How the Sixties Counterculture Shaped the Personal Computer Industry
In Markoff’s view, it was characterized by a bohemian sensibility that was open to experiments in alternative living arrangements, a disposition to anti-establishment politics (especially opposition to the military-industrial complex and its war in Vietnam), and a willingness to experiment with altered psychic states, especially through ingesting and inhaling certain substances. More fundamentally, in Markoff’s account of the period, what was shared by the hippies and the personal computing pioneers based in and around Stanford was a commitment to transforming the world and the nature of humanity in a fundamental way — bringing about a change that hadn’t come before.
14 hours ago
Stewart Brand and the Tools to Make the Whole Earth Better | WIRED
Surveying the landscape that formed and energized WIRED, you can’t avoid the mythic stuff of Brand: He was one of Ken Kesey’s Merry Pranksters, as immortalized in Tom Wolfe’s Electric Kool-Aid Acid Test. He worked with Douglas Engelbart on “The Mother of All Demos,” which in 1968 introduced hypertext, email, the mouse. He created the Whole Earth Catalog and its descendants­; he founded CoEvolution Quarterly.
hackers  activism  inspiration 
15 hours ago
Advice · Patrick Collison
- Don't stress out too much about how valuable the things you're going deep on are... but don't ignore it either. It should be a factor you weigh but not by itself dispositive.
- Make friends over the internet with people who are great at things you're interested in. The internet is one of the biggest advantages you have over prior generations. Leverage it.
15 hours ago
Linocutting Exercises for Beginners - Draw Cut Ink Press
I would encourage any beginners out there to practice some of the following exercises that I found in a small book called ‘The Art of Linocutting’, published in 1936 and written by Len A. Doust.
3 days ago
Generating JWT Tokens for App Store Connect API – XCBlog – Medium
As mentioned earlier, JWT is used to generate the token that has been used by App Store Connect API. The process of generating token requires following six details

Issuer ID: The ID found on the top of App Store Connect
Private Key ID: The ID associated with Private Key on App Store Connect
Expiration Time: 20 min maximum, the token cannot be valid more than 20 min so that we have to make sure that, we will create new token before it expires.
Audience: This is constant with API version value usually “applestoreconnect-v1”
Algorithm: This is JWT algorithm required to generate token e.g ES256
3 days ago
nomic-io/lotion: ✨ Smooth, easy blockchain apps ✨
Lotion lets you build blockchains. At any moment in time, the whole state of your blockchain is represented by a single JavaScript object called the state.

Users will create transactions: JavaScript objects that tell the application how to mutate the blockchain's state.

Every user who runs your Lotion app will interact with the same blockchain. Anyone can create a transaction, and it will automagically find its way to everyone else running the app and mutate their state. Everyone's state objects will constantly be kept in sync with each other.
javascript  crypto 
4 days ago
Question / Help - [SOLVED] Stream my shoutcast stream to youtube??
1) Added new source
2) uncheck local
3) Input was in my case http://streams.justclassicrock.com:8012
4) input format: mp3
5) click ok
6) start streaming.
9 days ago
Vanilla JS Cheatsheet
Free yourself from the chains of jQuery by embracing and understanding the modern Web API and discovering various directed libraries to help you fill in the gaps.
9 days ago
An audio effects library for the Web Audio API.
13 days ago
Creating Livable City Streets
What Appleyard found was that the amount of car traffic on the street dictated how friendly neighbors were with each other, how “at home” people felt in their neighborhood, and how familiar they were with their surroundings.
13 days ago
Emoji Bullet List
Create fancy lists that use emoji for bullet points.
14 days ago
CLI release tool for Git repos and npm packages. Automate the tedious tasks of software releases. Happily release and publish your Git repositories, npm packages, GitHub & GitLab releases, changelogs, and much more!
cl  github 
14 days ago
Mutt, Gmail and GPG
Crypto people are always dismayed that I don't use signatures - on the face of it I am taking perfectly good Authenticity and throwing it away - an attacker could spoof my email address, send email to someone with whom they know I communicate and then encrypt with that persons key. This is, undeniably, a risk. The thing you should consider, though, is the other side of the coin. Quite simply, if you plan, at any point, to say something in encrypted email that you wouldn't want read out in court, DON'T SIGN ANYTHING EVER. The person you are sending to is about to have a plaintext copy of the communication, where you have undeniably linked the text with your private key. If that message leaks, gets snitched, if the other peer gets owned by HackingTeam (or whatever) then it's more or less Game Over.
14 days ago
Encrypt Your Dog (Mutt and GPG) | Linux Journal
set pgp_replyencrypt # now crypt_replyencrypt
set pgp_replysign # now crypt_replysign
set pgp_replysignencrypted # now crypt_replysignencrypted
set pgp_show_unusable=no
cli  howto 
14 days ago
GitHub does dotfiles - dotfiles.github.io
Backup, restore, and sync the prefs and settings for your toolbox. Your dotfiles might be the most important files on your machine.
15 days ago
Good Company on Steam
In Good Company you pursue your dream of being a hands-on tycoon. Start small in your garage, design unique high-tech goods and develop a management system that optimizes production, logistics, and research for you – all while you lead your enterprise to global success.
4 weeks ago
Running Hashcat on Google Cloud's new GPU-based VMs
In February, Google announced the availability GPU-based VMs. Recently, I spun up a few of these instances, and ran some benchmarks. Along the way, I wrote down the steps taken to provision these VM instances, and install relevant drivers.

My only use case for GPU-based VMs is cracking (password) hashes, hence the test run with Hashcat.
5 weeks ago
recon-ng – Good tool for Information Gathering
Recon-ng is a tool written in python mostly used in information gathering with its independent modules, keys list and other modules. This tool is preloaded with lots of modules which use online search engines, plugins and API which can help in gathering the information of the target.
5 weeks ago
davidshimjs/qrcodejs: Cross-browser QRCode generator for javascript
QRCode.js is javascript library for making QRCode. QRCode.js supports Cross-browser with HTML5 Canvas and table tag in DOM. QRCode.js has no dependencies.
5 weeks ago
mafintosh/hypercore: Hypercore is a secure, distributed append-only log.
Hypercore is a secure, distributed append-only log.

Built for sharing large datasets and streams of real time data as part of the Dat project.
5 weeks ago
Internet Radio Server Prices
All our radio packages come with a full control panel, prioritised directory listing, any bitrate up to 320 Kbps, code snippets for your website, a mobile friendly start page and more. Get a free trial today!
6 weeks ago
Opinion | Let Children Get Bored Again - The New York Times
“People used to accept that much of life was boring. Memoirs of pre-21st-century life are rife with tedium. When not idling in drawing rooms, members of the leisured class took long walks and stared at trees. They went motoring and stared at more trees. Those who had to work had it a lot harder.”
Once you’ve truly settled into the anesthetizing effects of boredom, you find yourself en route to discovery. With monotony, small differences begin to emerge, between those trees, those sweaters. This is why so many useful ideas occur in the shower, when you’re held captive to a mundane activity. You let your mind wander and follow it where it goes.
6 weeks ago
Sending sound over the internet using photon
Broadcast audio, record voice commands, build internet walkie-talkies with this simple tutorial!
hacking  audio  iot 
7 weeks ago
iPhones can now automate tasks using NFC with Launch Center Pro
iPhone users are finally getting a convenient and powerful feature that’s long been available on Android phones: the ability to tap an NFC tag and have their phone automatically perform certain actions, like opening an app or playing music.
automation  ios 
7 weeks ago
we play programmed
We prioritize certain behaviors curated by social programming, whether by poetry or by survival. Through dissecting Fluct’s latest work ‘everythingmakesmehappy.’, we will discuss the processes used to create performance aimed at exposing and ultimately interrupting the psychology of social programming. With fluid interruption, responsive support and acute presence, we are aiming to disable oppressive structures in order to become the authors of our existence.
7 weeks ago
How sex censorship killed the internet we love
The ignorance behind the war on sex raged by the Facebooks, the Apples, the Googles, the advertisers, the algorithms, is not only dated, but dangerous. As women fight for control of our reproductive organs, as trans people fight for the right to use a bathroom, the trolls have convinced the gatekeepers that sex must be silent, and 4chan — acting on the urges of right-wing populists — deserves a voice.
7 weeks ago
The Power of Not Retweeting – Douglas Rushkoff – Medium
Tweeting one’s outrage is not real activism, anyway. It’s really just a form of social signaling. Doing so without even knowing anything about the scene we’re commenting on is just adding noise. Worse, it becomes good evidence that whatever side you’re on is just as guilty of disinformation and rushing to judgment as the trolls.
7 weeks ago
WPA wifi cracking on a MacBook Pro with deauth
There are 3 steps:
+ Identify the target access point: name (= BSSID), MAC address (= SSID) and channel (~ radio frequency)
+ Sniff the channel in monitor mode to retrieve:
- a beacon (easy)
- a handshake (= four-way handshake), or some frames of it (hard)
+ Crack the password using the dump
7 weeks ago
In Praise of the AK-47 – Dear Design Student
Possibly. If Kalashnikov hadn’t designed the AK-47 wouldn’t someone else just have designed another rifle? Most assuredly. And they did. There are as many types of rifles out there shooting up our villages, our churches, and our Marine recruiting stations as there is cereal in the cereal aisle. And they all have a designer’s name attached to them. The shit we design carries our name.

Your role as a designer is to leave the world in a better state than you found it. You have a responsibility to design work that helps move humanity forward and helps us, as a species, to not only enjoy our time on Earth, but to evolve.
7 weeks ago
JanusVR re-imagines webpages as collaborative 3D webspaces interconnected by portals.
8 weeks ago
The 30-Year Mortgage is an Intrinsically Toxic Product
My wife and I rent right now, and like everyone in New York I face an annual exercise in sticker shock. In the event that markets crater and banks go under, my current rent will be completely unreasonable. But the rent I negotiate the year after that will be very reasonable indeed.
8 weeks ago
Unity 3D Data Visualization Library
This software is a Visualization Platform for Augmented Reality to visualize data. The core of this software lies in the modular capability with the use of plugins. The base code allows for the user to select a plugin for a Dynamic Vis Tool, either a 2D or 3D Platform, which can be moved around the room and resized. The objective of this library is to provide a set of tools to ease the creation of data visualization models for Augmented and Virtual Reality.
vr  dataviz 
8 weeks ago
the bergen mall on Vimeo
A short documentary I made about a very interesting mall in New Jersey that has kind of a cult following, which I found out after I made the video! This vid was also featured at a film festival in Fort Lee NJ, "The Birthplace of Film!"
9 weeks ago
philipperemy/tensorflow-1.4-billion-password-analysis: Deep Learning model to analyze a large corpus of clear text passwords.
Using deep learning and NLP to analyze a large corpus of clear text passwords.

Understand how people change their passwords over time: hello123 -> h@llo123 -> h@llo!23.
9 weeks ago
dhwajraj/deep-siamese-text-similarity: Tensorflow based implementation of deep siamese LSTM network to capture phrase/sentence similarity using character/word embeddings
Tensorflow based implementation of deep siamese LSTM network to capture phrase/sentence similarity using character/word embeddings
9 weeks ago
Voyages in sentence space
My project sentence-space, now public on GitHub, provides an API that serves up two things:

Sentence gradients: smooth interpolations between two input sentences.
Sentence neighborhoods: clouds of alternative sentences closely related to an input sentence.
machinelearning  art  writing 
9 weeks ago
gamaral – Software Engineer - PICOPi
PICO-8 console and stand-alone cartridge firmware distributed in an SD card image for the Raspberry Pi.
pico8  raspberrypi 
9 weeks ago
Man Taunts NYPD on Midtown South Radio Frequency - YouTube
New York, NY
Circa May 1991

The New York City Police Department had a problem with an individual who kept interfering with radio transmissions. Presented is just a sample of many days and nights this took place.
audio  hacking 
10 weeks ago
Get OS X System Info from the Command Line – teczd
The sw_vers command will give you the current Mac operating system version and build number.

>system_profiler -detailLevel mini > systeminfo.log
This will generate a text report of information from System Profiler without any personal or identifying information.
osx  reference  cli 
10 weeks ago
lra/mackup: Keep your application settings in sync (OS X/Linux)
I change my workstation every X months. Each time I either lose my apps' configurations, or I just waste a bunch of hours getting setup like I was on my old box. I also spend a lot of time reconfiguring the same stuff again on all my workstations (home, work).

For years, I've used a personal shell script that was copying known config files into Subversion, Git or Dropbox, and linked them into my home. But I felt a lot of us had the same problem: Making a more generic tool could help others and I could get help from others to support more apps in the tool.
10 weeks ago
Sal Cenicola - Wikipedia
Salvatore Cenicola III was born July 13, 1959, at Holy Name Hospital in Teaneck, New Jersey. His parents Salvatore U. Cenicola II and Maria Boccanfuso are both of Italian descent. Cenicola grew up in River Vale, New Jersey and attended Pascack Valley High School, where he competed in interscholastic wrestling.

Cenicola started boxing in 1975 and was trained by amateur trainer Eddie Helbig.
10 weeks ago
Fantasy Console Wars: A Guide to The Biggest Players in Retrogaming’s Newest Trend
From an outsider’s point of view, code is very similar to magic. It’s an arcane formulae rendering the most amazing interactions and stories. It’s necessarily encrypted, protected and out of reach. It’s the sacred language of an illuminated cast, the developers.
Pico-8 has broken that feeling. For the first time, I have had this amazing ability to “follow the trail” of code, directly and instantaneously.
pico8  games  programming 
10 weeks ago
PICO-8 Audio: Music Editor
How to use the music editor in the PICO-8 fantasy console
pico8  music  howto 
11 weeks ago
Blockchain Can Wrest the Internet From Corporations' Grasp | WIRED
The idea that an internet service could have an associated coin or token may be a novel concept, but the blockchain and cryptocurrencies can do for cloud-based services what open source did for software. It took twenty years for open source software to supplant proprietary software, and it could take just as long for open services to supplant proprietary services. But the benefits of such a shift will be immense. Instead of placing our trust in corporations, we can place our trust in community-owned and -operated software, transforming the internet’s governing principle from “don’t be evil” back to “can’t be evil.”
cryptocurrency  opensource 
11 weeks ago
How I Got My Attention Back | WIRED
In 1992 Bill McKibben “spent many months of forty hour weeks” attempting to watch twenty-four hours of television as recorded on ninety-one cable stations in Virginia (at the time, the most in the world). He wrote up his findings in the book, “The Age of Missing Information.”

“We believe that we live in the ‘age of information.’” he writes. “That there has been an information ‘explosion,’ an information ‘revolution.’ While in a certain narrow sense this is the case, in many important ways just the opposite is true. We also live at a moment of deep ignorance, when vital knowledge that humans have always possessed about who we are and where we live seems beyond our reach. An Unenlightenment. An age of missing information.”


But … I want my attention back.

Did I really have it before Facebook? Thinking back, the early versions of Facebook were adorable. Benign. No tagging. No timelines. Just The Wall. A way to say — Hey, what’s shaking dorm buddy? Poke. No algorithms. A human scale.


Returning to those (mythical?) halcyon minimalist information days: You could read all of the news in a single day. Grab the two or three papers and read. The information had edges; it could be understood by a single human over one cup of first-wave coffee. Were you insatiable, the library was available to dig deep on the topics of the day.

Is this being too reductive? Too rose-tinted?


Attention is a muscle. It must be exercised. Though, attention is duplicitous — it doesn’t feel like a muscle. And exercising it doesn’t result in an appreciably healthier looking body. But it does result in a sense of grounding, feeling rational, control of your emotions — a healthy mind. Our measuring sticks for life tend to be optimized for material things, things easy to count. Houses, cars, husbands, babies, dollar bills. Attention is immaterial, difficult to track.

We deserve our attention.
11 weeks ago
dualshock-controller - npm
Eventing API layer over HID for the Sony DualShock 3 and DualShock 4 controllers
javascript  games 
11 weeks ago
« earlier      
!breakfree activism advice app arduino art audio automation bigboard book cheatsheet cl cli code coding comedy cooking criticism crypto cryptocurrency css culture d3 data datajournalism dataviz demo design documentary drones education electronics facebook fashion firebase food funny game games github hackers hacking hardware health howto html ifttt infographic infographics inspiration ios iot javascript journalism jquery js json learning library linocut list machinelearning map mapping maps media military minecraft movies music network node nodejs ny oakland obama occupy occupyoakland opensource opsec osint osx painting people personal photography photojournalism pico8 podcast police politics process programming project protest raspberrypi reading recipe reference repo research resource resources responsive rstats school security server sex shootings startups strange stratfor teaching tech technique theme tool tributary trump typography ui urbanplanning ux video videogames vinyl visualization visuals vj vr vue watercolor webdesign whitenationalism writing youtube

Copy this bookmark: