Latest YouTube Video

Saturday, May 23, 2015

Orioles Video: P Brian Matusz ejected in 12th for having foreign substance, team loses 1-0 in 13 innings to Marlins (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

MLB: Orioles P Brian Matusz ejected in 12th inning vs. Marlins for having a foreign substance on right forearm (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Benfica replaces Porto on preseason tour

NEW YORK (AP) Portuguese league champion Benfica will replace Porto for four preseason exhibition games in North America this summer.

from FOX Sports Digital http://ift.tt/1RdoPlO
via IFTTT

Editorial: Anonymous platforms for cyberbullies hurt our kids

YIK Yak. It sounds benign, if a little childish. But this smartphone app is causing concern across the world. The app works on a geographic basis, like.

from Google Alert - anonymous http://ift.tt/1IW2JBt
via IFTTT

Benfica celebrates title with sons of fan beaten by police

LISBON, Portugal (AP) The two young sons of a Benfica fan who was beaten by a police officer helped the team celebrate its recently won Portuguese league title on Saturday.

from FOX Sports Digital http://ift.tt/1HCEJ4I
via IFTTT

Ancelotti: 'I continue at Madrid, or I take yearlong break'

MADRID (AP) Real Madrid coach Carlo Ancelotti says he will take a year off from coaching if he is let go by the Spanish club.

from FOX Sports Digital http://ift.tt/1cbSXOH
via IFTTT

Monaco claims final Champions League birth

PARIS (AP) Yannick Ferreira Carrasco scored the winner as Monaco beat Lorient 1-0 to secure a third-place finish in the French league on Saturday and claim the final qualifying birth for the Champions League.

from FOX Sports Digital http://ift.tt/1HCwJ3E
via IFTTT

Valencia grabs Spain's last CL spot; Almeria, Eibar go down

BARCELONA, Spain (AP) Valencia fought back twice to earn a Champions League berth with a 3-2 away win that relegated Almeria on a dramatic final day of the Spanish league Saturday.

from FOX Sports Digital http://ift.tt/1F8e3pm
via IFTTT

Juventus beats Napoli 3-1 to celebrate league and cup double

MILAN (AP) Juventus beat Napoli 3-1 in Serie A on Saturday as it celebrated winning the double of the Italian league and cup in a party atmosphere in Turin.

from FOX Sports Digital http://ift.tt/1AqR38m
via IFTTT

Orioles: LHP Ariel Miranda agrees to minor league contract - MLB.com report; 22-25 with 3.78 ERA from 2007-13 in Cuba (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Ben Stiller, Anonymous Donor

Watch "Ben Stiller, Anonymous Donor" from the hit NBC Live Events and Specials, Red Nose Day.

from Google Alert - anonymous http://ift.tt/1IRwVis
via IFTTT

Ben Stiller, Anonymous Donor

Watch "Ben Stiller, Anonymous Donor" from the hit NBC Live Events and Specials, Red Nose Day.

from Google Alert - anonymous http://ift.tt/1IRwVis
via IFTTT

Paderborn, Freiburg relegated from Bundesliga on final day

BERLIN (AP) Paderborn and Freiburg were relegated from the Bundesliga on the last day of the season Saturday, while Hamburg clinched the relegation playoff spot and Stuttgart survived outright.

from FOX Sports Digital http://ift.tt/1StaZND
via IFTTT

Blatter set to polarize opinion for 4 more years at FIFA

GENEVA (AP) Sepp Blatter divides opinion so much even his opponents are charmed by him.

from FOX Sports Digital http://ift.tt/1IVoLUN
via IFTTT

Urawa beats Kashima 2-1 to keep lead in J-League

TOKYO (AP) Takahiro Sekine's late goal helped Urawa Reds beat Kashima Antlers 2-1 to tighten its grip on the J-League lead and remain unbeaten on Saturday.

from FOX Sports Digital http://ift.tt/1Lpgsjb
via IFTTT

Orioles: C Matt Wieters (elbow) targeting June 4 as his return from 60-day DL - \"My arm will let me know when I'm ready\" (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Astoria — Advanced Tor Client Designed to Avoid NSA Attacks

In response to the threat of intelligence agencies like NSA and GCHQ, Security researchers from American and Israeli academics have developed a new advanced Tor client called Astoria specially designed to make eavesdropping harder. Tor (The Onion Router) is the most popular anonymity network that is intended to allow a user to browse the Internet anonymously via a volunteer network of more


from The Hacker News http://ift.tt/1emkf6q
via IFTTT

Google Brillo OS — New Android-based OS for Internet of Things

Internet of Things is the future, and every big tech companies are trying to become an integral part of this upcoming trend. Keeping this in mind, Google is developing an operating system for connecting all devices via the Internet. Google is expected to launch a new Android-based operating system that would be lightweight enough to run on low-power devices connected to the "Internet of


from The Hacker News http://ift.tt/1RbIwKO
via IFTTT

Anonymous on Twitter: "NSA Planned To Hack Google App Store And Install Malware On All ...

Retweets 13; Favorites 7; Pure Warfare1 AnonyOpNews DarkapocalyptiaX Anonymous OlgaMaria Carmen . Angel Jaen :P the Bestnuggz Officer ...

from Google Alert - anonymous https://www.google.com/url?rct=j&sa=t&url=https://twitter.com/LatestAnonNews/status/601533622277963777&ct=ga&cd=CAIyGjgxMzAxNTQ0ZWE3M2NhMmQ6Y29tOmVuOlVT&usg=AFQjCNHqEwfe1bDu_QaMSqM7j7W4Ga_BnQ
via IFTTT

A Dark and Dusty Sky


In the dusty sky toward the constellation Taurus and the Orion Arm of our Milky Way Galaxy, this broad mosaic follows dark and faint reflection nebulae along the region's fertile molecular cloud. The six degree wide field of view starts with long dark nebula LDN 1495 stretching from the lower left, and extends beyond the (upside down) bird-like visage of the Baby Eagle Nebula, LBN 777, at lower right. Small bluish reflection nebulae surround scattered fainter Taurus stars, sights often skipped over in favor of the constellation's better known, brighter celestial spectacles. Associated with the young, variable star RY Tau, the yellowish nebula VdB 27 is toward the upper left. Only 400 light-years or so distant, the Taurus molecular cloud is one of the closest regions of low-mass star formation. At that distance this dark vista would span over 40 light-years. via NASA http://ift.tt/1K7yTsl

Orioles Highlight: Miami native Manny Machado with 3 RBI, Caleb Joseph 3 H, including 2-run single, in win over Marlins (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Friday, May 22, 2015

[FD] Broken, Abandoned, and Forgotten Code, Part 5

Part 5 is up. In this and the next several parts we start analyzing the structure of Netgear R6200 firmware updates. We switch over to the HTTP daemon because it's less broken and a little easier to analyze than upnpd. The overall goal is to reverse engineer the firmware format so we can generate a malicious firmware image to use when exploiting the SetFirmware SOAP action described in parts 1-4. Binary patching, emulating with QEMU, and debugging with IDA Pro are recommended for the next several installments. Here is some recommended reading to help get that set up: - Remote Debugging with QEMU and IDA Pro http://ift.tt/1AIcSPm - Patching, Emulating, and Debugging a Netgear Embedded Web Server http://ift.tt/1CY9qA4 If you missed my post to Full Disclosure where I introduced the series, here's that: http://ift.tt/1F6IUWA As always I welcome feedback via email or Twitter. I'm @zcutlip. I hope you enjoy it. Cheers! Zach

Source: Gmail -> IFTTT-> Blogger

[FD] call for paper(information retrieval, privacy)

Workshop on Privacy-Preserving Information Retrieval, held in conjunction with the ACM SIGIR conference (August 13, 2015; Santiago de Chile) Submission Deadline: June 5, 2015. Acceptance Notifications: June 15, 2015 Camera-ready Deadline: June 22, 2015 Workshop: August 13, 2015 Submission types: Long papers (max. 4 pages in ACM SIG format), Position papers (max. 2 pages in ACM SIG format) Workshop format: Keynote speech, paper presentations, poster and group discussions. More information on: http://ift.tt/1Q1Ydlh We look forward to your ideas and solutions to the cross-discipline research on privacy and information retrieval. The submissions should be abount but not limited to the following research areas: - Privacy-related information retrieval models - Privacy in social media, micro blog, and people search - Evaluation for privacy-preserving IR - Leak of sensitive information in natural languages - Privacy in location-based services, recommender systems, and other IR works on mobile app - Privacy preserving IR work for healthcare and other domains. Potential topics for group discussion: - Protecting User Privacy in Search, Recommendation and Beyond: much damage can be caused as users can be identified in AOL query log data and Neflix log data, it is important to develop effective and efficient solutions to protect users' privacy in information retrieval applications. - Dataset Distribution and Evaluation: How does privacy affect IR test dataset distribution and evaluation? Forinstance, web query logs and medical records could not be shared without privacy concerns to the public or the researchers. How to anonymize the datasets and make sure that they can be shared with a certain degree ofprivacy guarantee while at the same time preserves the utility of the data? - Information Exposure Detection: new information retrieval and natural language processing technologies are needed to quickly identify components and/or at tributes of a user's online public profile that may reduce the user's privacy, and warn one's vulnerability on the Web. - Novel Information Retrieval Techniques for Information Privacy/Security Application: new information retrieval, evaluation, or machine learning techniques need to be designed that fit the practice of applications in information privacy and security. - Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services: data about a user's location and historical movements can potentially be gathered by a third party who takes away the information without the awareness of the service providers and the users, how location-based services and recommender systems interact with Location Obfuscation techniques and other Privacy-Enhancing Technologies. Grace Hui Yang (Georgetown University) Ian Soboroff (NIST)

Source: Gmail -> IFTTT-> Blogger

[FD] Multiple Vulnerabilities in Openlitespeed <= 1.3.10 - CVE-b045-73d a.k.a. Analbleed.

David from litespeedtech.com replied: "These are two bugs used to be in v1.3.10 and we fixed all of them in 1.3.11 now."

Source: Gmail -> IFTTT-> Blogger

[FD] Hue 3.7.1 Local Privilege Escalation

Hue project responded in two different messages: """ This is not changed, the Hue project provides this command as a helper, this is up to the packaging distribution to change the permissions of/move the files accordingly. """ """ Actually, the root privilege was only needed in Hue 2 when using the Shell app, there is no Shell app anymore since Hue 3 so indeed we should remove the part warning about not being run as root """

Source: Gmail -> IFTTT-> Blogger

[FD] 0day Mailbird XSS

I created inquiry about this issue to their support and got two replies: Leonardo Santoso, May 11, 12:50: We are investigating this issue right now, I'll let you know once we know more about it. Thank you for notifying us about it. Leonardo Santoso, May 21, 17:50: This issue should be fix in the latest version, please update your Mailbird. Latest version after downloading the application is 2.0.16.0 dated as May 15, which is still vulnerable to this cross-site scripting vulnerability. Nothing in changelog about this case. Mitigation: use different application :)

Source: Gmail -> IFTTT-> Blogger

Ebola-free Liberia cleared to host football games again

CAIRO (AP) The Confederation of African Football has cleared Liberia to host international football games again after it was declared free of Ebola by the World Health Organization.

from FOX Sports Digital http://ift.tt/1Eol0B0
via IFTTT

[FD] Hacktivity 2015 CFP

Hi all, Please find our CFP below - would be great to see many submissions from you ;) [ == Hacktivity 2015 Call For Papers == ] Conference: October 9-10, 2015 CFP closing date: June 30, 2015 CFP notification to authors: July 31, 2015 Venue: Budapest, Hungary Web: https://hacktivity.com Email: cfp _!{at}!_ hacktivity.com Twitter: @hacktivityconf Hacktivity is the leading hacking conference in Hungary. Hacktivity brings together representatives of the information security fields. We share knowledge in informal, educational, and highly technical forms. [ = Call For Contributions/Speakers = ] We accept the following formats of submission: either a conference, or a hello workshop. [ == Talk / Conference / Presentation / Paper == ] Business as usual. The Hacktivity programm commitee will evaluate submission from a wide spectrum of IT security topics. We will favor technical submissions and those with demos. Please write your slide-deck in English. Your speech can be in English (favored) or Hungarian. For speakers only speaking Hungarian, a professional translator will on the fly translate it to English. As a speaker you can have either a 20-minutes or 40-minutes slot to present your topic. [ == Hello workshop == ] We all know there is a huge difference between observing and achieving. Real knowledge grows from popping your first shell. Thus in order to help visitors ramping up, we organize hello workshops. Those are short courses introducing basic/intermediate IT security skills. Previous years included topics like: - Burp Extensions - Basic malicious PDF analysis - Rootkit techniques - SQL injections A hello workshop has the following requirements: - participants should acquire a definite and useful piece of knowledge; - participants bring their own equipment you should calculate with the diversity; - a workshop will not have more than 16 attendees; - it should fit into 20 plus 20 minutes (observing then executing) from preparation to take-aways; - one workshop will be held approx. 3 times during the two days [ = Topics = ] Here are some topics that we are especially interested in: Vulnerabilities at unexpected territories - Exploit and their mitigations - Malware analysis - Blue Team techniques / operation - Big Data / Cloud / APT / any_fancy_buzzword - What’s the big deal? Are there any / What are the new threats? - Extraordinary stories of #FAIL - Any research which brings something brand new to the security world This list is non limitative. Feel free to submit your security research. [ = How to submit your research = ] Please fill out our CFP application form: http://goo.gl/nByDWT [ = Speaker benefits = ] Speaker benefits are applicable to every person presenting at least one 40 minute or two 20 minute presentations. If you would like to hold a Hello workshop and need coverage for travel or accommodation please contact us! Hacktivity offers speakers accommodation for 2 nights next to the venue of the conference and cover travel expenses up to 350 EUR. We may have some flexibility regarding the travel expenses. The travel contribution is agreed individually with every speaker. Contact us at cfp _!{at}!_ hacktivity.com [ = Copyright = ] As a speaker or workshop presenter you should accept the following use of your intellectual properties: Presentations will be recorded and made available on our web site. To the event a conference paper will be published with presentation/workshop titles and abstracts, the presenters’ bio and their photos. The brochures will be distributed at the registration for all participants of the conference. Presentations and workshop materials will available on the conference web page after the event in pdf form. During the presentation we will take photos and use them in our publications and will be published on our site. We are not going to use your materials in any other form mentioned above without your prior consent. Cheers, Ferenc Spala head of program committee

Source: Gmail -> IFTTT-> Blogger

[FD] SAP Security Notes May 2015

Orioles: IF Everth Cabrera (left foot contusion) reinstated from 15-day DL; IF Rey Navarro optioned to Triple-A (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Coach Ernesto Valverde to stay another season at Bilbao

BILBAO, Spain (AP) Athletic Bilbao coach Ernesto Valverde has agreed to a one-year contract extension that will keep him at the Basque club through the end of next season.

from FOX Sports Digital http://ift.tt/1F1CEew
via IFTTT

I have a new follower on Twitter


Everyday Carry
A peek into the pockets of people worldwide, showcasing the essentials they carry every day. Share your EDC at http://t.co/GMpq61Vi2y
Miami Beach, FL
http://t.co/k5XLIdh33b
Following: 42327 - Followers: 110168

May 22, 2015 at 03:37PM via Twitter http://twitter.com/everydaycarry

CAS hears Gibraltar's appeal to join FIFA

LAUSANNE, Switzerland (AP) Gibraltar's appeal to become a FIFA member has been heard at world sport's highest court, with no timetable set for a ruling.

from FOX Sports Digital http://ift.tt/1FIkftO
via IFTTT

[FD] [CORE-2015-0010] - Sendio ESP Information Disclosure Vulnerability

Army removes WWII bomb near London's Wembley Stadium

LONDON (AP) British police say the army has safely removed an unexploded World War II bomb found near London's Wembley Stadium.

from FOX Sports Digital http://ift.tt/1Ap6GNr
via IFTTT

Greece escapes soccer suspension, FIFA happy with changes

ATHENS, Greece (AP) FIFA says it is satisfied with changes made to sporting law in Greece, and has dropped a threat to suspend the country from international competition.

from FOX Sports Digital http://ift.tt/1JGYiv0
via IFTTT

Scolari out of a job, without many supporters in Brazil

SAO PAULO (AP) Not long ago, Luiz Felipe Scolari was seen as an indisputable hero in Brazil. Most agreed he was the perfect coach to lead the national team at the home World Cup.

from FOX Sports Digital http://ift.tt/1IP5fLa
via IFTTT

Court releases 4 suspects in soccer fight death

MADRID (AP) A Spanish court has released four suspects in the death of a soccer fan following a brutal street fight between rival ''ultra'' groups in the Spanish capital in November.

from FOX Sports Digital http://ift.tt/1Bg8Xph
via IFTTT

Bid to topple Blatter from FIFA rests with Jordanian prince

LONDON (AP) In soccer, the only certain winner seems to be Sepp Blatter.

from FOX Sports Digital http://ift.tt/1Bg8Xpe
via IFTTT

Paul-Georges Ntep receives 1st call with France

PARIS (AP) Rennes forward Paul-Georges Ntep has been called up for the first time with France for upcoming friendlies against Belgium and Albania.

from FOX Sports Digital http://ift.tt/1IOZLzY
via IFTTT

Osaka, Yokohama picked as 2015 Club World Cup host cities

ZURICH (AP) FIFA says Osaka and Yokohama will be host cities for the 2015 Club World Cup in Japan.

from FOX Sports Digital http://ift.tt/1BfMokJ
via IFTTT

FIFA scandals while Sepp Blatter has been president

GENEVA (AP) FIFA has been routinely called ''scandal-plagued'' for much of Sepp Blatter's 17-year presidential reign.

from FOX Sports Digital http://ift.tt/1c8MJ1R
via IFTTT

Flawed Android Factory Reset Failed to Clear Private Data from Smartphones

If you’re planning to sell your old Android smartphone then you need to think again because there is a weakness in the Android Factory Reset option that could be exploited to recover your login credentials, text messages, emails and pictures even if you have wiped its memory clean. Computer researchers at the University of Cambridge conducted a study on Android devices from 5 different


from The Hacker News http://ift.tt/1BfFuvE
via IFTTT

Adult Friend Finder... Hacked & 3.5 Million Users' Database Leaked Online

Until now, hackers have targeted companies and websites that hold your credit card details or medical information, but now they are showing interest in your sex life instead. You heard it right. Adult Friend Finder, a casual dating website with the tagline "hookup, find sex or meet someone hot now", has suffered a massive data breach. Nearly 4 Million users of AdultFriendFinder have had


from The Hacker News http://ift.tt/1K85m1x
via IFTTT

NGC 6240: Merging Galaxies


NGC 6240 offers a rare, nearby glimpse of a cosmic catastrophe in its final throes. The titanic galaxy-galaxy collision takes place a mere 400 million light-years away in the constellation Ophiuchus. The merging galaxies spew distorted tidal tails of stars, gas, and dust and undergo fast and furious bursts of star formation. The two supermassive black holes in the original galactic cores will also coalesce into a single, even more massive black hole and soon, only one large galaxy will remain. This dramatic image of the scene is a composite of narrowband and near-infrared to visible broadband data from Hubble's ACS and WPC3 cameras, a view that spans over 300,000 light-years at the estimated distance of NGC 6240. via NASA http://ift.tt/1FyeyfY

Thursday, May 21, 2015

Towards Efficient Evolving Multi-Context Systems (Preliminary Report). (arXiv:1505.05502v1 [cs.AI])

Managed Multi-Context Systems (mMCSs) provide a general framework for integrating knowledge represented in heterogeneous KR formalisms. Recently, evolving Multi-Context Systems (eMCSs) have been introduced as an extension of mMCSs that add the ability to both react to, and reason in the presence of commonly temporary dynamic observations, and evolve by incorporating new knowledge. However, the general complexity of such an expressive formalism may simply be too high in cases where huge amounts of information have to be processed within a limited short amount of time, or even instantaneously. In this paper, we investigate under which conditions eMCSs may scale in such situations and we show that such polynomial eMCSs can be applied in a practical use case.



from cs.AI updates on arXiv.org http://ift.tt/1ejuwAm
via IFTTT

Parallel Streaming Signature EM-tree: A Clustering Algorithm for Web Scale Applications. (arXiv:1505.05613v1 [cs.IR])

The proliferation of the web presents an unsolved problem of automatically analyzing billions of pages of natural language. We introduce a scalable algorithm that clusters hundreds of millions of web pages into hundreds of thousands of clusters. It does this on a single mid-range machine using efficient algorithms and compressed document representations. It is applied to two web-scale crawls covering tens of terabytes. ClueWeb09 and ClueWeb12 contain 500 and 733 million web pages and were clustered into 500,000 to 700,000 clusters. To the best of our knowledge, such fine grained clustering has not been previously demonstrated. Previous approaches clustered a sample that limits the maximum number of discoverable clusters. The proposed EM-tree algorithm uses the entire collection in clustering and produces several orders of magnitude more clusters than the existing algorithms. Fine grained clustering is necessary for meaningful clustering in massive collections where the number of distinct topics grows linearly with collection size. These fine-grained clusters show an improved cluster quality when assessed with two novel evaluations using ad hoc search relevance judgments and spam classifications for external validation. These evaluations solve the problem of assessing the quality of clusters where categorical labeling is unavailable and unfeasible.



from cs.AI updates on arXiv.org http://ift.tt/1EmBWb5
via IFTTT

On the relation between accuracy and fairness in binary classification. (arXiv:1505.05723v1 [cs.LG])

Our study revisits the problem of accuracy-fairness tradeoff in binary classification. We argue that comparison of non-discriminatory classifiers needs to account for different rates of positive predictions, otherwise conclusions about performance may be misleading, because accuracy and discrimination of naive baselines on the same dataset vary with different rates of positive predictions. We provide methodological recommendations for sound comparison of non-discriminatory classifiers, and present a brief theoretical and empirical analysis of tradeoffs between accuracy and non-discrimination.



from cs.AI updates on arXiv.org http://ift.tt/1ejtu7s
via IFTTT

Variational Inference with Normalizing Flows. (arXiv:1505.05770v1 [stat.ML])

The choice of approximate posterior distribution is one of the core problems in variational inference. Most applications of variational inference employ simple families of posterior approximations in order to allow for efficient inference, focusing on mean-field or other simple structured approximations. This restriction has a significant impact on the quality of inferences made using variational methods. We introduce a new approach for specifying flexible, arbitrarily complex and scalable approximate posterior distributions. Our approximations are distributions constructed through a normalizing flow, whereby a simple initial density is transformed into a more complex one by applying a sequence of invertible transformations until a desired level of complexity is attained. We use this view of normalizing flows to develop categories of finite and infinitesimal flows and provide a unified view of approaches for constructing rich posterior approximations. We demonstrate that the theoretical advantages of having posteriors that better match the true posterior, combined with the scalability of amortized variational approaches, provides a clear improvement in performance and applicability of variational inference.



from cs.AI updates on arXiv.org http://ift.tt/1PZX9ym
via IFTTT

How do you revise your belief set with %$;@*?. (arXiv:1504.05381v2 [cs.AI] UPDATED)

In the classic AGM belief revision theory, beliefs are static and do not change their own shape. For instance, if p is accepted by a rational agent, it will remain p to the agent. But such rarely happens to us. Often, when we accept some information p, what is actually accepted is not the whole p, but only a portion of it; not necessarily because we select the portion but because p must be perceived. Only the perceived p is accepted; and the perception is subject to what we already believe (know). What may, however, happen to the rest of p that initially escaped our attention? In this work we argue that the invisible part is also accepted to the agent, if only unconsciously. Hence some parts of p are accepted as visible, while some other parts as latent, beliefs. The division is not static. As the set of beliefs changes, what were hidden may become visible. We present a perception-based belief theory that incorporates latent beliefs.



from cs.AI updates on arXiv.org http://ift.tt/1EqbaoL
via IFTTT

Add a link to node/add/session for anonymous users to log in

So that Justin and others can tweet the direct add-a-session url, we need to have it prompt users to first create an account.

from Google Alert - anonymous http://ift.tt/1cQUxpN
via IFTTT

Orioles Highlight: Steve Pearce hits his 1st grand slam, J.J. Hardy singles in tiebreaking run in 5-4 win over Mariners (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Anonymous on Twitter: "Here is the link to download part of 1TB data obtained from #Expo2015 ...

Here is the link to download part of 1TB data obtained from #Expo2015 http://ift.tt/1HxIVp1 …

from Google Alert - anonymous https://www.google.com/url?rct=j&sa=t&url=https://twitter.com/AnonymousGlobo/status/601234299761864705&ct=ga&cd=CAIyGjgxMzAxNTQ0ZWE3M2NhMmQ6Y29tOmVuOlVT&usg=AFQjCNE4SS7WO3LP9JkPYvIwjueAKk7JsA
via IFTTT

Lokomotiv Moscow wins Russian Cup

ASTRAKHAN, Russia (AP) Lokomotiv Moscow won the Russian Cup on Thursday, defeating Kuban Krasnodar 3-1 in extra time to lift its first trophy for eight years.

from FOX Sports Digital http://ift.tt/1EmnIXu
via IFTTT

AA Ghent wins first league title, beating Standard Liege

BRUSSELS (AP) AA Ghent won its first league title on Thursday after it beat Standard Liege 2-0 in the penultimate round of league playoffs.

from FOX Sports Digital http://ift.tt/1KnnyHJ
via IFTTT

Anonymous users cannot see public comments

Using the view to display Ajax comments, anonymous users who have the permission to see comments (but not post), cannot see them. This is caused ...

from Google Alert - anonymous http://ift.tt/1AhB2le
via IFTTT

NFL: Ray Rice has completed his pretrial intervention program, will have domestic violence charges dismissed (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


Michael McLaughlin
Cloud evangelist at Capgemini, parental engineer, Crossfit exerciser, cookie enthusiast. Bacon.
ATL

Following: 4359 - Followers: 4684

May 21, 2015 at 11:11AM via Twitter http://twitter.com/mbmclaughlin

Hide view field if visitor is anonymous

Hy! I have a view with a bunch of fields shown. Some of them are "Global: Custom text" where I show some links. Now I have 2 different links (2× ...

from Google Alert - anonymous http://ift.tt/1Hk7ujS
via IFTTT

Spy Agencies Hijack Google Play Store to Install Spyware on Smartphones

I have an Android phone with a five different gmail accounts configured in it. But what if any one of them get compromised via phishing, malware or any other way? The Hacker would be able to access my Google account and obviously Google Play Store account too, which allows anyone to install any Android application remotely into my phone without my knowledge and confirmation… What if


from The Hacker News http://ift.tt/1ElBlq7
via IFTTT

I have a new follower on Twitter


sarafina kunkk
Call me when you need a shoulder who is fun and relaxing:)


Following: 351 - Followers: 89

May 21, 2015 at 09:16AM via Twitter http://twitter.com/SarafinaKunk

ISS Daily Summary Report – 05/20/15

Double Cold Bag (DCB) Packing:  Virts and Kelly packed the +4 degrees Celsius (°C) DCB with conditioned Ice Bricks and samples from Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI)-2 and -32°C DCBs with Ice Bricks and frozen samples from MELFI-3.  The +4°C DCB will be returning with Cell Shape and Expression, CASIS PCG-3, Nematode Muscles, and NanoRacks Module-53 samples.  The -32°C DCB will be returning with frozen HRP samples.  Once packed, the DCBs were placed in Dragon prior to hatch closure. SpaceX-6 Departure Preparations:  This morning, the crew completed final cargo loading. Later, they configured Dragon’s pressurized segment for departure and closed its hatch.  Once the Dragon hatch was closed, they configured the Node 2 vestibule by removing Air Revitalization System (ARS) and data jumpers then installed the Common Berthing Mechanism (CBM) Controller Panel Assemblies (CPAs). SpaceX-6 unberth activities are scheduled to start this evening at 11:30pm CDT and Dragon release at ~6:04am CDT Thursday morning utilizing the Space Station Remote Manipulator System (SSRMS). Node 3 Forward 2 Stowage Removal:  In preparation for Permanent Multipurpose Module (PMM) relocation next week, Virts removed stowage from the Node 3 Forward location. PMM relocation from Node 1 nadir to Node 3 forward is planned for Wednesday, May 27th.   Today’s Planned Activities All activities were completed unless otherwise noted. Dragon – Transfers Ops Rendezvous and Prox Ops Program (RPOP) –  Adjustment Anemometer Handover from USOS to RS Activity with IVA Tools СТТС Configuration for MRM1 Dragon Transfer Ops Preparing for measuring air flow using anemometer Velocicalc 9565 in MRM1 and on SM Power Supply System units. Tagup with specialists Velocicalc 9565 Anemometer Setup for Operation. Tagup with specialists WRS – Recycle Tank Fill Measuring air flow using anemometer Velocicalc 9565 in MRM1 and on SM Power Supply System units. Tagup with specialists Dragon Transfer Ops RELAKSATSIYA Hardware Setup CEVIS Exercise Crew Medical Officer (CMO) Proficiency Training Dragon Cargo Operations Conference RELAKSATSIYA Comm reconfig for nominal ops Makita Tool Battery Cycling – Hardware Prep СОЖ Maintenance RELAKSATSIYA Closeout Ops Makita battery pre-charge installation Dragon Transfer Ops Makita charge monitoring Anemometer Handover from RS to USOS WRS – Recycle Tank Fill Work Maintenance Area Setup in DC1. Transfer to DC1 and Activation of Orlan suit No.5.Tagup with DRAGON – Dragon Egress in Preparation for Departure Makita Tool battery discharge Dragon – Hatch Closure Dragon Vestibule Configuration for Demate Recovery of Measuring System ИК-0702М in Orlan Suit No. 5. Tagup with specialists Installation of Node 2 Nadir CBM Controller Panel Assembly (CPA) Water Supply Hardware Audit [СBО] Installation of Makita tool battery for charging Monitor Makita Tool battery charge Recovery of space suit No.4 left sleeve for nominal operations Powerup of Cupola and LAB Robotic Workstation (RWS) Display and Control Panel (DCP) Orlan Suit No.5 and No.4 Closeout Ops Installation of Camcorder in the LAB at LAB RWS 3 to monitor RWS commanding from the ground Closing USOS Window Shutters End Makita Tool battery charge, log charge time into the table, remove battery from the charger, stow equipment IDENTIFIKATSIYA. Copy ИМУ-Ц micro-accelerometer data to laptop БД-2 Exercise, Day 1 IMS Delta File Prep UDOD. Copy and Downlink Data CASKAD. Thermostat Deactivation and Equipment Transfer to [CA]  Ground Activities All activities were completed unless otherwise noted. Node 2 Nadir CBM Preparations for Demate Dragon Prop and GNC Equipment Checkout Starboard TRRJ Video Survey Three-Day Look Ahead: Thursday, 05/21: SSRMS walk off, Dragon N2 vestibule demate/depress, Dragon unberth/landing, ACE M-3 sample prep, COL stowage relocate Friday, 05/22: Ocular Health, EVA Loop Scrub, Biolab Microscope cassette removal Saturday, 05/23:  Weekly Cleaning, Crew Off Duty QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Shutdown Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/1ei1tNx
via IFTTT

Understanding the Shared Security Model in Amazon Web Services

Security in the Amazon EC2 environment is a responsibility shared by both the end user and Amazon. This is because within this environment there are specific parts that Amazon has control of and specific parts that are controlled by the end user. For the end user, they are responsible for securing the operating systems running on their instances, as well as the applications running on those


from The Hacker News http://ift.tt/1LoQdKj
via IFTTT

Monaco, Marseille and Saint-Etienne fight for 3rd place

MONACO (AP) With the top two places already set, the only thing to be decided in the last round of the French league is which team will finish third and take the final Champions League spot.

from FOX Sports Digital http://ift.tt/1HvFQmI
via IFTTT

Relegation battle comes down to last day of Spanish league

BARCELONA, Spain (AP) While the title fight is over, there is still plenty to play for on the final day of the Spanish league season Saturday, when 11 teams play for either for berths in European competition or to avoid relegation.

from FOX Sports Digital http://ift.tt/1GrVlgP
via IFTTT

Austin completes remarkable rise to England squad

LONDON (AP) Charlie Austin has completed his remarkable rise from bricklayer to the England squad in the space of six years after being called up by his country for the first time.

from FOX Sports Digital http://ift.tt/1FzbIY6
via IFTTT

FIFA Presidential Election Candidates

ZURICH (AP) A look at the candidates in the FIFA presidential election on May 29 in Zurich:

from FOX Sports Digital http://ift.tt/1c71rGz
via IFTTT

Previous FIFA Presidential Elections

ZURICH (AP) Sepp Blatter would certainly argue that being president of FIFA is the best job in sports. Becoming FIFA president is one of the hardest.

from FOX Sports Digital http://ift.tt/1ehQu6S
via IFTTT

Sepp Blatter set for another win in FIFA election

GENEVA (AP) For once, a major FIFA election is untainted by claims of vote-buying.

from FOX Sports Digital http://ift.tt/1c71thG
via IFTTT

Previous FIFA Presidents

ZURICH (AP) List of the presidents of FIFA:

from FOX Sports Digital http://ift.tt/1ehQu6K
via IFTTT

Xavi to leave Barcelona after 17 trophy-filled seasons

SANT JOAN DESPI, Spain (AP) Barcelona midfielder Xavi Hernandez says he will leave the Catalan club after 17 trophy-laden seasons in which he set club records for appearances and titles won.

from FOX Sports Digital http://ift.tt/1c71rqg
via IFTTT

3 men to be tried after violence during Cyprus Cup final

NICOSIA, Cyprus (AP) Cyprus police say three men will be tried after violence marred the Cyprus Cup final and forced a 45-minute interruption.

from FOX Sports Digital http://ift.tt/1ehQtQs
via IFTTT

Google to Introduce New Photo-Sharing Platform to Kill Instagram

Google is reportedly going to launch a new online photo-sharing service and storage option at its developer conference later this month, which Bloomberg says, will not be a part of its Google+ social network. At the moment, Google offers a photo sharing service known as "Google+ Photos," which comes pre-installed with every Android device. Google+ Photos automatically backs up photos in


from The Hacker News http://ift.tt/1Lovgzg
via IFTTT

Rome derby is a contest for Champions League entry

ROME (AP) There will be much more than city bragging rights on the line when Roma meets Lazio in the Rome derby on Monday.

from FOX Sports Digital http://ift.tt/1Fz6RWO
via IFTTT

Bundesliga relegation battle set for exciting finale

BERLIN (AP) The Bundesliga relegation battle is going to the wire with just three points between the bottom five clubs going into the season's final round. Four of them face each other on Saturday. Hertha Berlin, one point above them, is not yet safe either as the German league provides a nail-biting finish at the bottom.

from FOX Sports Digital http://ift.tt/1Ah0Q0Y
via IFTTT

Hull and Newcastle fighting for survival on final day

MANCHESTER, England (AP) The Premier League is set for an afternoon of goodbyes on Sunday - to either Hull or Newcastle as the relegation places are decided and to two of English soccer's top midfielders.

from FOX Sports Digital http://ift.tt/1ShgZJ6
via IFTTT

Bayer Leverkusen extends coach Roger Schmidt's contract

LEVERKUSEN, Germany (AP) Bayer Leverkusen and coach Roger Schmidt have agreed a contract extension by three years through June 2019.

from FOX Sports Digital http://ift.tt/1KlS6cT
via IFTTT

Platini defends Financial Fair Play ahead of easing rules

NYON, Switzerland (AP) UEFA president Michel Platini insists his Financial Fair Play project to control club spending is ''here to stay'' and has not changed approach.

from FOX Sports Digital http://ift.tt/1HjBE70
via IFTTT

FIFA candidate Van Praag withdraws to support Prince Ali

AMSTERDAM (AP) FIFA presidential candidate Michael van Praag has withdrawn from the May 29 election against Sepp Blatter.

from FOX Sports Digital http://ift.tt/1dmjvxW
via IFTTT

Rights group: Qatar making little progress on labor reforms

DUBAI, United Arab Emirates (AP) Qatar is failing to deliver on reforms for its migrant workers a year after the wealthy Gulf nation announced plans to improve conditions for low-paid laborers building its highways, hotels, stadiums and skyscrapers, Amnesty International said Thursday.

from FOX Sports Digital http://ift.tt/1FpLpCs
via IFTTT

Sean Anonymous and Dimitry Killstorm - Big Bang feat. Lizzo and POS

Today's Song of the Day is a premiere from local rapper Sean Anonymous and local producer Dimitry Killstorm, who teamed up with Lizzo and P.O.S ...

from Google Alert - anonymous http://ift.tt/1LnLdp7
via IFTTT

Sydney signs Senegal player Tavares for 2 more years

SYDNEY (AP) Sydney FC has extended the contract of French-born Senegal international Mickael Tavares for a further two A-League seasons.

from FOX Sports Digital http://ift.tt/1LdYv6X
via IFTTT

Wednesday, May 20, 2015

I have a new follower on Twitter


Branch Metrics
Helping apps grow their user base with our SDKs for seamless referrals, sharing and deep linking across install.
Palo Alto, CA
https://t.co/D41jB3V14w
Following: 1182 - Followers: 1297

May 20, 2015 at 10:44PM via Twitter http://twitter.com/branchmetrics

Fan violence interrupts 2nd-division match in Rio

RIO DE JANEIRO (AP) A second-division match in Rio de Janeiro was suspended for nearly an hour because of fan violence that reportedly caused one spectator to lose his hand when a firecracker exploded near him.

from FOX Sports Digital http://ift.tt/1c66KpZ
via IFTTT

Orioles Video: Adam Jones goes 3-for-4 to raise batting average to .343 in 4-2 loss to Mariners (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Rights group: Qatar making little progress on labor reforms

DUBAI, United Arab Emirates (AP) Amnesty International said Thursday that Qatar is failing to deliver on reforms for its migrant workers a year after the wealthy Gulf nation announced plans to improve conditions for low-paid laborers building its highways, hotels, stadiums and skyscrapers.

from FOX Sports Digital http://ift.tt/1K3mm9j
via IFTTT

Image Reconstruction from Bag-of-Visual-Words. (arXiv:1505.05190v1 [cs.CV])

The objective of this work is to reconstruct an original image from Bag-of-Visual-Words (BoVW). Image reconstruction from features can be a means of identifying the characteristics of features. Additionally, it enables us to generate novel images via features. Although BoVW is the de facto standard feature for image recognition and retrieval, successful image reconstruction from BoVW has not been reported yet. What complicates this task is that BoVW lacks the spatial information for including visual words. As described in this paper, to estimate an original arrangement, we propose an evaluation function that incorporates the naturalness of local adjacency and the global position, with a method to obtain related parameters using an external image database. To evaluate the performance of our method, we reconstruct images of objects of 101 kinds. Additionally, we apply our method to analyze object classifiers and to generate novel images via BoVW.



from cs.AI updates on arXiv.org http://ift.tt/1GqERFK
via IFTTT

A New Oscillating-Error Technique for Classifiers. (arXiv:1505.05312v1 [cs.AI])

This paper describes a new method for reducing the error in a classifier. It uses a weight adjustment update, but includes the very simple rule of either adding or subtracting the adjustment, based on whether the data point is currently larger or smaller than the desired value, and on a point-by-point basis. This gives added flexibility to the convergence procedure, where through a series of transpositions, values far away can continue towards the desired value, whereas values that are originally much closer can oscillate from one side to the other. Tests show that the method can successfully classify some known datasets. It can also work in a batch mode, with reduced training times and can be used as part of a neural network, or classifiers in general. There are also some updates on an earlier wave shape paper.



from cs.AI updates on arXiv.org http://ift.tt/1Bd2M5e
via IFTTT

Reactive Reasoning with the Event Calculus. (arXiv:1505.05364v1 [cs.AI])

Systems for symbolic event recognition accept as input a stream of time-stamped events from sensors and other computational devices, and seek to identify high-level composite events, collections of events that satisfy some pattern. RTEC is an Event Calculus dialect with novel implementation and 'windowing' techniques that allow for efficient event recognition, scalable to large data streams. RTEC can deal with applications where event data arrive with a (variable) delay from, and are revised by, the underlying sources. RTEC can update already recognised events and recognise new events when data arrive with a delay or following data revision. Our evaluation shows that RTEC can support real-time event recognition and is capable of meeting the performance requirements identified in a recent survey of event processing use cases.



from cs.AI updates on arXiv.org http://ift.tt/1GqEScB
via IFTTT

Towards Ideal Semantics for Analyzing Stream Reasoning. (arXiv:1505.05365v1 [cs.AI])

The rise of smart applications has drawn interest to logical reasoning over data streams. Recently, different query languages and stream processing/reasoning engines were proposed in different communities. However, due to a lack of theoretical foundations, the expressivity and semantics of these diverse approaches are given only informally. Towards clear specifications and means for analytic study, a formal framework is needed to define their semantics in precise terms. To this end, we present a first step towards an ideal semantics that allows for exact descriptions and comparisons of stream reasoning systems.



from cs.AI updates on arXiv.org http://ift.tt/1Bd2LOY
via IFTTT

Multi-Context Systems for Reactive Reasoning in Dynamic Environments. (arXiv:1505.05366v1 [cs.AI])

We show in this paper how managed multi-context systems (mMCSs) can be turned into a reactive formalism suitable for continuous reasoning in dynamic environments. We extend mMCSs with (abstract) sensors and define the notion of a run of the extended systems. We then show how typical problems arising in online reasoning can be addressed: handling potentially inconsistent sensor input, modeling intelligent forms of forgetting, selective integration of knowledge, and controlling the reasoning effort spent by contexts, like setting contexts to an idle mode. We also investigate the complexity of some important related decision problems and discuss different design choices which are given to the knowledge engineer.



from cs.AI updates on arXiv.org http://ift.tt/1GqERpb
via IFTTT

Asynchronous Multi-Context Systems. (arXiv:1505.05367v1 [cs.AI])

In this work, we present asynchronous multi-context systems (aMCSs), which provide a framework for loosely coupling different knowledge representation formalisms that allows for online reasoning in a dynamic environment. Systems of this kind may interact with the outside world via input and output streams and may therefore react to a continuous flow of external information. In contrast to recent proposals, contexts in an aMCS communicate with each other in an asynchronous way which fits the needs of many application domains and is beneficial for scalability. The federal semantics of aMCSs renders our framework an integration approach rather than a knowledge representation formalism itself. We illustrate the introduced concepts by means of an example scenario dealing with rescue services. In addition, we compare aMCSs to reactive multi-context systems and describe how to simulate the latter with our novel approach.



from cs.AI updates on arXiv.org http://ift.tt/1Bd2LOU
via IFTTT

On Minimal Change in Evolving Multi-Context Systems (Preliminary Report). (arXiv:1505.05368v1 [cs.AI])

Managed Multi-Context Systems (mMCSs) provide a general framework for integrating knowledge represented in heterogeneous KR formalisms. However, mMCSs are essentially static as they were not designed to run in a dynamic scenario. Some recent approaches, among them evolving Multi-Context Systems (eMCSs), extend mMCSs by allowing not only the ability to integrate knowledge represented in heterogeneous KR formalisms, but at the same time to both react to, and reason in the presence of commonly temporary dynamic observations, and evolve by incorporating new knowledge. The notion of minimal change is a central notion in dynamic scenarios, specially in those that admit several possible alternative evolutions. Since eMCSs combine heterogeneous KR formalisms, each of which may require different notions of minimal change, the study of minimal change in eMCSs is an interesting and highly non-trivial problem. In this paper, we study the notion of minimal change in eMCSs, and discuss some alternative minimal change criteria.



from cs.AI updates on arXiv.org http://ift.tt/1Bd2JX6
via IFTTT

Towards a Simulation-Based Programming Paradigm for AI applications. (arXiv:1505.05373v1 [cs.AI])

We present initial ideas for a programming paradigm based on simulation that is targeted towards applications of artificial intelligence (AI). The approach aims at integrating techniques from different areas of AI and is based on the idea that simulated entities may freely exchange data and behavioural patterns. We define basic notions of a simulation-based programming paradigm and show how it can be used for implementing AI applications.



from cs.AI updates on arXiv.org http://ift.tt/1GqEPh3
via IFTTT

Towards Large-scale Inconsistency Measurement. (arXiv:1505.05375v1 [cs.AI])

We investigate the problem of inconsistency measurement on large knowledge bases by considering stream-based inconsistency measurement, i.e., we investigate inconsistency measures that cannot consider a knowledge base as a whole but process it within a stream. For that, we present, first, a novel inconsistency measure that is apt to be applied to the streaming case and, second, stream-based approximations for the new and some existing inconsistency measures. We conduct an extensive empirical analysis on the behavior of these inconsistency measures on large knowledge bases, in terms of runtime, accuracy, and scalability. We conclude that for two of these measures, the approximation of the new inconsistency measure and an approximation of the contension inconsistency measure, large-scale inconsistency measurement is feasible.



from cs.AI updates on arXiv.org http://ift.tt/1Bd2LOP
via IFTTT

Fuzzy Least Squares Twin Support Vector Machines. (arXiv:1505.05451v1 [cs.AI])

Least Squares Twin Support Vector Machine (LSTSVM) is an extremely efficient and fast version of SVM algorithm for binary classification. LSTSVM combines the idea of Least Squares SVM and Twin SVM in which two non-parallel hyperplanes are found by solving two systems of linear equations. Although, the algorithm is very fast and efficient in many classification tasks, it is unable to cope with two features of real-world problems. First, in many real-world classification problems, it is almost impossible to assign data points to a single class. Second, data points in real-world problems may have different importance. In this study, we propose a novel version of LSTSVM based on fuzzy concepts to deal with these two characteristics of real-world data. The algorithm is called Fuzzy LSTSVM (FLSTSVM) which provides more flexibility than binary classification of LSTSVM. Two models are proposed for the algorithm. In the first model, a fuzzy membership value is assigned to each data point and the hyperplanes are optimized based on these fuzzy samples. In the second model we construct fuzzy hyperplanes to classify data. Finally, we apply our proposed FLSTSVM to an artificial as well as three real-world datasets. Results demonstrate that FLSTSVM obtains better performance than SVM and LSTSVM.



from cs.AI updates on arXiv.org http://ift.tt/1Bd2JGL
via IFTTT

Memory Networks. (arXiv:1410.3916v10 [cs.AI] UPDATED)

We describe a new class of learning models called memory networks. Memory networks reason with inference components combined with a long-term memory component; they learn how to use these jointly. The long-term memory can be read and written to, with the goal of using it for prediction. We investigate these models in the context of question answering (QA) where the long-term memory effectively acts as a (dynamic) knowledge base, and the output is a textual response. We evaluate them on a large-scale QA task, and a smaller, but more complex, toy task generated from a simulated world. In the latter, we show the reasoning power of such models by chaining multiple supporting sentences to answer questions that require understanding the intension of verbs.



from cs.AI updates on arXiv.org http://ift.tt/1sUFTDT
via IFTTT

Knowledge, Justification, and Reason-Based Belief. (arXiv:1412.1862v3 [cs.LO] UPDATED)

Is knowledge definable as justified true belief ("JTB")? We argue that one can legitimately answer positively or negatively, depending on how the notion of justification is understood. To facilitate our argument, we introduce a simple propositional logic of reason-based belief. We show that this logic is sufficiently flexible to accommodate various useful features, including quantification over reasons. We use our framework to contrast two notions of JTB: one internalist, the other externalist. We argue that Gettier cases essentially challenge the internalist notion but not the externalist one. In particular, we may equate knowledge and JTB if the latter is grounded in what we call "adequate" reasons.



from cs.AI updates on arXiv.org http://ift.tt/12Up9T1
via IFTTT

[FD] CVE for Apple's ECDHE-ECDSA SecureTransport bug?

Does anyone know if Apple's ECDHE-ECDSA SecureTransport bug was assigned a CVE? It affected OS X and iOS. Effectively, the bug was an implementation error that cause interoperability failures. To mostly counter it, the cipher suites had to be disabled, which resulted in a loss of security. If the person experiencing it did not know the cause, then they were left with a Denial of Service (DoS). To be clear, this was a different bug than CVE-2015-1130 (Goto Fail). Also see SSL_OP_SAFARI_ECDHE_ECDSA_BUG on the OpenSSL wiki (http://ift.tt/1GquAJJ).

Source: Gmail -> IFTTT-> Blogger

[FD] CVE ID assignment - eZPublish vulnerability

Hi, I'm trying to get a CVE-ID attributed to the issue discribed bellow. I tried to contact cve-assign@mitre.org two times, on March 31 and on May 11, but I did not get any answer. The issue is now public and described here : http://ift.tt/1dlAkJm May someone attribute a CVE-ID to this vulnerability please ? Description

Source: Gmail -> IFTTT-> Blogger

Allardyce ponders future at West Ham

LONDON (AP) West Ham manager Sam Allardyce shifts his bulk uneasily, watching from the bench as his team loses its grip on the last home match of the season. After Saturday's 2-1 defeat to Everton a `Big Sam Out' banner is unraveled in the stands, and a fate is potentially sealed.

from FOX Sports Digital http://ift.tt/1FoYr2U
via IFTTT

[FD] hardwear.io - Hardware Security Conference Call for Papers

Dear Hackers and Security Gurus, hardwear is seeking innovative research on hardware security. If you have done interesting research on attacks or mitigation on any Hardware and want to showcase it to the security community, just submit your research paper. Please find all the relevant details for the submission below. About hardwear.io

Source: Gmail -> IFTTT-> Blogger

Yik Yak - the rise of anonymous geo-social connectivity

Charting the course of social media sites and apps will lead you from a mostly-anonymous digital scene, to identity-is-everything channels (eg ...

from Google Alert - anonymous http://ift.tt/1LcrUhZ
via IFTTT

Sunderland secures Premier League status with Arsenal draw

LONDON (AP) Sunderland secured its Premier League survival on Wednesday by drawing 0-0 at Arsenal, denying the London club a chance to guarantee a place in the Champions League group stage.

from FOX Sports Digital http://ift.tt/1cOXNll
via IFTTT

Cantona sues Cosmos, alleging breach of contract

NEW YORK (AP) Former Manchester United forward Eric Cantona has sued the New York Cosmos, saying the club never delivered on promises to pay him and provide a share of equity in the club.

from FOX Sports Digital http://ift.tt/1c5y8nW
via IFTTT

Brazilian club Fluminense changes coach after 8 matches

RIO DE JANEIRO (AP) Fluminense says coach Ricardo Drubscky, who was hired less than two months ago, is leaving the club by mutual agreement.

from FOX Sports Digital http://ift.tt/1AfjqXb
via IFTTT

América: Lista preliminar de Perú

LIMA, Peru (AP) Lista preliminar de 30 jugadores convocados por el tecnico de Peru Ricardo Gareca para la Copa America:

from FOX Sports Digital http://ift.tt/1Sdf1cN
via IFTTT

América: Lista preliminar de Paraguay

ASUNCION, Paraguay (AP) Lista preliminar de 30 jugadores convocados por el tecnico de Paraguay Ramon Diaz para la Copa America:

from FOX Sports Digital http://ift.tt/1HttCuQ
via IFTTT

América: Lista preliminar de Ecuador

QUITO, Ecuador (AP) Lista preliminar de 30 jugadores convocados por el tecnico de Ecuador Gustavo Quinteros para la Copa America:

from FOX Sports Digital http://ift.tt/1HttBXH
via IFTTT

Greaves 'improving' after severe stroke, says agent

LONDON (AP) The agent of Jimmy Greaves says the health of the former England striker is improving following a severe stroke.

from FOX Sports Digital http://ift.tt/1AlWXHH
via IFTTT

FIFA sponsors Coke, Visa express concern over Qatar labor

LONDON (AP) FIFA came under pressure from sponsors Coca-Cola and Visa on Wednesday to ensure Qatar improves conditions for migrant workers as the country rapidly expands to host the 2022 World Cup.

from FOX Sports Digital http://ift.tt/1LlCUu4
via IFTTT

FIFA making progress in Israeli-Palestinian soccer spat

RAMALLAH, West Bank (AP) FIFA President Sepp Blatter says he is making process in resolving a spat between Palestinian and Israeli soccer leaders and hopes to avoid a vote to suspend Israel.

from FOX Sports Digital http://ift.tt/1HheQVb
via IFTTT

Sponsor Visa expresses 'grave concern' over Qatar labor

LONDON (AP) World Cup sponsor Visa has expressed ''grave concern'' to FIFA over conditions facing migrant workers in Qatar, the host nation of the 2022 tournament.

from FOX Sports Digital http://ift.tt/1K0OfPm
via IFTTT

New LogJam SSL Vulnerability Puts Internet Users At Risk

After HeartBleed, POODLE and FREAK encryption flaws, a new encryption attack has been emerged over the Internet that allows attackers to read and modify the sensitive data passing through encrypted connections, potentially affecting hundreds of thousands of HTTPS-protected sites, mail servers, and other widely used Internet services. A team of security researchers has discovered a new attack,


from The Hacker News http://ift.tt/1FvJnSC
via IFTTT

Nimes to remain in 2nd division in match-fixing case

PARIS (AP) French club Nimes will not be relegated from the second division next season after the country's soccer federation overturned a previous decision in a match-fixing case.

from FOX Sports Digital http://ift.tt/1c4AQdg
via IFTTT

ISS Daily Summary Report – 05/19/15

USOS Crew Reduced Duty Day: Today was a reduced duty day for the USOS Crew as a result of sleep shifting in preparation for SpaceX-6 departure on Thursday, 21 May 2015. Fluid Shifts Before, During and After Prolonged Space Flight and Their Association with Intracranial Pressure and Visual Impairment (Fluid Shifts): Kornienko begun his Flight Day (FD) 45 Fluid Shifts Dilution Measurements today, with the assistance of Padalka as his Crew Medical Officer (CMO).  Upon wakeup he collected baseline saliva, blood and urine and inserted them into Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI) prior to ingesting a Sodium Bromide (NaBr) tracer.  Throughout the day, he performed more urine, blood, and saliva collections, inserting those samples into MELFI as well.  The Dilution Measurements are the first part in the series of FD45 Fluid Shifts measurements. Next week, Kelly and Kornienko will be performing their Baseline Imaging using the ultrasound.  The third portion of the Fluid Shifts experiment involves utilization of the Russian Chibis (Lower Body Negative Pressure – LBNP) during ultrasound measurements.  Fluid Shifts investigates the causes for severe and lasting physical changes to astronaut’s eyes. Because the headward fluid shift is a hypothesized contributor to these changes, reversing this fluid shift with a lower body negative pressure device is investigated as a possible intervention. Results from this study may help to develop preventative measures against lasting changes in vision and eye damage. Ocular Health: Virts with Cristoforetti as his CMO, and ground remote guidance, performed his Optical Coherence Tomography (OCT) exam to measure retinal thickness, volume, and retinal nerve fiber layer as required for his Return-30 (R-30) Ocular Health sessions.  Later in the day, he executed his fundoscope exam to obtain images of the retinal surface, again with Cristoforetti and ground assistance.  The Ocular Health protocol calls for a systematic gathering of physiological data to characterize the risk of microgravity-induced visual impairment/intracranial pressure in ISS crewmembers. Researchers believe that the measurement of visual, vascular and central nervous system changes over the course of this experiment and during the subsequent post-flight recovery will assist in the development of countermeasures, clinical monitoring strategies, and clinical practice guidelines. Commercial Orbital Transport Services (COTS) UHF Communication Unit (CUCU) Checkout:  In preparation for the upcoming SpaceX-6 departure, Kelly worked with ground teams to activate the CUCU System and successfully performed a Crew Command Panel (CCP) checkout. CUCU provides a command and telemetry communications link between ISS and Dragon during free flight operations in the vicinity of ISS.   Dragon Cargo Transfer Operations: Today, Cristoforetti continued with Dragon cargo operations.  The crew has approximately 3 hours of SpaceX-6 cargo operations remaining. Mobile Servicing System (MSS) Operations:  Robotics Flight Controllers walked the Space Station Remote Manipulator System (SSRMS) off of worksite 4 Mobile Remote Servicer (MRS) Base System Power and Data Grapple Fixture (PDGF) 1 to the Node2 PDGF. Once the walk off was complete, they commanded the SSRMS to grapple Dragon in preparation for Thursday’s unberth and release.   In conjunction with today’s operations, Flight Controllers also performed a checkout of Latching End Effector A (LEE-A), and performed commissioning on the SSRMS Gear Box Limping (GBL) feature.  The LEE-A checkout gathered additional data on latching currents since the LEE-A was lubricated on Extravehicular Activity (EVA) 30 in February.  The GBL feature produces greater arm compliance than passive limping, and is intended to reduce the required rigidization force to capture a fixed grapple fixture.  Later today the Robotics Ground Controllers will maneuver LEE-B to grapple the SpaceX-6 Dragon Flight Releasable Grapple Fixture (FRGF) ready for Dragon unberth and release on GMT 141 (21 May 15). They will also perform an initial checkout of GBL on LEE-B during this operation. Today’s Planned Activities All activities were completed unless otherwise noted. FLUID SHIFTS WRS – Recycle Tank Fill WRS Water Sample Analysis OCT Exam ARED Flywheel Cylinder Evacuation Makita Tool Battery Cycling – Hardware Prep Greasing exposed ARED wires Installation of Makita tool battery for charging  Verification of ИП-1 Flow Sensor Position Makita battery charge monitoring OCT Equipment Stowage VELO Exercise, Day 4 Audit of Personal Hygiene Articles TOCA Data Recording Installation of Makita tool battery for charging Grab Sample Container (GSC) Sampling Operations Monitor Makita Tool battery charge PROBOY. RSE1 Laptop Software Update for PROBOY Experiment. Water Recovery System (WRS): WPA Waste Water Tank Offload into CWC Monitor Makita Tool battery charge End Makita Tool battery charge, log charge time into the table, remove battery from the charger, stow equipment PROBOY. RSЕ1 Laptop Ops. Tagup with specialists PROBOY. Penetration Simulator Ops. Tagup with specialists PAO Event POLAR Procedure Review Filling (separation) of EDV (KOV) No.1162 (00063575R, ФГБ1ПГО_1_110) from SM Rodnik БВ2 for Elektron Dragon Transfer Ops Psychological Evaluation Program (WinSCAT) СОЖ Maintenance Private Medical Conference Dragon Cargo Operations Conference POLAR1 Transfer and Installation POLAR2 Transfer Audit of SM Laptop Power Supply PROBOY. Copy and Downlink Data Fundoscope Prep WRS – Recycle Tank Fill IMS Delta File Prep CUCU Check Fundoscope – Eye Exam Fundoscope – Closeout Ops and Stowage RELAKSATSIYA. Relaksatsiya P/L Battery Charge Completed Task List Items COL Toolbox Pictures Ground Activities All activities were completed unless otherwise noted. CUCU Checkout MSS walk off from worksite 4 MBS PDGF 1 to Node2 PDGF then grapple Dragon. [In Work]  Three-Day Look Ahead: Wednesday, 05/20: Double Cold Bag pack in Dragon, N3 stowage removal, Dragon egress/vestibule config for demate/N2 CPA install Thursday, 05/21: SSRMS walkoff, Dragon N2 vestibule demate/depress, Dragon unberth/landing, ACE M-3 sample prep, COL stowage relocate Friday, 05/22: Ocular Health, EVA Loop Scrub, Biolab Microscope cassette removal QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) On [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Shutdown Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Process Trace Contaminant Control System (TCCS) Lab Off […]

from ISS On-Orbit Status Report http://ift.tt/1EjlUPa
via IFTTT

Romanian mayor rents soccer field for daughter's wedding

BUCHAREST, Romania (AP) A Romanian soccer team couldn't play its weekend match at home because the mayor rented the stadium for his daughter's wedding.

from FOX Sports Digital http://ift.tt/1ef2VjO
via IFTTT

Sepp Blatter opponents considering joining forces

THE HAGUE, Netherlands (AP) The three challengers bidding to oust Sepp Blatter as president of FIFA have discussed joining forces against the 79-year-old Swiss incumbent.

from FOX Sports Digital http://ift.tt/1Ej196b
via IFTTT

Kane picked by England U21s despite burnout fears

LONDON (AP) Tottenham striker Harry Kane has been selected by England for the European Under-21 Championship, despite concerns by his club that he is facing burnout after playing 52 games in a breakthrough season.

from FOX Sports Digital http://ift.tt/1Bbtv2n
via IFTTT

[FD] Eisbär SCADA (All Versions - iOS, Android & W8) - Persistent UI Vulnerability

Document Title: =============== Eisbär SCADA (All Versions - iOS, Android & W8) - Persistent UI Vulnerability References (Source): ==================== http://ift.tt/1JvYhcY Release Date: ============= 2015-05-19 Vulnerability Laboratory ID (VL-ID): ==================================== 1456 Common Vulnerability Scoring System: ==================================== 5.2 Product & Service Introduction: =============================== Polar Bear KNX is a modern EIB or KNX visualization for all types of buildings. Applications: lighting, shading, heating, air conditioning, Ventilation and security integration and integrated control reduce capital and operating costs of buildings and systems, Flexibility in use and their adaptation, comfort, safety and optimization of running processes. (Copy of the Vendor Homepage: http://ift.tt/1Al7K4X & http://ift.tt/1Al7Jhf ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered an application-side input validation vulnerability in the Eisbär SCADA v2.1.454.814 & v2.1.11 (iOS, Android & W8) application. Vulnerability Disclosure Timeline: ================================== 2015-05-19: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Alexander Maier GmbH Product: Eisbär SCADA - Mobile (Google Android, Windows Phone & Apple iOS) 2.1.11 Alexander Maier GmbH Product: Eisbär SCADA - Software 2.1.454.814 Exploitation Technique: ======================= Local Severity Level: =============== Medium Technical Details & Description: ================================ An application-side input validation web vulnerability has been discovered in the officialEisbär SCADA v2.1.454.814 & v2.1.11 (iOS, Android & W8) application. The security vulnerability allows an attacker to inject own script code to the application-side of the affected mobile software to compromise connected scada services. We setup a secure environment that was able to execute scada controlled functions in our company by an android, ios and windows mobile device. Due to the implementation we discovered that the server configuration input impacts a common security risk. The vulnerability is located in the `server name` value of the main network server settings module. Local attackers with physical device access are able to manipulate the `netzwerk server name` input to compromise the mobile application or connected eisbär scada services. The attacker includes a own script code payload to the servername and is able to execute the function in the server index listing and edit mode. The attacker can prepare a qr code with a final configuration that impact a malicious injected server name. The execution of the payload occurs after the scan or on review of the server listing. The servername value is also in use by the Eisbär Solutions section with the DoorPhone-Knoten service. We verified that the main server name component can be used to unauthorized execute a function in the connected scada service. The servername can be changed by the app or in the node directly to manipulate the communication permanently. The connection to the Polar Bear SCADA server is multi-client capable and configuration data required for the network settings of the app can be automatically transferred via QR code. In polar bears v2.1 there are also refer to a QR code component. The security risk of the application-side web vulnerabilities are estimated as medium with a cvss (common vulnerability scoring system) count of 5.2. Exploitation of the persistent input validation web vulnerability requires a low privilege application user account and low user interaction (click). Successful exploitation of the persistent web vulnerability results in mobile application/device compromise or connected service component manipulation. Request Method(s): [+] [Sync] Vulnerable Module(s): [+] Home > Server (Netzwerk) Vulnerable Parameter(s): [+] servername (name) Affected Module(s): [+] Home Index Server Listing [+] Edit Server Entries Proof of Concept (PoC): ======================= The application-side input validation web vulnerability can be exploited by local attackers with low privileged application user account and low user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Install the mobile application to your windows phone, ios or android mobile device 2. Start the application 3. Configure a service that is successful connected with functions 4. Surf to the existing server home index listing 5. Change the internal or external server with existing address and payload 6. Save the input 7. The execution occurs in the main index server listing 8. Click the arrow next to the injected code 9. The second execution occurs in the header section were the servername description becomes visible 10. Successful reproduce of the security vulnerability! Note: Include as payload a server that exists and attach your payload for a successful execution! The connection to the Polar Bear SCADA server is multi-client capable and configuration data required for the network settings of the app can be automatically transferred via QR code. In polar bears v2.1 there are also refer to a QR code component. Solution - Fix & Patch: ======================= The vulnerability can be patched by a secure parse and encode of the netzwerk - servername value. Restrict the input field and disallow the usage of script code tags and special chars. Filter the server name output in the edit mode and parse also the index listing output with the servername. Security Risk: ============== The security risk of the application-side input validation vulnerability in the server configuration is estimated as medium. (CVSS 5.2) Credits & Authors: ================== Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm@evolution-sec.com) [http://ift.tt/1jnqRwA] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™

Source: Gmail -> IFTTT-> Blogger

[FD] Staff FTP v3.04 Software - DLL Hijacking Vulnerability

[FD] WISE-FTP Software v8.0.2 - DLL Hijacking Vulnerability

[FD] HiDisk 2.4 iOS - (currentFolderPath) Persistent Vulnerability

Document Title: =============== HiDisk 2.4 iOS - (currentFolderPath) Persistent Vulnerability References (Source): ==================== http://ift.tt/1HplDii Release Date: ============= 2015-05-19 Vulnerability Laboratory ID (VL-ID): ==================================== 1496 Common Vulnerability Scoring System: ==================================== 3.5 Product & Service Introduction: =============================== HiDisk is such an app.it`s a Safe,a File Manager,a Media Player,a Files Reader. As a Safe - Provide Password System to secure your private stuff (photo,video,audio,note,docs,etc.) As a File Manager - Easily add folder&subfolder and quickly organize your files with few taps. As a Media Player - Play music,voice memos and video within the app. As a Files Reader - Not only provide slideshow just like native photo app,but also provide viewing docs(iWork,Windows office,etc.) (Copy of the Homepage: http://ift.tt/1FzMWZK ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Core Research Team discovered an application-side input validation vulnerability in the HiDisk v2.4 iOS mobile application. Vulnerability Disclosure Timeline: ================================== 2015-05-19: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Elite Tracy Product: HiDisk - iOS Mobile Web Application 2.4 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ A persistent input validation web vulnerability has been discovered in the official HiDisk v2.4 iOS mobile web-application. The vulnerability allows remote attacker or low privilege user accounts to inject malicious codes to the application-side of the affected mobile iOS web-application. The application-side vulnerability is located in the `name` value (currentFolderPath) of the `folder add` module. Local attackers with low privilege user accounts are able to inject own malicious script codes via folder name input to compromise the `Wifi Web Access` interface web-application. The attack vector is located on the application-side of the wifi web access interface and the request method to inject is an app sync. The injection point is the add folder input and the execution occurs in the index path dir listing. The security risk of the application-side web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.5. Exploitation of the application-side web vulnerability requires a low privilege web-application user account and low or medium user interaction. Successful exploitation of the vulnerabilities results in persistent phishing mails, session hijacking, persistent external redirect to malicious sources and application-side manipulation of affected or connected module context. Request Method(s): [+] Sync Vulnerable Module(s): [+] Folder Add (Ordner Hinzufuegen) Vulnerable Parameter(s): [+] name (currentFolderPath) Affected Module(s): [+] Index Path Listing [+] Subfolder Path Listing Proof of Concept (PoC): ======================= The persistent input validation web vulnerability can be exploited by local attackers with low privilege application user account and low or medium user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. PoC: #1
"><[PERSISTENT INJECTED SCRIPT CODE!!]>
hello
test path var



PoC: #2

NetUSB Driver Flaw Exposes Millions of Routers to Hacking

A simple but shockingly dangerous vulnerability has been uncovered in the NetUSB component, putting Millions of modern routers and other embedded devices across the globe at risk of being compromised by hackers. The security vulnerability, assigned CVE-2015-3036, is a remotely exploitable kernel stack buffer overflow flaw resides in Taiwan-based KCodes NetUSB. NetUSB is a Linux kernel


from The Hacker News http://ift.tt/1JyPAyC
via IFTTT

中村康秀 (@nkmr0) favorited one of your Tweets!

@mistermcguire: Re: [FD] 0-day Denial of Service in IPsec-Tools   中村康秀 favorited your Tweet. View   Patrick McGuire @mistermcguire =   Re: [FD] 0-day Denial of Service in IPsec-Tools ift.tt/1Gojsgb   Settings | Help | Opt-out | Download app Twitter, Inc. 1355 Market Street, Suite 900 San Francisco, CA 94103

Source: Gmail -> IFTTT-> Blogger

A-League's Newcastle placed into administration by owner

SYDNEY (AP) Financially-troubled Nathan Tinkler, owner of the Newcastle Jets, has placed the A-League club into voluntary administration with debts of 2.7 million Australian dollars ($2.14 million).

from FOX Sports Digital http://ift.tt/1eeDVsV
via IFTTT

I have a new follower on Twitter


Amanda Collins
Hardcore creator. Professional zombieaholic. Coffee lover. Bacon ninja. Organizer. Friendly food trailblazer.
Long Beach

Following: 3157 - Followers: 2986

May 20, 2015 at 01:04AM via Twitter http://twitter.com/maltdeceive

Tuesday, May 19, 2015

I have a new follower on Twitter


Cleotilde Garcia
Every good painter paints what he is.
Barclay town, MD, USA

Following: 1022 - Followers: 40

May 19, 2015 at 11:53PM via Twitter http://twitter.com/cleotildegarc50

Re: [FD] 0-day Denial of Service in IPsec-Tools

On May 19, 1:32pm, jvoss@altsci.com (Javantea) wrote: -- Subject: [FD] 0-day Denial of Service in IPsec-Tools | Denial of Service in IPsec-Tools | Vulnerability Report | May 19, 2015 | | Product: IPsec-Tools | Version: 0.8.2 | Website: http://ift.tt/1lY08Yp | CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C) | | IPsec-Tools is vulnerable to a 0-day exploit that I made available yesterday. It is a null dereference crash in racoon in gssapi.c. It requires HAVE_GSSAPI to be set, which is a configuration option. The impact is a denial of service against the IKE daemon. Because IPsec is critical infrastructure and this attack requires two UDP packets, it deserves a medium rating. This denial of service violates the premise that IPsec's security is built upon. More information about the impact can be found on my website linked below. | | If you're running IPsec-Tools, replace it sensibly as soon as possible. The reason this exploit is being released without patch on full disclosure is because the authors have apparently abandoned the software. | | The vulnerability: | | racoon/gssapi.c:205:static int gssapi_init(struct ph1handle *iph1) | | if (iph1->rmconf->proposal->gssid != NULL) { | | The exploit is available on my website: | http://ift.tt/1PvJpR0 The fix is trivial and does not seem to affect the preshared key authentication method. Looks to me like a simple DoS attack that does not have any additional impact. christos

Source: Gmail -> IFTTT-> Blogger

Orioles Highlight: Jimmy Paredes homers and drives in 4 runs as Baltimore rallies for 9-4 win over Mariners (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

What is Learning? A primary discussion about information and Representation. (arXiv:1505.04813v1 [cs.AI])

Nowadays, represented by Deep Learning techniques, the field of machine learning is experiencing unprecedented prosperity and its influence is demonstrated in academia, industry and civil society. "Intelligent" has become a label which could not be neglected for most applications; celebrities and scientists also warned that the development of full artificial intelligence may spell the end of the human race. It seems that the answer to building a computer system that could automatically improve with experience is right on the next corner. While for AI and machine learning researchers, it is a consensus that we are not anywhere near the core technique which could bring the Terminator, Number 5 or R2D2 into real life, and there is not even a formal definition about what is intelligence, or one of its basic properties: Learning. Therefore, even though researchers know these concerns are not necessary currently, there is no generalized explanation about why these concerns are not necessary, and what properties people should take into account that would make these concerns to be necessary. In this paper, starts from analysing the relation between information and its representation, a necessary condition for a model to be a learning model is proposed. This condition and related future works could be used to verify whether a system is able to learn or not, and enrich our understanding of learning: one important property of Intelligence.



from cs.AI updates on arXiv.org http://ift.tt/1GnPpW1
via IFTTT

Towards Data-Driven Autonomics in Data Centers. (arXiv:1505.04935v1 [cs.DC])

Continued reliance on human operators for managing data centers is a major impediment for them from ever reaching extreme dimensions. Large computer systems in general, and data centers in particular, will ultimately be managed using predictive computational and executable models obtained through data-science tools, and at that point, the intervention of humans will be limited to setting high-level goals and policies rather than performing low-level operations. Data-driven autonomics, where management and control are based on predictive holistic models that are built and updated using generated data, opens one possible path towards limiting the role of operators in data centers. In this paper, we present a data-science study of a public Google dataset collected in one of their 12K-node clusters with the goal of building and evaluating a predictive model for node failures. We use BigQuery, the big data SQL platform from the Google Cloud suite, to process massive amounts of data and generate a rich feature set capturing machine status over time. We describe how an ensemble classifier can be built out of many Random Forest classifiers each trained on these features, to predict if machines will fail in a future 24-hour window. Our evaluation reveals that if we limit false positive rates to 5%, we can achieve true positive rates between 27% and 88% with precision varying between 50% and 72%. We discuss the practicality of including our predictive model as the central component of a data-driven autonomic manager and operating it on-line on live data streams (rather than off-line on data logs). All of the scripts used for BigQuery and classification analyses are publicly available from the authors' website.



from cs.AI updates on arXiv.org http://ift.tt/1HterVc
via IFTTT

Recursion in RDF Data Shape Languages. (arXiv:1505.04972v1 [cs.DB])

An RDF data shape is a description of the expected contents of an RDF document (aka graph) or dataset. A major part of this description is the set of constraints that the document or dataset is required to satisfy. W3C recently (2014) chartered the RDF Data Shapes Working Group to define SHACL, a standard RDF data shape language. We refer to the ability to name and reference shape language elements as recursion. This article provides a precise definition of the meaning of recursion as used in Resource Shape 2.0. The definition of recursion presented in this article is largely independent of language-specific details. We speculate that it also applies to ShEx and to all three of the current proposals for SHACL. In particular, recursion is not permitted in the SHACL-SPARQL proposal, but we conjecture that recursion could be added by using the definition proposed here as a top-level control structure.



from cs.AI updates on arXiv.org http://ift.tt/1S9ErId
via IFTTT

A New Fundamental Evidence of Non-Classical Structure in the Combination of Natural Concepts. (arXiv:1505.04981v1 [cs.AI])

We recently performed cognitive experiments on conjunctions and negations of two concepts with the aim of investigating the combination problem of concepts. Our experiments confirmed the deviations (conceptual vagueness, underextension, overextension, etc.) from the rules of classical (fuzzy) logic and probability theory observed by several scholars in concept theory, while our data were successfully modeled in a quantum-theoretic framework developed by ourselves. In this paper, we isolate a new, very stable and systematic pattern of violation of classicality that occurs in concept combinations. In addition, the strength and regularity of this non-classical effect leads us to believe that it occurs at a more fundamental level than the deviations observed up to now. It is our opinion that we have identified a deep non-classical mechanism determining not only how concepts are combined but, rather, how they are formed. We show that this effect can be faithfully modeled in a two-sector Fock space structure, and that it can be exactly explained by assuming that human thought is the supersposition of two processes, a 'logical reasoning', guided by 'logic', and a 'conceptual reasoning' guided by 'emergence', and that the latter generally prevails over the former. All these findings provide a new fundamental support to our quantum-theoretic approach to human cognition.



from cs.AI updates on arXiv.org http://ift.tt/1GnPrxb
via IFTTT

An Experimental Comparison of Hybrid Algorithms for Bayesian Network Structure Learning. (arXiv:1505.05004v1 [stat.ML])

We present a novel hybrid algorithm for Bayesian network structure learning, called Hybrid HPC (H2PC). It first reconstructs the skeleton of a Bayesian network and then performs a Bayesian-scoring greedy hill-climbing search to orient the edges. It is based on a subroutine called HPC, that combines ideas from incremental and divide-and-conquer constraint-based methods to learn the parents and children of a target variable. We conduct an experimental comparison of H2PC against Max-Min Hill-Climbing (MMHC), which is currently the most powerful state-of-the-art algorithm for Bayesian network structure learning, on several benchmarks with various data sizes. Our extensive experiments show that H2PC outperforms MMHC both in terms of goodness of fit to new data and in terms of the quality of the network structure itself, which is closer to the true dependence structure of the data. The source code (in R) of H2PC as well as all data sets used for the empirical tests are publicly available.



from cs.AI updates on arXiv.org http://ift.tt/1Hrm2Ri
via IFTTT

Modular Action Language ALM. (arXiv:1505.05022v1 [cs.LO])

The paper introduces a new modular action language, ALM, and illustrates the methodology of its use. It is based on the approach of Gelfond and Lifschitz (1993; 1998) in which a high-level action language is used as a front end for a logic programming system description. The resulting logic programming representation is used to perform various computational tasks. The methodology based on existing action languages works well for small and even medium size systems, but is not meant to deal with larger systems that require structuring of knowledge. ALM is meant to remedy this problem. Structuring of knowledge in ALM is supported by the concepts of module (a formal description of a specific piece of knowledge packaged as a unit), module hierarchy, and library, and by the division of a system description of ALM into two parts: theory and structure. A theory consists of one or more modules with a common theme, possibly organized into a module hierarchy based on a dependency relation. It contains declarations of sorts, attributes, and properties of the domain together with axioms describing them. Structures are used to describe the domain's objects. These features, together with the means for defining classes of a domain as special cases of previously defined ones, facilitate the stepwise development, testing, and readability of a knowledge base, as well as the creation of knowledge representation libraries. To appear in Theory and Practice of Logic Programming (TPLP).



from cs.AI updates on arXiv.org http://ift.tt/1GnPpFD
via IFTTT

Necessary and Sufficient Conditions for Surrogate Functions of Pareto Frontiers and Their Synthesis Using Gaussian Processes. (arXiv:1505.05063v1 [cs.AI])

This paper introduces the necessary and sufficient conditions that surrogate functions must satisfy to properly define frontiers of non-dominated solutions in multi-objective optimization problems. Given that this is the first time that those conditions are elicited, there is no reason to believe that the surrogates already proposed in the literature meet them. As a consequence, dominated solutions can be suggested by already proposed surrogates as valid candidates to represent the Pareto frontier. Conceptually speaking, the new conditions we are introducing work directly on the objective space, thus being agnostic on the evaluation methods. Therefore, real objectives or user-designed objectives' surrogates are allowed, opening the possibility of linking independent objective surrogates. To illustrate the practical consequences of adopting the proposed conditions, an oversimplified model for the surrogate is shown to be capable of suggesting a valid frontier of non-dominated solutions, though not the expect one from the data provided. On the other hand, when applying Gaussian processes as surrogates endowed with monotonicity soft constraints and with an adjustable degree of flexibility, the necessary and sufficient conditions proposed here are finely managed by the multivariate distribution, guiding to high-quality surrogates capable of suitably synthesizing an approximation to the Pareto frontier in challenging instances of multi-objective optimization.



from cs.AI updates on arXiv.org http://ift.tt/1L88oTF
via IFTTT

A Simplified and Improved Free-Variable Framework for Hilbert's epsilon as an Operator of Indefinite Committed Choice. (arXiv:1104.2444v7 [cs.AI] UPDATED)

Free variables occur frequently in mathematics and computer science with ad hoc and altering semantics. We present the most recent version of our free-variable framework for two-valued logics with properly improved functionality, but only two kinds of free variables left (instead of three): implicitly universally and implicitly existentially quantified ones, now simply called "free atoms" and "free variables", respectively. The quantificational expressiveness and the problem-solving facilities of our framework exceed standard first-order and even higher-order modal logics, and directly support Fermat's descente infinie. With the improved version of our framework, we can now model also Henkin quantification, neither using quantifiers (binders) nor raising (Skolemization). We propose a new semantics for Hilbert's epsilon as a choice operator with the following features: We avoid overspecification (such as right-uniqueness), but admit indefinite choice, committed choice, and classical logics. Moreover, our semantics for the epsilon supports reductive proof search optimally.



from cs.AI updates on arXiv.org http://ift.tt/12jZYm9
via IFTTT