Adverse Neighbor Search Results

News: Personal Computing Is Dead, Long Live Collaborative Computing

Those of us who are actively developing for the HoloLens, and for the other augmented and mixed reality devices and platforms that currently exist, are constantly looking for the next bit of news or press conference about the space. Our one hope is to find any information about the road ahead, to know that the hours we spend slaving away above our keyboards, with the weight of a head-mounted display on our neck, will lead to something as amazing as we picture it.

News: MSG Is the Ultimate Healthy Flavor Hack

Hear me out. No, really. Before you sharpen your pitchforks and give me anecdotal evidence of your Chinese restaurant syndrome, I think you need to know a few things about monosodium glutamate. First of all, it's a naturally-occurring chemical compound that can be found in anything from tomatoes to cheese, and is used in all kinds of foods from KFC to breakfast sandwiches. So spare me the comments on MSG and Chinese food—you probably eat MSG on a daily basis without even knowing it. (And also...

How To: Turn a Tortilla into a French Crêpe

Making a good crêpe takes practice and commitment. The batter is rich—most recipes incorporate melted butter, whole milk, and several eggs—and the cooking of the crêpe requires good technique. You have to learn to deposit and swirl just the right amount of batter to get the thinnest possible crêpe, and then learn how to loosen the entire circle and flip it over without tearing or snagging.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 5 (Windows Registry Forensics)

Welcome back, my aspiring hackers! As I mentioned in earlier posts, the best hackers (or at least those not behind bars) have a keen understanding of digital forensics. If I am tasked to intrude upon an enemy's file server to retrieve war plans, such as in this tutorial, it is essential to my country's (and my own) well-being that it not be traced back to me. Understanding digital forensics helps us to leave without a trace and never have a trail back to us or our employer.

Hack Like a Pro: How to Spy on Anyone, Part 2 (Finding & Downloading Confidential Documents)

Welcome back, my tenderfoot hackers! A short while ago, I started a new series called "How to Spy on Anyone." The idea behind this series is that computer hacking is increasingly being used in espionage and cyber warfare, as well as by private detectives and law enforcement to solve cases. I am trying to demonstrate, in this series, ways that hacking is being used in these professions. For those of you who are training for those careers, I dedicate this series.

How To: Make Custom-Shaped Chocolates at Home

It is a truth universally acknowledged that food molded into fancy shapes somehow seems tastier. That's true even with chocolate, which is inherently delicious. Now, while you can buy chocolate that's been pre-molded into fancy shapes, you can have a lot of fun and save a few bucks by making your own specialty chocolate molds. All you need to get started are items you most likely already own.

How To: Make a Halloween corpse

Whether you're planning the best Halloween bash on the block, creating a haunted house ride, or just want to scare the living daylights out of your neighbors, this Halloween corpse will be the death of the party. Watch and see how to make one yourself in this series.

How To: Keep deer out of your yard

Deer can wreck havoc on your plants and yard. No need to go to war with the deer, when with a few tricks of the trade, deer can be discouraged from feeding on your yard. The neighbor‘s yard, on the other hand, might seem that much more appealing.

How To: Set up a haunted house

In this series of spooky videos about how to scare the heck out of your friends and neighbors, our haunted house expert tells you everything you need to know about setting up your own haunted house. Matt Cail, designer and director of the University of Washington's campus haunted house, shares the tips and advice he gained from putting the fright to university students. He begins by discussing goals for a haunted house then tells you how to achieve them with the seasoned advice of someone who...

News: Uber Goes North to Expand Driverless Program

Oh, Uber. It's not often to hear your name in the news and have it mean something good. You're being sued, you're crashing, your driverless program is falling behind. But I have to hand it to you; when the world is crumbling around you, you continue to fight against it. You've even made it to Canada.

How To: Rock Harder on GarageBand with a DIY Pringles Can Drum Kit

Damn right, you don't just eat 'em. When you're done with your next Pringles can, you can turn it into a kaleidoscope, a pinhole camera, and even a solar hot dog cooker. But Instructables user TheSpodShed may have just created the most awesome way to upcycle empty Pringles cans—use them as a mini MIDI drum kit for your mobile device. This tiny drum kit will let you rock your face off without pissing off all your neighbors.

WANTED: Hackers for Bug Bounties

In previous posts here, I have pointed out that hackers are in high demand around the world and in nearly every industry. Every military and espionage unit of every country is trying to hire high-quality, experienced hackers as fast as they can to hack their adversaries' computer systems in order to gain a strategic advantage and to spy.

How To: See Who's Clogging Up Your Wi-Fi Network with These Free Mobile Apps

Android has released a new application called ezNetScan, which is a free app that scans the wireless network you're connected to and gives you a full log of all of the devices connected to that network. This isn't new for smartphone users, let alone Android users. Fing has been around for a while and does practically the same thing that exNetScan does. It gathers information such as the IP and MAC addresses, device vendors, and ISP location. But while Fing is a great program, it does lack a f...

How To: Rid your yard of moles

Moles can be a real problem in gardens. Unfortunately, there is no easy answer to get rid of them. The best way is to try several methods until you find one that works. Even then if you manage to catch or deter a mole it's not always the end of the problem. For much of the year moles are solitary, and have their own territory. If you catch the little fellow, his neighbor will take advantage of the tunnel system and move in. This how to video give you some ideas of how to get rid of those pest...

Advice from a Real Hacker: How to Create Stronger Passwords

People who know that I am a professional hacker often ask me what they can do to make their computers and personal information safe from people like me. The answer, of course, is that nothing will make you completely safe, but there are a number of measures any computer user can take to reduce the chances of being a victim of a hacker.

How To: 10 Unique & Practical Ways to Repurpose Your Old Hard Disk Drives

At one point in the '90s, about fifty percent of the CDs produced worldwide had an AOL logo. About fifty percent of the CDs in my home still have that AOL promise of 500 free hours on them. Though they never got me to join their internet service, I did get a lifetime supply of coasters. Thanks to the rise of high-speed internet access and bigger and better hard drives, there's no reason for companies to snail mail any more of those obnoxious plastic discs.

AHS Cult: How to Grow a Beehive Out of Your Skull for Halloween

The promotional images for American Horror Story: Cult have been some of the most arresting in recent memory. They mash coulrophobia, trypophobia, and body horror together with some serious economy into a succinct, colorful, image. It's like a bad car accident that you can't stop rubbernecking. Which makes it perfect for a Halloween costume — you'll be repulsive, but no one will be able to look away. While the beehive skull hasn't made an actual appearance in Cult yet, and probably won't sinc...