➔ [3] Making Music from Noise
| 3 minute read
By Anonymous Making Music from Noise This is one of those hard to find skills that take little effort to learn and produce amazing results with infinite possibilities. If you ever needed some wacky electronic sounds or something strange to listen to that you can create yourself, importing literally anything into Audacity as raw data can have amazing results. However, there are a few tips and tricks to making this a much more pleasurable experience and give you more of what you’re looking for.
Read More >>
➔ [3] Portrait of a New Radical
| 4 minute read
by Zeroach Meme: a cultural item that is transmitted by repetition in a manner analogous to the biological transmission of genes.
Memetics: the study of the replication, spread, and evolution of memes.
There was a time where spreading a meme wasn’t easy. A few guys with a message would have started a band or self-published a zine. They might start a local BBS so they can post their radical ideas hoping that it’ll infect the next wandering mind who happens across their small island in cyberspace.
Read More >>
➔ [3] Recommended Reading: IT'S BEHIND YOU - The Making of a Computer Game
| 2 minute read
By FORMAT ‘IT’S BEHIND YOU: The making of a computer game’ by Bob Pape The book is available free of charge at: http://bizzley.imbahost.com/
This book is different from previous recommendations as it is an autobiography. It covers the story of the writer as he delves in to the world of computing, learns his first programming languages, writes his first softwares, and eventually becomes a paid game developer for the ZX Spectrum home computer, starting with porting ‘Rampage’ and then focusing on his ‘R-Type’ port, which is the subject of most of the book.
Read More >>
➔ [3] Secure Communications Over Insecure Channels
| 7 minute read
By Michel Walker Secure Communications Over Insecure Channels1 According to traditional conceptions of cryptographic security, it is necessary to transmit a key, by secret means, before encrypted messages can be sent securely. This paper shows that it is possible to select a key over open communications channels in such a fashion that communications security can be maintained. A method is described which forces any enemy to expend an amount of work which increases as the square of the work required of the two communicants to select the key.
Read More >>
➔ [3] The Way of Schway
| 7 minute read
by serene The Way of Schway Apprehending new systems of thought, learning about the way other users think and learning all the symbols in the world expand the scope of what you can possibly become. Yet the pursuit of knowledge alone is no end in itself; it is useless unless applied with intent.
Consider the basic, bare-bones model of a modern life: a cubicle at a net-cafe, or an apartment. You can rent one out at low expense, and it has a futon, a computer, and some way of obtaining food and drink.
Read More >>
➔ [3] Victor Lustig and the Importance of the Newspaper
| 4 minute read
By Nick Victor Lustig and the Importance of the Newspaper Victor Lustig is known as the ‘the man who stole the Eiffel Tower twice.'1,2 His life was devoted to that of a confidence man and developed important social engineering techniques that are practiced today. Fluent in many languages, a lust for knowledge, and charismatic, he contained the appropriate arsenal of his time to pull off insane stunts that were immensely profitable at the time.
Read More >>
➔ [3] Video Games, Real World Currency, and You
| 8 minute read
By Kashire Introduction Greetings fellow Lainers! Kashire here. Imagine if you will that you’re sitting in IRC, talking to all us cool bastards, posting around the board, and checking out some news. Maybe you’re watching steins;gate for the 19th time.
Now imagine you’re doing this… while generating a mostly passive income. This is passive income that basically takes ~30 minutes in total out of your day, to get an extra $50 just passed into your bank account.
Read More >>