Toolkit Search Results

How To: Motion tween with the motion editor in Flash CS4

The new motion editor in Flash CS4 is a welcome addition to the Flash toolkit and it has some new options to speed up motion tweening. However, there are still some techniques that will require users to employ the classic tween. David Stiller goes over one of those techniques and looks at some of the new motion tweening features in Flash CS4 and the Flash CS4 motion editor. Motion tween with the motion editor in Flash CS4.

How To: Use the Krakatoa plugin in 3D Studio Max

Watch this series of video tutorials to see how the particle rendering system Krakatoa from Frantic Films works. Krakatoa is a high-volume point-based particle rendering, manipulation and management toolkit available as a plug-in for Autodesk 3ds Max running on Windows. Krakatoa enables VFX artists to create dust, smoke, silt, ocean surface foam, plasma and even solid objects, all at unprecedented speeds. Use the Krakatoa plugin in 3D Studio Max.

News: You Don't Need to Be a Hacker to Hack with This Android App

Security awareness seems to be a hot topic these days on the web, with developers making apps and devices that can hack networks and machines with just a few clicks. But these applications aren't only exploiting security flaws in systems and networks, they're being used by amateur and wannabe hackers who want to have a little fun, but don't want to learn how to actually "hack" anything.

Lockdown: The InfoSecurity Guide to Securing Your Computer, Part II

This is Part II in the Lockdown: The InfoSecurity Guide To Securing Your Computer series. Before beginning, check out Part I. This article will cover using alternate software to increase your security and will provide you with some information about websites and programs that test a computer's security. It will also guide you to software you can install or follow so you know what programs need to be updated on the computer. Lastly, I will talk about some features that should be disabled when ...

Lockdown: The InfoSecurity Guide to Securing Your Computer, Part I

This is a two-part series to locking down the computer to provide maximum protection. Even though this guide will sound intrusive, we are talking about reality here. Extreme measures must be taken to protect our computers, especially when we have confidential documentation or do internet banking, which many people do. We all have to use electronic devices at some stage, whether it be for business or personal use.

Next Page