Lets bring back handsome!
UHF connector performance
My ham-radio side found this article fascinating…
In this short paper I will attempt to take a practical approach to demonstrate the problems associated with non constant impedance RF connectors. Of particular interest is the now inappropriately named UHF type connector, known more commonly as the PL-259 (Male) and SO-239 (Female). The results gained here are primarily aimed at supplying fellow radio amateurs with information that is not readily available. Characterisation will take place at frequencies around 146 MHz and the at UHF frequency of 438 MHz, where in actual fact this type of connector is not recommended for use.
Comments are off for this post
My buddy Steve personally sent me a pre-release iPad to play with! w00t!
UPDATE: Yes, it was a april fool’s joke… thanks to those who figured it out and didn’t ruin the fun 😀
How do defeat locks with foil
Now from China – lock pick kits made from foil!
Apparently it’s been around for fifteen years but using foil impressions to pick locks is new to us. This is similar to using bump keys but it works on locks that are supposedly much more secure. This method uses a heavy gauge aluminum foil to grab and hold the pins in the correct place for the lock to be turned. The foil is folded over and slits are cut where each pin will fall. It is then inserted into a lock on a tool shaped like a key blank. Jiggle the tool for a bit and the cylinder will turn. This just reminds us that we’re much more dependent on the good will of our fellow citizens to not steal our stuff, rather than the deterrent that a lock provides.
Comments are off for this post
How to wipe drives securely
I just went thru’ this process to wipe a stack of drives before I dropped them off at the local Goodwill Computerworks…
With stories abounding of identity theft aided by information lifted from discarded storage devices, you want devices you no longer plan to use to have no usable information when they head out the door. Here’s how to wipe them clean.
Leave No Trace: How to Completely Erase Your Hard Drives, SSDs and Thumb Drives
Comments are off for this post
How Color Theory works
This is good stuff when choosing colors for designs…
Color in design is very subjective. What evokes one reaction in one person may evoke a very different reaction in somone else. Sometimes this is due to personal preference, and other times due to cultural background. Color theory is a science in itself. Studying how colors affect different people, either individually or as a group, is something some people build their careers on. And there’s a lot to it. Something as simple as changing the exact hue or saturation of a color can evoke a completely different feeling. Cultural differences mean that something that’s happy and uplifting in one country can be depressing in another.
Comments are off for this post
My Yaesu FTM-350R is back from getting firmware update
Posted by richardyoo on Natuba
Comments are off for this post
Create your own 2.4ghz Spectrum analyzer
Someday, when I run out of projects… maybe I’ll build one of these… 🙂
After visiting some web pages about 2.4 GHz ISM band spectrum analyzers based on the CYWM6935 module, I tried to build my own analyzer, but with some improvements. The references I found on the net used the parallel port or a serial link to a host computer. I want the analyzer to be portable, and easy to transport, so I will use a microcontroller and a graphical LCD.
Comments are off for this post
Antenna Party
Antenna party
-Richard
Antenna party – quad on the ground
-Richard
Comments are off for this post
The Latest ATM skimming technology
This has gotten me so freaked out that I have this new habit where I inspect an ATM carefully even before I take my wallet out… yikes!
Easily the most-viewed post at krebsonsecurity.com so far has been the entry on a cleverly disguised ATM skimmer found attached to a Citibank ATM in California in late December. Last week, I had a chance to chat with Rick Doten, chief scientist at Lockheed Martin’s Center for Cyber Security Innovation. Doten has built an impressive slide deck on ATM fraud attacks, and pictured below are some of the more interesting images he uses in his presentations.
According to Doten, the U.S. Secret Service estimates that annual losses from ATM fraud totaled about $1 billion in 2008, or about $350,000 each day. Card skimming, where the fraudster affixes a bogus card reader on top of the real reader, accounts for more than 80 percent of ATM fraud, Doten said.
FCC may ban cell phone amplifiers
I already own a Wilson cell phone amp (part of my pile of ham radio gear)… but they may become extinct soon…
Comments are off for this post
Got a Nexus One? You need DoubleTwist!
Comments are off for this post
Suspended animation for humans is coming
Here’s a video of Mark Roth from this year TED conference – Mark talks about how suspended animation is very real and will be here soon for humans.
I’m excited!
Comments are off for this post
SxSW Interactive is now *officially* useless
Sadly, I agree… except, the last line in his article… I think TED is done too. 🙁
The Interactive portion of the conference drew over 12,000 attendees this year, and the rumor going round is this is the first year that Interactive has more badge-holders than Music. But the same rumor went around last year, and who cares, Music’s still got all the wrist-banders too. Burning Man gets bigger every year, but it’s (reportedly) pretty much as cool as ever. What’s different at this year’s SXSWi?
Comments are off for this post
My new phone is here – The ATT ver of Nexus One
Posted by richardyoo on Natuba
Comments are off for this post
The Lego Blocumentary
I really enjoyed watching this… these LEGO builders are SERIOUS (and apparently all from Washington state):
AFOL A Blocumentary from AFOL on Vimeo.
Comments are off for this post





















