Trading Activities Search Results

How To: Draw a nerdy guy with glasses, braces and big ears

Portrait drawings are difficult for most artists, but one thing's for sure— drawing nerds is as easy as they come. Nerds are easier to draw because you can stray from the formality of portraits, putting your own spin on it, over-compensating the details, exaggerating the dorky features. It's a drawing class in its own, and Merrill shows you how to draw his version of the NERD!

How To: Make a level one boffer sword for LARPing

If you're a LARP maniac, or just a fan of LSD-themed (Latter-day Saint) games and activities, then this tutorial is perfect for you. Watch this video to learn how to make a foam-padded sword that is easy and inexpensive. This level one boffer sword will take care of your LARPing opponents in no time. If you're a fan of live action role-playing, then this boffer sword is just the beginning. The first video shows you step-by-step how to make this foam sword for awesome LARPing. The second is ju...

How To: Play with a Rubik's Cube Lego puzzle

Puzzles include multiple pieces each with a designated pattern so that when a user regroups the pieces, a picture or a particular image is presented, which provides practice to the coordination of the user's concept to space and structural relationship between pieces. However, no matter how large the quantity of the pieces is, puzzles only provide user's spatial concept in two dimensions. To enhance spatial concept and increase entertainment to the user, building blocks are promoted so that u...

How To: The Best Learning Apps on Your Phone for 18-Month-Olds

Give an 18-month-old a shoe, check back 10 minutes later, and it's a very big maybe he will have it on his foot. But give him your smartphone, and in a mere five minutes, he can take 100 pictures of the carpet, send weird messages, and delete essential apps. Imagine what your child could do if they were able to harness this technical aptitude and put it to good use — and they can, with learning apps.

How To: Buy Bitcoin Anonymously — A Guide to Investing in Cryptocurrency While Maintaining Privacy

Just like cash, bitcoin is used for everything from regular day-to-day business to criminal activities. However, unlike physical cash, the blockchain is permanent and immutable, which means anyone from a teen to the US government can follow every single transaction you make without you even knowing about it. However, there are ways to add layers of anonymity to your bitcoin transactions.

News: Here's What the 2018 LCD iPhone Could Cost

This year will be an interesting one for iPhones. With speculation that the expensive iPhone X is underperforming, rumors have circulated that Apple will release three "bezel-less" devices, one of which will cost less by omitting the OLED panel for a traditional, yet large, 6.1" LCD. Now, thanks to the source of this rumor, we have an idea how much that lower-tier iPhone will cost.

News: Baidu Teams Up with Leading Chinese Tier-Ones for Driverless

Baidu signed a cooperation agreement on June 7, the first day of the CES Asia conference, with multiple companies in the autonomous vehicles industry. The companies listed in the press release include Desay SV, United Automotive Electronics, and Hangsheng Electronics, as well as possibly additional auto manufacturers. Baidu plans to "jointly develop" upcoming intelligent driving production plans.

How To: Create a Reusable Burner OS with Docker, Part 1: Making an Ubuntu Hacking Container

Containers are isolated software instances representing applications, servers, and even operating systems—complete with all of their dependencies, libraries configuration files, etc.—and they're taking over the corporate world. The ephemeral, portable nature of containers help them stay current and speedy, and they can work on pretty much any computer, virtual machine, and cloud.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 13 (Browser Forensics)

Welcome back, my novice hackers! In this series, we have been exploring how a forensic investigator can find evidence of illegal or illicit activity. Among other things, we have examined the registry and prefetch files for artifacts and have done some rudimentary forensic analysis. For those of you who are seeking career as a forensic investigator or security engineer, this can be invaluable training. For hackers, it might be life-saving.

News: Actual iPhone 6 Leaks Confirm Previous Leaks Were Spot On

Over the weekend—just days before Apple's big event—an actual iPhone 6 leaked on Chinese site cnBeta. Again, nothing here that we already didn't know about—Sapphire screen, round(er) corners, larger display, and new button stylings. Below are images of the new iPhone 6 next to the current iPhone 5S. We can clearly see the protruding camera module as well as sections on the top and bottom of the back where the antennas will be housed. A second source was able to put together some videos, as yo...

How To: Convert Your Old Apple iMac G4 into a Cable-Ready HDTV

Most of us have traded our desktop systems for laptops, tablets, and mobile devices, meaning there's a lot of outdated hardware sitting in attics. Want to give your old computer a new purpose? Matthew Chappee turned his iMac G4 into an HDTV using the guide by Dremel Junkie. One thing to note before you take on this project yourself is that if you want to use it to watch cable, you'll need a converter box to get around the MPAA's HDCP restriction. But, a converter box is considerably less expe...