Posts in Technology

List of programming steps to take when building .Net MVC application functionality

// May 11th, 2017 // No Comments » // Computers & Programming

Just in case you’re asked and want to sound like you know what you’re doing, here are the steps to take when building .Net application functionality.

Cell phone jammer circuit (GSM1900 network)

// March 20th, 2017 // No Comments » // Electronics

A mobile phone jammer circuit usable with GSM1900 and an effective frequency range of 1930 MHz through 1990 MHz. The GSM1900 network is used in Canada, South America, and the United States (T-Mobile and AT&T).

The big list of electronic component and integrated circuit (IC) package types

// March 14th, 2017 // No Comments » // Electronics

Integrated circuit packages, the form an IC is manufactured in, are as wide and varied as a Donald Trump “alternative truth”. Below is the big list of integrated circuit (IC) package types including the package name, package full (official) name, remarks and notes, and a picture of diagram of the electronic package.

Here are the recommended maximum data-length limits for common database and programming fields

// October 31st, 2016 // No Comments » // Technology

Although there are no definitive standards for common field length validations, we can come close using governmental standards, ISO recommendations, and database best practices based on maximum known values. Below are common database fields along with their maximum recommended allowable length and data type.

If you think driving from New York to LA in under 29 hours is no big deal – think again

// September 3rd, 2016 // No Comments » // Technology

They broke laws in 13 states and 93 counties, reaching speeds of 160 mph, on a 2,683-mile trip from New York to Los Angeles. The jaunt should realistically take over 41 hours – they did in under 29 driving an innocuous looking Mercedes that was decked out with more gear than a Oklahoma stormchaser’s rig.

Hands on with North Korea’s official Red Star 3.0 Server linux operating system

// January 12th, 2015 // No Comments » // Technology

Red Star OS, North Korea’s official Red Hat-based Linux distro, is very easy to install in a VM. Given recent revelations of its many security holes, it’s an excellent opportunity to install the operating system in a local VM and then pound it for vulnerability assessment. At the very least, this will let you derive […]

Oldest known photograph of a human being dates back to 1838

// November 9th, 2014 // No Comments » // Technology

The black and white photograph depicting an early 19th century scene was taken by Louis Daguerre in 1838 on the streets of Paris, France. With a seven minute exposure time, two stationary humans were captured on camera, making it the oldest known photograph containing actual images of people. Oddly, there were likely many other people […]

How to secure your Internet connection using a secure VPN through a secure VPN

// September 6th, 2014 // No Comments » // Technology

If you are suspicious of Tor, tired of the laggy connection, or simply want a more stable means to ensure your connection is encrypted and secure, you can easily create a VPN connection through a VPN connection which ensures anonymity and hard-core encryption of your network stream (with kill switches to protect your identity if […]

Visual history of Facebook- from its introduction in 2004 to its modern-day design

// February 6th, 2014 // No Comments » // Technology

2006 - Mark Zuckerberg's profile

“The Facebook” went live on February 4, 2004 from Mark Zuckerberg’s Harvard University dorm room. Ads began running shortly thereafter. In 2005, Facebook rolled out the News Feed and by 2007, Facebook simplified its design. By 2008, Facebook had 100 million users and launched Facebook Chat. In 2012, Facebook hit 1 billion members and in […]

The AVE Mizar – the historic “Flying Pinto” car that ended up killing its inventor

// May 30th, 2013 // No Comments » // Technology

Man’s’ preoccupation with the capability to escape his earthly domain and soar amongst the clouds has led to innumerable ingenious methods of getting aloft. Some methods have been practical – others not so much. Case in point – the AVE Mizar flying car, affectionately known as “The Flying Pinto”. Yes, “Pinto”, as in the “death […]

Differences in Chinese and Russian security philosophies and how the United States should counter

// April 15th, 2013 // No Comments » // Technology

I enjoy hacking. The intrigue, digging through arcane protocol specs in order to discover some new architectural design flaw or idiotic programmer bug, and the excitement surrounding a mysterious hidden world that few are capable of experiencing, in my mind is akin to losing yourself deep in a software coding problem. I consider myself a […]

Wily South Africans clean up scenic landscape with clumsy attempt to disguise cellphone towers as trees

// April 2nd, 2013 // No Comments » // Technology

South African photographer Dillon Marsh’s latest photographic series tipped us on to some hidden gems that we most likely would have never noticed – cellphone towers disguised as trees. The cellphone infrastructure often provides an incompatible fit with our typically scenic landscapes but those wily South Africans devised an interesting and to some, funny, solution […]

China’s modern Internet architecture – a framework for effective and efficient Internet traffic communication or model for mass censorship

// March 14th, 2013 // No Comments » // Technology

When it comes to Internet architecture, China has a huge advantage over the rest of the world. Given its relatively new economic status (the Internet was not introduced to China until 1994), China is in the unique position to build its Internet, from the ground up, using proven and sound architectural schemas (in contrast to […]

These dairy robots milk the cows and page the farmer in the dell when it breaks down

// January 25th, 2013 // No Comments » // Technology

Widely used in Europe and beginning to catch on in the United States, these robotic milking machines require very little human labor allowing a dairy farmer to operate a 350-cow dairy with only two human employees. The robotic milkers are revolutionizing the dairy industry. When the cow gets uncomfortable and decides it needs to be […]

How to build a Trebuchet (Catapult) – the ultimate defense (and offense) for the zombie apocalypse

// November 16th, 2012 // No Comments » // Technology

In a lot of ways, those ancient guys were pretty smart and the trebuchet is the perfect example their old time ingenuity. A Trebuchet (pronounced treb-oo-shay) is a medieval siege engine that transfers gravitational energy into kinetic energy – similar to a playground see-saw. In ancient times, it was used to launch (throw) projectiles including […]

Meet Thermite, the extreme robot firefighter that can go where no man has gone before

// November 1st, 2012 // No Comments » // Technology

Constructed by Howe and Howe Technologies, the Thermite RS1-T2 automated firefighting machine is designed to go into situations and blazes that firefighters could not normally enter – chemical plants, nuclear reactors, munitions plants, and other dangerous places that firefighters would draw straws for. Originally designed to neutralize IEDs in war zones, Thermite was redesigned as […]