Standard Woodworking Search Results

News: Minecraft World's Weekly Workshop: Music to My Ears

This Week's Workshop: Music To My Ears The heart of WonderHowTo's Minecraft World is, naturally, “How-To” and so in the spirit of all things tutorial and DIY we will be hosting a weekly workshop showcasing the best and newest tutorials, builds, and inspiring ideas. We hope to inspire creativity and create a place where the community can share ideas and practice skills, right here on our server.

News: Freemium Games Start Their US Invasion on the iOS Front

For more than a decade, free-to-play games with microtransactions (also called In-App Purchase or IAP) by which players can pay real money for in-game content have been the industry standard for online success in Asia. Mainstream American gamers have long resisted these "freemium" games, with World of Warcraft and other subscription based online games reigning supreme, and being seen as more AAA than their free-ish counterparts. Casual games developers have encountered no such problems, and m...

CryEngine 3: Now Everyone Can Make a Game As Good As Crysis 2… For Free

Crysis 2 is the current standard for high-quality graphics in video games. No other game looks so smooth, so colorful, so... ultra-real. German developer Crytek has built their reputation on PC game technology to the limit, and the CryENGINE 3 graphics engine they used to make Crysis 2 might be the most powerful tool for creating 3D video game graphics on Earth. As of yesterday, it's also free for anyone, yourself included, to download from Crytek's website here.

News: Should Google+ Require You to Use Your Real Name?

Google started culling Google+ accounts. There are two main targets: businesses and those who are using pseudonyms. For businesses, Google is promising to provide their own version of Facebook Pages, which will be released later this year. For those who use pseudonyms, they aren't so lucky. According to Google+'s community standards, users must "use the name your friends, family, or co-workers usually call you". The purpose of this rule is ostensibly to discourage spammers and people from set...

News: Supreme Court Deems Violent Video Games Protected Under Freedom of Speech

Video games are the newest major expressive media. As such, their role in society is still being defined continuously. A monumentally important example of this took place yesterday at the US Supreme Court. After a long deliberation, the highest court in the land handed down a decision invalidating a California law banning the sale of violent video games to minors on the grounds that video games are protected speech under the First Amendment, like movies and books.

News: Google Kills Gaming on Android

One of the biggest advantages iOS has over Android as a mobile platform is how readily and fully it has embraced mobile gaming. There are over 200,000 games available in the Apple store, compared to approximately 100,000 in the Android Marketplace. As an Android-using gamer, this has always bothered me.

How To: Clone a Banana with Jello

Mold making is pretty thrilling—the ability to replicate objects right down to every little crack and crevice seems like something only a machine would be able to do. But in many cases creating a replica from a mold is surprisingly simple. Found on Tasteologie, La Receta de la Felicidad presents a fun alternative to the classic Jello jiggler. For a Dada-esque dessert, try using a banana peel as your mold. As you can see below, it works quite well at capturing the natural texture of the banana.

Echoisms: How to Measure Your Own Attractiveness

Have you ever heard symmetrical is sexier? Yep, according to scientists, symmetry is inherently more attractive to the Homo Sapien eye. Back in the days of Helen of Troy, Phidias, Plato and other great philosophers all observed the golden ratio, "a sum where the quantities to the larger quantity is equal to the ratio of the larger quantity to the smaller one". Confusing? Let's apply it to the human face only: the features of the human head were measured in calculated, precise proportions to d...

News: My China World

Tips China is called Zhong Guo to chinese people which means "Middle Country" or literally "Middle Kingdom" but nobody calls countries kingdoms anymore, not even the chinese.

News: GTA 4 First Person View Mod

GTA4 1st Person View Mod This mod has been out for a while, but with some people gettings Grand Theft Auto 4 for the PC last week because of the Steam sale, there has been talk about what are the best mods to get. There is a thread on Neogaf that talks about playing the game in first person mode instead of the default 3rd person point of view.

News: "How I’d Hack Your Weak Passwords"- The Art of Cracking

Lifehacker posts an article on the art of cracking weak passwords, courtesy of Internet standards expert, CEO of web company iFusion Labs, and blogger John Pozadzides. Pozadzides certainly knows a thing or two about password logic. (Note: this information is not intended to hack into accounts, but rather to protect you from using weak passwords).

How To: Play a G, Em, C and D chord progression on the guitar

This video teaches a simple chord progression consisting of 4 simple chords, G, Em, C and D to learn up to 5 songs. The principle I will illustrate in this video is that popular music often is based on standard chord patterns, or intervals. To demonstrate this, I will play the end part of Led Zeppelin's "Stairway To Heaven" and go right into Jimmy Hendrix's "All Along The Watchtower" -- without changing chords or tempo!

How To: Understand and Provide Indirect Care for CNA Certification

What is Indirect Care? Does it affect the CNA's exam result? Indirect Care entails your behavior in terms of how you communicate with the resident, valuing residents' rights and residents' safety and security. Indirect Care is absolutely important because: (1) it is a graded performance, (2) it has separate score ratings, and (3 )it greatly affects the testees' overall performance during the clinical skills exam.

News: Secure Your Wireless Network from Pillage and Plunder in 8 Easy Steps

Wireless networks. Nowadays, everyone uses 'em, but most don't secure 'em. On average, I can drive up and down any block in my city and find at least one or two open or semi-open networks on any given day. With some changed MAC addresses for good measure, an attacker can use your network as a spring board for who knows what. When the police come a few days after, they are coming to your door—and not to talk about how nice your lawn is. Don't be that guy.

How To: Use the rubber stamp tool in Acrobat 5

In this Adobe Acrobat video tutorial you will learn how to use the Rubber Stamp Tool. You use the Stamp tool in Acrobat 5 to apply a stamp to an Adobe PDF document in much the same way you would use a rubber stamp on a paper document. In addition to the standard stamps offered, dynamic stamps obtain information from your system and from the Identity panel of the Preferences dialog box, allowing you to indicate name, date, and time information on the stamp. Make sure to hit "play tutorial" in ...

News: Basic Math Operations

It was brought up a while back in a Community Call to Arms that *math* is handy for encryption (and let's face it, everything) so let us go over things you just have to know. "In its simplest meaning in mathematics and logic, an operation is an action or procedure which produces a new value from one or more input values."[source]

Glass Cutters Are for Tools: How to Dissolve Glass Using Sodium Hydroxide

Glass is one of the least reactive substances known to chemistry. It is the standard container material for almost all lab chemicals because it's so inert. But there are a couple of substances that have strong reactions with glass. Sodium hydroxide, aka solid drain cleaner or lye, can easily be stored in glass as a solid, but when molten, it reacts violently with glass and can actually dissolve it away! So, the next time you clog up your drains with broken glass beakers and flasks, rest assur...

News: Obama's Rise

So far, I've talked a lot about what's going on in the world around us, but it's time I come back to politics for a bit. That said, the name of this world is somewhat misleading, in the sense that I talk about everything, not just politics! But I digress again.

News: Finding Hidden Metadata in Images (Oh, the Possibilities)

Did you know there is hidden data in your digital pictures? Well, there is, and that data might be a security risk to you. Think back at all of those pictures you're in and are connected with. I'm sure some of those you'd like to distance yourself from. And surely you wouldn't mind checking out the metadata in a few of those images. In this article, we'll be going over how to do just that.

Hacker Fundamentals: A Gentle Introduction to How IP Addresses Work

Imagine you're in Paris and you need to get to Versailles. Looking around for directions, you come to a cold realization—you do not speak a lick of French! How are you going to get to Versailles and what happens if there is a detour? It will be a difficult struggle, and you'd probably get lost and eventually fail. This is why it's important to know some of the country's language before taking that trip in the first place.

News: Advanced Cracking Techniques, Part 2: Intelligent Bruteforcing

Following the first part in this series on advanced cracking techniques, we are going to go over how we can intelligently crack passwords using the old-fashioned bruteforce method. These unique cracking techniques aren't widely used, because most crackers are Script Kiddies who have no idea what the concepts are behind cracking passwords, thus, word won't get around too quickly.