Test run of my (d)iskette (O)rgan doing Toccata & Fugue. People have made floppy drives sing before, but this is my personal take on it. Features two 3 1/2" drives and two 5 1/4" drives connected to a PIC18f14k50 microcontroller. It interfaces to any MIDI source via MIDI over USB. Straight MIDI would also be possible with an additional small circuit and some minor … [Read more...]
Archives for February 2011
YouTube Introduces HTTPS Embedding
I tend to embed YouTube clips pretty regularly over at Jason Off The Clock but if you don't check out the embed options as frequently, things have been changing in that area recently. Iframe embedding has gone from beta to the default for clip embedding while the previous object/embed code is now only accessible if you check the box 'use old embed code' or 'Enable … [Read more...]
Using RunAs With Active Directory Users And Computers and Group Policy Management Console
Best practice has us not logging in with Administrator-level accounts for everyday activities. One way to ease the burden of having to log off and log on with an admin account when duty calls is to use the Run As... process that I refer to frequently. Running an executable, like Setup.exe, as an administrator is easy. You can right-click on it (or hold down Shift and … [Read more...]
Adobe Patches Reader and Acrobat to 10.0.1, Joins Windows Updates For A Busy Patch Tuesday
Adobe released patches for Adobe Reader and Adobe Acrobat bringing the products up to versions 10.0.1, 9.4.2, or 8.2.6 for the three currently supported major versions. For the first time in a long time, Adobe was able to keep their scheduled quarterly updates. Congrats to them on being able to keep ahead of major security exploits making it public. The update does resolve … [Read more...]
Infographic: Inside the Business of Malware
This flowchart shows how individuals or organizations profit out of infecting your computer. Amongst other things, it also shows a few reasons why it is important to clean up your infected computer immediately and change the accounts of any possibly compromised accounts. Check out this infographic from byJess.net. (click for full res image) (via threatpost) … [Read more...]