A Ac3dec, 500 Accent, 424 Accounts, Root, 11 Ack (Snort Rule Option)

Total Page:16

File Type:pdf, Size:1020Kb

A Ac3dec, 500 Accent, 424 Accounts, Root, 11 Ack (Snort Rule Option) 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 519 2 3 INDEX 4 5 6 7 8 9 A remote monitoring, 185–92 sound effects and filtering, ac3dec, 500 coding, 186–89 377–80 Accent, 424 compiling, 189–91 system preparation for, 370 Accounts, root, 11 testing, 191–92 types of digital audio, 366–69 ack (Snort rule option), 257 Apex DVD player, 419–20 amplitude-based, 366–67 Actions, Snort, 252 API, Apache, 182–85 frequency-based, 367, 369, activate (Snort action), 252 apxs tool, 189 380–81 Active reconnaissance, 233 arch directory, 17 MP3 (MPEG Layer 3) add command (CVS), 123 Artistic License, 6 format, 368–69, 381 2 Aeromail, 158 aRts, 407 Ogg Vorbis format, 369, 2 installation of, 165 ASF files, 500, 501 381 2 using, 171–75 Aspect ratio, 446 RAW format, 368 2 agetty command, 81–82 Attachments, e-mail, 174 WAV format, 368 2 AIM (AOL Instant Messenger), Attacks on networks, 232–34 vinyl record transfer to CDs, 2 54 browser-based, 288 384–95 2 under wine, 339–40, 345 denial-of-service (DoS), 50, audio system and, 386–87 2 Albing, Greg, 477 232 CD creation, 393–94 2 alert (Snort action), 252 “Man in the Middle” (MITM), MP3 file creation, 394–95 2 AllowUsers (SSH server option), 269 preparation for, 385–86 277 profiles of, 260 recording, 387–89 3 Amplifier, audio, 386 scripted, 234 removing clicks, pops, and 3 Amplitude-based method for by sniffing, 217 hisses, 389–90 3 storing digital audio Audacity waveform editor, trimming cuts, 390–93 3 (PCM), 366–67 375–77, 380, 387, 413 writing audio to CDs, 3 Analog-to-digital (A-D) Audio CDs, burning, 363 382–84 3 conversion, 366 Audio processing, 365–97. See Authentication, RSA/DSA, 3 Animation, 461–62 also Music production 285–87 3 Anthem, 402 audio files from CD, 372–73 Autoconf, 12–13 3 Antisniff, 228 editing (cut and paste), AvantGo, 330–31 3 Apache, 114, 158, 162, 177, 375–77 avifile, 497 4 179–93 format conversions, 380–82 avifile-0.53.2, 499–500 API, 182–85 mixer properties, 370–72 AVI files, 483, 497, 498–501 4 module basics, 180–81 recording, 371, 374–75 AVI-XMMS-1.2.1, 501 4 4 4 519 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 520 520 INDEX B Capital cost of software checkout command (CVS), 122 Backdoor software, 54 distribution, 507 Chorus sound effect, 380 backup switch (pilot-xfer), 310, Capture, video, 484, 487–88, Client-server configuration 4 312–13 492–93 for NAT, 72–74 BacteriuM, 407 Cathedral and the Bazaar, The, 7 for PLIP networking, 70–71 6 bash, 298 CCD, 447 Client/server model, CVS, Berkeley DB, 220 cdda2wav, 352–53 120 Berkeley Software Distribution cdparanoia, 372–73 Clipping, 370–72 (BSD) licenses, 6 cdrdao, 382–83 Close-up, 32 9 BIOS, 14 cdrecord, 352–53, 356, 358, COAST project, 236 0 Bit depth, 366 382–83, 393–94 Codecs Bit rate, 368–69 CDs audio, 369 Blackbox, 302 audio, 363 video, 483, 487, 500 BlackICE, 222 files from, 372–73 Color balance, 453 4 bladeenc, 381 MP3 on, 418 Colors, in PovRay, 466, 473–75 Blender, 459, 460, 461, 475, 476 writing, 382–84 Comer, Douglas E., 73 6 BMP, 444 remote burning of, 347–63 Command line, 2 Bootable CDs, 363 audio CDs, 363 Commercial music, 497 /boot directory, 15 blanking CD-RW, 355–58 commit command (CVS), 122 Booting the kernel, 22–23 bootable CDs, 363 Communications, 59–84. 9 Boot loader, LILO, 13–15 burning data, 358–59 See also Network(s)/ 0 Boot sector viruses, 14 duplicating CDs, 359–62 networking; Secure Bourne-again shell (bash), 298 80-min/700 mb CDs, 363 connectivity Brahms, 402, 406 finding drive, 355 non-IP dialup, 74–84 Broadcast 2000, 494 iso images, 353–55 /etc/inittab file, 77–80 4 Browser-based attacks, 288 kernel modification for, getty, 76–77, 81–84 Browsers 348–52 Parallel Line Internet 6 network, 96–98 mkisofs, 352, 354 Protocol (PLIP) Web, 185–92 using GUID for, 359–61 networking, 60–71 BSD licenses, 6 verifying, 359, 363 kernel compilation to BTTV chip set, 486 video (VCDs), 504–5 enable, 64–69 9 Buffer underruns, 353 vinyl record transfer to, NAT set up for, 71–74 0 Building blocks (primitives), 469 384–95 PLIP tunnel set up, 69–71 b[un]zip2, 296 audio system and, 386–87 Compiling, 8–10 Burn All GIFs Web site, 441 CD creation, 393–94 autoconf, 12–13 bzImage kernel, 21 MP3 file creation, 394–95 as encryption, 507 4 bzip, 21 preparation for, 385–86 Imakefiles, 11 recording to hard disk, make files, 11–12 6 C 387–89 Compression Cable modems, 48 removing clicks, pops, and in JPEG, 441–43 Cable providers, 46 hisses, 389–90 LZW, 440–41 9 Cables, two-way printer port, trimming tracks, 390–93 Compression/decompression 63–64 Censorware, 223 program, 296 0 Cameras Certificates, 163 CompressionLevel (SSH client digital, 447–48 on Netscape, 166–70 option), 275 positioning, 468 Change-coupled device (CCD), Compression (SSH client video, 484 447 option), 275 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 521 INDEX 521 Concurrent Versioning System. Debian, 26 Driver(s) See CVS (Concurrent integrity checks by, 241–46 interrupt, 69 2 Versioning System) VNC on, 40 polling, 69 3 Configuration system, Web server implementation, video, 486 4 interactive, 18–20 115 drivers directory, 17 5 Connectivity, secure. See Secure Debian Free Software Guidelines Drives, mapping, 99–100 6 connectivity (DFSG), 7, 8 Drum machines, 407–8 7 Console-based applications Delay sound effect, 380 dsize (Snort rule option), 256 e-mail-based, 133–55 delete switch (pilot-xfer), 311 DSL, 48 8 connecting, 134–35 Demos, music, 408–9 dsniff, 218–23 9 e-mail concepts, 136–37 Denial-of-service (DoS) attack, compiling, 221–23 Fetchmail, 136, 137–39 50, 232 required packages, 218–21 Procmail, 134–35, 139–40, DenyUsers (SSH server DUMB, 462 147 option), 277 Duplication of CDs, 359–62 security issues, 135–36, dep, 20–21 DVD players, 419–20 147–54 Dia, 303 Dynamic loading, 180 MP3 player, 417–18 Dialect, 424 dynamic (Snort action), 252 Consoles, text-mode, 76–77 Dialup, non-IP, 74–84 content-list (Snort rule option), /etc/inittab file, 77–80 E 257 getty, 76–77, 81–84 ecasound, 413 content (Snort rule option), Dictionaries Echo sound effect, 380 256–57 phoneme, 427 ECP, 63 2 convert command pronunciation, 426, 427 Editing 2 (ImageMagick), 445–46 diff, 295 audio, 375–77 2 CPU requirement, 26 Digital audio. See Audio video, 488, 493–97 2 crontab, 138–39 processing Editors, 295 2 Cryptographic basics, 196–98 Digital cameras, 447–48 waveform, 375–77, 380, 387, 2 Crystal Space, 462, 475, 476 Digital signatures, 135, 148, 413 2 CuBase VST, 402 203–6, 235. See also elm, 301 2 Cumulus, 407 GPG (GNU Privacy GPG integration with, 211 2 cut, 297 Guard) ELM jukebox, 431 2 CVS (Concurrent Versioning encryption without, 210–11 E-mail System), 118, 120–28, 296 hashing functions for, 197 concepts, 136–37 3 commands, 121–23 passphrases and, 208 programs and utilities, 301–2 3 conflict resolution, 123–28 validating, 204–6 security issues. See GPG 3 core concepts, 120 direction, Snort, 254 (GNU Privacy Guard) 3 repository, 120–21 Directory Directives, 164 speech-driven checking at 3 CVSROOT, 121 DirectX, 345 login, 428–31 3 Cygwin, 29 Discrete cosine transform tunneling through, 291 3 (DCT), 442–43, 444 video (V-mails), 505 3 D Display specification, 31 E-mail-based console 3 Data Encryption Standard distributed.net client, 53 application, 133–55 3 (DES), 196 DivX, 483 connecting, 134–35 4 Datagrams, fragmented, 72–73 Documentation directory, 17 Fetchmail, 136, 137–39, 301 Data-harvesting. See Sniffing Domain Naming System (DNS), Procmail, 134–35, 139–46, 147 4 DCT, 442–43, 444 54, 253 command execution, 147 4 dd, 295, 390–92 dpi (dots per inch), 438 recipes in, 140–46 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 522 522 INDEX E-mail-based console ext, 121 ForwardX11 (SSH client option), application (cont.) Extreme Wave, 460, 475 275 security issues, 135–36, Fourier, Jean Baptiste Joseph, 4 147–54 F 367 GnuPG to encrypt results, False positives in Snort, fragbits (Snort rule option), 256 6 148 261–62 Frame grabbers, 484 GnuPG to handle Festival, 424, 426–28, 431 Fraunhofer Group, 369 authorizations, 147–48 Fetchmail, 134, 136, 137–39, 301 “Free,” defining, 3–8 E-mail clients, GPG integrated .fetchmailrc file, 137, 140 FreeAmp, 371, 382, 417–20 9 with, 211–13 fetch switch (pilot-xfer), 311 Freebirth, 407 0 E-mail servers, 287 File browser, speech-driven, Free Software, 3, 508–9 Employee watching with HTTP 431–36 licenses for, 4–7 proxy, 288 File management tools, 294–98 philosophy behind, 7 Emulators, 333 file (program), 297 Great Schism in, 7–8 4 Encapsulation, in JPEG Files, comparing, 295 Free Software Foundation encoding, 443 File Transfer Protocol. See FTP (FSF), 4 6 Encryption, 135, 196–98, 270. File transfer with SCP, 270–71 Frequency-based method of See also GPG (GNU Filtering storing audio, 367, 369, Privacy Guard) frequency, 377, 378–80 380–81 compilation as, 507 in Procmail, 141–42 Frequency filtering, 377, 378–80 9 passphrases for decryption, Filters, spam, 141 Freshmeat Web site, 24 0 209–10 find, 299 fs directory, 17 public key, 197–98, 268–70 Finding, tools for, 299–300 fstab configuration file, 295 without signature, 210–11 Firewall(s), 265 FTP, 53, 54, 267, 268 Endianness, 368 getting out of, 279–82 encrypted, 268 4 Enhanced capability port (ECP), getting through, 283–85 masquerading of, 72 63 hardware, 58 6 Entrenchment phase of network- http-proxy-only, 289 G based attack, 234 IP, 49 g3d, 460, 475 Entropy pool, 201 IP address of, 52 gAlan, 407 EPP (enhanced parallel port), maniacally restrictive, 285 Game engines, 3D, 462 9 62–63 network, 49 Game hosting, 56–57 0 EPS (Encapsulated PostScript), port forwarding by, 54–56 GatewayPorts (SSH client 441 rules, 73 option),
Recommended publications
  • Customizable Multimedia Devices in Virtual Environments
    Customizable Multimedia Devices in Virtual Environments Ankur Pai, Balasubramanian Seshasayee, Himanshu Raj and Karsten Schwan Center for Experimental Research in Computer Systems Georgia Institute of Technology Atlanta, Georgia 30332–0250 fpaiankur, bala, rhim, [email protected] Abstract—The separation of logical from physical devices maintain a consistent view of physical devices by presenting provided by modern virtualization techniques can be used to only a common minimal set of device features is too limiting enhance device functionality, including by emulating non-native and worse, it cannot account for changes in the environmental device functions in software. Such logically extended devices are particularly promising in the mobile domain, for embedded conditions or contexts in which devices are used. machines, handhelds, or phones. Challenges arise, however, from We argue that device sharing and interoperation in mobile the highly heterogeneous nature of portables and the devices with systems requires models and interfaces with which virtual- which they can interact. This suggests that device extensions ization infrastructures can dynamically change device func- should be dynamic, varied at runtime to adjust to new user needs and/or changes in environmental conditions. This paper tionality to account for runtime changes in device use, con- presents a model for runtime device extension and for then using ditions, and contexts. This paper presents such a model. It such extended devices. The model provides uniform interfaces to implements the safe, runtime extension of device functionality, native and extended devices, permits the safe runtime extension by enabling the virtualization layer, guest operating systems, of device functionality, and can be shown to operate across both or applications to safely specify and deploy custom code that stationary and mobile platforms, and arbitrary operating systems and applications.
    [Show full text]
  • Linux on the Road
    Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.22 TuxMobil Berlin Copyright © 2000-2011 Werner Heuser 2011-12-12 Revision History Revision 3.22 2011-12-12 Revised by: wh The address of the opensuse-mobile mailing list has been added, a section power management for graphics cards has been added, a short description of Intel's LinuxPowerTop project has been added, all references to Suspend2 have been changed to TuxOnIce, links to OpenSync and Funambol syncronization packages have been added, some notes about SSDs have been added, many URLs have been checked and some minor improvements have been made. Revision 3.21 2005-11-14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005-11-14 Revised by: wh Some typos have been fixed. Revision 3.19 2005-11-14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005-10-10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005-09-28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005-08-28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross-compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop-mode-tools added, some URLs updated, spelling cleaned, minor changes.
    [Show full text]
  • An Introduction to Software Licensing
    An Introduction to Software Licensing James Willenbring Software Engineering and Research Department Center for Computing Research Sandia National Laboratories David Bernholdt Oak Ridge National Laboratory Please open the Q&A Google Doc so that I can ask you Michael Heroux some questions! Sandia National Laboratories http://bit.ly/IDEAS-licensing ATPESC 2019 Q Center, St. Charles, IL (USA) (And you’re welcome to ask See slide 2 for 8 August 2019 license details me questions too) exascaleproject.org Disclaimers, license, citation, and acknowledgements Disclaimers • This is not legal advice (TINLA). Consult with true experts before making any consequential decisions • Copyright laws differ by country. Some info may be US-centric License and Citation • This work is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0). • Requested citation: James Willenbring, David Bernholdt and Michael Heroux, An Introduction to Software Licensing, tutorial, in Argonne Training Program on Extreme-Scale Computing (ATPESC) 2019. • An earlier presentation is archived at https://ideas-productivity.org/events/hpc-best-practices-webinars/#webinar024 Acknowledgements • This work was supported by the U.S. Department of Energy Office of Science, Office of Advanced Scientific Computing Research (ASCR), and by the Exascale Computing Project (17-SC-20-SC), a collaborative effort of the U.S. Department of Energy Office of Science and the National Nuclear Security Administration. • This work was performed in part at the Oak Ridge National Laboratory, which is managed by UT-Battelle, LLC for the U.S. Department of Energy under Contract No. DE-AC05-00OR22725. • This work was performed in part at Sandia National Laboratories.
    [Show full text]
  • Version 7.8-Systemd
    Linux From Scratch Version 7.8-systemd Created by Gerard Beekmans Edited by Douglas R. Reno Linux From Scratch: Version 7.8-systemd by Created by Gerard Beekmans and Edited by Douglas R. Reno Copyright © 1999-2015 Gerard Beekmans Copyright © 1999-2015, Gerard Beekmans All rights reserved. This book is licensed under a Creative Commons License. Computer instructions may be extracted from the book under the MIT License. Linux® is a registered trademark of Linus Torvalds. Linux From Scratch - Version 7.8-systemd Table of Contents Preface .......................................................................................................................................................................... vii i. Foreword ............................................................................................................................................................. vii ii. Audience ............................................................................................................................................................ vii iii. LFS Target Architectures ................................................................................................................................ viii iv. LFS and Standards ............................................................................................................................................ ix v. Rationale for Packages in the Book .................................................................................................................... x vi. Prerequisites
    [Show full text]
  • Qualys Policy Compliance Getting Started Guide
    Policy Compliance Getting Started Guide July 28, 2021 Verity Confidential Copyright 2011-2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd Foster City, CA 94404 1 (650) 801 6100 Table of Contents Get Started ........................................................................................................ 5 Set Up Assets............................................................................................................................ 6 Start Collecting Compliance Data ............................................................... 8 Configure Authentication....................................................................................................... 8 Launch Compliance Scans ................................................................................................... 10 We recommend you schedule scans to run automatically .............................................. 12 How to configure scan settings............................................................................................ 12 Install Cloud Agents.............................................................................................................. 17 Evaluate Middleware Assets by Using Cloud Agent .......................................................... 17 Define Policies ................................................................................................. 21
    [Show full text]
  • Patagonia Clonesys – a Tool to Install Multi-Boot Environments
    Patagonia CloneSys – A Tool to Install Multi-Boot Environments Christian Kurmann, Felix Rauch, Thomas M. Stricker Laboratory for Computersystems ETH Zurich, Switzerland Revised 24 November 1999, Christian Kurmann 1 Introduction The Patagonia CloneSys is designed to provide easy system installations on multi- boot and multi-purpose Clusters of PC’s. Do keep it easy and circumvent the devel- opment of a proprietary system it is based on standard UNIX tools and can easily be ported to other flavours of UNIXes. The scripts and ideas are subject to change and are provided as they are without any support. 2 Cloning: Basic Ideas Everybody knows the drudgery involved in manually setting up and rolling out new PCs, updating existing PCs, and recovering failed PCs. CloneSys makes a big dent in the time required to conduct these jobs. It first creates an exact image of a PC’s hard drive, effectively taking a ”snapshot” of all the files — hidden, visible, and active — that make up the operating system, applications, and configuration settings. The image can then be copied to any number of PCs, thereby creating completely identical installations. Moreover, it can be copied to many PCs simultaneously. This process it completely operating system independent which makes the system very easy and fast. As the raw disk data is copied, no file system initialization is needed, even the partitioning is implicitly done with a total clone. To support multi-boot environments the installation of single partitions is supported as well. To keep the system even easier as other commercially available tools we based it on freely available UNIX tools and Linux.
    [Show full text]
  • Camera Driver Development.Pptx
    CAMERA DRIVER DEVELOPMENT Kyle Xu OUTLINE Prepare the Hardware Set up Environment Write a Camera Driver Solve Remaining Problems PREPARE THE HARDWARE TI OMAP4 Pandaboard Aptina AR0832 Image Sensor Ominivision OV5650 Image Sensor Pandaboard Adapters and Connectors Datasheets AR0832 OV5650 PREPARE THE HARDWARE System Setup OUTLINE Prepare the Hardware Set up Environment Write a Camera Driver Solve Remaining Problems SET UP ENVIRONMENT Install Ubuntu 12.04 on Pandaboard Powerful and fast server for cross compilation 32-core 5 min on server vs. 5 hours on Pandaboard Understand Data Path and Interfaces DATA PATH Camera Serial Interface (CSI-2) Image Sub-System (ISS) Image Sensor INTERFACE: CSI-2 N data lanes and one data clock lane Each lane is a pair of +/- lines. I2C standard control interface (CCI) SCL SDA INTERFACE: Hardware Level Pandaboard Camera Expansion Connector (J-17) 5 CSI-2 lanes (including one CLK lane) I2C control lines (SCL, SDA) Other lines for battery power, camera clock, GPIO… Image Sensor 2 CSI-2 data lanes + 1 CSI-2 clock lane I2C control lines (as slave) Powered from on board battery OUTLINE Prepare the Hardware Set up Environment Write a Camera Driver Solve Remaining Problems WRITE A CAMERA DRIVER Describe the camera to the board Write the driver file a. Voltage Regulator and Clock b. I2C Bus c. V4L2 d. Driver Framework e. Complete Template Implement the driver to Linux Kernel DESCRIBE THE CAMERA TO THE BOARD Create ar0832.h to describe camera’s platform information struct ar0832_platform_data containing fields about voltage regulator, clock, power on/off methods Edit board-omap4panda-camer.c Assign values or functions to ar0832_platform_data’s fields.
    [Show full text]
  • Creator's Guide to Commercializing Copyrighted Work
    STANFORD UNIVERSITY OFFICE OF Creator’s Guide to TECHNOLOGY Commercializing LICENSING Copyrighted Work OURSES WEB C PHY BOOKS S SI E GRA OFT TE D TO WA S O HO R C P E V M S U ID Y M S H E I E O C O P P C A S H F R G O N R I I C G E D O T O R G I O E R O C A R E N P R H O Y S M H P C C P O O A D B E E C L I I I C L B S O E O U U R M A S M N E P O S I T W P E C I E F B S R S O I T E A E D I S V B W O T O F K O S S he Stanford University Office of Technology Licensing (OTL) promotes the transfer of Stanford technology for Tsociety’s use and benefit. This technology grows out of the CONTENTS boundless creativity found in the faculty, staff, and students at the University. When that creative expression is protected by copyright, OTL and our Stanford creators face a distinct set THE BASICS .......................................................................................2 of commercialization and distribution issues that they do not STanford’s copyrighT POLICY .......................................................5 encounter for other forms of intellectual property. SOFTWARE .........................................................................................8 OTL created this booklet to help Stanford creators successfully identify and CONTENT AND COURSES..................................................................15 navigate those issues. The booklet is focused on out-licensing or distributing OPEN SOURCE SOFTWARE LICENSING ..............................................18 creative works owned by Stanford.
    [Show full text]
  • Article Title
    International In-house Counsel Journal Vol. 5, No. 20, Summer 2012, 1 Corporate Use of Open Source Software: Dispelling the Myths with a Policy HEATHER E. MCNAY Senior Intellectual Property Counsel, Landis+Gyr, USA Abstract Many companies do not understand open source software and choose to avoid it completely instead of creating an informed policy. Avoiding the issue can lead to developers using open source software incorrectly and potentially exposing proprietary company intellectual property through mandated public disclosure. The legal department for every technology company needs to work with the software development group to create a comprehensive Open Source Policy. The policy should ensure that every piece of open source code that is used by the company is reviewed pursuant to a prescribed process. A good policy will require that the requesting developer list the planned use of the open source code and provide the name of the license covering the code, if known. The proposed use of the code is important because stand-alone, or separably compilable, applications will not trigger certain license’s obligations, such as the publication of source code. There are many distinct open source licenses being used today, each with very different terms. With knowledge of the use and the license, the legal department can investigate the license and make a recommendation based on whether it is a ‘viral license’ (requiring publication) or not. Then, together with the technical point of contact, an informed decision can be made about all source code used by the company. Organisations will discover that using open source software in controlled manner can provide actual cost savings without exposing the company to any risk.
    [Show full text]
  • Command-Line Sound Editing Wednesday, December 7, 2016
    21m.380 Music and Technology Recording Techniques & Audio Production Workshop: Command-line sound editing Wednesday, December 7, 2016 1 Student presentation (pa1) • 2 Subject evaluation 3 Group picture 4 Why edit sound on the command line? Figure 1. Graphical representation of sound • We are used to editing sound graphically. • But for many operations, we do not actually need to see the waveform! 4.1 Potential applications • • • • • • • • • • • • • • • • 1 of 11 21m.380 · Workshop: Command-line sound editing · Wed, 12/7/2016 4.2 Advantages • No visual belief system (what you hear is what you hear) • Faster (no need to load guis or waveforms) • Efficient batch-processing (applying editing sequence to multiple files) • Self-documenting (simply save an editing sequence to a script) • Imaginative (might give you different ideas of what’s possible) • Way cooler (let’s face it) © 4.3 Software packages On Debian-based gnu/Linux systems (e.g., Ubuntu), install any of the below packages via apt, e.g., sudo apt-get install mplayer. Program .deb package Function mplayer mplayer Play any media file Table 1. Command-line programs for sndfile-info sndfile-programs playing, converting, and editing me- Metadata retrieval dia files sndfile-convert sndfile-programs Bit depth conversion sndfile-resample samplerate-programs Resampling lame lame Mp3 encoder flac flac Flac encoder oggenc vorbis-tools Ogg Vorbis encoder ffmpeg ffmpeg Media conversion tool mencoder mencoder Media conversion tool sox sox Sound editor ecasound ecasound Sound editor 4.4 Real-world
    [Show full text]
  • BSD UNIX Toolbox 1000+ Commands for Freebsd, Openbsd
    76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page i BSD UNIX® TOOLBOX 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iv BSD UNIX® Toolbox: 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD® Power Users Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-37603-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data is available from the publisher. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permis- sion should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • Linux Laptop-HOWTO
    Linux Laptop−HOWTO Linux Laptop−HOWTO Table of Contents Linux Laptop−HOWTO.....................................................................................................................................1 Werner Heuser <[email protected]>...................................................................................................1 1. Preface..................................................................................................................................................1 2. Copyright, Disclaimer and Trademarks...............................................................................................1 3. Which Laptop to Buy?.........................................................................................................................1 4. Laptop Distribution..............................................................................................................................1 5. Installation...........................................................................................................................................2 6. Hardware In Detail...............................................................................................................................2 7. Palmtops, Personal Digital Assistants − PDAs, Handheld PCs − HPCs.............................................2 8. Cellular Phones, Pagers, Calculators, Digital Cameras, Wearable Computing...................................2 9. Accessories..........................................................................................................................................3
    [Show full text]