James is a keen gamer, and records Technophilia - an awesome but somewhat NSFW technology podcast - weekly with Justin and Dave.
Feel free to contact at firstname.lastname@example.org
James's Latest Posts
Last time I gave a theoretical introduction to 3D printers and talked briefly about some concepts such as self replication and the effect such devices would have on society. Today I’d like to show you two specific projects that can built for more or less $1,000, both of which are fully functional 3D-plastic printers, and […]
A mainstay of sci-fi since the genre began, the idea of being able to create your own objects at home is understandably quite fascinating. Who hasn’t dreamed of having their own replicator that makes cookies and tea on-demand? But do these dreams have any grounding in reality? What would the world be like if you could download the plans for a 3D object and make it at home?
It’s often said that given a list of internet bookmarks, you can tell everything about that person. Nowadays, I suspect the RSS feeds you are subscribed to are much more revealing. So what feeds am I subscribed to – as a geek, technologist, web developer and keen gamer?
True gamers among us will likely have fond memories of the original Age of Empires game released by Microsoft Studios back in 1997, and it was a regular at many of my own LAN parties. The game itself was standard fare strategy / empire building but at the time it was quite innovative, helping to push forward the genre.
With Wordpress popularity ever increasing, security issues have never been more relevant – but other than simply keeping updated, how can a beginner or average level user stay on top of things? Would you even know if your blog has been hacked? A helpful new service from WebsiteDefender aims to solve this problem. Is it worth the effort though?
If your Wifi is being hijacked by some dirty rotten thieves – I showed you how to check this before – what can you do to get your own back, or find out a little more about who is responsible? Or rather, if a hacker has gained access to your wifi network, what kind of nasty things could they do to you?
We’re constantly telling you that using WEP to ‘secure’ your wireless network is really a fools game, yet people still do it. Today I’d like to show you exactly how insecure WEP really is, by showing you how to crack a WEP-secured network password in less than 5 minutes.
As I sit here wondering how things will pan out for London after the riots, I can’t help but turn towards Twitter for relevant information about my local area. The media is repeating the same tired footage and quotes from various politicians, and everyone is using the events to forward their own political goals or views of society. Yet all I want to know is – are my wife and I safe here?
Now you can easily download and view our entire selection of MakeUseOf PDF Guides directly on your smartphones and iPad, without any hassle! Here’s how we have made our amazing and ever expanding selection of free guides available to iPhone, iPad and Android users.
If you have access to your router, and it’s able to log activity, it’s relatively easy to watch everything that’s going on to try to find any untoward activity. Today I’d like to show you how to set that up on your DD-WRT router and some Windows-only software called WallWatcher. OSX users can also use it using a Parallels virtual machine.
Last week we introduced the top 10 most pirated games of all time as a good indicator of real success. Can the same logic be applied to movies? Will the biggest grossing movies also be the most downloaded? Read on to find out, in our list of the top 10 most downloaded movies, ever. This time, I’ve included box office stats from IMDB as well, to see how they correlate.
As the internet evolves and the systems it’s running on become harder to hack, you’d think websites would be hacked less! In fact, the opposite is true, with the number one problem lying not in the software but in human complacency. That said, how can you know if your site is vulnerable? That’s where the free service HackerTarget.com comes in.
We’ve talked a lot in the past about running local web servers for development purposes or to try out software such as Wordpress without having to pay for hosting, but how do you take it live once you’re ready to launch? The principles remain the same for any CMS or web software.
Tilt Shift is that wonderful effect that makes your photographs look like model dioramas, and we’ve covered a few utilities to achieve the effect before. This time though, I want to show how you can do the same thing in Photoshop – and apart from giving you more freedom in the overall process, it’s a […]
While we would never endorse piracy, it’s fair to say that the best games get downloaded more than others. In fact, games that are well pirated generally mirror their performance in the retail world – so in the absence of reliable sales figures, we look towards the download counts. It’s with great pleasure that I hereby introduce you to the top 10 most pirated games of all time.