SlideShare a Scribd company logo
Barcamp Charleston 2010
Geocaching History
What is Geocaching? The use of a GPS to find a
cache that contains items to be found.
http://www.geocaching.com/about/history.aspx
http://www.geocaching.com/faq/default.aspx
Who can participate in Geocaching?
If you can walk you can go Geocaching
Great activity for families
Geocaching in Lowcountry
Geocaching pictures
Geocache picture
Geocache pictures
Geocache picture
Geocache picture
What tools do you need?
Free Geocaching account on
http://www.geocaching.com
GPS
Correct clothing – closed shoes and long pants
Bug Spray (DEET) or Skin So Soft from Avon
Long stick or metal rod for probing for hidden caches
on the ground
Flashlight if Geocaching at night
The different types of Caches
• http://www.geocaching.com/about/cache_types.aspx
Traditional
Micro
Multi Cache
Mystery Cache
Event Cache
Cache in Trash Out event
Geocache Difficulty rating
Determined by the size of the cache
Determined by the terrain
Rating goes from 1 through 5
The higher the number the harder it will be to find it.
Different types of GPS to use
http://www.geocaching.com/about/buying.aspx
Garmin is a well known brand
GPS software for iPhone, iPad, Android
 http://www.geocaching.com/iphone/ Groundspeak Geocache
application
Picture of Garmin GPS I use
Being Aware of surroundings
Personal safety. Geocache with a partner
Be aware of wildlife and insects
Beware of Mugglers
Mugglers are people who vandalize caches
Geocaching ettiquette
There are no wrong or right ways to Geocache
Different people do it differently
Don’t leave trash in the cache you find
Hide the cache container as well as you found it
If you take a cache item please leave one
If you take a travel bug relocate it within 24 hrs
Angel Oak Tree on Bohicket Rd
Geocaching Picture
Geocaching Picture
The Bird Cache
The Bird Cache
The Bird Cache
Going to the cache
The cache found

More Related Content

Similar to Geocaching in the lowcountry

Geocaching May17
Geocaching May17Geocaching May17
Geocaching May17bbelardi
 
Geocaching for Fun and Fitness
Geocaching for Fun and FitnessGeocaching for Fun and Fitness
Geocaching for Fun and Fitness
kendricktm
 
Geo caching
Geo cachingGeo caching
Geo caching
Rhonda Frohn
 
Educational geocaching presentation
Educational geocaching presentationEducational geocaching presentation
Educational geocaching presentation
Porter Wideman Palmer
 
Geocaching for Townships
Geocaching for TownshipsGeocaching for Townships
Geocaching for Townships
Peter Muir
 
Geocaching citb mb presenatation day 1
Geocaching citb mb presenatation day 1Geocaching citb mb presenatation day 1
Geocaching citb mb presenatation day 1
Joseph Murphy
 
The Joy of Geocaching
The Joy of GeocachingThe Joy of Geocaching
The Joy of Geocaching
Paul Gillin
 
Geocaching in the Classroom
Geocaching in the ClassroomGeocaching in the Classroom
Geocaching in the Classroom
kendricktm
 
Geocaching - Conference 2009 (A7)
Geocaching - Conference 2009 (A7)Geocaching - Conference 2009 (A7)
Geocaching - Conference 2009 (A7)
Alberta Recreation and Parks Association
 
Geocaching
GeocachingGeocaching
Geocaching
Ann Noonen
 
Geocaching presentation
Geocaching presentationGeocaching presentation
Geocaching presentationiteclearners
 
Kids cache bash ppt
Kids cache bash pptKids cache bash ppt
Kids cache bash pptAnn Noonen
 
Geocaching.pptx
Geocaching.pptxGeocaching.pptx
Geocaching.pptx
KierenReynolds3
 
Kids cache bash ppt
Kids cache bash pptKids cache bash ppt
Kids cache bash ppt
Ann Noonen
 
What is Geocaching?
What is Geocaching?What is Geocaching?
What is Geocaching?
Andrea Mercado
 
Wheres Waldo Pete& C
Wheres Waldo Pete& CWheres Waldo Pete& C
Wheres Waldo Pete& C
Kristin Hokanson
 
GPS and Geocaching in your classroom
GPS and Geocaching in your classroomGPS and Geocaching in your classroom
GPS and Geocaching in your classroom
bcteacher
 
GPS and Geocaching in your classroom
GPS and Geocaching in your classroomGPS and Geocaching in your classroom
GPS and Geocaching in your classroom
bcteacher
 
Introduction To NNJC Geocaching v2
Introduction To NNJC Geocaching v2Introduction To NNJC Geocaching v2
Introduction To NNJC Geocaching v2
Kevin Noble
 
Geocaching
GeocachingGeocaching
Geocachingbbelardi
 

Similar to Geocaching in the lowcountry (20)

Geocaching May17
Geocaching May17Geocaching May17
Geocaching May17
 
Geocaching for Fun and Fitness
Geocaching for Fun and FitnessGeocaching for Fun and Fitness
Geocaching for Fun and Fitness
 
Geo caching
Geo cachingGeo caching
Geo caching
 
Educational geocaching presentation
Educational geocaching presentationEducational geocaching presentation
Educational geocaching presentation
 
Geocaching for Townships
Geocaching for TownshipsGeocaching for Townships
Geocaching for Townships
 
Geocaching citb mb presenatation day 1
Geocaching citb mb presenatation day 1Geocaching citb mb presenatation day 1
Geocaching citb mb presenatation day 1
 
The Joy of Geocaching
The Joy of GeocachingThe Joy of Geocaching
The Joy of Geocaching
 
Geocaching in the Classroom
Geocaching in the ClassroomGeocaching in the Classroom
Geocaching in the Classroom
 
Geocaching - Conference 2009 (A7)
Geocaching - Conference 2009 (A7)Geocaching - Conference 2009 (A7)
Geocaching - Conference 2009 (A7)
 
Geocaching
GeocachingGeocaching
Geocaching
 
Geocaching presentation
Geocaching presentationGeocaching presentation
Geocaching presentation
 
Kids cache bash ppt
Kids cache bash pptKids cache bash ppt
Kids cache bash ppt
 
Geocaching.pptx
Geocaching.pptxGeocaching.pptx
Geocaching.pptx
 
Kids cache bash ppt
Kids cache bash pptKids cache bash ppt
Kids cache bash ppt
 
What is Geocaching?
What is Geocaching?What is Geocaching?
What is Geocaching?
 
Wheres Waldo Pete& C
Wheres Waldo Pete& CWheres Waldo Pete& C
Wheres Waldo Pete& C
 
GPS and Geocaching in your classroom
GPS and Geocaching in your classroomGPS and Geocaching in your classroom
GPS and Geocaching in your classroom
 
GPS and Geocaching in your classroom
GPS and Geocaching in your classroomGPS and Geocaching in your classroom
GPS and Geocaching in your classroom
 
Introduction To NNJC Geocaching v2
Introduction To NNJC Geocaching v2Introduction To NNJC Geocaching v2
Introduction To NNJC Geocaching v2
 
Geocaching
GeocachingGeocaching
Geocaching
 

Recently uploaded

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Geocaching in the lowcountry