Last updateThu, 21 Dec 2017 2pm


Introducing – Tools for Cinema Quality Assurance


Cinema Test Tools for the non-Technical Manager – Post Installation Quality Assurance Has Begun

Cinema Test Tools is a free resource for the cinema industry, tuned most particularly for the non-technical manager. The tools include several DCPs, all with interesting means of testing the sound and picture quality for the interested by lightly trained staff. The lessons on sound and light are written to provide a foundation to communicate with the technician who must respond quickly and well to the information that they discover.

The key is a free Managers Walk Through Checklist that correlates with the many DCPs. It helps bring an understanding of the many nuances of the auditorium's situation in a straightforward way. 

Security issues should always be taken seriously. Then again, so should consistent exercise and taking regular breaks from madness. Notwithstanding, here's the recent news in the field of security.

Major SSL Encryption Flaw Hits Web/Tech Companies Using SSL | IT Pro

Tech companies using SSL have some serious work to do to fix a big hole that could leave internet users at risk.

A ‘major’ vulnerability in SSL (Secure Sockets Layer) authentication has been discovered, potentially leaving web surfers under serious threat.

The authentication gap allows an attacker to perform a ‘man-in-the-middle’ attack, according to security researchers at PhoneFactor.

PhoneFactor claimed that most websites using SSL encryption were affected, including online banking and retail sites. Some mail and database servers were also vulnerable.

It also invalidated the SSL lock, which is used to verify whether website communications are secure.

Read more ...

Urgent - Adobe fixes five critical Shockwave flaws | IT PRO

Adobe fixes five critical Shockwave flaws Adobe's multimedia web player is patched up for vulnerabilities a hacker could have exploited.

Adobe has released an update fixing five ‘critical’ vulnerabilities in its Shockwave player, said to be on 450 million internet-enabled desktops.

The vulnerabilities could have allowed an attacker who successfully exploited them to run malicious code.

There was an invalid index and an invalid strength length vulnerability, as well as two invalid pointer flaws.


Read more ...

Apple Admits Existence of Data-Eating Bug

Before reading this article, start backing up your computers...no matter the operating system, no matter how cool you are.

Secondly, if you are on a Mac with 10.6 Snow Leopard system, be aware:

  • don't switch between guest and main accounts on Snow Leopard systems, or trust T-Mobile's Sidekick systems until this is fixed
  • back up, early and often.

Article begins:

The 'rare' glitch affects users of Apple's new Snow Leopard operating system

Apple has admitted that its latest operating system harbours a bug that can accidentally delete data belonging to the computer's owner.

The glitch occurs when some users who upgraded to the Snow Leopard - which was released at the end of August - log into a "guest" account on their machines. When they log back in under their own name, all of the files in their home directory - such as documents, music and videos - have been deleted.

Read more ...

Upgrade Firefox 3.5.4 and Reader 9.2

The latest upgrade to Firefox, dated 27 October, in particular for the Mac 3.5.4, has 6 "Critical Vulnerabilitioes" listed sine the September 3.5.3 update - See: Security Advisories for Firefox 3.5 - This rounds out to 25 Critical fixes since the June release of 3.5

Should you update? No question. Just look at the definition of Critical - Vulnerability can be used to run attacker code and install software, requiring no user interaction beyond normal browsing.

There will be confusion by those who have heard that there is a new release that is a beta. Do not be confused. A beta of 3.6 is iminent - it was expected on the 28th, but has been delayed.


Reader Update: 2 weeks ago Adobe Reader was upgraded to 9.2 - This release of Reader is mandatory as well. 9.1 was plagued with vulnerabilities and required many updates to stay current and secure. It is best that you and that everyone you know is upgraded.

Spread the word.

Apple's Snow Leopard downgrades Flash

Apple's Snow Leopard, Mac OS X 10.6, downgrades the Adobe Flash Player installed on systems being upgraded with the updated operating system. The Flash Player version distributed with Snow Leopard is Although this is a later version number than the most recently reported vulnerable version, it was being distributed at the same time as the flawed version and most probably suffers the same critical security issues. Adobe have confirmed the issue exists and recommend that Snow Leopard users update their Flash Player as soon as possible, by visiting http://get.adobe.com/flashplayer/ and installing version Users can check what version of Flash Player they have installed by going to Adobe's version check


Read the entire article at:

Apple's Snow Leopard downgrades Flash - News - The H Security: News and features

During the development of Snow Leopard, and as far back as early July, beta versions were shipped which included Adobe Flash Player Towards the end of July, a critical security vulnerability was discovered in Flash Player version, the generally available Flash Player version at the time. The Flash Player was updated on the last day of July, to version, but it appears either Adobe or Apple did not ensure that this update made it onto the "gold master" of Snow Leopard which, according to reports, was sent to manufacturing in mid August. This master was used to produce the Snow Leopard DVDs, which were made available in stores on August 28th. As a result, users who had updated the Flash Player on Mac OS X 10.5.8 at the start of August, and then upgraded to Snow Leopard will find that they are back to running a version which, although there are no specific security advisories for it, is most probably vulnerable to the same flaws as Flash Player