Final Web Search Results

News: Convert a Truck Into a Camera

We've featured unusual pinhole cameras before, but nothing at this grandiose scale. Presenting the world's largest mobile pinhole camera, the Cameratruck, creation of photographer Shaun Irving. The Cameratruck can take pictures approximately 3,000 times the size of a 35mm!

News: Paper-made Girls

Korean artist Osang Gwon creates more than just alluring paper-made girls. Gwon has moved past traditional papercraft, taking volumes of photographs of his subjects and constructing sculptural forms from the carefully arranged 2D images. Gwon shows in galleries, and has done commissioned projects for both Fendi and Nike.

News: Fold a shirt instantly

This technique was popularized on Japanese television and has since been widely imitated and posted everywhere. The original concept was shown on a primetime Japanese variety show. Many others produced (plagiarized) their own tutorials for the web. Even Martha made one.

How To: Knit a Snowflake

For the holiday season, a great knitting project is a snowflake design. It's perfect for handmade Christmas gifts. You can knit just one, or a row of them, or use them as full pattern on a sweater or blanket—or whatever project you choose.

How To: Create A Nice Curtain In GIMP

Hello everyone, This is my first tutorial posted on WonderHowTo and as a starter I wanted to show you how to make a nice curtain in GIMP, the free Photoshop alternative. Even though GIMP does not have all the features of his expensive brother, you can still do some cool designs or photo manipulation.

How To: Create glossy web icons in Illustrator CS2

In this tutorial you will learn how to create glossy web icons in Illustrator CS2. Very often you will be able to download royalty-free icons from the Internet, but the problem is they are not customized to fit in with your existing web site's design. So creating your own icons is always a good way if you have the time to do it. Make sure to hit "play tutorial" in the top left corner of the video to start the video. There is no sound, so you'll need to watch the pop-up directions. Create glos...

How To: Take Your Measurements

These measurments should be taken and recorded before drawing up you clothing design pattern. Wear the bra and panties you will be wearing with the final garment. Another option, especially if you are going to be selling a series of the garments, is to follow a size chart. While sizing is not very standardized in the clothing industry, I like the charts on the Burdastyle website which are in both inches and centimeters. When measuring, the tape measure should be neither too tight nor too loos...

News: A New Ink & Paint!

Ink & Paint was originally intended to provide a place for the sharing of graffiti and street art related news and the spreading of the street art culture. However in recent months I have noticed a distinct lack of "lowbrow" art in the WHT community. Don't get me wrong though, I'm a HUGE nerd. I love null byte, I love the Minecraft world, and all the tech posts that are becoming increasingly more common. It's awesome. However the nerd in me and the artist in me both want to see more comics, s...

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers

In the first part of this series, we learned about darknets, as well as how they came about. But these patches of forgotten Internet are not the oasis of free information you might think. Despite being hidden—or just harder to come across—these networks are no more safe then anywhere else on the 'clear' Internet. The nature of networking and routing means your location is always known in server logs. It only takes one phone call to your ISP with your IP address to obtain both your physical ad...

How To: Reveal Saved Browser Passwords with JavaScript Injections

JavaScript is the language of the internet. It is what allows us to create dynamic, interesting webpages that are fast, web-based applications and so much more. The primary use of JavaScript is to write functions that are embedded in or included from HTML pages and that interact with the Document Object Model (DOM) of the page. This is the magic that allows all of what we see to happen, and for our browser to be manipulated.

Community Byte: Coding a Web-Based Password Cracker in Python

Welcome to another Community Byte announcement! In the past two sessions, we have coded an IRC bot in Python capable of issuing commands. Since it can issue commands and most of you are new to programming, that project will stay idle for a while. Other commands such as voice and half-op can be easily hacked in via common sense, even if you weren't there for that session.

News: Easy Skype iPhone Exploit Exposes Your Phone Book & More

Like the recent XSS 0day exploit found in the Mac and Windows versions of Skype, a similar one has been found in the Skype app for iPhone. The vulnerability allows an attacker to send a message that contains malicious JavaScript code in the "Name" parameter. This code can steal your phonebook, crash the app, and potentially do a lot worse. The URI scheme is improperly identified for the web-kit browser. Instead of going to a blank browser page, it defaults to "file://". The code could steal a...

News: Unity3D Could Change the Gaming World Now That It Has Flash

Big news from the world of game development engines. For several years, Unity3D has been the free 3D game development engine of choice for aspiring and indie game designers around the world. While it isn't as powerful as Unreal Engine 3 or CryEngine, it's free and much easier to use. Now, according to an announcement made by Unity yesterday, Unity 3D is about to unleash a huge weapon that neither of those other engines can claim: Flash compatibility.

How To: Subscribe to Google+ Users with Google Reader

If you're like me, you don't do a lot of web browsing anymore. I subscribe to my favorite blogs' feeds and read them via Google Reader. It's one of my favorite Google products, for a lot of reasons. I can keep up with most of my web activities in one tab, and follow along with my favorite blogs, Flickr photos, and Twitter. I can share instantly with people who follow me, and see what other people have shared with me. I hope that Google+ will integrate well with Google Reader, because it alrea...

3 Dreams Of Black: An Interactive Music Video You Can Create and Control

Video games are the most prevalent type of interactive media, but certainly not the only one. The interactive music video for the song "3 Dreams of Black" by supergroup ROME and digital artist Chris Milk utilizes the latest web design technology, video game influenced art and interactivity, and large crowd-sourced elements to form a compelling work of art. ROME is composed of producer extraordinaire Danger Mouse, Italian film composer Daniele Luppi, Norah Jones, and Jack White. Their recent e...

News: Google Music Now Live in Beta Mode

At Google I/O this morning, Google finally announced the launch of its much awaited Google Music service. It's currently in invite-only beta mode, but they claim it will open up to the masses soon enough. To start syncing your music library with Google's Cloud now, you need make sure you're signed into your Google Account, then click here for a personal invite. It's currently free for a limited, undisclosed amount time.

News: Election Day Again

Tomorrow is another day of election (PSG). I have to wake up early to set up the computers on both computer rooms. The election process is computerized, making the counting of votes the responsibility of the computer. What makes this year's election special is that for the first time in 3 years (correct me if I'm wrong), there are competing parties. The result is something to look forward to especially for me who contributed in the creation of the system.

News: "How I’d Hack Your Weak Passwords"- The Art of Cracking

Lifehacker posts an article on the art of cracking weak passwords, courtesy of Internet standards expert, CEO of web company iFusion Labs, and blogger John Pozadzides. Pozadzides certainly knows a thing or two about password logic. (Note: this information is not intended to hack into accounts, but rather to protect you from using weak passwords).