Want to make sure you catch anyone brash enough to loot your beloved media center? Include this PS3 Trojan Horse in the mix to track your gear.
Wayne, from the electronics blog DSS Circuits, was upset that somebody stole his nephew’s PS3. While most people would shake their fists and hope their home owner’s insurance covered such unfortunate events, Wayne decided that he’d lay a trap for future thieves with a cleverly designed PS3 dummy unit that housed not a sweet current gen game console but instead an array of inexpensive electronic tracking gear. The thief lifts your PS3 and the PS3 activates a homing beacon–sending you SMS updates with GPS coordinates for as long as the internal battery holds out.
Since the PS3 is just an empty shell–Wayne bought it for $20 off eBay and opted to use the PS3 because of the high thieves-will-take-it factor–so his instructions could easily be adopted to anything large enough to contain all the parts.
Hit up the link below for more information.
Video Game Console Tracker [DSS Circuits via Hack A Day]
This trick is for Linux and SSH users who often log in to remote systems. Having to type the same info over and over again is mind-numbingly repetitive, but using an SSH config file makes the process much more convenient.
Every file on your computer has a timestamp, which contains the access and modification time for a file, but did you know that you can change that timestamp? Here’s how to do it.
This week we’re taking a look at social networks. Do you use social network apps to increase the usefulness of social networks like Twitter, Facebook, and others?
Are you creating a very long document, but hate the thought of dealing with Word’s master document feature? The Master document feature in Word has been known in the past to corrupt documents.
Popular music streaming service Pandora has finished beta testing its new HTML5 web interface and rolled it out to all users. At the same time they’ve removed the free-user cap of 40 hours per month–listen for free as long as you want.
Windows: SimilarImages is a duplicate file finder tweaked to find image files. Rather than simply compare raw stats it also scans the photo itself. As a result you’ll find more duplicates and be able to select which file you wish to keep.
Ever heard of a “full frame” camera? Today we’ll learn just what this means by taking a look at camera formats, racking up some serious photo geek cred, and finally deciding if the expensive cameras are worth the heavy pricetag.
If you have been following our Hackintoshing guides, you might know the basics, and how to install Snow Leopard on your custom built PC. In this guide, we will try to upgrade your Snow Leopard hackintosh to Mac OS X Lion, and also explain a thing or two regarding dual-booting your hackintosh with
Enforcement of broadband caps is on the rise. Whether you’ve received a warning letter from your ISP or you just curious and want to keep an eye on things, this tutorial will show you how you can monitor, log, and save your bandwidth usage with Tomato.
Earlier this year Google announced their Google Wallet initiative; now they’re rolling it out to Android phones on the Sprint network.