9:32
|
13:17
|
17:52
|
6:29
|
What is Windows Azure? English
Just what is Windows Azure. Join me in this brief video for an introduction to Windows Azure. We will explore its components the key features and discuss why you should care.
Just what is Windows Azure. Join me in this brief video for an introduction to Windows Azure. We will explore its components the key features and discuss why you should care.
2:36
|
3:37
|
19:08
|
Draggable OS Style Windows Flash Tutorial Actionscript 3.0 - English
Free Source - http://www.developphp.com
Learn how to create operating system style windows for your flash actionscript 3.0 projects. We make sure that the window top bar is the only thing that can...
Free Source - http://www.developphp.com
Learn how to create operating system style windows for your flash actionscript 3.0 projects. We make sure that the window top bar is the only thing that can be grabbed and dragged around to produce the effect we want. To see how I used it on my site check out www.flashbuilding.com
More...
Description:
Free Source - http://www.developphp.com
Learn how to create operating system style windows for your flash actionscript 3.0 projects. We make sure that the window top bar is the only thing that can be grabbed and dragged around to produce the effect we want. To see how I used it on my site check out www.flashbuilding.com
4:05
|
GIMP - Windows Download & Install - English
n this video I demonstrate the process of downloading and installing the GIMP for Windows
n this video I demonstrate the process of downloading and installing the GIMP for Windows
10:40
|
Cracking Stuxnet - A 21st-century cyber weapon against Iran - Ralph Langner - English
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and...
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target -- and its covert origins. In a fascinating look inside cyber-forensics, he explains how.
The idea behind the Stuxnet computer worm is actually quite simple. We don't want Iran to get the Bomb. Their major asset for developing nuclear weapons is the Natanz uranium enrichment facility. The gray boxes that you see, these are real-time control systems. Now if we manage to compromise these systems that control drive speeds and valves, we can actually cause a lot of problems with the centrifuge. The gray boxes don't run Windows software; they are a completely different technology. But if we manage to place a good Windows virus on a notebook that is used by a maintenance engineer to configure this gray box, then we are in business. And this is the plot behind Stuxnet.
So we start with a Windows dropper. The payload goes onto the gray box, damages the centrifuge, and the Iranian nuclear program is delayed -- mission accomplished. That's easy, huh? I want to tell you how we found that out. When we started our research on Stuxnet six months ago, it was completely unknown what the purpose of this thing was. The only thing that was known is very, very complex on the Windows part, the dropper part, used multiple zero-day vulnerabilities. And it seemed to want to do something with these gray boxes, these real-time control systems. So that got our attention, and we started a lab project where we infected our environment with Stuxnet and checked this thing out. And then some very funny things happened. Stuxnet behaved like a lab rat that didn't like our cheese -- sniffed, but didn't want to eat. Didn't make sense to me. And after we experimented with different flavors of cheese, I realized, well, this is a directed attack. It's completely directed. The dropper is prowling actively on the gray box if a specific configuration is found, and even if the actual program that it's trying to infect is actually running on that target. And if not, Stuxnet does nothing.
So that really got my attention, and we started to work on this nearly around the clock, because I thought, well, we don't know what the target is. It could be, let's say for example, a U.S. power plant, or a chemical plant in Germany. So we better find out what the target is soon. So we extracted and decompiled the attack code, and we discovered that it's structured in two digital bombs -- a smaller one and a bigger one. And we also saw that they are very professionally engineered by people who obviously had all insider information. They knew all the bits and bites that they had to attack. They probably even know the shoe size of the operator. So they know everything.
And if you have heard that the dropper of Stuxnet is complex and high-tech, let me tell you this: the payload is rocket science. It's way above everything that we have ever seen before. Here you see a sample of this actual attack code. We are talking about -- round about 15,000 lines of code. Looks pretty much like old-style assembly language. And I want to tell you how we were able to make sense out of this code. So what we were looking for is first of all is system function calls, because we know what they do.
And then we were looking for timers and data structures and trying to relate them to the real world -- to potential real world targets. So we do need target theories that we can prove or disprove. In order to get target theories, we remember that it's definitely hardcore sabotage, it must be a high-value target, and it is most likely located in Iran, because that's where most of the infections had been reported. Now you don't find several thousand targets in that area. It basically boils down to the Bushehr nuclear power plant and to the Natanz fuel enrichment plant.
So I told my assistant, "Get me a list of all centrifuge and power plant experts from our client base." And I phoned them up and picked their brain in an effort to match their expertise with what we found in code and data. And that worked pretty well. So we were able to associate the small digital warhead with the rotor control. The rotor is that moving part within the centrifuge, that black object that you see. And if you manipulate the speed of this rotor, you are actually able to crack the rotor and eventually even have the centrifuge explode. What we also saw is that the goal of the attack was really to do it slowly and creepy -- obviously in an effort to drive maintenance engineers crazy, that they would not be able to figure this out quickly.
The big digital warhead -- we had a shot at this by looking very closely at data and data structures. So for example, the number 164 really stands out in that code; you can't overlook it. I started to research scientific literature on how these centrifuges are actually built in Natanz and found they are structured in what is called a cascade, and each cascade holds 164 centrifuges. So that made sense, it was a match.
And it even got better. These centrifuges in Iran are subdivided into 15, what is called, stages. And guess what we found in the attack code? An almost identical structure. So again, that was a real good match. And this gave us very high confidence for what we were looking at. Now don't get me wrong here, it didn't go like this. These results have been obtained over several weeks of really hard labor. And we often went into just a dead-end and had to recover.
Anyway, so we figured out that both digital warheads were actually aiming at one and the same target, but from different angles. The small warhead is taking one cascade, and spinning up the rotors and slowing them down, and the big warhead is talking to six cascades and manipulating valves. So in all, we are very confident that we have actually determined what the target is. It is Natanz, and it is only Natanz. So we don't have to worry that other targets might be hit by Stuxnet.
Here's some very cool stuff that we saw -- really knocked my socks off. Down there is the gray box, and on the top you see the centrifuges. Now what this thing does is it intercepts the input values from sensors -- so for example, from pressure sensors and vibration sensors -- and it provides legitimate code, which is still running during the attack, with fake input data. And as a matter of fact, this fake input data is actually prerecorded by Stuxnet. So it's just like from the Hollywood movies where during the heist, the observation camera is fed with prerecorded video. That's cool, huh?
The idea here is obviously not only to fool the operators in the control room. It actually is much more dangerous and aggressive. The idea is to circumvent a digital safety system. We need digital safety systems where a human operator could not act quick enough. So for example, in a power plant, when your big steam turbine gets too over speed, you must open relief valves within a millisecond. Obviously, this cannot be done by a human operator. So this is where we need digital safety systems. And when they are compromised, then real bad things can happen. Your plant can blow up. And neither your operators nor your safety system will notice it. That's scary.
But it gets worse. And this is very important, what I'm going to say. Think about this. This attack is generic. It doesn't have anything to do, in specifics, with centrifuges, with uranium enrichment. So it would work as well, for example, in a power plant or in an automobile factory. It is generic. And you don't have -- as an attacker -- you don't have to deliver this payload by a USB stick, as we saw it in the case of Stuxnet. You could also use conventional worm technology for spreading. Just spread it as wide as possible. And if you do that, what you end up with is a cyber weapon of mass destruction. That's the consequence that we have to face. So unfortunately, the biggest number of targets for such attacks are not in the Middle East. They're in the United States and Europe and in Japan. So all of the green areas, these are your target-rich environments. We have to face the consequences, and we better start to prepare right now.
Thanks.
(Applause)
Chris Anderson: I've got a question. Ralph, it's been quite widely reported that people assume that Mossad is the main entity behind this. Is that your opinion?
Ralph Langner: Okay, you really want to hear that? Yeah. Okay. My opinion is that the Mossad is involved, but that the leading force is not Israel. So the leading force behind that is the cyber superpower. There is only one, and that's the United States -- fortunately, fortunately. Because otherwise, our problems would even be bigger.
CA: Thank you for scaring the living daylights out of us. Thank you Ralph.
(Applause)
More...
Description:
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target -- and its covert origins. In a fascinating look inside cyber-forensics, he explains how.
The idea behind the Stuxnet computer worm is actually quite simple. We don't want Iran to get the Bomb. Their major asset for developing nuclear weapons is the Natanz uranium enrichment facility. The gray boxes that you see, these are real-time control systems. Now if we manage to compromise these systems that control drive speeds and valves, we can actually cause a lot of problems with the centrifuge. The gray boxes don't run Windows software; they are a completely different technology. But if we manage to place a good Windows virus on a notebook that is used by a maintenance engineer to configure this gray box, then we are in business. And this is the plot behind Stuxnet.
So we start with a Windows dropper. The payload goes onto the gray box, damages the centrifuge, and the Iranian nuclear program is delayed -- mission accomplished. That's easy, huh? I want to tell you how we found that out. When we started our research on Stuxnet six months ago, it was completely unknown what the purpose of this thing was. The only thing that was known is very, very complex on the Windows part, the dropper part, used multiple zero-day vulnerabilities. And it seemed to want to do something with these gray boxes, these real-time control systems. So that got our attention, and we started a lab project where we infected our environment with Stuxnet and checked this thing out. And then some very funny things happened. Stuxnet behaved like a lab rat that didn't like our cheese -- sniffed, but didn't want to eat. Didn't make sense to me. And after we experimented with different flavors of cheese, I realized, well, this is a directed attack. It's completely directed. The dropper is prowling actively on the gray box if a specific configuration is found, and even if the actual program that it's trying to infect is actually running on that target. And if not, Stuxnet does nothing.
So that really got my attention, and we started to work on this nearly around the clock, because I thought, well, we don't know what the target is. It could be, let's say for example, a U.S. power plant, or a chemical plant in Germany. So we better find out what the target is soon. So we extracted and decompiled the attack code, and we discovered that it's structured in two digital bombs -- a smaller one and a bigger one. And we also saw that they are very professionally engineered by people who obviously had all insider information. They knew all the bits and bites that they had to attack. They probably even know the shoe size of the operator. So they know everything.
And if you have heard that the dropper of Stuxnet is complex and high-tech, let me tell you this: the payload is rocket science. It's way above everything that we have ever seen before. Here you see a sample of this actual attack code. We are talking about -- round about 15,000 lines of code. Looks pretty much like old-style assembly language. And I want to tell you how we were able to make sense out of this code. So what we were looking for is first of all is system function calls, because we know what they do.
And then we were looking for timers and data structures and trying to relate them to the real world -- to potential real world targets. So we do need target theories that we can prove or disprove. In order to get target theories, we remember that it's definitely hardcore sabotage, it must be a high-value target, and it is most likely located in Iran, because that's where most of the infections had been reported. Now you don't find several thousand targets in that area. It basically boils down to the Bushehr nuclear power plant and to the Natanz fuel enrichment plant.
So I told my assistant, "Get me a list of all centrifuge and power plant experts from our client base." And I phoned them up and picked their brain in an effort to match their expertise with what we found in code and data. And that worked pretty well. So we were able to associate the small digital warhead with the rotor control. The rotor is that moving part within the centrifuge, that black object that you see. And if you manipulate the speed of this rotor, you are actually able to crack the rotor and eventually even have the centrifuge explode. What we also saw is that the goal of the attack was really to do it slowly and creepy -- obviously in an effort to drive maintenance engineers crazy, that they would not be able to figure this out quickly.
The big digital warhead -- we had a shot at this by looking very closely at data and data structures. So for example, the number 164 really stands out in that code; you can't overlook it. I started to research scientific literature on how these centrifuges are actually built in Natanz and found they are structured in what is called a cascade, and each cascade holds 164 centrifuges. So that made sense, it was a match.
And it even got better. These centrifuges in Iran are subdivided into 15, what is called, stages. And guess what we found in the attack code? An almost identical structure. So again, that was a real good match. And this gave us very high confidence for what we were looking at. Now don't get me wrong here, it didn't go like this. These results have been obtained over several weeks of really hard labor. And we often went into just a dead-end and had to recover.
Anyway, so we figured out that both digital warheads were actually aiming at one and the same target, but from different angles. The small warhead is taking one cascade, and spinning up the rotors and slowing them down, and the big warhead is talking to six cascades and manipulating valves. So in all, we are very confident that we have actually determined what the target is. It is Natanz, and it is only Natanz. So we don't have to worry that other targets might be hit by Stuxnet.
Here's some very cool stuff that we saw -- really knocked my socks off. Down there is the gray box, and on the top you see the centrifuges. Now what this thing does is it intercepts the input values from sensors -- so for example, from pressure sensors and vibration sensors -- and it provides legitimate code, which is still running during the attack, with fake input data. And as a matter of fact, this fake input data is actually prerecorded by Stuxnet. So it's just like from the Hollywood movies where during the heist, the observation camera is fed with prerecorded video. That's cool, huh?
The idea here is obviously not only to fool the operators in the control room. It actually is much more dangerous and aggressive. The idea is to circumvent a digital safety system. We need digital safety systems where a human operator could not act quick enough. So for example, in a power plant, when your big steam turbine gets too over speed, you must open relief valves within a millisecond. Obviously, this cannot be done by a human operator. So this is where we need digital safety systems. And when they are compromised, then real bad things can happen. Your plant can blow up. And neither your operators nor your safety system will notice it. That's scary.
But it gets worse. And this is very important, what I'm going to say. Think about this. This attack is generic. It doesn't have anything to do, in specifics, with centrifuges, with uranium enrichment. So it would work as well, for example, in a power plant or in an automobile factory. It is generic. And you don't have -- as an attacker -- you don't have to deliver this payload by a USB stick, as we saw it in the case of Stuxnet. You could also use conventional worm technology for spreading. Just spread it as wide as possible. And if you do that, what you end up with is a cyber weapon of mass destruction. That's the consequence that we have to face. So unfortunately, the biggest number of targets for such attacks are not in the Middle East. They're in the United States and Europe and in Japan. So all of the green areas, these are your target-rich environments. We have to face the consequences, and we better start to prepare right now.
Thanks.
(Applause)
Chris Anderson: I've got a question. Ralph, it's been quite widely reported that people assume that Mossad is the main entity behind this. Is that your opinion?
Ralph Langner: Okay, you really want to hear that? Yeah. Okay. My opinion is that the Mossad is involved, but that the leading force is not Israel. So the leading force behind that is the cyber superpower. There is only one, and that's the United States -- fortunately, fortunately. Because otherwise, our problems would even be bigger.
CA: Thank you for scaring the living daylights out of us. Thank you Ralph.
(Applause)
1:15
|
3:33
|
The Window farms Project-English
Contributed by syed_nadeemi. An amazing little video shows how people living in apartments are growing their own organic food in WINDOW FARMS The plants are grown from bottles connected vertically...
Contributed by syed_nadeemi. An amazing little video shows how people living in apartments are growing their own organic food in WINDOW FARMS The plants are grown from bottles connected vertically and watered by a small fish-tank pump You have to see this to believe it
More...
Description:
Contributed by syed_nadeemi. An amazing little video shows how people living in apartments are growing their own organic food in WINDOW FARMS The plants are grown from bottles connected vertically and watered by a small fish-tank pump You have to see this to believe it
1:18
|
[March for the Alternative] Protesters break into bank, clash with cops as London march turns violent-26Mar2011 -English
Tens of thousands of mostly peaceful demonstrators streamed into central London on Saturday to march against government budget cuts, with a small breakaway group smashing its way into a bank,...
Tens of thousands of mostly peaceful demonstrators streamed into central London on Saturday to march against government budget cuts, with a small breakaway group smashing its way into a bank, breaking windows and spray painting logos on the walls. Another group of black-clad protesters hurled paint bombs and ammonia-filled light bulbs at police. Organisers of the march estimated that at least 250,000 people from across the country were peacefully joining in the demonstration, the biggest protest in London since a series of rallies against the Iraq war in 2003. Police said they were not giving out crowd estimates.
More...
Description:
Tens of thousands of mostly peaceful demonstrators streamed into central London on Saturday to march against government budget cuts, with a small breakaway group smashing its way into a bank, breaking windows and spray painting logos on the walls. Another group of black-clad protesters hurled paint bombs and ammonia-filled light bulbs at police. Organisers of the march estimated that at least 250,000 people from across the country were peacefully joining in the demonstration, the biggest protest in London since a series of rallies against the Iraq war in 2003. Police said they were not giving out crowd estimates.
14:43
|
Magic Mouse Pan Image Windows Flash AS3 Tutorial CS3 CS4 - English
Download it FREE! - http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=308
Build a magic mouse pan image window with mask using AS3 in CS3 or CS4. Fully customizable.
Download it FREE! - http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=308
Build a magic mouse pan image window with mask using AS3 in CS3 or CS4. Fully customizable.
Electric Stream Animations Adobe After Effects Tutorial - English
Learn how to make custom lines animate in streaming plasma and electric patterns. Then render out an SWF that can be imported into flash for your website animations.
Wiki Facts:
Adobe After...
Learn how to make custom lines animate in streaming plasma and electric patterns. Then render out an SWF that can be imported into flash for your website animations.
Wiki Facts:
Adobe After Effects is primarily used for creating motion graphics and visual effects. After Effects allows users to animate, alter, and composite media in 2d and 3d space with various built-in tools and third party plug-ins, as well as individual attention to variables like parallax and user-adjustable angle of observation.
Both After Effects and some non-linear editing systems (NLEs) are layer-oriented, meaning that each individual media object (video clip, audio clip, still image, etc.) occupies its own track. In contrast, some NLEs use a system where individual media objects can occupy the same track as long as they do not overlap in time. This track-oriented system is more suited for editing and can keep project files much more concise. The layer-oriented system that After Effects adopts is suited for extensive effects work and keyframing. Although other compositing packages—especially ones that employ tree or node workflows, such as Apple Shake—are better suited to manage large volumes of objects within a composite, After Effects is able to somewhat counter the clutter by selectively hiding layers (using the Shy switch) or by grouping them into pre-compositions.
The main interface consists of several panels (windows in versions prior to After Effects 7.0). Three of the most commonly used panels are the Project panel, the Composition panel, and the Timeline panel. The Project panel acts as a bin to import stills, video, and audio footage items. Footage items in the Project panel are used in the Timeline panel, where layer order and timing can be adjusted. The items visible at the current time marker are displayed in the Composition panel.
After Effects integrates with other Adobe software titles such as Illustrator, Photoshop, Premiere Pro, Encore, and Flash.
More...
Description:
Learn how to make custom lines animate in streaming plasma and electric patterns. Then render out an SWF that can be imported into flash for your website animations.
Wiki Facts:
Adobe After Effects is primarily used for creating motion graphics and visual effects. After Effects allows users to animate, alter, and composite media in 2d and 3d space with various built-in tools and third party plug-ins, as well as individual attention to variables like parallax and user-adjustable angle of observation.
Both After Effects and some non-linear editing systems (NLEs) are layer-oriented, meaning that each individual media object (video clip, audio clip, still image, etc.) occupies its own track. In contrast, some NLEs use a system where individual media objects can occupy the same track as long as they do not overlap in time. This track-oriented system is more suited for editing and can keep project files much more concise. The layer-oriented system that After Effects adopts is suited for extensive effects work and keyframing. Although other compositing packages—especially ones that employ tree or node workflows, such as Apple Shake—are better suited to manage large volumes of objects within a composite, After Effects is able to somewhat counter the clutter by selectively hiding layers (using the Shy switch) or by grouping them into pre-compositions.
The main interface consists of several panels (windows in versions prior to After Effects 7.0). Three of the most commonly used panels are the Project panel, the Composition panel, and the Timeline panel. The Project panel acts as a bin to import stills, video, and audio footage items. Footage items in the Project panel are used in the Timeline panel, where layer order and timing can be adjusted. The items visible at the current time marker are displayed in the Composition panel.
After Effects integrates with other Adobe software titles such as Illustrator, Photoshop, Premiere Pro, Encore, and Flash.
22:34
|
آموزش کامپیوتر Computer Training Program صفحه كليد from IRIB2 - Farsi
Computer Training Program on movie maker and pdf file formats and quiz questions from IRIB2 - Farsi
آموزش کامپیوتر Computer Training Program صفحه كليد from IRIB2 - Farsi
Computer Training Program on movie maker and pdf file formats and quiz questions from IRIB2 - Farsi
آموزش کامپیوتر Computer Training Program صفحه كليد from IRIB2 - Farsi
آموزش کامپیوتر Computer Training Program صفحه كليد from IRIB2 - Farsi
Computer Training Program on movie maker and pdf file formats and quiz questions from IRIB2 - Farsi آموزش کامپیوتر Computer Training Program صفحه كليد from IRIB2 - Farsi
Computer Training Program on movie maker and pdf file formats and quiz questions from IRIB2 - Farsi آموزش کامپیوتر Computer Training Program صفحه كليد from IRIB2 - Farsi
9:28
|
png2ico Tutorial The Best Favicon Icon Creation Software How to Make Guide - English
Free Download: http://www.developphp.com/housefeed_freetool_view.php?id=23
Favicon.ico Wiki Info link:
http://en.wikipedia.org/wiki/Favicon
Learn to use a tool I have been using for years to...
Free Download: http://www.developphp.com/housefeed_freetool_view.php?id=23
Favicon.ico Wiki Info link:
http://en.wikipedia.org/wiki/Favicon
Learn to use a tool I have been using for years to quickly and easily create favicon.ico files for all of your client sites or your own. png2ico
More...
Description:
Free Download: http://www.developphp.com/housefeed_freetool_view.php?id=23
Favicon.ico Wiki Info link:
http://en.wikipedia.org/wiki/Favicon
Learn to use a tool I have been using for years to quickly and easily create favicon.ico files for all of your client sites or your own. png2ico
25:58
|
به رنگ رويا - Youths Program & آموزش کامپیوتر Computer Training صفحه كليد - Farsi
Information به رنگ رويا - Youths Program shopping and more - Farsi
به رنگ رويا - Youths Program & آموزش کامپیوتر Computer Training Program صفحه كليد -...
Information به رنگ رويا - Youths Program shopping and more - Farsi
به رنگ رويا - Youths Program & آموزش کامپیوتر Computer Training Program صفحه كليد - Farsi
More...
Description:
Information به رنگ رويا - Youths Program shopping and more - Farsi
به رنگ رويا - Youths Program & آموزش کامپیوتر Computer Training Program صفحه كليد - Farsi
آموزش کامپیوتر Computer Training Program صفحه كليد from IRIB2 - Farsi
Computer Training Program on movie maker and pdf file formats and quiz questions from IRIB2 - Farsi آموزش کامپیوتر Computer Training Program صفحه كليد from IRIB2 - Farsi
Computer Training Program on movie maker and pdf file formats and quiz questions from IRIB2 - Farsi آموزش کامپیوتر Computer Training Program صفحه كليد from IRIB2 - Farsi
28:44
|
2:46
|
Photoshop Tutorial Adobe Photoshop CS3 Tutorial - English
Adobe Photoshop CS3 is a photo-editing program that allows the user to alter digital images, such as making the image black and white, changing the color temperature, omitting certain areas or...
Adobe Photoshop CS3 is a photo-editing program that allows the user to alter digital images, such as making the image black and white, changing the color temperature, omitting certain areas or morphing the subject matter. Learn how to use a few key features in Photoshop with advice from a Photoshop user in this free video on photo-editing software.
Expert: Coming soon
Bio: Coming soon
Filmmaker: Christopher Rokosz
More...
Description:
Adobe Photoshop CS3 is a photo-editing program that allows the user to alter digital images, such as making the image black and white, changing the color temperature, omitting certain areas or morphing the subject matter. Learn how to use a few key features in Photoshop with advice from a Photoshop user in this free video on photo-editing software.
Expert: Coming soon
Bio: Coming soon
Filmmaker: Christopher Rokosz
11:55
|
Adobe Bridge Tutorial Learn the basics of the Bridge - English
This video was somehow automatically shortened by Youtube in Feb. of 2009. Instead of taking it down I decided to simply include a link to the full video on tutvid.com.
This tutorial is geared...
This video was somehow automatically shortened by Youtube in Feb. of 2009. Instead of taking it down I decided to simply include a link to the full video on tutvid.com.
This tutorial is geared toward new Adobe Bridge users, with the hopes of getting you firmly situated and comfortable with Adobe Bridge, as well as understand some of the basic features it has to offer! Thank you for viewing the video! Please check out for more free video tutorials as well as downloads!
In this tutorial we will draw a speaker! you will learn everything you need to know to draw a speaker, and then complete the project yourself, or go to the site and download the finished PNG and sort it out in Fireworks yourself! Have fun!
More...
Description:
This video was somehow automatically shortened by Youtube in Feb. of 2009. Instead of taking it down I decided to simply include a link to the full video on tutvid.com.
This tutorial is geared toward new Adobe Bridge users, with the hopes of getting you firmly situated and comfortable with Adobe Bridge, as well as understand some of the basic features it has to offer! Thank you for viewing the video! Please check out for more free video tutorials as well as downloads!
In this tutorial we will draw a speaker! you will learn everything you need to know to draw a speaker, and then complete the project yourself, or go to the site and download the finished PNG and sort it out in Fireworks yourself! Have fun!
13:39
|
Adobe Bridge Tutorial Why use Bridge - English
This video was somehow automatically shortened by Youtube in Feb. of 2009. Instead of taking it down I decided to simply include a link to the full video on tutvid.com.
Why should I use Bridge?...
This video was somehow automatically shortened by Youtube in Feb. of 2009. Instead of taking it down I decided to simply include a link to the full video on tutvid.com.
Why should I use Bridge? That is a question I hear quite frequently, as a response I have made an entire video explaining just some of the great reasons why. I do hope by the end of the video you will be a die-hard Bridge user! Please check out http://www.tutvid.com for more free video tutorials as well as downloads!
More...
Description:
This video was somehow automatically shortened by Youtube in Feb. of 2009. Instead of taking it down I decided to simply include a link to the full video on tutvid.com.
Why should I use Bridge? That is a question I hear quite frequently, as a response I have made an entire video explaining just some of the great reasons why. I do hope by the end of the video you will be a die-hard Bridge user! Please check out http://www.tutvid.com for more free video tutorials as well as downloads!
0:51
|
Video: Moment of DC, Virginia earthquake caught on CCTV - Aug 24, 2011 - All Languages
One of the strongest earthquakes on record has shaken the East Coast of the United States. Windows shattered and grocery stores were wrecked in Virginia, where the quake was centered. Cars were...
One of the strongest earthquakes on record has shaken the East Coast of the United States. Windows shattered and grocery stores were wrecked in Virginia, where the quake was centered. Cars were also damaged when bricks and debris fell from damaged buildings. In Washington, the White House and Capitol were evacuated
More...
Description:
One of the strongest earthquakes on record has shaken the East Coast of the United States. Windows shattered and grocery stores were wrecked in Virginia, where the quake was centered. Cars were also damaged when bricks and debris fell from damaged buildings. In Washington, the White House and Capitol were evacuated
45:54
|
21:00
|
Microsoft Kinect Spy System with Jason Bermas - English
Microsoft X-Box Kinect games device has a video camera and a microphone that records speech. Microsoft has stated that users should not expect any level of privacy concerning your use of the live...
Microsoft X-Box Kinect games device has a video camera and a microphone that records speech. Microsoft has stated that users should not expect any level of privacy concerning your use of the live communication features," and the company "may access or disclose information about you, including the content of your communications.
More...
Description:
Microsoft X-Box Kinect games device has a video camera and a microphone that records speech. Microsoft has stated that users should not expect any level of privacy concerning your use of the live communication features," and the company "may access or disclose information about you, including the content of your communications.
1:56
|