Author Archives

Archive of the posts written by author : Nurdologist.

The Ultimate Wareable

Probably not implanted but drawn / projected onto your skin/surface.  Very kool…

Leg Exercise is Critical to Brain and Nervous System Health

Summary: Weight bearing leg exercises send signals to the brain which are vital for the production of healthy neural cells, researchers report. Source: Frontiers. Groundbreaking research shows that neurological health depends as much on signals sent by the body’s large, leg muscles to…

Herpes virus may play role in Alzheimer’s, study says

Updated 6:39 PM EDT, Thu June 21, 2018 Researchers saw double the concentration of herpes virus in the brains of people who had Alzheimer's The study could lead to new pathways for medical treatment (CNN)Doctors don't know what causes Alzheimer's disease or the…

How to sell yourself in 30 seconds and leave people wanting more

The elevator pitch can be harder than it seems. Selling yourself quickly and efficiently is key when you meet someone new. But crafting and delivering a solid elevator pitch can be harder than it seems. We asked marketing strategist Dorie Clark for her…

How they made Jurassic World: Fallen Kingdom

Every summer, Hollywood goes big. Big stars. Big budgets and huge visual effects. This summer’s technology is more spectacular than ever. We went behind the scenes to see how magic is made in 2018. How to make a dinosaur,  by David Vickery, VFX…

Social Networking before the web

ah the good ol days…..   *original author unknown

WildWildWord of Tech Acronyms

0–9 #!—Shebang /.—Slashdot 1GL—First-Generation Programming Language 1NF—First Normal Form 10B2—10BASE-2 10B5—10BASE-5 10B-F—10BASE-F 10B-FB—10BASE-FB 10B-FL—10BASE-FL 10B-FP—10BASE-FP 10B-T—10BASE-T 100B-FX—100BASE-FX 100B-T—100BASE-T 100B-TX—100BASE-TX 100BVG—100BASE-VG 286—Intel 80286 processor 2B1Q—2 Binary 1 Quaternary 2FA—Two-factor authentication 2GL—Second-Generation Programming Language 2NF—Second Normal Form 3GL—Third-Generation Programming Language 3GPP—3rd Generation Partnership Project—’3G comms…

I can’t be bothered….

No seriously, don’t bother me…

What causes insomnia?

by Dan Kwartler

Attacking Private Networks from the Internet with DNS Rebinding

TL;DR Following the wrong link could allow remote attackers to control your WiFi router, Google Home, Roku, Sonos speakers, home thermostats and more. The home WiFi network is a sacred place; your own local neighborhood of cyberspace. There we connect our phones, laptops,…

Menu