background preloader

Check It

Facebook Twitter

Attention Rebellious Jezebels - What's In Karen's Tabs? Happy Saturday, Internets!

Attention Rebellious Jezebels - What's In Karen's Tabs?

What's in Karen's tabs? Reading: Turn Old Paperbacks into Custom HardbacksHow To. Previous image Next image We love to integrate books into our decor, but does your child have favorite books that aren't quite in display condition?

Turn Old Paperbacks into Custom HardbacksHow To

How to hide files in JPEG pictures. If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes.

How to hide files in JPEG pictures

However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else.

Not only that, you can actually store many files inside of single JPG file, not just one! Hide File in Picture Create a folder on your hard drive, i.e. How to digitize cassette tapes. How to Read and Write in 1337. Edit Article 1337 SamplesReading and Writing in 1337 Edited by Thief, Battlecruser9292, Ben Rubenstein, Colin Marchon and 95 others LEET (1337) is a written language or cipher used in online gaming, e-mails, text messaging, tweeting, and other electronic communication.

How to Read and Write in 1337

The root of the term "leet" is the word "elite"--translated as 31337--and 1337 was initially developed as an exclusionary language: a way to encode text so that messages could only be read by the initiated. The Lead. A Prayer for the Nation and Our Next President, Barack Obama (Also available on You Tube).

The Lead

The Humphrey Winterton Collection of East African Photographs: 1860-1960. Some Stuff I Thought During "Jurassic Park: The Musical" Jurassic Park the Musical Part 1 from Mark Hennings on Vimeo. Jurassic Park the Musical Part 2 from Mark Hennings on Vimeo. 20 Science Books Every Scifi Fan (and Writer) Should Read.

12.9.10 linkage

Cultivated Play: Farmville. [This essay was given as a talk at SUNY Buffalo, 28 January 2010, the day after Howard Zinn’s death.

Cultivated Play: Farmville

I have left the text unaltered, to better reflect the spirit of the talk.] “I’m worried that students will take their obedient place in society and look to become successful cogs in the wheel - let the wheel spin them around as it wants without taking a look at what they’re doing.” — Howard Zinn The great social historian Howard Zinn, author of A People’s History of the United States, died yesterday of a heart attack. Zinn devoted his life to educating Americans in their country’s history, that they might better understand their place in its present. Building “The X-Files” Building The X-Files: Television Production, Authorship, and Discourse By Malinda Lo This research was partially funded by a Mellon Foundation Grant while I was a graduate student at Stanford University during the summer of 2001.

Building “The X-Files”

Fox Studios is situated at the juncture of Pico Boulevard and the Avenue of the Stars in west Los Angeles. It is hidden from the view of the public by brick walls and chain link fences, behind which huge satellite dishes are planted in clusters of eyes peering up at the sky. Image Generators for Library Displays. I've been slogging through the hundreds of "saved to read/bookmark later" posts in my doomed Bloglines account and came across this faux newscast generator, which seems ideal for Banned Books Week (replace Dave & Jan with staff photo?)

Image Generators for Library Displays

: Tuxpi [Photo Effect: Newscast] De-suck your photos! Trading Card: Turn your photos into trading cards! Tons of fun stuff...

Trading Card: Turn your photos into trading cards!

Give one of our toys a spin! Effects - PhotoFunia. DICE 2010: "Design Outside the Box" Presentation Videos. Ultimate Flash Face v0.42b. THE MICHAEL BAYIFIER. Crumpet's kandi patterns - kandi patterns for raver kandi bracelets, raver cuffs. Paper Divas « Rabisco Pop. Make and share step-by-step craft tutorials. Action Papercrafts. Music Page. Mathematical Proofs Set to Music I added this web page just for fun. While looking at some proofs, it occurred to me that their structure resembled musical scores, so as an experiment I decided to see what they "sounded" like. Essentially, the musical notes correspond to the depth of the proof tree as the proof is constructed by the proof verifier. A fast higher note is produced for each step in the construction of a formula.

A sustained lower note is produced when the formula is matched to a previous theorem or earlier proof step, to result in a new proof step (which corresponds to a proof step displayed on the Metamath Proof Explorer page that shows the theorem's proof). Is it "music"? Gangstagrass. Coverville - World Famous Cover Music Podcast. [ INCREDIBOX ] presents [ THE INCREDIBLE POLO ] Campus Progress. College Blog. One of the greatest aspects of the college experience is being a part of a great college tradition.

College Blog

Traditions can provide a great sense of community, school spirit and overall well-being at a college with many students. Here we present our ranking of the 100 Greatest College Traditions based on the history, amount of student participation, and overall uniqueness of the tradition. The Good Men Project MagazineAcademic Video Lectures. Is Google Watching You? New Plugin Will Let You Know [APPS] Index. Sudan Research, Analysis, and Advocacy. CryptoKids™ America's Future Codemakers & Codebreakers. Ultra High Security Password Generator. If some device was not following the WiFi Alliance WPA specification by not hashing the entire printable ASCII character set correctly, it would end up with a different 256-bit hash result than devices that correctly obeyed the specification.

It would then be unable to connect to any network that uses the full range of printable ASCII characters.