Spelling suggestions: "subject:"#blacklist"" "subject:"#blackleg""
1 |
BlacklistingGall, Gregor January 2016 (has links)
No
|
2 |
The political blacklist in the broadcast industry : the decade of the 1950's.Cailteux, Karen Sue Byers January 1972 (has links)
No description available.
|
3 |
Intimate strangers blacklisted filmmakers in postwar Europe /Prime, Rebecca Lynn, January 2009 (has links)
Thesis (Ph. D.)--UCLA, 2009. / Vita. Description based on print version record. Includes bibliographical references (leaves 344-369). Filmography: Leaves 335-342.
|
4 |
Proxy firewall / Proxy firewallKugler, Zdeněk January 2009 (has links)
This diploma thesis deals with the topic of proxy servers and firewalls and considers other associated technologies and network techniques. It systematically describes the general issues of firewalls, with a special focus on proxy firewalls and their safety. Additional systems mentioned in this document are intrusion detection systems (IDS), antivirus systems and content control filters – as these are also connected with safety of networks, servers and workstations or with limiting various Internet sources. IDS systems can be typically supplemented with various additional applications or tools that enrich them and increase their potential – including graphic additions. This part is remembered too. Some systems can communicate with each other, which is successfully utilised (FW & IDS co-operation, for example). The purpose of the first large chapter is to present firewall technologies, to list firewall types, their basic functionality and to present the final comparison. It marginally mentions firewall applications in practice. Chapter two explains the theory of network address translation (NAT), deals with its functionality, safety and with limiting the NAT mechanism. Chapter three brings a comprehensive presentation of proxy servers. It explains their principle from the point of view of functionality and the specification of application areas. The chapter is complete with a clear list of proxy server types and their descriptions. The last chapter named Linux Proxy Firewall is the key part of the work. It deals generally with the Linux platform, the Debian GNU/Linux distribution, principles of safety policy, network configuration, network server safety, Linux firewalls (Netfilter framework, Iptables tool) and with the Squid proxy server. The following subchapters respect the previous structure: they describe the theories of intrusion detection systems, antivirus checks and content filtering based on different methods. All this is presented similarly to the previous chapters. A proxy firewall solution built on the Linux operating system has been proposed in the practical part. The Debian GNU/Linux distribution has been chosen, being very suitable for server use due to its features. This environment is also used for additional safety software contained in the proxy firewall: antivirus protection, content filtering and an intrusion detection system. The priority is the most comprehensive computer network security, which requires detection abilities with the broadest possible coverage in the area of network safety. The purpose of this diploma thesis is not only to describe the principle of operation of proxy servers and to compare them with other types and other systems, but it also brings my own proposed free solution, which increases network safety and has the ambition of comparing it with clearly commercial products available on the market.
|
5 |
Have you no sense of decency? Morals clauses, communists and the legal fight against blacklisting in the entertainment industry during the post-war eraBruce, Robert Erik, 1965- 26 January 2011 (has links)
Anti-communism in America reached its apex in the 1950s. One element of this crusade focused on preventing suspected communists from working in their chosen profession, a practice called blacklisting. In attempting to assert their legal rights, the blacklisted found an imperfect justice system, cloaked in equality, yet hampered by the existing cultural setting that treated as immoral anything communist. This dissertation deconstructs the interplay between culture and law, between the desire to root out communists and the attempt to maintain a fair legal system. With an emphasis on the entertainment industry, broadly defined, I will trace blacklisting from anti-labor tool to for-profit instrument focusing on how the blacklisted employed the lawsuit to fight for their jobs. I argue that from the late 1940s through the mid-1960s, blacklisted plaintiffs continuously found themselves handicapped by their association -- either current or past, real or perceived -- with the Communist Party, and not until a plaintiff with no demonstrable ties to communism came along did the legal system prove a comprehensively effective tool in ending the practice. I show that various members of the blacklisted community, with the aid of a small number of lawyers, tried an assortment of legal theories in their attempt to remedy their pariah status with the results often promising -- the first three jury trials ended in victories for the plaintiffs -- but ultimately hollow as a recalcitrant appellate judiciary dashed these early hopes. Moreover, I show how plaintiff's lawyers, sensitive to a legal system that demanded a successful plaintiff be free of communist ties, adjusted their strategy to accommodate the relationship between cultural setting and legal success. / text
|
6 |
Todo tiempo pasado fue peor: La representación literaria del nazismo en Vásquez, Pardo, Borges y BayerAlfonso, Cristhian Camilo 04 November 2015 (has links)
After the end of War World II, Latin-American literature has used the theme of Nazism to create and recreate a wide variety of stories. In some cases, these stories are conceived as a critique to specific aspects of real life, which reminds the reader of the often blurred duality between reality and fiction. This critique is based on the relationship of the characters in the stories, as well as by the socio-political and philosophical views they represent, as can be seen in Juan G. Vásquez’s Los informantes or Jorge E. Pardo’s El pianista que llegó de Hamburgo, both novels written by Colombian authors. Furthermore, it can also be seen in Argentinian literature, as examined here in two specific narratives, Jorge Luis Borges’s short-story, “Deutsches Requiem,” and Osvaldo Bayer’s novel Rainer y Minou. Each of these incorporates the theme of Nazism or topics related to it, and therefore, in this project I set out to analyze how these narratives represent Nazism from a fictional point of view, while also examining how the political and social aspects of each particular case shape the narratives as they relate to the incursion of Nazism in their plot. This, for example, is the case of the blacklists in Los informantes or the irony from escaping a European country in the midst of a war to end up living in a Latin-American country that faces an even worse situation, as is narrated in El pianista que llegó de Hamburgo. The mentality of a Nazi German soldier and his reasons to transform the world is also presented in “Deutsches Requiem,” to conclude this analysis with the representation of guilt and shame that is passed to the children of Nazi soldiers condemned for executing Jews in Rainer y Minou.
|
7 |
Nymbler: Privacy-enhanced Protection from Abuses of AnonymityHenry, Ryan January 2010 (has links)
Anonymous communications networks help to solve the real and important problem of enabling users to communicate privately over the Internet. However, by doing so, they also introduce an entirely new problem: How can service providers on the Internet---such as websites, IRC networks and mail servers---allow anonymous access while protecting themselves against abuse by misbehaving anonymous users?
Recent research efforts have focused on using anonymous blacklisting systems (also known as anonymous revocation systems) to solve this problem. As opposed to revocable anonymity systems, which enable some trusted third party to deanonymize users, anonymous blacklisting systems provide a way for users to authenticate anonymously with a service provider, while enabling the service provider to revoke access from individual misbehaving anonymous users without revealing their identities. The literature contains several anonymous blacklisting systems, many of which are impractical for real-world deployment. In 2006, however, Tsang et al. proposed Nymble, which solves the anonymous blacklisting problem very efficiently using trusted third parties. Nymble has inspired a number of subsequent anonymous blacklisting systems. Some of these use fundamentally different approaches to accomplish what Nymble does without using third parties at all; so far, these proposals have all suffered from serious performance and scalability problems. Other systems build on the Nymble framework to reduce Nymble's trust assumptions while maintaining its highly efficient design.
The primary contribution of this thesis is a new anonymous blacklisting system built on the Nymble framework---a nimbler version of Nymble---called Nymbler. We propose several enhancements to the Nymble framework that facilitate the construction of a scheme that minimizes trust in third parties. We then propose a new set of security and privacy properties that anonymous blacklisting systems should possess to protect: 1) users' privacy against malicious service providers and third parties (including other malicious users), and 2) service providers against abuse by malicious users. We also propose a set of performance requirements that anonymous blacklisting systems should meet to maximize their potential for real-world adoption, and formally define some optional features in the anonymous blacklisting systems literature.
We then present Nymbler, which improves on existing Nymble-like systems by reducing the level of trust placed in third parties, while simultaneously providing stronger privacy guarantees and some new functionality. It avoids dependence on trusted hardware and unreasonable assumptions about non-collusion between trusted third parties. We have implemented all key components of Nymbler, and our measurements indicate that the system is highly practical. Our system solves several open problems in the anonymous blacklisting systems literature, and makes use of some new cryptographic constructions that are likely to be of independent theoretical interest.
|
8 |
Nymbler: Privacy-enhanced Protection from Abuses of AnonymityHenry, Ryan January 2010 (has links)
Anonymous communications networks help to solve the real and important problem of enabling users to communicate privately over the Internet. However, by doing so, they also introduce an entirely new problem: How can service providers on the Internet---such as websites, IRC networks and mail servers---allow anonymous access while protecting themselves against abuse by misbehaving anonymous users?
Recent research efforts have focused on using anonymous blacklisting systems (also known as anonymous revocation systems) to solve this problem. As opposed to revocable anonymity systems, which enable some trusted third party to deanonymize users, anonymous blacklisting systems provide a way for users to authenticate anonymously with a service provider, while enabling the service provider to revoke access from individual misbehaving anonymous users without revealing their identities. The literature contains several anonymous blacklisting systems, many of which are impractical for real-world deployment. In 2006, however, Tsang et al. proposed Nymble, which solves the anonymous blacklisting problem very efficiently using trusted third parties. Nymble has inspired a number of subsequent anonymous blacklisting systems. Some of these use fundamentally different approaches to accomplish what Nymble does without using third parties at all; so far, these proposals have all suffered from serious performance and scalability problems. Other systems build on the Nymble framework to reduce Nymble's trust assumptions while maintaining its highly efficient design.
The primary contribution of this thesis is a new anonymous blacklisting system built on the Nymble framework---a nimbler version of Nymble---called Nymbler. We propose several enhancements to the Nymble framework that facilitate the construction of a scheme that minimizes trust in third parties. We then propose a new set of security and privacy properties that anonymous blacklisting systems should possess to protect: 1) users' privacy against malicious service providers and third parties (including other malicious users), and 2) service providers against abuse by malicious users. We also propose a set of performance requirements that anonymous blacklisting systems should meet to maximize their potential for real-world adoption, and formally define some optional features in the anonymous blacklisting systems literature.
We then present Nymbler, which improves on existing Nymble-like systems by reducing the level of trust placed in third parties, while simultaneously providing stronger privacy guarantees and some new functionality. It avoids dependence on trusted hardware and unreasonable assumptions about non-collusion between trusted third parties. We have implemented all key components of Nymbler, and our measurements indicate that the system is highly practical. Our system solves several open problems in the anonymous blacklisting systems literature, and makes use of some new cryptographic constructions that are likely to be of independent theoretical interest.
|
9 |
The Musical Fallout of Political Activism: Government Investigations of Musicians in the United States, 1930-1960McCall, Sarah B. 08 1900 (has links)
Government investigations into the motion picture industry are well-documented, as is the widespread blacklisting that was concurrent. Not nearly so well documented are the many investigations of musicians and musical organizations which occurred during this same period. The degree to which various musicians and musical organizations were investigated varied considerably. Some warranted only passing mention, while others were rigorously questioned in formal Congressional hearings. Hanns Eisler was deported as a result of the House Committee on Un-American Activities' (HUAC) investigation into his background and activities in the United States. Leonard Bernstein, Marc Blitzstein, and Aaron Copland are but a few of the prominent composers investigated by the government for their involvement in leftist organizations. The Symphony of the Air was denied visas for a Near East tour after several orchestra members were implicated as Communists. Members of musicians' unions in New York and Los Angeles were called before HUAC hearings because of alleged infiltration by Communists into their ranks. The Metropolitan Music School of New York, led by its president-emeritus, the composer Wallingford Riegger, was the subject of a two day congressional hearing in New York City. There is no way to measure either quantitatively or qualitatively the effect of the period on the music but only the extent to which the activities affected the musicians themselves. The extraordinary paucity of published information about the treatment of the musicians during this period is put into even greater relief when compared to the thorough manner in which the other arts, notably literature and film, have been examined. This work attempts to fill this gap and shed light on a particularly dark chapter in the history of contemporary music.
|
10 |
Paul Strand and Cesare Zavattini's 'Un paese' (1955) : the art, synergy and politics of a photobookShannon, Elizabeth J. January 2012 (has links)
"Paul Strand and Cesare Zavattini's 'Un paese' (1955): the art, synergy and politics of a photobook" is a study of the genesis, production and reception of the photobook 'Un paese', created in a collaboration between the American photographer Paul Strand and the Italian neorealist screenwriter Cesare Zavattini. Set in Luzzara, a small town in northern Italy, Strand portrayed the community in a series of images of the landscape, the townsfolk and still lives. The thesis reconstructs the reasoning behind Strand's decision to abandon documentary filmmaking for the creation of photobooks. Strand and the critic Elizabeth McCausland are shown to have specifically conceptualised the photobook as a hybrid form capable of communicating a multifaceted political message through a narrative synthesis of text and image, utilising strategies drawn from documentary film, the photomural and mass media publications. It is shown how Strand and his collaborators combined image and text placed within a deliberately spare graphic design and layout, to emphasise the solidity and importance of the subject matter, and to privilege the communicatory capacity of the photograph. In addition, this thesis reorients the study of Strand from concentration on his early individual fine prints to the collaboratively created political artworks of his later career. It is argued that Strand's production of photobooks is directly related to his status as a Marxist American expatriate who left the United States to avoid blacklisting at the end of the 1940s. By carefully choosing the sites where he worked, utilising realist photographic strategies developed earlier in his career, and collaborating with sympathetic writers, Strand's photobooks present the idealised image of communitarian, primarily agrarian life. 'Un paese' is shown in this thesis to typify Strand's working method; to visually and materially embody his creative and political beliefs; and to exemplify the intermedial collaboration required by the photobook.
|
Page generated in 0.0656 seconds