Onno (VK6FLAB)

Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.

#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork

  • 1 Post
  • 25 Comments
Joined 4 months ago
cake
Cake day: March 4th, 2024

help-circle



  • DRM is one potential reason, but not the only one.

    Content is licensed under specific conditions, resolution, audio tracks, closed captions, etc. Two organisations might have licensed the same title, but not the same conditions.

    You can see this clearly during the Olympics where some channels only have secondary rights, or only certain events, but only free to air, not online, etc.

    Added to that are marketing and exclusively deals and in the end it’s anyone’s guess what you actually end up with.


  • I don’t know, but I doubt that the frequency response of a mobile phone microphone is either linear or consistent across sound level.

    I don’t even think you could compare two sounds with different frequencies, but I don’t know.

    I suspect that calibration of any such thing would require a whole lot of infrastructure, consider for example the angle of the phone in relation to sound and the impact of holding the phone in how it affects vibration and noise damping.

    You might be able to use a calibrated sound level meter and pair it via Bluetooth with your phone, but I think that’s going to be as close as you might get.

    In the past I’ve tried a wired USB microphone, but the OS isn’t real-time, so the jitter was horrendous. A pi would give you a more consistent result.






  • I just pirate media I like

    In other words, your computer is downloading stuff from other computers, that’s potentially receiving stolen property, but a potential argument might be that you didn’t know that it was stolen. It’s not a good argument, but it’s an argument. So you’re an individual who potentially broke the law. Depending on how much money you have, you might get a knock on your door.

    But then, you also distribute that potentially stolen property to other computers, because that’s how BitTorrent works, and now you’re part of a distribution network dealing with stolen property. The chances that once you’ve discovered you come away with just a slap on the wrist are slim to none.

    How do they find you?

    Through your IP address.

    How?

    By figuring out who owns that address, who loaned it to you to get online at that specific time. One packet at a time the research will bring them closer to knocking on your door.

    So, is it a big deal that your public IP address is linked to torrenting? Yes it is.

    Is this the whole story? Not by a long shot, but it’s not my job to teach you how to break the law.







  • Onno (VK6FLAB)@lemmy.radiotoSelfhosted@lemmy.worldPost your Servernames!
    link
    fedilink
    English
    arrow-up
    35
    arrow-down
    1
    ·
    edit-2
    2 months ago

    My first networked computer, on an AppleTalk network was called “()/)/)()”

    It was an Apple Macintosh IIci.

    It had that name for less than five minutes. That’s how long it took the network manager to find me and demand that I rename it to something that didn’t appear at the top of the Chooser, since that’s where the ADMIN NetWare server should be.

    He suggested “ob1”, and that’s what it has been and continues to be for the past 32 years. My laptop became ob2.

    Servers under my custody are called short words, generally four characters or less unless they’re disposable and they don’t get a name beyond what the installation process creates.

    Edit: Oops, one too many slashes. Fixed.