Terminal Street Search Results

How To: Install No-Frills Drip Irrigation

Solving a Dilemma This is a simple how-to for a cost effective drip irrigation system for your garden. My motivation to set up my garden for drip irrigation was pretty simple. In the summer, it gets to 90+ degrees outside, and my 50’ garden hose didn’t reach the far extents where I have the majority of my large trees. I noticed a large amount of the water I applied to the trees just ran off and did absolutely nothing. This was a huge waste of resources.

News: Wonder what would happen if all the toilets were flushed simultaneously

Imagine if all 350 million toilets in the United States were flushed at the same time. Granted, doing this would require exceptional coordination, and the helping hands of a few million foreigners. But what if we could pull it off? Would flushing in concert explode all the pipelines, cripple the water supply, flood the streets with sewage, and, in short, destroy civilization as we know it . Could this be the 2012 doomsday LOL...The end of humanity By simple toilets

News: The Right Linux Distro

As many of you Null Byters may know, I was planning on writing this article a week or two ago. Better late than never! So, let's get right to it then—choosing the right Linux distro for your needs.

Uncrackable: Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.

Making Electromagnetic Weapons: EMP Generator, Part One

In this series, I'll be exploring electromagnetic weapons, how to build them, their function and application to the future, and the amazing possibilities electromagnetism has to offer. First, the electromagnetic pulse generator, or EMP. You've probably heard of these before, and their devastating effects on electronics. A simple EMP consists of a capacitor, transformer, trigger, and coil of copper wire. This, when triggered, would produce an intense magnetic field for a brief period, similar ...

News: Useful Vocabulary

Words that will help you with your writing Alliteration - The repetition of aconsonant sound. This si important because it makes words stand out, and because it can help set the mood for something.

How To: Code Your Own Twitter Client in Python Using OAuth

This is my attempt to show people some cool things we can do with programming, and to give a small incentive for people to join the weekly Community Bytes. I wanted to make a tutorial on how to use Twitter from the command line with Python. This would have been an easy project to do not too far back, and a good bit of practice for a beginner to programming. It teaches that you can do useful stuff with programming. However, a while ago Twitter started using something called OAuth to access the...

News: Thankful for the Beauty in a Summer Margarita

I'm most thankful for the simplest things in life...and how they can be so beautiful. Take this margarita I was sipping on a patio with my friends. Just a few friends, chatting...watching the people pass by on a busy street...the summer air so calm and relaxing....and the sip I'm about to take from this beautifully salted margarita. A relaxing moment in time. So simple, yet so precious to me.

How To: Use Wireshark to Steal Your Own Local Passwords

Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their computers to protect from various threats. Here are a few things that should always happen when doing business on computers:

Filter Photography Challenge: Los Angeles and Portland Shots

Ok. My Cell Phone isn't cool like everyone else's. I still wanted to post up some images though. These are my attempts to make something look like it was taken using a filter app for a smart phone. These were inspired by the picture Swell of the Frank Gehry concert hall in downtown LA that was in the post on 50 amazing shots taken using instagram. I had some pictures of it that I thought were pretty cool. So there's two of them here and then a another downtown artsy pictures of Los Angeles, a...

How To: Install "Incompatible" Firefox Add-Ons After Upgrading to the New Firefox

To the displeasure of many loyal Firefox users, Mozilla has been deploying what seems like a new marketing strategy to "catch up" to Google Chrome. I have no idea if this is because the version number is higher than theirs, but it is downright annoying. It's not all complaints, though. Firefox has done an amazing job at completely revamping its source code and redesigning all of its engines, making it a more than worthy competitor to Chrome. However, we are displeased with Firefox because eve...

News: Pregnant Fetus Sucking Zombies

Stay off the streets, lock your doors and grab your shotguns, because zombies are infecting the world over. Well… this Halloween season anyway. With the return of The Walking Dead to AMC a couple weeks ago and the subsequent renewal of a third season, it just goes to show that the undead cannot be killed.

How To: Make an Unbreakable Linux Password Using a SHA-2 Hash Algorithm

In Linux, all password hashes are normally stored using the MD5 hashing algorithm in the /etc/shadow file, but MD5 is algorithmically weak due to collision vulnerabilities. The new recommended standard are the higher level SHA-2 hashing algorithms, SHA256 or SHA512. As a friend pointed out to me, Ubuntu is currently the only distro implementing SHA-2 as the default. With SHA-2, your passwords take an unreasonably larger amount of time to calculate. This will greatly decrease how many password...

How To: Hack Wireless Router Passwords & Networks Using Hydra

Leaving your wireless router at its default settings is a bad idea. The sad thing is, most people still do it. Once they've penetrated your network, hackers will change your router settings so they'll have an easy way back in. This allows them to change your network into a shell or proxy so they can forward their traffic anonymously through you when committing other dirty deeds.

How To: Share Your Laptop's Wireless Internet with Ethernet Devices

Sharing a laptop's wireless Internet connection with other computers connected to its Ethernet port is a great skill to know. It can be good for a number of reasons; Your computer may not have proper hardware to have a standard setup, or you may have an awkward network topology where sharing your wireless Internet via Ethernet would just be a better option.

How To: Get Free Wi-Fi from Hotels & More

Often times when staying at a hotel or anywhere for that matter, you'll whip out your laptop and check the local area for Wi-Fi. I know you've all been in my shoes when you find an unsecured network that appears to be public Wi-Fi belonging to the hotel or airport, and you connect to it. You connect fast and perfectly, only to find that when you open your browser, it says you don't have an account, and are filtered from accessing the web. This is because the owners of the network want to keep...

News: 15 Brilliant Google+ Female Photographers to Circle

In a previous article where I suggested 104 photographers to follow on Google+, I received a lot of criticism because over 90% of the listed photographers were men. While women are currently not a majority on Google+, they are a definite presence, and they are active. Today, I highlight the best female photographers I've found on Google+ so far. This time I'm taking a slightly different approach. Since the best way to get to know photographers is through their work, I've included one photo fo...

News: The Perfect Hack for Enabling NFC Credit Card Payments on Your iPhone 4

Remember the good ol' days when you actually had to swipe your credit or debit card to make a payment at the store? Now all it takes is a flick of the wrist to purchase goods with your card, thanks to RFID (radio-frequency identification) technology from Chase (blink), Visa (payWave) and MasterCard (PayPass). But soon "contactless" payments will be made by an entirely different beast—NFC, which stands for near field communication.

News: Augmented Reality Cinema App Takes You to the Movies—in Real World Locations

The yet-to-be released Augmented Reality Cinema app is sure to make avid movie fans across the world drool. The concept is genius and appears to be quite seamless as well: Simply install the app on your iPhone, take a stroll through your city (supported cities have not yet been released, but the video below shows London), and aim your phone at various locations to view movie scenes that have been previously shot there.

News: XBox 360 Remake-O-Rama!

The aging and maturity of video games as a medium has lead to some unfortunate consequences. One of these, perhaps drawn from the film industry, is the spate of remakes that has overtaken the game market over the last few years. It hasn't been as bad as the remakeorama trend in cinema, but developers have recognized the value in releasing the same thing they already made and making more money off it. Below, a roundup of some remakes of classic games released for XBLA recently, some fantastic,...

Drawing 101: How to Sketch Your First Caricature (Portrait)

If you've ever been to an amusement park or carnival, or even just been on a stroll down the boardwalk or promenade, then you probably know exactly what a caricature drawing is—those cartoony depictions of people or things with extremely exaggerated or oversimplified features that create a comedic effect. Caricatures aren't just for street artists, though—they also work great for political satire and entertainment purposes.

News: Hollywood Billboard Hijack

Via Newsweek Tumblr. Looks like this video and billboard hijacking is the work of DesireObtainCherish, an LA-based street team. The work isn't exactly great art, but it's an amusing form of culture jamming, in which anti-consumerist activists subvert public advertisements.

News: F.A.T. Lab (Free Art and Technology)

F.A.T. Lab (Free Art and Technology) is a network of artists, engineers, scientists, lawyers, and musicians dedicated to the research and development of new technologies and creative media. They are "committed to supporting open values and the public domain through the use of emerging open licenses, support for open entrepreneurship and the admonishment of secrecy, copyright monopolies and patents."

News: People Who Can't Afford Food

These pictures was taken on the bus during my ride going home from work. My heart reaches out to them, Street children who cannot afford to buy food. Who resort to sniffing solvent fumes just to forget hunger and the harsh reality of life.I just wish I could something for them. I saw them on the sidewalk near SM Makati under MRT Ayala Station.

How To: Transform Multiple Screens into One Big Virtual Display

The Junkyard Jumbotron is an amazing project that allows a collection of random web browser enabled displays—laptops, smartphones or tablets—to share a single image split across the group, creating one large virtual display. Created by Rick Borovoy at MIT's Center for Future Civic Media, the app is completely free and open, meaning you can do it yourself in a matter of minutes. It works like this: