‘Cloaking’ device uses ordinary lenses to hide objects across range of angles

To build your own device

Purchase 2 sets of 2 lenses with different focal lengths f1 and f2 (4 lenses total, 2 with f1 focal length, and 2 with f2 focal length)
Separate the first 2 lenses by the sum of their focal lengths (So f1 lens is the first lens, f2 is the 2nd lens, and they are separated by t1= f1+ f2).
Do the same in Step 2 for the other two lenses.
Separate the two sets by t2=2 f2 (f1+ f2) / (f1— f2) apart, so that the two f2 lenses are t2 apart.

‘Cloaking’ device uses ordinary lenses to hide objects across range of angles : NewsCenter.

Tiny Humanoid Robot Learning to Fly Real Airplanes

The little robot in the picture above is a PIBOT, a small, very low-cost humanoid (actually a Bioloid Premium from Robotis). It’s been slightly modified to be able to work the controls of a scaled-down, simulated aircraft cockpit, as in the pic above. PIBOT is able to identify and use all of the buttons and switches and stuff that you’d find in the cockpit of a normal light aircraft designed for humans

via Tiny Humanoid Robot Learning to Fly Real Airplanes – IEEE Spectrum.

Gauntlet 2014 released!

Four Heroes Search the Deadly Gauntlet For Untold Riches

WILL THEY MAKE IT OUT ALIVE?

For ages, fool-hardy adventurers have been lured by promises of countless treasures in the depths of the Gauntlet, yet none have ever made it out alive. The corrupt wizard Morak conjures minions and devious traps against would-be champions and taunts them all along the way. But a new group of heroes looks to succeed where all others have failed.

via Gauntlet | Invade the Darkness this September on PC!.

Hope it’s as much fun as the original!

Terror laws clear Senate, enabling entire Australian web to be monitored and whistleblowers to be jailed

Australian spies will soon have the power to monitor the entire Australian internet with just one warrant, and journalists and whistleblowers will face up to 10 years’ jail for disclosing classified information.

via Terror laws clear Senate, enabling entire Australian web to be monitored and whistleblowers to be jailed.

Bash broken – ShellShock

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix

via NVD – Detail.

Antidepressants rapidly alter brain architecture

A single dose of a popular class of psychiatric drug used to treat depression can alter the brain’s architecture within hours, even though most patients usually don’t report improvement for weeks, a new study suggests.

More than 1 in 10 adults in the U.S. use these drugs, which adjust the availability of a chemical transmitter in the brain, serotonin, by blocking the way it is reabsorbed. The so-called Selective Serotonin Reuptake Inhibitors, or SSRIs, include Prozac, Lexapro, Celexa, Paxil and Zoloft.

via Antidepressants rapidly alter brain architecture, study finds – LA Times.

Lockheed Martin Conducts Flight Tests Of Aircraft Laser Turret

Lockheed Martin [NYSE: LMT], in partnership with the Air Force Research Laboratory (AFRL) and the University of Notre Dame, has demonstrated the airworthiness of a new beam control turret being developed for the Defense Advanced Research Projects Agency (DARPA) and AFRL to give 360-degree coverage for high-energy laser weapons operating on military aircraft. A research aircraft equipped with the Aero-adaptive Aero-optic Beam Control (ABC) turret conducted eight flights in Michigan.

via Lockheed Martin Conducts Flight Tests Of Aircraft Laser Turret For Defense Advanced Research Projects Agency · Lockheed Martin.

The big thing here is that they’ve mounted it on a small business jet instead of the previous incarnation, which was a Boeing 747. What isn’t mentioned though, is the power of the laser – can it knock out ICBMs and aircraft? Smaller missles? What is the recharge time between firings and how long can the laser fire? Are we at the point where dogfighting is truly becoming obsolete?

Open-Source Syringe Pump Library

A syringe pump was designed using freely available open-source computer aided design (CAD) software and manufactured using an open-source RepRap 3-D printer and readily available parts. The design, bill of materials and assembly instructions are globally available to anyone wishing to use them. Details are provided covering the use of the CAD software and the RepRap 3-D printer.

via PLOS ONE: Open-Source Syringe Pump Library.

These will save doctors loads of money over commercially available equipment.

3D print your own Smartphone Microscope for $1,-

Using inexpensive glass beads traditionally used for reflective pavement markings at airports, the PNNL team has demonstrated 1000x magnification, which is necessary to see tiny anthrax spores and plague cells. They have also made a 350x version, which is adequate to identify parasites in blood samples or protozoa in drinking water. A 100x version enables children to investigate common items like salt grains and flower petals in much greater detail.

via PNNL Smartphone Microscope – Available Technologies – PNNL.

The 3d printer files and links to materials are at the bottom of the page.

De gereedschapskist van de hacker | Workshop Security en Privacy

Security is een ambacht, hackers zijn vaak hun hele leven al bezig om systemen en applicaties te testen, maar evenals bij een goede ICT beheerder is een kenmerk van een hacker dat men liever routineuze taken zal automatiseren (scripten).
In de begindagen van het web hadden hackers veelal hun eigen collecties van scripts en werden deze scripts vaak via bulletin boards of forums onderling uitgewisseld.
Echter al snel bleek het veel efficienter om deze scripts te bundelen en daaruit ontstonden heuse hacking frameworks, een van de bekendste daarvan zijn Metasploit en OpenVAS.

De gereedschapskist van de hacker | Workshop Security en Privacy.

Chivalry: Medieval Warfare

First person multiplayer sword fighting or…

Players have real-time control over their swings, allowing them to aim strikes and blocks with precision and become master swordsmen over time. Players exchange attacks and blocks in a fast-paced competitive multiplayer setting with truly satisfying combat including gruesome decapitation and advanced swordplay.

Chivalry: Medieval Warfare – Torn Banner Studios.

ads showing sexy women make male consumers less charitable

What happens when you use images of sexy women to attract men’s attention? According to a new study in the Journal of Consumer Research, male consumers who are shown images of sexy women feel less connected to other people and are less likely to purchase products advertised as benefiting others or make charitable contributions.

via Do ads showing sexy women make male consumers less charitable?.

The Police Tool That Pervs Use to Steal Nude Pics From Apple’s iCloud

The software first brute forces an icloud username / password, then tricks icloud into thinking your device is the target device and finally performs a full restore to your device.
This software is supposed to be for law enforcement, but can be bought and downloaded by anyone. There are also illegal copies to be found.

The Police Tool That Pervs Use to Steal Nude Pics From Apple’s iCloud | Threat Level | WIRED.