual customer service numbers for companies such as (apparently) UPS, an oil change business, an auto insurance "claims support line", a psychic hotline, a pen manufacturer, a bank, a department store, a ...
Longmont Potion Castle (born 1972) [2] is the stage name of a musician and surrealist prank caller from Denver, Colorado who has been active since 1986. The name is also used for most of his prank call albums, and for the project in general. [3] Details about his personal life are scarce, and his real name is kept a secret.
From Wikipedia, the free encyclopedia. Redirect page
It’s not just a great number to prank call for kids—but adults can join in for a laugh and a touch of holiday enchantment. 2. Hogwarts Admissions: 1-267-436-5109. This prank call is quite magical.
The Phone Losers of America (PLA) is an internet prank call community founded in 1994 as a phone phreaking and hacking e-zine. Today the PLA hosts a prank call podcast called the Snow Plow Show , which it has hosted since 2012.
Get AOL Mail for FREE! Manage your email like never before with travel, photo & document views. Personalize your inbox with themes & tabs. You've Got Mail!
British physicist R. V. Jones recorded two early examples of prank calls in his 1978 memoir Most Secret War: British Scientific Intelligence 1939–1945.The first was by Carl Bosch, a physicist and refugee from Nazi Germany, who in about 1933 persuaded a newspaper journalist that he could see his actions through the telephone (rather than, as was the case, from the window of his laboratory ...
Pranknet initially operated through a chat room at Pranknet.org, and participants used Skype to make their calls. As of 2009, Skype used encryption and obfuscation of its communication services and provided an uncontrolled registration system for users without proof of identity, making it difficult to trace and identify users. [8]