Posts

R2-D2 Gets Real: 'Star Wars' Droids Already Exist

Image
Star Wars' Droids  It's sheltered to state that the robots from the "Star Wars" films have left a gigantic social effect. Indeed, even individuals who aren't diehard fans will probably recollect C-3PO, R2-D2 and a large number of the other mechanical creatures that lived in George Lucas' rich universe. These science fiction manifestations gave a look at how robots could be utilized as a part without bounds, yet how close is the world to making its own particular R2-D2 a reality? Really, a few "Star Wars"- like advances as of now exist. From medical bots intended to keep you beneficial to rambles for chasing down "Revolt scum" to manmade brainpower that can drive an auto or fly a plane, robots are no longer quite recently the stuff of sci-fi. [Science Fact or Fiction? The Plausibility of 10 Sci-Fi Concepts] Here are probably the most significant bots from "Star Wars," and their genuine partners: Driving Droids  What...

Really Micro Machines: Molecular Cars Prep for First-Ever Race

Image
Tiny vehicles made from a solitary particle  clashed in the principal ever NanoCar Race in (April 28), and the opposition  broadcasted live on YouTube.  The race is made conceivable by a stand-out scanning burrowing magnifying lens (STM) at the National Center for Scientific Research (CNRS) in Toulouse, France, that gives four clients a chance to manipulate atoms on the same surface simultaneously. Four freely operated ultrafine metallic tips convey electrical heartbeats that will move the alleged "nanocars" along a racetrack made of gold atoms.  Six teams made it through to the final round, according to the race organizers. Originally, four teams would have been chosen earlier today to take part in tomorrow's race, however the organizers ultimately chose that all the teams ought to participate. This means two teams will control magnifying instruments remotely from their own labs — one in Ohio and the other in Graz, Austria. [Magnificent Microphotography...

What is it that Linux can do but not Windows?

Image
After years of using Linux only I recent took on a new job that required me to use a Windows machine. I constantly come across thing that are trivial under Linux but are frustrating with Windows. For example maximise a command line window in Linux and it goes full screen, do the same with most Windows command line windows and goes full height but no wider. Too bad if the data you are looking at is more than 80 characters wide. However one early experience stands out. When I moved from Windows 2000 to Windows XP my video capture card stopped working. The driver model had changed and the card manufacturer was not supplying new drivers for my ‘old’ card. I was expected to buy a new card to replace a perfectly good card. Not long after that I upgraded the system to Linux and the card only partly worked, the video in worked but the tuner would not tune. This was the early days of Linux and could not find a solution online so I decided to get my hands dirty and see if I could fix it...

Microsoft finally reveals what data Windows 10 really collects

Image
Microsoft has been responding to Windows 10 privacy concerns for nearly two years now, and it appears the company has finally got the message and is prepared to act. Starting today, Microsoft is updating its privacy statement and publishing information about the data it collects as part of Windows 10. “For the first time, we have published a complete list of the diagnostic data collected at the Basic level,” explains Windows chief Terry Myerson in a company blog post. “We are also providing a detailed summary of the data we collect from users at both Basic and Full levels of diagnostics.” Microsoft is introducing better controls around its Windows 10 data collection levels in the latest Creators Update, which will start rolling out broadly next week. The controls allow users to switch between basic and full levels of data collection. “Our teams have also worked diligently since the Anniversary Update to re-assess what data is strictly necessary a...

What are the most important JavaScript concepts to know for a job interview?

Image
I had to interview developers for a bunch of Javascript positions. So here is the stuff I always check for in order to avoid to get drowned in a wall of buzzwords: The concept of prototypes (and what differs from more traditional inheritance approaches) and alternatives to inheritance. Inheritance and the prototype chain Why: I want to know that you will not use Javascript like Java or a traditional OOP lang. Closures) Closure (computer programming) | WikiWand Why: So that you not get lost in callback hell Loose Coupling in Javascript and Events Custom events in JavaScript Why: I want to be sure you don't dipp your code in useless if and switch statements + adding a lot of coupled code, just because you don't know about events. Duck Typing (for people coming from strong typed languages) Duck Typing in Javascript Why: Another very basic feature that comes with these kind of languages. Sync vs. Async and the challenges that come with it. Be able to explain the...

Guide For Getting Free Stuff

Image
Ok, if you are like me you have heard so much about the FreeIpods and FreeFlatScreens websites on different forums, blogs, IM's, etc, you are about to puke. So am I. But yet the draw of getting an Ipod for doing basically nothing is pretty strong. I dismissed all the "stories" of people getting their ipods as the marketing machine at work. However, when Kevin Rose published that not only did he receive his, but a few of his friends did as well, I figured I might take a chance and give it a go. Today I received proof that it does indeed work. Yep, I got my iPod. Whats in it for them? Step 1. Collect Names. Step 2. Send those names items worth $200 or more Step 3. ????? Step 4. Profit Before I signed up, I wanted to get to the bottom of the ?????. I didn't want any sweaty, filth pushing webmonkeys to have all my info, so I did my research. Gratis Internet, the parent company of the FreeIpods, FreeFlatscreens, etc. sites, recently did an interview with Wired Ma...

How To Set Up FTP Server

Image
Register free at the page. (follow all the instructions you get there) Look at the top, and you see the Host Search. Write the name you want, and press Go! Then download the program called No-IP on the site, or use this .... Read More

Excellent tricks and techniques of Google Hacks

Image
ws_ftp.ini is a configuration file for a popular FTP client that stores usernames, (weakly) encoded passwords, sites and directories that the user can store for later reference. These should not be on the web  Read More ....

How To Change Your Ip In Less Then 1 Minute

Image
1. Click on "Start" in the bottom left hand corner of screen 2. Click on "Run" 3. Type in "command" and hit ok You should now be at an MSDOS prompt screen.  Read More ....

Advanced Shellcoding Techniques

Image
This technique was originally developed by Sorbo of darkircop.net.  The mul instruction may, on the surface, seem mundane, and it's purpose obvious.  However, when faced with the difficult challenge of shrinking your shellcode, it proves to be quite useful.  First some background information on the mul instruction itself...  Read More

How To Stop Spam

Image
HOW TO STOP SPAM VIA WINDOWS MESSENGER SERVICE Below you'll find many ways (sorted in the most successful ratio first) to stop the Windows Messenger service, depending on your system environment, some may require more than one process. This service is available only on NT, 2K, XP & Server 2003. Administrator Login is REQUIRED  Read More ....

How to make key generators

Image
Hi there, in this tutorial, I intend to teach you how to make a pretty simple keygen, of a program called W3Filer 32 V1.1.3. W3Filer is a pretty good web downloader... I guess some of you might know the program.  Read More ....

How to Bypass BIOS Passwords

Image
BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS  Read More ....

How To Copy XBOX Games

Image
1) Insert your original in your CD-ROM. 2) Open CDRWin (or any other image extractor) to make an iso image of the game on your hard disc. Click on 'Extract Disc/Tracks/Sectors' 3) Here are the settings which work for me (!):  Read More ....

All About FTP Must Read

Image
Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server. That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic  Read More ....

Anonymity of Proxy

Image
The exchange of information in Internet is made by the "client - server" model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client. There are different variants of web-pages for different configurations of browsers. However, as long as web-pages do not usually depend on browsers, it makes sense to hide this information from the web-server.  Read More

ALL About Spyware

Image
What is spy-ware? Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.  Read More

How To Block Adservers

How it works It's possible to set up a name server as authoritative for any domain you choose, allowing you to specify the DNS records for that domain .... Read More

Bit Torrent Tutorials

In this tutorial, I will be describing it all using a bit torrent client called Azureus. This client is used to decode the .torrent files into a useable format to download from other peers. From here on out, I will refer to Bit Torrent as BT ... Read More

Anti leech hacking tutorial

we gona use a soft calde proxo mitron proxomitron is an anti bull script web proxy it' works buy applying some rules to elliuminte pop up and many other thing but for our cas we need to desactive all this filtring first goto  Read More