Posted on 22 November, 2013
"Carson has four golden rules, the first of which is, “If police can’t see you, they can’t arrest you.” The simplest application of this concept is that if you plan on doing something illegal, you should do it in the privacy of your home."
Posted on 21 November, 2013Source theatlanticcities.com
"Jak zrobić prosty i skuteczny ustrój akustyczny domowym sposobem? Czas wykonania: nie cała godzina, nie licząc niezbędnych zakupów w Castoramie. Koszt: poniżej 100zł za szt. Propozycja dla tych wszystkich, którzy nagrywają w domu. W źle przystosowanych warunkach akustycznych, pokojach w bloku, piwnicach i garażach. Bardzo przydatna również w profesjonalnych studiach nagrań. Prosta konstrukcja pozwalająca znacznie poprawić akustykę pomieszczenia."
"Garth Richardson, a producer who worked with Rage Against the Machine back in the day, first told me about using an LA-3A Audio Leveler into an LA-2A Leveling Amplifier and setting them both to limit and just nudging up to 2dB of gain reduction on each. That blew my mind when I finally got to try it. I had no idea that something that subtle could have such a profound effect."
"Starting with no pre-delay, slowly start to increase it. This will slowly pull the elements closer. Usually only 10-20ms of pre-delay is needed to help add mix clarity when needed, and create a space that sounds more realistic. Refining pre-delay settings when using short times such as 10-20ms is important. Anything under 20ms can induce some elements of comb filtering. This isn’t as much of an issue with pre-delay times higher than 20ms, but can be at the expense of audible flams from the wet delayed signal. Sometimes it’s best to find a point rhythmically where the pre-delay can be set to be in time with the song, which helps mask any issues and also avoids comb filtering. It’s also not uncommon to add a compressor to the reverb signal to catch some transients that can draw unwanted attention to the reverb."
"«Гастроли на Гаити нас вправду перепахали. Мы там играли совсем в сельской местности — для людей, которые никогда в жизни не слышали ни The Beatles, ни The Rolling Stones. То есть ты составляешь сет-лист и думаешь: так, давайте сыграем несколько каверов; интересно, какие песни The Beatles им могут понравиться? А потом отвечаешь себе: а может, и никакие. Очень странное ощущение — ты оказываешься как бы вне истории, за пределами контекста. И тогда тебе приходится коммуницировать с людьми чисто на ритмическом уровне. Это нас очень зажгло. Отсюда и выросла песня «Reflektor».» | Уин Батлер"
Posted on 17 November, 2013Source volna.afisha.ru
"Columbia was heavy into Neumann M49 and AKG C12 mics back then. Both are large tube-type condenser mics. On the Brubeck groups, the engineers used one mic per instrument, and each mic was at a very respectful distance, about 1 1/2 to 3 feet away (Figure 1)… You still hear all the air off the sax reed, and still hear all the tone. They got the placement quickly. Distant miking like this sounds great; I think we overdo close miking."
Posted on 15 November, 2013
Posted on 14 November, 2013Reblogged from technariumas
The insecurity of baseband software is not by error; it’s by design. The standards that govern how these baseband processors and radios work were designed in the ’80s, ending up with a complicated codebase written in the ’90s - complete with a ’90s attitude towards security. For instance, there is barely any exploit mitigation, so exploits are free to run amok. What makes it even worse, is that every baseband processor inherently trusts whatever data it receives from a base station (e.g. in a cell tower). Nothing is checked, everything is automatically trusted. Lastly, the baseband processor is usually the master processor, whereas the application processor (which runs the mobile operating system) is the slave.
While we can sort-of assume that the base stations in cell towers operated by large carriers are “safe”, the fact of the matter is that base stations are becoming a lot cheaper, and are being sold on eBay - and there are even open source base station software packages. Such base stations can be used to target phones. Put a compromised base station in a crowded area - or even a financial district or some other sensitive area - and you can remotely turn on microphones, cameras, place rootkits, place calls/send SMS messages to expensive numbers, and so on. Yes, you can even brick phones permanently."
Posted on 13 November, 2013Reblogged from pukomuko
"Andy Wallace was talking about EQ’ing bass on all these metal records. He said he would boost a ridiculous amount way into the super sub lows and then send it to the compressor. I was like Mother Fucker, that’s how he got that sound on LinkinPark or whatever."
"Wouldn’t it be nice if one day, told that Google’s mission is to “organize the world’s information and make it universally accessible and useful,” we would finally read between the lines and discover its true meaning: “to monetize all of the world’s information and make it universally inaccessible and profitable”? With this act of subversive interpretation, we might eventually hit upon the greatest emancipatory insight of all: Letting Google organize all of the world’s information makes as much sense as letting Halliburton organize all of the world’s oil."
Posted on 12 November, 2013Source faz.net