05.03.2013 Views

Data Hacking

Data Hacking

Data Hacking

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

FIGURE 11-6: Crisscross or grid search pattern<br />

Chapter 11 — <strong>Hacking</strong> Geocaching<br />

Stop and Average<br />

Some caches are just plain elusive; they may be well hidden under a log or rock, or in a massive<br />

field of logs and rocks. This can make things mega tricky. At this point, it might be a good idea<br />

to just take a break and let your GPS receiver get a good lock (a few minutes), giving you a<br />

good high-precision estimate of the distance to the cache. Then move a bit and let the GPS<br />

unit get another lock. Keep doing this until you have narrowed down the position of the cache.<br />

This is a slow process but it does get results.<br />

Approach It from a Different Direction<br />

This is a simple but effective trick. Just overshoot the cache location and approach it from the<br />

opposite direction. Many caches are only well hidden from the direction in which the cacher<br />

thinks you will approach!<br />

265

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!