What we're about
Upcoming events (5+)
Learn how to make livecoded music with Tidalcycles! Tidalcycles is a free, open source tool for making music using code and is used in algorave parties all over the world. In this meetup you will learn how to create your own improvised compositions with tidal. No programming or music experience is required. This meetup is open to all abilities and experience levels. At the meetup you will need: -A laptop (Windows, Mac Os, or Linux) -Headphones -A willingness to try new things It is recommended to try and install tidal on your own (instructions can be found here: https://tidalcycles.org/index.php/Installation ). We have also made a template project that contains a variety of tutorials to help you get started: https://github.com/XiNNiW/tidal-starter-project. Don't worry if you have trouble as we will be happy to help during the meetup. Also feel free to reach out for help here: https://talk.lurk.org/channel/tidal. Suggested donation to All Hands Active is $20 (free for members). All proceeds will go to AHA. Some examples of tidalcycles in action: https://www.youtube.com/watch?v=nAGjTYa95HM&t=610s https://www.youtube.com/watch?v=ksYNonhQilE
Our longest running event. Generally starts around 7pm and heats up as more people bring projects to work on, share things with each other (sometimes cookies), or do a little socializing. These evenings occasionally have themes. We'll have a volunteer on staff by 7pm to assist if you need help using our workshop. If you arrive to find that the upstairs doors to the building are locked, please try the door at the bottom of the "Deliveries Only" staircase. It can be found on the north side/parking lot area of the building, adjacent to 5th Ave..
C2 Servers can be cumbersome. First, they are a key piece used in attribution. Second, they can be subject to DoS attacks from adversaries. Finally, they require maintenance. Gross! Join me for a detailed walkthrough going from 0 to 60 in creating a completely peer to peer botnet. We will discuss decentralized methods for issuing commands in a secure way, various methods to disguise traffic and how to opportunistically schedule communication with other "normal" traffic. As usual, this is instructional and meant to educate the public on what is possible. I don't condone computer crime.