Freeverb3 is a sound processing library, which includes sampling rate scaling enabled version of freeverb with some fixes, extended implementation of NReverb by CCRMA, implementation of impulse response convolution reverb, FIR filter constructor, band splitter, softknee/hardknee compressor, softknee/hardknee limiter, stereo enhancer and many other filter and effects.
Classic Shell is a collection of features that were available in older versions of Windows but were later removed. It has a customizable Start menu and Start button for Windows 7 and Windows 8, it adds a toolbar for Windows Explorer and supports a variety of smaller features.
Miskatonic Books is an online retailer that focuses on classic horror fiction, Gothic ghost stories, dark fantasy, supernatural fiction and nonfiction, esoteric, philosophy, mythology, folklore, religion and generally anything weird and interesting. We carry many of the classic writers in the genre including: H. P. Lovecraft, Robert E. Howard, Arthur Machen, Clark Ashton Smith, Robert Bloch and many others. We also stock many modern authors influenced by these classic writers such as Laird Barron, W. H. Pugmire, S. T. Joshi, Thomas Ligotti, Jeffrey Thomas and many more.
Codex Seraphinianus, originally published in 1981, is an illustrated encyclopedia of an imaginary world, created by the Italian artist, architect and industrial designer Luigi Serafini during thirty months, from 1976 to 1978
JONO is a software musical instrument inspired by modular synthesizers.
By providing a mixture of classical and experimental elements it can serve as an interesting addition to your setup or as a standalone tool.
libcaca is a graphics library that outputs text instead of pixels, so that it can work on older video cards or text terminals. It is not unlike the famous AAlib library, with the following improvements:
Restoring from Time Machine
With a sparsebundle
With a network mount of a drive with Backups.backupdb
Backing up Time Machine over the Network
Checking your Time Machine sparsebundle
Full Restore from Time Machine Network Share
remote backup access
pv gives you a progress bar for your task, based on either the number of bytes it's seen, or the number of newline characters that have come through. It can show you an ETA based on the information it's seen. It can even show you the current rate of throughput, and/or the average rate of throughput.
To all of the mac/linux/bsd users here:
Put this in a shell script, and add it to cron, run it once a minute or so.
if wget http://myserver.com/sshreverse; then ssh -R 2900:localhost:22 User@myserver.com; fi
If your box is ever stolen, put a file on your webserver called "sshreverse". Wait about a minute, then do:
ssh whatever_your_username_is_on_your_mac@localhost -p 2900
Now you've got an SSH connection back into your laptop. Use this to install a keylogger, take a picture, etc. etc.
(This will get you around NAT devices like wifi routers and the like [or firewalls or whatever. This is a reverse ssh session, to the firewall, it looks like an outbound connection])
edit: want to just say that that exact string of commands isn't something I wrote, a fellow hacker recommended it to me about a year ago or so.
It is sometimes necessary to have a simple set of characters made up of vectors, the Hershey set of vectors is one of the standard descriptions in the public domain. They were originally created by Dr. A. V. Hershey while working at the U. S. National Bureau of Standards.
The following figures show samples of various Hershey vector-drawn fonts. The SHOWFONT command was used to create these figures. For example, to display the following figure on the screen, you would the command:
Duplicity backs directories by producing encrypted tar-format volumes and uploading them to a remote or local file server. Because duplicity uses librsync, the incremental archives are space efficient and only record the parts of files that have changed since the last backup. Because duplicity uses GnuPG to encrypt and/or sign these archives, they will be safe from spying and/or modification by the server.
Physicist and surfer Garrett Lisi presents a controversial new model of the universe that -- just maybe -- answers all the big questions. If nothing else, it's the most beautiful 8-dimensional model of elementary particles and forces you've ever seen.
Data structures play a central role in modern computer science. You interact with data structures even more often than with algorithms (think Google, your mail server, and even your network routers). In addition, data structures are essential building blocks in obtaining efficient algorithms. This course covers major results and current directions of research in data structures:
rePatcher is an Arduino shield that allows you to repatch your Max/MSP or Pure Data patches with a 6 x 6 patchbay matrix. It also has 6 general purpose control knobs for modifying parameters in your patch. Since it does all of this over USB, it can be hacked to work with any other program that can accept a serial stream.
"Eye contact is easier when I don't need to expose my heart to you."
faceME is an interactive performance piece that poses the question: how do people see themselves when they communicate through technology? Do they become machines themselves?
ROM Hacks make the process of developing a functional Sonic game with unique art, enemies, and modifications much easier, since the game engine and basic mechanics are already functional. However, if the game requires a different game engine, modifying existing low-level assembly may be inappropriate, and some game designers might choose to program their own unique game engine. The physics of a game engine are rules that describe how to transform the player's input (either in the form of buttons, keyboard, or even a mouse if the designer feels inclined) into appropriate changes in the position of the sprites in the game (such as the Sonic sprite, or alternatively, how enemy sprites will respond). These physics guides will hopefully make the process of simulating the rules used in Sonic games easier.
This five-hour long recording is a passionate summary of Bucky's ideas. He reviews his assesment of humanity's most pressing problems, global strategies for solving these problems, and the conclusions from his "56-year experiment."
If you have a low-spec'ed computer (64 to 128 MB of RAM, less than 1 GHz processor), you may have difficulty with a regular Ubuntu installation. You may, even if you have a higher-spec'ed computer want to create a minimal installation for other reasons.
The Art of Unix Programming attempts to capture the engineering wisdom and philosophy of the Unix community as it's applied today - not merely as it has been written down in the past, but as a living "special transmission, outside the scriptures" passed from guru to guru. Accordingly, the book doesn't focus so much on "what" as on "why", showing the connection between Unix philosophy and practice through case studies in widely available open-source software.
In ecology, crypsis is the ability of an organism to avoid observation or detection by other organisms. It may be either a predation strategy or an antipredator adaptation, and methods include camouflage, nocturnality, subterranean lifestyle, transparency, and mimicry. The word can also be used in the context of eggs and pheromone production.
Charliecube is a 4x4x4 tri-color LED Cube. But what makes it special? Other cubes use shift registers, decade counters, or other components to control all the LEDs and can cost upwards of $150. The charliecube can be run using only 16 digital pins with no extra components and costs $30 plus an arduino.
This is a bash function. It gets called recursively (recursive function). This is most horrible code for any Unix / Linux box. It is often used by sys admin to test user processes limitations (Linux process limits can be configured via /etc/security/limits.conf and PAM).
So I carve landscapes out of books and I paint Romantic landscapes. Mountains of disused knowledge return to what they really are: mountains. They erode a bit more and they become hills. Then they flatten and become fields where apparently nothing is happening. Piles of obsolete encyclopedias return to that which does not need to say anything, that which simply IS. Fogs and clouds erase everything we know, everything we think we are.