Berkeley CSUA MOTD:Entry 52108
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/07/08 [General] UID:1000 Activity:popular
7/8     

2008/11/25-28 [Computer/Theory] UID:52108 Activity:nil
11/25   Holy crap! I was the one asking how to open a locked up masterlock a
        few days ago. I tried the algorithm on this webpage:
        http://www.wikihow.com/Crack-a-%22Master-Lock%22-Combination-Lock
        and it worked! Thanks to whoever suggested it.
        \_ Good to know, thanks for the reply.
2025/07/08 [General] UID:1000 Activity:popular
7/8     

You may also be interested in these entries...
2012/1/24-3/3 [Computer/SW/Languages/C_Cplusplus, Computer/SW/Languages/Misc] UID:54296 Activity:nil
1/24    http://james-iry.blogspot.com/2009/05/brief-incomplete-and-mostly-wrong.html
        Amusing "history" of computer science.
        \_ Where's the mentioning of Al Gore the inventor of AlGorithm?
	...
2011/6/29-7/21 [Computer/SW/Database, Computer/SW] UID:54133 Activity:nil
6/29    "An Israeli algorithm sheds light on the Bible"
        http://www.csua.org/u/tq4 (news.yahoo.com)
        "Software developed by an Israeli team is giving intriguing new hints
        about what researchers believe to be the multiple hands that wrote the
        Bible."
        \_ "Hype developed by an American OnLine News Feed is giving
	...
2010/8/9-19 [Computer/SW/Security] UID:53917 Activity:nil
8/9     I got two files, one is size 522190848 and the other is size
        521648128.  Both sha256 to the same number.  (and sha1 too).
        I don't think this is supposed to happen, right? (least not with
        sha256).
        \_ how are you checking?
           \_ I burned one file to cd, so i mounted /cdrom and
	...
2010/1/20-29 [Computer/SW/Languages/Misc, Computer/SW/Security] UID:53649 Activity:nil
1/20    Did Chinese come up with new way of quicksort?
        http://www.nytimes.com/2010/01/20/technology/20cyber.html
        Joe Stewart, a malware specialist with SecureWorks, a computer
        security company based in Atlanta, said he determined the main
        program used in the attack contained a module based on an unusu
        al algorithm from a Chinese technical paper that has been
	...
2009/10/24-11/3 [Computer/HW/Laptop] UID:53466 Activity:kinda low
10/24   How well do you see color? I got 8, how about you?
        http://www.xrite.com/custom_page.aspx?PageID=77
        \_ 7
           \_ what monitor did you use?
              \_ LCD on thinkpad x32, under not so great lighting conditions.
        \_ I scored 101, which seems impossible. Then again, I didn't
	...
2009/1/13-22 [Computer/Theory] UID:52367 Activity:kinda low
1/13    I am writing a commandline parser for a class and I could use some
        tips for algorithms to use. (The project is over and done so I am
        not cheating, but I am dissatisfied with my end result.) I STFW and
        didn't come up with too much I liked. I read the source for some
        shells like tcsh and that is *WAY* too complicated and relies on
        a lot of other code. I know that browsers and other apps have
	...
2008/12/2-6 [Computer/SW/Apps, Academia/Berkeley/CSUA/Motd] UID:52140 Activity:kinda low
12/1    Just curious -- what do you guys generally use soda for? Why do you
        log on? Personally, I use it to keep a presence on IRC and AIM/gTalk
        at all times, and mess around with some Python programming (been
        setting up Twisted and such so I can play with making an irc bot).
        --toulouse
        \_ I use it to post SHIT, er, I mean, spill my guts about the company
	...
Cache (3652 bytes)
www.wikihow.com/Crack-a-%22Master-Lock%22-Combination-Lock
Of these options, only the last two will leave you with a usable lock without emptying your wallet. Unfortunately, there are 64,000 possible combinations on a standard 40-number Master Lock. With this method, however, you can quickly narrow that down to 80 combinations, a workable number to try if you've got the time and the inclination to give it a shot. This method only works with Master Lock combination locks, and may not work with all of them. It is rumored that Master Lock changed the combination algorithm on some of the newer locks, in particular those with serial numbers starting with the number 800. Some people, however, have reportedly had success cracking these with this method, too, so it may be worth a try. discussion page for this article to check which serial numbers others have had success with. It is a good idea to turn it at least three rotations first, just to make sure it's clear. The shackle is the u-shaped part of the lock that goes around whatever you're locking. lock down if the shackle is locked onto something solid. If you can't turn the dial at all, release the shackle and turn the dial clockwise just a number or two and then try it again. Sometimes it will stick right on the numbers, but sometimes it will be between the numbers. Turn the dial clockwise about one number from the sticking point in order to allow you to "escape" that sticking point. You should find a total of twelve sticking points in one complete turn of the dial. You should eliminate 7 of the 12 numbers with this step. Four of the remaining five numbers will share the same number in the "ones" place, so for example, if the numbers left on the list are 4, 14, 24, 27, and 34, the number 27 is the only one which does not have a four in the "ones" place. Divide the third number of the combination (27 in this case) by four and write down the remainder. In this case 27/4 = 6 remainder 3 Remember we are only concerned with the remainder, which will always be 0, 1, 2, or 3 Write down the magic number (3 in this example). Now add 4 to that and continue adding 4 to each resulting sum until you have gone completely around the dial once. Thus, for the example above the numbers would be 3, 7, 11, 15, 19, 23, 27, 31, 35, and 39. One of these numbers is the first number of the combination. add 2 to it, otherwise subtract 2 Since our example magic number is 3, we subtract 2 and get 1 Write down the answer and add 4 to it. Now add 4 to each resulting sum until you have gone completely around the dial once. Thus, in the example, the numbers would be 1, 5, 9, 13, 17, 21, 25, 29, 33, and 37. One of these numbers is the second number in the combination. You've just narrowed down 64,000 combinations to only 80. Now try each combination until you find the correct one. If you're lucky, you may need to try only a few but then again, you may need to try all 100. edit Tips * After cracking just one lock, the system becomes much easier to understand, so hang in there. Once you've figured out the third number, you can save time by using a special computer application to determine all the possible combinations. Otherwise, cutting off the lock and buying a new one makes more sense. After you align the tumblers, and determine the unlock code, you can seal the hole with a two-part epoxy. edit Warnings * Do not use this technique to crack someone else's lock without permission of the owner. If you do that, you are breaking the law and could be prosecuted accordingly. Site map All text here is freely available to copy, adapt, and distribute under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 25 License.