View allAll Photos Tagged hack
Our prospects for changing the mounting system for this frame look good. The LCD is a self contained panel with a ribbon cable connection to the main circuit board contained within the frame housing.
Turning a standard USB keyboard into a restricted access interface for an interactive automaton.
Sawing off unneeded keyboard end.
Project: Hive Mind Fortune Reader
Reads the collective mind of connected Twitter users and reads their fortune.
April 2013
For more on this and other such making things and techniques see the "Making weird stuff" blog
High Heels geben dir immer das sexy Selbstvertrauen, weshalb sie von vielen Frauen getragen werden, obwohl sie die Füße belasten und danach sehr schlecht machen können. Wenn Sie eine zierliche Frau sind, bin ich mir ziemlich sicher, dass Sie ständig mit dem Kampf zwischen der Auswahl von Kom...
coolideen.com/2018/08/10/high-heel-hacks-um-ihre-fuse-beq...
Prokit-type softbox. Finished and ready to attach to the flash. The plastic in the mouth of the softbox helps to diffuse the light. The oval shape is a piece of aluminium tape on the inside. It's there to throw back the light from the hotspot.
Current & Twitter Hack The Debate
photo by Scott Beale / Laughing Squid
This photo is licensed under a Creative Commons license. If you use this photo within the terms of the license or make special arrangements to use the photo, please list the photo credit as "Scott Beale / Laughing Squid" and link the credit to laughingsquid.com.
This is a true 90's movie. This is what we "geeks" live for. {still exist, just got to keep it shhhhhh}
4 days toy hacking and circuit bending workshop with a group of 20 students from Willem de Kooning academy, Rotterdam.
Stephanie Martz, Principal, Monument Policy Group;
Orin Kerr, Fred C. Stevenson Research Professor, George Washington University Law School;
Amie Stepanovich, U.S. Policy Manager and Global Policy Counsel, Access Now;
Steven M. Bellovin, Professor of Computer Science, Columbia University;
Kobie Flowers, Partner, Flowers Law, PLLC
4 days toy hacking and circuit bending workshop with a group of 20 students from Willem de Kooning academy, Rotterdam.
Hacker – Blackhat 2015 | filmi, puan alarak yapımı olan filmin konusunda ise Yapımı, oyuncları ve yönetmen İMDB: 5.4 ( 12.435 Kişi Oy kullanmıştır. ) Yakın gelecekte iki süpergüç olan Amerika Birleşik Devletleri ve Çin yüksek oranda siber suç işlenmesi nedeniyle, güvenliklerini sağlayabilm...
Hacking Arts ignites entrepreneurship and innovation within the creative arts. We bring together creative technologists, artists, innovators and hackers at MIT to explore the future of the arts at our annual Conference, Tech Expo and Hackathon.
Hacking Arts 2016 marked the fourth annual festival held at the MIT Media Lab, fostering community and celebrating innovation in the creative industries: Design, Fashion, Film/Video, Gaming, Music, Performing Arts, Virtual/Augmented Reality and Visual Arts.
Hacking Arts is organized by the MIT Sloan School of Management Entertainment, Media & Sports Club in partnership with MIT's Center for Art, Science, and Technology and the Martin Trust Center for MIT Entrepreneurship.
Learn more at hackingarts.com/#ha2016
All photos ©Sharon Lacey
sharonlacey.com/lennymartinezd/
Please ask before use
We were young and ambitious many years ago in the beginning of internet epoch in Russia. Here are: Evgeny Rodichev, Pavel Plechov, Volodya Ermakov, Lexa Tutubalin, me (Oleg Bartunov). Many people (now well recognized) visited our room 38 in Sternberg Astronomical Institute, Moscow University.
Smoke detector. Hacked to give analog output. This way the ambient smoke
level in the layout can be monitored.
This is the view out the back window of my taxi cab home tonight. On
15th street at Harvard, the hack police are out in force, pulling over
my cab to check the driver's cabbie license. Good on them, I say.
--
Kiwicon 2038AD took place in Wellington on 16 and 17 November 2018. It's the premier hacker conference in Aotearoa New Zealand if not the Southern Hemisphere, the earth, and the entire universe.
Students attend the YU Hackathon, a 24-hour event focused on technology, computer science, and engineering. The event was officially called Reinvent YU.
¿Como fotografiar a un Hacker sin desvelar su identidad?
Hicimos varios intentos. En l aimagen central pequeña, se ve demasiado bien al hacker, asi que no sirve. Un SB-26 con gel azul sobre el teclado rebotado en un folio en la pantalla para crear la sensación de brillo de monitor. Otro flash disparando sobre el fondo para llevarlo al blanco.
En la imagen izquierda un flash con panal de abeja sobre el ordenador, otro con panal de abeja sobre el teclado desde la izquierda de la imagen para resaltar algo la mano. Otro flash desde detrás para el perfilado por la izquierda y un último flash con gel azul para el fondo.
En la imagen de la derecha hemos eliminado el flash que ilumina el teclado para proteger la identidad de nuetro hacker.
Sketchnotes of Chapter 3 of Hacking Work by Bill Jensen & Joshua Klein
I did the text, @danboudwin did the illustrations.
"April 6, 2006
MIT hackers posing as the Howe & Ser Moving Company appropriated this cannon on March 28, 2006. It later appeared on MIT's campus with the addition of a large brass rat made of gold-plated aluminum. In honor of its previous owners, the cannon points towards Pasadena, CA."