This pdf has a couple of fun bash shell tricks, such as using find, replacements for the up arrow, cut, sed, awk and a few more in a very readable format.
Unix_Command-Line_Kung_Fu_ SANS .pdf application/pdf Object.
This pdf has a couple of fun bash shell tricks, such as using find, replacements for the up arrow, cut, sed, awk and a few more in a very readable format.
Unix_Command-Line_Kung_Fu_ SANS .pdf application/pdf Object.
This shows pretty conclusively that the iphone has the best touchscreen followed by the Palm Pre. The Androids don’t do too well at all.
labs.moto.com » Blog Archive » Robot Touchscreen Analysis.
The BAA employee took a photo of his co-worker, Jo Margetson, when she inadvertently went through a scanner.
“I can't bear to think about the body scanner thing,” she told the Sun. “I'm totally traumatised. I've spoken to the police about it. I'm in too much of a state to go to work.”
BAA said: “We treat any allegations of inappropriate behaviour or misuse of security equipment very seriously and these claims are being investigated thoroughly,” a BAA spokesman said. “If found to be substantiated we will take appropriate action.”
via Airport worker given police warning for ‘misusing’ body scanner | UK news | guardian.co.uk.
Well it’s not a surprise that the thing is used for what it was built. These things are a total scourge on our privacy and it’s ridiculous that these can be used on passengers, especially when they don’t increase passenger safetly at all.
This guy started stealing at 6 and never looked back. Banks, jewelry, skimming, scamming, he’s done it all. Using high-tech gadgets and doing parachuting in or using air ducts, he got in anywhere. A gripping read of a real life Pink Panther style master thief, who made a few too many mistakes and got caught.
Art of the Steal: On the Trail of World’s Most Ingenious Thief | Magazine.
Yup, it finally happened,
Barbie® I Can Be…™ dolls and accessories empower girls to play out different roles and “try on” fabulous careers, including computer engineer, the first Barbie® profession chosen by popular vote! Always a reflection of the times, this digital diva engineers the perfect geek-chic look, with hot pink accessories and sleek gadgets to match. The inspiring set also comes with a special code that unlocks career-themed content online, for even more digital play (how fitting)!
http://shop.mattel.com/product/index.jsp?productId=4032107&cp=3719989.3748552
A school that has allowed its pupils to start the day an hour later says it has seen absenteeism decline.At Monkseaton High School, in North Tyneside, 800 pupils aged 13-19 have started lessons at 10am since October.Early results indicates that general absence has dropped by 8% and persistent absenteeism by 27%.
via BBC News – Lie-in for teenagers has positive results.
Whether they’re plus sized, normal sized or skinny, women will feel bad about themselves whenever they see a model.
There really is no pleasing them!
Plus Size Models Don’t Raise Self Esteem | The Frisky.
The way the tool works is that you first take some aluminum foil and make a ‘U shaped’ form using the special tool to do so and make small incisions on pre-determined positions. Next thing you do is put the foil over a special blank that already has the profile of your target lock. The clever thing about this tool is that the ‘U shaped foil tube’ is wrapped around some sort of needle, and the foil can not be pushed in when entering the lock! Once the key is inserted, the needle is taken out from the back of the tool, and the pins are now resting on the foil. Because of the cuts in the foil, each pin will stand on it’s own ‘island’ of foil, and when it is pushed in will not disturb the neighboring pin!
This technique will open most locks and you can buy a kit for around $58,- or a simpler model for $21,-
via Advanced foil impressioning « Blackbag, Barry’s weblog.
Launch regedit.exe
HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Explorer AdvancedGo to Edit->New->DWORD 32-bit ValueName the value LastActiveClick
Hit enter to assign the value and change it to 1Restart Explorer and you're good to go.
via Speed Up Windows 7 Taskbar Navigation with a Registry Hack – Windows Tip – Lifehacker.
Not only is the F-35 underperforming and overpriced, it’s also not an air dominance fighter. It’s a point defence fighter with the same limitations of the F-16 when it first came out. If you want to play with the big boys, you gotta have a big stick, and the F-35 just isn’t it.
Now it’s flayaway price is estimated at $135m, a lot more than the $60-$90m projected and a whole lot more than a new F-16 or even a latest model F-18.
Dump this programme, get F-22 back on the rails (if you’re American) or buy Eurofighter / Rafale / Gripen (if you’re European).
Last year, the US Air Force reported incremental unit procurement cost to buy one more F-22 in Fiscal 2010, assuming a 20-aircraft multi-year contract. The cost was $138 million.At the time, the F-35 seemed like a bargain by comparison. The official cost estimate, unchanged since 2007, pinned the average procurement cost for the F-35 between $60-$90 million, depending on the variant.Those assumptions for the F-35 now look almost ridiculously rosy. The Department of Defense released a document today revising the F-35 cost estimate by up to nearly 90% [read full story].We now know the F-35 will cost between $114 million to $135 million, adjusted for inflation. That average cost assumes the US Air Force will still buy 1,763 F-35As despite plans to draw-down to a total of 2,000 fighters, including 186 F-22s already on order.
via F-35 sticker shocks the $138 million F-22 – The DEW Line.
Showing there is little unity and policy when it comes to cyber warfare in the US, the military took down a website used to gather intelligence on extremists. In the process of doing so they took down around 300 servers around the world and pissed off all the other intelligence gathering agencies that were covertly monitoring the site to gain information on the identities and plans of terrorist extremists.
Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies.
d_shape is a large Italian 3D printer, capable of printing large structures, up to and including houses.
via welcome to d_shape.
This isn’t a new idea, and it should work. I don’t know what happened to the house printer I covered in
On December 1727 an intriguing play called Double Falshood; Or, The Distrest Lovers was presented for production by Lewis Theobald, who had it published in January 1728 after a successful run at the Theatre Royal, Drury Lane, London. The title page to the published version claims that the play was ‘Written Originally by W.SHAKESPEARE’.
Double Falsehood’s plot is a version of the story of Cardenio found in Cervantes’s Don Quixote (1605) as translated by Thomas Shelton, published in 1612 though in circulation earlier. Documentary records testify to the existence of a play, certainly performed in 1613, by John Fletcher and William Shakespeare, probably entitled The History of Cardenio and presumed to have been lost.
Well you can buy it now and decide for yourself if this is a genuine play. There will be much discussion about it now that some major scholars have decided to throw their weight behind it as being true.
This program allows you to remote control your Canon or Nikon camera connected to a PC, allowing you to preview and shoot the pictures from the screen of the ipod.
DSLR Camera Remote Professional Edition for iPhone, iPod touch, and iPad on the iTunes App Store.
Opinion piece by a former CIA operative on its current lack of operational capability,
On December 30, in one of the deadliest attacks in CIA history, an Al Qaeda double agent schemed his way onto a U.S. base in Afghanistan and blew himself into the next life, taking seven Americans with him. How could this have happened? Agency veteran Robert Baer explains, offering chilling new details about the attack and a plea to save the dying art of espionage
http://www.gq.com/news-politics/politics/201004/dagger-to-the-cia
It used to be that you needed a huge cellphone network to start mapping changes in air currents, but now these guys have developed a sensor that can measure the movement and displacement of air particles using a sensor smaller than a matchstick head!
The Microflown
The Microflown is the worlds first and only MEMS technology based sensor that can measure the acoustic particle velocity. By measuring the temperature difference in the cross section of two extremely thin platinum wires placed in parallel, this extremely fast mass flow sensor is capable of monitoring the movement of air particles. Any sound field is described completely by both the (scalar) value sound pressure and the (vector) value acoustic particle velocity. Understandably, acoustic testing becomes much easier if both acoustic quantities can be measured. But the Microflown sensor platform can also be used to measure:
*
structural velocity
*
sound pressure
*
temperature
*
DC flow
*
acceleration
via Microflown Technologies – Home.
This wiki has guides showing you how to get OSX Snow Leopard installed on a PC using Intel or AMD chips.
This article is a general primer on how to get players to continuously play your game, which in the world of the MMPORG is a very important element, using a behavioural model.
Gamasutra – Features – Behavioral Game Design.
This article is a bit more cynical and compares the above techniques to addiction creation and illustrates the theory with specific examples from World of Warcraft.
Cracked – 5 Creepy Ways Video Games Are Trying to Get You Addicted
Using Google search technology you can now browse through the entire archive of Popular Science magazine and read the old issues online.
New! Browse the Complete PopSci Archive | Popular Science.
Yup, this is what happens to DRM servers: they go down and you can’t play your game, listen to your music, or really do anything with the product you bought.
Ubisoft’s game servers have been down for longer than 10 hours, well done!
The Escapist : News : Ubisoft DRM Authentication Servers Go Down.
This guy will dump your girlfriend or boyfriend for a small fee by phone. He records the call and then puts it on YouTube for the world to hear.
IDUMP4U the website where we do all the dirty work for you!.
Showing that the LibDems in the UK are now the lapdogs of major industry, they have proposed an amendment allowing copyright owners to force ISPs to take content offline without any proof that the copyright belongs to them.
“During today's debate in the UK's House of Lords on the much-criticized Digital Economy Bill the unpopular Clause 17 (that would have allowed the government to alter copyright law much more easily than it currently can) was voted out in favor of a DMCA-style take-down system for websites and ISPs. The new amendment known as 120A sets up a system whereby a copyright owner could force an ISP to block certain websites who allegedly host or link to infringing material or face being taken before the High Court and made to pay the copyright owner's legal fees. This amendment was tabled by the Liberal Democrat party who had so far been seen as the defenders of the internet and with the Conservative party supporting them. The UK's Pirate Party and Open Rights Group have both strongly criticized this new amendment.”
via Slashdot Your Rights Online Story | DMCA Amendment Proposed For UK.
And we’ve known this since the 1890s. Experiments repeatedly show that multitasking basically makes you perform badly at any of the tasks you’re performing. Now, however, it turns out that not only do you do badly at the tasks, but it also destroys your capacity for reasoning.
This article walks quickly through the history of the research on multitasking and brings you up to date with methods to practically use single tasking, from the extreme in classrooms to the more mundane.
The system beams a keyboard or menu onto the user's forearm and hand from a projector housed in an armband. An acoustic detector, also in the armband, then calculates which part of the display you want to activate.
via Body acoustics can turn your arm into a touchscreen – tech – 01 March 2010 – New Scientist.
And then puts them into a database accessible by… who? and why? This started in 2002 and has been going on without your knowledge ever since…
Newborns’ blood used to build secret DNA database – Short Sharp Science – New Scientist.