星球

RSS | RDF | ATOM

在GNU/Linux上讓impro-visor可以連外部midi音源

2017/6/14 22:14:00 | 魔法設計的藝術
1.開好 Qsynth



2.sudo modprobe snd-virmidi ,製造一個虛擬的midi裝置,這是impro-visor(java程式)可以看得到的

3.jack的midi管線,把sudo modprobe snd-virmidi接到Qsynth的實體


4.開啟impro-visor,在midi的設定指定midi out用virtual raw midi 3-0



5.可以開啟一個leadsheet來玩玩了,開個Donna lee來看看,可以只是練琴,或者按下impro,看電腦自己即興,每一輪還彈不一樣耶,雖然電腦目前即興得還很無機就是了,完全不休息XD,不過有時候會噴出好聽的句子,還是給他拍拍手。 :)

筆記:Galaxy S3昇Android7.1.2r2(Resurrection Remix OS)

2017/5/10 9:31:00 | 魔法設計的藝術
我覺得我的舊s3就好像奮戰過後殘破不堪的青銅聖衣,滴上雅典娜女神的血後,瞬間就修復,變成神聖衣的感覺了。

一裝完,大為改觀,本來以為舊手機S3來日無多,沒想到刷完Resurrection Remix OS 5.8.3(nightly build是追到最新的Android 7.1.2 beta)以後,從Android5升到7,操作變得很smooth、不像以前動不動過熱、待機變得非常省電(doze機制,進入待機以後,所有連網程式都被凍結深度待機),我測試就算不使用綠色守護,耗電也沒差多少,就算一直開wifi,待機5小時也不過掉4%,(wifi關掉的話,6小時待機只會掉3%);記憶體管理也精進好多,再也不會卡頓、不再發生關了APP以後回到系統launcher,系統launcher動不動老是重讀的狀況,而且開機也變得很快,跟當初S3的官方Android 4.4有得拼。S3雖然只有

Clonezilla live 小硬碟複製到大硬碟筆記

2017/4/18 1:05:00 | 魔法設計的藝術
今天把Thinkpad x201(i),從原來的小硬碟換成sshd的大硬碟(從來不會壞軌的日立硬碟!! 7歲了)

參考

http://clonezilla.nchc.org.tw/clonezilla-live/
http://note.drx.tw/2013/10/working-on-gnu-linux-26-clonezilla.html

現在最新的Clonezilla實在是很厲害!

首先同一台筆電作硬碟複製時,來源硬碟跟目標硬碟都必須是unmount的,所以不可能用原來開機的Linux系統來作,所以我燒出一片Clonezilla-live的光碟來處理。

過程中我是用專業模式,因為就是用MBR開機磁區+ Linux的分割區,所以一些非MBR跟Windows磁區的猜測都不用了,此外分割區表的建立,我選擇按照來源磁碟,等比例擴大的選項,我的分割區本來就規劃 /  /boot

讓《返校》恐怖度升級的方法

2017/1/21 0:30:00 | 魔法設計的藝術
其實這個標題有一點聳動....其實應該算是在內顯、舊筆電上也可以玩的方法,你也可以理解成....「拿2010年以後的內顯筆電玩起來會更恐怖喔」。




 (是不是很像鬼火?)

我的筆電是2010年的Thinkpad x201,i5 cpu+ intel HD Graphics,作業系統是Ubuntu Linux 14.04,遠低於《返校》的最低配備。

不過我偏不信邪,因為類似返校畫面水準的其他外國遊戲,都只要Opengl2.0+shader3.0,是可以在我這台機器上玩的,Linux steam平台有一個特性,就是通常可以比其他平台更低的硬體要求就可以玩遊戲了,所以....

返校我試玩版的時候就已經用手工編輯設定檔的方式調降解析度來玩,不過正式版一裝好,正式版、試玩版都變成一開始主角睡覺起來,要走出教室門時,就會當機@@

首先我發現原來Ubuntu14.04LTS可以用最新

在Ubuntu Linux上使用外接硬碟

2016/11/4 16:58:00 | 魔法設計的藝術
日前我買了這顆 2TB的WD外接硬碟 My Passport Ultra作備份。

我在台北光華原價屋買的,體驗到了傳說中店員的傲慢,類似傲驕系的女僕店的體驗。

買來以後第一次接上電腦,發現他已經格式化成ntfs,當然在Linux下效能很不好,所以重新格式化成ext4。然後這一定會導致這硬碟automount以後的owner是root,所以我在上面做了一個目錄home,把home的owner改成我自己的帳號。


新買了硬碟於是馬上用磁碟公用程式來檢查,來看看磁碟是不是健康的。



不過SMART的檢測的功能是無法按的

查了資料

找到這一篇https://www.smartmontools.org/wiki/Supported_USB-Devices

找到我的硬碟WD My Passport Ultra (USB 3.0) 2TB

所以我要下
sudo

心善音樂祭表演心得還有那些曲子...

2016/10/4 6:03:00 | 魔法設計的藝術
昨天做了好玩的事情,第一屆心善音樂祭我跟兩位朋友結了一個臨時團去表演。

心善音樂祭非常的妙,簡單說,就是在佛寺辦的音樂祭,想像起來就很有趣。其實佛教用音樂弘法已經有相當長的歷史,但是近百年來,老實說,以華人世界的正信佛教來說,在這方面都非常地保守而落後,今年心善寺首開風氣之先,要辦這個佛寺音樂祭,我從佐安薇的團長許日本那邊聽到這個消息以及他的邀請(中間那位),我就很開心地參加,來結成這臨時的電音hybrid團—《女少佛具專賣店》。

註:就真的團員女生很少咩

曲子是我作的,有創作曲也有改作曲,主要都是電音,好幾首算勸世風格。XD 下面的清單你要聽的話,由於是電音,哥給你個建議...

找個低音沉的音響,把你的電腦或者iPad、手機接上去,或者帶上好一點的耳機,播放按鈕按下去,enjoys那些音浪吧~把聲音放出來給大家,你已經在弘揚佛法囉。 :)





佛曲也可以很潮的XD

USN-3088-1: Bind vulnerability

2016/10/4 5:28:40 | Ubuntu security notices

Ubuntu Security Notice USN-3088-1


27th September, 2016


bind9 vulnerability


A security issue affects these releases of Ubuntu and its
derivatives:




  • Ubuntu 16.04 LTS


  • Ubuntu 14.04 LTS


  • Ubuntu 12.04 LTS





Summary


Bind could be made to crash if it received specially crafted network
traffic.





Software description





  • bind9
    - Internet Domain Name Server











Details


It was discovered that Bind incorrectly handled building responses to
certain specially crafted requests. A remote attacker could possibly use
this issue to cause Bind to crash, resulting in a denial of service.



Update instructions


The problem can be corrected by updating your system to the following
package version:




Ubuntu 16.04 LTS:




bind9

1:9.10.3.dfsg.P4-8ubuntu1.1





Ubuntu 14.04 LTS:




bind9

1:9.9.5.dfsg-3ubuntu0.9





Ubuntu 12.04 LTS:




bind9

1:9.8.1.dfsg.P1-4ubuntu0.17






To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.


In general, a standard system update will make all the necessary changes.





References




CVE-2016-2776


USN-3089-1: Django vulnerability

2016/10/4 5:28:40 | Ubuntu security notices

Ubuntu Security Notice USN-3089-1


27th September, 2016


python-django vulnerability


A security issue affects these releases of Ubuntu and its
derivatives:




  • Ubuntu 16.04 LTS


  • Ubuntu 14.04 LTS


  • Ubuntu 12.04 LTS





Summary


Django could be made to set arbitrary cookies.





Software description





  • python-django
    - High-level Python web development framework











Details


Sergey Bobrov discovered that Django incorrectly parsed cookies when being
used with Google Analytics. A remote attacker could possibly use this issue
to set arbitrary cookies leading to a CSRF protection bypass.



Update instructions


The problem can be corrected by updating your system to the following
package version:




Ubuntu 16.04 LTS:




python3-django

1.8.7-1ubuntu5.2






python-django

1.8.7-1ubuntu5.2





Ubuntu 14.04 LTS:




python-django

1.6.1-2ubuntu0.15





Ubuntu 12.04 LTS:




python-django

1.3.1-4ubuntu1.21






To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.


In general, a standard system update will make all the necessary changes.





References




CVE-2016-7401


USN-3090-1: Pillow vulnerabilities

2016/10/4 5:28:40 | Ubuntu security notices

Ubuntu Security Notice USN-3090-1


27th September, 2016


Pillow vulnerabilities


A security issue affects these releases of Ubuntu and its
derivatives:




  • Ubuntu 14.04 LTS





Summary


Pillow could be made to crash if it received specially crafted input or opened
a specially crafted file.





Software description





  • pillow
    - Python Imaging Library compatibility layer







Details



It was discovered that a flaw in processing a compressed text chunk in
a PNG image could cause the image to have a large size when decompressed,
potentially leading to a denial of service. (CVE-2014-9601)



Andrew Drake discovered that Pillow incorrectly validated input. A remote
attacker could use this to cause Pillow to crash, resulting in a denial
of service. (CVE-2014-3589)



Eric Soroos discovered that Pillow incorrectly handled certain malformed
FLI, Tiff, and PhotoCD files. A remote attacker could use this issue to
cause Pillow to crash, resulting in a denial of service.
(CVE-2016-0740, CVE-2016-0775, CVE-2016-2533)





Update instructions


The problem can be corrected by updating your system to the following
package version:




Ubuntu 14.04 LTS:




python-imaging

2.3.0-1ubuntu3.2






python3-pil

2.3.0-1ubuntu3.2






python-pil

2.3.0-1ubuntu3.2






python3-imaging

2.3.0-1ubuntu3.2






To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.


In general, a standard system update will make all the necessary changes.





References




CVE-2014-3589,

CVE-2014-9601,

CVE-2016-0740,

CVE-2016-0775,

CVE-2016-2533


USN-3090-2: Pillow regresssion

2016/10/4 5:28:40 | Ubuntu security notices

Ubuntu Security Notice USN-3090-2


30th September, 2016


Pillow regression


A security issue affects these releases of Ubuntu and its
derivatives:




  • Ubuntu 14.04 LTS







Software description





  • pillow
    - Python Imaging Library compatibility layer







Details


USN-3090-1 fixed vulnerabilities in Pillow. The patch to fix CVE-2014-9601
caused a regression which resulted in failures when processing certain
png images. This update temporarily reverts the security fix for CVE-2014-9601
pending further investigation.



We apologize for the inconvenience.



Original advisory details:



It was discovered that a flaw in processing a compressed text chunk in
a PNG image could cause the image to have a large size when decompressed,
potentially leading to a denial of service. (CVE-2014-9601)



Andrew Drake discovered that Pillow incorrectly validated input. A remote
attacker could use this to cause Pillow to crash, resulting in a denial
of service. (CVE-2014-3589)



Eric Soroos discovered that Pillow incorrectly handled certain malformed
FLI, Tiff, and PhotoCD files. A remote attacker could use this issue to
cause Pillow to crash, resulting in a denial of service.
(CVE-2016-0740, CVE-2016-0775, CVE-2016-2533)



Update instructions


The problem can be corrected by updating your system to the following
package version:




Ubuntu 14.04 LTS:




python-imaging

2.3.0-1ubuntu3.3






python3-pil

2.3.0-1ubuntu3.3






python-pil

2.3.0-1ubuntu3.3






python3-imaging

2.3.0-1ubuntu3.3






To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.


None





References




CVE-2014-9601,

LP: 1628351