dimanche 30 décembre 2012

nos vemos em 2013


A Radio Indie se despede de 2012 com uma prévia do que vai rolar por aqui no próximo ano: os novos trabalhos do Yo La Tengo (foto), Ra Ra Riot, Ducktails, Local Natives, Matt Pond PA, Thao with The Get Down Stay Down, Veronica Falls, Nick Cave, Phosphorescent e Free Energy. Nós voltamos dia 7 de Janeiro, um ótimo 2013 a todos.

 Seleção Musical de Ricardo Pereira. 

01 – YO LA TENGO, “Ohm”
In: Fade, 2013. 

02 – RA RA RIOT, “Beta Love”
In: Beta Love, 2013. 

03 – DUCKTAILS, “The Flower Lane”
In: The Flower Lane, 2013. 

04 – LOCAL NATIVES, “Bowery”
In: Hummingbird, 2013. 

05 – MATT POND PA, ‘Love To Get Used”
In: The Lives Inside the Lines in Your Hands, 2013. 

06 – THAO with THE GET DOWN STAY DOWN, “Holy Roller”
In: We The Common, 2013. 

07 – VERONICA FALLS, “Teenage”
In: Waiting for Something To Happen, 2013. 

08 – NICK CAVE & THE BAD SEEDS, “We No Who R U”
In: Push The Sky Away, 2013. 

09 – PHOSPHORESCENT, “Song for Zula”
In: Muchacho, 2013. 

10 – FREE ENERGY, “Dance All Night”
In: Love Sign, 2013. 

Siga a Rádio Indie pelo twitter e fique por dentro das nossas atualizações:
http://twitter.com/radio_indie

vendredi 28 décembre 2012

Security Software: Stay Safe



Your home computer serves as a gateway to a universe of information. Along with this extraordinary capability come the risks of losing data, falling prey to malicious software and leaving the door open to identity theft. Safeguard your computer and protect your family by using security software that minimizes or eliminates these risks.
  1. Internet Security

    • The first line of defense for any home computer setup is a good Internet firewall. A firewall allows a normal flow of data to and from your computer but blocks attacks from outside, essentially hiding your PC behind a shield. Microsoft’s Windows 7 includes a software firewall that, when enabled, effectively blocks unauthorized outside access.
      Other products include Kaspersky Lab’s Kaspersky ONE Universal Security. This software blocks spam email and viruses along with providing firewall protection. The software includes protection for PCs, Macintosh computers, Android, iOS and other mobile devices in one comprehensive package. The editors at TechRadar rate Kaspersky ONE 4 1/2 stars out of 5.
      ZoneAlarm Internet Security Suite by Check Point Software Technologies contains a firewall, virus scanner and spyware blocker. The ZoneAlarm scanner employs Kaspersky Lab’s proven virus detection technology. In addition, Check Point Software Technologies offers a firewall-only version of ZoneAlarm as a free download. IT Reviews praised ZoneAlarm’s simple, easy-to-use layout and strong protection against malware.

    Malware Protection

    • Malware programs spy on your computer activities, damage your files or hijack your PC to spread email and Web spam. Attackers spread malware through enticing Web pages, email attachments and by other insidious means. Malware goes by various names that describe a specialty: spyware, viruses, adware and rootkits. A rootkit, for example, hides itself by becoming part of Windows, making detection and removal difficult. An entire software industry has grown up in response to the malware threat. Two examples of anti-malware software are Kaspersky ONE and Symantec’s Norton 360; these packages contain several programs that address multiple malware problems at the same time. They detect computer viruses in email attachments and file downloads and scan for malware already residing on your computer, giving you options for removing the malicious files. In addition to these features and others, Norton 360 automatically backs up your recent data, performing a frequently neglected, yet essential task.

    Encryption

    • Protecting confidential files such as medical records and family finances demands a high priority level. Encryption prevents anyone from seeing this information without the correct password. The process of encrypting data mathematically scrambles it, turning it into meaningless random bits. To read the information, you type a password into a program to decrypt the data to its original form. Windows 7 has built-in encryption capability that allows you to protect individual files and folders on your hard drive, USB drives and other media.
      Another software solution, TrueCrypt, from the TrueCrypt Developers Association, creates an encrypted virtual disk onto which you can store files. TrueCrypt is a free, open-source program that offers industrial-strength encryption methods. You choose from AES, Twofish and Serpent algorithms, either alone or in combination, yielding extremely strong security.
      Using, PKWARE’s PKZIP, a popular data-archiving program, you compress several files into one, saving hard drive space and facilitating file transfers. The program has a data-encryption feature using industry-standard AES and 3DES methods; you can select either. PKZIP’s encryption provides a basic level of security suitable for everyday use.

    Parental Controls

    • Although people in some countries experience a nationally controlled, sanitized Internet, Americans still enjoy relatively unrestricted freedom of expression on the Web. Some of the information available is not suitable for children, and you may wish to protect your minor children from the worst the Internet has to offer. To that end, Microsoft’s Windows 7 software includes several parental-control features. Through the Internet Explorer Web browser, you can turn on a Content Advisor that acts as a filter for Web content. A Windows Control Panel resource, User Accounts and Family Safety, lets you regulate the time your child spends on the computer.
      For more sophisticated and comprehensive parental controls, consider Keyware Incorporated’s Action Alert. This software blocks websites, automatically filters Web searches, monitors email and records the computer’s video and keyboard activities. If the program detects objectionable content coming through emails or websites, you can opt to receive alerts via cell phone text messages. Action Alert comes in free and full-featured editions; you can purchase the latter version for a modest one-time fee.

    Everyday Practices

    • As your data is precious, yet easily lost due to accidents, hardware problems and malware, backups are one of the best daily disciplines you can put into practice. Microsoft Windows includes backup software that copies your documents to a USB drive, second hard drive or recordable DVD on an automatic or manual basis, depending on if you connect the media permanently or if you plug it in occasionally. Web services such as Carbonite back up your files through the Internet, placing your data in secure offsite storage.
      Exercise healthy skepticism when reading your email, even when messages come from known sources. For example, if you see a message from FedEx about a shipment when you are not expecting a package, do not click on the attachment. Be hesitant to open any email attachments unless you have complete confidence in the sender. Likewise, refrain from clicking on Web links embedded in these messages, as they can lead to virus-infected Web pages.
      When creating passwords, make them as long and complex as possible. A shortcut for this is to make the password from a phrase, such as “tacosalad” or “FiveforaDollar.” Stay away from easily guessed passwords such as “12345.” Malicious hackers keep extensive dictionaries of frequently used passwords and can crack them in seconds.


Read more: Security Software: Stay Safe | eHow.com http://www.ehow.com/info_12223423_security-software-stay-safe.html#ixzz2GLWl9vGn


How to Save Battery Life



Batteries are not all created equal--every battery is not suited to every job. Batteries mismatched with the items that need them can run them down quickly. Knowing how to select the right batteries and how to store them properly will save you time and money by assuring full battery life. Read on to learn more.

Instructions

    • 1
      Buy batteries that are fresh. Do this by going to a store with a high battery turnover such as a busy toy store or electronics department. Choose from the center of the rack, as store employees are taught to put new merchandise in the very front or back of the displays.
    • 2
      Buy zinc-carbon batteries for items like clocks, flashlights and calculators. Choose heavy duty zinc carbon batteries for small radios, and small lights like penlights. For items that are used constantly or have a high draw such as toys, boom boxes, camera flashes and tape recorders, use alkaline batteries.
    • 3
      Store batteries in the refrigerator inside a sealed plastic bag for keeping them fresh for the longest amount of time. You should leave them out long enough to reach room temperature before you use them.
    • 4
      Take batteries out of items that rarely get used. Put them in a zippered plastic bag. You can tape the bag to the item if possible or you can store them elsewhere, away from heat and light. Don't let them touch anything metal as they can lose power.
    • 5
      Keep batteries warm in your pocket if you need to use them outside. Put them in just before you use them and take them out again to keep warm when you're done.
    • 6
      Don't mix old and new batteries when you use them. The new ones will be stronger and can cause the older ones to leak battery acid. Battery acid is extremely caustic and will cause burns on your skin and anything else it touches. Wear gloves and use caution when removing leaking batteries. Make sure to dispose of batteries properly.

Tips & Warnings

  • Keep batteries in zipper bags in the fridge to keep them fresh longer.
  • Warm refrigerated batteries to room temperature before using.
  • Don't touch a leaking battery without gloves and caution. Battery acid is very caustic and will cause terrible burns to skin and everything else it touches.
  • Don't mix old and new batteries--it can cause the older ones to leak.


Read more: How to Extend Battery Life | eHow.com http://www.ehow.com/how_2151104_extend-battery-life.html#ixzz2GLUxrmkl

La Chine décide la fin de l'anonymat sur Internet





Officiellement, il s'agit de "protéger la vie privée." Selon le compte Twitter de l'agence de presse officielle de la République populaire de Chine, Xinhua, "le corps législatif chinois adopte des règles d'information en ligne pour protéger la vie privée."
"Le corps législatif suprême de Chine a approuvé ce vendredi des règles pour améliorer la protection des informations personnelles en ligne et pour sauvegarder les intérêts publics, obligeant les utilisateurs de l'Internet à s'identifier auprès des fournisseurs de service lorsqu'ils concluent un accord d'accès sur le web."
Pas de changement pour l'internaute moyen 
Xinhua précise que le texte a valeur de loi. Pendant les cinq jours qu'a duré la session législative aboutissant à l'adoption de cette décision, plusieurs informations avaient fuité, note The Next Web. Particulièrement inquiétantes pour les internautes chinois.
On ne sait pas quand le texte s'appliquera - il n'est officiellement qu'à l'état de brouillon - mais l'article de The Next Web est relativement éclairant sur les effets de la loi, lorsqu'elle sera promulguée. Pour le journaliste, correspondant du site néerlandais en Chine, cela ne devrait pas changer grand-chose pour le consommateur moyen.
"J'ai déjà dû photocopier mon passeport pour obtenir un service de téléphonie mobile ou d'Internet fixe. (...) Les cafés Internet, par contre, pourraient sentir le tour de vis si des restrictions les forçaient à conserver un historique précis de leur clientèle."
Craintes pour les cyberdissidents 
La principale inquiétude repose désormais sur les dissidents en ligne, pour qui l'anonymat est en Chine une chance supplémentaire, sinon une garantie, de sécurité. Cela n'interdira pas l'utilisation de pseudonymes sur les services en ligne, mais il sera bien plus facile de les relier à un internaute identifié.
Cette nouvelle disposition législative ne laissera donc pas d'inquiéter, d'autant que les nouvelles ne sont pas bonnes non plus du côté des solutions techniques de contournement de la "Muraille de Chine numérique".
Plus tôt ce mois-ci, le Guardian a en effet révélé que la Chine s'était dotée d'une technologie de détection et de blocage des connexions VPN non autorisées par les autorités. Le système de routage en oignon TOR, également plébiscité par les tenants de l'anonymat en ligne, pourrait lui aussi subir les effets de ce blocage.
Source: ZSnet

jeudi 27 décembre 2012

A Map of the Internet


Where will you travel on the Internet today?
Note: Yes, we know that the word Downloads is misspelled as Downoads in the image, but otherwise it is still a fun image to add to your collection.
You can download a super-sized large version of the image using this link(1500*2400 pixels)
[via MUO]


Geek Comic for December 27th – Coming Full Circle


Does Plain Black Wallpaper Save Battery on Mobile Devices?

In a world where you can have 3D scenes rendered in real time as your smartphone’s background, plain black wallpapers aren’t the most eye-catching option. However, they can offer battery life improvements over colored wallpapers on some displays.

Plain black wallpapers can also make text easier to read, helping the icons stand out. They won’t be lost in the jumble of colors — or animated fish, if you’re using a live wallpaper.

Will It Save Battery Life?

On most computer displays, such as the computer screen you’re probably reading this article on, using a black background won’t save you any battery life. No matter what color a pixel is – whether it’s dark black or blinding white – there’s a backlight at the back of your screen and it’s constantly outputting light. The black pixels block more of the backlight, but it’s still behind the black pixel, using power.
For many portable devices – including Apple’s iPhone – you can’t save any battery life by using a black background. Like on a computer’s LCD monitor, the iPhone’s backlight is constantly shining when the screen is on.
However, this doesn’t apply if you’re using a mobile device with an AMOLED (also known as Super AMOLED or OLED) display. OLED screens don’t have a solid backlight. Each pixel on an OLED screen is an “organic light emitting diode” that produces its own light. When the pixel is black, it isn’t producing any light. When the pixel is white, it’s producing light.
In other words, if you use a black background on an AMOLED display, your display will produce less light. This will help save battery power, squeezing more battery life out of your device.
There are many devices with AMOLED displays out there, including the popular Samsung Galaxy S3. The Nokia Lumia 900 has an AMOLED display, although the Lumia 920 has an IPS LCD display. To check the type of display your smartphone or tablet has, examine its specifications or perform a Google search.
Image Credit: KhE on Flickr

Setting a Plain Black Wallpaper on Android

To set a plain black wallpaper on Android, open this page in your browser and tap here to view the plain-black wallpaper image. Long-press the image and tap Save image to save it to your device.
Long-press on your home screen and tap Gallery to select a wallpaper from your device. If you’re using an older version of Android or a manufacturer-provided interface, you may have to tap Wallpaper after long-pressing your home screen.
Tap the Download folder in the gallery, select your plain black wallpaper, and confirm the operation.
Remember: Setting a plain black wallpaper will only improve your Android’s battery life if it has an OLED display. However, we’ve also got some tips that will help maximize any Android device’s battery lifeDon’t use a task killer, though.

Setting a Plain Black Wallpaper on iOS

To set a plain black wallpaper on iOS, open this page in Safari and tap here to view the plain-black background image. Long-press the wallpaper and save it to your device.
Return to the home screen, tap the Settings icon, and select Brightness & Wallpaper.
Browse for a new wallpaper and select your Camera Roll – you’ll see the black image you saved. Select it as your background.
Setting a plain black wallpaper won’t improve your battery life on your iPhone, iPad, or iPod Touch. Don’t worry, though – we’ve got some tips for improving your iOS device’s battery life.
Sources: How To Geek

3D Printing Technique Yields Working Records



Evidence that 3D printing techniques are maturing in their capabilities: working 3D records. This interesting tutorial takes a look at how you can produce a serviceable LP with a 3D printer.
The results are highly experimental at this point and the sound is a bit muddy (at the current stage the project is only able to sample sound at about a third the audio quality of MP3) but the fact that 3D printers have evolved to even allow for the fine-detail printing necessary for record playback is amazing. Hit up the link below for more details about the project.
3D Printed Record [Instructables]

lundi 24 décembre 2012

album do ano


Finalizando a série de playlists especiais dedicada aos destaques de 2012 é hora de conhecer o melhor álbum do ano. Feito que cabe a Victoria Legrand e Alex Scally, o Beach House. Depois de passar raspando em 2010 com Teen Dream (que perdeu para The Suburbs, do Arcade Fire), este ano não tem para ninguém. Bloom, quarto album da dupla, conseguiu o que parecia impossível: repetir o estado de emoção do trabalho anterior – o dream pop nunca foi tão devastador. Confira na nossa playlist de hoje, o álbum Bloom na íntegra – que encabeça uma lista de respeito, conheça quais são os melhores álbuns de 2012 na Radio Indie. 

OS MELHORES ALBUNS DE 2012

Seleção de Ricardo Pereira.

01 – BEACH HOUSE, Bloom
02 – GRIZZLY BEAR, Shields
03 – LOST IN THE TREES, A Church That Fits Our Needs
04 – DAVID BYRNE & St. VINCENT, Love This Giant
05 – TAME IMPALA, Lonerism
06 – LEE RANALDO, Between The Times and The Tides
07 – DIRTY PROJECTORS, Swing Lo Magellan
08 – SPIRITUALIZED, Sweet Heart Sweet Light
09 – OF MONSTERS AND MEN, My Head is An Animal
10 – SHARON VAN ETTEN, Tramp


01 – BEACH HOUSE, “Myth”
In: Bloom, 2012. 

02 – BEACH HOUSE, “Wild”
In: Bloom, 2012. 

03 – BEACH HOUSE, “Lazuli”
In: Bloom, 2012. 

04 – BEACH HOUSE, “Other People”
In: Bloom, 2012. 

05 – BEACH HOUSE, “The Hours”
In: Bloom, 2012. 

06 – BEACH HOUSE, “Troublemaker”
In: Bloom, 2012. 

07 – BEACH HOUSE, “New Year”
In: Bloom, 2012. 

08 – BEACH HOUSE, “Wishes”
In: Bloom, 2012. 

09 – BEACH HOUSE, “On The Sea”
In: Bloom, 2012. 

10 – BEACH HOUSE, “Irene”
In: Bloom, 2012. 

Curta e compartilhe a Radio Indie no Facebook:
http://www.facebook.com/pages/Radio-Indie/142639295767771

vendredi 21 décembre 2012

TERRES ET PAYSAGES A LA RADIO

Diffusions sur Radio Grenouille du 24 décembre au 6 janvier

Dans le cadre de l'exposition Terres et Paysages [en Pays d'Aix], retrouvez les voix des agriculteurs du pays d'Aix sur Radio Grenouille

--- dans la miellerie --- les terriens --- le blé dur --- les chèvres du Rove --- l'irréprochable --- vente à la ferme --- on n'est pas obligés --- l'arrosage gravitaire --- écosystème ---

Neuf sons de 3 à 10 mn, diffusés de façon aléatoire à 9h30, 11h30, 13h30, 17h30 et 22h30, du lundi 24 décembre au dimanche 6 janvier

Réalisation :
Emmanuelle Taurines et Bat Sheva Papillon/L'orage

Bonne écoute !


lundi 17 décembre 2012

How to stand out among birthday well-wishers on Facebook



"Happy birthday! Have a great day!"
Perhaps you're a bit more creative than the above greeting, but even the most clever among us have probably run out of ways to wish friends a happy birthday on Facebook.
Yes, I just wished myself a happy birthday.
(Credit: Screenshot by Matt Elliott/CNET)
Thankfully, an enterprising Reddit user whose handle I do not wish to repeat in this space offered a handy and simple tip: search YouTube for "happy birthday" and your friend's name. You will be surprised by the volume and variety of videos available.
(Credit: Screenshot by Matt Elliott/CNET)
Sure, your friend will be sung happy birthday wishes by a random stranger or group, but I think that's part of the charm. And you might even find a professional in the results; when the day arrives where my daughter is on Facebook, I now know that Florence and the Machine (and a theater full of people) are there to sing her a YouTube happy birthday.


Upload a photo to a specific Facebook album on Android, iOS


You can now upload a photo to a specific Facebook album using the iOS and Android apps. There have been various methods in the past to get a photo into a preferred album, but the process is now streamlined.
iOS users will have the ability to add a photo, or photos, to an existing album or create a new album during the upload process. Android users will only be able to upload photos to an existing album. Before uploading a photo, however, Android users can create an album by visiting the Photos tab from the menu and tapping on the plus sign. It's an extra step, but with the same end result.
During the photo upload process, you will see a new album icon. Tapping on it will reveal the Facebook photo albums, allowing you to choose which album to upload the photo to. It's that simple.

Watch This Video From Cnet.com




Source: Cnet

Use Kies to back up and restore your Samsung mobile device


Samsung's Kies desktop software can sync your Samsung smartphone or tablet to your computer. If you haven't used Kies before, then you may not know that it can also back up the data on your Samsung device. With a Google account, a lot of your data already syncs with Google's servers, but Kies can also back up Samsung-specific apps, like S Planner and S Memo, which come on theGalaxy S3. Additionally, Kies can back up your contacts, call log, SMS/MMS messages, and media files. Here's how:

Back up

Step 1: After installing Kies (Windows | Mac) on your computer, connect your Samsung smartphone or tablet to your computer via a USB data cable.
Step 2: Confirm that Kies is connected to your Samsung device. Once connected, you'll see basic information about your device in the first tab.
Samsung Kies Basic Info tab
Click to enlarge.
(Credit: Screenshot by Ed Rhee/CNET)
Step 3: Click on the Back up/Restore tab and choose the items you want to back up, then scroll to the bottom of the window and click the Backup button.
Select items to back up
Click to enlarge.
(Credit: Screenshot by Ed Rhee/CNET)
Step 4: Wait for your backup to finish, then click the Complete button.
Kies backup complete(Credit: Screenshot by Ed Rhee/CNET)

Restore

Step 1: In the Back up/Restore tab, scroll all the way to the bottom and click the Restore button. When you get the warning message about closing running applications, click Continue.
Samsung Kies restore
Click to enlarge.
(Credit: Screenshot by Ed Rhee/CNET)
Step 2: Choose the backup file to restore, then click Next.
Choose backup to restore(Credit: Screenshot by Ed Rhee/CNET)
Step 3: Select the data you want to restore, and make sure you want to restore the backup to your device. This is your last chance to back out of the restore. If you're sure you want to restore your data, click Next.
Select data to restore(Credit: Screenshot by Ed Rhee/CNET)
Step 4: Once the restore completes, you'll see a confirmation dialog box, and your device will reboot.
Kies restore complete(Credit: Screenshot by Ed Rhee/CNET)
That's it. Now you know how to back up and restore your Samsung mobile device using Kies and your computer. We've confirmed that Kies works with a Samsung Galaxy S III smartphone and a Galaxy Tab 10.1 tablet. If you have another Samsung device that works with Kies, let us know in the comments.
Source: Cnet


Automatically dial extensions for Android contacts




A lot of companies have an automated service that answers their incoming phone calls. However, it's a bit of a pain when you're trying to dial a company and have to wait to enter the extension number each time for the department or person you're trying to reach. This is especially true when you don't remember the extension and you have to check out the contact information to find it.
Luckily Android dialer apps allow you to program the extension into the contact information. There are two different styles you can use: pause or wait. Read on to learn the differences and how to use each.
Tip: If you cannot find the options mentioned below, you may need to open an extra symbol menu on your number pad. In most cases you can just use the required punctuation from the alphabetical version of the keyboard.

Pause option:

On the number pad, this will either appear as a comma (,) or "pause." Using this option means that when you dial a number, the extension is used automatically after the dialer app detects that the phone has been answered.
(Credit: Screenshot by Nicole Cozma/CNET)
To use pause, enter the number like this: 1-555-555-1234,77 -- where "77" is the extension you need to dial.

Wait option:

The wait option appears as semicolon (;) or "wait" on the number pad.This option should be used when you are calling somewhere that requires listening to the entire automated message before allowing any menu or extension selections. Instead of just keying the numbers for you, a pop-up will appear on the screen with extension, asking if you should send it now. It will remain on the screen while in the call until you decide to send the extension or cancel.
(Credit: Screenshot by Nicole Cozma/CNET)
To use wait, enter the number like this: 1-555-555-1234;88 -- where "88" is the extension.
And if you really want to get fancy, you can enter combinations like 88,77; and so on to account for menus that you need to navigate on their phone system.

Source: Cnet