Wednesday, April 21, 2010

Insanely Cool Cassette Tape Art [PIC]

Insanely Cool Cassette Tape Art [PIC]: "

insanely cool cassette tape art

"

Honda CBX Custom: ‘Wide Boy’

Honda CBX Custom: ‘Wide Boy’: "
Honda CBX

I don’t know about you, but I find most ’show bikes’ less inspiring than a good garage build. The shows occasionally do throw up something truly original though, and this bike is a case in point. ‘Wide Boy’ appeared at the recent London Ace Cafe Motorcycle & Custom Show, and was built by Larry Houghton. It didn’t win—it came third in the Freestyle class—but it deserves a closer look. Larry comes from the ‘extreme engineering’ school of custom bike building, and unlike most extreme customs, his bike holds together visually. It’s based on a late model 1983 6-cylinder CBX, although little remains of the Honda donor. The new frame, for example, is crafted from one-inch thick aluminum sheet that Larry cut, bent and twisted into a multitude of angles—as if it were a paper origami sculpture. He designed a front end similar to BMW’s radical Telelever system, and installed a single-sided Ducati 916 swingarm at the back. Wheels are 17” Marchesinis from a Ducati 996. The sinuous, six-into-six exhaust system is a highlight: it took Maf Welch of Expressive Engineering three weeks to build, and required seven meters of stainless steel tubing. It’s tempting to overcook a bike like this, so the paintjob is thankfully low-key: a gunmetal black base is overlaid with dusted silver, and finished with orange pinstriping. (A color scheme coincidentally close to the colors of the original, unmolested CBX.) If I was a show judge, I’d say the result is edgy and provocative—and a welcome departure from the usual ‘Hot Wheels’ show bike look. What do you think? [Thanks to Peter Leonard.]

Honda CBX

Honda CBX

Honda CBX Custom: ‘Wide Boy’ is a post from Bike EXIF. Brought to you by Vitesse Moto.

See also:
  1. Benjie’s Café Honda CB350
  2. 1980 Honda CBX custom

Holga Medium-Format 3D Stereo Camera

Holga Medium-Format 3D Stereo Camera:


The Holga 120 3D Stereo Camera is a plastic, medium-format camera that captures two slightly offset images at the same time on 120 film. The resulting images are then viewable in stereo 3D using the special Holga 120 3D Slide Viewer. The camera itself costs $100, but for $150 you also get the 3D viewer, some 120 film, and a set of slide mounts.

If you’d prefer doing 3D photography digitally, Fujifilm’s FinePix REAL 3D W1 can do the trick, though, with an MSRP of $600, it costs nearly six times as much.

(via Gizmodo)

Want Porn? Buy an Android Phone, Steve Jobs Says

Want Porn? Buy an Android Phone, Steve Jobs Says: "

The rules about what types of content can and can’t be in Apple’s App Store are still fuzzy, but one thing’s certain: Steve Jobs doesn’t want to sell porn.
Despite yesterday’s iPhone debacle, Jobs was still in a chatty enough mood to respond to a concerned customer’s e-mail questioning Apple’s role as “moral police” of its App Store. The customer, Matthew Browing, was referring to the App Store’s initial rejection of an app containing Mark Fiore’s Pulitzer-winning editorial cartoon, as well as the company’s recent porn ban.
In his reply, Jobs admitted rejecting Fiore’s app was a mistake, and he wasn’t shy about advertising his biggest competitor’s product as a phone for porn lovers:
Fiore’s app will be in the store shortly. That was a mistake. However, we do believe we have a moral responsibility to keep porn off the iPhone. Folks who want porn can buy and [sic] Android phone.
TechCrunch’s MG Siegler, who originally reported the e-mail exchange, noted the “and” typo in Jobs’ response, but he said he verified the sender by checking the e-mail’s IP headers.
Jobs’ purported e-mail response is believable, as it comes in line with a statement the CEO made during a question-and-answer session at Apple’s iPhone OS 4 event earlier this month. A journalist asked whether Apple would consider allowing customers to load apps through alternative means other than the App Store, and Jobs again noted Android as an option for porn fans.
“You know, there’s a porn store for Android,” Jobs said. “You can download nothing but porn. You can download porn, your kids can download porn. That’s a place we don’t want to go, so we’re not going to go there.”
Jobs’ opposition to porn is loud and clear, but Apple’s crackdown on sex-tinged apps can be described as a “semi-ban” at best. The Playboy app remains in the App Store, as does the Sports Illustrated app, because they come from “more reputable companies,” according to Apple’s vice president of marketing Phil Schiller.
See Also:
Photo: Jon Snyder/Wired.com
"

iPad user case: Pro blogger

iPad user case: Pro blogger: "

Filed under:

Over the past few weeks, we've heard many people say, 'The iPad is cool, but what would I do with it?' This new series aims to answer that question. We'll examine one user case per post, from couch surfer to mobile professional, and describe just how that person uses his or her iPad.



As a professional blogger, there are 5 things I need to do my job:

  • A comfortable, reliable keyboard

  • A text editor

  • RSS feeds

  • Web access

  • A reference tool for compiling research


The iPad lets me get nearly all of that accomplished. Let's start with what works.



The keyboard



The iPad's software keyboard is more usable that I expected. It's forced me to develop a hybrid typing method that's part hunt-and-peck and part touch typing. Years ago, I learned to keep my fingers in the home position, lightly touching the keys. On the iPad, 'lightly touching' means 'pressing,' so now I hover just above the keys.



The landscape keyboard is just a bit smaller than a standard keyboard, so I can't keep my hands in the true home position. However, knowing each key's location without having to look is tremendously helpful. With a bit of practice, my muscle memory has adapted to the smaller keyboard. The real key, as with the iPhone, is to be fearless and type. The iPad will correct the vast majority of your mistakes.



That being said, I don't want to write more than a few hundred words with it. Even with the above accommodations, I still make more errors than I do with a physical keyboard. Therefore, Apple's Bluetooth keyboard is essential. It's a breeze to set up, fits squarely in a bag and is barely wider than the iPad itself. With the iPad docked and the keyboard in place, I'm ready to write.





TUAWiPad user case: Pro blogger originally appeared on The Unofficial Apple Weblog (TUAW) on Tue, 20 Apr 2010 16:00:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments"

Mozilla Disables Insecure Java Plugin

Mozilla Disables Insecure Java Plugin: "

firefox-logo.jpgHats off to Brian Krebs for reporting that Mozilla has disabled vulnerable versions of a Java plugin for Firefox through their blocklist service.



Oracle had issued a Java update to fix the bug last week, but Mozilla developers were concerned that the update does not necessarily remove old, vulnerable versions. Leaving old, vulnerable code on a system is a long-standing issue with Java, albeit one which they have begun to address.


The information came from discussions on Bugzilla, where Mozilla developers and administrators decided to issue the flag.. Mozilla hasn't made any announcement on the matter. Note that the vulnerable plugin is the 'Java Deployment Toolkit' versions prior to 6.0.200.2. Look carefully, as there are quite a few add-in programs in Firefox with the 'Java' name in them.



Changes to the blocklist are issued through Firefox's update mechanism. Some details of how this is done are discussed on the Bugzilla page. A few users complained about the change, offended that Mozilla would shut off software on their system without asking. This complaint seems irrational; only users who are subscribed to Mozilla's automatic updating mechanism receive the change, and they receive substantial software changes from Mozilla all the time. Minor version updates are applied automatically with no user confirmation. Furthermore, such users are free, and well-advised, to apply the Oracle update to Java and they should notice no change in functionality.



I read the Bugzilla thread as indicating that there is still some confusion over who is vulnerable and that the proof-of-concept attack provided by the researcher who reported the bug was not necessarily running on all vulnerable systems. But even so you're clearly better-off with the new version on and old versions off.



Not enough attention is being paid to the fact that Oracle (and, before that, Sun) installs several add-ins of various types to Firefox and Internet Explorer when you install the JRE (Java Runtime Environment). If they inform the user that they are doing this during the installation, it's a subtle notification. When it came to light that Microsoft had installed a Firefox plugin for .NET and that plugin had a vulnerability Microsoft was widely criticized for installing it without asking permission. But such installations are common, as shown by Oracle's actions.

"

Quantum Broadband Network is So Secure It's Unbreakable (in Theory)

Quantum Broadband Network is So Secure It's Unbreakable (in Theory): "

In the world of IT, it really doesn't matter how much data you can transmit if you can't send it safely and securely. Now, Toshiba researchers in the UK have created the first high-speed network connection that is theoretically impossible to hack, tapping the quantum properties of photons encrypt data that was beamed through more than 30 miles of optical cable.

Quantum encryption involves one party sending a 'key' to another party that is embedded in the quantum properties of a photon string. The laws of quantum mechanics protect this data, ensuring that if any third party messes with the quantum key, the key will be altered and the foul play will become evident.


While this concept isn't new, it wasn't previously feasible. The most efficient way to pass encoded quantum strings back and forth was through the air, but even the best attempts at that could only transmit the key several hundred meters. Toshiba was seeking a way to integrate quantum broadband into existing infrastructure that would allow photon transmission across greater distances.


Of course, sending photons through existing optical fiber isn't new either, but Toshiba's breakthrough came on the back of a new photon detector that can actually pick up individual photons at the hard-to-detect wavelengths required for long-distance data transmission. The transfer rates are nothing to scoff at either; the1 megabit-per-second data speeds the team achieved are fast enough to stream video.


[New Scientist]

"

A Mind-tripping journey into Heaven and Hell

A Mind-tripping journey into Heaven and Hell: "

hattlar_01


These are two animation loops: 1) “1925” (a.k.a. Heaven) and 2) “1923” (a.k.a. Hell) directed by Max Hattler. The films are inspired by Augustin Lesage’s paintings of “A symbolic Composition of the Spiritual World” from 1923 and 1925.


(...)
Read the rest of A Mind-tripping journey into Heaven and Hell (131 words)


No comment Yet | Join Illusion 360 at Facebook!






Sponsors

ProWorkFlow
SiteGrinder - Designers Rejoice!
OneEyeland
LiveBooks
Ript Apparel




OneEyeland | SiteGrinder | Ript Apparel | LiveBooks | ProWorkFlow


"

Monday, April 19, 2010

Recommended Tools to remove Security Tool

Some of the recommended tools and websites which can help you to get rid of the virus free of cost are:
Tools:
Malwarebytes, Trojan Remover, Glare Utilities & Ccleaner for removing left overs, Hijackthis and try spybot(Only if MBAM is not working and you do not want to run combofix).Also use Trojan Remover Utilities to Reset Host files and explorer policies...If nothing works then its Combofix(Not recommended for a basic user).

Sites:

* http://www.bleepingcomputer.com/virus-removal/
* http://www.microsoft.com/security/antivirus/rogue.aspx

There are many more sites you can follow but too much information will mess it up.So just follow one of these and it'll be removed.
.

Massive Malware Attack by Security Tool since yesterday

Since yesterday there has been a tremendous increase in Security Tool rogue infections mostly in the US,Canada and surrounding regions. Its the same breed of security tool malware and not always very tough to remove in its initial stage. The ways they are entering the computers by fooling the users is scary. It is spreading through emails,Youtube and could be any social networking way. The security tool if installed alone is not very difficult to remove.Just follow the removal steps using google or go to bleepingcomputer.com. The problem arises only if it has entered the computer through MyWebsearch (Another well known backdoor creator). If the sysem is infected by MyWebsearch then most like there are different variants of malware in the computer which make it difficult for a normal user to remove because it'll not allow you to run the powerful removal tools like Malwarebytes, Trojan Remover..etc. Follow the steps in bleeping computer when unable to install MBAM. In one of my experience non of the tricks worked and had to go for soemthing more powerful like combofix (not recommended for a basic user). If any of you face any trouble removing it let me know, i'll send the steps how to make it run and remove it.