In this video a tone generator is used to shoot specific frequencies through a large drop of mercury which results in a wide array of unique shapes and patterns created by standing waves–but really, you need to see it to appreciate it.
The experiment, put together by Nick Moore, combines a glass dish, a drop of mercury, and a old tone generator to demonstrate standing waves in 3D. Check out the video above to see the experiment in full speed or hit up his YouTube channel to see a remix with music (and other cool science experiment videos).
Mercury Hz [via Mental_Floss]
You might’ve heard of the LinkedIn and last.fm security breaches that took place recently. Not to mention the thousands of websites that have been hacked till now. Nothing is invulnerable to hacking. And when something like that happens, passwords are leaked.
People often “tether” their computers to their smartphones, sending their computer’s network traffic over the device’s cellular data connection. “Reverse tethering” is the opposite – tethering your Android smartphone or tablet to your PC to use your PC’s Internet connection.
Once upon a time the only place for new video game information was down at the arcade. These days there’s a news source and niche for everyone and every kind of game; where and how do you find your next video game conquest?
If you use the Desktop context menu often, wouldn’t it be useful if you could add program shortcuts to it so you can quickly access your favorite apps? We’ve shown you how to do this using a quick registry tweak, but there’s an easier way.
Think you know the answer? Click through to see if you're right!
Commercial fish eye lenses are a niche product and carry a hefty price tag; if you’re looking to goof around with fish eye photography on the cheap, this $6 tutorial is for you.
Ubuntu One, Ubuntu’s built-in cloud file storage service, allows you to make files publically available online or share them privately with others. You can share files over the Internet right from Ubuntu’s file browser.
More and more banks, credit card companies, and even social media networks and gaming sites are starting to use two-factor authentication. If you’re a little unclear on what it is or on why you’d want to start using it, read on to learn how two-factor authentication can keep your data secure.
Think you know the answer? Click through to see if you're right!
In this nostalgia filled short video, PBS takes a retrospective look at the history and the evolution of early 8-bit video games.