View allAll Photos Tagged hacking

Medics tend to NSPCC HACK (hike against cruelty to kids) walkers next to our vehicle on North Yorkshire Moors. Beverley and Barnsley Area RAYNET and others were in attendance at this event.

 

17/6/2006 - A challenging 40 mile walk for both walkers and operators stretching from Kirkbymoorside on the North Yorkshire Moors to Scarborough in the East.

 

RAYNET is a voluntary emergency communications service, using amateur radio frequencies for co-ordination. They work alongside emergency services as requested. They also provide wide area event communications in their spare time as part of their training. To find out more about what they do, go here: www.raynet-uk.net/

 

RAYNET always welcome new licensed radio amateurs who wish to join. Contact the website to find your local group.

HACKED - Held at the o2 Arena London over the weekend of 20th and 21st July 2013.

Techno Security 2008

  

Hacker Halted

Techno Security 2008

Myrtle Beach, SC

I hacked one of my notebooks that I have a stack off in my closet, and hacked it by taking off the cover and putting in the midori notebooks from IchibanKan

I couldn't find non-white rounded and the right size of elastic at my local Walmart.

No, we don't have a craft store :(

 

Electronics Hobby

 

Building a new components-cabinet.

 

Hacker (hobbyist)

 

In home computing, a hacker is someone who modifies software or hardware of their own private computer system. It includes building, rebuilding, modifying, and creating software (software cracking, demoscene), electronic hardware (hardware hacking, overclocking, modding), either to make it better, faster, to give it added features or to make it do something it was not originally intended to do. Hacking in this sense originated around hobbyist circles discussing the MITS Altair at the homebrew computer club.

  

Hacker artists[edit]

 

See also: Fractal art, algorithmic art and interactive art

 

Hacker artists create art by hacking on technology as an artistic medium. This has extended the definition of the term and what it means to be a hacker. Such artists may work with graphics, computer hardware, sculpture, music and other audio, animation, video, software, simulations, mathematics, reactive sensory systems, text, poetry, literature, or any combination thereof.

 

Dartmouth College musician Larry Polansky states: "Technology and art are inextricably related. Many musicians, video artists, graphic artists, and even poets who work with technology—whether designing it or using it—consider themselves to be part of the 'hacker community.' Computer artists, like non-art hackers, often find themselves on society’s fringes, developing strange, innovative uses of existing technology. There is an empathetic relationship between those, for example, who design experimental music software and hackers who write communications freeware." [3]

 

Another description is offered by Jenny Marketou: "Hacker artists operate as culture hackers who manipulate existing techno-semiotic structures towards a different end, to get inside cultural systems on the net and make them do things they were never intended to do." [4]

 

A successful software and hardware hacker artist is Mark Lottor (mkl), who has created the 3-D light art projects entitled the Cubatron, and the Big Round Cubatron. This art is made using custom computer technology, with specially designed circuit boards and programming for microprocessor chips to manipulate the LED lights.

 

Don Hopkins is a software hacker artist well known for his artistic cellular automata. This art, created by a cellular automata computer program, generates objects which randomly bump into each other and in turn create more objects and designs, similar to a lava lamp, except that the parts change color and form through interaction. Says Hopkins, "Cellular automata are simple rules that are applied to a grid of cells, or the pixel values of an image. The same rule is applied to every cell, to determine its next state, based on the previous state of that cell and its neighboring cells. There are many interesting cellular automata rules, and they all look very different, with amazing animated dynamic effects. 'Life' is a widely known cellular automata rule, but many other lesser known rules are much more interesting."

 

Some hacker artists create art by writing computer code, and others, by developing hardware. Some create with existing software tools such as Adobe Photoshop or GIMP.

 

The creative process of hacker artists can be more abstract than artists using non-technological media. For example, mathematicians have produced visually stunning graphic presentations of fractals, which hackers have further enhanced, often producing detailed and intricate graphics and animations from simple mathematical formulas.

  

en.wikipedia.org/wiki/Hacker_(hobbyist)

A hack of the MIT Media Lab.

 

A livingroom was installed on the underside of the sculpture attached to the MIT Media Lab (normally it looks like www.media.mit.edu/about/images/e15.jpg ).

weather closing in.

thomashawk.com/2007/01/top-10-hacks-on-flickr.html

 

7. Moo Cards. Again, not so much of a Flickr hack as a tool for the flickr photographer. One of the problems with the outside world (yes even with Stewart and Caterina on the cover of Time magazine, etc. etc.) is that outside your immediate bubble of friends, a whole chunk of the world has no idea what Flickr is. As a photographer out there shooting all the time people will ask me where they can see my work. Even if you say "flickr" "thomas hawk" etc. People will forget. By ordering up some Moo cards (they are only about $25 for 100) you can give these cards out to people when they ask where they can see the shots.

 

Of course one hack with your Flickr Moo cards is that you don't actually have to send them to your Flickrstream. My Flickr Moo cards have my Zooomr stream ID url on there instead. Opps, did I just say that, Doh!

 

If you like these Flickr hacks feel free to digg them here.

Techno Security 2008

  

Hacker Halted

Techno Security 2008

Myrtle Beach, SC

Mozilla Paris Hack-a-Thon, June 9th 2013

need hacking profile to get in, the spirit with me

Ariel talking to Science Hack Day Berlin

Long abandoned historic Tie Hacker Camp in the High Uintas. Tie hackers in this area were an important part of the building of the coast to coast railroad. Tie Hackers cut railroad ties from the lodge pole and other pine and fur trees in the Utinas and hauled them to the construction sights where the railroad was being built. Both the Union Pacific and the Central Pacific used ties harvested and shaped from this area.

After all the parts are soldered, use the +9VDC wall wart power supply to power up the circuit, and check voltages. The LED should light up and +5VDC should be coming out of the regulator.

Mobile hacking space van at Defcon 16. This looks like it could be a lot of fun. Too bad gas is so expensive.

Hack D100 shutter, driver test. Now the new FPGA module is operational, I can further tests the D100 shutter unit. After a few tries everything works as expected. I had to slow down the sequence motor at the end if not, he went too far overshoot. Here the shutter is full open in order to let through the backlight.

 

To control the shutter, there are three elements:

- the sequence motor

- magnet 1

- magnet 2

The shutter itself actually consists of two separate curtains. Nikon hereby regulates its exposures For me it is easier given the shutter just have to be open or close. The motor sequence must be completely done. I could not take the signals from the fine connector. The pitch is only 0.5mm. A new SMD connector I had not. However, there are two solder terminals which are closed when the first curtain is fully open. At that signal I stop the sequence motor. If you interrupt the magnet 1 then the rear curtain closes. Magnet 2 is not used.

 

The D100 shutter is intended for use with my background LED module.

 

Timings:

Delay start close shutter 3.5 msec

Delay shutter full closed 10 msec

Magnet resistance dc: 75 ohm

 

A hack of the MIT Media Lab.

 

A livingroom was installed on the underside of the sculpture attached to the MIT Media Lab (normally it looks like www.media.mit.edu/about/images/e15.jpg ).

From 8-10 May, 2015, Waag Society and The Netherlands Institute for Sound and Vision hosted the first of six Europeana Space hackathons. This was the main objective: come up with appealing ideas and applications to bring the rich archive of digitized European cultural heritage to the public.

 

The Europeana Space Project seeks prove that digitized cultural heritage material can be used in creative ways, and new business and sustainability models can be developed around these innovations.

 

waag.org/nl/project/europeana-space

www.europeana-space.eu/

Hacker Herald Radio RP 10 back panel

D100 hack shutter.

The sliding contacts indicates the correct position of the sequnce motor. The connections are in the counterpart. This is the secret of how the sequencer works. For the shutter I do not need all positions.

Techno Security 2008

  

Hacker Halted

Techno Security 2008

Myrtle Beach, SC

Hacker İş Başında

Brutal hackjob in PS. I need to work on my selections. Anyhow, this shows the relatives size of my other C mount lenses and how it might look melded to the F20. The image quality of the F20 at ISO 800 isn't bad actually. Perhaps it'll make the donor list!

 

This is the 12mm Computar M1214-MP F1.4 for 2/3 sensor. The 8mm F1.4 is the same size. Each were found on ebay for 15 bucks each (new they are over 100 bucks). After some passes with the lens pen I was hard pressed to find any sign of use on them. Nicely built and both focus and aperture rings turn very smoothly. Minor beefs - the focus ring only has markings for near and far. If I succeed in mounting these lenses I'll have to make a scale by trial and error. Also the marking are for when you are looking at the camera from in front.

 

One worry is the quality of the lens can vary quite a bit as a lot are just designed for video. The label I've found I must look for are the "megapixel" lenses. They're rated for 1,2,3 and 5 megapixels, each corresponding to higher prices. The Computars are rated at 3 MP. I'll have to buy two donor cameras to compare if there is any real degradation in image due the lens ability to resolve.

 

Given the mount distance does not change for the various sensor sizes, a camera this size could sport a 2/3 sensor with little impact to internal configuration. So far the only 2/3 sensor cameras I could find were the size of the G1 and GH1. Perhaps a few attempts down the road I could try using the sensor from say the Pro1 in a smaller body.

 

All this to try and eek out less and less noise without carrying an SLR. I think the SLR will always win but I can try to close the gap. The thought of carrying a light kit with fast lenses is pretty appealing. I've done a trip to China, a trip to Puerto Rico and a wedding on a 28 and 50mm (45mm, 80mm equivalent on my 30D). The compact body, extra batteries, 2 primes and maybe a zoom would fit into the same volume of my SLR!

this is my first advance hacking experience

The reason why this got binned was that we needed a logo, not an illustration. I've drawn a lot of light bulbs for HackWeek. And chameleons.

HACK your brain - MAKE a brain machine

A sophisticated proof press that incorporated precision enginering to approximate actual press conditions. The Hacker company sold to Vandercook & Sons in 1937 and this model was discontinued. There is some discussion that Hacker was making a better proof press than Vandercook was but these cost more, so coupled with the Depression, Hacker had to sell out. Scanned from a print made direct from the original 8x10 Hacker negative in our collection.

D100 hack shutter.

The sliding contacts indicates the correct position of the sequnce motor. The sliding contacts are showing in the counterpart picture. This is the secret of how the sequencer works. For the shutter I do not need all positions.

1 2 ••• 13 14 16 18 19 ••• 79 80