Solved

Is there a way to record streaming quicktime files?

Posted on 2004-09-15
7
1,183 Views
Last Modified: 2008-03-10
Greetings

A friend of mine is interested in streaming product information videos from his site.  It is extremely important that these video files are available to download.  I was told streaming a QuickTime file is one of the best methods, while setting the options to turn of caching and the kiosk.  Is there still a way around this option, can someone still technically record or download these files?
0
Comment
Question by:MrKnish
7 Comments
 
LVL 8

Accepted Solution

by:
Wojciech Duda earned 75 total points
ID: 12066421
There is always a way to record streamed videos. The Quicktime option is a good one as it takes a technically sound user to save the videos. But it is still possible.
0
 

Author Comment

by:MrKnish
ID: 12067293
So how exactly would you go about it?
0
 
LVL 17

Expert Comment

by:Jared Luker
ID: 12067672
Correct me if I'm wrong, but I thought that quicktime usually stored all it's videos in the temporary internet files.
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 

Author Comment

by:MrKnish
ID: 12067814
It does, but the file it creates has no extention, no affiliation and renaming it as a .mov does nothing to make it readable.  If you can convert the temp file to a playable format you should be ok I would imagine.  However, I think the file is designed to be unreadable.  Any thoughts?
0
 
LVL 8

Expert Comment

by:Wojciech Duda
ID: 12073035
Now I'm confused: You want the videos to be saveable or not?
0
 

Author Comment

by:MrKnish
ID: 12081173
No, I don't want the videos to be saved, but I'm curious about how would go about making the attempt if you really wanted them.
0
 
LVL 3

Assisted Solution

by:dheeruthakur
dheeruthakur earned 75 total points
ID: 12083035
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Power Steering Pump 8 55
SpiceWorks - help desk system 2 54
How often can a passive RFID be polled? 10 41
iPhone 7 64GB 5 36
If you want to move up through the ranks in your technology career, talent and hard work are the bare necessities. But they aren’t enough to make you stand out. Expanding your skills, actively promoting your accomplishments and using promotion st…
EE introduced a new rating method known as Level, which displays in your avatar as LVL. The new Level is a numeric ranking that is based on your Points. This article discusses the rationale behind the new method and provides the mathematical formula…
The Bounty Board allows you to request an article or video on any technical topic, or fulfill a bounty request to earn points. Watch this video to learn how to use the Bounty Board to get the content you want, earn points, and browse submitted bount…
Where to go on the main page to find the job listings. How to apply to a job that you are interested in from the list that is featured on our Careers page.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now