Search Results

Search found 865 results on 35 pages for 'kinect hacking'.

Page 16/35 | < Previous Page | 12 13 14 15 16 17 18 19 20 21 22 23  | Next Page >

  • Friday Fun: Daisy in Wonderland

    - by Asian Angel
    Are you suffering the effects of another grinding week at work? Then it is time for you to relax for a little bit and have some fun! In this week’s game you get to engage in inter-dimensional travel as you help Daisy try to return home Latest Features How-To Geek ETC How To Create Your Own Custom ASCII Art from Any Image How To Process Camera Raw Without Paying for Adobe Photoshop How Do You Block Annoying Text Message (SMS) Spam? How to Use and Master the Notoriously Difficult Pen Tool in Photoshop HTG Explains: What Are the Differences Between All Those Audio Formats? How To Use Layer Masks and Vector Masks to Remove Complex Backgrounds in Photoshop Bring Summer Back to Your Desktop with the LandscapeTheme for Chrome and Iron The Prospector – Home Dash Extension Creates a Whole New Browsing Experience in Firefox KinEmote Links Kinect to Windows Why Nobody Reads Web Site Privacy Policies [Infographic] Asian Temple in the Snow Wallpaper 10 Weird Gaming Records from the Guinness Book

    Read the article

  • Week in Geek: 50 Million Viruses and More on the Way Edition

    - by Asian Angel
    This week we learned how to backup and copy data between iOS devices, use Linux commands in Windows with Cygwin, boost email writing productivity with Microsoft Word Mail Merge, be more productive in Ubuntu using keyboard shortcuts, “restore the FTP service in XBMC, rename downloaded TV shows, access the Android Market in emulation”, and more Latest Features How-To Geek ETC How To Create Your Own Custom ASCII Art from Any Image How To Process Camera Raw Without Paying for Adobe Photoshop How Do You Block Annoying Text Message (SMS) Spam? How to Use and Master the Notoriously Difficult Pen Tool in Photoshop HTG Explains: What Are the Differences Between All Those Audio Formats? How To Use Layer Masks and Vector Masks to Remove Complex Backgrounds in Photoshop Enjoy Clutter-Free YouTube Video Viewing in Opera with CleanTube Bring Summer Back to Your Desktop with the LandscapeTheme for Chrome and Iron The Prospector – Home Dash Extension Creates a Whole New Browsing Experience in Firefox KinEmote Links Kinect to Windows Why Nobody Reads Web Site Privacy Policies [Infographic] Asian Temple in the Snow Wallpaper

    Read the article

  • South Florida Code Camp 2011 - 02/12/2011 - Final Days to register

    - by Nikita Polyakov
    South Florida Code Camp - 02/12/2011 - Final Days to register 13 tracks, 78 sessions, 65 speakers Topics include: Windows Phone 7, Silverlight, Web dev, Architecture/Agile, Sharepoint and SQL Networking with 700 other software developers, over 800 already registered! Free breakfast and lunch Hobnob with speakers, MVP's and authors Party afterwards with attendees and speakers Convenient location at Nova University in Davie Free XBOX 360 Kinect 250 GB raffle (must be present) Free raffle of valuable software, books and swag Free Code Camp T-shirt Book swap - see site for details You get to say "I was there!" More information: http://www.fladotnet.com/codecamp   Register now at: https://www.clicktoattend.com/invitation.aspx?code=150628 (some people have had a problem with this link but click again and it should work). I am presenting Windows Phone Marketplace session. Marketplace and Monetization Details of Windows Phone Marketplace and using Microsoft Advertising SDK control. Monetization strategies, rules and tips for making the best out of your post writing the Windows Phone app experience. Many speakers end up hanging out in the back and this session turns into a open discussion panel.

    Read the article

  • How To Colorize Black and White Vintage Photographs in Photoshop

    - by Eric Z Goodnight
    Ever wanted to add color to your old, vintage, or historical photographs? Load up some old pictures and see how color can be added quickly to any black and white photograph in this simple Photoshop how to. While many purists simply don’t like the look of colorized black and white photographs, the ability to add color to black and white images is as indispensible as it is simple. Read on to see just how easy it can be Latest Features How-To Geek ETC How To Create Your Own Custom ASCII Art from Any Image How To Process Camera Raw Without Paying for Adobe Photoshop How Do You Block Annoying Text Message (SMS) Spam? How to Use and Master the Notoriously Difficult Pen Tool in Photoshop HTG Explains: What Are the Differences Between All Those Audio Formats? How To Use Layer Masks and Vector Masks to Remove Complex Backgrounds in Photoshop Hack a Wireless Doorbell into a Snail Mail Indicator Enjoy Clutter-Free YouTube Video Viewing in Opera with CleanTube Bring Summer Back to Your Desktop with the LandscapeTheme for Chrome and Iron The Prospector – Home Dash Extension Creates a Whole New Browsing Experience in Firefox KinEmote Links Kinect to Windows Why Nobody Reads Web Site Privacy Policies [Infographic]

    Read the article

  • How To Get SSH Command-Line Access to Windows 7 Using Cygwin

    - by YatriTrivedi
    Are you comfortable with Linux/Unix and want SSH access to your Windows 7 machine? Cygwin provides this functionality and gives you a familiar environment to work with in a few simple steps. We’re assuming you’ve got Cygwin installed and configured. If not, check out our article, How To Use Linux Commands in Windows with Cygwin to get started Latest Features How-To Geek ETC How To Create Your Own Custom ASCII Art from Any Image How To Process Camera Raw Without Paying for Adobe Photoshop How Do You Block Annoying Text Message (SMS) Spam? How to Use and Master the Notoriously Difficult Pen Tool in Photoshop HTG Explains: What Are the Differences Between All Those Audio Formats? How To Use Layer Masks and Vector Masks to Remove Complex Backgrounds in Photoshop Bring Summer Back to Your Desktop with the LandscapeTheme for Chrome and Iron The Prospector – Home Dash Extension Creates a Whole New Browsing Experience in Firefox KinEmote Links Kinect to Windows Why Nobody Reads Web Site Privacy Policies [Infographic] Asian Temple in the Snow Wallpaper 10 Weird Gaming Records from the Guinness Book

    Read the article

  • Is your company successfully applying Application Lifecycle Management?

    - by Eric Nelson
    Two separate emails arrived in my Inbox. Email #1: The results of  detailed survey of UK ISVs which we had commissioned – what makes them tick etc. In that survey it stated “76% of ISVs do not use any ALM tools”. It also stated that of those that did, most only did the basics. I#m not surprised … but I am disappointed. Email #2: The wonderful Black Marble have gone all Xmasy and are offering Visual Studio ALM health checks with chances to win an Xbox 360 + Kinect each week of Dec. It therefore seemed obvious to me that I should do my little bit to address an obvious issue from Email #1 with an obvious solution from email #2. Check out 5 Great Reasons to get an ALM health check  and then to find out more, call 01274 300175 or visit http://www.blackmarble.com/XBoxElfCheck

    Read the article

  • How to Take Control and Customize Google Calendar Reminders

    - by Justin Garrison
    Google calendar has great flexibility with reminders, but the defaults are often useless without tweaking the settings. Here are some common notification settings you may want to change to suit your needs better Latest Features How-To Geek ETC How To Create Your Own Custom ASCII Art from Any Image How To Process Camera Raw Without Paying for Adobe Photoshop How Do You Block Annoying Text Message (SMS) Spam? How to Use and Master the Notoriously Difficult Pen Tool in Photoshop HTG Explains: What Are the Differences Between All Those Audio Formats? How To Use Layer Masks and Vector Masks to Remove Complex Backgrounds in Photoshop Hack a Wireless Doorbell into a Snail Mail Indicator Enjoy Clutter-Free YouTube Video Viewing in Opera with CleanTube Bring Summer Back to Your Desktop with the LandscapeTheme for Chrome and Iron The Prospector – Home Dash Extension Creates a Whole New Browsing Experience in Firefox KinEmote Links Kinect to Windows Why Nobody Reads Web Site Privacy Policies [Infographic]

    Read the article

  • The Most Important Person Is the One that Keeps Your PC Running [Comic]

    - by The Geek
    Fixing people’s computers usually makes them appreciate you more, though this might be a little too far. Latest Features How-To Geek ETC How To Create Your Own Custom ASCII Art from Any Image How To Process Camera Raw Without Paying for Adobe Photoshop How Do You Block Annoying Text Message (SMS) Spam? How to Use and Master the Notoriously Difficult Pen Tool in Photoshop HTG Explains: What Are the Differences Between All Those Audio Formats? How To Use Layer Masks and Vector Masks to Remove Complex Backgrounds in Photoshop Bring Summer Back to Your Desktop with the LandscapeTheme for Chrome and Iron The Prospector – Home Dash Extension Creates a Whole New Browsing Experience in Firefox KinEmote Links Kinect to Windows Why Nobody Reads Web Site Privacy Policies [Infographic] Asian Temple in the Snow Wallpaper 10 Weird Gaming Records from the Guinness Book

    Read the article

  • Sega lance des jeux vidéos dirigés par les jets d'urine, dont les consoles sont installées dans les urinoirs

    Sega lance des jeux vidéos dirigés par des jets d'urine, dont les consoles sont installées dans les urinoirs Ras-le-bol des jeux vidéos conventionnels ? Pas tenté par les nouvelles consoles à détection de mouvements comme le Kinect ? Sega a pensé à vous. La firme vient en effet de lancer un nouveau concept qui est actuellement testé à Tokio, dans quatre stations de métro. Cette nouvelle console de jeux s'appelle Toylets et, comme son nom l'indique, elle s'utilise dans les urinoirs. Pas de manettes, mais des capteurs de pression mesurant l'intensité du jet de votre urine. Pour diriger votre personnage, modifiez la direction de votre émission de liquide, comme dans le "Vent du Nord&qu...

    Read the article

  • Which creative framework can create these games? [closed]

    - by Rahil627
    I've used a few game frameworks in the past and have run into limitations. This lead me to "creative frameworks". I've looked into many, but I cannot determine the limitations of some of them. Selected frameworks ordered from highest to lowest level: Flash, Unity, MonoGame, OpenFrameworks (and Cinder), SFML. I want to be able to: create a game that handles drawing on an iPad create a game that uses computer vision from a webcam create a multi-device iOS game create a game that uses input from Kinect Can all of the frameworks handle this? What is the highest level framework that can handle all of them?

    Read the article

  • Farseer Physics: Ways to create a Body?

    - by EdgarT
    I want to create something similar to this using farsser and Kinect: https://vimeo.com/33500649 This is my implementation until now: http://www.youtube.com/watch?v=GlIvJRhco4U I have the outline vertices and the triangulation of the user. And following the Texture to Polygonmsample i used this line to create the shape, where farseerObject is a list of vertices of the triangles: _compound = BodyFactory.CreateCompoundPolygon(World, farseerObject, 1f, BodyType.Dynamic); But I have to update the body each frame (like 30 fps) and this is very slow. I get just 2 or 3 fps. There's another (faster) way to create the Body from a list of triangles or the contour vertices?

    Read the article

  • Which game - or Gamekit - makes it easy for me to see my own creations in a ready-made world appear?

    - by Karl Heinz
    I saw Slender and "Dream of the Blood Moon". I like to create things with Sculptris and animate them with Kinect. Which game - or Gamekit - makes it easy for me to see my own creations in a ready-made world appear? I would like to start with replacing the characters first for several actions then maybe change the virtual world. Finally I would like to offer the game for free as the others do. Is it a good idea to use c#'s XNA for that?

    Read the article

  • Capteur de mouvements d'Intel : l'inscription au concours repoussée au 2 juillet, téléchargez le SDK et soumettez vos idées d'applications

    Capteur de mouvements d'Intel : l'incription au concours de développement repoussée au 2 juillet Téléchargez le SDK et soumettez vos idées d'applicationsAu cas où vous ne le sauriez pas, Intel s'est lancé il y a peu dans les Natural Interfaces (ou NUI) avec un capteur de mouvement/caméra ? vous avez dit Kinect ? ? baptisé sobrement « Gesture Camera ». Cet appareil a été conçu en collaboration avec le constructeur Creative et dévoilé au CES 2013 de Las Vegas. Pour l'occasion, Intel a également décidé d'organiser un grand concours de programmation autour de ce concept de « développement ...

    Read the article

  • Unrooted G1 stuck on "DREA100 PVT 32B screen" and won't turn off. [closed]

    - by MiffTheFox
    I've been pretty happy with my G1 thus far, but I turned it on this morning and it gave me a screen showing multicolored bars and the following text: DREA100 PVT 32B HBOOT-0.95.0000 CPLD-4 RADIO-2.22.19.261 Sep 2 2008 Later down it says "Serial0". Please help me, I don't want to wipe my phone and lose my data on it! I haven't rooted it and have no interest in rooting it. I got Cupcake over the wire, not via hacking.

    Read the article

  • Monitor Mode on the Intel Centrino(R) Advanced-N 6205 (WEP Penetration) On Windows

    - by WindowsEscapist
    Can anyone tell me a way to do WEP hacking (legal, of course) (on my own wireless connection, for the purposes of this question) with Wireshark or similar programs on an Intel Centrino Advanced-N 6205? (Laptop is Acer Aspire 5750-6866.) According to the programs, I cannot accomplish this (monitor mode) but seeing as it is a fairly recent wireless card (should be able to support this) are there any cracked drivers available or does anyone have the knowledge to make one? Much appreciated! Thanks.

    Read the article

  • Why would sshd allow root logins by default?

    - by The Journeyman geek
    I'm currently working on hardening my servers against hacking- amongst other things, i'm getting a load of attempts to log on as root over ssh. While i've implemented fail2ban, i'm wondering, why root logons would be allowed by default to start with? Even with non sudo based distros, i can always log on as a normal user and switch - so i'm wondering is there any clear advantage to allowing root logons on ssh, or it just something no one bothers to change?

    Read the article

  • Any Linux distro which is supported on EFI enabled XServe

    - by geoaxis
    I am looking into installing Linux on a test XServe machine and see how it goes overall. We have our entire infrastructure on OSX and would like to move to Linux servers. Is there any distribution which has good support for XServe? Google search yielded nothing conclusive. I don't mind hacking around for personal use (compiling kernel, tweaking packages and configurations) but when running in production it's good to be cautious. Paying for commercial support is definitely an option.

    Read the article

  • How do I allow programs that generate "high" or "severe" alerts in MS Security Essentials?

    - by Alex O
    Microsoft Security Essentials seems to allow only quarantine or delete actions for program that it deems to have "high" or "severe" risk. However, it also assigns these levels to what it considers to be "hacking tools". Is there a way to override this nanny behaviour and force programs on the allowed list? Thank you. EDIT: Here's a screenshot showing the lack of an "Allow" option in the drop-down list: http://img820.imageshack.us/img820/3870/msse.png

    Read the article

  • What should I do about this user?

    - by Tim Brigham
    What should I do about this user? The user is: Downloading pornography Attempting unauthorized access Running hacking software Sending unsolicited email Installing software / tampering with the system etc This is intended as a generic answer for employee behavioral problems, a la Can you help me with my software licensing question? I could see where acceptable use issues are a touch out of scope for SF, however it is one of those things most sysadmins will run into. I don't want to keep rewriting similar answers.

    Read the article

  • OS X Terminal showing incorrect hostname

    - by Erik W
    I have a brand new MacBook Air. The reason I mention this is that I want to be clear that I don't think I'm responsible for this problem, as I haven't been hacking up my prefs. Anyhow... When I open Terminal I expect it to show what my PS1 is set to (\h:\W \u\$) however it's not displaying my hostname (Eriks-MacBook), as displayed in System Preferences, it's showing some random string (unknownb88d120cd4b2). Any ideas? Thanks...

    Read the article

  • An device with an unknown MAC address is connected to my router

    - by Yar
    There is a computer that is not mine that is accessible on my network. I can even access its filesystem via AFP. What I want to know is how the computer could get on my network. My network is secured like this: Does that mean that they've used password cracking tools? The pass is not easy to guess but not hard to figure out via brute-force hacking, I guess. If I am being hacked, should I switch to WPA?

    Read the article

  • An unknown Mac is connected to my router?

    - by Yar
    There is a computer that is not mine that is accessible on my network. I can even access its filesystem via AFP. What I want to know is how the computer could get on my network. My network is secured like this: Does that mean that they've used password cracking tools? The pass is not easy to guess but not hard to figure out via brute-force hacking, I guess. If I am being hacked, should I switch to WPA?

    Read the article

  • Mac on My Router?

    - by Yar
    There is a computer that is not mine that is accessible on my network. I can even access its filesystem via AFP. What I want to know is how the computer could get on my network. My network is secured like this: Does that mean that they've used password cracking tools? The pass is not easy to guess but not hard to figure out via brute-force hacking, I guess. If I am being hacked, should I switch to WPA?

    Read the article

< Previous Page | 12 13 14 15 16 17 18 19 20 21 22 23  | Next Page >