Get flash to fully experience Pearltrees
Back in 1985 I worked on the computerization of a machine designed to stick labels on bottles. The company that made the machines was using electromechanical controls to spool labels off a reel and onto products (such as bottles of shampoo) passing by on a conveyor. The entire thing needed to work with mm accuracy because consumers don't like labels that aren't perfectly aligned.
At the beginning of a sunny Monday morning earlier this month, I had never cracked a password. By the end of the day, I had cracked 8,000.
This mini tutorial will show you how you can find and uninstall all those extra COM ports you may have registered from years of microcontroller-hacking. You may have noticed that every time a new FTDI-based board is plugged in, you get a new COM port. You might also get new COM port assignment with adapters, etc.
I’m Zack Freedman, part man, part Raspberry Pi! I’m writing this blog post from a wearable cyborg Raspberry Pi, or as I like to call it, Pi in the Face. When Rob Bishop of the Raspberry Pi Foundation visited the space yesterday, he challenged the attendees to build a project using the tiny open-source computer.
ARToolKit is a software library for building Augmented Reality (AR) applications. These are applications that involve the overlay of virtual imagery on the real world. For example, in the image to the right a three-dimensional virtual character appears standing on a real card. It can be seen by the user in the head set display they are wearing. When the user moves the card, the virtual character moves with it and appears attached to the real object.
Ah, the joy of firmware debugging! I’ve been working on a USB firmware for my new upcoming product that involves a dual traditional TTL (Serial) and a USB-TO-SERIAL converter (CDC Communication Port) implemented in the same firmware.
Blockly is a web-based, graphical programming editor. Users can drag blocks together to build an application. No typing required. Check out the applications: Maze - Use Blockly to solve a maze. Turtle - Drawing with Blockly.
Whenever you receive an email, there is a lot more to it than meets the eye. While you typically only pay attention to the from address, subject line and body of the message, there is lots more information available “under the hood” of each email which can provide you a wealth of additional information. Why Bother Looking at an Email Header?
It is that FIRST Robotics competition time of the year. Basically, in FIRST , high school students work in teams to build robots that compete in specific tasks. Apparently, this year a task involves throwing a basketball into a goal. And this leads to the popular question: how do I tell my robot to throw the ball? Oh?
When Chris and I first started working on GitHub in late 2007, we split the work into two parts. Chris worked on the Rails app and I worked on Grit, the first ever Git bindings for Ruby. After six months of development, Grit had become complete enough to power GitHub during our public launch of the site and we were faced with an interesting question: Should we open source Grit or keep it proprietary?
The Wireshark WPA Pre-shared Key Generator provides an easy way to convert a WPA passphrase and SSID to the 256-bit pre-shared ("raw") key used for key derivation. Directions : Type or paste in your WPA passphrase and SSID below. Wait a while . The PSK will be calculated by your browser.
So the Sony saga continues. As if the whole thing about 77 million breached PlayStation Network accounts wasn’t bad enough, numerous other security breaches in other Sony services have followed in the ensuing weeks, most recently with SonyPictures.com . As bad guys often like to do, the culprits quickly stood up and put their handiwork on show. This time around it was a group going by the name of LulzSec. Here’s the interesting bit: Sony stored over 1,000,000 passwords of its customers in plaintext
An image scaled with nearest-neighbor scaling (left) and 2×SaI scaling (right). In computer graphics, image scaling is the process of resizing a digital image . Scaling is a non-trivial process that involves a trade-off between efficiency, smoothness and sharpness.
Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones. So let's dive into the world of passwords, and look at what makes a password secure in practical terms. Update: Read the FAQ (updated January 2011)
Microsoft HTML Help is the standard help system for the Windows platform. Authors can use HTML Help to create online help for a software application or to create content for a multimedia title or Web site. Developers can use the HTML Help API to program a host application or hook up context-sensitive help to an application. As an information delivery system, HTML Help is suited for a wide range of applications, including training guides, interactive books, and electronic newsletters, as well as help for software applications. HTML Help offers some distinct advantages over standard HTML, such as the ability to implement a combined table of contents and index and the use of keywords for advanced hyperlinking capability. The HTML Help compiler (part of the HTML Help Workshop) makes it possible to compress HTML, graphic, and other files into a relatively small compiled help (.chm) file, which can then be distributed with a software application, or downloaded from the Web.