background preloader

Magic cast-on for toe-up socks

Magic cast-on for toe-up socks
You have cast one stitch on to needle #1. 5. Bring needle #2 over the yarn tail on your thumb, around and under the yarn and back up, making a loop around needle #2. Pull the loop snug around the needle. You have cast one stitch on to needle #2. There are now two stitches on needle #2 Ñ the stitch you just cast on plus the anchor loop. The top yarn strand always wraps around needle #1 (the bottom needle), and the bottom yarn strand always wraps around needle #2 (the top needle). 6. 7. 8. In this picture, a total of 20 stitches, or 10 stitches on each needle, have been cast on. Turn back to the right side to begin knitting. 9. Knit the row of stitches from needle #1. You will see a row of stitches appear between the two needles. 10. Be careful! You have completed one round and are back where you started. Note: Do the stitches between the needles appear too loose or "sloppy?" There are two rows of stitches between the needles now. Round 3: K all stitches on both needles (no decreases).

419 BAITER - Links When I first started scambaiting, I was inspired by a handful of sites. Unfortunately, a few of these sites have since vanished. I have listed the ones that remain. The Adventures of Wendy Willcox - I managed to locate this great story and thought, "Yeah, I could do that". I drew quite a bit of inspiration (and a few ideas) from Wendy's story. The 419 Game - Ebenezer Codpiece is back. What's the Bloody Point? After my first foray into this growing internet sport, I found many more sites devoted to scambaiting. 419 Eater - Claims to be the world's largest organized group of scambaiters. Scam-o-Rama - The operators of this site don't do any scambaiting themselves. Nigerian Money Scams - The Nigerian Letters - J. The Brad Christensen Exhibit - Hilarious scambaiting here, this guy even makes his scammers laugh, though not for long. - Home of "Anus Laptops". - "Gilbert Murray" is one of the best waster of the scammers' time I've seen. Vladdio...

Top Ten 2.0 Tools – 2010 « John Steltz-Teacher/Author I am finishing my 14th year as an English-Language Arts teacher of students. I have grown more as an educator in this one academic year than in the lasGet Shortlinkt five years combined. I should really be more specific; I was on paternity leave for six weeks in November and December, so the new growth really didn’t begin until the New Year began. Through the assistance, encouragement, and on-going support of my colleague, Jessica (@jbrogley for Twitter followers), I have expanded my professional horizons to the vast frontier of technology. I can’t say enough about her confidence building personality, her willingness to help, and her wide range of Web 2.0 knowledge. It began with Twitter. Writing is a passion of mine and I was searching for an efficient way of sharing my writing with more people. Jessica sent me a link, maybe even through Twitter, to a Wiki that listed a plethora of Web 2.0 tools to for students (I consider myself a student too) to use, CoolToolsforSchools. 1. 2. 3. 4.

31 Aquariums From Wow to WTF [Pics] People enjoy watching fish swim. It’s soothing in our otherwise crazy high-speed lifestyles. Fish habitats come in practically every shape and size you can imagine. Some are works of wonder while others are more like WTF were they thinking when they designed that aquarium. These are 31 of those very unique aquariums found around the world. Want an Aquarium? (image credits Born Rich,hometone,gizmodo,Sydney Morning Herald,Born Rich) Fish habitats have come a long way since simple rectangular aquariums or a round bowl. glass-art (image credits: Vanessa Mitrani ) If you have a fondness for glass art yet also want to keep fish as pets, there are dozens of options available for you. Ice (image credits doseng) Want fish but not the mess of cleaning their habitat? Strange or Cool? (image credits gizmodo,Born Rich,gizmodo,novate) The Spillarium has a waterfall effect to circulate and purify water in the aquarium. Fish Fans (image credits Luxury Housing Trends,Opulent Items,Opulent Items,Elseware Inc)

Health & Medical History of Osama bin Laden Doctor Zebra > Presidential health > Other notables > Historical figures All information about bin Laden should be treated with a healthy dose of skepticism. A Pulitzer Prize-winning 2006 book, The Looming Tower 1, scoffs at previous reports -- apparently well-regarded by the CIA -- that bin Laden has Marfan syndrome or kidney disease. Vital Statistics Bin Laden was born on March 10, 1957 2a. Comment: Being "forced to lie down" could be a result of hypotension, autonomic dysfunction, or some other cause of weakness. "The CIA has determined that bin Laden has an enlarged heart and chronically low blood pressure" 4. [Persons with Marfan syndrome are classically tall and thin. Resources Wright, Lawrence.

Review: USB mobile phone charge cables (and other daft things to do with USB sockets) Greetings, road warriors. Picture this. You're out and about with your steal-me bag full of computer gear, you've been making mobile phone calls all day - or using your funk-o-phone as a modem for your laptop - and now the phone's battery's flat. You don't have a car charger - or you don't have a car. You've got a perfectly serviceable laptop with a not-yet-flat big fat battery pack, but that's no use to you, right? Enter these things. The computer doesn't notice when its USB ports are used this way, because there's nothing connected to the data contacts - only the power supply ones. Using a USB port as nothing but a five volt power supply is like using a rifle as a club, but hey, you've got 'em. One of the charge cords has a barrel plug that suits Nokia 8850, 8210 and 3210 phones - or various other things with the same 3.5mm centre-positive barrel socket that can run from five volts. There's not a lot more to be said about the cables. OK.

Ordering CPIF Purchase "eBook" (download book in PDF format) Online Price: US$10.00 per licensed download Terms: This eBook is copyrighted material. You may print copies for your own personal and immediate family use. If you are a teacher, you may print up to 10 copies per downloaded eBook license for use in your classroom or lab only. You may not distribute copies of the book in electronic or printed form outside your lab, classroom, or home. Note: When you place an eBook order, please allow time for the order email from PayPal to be received and handled. Item code: cpif-17-ebook Available in some Stores Computer Programming is Fun! Special Orders Printed copies of Computer Programming is Fun!

What follows in this section is just a brief summary of much material presented and discussed over 24 hours of intensive instruction and interaction, so it's not an easy read. Consider it rather a quick tour of the cc world - mainly as a guide for further thinking and an opening to the expanded materials on our web-sites - this,, and others - / We began with the basics of conventional and community money systems - that all we really need to know about money, we already know and we always did. We know what it does, what it is and where it's from. For conventional money, the three key characteristics are - what it does - it goes anywhere in the worldwhat it is - it's scarce, and where it's from - it comes from somewhere else. Those factors alone result in serious problems in the economy - both the personal and the public economy - problems all about where money is, and is not, when it's needed.

[DOM Based Cross Site Scripting or XSS of the Third Kind] Web Security Articles - Web Application Security Consortium DOM Based Cross Site Scripting or XSS of the Third KindA look at an overlooked flavor of XSS By Amit Klein [TEXT] size: 22k (MD5 SUM: 2285b3e1e8c471ce4d966958213e47c2) [HTML] size: 42k (MD5 SUM: 237cae7486922ce7c7580ffee3fcca30) Summary We all know what Cross Site Scripting (XSS) is, right? It’s that vulnerability wherein one sends malicious data (typically HTML stuff with Javascript code in it) that is echoed back later by the application in an HTML context of some sort, and the Javascript code gets executed. Application developers and owners need to understand DOM Based XSS, as it represents a threat to the web application, which has different preconditions than standard XSS. Introduction The reader is assumed to possess basic knowledge of XSS ([1], [2], [3], [4], [8]). Example and Discussion Before describing the basic scenario, it is important to stress that the techniques outlined here were already demonstrated in public (e.g. [5], [6] and [7]). <HTML> <TITLE>Welcome! Notes:1. 2. 1. 2.

Much ADO About Text Files Greg Stemp Microsoft Corporation March 5, 2004 Summary: Demonstrates how script writers can use Microsoft ActiveX Database Objects (ADO) techniques to retrieve data from logs and other text files. (14 printed pages) If we Microsoft® Scripting Guys were smart (well, let's face it: if we were smart we'd be the Microsoft Highly-Paid Executive Guys rather than the Microsoft Scripting Guys) you would think that at some point we would learn not to make offhand remarks, unless we were ready and able to back them up. Well, it turns out that a lot of people read Readme files, and that a lot of people want an Active Directory browser. So did I learn my lesson from the Active Directory browser incident? Well, as the old saying goes, once the toothpaste is out of the tube, it's awfully hard to get it back in. Oh, right: I shouldn't have said that either. So What Are Delimited Files? LastName,FirstName,MiddleInitial Myer,Ken,W Poe, Deborah,L "Myer","Ken","W" What's the difference? No filtering. Eep!

Maybe on my next pair of socks I'll give that a try. I only do the 1 or 2 circs method. Should work fine I'd say. by douglasgrendahl Dec 21

I have done it and it's not hard to master, although I have to read the directions again each time I use it. I usually do socks 2 at a time and there are instructions for that on the Internet too. I don't know if I've save that link in Pearltrees. by stacyw Dec 20

Ok, has anyone tried this technique and if so, comments? by douglasgrendahl Dec 20