how to create a 3d images

Posted by Unknown On Thursday, 30 October 2014 1 comments
Curious about 3D technology and visual effects? Did you know that you can easily make your own 3D photos on your own computer? With a pair of red-blue 3D glasses, a digital camera, and some photo editing software, you too can make your very own three-dimensional photographs, also known as anaglyphs. See Step 1 below to get started!

Method 1 of 2: Photoshop Method

  1. Make 3D Photos Step 1.jpg
    1
    Find a subject. If you cannot take two pictures at once (say, with a stereo camera, or with two similar cameras), then make sure your subject has almost no movement between shots. Scenes that have a lot of depth and that are photographed without blur in the foreground and background make the best 3D shots.
    Ad
  2. Make 3D Photos Step 2.jpg
    2
    Take two photos of the same scene, moving the camera at least 2 inches horizontally. It's not critical that you make the boundaries exactly match, but it is critical for many shots that both photos are close to perfectly horizontal. It would be a good idea to use a tripod with a level.
    • Name your files "right" and "left" for easy distinction.
  3. Make 3D Photos Step 3.jpg
    3
    Open your images separately in Photoshop.
  4. Make 3D Photos Step 4.jpg
    4
    Select the right image by clicking the Select tab at top and clicking All, or by using CTRL-A.
  5. Make 3D Photos Step 5.jpg
    5
    Copy the right image. After you've selected the right image, you can copy it either by clicking the Edit tab at top and clicking Copy, or by using CTRL-C.
  6. Make 3D Photos Step 6.jpg
    6
    Open the left image. You can close out the right image by clicking the smaller, gray X in the upper right corner (but not the large red X).
  7. Make 3D Photos Step 7.jpg
    7
    Paste the right image onto the left image. Click Edit at the top and then Paste, or use CTRL-V.
  8. Make 3D Photos Step 8.jpg
    8
    Know your layers. Now that you've pasted the right image on top of the left image, the left image contains layers, which you can see on your right-hand toolbar under the layers tab. The right photo is Layer 1; the left photo is still listed as Background.
  9. Make 3D Photos Step 9.jpg
    9
    Double-click Layer 1 to bring up the Layer Style Box.
  10. Make 3D Photos Step 10.jpg
    10
    Under Advanced Blending and Channels, uncheck R. This will keep all the Red in the right photo unblended. Click OK. You'll notice red-cyan strokes on your photo now.
  11. Make 3D Photos Step 11.jpg
    11
    Double-click Background. You're going to make this into Layer 0. Just click OK on the box that comes up.
  12. Make 3D Photos Step 12.jpg
    12
    Grab the move tool. This should be the top-most arrow on your toolbar at the left.
  13. Make 3D Photos Step 13.jpg
    13
    Choose a focal point. Where you place your focal point will effect how your photo looks 3D. To have a sort of "backwards and forwards" depth, choose one that's at about the middle - not too far in the background, but not directly in the foreground, either.
  14. Make 3D Photos Step 14.jpg
    14
    Using the move tool, drag the red portion of your focal point over to its counter part in the other image. Your focal point shouldn't have any crazy red or cyan strokes directly around it.
  15. Make 3D Photos Step 15.jpg
    15
    Crop off the leftovers. Grab your crop tool and select the portion of the image that includes both colors. Exclude the strip of bright red or cyan around the border that you generated when you matched up focal points.
  16. Make 3D Photos Step 16.jpg
    16
    Save your file.
  17. Make 3D Photos Step 17.jpg
    17
    View the photo with 3D glasses, keeping the red lens over the left eye.You should be able to view the image on your computer or on a printed sheet.

Method 2 of 2: Free 3D Photo Maker

  1. Free3DPhotoMaker.JPEG
    1
    Download a free 3d photo maker online.
  2. Make 3D Photos Step 19.jpg
    2
    Select input images. You need to take two shots of a still set object captured with a small horizontal shift. Usually the distance must be about 2 to 3 inches to create the correct effect.
    • Exclusive feature: You can make a 3D picture out of one source image file. Just check the "Use single image" box.
  3. Make 3D Photos Step 20.jpg
    3
    Select the output location. Name your new file.
  4. Make 3D Photos Step 21.jpg
    4
    Select True Anaglyph on the drop menu.
  5. 5
    Click the Make 3D button.
    Ad

Do you know about photography? We could use your help!

Can you tell us about
lens aperture?
Yes I can
Can you tell us about
Photoshop fading?
Yes I can
Can you tell us about
shutter speed?
Yes I can
Can you tell us about
face swaps?
Yes I can

Video




Tips

  • Having a stereo camera, or two identical cameras, to take two pictures side-by-side gives you a lot more flexibility, because you get full color results, and you can take objects in motion, even ones moving very fast.
  • You should ideally move the camera 2 cm for every 1 m to the subject for the best effect. For instance, if your subject is 3 meters away, move your camera 6 cm for the next shot.
Ad
READ MORE

How To Check If Your Account Passwords Have Been Leaked Online and Protect Yourself From Future Leaks

Posted by Unknown On Saturday, 14 December 2013 1 comments
key-in-lock
Security breaches and password leaks happen constantly on today’s Internet. LinkedIn, Yahoo, Last.fm, eHarmony – the list of compromised websites is long. If you want to know whether your account information was leaked, there are some tools you can use.
These leaks often lead to many compromised accounts on other websites. However, you can protect yourself by using unique passwords everywhere – if you do, password leaks won’t be a threat to you.
Image Credit: Johan Larsson on Flickr

Why Password Leaks Are Dangerous

Password leaks are so dangerous because many people use the same password for multiple websites. If you register for a website with your email address and provide the same password you use for your email account, that email/password combination may be present on a list somewhere.
Crackers can then use this email/password combination to gain access to your email account. Even if you use a different password for your email account, they may try the email or account name and password combination on other websites to gain access to your other accounts.
For example, crackers recently compromised over 11,000 Guild Wars 2 accounts. They didn’t use keyloggers or compromise the game’s servers – they just tried logging in using email address and password combinations found on lists of leaked passwords. Players who reused a password that had already been leaked were compromised. The same will happen for other services that crackers want to gain access to.

How To Protect Yourself

To protect yourself against future leaks, ensure you use different passwords on each website – and ensure they’re long, strong passwords. Otherwise, a compromise at one website could lead to your accounts elsewhere being compromised. While compromised websites will generally inform you of the leak and have you change your password immediately, this won’t help much if you’re using the same password on many other websites.
Remembering unique passwords for all the different websites we use can be difficult, which is why password managers can be so useful. We like LastPass, but many people swear byKeePass, which keeps you in control of your data.
Read More:

Checking If Your Password Was Leaked

If you’re curious whether your email address appears on one of these leaked password lists, you don’t have to find a shady download site and download the lists yourself. Instead, you can use a tool that quickly checks for you.
PwnedList is a good one. LastPass now uses PwnedList to monitor whether LastPass account email addresses become compromised. For example, if your LastPass account email address is you@example.com, you’ll get a notification if you@example.com appears on any lists of leaked email addresses and passwords. This only applies to the single email address you use for your LastPass account, not every address you have in your LastPass vault.
If you want to check an email address manually, you can use PwnedList’s website. Plug in an email address and PwnedList will tell you whether it appears on any leaked lists. (Note that you can also enter SHA-512 hashes of your email address if you don’t trust PwnedList with your email address – you can use a tool such as this one to generate a SHA-512 hash.)
If your email address does appear on a list, don’t panic – this just means you should ensure you’re not reusing the same passwords on multiple websites. If you use the same password everywhere and your email address appears on one (or more) of these lists, you have a problem – you should change your passwords immediately.
LastPass also hosts some tools that allow you to see whether a specific password appears on the leaked lists of LinkedIn or Last.fm passwords. You can actually plug passwords in and see if someone was using them. The results show how weak many passwords are – plug in “password123” and you can see that at least one person was using it as their LinkedIn password.

Your email account is the center of your online security – websites generally allow you to change your password as long as you can click a link in an email. If someone else gains access to your email account, it can be game over for your other accounts. Read How To Recover After Your Email Password Is Compromised for more tips on protecting yourself.

READ MORE

How to Access Windows Remote Desktop Over the Internet

Posted by Unknown On 0 comments
image
We’ve covered several solutions for accessing your desktop remotely over the Internet, including TeamViewer and VNC. However, if you have a Professional edition of Windows, you already have Windows Remote Desktop installed.
By default, Windows Remote Desktop will only work on your local network. To access Remote Desktop over the Internet, you’ll need to use a VPN or forward ports on your router.
Before you continue, enable Remote Desktop on your computer and ensure you can access it from other computers on your local network.

Set Up a VPN

If you create a virtual private network (VPN), you won’t have to expose the Remote Desktop server directly to the Internet. Instead, you’ll first have to join your computer to the VPN. Your remote computer will act as if it’s part of the same local network as the computer running the Remote Desktop server. This will allow you to access Remote Desktop and other services only exposed on your local network.
There are a number of VPN applications you can use to create your own VPN, from complicated servers you configure by hand to easy-to-use graphical applications. We recommend LogMeIn Hamachi – download and install it on the computer you want to Remote Desktop to. Click here for more information on setting up Hamachi.
Once you’ve created an account, you can log into Hamachi on another computer and join both computers onto the same “Hamachi network.” They’ll act as if they’re connected directly, even if you’re doing this over the Internet.
You can now use the Remote Desktop Connection application on your computer to connect to the Remote Desktop server. Use the IPv4 address of the other computer, which is displayed in the Hamachi window while you’re connected.

Forward TCP Port 3389

You can also skip the VPN and expose the Remote Desktop server directly to the Internet. If you do this, ensure you have strong passwords set up on your computer. You wouldn’t want malicious people logging into your computer remotely.
We’ll go over the process quickly here. For more detailed help, read our in-depth guide to port forwarding. If you follow that guide, ensure you forward TCP port 3389 to the computer running Remote Desktop.
First, locate the IP address of the computer running Remote Desktop. On the computer running Remote Desktop, open the Control Panel, click View network status and tasks, and click the name of your current connection to the right of Connections. Click the Details button and note the number displayed to the right of IPv4 Address. (Click here for more detailed step-by-step instructions to find your computer’s IP address.)
Next, access your router’s web interface. If you don’t know its address, it’s probably the same as the “IPv4 Default Gateway” address in the Network Connection Details window. Plug this address into your web browser’s address bar to access the router’s web interface.
Log into the router and locate the Port Forwarding section. Forward TCP port 3389 to the IPv4 address you located earlier.
You can now log into Remote Desktop over the Internet – connect to your network’s external IP address, also known as its public IP address.
If you’ve forwarded ports, you may want to set up a dynamic DNS service so you can always connect, even if your network’s IP address changes. You may also want to set up a static IP address on the computer running the Remote Desktop server. This will ensure that the computer’s internal IP address won’t change – if it does, you’ll have to change your port forwarding configuration.

READ MORE

10 Awesome Improvements For Desktop Users in Windows 8

Posted by Unknown On 0 comments

10 Awesome Improvements For Desktop Users in Windows 8

00_lead_image_windows_8
It’s easy to focus on how Windows 8’s new interface doesn’t feel at home on a traditional desktop PC or laptop. But that’s only one part of Windows 8 – the Windows 8 desktop includes a variety of useful improvements.
If you’re a desktop user, you owe it to yourself to look over the improvements and consider upgrading. If Microsoft hadn’t removed the traditional Start menu and added a new interface, we’d all be considering Windows 8’s desktop an upgrade.

Boot Speed

Windows 8 uses some tricks to dramatically improve its boot speed. Some people have seen boot times drop from 30 to 15-20 seconds on existing hardware. Instead of shutting down normally, Windows 8 employs a clever trick – it saves the state of low-level software such as the kernel and hardware drivers to the disk and restores them when you boot it up. Essentially, Windows 8 “hibernates” low-level system software instead of shutting it down, resulting in greatly increased boot speeds.
New Windows 8 PCs using UEFI will also boot faster than systems using the old-style BIOS.

File Copying

File copying in Windows 8 is dramatically improved. The new file copy dialog allows you to pause file-copying operations, view multiple file-copying operations in the same window, and more easily manage file conflicts. The interface is simple by default, but you can also expand the dialog to view more information, including a graph of the file transfer’s speed over time.

Improved Multiple Monitor Support

For power uses with multiple monitors, windows 8 allows you to place separate taskbars and wallpapers on each monitor. Previously, this required third-party software.

Task Manager

The new Task Manager is a huge improvement over the old one. It features a Startup software manager that allows users to easily control the software that loads at startup. It’s also easier to understand at a glance, with color-coded resource usage columns and more human-readable program names. You can also quickly research a mysterious process online by right-clicking it and using the Search online option.

File Explorer Improvements

Windows Explorer has seen quite a few changes. For one, it’s now named File Explorer. While some users may dislike the new ribbon interface, it makes it easier to access powerful options like viewing hidden files without digging through menus and dialog boxes. You can also easily collapse the ribbon if you never want to see it.
There are also quite a few straight-up improvements, including the ability to mount ISO and VHD files by double-clicking them – no need to install any additional software. The Up button on the toolbar that was removed in Windows 7 is now back.

Storage Spaces

Storage Spaces is a power-user feature that allows you to combine multiple physical volumes into one logical volume. In other words, you can create a pool of storage from several physical hard disks. The storage pool will behave as if it were one hard disk.

Hyper V

Windows 8’s included Hyper-V feature allows you to create virtual machines out-of-the-box. Hyper-V was previously used on Windows Server and replaces the Windows Virtual PC virtualization solution used for Windows XP Mode on Windows 7. For example, you can use Hyper-V to install Ubuntu on a virtual machine without installing any third-party software.

Refresh and Reset

The ability to refresh your device to its factory state may seem like a tablet feature, but it isn’t. You can actually create your own system image and refresh Windows to it, quickly resetting Windows 8 to a fresh-installed state whenever you like. This can save you time when reinstalling Windows.

Battery Life

Low-level system changes, including optimizations to squeeze more battery life out of tablets and other portable computers, should result in a more power-efficient operating system and longer battery life. The removal of Aero should also result in longer battery life for laptops.

Security

Security has seen a lot of attention in Windows 8. Microsoft has finally included an integrated antivirus in Windows 8. It’s named Windows Defender, but it’s actually a renamed Microsoft Security Essentials. This will ensure that even less-experienced Windows users have an antivirus, but you can easily disable it and install any other antivirus product you prefer.
Secure Boot provides protection from rootkits that hijack the startup process, assuming you’re using a new PC with UEFI instead of the traditional BIOS. (On Intel x86 PCs, you can disable Secure Boot or add your own keys to Secure Boot in the UEFI firmware, so Secure Boot won’t prevent you from installing Linux. However, Secure Boot is used to lock-down ARM-based Windows RT computers.)
The integration of Microsoft’s SmartScreen filter at a lower level helps prevent less experienced uses from downloading and installing malware by warning them when they install software that is known-bad, or software that hasn’t been seen before.
There are also low-level changes to memory allocation and ASLR (Address Space Layout Randomization) that make security vulnerabilities harder to exploit, even if security holes are found.

If these were the only changes that were made in Windows 8, desktop users would see it as a worthy upgrade over Windows 7 – especially for $40.
Even if you dislike Windows 8’s new interface, the availability of third-party Start menus and software that hides a lot (but not all) of the new interface on the desktop should make you seriously consider upgrading to Windows 8 if these improvements seem significant to you.
READ MORE

8 Chromebook Tricks You Need to Know

Posted by Unknown On 0 comments
samsung-chromebook
Chromebooks aren’t like traditional laptops. While they’re much simpler, they still have various useful features you may not know about. These tricks will help you take advantage of your Chromebook’s true potential.
From accessing remote computers and printing to wiping your personal data, recovering Chrome OS, and installing desktop Linux, these tricks will help you get the most out of your Chromebook.

Control Who Can Log In

Chromebooks are marketed as laptops “for everyone.” By default, anyone with your laptop can pick it up, plug in their Google account, and log in. They won’t be able to access your data, but they will be able to use your Chromebook.
If you want to restrict access to your Chrome laptop, you can open Chrome’s settings screen and control who can log in. Only the Chromebook’s “owner” can do this. The first account you log in to the Chromebook with becomes the owner account.
You’ll find these options on the Settings screen, under the Users heading. You can also use the options here to have Chrome prompt you for your password every time you open it — by default, Chrome will wake from sleep without prompting you for a password. It’s fast and convenient, but potentially insecure.

Access Remote Windows, Mac, and Linux Desktops

You can’t run Windows programs on your Chromebook, but you can access remote Windows, Mac, and Linux desktops. The Chrome Web Store offers VNC clients for connecting to traditional VNC servers, but Chrome actually has Google-built remote desktop features. You can use this to access your desktop PC from a Chromebook or to remotely run that rare Windows application.
To do this, install the Chrome Remote Desktop app in Chrome on your PC. You can then activate the “Enable remote connections” option and connect to your PC from your Chromebook using the Chrome Remote Desktop app there.
This isn’t a Chrome OS-only feature. You can also use Google Chrome to remotely access Windows, Mac, and Linux PCs from any other type of PC,  whether you have a Chromebook or not.

Print via Google Cloud Print

If you ever need to print something, you should be aware that you can’t plug printers directly into your Chromebook and print to them. However, you can set up Google Cloud Print and use it to remotely print to supported printers from your Chromebook.
There are two ways to set up Google Cloud Print. Either you have a Google Cloud Print-ready printer, or you can install Chrome on a computer connected to a traditional printer and set up the Google Cloud Print connector, which will allow you to remotely print to that PC. Think of it like sharing a printer on a traditional Windows network, but even better — it also allows you to print to Google Cloud Print printers over the Internet.
Click the Print option in Chrome’s menu, click the Change button under Destination, and use the Google Cloud Print option to set this up. Chrome OS also includes the ability to print to a PDF, so you can always print to a PDF file and print that PDF file later on another computer, if you like.

Use Powerwash to Wipe Personal Data

Chrome OS includes a “Powerwash” feature that functions similarly to the Refresh or Reset options on Windows 8, performing a factory reset and removing your personal data, putting a Chromebook back into its clean state. It’s ideal when you are going to give your Chromebook to someone else, as it will remove all of your personal data. Think of it like reinstalling Windows or performing a factory-reset of a tablet.
You’ll find this option on the Settings screen. Click the Show advanced settings link and scroll down the bottom, where you’ll see a Powerwash button.

Create Keyboard Shortcuts

Want to create your own keyboard shortcuts on Chrome OS? Use the Shortcut Manager extension, created by a Google employee. It allows you to assign custom keyboard shortcuts to everything from browser actions to running JavaScript bookmarklets on the current page. If you’re a fan of AutoHotkey on Windows, you may find that the extension can replace many types of shortcuts you would create using AutoHotkey.

View Local Files

Your Chromebook isn’t just a web browser. It also includes a Files app along with local file viewers that allow you to watch videos, play music, read PDFs and Microsoft Office documents, view images, and more. You can download all sorts of media files and open them later from the Files app.

Recover Chrome OS From a USB Drive

Chromebooks include a recovery mode that allows you to reinstall Chrome OS if your Chromebook’s software becomes damaged. However, this is unlikely to happen unless you’re messing around in Developer Mode.
To recover your Chrome operating system, you’ll need to create a recovery drive. You can do this by downloading and running Google’s Chrome Recovery Tool for Windows, Mac, or Linux. You can also create a recovery drive on Chrome OS itself. Just plug chrome://imageburnerinto the address bar on your Chromebook and you’ll access the interface. The recovery data can be copied to a USB stick or SD card.
To actually recover Chrome OS, you’ll need to press Escape + Refresh and hold down the Power button. This accesses the Recovery screen. Older Chromebooks have dedicated recovery buttons — you’ll find more information on Google’s website.

Use Developer Mode to Run Desktop Linux

Chromebooks allow you to disable their security features and enable Developer Mode. In Developer Mode, you can modify Chrome OS all you like and boot other operating systems, including Ubuntu and other traditional desktop Linux systems. You can even run a desktop Linux system side-by-side with Chrome OS, switching between the two with hotkeys.

Know any other useful Chromebook tricks you’d like to share? Leave a reply in the Discourse thread!
READ MORE