November 2002 Archive of Music Software Discussion & Help Page

Music Software Discussion and Help


Archive: November 2002



[ Archive: October 2002] [ Archive: September 2002] [ Archive: August 2002] [ Archive: July 2002] [ Archive: June 2002] [ Archive: May 2002] [ Archive: April 2002] [ Archive: March 2002] [ Archive: February 2002] [ Archive: January 2002] [ Archive: December 2001] [ Archive: November 2001] [ Archive: October 2001] [ Archive: September 2001] [ Archive: August 2001] [ Archive: July 2001] [ Archive: June 2001] [ Archive: May 2001] [ Archive: April 2001] [ Archive: March 2001] [ Archive: February 2001] [ Archive: January 2001] [ Archive: December 2000] [ Archive: November 2000] [ Archive: October 2000] [ Archive: September 2000] [ Archive: August 2000] [ Archive: July 2000] [ Archive: June 2000] [ Archive: May 2000]

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

get gr8 mp3 mixer

get great mp3 mixer software at

i need a software that can extract instrumentals

i need a software that can extract instrumentals from a music.only the instrumental

Re: i need a software that can extract instrumentals

the software doesn't exist

: i need a software that can extract instrumentals from a music.only the instrumental

Creative Labs EXTIGY and SONY VAIO

Hello everybody. I'm using a SONY VAIO-Notebook, Model PCG-FX 602 with an AMD-Processor. When I try to install EXTIGY the installation-program demands an update from AMD.
But installation of this update doesn't work because it finds no AMD-devices...
Neither Creative Labs nor Sony are able (or willing) to solve this Problem.
Is there somebody who knows a solution ?

Re: Creative Labs and SONY VAIO

:Hi. I recently installed creative labs webcam on Sony Vaio PGV 600 AND Vaio A115z.

In both cases it disabled my ADSL access, wouldnt let me ininstall easily , and in one case disabled the restore function requiring me to go back to source disk backup to clear everything and start agin.

Has anyone else experienced anything similar ??

o: Hello everybody. I'm using a SONY VAIO-Notebook, Model PCG-FX 602 with an AMD-Processor. When I try to install EXTIGY the installation-program demands an update from AMD.
: But installation of this update doesn't work because it finds no AMD-devices...
: Neither Creative Labs nor Sony are able (or willing) to solve this Problem.
: Is there somebody who knows a solution ?

recording steam radio broadcast

I would like to know if their a way to record radio steam broadcast.

Re: recording steam radio broadcast

go to the recording section of this site. there are a few programs that can do this, including totalrecorder

: I would like to know if their a way to record radio steam broadcast.

cubase Vs Logic 5 Vs ableton Live Vs others

what synt do u think is taking the lead ?...
waht do you think is the best???

record

can anybody help ihave downloaded a full album i need to know how to seperate it in to individual tracks
thanks

seperate it into indivisual tracks..

you'll need a special software..
i suggest Acoustica MP3 audio Mixer...get it at

change font size

how do I change the font. I have 3.31. I love the program would like to increase the small lettering size. Thank you,drpag822. That was the address you gave me when I had 3.3. Paul

Midi Software

What is the best software making midi music that has full features in mormal instruments and percussion.A program that you can make rolls and diidles for percussion.Basically what is the best software for making midi music.

"Help "Miracle Piano software for Mac !

"Help "Miracle Piano software for Mac !

This popular thread has been given its own page : "Help "Miracle Piano software for Mac !

Need Manual or Paperwork for Casio Keyboard

I've lost all my paperwork, manual for the (Casio) Casiotone MT-36. I called Casio and they said they discontinued the manual for this unit. Can anyone help?
TIA,
K. Heck

Re: Need Manual or Paperwork for Casio Keyboard

: I have lost the manual for the mk 1350 casio board does anyone have this manual. If so please reply thanks

Rodney

Re: Need Manual for Casio Keyboard CTK437 or alike.

I want to get a manual for Casio Keyboard CTK 437 or like other. It may be old or second hand. Is any well wisher can send me through mail?

Permission to use a song

How does one go about getting permission to use a song for say a remix, or different rendition.

Re: Permission to use a song

contact the label first. then you may need to contact the publisher. it's a long haul.

: How does one go about getting permission to use a song for say a remix, or different rendition.

Re: Permission to use a song - minor correction

If you are only going to do a new rendition, i.e. you
don't need to use the original recording, then you only
need to contact the publisher.

<font color="#00FFFF">: contact the label first. then you may need to contact the publisher. it's a long haul.</font>

<font color="#0000FF">: : How does one go about getting permission to use a song for say a remix, or different rendition.</font>

If you must shoot yourself in the foot, at least take some bulle

How to get better results from your online quest for quality information and software

I finally found an example of some better MSIE settings. I do much the same as this, but i disable instead of allow prompts. Also, I tend to disable all Java and delete all OLD certificates and certificate "authorities". The only ones i keep are the ones from the U.S. Postal service, and from any reputable authorities in Germany. Germans seem to be a bit smarter than other westerners about internet security. Interestingly, most browsers don't need certificates to run, even in https or ssl mode. why the hell any computer needs them is beyond me. I think the use of certificates is probably bad, since they are most often expired, even when the browser is installed new. That means that the certificates are invalid, and are a built-in security flaw. invalid = insecure. if you see certificates when you browse the web, more likely you are sending and recieving more information about your system than is necessary or safe.

I would also like to add that you should make the effort to specify as many relevant languages as possible in your web browser. some of the best information comes from sites that only submit information in their home language. if your browser is only set for English, not only are you discriminating against other cultures, but you are depriving yourself of downloads and information. Many sites still publish multilingually even if they respond primarily to their native language queries. Any web browser or search engine that does not allow you to change the preferred language, is enacting de-facto discrimination and is censoring your web content by default.

Here is an example about safe settings for Internet Explorer:

* General / settings / every visit to page

* General / days to keep history / 0

* Security / internet / ALL active-X -disable, cookies that are stored to your computer -disable, per-session cookies -disable, Java permissions - high safety, Installation of desktop items -disable, Launching programs and files in in a IFRAME -disable, Software channel permissions - high safety, Userdata persistance - disabled, Active Scripting - disabled, User authentication -prompt for user name / password.

* Security / Trusted Sites / download unsigned active-X -prompt, Initialize and script ActiveX content not market safe for scripting -prompt, Java permissions -high security, Installation of desktop items -prompt, Software channel permissions -high safety, User data persistance -disable, User autentications -prompt for user name / password.

* Content / autocomplete -disable ALL (remember to clear both passwords and forms NOW)

* Advanced / disable following: Install on demand, Offline items to be synchronized, Use inline autocomplete, Profile assistant, Fortezza, PCT.

* Advanced / Make sure you have the following enabled: Disable script debugging, Use http1.1, JIT complier for virtual machine, Check for publishers certificate revocation, Check for server certificate revocation, Do not save encrypted pages to disk, Empty temporary internet files when browser is closed, SSL3, TLS, Warn about invalid site certificates, Warn if forms submittal is being redirected.

TIP: You can add sites where you REALLY need cookies, Javascript or ActiveX to your "trusted sites"

By
Markus Jansson from Finland
www.markusjansson.net

null

null

null

null

null

null

How the U.S. Patriot Act affects digital privacy/spyware/adware/

<A HREF="http://astalavista.com/technologies/library/crime/usa.shtml"> http://astalavista.com/technologies/library/crime/usa.shtml</A>

Pay close attention to SECTION 5 of the document posted above.

The link above refers to a modest explanation of the U.S. Patriot act in terms of the internet. The link above clearly explains how the U.S. government has and is reducing civilian rights and privacy in favour of surveillance by governments and corporations. In other words, if you are a government agency or a corporation, you will have more power to hack into citizens computers and profile them and obtain private information about them. However, if you are a citizen who wishes to explore computer security actively, you will have less rights and a greater probability of being put into a Federal prison for a longer term.

This change in punishment includes both nice and naughty non-profit hackers. For-profit malicious hackers such as Microsoft/Earthlink/Mindspring and Kazaa and AOL-Time Warner/Netscape/Compuserve will have more protection and be less threatened.

Many civil liberties organizations and concerned citizens are critical of the so-called Patriot act, but this is a lesser known aspect of it. As I said, pay close attention to section 5. One implication of the section is that companies that conveniently plant bugs or design "flaws" that allow them to spy on their users will not be held accountable for their wrong-doing. This is most likely because government surveillance relies heavily upon such design flaws. This is most evident in Microsoft products. Germany accused Microsoft of creating an intentionally-flawed and privacy-invasive system to be used for national and international espionage. Most likely this is true if you read anything at <A HREF="http://grc.com">GRC.COM</A> about the FBI and spyware and bugs.

Coincidentally, the known terrorists involved in the 9-11-01 airplane bombings spent considerable time in Germany just prior to the sysematic bombing. Considering how many years before 9-11 the FBI and CIA knew of Al-Quaeda and the plans to attack the WTC, it's very likely that Germany is exactly correct.

Even if it is not true that Microsoft Windows is designed for espionage, it is most certainly vulnerable to being used for it. So far, many spyware and adware attacks on file sharing community members or just regular web browser users are built upon security flaws and extensive logging built into all Windows operating systems, and most Microsoft softwares. As microsoft publishes and leases use of their software design templates, the trend spreads to other companies and softwares such as AOL.

Any company that builds internet software technology on a MSIE development kit risks creating software that is inherently useful for tracking, logging, trojan horses, and other BAD and invasive computing. For the record, it's possible that any Microsoft Software Development Kit expands this kind of incident. This means that any lone programmer utilizing Microsoft Visual BASIC or some other ready-made Authorware might be contributing to the spyware/hackware problem.

Other companies intentionally and unintentionally may contribute to the problem as well. Buggy software is BAD software. There is no monopoly on poor or DANGEROUS software design.

So, jumping back to <a href="http://astalavista.com/technologies/library/crime/usa.shtml">http://astalavista.com/technologies/library/crime/usa.shtml</a> and re-examining SECTION 5, we can see just exactly how this all could play out.

By now you have probably noticed that this information is educational, socially valuable, and factual. This is the TRUE NATURE of non-profit Hacker Culture. Hacker Culture is inherently tied to Security Culture, and both are tied to Intellectual Privacy Culture, as well as Civil Liberties Culture.

Noticably, some of the most malicious softwares as well as the most beneficial and protective technologies and informations can be found at such a hacker site. It's scary to notice the existence of computer viruses free for download on a hacker website, but it's equally scary to realize that some of the best informants on information freedom and privacy are found here as well. In general, most non-profit hackers enhance online security by providing access to knowledge and plain-english explanations of serious technologies used for both good and evil. Anyone seeking to fight against malicious computing from any and all sources (public/private/government/etc) would be wise to read and respect hacker publications.

The reason why I posted this here, is because people are constantly discussing MP3 file sharing communities and bugs in their software. In my opinion, buggy software is most often a result of either bizarre copyright protection schemes, or software that is executing dangerous or malicious commands or modifying an otherwise stable system. Mark my words. I have been studying computer dynamics for about 15 years. I'm quite used to seeing the connections between seemingly unrelated computer fields.

By the way, your Windows Media Player is probably one of the biggest security holes in your online computer. If you are reading this right now with either Internet Explorer or Netscape or CyberDog or any variant, you are hurting yourself. Likewise, to have email on Hotmail.com or Yahoo.com or MSN.com or AOL.com is most likely hurting yourself as well. There's no such thing as a free lunch, and anybody who wants to get into your pants or into your computer will do their best to make themselves look appealing to you, no matter how sinister they actually are. Every time you download a program from this site that requires "Installation", you are taking an enormous hit upon your computer's stability and security. Unless you know EXACTLY what is being stored/modified/copied/deleted/renamed/moved, then you are a sitting duck for having your online purchases, passwords, emails, browsing and downloads monitored, modified, and/or stolen.

Now that the government has gotten into the game, isn't interesting whose side they take? Make no mistake, they are not on our side as civilian users in this case. As dynamic softwares and operating systems are embedded more and more into cable boxes, phones, pagers, satellites, televisions, radios, cameras, printers, scanners, and ATM machines, you will come under increasing attack from forces that wish to profit from spying on you, me, us.

I'll bet right now, on your computer theres some built-in system function used to dial into the internet just to set the computer clock or to upgrade some programs automatically. How the hell you do you really know what data is being transmitted? If you have a camera or microphone or soundcard built into your system, you might be under surveillance at any given moment that you are online. Already in the U.S., the phone company allows government surveillance organizations to listen through a phoneline even as it is hung up!!! The only way to prevent this is to unplug it. If you have a cordless phone, you are ALWAYS being monitored, and it could be anybody with a RF reciever.

If you don't believe me, call up your phone company and demand information about their testing procedures and electronic surveillance policies. You will be massively stonewalled. Expect them to be rude and evasive. Ever hear your phone click by itself in the middle of the night or at roughly the same time every day? Some of those clicks are the result of automatic scanning and eavesdropping. It has to click in, and then click off. If the phone is sensitive to those electrical voltage changes, you will hear a click some of the time. Of course, if you aren't doing anything illegal, you have less to worry about, but that's not really much consolation considering how many innocent people are found in prison every few years after DNA tests are finally let out.

I once saw a documentary on television about hackers in federal prisons and under surveillance at home. Ironically, I saw an old college acquaintance of mine claiming to be innocent. I haven't seen him in about 10 years, so I don't know if it's true or not, but he was a computer expert back then and didn't seem like the malicious type. He did seem like someone who was excessively curious and interested in networked computing. If it really was him, I'm sure he his punishment really is totally excessive; I don't associate with criminals.
If I had remained a hacker in college, maybe that would've been me screaming for political asylum from some lonely Federal prison. Considering the nature of murder and warfare, non-profit non-malicious hacking is truly NOT an evil thing by comparision. When corporations hack and exploit the individual they merely make more money. Remember that when you sign up for MEDIA.COM and you start wondering what the hell that box is REALLY doing, and how it communicates over the powerlines and phone lines.

Well that's that.
http://astalavista.com/technologies/library/crime/usa.shtml

what the hell, i still have an axe to grind: Meditation upon th

<A HREF="http://astalavista.com/technologies/library/misc/terrabyte-territory.shtml">This link: The nature and future of computer data storage, as well as profound implications in terms of audio-visual media"</A>

At one point in the past, I stated that audio technology drives computer technology. The link above is some supporting evidence of this. It is not entirely apparent at first, but considering the push to increase bitrates and sampling rates and multitracks, it is obvious to me that audio technology and multimedia (audio/visual) formats have a direct effect upon the development of data storage. Furthermore, the invention of the digital media is a direct result of audio recording technologies.

I would like to add my opinion that pattern recognition is the future tool of data storage access. Current technologies such as MPEG compression and digital watermarking deal directly with pattern recognition. So do internet search engine technologies. Because of this, they will have an indirect impact on how data is accessed in the future on extremely high-capacity storage formats. In other words, it's not the address that matters, but the search tools.

This is part of the reason why I suggest people start learning to post HTML links as search engine queries instead of as direct links. It's good practice for creating links to data that can expire or change or reappear over time. A direct address to data is insufficient. Also, there can be many many occurances of similar data. The better the search algorithm, the more precise the results.

What does this have to do with computer audio? Well, if your future computer drive can store so much information as to almost become limitless, then recording programs will surely start to take advantage of that with, for example, audio programs that automatically record constantly. Whatever the details, there could easily be a situation where lots and lots of tracks and recording sessions exist--much more than can be easily categorized. We are already seeing this happen in audio software that has 999 (or unlimited) levels of Undo. Audio software and hard disk recording systems were the first to invent this feature.

So if unlimited Undo becomes the norm, and the number of audio tracks increases, and so does bit resolution (for lower processing distortion/higher quality/lower noise/more headroom) then high capacity drives will surely be marketed in terms of audio and video capabilities. This is already happening.
Also, increased sample rates will mean increased resolution of digital filters and EQ. The higher sampling rates will ensure less distortion. In terms of digital storage, this means that files will be bigger. Much much bigger, in fact.

Studio musicians have an unsatiable hunger for wanting the highest quality audio yet also desiring extreme ease of use and quick access to functions. This will continue to drive the development of audio visual programs which require sophisticated algorithms and brute force techniques. If virtual memory continues to be used as a RAM substitute, then surely new audio programs will take advantage of terabyte drive space for complex statistical and Fourier processing.

I imagine that singing speech synthesis will become a new fad. This too is already happening. Vocal pitch correction technology is just a footstep away from vocal song synthesis. This is more apparent when you consider the development of computers as samplers with extended storage space, and the ready-made sample library. Sooner or later, someone is going to create a vocal-modeling synth feed by lyric and phoneme and pitch databases and MIDI-like data. The developments in pitch-correction and vocal processing will integrate with generative algorithms, and mathematical and sampled data of real vocal performances.

Anybody who records live audio tracks knows that recording vocal tracks takes a lot more hard drive space than sampled instruments and loops. This is because it is popular to have lyrics that change and vocal expression that varies in a performance. Nowadays choruses are generally sampled to sound perfect every time they repeat, but verses and solos are still long unique recording elements. Add the capacity to spontaneously generate a synthetic vocalist, and you will suddenly have an increase in audio recording track use. Naturally, this will enhance the push (or use) of high-capacity drives.

On a different note, international politics and the worldwide trend for government and military surveillance will increase the use of digital storage media for forensic and profiling use. 24 hour surveillanc systems will be recording audio, video, and maybe even satellite position data (GPS).

Naturally, there will be a strong push to integrate these surveillance recording systems with voice, facial, automobile, figure, and gesture recognition programs. You better read that last line again. It's not so far fetched. Already face recognition software has exploded. As people's visual identities continue to become more flexible with plastic surgery and cosmetics, (and disguises), voice recognition softwares will become more important. The other reason for this is the fact is that there is too much natural similarity between faces. There is just not enough genetic variance between appearances in humans to prevent an overabundance of look-alikes.
Vocal information will serve as another factor.

Therefore, vocal pattern recognition technologies will increase. Also, this will enhance development of musical instrument and sound recognition. On example might be a program that can recognize chords in a recording. This technology is somewhat primitive today, but it will surely see improvements as surveillance technologies increase their statistical and AI aspects.

One of the more probable uses of high-capacity hard drives is merely their use as audio kiosks and custom jukeboxes. This is already happening, but the trend will continue as music production becomes more and more of a common thing. Conventional recording studios will become almost entirely extinct in the commercial world. Instead, people will have their own recording studios at home. The exceptions could exist for special advanced media and marketing formats, assuming that the cultural demand is maintained or created by corporate megaliths.

Another likely extinction is the popular use of the MPEG audio format. Because storage capacity will increase as well as hi-fi format file size, compressed audio will become less appealing compared to lossless storage formats. AIFF, SD2, and WAVE formats will see an increase in use since they already have allowances for multiple tracks, higher bit rates, and higher sampling rates. They can also be edited with greater ease than the compressed formats such as MP3. Meridian Lossless Packing, the compression algorithm used in DVD disks will probably finally reach the internet, as will Surround Sound formats (if surround sound continues to be promoted).

Even if surround sound playback falls out of popularity, mulitrack formats will surely increase, as the multitrack productino process is brought closer to the consumer playback process. Karaoke and other interactive gaming and production and reality-tv/reality-media will encourage this.

As digital broadcasting increases, so will the dissemination of digital media formats. Some compression will still be needed to conserve bandwidth, but the mainstreaming of optronics and fibre optic networks and extended wireless networks will reduce some of the growning demand for bandwidth. Also, the increased stranglehold monopoly of corporate media giants such as AOL-Time Warner and Viacom and Microsoft will keep the masses from having too much influence upon gaining bandwidth at a cheap price. Increasing government involvement in the internet will also keep bandwidth from becoming bogged down to standstill.

Even as lossy or lossless audio and video file compression codecs continue, their corresponding compander and playback systems will still utilize higher capacity disks. This is because consumers want downloadable media that looks and sounds good and that can be edited or altered, regardless of any lingering copyright issues. Much of the time file expansion will contribute to this bloating. However, as compression algorithms become more sophisticated, file sizes of playable media won't necessarily increase, but the size of the program applications will. There will be continued increase in the size of software programs, or at least an increase in the number of dynamically loaded computer code libraries (.DLL files and other shared library formats or system extensions). Operating systems will continue to have a more modular form, but because of the inherent dynamic stability and complexity of modular operating systems, hardware multimedia devices will continue to see production and specialization. For example, portable digital multitrack recorders will see an increase in storage and track capacity while there size will shrink to a more manageable size except where it is stylish. (For example, having big knobs and continuous controllers for MIDI-like performance and automation data). I imagine Roland and Akai and Behringer and Korg will still be around if they continue to follow this trend, while other companies will go bankrupt or will change their focus entirely.

VST and DirectX and emerging technologies will see continued growth and development, but it will be mainly only a small handful of companies that actually draw a profit from modular effects and instrument softwares. The exceptions will be a few independent companies that manage to conquer the challenges of vocal synthesis and other advanced applications of higher math and statistics in audio software. Freeware plug-ins will continue to be available as software development kits (SDK) continue to be available, and as the trend for automated shareware/freeware/trialware publishing continues.

As computers become more advanced, and as their capacities increase, so will the sophistication and organization and archival knowledge of cracking and software piracy. Because of this, software producers will rely more and more heavily on steganography, and less and less on cryptography and timestamping. Steganography hides the presence of a coded message, while cryptography merely encodes a visible message. Therefore, the logical upgrade to crptography is steganography. Since audio and visual formats are the most dense and the most complex of data formats, and allow sampling of real-world physical, intellectual, and technical data, audio and video formats will continue to be of prime importance in driving information theory and practice.

This will also indirectly reinvigorate music with a political content, even if it is entirely inaudible. This will also increase as politically oppressed and tyrannized societies obtain more and more internet and computer technology/access. This is already apparent in the international adoption of RAP music, which in many ways is the most lyrically efficient and technologically cheap form of (loose) audio steganography. Multilingual RAP and other lyrical forms will continue to be used as a vehicle for political and social messages regardless of how little the public suspects or notices the actual meaning.

Well, that's an overload of information, but it's important to put it out there into the Zeitgeist for intellectual digestion and contemplation.

null

null

vocal song synthesis is here....

As always I enjoyed this post. I'm glad you have the
time to write down some of the things I only have time
to think about.

You might also be interested to know that there have
already been attemps at vocal song synthesis which is
MIDI driven - check out
<a href="http://www.hitsquad.com/smm/programs/VocalWriter_mac/">VocalWriter</a>

Re: vocal song synthesis is already here....

As always I enjoyed this post. I'm glad you have the
time to write down some of the things I only have time
to think about.

You might also be interested to know that there have
already been attemps at vocal song synthesis which is
MIDI driven - check out <a href="http://www.hitsquad.com/smm/programs/VocalWriter_mac/" target="_top"></a>

A good example of why KazaA sucks ass!

<A HREF="http://astalavista.com/code/delphi/">just one of many flavours</A>
<IMG SRC="http://astalavista.com/include/logo.jpg">

Re: A good example of why KazaA sucks ass!

Good warning - in fact Kazaa should be classified as a
virus itself - check out <a href="http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=kazaa+virus" target="blank">http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=kazaa+virus</a>

Re: A good example of why KazaA sucks ass!

: Good warning - in fact Kazaa should be classified as a
: virus itself - check out <a href="http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=kazaa+virus" target="blank">http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=kazaa+virus</a>

MPC 2000 zip format on Mac 8.6

MPC 2000 zip format on Mac 8.6

This popular thread has been given its own page : MPC 2000 zip format on Mac 8.6

ÔõÑù°Ñ*.datÀ©Õ¹ÃûµÄµçӰת»¯Îªrm¸ñʽµÄ

ÔõÑù°Ñ*.dat»ò*.mpgÀ©Õ¹ÃûµÄµçӰת»¯Îªrm¸ñʽµÄ

be careful what you wish for

i don't know what Font you use, but you should be sending messages like that to
<A HREF="http://inbox.malism.com/">http://inbox.malism.com/</A> or <A HREF="http://message.malism.com/">http://message.malism.com/</A>instead of here. If you want to find or create intrigue, there is where you will find it.

The butterfly flutters about the palm wine but he does not drink because he cannot afford to buy.

to liping from Macintorque v2.0

Lesson 1 in elementary statistical analysis of the ciphertext using MacTravesty, courtesy of Macintorque.

1 char statistics:

Ô 2 õ 2 Ñ 4 ù 2 ° 4 * 3 . 3 d 2 a 2 t 2
À 2 © 2 Õ 2 1 2 Ã 2 û 2 µ 6 Ä 4 ç 2 Ó 2
x 2 ª 4 » 3 ¯ 2 Î 2 r 2 m 3 ¸ 2 ñ 2 Ê 2
½ 2 ¬ 2 ò 1 p 1 g 1

2 char statistics:

ÔõÑ 2 õÑù 2 Ñù° 2 Ñ*. 2 ù°Ñ 2 °Ñ* 2 °xª 2 *.d 2
*.m 1 .da 2 .mp 1 dat 2 atÀ 1 at» 1 tÀ© 1 t»ò 1
À©Õ 2 ©Õ1 2 Õ1à 2 1Ãû 2 Ãûµ 2 ûµÄ 2 µÄµ 2 µÄ¬ 2
µçÓ 2 ĵç 2 Ä¬Ô 2 çÓ° 2 Ó°x 2 xª» 2 ª»¯ 2 ªrm 2
»¯Î 2 »ò* 1 ¯Îª 2 Ϊr 2 rm¸ 2 m¸ñ 2 mpg 1 ¸ñÊ 2
ñʽ 2 ʽµ 2 ½µÄ 2 ¬Ôõ 2 ò*. 1 pgÀ 1 gÀ© 1

well, you get the idea. ASCII, unicode, hex, iso that's pretty weak to play alphabet games. besides, .mpg and .dat seems pretty clear from your ciphertext.

your data file and your mpeg perhaps

You sure you want to do that here?

directions: ON RA. TO WAV

I AM NOT QUITE CLEAR ON HOW TO RUN THIS PACTH IN THE SAME DIRECTORY AS THE PROGRAM TO MAKE EVERY THING WORK OK. PLEASE HELP -- JAK

confused about midi

i have a desktop pc with sblive card and live drive and i have a laptop with a usb/midi interface cable ux16,and i have a midiman 2x2 usb interface as well

also i have an evolytion mk149 controller keyboard,

my question is is it possible to hook allthree together so i canuse the controller keyboard in reason,then by changing the channel setting on the keyboard to another channel i can then use the keyboard on my laptop reason,

all i ever seem to find is connections on the web and stuff about pc/controller keyboard and then off board syth,sound module,i cant find anything about one keyboard controller being shared by to computers thru midi connections,

cheers would be much appreiciated if any one can help me

cheers

To the Worldwide Hip-hop community: The Murder of Run DMC's Jam

Jam Master Jay, one of the members of Run DMC, was recently murdered.
The killer is still on the loose. This is not a publicity stunt; this atrocity really happened.

I don't know the details, but this is terrible.
RunDMC are not the type of musicians who associate with criminals.
In fact, they went through a spiritual rebirth in the late nineties.
They have never been gangster rappers, and do not promote violence in their lyrics or public personas.

For Jam Master Jay to have been murdered is not only an act against Jay himself, but against his family, his associates, and his legacy which is felt by Rap/Hip hop/DJ's/Remixers/Sound Engineers/Producers and fans.

Some might consider it an actual attack upon hip-hop culture.
KRS One has been warning us of these things. Why won't you listen?
Moby may sample RunDMC as have millions of others. A great creator has been lost, but don't let him be forgotten. Take the time to listen to a RunDMC album, and surely you'll hear the roots of much contemporary music. Then you'll know that a forefather in the music scene was taken away from us unfairly.

Is it possible to cut a song so I only keep the section I want?

I have a two songs on two separate audio CDs that I would like to burn on to one CD for playing on an ordinary stereo.

First of all, how do I do this, and can I keep them in their original .cda format (which I gather is larger and has a higher sound quality than .mp3)?

Secondly, I only want the first half of one of the songs. Is there any way to cut a song file so that the CD I burn only contains the section I want?

Thanks,
Al.

Re: Is it possible to cut a song so I only keep the section I wa

Easy. Get a copy of CDex and copy the two tracks onto your hard drive. Then get an audio editor (e.g. Cool Edit) to cut out the part of the track you don't want. Save the files in WAV format. Then burn the finished tracks onto a CD (Nero Burn, Easy CD Creator etc). If the total length of the tracks is less that 79 minutes, they'll fit on a 700MB CD-R. Otherwise you're stuck.

Converting to MP3 will only work if your CD player can read MP3 files (unlikely).

Lister

Re: Is it possible to cut a song so I only keep the section I wa

Thanks, Lister. Are "CDex" and "Cool Edit" available to download free somewhere on the Web? Is it self-explanatory how to cut them and save as .wavs once I get them? I've got Nero, so I can do the last part.

Cheers,
Al.

Re: Is it possible to cut a song so I only keep the section I wa

<a href="http://www.hitsquad.com/smm/programs/Cdex/">CDex</a> is free. <a href="http://www.hitsquad.com/smm/programs/Cool_Edit_2k/">Cool Edit 2000</a> is shareware, but <a href="http://www.hitsquad.com/smm/programs/Audacity/">Audacity</a> is free.

: Thanks, Lister. Are "CDex" and "Cool Edit" available to download free somewhere on the Web? Is it self-explanatory how to cut them and save as .wavs once I get them? I've got Nero, so I can do the last part.

: Cheers,
: Al.

Converting cassets to CD's

I need help, what equipment is needed to convert music cassets to CD's. My dad is 80 and wants to convert his casset collection

Re: Converting cassets to CD's

This <a href="http://www.hitsquad.com/smm/news/1316/">tutorial</a> might help.

: I need help, what equipment is needed to convert music cassets to CD's. My dad is 80 and wants to convert his casset collection

Looking for WaveLab pfd, etc. manual

Looking for Wavelab pdf or printed manual. Preferrebly 4.0 but will accept 3.0. Please notify me if you can help or have info.

Re: Looking for WaveLab pfd, etc. manual

I am also looking for a Wavelab 4.0 manual.
If anyone knows where this can be acquired, please, please
e-mail me. Thanks so much!

Re: Looking for WaveLab pfd, etc. manual

: I am also looking for a Wavelab manual.
: If anyone knows where this can be acquired, please, please
: e-mail me. Thanks a lot!!!

Re: Looking for WaveLab pfd, etc. manual

Please e-mail me if you have the .pdf manula for WaveLab 4.0

Thanks!
David

: : I am also looking for a Wavelab manual.
: : If anyone knows where this can be acquired, please, please
: : e-mail me. Thanks a lot!!!

help for help

I can't remember for sure, but i think there is a little bit of built-in help for wavelab. but maybe that's soundforge, i cant remember for sure. but check it out. if your wavelab folder has any .HLP or .CNT files, then there's at least that. you can click on the .HLP files and read them.