Blog
Longhorn’s Secret Modder Surprises?
Huh, this will be neat to see. With the Beta 1 release of Longhorn now just weeks away, it is time to start talking about two little-known features that will particularly appeal to modders and power gamers. These are good signs that Microsoft is getting serious about these audiences; Link.
BlackJack on iPod notes hack…
iPod Blackjack lets you play blackjack on an iPod through the notes feature. The notes format does not allow random numbers or programming, so the games must be generated in advance. iPod Blackjack generates the games as note files. Some sample files have been included to let you use iPodBlackJack without having to run the program. Link.
RoBoCup 2005 : the pictures and the videos!
Amazing coverage, videos and photos!…what is RoBoCup exactly? It’s a competition between small robots from a number of universities or manufacturers. There are two main themes: an obstacle course and a football game. The last one seemed to be the most popular (we recommend the Aibo fottball game). There was also a small booth with the latest in cybernetics. Link.
HOW TO get cash for your old cell phone
Many of the sites take all phones – including clunky, brick-shaped dinosaurs – and simply recycle those that cannot be reused. Phones taken in that still have value are tested, outfitted with any needed accessories and then sold to dealers who resell them as refurbished phones in the United States or abroad. Some phones are donated to charities for use as emergency phones. [via] Link.
Past volumes of MAKE on sale!
If you’re looking for past volumes of MAKE, we now have another way of getting them! VOLUME #2: Robot builders, building your own high definition video recorder, how to podcast, making a robot from an old computer mouse, reconditioning an old amplifier…and more! And volume #1 our premiere issue! Link.
Computer Hacking and Unauthorized Access Laws
Handy to review, since a lot of folks are talking about weezin the Wi-Fi being a crime now...”Unauthorized access” entails approaching, trespassing within, communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without consent. These laws relate to either or both, or any other actions that interfere with computers, systems, programs or networks. Link.