Get flash to fully experience Pearltrees
We love to integrate books into our decor, but does your child have favorite books that aren't quite in display condition?
If you’re looking to hide files on your PC hard drive , you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file ! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Not only that, you can actually store many files inside of single JPG file, not just one!
by Rick Broida Click to view The next time you have an afternoon free, dig out that old box of cassette tapes you squirreled away in the basement. It's time to resurrect your collection of Phil Collins albums, Stephen King audiobooks, and other treasures of the 80s. With a few simple tools and your PC, you can turn these forgotten jewels into digital audio files that will live forever. There's more to this idea than a trip down memory lane.
LEET (1337) is a written language or cipher used in online gaming, e-mails, text messaging, tweeting, and other electronic communication. The root of the term "leet" is the word "elite"--translated as 31337--and 1337 was initially developed as an exclusionary language: a way to encode text so that messages could only be read by the initiated. The defining characteristic of 1337 is substitution of symbols and numbers for letters (for example, in the term "1337," 1=L, 3=E and 7=T), but the language has also developed to include intentional misspellings, phonetic spelling, and new words. If you want to familiarize yourself with 1337, or if you're just curious about it, this article will explain the basics of how to read and write in this everchanging language. The license plate on the car says H4X0RZ, or Hackers.
A Prayer for the Nation and Our Next President, Barack Obama ( Also available on You Tube) . By The Rt. Rev. V.
Jurassic Park the Musical Part 1 from Mark Hennings on Vimeo . Jurassic Park the Musical Part 2 from Mark Hennings on Vimeo . Jurassic Park the Musical Part 3 from Mark Hennings on Vimeo . 1) I really wasted my college years. All those hours spent studying and working part-time jobs and waiting for dialup internet to connect could not possibly add up to anything better than this production right here.
[This essay was given as a talk at SUNY Buffalo, 28 January 2010, the day after Howard Zinn’s death. I have left the text unaltered, to better reflect the spirit of the talk.] “ I’m worried that students will take their obedient place in society and look to become successful cogs in the wheel - let the wheel spin them around as it wants without taking a look at what they’re doing. ” — Howard Zinn The great social historian Howard Zinn, author of A People’s History of the United States , died yesterday of a heart attack.
I've been slogging through the hundreds of "saved to read/bookmark later" posts in my doomed Bloglines account and came across this faux newscast generator, which seems ideal for Banned Books Week (replace Dave & Jan with staff photo?): Tuxpi [Photo Effect: Newscast]
Simmm… hoje uma das nossas queridinhas do Rabisco Pop completa 26 aninhos, e pra comemorar essa data tão importante, os lirou monsters votaram e escolheram uma roupitcha nova pra paper GaGa! YAY! \o/
Mathematical Proofs Set to Music I added this web page just for fun. While looking at some proofs, it occurred to me that their structure resembled musical scores, so as an experiment I decided to see what they "sounded" like. Essentially, the musical notes correspond to the depth of the proof tree as the proof is constructed by the proof verifier. A fast higher note is produced for each step in the construction of a formula. A sustained lower note is produced when the formula is matched to a previous theorem or earlier proof step, to result in a new proof step (which corresponds to a proof step displayed on the Metamath Proof Explorer page that shows the theorem's proof).
Finals week is a test of endurance on your brain and body. For some, it will be hell. So to make sure you don’t end up like this during finals week, we offer some tips to get you ready and prepared for a week full of exams. You need to be mentally ready to take on finals week: A sharp brain starts with proper sleep and a healthy diet. Step 1: Get Proper Sleep
Another rad browser plugin called Google Alarm hit the Internets this week, which alerts you every time your personal info is sent to Google's servers. How? Via notifications, a running tally of dangerous sites and, naturally, a super annoying, vuvuzela -like alarm. After seeing this new plugin — which works with both Firefox and Chrome — on F.A.T. , I contacted the developer who made it: Jamie Wilkinson , who also created Know Your Meme and Mag.ma.
If some device was not following the WiFi Alliance WPA specification by not hashing the entire printable ASCII character set correctly, it would end up with a different 256-bit hash result than devices that correctly obeyed the specification. It would then be unable to connect to any network that uses the full range of printable ASCII characters. Since we have heard unconfirmed anecdotal reports of such non-compliant WPA devices (and since you might have one), this page also offers "junior" WPA password strings using only the "easy" ASCII characters which even any non-fully-specification-compliant device would have to be able to properly handle. If you find that using the full random ASCII character set within your WPA-PSK protected WiFi network causes one of your devices to be unable to connect to your WPA protected access point, you can downgrade your WPA network to "easy ASCII" by using one of these easy keys. And don't worry for a moment about using an easy ASCII key.