Sometimes you want to feel a pulse of the track, but maybe the drums and bass are just not enough. If you have a strumming Rhythm guitar you can use your automation to make it pump to emphasize the beat. The pumping Rhythm guitar trick first of all select the Rhythm guitar track that you Read More …
Tag: notes
What is an Electronic Press Kit or EPK
In the old days, physical press kits were paper-based and mailed old skool. Today, music artists can use digital media for promotion. This is known as an electronic press kit, or EPK. What is an EPK? An Electronic Press Kit is a digital resume for all audiences that is the promotional materials, giving everyone an Read More …
NOTES :: Retrieval Augmented Generation (RAG)
A solution model pattern in how to leverage large language models. Systems that use LLM but on their own content. Start Large language models can be inconsistent. Sometimes they nail the answer to questions, other times they regurgitate random facts from their training data. If they occasionally sound like they have no idea what they’re Read More …
AWS Notes – AWS Pentesting
An Opinionated Ramp Up Guide to AWS Pentesting https://awssecuritydigest.com/articles/opinionated-ramp-up-guide-to-aws-pentesting https://medium.com/@MorattiSec/my-aws-pentest-methodology-14c333b7fb58 Understanding the Shared Responsibility Model https://www.wiz.io/academy/shared-responsibility-model fwd:cloudsec https://fwdcloudsec.org/ AWS Customer Support Policy for Penetration Testing https://aws.amazon.com/security/penetration-testing/ Also, read this and follow the AWS pentesting rules. Cloud Tests One is a review of the external facing posture, which you can consider adjacent to a traditional External Read More …
AuKill EDR Post
Summary AuKill is a malicious software, often used by ransomware groups, designed to disable endpoint detection and response (EDR) security solutions on a system, essentially allowing attackers to bypass security measures before deploying ransomware by terminating EDR processes using a vulnerable, outdated driver like the Process Explorer driver from Sysinternals; effectively “killing” the EDR functionality. Key points about Read More …
Hook Chain EDR Kill
Summary Every binary loaded into WIndows, has a list of needed functions and processes in order for it to function properly. THink of a browser, it will use a Windows DLL to resolved the hostname to the IPv4 address and so forth. This Table can be hijacked, so instead of pointing to the appropriate function Read More …
Notes on “Paved Road”
Lessons from Securing Internal Applications WebappSec Link Building a Security Platform Engineering Team “”” I’m a big fan of building security into existing processes, a term coined as “secure paved roads” by Jason Chan, Ex-Netflix CISO. The idea behind this is that security should mostly be invisible. The average employee should simply not have to Read More …
Studio Notes – Limiters
With acoustic guitars you will hear some strums that are really loud and some strums that aren’t quite as loud. It could be very well played but you will still have some variation between strums. Sometimes the dynamic is quite loud and a compressor sometimes just can’t get a hold of that because the difference Read More …
What is DTLS and where do I use it?
It’s best suited for small- to medium-sized businesses with deployments that range from tens to a few hundred computers. A provisioning package (. ppkg) is a container for a collection of configuration settings. Use the Windows Configuration Designer tool to create provisioning packages to easily configure devices running Windows client. Windows Configuration Designer is primarily Read More …
Studio Notes – Realistic programmed hi-hats
Programmed hi-hats have way of feeling programmed. Duh. Here are some ways to put some realism into that hi hat part. First copy the track so you have a second programmed hat and you can always revert your changes back. Another option would be to save right before starting, with a slightly different name.