Do you use Scrivener to get your writing done or want to learn how to get the most out of what the software has to offer, then check out this training video: https://vimeo.com/132983281
Standard Manuscript Format; Character Arc; Properly Formatting; Style Guides; Online Writing Labs & Resources etc.
Do you use Scrivener to get your writing done or want to learn how to get the most out of what the software has to offer, then check out this training video: https://vimeo.com/132983281
There’s a self-publishing event taking place online right now. Free access to the seminars for a few days or you can pay for a membership: http://self-publishingschool.com/s/summit/
Courtesy of Damian Lopes:
Barrie’s Culture Department is hosting a free workshop on how to get published on 18 May 2016. Topics range from placing pieces in magazines and journals, all the way to landing an agent and book contract, with some self-publishing, zine and micro press publishing thrown in. Though free, registration is required.
Join Alana Wilcox of Coach House Books, Bruce Meyer and me on 18 May!
Follow the link for more details: http://www.damianlopes.com/news/barrie-workshop-how-to-get-published-18-may/
by SM CADMAN
Note: The owner of Page to Pixels has closed his website as he’s taken on a new Social Media job, so I’m reposting my article from there here. Enjoy! 😉
Use a paid Antivirus and Firewall. It will update regularly, keeping you protected from Zero-Day vulnerabilities and provides an extra layer of protection when surfing online. Are they fallible? Yes. But for the majority of regular users online, it will keep you and your machine and devices protected from most of the typical and damaging malware and viruses. Some Antivirus software such as Kaspersky will also keep you protected from nasty things like Rootkits and RAT’s (Remote Access Trojans). For another extra layer of protection, if on a Windows machine, keep UAC (User Account Control) enabled too. It keeps malicious software from modifying your system without your permission.
A hacker once told me, “Your passwords should be like launch codes…” and I agree. They should contain (wherever possible) long strings of both upper case and lower case letters, digits and symbols such as #!&. Or use a string of four to five words, unrelated to one another but know that sometimes these types of passwords are vulnerable to Dictionary Attacks. Make a hard copy of all of your passwords, keep them up to date, a simple notebook will do, kept in a secure location. Change them every 3-6 months. If your machine is clean, malware and virus free, think about using a Password Keeper but also understand that they too can be vulnerable to attacks. Avoid Public Wi-Fi whenever possible, and make sure your home network is secure by choosing the most appropriate setting. If you must use Public Wi-Fi, make sure your settings on your computer and/or devices are set to Public to avoid sharing files on that network.
Use a different password for every account and/or device you use or have. Yes. You must! It’s a pain in the ass but it’s worth it, so just do it.
Remember to back up your files, such as media, documents, photographs and any software/applications you use frequently. Use an external, portable hard drive for added security if you don’t trust Cloud back up, flash drives for quick backups etc. Keep your passwords on Cloud backup secure by following the aforementioned advice.
Make sure you regularly update your machine and software too. Choose automatic updates if less tech savvy. Always keep Flash updated and if you’re not using Java for gaming (Minecraft etc.) or keeping it up to date from previous versions, uninstall it. Also make sure your browser is updated too. If you’re thinking about having a website and are not technically proficient, use a CMS (Content Management System) website provider such as WordPress.com that regularly updates your website’s security and includes a comment anti-spam features (like Askimet) that also protects you from attacks.
Phishing is a particular nuisance to those who use the Internet for business, such as writers, artists etc. Often it arrives in your inbox in the form of some job offer or some other product offered. Always check the email it was sent from, if you can see the source of it (some email providers, provide this service) examine it. Social Engineering can also take place in these malicious types of emails by trying to entice you to download certain documents, run programs or click on various links within these emails. Good rule of thumb is: Unless you know the person and they’ve made you previously aware of sending you such information, don’t download anything or open any links. Be suspicious and wary of links that even family and friends send you with jokes etc. Social Engineering is especially rampant on Social Media by using tactics such as, ego flattery, being overly friendly and even romance (specifically targeted at women) or just the opposite, abusive with you. In security, the weakest link in the chain is the human being. Kevin Mitnick was famous for exploiting human vulnerabilities. Good videos explaining this to the average user are:
The Dangers of Social Engineering at TEDx by Brian Brushwood:
Social Engineering – Don’t Trust Fancy Ties & Polished Lies by Enterprise Risk Management:
The Dangers of Social Engineering by NCMS Inc.:
They will lie, defame and are often downright delusional with accusations, anything to engage you. Why? Because they’re trolls. But don’t engage them. They use tactics such as shaming and doxing also. Often their motives are simple and for very selfish reasons, but the worst ones can have far-fetched vendettas about some innocuous thing you’ve said or think you may have done or wronged them by. Never be afraid to block them or even act bizarre (crazy*) in return to deter them and keep away from you. Blocking isn’t censorship on them, it’s giving you your freedom to go about your business online free from harassment. Their abuse is censorship on you. If it’s particularly bad, always take screen shots but never respond; log IP’s on your website with any explosive comments and don’t read them if they upset you. And never be afraid to seek out professional help if it gets out of hand.
Most hacking of accounts on Social Media occurs because of these reasons:
-A compromised app, or bogus app
-Clicking on links, especially shortened URL’s without expanding them to see the link
-Visiting websites without being aware they’re logging your IP, or neglecting to scan the website first
Most malware and viruses are often dispatched in private messages and DM’s (Twitter, Direct Messages) via links or code dumped there, or links that lead you to re-log into your account. If you see strange code dumped on your feed or other nefarious posts shared by others on these platforms, never retweet them or repost them. Be wary of spam masquerading as actual posts or tweets too. Often times bots on Twitter will attach themselves to your account. Never follow back and block all bots if they follow. Do not retweet or follow any Follow Back Teams either. Signs of bots are: Never engaging in reciprocal conversations; timelines full of quotes and jokes, a sign of automation; and no favorites.
Resources and information:
To scan URL’s try, VirusTotal:
https://www.virustotal.com/
To expand URL’s try, LongURL:
http://longurl.org/
Does the Twitter Follower Scam Actually Work? by TrendMicro: http://blog.trendmicro.com/trendlabs-security-intelligence/does-the-twitter-follower-scam-actually-work/
Investigating Twitter Abuse, Part 1 by TrendMicro:
http://blog.trendmicro.com/trendlabs-security-intelligence/investigating-twitter-abuse-part-1/
Investigating Twitter Abuse, Part 2 by TrendMicro:
http://blog.trendmicro.com/trendlabs-security-intelligence/investigating-twitter-abuse-part-2/
Not everything about you must be shared. Think Before You Post is a good way to stop and reconsider future repercussions about what you’re posting. Limit your media such as photographs too unless this is your business to do so. Understand that Cloud, devices, Social Media accounts even with extreme privacy measures set on can still be hacked by very obsessive, stalking hackers. Never store, take photos of yourself that you don’t wish to be shared or made public. Understand too that devices and computers with built in cameras are at risk also for being hacked. If you feel especially paranoid about this, tape up your cameras and never use them. Use a separate device/camera to take photos with. Make rules between friends and family to okay all media about you before they post it too. Know your boundaries and what you’re comfortable with and never be afraid or intimidated to enforce them with others.
It happens, even after following the most stringent routines with security. Know that it’s not your fault and it happens to thousands of people and businesses each day. Seek out professional help if you’re dealing with malware and virus and get help if you’re dealing with personal abuse too, especially with PTSD and depression as a result from it. This may be the case if it has been an especially virulent attack such as doxing or from cyberstalking. Know that you’re not alone and that you have just as much right to be online as anyone else too.
More Free Resources, For Anonymity When Surfing:
Info, VPN: https://technet.microsoft.com/en-us/library/bb742566.aspx
Tor: https://www.torproject.org/
Orbot (For Mobile Devices, Android): https://www.torproject.org/docs/android.html.en
Proxy, HideMe: https://hide.me/en/proxy
Proxy, KProxy: https://www.kproxy.com/
Proxy, HideMyAss: https://www.hidemyass.com/proxy
Be Safe And Surf On! ~Sara 😉
by SM CADMAN
Note: The owner of Page to Pixels has closed his website as he’s taken a new Social Media job, so I’m reposting my article from there here. Enjoy! 😉
Read the most popular, best-selling fiction and you’re bound to notice a pattern: It always follows a succession of logical steps that know exactly how to hook you emotionally. This was first observed in early Greek tragedies and later seen within the works of William Shakespeare. Since then, many authors follow this distinctive formula known as Freytag’s Pyramid. Although many other formula’s exist, this one is most often used. Why? Because it’s tried, tested and true. It’s been around for centuries. It goes something like this:
Exposition
The writer sets up the story, with important background information, such as: Setting, prior events, and the back story of characters.
Rising Action
The story sets up various related incidents for the reader, the reader then becomes ‘hooked’ into the story.
Climax
The epicentre of conflict where action begins, also the turning point for the protagonist(s) or characters.
Falling Action
The conflict between protagonist and antagonist unravels…
Dénouement (resolution, revelation or catastrophe) Old French: untying of the knot.
Comprises the events from falling action into resolution, or the ending.
2. Do Your Research
Trying to sell your fiction and/or submit it? Find out what some of the hottest genres are and upcoming genres about to break. Currently vampires are a dying species. Shades Of Grey-esque fiction is on its deathbed while Dystopian, Tech thrillers (hackers, hacking, cybercrime, cyber espionage) are on the rise, think Mr. Robot and Blackhat. The Internet and technology are evolving faster than we are and this could be both a profitable and prolific niche to write about. Thrillers like, The Girl On The Train are hitting all the right notes with readers. As always, Romance, from the super-cheesy Harlequin novels to Nicholas Sparks are still tugging at readers heartstrings everywhere. I also foresee Weird and Bizarro fiction becoming more mainstream in the near future as both authors and readers expand their limits of creativity, with writers such as Christoph Paul and his alter ego Mandy De Sandra leading the pack.
3. Challenge Yourself: Write What’s Interesting Not Just What’s Familiar
Have a keen interest in a particular subject? Take a chance; explore, learn about it then write it. Keep things like familiarity for working through problems your characters may encounter, only. Often when you’re stuck with a piece of writing, this comes in handy. Have similar characters popping up in the same piece? Combine them and eliminate anything that doesn’t serve your story. Learn the skill of knowing what to keep and what to cut out. But always keep the cuts to refer back to later on or to use in other pieces.
4. Know Your Ending Before Your Beginning
You wouldn’t plan a vacation without knowing your destination, why would you write something without knowing how it will end? Although this hit and miss, laissez-faire attitude can work in life, it doesn’t necessarily translate well to the page. You have to know how it will end but your reader doesn’t need to know until that point. If plotting works for you, use it. If it doesn’t, don’t use it but always know your destination.
5. Know What POV Is And Stick To It!
Rookie mistakes found in fiction often center around issues with the writer not understanding Point Of View and writing it effectively. This confuses readers and you’ll have editors and agents relegating your work to the slush pile if they see you don’t understand POV. Spend time learning it and then applying it to every piece you write. Your readers, editors, agents and publishers will appreciate it. And it keeps you from looking like a newbie.
6. Write In A Strong Voice
Know the difference between the Active and Passive Voice in writing. Learn to moderate between them effectively. The majority of fiction nowadays demands that you use an Active Voice. Even within academic and research writing, scientists and researchers are now being encouraged to use it to convey their work better. A simple formula for using both voices is below:
In the Active Voice, the subject comes first.
In the Passive Voice, the object comes first.
Formula for Active Voice:
Subject+Verb+Object
Formula for Passive Voice:
Object+To be+Past Participle [verb]+By+Subject.
Example:
Active: Anne eats pizza.
Passive: Pizza is eaten by Anne.
Active: Matt Haig wrote a book about Mental Illness.
Passive: A book was written by Matt Haig about Mental Illness.
7. Deliberately Write Flawed Characters
There’s no conflict or interest if your characters aren’t flawed in some way. It’s boring to the reader. People in life aren’t perfect, your characters shouldn’t be either. If it doesn’t specifically suit a particular character to be flawless, don’t write them that way!
8. Write The Stories YOU Want To Read
Often the stories that need to be told are the ones that are unique to you and your life experiences. Why? Because undoubtedly on this revolving ball of dirt, you’re bound to find many others who are looking to read the exact same things you’re interested in. If you don’t enjoy reading it, chances are you won’t enjoy writing it either. Know what you like and what you’re interested in then write it. The world is waiting to hear your story.
9. Above All Else, “Keep It Simple, Stupid!”
Use simple words that pack the most meaningful punch. Your writing shouldn’t need a dictionary, a thesaurus and Wikipedia just to digest it. It shouldn’t be about writing, it should about the story. Don’t fret about mistakes either. Everyone makes them. Anything on paper with enough good editing after can be easily fixed. Major on the major, Plot, POV etc., minor on the minor, spelling mistakes etc.. Don’t obsess about what others may think about you, your story or your writing, just write it. Often this is the main factor contributing to Writer’s Block. And the only way to get past it, is to stop worrying and just write.
~Sara
by SM CADMAN
Graphic Of Freytag’s Pyramid¹
Freytag’s Pyramid or dramatic structure is the structure of either a piece of literary work (a book, a story or play) or even a film. Gustav Freytag arrived at creating this arc by examining Ancient Greek and Shakespearian dramas. But this arc can also be applied to many modern forms of fiction successfully too. He divided the parts of a drama into five acts or parts. They are:
Exposition
Where the writer sets up the story for the reader with important background information, such as: setting, prior events, and the back story of characters.
Rising Action
The story sets up various related incidents for the reader, generally where the reader becomes ‘hooked’ into the story being told.
Climax
The epicentre of conflict where action begins, also the turning point for the protagonist(s) or characters. Comparable to a punch line when a joke is told.
Falling Action
The conflict between protagonist and antagonist unravels…
Dénouement (resolution, revelation or catastrophe) Old French: untying of the knot.
Comprises the events from falling action into resolution, or the ending.
Below is a video and downloadable PDF graphics which discuss Freytag’s Pyramid:
Plot Structure, feat. Freytag’s Triangle
Downloadable Blank Worksheets PDF’s of Freytag’s Triangle
Enjoy and write on!
~Sara
¹Freytag’s Pyramid Arc. Graphic. Dr. Kip Wheeler. Freytag PDF. Carson-Newman College, 2003. Web. 18 Jul. 2015. ‹https://web.cn.edu/kwheeler/documents/Freytag.pdf›
by SM CADMAN
So I collected a number of videos about Narrative POV (Point Of View) from YouTube and also found some resources for Deep Narrative POV too.
Things to keep in mind when using Deep Narrative POV:
In Deep Narrative POV also remember to remove:
Resources And Guides For Deep Narrative POV (Point Of View):
Deep POV: What’s So Deep About it?
Diving Into Deep Point Of View
Emotional Depth For Deep Point Of View
Trouble Shooting Deep POV and Voice
More YouTube Videos Of Narrative POV (Point Of View):
Writing with Jane: Point of View
Narrative Point of View
Point of View (POV) – The Book Editor Show Episode 001
POV: Point of View
Enjoy and Write On!
~Sara
by SM CADMAN
“The author’s persona of a fictional narrative can help or hinder the success of the story. Which persona you adopt depends on what kind of story you are trying to tell and what kind of emotional atmosphere works best for the story.
“The persona develops from the personality and attitude of the narrator, which are expressed by the narrator’s choice of words and incidents. These in turn depend on the Point Of View of the story.”
“If the narrator is just the author telling a story in the third person, the persona is less clearly defined; it may be a lot like the author himself or herself, or very different. But the persona will still tell readers what’s happening in the story and what kind of attitude they should adopt toward events. For example, the persona may describe a death and make us feel outraged, or horrified, or amused.”¹
1. FIRST PERSON POINT OF VIEW:
Example sentence:
I walked to the store.
First person Point Of View is usually subjective: readers learn the narrator’s thoughts, feelings, and reactions to events.
Unreliable Narrator:
Willfully obtuse or is plain lying or at least giving only half-truths. The reader then must spot the inconsistencies in the story.
First Person Objective:
The narrator tells only what the characters said and did, without comment, and leaves it up to readers to imagine exactly what they’re feeling.
Observer Narrator:
Is a narrator outside the main story.
Detached Autobiography:
Is a narrator looking back on past events, with the benefit of hindsight.
Multiple Narrators:
Are First Person accounts by several characters.
Interior Monologue:
An interior monologue is one in which the narrator recounts the story as a memory, i.e. a stream of consciousness.
Dramatic Monologue:
The narrator tells the story out loud without interruption.
Letter/Diary Narrative:
The narrator writes down the events as they happen.
2. SECOND PERSON POINT OF VIEW:
Example sentence:
You walked to the store.
Rarely ever used in short stories and novels; mostly this POV is relegated to poetry, prose and song lyricism.
3. THIRD PERSON POINT OF VIEW:
Example sentence:
He/she/they walked to the store.
The story is told about the character, not from the character’s account of the story.
Third Person Limited:
Persona depends upon a single character who eyes witness the story.
Third Person Objective:
Readers have no entry to anyone’s thoughts or feelings. The author describes, without emotion nor editorializing what the characters say and do.
Third Person Omniscient:
“All-Knowing” the author tells the story from all perspectives, in this author’s persona the story can develop in any way of several directions.
Episodically Limited:
Whoever the Point Of View is for a particular scene determines the persona.
Occasional Interrupter:
The author steps in from time to time to supply the necessary information but otherwise stays in the background.
Editorial Commentator:
This narrator persona has a distinct attitude toward the story’s characters and events then frequently comments on them.
Sentimentality:
One problem is when the author’s editorial rhetoric tries to evoke an emotional response that the story’s events cannot evoke by themselves.
Mannerism:
Another issue is when the author’s persona seems more important that the story itself, and the author keeps reminding us of his/her presence through stylistic flamboyance, quirks of diction, or right editorializing about the characters and events of the story.
Frigidity:
This issue happens when the persona’s excessive objectivity trivializes the events of the story, suggesting that the characters problems not be taken seriously.
“Verb tense can also affect the narrative style of the story. Most stories use the past tense.”
“Be careful to write consistently in one verb tense unless your narrator is a person who might switch tenses.”
~Sara
¹Kilian, Crawford. Writing Science Fiction and Fantasy. Bellingham, WA: Self-Counsel Press, 2007. Book.
by SM CADMAN
PDF of the Barrie Writers’ Club Critique Guidelines. Download, read and keep them in mind when you’re at the club and given an opportunity to critique another author’s writing. Remember we will also be using them when editing for the upcoming book, Unleashed Ink 2 also.
Click on the above graphic for the PDF.
~Sara
by SM CADMAN
It’s that time again. Barrie Writers’ Club is venturing into the journey of working on our next anthology, Unleashed Ink II. This is an opportunity to walk through the steps of writing, critiquing, editing, accepting critiques, making changes and receiving a publishing credit.
Below you’ll find PDF’s with the Guidelines and SMF you are to follow for submissions, please read and follow them carefully before submitting. If you need any technical assistance with formatting, please contact: Evie, Rose-Ann, Aaron or myself, Sara (my email address in on my contact page at SM CADMAN).
Happy submitting!
CLICK THE GRAPHIC FOR THE PDF UNLEASHED INK II GUIDELINES
Previous examples of SMF and exactly what your submission should look like, below in PDF format:
1. GUIDELINE & TIPS – Standard Manuscript Format
2. TITLE PAGE – Standard Manuscript Format
3. NOVEL & SHORT STORY – Standard Manuscript Format
~Sara