On Line Financial Search Results

Hide Your Secrets: How to Password-Lock a Folder in Windows 7 with No Additional Software

Today's guide is on creating a password protected folder on Windows 7 without any additional software. Yes, you heard that right. No extra software at all! This guide is intended for beginners. But please note, this method should not be used to store financial or otherwise highly confidential material. It might be a good place to hide a planning document for a family member's birthday party or similar occasion where you need to keep something secret temporarily.

Horror Photography Challenge: Guitar Ghost

I thought this one was interesting. Long exposure while zooming out. All of the bright spots from the guitar became streaking lines. Maybe not that scary but I thought it was an interesting technique with an interesting result. Probably would have worked a lot better in a better location! My classroom isn't that interesting.

News: Iconic Indie Game Publisher Interplay Struggles to Make a Comeback

For more than a decade, Interplay was arguably the best video game publisher in America. Their list of games is a who's-who of the most creative and forward thinking games of the '90s, including everything fromOut of This World to Alone in the Dark to Earthworm Jim to Descent. They've been around since 1983, but have fallen on hard times since 1997, when they became a public company. They were acquired by a French publisher who then went bankrupt. They were forced to close their internal deve...

News: Famous Indie Game Makers Immortalized in 'The Indie Game Legend'

The indie game scene is constantly expanding, but in 2008, Minecraft, Braid and Angry Birds had not been released, along with all of the other indie games that established the financial viability of the format. Indie games were the all-but-exclusive purview of free Flash game sites and the proud users of TIGsource.com. The Independent Gaming Source is a massive forum for indie game developers to share their projects with like-minded individuals, while seeking help and approval of their games.

News: Battlefield 3 - 12 min "Fault Line" Trailer

Wow. I'm not much of an MW or BF player but the first 12 minutes of the game are visually impressive, probably the best graphics and animations I've ever seen. Lots of game has great graphics but if the animations are not up to par (The Witcher 2), the game suffers considerably.

Rodarte - Spring '11 (DP: Matthew Lloyd)

Todd Cole directed this beautifully shot (DP Matthew Lloyd) and art directed preview of the Rodarte Spring '11 line. The visual execution of this ostensibly simple concept is flawless; there are no extraneous colors whatsoever. Clarity of vision and preproduction certainly paid off.

News: Singing rhymes...

"twinkle twinkle little staar.............." mmhhh.." how u wonddd"... mmhhh.. scratching the head wondering what is the next line...ohh..the sweet voice with broken language is the best song we can hear ever...

News: Bodies in Plain Sight

Choreographer Willi Dorner's curiously charming “human sculptures” invade New York City as part of the French Institute Alliance Française’s Crossing the Line festival. More images of Dorner's Bodies in Urban Spaces at the Wall Street Journal photography blog.

News: Can you do a zine in 24 hours?

Who says zines are dead? This is a challenge along the lines of National Novel Writing Month. In the month of July, this site challenges you to create a 24 page zine in 24 hours. No preliminary planning. What sort of zine would you create?

Tres French: food+sex+scat=happy death

For an ivy league freshman in 1973, it was simply a rite of passage to take a date to a foreign film. I would pretend (oscar worthy effort by yours truly) to adore each film...for the simple purpose of maybe getting lucky with an ivy league female. By accident, I actually enjoyed this insane film. Border-line pornography, it made excess an art form.

How To: Abuse Vulnerable Sudo Versions to Get Root

Anyone who has used Linux long enough is familiar with sudo. Short for superuser do (or substitute user do, depending on who you ask), it allows users to run commands as either root or another user on the system. From a hacker's point of view, sudo is often all that stands between them and root access. We'll be exploring an older vulnerability in sudo that allows a user to run commands as root.