4 World of Webcraft Actionscript 3.0 Dynamic Tween and hitTestObject...
Copy+Paste Script: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1161
Learn how to dynamically tween any item to multiple...
Copy+Paste Script: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1161
Learn how to dynamically tween any item to multiple objects using a universal function that uses Tweens, an EnterFrame Event, and the hitTestObject function. Smart stuff.
11m:48s
5145
PHP Image Watermark Function Tutorial How To Apply Watermark On the Fly...
Copy Paste Code: http://www.developphp.com/view.php?tid=1147
Master PHP Image Processing with Adam Khoury in this Video Textbook Series. In this...
Copy Paste Code: http://www.developphp.com/view.php?tid=1147
Master PHP Image Processing with Adam Khoury in this Video Textbook Series. In this video we learn how to apply watermark to any uploaded images on the fly by applying another custom function to our image processing library file.
10m:48s
5277
PHP Tutorial Bad Word Filter Function and Harmful Character String...
Learn to build bad word or harmful character filter functions and data filtration systems for user input. We are using the str_ireplace()...
Learn to build bad word or harmful character filter functions and data filtration systems for user input. We are using the str_ireplace() php function fed with arrays.
9m:12s
13904
PHP Image Crop Thumbnail Function Tutorial jpg gif png Resize On the Fly...
Copy Paste Code: http://www.developphp.com/view.php?tid=1144
Master PHP Image Processing with Adam Khoury in this Video Textbook Series. In this...
Copy Paste Code: http://www.developphp.com/view.php?tid=1144
Master PHP Image Processing with Adam Khoury in this Video Textbook Series. In this video we learn how to script a universal PHP image crop function that runs inline with out resize function created in the last lesson. It uses a handful of functions from the GD library in PHP. In our example the function will work for cropping JPG, GIF, and PNG type of images universally
10m:15s
7122
How to Build a Social Network Website Part 28 PHP 5.0 Ready - English
If you have a script coded in PHP 5+ that is attempting to create cookies for something like a website remember me feature using setcookie, no...
If you have a script coded in PHP 5+ that is attempting to create cookies for something like a website remember me feature using setcookie, no output can occur before the setcookie function is called to run. Just try to get all of your page output to occur below or after you run setcookie() function in PHP version 5.
5m:16s
4867
PHP Image Resize Function Tutorial jpg gif png Size On the Fly - English
Copy Paste Code: http://www.developphp.com/view.php?tid=1140
Master PHP Image Processing with Adam Khoury in this Video Textbook Series. In this...
Copy Paste Code: http://www.developphp.com/view.php?tid=1140
Master PHP Image Processing with Adam Khoury in this Video Textbook Series. In this video we learn how to script a universal PHP image resizing function that uses a handful of functions from the GD library in PHP. In our example the function will work for resizing JPG, GIF, and PNG type of images.
27m:57s
5209
PHP Image Convert Function Tutorial Upload Type jpg gif png On the Fly -...
Copy Paste Code: http://www.developphp.com/view.php?tid=1146
Master PHP Image Processing with Adam Khoury in this Video Textbook Series. In this...
Copy Paste Code: http://www.developphp.com/view.php?tid=1146
Master PHP Image Processing with Adam Khoury in this Video Textbook Series. In this video we learn how to convert images from one type to another using the GD library functions.
8m:13s
11174
Missing in Pakistan - Documentary - Urdu - English
A heartbreaking documentary by filmmaker and journalist Ziad Zafar on the disappeared people in Pakistan. Timely and to the point. Points to the...
A heartbreaking documentary by filmmaker and journalist Ziad Zafar on the disappeared people in Pakistan. Timely and to the point. Points to the two major factors that determine Pakistani politics - the American geo-strategic interests and the politico-economic interests of the military establishment. Important to note that religious extremism and sectarianism in Pakistan have always been the function of these two factors. The American selfish interests in the region and the failure of political process since the establishment of Pakistan are the real causes behind religious extremism. Busharrafs war on terror is failing. This war is itself a form of and a cause of growing terrorism in the region. Those individuals involved in militant organizations and terrorist activities should be brought to justice. But it should be done through given constitutional and criminal procedures instead of extra-judicial kidnappings and killings. Because illegitimate and unpopular power has its own logic. It does not distinguish between one type of body from the other - one type of citizen from another - militant or otherwise - when it comes to the question of preserving itself. The history of dictatorships in Pakistan - military or democratic - provide plenty of examples where in the name of National Integrity Development Islamization and more recently Curbing Islamic Extremism and War on Terror the state has suppressed dissent liberties and freedom of its citizens. Notice the list of missing people at the end of the documentary. Recognize the backgrounds of people through their names. Are they only what the Pakistani state likes to call the Islamic Militants. Or the list also includes the Baloch the Muhajir the Pashtoon the Sunni the Shia the Liberal the Human Rights Activist and the Journalist.
24m:11s
11965
Flash AS3 ColorPicker Component Tutorial: Color choosing - English
Get the free Source files:http://www.developphp.com
In this free Flash ActionScript 3.0 tutorial we show how to dynamically program the...
Get the free Source files:http://www.developphp.com
In this free Flash ActionScript 3.0 tutorial we show how to dynamically program the ColorPicker component. Learn how to allow users to change colors on elements you want, and also learn how to access the value of their choice if using it in a form application. lesson By Adam Khoury at www.developphp.com
17m:32s
6273
Flash Tutorial: Arrays Explained with Cool Text Animations - English
Free Source: http://www.developphp.com/Flash_tutorials
Learn the basics of creating and working with arrays, then we kick it into overdrive to...
Free Source: http://www.developphp.com/Flash_tutorials
Learn the basics of creating and working with arrays, then we kick it into overdrive to show you guys advanced flash as3 techniques explained in an easy to understand way. With an easy to understand source file example coded using Flash CS3 or CS4.
If you want to know how the pros script and code in ActionScript 3.0 this lesson is for you. Let me be your actionscript 3.0 teacher for a few minutes... thanks!
17m:56s
5090
Simple Circular Flash Preloader Animation Tutorial for ActionScript 3.0...
Free Source and Demo - http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=430
Learn a simple but cool looking flash circular...
Free Source and Demo - http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=430
Learn a simple but cool looking flash circular preloader animation for your ActionScript projects. Next lesson we will tackle creating an animated wedge mask to make it even cooler looking.
Visit our tutorial archive and network:
http://www.developphp.com
7m:58s
6833
Circular Dynamic Preloader Tutorial Flash ActionScript 3.0 Website...
Download Starter Package - http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=437
Visit our tutorial archive and network for more:...
Download Starter Package - http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=437
Visit our tutorial archive and network for more:
http://www.developphp.com
Learn how to create true dynamic circular(circle shaped) preloaders that go around clockwise or counter-clockwise to show completed loading progress of your flash web content that requires preloading due to its size. Adam is using actionscript 3.0 in his file, but you can use any Actionscript version if you are acquainted with it.
Adam uses a mid level complexity masking maneuver to pull off this otherwise mind boggling exercise in flash. Be sure to give developPHP.com credit for showing you how to rock this skillful expert animation.
20m:0s
7831
Flash Email Validation Tutorial ActionScript 3.0 Function Use - English
Free Source Download - http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=532
And here is link to Form Components Building...
Free Source Download - http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=532
And here is link to Form Components Building Tutorial:
http://www.youtube.com/watch?v=t5XHFXULMuw
Learn to validate email addresses using actionscript 3.0 and Flash.
7m:52s
6004
PHP Image Filter Name Rename Tutorial Upload jpg gif png On the Fly -...
Copy Paste Code: http://www.developphp.com/view.php?tid=1145
Master PHP Image Processing with Adam Khoury in this Video Textbook Series. In this...
Copy Paste Code: http://www.developphp.com/view.php?tid=1145
Master PHP Image Processing with Adam Khoury in this Video Textbook Series. In this video we learn how to filter or rename an uploaded image file name so that strange characters or spaces in the name do not present issues. In our example the function will work for renaming and filtering JPG, GIF, and PNG type of images file names.
4m:35s
6014
Experience Level Programming Tutorial for PHP MySQL Game or Web Site XP...
Learn to use PHP to tally up a user\'s Experience Level from any number stored or derived from a MySQL database and render graphics accordingly....
Learn to use PHP to tally up a user\'s Experience Level from any number stored or derived from a MySQL database and render graphics accordingly. Can be used for games or web site programming. You can easily adjust all numbers to fit your system.
13m:20s
5130
5 World of Webcraft Two Way Array Play Actionscript 3.0 PHP MySQL Member...
Reference Code: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1164
Learn to bring in your member friend lists respectively from...
Reference Code: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1164
Learn to bring in your member friend lists respectively from PHP MySQL and then break them down in Actionscript 3.0. Learn how to work with two way array data between Flash Actionscript 3.0 and PHP + MySQL. This lesson is not for lightweight coders by any means due to the blending of various web technologies at play in our application.
18m:15s
5202
7 World of Webcraft Character Customization PHP Actionscript Programming...
Now we begin learning one way to allow a player to customize their character in a flash game environment. I will show a very basic example that...
Now we begin learning one way to allow a player to customize their character in a flash game environment. I will show a very basic example that maybe you guys can build from.
6m:30s
4782
8 World of Webcraft Character Customization Continued - English
Copy+Paste: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1168
Now we complete the basic Flash application to allow a player to...
Copy+Paste: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1168
Now we complete the basic Flash application to allow a player to customize their character in a flash game environment. This is a very basic example that maybe you guys can build from.
15m:40s
4870
9 World of Webcraft Flash Game Full Screen Tutorial Actionscript 3.0 -...
Copy+Paste: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1169
Learn how to allow users to full screen your Flash social game or...
Copy+Paste: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1169
Learn how to allow users to full screen your Flash social game or any Flash application using Actionscript 3.0.
5m:54s
4942
10 World of Webcraft Drag World Flash Game Tutorial Actionscript 3.0 -...
Copy+Paste: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1170
In this lesson we use Actionscript 3.0 to allow the user to drag...
Copy+Paste: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1170
In this lesson we use Actionscript 3.0 to allow the user to drag the world to see all sectors of a world area that is larger than the stage size.
7m:55s
5642
11 World of Webcraft Save Coordinates Where Drag MovieClips Flash...
Copy+Paste: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1171
In this lesson we demonstrate dragging movieclips within multiple...
Copy+Paste: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1171
In this lesson we demonstrate dragging movieclips within multiple drag levels, and the focus is saving the coordinates of where an item is dropped to a MySQL database system to retrieve for the next time the game loads for the player. A way of remembering where your players want certain objects to live
8m:49s
5095
jQuery Ajax PHP Tutorial Swap out page content on your website using PHP...
Get Source Code: http://www.developphp.com/view.php?tid=1143
Learn to use jQuery / Ajax post mechanism to communicate to PHP in order to swap out...
Get Source Code: http://www.developphp.com/view.php?tid=1143
Learn to use jQuery / Ajax post mechanism to communicate to PHP in order to swap out page content, or access a mysql database, or whatever the hell you want.
18m:9s
7062
Cracking Stuxnet - A 21st-century cyber weapon against Iran - Ralph...
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more...
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target -- and its covert origins. In a fascinating look inside cyber-forensics, he explains how.
The idea behind the Stuxnet computer worm is actually quite simple. We don't want Iran to get the Bomb. Their major asset for developing nuclear weapons is the Natanz uranium enrichment facility. The gray boxes that you see, these are real-time control systems. Now if we manage to compromise these systems that control drive speeds and valves, we can actually cause a lot of problems with the centrifuge. The gray boxes don't run Windows software; they are a completely different technology. But if we manage to place a good Windows virus on a notebook that is used by a maintenance engineer to configure this gray box, then we are in business. And this is the plot behind Stuxnet.
So we start with a Windows dropper. The payload goes onto the gray box, damages the centrifuge, and the Iranian nuclear program is delayed -- mission accomplished. That's easy, huh? I want to tell you how we found that out. When we started our research on Stuxnet six months ago, it was completely unknown what the purpose of this thing was. The only thing that was known is very, very complex on the Windows part, the dropper part, used multiple zero-day vulnerabilities. And it seemed to want to do something with these gray boxes, these real-time control systems. So that got our attention, and we started a lab project where we infected our environment with Stuxnet and checked this thing out. And then some very funny things happened. Stuxnet behaved like a lab rat that didn't like our cheese -- sniffed, but didn't want to eat. Didn't make sense to me. And after we experimented with different flavors of cheese, I realized, well, this is a directed attack. It's completely directed. The dropper is prowling actively on the gray box if a specific configuration is found, and even if the actual program that it's trying to infect is actually running on that target. And if not, Stuxnet does nothing.
So that really got my attention, and we started to work on this nearly around the clock, because I thought, well, we don't know what the target is. It could be, let's say for example, a U.S. power plant, or a chemical plant in Germany. So we better find out what the target is soon. So we extracted and decompiled the attack code, and we discovered that it's structured in two digital bombs -- a smaller one and a bigger one. And we also saw that they are very professionally engineered by people who obviously had all insider information. They knew all the bits and bites that they had to attack. They probably even know the shoe size of the operator. So they know everything.
And if you have heard that the dropper of Stuxnet is complex and high-tech, let me tell you this: the payload is rocket science. It's way above everything that we have ever seen before. Here you see a sample of this actual attack code. We are talking about -- round about 15,000 lines of code. Looks pretty much like old-style assembly language. And I want to tell you how we were able to make sense out of this code. So what we were looking for is first of all is system function calls, because we know what they do.
And then we were looking for timers and data structures and trying to relate them to the real world -- to potential real world targets. So we do need target theories that we can prove or disprove. In order to get target theories, we remember that it's definitely hardcore sabotage, it must be a high-value target, and it is most likely located in Iran, because that's where most of the infections had been reported. Now you don't find several thousand targets in that area. It basically boils down to the Bushehr nuclear power plant and to the Natanz fuel enrichment plant.
So I told my assistant, "Get me a list of all centrifuge and power plant experts from our client base." And I phoned them up and picked their brain in an effort to match their expertise with what we found in code and data. And that worked pretty well. So we were able to associate the small digital warhead with the rotor control. The rotor is that moving part within the centrifuge, that black object that you see. And if you manipulate the speed of this rotor, you are actually able to crack the rotor and eventually even have the centrifuge explode. What we also saw is that the goal of the attack was really to do it slowly and creepy -- obviously in an effort to drive maintenance engineers crazy, that they would not be able to figure this out quickly.
The big digital warhead -- we had a shot at this by looking very closely at data and data structures. So for example, the number 164 really stands out in that code; you can't overlook it. I started to research scientific literature on how these centrifuges are actually built in Natanz and found they are structured in what is called a cascade, and each cascade holds 164 centrifuges. So that made sense, it was a match.
And it even got better. These centrifuges in Iran are subdivided into 15, what is called, stages. And guess what we found in the attack code? An almost identical structure. So again, that was a real good match. And this gave us very high confidence for what we were looking at. Now don't get me wrong here, it didn't go like this. These results have been obtained over several weeks of really hard labor. And we often went into just a dead-end and had to recover.
Anyway, so we figured out that both digital warheads were actually aiming at one and the same target, but from different angles. The small warhead is taking one cascade, and spinning up the rotors and slowing them down, and the big warhead is talking to six cascades and manipulating valves. So in all, we are very confident that we have actually determined what the target is. It is Natanz, and it is only Natanz. So we don't have to worry that other targets might be hit by Stuxnet.
Here's some very cool stuff that we saw -- really knocked my socks off. Down there is the gray box, and on the top you see the centrifuges. Now what this thing does is it intercepts the input values from sensors -- so for example, from pressure sensors and vibration sensors -- and it provides legitimate code, which is still running during the attack, with fake input data. And as a matter of fact, this fake input data is actually prerecorded by Stuxnet. So it's just like from the Hollywood movies where during the heist, the observation camera is fed with prerecorded video. That's cool, huh?
The idea here is obviously not only to fool the operators in the control room. It actually is much more dangerous and aggressive. The idea is to circumvent a digital safety system. We need digital safety systems where a human operator could not act quick enough. So for example, in a power plant, when your big steam turbine gets too over speed, you must open relief valves within a millisecond. Obviously, this cannot be done by a human operator. So this is where we need digital safety systems. And when they are compromised, then real bad things can happen. Your plant can blow up. And neither your operators nor your safety system will notice it. That's scary.
But it gets worse. And this is very important, what I'm going to say. Think about this. This attack is generic. It doesn't have anything to do, in specifics, with centrifuges, with uranium enrichment. So it would work as well, for example, in a power plant or in an automobile factory. It is generic. And you don't have -- as an attacker -- you don't have to deliver this payload by a USB stick, as we saw it in the case of Stuxnet. You could also use conventional worm technology for spreading. Just spread it as wide as possible. And if you do that, what you end up with is a cyber weapon of mass destruction. That's the consequence that we have to face. So unfortunately, the biggest number of targets for such attacks are not in the Middle East. They're in the United States and Europe and in Japan. So all of the green areas, these are your target-rich environments. We have to face the consequences, and we better start to prepare right now.
Thanks.
(Applause)
Chris Anderson: I've got a question. Ralph, it's been quite widely reported that people assume that Mossad is the main entity behind this. Is that your opinion?
Ralph Langner: Okay, you really want to hear that? Yeah. Okay. My opinion is that the Mossad is involved, but that the leading force is not Israel. So the leading force behind that is the cyber superpower. There is only one, and that's the United States -- fortunately, fortunately. Because otherwise, our problems would even be bigger.
CA: Thank you for scaring the living daylights out of us. Thank you Ralph.
(Applause)
10m:40s
8801
Flash CS5.5 Tutorial Android App Orientation Change Size Actionscript...
Learn how to program app orientation for Android device turning features. When the mobile device user flips the view mode you want to make sure you...
Learn how to program app orientation for Android device turning features. When the mobile device user flips the view mode you want to make sure you account for that. Luckily it is simple to do using Actionscript 3.0 and Flash.
We use the stage event of \"RESIZE\" and add a listener to that. The corresponding function is where we place any code we like to manipulate the orientation or dynamic sizes of things in the view screen of the user
7m:43s
6209