➔ [3] Editor's Note

   |   2 minute read
By Junk Lains, Lainzine 3 is finally here! As usual, apologies for not following any kind of schedule and probably convincing you all that the lainzine is dead. My freshman year of college happened, which severely delayed things, and we had a lot of changes to the staff and infrastructure. We’re now hosted on gitlain, you can find the project here: https://gitla.in/groups/lainzine. Something else major is Kalyx’s departure to the Air Force.
Read More >>

➔ [3] Ersatz, or the Post-Modern Prometheus

   |   12 minute read
By Jove Her eyelids fluttered open to the sight of a concrete ceiling. She didn’t move, not wanting her overlay to notice she was awake. She lay there for a moment, the first rays of the sun’s light streaking the ceiling. With a sigh she hauled herself up and walked towards the window, greeted by the familiar green blinking in the corner of her vision. She looked out across the stark grey rectangles that made up her home.
Read More >>

➔ [3] Geometry

   |   1 minute read
By JS Geometry (under construction) right click and click “view image” to zoom in

➔ [3] High Tech, Low Life

   |   2 minute read
By Anonymous I live day to day by scraping change together, betting online, micro bitcoin investments. I sleep on the floor in a small room I can barely afford to rent, running errands on a $5000 carbon fiber bicycle. Don’t ask how I got it. The real lowlife is being awake for 42 hours, unable to escape the dark thoughts of never amounting to anything. Knowing that someone’s half-hearted desire to buy the GPU I’ve posted on craigslist determines if I eat that day.
Read More >>

➔ [3] Let's All Love Lain

   |   5 minute read
By Anonymous Let’s all Love Lain! In the earliest of years, uploading was a much more limited gesture. While we could interact with information, the integration was limited. The line between the Wired and reality was definite. We once thought of this like that between being and not being. Permanent. Now, we see that it is only so definite as the borders between nations. Nations are illusions. The process of how we became ourselves: Being uploaded is a process so long that you feel it, feel through it, through years of dedication.
Read More >>

➔ [3] Making Music from Noise

   |   3 minute read
By Anonymous Making Music from Noise This is one of those hard to find skills that take little effort to learn and produce amazing results with infinite possibilities. If you ever needed some wacky electronic sounds or something strange to listen to that you can create yourself, importing literally anything into Audacity as raw data can have amazing results. However, there are a few tips and tricks to making this a much more pleasurable experience and give you more of what you’re looking for.
Read More >>

➔ [3] Portrait of a New Radical

   |   4 minute read
by Zeroach Meme: a cultural item that is transmitted by repetition in a manner analogous to the biological transmission of genes. Memetics: the study of the replication, spread, and evolution of memes. There was a time where spreading a meme wasn’t easy. A few guys with a message would have started a band or self-published a zine. They might start a local BBS so they can post their radical ideas hoping that it’ll infect the next wandering mind who happens across their small island in cyberspace.
Read More >>

➔ [3] Recommended Reading: IT'S BEHIND YOU - The Making of a Computer Game

   |   2 minute read
By FORMAT ‘IT’S BEHIND YOU: The making of a computer game’ by Bob Pape The book is available free of charge at: http://bizzley.imbahost.com/ This book is different from previous recommendations as it is an autobiography. It covers the story of the writer as he delves in to the world of computing, learns his first programming languages, writes his first softwares, and eventually becomes a paid game developer for the ZX Spectrum home computer, starting with porting ‘Rampage’ and then focusing on his ‘R-Type’ port, which is the subject of most of the book.
Read More >>

➔ [3] Secure Communications Over Insecure Channels

   |   7 minute read
By Michel Walker Secure Communications Over Insecure Channels1 According to traditional conceptions of cryptographic security, it is necessary to transmit a key, by secret means, before encrypted messages can be sent securely. This paper shows that it is possible to select a key over open communications channels in such a fashion that communications security can be maintained. A method is described which forces any enemy to expend an amount of work which increases as the square of the work required of the two communicants to select the key.
Read More >>

➔ [3] The Way of Schway

   |   7 minute read
by serene The Way of Schway Apprehending new systems of thought, learning about the way other users think and learning all the symbols in the world expand the scope of what you can possibly become. Yet the pursuit of knowledge alone is no end in itself; it is useless unless applied with intent. Consider the basic, bare-bones model of a modern life: a cubicle at a net-cafe, or an apartment.
Read More >>
<< Previous  |  Page 4 of 7  |  Next >>