Tuesday, March 25, 2008

Produce A Film...

March 2008

Here is a COLLECTION OF INFO that has been accumulated throughout the years when it comes to PRODUCING A FILM from the experts. Some of this stuff is good for everyone, in all aspects of life when it comes to setting up projects.

Hope you enjoy the info that was made through practical efforts of gut, sweat and tears:

FILM PRODUCTION
http://www.wildsound-filmmaking-feedback-events.com/film_production.html

TIME MANAGEMENT
http://www.wildsound-filmmaking-feedback-events.com/time_management.html

Rules of the Trade of Hiring the best Crew you can.
http://www.wildsound-filmmaking-feedback-events.com/hiring_your_crew.html

NEGOTIATING
http://www.wildsound-filmmaking-feedback-events.com/negotiating.html Negotiating

FILM AGREEMENTS
http://www.wildsound-filmmaking-feedback-events.com/film_agreements.html

MEETINGS
http://www.wildsound-filmmaking-feedback-events.com/meetings.htmlMeetings

GOOD, CHEAP and FAST
http://www.wildsound-filmmaking-feedback-events.com/good_cheap_and_fast.html

FILM BUDGETING
href="http://www.wildsound-filmmaking-feedback-events.com/film_budget_rules.html

FILM PRODUCER QUOTES
href="http://www.wildsound-filmmaking-feedback-events.com/film_producer_quotes.html

You'll also love our http://www.wildsound-filmmaking-feedback-events.com/one_page_screenplay_competition_II.html
One Page Screenplay Competition

SUBMISSION DEADLINE APPROACHING
WILDsound Film and Screenplay Festival

Deadline approaching. Be a part of the fastest growing and most unique Film Festival in the world today:

FILM SUBMISSIONS - See the full details to submit your film
http://www.wildsound-filmmaking-feedback-events.com/film-festival-submissions.html

SCREENPLAY SUBMISSIONS - See the full details to submit your script
http://www.wildsound-filmmaking-feedback-events.com/screenplay-submissions.html

Thanks Jen Frankel from Toronto, ON

Tuesday, March 18, 2008

Cyber Storm...

March 2008

DHS conducts Cyber Storm II to examine cyber preparedness, response capabilities. The Department of Homeland Security (DHS) is conducting the largest cyber security exercise ever organized. Cyber Storm II is being held from March 10-14 in Washington , D.C. and brings together participants from federal, state and local governments, the private sector and the international community. Cyber Storm II is the second in a series of congressionally mandated exercises that will examine the nation’s cyber security preparedness and response capabilities. The exercise will simulate a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets. “Securing cyberspace is vital to maintaining America ’s strategic interests, public safety, and economic prosperity,” said DHS’s assistant secretary for Cyber Security and Communications. “Exercises like Cyber Storm II help to ensure that the public and private sectors are prepared for an effective response to attacks against our critical systems and networks,” he said. Cyber Storm II will include 18 federal departments and agencies, nine states (Calif., Colo., Del., Ill., Mich., N.C., Pa., Texas and Va.), five countries (United States, Australia, Canada, New Zealand and the United Kingdom), and more than 40 private sector companies.

Monday, March 03, 2008

Malicious Adobe Integrated Code...

March 2008

Security experts warn of potential

malicious AIR code. On Monday, Adobe Systems rolled out its new Web 2.0 development tool, Adobe Integrated Runtime, or AIR. Following its release were some concerns from the security community. AIR, formerly Adobe Apollo, is a runtime environment that allows developers use HTML, Flash, AJAX, Flex, and other Web 2.0 tools to create desktop applications. One such application built using Adobe AIR comes from Nickelodeon Online. But some security experts are concerned about local file access by AIR applications. Recently, Firefox experienced a vulnerability that could have allowed remote attackers to access a targeted file system. To mitigate this, Adobe says it implemented a sandboxing environment, however, Adobe’s documentation suggests that the sandboxes are less secure than a Web browser’s sandbox. Additionally, Adobe says that AIR applications need to be digitally signed, however, these certificates can be self-signed. And many users will ignore the warnings and run untrusted applications. Finally, there is the potential for Cross-Site Scripting (XSS), SQL injection, and local link injection. While these threats are not limited to Adobe AIR, developers could gain a false sense of security by relying only on AIR’s weaker sandbox protection. Adobe has also provided the following: an informative article titled “Introduction to AIR security” and a white paper; “AIR Security” (PDF). But the Sans Internet Storm Center site, notes that “many developers will be unaware of Adobe AIR security best practices or will knowingly take shortcuts that expose end users to attacks.”

Cold Boot’ Encryption Hack...

March 2008


Users can keep thieves from stealing encrypted data by changing some settings in Windows, a Microsoft Corp. product manager said as he downplayed the threat posed by new research that shows how attackers can inspect a “ghost” of computer memory. A senior product manager for Windows Vista security reacted Friday to reports last week about a new low-tech technique that could be used to lift the encryption key used by Vista’s BitLocker or Mac OS X’s FileVault. Once an attacker has the key, of course, he could easily access the data locked away on an encrypted drive. The method – dubbed “Cold Boot” because criminals can boost their chances by cooling down the computer’s memory with compressed gas or even liquid nitrogen – relies on the fact that data does not disappear instantly when a system is turned off or enters “sleep” mode. Instead, the bits stored in memory chips decay slowly, relatively speaking. Cooling down memory to -58 degrees Fahrenheit (-50 degrees Celsius) would give attackers as long as 10 minutes to examine the contents of memory, said the researchers from Princeton University, the Electronic Frontier Foundation and Wind River Systems Inc. And when they pushed the envelope and submersed the memory in liquid nitrogen to bring the temperature down to -310 degrees Fahrenheit (-190 degrees Celsius), researchers saw just 0.17 percent data decay after an hour. But the Vista security blog contended that such a risk is unlikely, as an attacker would need physical access to a machine in “sleep” mode, rather than in “hibernate” mode or powered off. But even as the Vista security blog downplayed the chance of an attack, it also spelled out ways users of BitLocker – the full-disk encryption feature included in Vista Ultimate and Vista Enterprise – could protect their laptops from a Cold Boot.