Connect with us

Technology

Think twice before using public computers: Here's why

Published

on

Think twice before using public computers: Here's why

Ever found yourself in a pinch, needing to check your email or print a document while you’re out and about? Maybe you’re traveling and need to send a quick message, or perhaps you’re at a coffee shop and want to catch up on work. Public computers in libraries, hotel lobbies or internet cafes might seem like a lifesaver in these moments. But hold up. Before you start typing away, let’s discuss why you should think twice before using these shared machines.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Public computers may seem convenient, but there are hidden dangers. (Kurt “CyberGuy” Knutsson)

The sneaky dangers of public computers

1) Malware mayhem

Here’s a situation you may be confronted with. You’re checking your social media on a library, cafe or hotel lobby computer, but little do you know, there’s a digital gremlin lurking in the background. Yep, malware on public computers. These nasty programs can snatch your passwords, personal messages and even financial details faster than you can say “identity theft.”

2) Privacy? What privacy?

Using a public computer is like having a conversation in a crowded room: everyone can potentially hear (or see) what you’re up to. Browsers on these machines might be set up to remember everything you do. Your search history, saved passwords and that embarrassing social media video you watched? All are potentially up for grabs by the next user.

Advertisement

Public computers at a library (Kurt “CyberGuy” Knutsson)

11 THINGS TO ADD TO YOUR PRIVACY CHECKLIST ONLINE ASAP

3) Session hijacking

Imagine logging into your email and then grabbing a coffee while still logged in. In that brief moment, a tech-savvy criminal could hijack your active session, gaining full access to your account without needing your password. They could send emails as you, access your contacts or worse, all while you’re blissfully unaware.

4) Shoulder surfing

Public computers are often in busy areas where anyone can glance at your screen. A seemingly innocent bystander could be memorizing your passwords, credit card details or other sensitive information as you type. This low-tech but effective method of information theft is surprisingly common.

5) USB port peril

Those convenient USB ports on public computers? They might be secretly housing “USB killers,” which are devices that can fry your external drive or smartphone when plugged in. Or worse, they could be set up to automatically copy data from any device connected to them.

Advertisement

6) Fake login pages

Cybercriminals sometimes set up convincing fake login pages on public computers. You think you’re logging into your account, but you’re actually handing your credentials directly to a hacker. These phishing attempts can be incredibly sophisticated and hard to spot.

7) Screen capture software

Some public computers may have screen capture software installed, taking periodic screenshots of user activity. This means even if you’re careful about what you type, sensitive information displayed on the screen could still be captured and stored.

8) Compromised hardware

It’s not just the software you need to worry about. Hardware keyloggers – small devices that record every keystroke – can be physically attached to public computers without being easily noticeable. These devices can capture everything you type, from passwords to private messages.

By understanding these hidden risks, you can better protect yourself when using public computers. Remember, when it comes to shared machines, it’s always better to err on the side of caution.

Public computers at a library (Kurt “CyberGuy” Knutsson)

Advertisement

6 PRIVACY AND SECURITY MYTHS TO CLEAR UP ONCE AND FOR ALL

Best practices on a public computer

Alright, sometimes you just gotta use a public computer. I get it. But let’s make sure you’re not leaving digital breadcrumbs for the bad guys to follow:

  • Go incognito: Always use private browsing mode. It’s like wearing an invisibility cloak for your internet activities.
  • Log out, log out, log out: Triple-check that you’ve signed out of all accounts before you walk away.
  • Avoid sensitive stuff: Please, oh please don’t check your bank account or shop online using public computers. Save that for your secure home setup.
  • USB caution: Thinking of plugging in your USB drive? Think again. It’s an easy way to catch a digital virus.
  • Clear your tracks: Delete your browsing history, cache and any downloaded files. Leave no trace.

People working on computers at a library (Kurt “CyberGuy” Knutsson)

6 THINGS TO DO RIGHT NOW TO BOOST YOUR SECURITY AND PRIVACY BEFORE IT’S TOO LATE

How to clear your tracks after using a public computer

Here’s how to cover your digital footprints on different browsers when using a public computer. Be sure to do this before you log out:

Chrome:

  • Launch the Google Chrome browser on your computer.
  • Click the three dots in the top right corner of the browser window.
  • Tap History
  • Scroll down and click on Delete browsing data.
  • In the dialog that appears, select All time from the time range drop-down.
  • Check all boxes for the types of data you want to clear, such as Browsing history
  • Click on Delete data to complete the process

Firefox:

  • Click the menu button (three lines) in the top right
  • Choose Settings
  • Tap Privacy & Security
  • Under Cookies and Site Data, click Clear Data (Select History, Cookies and site data and temporary cached files and pages)

Safari:

  • Click Safari in the top menu
  • Select Clear History
  • Choose all history from the drop-down menu
  • Click Clear History

Edge:

  • Click the three dots in the top right
  • Go to Settings
  • Tap Privacy, Search, and Services
  • Under Delete browsing data, click Choose what to clear
  • Select all options and click Clear now

What if I use my own device on public Wi-Fi?

Using your own device is definitely safer than a public computer, but hold your horses: Public Wi-Fi can still be a digital minefield. Here’s how to stay safe when you’re surfing on public networks:

1) Use a VPN: Using a VPN helps protect you against being tracked and helps you identify your potential location on the websites you visit. Many sites can read your IP address and, depending on their privacy settings, may display the city from which you are corresponding. A VPN will disguise your IP address to show an alternate location. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

Advertisement

2) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Avoid sensitive transactions: Still not the best place for online banking or shopping. Save that for your secure home network.

4) Keep your software updated: Those pesky update notifications? They often include important security patches. So be sure to update your software on all your devices regularly.

5) Use two-factor authentication: 2FA is like having a second lock on your digital door.

By implementing these precautions, you can greatly minimize the risks linked to using public Wi-Fi. Always opt for your personal device with the right security measures instead of a public computer when accessing open networks. If you choose to use your own device – an option I highly recommend – consider avoiding public Wi-Fi altogether in such environments. Instead, you can utilize your iPhone or Android as a mobile hot spot for a more secure connection.

Advertisement

A person using their phone as a hot spot for their laptop (Kurt “CyberGuy” Knutsson)

Perks at public libraries

While navigating the potential pitfalls of public computers can feel daunting, your local library offers a wealth of free digital resources that can enhance your online experience without the associated risks. From borrowing e-books and audiobooks with apps like Libby and Hoopla to accessing free movies and career advice through Kanopy and LinkedIn Learning, libraries are treasure troves of valuable services. Are you curious about the tech goodies your library offers? Check out our article on free perks from the library. You might be pleasantly surprised by what’s available.

Public computers at a library (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

We’ve covered a lot of ground here, from the sneaky dangers lurking on public computers to the do’s and don’ts of using public Wi-Fi. The bottom line? Be cautious, be smart and always prioritize your digital safety. Remember, while public computers and Wi-Fi can be lifesavers in a pinch, they’re not without risks. If you absolutely must use them, follow our tips to minimize your exposure. But whenever possible, stick to your own devices and secure networks.

Have you ever faced any security issues while using public computers or Wi-Fi? If so, how did you handle the situation? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Advertisement

Copyright 2024 CyberGuy.com. All rights reserved.

Technology

Meta’s new deal with Nvidia buys up millions of AI chips

Published

on

Meta’s new deal with Nvidia buys up millions of AI chips

Meta has struck a multiyear deal to expand its data centers with millions of Nvidia’s Grace and Vera CPUs and Blackwell and Rubin GPUs. While Meta has long been using Nvidia’s hardware for its AI products, this deal “represents the first large-scale Nvidia Grace-only deployment,” which Nvidia says will deliver “significant performance-per-watt improvements in [Meta’s] data centers.” The deal also includes plans to add Nvidia’s next-generation Vera CPUs to Meta’s data centers in 2027.

Meta is also working on its own in-house chips for running AI models, but according to the Financial Times, it has run into “technical challenges and rollout delays” with its chip strategy. Nvidia is also dealing with concerns about depreciation and chip-back loans used to finance AI buildouts, as well as the pressure of competition. CNBC notes that Nvidia’s stock dropped four percent after a November report about Meta considering using Google’s Tensor chips for AI, and late last year, AMD announced chip arrangements with both OpenAI and Oracle.

Nvidia and Meta did not disclose how much the deal cost, but this year’s AI spending from Meta, Microsoft, Google, and Amazon is estimated to cost more than the entire Apollo space program.

Continue Reading

Technology

Criminals are using Zillow to plan break-ins. Here’s how to remove your home in 10 minutes.

Published

on

Criminals are using Zillow to plan break-ins. Here’s how to remove your home in 10 minutes.

NEWYou can now listen to Fox News articles!

The whole country is watching the Nancy Guthrie case. When the suspected kidnapping happened, I was curious. How long would it take me to find her home address and cell phone number on a people search site?

About 30 seconds.

STOP FOREIGN-OWNED APPS FROM HARVESTING YOUR PERSONAL DATA

I then pasted her address into Zillow and saw photos of her home. I could match what I found to the video from a home tour done on the Today show. I could see the layout. The entry points. The windows. Where her furniture sat. Imagine if I was a criminal armed with that info.

Advertisement

Here’s the thing: I’m not some hacker. I used free websites anyone can access from their couch.

This is happening everywhere

In Scottsdale, Arizona, two teens dressed as delivery drivers forced their way into a couple’s home. They duct-taped and assaulted the homeowners, looking for $66 million in cryptocurrency. They got the victims’ home address from strangers on an encrypted app.

Savannah Guthrie and mother Nancy Guthrie on Thursday, June 15, 2023. (Nathan Congleton/NBC via Getty Images)

In Delray Beach, Florida, a retired couple had their sliding glass door shattered by thieves. The attackers had their home address from leaked personal data. That crew went on to hit victims in multiple states.

Riverside, California, police confirmed detectives routinely find Zillow and Redfin searches on phones seized from arrested burglary suspects. 

Advertisement

A former NYPD detective put it bluntly: today’s burglars can case your home from their chair with a cup of coffee and get better intel than they ever could sitting outside with binoculars.

HOW TECH IS BEING USED IN NANCY GUTHRIE DISAPPEARANCE INVESTIGATION

The numbers are scary

Zillow’s database covers over 160 million homes. Listing photos often stay online long after a home is sold. That means photos of your home, taken when you listed it three, five, even 10 years ago, could still be sitting there right now showing every room, every door, every window and exactly where your security cameras are mounted.

Google Street View covers 10 million miles of road worldwide. Criminals use it to check out vehicles parked in driveways, scope backyards and plan escape routes. In some areas, police say thieves are even using drones to peer into windows and check for dogs.

Aerial drone shots of missing person Nancy Guthrie’s home on Tuesday, February 3, 2026 in Tucson, Arizona. Nancy Guthrie, mother of ‘Today’ show host Savannah Guthrie, is suspected of being abducted from her home earlier this week. (Fox Flight Team)

Advertisement

Anyone can type your name into a free people search site and get your home address in seconds. Then they plug it into Zillow and see your floor plan, entry points, window types and where the security cameras sit.

Unless you’re selling your home, take down your photos. Now.

Take it all down in 10 minutes

These steps can look a little different depending on your device, app version or browser. If it’s not exact, poke around. The option is there.

Zillow: Sign in at zillow.com. Click your profile icon > Your Home. Search your address, claim it, then go to Edit Facts and hide or delete the photos. Hit Save.

MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA

Advertisement

Redfin: Sign in at redfin.com. Go to Owner Dashboard. Select your home > Edit Photos > Hide listing photos > Save.

Realtor.com: Go to realtor.com/myhome. Claim your home, then select it under My Home > Remove Photos > Yes, Remove All Photos.

Google Street View: Open Google Maps on a computer. Search your address, drop into Street View, then click “Report a problem” (bottom right). Position the red box over your home. Under Request blurring, select “My home.” Submit. FYI, once it’s blurred, it’s permanent. Good.

A member of the Pima County sheriff’s office remains outside of Nancy Guthrie’s home, Monday, Feb. 9, 2026 in Tucson, Ariz. (Ty ONeil/AP Photo)

Pro tip: Ask your old listing agent to pull photos from the MLS. Once they’re gone from MLS, the feeder sites eventually follow.

Advertisement

Also, while you’re at it, search yourself on people search sites like Spokeo, WhitePages and BeenVerified. Most let you opt out. It takes some time per site, but it cuts off the first step criminals use to find you. Better bet is to sign up for Incogni, a sponsor of my national radio show and podcasts.

If you’re not selling, there’s zero reason for the internet to have a virtual tour of your home. Take it down today.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

I guess you could say Zillow gives everyone an open house. Problem is, you never sent the invitations.

Know someone who bought a home in the last few years? Forward this. Their listing photos are probably still online and they have no idea. You can sign up for my 5-star rated newsletter at my website, Komando.com. 

Advertisement

Copyright 2026, WestStar Multimedia Entertainment. All rights reserved.

Continue Reading

Technology

Legendary composer Laurie Spiegel on the difference between algorithmic music and ‘AI’

Published

on

Legendary composer Laurie Spiegel on the difference between algorithmic music and ‘AI’

In 1986, electronic music pioneer Laurie Spiegel created Music Mouse, a way for those with a Mac, Atari, or Amiga computer to dabble in algorithmic music creation. Music Mouse is deceptively simple: Notes are arranged on an XY grid, and you play it by moving a mouse around. Back in 1986, the computer mouse was still a relatively novel device. While it can trace its origins back to the late ’60s, it wasn’t until the Macintosh 128K in 1984 that it started seeing widespread adoption.

By then Spiegel, was already an accomplished composer. Her 1980 album The Expanding Universe is generally considered among the greatest ambient records of all time. And her composition “Harmony of the Worlds” is currently tearing through interstellar space as part of the Voyager Golden Record, launched in 1977. But she is also a technical wizard who joined Bell Labs in 1973 and was instrumental in early digital synthesis experiments and worked on an early computer graphics system called Vampire.

Spiegel was deeply drawn to algorithmic music composition and this new tool, the home computer. So, she created what she calls an “intelligent instrument” that enables the creation of complex melodies and harmonies with minimal music-theory knowledge. Music Mouse restricts you to particular scales, and then you explore them simply by pushing a mouse around.

Spiegel gives the user some control, of course. You can choose if notes move in parallel or contrary to each other, there are options to play notes back as chords or arpeggios, and there is even a simple pattern generator.

Despite being available for purchase until 2021, Spiegel never updated it to work on anything more current than Mac OS 9. Now, 40 years after its debut, it’s getting reborn for modern machines with help from Eventide.

Advertisement

Music Mouse is finally running on modern hardware.
Image: Eventide

While it would have been easy for Eventide and Spiegel to overload the 2026 version of Music Mouse with countless modern amenities and new features, they kept things restrained for version 1.0. The core feature set is the same, though the sound engine is more robust and includes patches based on Spiegel’s own Yamaha DX7. There are also some enhanced MIDI features, including the ability to feed data from Music Mouse into your DAW or an external synthesizer.

Laurie Spiegel answered some questions for us about the history of Music Mouse, algorithmic composition, AI, and why she thinks the computer is a “folk instrument.”

What were the origins of Music Mouse? Was there something specific that inspired its creation?

When the first Macs came out, the use of a mouse as an input device, as an XY controller, was altogether new. Previous computers had just alphanumeric keyboard input or maybe custom controllers. The most obvious thing I immediately wanted to do was to be able to push sound around with that mouse. So, as soon as the first C compilers came out, I coded up a way to do that. Pretty soon, though, I wanted the sound quantized into scales, then to add more voices to fill out the harmony. Then I wanted to have controls for timbre, tempo, and everything else I eventually added.

Advertisement

How did you connect with Eventide for this new version?

I first met Tony and Richard of Eventide all the way back in the early 1970s. They are longtime good friends. I’d been involved in various music tech projects at Eventide over the years. Tony knew that I really missed Music Mouse and that I still get a fair number of requests for the 1980s versions from people who keep vintage computers from that era just to be able to run Music Mouse or other obsolete software. He decided it was a musical instrument worth reviving. I had been wanting to revive it, but hadn’t been able to find the time to even just keep up with the way development tech keeps changing. My main thing is really composing music, and I have an active enough career doing that to not have enough time to do coding as well. I am extremely grateful to Eventide for resuscitating Music Mouse. I hope a lot of people will get a lot of music out of this new version.

Did you feel compelled to make any big changes to it after 40 years?

We decided to keep 1.0 of this new version of Music Mouse functionally the same as the 1980s original. The exceptions are adding a higher-quality internal synthesizer and providing ways to sync it with other software, to record or notate its MIDI output. We have a growing list of features to add in 2.0.

“It’s pretty easy by now to use computers to generate music-like material that is not actually the expression of an individual human being.”

Advertisement

Are there any current innovations in music tech that excite you?

That’s a hard question, because I am not all that excited about music tech right now. It’s music itself that holds my interest — composition, form, structure. I love counterpoint and the various contrapuntal forms. I studied them extensively when I was younger. Of course, harmonic progression is something I’m also very interested in, and in algorithmic assistance for composing it.

That various kinds of structures within music can now be more easily dealt with in computer software by now has both pros and cons. The pros include how much more deeply we have to understand how music works, how it is structured, and how it affects us, in order to represent it as a process description in software. That means learning, research, and self-discovery. The cons include that it’s pretty easy by now to use computers to generate music-like material that is not actually the expression of an individual human being. Music is a fundamental human experience. There is no human society that doesn’t have it. But it is something that comes from within human beings, as personal expression, as communication, as a sort of form of documentation of what we are feeling, and as a means of sharing it.

You’ve been credited as saying that the computer is a new kind of folk instrument. Can you explain what you mean by that? How does something like Music Mouse fit into that model?

Now that everyone with a computer or even just a phone has the ability to record and edit and play back and digitally process and transform sound, and particularly ever since sampling became a common musical technique, people have been doing remixes, collages, sonic montages… doing all kinds of stuff to audio they get from others or find online. This is very like what we used to call “the folk process,” in which music is repurposed, re-orchestrated, given new lyrics or otherwise modified as it goes from person to person and is adapted to fit what is meaningful in successive groups of people.

Advertisement

Music Mouse will help people create musical materials that can be used in a potentially infinite number of ways. It is a personal, often home-based instrument played by an individual, like a guitar.

Laurie Spiegel in 1990 in front of her Mac and a large collection of synths and other audio gear.

Laurie Spiegel in 1990 working at her Macintosh.
Image: Marilyn McLaren

You refer to Music Mouse as an “intelligent instrument”; it automates a certain amount of creation. What is the appeal of letting a computer take the wheel to a degree, as an artist?

Music Mouse is not a generative algorithm or an “AI.” It’s a musical instrument that a person can play. It is, to some degree, what we used to call an “expert system,” as it has some musical expertise built in. But that is meant to be supportive for the real live human being who is playing it, not to replace them. It makes the playing of notes easier in order to let the player’s focus be on the level of phrasing or form. I have coded up generative algorithms for music. Music Mouse is not one of them. It’s an instrument that an individual can play, and it’s under their control. It enables a different perspective that’s from above the level of the individual note.

Do you see a connection between modern generative AI and algorithmic composition tools?

Of course. Algorithms can be used to generate music. I have written and used some. Music Mouse is not generative, though. It does nothing on its own. It’s a musical instrument played by a person.

Advertisement

What is currently called “AI” is different from previous generations of artificial intelligence. I expect there will doubtless be further evolution. In the early years of my use of computer logic in composing, AI was more of a rule-based practice. We would try to figure out how the mind was making a specific kind of decision, code up a simulation to test our hypothesis, and then refine our understanding in light of the result. After that, there was a period of AI taking more of a brute-force approach. Computer chess, for example, would involve generating all possible moves possible in a given situation, then eliminating those that would be less beneficial. Then neural nets were brought in for a next generation of AI. I look forward to getting beyond the imitative homogenizing LLM approach and seeing whatever comes next.

There are many ways of designing an algorithm that either generates music or else helps a human being to do that, making some of the decisions during the person’s creative process to leave them free to focus on other aspects. By taking over some of the decision-making, they can free a creative mind to focus on different perspectives. People just starting to learn music too often bog down and give up at the level of simply playing the notes, just figuring out where to put their fingers. We can make musical instruments now that let people use a bit of automation on those low levels to let them express themselves on a larger level, for example, to make gestures in texture-space rather than thinking ahead just one note at a time.

“Music Mouse is not a generative algorithm or an ‘AI.’ It’s a musical instrument that a person can play.”

What do you think separates algorithmically generated music from something created by generative AI?

Artificial intelligence refers to a specific subset of ways to use algorithms. An algorithm is just a description of a process, a sequence of steps to be taken. A generative algorithm can make decisions involved in the production of information, and, of course, music is a kind of information. You can think of AI as trying to simulate human intelligence. It might have a purpose, such as taking over some of our cognitive workload. In contrast, the purpose of generative algorithms is to create stuff. In music, that purpose is to create an experience.

Advertisement

Music Mouse is not a generative algorithmic program. It’s more of a small expert system in that it has built into it information and methods that can help its player get beyond the level of just finding notes, to the level of finding personal expression.

Suno’s CEO Mikey Shulman has said that, “Increasingly taste is the only thing that matters in art and skill is going to matter a lot less.” In an age where music can be easily created using algorithms, plug-ins, and text prompts on cheap laptops and smartphones, do you see the role of composer being one primarily of curation?

I can see where he’s coming from, but, no, I don’t think so. The range and kinds of skills used in the creative arts will continue to evolve and expand. But the history of creative techniques shows them to be largely cumulative versus sequential. The keyboard synthesizer has not replaced the piano, which has not replaced the harpsichord or the organ. We have them all, that whole lineage, all still in use. Each musical instrument or artistic technique implies its own unique artistic realm. Each is defined by its specific limitations, which guide us as we use them. It is true that skills and traditional techniques will be an option rather than a prerequisite to creating music and art, but people will still do them. Just as LPs and chemical film have made comebacks recently, I expect to see traditional musical skills do the same. We have had computers and synthesizers for decades, yet there are still little children captivated by instruments made out of wood or painting or drawing, and I have yet to use any music editing software that gives me the fluidity and freedom of a pencil on staff paper. There will just be more kinds of complementary ways of making music.

More importantly, we humans have imaginations and emotions. There are internal experiences going on inside of us that we feel driven to express, to communicate, to share. It doesn’t matter what machines can generate on their own. We will always have those internal subjective experiences, emotion, and imagination, and people will experience them intensely enough to feel driven to create them external to their own selves in order to communicate and share them. You can’t replace human self-expression or the need for it by simulating their results. Artistic creation comes from a fundamental human drive, the need for self-expression. Artistic creativity is an essential method of processing the intensity of being alive.

Laurie Spiegel in the studio in 1985.

Laurie Spiegel in the studio in 1985.
Image: Enrico Ferorelli

You told New Music USA in 2014 that, in regard to electronic music, “There is no single creator… the concept of a finite fixed-form piece with an identifiable creator that is property and a medium of exchange or the embodiment of economic value really disappears.” Does this idea shape your views on ownership of art?

Advertisement

Those assumptions, which we inherited from the European classical model of music, are already much less prominent in our musical landscape. Improvisation, “process pieces,” the ease with which we can do transformations of audio files are all over the place. Folk music, and a lot of what we heard online here and there, might be audio that no longer has any known originator. We don’t know, and people don’t really care, who first created a swatch of sound. We are experiencing whatever has been done with it — different orchestrations, durations, signal processing. The huge proliferation of plug-ins and guitar effects pedals let anyone transform a sound beyond recognition. This is composition on a different level than on the level of the individual note, similarly to Music Mouse.

Another very important aspect of “folk music” is that it is typically played at home, with or for friends or family, or alone. This is very different from formal concert settings and programming we in the US inherited from Europe. For me, the most important musical experience is just about always at home, where we live. To quote what Pete Seeger said in his write-up of Music Mouse in Sing Out, that “she [meaning me] foresees a day when computer pieces will be like folksongs, anonymous common property to be altered by each new user. She would like to get music out of the concert hall and back into the living room.”

Music Mouse is available for macOS and Windows 11 for $29.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading
Advertisement

Trending