background preloader


Facebook Twitter


Hack. Bullshit Generator. 9 Ways The Bankster Occupied U.S. Government Is Waging War Against America. Part I: 9 Ways The Hijacked Federal Government Is Waging War Against The American People. Part II: 9 More Ways The U.S. Government Is Waging War Against America. 1. Ideology. There is a dictatorship of the mind and spirit in America. The official ideology of the U.S. totalitarian state is counter-terrorism and national security.

All domestic and foreign crimes are justified under the umbrella of security and defense. The attacks also had the effect of putting the American people into a psychological state of subservience towards the government and power elite. The voice of dissent and 9/11 truth is the only way to break the totalitarian conditioning of the American people and the people of other Western countries. 2. What exists in Washington is one party dictatorship with two political factions. The false left-right political paradigm enables the power elite to remain in control and continue to loot America without being discovered as the real enemy of the American people. 3. 4. 5. 6. 7.

How to Hack Microsoft Kinect Sensing Console of Xbox 360. Microsoft launched the Kinect motion sensing controller for the Xbox 360 last year, and it enroll itself into Guinness Book of World Records as the fastest selling consumer device of all time, selling over 10 million units in just two months. Kinect isn’t just a console accompaniment; it has the potential to unlock fun new ways of human machine interaction. While Nintendo and PlayStation Move require you to hold a wand or pointing device, Microsoft’s Kinect requires no such things, strongly emphasizing on its “you are the controller” in adverts.

So how has this simple looking device shaken the world of gaming and personal technology sector to some extent to become a revolution of sorts? Well, much credit goes to Microsoft and plain old human ingenuity. Today, we will describe the procedure of hacking Kinect console of Xbox 360 as per your according, actually done by Harishankar Narayanan; a Chennai based game developer who likes tinkering with gadgets. What is Kinect? 8.) Complex Hacks - Hacked Gadgets - DIY Tech Blog. When you want to make a project small you might grab an Arduino Pro Mini instead of a full sized Arduino board but what if your project needs to fit into a blood vessel? F. Levent Degertekin, a professor in the School of Mechanical Engineering at the Georgia Institute of Technology is developing some miniature technology that will revolutionize how medical doctors will look at the heart and blood vessels.

Via: Electronics Lab “The device integrates ultrasound transducers with processing electronics on a single 1.4 millimeter silicon chip. On-chip processing of signals allows data from more than a hundred elements on the device to be transmitted using just 13 tiny cables, permitting it to easily travel through circuitous blood vessels. The forward-looking images produced by the device would provide significantly more information than existing cross-sectional ultrasound. The dual-ring array includes 56 ultrasound transmit elements and 48 receive elements. Hacked Gadgets - DIY Tech Blog. My Favorite Smallware. Katamari Hack.

How to make a Bump Key Video. Hi, my name is Tyler and I am going to show you how to make and use a bump key. A bump key when properly used will open any lock that it fits into. Now, this technique is not new. The bad guys have been using it literally for years and the locks that you buy today, yes even lock that you have on your front door is vulnerable to this technique, largely because the general public doesn't know that they are unsafe. The way a normal key works is; you stick it into a lock and if you look at a key, you'll see that it has little ridges and little valleys.

When you stick it into a lock, the little valleys line up with the pins inside the lock. Those pins have splits in them at various heights and if the height of these little valleys matches the correct height on the pins, then the splits in the pins will line up where the two parts of the lock meet, allowing the cylinder to turn. Now the way you make this, is you take just a normal key. Alright, so here's the finished key. Top 5 Wireless Home Security Internet Cameras - Why You Need One. Written by: Michael Dougherty•edited by: Aaron R. •updated: 8/28/2011 Crime does not only happen on the Internet.

It happens at the one place where you should feel safest. Your home. Let the Internet help protect you from crime that happens off the Internet with these wireless home security internet cameras. It used to be that if you wanted a wireless home security Internet camera to monitor your home and/or property you had to contact a professional security firm and have them install a very expensive and elaborate system in your home. These days this is no longer a requirement to get the peace of mind a wireless home security Internet camera will give you and your family. Zing Starter Series Laser Engraving and Cutting Systems. The Best Hacking Tutorial Sites - Learn Legal Hacking.

How to use Google SketchUp for Ponoko 3D printing. Google Hacking Database, GHDB, Google Dorks. The Open Organisation Of Lockpickers :: Our Mission. How to Hack Your Brain. Member: bmlbytes. Adeona: A Free, Open Source System for Helping Track and Recover Lost and Stolen Laptops.

Internet security Tools | Arrow Webzine. If you want to protect yourself from Internet snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. Without a Trace If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number, then these tools are for you. Big String. Big String offers self-destructing IMs and emails for those who don’t want any evidence of their online communications. Use with many popular IM clients.Mozilla Firefox, Portable Edition. This free web browser leaves no personal information on your computer.

Browsing Security If you want to browse the Internet in privacy, these tools will help you do just that. Hide My Ass!. Computer Security Using the Internet is a huge open door for people to stick their nose in your business. Avast!. Laptop Tracking If someone makes off with your laptop, know how to stop them with these tools. Adeona. Spying on Those Out to Get You. Intitle:”live view / – axis” Inventables: Materials Database. Inventables: Materials Database. Inventables: Materials Database. Lina Bo Bardi - People.