Bookmarks for HitRECord

Bookmarks for HitRECord | Graphic Design & Copywriting
Collaborative Work for HitRECord – © Shared.
HitRECord is the production company and artists’ network of actor and filmmaker Joseph Gordon-Levitt.

Blade Runner 1982 – 2017: A Future Foretold

Ryan Gosling joins Harrison Ford in this new chapter of the Sci-Fi classic, which is set to premiere October 6, 2017 in USA and UK (a day sooner in other countries and in November in Japan).

BLADE RUNNER 2049 * Official Trailer

But, now, let’s remember (“Deckard: Memories! You’re talking about memories!” – Oh yes, it’s all about memories…) the original cult classic from 1982 (a winning combination of outstanding plot-cast-cinematography-effects-soundtrack), based on the novel ‘Do Androids Dream of Electric Sheep?’ (1968) by Philip K. Dick, which has served as reference to many professional Sci-Fi film directors, writers and producers for the past 30 years.

‘Los Angeles, sometime in November, 2019:

Retired police officer Rick Deckard (Harrison Ford) is detained at a noodle bar by officer Gaff (Edward James Olmos). Gaff takes Deckard to see his former supervisor, Bryant (M. Emmet Walsh). Deckard’s former job, as a ‘Blade Runner’, was to track down replicants (bioengineered robots) and “retire” them, which is the politically correct term for “elimination”.

Bryant wants Deckard back in the job, in order to retire six replicants, among which are Leon (Brion James), Roy Batty (Rutger Hauer), Zhora (Joanna Cassidy) and Pris (Daryl Hannah).

Deckard, teamed with Gaff, is sent to the Tyrell Corporation to ensure that the Voight-Kampff test (which helps to distinguish humans from replicants, based on their empathic response to questions) works on Nexus-6 models.

While at the Tyrell Corporation, Deckard discovers that Tyrell‘s (Joe Turkel) assistant Rachael (Sean Young) is an experimental replicant who believes to be human; Rachael’s mind has been enhanced with extra memories, to provide an “emotional cushion”.’

This encounter provides the plot with yet another layer of emotion, as both Rachel and Deckard discover much about each other and about themselves in this exciting journey embedded in a dark ambience, tinted by neon lights and wrapped in wire, rain and plastic.

Vangelis is behind the sublime music score that envelopes this futurist tale, forever tattooed in our own retinas.

Selecting the cast was not an easy task, particularly for the lead role of Deckard. Names like Robert Mitchum, Dustin Hoffman, Gene Hackman, Sean Connery, Jack Nicholson, Paul Newman, Clint Eastwood, Tommy Lee Jones, Arnold Schwarzenegger, Al Pacino, and Burt Reynolds were considered. It was due to the fact that Harrison Ford had already worked in Sci-Fi (in two of the successful Star Wars movies), his avid interest in the story of ‘Blade Runner’, along with the praise by Steven Spielberg, that he finally landed the role. His participation was secured for the new movie, too. Though, it’s well known in the industry that Ford and Scott had a hard time working together in the original, especially when it came to the subject of the voice overs to the narration of the film, something that Ford found to be unnecessary to the effectiveness of the plot, years later, both had no problem in recognising each other’s talents, putting their differences behind and talking of their working relationship just as another humorous anecdote to remember:

“Who’s the biggest pain in the arse you’ve ever worked with?”

Ridley Scott (Some of the movies he has directed include: Alien, Blade Runner, Thelma & Louise, Gladiator, Hannibal, Black Hawk Down, Prometheus, The Martian…) replied:

“It’s got to be Harrison… he’ll forgive me because now I get on with him. Now he’s become charming. But he knows a lot, that’s the problem. When we worked together it was my first film up and I was the new kid on the block. But we made a good movie”.

A “good movie”, as Scott describes it, Blade Runner went to win numerous awards, including Academy Awards®, Bafta Awards and Golden Globes, from the year it was released, 1982, to 2008 (the latter on the occasion of its DVD Special Edition Release).

BLADE RUNNER (1982) * Anniversary Trailer

It wasn’t a box-office hit at the time of its first run on the big screen, though, for it had to share the spotlight with other major productions such as ‘The Thing’, ‘Star Trek II: The Wrath of Khan’, and, most significantly,’ E.T. the Extra-Terrestrial’, which dominated ticket sales that summer.

Yet, it certainly is an all-time winner for both film lovers and critics who especially appreciate a thought-provoking and original plot coupled with stunning cinematography and a refined musical taste. And with regards to its, amazing at the time, non-digitalised, special effects, it should also be said that the film was named in 2007 ‘the 2nd most visually influential film of all time’ by the Visual Effects Society.

It is for these and other reasons that (and despite the excitement I feel about the new chapter) my heart will forever resonate with the following truth: there’s only one Blade Runner.

Fortunately, producers Broderick Johnson and Andrew Kosove, from Alcon Entertainment, seemed to agree:

“This is a once in a lifetime project for us.”

“Everything Ridley does as a filmmaker is fresh. I believe he sees an opportunity to create something that’s wholly original from the first Blade Runner.”

“This is a total reinvention, and in my mind that means doing everything fresh…”__Andrew Kosove

Rutger Hauer on BLADE RUNNER


For more on Philip K. Dick, author of the novel that was the literary source of the film, visit:
wiki/Philip_K._Dick >

How To Prevent Hacking


If you are one of the very few people out there who haven’t yet experienced the hacking of their email and/or social networking accounts, don’t be mistaken, you are not invulnerable: it can only take one click, one careless mistake, one apparently safe download or the temptation to engage in a fun social game. Your world can be hacked in a myriad ways.

So let’s expose the three most common tactics that hackers employ to get inside your personal matrix, and elaborate a bit on each of them to get a picture of their full extent.


Needless to say that what most hackers are after is your money and your contacts’ money, but there’s also another motivation behind the hacking of your email and social networking accounts and that’s what we are also going to explore when elaborating on method number 1, Password guessing.

PASSWORD GUESSING requires for a hacker to know you either personally or know details of you and your life such as your date of birth, details from your interests and preferences, your mobile number, your pets’ names… Yes, you’ve guessed right. This hacker is close to you in some way. They can be very close, such as a friend, boyfriend/girlfriend, ex-boyfriend/ex-girlfriend or family member can be, or fairly close to information about you and your life, such as a networking social contact can be. And within this last context is why you should be the most careful with regards to what you share and… with whom. These are details that can be used to guess a password or the security question of your email account in order for hackers to reset your password to one of their own, enabling them to login into your account.

Surely, you think that guessing a password requires power thinking, good social skills and a bit of psychology, but let’s face it, it’s easy to lose track of what one can share in social networking sites and it’s even easier to fall into lazy memory habits when creating a password. You’d be surprised of how little thinking it may take to guess your password if you’re prone to be fairly open with regards to the first case scenario and, fairly human when it comes to the second.

Here is what you need to do in order to protect yourself against this hacking method:

A – Create complex passwords and/or totally unrelated passwords to your personal details, preferences, interests and life experiences.

B – Do not use the same password across several email accounts, or at least vary it partially for each.

C – Choose security questions whose answer can’t be easily guessed. For example: Avoid ‘name of first school’, ‘mother’s maiden name’, ‘place of birth’… you get the idea.

D – Hide as many personal details as possible in your social networking profiles and don’t give away detailed personal or private information, either from you or from your closest contacts.

E – Related to D: Avoid exposing your links to family members and/or disclose their full names and shared details. Instruct your family members to do the same.

F – Avoid default user names such as ‘admin’ on the logins of your blogs and websites.

G – Don’t send passwords or store important information online or offline.

H – Avoid public Wi-fi connections.

I – Make sure you have logged out completely from websites and sessions either when connecting from public spaces or in shared work and home/clubs areas.

J – Monitor your logged on locations: Facebook has this option and email servers such as Gmail shows you from where last your account has been accessed. Know your IP addresses and if the last one does not match with the location/IP of your latest account activity, take action (you’ll find methods on how to solve a hacking attack also on this article).

KEYSTROKE CAPTURING would be the second in the scale of a proximity order from a hacker, at least when it comes to one hacking tool: the Hardware Keylogger.

The hacker requires physical access to the victims’ PC to install the hardware keylogger. This device can be easily and quickly inserted in between the keyboard and the PC to capture all the keystrokes, and thus the data, that you enter.

This data (obtained from your keystrokes) is collected in a temporary file on your PC and stored in the flash memory of the keylogger. They hacker only needs to retrieve the keylogger or access remotely your PC to open that temporal file and get the data.

Another way for keystroke capturing consists in the deployment of a Software keylogger (Spyware). Hackers send this keylogger application via email to their victims using a variety of disguises so the victims feel tempted or compelled to click on that link and open/download the application.

Just with that click the keylogger is automatically installed on your PC without any warning, and Antivirus programs also fail many times to recognise it. This application collects all your keystrokes (data) which are also stored in a temporary folder, periodically uploaded to the hackers location over the internet.

There’s a very extended practice which you have surely witnessed at least once if you are a member of any social networking site, especially Facebook. A hacker will have hacked one of your contacts’ email accounts/ social profiles and will either send you a private message for you to click on a specific link, or will have post it on your contact’s profile enticing or urging others to click on it.

Here is what you need to do in order to protect yourself against this hacking method:

Against Hardware Keylogger: Check your keyboard and PC for peculiar, strange, out-of-place devices.

A – Install an Antivirus complete with AntiSpyware and Malware protection, and if you obtain it from the internet, make sure it is from a manufacturer’s official site or a legitimate distributor’s site.

B – Never EVER click on any suspicious links and even less if you do not recognise the sender. Be careful, hackers may use email accounts that may resemble legitimate companies and organisations’ email addresses. Also, don’t click on that odd link that your social contact has posted on their profile or sent you by private message.

C – Never install/download any Software patch or keygen, unless, again, this is from a legitimate source or site.

Onto number three of the most common methods used by hackers: PHISHING. Phishing works by directing you to enter your details at a fake website whose look and feel mimic the legitimate one and even the url may appear to be identical to the legitimate site. The email or message you receive appears to come from a bank, or credit card company, requesting a verification of information. On clicking the link offered in that message, you are directed to a fake login page, which, as explained above, looks almost identical to the real one.

When you enter the information, this is either emailed to the hacker or saved in a text file hosted on the server.

Here is what you need to do in order to protect yourself against this hacking method:

A – If you are entering your details on a social networking site or any other site, make sure the url is legitimate and secure. Watch for the url to start with https:// <–(notice the bold typefont used on ‘s’ – Make sure that this ‘s’ is there), and that it continues and finishes exactly as the legitimate site’s.

B – With regards to social networking sites…. AVOID APPLICATIONS. Yes, some of them are fun, but beware that not only they are storing ALL the personal information you entered in your account, but that also the creator of the application could have easily fooled the social networking site’s application’s security procedures.

C – A true story example of a variation of phishing within a social networking context that will show you both how to recognise it and protect against it:

Inside a Hacker Chat >


Don’t worry, here’s how to solve it

First of all, don’t panic.

Now, if you suspect that the hacker could have accessed your bank and credit card details, notify both your bank and credit card company, but not before you:

A – change all your account’s passwords and security questions (following the precautions described above in this article) from a safe PC and a secure network.

In the time you reach the appropriate contact/department at your bank and/or credit card company and explain the situation the hackers could have accessed data they had no time yet to collect previously to you noticing the breach. So, this is number one priority. If a complete breach has already taken place, and your money stolen/compromised, your bank or credit card company will investigate the issue and maintain/refund your funds accordingly.

B – Next, make your PC and connections safe:

1. Restore your PC to a date before the breach took place (Start > Control Panel > System and Security > Recovery > System Restore -Restore this computer to a earlier point in time-).

2. Update your Antivirus program (as instructed earlier in this article) and run the updated program/version in search of viruses, spyware and malicious software.

3. If your PC is still infected and the antivirus cannot get rid of the threat, or you are not sure about when exactly your system was free of the threat and you suspect that your activity can still be monitored: Format your hard disk and re-install your Operative System (OS).

And from now on:

4. Download the latest Chrome, Firefox, Internet Explorer, Safari versions (from the legitimate sites)

5. Use a phishing filter in your email accounts and browsers; it will help you identify a phishing scam by showing you what is safe and what is not.

6. Be abreast with the latest on internet security. You can subscribe to especialised blogs or set alerts for this type of updates in your news reader.

7. And follow all the prevention tips offered in this article.