Service Runs Search Results

News: Run USB through phone lines

One of the many reasons Circuit City should go out of business is their sale of ridiculously expensive cables, wire and cords. The secret to the industry of Monster Cables is that it is unnecessary and ineffective. Gold-plated or otherwise, Monster's $100 cables are not intrinsically better than the cheaper versions they're stocked next to. Don't believe us?

How To: Control Running Bamboo

Most bamboo in the United States is running bamboo, because nearly all cold hardy bamboo is the running or invasive type. The tropical bamboos are mostly "clumpers" and stay in a nice, tight clump. Running bamboos spread far and wide and can be very invasive. I grow many kinds of running bamboos and over the past 20 years I've had to learn how to control it's spread.

News: The Wet Potato Race!

Im Going to keep this short simple and disastorous. Opening Scene: The guys Ehren, Bam, Steve O, Pontious, England, and Preston are standing on the shore line of the Santa monica pier. Dressed in Speedo bathing suits, (pontious in the bunny lifeguard suit) all the guys will have watter skis on ready to take off from the shore line they are all holding ski ropes attached to a boat. Cut to: Boat being Captained by Henry Rollans and his trusty Ship Mate Johnny Knoxville. Rollans stands up and ye...

How To: Join Second Life and Create Your Own Avatar

On June 23, 2003, Linden labs created a free client program known as Second Life. This program allows users, or residents, to interact with each other in a virtual world by using avatars. Thanks to this program, residents are able to explore, socialize, and create and trade virtual property, and services with each other. Second Life has become one of the most popular programs used by various age ranges from 16 to 60, but how do you enter this world and get your own avatar?

How To: Remotely Control Computers Over VNC Securely with SSH

VNC is a great protocol that you can use on Windows and Linux machines to remotely control computers. This is useful if you need to control your computer when away from home, help your grandma check her email, or help a client with a disk cleanup. VNC is secure in the sense that it requires authentication in order to make the connection, but after that, the data is sent over the internet unencrypted. This means that an attacker could sniff your traffic and snoop everything that's going on. Th...

How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration

If you've ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. Even with today's most advanced methods of defeating piracy in place, it is still relatively easy to crack almost any program in the world. This is mainly due to computer processes' ability to be completely manipulated by an assembly debugger. Using this, you can completely bypass the registration process by making it skip the application'...

How To: Make a Redstone Death Machine

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Oh, the power of redstone! But, what good is any technology if it can't be harnessed for killing? Here's a redstone build for the mad scientist in each of us.

News: Trailers from Hell

Lately I've really been enjoying Trailers from Hell, and while a lot of the movies they do are from before my childhood, it's run by Joe Dante and he was, like, a staple of it. So that counts, right?