Dave von Fintel

Filmmaker/Photographer specializing in Aerial Cinematography


  • Filmmaker specializing in Aerial Cinematography2014 - Present

    Kansas City, MO

    I'm taking my creative skills to new heights - piloting a UAV to produce dramatic aerial video/photo solutions as well as producing & editing conventional video for a variety of industries.

  • Freelance Creative Director2012 - 2014


  • Web Development Director2004 - 2012

    Rockhurst University

  • Creative Director1999 - 2004

    Rockhurst University

  • Art Director1998 - 1999

    Rockhurst University

  • Graphic Designer1997 - 1998

    GB Design


  • Bachelor of Fine Arts (BFA), Graphic Design1991 - 1996

    University of Missouri

  • Graphic Design, Photography & Video Production1995 - 1996

    University of Tasmania School of Art, Australia


  • “Dave has exceptional skills as a designer and web developer. As his supervisor for several years, I found him to be a joy to work with, and a great team player. He is a problem-solver who finds a solution to every challenge. I would not hesitate to hire him again.”

    Rosita McCoy, Senior VP - KU Endowment Association

  • “I’ve had the pleasure of working with Dave on many projects. He’s always able to bring a fresh perspective to every job. His positive personality and openness to trying new things, makes working with him a very fun & collaborative event.”

    Mark McDonald, Owner - Mark McDonald Photography

  • “I worked with Dave for several years while employed at gb Design. Dave and I collaborated on a variety of design projects and I always found him to be easy to work with and valued the ideas and professionalism he brought to the table. Since that time, my agency has had the pleasure to work with Dave and his team at Rockhurst as a vendor providing online development solutions and consulting to Rockhurst University. Dave continues to provide impressive direction and management skills to the projects we have conducted with him and his team.”

    Ryan Lorei, Owner - Voltage Creative

  • “In the seven years Dave and I worked together, I watched him consistently come up with effective, creative solutions for various print, web and video projects. He stays on top of design trends and web standards, and everything he touches looks refined and professional. He has exceptional talent and lots of ideas, which made him a valuable member of our team.”

    Jamie Swearingen, UX Copywriter - Garmin International

  • “I have hired Dave may times for his expert graphic design services, and have also brought him in as a consultant on several high profile web design and development projects. Dave's ability to listen to my client's needs, and his ability to translate their ideas into reality are second to none.”

    Matt Couch, Real Estate Analyst - Hopkins Appraisal Services


  • • CASE (Council for Advancement and Support of Education): Silver Award
- '09, Excellence in Multimedia: Single Web Page (Ready for Rockhurst) 
- Bronze - '02, Rockhurst University Alumni Magazine 
- Silver - '01, Rockhurst University Alumni Magazine
 - Gold - '00, Rockhurst University Alumni Magazine Cover 
- Silver - '00, Rockhurst University Campus Banners 
• Web Marketing Association's Web Awards Judge - '08 
• JAA (Jesuit Advancement Administrators): '06 - Award of Merit: Multimedia, Admission Pages 
• Internet Advertising Competition '05 - Best Education Integrated Ad Campaign - Rockhurst Website 
• Center for Digital Education: '05 Best of the Web 2nd place, Rockhurst University 
• Web Marketing Association: '05 Best Education Internet Advertising Award, Rockhurst University 
• American Association of Webmasters: '04 Silver Award, Rockhurst University 
• Mead Papers: Certificate of Excellence in the Graphic Arts - Rockhurst University, 1999 Annual Report

Visit Instagram/davevonfintel for frequently updated shots. Some of my work features footage that may be purchased as stock video or photo.


Let's Connect

6 steps the phone will get hacked. Try some one wanting to hack your own cellphone?

The response to this question is most likely “yes” – whether or not you might be someone of certain interest to hackers or not. An average Joe is almost certainly not the CEO of a petroleum or pharmaceutical organization, but there is still funds is built in hacking her product and extracting information. This is how attackers do this.

1. monitoring and wiretapping through SS7

Signalling System 7 (SS7) was an about 50-year old method which links more mobile networks around the world and allows services like wandering and name forwarding. It really is slightly rusty, and thus was its security. Alternatively, hacking into it allows attackers to trace the place of every mobile device around the globe and intercept the phone calls and texts coming-on and off they. All they require will be the connected contact number.

There is very little you are able to do to combat that sort of assault. If you should be a topic interesting to somebody who has the capability to hack SS7 – that may become anybody from governments, to petty cybercriminals – your own device are monitored. But you can easily ensure the material of your own communications remains secured through software that offer end-to-end security.

2. Eavesdropping for you via an IMSI-catcher

The standards employed by all mobiles are pretty older rather than specifically protected.

One of several defects inside them is the fact that a device always determines to a mobile tower using its IMSI numbers, however the mobile tower does not need to. And because mobile phones constantly connect to the tower emitting the strongest alert – usually the closest one – it isn’t that difficult to entice a device for connecting to a fake mobile tower.

This might be, essentially, what an IMSI-catcher (or Stingray) device is. When an attacker tricks the unit for connecting to their unique tower, they are able to relay your communications and study the unencrypted content material. To avoid which you can use an IMSI-catcher sensor software, which will help you stay away from fake mobile towers.

3. Infecting a computer device with malware or malware

The software on the phone have access to all sorts of records stored about it. This consists of your contacts, exploring history, conserved logins, where you are, etc. Plus if all those include stored in an encrypted kind, a keylogger spyware app can avoid that by keeping track of everything kind before it previously will get encoded.

Assailants either must have actual the means to access the telephone, so that they can install the apps on their own – or have you ever do so any time you install program from questionable 3rd party storage. Ideal you can do is actually put a password in your lock display screen rather than project beyond your Bing Play store.

4. Using phishing in order to get your own recommendations

Checking out the previous section, you are questioning who’d be very silly to set up a malicious application on the cellphone by themselves? It is not truly about stupidity, however.

Phishing plans, for which attackers trick their own targets with artificial versions of genuine web sites to extract recommendations, get increasingly more advanced and customized. Remember that single a phishing attack most likely switched the result of an election? Precisely.

5. Intercepting the communications over complimentary Wi-Fi

Whoever works a network additionally sees the unencrypted visitors going right on through it.

This can be as correct for Wi-Fi as it’s for mobile operators. Although a company is actually a legit business which works the channels under numerous laws, everyone can build a Wi-Fi hotspot.

Establishing a totally free one alongside a resort or cafe – and naming it aided by the establishment’s identity – is a way to entice around naive visitors for connecting. When they manage, the attacker have access to all the unencrypted email messages and messages which go through they. The answer here’s to prevent utilizing no-cost Wi-Fi and encrypt all your website traffic and communications.

6. removing important computer data through a USB charger

The USB chargers of all smartphones don’t only power battery pack, but can furthermore send information on / off these witryna mobilna ferzu devices when attached to a pc. While this can be useful for running data files throughout the equipment and saving some priceless megabytes from the data plan, also, it is a strike vector.

A number of variations of Android, the product mounts the tough drive as soon as the cable tv are connected with a pc. The latter tends to be build to immediately upload trojans or malware when this occurs. Hence, don’t demand your own cellphone on public personal computers, or ones that you don’t depend on. Your most readily useful simply use an effective older wall surface outlet to cost their unit.