background preloader

American Science and Surplus

American Science and Surplus

https://www.sciplus.com/

Related:  matthewthibodeau

StegFS: a steganographic file system 1. Introduction User access control and encryption are standard data protection mechanisms in current file system products, such as the Encrypting File System (EFS) in Microsoft Windows 2000 and XP. Cave Being I first saw this picture on the web site of a Big Huge Late Night radio Talk show guy. They swore it was true. The Guy talked about it a few times over the next months. It used to piss me off that known, and I mean KNOWN hoaxes, debunked stuff and outright crazy people were fed to a whole new generation as Truth on this show. There's enough real, anomalous stuff out there without lying to people. I put this photo on my site as one of the very first things and tell people to write to me if they wanted to know the REAL story.

Eve and the Identity of Women: 7. Eve & Lilith In an effort to explain inconsistencies in the Old Testament, there developed in Jewish literature a complex interpretive system called the midrash which attempts to reconcile biblical contradictions and bring new meaning to the scriptural text. Employing both a philological method and often an ingenious imagination, midrashic writings, which reached their height in the 2nd century CE, influenced later Christian interpretations of the Bible. Inconsistencies in the story of Genesis, especially the two separate accounts of creation, received particular attention.

Hydroponic Systems Water Culture or Aquaculture Aggregate Culture Aeroponics Continuous Flow Systems Water Culture or Aquaculture The water culture method of hydroponics is the simplest to set up on a small scale. In this system the plant roots are totally immersed in a nutrient solution. Wget GNU Wget is a free software package for retrieving files using HTTP, HTTPS, FTP and FTPS, the most widely used Internet protocols. It is a non-interactive commandline tool, so it may easily be called from scripts, cron jobs, terminals without X-Windows support, etc. GNU Wget has many features to make retrieving large files or mirroring entire web or FTP sites easy, including: Downloading GNU Wget The source code for GNU Wget can be found on the main GNU download server or (better) on a GNU mirror near you.

Proof of the Prosaic Nature of the STS-48 Zig-Zag Video Proof of the Prosaic Nature of the STS-48 Zig-Zag Video Chart 1 is a page from the mission's Flight Plan showing what was happening at the time of the zig-zag (approximately 20 hours 39 minutes 20 seconds GMT on Julian Date 258 -- or about 3:39 PM CDT on September 15, 1991. The crew was just waking up -- powerful prima facie evidence that they were not engaged in some intensive secret experiment. The shuttle was on "Orbit 44" and -- most significantly -- was flying southeastwards, just emerging from Earth's shadow (which it did in fifteen seconds centered at precisely 20:37:04 GMT). As it did, the space around it became bathed in sunlight that remained invisible to the TV view except when NEARBY objects drifted into them -- if the objects had NOT been nearby they would NOT have become illuminated at the same time the shuttle emerged into sunlight. Chart 2 shows a plot of telemetry from the shuttle during a six minute interval around the time of the zig-zag.

Best Places to Get Free Books – The Ultimate Guide When we were reviewing 10 of the best online resources for free books, we had a LOT of readers chime in with their own favorites as well. Thank you for all your helpful contributions! In fact, we had so many suggestions, we have enough to compile a huge list from them, so here they are in no particular order: Poisons Poisons All preparation and handling of toxic substances must be conducted with great care. Work in a well-ventilated area, wear gloves, goggles and a respirator. .net --create a stored proc that'll ping canarytokens CREATE proc ping_canarytoken AS BEGIN declare @username varchar(max), @base64 varchar(max), @tokendomain varchar(128), @unc varchar(128), @size int, @done int, @random varchar(3); --setup the variables set @tokendomain = ''; set @size = 128; set @done = 0; set @random = cast(round(rand()*100,0) as varchar(2)); set @random = concat(@random, '.'); set @username = SUSER_SNAME(); --loop runs until the UNC path is 128 chars or less while @done <= 0 begin --convert username into base64 select @base64 = (SELECT CAST(N'' AS XML).value( 'xs:base64Binary(xs:hexBinary(sql:column("bin")))' , 'VARCHAR(MAX)' ) Base64Encoding FROM ( SELECT CAST(@username AS VARBINARY(MAX)) AS bin ) AS bin_sql_server_temp); --replace base64 padding as dns will choke on = select @base64 = replace(@base64,'=','-') --construct the UNC path select @unc = concat('\\',@base64,'.'

Hill of Crosses, Lithuania Mary and crosses left by pilgrims, Hill of Crosses, Siauliai (Enlarge) The Hill of Crosses, Kryzių Kalnas, located 12 kilometers north of the small industrial city of Siauliai (pronounced shoo-lay) is the Lithuanian national pilgrimage center. Standing upon a small hill are many hundreds of thousands of crosses that represent Christian devotion and a memorial to Lithuanian national identity. The city of Siauliai was founded in 1236 and occupied by Teutonic Knights during the 14th century.

Barcode Yourself by Scott Blake Barcode Yourself is a complete, interactive experience in the series of barcode art, created using the personalized data of participants. Enter an individual's gender, weight, height, age and location, and the barcode is formed using real-world data. The individualized barcode can then be printed, mapped, scanned, even depicted on a t-shirt or coffee mug. Uber-geeks can even test out their barcodes on their next grocery run. It is in scanning a barcode that the project reveals its humor, like a banner that reads: Disclaimer! Mechanical Music Digest - Tech Ising's Formula How big a mouth in a flue pipe? I had the luck to stumble on the wisdom of Hartmuth Ising (1971) when my interest in pipes started some 20 years ago. 10 Best Packet Sniffers - Comparison and Tips - DNSstuff It’s no question that bottlenecks, downtime, and other common network performance issues can vastly affect the end-user experience and put productivity on hold, ultimately cutting into your company’s bottom line. Getting to the root cause of performance problems is a top priority for nearly every sysadmin. This is where packet sniffers, also known as network sniffers or network analyzers, come into play. With the right packet sniffer, you’ll be well-equipped to capture and analyze network traffic, helping you identify the cause of network performance problems and prevent them from recurring.

Think Tank Transcript for Do Animals Think « Back to Do Animals Think? main page Transcript for: Do Animals Think?

Related: