Audacity and You

I feel like my header needs some explanation, since you’re probably wondering, “How the heck does a picture of Pomeranian heads edited onto margaritas represent who you are as a student and person?” Well, anybody who knows me knows that I always put way too much effort into things that don’t require nearly as much of it; this header was no exception. Not only did it take me forever, but I only ended up using about a third of the actual photo. This pretty much sums up my academic life. Sigh.

This header also represents my sense of humor; after I finally finished and took a good look at the picture in its entirety, I spent a full two minutes giggling to myself like an idiot. It’s lively, quirky, and you shouldn’t look at it too closely or else you’ll spot all of its flaws—me, literally me.

Since I’ve pretty much mastered graphic design, let’s move on to audio editing. My freshman year, I had to edit a clip of Richard Nixon stating, “I’m not a crook” so that he said, “I’m a crook.” Sounds simple, doesn’t it? Yeah, no. This turned out to be one of the most tedious tasks I’ve ever had to do. The word “not” took up mere seconds, so I had to listen very carefully and try to cut it out precisely. Precision is key when it comes to audio editing, because your clip won’t sound right otherwise. Turns out, I have the precision of a toddler trying to color within the lines. When I cut too little, he said “I’mn—acrook;” when I cut too much, he said, “I’m—crook.” Overall, I’d say that the system was pretty difficult to get the hang of. While I will probably never edit sound clips as a hobby, I’m sure someone with more experience could/would. How fun would it be to manipulate recordings of your friends so that they say funny things? And just think of the blackmailing opportunities. “Oh, you didn’t call your boss fat? That’s funny, ‘cause I have this recording of you saying that…” Or if you’re looking for something less morally-bankrupt, you could also use Audacity/Garage Band to create and edit podcasts, record voice-overs for videos, or mash up songs. But, ya know, whatever floats your boat.

Your new desktop wallpaper. You’re welcome.

Phreaks, Hackers, and Trolls—Oh My!

Before we talk about the phreaks, hackers, and trolls, let’s discuss image editing. I don’t mean to brag, but I’ve got some crazy editing skills—just look at this amazing work done on my friend.img_2371Please, hold your applause. Can you tell the beard’s not real? Surprise. Seriously though, my image editing repertoire pretty much only consists of goofy stuff like doodling on preexisting photos (I’d show you the picture of myself that I “edited” to look like a vampire, but I’m trying to maintain some shred of dignity) and cropping pictures—all, mind you, on MS Paint. Fancy-schmancy terms like “layers” and “optimizing” elude me. I’ve seen a few YouTube videos of people editing photos and I must say, I’m impressed. Even a touch of editing can make a photo look incredible. For example, this puppy photo I found on someone’s profile on a website called “We Heart It”:

Yeah, I know, another puppy picture. What? I like dogs…

The pastel tint on the photo immediately brought to mind the term “saturation,” so I looked it up. According to my dear friend Google, “Saturation (or ‘chroma’) defines the intensity of a hue. Vivid primary colours are highly saturated, while pastel colours are unsaturated.” Therefore, this picture is unsaturated. Neat. I’m a bit nervous about having to actually edit images, because from what I’ve heard, it’s quite an arduous process; however, I’m willing to give it a go.

Now, let’s talk about the phreaks, hackers, and trolls. (There’s really no smooth way to segue from one topic to the other here, sorry.) When I think of a hacker, I imagine some guy wearing an Anonymous mask, typing rapidly, his computer screen raining binary like in The Matrix. Coleman mentions in the opening of her article that hackers follow a “hacker ethic”—“shorthand for a mix of aesthetic and pragmatic imperatives: a commitment to information freedom, a mistrust of authority, a heightened dedication to meritocracy, and the firm belief that computers can be the basis for beauty and a better world” (99). Sounds like they’re the heroes we need, but not the ones we deserve… Hackers’ ability to “watch the watchers” made them prime targets to law enforcement, which feared their technological prying. This resulted in the legal prosecution and persecution of hackers, in which “their punishment often exceed[ed] the nature of their crime” (108).

What comes to mind when I picture a troll is an acne-ridden neck-beard, purposely leaving racist or sexist comments on YouTube videos with the intention of stirring up trouble. Coleman writes, “Trolls work to remind the ‘masses’ that have lapped onto the shores of the Internet that there is still a class of geeks who, as their name suggests, will cause Internet grief, hell and misery” (110). She continues to explain that trolls serve a purpose—to “fuck shit up,” mostly, but on a deeper level, to take political correctness and make a mockery out of “the idea that language, much like everything virtual, is anything that should be taken seriously” (111). Personally, I don’t think that’s a good enough justification for the existence of trolls; all they do is spread hate and make people not want to be online. We don’t necessarily need jerks like these to shatter the concept of “political correctness,” especially not in the usually-crude way they do it.

Prior to Coleman’s article, I had no idea what a phreak was. The term “phreak” was once “phone freak,” but was “condensed out of the ambient cultural humidity” (103). These phone freaks were labeled as such due to their brand of hacking: “By 1961, phreakers—although still not named as such—no longer had to rely on perfect pitch to make their way into the phone system. They were building and using an assortment of small electrical boxes, the most famous of these being the Blue Box. This device was used to replicate the tones used by the telephone switching system to route calls, enabling Blue Box users to act as if they were a telephone operator, facilitating their spelunking of the phone system and, for some, free phone calls” (103).