Set aside a few hours this coming weekend to renew all your passwords…but start with the ones that are already broken and known in the DarkUniverse. And how do you know which those are?
Check this site: have i been pwned?
[……]
Eventually, there will be FAQs, but until then, please enjoy this selection of Glossaries.
Exhibition Glossaries
Warner Bros. Digital Cinema Glossary – (PDF)
Rex Beckett's dicineco DCinema Glossary (Online)
Council of Europe's Glossary Digitisation (DOC)
XDC's DC Glossary (PDF)
Michael Karagosian's MKPE Digital Cinema Technology FAQ
Michael Karagosian's MKPE Digital Cinema Business FAQs
Dolby's Digital Cinema Glossary (pdf)
Dolby's Digital Cinema Glossary – (Online)
Europa Distribution DC Glossary (PDF)
DCI DCinema Specs 1.1 Glossary (PDF)
Post Production/Mastering Glossaries
EDCF's Mastering Guide Glossary – (PDF)
Phil Green' s Digital Intermediate Guide (Online)
Surreal Road's Digital Intermediate Primer (Online)
Surreal Road's Digital Intermediate FAQ (Online)
Surreal Road's Digital Intermediate Glossary (Online)
Digital Rebellions' Post Production Glossary (Online)
3D Glossary
ev3's 3D Glossary
Production Glossaries
Moving Picture Companies Jargon Explained (Online)
Octamas Film Production DC Glossary (Online)
Pocket Lint's Glossary of 3D Terms (Online)
Kodak's Glossary of Film – (Online)
Kodak's Cinema and Television Glossary (Online)
Sony's ABCs of Digital Cinema (PDF)
Associated Glossaries
Christie's Technology Explained (OnLine)
Sony's Audio Glossary (PDF)
Set aside a few hours this coming weekend to renew all your passwords…but start with the ones that are already broken and known in the DarkUniverse. And how do you know which those are?
Check this site: have i been pwned?
[……]
Set aside a few hours this coming weekend to renew all your passwords…but start with the ones that are already broken and known in the DarkUniverse. And how do you know which those are?
Check this site: have i been pwned?
[……]
The Untold Story of NotPetya, the Most Devastating Cyberattack in History
An amazing story in Wired about several companies with backup plans and many employees dedicated to IT…who got owned in the worst way.
There are many lessons here.
[……]
The Untold Story of NotPetya, the Most Devastating Cyberattack in History
An amazing story in Wired about several companies with backup plans and many employees dedicated to IT…who got owned in the worst way.
There are many lessons here.
[……]
WPA2 is the most common protocol used for protecting WiFi signals from being used by nefarious people for horrible things. As of 16 October, WPA – and all its variants of WPA1, WPA2, personal and enterprise, including with TKIP, AES and GCMP – is officially broken. Until repairs are made to all equipment involved in a WiFi network – that means, equipment providing the signal and equipment using the signal – it is no longer a valuable security tool. The force is called KRACK = Key Reinstallation Attacks
[……]
WPA2 is the most common protocol used for protecting WiFi signals from being used by nefarious people for horrible things. As of 16 October, WPA – and all its variants of WPA1, WPA2, personal and enterprise, including with TKIP, AES and GCMP – is officially broken. Until repairs are made to all equipment involved in a WiFi network – that means, equipment providing the signal and equipment using the signal – it is no longer a valuable security tool. The force is called KRACK = Key Reinstallation Attacks
[……]
Doing what open source does best, a patch has been released for an Apache vulnerability for those using a very popular REST interface iteration. Quickly, efficiently, patched…except, you have to update/upgrade and restart the service.
So, get to it. Don’t believe me, read this article: Patch Released for Critical Apache Struts Bug | Threatpost | The first stop for security news
[……]
Doing what open source does best, a patch has been released for an Apache vulnerability for those using a very popular REST interface iteration. Quickly, efficiently, patched…except, you have to update/upgrade and restart the service.
So, get to it. Don’t believe me, read this article: Patch Released for Critical Apache Struts Bug | Threatpost | The first stop for security news
[……]
If you work for a large corporation, you are probably already familiar with the extra steps and heartache and benefits of using a VPN service between[……]
If you work for a large corporation, you are probably already familiar with the extra steps and heartache and benefits of using a VPN service between[……]
I finally got a chance to see Rogue One: A Star Wars Story recently (I know, I’m late to the game, but I was off my feet for a few weeks around the holidays). It got me thinking about data backups and data security. Whether you’re in a small business, an enterprise, the Imperial Forces, or just backing up a home computer, the same rules apply.
[……]
I finally got a chance to see Rogue One: A Star Wars Story recently (I know, I’m late to the game, but I was off my feet for a few weeks around the holidays). It got me thinking about data backups and data security. Whether you’re in a small business, an enterprise, the Imperial Forces, or just backing up a home computer, the same rules apply.
[……]
I finally got a chance to see Rogue One: A Star Wars Story recently (I know, I’m late to the game, but I was off my feet for a few weeks around the holidays). It got me thinking about data backups and data security. Whether you’re in a small business, an enterprise, the Imperial Forces, or just backing up a home computer, the same rules apply.
[……]
With terrific focus and perhaps no small degree of overkill, digital cinema has provided a secure distribution path for artists’ valuable materials without any history of break-in.
But as security specialist Bruce Schneier draws out, none of us live in a one computer environment anymore.
[……]
With terrific focus and perhaps no small degree of overkill, digital cinema has provided a secure distribution path for artists’ valuable materials without any history of break-in.
But as security specialist Bruce Schneier draws out, none of us live in a one computer environment anymore.
[……]