Friday, May 29, 2009

Radio-shack Electronics Learning Lab

practice "Cabalos Blancos" from Gipsy Guitar

Here are the boys from Lebanon (well - there will probably also played flamenco guitar), I totally forgot. They are cool on it. They play Caballos Blancos from Gipsy Guitar . I think the DVD I'm going down soon, again. When I listen to the guys and watch it itches me totally in the fingers, these Rumba immediately to play with others.



The associated text must be mentioned here on YouTube also observed: a rumba by Gerhard Graf-Martinez. Bassam on lead. Karim with the strumming pattern from hell! :)

Radio-shack Electronics Learning Lab

practice "Cabalos Blancos" from Gipsy Guitar

Here are the boys from Lebanon (well - there will probably also played flamenco guitar), I totally forgot. They are cool on it. They play Caballos Blancos from Gipsy Guitar . I think the DVD I'm going down soon, again. When I listen to the guys and watch it itches me totally in the fingers, these Rumba immediately to play with others.



The associated text must be mentioned here on YouTube also observed: a rumba by Gerhard Graf-Martinez. Bassam on lead. Karim with the strumming pattern from hell! :)

Thursday, May 28, 2009

18 Month Old Head Bump With Fever

re flamenco guitar ...

So - now I have more time to hopefully play guitar. About getting started in the second volume, that is, Chapter 6, I can not say much because I am currently rumquäle with the first exercises. In two weeks, then more.
Looking like it was made for others who are concerned with the Flamenco guitar method by RCD, or to learn, I was once in YouTube the keywords 'Graf Martinez' one - and lo! There are a surprising number of the world who are learning by the method 'of our flamenco teacher' flamenco guitar. Not everyone I would recommend to place his strumming to the world available, but it's rather nice to see how the international guitar (learning) the world of Andalusian music of a German taught, understood and practiced.

Besides the fact that I will not mention all the video posts here, maybe not all have found is amazing that Rumbita 1 and 2 is presented most often. Quite often the Bulerias be heard. See and hear for yourself:

is very well represented Elena from Hungary (not only with flamenco) and "Mr. bebopguitar "

Rumbita




Sole




Singles / Tangos




tremolo

Joy


Bulerías
Mr. "Bebopguitar" has it pretty well on it. His rasgueo like it very much. On a Flamenca it would probably sound pretty darn good.


Tarantas
something "crazy" I think the environment in which he plays. A true guitar freak.



Garrotin
Very nice - I have to practice a bit longer

.

Pulgar exercise


This post takes a very long load times, since all the vids are pulled by YouTube. Sorry - is not different, rather, I do not know otherwise. If you want to see the videos larger, then simply click the YouTube logo at the bottom right. Now you end up on YouTube - with the backspace button or the browser with the back button you come back to my blog flamenco guitar.

18 Month Old Head Bump With Fever

re flamenco guitar ...

So - now I have more time to hopefully play guitar. About getting started in the second volume, that is, Chapter 6, I can not say much because I am currently rumquäle with the first exercises. In two weeks, then more.
Looking like it was made for others who are concerned with the Flamenco guitar method by RCD, or to learn, I was once in YouTube the keywords 'Graf Martinez' one - and lo! There are a surprising number of the world who are learning by the method 'of our flamenco teacher' flamenco guitar. Not everyone I would recommend to place his strumming to the world available, but it's rather nice to see how the international guitar (learning) the world of Andalusian music of a German taught, understood and practiced.

Besides the fact that I will not mention all the video posts here, maybe not all have found is amazing that Rumbita 1 and 2 is presented most often. Quite often the Bulerias be heard. See and hear for yourself:

is very well represented Elena from Hungary (not only with flamenco) and "Mr. bebopguitar "

Rumbita




Sole




Singles / Tangos




tremolo

Joy


Bulerías
Mr. "Bebopguitar" has it pretty well on it. His rasgueo like it very much. On a Flamenca it would probably sound pretty darn good.


Tarantas
something "crazy" I think the environment in which he plays. A true guitar freak.



Garrotin
Very nice - I have to practice a bit longer

.

Pulgar exercise


This post takes a very long load times, since all the vids are pulled by YouTube. Sorry - is not different, rather, I do not know otherwise. If you want to see the videos larger, then simply click the YouTube logo at the bottom right. Now you end up on YouTube - with the backspace button or the browser with the back button you come back to my blog flamenco guitar.

Remington 870 Part Numbers

information, but with security - gaining information day at the University of Klagenfurt

On Tuesday, 31 March 2009, the Institute of Applied computer science - system security offered (University of Klagenfurt), a series of lectures on the theme of "Information Security". The 4th and 5th classes of network engineering department were accompanied by five professors with it.

After a welcome by Prof. Dr. Horst showed us this in a lecture, as before encryption was used (c. 1500 BC).. He led us through the centuries up to date used cryptographic algorithms.

The second lecture was also Dr. Horster about "attacks on secure systems." He spoke mainly about the security of chip cards. Since we now enforce various attack techniques such as error reading time dependencies, read internal states to manipulate internal states, microprocessor contact directly, etc. at their disposal, the view has changed. Chip cards are no longer considered tamper-proof, they are still influenced by the environment and their information leave the map. The instructor led several Facilities - eg freezing of memory, reverse engineering, micro-probes, analysis of current consumption, fake a fingerprint, attaching a card reader at a teller machines - at, can be cracked by what date (secure) systems.
said the last presentation of the first session Ing Wigoutschnigg on social networks such as StudiVZ or Facebook. He called us students to do more to ensure that we share information on the Internet, go there at sites like Archive.org not this data is lost and thus always available to everyone. After a few fun statistics, we were released as a free lunch.
The first lecture the second session was held in the afternoon by engineer Peter Gruber on "The Network Security Wheel." This process is repetitive describes four phases, which increase the security of a network.
  1. Secure: In this phase to initialize security measures and implemented. This need to reflect on the subject Firewall (Where and what?) Authentication of users (how?), Encryption (What data? Which algorithm?) And others are made.
  2. Monitor: This monitors the effectiveness of the measures. For this offer, among other log files, network intrusion detection system Netflow statistics.
  3. review: The implemented security measures to be tested. It will be using scanners, security tools, security, web sites, etc. looking for weak points of the network.
  4. Improve: The information obtained in the previous phases will be developed enhanced security measures.
example: Internet access at home via Wi-Fi.
1st Phase: The WEP encryption enabled as
2nd Phase: Monitoring shows that someone else mitbenützt access
Phase 3: Hacking's own APs
4.Phase: WEP is by EPAs will be replaced
1st Phase: WPA is activated
2nd Phase: There are still co-users
.... His previous day ended
have the instructor with the slogan "Security is never done".
The second lecture in the afternoon was then "Writing Secure Code", where DDipl. Ing Rass tried drumming into us that we are not the performance of our software will increase at the expense of safety.

The last lecture was given by Ass Prof. Dr. Schartner on the safety aspects of digital images. He presented a project of students, are provided in which captured photos with EXIF data, verified that each time may be, whether it is the original or a different picture. Each manipulation is documented and can be traced.

We hereby would like to thank you for the interesting presentations and the friendly hospitality at the participating members of the Institute.

Remington 870 Part Numbers

information, but with security - gaining information day at the University of Klagenfurt

On Tuesday, 31 March 2009, the Institute of Applied computer science - system security offered (University of Klagenfurt), a series of lectures on the theme of "Information Security". The 4th and 5th classes of network engineering department were accompanied by five professors with it.

After a welcome by Prof. Dr. Horst showed us this in a lecture, as before encryption was used (c. 1500 BC).. He led us through the centuries up to date used cryptographic algorithms.

The second lecture was also Dr. Horster about "attacks on secure systems." He spoke mainly about the security of chip cards. Since we now enforce various attack techniques such as error reading time dependencies, read internal states to manipulate internal states, microprocessor contact directly, etc. at their disposal, the view has changed. Chip cards are no longer considered tamper-proof, they are still influenced by the environment and their information leave the map. The instructor led several Facilities - eg freezing of memory, reverse engineering, micro-probes, analysis of current consumption, fake a fingerprint, attaching a card reader at a teller machines - at, can be cracked by what date (secure) systems.
said the last presentation of the first session Ing Wigoutschnigg on social networks such as StudiVZ or Facebook. He called us students to do more to ensure that we share information on the Internet, go there at sites like Archive.org not this data is lost and thus always available to everyone. After a few fun statistics, we were released as a free lunch.
The first lecture the second session was held in the afternoon by engineer Peter Gruber on "The Network Security Wheel." This process is repetitive describes four phases, which increase the security of a network.
  1. Secure: In this phase to initialize security measures and implemented. This need to reflect on the subject Firewall (Where and what?) Authentication of users (how?), Encryption (What data? Which algorithm?) And others are made.
  2. Monitor: This monitors the effectiveness of the measures. For this offer, among other log files, network intrusion detection system Netflow statistics.
  3. review: The implemented security measures to be tested. It will be using scanners, security tools, security, web sites, etc. looking for weak points of the network.
  4. Improve: The information obtained in the previous phases will be developed enhanced security measures.
example: Internet access at home via Wi-Fi.
1st Phase: The WEP encryption enabled as
2nd Phase: Monitoring shows that someone else mitbenützt access
Phase 3: Hacking's own APs
4.Phase: WEP is by EPAs will be replaced
1st Phase: WPA is activated
2nd Phase: There are still co-users
.... His previous day ended
have the instructor with the slogan "Security is never done".
The second lecture in the afternoon was then "Writing Secure Code", where DDipl. Ing Rass tried drumming into us that we are not the performance of our software will increase at the expense of safety.

The last lecture was given by Ass Prof. Dr. Schartner on the safety aspects of digital images. He presented a project of students, are provided in which captured photos with EXIF data, verified that each time may be, whether it is the original or a different picture. Each manipulation is documented and can be traced.

We hereby would like to thank you for the interesting presentations and the friendly hospitality at the participating members of the Institute.

Wednesday, May 13, 2009

Hemo Injected Steroid

4AHITN second Price for Stock Market Game

As recently reported, has assigned a group of five students of grade 4AHITN second in the Stock Market Game by Raiffeisen. The class received a check for more than 750 € presented.

The winning team: Patrick Domenig, Christian Paul,
Andreas Urschitz, Daniel Rainer and Florian Kofler

Ingrid Walder, Youth Officer at Raiffeisen Bank Villach and Harald Kollmann, head of Raiffeisen Club in Carinthia, handed over at a small ceremony in the presence of Prof. Petra Aigner and director Oskar Dorner Fofrat the second prize to the class president of 4AHITN.
was emphasized that it has been the class even in times of financial crisis to reach thanks to brisk online research and of course a little luck of the capable remarkably high performance of almost 20%.
department head Helmut Schmalzl Raiffeisen thanked for the opportunity to meet our students through such "practical contacts" necessary for their education.


Hemo Injected Steroid

4AHITN second Price for Stock Market Game

As recently reported, has assigned a group of five students of grade 4AHITN second in the Stock Market Game by Raiffeisen. The class received a check for more than 750 € presented.

The winning team: Patrick Domenig, Christian Paul,
Andreas Urschitz, Daniel Rainer and Florian Kofler

Ingrid Walder, Youth Officer at Raiffeisen Bank Villach and Harald Kollmann, head of Raiffeisen Club in Carinthia, handed over at a small ceremony in the presence of Prof. Petra Aigner and director Oskar Dorner Fofrat the second prize to the class president of 4AHITN.
was emphasized that it has been the class even in times of financial crisis to reach thanks to brisk online research and of course a little luck of the capable remarkably high performance of almost 20%.
department head Helmut Schmalzl Raiffeisen thanked for the opportunity to meet our students through such "practical contacts" necessary for their education.