After Thanksgiving, there's Black Friday, the biggest shopping day of the year, with stores offering holiday shoppers the best deals they can muster up. This year's Black Friday was practically a one-day warzone, with Target taking on most of the mayhem (see videos below).
Put simply, SEO = more organic traffic. And more traffic is always good for a web page / website (unless of course, you are an underground drug-dealer selling drugs worldwide via a spooky website whose URLs are as search engine unfriendly as possible, so that no one accidentally discovers your page and informs the police, sending to heaven both an exciting career opportunity and the likely Al Capone's successor).
This article will teach you how to make an error similar to this one (also by me). This error message though, is a yes or no question. Clicking yes and no will give different results. Like the previous error message, this is 100% harmless.
The job market has bounced back slightly in recent months, yet it appears that working remotely will be a way of life for many of us moving forward. With many industries disappearing, app development looks like it's here to stay.
A lot of different places have computers with controls on them for several things; some have controls for installing software, some for running software, blocking websites, opening certain file formats, etc.
So you want to learn the basics of the fantastic language Java, but you don't want to search the Inter-webs looking for a great tutorial. Well you came to the right place, now may I present to you JAVA.
In my Wireshark article, we talked a little bit about packet sniffing, but we focused more on the underlying protocols and models. Now, I'd like to dive right back into Wireshark and start stealing packets.
Wireless networks. Nowadays, everyone uses 'em, but most don't secure 'em. On average, I can drive up and down any block in my city and find at least one or two open or semi-open networks on any given day. With some changed MAC addresses for good measure, an attacker can use your network as a spring board for who knows what. When the police come a few days after, they are coming to your door—and not to talk about how nice your lawn is. Don't be that guy.
There are so many hackers around these days, and they are becoming very smart. So smart that they have successfully taken down many government websites. The most recent attack was on the Department of Justice (DOJ). To read about the history of these hackers, check out Wikipedia.
If you are looking for ways/opportunities for you to be politically involved you have come to the right place. Here is a series of links that will take you to a webpage of a location where you can volunteer in and make a difference. In each section you will find:
I want to write this article because in my childhood, I had experienced internet stalking which ultimately ended in physical stalking which then lead to several attempted abductions. I have now learned how to use the internet safely, who to communicate with and I've learned how stalkers work.
Pygame! And what you can accomplish with it. Another python article... (Blame Alex for getting me hooked on yet another coding language...)
Last week I had a quick look at V.I.K.T.O.R, the anthropomorphized automated editing app that lives on your iPhone, and today it’s time to put it to work.
It's once again Monday, which means it's time to highlight some of the most recent community submissions posted to the Math Craft corkboard. Since two of these posts were on polyhedral versions of M.C. Escher's tessellations, I thought we'd take a look at building a simple tessellated cube based off of imitations of his imagery.
When your computer first connects to a nework, it sends out a request on the network to lease an IP from the router. The router then leases your computer an unused IP address, which is used as a unique routing address for sending traffic that is meant for you, to you. As everything tends to, this method has its flaws.
In Monday's post, we created a sliceform model of a hyperbolic paraboloid. In today's post, we will create a similar model using skewers. The hyperbolic paraboloid is a ruled surface, which means that you can create it using only straight lines even though it is curved. In fact, the hyperbolic paraboloid is doubly ruled and is one of only three curved surfaces than can be created using two distinct lines passing through each point. The others are the hyperboloid and the flat plane.
It's Monday, which means once again, it's time to highlight some of the most recent community submissions posted to the Math Craft corkboard. I also thought we'd take a look at building a sliceform model of a hyperbolic paraboloid.
WonderHowTo is made up niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects.
It's Monday, which means once again, it's time to highlight some of the recent community submissions posted to the Math Craft corkboard. In this post, we'll also make a flexagon, which is a type of transformable object.
Last post, the Sonobe unit was introduced as a way to use multiple copies of a simply folded piece of paper to make geometric objects. In this post, we are going to explore that concept further by making two more geometric models. The first is the truncated icosahedron, which is a common stitching pattern for a soccer ball. The second was supposed to be the pentakis dodecahedron, but through systematic errors last night, I actually built a different model based off of the rhombic triacontahed...
Modular origami is a technique that can be used to build some pretty interesting and impressive models of mathematical objects. In modular origami, you combine multiple units folded from single pieces of paper into more complicated forms. The Sonobe unit is a simple example unit from modular origami that is both easy to fold and compatible for constructing a large variety of models. Below are a few models that are easy to make using this unit.
It's Monday, which means once again, it's time to highlight some of the recent community submissions posted to the Math Craft corkboard. I also thought that we'd try and create something known as an "Orderly Tangle" or "Polylink".
WonderHowTo is made up niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects.
It's another Monday, which means once again, it's time to highlight some of the recent community submissions posted to the Math Craft corkboard. Additionally, I thought we'd take a look at the Mobius Strip.
It's another Monday, which means it's once again time to highlight some of the recent community submissions posted to the Math Craft corkboard. Additionally, I thought we'd take a look at the process of stellation and make some stellated polyhedra out of paper.Rachel Mansur of Giveaway Tuesdays posted a video from animator Cyriak Harris, which zooms into fractal hands, where each fingertip also has a hand and fingers. A few more details can be found here, as well as some other really cool pic...
Google Reader is ostensibly just an RSS aggregator, a tool that lets you catch up on your favorite blogs. How could Google have anticipated that getting rid of its social features could have angered so many people who were actually using it as their default social network, and who enjoyed it precisely because it didn't function like Facebook or Google+?
It's a question I've been pondering a lot lately. Technically, children under the age of 13 are not allowed to join Facebook. But according to a Consumer Reports in May, 7.5 million children 12 and younger are already on the site. Currently, federal law prohibits websites from collecting personal data from children without parental permission. The Children's Online Privacy Protection Act, or COPPA, as it is more commonly known, has been in effect since 1998, but has not been updated since.
Formerly ipchains, iptables is a script-based firewall that's included with both Mac and Linux operating systems. In my opinion, it's the best firewall in existence. The only downfall is that it's complicated for some people to use due to its script-based nature. But this should be disregarded, as firewalls are nearly the entire security of your computer.
Now that Google+ is open to everyone, there are a lot of new people who aren't techies trying out the service. When you first sign on, it can be overwhelming. I've decided to round up a bunch of resources to help you get started, and recommend some people for you to follow, if you want to stay on top of tips and new announcements.
There's nothing better than playing a game of Scrabble, feeling the smooth wooden tiles in your hand and savoring the heavy fumes of cardboard, cheap wood and plastic as you rearrange the letters on your rack into the perfect word. You try to keep a straight face while you watch your opponent sweat, but you can't help but release that diabolical grin of self-admiration as you play the elusive triple-triple. The score's recorded and you feel sorry for your bitter rival, but then you remember y...
Last week's round up was all about third party services that sprang up to fill any Google+ voids. This week, I'll let you know how to keep up with the latest Google+ updates, and give you some great tips for interacting with your followers.
If you want more people to follow you on Google+, you'll have to work for it. Not everyone can be +Tom Anderson or +Robert Scoble overnight, you know.
Now that you can invite anyone you want to Google+, the floodgates are open. If you've been bummed out about not being able to share the joys of Google+ with your friends and acquaintances, make use of that handy envelope icon the right side of your stream page. Just enter the email addresses of the people you want to invite, and hit the "Invite" button.
Everybody has them. You can say you don't, but it's probably a lie. There's at least one person on your mobile phone that you never, ever want to pick up the phone for. When they call, you cringe and immediately hit the silent button. They're annoying. Overbearing. You hate them, but yet you love them enough to not delete them entirely from your contact list. Maybe if they called just once a week, but once a day is just too much for you to handle. What do you do?
I've struggled for a long time trying to set up a virtual network between my KVM virtual machines. I tried several forums and tutorials on the web, but still on my system it just wouldn't work. I eventually got it owrking, so I've decided to make some notes of my own. Hopefully it will be helpful to you as a reader as well.
The days of having to pay for video games are over. Generally, retail games are better because they're made with more effort and care than their free counterparts. But free browser-based game sites are insanely popular, specifically Kongregate, Armor Games, and the grandaddy of them all—NewGrounds. Despite not receiving funds directly from the players, they’ve become a profitable niche in the games industry. And that popularity has attracted more talent and money to the production of web game...
Real-time strategy (RTS) was the most popular genre in PC games at one time. It put Blizzard on the map—one of the biggest game developers in the world. And it buried the once venerable turn-based strategy genre, the only survivor being the Civilization series. But like hair metal in the late ‘80s, RTS reached its saturation point. Many bands (games) were too similar and used ornamentation over innovation. Suddenly, the fans left. From ’95 to ’03, Command & Conquer releases were more like new...
Movies like to show hackers breaking passwords with fancy software and ludicrous gadgets. The reality of busting passwords open is much more mundane. Simple as it may sound, most passwords are broken purely by guesswork. Check out this infographic from ZoneAlarm, as well as this list from the Wall Street Journal of the fifty most common passwords gleaned from the 2010 Gawker hack. If your password is on one of those lists, you need to change it. Right now.
noob - Short for "newbie." Someone with little to no experience or skill. In some gaming communities, there is fierce debate over the distinction between "noob" and "newb"—one being derogatory while the other simply indicates being a novice. While some may argue the semantic differences, "noob" is the most common spelling seen around the internet, for both purposes.