Brave GNU World

Total Page:16

File Type:pdf, Size:1020Kb

Brave GNU World COMMUNITY Brave GNU World The Monthly GNU Column BRAVE GNU WORLD This column looks into projects and current affairs in the world of free software. This month we focus on better security with Firestarter, a tool that helps you set up a firewall. We also look at a distributed computing project for animation or visualization. BY GEORG C. F. GREVE irewalls are more important now allows users to complete a basic configu- attempts as events, giving you details on than ever, so a free tool that helps ration with the focus on distributed the origin, service, and time (Figure 2). Fusers manage their firewalls is Internet connections for multiple com- You can click to add a filtering rule to always welcome. puters using dynamic IP address assign- allow a service or a host – or to allow ments. exactly this service from exactly this Firewalls The default packet filter settings allow computer. Simple management is one of A firewall operates at the network con- any outgoing connections and deny any Firestarter’s strongest points. Instead of nection level, analyzing, monitoring, external packets that attempt to access wading through tables of port numbers and controlling the traffic that enters or the computer, with the exception of to discover the services assigned to leaves a computer. On Linux with kernel packets that belong to existing connec- them, users can simple check the Event 2.4 or later, this is the domain of ipta- tions. Firestarter has three tabs called tab to allow access. And the Policy bles. Network traffic is represented by IP Status, Events, and Policy for normal allows you to remove any unwanted data packets, and the kernel specifies operations. The Status tab in Figure 1 rules. what should happen to specific types of not only shows you the current firewall packets. Firewalls of status, but also gives you Priorities this type are known information on current Firestarter also supports ICMP packet fil- as packet filters. connections, including tering. ICMP was originally designed for Firestarter [5] is a the applications and ser- network diagnostics, but it is often mis- graphical firewall vices responsible for used for Denial-of-Service attacks. Addi- administration pro- those connections. It is tionally, the Type of Service feature gram by Tomas Jun- also possible to modify allows you to prioritize services and thus nonen. The program settings made using the optimize network traffic for throughput, aims to make the job wizard and to enable or reliability, or interactivity. One of of setting up a Linux disable the firewall. Firestarter’s neatest features is that it firewall more simple, Firestarter also has a sin- displays the firewall status in the panel convenient, and gle-click detach feature and alerts you to specific events. transparent. that prevents any commu- Tomas started work on Firestarter When a user first nication with the outside. back in 2000 while he was waiting for a launches the pro- place at the university after completing gram, a firewall wiz- Access national service. At the time, he noted ard takes the user Figure 1: Firestarter displaying an Monitoring that none of the available programs did through an initial overview of the current firewall The Event tab displays exactly what he wanted it to do. In other setup. The wizard status. blocked connection words, Firestarter, like many other pro- 94 ISSUE 52 MARCH 2005 WWW.LINUX-MAGAZINE.COM Brave GNU World COMMUNITY grams, started life with the famous dependencies between tasks. hacker mantra: “That can’t be too diffi- Additionally, the program groups cult.” slaves in pools and allows granu- Firestarter is a free, GPLed application lar control of the number of CPUs that was written in C using the GTK+ assigned to a job. DrQueue also toolkit. As the program was recently assigns processing work based on added to the Gnome CVS tree, the pro- the operating system, the system ject’s translation team has added local- load, and several additional para- ized versions, and errors are handled by meters. the Gnome bugtracker. The master program maintains One of the issues the team faced was Figure 3: Dr Queue controls CPU capacity for ren- status information concerning the small but important differences dering individual images within a digital animation. crashes or system resets, allowing between distributions. However, a team The GUI gives users an overview of the network processing to pick up from where of volunteers, including Netfilter guru nodes. it left off after an interruption. Paul Drain, brought the project to matu- Users can access these parameters rity, seeing the release of version 1.0 in Blender [7] and Pixie [8]. You can add via the GUI while processing is in November 2004, and providing binary more rendering tools provided they have progress and tell the program to packages for a number of distributions. a default profile that matches DrQueue’s reprocess individual frames, remove For Tomas, Firestarter’s major strengths requirements. A simple shell script han- computers from the pool, or add com- are its ease of use and good supporting dles task distribution. puters to the pool. documentation – although he admits As the current version already has all that, like many other free projects, Easily Ported the features that Jorge Daza planned for Firestarter could benefit from more pro- The program itself was mainly written in version 1.0, there is nothing to prevent fessional graphics. C, with a few lines of C++ and TCSH the release from going ahead. However, Firestarter really does take the fear for scripting thrown in for good mea- Jorge is looking to improve usability and factor out of iptables configuration for sure. DrQueue uses Scons [9] to support the help feature. The author also intends normal users, although it does not cur- configuration and compilation, and this to simplify the install and add binary rently support the full range of firewall means you can run the program on packages for major distributions. configurations and may not cover some Linux, FreeBSD, Irix, and Mac OS X. complex scenarios. The resource manager has three major Documentation elements known as the master, slave, Documentation is a major prerequisite to Distributed Processing and drqman. The master assumes the usability. Unfortunately, the existing Let’s move on now to part two of this server role, handling task distribution documentation is incomplete and not up month’s column and look at distributed and coordinating the results, whereas to date. Jorge would appreciate your processing, more specifically, at the ren- the slave runs on the individual nodes to feedback. If you are interested and have dering manager DrQueue [6]. The pro- handle processing as stipulated by the the required technical skills, please gram’s author, Jorge Daza, first released master program. drqman provides a con- check out the project and help where this GPLed tool about a year ago. venient GUI for users based on the you can. ■ DrQueue distributes the task of render- GTK+ toolkit. ing multiple individual images or anima- INFO tions over a pool of computers. Central Data Repository [1] Send ideas, comments, and questions The interesting thing is that the com- The program collects results and logfiles to Brave GNU World: puters can use different rendering tools. on a Network File System (NFS) export, [email protected] DrQueue supports both proprietary pro- which is mounted by all the computers [2] GNU project homepage: grams such as Maya, Mental Ray, and in the group. As NFS is a fairly ancient http://www.gnu.org/ Blue Moon Rendering Tools (BMRT), protocol that does not provide a lot in [3] Georg’s Brave GNU World homepage: and free software applications such as the line of security or cryptography, and http://brave-gnu-world.org as the queue manager does not add [4] “We run GNU” initiative: these capabilities, it makes sense to iso- http://www.gnu.org/brave-gnu-world/ late this kind of setup from the rest of rungnu/rungnu.en.html your network or hide it behind a [5] Firestarter homepage: securely configured firewall. It might http://www.fs-security.com also be a good idea to make sure the [6] DrQueue homepage: http://www.drqueue.org computers involved can only exchange data within the group; the Firestarter [7] Blender homepage: http://www.blender.org tool we just looked at would be the ideal [8] Pixie homepage: http://pixie.sf.net tool to handle this. [9] Scons homepage: Figure 2: The overview has an entry with the One of DrQueue’s major strengths is http://www.scons.org/ connection details for each denied packet. its ability to priorize tasks and specify WWW.LINUX-MAGAZINE.COM ISSUE 52 MARCH 2005 95.
Recommended publications
  • Appearance Exchange Format (Axf) Is the First File Format Exclusively Designed for System-Independent Storage of Measured Digital Appearance
    The Digital Twin of a Physical Material Appearance eXchange The inability to capture and manage complex material appearance data in a single, editable, portable file format has been an obstacle to improving the virtualization of products. In practice, Format (AxF) many complex design and production workflows rely on a variety of different software packages, and different file formats must be used in parallel. This poses serious issues when consistency in color and appearance needs to be achieved. X-Rite’s Appearance eXchange Format (AxF) is the first file format exclusively designed for system-independent storage of measured digital appearance. AxF is a binary digital file format that delivers a standardized format for storing and communicating complex materials appearance data. It is used within X-Rite’s Total Appearance Capture (TAC) Ecosystem, and it can be ingested into a variety of CAD, PLM, 3D rendering and plug-in solutions used in product design, development, manufacturing, sales and marketing. One file format to use in any solution where material images are utilized. It is an industry first that is helping brands reduce cycle times, control costs and ensure consistency in color and appearance. • AxF is not restricted to a single representation of surface reflectance. From a single spectrum up to full BSSRDF, it supports continuous appearance representations, including parametric BRDF models as well as BTF measurements. • AxF is scalable, extensible and portable, ensuring efficient access for large data volumes of gigabytes or more. Extensions can be defined without harming existing support in third-party applications. SDKs are available for Windows and Linux operating systems with support for Mac under development.
    [Show full text]
  • Full CUDA Implementation of GPGPU Recursive Ray-Tracing Andrew D
    Purdue University Purdue e-Pubs College of Technology Masters Theses College of Technology Theses and Projects 4-30-2010 Full CUDA Implementation Of GPGPU Recursive Ray-Tracing Andrew D. Britton Purdue University - Main Campus, [email protected] Follow this and additional works at: http://docs.lib.purdue.edu/techmasters Britton, Andrew D., "Full CUDA Implementation Of GPGPU Recursive Ray-Tracing" (2010). College of Technology Masters Theses. Paper 24. http://docs.lib.purdue.edu/techmasters/24 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. Graduate School ETD Form 9 (Revised 12/07) PURDUE UNIVERSITY GRADUATE SCHOOL Thesis/Dissertation Acceptance This is to certify that the thesis/dissertation prepared Andrew Duncan Britton By Entitled FULL CUDA IMPLEMENTATION OF GPGPU RECURSIVE RAY-TRACING For the degree of Master of Science Is approved by the final examining committee: Dr. Bedrich Benes Chair Dr. James Mohler Eliot Mack To the best of my knowledge and as understood by the student in the Research Integrity and Copyright Disclaimer (Graduate School Form 20), this thesis/dissertation adheres to the provisions of Purdue University’s “Policy on Integrity in Research” and the use of copyrighted material. Dr. Bedrich Benes Approved by Major Professor(s): ____________________________________ ____________________________________ Approved by: Dr. James Mohler April 21, 2010 Head of the Graduate Program Date Graduate School
    [Show full text]
  • Computer Security Administration
    Information Security Group Information + Technology Services University of Toronto Endpoint Security Policy System A Network Access Control System with Vulnerability Detection and User Remediation Evgueni Martynov UNIX Systems Group Mike Wiseman Computer Security Administration Endpoint Security Policy System Table of Contents Acknowledgements............................................................................. 3 Change History .................................................................................... 4 Summary ............................................................................................. 5 Overview .............................................................................................. 5 Network Isolation ............................................................................... 6 Vulnerability Detection ....................................................................... 6 User Remediation ................................................................................ 8 Administering ESP ............................................................................... 8 ESP Operations Experience ................................................................ 9 Appendix I – Installation and Configuration of ESP server ........... 10 Using init.sh ..................................................................................... 10 Post-Installation ................................................................................ 11 Configuring an ESP Server to Work with an ESP Agent .......................
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Status of Open Source and Commercial Ipv6 Firewall Implementations (Paper)
    Status of Open Source and commercial IPv6 firewall implementations Dr. Peter Bieringer AERAsec Network Services & Security GmbH [email protected] http://www.aerasec.de/ European Conference on Applied IPv6 (ECAI6) Cologne, Germany September 6 - 7, 2007 Abstract IPv6, the successor of IPv4, has been ready for production for quite some time. For security reason, firewalling in IPv6 is also an important requirement. This paper presents an overview of the status of Open Source and commer- cial implementations. Introduction With IPv4 nowadays, many client-to-server and most client-to-client communications are intercepted by gate- ways with address and port masquerading abilities, usually named Network (and Port) Address Translation (NAT, NAPT). This prohibits native client-to-client communication, if both peers are located behind such gate- ways. In this case, only special tunnelling techniques, like STUN (Simple traversal of UDP over NATs), which requires special servers located at the Internet, or other ªfirewall-piercingº methods can help to establish native and bidirectional client-to-client communication. One of the goals of IPv6 is the re-introduction of bidirectional, native end-to-end communication without play- ing any tricks on gateways in between. Also, IPv6 has a large enough address space which should suffice for the next decades. Therefore NAT was left out by design, too. Jumping back to IPv4, the initial intention of introducing NAT was the lack of IPv4 addresses for use in internal networks, while still allowing clients to open connections to the Internet via a hiding mechanism. It turned out to also protect internal networks against threats from the Internet, because under normal circumstances (bug- free stateful hiding-NAT implementation on the gateway) it©s not possible for an outside node to connect to an internal host without any dedicated rule on the gateway.
    [Show full text]
  • 3D Distributed Rendering and Optimization Using Free Software
    Free Software: Research and Development 3D Distributed Rendering and Optimization using Free Software Carlos González-Morcillo, Gerhard Weiss, David Vallejo-Fernández, and Luis Jiménez-Linares, and Javier Albusac-Jiménez The media industry is demanding high fidelity images for 3D synthesis projects. One of the main phases is Rendering, the process in which a 2D image can be obtained from the abstract definition of a 3D scene. Despite developing new techniques and algorithms, this process is computationally intensive and requires a lot of time to be done, especially when the source scene is complex or when photo-realistic images are required. This paper describes Yafrid (standing for Yeah! A Free Render grID) and MAgArRO (Multi Agent AppRoach to Rendering Optimization) architectures, which have been developed at the University of Castilla-La Mancha for distributed rendering optimization. González, Weiss, Vallejo, Jiménez and Albusac, 2007. This article is distributed under the “Attribution- Share Alike 2.5 Generic” Creative Commons license, available at <http://creativecommons.org/licenses/ by-sa/2.5/ >. It was awarded as the best article of the 1st. FLOSS International Conference (FLOSSIC 2007). Keywords: Artificial Intelligence, Intelligent Agents, Authors Optimization, Rendering. Carlos Gonzalez-Morcillo is an assistant professor and 1 Introduction a Ph.D. student in the ORETO research group at the Uni- versity of Castilla-La Mancha. His recent research topics Physically based Rendering is the process of generating are multi-agent systems, distributed rendering, and fuzzy a 2D image from the abstract description of a 3D scene. The logic. He received both B.Sc. and M.Sc. degrees in Com- process of constructing a 2D image requires several phases puter Science from the University of Castilla-La Mancha in including modelling, setting materials and textures, plac- 2002 and 2004 respectively.
    [Show full text]
  • Lecture 11 Firewalls
    BSc in Telecommunications Engineering TEL3214 Computer Communication Networks Lecture 11 Firewalls Eng Diarmuid O'Briain, CEng, CISSP 11-2 TEL3214 - Computer Communication Networks Copyright © 2017 Diarmuid Ó Briain Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back- Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". TEL3214 Firewalls 09 May 2017 TEL3214 - Computer Communication Networks 11-3 Table of Contents 1. AN INTRODUCTION TO FIREWALLS........................................................................................................................5 2. THE DIGITAL SECURITY PROBLEM...........................................................................................................................5 2.1 HOME......................................................................................................................................................................5 2.2 ENTERPRISE...............................................................................................................................................................6 2.3 ROAMING INDIVIDUAL.................................................................................................................................................6 2.4 PERIMETER DEFENCE AND FIREWALLS.............................................................................................................................6
    [Show full text]
  • Blender 3D: Noob to Pro/Printable Version
    Blender 3D : Noob to Pro. For latest version visit http://en.wikibooks.org/wiki/Blender_3D:_Noob_to_Pro Blender 3D: Noob to Pro/Printable Version From Wikibooks, the open-content textbooks collection < Blender 3D: Noob to Pro Contents 1 Beginner Tutorials 2 Note on Editing 3 Quick Installation Guide 4 Weblinks 5 Tutorial Syntax 6 Keyboard 7 3-button Mouse 8 Apple 1-button Mouse substitutions 9 Path menu 10 Become Familiar with the Blender Interface 11 Learn the Blender Windowing System 12 The 3D Viewport 13 Resizing the Windows 14 User Preferences 15 Joining and Splitting Windows 16 Window Headers 17 Changing/Selecting Window Types 18 The Buttons Window 19 The 3D Viewport Window 20 Rotating the view 20.1 For laptop users: the num lock 21 Panning the View 22 Zooming the View 23 Pro Tip 24 Placing the 3D cursor 25 Adding and Deleting Objects 26 Other Windows 27 Learn to Model 28 Beginners Tips 29 Starting with a box 30 Subdivision Surfaces 30.1 But I want a box! 31 Quickie Model 32 Quickie Render 33 Mesh Modeling 34 Modeling a Simple Person 35 Creating a New Project 36 Learning about Selection 36.1 1. Box Selecting 36.2 2. Circle Selecting 36.3 3. Lasso Selecting 36.4 4. One By One Selecting 36.5 5. Face Selecting 37 Learning Extrusion 38 Placing Geometry 39 Summary: Keys & Commands 39.1 Detailing Your Simple Person I 39.2 Subsurfaces 39.3 Smooth Surfaces 39.4 Detailing Your Simple Person II 39.5 Selection modes 39.6 Scaling with axis constraint 39.7 Modeling the arms 39.8 Modeling the legs 39.9 Modeling the head 39.10 Creating a Simple Hat 1 Blender 3D : Noob to Pro.
    [Show full text]
  • Integrating Open Source Distributed Rendering Solutions in Public and Closed Networking Envi- Ronments
    Integrating open source distributed rendering solutions in public and closed networking envi- ronments Seppälä, Heikki & Suomalainen, Niko 2010 Leppävaara Laurea University of Applied Sciences Laurea Leppävaara Integrating open source distributed rendering solutions in public and closed networking environments Heikki Seppälä Niko Suomalainen Information Technology Programme Thesis 02/2010 Laurea-ammattikorkeakoulu Tiivistelmä Laurea Leppävaara Tietojenkäsittelyn koulutusohjelma Yritysten tietoverkot Heikki Seppälä & Niko Suomalainen Avoimen lähdekoodin jaetun renderöinnin ratkaisut julkisiin ja suljettuihin ympäristöihin Vuosi 2010 Sivumäärä 64 Moderni tutkimustiede on yhä enemmän riippuvainen tietokoneista ja niiden tuottamasta laskentatehosta. Tutkimusprojektit kasvavat jatkuvasti, mikä aiheuttaa tarpeen suuremmalle tietokoneteholle ja lisää kustannuksia. Ratkaisuksi tähän ongelmaan tiedemiehet ovat kehittäneet hajautetun laskennan järjestelmiä, joiden tarkoituksena on tarjota vaihtoehto kalliille supertietokoneille. Näiden järjestelmien toiminta perustuu yhteisön lahjoittamaan tietokonetehoon. Open Rendering Environment on Laurea-ammattikorkeakoulun aloittama projekti, jonka tärkein tuotos on yhteisöllinen renderöintipalvelu Renderfarm.fi. Palvelu hyödyntää hajautettua laskentaa nopeuttamaan 3D-animaatioiden renderöintiä. Tämä tarjoaa uusia mahdollisuuksia mallintajille ja animaatioelokuvien tekijöille joilta tavallisesti kuluu paljon aikaa ja tietokoneresursseja töidensä valmiiksi saattamiseksi. Renderfarm.fi-palvelu perustuu BOINC-pohjaiseen
    [Show full text]
  • Ethical Hacking and Countermeasures Version 6
    Ethical Hacking and Countermeasures Version 6 Modu le LX Firewall Technologies News Source: http://www.internetnews.com/ Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective This modu le will fam iliar ize you wihith: • Firewalls • Hardware Firewalls • Software Firewalls • Mac OS X Firewall • LINUX Firewall • Windows Firewall Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Firewalls Mac OS X Firewall Hardware Firewalls LINUX Firewall Software Firewalls Windows Firewall Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Firewalls: Introduction A firewall is a program or hardware device that protects the resources of a private netw ork from users of other networks It is responsible for the traffic to be allowed to pass, block, or refuse Firewall also works with the proxy server It helps in the protection of the private network from the users of the different network Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hardware Firewalls Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hardware Firewall Har dware Firewa lls are place d in the perime ter of the networ k It employs a technique of packet filtering It reads the header of a packet to find out the source and destination address The information is then compared with the set of predefined and/orand/ or user created rules that determine whether the packet is forwarded or dropped Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Netgear Firewall Features: • ItInterne t shar ing broa dbddband router and 4-port switch • 2x the speed and 4x times the coverage of a Wireless-G router • Configurable for private networks and public hotspots • Double Firewall protection from external hackers attacks • Touchless WiFi Security makes it easy to secure your network Copyright © by EC-Council EC-Council All Rights Reserved.
    [Show full text]
  • Nitin Singh - Senior CG Generalist
    Nitin Singh - Senior CG Generalist. Email: [email protected] Montreal, Canada Website: www.NitinSingh.net HONORS & AWARDS * VISUAL EFFECTS SOCIETY AWARDS (VES) 2014 (Outstanding Created Environment in a Commercial or Broadcast Program) for Game Of Thrones ( Project Lead ) “The Climb”. * PRIMETIME EMMY AWARDS 2013 ( as Model and Texture Lead ) for Game of Thrones. “Valar Dohaeris” (Season 03) EXPERIENCE______________________________________________________________________________________________ Environment TD at Framestore, Montreal (Feb.05.2018 - June.09.2018) Projects:- The Aeronauts, Captain Marvel. * procedural texturing and lookDev for full CG environments. * Developing custom calisthenics shaders for procedural environment texturing and look development. * Making clouds procedurally in Houdini, Layout, Lookdev, and rendering of Assets / Shots in FrameStore's proprietary rendering engine. Software's Used: FrameStore's custom texturing and lighting tools, Maya, Arnold, Terragen 4. __________________________________________________________________________________________________________ Environment Pipeline TD at Method Studios (Iloura), Melbourne (Feb.05.2018 - June.09.2018) Projects:- Tomb Raider, Aquaman. * Developing custom pipeline tools for layout and Environment Dept. using Python and PyQt4. * Modeling and texturing full CG environment's with Substance Designer and Zbrush. *Texturing High res. photo-real textures for CG environments and assets. Software's Used: Maya, World Machine, Mari, Zbrush, Mudbox, Nuke, Vray 3.0, Photoshop,
    [Show full text]
  • Open Source Film a Model for Our Future?
    Medientechnik First Bachelor Thesis Open Source Film A model for our future? Completed with the aim of graduating with a Bachelor of Science in Engineering From the St. Pölten University of Applied Sciences Media Technology degree course Under the supervision of FH-Prof. Mag. Markus Wintersberger Completed by Dora Takacs mt081098 St. Pölten, on June 30, 2010 Medientechnik Declaration • the attached research paper is my own, original work undertaken in partial fulfillment of my degree. • I have made no use of sources, materials or assistance other than those which have been openly and fully acknowledged in the text. If any part of another person’s work has been quoted, this either appears in inverted commas or (if beyond a few lines) is indented. • Any direct quotation or source of ideas has been identified in the text by author, date, and page number(s) immediately after such an item, and full details are provided in a reference list at the end of the text. • I understand that any breach of the fair practice regulations may result in a mark of zero for this research paper and that it could also involve other repercussions. • I understand also that too great a reliance on the work of others may lead to a low mark. Day Undersign Takacs, Dora, mt081098 2 Medientechnik Abstract Open source films, which are movies produced and published using open source methods, became increasingly widespread over the past few years. The purpose of my bachelor thesis is to explore the young history of open source filmmaking, its functionality and the simple distribution of such movies.
    [Show full text]