A mobile phone jammer circuit usable with GSM1900 and an effective frequency range of 1930 MHz through 1990 MHz. The GSM1900 network is used in Canada, South America, and the United States (T-Mobile and AT&T).
Posts in Technology
Integrated circuit packages, the form an IC is manufactured in, are as wide and varied as a Donald Trump “alternative truth”. Below is the big list of integrated circuit (IC) package types including the package name, package full (official) name, remarks and notes, and a picture of diagram of the electronic package.
Although there are no definitive standards for common field length validations, we can come close using governmental standards, ISO recommendations, and database best practices based on maximum known values. Below are common database fields along with their maximum recommended allowable length and data type.
They broke laws in 13 states and 93 counties, reaching speeds of 160 mph, on a 2,683-mile trip from New York to Los Angeles. The jaunt should realistically take over 41 hours – they did in under 29 driving an innocuous looking Mercedes that was decked out with more gear than a Oklahoma stormchaser’s rig.
Red Star OS, North Korea’s official Red Hat-based Linux distro, is very easy to install in a VM. Given recent revelations of its many security holes, it’s an excellent opportunity to install the operating system in a local VM and then pound it for vulnerability assessment. At the very least, this will let you derive […]
The black and white photograph depicting an early 19th century scene was taken by Louis Daguerre in 1838 on the streets of Paris, France. With a seven minute exposure time, two stationary humans were captured on camera, making it the oldest known photograph containing actual images of people. Oddly, there were likely many other people […]
If you are suspicious of Tor, tired of the laggy connection, or simply want a more stable means to ensure your connection is encrypted and secure, you can easily create a VPN connection through a VPN connection which ensures anonymity and hard-core encryption of your network stream (with kill switches to protect your identity if […]
“The Facebook” went live on February 4, 2004 from Mark Zuckerberg’s Harvard University dorm room. Ads began running shortly thereafter. In 2005, Facebook rolled out the News Feed and by 2007, Facebook simplified its design. By 2008, Facebook had 100 million users and launched Facebook Chat. In 2012, Facebook hit 1 billion members and in […]
Man’s’ preoccupation with the capability to escape his earthly domain and soar amongst the clouds has led to innumerable ingenious methods of getting aloft. Some methods have been practical – others not so much. Case in point – the AVE Mizar flying car, affectionately known as “The Flying Pinto”. Yes, “Pinto”, as in the “death […]
I enjoy hacking. The intrigue, digging through arcane protocol specs in order to discover some new architectural design flaw or idiotic programmer bug, and the excitement surrounding a mysterious hidden world that few are capable of experiencing, in my mind is akin to losing yourself deep in a software coding problem. I consider myself a […]
Wily South Africans clean up scenic landscape with clumsy attempt to disguise cellphone towers as trees
South African photographer Dillon Marsh’s latest photographic series tipped us on to some hidden gems that we most likely would have never noticed – cellphone towers disguised as trees. The cellphone infrastructure often provides an incompatible fit with our typically scenic landscapes but those wily South Africans devised an interesting and to some, funny, solution […]
China’s modern Internet architecture – a framework for effective and efficient Internet traffic communication or model for mass censorship
When it comes to Internet architecture, China has a huge advantage over the rest of the world. Given its relatively new economic status (the Internet was not introduced to China until 1994), China is in the unique position to build its Internet, from the ground up, using proven and sound architectural schemas (in contrast to […]
Widely used in Europe and beginning to catch on in the United States, these robotic milking machines require very little human labor allowing a dairy farmer to operate a 350-cow dairy with only two human employees. The robotic milkers are revolutionizing the dairy industry. When the cow gets uncomfortable and decides it needs to be […]
In a lot of ways, those ancient guys were pretty smart and the trebuchet is the perfect example their old time ingenuity. A Trebuchet (pronounced treb-oo-shay) is a medieval siege engine that transfers gravitational energy into kinetic energy – similar to a playground see-saw. In ancient times, it was used to launch (throw) projectiles including […]
Constructed by Howe and Howe Technologies, the Thermite RS1-T2 automated firefighting machine is designed to go into situations and blazes that firefighters could not normally enter – chemical plants, nuclear reactors, munitions plants, and other dangerous places that firefighters would draw straws for. Originally designed to neutralize IEDs in war zones, Thermite was redesigned as […]
Most hardcore geeks have been there and a few hardy souls visit it regularly. Known variously as the Deep Web, Deepnet, Invisible Web, Hidden Web, and Undernet, it is claimed to be several orders of magnitude larger than the surface web – if you can find the buried, hidden content that lies deep within. But […]