Archive for the ‘LPT730A’ Category

LPT730 – LAB9

December 5, 2008

I have been trying lab 9 for 2 days, I think there is some problem with Fedora 10 x64 and some of the filters used by the dvd-slideshow, this is the output I am getting.

#################################################
AUDIO FILE FORMATS: 8svx aif aifc aiff aiffc al amb au avr caf cdda cdr cvs cvsd dat dvms f4 f8 fap flac fssd gsm hcom htk ima ircam la lpc lpc10 lu mat mat4 mat5 maud nist ogg paf prc pvf raw s1 s2 s3 s4 sb sd2 sds sf sl smp snd sndfile sndr sndt sou sox sph sw txw u1 u2 u3 u4 ub ul uw vms voc vorbis vox w64 wav wavpcm wv wve xa xi
PLAYLIST FORMATS: m3u pls
AUDIO DEVICE DRIVERS: alsa ao oss ossdsp

EFFECTS: allpass band bandpass bandreject bass bend chorus compand contrast dcshift deemph delay dither earwax echo echos equalizer fade filter flanger gain highpass ladspa loudness lowpass mcompand mixer noiseprof noisered norm oops pad phaser pitch rate remix repeat reverb reverse riaa silence spectrogram speed splice stat stretch swap synth tempo treble tremolo trim vol

EFFECT OPTIONS (effopts): effect dependent; see –help-effect
[dvd-slideshow] Creating mp2 audio using toolame 0.2l…
[dvd-slideshow]############################################################
[dvd-slideshow] Multiplexing audio and video…
[dvd-slideshow] ERROR: no output .mp2 file found!
[dvd-slideshow] Must be some error with your input audio
[dvd-slideshow] or the mp2 audio encoder
[dvd-slideshow] ERROR during mplex execution!
[dvd-slideshow] see /home/milton/Pictures/fedora 10 release/dvd-slideshow.log for details
[dvd-slideshow] cleanup…
#################################################

I tryed to modify the given line 661 (ac3=0), I also changed the audio file to .mp3, .ogg and even .wav and the program still not working. I took a look in my classmates blogs and followed their tutorials and still not working for me :-(. If someone have any solution, please let me know, thanks.

Advertisements

Mosaic using Linux Command Line Tools

November 21, 2008

1.0) Creating a mosaic

1.1) Install metapixel

yum -y install metapixel

1.2) Create the library directory that will be the source of your mosaic.

metapixel-prepare source_directory destination_directory –width=25 –height=25

1.3) Creating the mosaic

metapixel –metapixel source_image.jpg mosaic_name.png –library source_files_from_metapixel_prepare –scale=35 –distance=100

And here is my mosaic…..

milton3

2.0) Removing red eyes on Gimp

    gimp-logo

    2.1) Open a picture

    2.2) Go to Filters -> Enhance -> Red Eye Removal

    gimp-how-to

    Torrent x Magnet

    November 13, 2008

    .Torrent files:
    –    Other user will not able to see your share folder, since it only share the files that you’re downloading and the one that you marked to be shared.
    –    It is very easy to find updated resources from .torrent files.
    –    You will able to get fast connection, especially when the resource is updated lately and it’s a popular file.
    –    You can change a lot of different options in the application during downloading a torrent package, including priority, download and upload bandwith.

    Magnet files:
    –    You may not able to find updated resources, since there are not many people using magnet links.
    –    Your fireware or your internet supplier may have disable the port or limit the bandwidth for magnet port.

    Disadvantages:

    .Torrent files:
    –    Even you can google a lot of torrent files from the internet, torrent clients do not have search functions.
    –    Compare to magnet links, you have to find torrent files yourself, instead of just click on a web page or search in the client application.

    Magnet files:
    –    You may expose some sensitive files when you’re sharing a whole directory.
    –    Files are not up-to-date
    –    a lot of spam and virus in this peer-to-peer network.

    Robot Exclusion

    September 23, 2008

    Source: http://www.robotstxt.org/
    Source1: http://www.indiaseos.com/user-agent-robot-txt.htm

    Robots are programs that goes to many pages recursively retrieving linked pages. They are also called WWW Robots, Spiders or Crawlers.

    They were useful in the past when the dial-up calls were expensive and a cheaper solution was to download all the texts (newspapers, books, etc) you want to read in your computer and then hang up the phone line, saving you some money in the phone bill.

    One popular program I used in that days was webmirror ( http://www.bmtmicro.com/BMTCatalog/multipleos/webmirror.html )

    Some time in the years 1993 or 1994 there have been occasions where robots have visited web servers where they weren’t welcome for various reasons. One of these reasons were robot specific swamped servers with rapid-fire requests, retrieved the same files repeatedly or going very deep virtual trees.

    These incidents indicated the need for established mechanisms for web servers to indicate to robots which parts of their server should not be accessed.

    The solution to exclude robots from accessing sensitive information on a server was to create a file on the server which specifies an access policy for robots. This file must be accessible via HTTP on the local URL “/robots.txt“.

    This approach was chosen because it can be easily implemented on any existing WWW server, and a robot can find the access policy with only a single document retrieval. Even though this control is implemented in the robot, and can deactivated.

    Phishing – Protect yourself before lose your informations

    September 22, 2008

    Following the definition from the website http://www.webopedia.com, fishing is the act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identify theft.

    The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The web site, however, is bogus and set up only to steal the user’s information.

    To protect yourself against phishing the users must following some recommendations:

    • Never open a email from a unknown sender
    • Take care about which kind of attachments your are going to open
    • Use Firefox instead of Internet Explorer
    • Keep your web browser always updated
    • Uses a good anti virus and update it daily
    • Never click in links to go to any website, always prefer to type the address by yourself
    • Pay attention about the locker that appear in the browser when entering in a protected website

    In the blog http://www.jgc.org/blog/2006/09/watching-phishing-attack-live.html the author describe step by step a phishing attempt against his blog.

    Another web site http://www.cs.utoronto.ca/~ronda/itrustpage/screenshots/index.html have a huge collection of screen shots from real fishing attacks. They also have a free GNU / GPL anti fishing software.

    LPT730 – LAB2

    September 15, 2008
    • Public Keys
    • Thunderbird with the Enigmail
    • Certificates

    Answers for the LPT730 – LAB2

    LPT730 – LAB1

    September 3, 2008

    Topic 1: Software Patents – good or bad?

    Source:

    http://bioinformatics.oxfordjournals.org/cgi/content/full/22/13/1543

    Patents arose as a legal mechanism designed to protect ‘intellectual capital’. In theory, patents provide a valuable protection system for inventors pursuing development of their invention as well as a reward system for commercially valuable ideas.

    The term ‘software patents’ is a little bit of a misnomer since in general, it is not the software that is patented, but the underlying method or algorithmic means of accomplishing an end result.

    In 1998, Sergey Brin and Larry Page published a paper on a search engine they were working on called Google (Brin and Page, 1998). They filed a patent the same year (Page, 1998), which was granted in 2001. At the time, the reigning search engine giants like Yahoo, Altavista and Webcrawler were already well established, flush with resources—at least compared to an academic start-up that began in a garage. Google is today the world’s most popular search engine, earning that distinction by giving people a superior product. But what would have happened to Google if their idea could have been stolen without legal consequence?

    If software patents can be used to protect inventors and investors actively pursuing development of a clever idea, then they can be a good thing. So the question remains of how to keep the potential for good and lessen the potential for evil.

    ————————-

    Another interesting text cames from the movement “nosoftwarepatents”

    http://www.nosoftwarepatents.com

    Topic 2: Proposed Federal Bill C-61 and its potential impact on open source software

    Source:

    http://en.wikipedia.org/wiki/Bill_C-61_(39th_Canadian_Parliament,_2nd_Session)

    Bill C-61, An Act to amend the Copyright Act, was a bill tabled in 2008 during the second session of the 39th Canadian Parliament by Minister of Industry Jim Prentice. The bill died on the table when the 39th Parliament was dissolved prematurely and an election was called by the Governor General Michaëlle Jean at Prime Minister Stephen Harper‘s request on September 7, 2008.

    The proposed bill contains the following changes on what constitutes copyright infringement and what does not for personal use:[5]

    • Time shifting, limited format shifting, copying for personal use, and device transferring of media is legal as long as:
    • Citizens do not retain recorded programs for extended time
    • Are not backups of DVD’s (can only be of videocassettes in format shifting).
    • Do not circumvent any and all “digital locks”
    • Transferring of media occurs only once per device owned by the purchaser of the original copy while retaining the original copy.
    • Are not of shows broadcast with “no recording” flags
    • Are not governed by any other clauses between the right holder and consumer (ex. Amazon’s non-transferability clause, promotional use only, do not sell/transfer, etc.) [6]
    • Format shifting must comply with the twelve processes listed here (pdf) in addition to all other conditions listed. [7]

    Hosts, such as ISP’s, will no longer have legal responsibility under the new bill when their services are unintentionally used to provide access to copyrighted material. [8]

    Methods of protecting privacy would become legal under the proposed bill, however distribution of software to do so will be illegal, effectively canceling out the new right.

    The bill will make circumventing all digital locks illegal, including locks on the Internet. [9]

    It modifies what libraries can do in providing digital copies, such that they would be allowed to create digital copies for patrons, but the copies must self destruct/be destroyed within 5 days of creation [8]

    It modifies the copyrights of performers and their performances such that a performer is given the sole right to: [8]

    • “communicate [their performance] to the public by telecommunication.”
    • “to perform [their performance] in public.”
    • fix their performance in material form, such as recording their performance onto a dvd.
    • reproduce, rent, sell or otherwise transfer ownership of any sound recording of their performance.

    Proposed fines for breaking the law are (per each instance, personal use):

    • A new statutory damage award of $500 for music downloads.
    • Since the $500 limit does not apply to all cases, fines up to $20,000 (defined in previous bills)[10] may be incurred (per instance) for:
    • Circumventing digital locks or DRM regardless of reason/intent.
    • Uploading regardless of awareness, including uploading to YouTube or peer-to-peer networks. Note that peer-to-peer programs generally allow files to be both uploaded and downloaded by default.
    • “Making available” of copyrighted material (regardless if it was actually uploaded). [11]

    In the case of commercial circumvention of DRM, Clause 32 of the Bill specifies penalties of $1,000,000 and/or five years imprisonment on conviction on indictment, or $25,000 and/or six months imprisonment on summary conviction. [8]

    The Canadian Software Innovation Alliance, an association of open source developers questions the bill, because of its potentially harmful effects on open source software modification. Spokesman Bob Young, Lulu Inc‘s CEO (and the former CEO of Linux vendor Red Hat) says “We’re crafting these laws without having anyone from the technology industry engaged in the process.” He contends that the bill caters too closely to the content industry and not to engineers and software developers.

    In late July 2008, Michael Geist criticized the bill on environmental grounds. Specific criticisms include:

    • If enacted, Bill C-61 would not allow unlocking of cellphones, forcing consumers to acquire a new cell phone each time they switch a carrier, creating excess waste.
    • Bill C-61, which parallels American DMCA, could allow lawsuits over the legality of companies that offer to recycle printer ink cartridges.
    • Bill C-61 creates new barriers in the race toward network-based computing, since the ICT industry accounts for more carbon emissions than the airline industry. Network-based computing — often referred to as “cloud computing” — basically are large server farms situated near clean energy sources. The bill could prevent developments on Canada’s northern high-speed optical networks with zero carbon emissions. Bill C-61 would further prohibit many uses of network-based computing such as video recording services, backup of data, etc.

    LPT730 – LAB 0

    September 3, 2008

    In the first blog entry tell about yourself

    • Education and/or professional background
    • Your interests in computers (other than playing games)

    https://miltonpaiva.wordpress.com/about/

    In another entry write an article about two desktop software applications that you use often.

    • For each of your choices provide at least one screenshot

    Xosview – http://xosview.sourceforge.net/

    Xosview is a software that displays a group of graphs: memory usage, CPU usage, system load, etc… about the current status of your computer. Xosview runs under the X Windows System.

    Hping – http://www.hping.org/

    Hping is a security tool that allows tests in hosts and networks. It supports TCP, UDP, ICMP and RAW-IP protocols and has a traceroute mode and many other features.