Three-dimensional printing is one of the many wonders of modern technology. It's the first step towards real life Star Trek replicators and Timeline-esque teleportation chambers. While we aren't at the level of reconstructing strands of DNA, it's already possible to make tons of fun and useful designs on a 3D printer.
Who doesn't love Star Wars? No one, that's who. And if you love Stars Wars, logic would follow that you like lightsabers, so central are they to the tale's mythology. It's part sword, part laser, and makes a sound like a humming motor have multigasms. If I saw one in real life, I would struggle not to lick it, even though that would mean death.
There is nothing more annoying than a greedy roommate. It's absolutely infuriating to wake up and find the cookies your mother just made for you gone without a trace. Your favorite drink is empty and the homemade meal you worked so hard on the night before is nowhere to be found. This irked me so much that I made this shocking cookie jar. When a cookie burglar touches the side and the lid of the jar simultaneously, a small electric shock stops them in their tracks.
For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.
Last Thursday's post demonstrated how to Make Yin-Yang Pillow boxes, which were based on equilateral triangles and squares. The units for making these boxes were created by Phillip Chapman-Bell, who runs an amazing origami blog and has a spectacular flickr photostream. Using these units, you can make also make 4 of the 5 platonic solids. I made an additional template based on the regular pentagon so that the dodecahedron can be built completing the set.
Dropbox continues to make headlines with their recent programming blunder which left the accounts of its 25 million customers wide open during a four-hour time span. During the duration, anyone in the world could access any Dropbox profile by typing in any password. And seeing as this wasn't the first security failure, everyone, including the most loyal users are considering dropping the Dropbox.
L.A. Noire is the newest Rockstar (GTA4, Red Dead Redemption) game created by Team Bondi ( The Getaway). The game is set in the late 1940’s in Los Angeles. The main character, Phelps, is a war veteran rising through the ranks from police officer to detective. The game is presented in mini episodes (one case per episode) and flashbacks. Once you finish a case, you go straight to the next one. Having played four cases where the character moves from police officer to detective, here are my initi...
Dear Miss and Mrs. H, I love your blog! Its nice to get two completley different opinions on one subject. I have a couple questions for you both and then need some advice.
There's a lot that you can do in The Elder Scrolls V: Skyrim. Sure, you can do the predictable thing and be a gay cat-man that shouts at dragons to death. But you can also take on even the most mundane of tasks. Want to make pies for twenty hours? There's an oven right over there, get baking. How about living an honest life as a blacksmith? Well, by golly, you can do it!
It’s hard to know where to start talking about a book like 2666. That’s partly because, in some ways, it’s actually five books. Published posthumously, the book begins with “A Note from the Author’s Heirs” explaining that, before his death, Bolano stipulated the book be published as five separate works. Instead, his friends and family opted to publish Bolano’s novel as he originally would have – as one single volume divided into five parts. Ultimately the five parts belong together. They shar...
If you've been reading, watching or listening to the news, you sure know about the Trayvon Martin case. If you visit this site often, you may also have noticed that I've not put up any news on this case. I have my reasons. And this post will describe why.
If you follow the Anonymous, Occupy, and IT security scenes, you have no doubt heard about a dox release. What is it? How can it hurt you? And most importantly, how can you protect yourself from it? Some of these steps might seem common sense, while others will be an ah-ha! moment. Your private info is both your biggest weakness and your biggest weapon in your battle to remain anonymous. You must learn how to use it as both.
In the first part of this series, we learned about darknets, as well as how they came about. But these patches of forgotten Internet are not the oasis of free information you might think. Despite being hidden—or just harder to come across—these networks are no more safe then anywhere else on the 'clear' Internet. The nature of networking and routing means your location is always known in server logs. It only takes one phone call to your ISP with your IP address to obtain both your physical ad...
Using water color paper and tracing paper are a few necessary and useful tools that will help you paint a rooster with watercolors. Learn more about watercolor painting tools from a professional artist in this free painting video. Paint a rooster with watercolors - Part 1 of 26.
The last few months of WikiLeaks controversy has surely peaked your interest, but when viewing the WikiLeaks site, finding what you want is quite a hard task.
I am writing this quick post in response to the recent earthquakes and tsunamis that are affecting Japan. As soon as the news broke, and we began to hear of tsunami warning for our area, I immediately realized how under prepared I was for a natural disaster. The thing that drove this point home even deeper was the number of people asking me for advice on what they could do to prepare for the possibility that we are hit by one of the resultant tsunamis. Many thoughts raced through my mind, and...
Over the past couple of weeks, there have been a series of high-profile hacks and leaks. From the rooting of CombinedSystems, to a secret FBI conference call leak, all the way to the distributed denial-of-service (DDoS) attacks on U.S. government sites—with a lot in-between. As governments move to close their long fingers around the free speech that exposes their secrets, this shadowy collective of loose-knit, but like-minded individuals are hell bent on preventing them. Or are they?
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called caching. For example, when a site is down, you can view its cached page on Google.
Remember what life was like before your iPhone? Before there were palm-sized smartphones with seemingly endless features, there were phones like Motorola's RAZR that peaked with its embedded camera. Before that, there were simple flip phones with texting capabilities, bulky two-pound Gordon Gekkos—even briefcase phones.
By Ethical Traveler As the world becomes ever more interconnected, being an ethical traveler becomes both easier and more urgent. Travelers today have access to far more information than we did even 10 years ago. We can observe–almost in real time–the impact that smart or selfish choices, by governments and individuals, have on rainforests and reefs, cultures and communities.