Mask Unblocked Search Results

News: SPLAT! Art Made from Everyday Household Items

Tom Friedman. One of my very favorite contemporary artists. Friedman injects the wonder into the humdrum. He creates magic from the unsuspected with his incredible sculptures assembled from simple, everyday materials. His materials have included: toilet paper, drinking straws, construction paper, masking tape, toothpicks, bubblegum, spaghetti, toothpaste, soap powder, sugar cubes.

How To: Create and use image masks in Fireworks 8

Fireworks, with its hybrid vector/raster type operation is especially well suited to mask work. Fireworks masks are based on one image clipping another. In this Fireworks 8 video tutorial you will learn how to create and use image masks. Make sure to hit "play tutorial" in the top left corner of the video to start the video. There is no sound, so you'll need to watch the pop-up directions. Create and use image masks in Fireworks 8.

News: OCD Iron Man Nut Builds SPECTACULAR Suit Replica

25-year-old Anthony Le, of Colorado is THE ultimate Iron Man fan. A cosplay fan, Anthony decided to try his hand at building a super realistic Iron Man suit, just in time for the release of Iron Man 2. The incredibly talented fitness consultant did above and beyond what you might expect. Check out the two videos below. Le's insane suit features the following: a dent-proof exterior, a motorized faceplate, and a spinning mock Gatling gun. He spent one month and approximately $4k building his ma...

News: FarmVille Harvests the World via iPhone?

Word of mouth is that Zynga is preparing to harvest the world.  Is this a horror movie?  No, but FarmVille has already invaded millions of homes, and now it wishes to conquer our pockets.  They're gearing up for a mobile platform, one that will reach millions more via the iPhone, iPod Touch, iPad, and Android.

How To: Remove blackheads using home remedies

This video teaches one how to get rid of blackheads. First, we have to open the skin pores by putting a warm towel on our face. Keep it there a while, until it starts to cool. After that, the pores are open. Put a clay mask in your skin - any clay mask will do. Keep the clay mask on your face for 8 to 12 minutes; do not allow the clay mask to dry because your face will make more oil to compensate. Then use the same towel to clean your skin. Your face will be softer, and the blackheads will di...

How To: Create a picture clipping mask in Illustrator CS2

In this Illustrator CS2 video tutorial you will learn to create a picture clipping mask. In another words, you will learn how to clip a picture with any closed vector path. Make sure you select both objects when applying the Make Clipping Mask command. Make sure to hit "play tutorial" in the top left corner of the video to start the video. There is no sound, so you'll need to watch the pop-up directions. Create a picture clipping mask in Illustrator CS2.

How To: Use and work with DOP forces in Houdini 10

This three-part series presents a look at the various forces in DOPs and how they work. This tutorial covers all the major forces except for the vortex, bouyancy and fluid forces. It covers both basic aspects and some more advanced techniques (animated masks, using RBD object position to drive a magnet force).

News: Impromptu Tear Gas Chamber

Step 1: Have most of the Jackass crew think they are doing a photo shoot for the upcoming movie. Schedule the shoot in a tear gas chamber that is dressed to look like a photo set. Have secret film cameras planted in the chamber so you don't have any obvious camera men walking around with gas masks on inside the room.

News: 20 Amazing Minecraft Costumes at MineCon 2011

MineCon 2011 (held at the Mandalay Bay in Vegas) was in a word, awesome. The crowd was overwhelmingly young, the vibe was fun and nerdy, and best of all, the costumes were inspired. Below are my favorites, which unfortunately aren't of the best quality (lighting was low and super yellow, which wasn't helped much by my standard point-and-shoot). If you happened to attend Minecon as well, post about your experience to the community corkboard... if you're pictured below, please comment!

How To: How Cross-Site Scripting (XSS) Attacks Sneak into Unprotected Websites (Plus: How to Block Them)

XSS stands for cross-site scripting, which is a form of web-based exploitation that uses client-side vulnerabilities in a web page to execute malicious JavaScript codes. JavaScript is referred to as "cross-site" because it usually involves an external website containing the malicious code. That code is most commonly used to steal cookies with a website that the attacker created and hosted on another server. The cookies can then be used to escalate privileges and gain root access to someone's ...

How To: Make an Airsoft Machine Gun (AKA Halo Mobile Turret)

Airsoft doesn't get any better than a cloud chamber BB machine gun, aka Cloud BBMG. This design has an incredible rate of fire. If you've got a full charge of compressed air, it can easily fire more than 50 rounds per second at a 350 ft/s muzzle velocity. Since this is a legit airsoft build, it should be handled safely with the same care as any other airsoft firearm, and you should be wearing the same protective gear—protective mask, safety glasses, etc. My video details the build of this bea...

Scrabble Bingo of the Day: NOSEGAY

Scrabble Bingo of the Day: NOSEGAY [n] A nosegay is simply a bouquet of flowers, typically given as gifts. It comes from Middle English, from the words nose and gay, which in this case means brightly colored and showy. It does not reference homosexuality; the modern sense of gay.

Secure Your Computer, Part 3: Encrypt Your HDD/SSD to Prevent Data Theft

Welcome to Part 3 in my series on protecting your computer from prying eyes (Part 1, Part 2). In today's segment, we will be going over drive encryption using the TrueCrypt program on Windows OS. Drive encryption is a technique that masks your data with a cryptographic function. The encryption header stores the password that you have entered for the archive, which allows the data to be reversed and read from. Encrypted data is safe from anyone who wants to read it, other than people with the ...

News: Pokemon + Jabbawockeez + YouTube = Kusarine Project

Japan has a tendency to produce things that boggle the Western mind. Its citizens are already responsible for without a question the weirdest music video in the history of the medium. With that said, here is a video reenactment of several Pokemon (Pocket Monster in Japan) games released by Japanese performance art troupe Kusarine Project: Kusarine Project and their amazing YouTube channel first became known through the Japanese video sharing site/meme originator NicoNicoDouba. Their white mas...

News: Boob Support = Life Support

Dr. Elena Bodnar proposes a silly idea. Why not wear a bra that double as a gas mask? No point in being ill equipped (in the event of fires, terrorist attacks, dust storms or a swine flu outbreak). The instructions are simple: In the event of an emergency, remove bra.

News: Long and Jurassic C#$k

Ok, so for this one its going to be on my friend Nathans cousin, Justin, once again. We mess with this guy sooo much ha. Read the whole prank, but it short, He thinks he's gonna be in an actual movie, but instead its a Jurassic Park themed gay porn shoot. So we're gonna tell him we're going to California to be in Jurassic Park 4(he'll believe it, trust me). On the flight we can even have a couple pages of a fake script to read. When we get there it'll be just like any other shoot or at least ...

News: Supersonic Space Diver With Death Wish

Felix Baumgartner plans to leap a record 120,000 feet, breaking four world records. If all goes well, Baumgartner will set records for highest altitude freefall, longest distance freefall, highest manned balloon fight, and fastest speed freefall (he will actually break the sound of speed!). 

How To: Hide your IP address using IP Hider 4.0

IP Hider masks the real IP of a user, allowing him to browse all kind of pages without ever worrying that the ISPs or any other marketing tool is monitoring your surfing habits or spammers are attacking your computer. The simplest way to do this is to have traffic redirected through anonymous proxies.

How To: Use Fireworks CS4

This ten-part video tutorial series covers all the new features and uses of Fireworks CS4. This is a great introduction to any user new to Fireworks in general, or wanting to learn what changes have happened from Fireworks CS3 to CS4.

News: Steampunk Fashion - Timetravelers and Warriors

There are many opportunities to make Steampunk clothing. Clothing can be elegant and relate to the aristocrats of the 19th century. But Steampunk also can be rough and dirty, inspired by the adventurer from stories like 2000 miles under the sea or even movies like "Mad Max" or Wild "Wild West".. There are no rules how Steampunk has to look...