Filter by :
7 results found on

"attack"

Tall Tales from a Large Man
Tall Tales from a Large Man
See Aaron James Draplin of the Draplin Design Co., in his trademark presentation style, share some of his amazing graphic design work, along with the highs and lows of his ferociously independent existence in the cutthroat world of contemporary graphic design. As Draplin tells his tall tales, you'll learn about:• His loves: his tools, his independence, and his mom and dad. He hates a couple of things, too.• How young designers can be inspired to attack their design futures in different ways.• Why established designers may — or may not — leave feeling grateful they don't have anything to do with him. Hard to say. Be there!
  • Views: 3,475
  • Added: May 06, 2013
  • Runtime: 00:48:12
Litter belongs in the trashcan
Litter belongs in the trashcan
Litter in the Trash Can provides a humorous look at the effect littering has, not only on the Everett campus, but also within our planet as a whole. One student’s daydream turns into a nightmare when a walking pile of garbage, which should have been properly thrown, stands up and attacks him on campus!
  • Creative Suite Master Collection
  • Product Version: CC
  • Views: 102
  • Added: May 11, 2011
  • Runtime: 00:01:37
  • Tags: AYV Live event, Adobe Youth Voices, san francisco
Sandboxing Adobe Reader: Protected Mode
Sandboxing Adobe Reader: Protected Mode
Join Suchit Mishra, Acrobat lead security researcher, and Steve Gottwals, group product manager, as they help separate fact from fiction in the buzz around Adobe Reader security. We'll outline the motivation behind Protected Mode and give a demonstration of Reader running in the sandbox. We'll discuss how Reader Protected Mode works and how it can protect end users from Internet attacks via malicious PDF files.
  • Views: 700
  • Added: Oct 27, 2010
  • Runtime: 01:11:04
Cross-site Scripting
Cross-site Scripting
Platform Security Strategist Peleus Uhley covers the fundamentals of secure ActionScript coding. In this episode, he explains the dangers of cross-site scripting attacks and how to prevent them.
  • Flash Professional
  • Product Version: CC
  • Views: 8,284
  • Added: Oct 05, 2010
  • Runtime: 00:10:26
  • Tags: Flash, Platform, actionscript, code, coding, cross-site, scripting, secure, security, site
Attack Of The Pooluting Zombies - Cinequest 2010
Attack Of The Pooluting Zombies - Cinequest 2010
When the Junker cars of the world turn against the humans they release a viral disease in the clouds of smog they leave behind. The virus causes humans to turn into mindless plant eaters. Who can save the world from the Pootlutting Zombies?
  • Creative Suite Design Premium
  • Product Version: CC
  • Views: 94
  • Added: Aug 19, 2010
  • Runtime: 00:02:03
Killzone 2 Webgame by Agency Republic
Killzone 2 Webgame by Agency Republic
Agency Republic's Killzone 2 Webgame draws gamers into the world of multi-player shooter games with a teaser campaign of surprise "attacks" while surfing the Internet. The online game was created using several Creative Suite 4 Master Collection components, including After Effects CS4.
  • After Effects
  • Creative Suite Master Collection
  • Product Version: CC
  • Views: 716
  • Added: Mar 09, 2010
  • Runtime: 00:00:27
  • Tags: after effects, creative suite, killzone game, max awards
RIA Problems You Never Expected: Service Security
RIA Problems You Never Expected: Service Security
It is important to cultivate the mentality of security first. In this video, Kevin Hoyt discusses numerous access points for malicious attacks, as well as accidental data leaks.
  • Flex SDK
  • Product Version: CC
  • Views: 1,394
  • Added: Feb 02, 2010
  • Runtime: 00:05:24
  • Tags: code, coding, developer, flex, lcds, livecycle, online, privacy, ria, security
Copyright © 2014 Adobe Systems Incorporated. All rights reserved.
Use of this website signifies your agreement to the Terms of Use and Privacy Policy and Cookies