1. Tim Shelton- New Found Road at Pickin' in the Panhandle bluegrass festival


    from Bluegrass Today / Added

    434 Plays / / 0 Comments

    John Lawless from Bluegrass Today speaks with Tim Shelton at the Pickin in the Panhandle festival in West Virginia. 9-9-12. Tim talks about a new direction career paths make and his upcoming project. Copyright © 2012 Bluegrass Today. All rights reserved. Unauthorized reproduction prohibited.

    + More details
    • I'm New Here - Gil Scott Heron Jamie XX


      from Timothy Shelton / Added

      860 Plays / / 0 Comments

      5 week University project brief with XL Recordings to create a unique visual video to act as a placeholder for a track on youtube or other video site. The ideal solution would be makeable in about 3 days with only limited campaign visuals and resources to play with. I took the route of creating an animation dictated by the audio element itself i.e. the type of sounds, how they are arranged and how the elements in the track move. I used 2 videos and 8 images to create this outcome. Created in about 38 hours in After Effects whilst experimenting and building the visuals in accordance with the track. Hope you like!!

      + More details
      • Aztec Players Visit Students Camped out for Game Against BYU


        from James Gregg / Added

        32 Plays / / 0 Comments

        San Diego State students started camping out on Wed. Feb 23 for tickets to the #6 Aztecs matchup against #7 BYU on Sat. Feb 26. Thursday night, players came out to thank the students for their dedication to the team. Senior point guard DJ Gay and junior forward Tim Shelton walked the entire line to thank each student personally.

        + More details
        • BlackHat USA 2010 - Tim Shelton, IBM AIX Heap Overflow Methods


          from redsand / Added

          104 Plays / / 0 Comments

          With the ever increasing importance of providing and maintaining reliable services for both infrastructure support as well as business continuity, companies rely upon the IBM AIX operating system. In most cases, these machines hold the most critical data available for their business which makes IBM AIX a highly valued target from a hacker’s perspective. Over the past decade, hackers have increasingly focused on infiltrating valuable data such as proprietary databases, credit information, product pricing information and more. As such, the importance of protecting the IBM AIX operating system should be priority one. Initial heap exploitation research was first documented and published by David Litchfield, in August of 2005. His paper entitled, ”An Introduction to Heap overflows on AIX 5.3L” focused on AIX heap abuse within the utilization of heap’s free()/rightmost() functions. **NOTE: We will review the Litchfield methodology as well as look at a NEW, NEVER BEFORE SEEN methodology for taking control of the flow of code execution on IBM AIX systems when leveraging only 8 bytes of memory corruption. The Litchfield methodology will only work 50% of the time, in which case this new methodology is required to take control of the flow of execution.

          + More details

          What are Tags?


          Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."