Typically Generates Search Results

How To: Improve Water Head

An experiment was carried out at our laborataries to investigate the flow through two pipes of same diameter fitted at the same height from water level inside of a water tank as shown. It is found the longer pipe line inside the water tank generates a higher speed resulting more powerfull flow. Flow in this pressure pipe develops due to gravitational accelaration on a horizontally flowing water column also, when it is an enclosed stream of flow. If this length is short it is not possible to d...

How To: Convert PDF Documents to JPG Images Online for Free

PDF is a convenient format for documents that can embed text and pictures and can be read by almost any device—personal computers, laptops, smartphones, etc. However, PDFs are mostly read-only files, so sometimes it's necessary to convert them to JPG images, a universal format for pictures. JPGs can be modified by software such as Adobe Photoshop or posted on Facebook.

How To: Practice good golf club grip

The way you place your hands on the golf club will have a direct relationship to the flight of your ball, as demonstrated in this how-to video. If your grip is too weak, the clubface angle at impact will be off line, which will cause the ball to curve. The bottom edge of the clubface needs to be straight to the target line in order for the ball to fly straight toward the target. A good golf grip would be considered neutral, that is, neither weak nor strong. A neutral grip will allow your hand...

How To: Bake Cape Cod lemon butter scrod

Scrod sounds good, right? This fish will satisfy your seafood craving. But wait… is scrod even a fish? No. If you're not from the New England-area, you probably would never know this, but scrod is not a fish at all. It's often misconceived as being a type of fish. However, scrod is a New England term that refers to any white fish that has been split and boned before sale, typically cod or haddock.

How To: Catch fish using a football-shaped jig

Large, sweaty men are usually the first thing that comes to mind when you hear the word football, but for this video, we're not talking about the guys on the playing field, we're talking about the guys in the fishing boat, the kind of guys who like to use a "football jig".

News: Laser Blasts 2 Megajoule Beam 1,000 Times Stronger Than All U.S. Power Plants Combined

You might already know a little bit about what the National Ignition Facility has been up to lately, or what they could possibly achieve. But last week, even the scientists at the Livermore, California station couldn't predict the awesome power that their humongous laser was capable of. NIF's laser is already the record holder for the world's largest laser, and now it can also claim to be the first ever 2 megajoule ultraviolet laser after it generated nearly 100 times more energy than any oth...

Uncrackable: Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.

Master the Power: How to Shock People with Your Fingertips

In this article, I'll be showing you how to make a simple yet effective static electricity generator. Basically, this device allows you to carry a constant static charge on your body and discharge it on anything grounded or of opposite polarity. The electricity generated is around 8-10 kV, at a very low current. The shock is enough to startle your friends, just like a static shock from a trampoline or carpeted room. You'll need a little experience in soldering and circuit design to build the ...

Making Electromagnetic Weapons: The Theory Behind EMP Generators

This is the third part of my electromagnetic pulse series (see Part One and Part Two). By now, I've covered the hardware and general concept of electromagnetic pulse generators, but how exactly do they disable electronics? How can an invisible field of energy have such a catastrophic effect on computers, cell phones, and most any other electronics? I'll be answering all these questions in part three of Making Electromagnetic Weapons.

Understanding Electricity: Nikola Tesla

Nikola Tesla In my opinion, one of the most neglected inventors of all time. The names Edison and Marconi come to mind as familiar, but Tesla? Most think of a car. Few know that Tesla is responsible for alternating current, florescent lights, radar, remote control, generators that preform efficiently, the spark plug, and many others. The U.S Supreme Court declared in 1943 that Tesla, not Marconi, was the true inventor of the radio.

How To: GPU Accelerate Cracking Passwords with Hashcat

How to Crack Passwords Faster by Putting Your GPU to Work with HashcatSecurity on the internet is always changing. Not too long ago, having a 10 character password meant that you were safe from all forms of hash cracking. Hash cracking is when you take a string of characters that have been passed through a cryptographic hash and try to reverse them. The normal processors that are housed inside of our computer cases are general purpose. The processors are not meant for handling complex math an...

How To: Mine Bitcoin and Make Money

Bitcoin is a new currency built off "Satoshi Nakamoto's" (alias) 2008 Bitcoin white-paper. Bitcoin provides its users with a way to make peer-to-peer (P2P) transactions without having to use a bank as a mediator. There is no middle man, no corporation backing it, and no one has access to your money, except you. It's decentralized from government, run by the people, for the people.

Tartine Bread: The Beauty and Artistry of Bread Making

Unfortunately, I'm a little behind schedule on my pizza dough making mission, but I promise - more experiments coming soon! In the meantime, here's a beautiful video about the nuance that goes into bread making, as demonstrated by famed San Francisco baker Chad Robertson of Tartine Bread. Bread and pizza dough go hand-in-hand, and I've been thinking about picking up the Tartine cookbook for some time now. As I mentioned above, the nuance that goes into the process is really pretty remarkable....

News: Until Project Rainfall Succeeds, We Must Hack the Wii for Xenoblade Chronicles in North America

For as much money as they've made from North American video game audiences over the years, Japanese game developers don't seem to have very much faith in them. Dozens of great titles from their 40 years in the industry have appeared in Japan and across Europe, oftentimes even in English. But they never make it over to America, like Mother 3, Last Window: Midnight Promise, Dragon Force 2, and Tobal No. 2 (that one didn't even hit Europe).

Games That Act Like Films: Are They Really 'Bastard Half-Children'?

Many gamers see the film industry as the premier model that video games should follow, and it's no surprise. Movies are seen as the most legitimate and profitable of all artistic visual mediums, which is certainly qualities practitioners of any new medium would desire. Big budget games like Heavy Rain and L.A. Noire strive for the same level as film by aping its techniques, focusing on storytelling in a cinematic fashion, rather than creating compelling gameplay experiences.

3 Dreams Of Black: An Interactive Music Video You Can Create and Control

Video games are the most prevalent type of interactive media, but certainly not the only one. The interactive music video for the song "3 Dreams of Black" by supergroup ROME and digital artist Chris Milk utilizes the latest web design technology, video game influenced art and interactivity, and large crowd-sourced elements to form a compelling work of art. ROME is composed of producer extraordinaire Danger Mouse, Italian film composer Daniele Luppi, Norah Jones, and Jack White. Their recent e...

An App for Stalkers: "Creepy" Geo-Locates Based on Social Networking Activity

With the globally rampant use of such social networking platforms as Facebook, Twitter, and Foursquare, the issue of privacy has become a prevalent concern for many. And for good reason—there's the violation of Facebook employing user names in ads, the Etsy slip-up, and of course, the everyman act of recklessly sharing too much information via common social media outlets: a night of drinking results in morning after embarrassment, or worst case scenario, sloppy Facebook posts and tweets resul...