Referred Search Results

News: Shibumi

In the dojo, what ISN’T said is often as important as what IS said. To most of us who’ve been raised in the USA, the reticence we encounter in the dojo can be off-putting. American society is very “content” oriented. Our legal contracts, for instance, run for pages and pages. Everything needs to be spelled out. In “context-oriented” societies there is far less reliance on such a literal approach. Much more importance is placed on the relationship between the two parties entering into an agree...

News: HTC to Make This Year's Nexus Devices

HTC is developing the latest Nexus phones for Google, according to a recent tweet from Evan Blass, a well-known phone leaker. Blass reported that the new Nexus phones will run Android N, and are being referred to as the M1 and S1. Android Police backed up Blass's tweet and added that a source told them the new handsets will be named "Marlin" and "Sailfish."

How To: 15 Super-Practical Uses for Petroleum Jelly

In 1859, 22-year-old chemist Robert A. Chesebrough accidentally discovered petroleum jelly when he visited a working oil well in Titusville, Pennsylvania. Oil workers complained of a gooey substance referred to as "rod wax" which kept getting into the machinery and slowing them down. Chesebrough noticed that oil workers also smeared this same substance on their burn marks or dry skin to help speed the healing process.

How To: Hone Your Sixth Sense

You know that tingly spidey feeling you sometimes get urging you to make a crazy career change or warning you against trusting a smooth-talker with your money? Commonly referred to as your gut instinct, intuition or sixth sense, your ability to subconsciously know something or suspect something beyond the realm of conscious reasoning can help you in all aspects of your life, from interpersonal relationships to big life decisions.

How To: How Cross-Site Scripting (XSS) Attacks Sneak into Unprotected Websites (Plus: How to Block Them)

XSS stands for cross-site scripting, which is a form of web-based exploitation that uses client-side vulnerabilities in a web page to execute malicious JavaScript codes. JavaScript is referred to as "cross-site" because it usually involves an external website containing the malicious code. That code is most commonly used to steal cookies with a website that the attacker created and hosted on another server. The cookies can then be used to escalate privileges and gain root access to someone's ...

Scrabble Bingo Weekly Roundup: Shlemiels, Cynosures and Yanquis

Bingo! No, this isn't the game where balls fly around in machines and players dab their cards with daubers. In a game of Scrabble, bingo refers to the bonus a player receives when emptying their rack in one turn, which gets them an extra 50 points on top of whatever their play was. Even if you had two blanks on your rack and didn't utilize any premium squares on the board, you'd still have an impressive 56-point turn (at least) by using all 7 of your letters.

How To: Oktoberfest

Oktoberfest is the world's largest annual beer festival located in Munich, Germany! The festival starts in late September and lasts until early October -approx 16-18 days. Oktoberfest is an important part of the Bavarian Culture and has been going on for over 200 years. Each year the festival is held in an area called Theresienwiese, but often referred to as Wiesen for short. Wisen is located near the center of Munich. Oktoberfest is held as one of the world's largest fairs with over 5 millio...

Privacy Is So 2001: An Anime Video Game Novel About Social Media

Japanese people are into many things Americans find weird—like YouTube's beloved canine-hosted cooking show or Daito Manabe's light up LED grills or even more insane, a vending machine that distributes live crabs. In light of these cultural oddities, the Japanese phenomenon of visual novels (NVL, or bijuaru noberu), seems relatively normal. A meeting place of books and video games, visual novels are a sort of "Choose-Your-Own-Adventure" for the new generation.

How To: Measure Radiation in Japan, Plus Other Sources of Common, Everyday Intake

In the wake of the recent tragedy in Japan, Southern Californians have been hyper alert to any news regarding dangerous levels of nuclear radiation drifting over from Fukushima. At this time, official statements from the California Department of Public Health and the EPA are assuaging the population that there is nothing to fear. While there has been some detection of radiation in the air, the current levels recorded are "thousands of times below any conservative level of concern". But despit...

How To: Pick Basic Tumbler Locks

Professionally and academically speaking, I am a computer scientist, but I also enjoy lock picking as a hobby, so I thought I would share what knowledge I have with this. Before we start doing anything, first we need to understand the fundamentals of how locks work and then acquire and familiarize ourselves with basic lock-picking tools.

News: Canon's 5D Mark II Invades Hollywood

Since its release three years ago, Canon's EOS 5D Mark II has been the most sought out digital SLR for photographers everywhere. But it's also becoming a favorite amongst cinematographers, thanks to its compact size and high-def video recording mode, seeing action in everything from independent features to Hollywood blockbusters and even big network TV shows.

News: Basic Math Operations

It was brought up a while back in a Community Call to Arms that *math* is handy for encryption (and let's face it, everything) so let us go over things you just have to know. "In its simplest meaning in mathematics and logic, an operation is an action or procedure which produces a new value from one or more input values."[source]

How To: Things to Do on WonderHowTo (05/23 - 05/29)

WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most popular communities. Users can join and participate in any World they're interested in, as well as start their own community.

How To: An Entry Level Guide to Finding and Reading Logs (And Maybe Staying Out of Jail)

Big brother is watching when you're playing around on another system—and big brother is that system. Everything from operating systems to intrusion detection systems to database services are maintaining logs. Sometimes, these are error logs that can show attackers trying various SQL injection vectors over and over. This is especially so if they are using an automated framework like sqlmap that can spam a ton of requests in a short time. More often than not, the access logs are what most amate...

Hacking Reconnaissance: Finding Vulnerabilities in Your Target Using Nmap

Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and root boxes, you'll need to learn how to perform the necessary reconnaissance first. In fact, you will spend far more time researching your target then you will exploiting it. In this article, I am going to show you the fi...

How To: Detect Facebook Spam

Spam is everywhere and Facebook is no exception. In fact, spammers are constantly stepping up their game by tricking unsuspecting Facebook users to participate in quizzes, games, apps, or "new features" that are actually dangerous computer viruses, spyware, or other trojan horses in disguise. Their attempts even trick people into unknowingly becoming spammers themselves.

Redstone Logic Gates: Mastering the Fundamental Building Blocks for Creating In-Game Machines

Many people get so discouraged by their failures with redstone that they give up using it entirely, or never progress beyond using simple switches. However, by incorporating logic gates into your redstone designs, the applications are nearly limitless. The ability to add multiple switches to your machines is just a small part of what logic gates can do. Most importantly, they give you control.

News: Secure Your Wireless Network from Pillage and Plunder in 8 Easy Steps

Wireless networks. Nowadays, everyone uses 'em, but most don't secure 'em. On average, I can drive up and down any block in my city and find at least one or two open or semi-open networks on any given day. With some changed MAC addresses for good measure, an attacker can use your network as a spring board for who knows what. When the police come a few days after, they are coming to your door—and not to talk about how nice your lawn is. Don't be that guy.

News: World's Greatest Bento - Plastic Japanese Meal

Anna The Red is the greatest Bento artist I have come across on the web. She's so highly regarded she even did an ad for Google. Check it out: For those of you who don't know, Bento is a "single-portion takeout or home-packed meal common in Japanese cuisine". When bento is arranged in an elaborate style (such as people, animals, characters, plants, etc.) it is referred to as kyaraben or charaben (a shortened version of character bento).