Website Rates Search Results

Lockdown: The InfoSecurity Guide to Securing Your Computer, Part I

This is a two-part series to locking down the computer to provide maximum protection. Even though this guide will sound intrusive, we are talking about reality here. Extreme measures must be taken to protect our computers, especially when we have confidential documentation or do internet banking, which many people do. We all have to use electronic devices at some stage, whether it be for business or personal use.

How To: Create a string figure Owl

Did you play Cat's Cradle as a kid? Well, there's more to string figure art than just Cat's Cradle or Jacob's Ladder. This string art video demonstrates how to make a string figure owl. Song: King Crimson - In the Court of King Crimson.

How To: Create a string figure Moth

Did you play Cat's Cradle as a kid? Well, there's more to string figure art than just Cat's Cradle or Jacob's Ladder. This string art video demonstrates how to make a string figure moth. Song: Warhorse - Woman of the Devil.

How To: Create a Drybrush Painting of Bob Marley

I usually do step-by-step drawing tutorials, but I found drybrush technique to be fascinating and possibly superior to pencil drawing. Pencils are limited tools because they can only be applied with a point of some sort (with the exception of a graphite stick), while paintbrushes allow artists to think in terms of shapes instead of lines. If you look around the room that you are currently in, I guarantee you that you will not see anything that resembles an edge that a pencil gives you; the wo...

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers

In the first part of this series, we learned about darknets, as well as how they came about. But these patches of forgotten Internet are not the oasis of free information you might think. Despite being hidden—or just harder to come across—these networks are no more safe then anywhere else on the 'clear' Internet. The nature of networking and routing means your location is always known in server logs. It only takes one phone call to your ISP with your IP address to obtain both your physical ad...

How To: Build a Wireless Energy Transfer Array to Power Light Bulbs Without Plugging Them In

In this article, I'll show you how to built a Wireless Transfer of Energy Transmitter. Simply put, this device will send electricity to a florescent light bulb and light it up, from up to three feet. The idea originally (at least, prominently) came from Nikola Tesla (read more about this amazing inventor here), who used his Tesla coils to transfer wireless energy to light bulbs in demonstrations (photo below). However, the circuit described in this article consists of a flyback transformer, n...

Making Electromagnetic Weapons: EMP Generator, Part One

In this series, I'll be exploring electromagnetic weapons, how to build them, their function and application to the future, and the amazing possibilities electromagnetism has to offer. First, the electromagnetic pulse generator, or EMP. You've probably heard of these before, and their devastating effects on electronics. A simple EMP consists of a capacitor, transformer, trigger, and coil of copper wire. This, when triggered, would produce an intense magnetic field for a brief period, similar ...