Birthday gift from House Sneed.
<a href='/images/imag0135.jpg'
From the movie Aliens, a workshirt for the Weyland-Yutani Corporation.
Read more...
<a href='/images/imag0135.jpg'
From the movie Aliens, a workshirt for the Weyland-Yutani Corporation.
Read more...
A spinning wheel with Robby the Robot etched onto the side.
Wool, ready to spin into yarn.
I've heard of knitting circles before, but this is the first spinning circle I've ever seen.
Read more...
Read more...
From the HacDC space blimp meeting a couple of weekends ago: telemetry proof-of-concept.
Clockwise from left to right: Windbringer, HTX-202 hand-held ham radio, remains of breakfast, random PS/2 stuff from R. Mark Adams' workshop, keyboard, someone else's laptop, 35 watt linear amplifier, USB-to-serial converter, TinyTrak 4 TNC, LCD display for TinyTrak.
We get signal?
Read more...
Read more...
In the halcyon days of the 80's, a fairly common trope of cyberpunk was people (usually background characters but occasionally a main character) wearing battlegoth makeup - funky facepaint that distinctively changes your appearance. Often it was described as a stylistic choice, not unlike what some media stars effect today though occasionally you see it at street level. Facial recognition systems are pretty primitive today but they're starting to be deployed by law enforcement and advertising agencies just the same to gather actionable information for later use. Right now eye tracking software is used to determine what keeps people's attention for …
Read more...
If you just look at the outside of a piece of hardware you can't tell if it's working or not, but if you open the housing to peek inside you will unquestionably break it.
Read more...
Confirmation's just hit the NOVALUG website - I will be presenting at the next meeting on 10 April 2010 on the topic of anonymity technologies in general and Tor in particular. Tor is the name of a free/open source utility which protects the user from traffic analysis and some content monitoring by passive attackers. I will discuss the origins of Tor as well as the threat model it was designed for, its capabilities, and potential attacks against the network as a whole and individual users thereof. I will also talk about operational security for users and Tor nodes. I will …
Read more...
It seems that Squidgate has finally drawn to a close and now all that remains is to pack the pieces back into their respective slots, fold up the game board, and find out what sentence will be given to Dr. Watts. As has been repeated time and again around the Net (with varying signal/noise ratios), he was convicted of obstructing US border guards. Not attacking or making any threatening movements toward them, as the agents originally claimed. Obstructing them. The jury eventually decided in favor of the prosecution because, by the letter of the law (good luck finding it …
Read more...
Hot-swappable drives aren't.
Read more...