Latest YouTube Video

Saturday, January 30, 2016

[opencv] Problem with Samsung Galaxy Ace 4 (#6038)

I like this phone because it is delivering 30+fps in camera preview mode while my regular workhouse is only able to reach about 20fps It also is unusual, to me, in having no physical menu button I found a problem which results in my app crashing on certain openCV functions (more detail later) My logcat for errors only displays this as: 01-30 22:07:55748 4952-4952/? E/SELinux: [DEBUG] get_category: variable seinfocat: default sensitivity: NULL, cateogry: NULL 01-30 22:07:55748 4952-4952/? E/SELinux: seapp_context_lookup: str_security_ctx is null 01-30 22:07:55748 4952-4952/? E/dalvikvm: >>>>> Normal User 01-30 22:07:55748 4952-4952/? E/dalvikvm: >>>>> ukcomicompanieroopencvappli [ userId:0 | appId:10160 ] 01-30 22:07:55758 4952-4952/? E/SELinux: [DEBUG] get_category: variable seinfocat: default sensitivity: NULL, cateogry: NULL 01-30 22:07:55758 4952-4952/? E/SELinux: seapp_context_lookup: str_security_ctx is null 01-30 22:07:58328 4952-4952/ukcomicompanieroopencvappli E/OpenCV/StaticHelper: OpenCV error: Cannot load info library for OpenCV 01-30 22:07:59158 4952-4952/ukcomicompanieroopencvappli E/OpenCV/StaticHelper: OpenCV error: Cannot load info library for OpenCV 01-30 22:08:00188 4952-5162/ukcomicompanieroopencvappli E/ACodec: [OMXqcomvideoencoderavc] storeMetaDataInBuffers (output) failed w/ err -2147483648 01-30 22:08:07678 4952-5152/ukcomicompanieroopencvappli A/libc: Fatal signal 11 (SIGSEGV) at 0x00000000 (code=1), thread 5152 (Thread-1615) The last line being the timestamp I hunted for in the full logcat attached I can run my app happily for 6 seconds of a different algorithm, it also works perfectly on other 5x phones The location of the crash is: void subtractOthers(ThresholdingMat others) { for (ThresholdingMat ttMat : others) Coresubtract(maskMat, ttMatmaskMat, maskMat); } Specifically Coresubtract( I've stepped and checked everything is behaving so the problem must lie in your library or the phone's ROM As it is a stock Samsung ROM I'd like to be assured of quality there, meaning no offence, it's not as if I can ask Samsung to fix there ROM now however much I might like to try to port 51 or even 60 to their source code I've selected what I believe the most pertinent tombstone here too: 01-30 21:49:52948 I/DEBUG (25863): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 01-30 21:49:52948 I/DEBUG (25863): Build fingerprint: 'samsung/heatqltexx/heatqlte:444/KTU84P/G357FZXXU1AOH4:user/release-keys' 01-30 21:49:52948 I/DEBUG (25863): Revision: '2' 01-30 21:49:52948 I/DEBUG (25863): pid: 3515, tid: 3744, name: Thread-1580 >>> ukcomicompanieroopencvappli <<< 01-30 21:49:52948 I/DEBUG (25863): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 00000000 01-30 21:49:52968 W/QCamera2HWI( 230): preview_stream_cb_routine : send callback to upper layer! 01-30 21:49:52968 D/ShotSingle( 230): CAMERA_MSG_PREVIEW_FRAME E 01-30 21:49:52968 I/EDMNativeHelperService( 731): isCameraEnabled 01-30 21:49:52968 D/ShotSingle( 230): CAMERA_MSG_PREVIEW_FRAME X 01-30 21:49:52968 W/QCamera2HWI( 230): preview_stream_cb_routine : returned! 01-30 21:49:52978 D/SSRMv2:SIOP( 731): SIOP:: AP = 290, Delta = 30 01-30 21:49:52988 E/DataRouter( 237): Opening of the USB File failed fd is -1 & errno is 2 01-30 21:49:53068 I/EDMNativeHelperService( 731): isCameraEnabled 01-30 21:49:53068 I/DEBUG (25863): r0 41f821f8 r1 00000002 r2 41f81e30 r3 00000000 01-30 21:49:53068 I/DEBUG (25863): r4 41f821f8 r5 00000000 r6 61c9a614 r7 41f81e28 01-30 21:49:53068 I/DEBUG (25863): r8 00000000 r9 ffffffff sl 00012c00 fp 00000000 01-30 21:49:53068 I/DEBUG (25863): ip 41f81e30 sp 62c570b0 lr 614e17af pc 00000000 cpsr 200e0010 01-30 21:49:53068 I/DEBUG (25863): d0 7463617274627573 d1 0000000000000000 01-30 21:49:53068 I/DEBUG (25863): d2 4330000000000000 d3 0008000062924e90 01-30 21:49:53068 I/DEBUG (25863): d4 4330000000000000 d5 0000000000000000 01-30 21:49:53068 I/DEBUG (25863): d6 0000000000000000 d7 0000000000000000 01-30 21:49:53068 I/DEBUG (25863): d8 0000000000000000 d9 0000000000000000 01-30 21:49:53068 I/DEBUG (25863): d10 0000000000000000 d11 0000000000000000 01-30 21:49:53068 I/DEBUG (25863): d12 0000000000000000 d13 0000000000000000 01-30 21:49:53068 I/DEBUG (25863): d14 0000000000000000 d15 0000000000000000 01-30 21:49:53068 I/DEBUG (25863): d16 0000000062924e90 d17 0000000000000000 01-30 21:49:53068 I/DEBUG (25863): d18 0000000000000000 d19 0000000000000000 01-30 21:49:53068 I/DEBUG (25863): d20 0101010101010101 d21 0101010101010101 01-30 21:49:53068 I/DEBUG (25863): d22 0000000000000000 d23 0000000000000000 01-30 21:49:53068 I/DEBUG (25863): d24 0080008000800080 d25 0080008000800080 01-30 21:49:53068 I/DEBUG (25863): d26 0080008000800080 d27 0080008000800080 01-30 21:49:53068 I/DEBUG (25863): d28 0080008000800080 d29 0080008000800080 01-30 21:49:53068 I/DEBUG (25863): d30 0000000000000000 d31 8080808080808080 01-30 21:49:53068 I/DEBUG (25863): scr 80000012 01-30 21:49:53068 I/DEBUG (25863): 01-30 21:49:53068 I/DEBUG (25863): backtrace: 01-30 21:49:53068 I/DEBUG (25863): #00 pc 00000000 01-30 21:49:53068 I/DEBUG (25863): #1 pc 000ed7ad /data/app-lib/orgopencvengine-1/libopencv_java3so (cv::Mat::create(int, int const, int)+1296) 01-30 21:49:53068 I/DEBUG (25863): 01-30 21:49:53068 I/DEBUG (25863): stack: 01-30 21:49:53068 I/DEBUG (25863): 62c57070 00038184 01-30 21:49:53068 I/DEBUG (25863): 62c57074 000388d0 01-30 21:49:53068 I/DEBUG (25863): 62c57078 0003901c 01-30 21:49:53068 I/DEBUG (25863): 62c5707c 00039768 01-30 21:49:53068 I/DEBUG (25863): 62c57080 00039eb4 01-30 21:49:53068 I/DEBUG (25863): 62c57084 0003a600 01-30 21:49:53078 I/DEBUG (25863): 62c57088 0003ad4c 01-30 21:49:53078 I/DEBUG (25863): 62c5708c 0003b498 01-30 21:49:53078 I/DEBUG (25863): 62c57090 0003bbe4 01-30 21:49:53078 I/DEBUG (25863): 62c57094 0003c330 01-30 21:49:53078 I/DEBUG (25863): 62c57098 0003ca7c 01-30 21:49:53078 I/DEBUG (25863): 62c5709c 0003d1c8 01-30 21:49:53078 I/DEBUG (25863): 62c570a0 0003d914 01-30 21:49:53078 I/DEBUG (25863): 62c570a4 0003e060 01-30 21:49:53078 I/DEBUG (25863): 62c570a8 41f821f8 /dev/ashmem/dalvik-heap (deleted) 01-30 21:49:53078 I/DEBUG (25863): 62c570ac 614e1785 /data/app-lib/orgopencvengine-1/libopencv_java3so (cv::Mat::create(int, int const, int)+1256) 01-30 21:49:53078 I/DEBUG (25863): #00 62c570b0 00000000 01-30 21:49:53078 I/DEBUG (25863): 01-30 21:49:53078 I/DEBUG (25863): #1 62c570b0 00000000 01-30 21:49:53078 I/DEBUG (25863): 62c570b4 41f81e58 /dev/ashmem/dalvik-heap (deleted) 01-30 21:49:53078 I/DEBUG (25863): 62c570b8 00000000 01-30 21:49:53078 I/DEBUG (25863): 62c570bc 00000000 01-30 21:49:53078 I/DEBUG (25863): 62c570c0 00041374 01-30 21:49:53078 I/DEBUG (25863): 62c570c4 62c57388 [stack:3744] 01-30 21:49:53078 I/DEBUG (25863): 62c570c8 9d3a8c74 01-30 21:49:53078 I/DEBUG (25863): 62c570cc 00000002 01-30 21:49:53078 I/DEBUG (25863): 62c570d0 61adb3f4 /data/app-lib/orgopencvengine-1/libopencv_java3so 01-30 21:49:53078 I/DEBUG (25863): 62c570d4 61adb424 /data/app-lib/orgopencvengine-1/libopencv_java3so 01-30 21:49:53078 I/DEBUG (25863): 62c570d8 61adb3ec /data/app-lib/orgopencvengine-1/libopencv_java3so 01-30 21:49:53078 I/DEBUG (25863): 62c570dc 61b9a6d8 /data/app-lib/orgopencvengine-1/libopencv_java3so 01-30 21:49:53078 I/DEBUG (25863): 62c570e0 00000000 01-30 21:49:53078 I/DEBUG (25863): 62c570e4 61b9a6d8 /data/app-lib/orgopencvengine-1/libopencv_java3so 01-30 21:49:53078 I/DEBUG (25863): 62c570e8 61adb334 /data/app-lib/orgopencvengine-1/libopencv_java3so 01-30 21:49:53078 I/DEBUG (25863): 62c570ec 00000001 01-30 21:49:53078 I/DEBUG (25863): 01-30 21:49:53078 I/DEBUG (25863): memory near r0: 01-30 21:49:53078 I/DEBUG (25863): 41f821d8 006e006e 00620061 0065006c 00000013 01-30 21:49:53078 I/DEBUG (25863): 41f821e8 41f820e8 00000000 41ed54d0 0000001b 01-30 21:49:53078 I/DEBUG (25863): 41f821f8 41672a60 00000000 00000000 41672518 01-30 21:49:53078 I/DEBUG (25863): 41f82208 00000000 0000001b 41682968 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f82218 41f82228 00000001 0000000b 0000003b 01-30 21:49:53078 I/DEBUG (25863): 41f82228 41664950 00000000 00000010 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f82238 00680054 00650072 00640061 0031002d 01-30 21:49:53078 I/DEBUG (25863): 41f82248 00380035 00000030 00000000 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f82258 00000000 00000023 416640e0 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f82268 41f82228 00000000 00000000 0000000b 01-30 21:49:53078 I/DEBUG (25863): 41f82278 00000000 00000023 41673a10 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f82288 00000000 00000000 00000000 41f81e28 01-30 21:49:53078 I/DEBUG (25863): 41f82298 00000000 0000001b 41664698 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f822a8 00000000 62924120 00000000 00000023 01-30 21:49:53078 I/DEBUG (25863): 41f822b8 416640e0 00000000 41f822d8 fa620efe 01-30 21:49:53078 I/DEBUG (25863): 41f822c8 00000000 00000024 00000000 00000063 01-30 21:49:53078 I/DEBUG (25863): 01-30 21:49:53078 I/DEBUG (25863): memory near r2: 01-30 21:49:53078 I/DEBUG (25863): 41f81e10 002e0067 00680054 00650072 00640061 01-30 21:49:53078 I/DEBUG (25863): 41f81e20 00000000 0000005b 42ff0000 00000002 01-30 21:49:53078 I/DEBUG (25863): 41f81e30 000000f0 00000140 00000000 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f81e40 00000000 00000000 41f821f8 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f81e50 41f81e30 41f81e58 00000140 00000001 01-30 21:49:53078 I/DEBUG (25863): 41f81e60 00000000 00000000 00000005 00000001 01-30 21:49:53078 I/DEBUG (25863): 41f81e70 00000001 00000000 00000000 00000023 01-30 21:49:53078 I/DEBUG (25863): 41f81e80 416640e0 00000000 41f81ea0 144e2295 01-30 21:49:53078 I/DEBUG (25863): 41f81e90 00000000 0000002e 00000000 00000073 01-30 21:49:53078 I/DEBUG (25863): 41f81ea0 41664950 00000000 0000002e 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f81eb0 0072006f 002e0067 0070006f 006e0065 01-30 21:49:53078 I/DEBUG (25863): 41f81ec0 00760063 0061002e 0064006e 006f0072 01-30 21:49:53078 I/DEBUG (25863): 41f81ed0 00640069 004a002e 00760061 00430061 01-30 21:49:53078 I/DEBUG (25863): 41f81ee0 006d0061 00720065 00560061 00650069 01-30 21:49:53078 I/DEBUG (25863): 41f81ef0 00240077 00610043 0065006d 00610072 01-30 21:49:53078 I/DEBUG (25863): 41f81f00 006f0057 006b0072 00720065 0000002b 01-30 21:49:53078 I/DEBUG (25863): 01-30 21:49:53078 I/DEBUG (25863): memory near r4: 01-30 21:49:53078 I/DEBUG (25863): 41f821d8 006e006e 00620061 0065006c 00000013 01-30 21:49:53078 I/DEBUG (25863): 41f821e8 41f820e8 00000000 41ed54d0 0000001b 01-30 21:49:53078 I/DEBUG (25863): 41f821f8 41672a60 00000000 00000000 41672518 01-30 21:49:53078 I/DEBUG (25863): 41f82208 00000000 0000001b 41682968 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f82218 41f82228 00000001 0000000b 0000003b 01-30 21:49:53078 I/DEBUG (25863): 41f82228 41664950 00000000 00000010 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f82238 00680054 00650072 00640061 0031002d 01-30 21:49:53078 I/DEBUG (25863): 41f82248 00380035 00000030 00000000 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f82258 00000000 00000023 416640e0 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f82268 41f82228 00000000 00000000 0000000b 01-30 21:49:53078 I/DEBUG (25863): 41f82278 00000000 00000023 41673a10 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f82288 00000000 00000000 00000000 41f81e28 01-30 21:49:53078 I/DEBUG (25863): 41f82298 00000000 0000001b 41664698 00000000 01-30 21:49:53078 I/DEBUG (25863): 41f822a8 00000000 62924120 00000000 00000023 01-30 21:49:53088 I/DEBUG (25863): 41f822b8 416640e0 00000000 41f822d8 fa620efe 01-30 21:49:53088 I/DEBUG (25863): 41f822c8 00000000 00000024 00000000 00000063 01-30 21:49:53088 I/DEBUG (25863): 01-30 21:49:53088 I/DEBUG (25863): memory near r6: 01-30 21:49:53088 I/DEBUG (25863): 61c9a5f4 61c80428 61c803a0 61c80518 9e3779b9 01-30 21:49:53088 I/DEBUG (25863): 61c9a604 03000000 00000000 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 61c9a614 61c80700 00000000 00000000 00000001 01-30 21:49:53088 I/DEBUG (25863): 61c9a624 9e3779b9 9e3779b9 9e3779b9 9e3779b9 01-30 21:49:53088 I/DEBUG (25863): 61c9a634 9e3779b9 00000000 00000000 00000001 01-30 21:49:53088 I/DEBUG (25863): 61c9a644 00000000 00000000 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 61c9a654 00000000 00000000 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 61c9a664 00000000 00000000 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 61c9a674 00000000 00000000 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 61c9a684 00000000 00000000 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 61c9a694 00000000 00000000 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 61c9a6a4 00000000 00000000 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 61c9a6b4 00000000 00000000 00000000 00000001 01-30 21:49:53088 I/DEBUG (25863): 61c9a6c4 00000000 00000000 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 61c9a6d4 00000000 00000000 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 61c9a6e4 00000000 00000000 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 01-30 21:49:53088 I/DEBUG (25863): memory near r7: 01-30 21:49:53088 I/DEBUG (25863): 41f81e08 006c002e 006e0061 002e0067 00680054 01-30 21:49:53088 I/DEBUG (25863): 41f81e18 00650072 00640061 00000000 0000005b 01-30 21:49:53088 I/DEBUG (25863): 41f81e28 42ff0000 00000002 000000f0 00000140 01-30 21:49:53088 I/DEBUG (25863): 41f81e38 00000000 00000000 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 41f81e48 41f821f8 00000000 41f81e30 41f81e58 01-30 21:49:53088 I/DEBUG (25863): 41f81e58 00000140 00000001 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 41f81e68 00000005 00000001 00000001 00000000 01-30 21:49:53088 I/DEBUG (25863): 41f81e78 00000000 00000023 416640e0 00000000 01-30 21:49:53088 I/DEBUG (25863): 41f81e88 41f81ea0 144e2295 00000000 0000002e 01-30 21:49:53088 I/DEBUG (25863): 41f81e98 00000000 00000073 41664950 00000000 01-30 21:49:53088 I/DEBUG (25863): 41f81ea8 0000002e 00000000 0072006f 002e0067 01-30 21:49:53088 I/DEBUG (25863): 41f81eb8 0070006f 006e0065 00760063 0061002e 01-30 21:49:53088 I/DEBUG (25863): 41f81ec8 0064006e 006f0072 00640069 004a002e 01-30 21:49:53088 I/DEBUG (25863): 41f81ed8 00760061 00430061 006d0061 00720065 01-30 21:49:53088 I/DEBUG (25863): 41f81ee8 00560061 00650069 00240077 00610043 01-30 21:49:53088 I/DEBUG (25863): 41f81ef8 0065006d 00610072 006f0057 006b0072 01-30 21:49:53088 I/DEBUG (25863): 01-30 21:49:53088 I/DEBUG (25863): memory near sl: 01-30 21:49:53088 I/DEBUG (25863): 00012be0 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012bf0 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012c00 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012c10 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012c20 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012c30 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012c40 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012c50 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012c60 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012c70 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012c80 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012c90 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012ca0 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012cb0 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012cc0 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 00012cd0 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53088 I/DEBUG (25863): 01-30 21:49:53088 I/DEBUG (25863): memory near ip: 01-30 21:49:53088 I/DEBUG (25863): 41f81e10 002e0067 00680054 00650072 00640061 01-30 21:49:53088 I/DEBUG (25863): 41f81e20 00000000 0000005b 42ff0000 00000002 01-30 21:49:53088 I/DEBUG (25863): 41f81e30 000000f0 00000140 00000000 00000000 01-30 21:49:53088 I/DEBUG (25863): 41f81e40 00000000 00000000 41f821f8 00000000 01-30 21:49:53088 I/DEBUG (25863): 41f81e50 41f81e30 41f81e58 00000140 00000001 01-30 21:49:53088 I/DEBUG (25863): 41f81e60 00000000 00000000 00000005 00000001 01-30 21:49:53088 I/DEBUG (25863): 41f81e70 00000001 00000000 00000000 00000023 01-30 21:49:53088 I/DEBUG (25863): 41f81e80 416640e0 00000000 41f81ea0 144e2295 01-30 21:49:53088 I/DEBUG (25863): 41f81e90 00000000 0000002e 00000000 00000073 01-30 21:49:53088 I/DEBUG (25863): 41f81ea0 41664950 00000000 0000002e 00000000 01-30 21:49:53088 I/DEBUG (25863): 41f81eb0 0072006f 002e0067 0070006f 006e0065 01-30 21:49:53088 I/DEBUG (25863): 41f81ec0 00760063 0061002e 0064006e 006f0072 01-30 21:49:53088 I/DEBUG (25863): 41f81ed0 00640069 004a002e 00760061 00430061 01-30 21:49:53088 I/DEBUG (25863): 41f81ee0 006d0061 00720065 00560061 00650069 01-30 21:49:53088 I/DEBUG (25863): 41f81ef0 00240077 00610043 0065006d 00610072 01-30 21:49:53088 I/DEBUG (25863): 41f81f00 006f0057 006b0072 00720065 0000002b 01-30 21:49:53088 I/DEBUG (25863): 01-30 21:49:53088 I/DEBUG (25863): memory near sp: 01-30 21:49:53088 I/DEBUG (25863): 62c57090 0003bbe4 0003c330 0003ca7c 0003d1c8 01-30 21:49:53088 I/DEBUG (25863): 62c570a0 0003d914 0003e060 41f821f8 614e1785 01-30 21:49:53098 I/DEBUG (25863): 62c570b0 00000000 41f81e58 00000000 00000000 01-30 21:49:53098 I/DEBUG (25863): 62c570c0 00041374 62c57388 9d3a8c74 00000002 01-30 21:49:53098 I/DEBUG (25863): 62c570d0 61adb3f4 61adb424 61adb3ec 61b9a6d8 01-30 21:49:53098 I/DEBUG (25863): 62c570e0 00000000 61b9a6d8 61adb334 00000001 01-30 21:49:53098 I/DEBUG (25863): 62c570f0 00046b04 00047250 0004799c 000480e8 01-30 21:49:53098 I/DEBUG (25863): 62c57100 00048834 62c57a78 ffffffff 00000000 01-30 21:49:53098 I/DEBUG (25863): 62c57110 00000000 00000000 62c57388 41f81e28 01-30 21:49:53098 I/DEBUG (25863): 62c57120 00000002 614f5af5 0004d12c 0004d878 01-30 21:49:53098 I/DEBUG (25863): 62c57130 0004dfc4 0004e710 0004ee5c 0004f5a8 01-30 21:49:53098 I/DEBUG (25863): 62c57140 00000000 00050440 00050b8c 000512d8 01-30 21:49:53098 I/DEBUG (25863): 62c57150 00000000 00052170 61adbd90 61b9a230 01-30 21:49:53098 I/DEBUG (25863): 62c57160 61adb334 61adbd80 61b9a230 61adb334 01-30 21:49:53098 I/DEBUG (25863): 62c57170 00055484 00055bd0 00000000 00056a68 01-30 21:49:53098 I/DEBUG (25863): 62c57180 61adbd90 61b9a230 61adb334 61adbd80 01-30 21:49:53098 I/DEBUG (25863): 01-30 21:49:53098 I/DEBUG (25863): code around pc: 01-30 21:49:53098 I/DEBUG (25863): 00000000 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 00000010 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 00000020 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 00000030 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 00000040 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 00000050 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 00000060 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 00000070 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 00000080 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 00000090 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 000000a0 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 000000b0 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 000000c0 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 000000d0 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 000000e0 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 000000f0 ffffffff ffffffff ffffffff ffffffff 01-30 21:49:53098 I/DEBUG (25863): 01-30 21:49:53098 I/DEBUG (25863): code around lr: 01-30 21:49:53098 I/DEBUG (25863): 614e178c 9b0c6879 bf082c00 46064604 e000f8d4 01-30 21:49:53098 I/DEBUG (25863): 614e179c 92014620 95004662 95039502 5008f8de 01-30 21:49:53098 I/DEBUG (25863): 614e17ac 460347a8 28006278 683bd055 2550f64b 01-30 21:49:53098 I/DEBUG (25863): 614e17bc f0036879 6afa0407 03c8f3c3 00643901 01-30 21:49:53098 I/DEBUG (25863): 614e17cc fa251c58 f852f304 f0032021 fa000303 01-30 21:49:53098 I/DEBUG (25863): 614e17dc 429af303 aec7f43f 0a48f10d 2300212b 01-30 21:49:53098 I/DEBUG (25863): 614e17ec 46509312 f01f9313 4e66f9e3 f106447e 01-30 21:49:53098 I/DEBUG (25863): 614e17fc 46040e20 34104635 3610cd0f f8444575 01-30 21:49:53098 I/DEBUG (25863): 614e180c f8440c10 f8441c0c f8442c08 d1f13c04 01-30 21:49:53098 I/DEBUG (25863): 614e181c f240ce03 4a5c159d f8b64b5c 447ae000 01-30 21:49:53098 I/DEBUG (25863): 614e182c 447b78b6 f06f6020 606100d6 f8a44651 01-30 21:49:53098 I/DEBUG (25863): 614e183c 72a6e008 f0239500 4650fd6d f9caf01f 01-30 21:49:53098 I/DEBUG (25863): 614e184c 2301e691 28004604 ae54f43f 4632e626 01-30 21:49:53098 I/DEBUG (25863): 614e185c 2401e613 ad10e64e 21069010 46289311 01-30 21:49:53098 I/DEBUG (25863): 614e186c f9a6f01f c128f8df 4a4a4686 1895f240 01-30 21:49:53098 I/DEBUG (25863): 614e187c 4b4944fc 447a4629 0000f8dc f8bc447b 01-30 21:49:53158 E/mm-camera( 242): cpp_hardware_process_frame:956, v4l2 ioctl() failed rc:-1, trans_code:-11 01-30 21:49:53158 E/mm-camera( 242): [cpp_hardware_process_frame:960] drop this frame 01-30 21:49:53158 E/mm-camera( 242): [cpp_hardware_process_frame:962] cpp drop counter 0 01-30 21:49:53158 E/mm-camera( 242): cpp_thread_handle_process_buf_event:218] get buffer fail drop frame id:242 identity:0x20004 01-30 21:49:53198 E/mm-camera( 242): cpp_thread_handle_process_buf_event:218] get buffer fail drop frame id:243 identity:0x20004 01-30 21:49:53208 I/DEBUG (25863): !@dumpstate -k -t -z -d -o /data/log/dumpstate_app_native -m 3515 01-30 21:49:53208 I/BootReceiver( 731): Copying /data/tombstones/tombstone_03 to DropBox (SYSTEM_TOMBSTONE) 01-30 21:49:53218 I/dumpstate( 4070): begin 01-30 21:49:53218 W/ActivityManager( 731): Force finishing activity ukcomicompanieroopencvappli/CameraActivity 01-30 21:49:53228 D/DisplayManagerGlobal( 731): getDisplayInfo: displayId=0, info=DisplayInfo{"Built-in Screen", app 480 x 800, real 480 x 800, largest app 800 x 762, smallest app 480 x 442, 600 fps, rotation0, density 240 (217714 x 21617) dpi, layerStack 0, type BUILT_IN, FLAG_SECURE, FLAG_SUPPORTS_PROTECTED_BUFFERS} 01-30 21:49:53228 E/mm-camera( 242): cpp_thread_handle_process_buf_event:218] get buffer fail drop frame id:244 identity:0x20004 01-30 21:49:53238 W/ApplicationPackageManager( 731): getCSCPackageItemText() 01-30 21:49:53248 I/dumpstate( 4075): begin 01-30 21:49:53248 I/dumpstate( 4075): dumpstate is still running 01-30 21:49:53258 E/mm-camera( 242): cpp_thread_handle_process_buf_event:218] get buffer fail drop frame id:245 identity:0x20004 01-30 21:49:53258 D/STATUSBAR-StatusBarManagerService( 731): manageDisableList what=0x0 pkg=WindowManagerLayoutParams 01-30 21:49:53268 I/SurfaceFlinger( 227): id=707 createSurf (1x1),1 flag=4, terevin 01-30 21:49:53288 E/mm-camera( 242): cpp_thread_handle_process_buf_event:218] get buffer fail drop frame id:246 identity:0x20004 01-30 21:49:53298 D/AutotriggerReceiver(13182): [onReceive] Intent { act=androidintentactionDROPBOX_ENTRY_ADDED flg=0x10 cmp=comqualcommlogkit/autotriggerAutotriggerReceiver (has extras) } 01-30 21:49:53308 D/AutotriggerReceiver(13182): [onReceive] Intent { act=androidintentactionDROPBOX_ENTRY_ADDED flg=0x10 cmp=comqualcommlogkit/autotriggerAutotriggerReceiver (has extras) } 01-30 21:49:53308 D/AutotriggerReceiver(13182): [onReceive] androidintentactionDROPBOX_ENTRY_ADDED: SYSTEM_TOMBSTONE 01-30 21:49:53328 E/mm-camera( 242): cpp_thread_handle_process_buf_event:218] get buffer fail drop frame id:247 identity:0x20004 01-30 21:49:53358 E/mm-camera( 242): cpp_thread_handle_process_buf_event:218] get buffer fail drop frame id:248 identity:0x20004 01-30 21:49:53388 E/mm-camera( 242): cpp_thread_handle_process_buf_event:218] get buffer fail drop frame id:249 identity:0x20004 01-30 21:49:53418 D/dalvikvm( 731): GC_FOR_ALLOC freed 2433K, 25% free 21049K/27744K, paused 107ms, total 108ms 01-30 21:49:53418 D/CrashAnrDetector( 731): Build: samsung/heatqltexx/heatqlte:444/KTU84P/G357FZXXU1AOH4:user/release-keys 01-30 21:49:53418 D/CrashAnrDetector( 731): Hardware: MSM8916 01-30 21:49:53418 D/CrashAnrDetector( 731): Revision: 2 01-30 21:49:53418 D/CrashAnrDetector( 731): Bootloader: G357FZXXU1AOH4 01-30 21:49:53418 D/CrashAnrDetector( 731): Radio: unknown 01-30 21:49:53418 D/CrashAnrDetector( 731): Kernel: Linux version 31028-772944 (dpi@SWHD8906) (gcc version 47 (GCC) ) #1 SMP PREEMPT Wed Aug 19 20:36:20 KST 2015 01-30 21:49:53418 D/CrashAnrDetector( 731): 01-30 21:49:53418 D/CrashAnrDetector( 731): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 01-30 21:49:53418 D/CrashAnrDetector( 731): Build fingerprint: 'samsung/heatqltexx/heatqlte:444/KTU84P/G357FZXXU1AOH4:user/release-keys' 01-30 21:49:53418 D/CrashAnrDetector( 731): Revision: '2' 01-30 21:49:53418 D/CrashAnrDetector( 731): pid: 3515, tid: 3744, name: Thread-1580 >>> ukcomicompanieroopencvappli <<< 01-30 21:49:53418 D/CrashAnrDetector( 731): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): r0 41f821f8 r1 00000002 r2 41f81e30 r3 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): r4 41f821f8 r5 00000000 r6 61c9a614 r7 41f81e28 01-30 21:49:53418 D/CrashAnrDetector( 731): r8 00000000 r9 ffffffff sl 00012c00 fp 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): ip 41f81e30 sp 62c570b0 lr 614e17af pc 00000000 cpsr 200e0010 01-30 21:49:53418 D/CrashAnrDetector( 731): d0 7463617274627573 d1 0000000000000000 01-30 21:49:53418 D/CrashAnrDetector( 731): d2 4330000000000000 d3 0008000062924e90 01-30 21:49:53418 D/CrashAnrDetector( 731): d4 4330000000000000 d5 0000000000000000 01-30 21:49:53418 D/CrashAnrDetector( 731): d6 0000000000000000 d7 0000000000000000 01-30 21:49:53418 D/CrashAnrDetector( 731): d8 0000000000000000 d9 0000000000000000 01-30 21:49:53418 D/CrashAnrDetector( 731): d10 0000000000000000 d11 0000000000000000 01-30 21:49:53418 D/CrashAnrDetector( 731): d12 0000000000000000 d13 0000000000000000 01-30 21:49:53418 D/CrashAnrDetector( 731): d14 0000000000000000 d15 0000000000000000 01-30 21:49:53418 D/CrashAnrDetector( 731): d16 0000000062924e90 d17 0000000000000000 01-30 21:49:53418 D/CrashAnrDetector( 731): d18 0000000000000000 d19 0000000000000000 01-30 21:49:53418 D/CrashAnrDetector( 731): d20 0101010101010101 d21 0101010101010101 01-30 21:49:53418 D/CrashAnrDetector( 731): d22 0000000000000000 d23 0000000000000000 01-30 21:49:53418 D/CrashAnrDetector( 731): d24 0080008000800080 d25 0080008000800080 01-30 21:49:53418 D/CrashAnrDetector( 731): d26 0080008000800080 d27 0080008000800080 01-30 21:49:53418 D/CrashAnrDetector( 731): d28 0080008000800080 d29 0080008000800080 01-30 21:49:53418 D/CrashAnrDetector( 731): d30 0000000000000000 d31 8080808080808080 01-30 21:49:53418 D/CrashAnrDetector( 731): scr 80000012 01-30 21:49:53418 D/CrashAnrDetector( 731): 01-30 21:49:53418 D/CrashAnrDetector( 731): backtrace: 01-30 21:49:53418 D/CrashAnrDetector( 731): #00 pc 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): #1 pc 000ed7ad /data/app-lib/orgopencvengine-1/libopencv_java3so (cv::Mat::create(int, int const, int)+1296) 01-30 21:49:53418 D/CrashAnrDetector( 731): 01-30 21:49:53418 D/CrashAnrDetector( 731): stack: 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c57070 00038184 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c57074 000388d0 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c57078 0003901c 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c5707c 00039768 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c57080 00039eb4 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c57084 0003a600 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c57088 0003ad4c 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c5708c 0003b498 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c57090 0003bbe4 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c57094 0003c330 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c57098 0003ca7c 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c5709c 0003d1c8 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570a0 0003d914 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570a4 0003e060 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570a8 41f821f8 /dev/ashmem/dalvik-heap (deleted) 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570ac 614e1785 /data/app-lib/orgopencvengine-1/libopencv_java3so (cv::Mat::create(int, int const, int)+1256) 01-30 21:49:53418 D/CrashAnrDetector( 731): #00 62c570b0 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): 01-30 21:49:53418 D/CrashAnrDetector( 731): #1 62c570b0 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570b4 41f81e58 /dev/ashmem/dalvik-heap (deleted) 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570b8 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570bc 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570c0 00041374 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570c4 62c57388 [stack:3744] 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570c8 9d3a8c74 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570cc 00000002 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570d0 61adb3f4 /data/app-lib/orgopencvengine-1/libopencv_java3so 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570d4 61adb424 /data/app-lib/orgopencvengine-1/libopencv_java3so 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570d8 61adb3ec /data/app-lib/orgopencvengine-1/libopencv_java3so 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570dc 61b9a6d8 /data/app-lib/orgopencvengine-1/libopencv_java3so 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570e0 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570e4 61b9a6d8 /data/app-lib/orgopencvengine-1/libopencv_java3so 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570e8 61adb334 /data/app-lib/orgopencvengine-1/libopencv_java3so 01-30 21:49:53418 D/CrashAnrDetector( 731): 62c570ec 00000001 01-30 21:49:53418 D/CrashAnrDetector( 731): 01-30 21:49:53418 D/CrashAnrDetector( 731): memory near r0: 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f821d8 006e006e 00620061 0065006c 00000013 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f821e8 41f820e8 00000000 41ed54d0 0000001b 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f821f8 41672a60 00000000 00000000 41672518 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f82208 00000000 0000001b 41682968 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f82218 41f82228 00000001 0000000b 0000003b 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f82228 41664950 00000000 00000010 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f82238 00680054 00650072 00640061 0031002d 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f82248 00380035 00000030 00000000 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f82258 00000000 00000023 416640e0 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f82268 41f82228 00000000 00000000 0000000b 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f82278 00000000 00000023 41673a10 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f82288 00000000 00000000 00000000 41f81e28 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f82298 00000000 0000001b 41664698 00000000 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f822a8 00000000 62924120 00000000 00000023 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f822b8 416640e0 00000000 41f822d8 fa620efe 01-30 21:49:53418 D/CrashAnrDetector( 731): 41f822c8 00 01-30 21:49:53428 D/CrashAnrDetector( 731): processName:ukcomicompanieroopencvappli 01-30 21:49:53428 D/CrashAnrDetector( 731): broadcastEvent : ukcomicompanieroopencvappli SYSTEM_TOMBSTONE 01-30 21:49:53428 E/mm-camera( 242): cpp_thread_handle_process_buf_event:218] get buffer fail drop frame id:250 identity:0x20004 01-30 21:49:53428 W/ContextImpl( 731): Calling a method in the system process without a qualified user: androidappContextImplsendBroadcast:1272 comandroidserveranalyticsdatacollectionapplicationCrashAnrDetectorbroadcastEvent:296 comandroidserveranalyticsdatacollectionapplicationCrashAnrDetectorprocessDropBoxEntry:254 comandroidserveranalyticsdatacollectionapplicationCrashAnrDetectoraccess$100:60 comandroidserveranalyticsdatacollectionapplicationCrashAnrDetector$1onReceive:102 libcSigSevtxt —Reply to this email directly or view it on GitHub.

Source: Gmail -> IFTTT-> Blogger

Anonymous Date Reminder

I Installed Anonymous Date Reminder and set the permissions to administrator. I have the options to create a block and fields to show in a table.

from Google Alert - anonymous http://ift.tt/1UxgUAP
via IFTTT

HA - Hackers Anonymous

More… Add-ons for Mobile · Dictionaries & Language Packs · Search Tools · Developer Hub · Add-ons for Firefox · Themes; HA - Hackers Anonymous ...

from Google Alert - anonymous http://ift.tt/20zlpOS
via IFTTT

Google Wants to Fly Drones Over Your Head to Deliver High Speed 5G Internet

Would you enjoy If Drones hovering outside your window or above your head, just because it is offering High-Speed Internet Service? Most Americans may simply prefer to "Shoot Down" unwelcome items. Well, Google is working on a similar secret project, codenamed Project Skybender, to beam faster internet service, as fast as 5G, from the air. Google is currently testing multiple


from The Hacker News http://ift.tt/1KMiEkb
via IFTTT

WhatsApp to Share your Personal Data With Facebook

Recently the Facebook-owned messaging app dropped its $1 annual subscription fee to make WhatsApp Free for Lifetime. Now, WhatsApp has plans to introduce a new feature that would allow its users to integrate their Facebook accounts with the most widely used messaging app. <!-- adsense --> So far, the social media giant has been focusing on its own messaging platform, Messenger and both


from The Hacker News http://ift.tt/1nuhrIS
via IFTTT

Preview: Anonymous, Inc.

The U.S. has become known as the easiest place for foreigners to launder dirty money. See what happens when hidden cameras capture American ...

from Google Alert - anonymous http://ift.tt/1KgKKcb
via IFTTT

Hidden Galaxy IC 342


Similar in size to large, bright spiral galaxies in our neighborhood, IC 342 is a mere 10 million light-years distant in the long-necked, northern constellation Camelopardalis. A sprawling island universe, IC 342 would otherwise be a prominent galaxy in our night sky, but it is hidden from clear view and only glimpsed through the veil of stars, gas and dust clouds along the plane of our own Milky Way galaxy. Even though IC 342's light is dimmed by intervening cosmic clouds, this deep telescopic image traces the galaxy's obscuring dust, blue star clusters, and glowing pink star forming regions along spiral arms that wind far from the galaxy's core. IC 342 may have undergone a recent burst of star formation activity and is close enough to have gravitationally influenced the evolution of the local group of galaxies and the Milky Way. via NASA http://ift.tt/1nCJE0C

Friday, January 29, 2016

Hide Names of Graders (aka Anonymous graders)

Hide Names of Graders (aka Anonymous graders). Created on Jan 29, 2016 3:07 PM by lindalee@wharton.upenn.edu - Last Modified: Jan 29, 2016 ...

from Google Alert - anonymous http://ift.tt/1SP05nh
via IFTTT

Cache tags for anonymous user with internal page cache?

Is it possible to change an array value dynamic (with Internal Page Cache) for anonymous users with the usage of cache tags? The documentation ...

from Google Alert - anonymous http://ift.tt/1NG2OYj
via IFTTT

[FD] Netlife Photosuite Pro - Client Side Cross Site Scripting Vulnerability

Document Title: =============== Netlife Photosuite Pro - Client Side Cross Site Scripting Vulnerability References (Source): ==================== http://ift.tt/23xzhvp Release Date: ============= 2016-01-29 Vulnerability Laboratory ID (VL-ID): ==================================== 1692 Common Vulnerability Scoring System: ==================================== 3.3 Product & Service Introduction: =============================== Netlife Photosuite Pro is a CMS, designed for schools. Its offers a online Photo ordering service. (Copy of the Vendor Homepage: http://netlife.no/ ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Core Research Team discovered a client-side cross site scripting web vulnerability in official Netlife Photosuite Pro, manufactured by Netlife AS. Vulnerability Disclosure Timeline: ================================== 2016-01-29: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Netlife Product: Photosuite Pro - Content Management System 2016 Q1 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ A GET cross site scripting web vulnerability has been discovered in the official Netlife Photosuite Pro Content Management System. A vulnerability allows remote attackers to inject malicious script codes on the client-side of the affected web-application. The vulnerability is located in the `message` value of the `sections/prophoto/key.php` file. Remote attackers are able to inject own malicious script codes to the client-side of the affected web-application. The request method to inject is GET and the attack vector is client-side. The attacker inject the payload in the message value to execute the code in key.php. The security risk of the client-side web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.3. Exploitation of the non-persistent cross site scripting web vulnerability requires no web-application user account and no user interaction. Successful exploitation results in session hijacking, persistent phishings attacks, persistent external redirect and malware loads or persistent manipulation of affected or connected module context. Request Method(s): [+] GET Vulnerable Module(s): [+] sections/prophoto/ Vulnerable File(s): [+] key.php Vulnerable Parameter(s): [+] message Proof of Concept (PoC): ======================= The cross site scripting web vulnerability can be exploited by remote attackers without a web-application user account or user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. PoC: http://ift.tt/1Uv6LVj Reference(s): Examples http://ift.tt/1JLGG3P http://ift.tt/1Uv6Kkc http://ift.tt/1Uv6Kke http://ift.tt/1Uv6Mbz http://ift.tt/1JLGIbO http://ift.tt/1Uv6MbD http://ift.tt/1JLGG3W Solution - Fix & Patch: ======================= The vulnerability can be patched by a secure parse and encode of the vulnerable `message` value in the affected key.php file GET method request. Filter the input and restrict it by disallowing usage of special chars or script code tags to prevent client-side injection attacks. Security Risk: ============== The security risk of the client-side cross site scripting web vulnerability in Netlife Photosuite Pro web-application is estimated as medium. (CVSS 3.3) Credits & Authors: ================== Iran Cyber Security Group - 0x3a (ICG SEC) [Iran-Cyber.Net] [http://ift.tt/1JLGIbT] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2016 | Vulnerability Laboratory - [Evolution Security GmbH]™

Source: Gmail -> IFTTT-> Blogger

Police Using Planes Equipped with Dirtbox to Spy on your Cell Phones

The Anaheim Police Department of California — Home of Disneyland — admitted that they used special Cell Phone surveillance technology, known as DirtBox, mounted on aircraft to track millions of mobile users activities. More than 400 pages of new documents [PDF] published Wednesday revealed that Local Police and federal authorities are using, DRTBox, an advanced version of Dirtbox developed


from The Hacker News http://ift.tt/1WRxCw9
via IFTTT

Ocean City, MD's surf is at least 6.32ft high

Maryland-Delaware, February 03, 2016 at 02:00PM

Ocean City, MD Summary
At 2:00 AM, surf min of 3.31ft. At 8:00 AM, surf min of 4.42ft. At 2:00 PM, surf min of 6.32ft. At 8:00 PM, surf min of 4.86ft.

Surf maximum: 6.53ft (1.99m)
Surf minimum: 6.32ft (1.93m)
Tide height: 2.35ft (0.72m)
Wind direction: NW
Wind speed: 9.29 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

ISS Daily Summary Report – 01/28/16

Story Time from Space:  Peake read “Science on the Space Station” from the book Max Goes to the Space Station,” discussed the subject on camera and demonstrated the scientific principles involved.  Kelly obtained pictures of Peake while he was reading the book with the Cupola in the background.  The video recording will be downlinked to the ground and used for educational purposes.   Sleep Actiwatch Downlink and Configuration:  Kelly downloaded data from his and Kornienko’s Actiwatch Spectrums and then configured the devices to continue collecting data.  The actiwatches have a photodiode that measures ambient light and an accelerometer to measure the movement of the arm or leg that the watch is attached to.  The actiwatch data recorded on the watch supports the Sleep ISS-12 experiment, which assesses the effects of space flight and ambient light exposure on sleep during a year-long mission on the ISS.   Low Earth Orbiting Navigation Experiment for Spacecraft Testing Autonomous Rendezvous and Docking (LONESTAR):  Peake depressurized and vented the JEM Airlock today in preparation for the deploy of the LONESTAR tomorrow.  LONESTAR contains satellites AggieSat4 (built by Texas A&M University students) and Bevo-2 (built by University of Texas students).  After deploy away from the ISS, AggieSat4 ejects the BEVO-2 satellite.  Both satellites then perform cross-linking communications, exchange data, link to GPS, and transmit to ground radio stations.  LONESTAR is used to further develop and refines autonomous navigation, rendezvous and docking software and procedures.  Future NASA missions to destinations such as asteroids and other celestial bodies require the use of autonomous navigation systems.   Orbital ATK (OA)-4 Cargo Operations:  All three USOS Crew continued transferring Cygnus cargo to ISS today. As of yesterday afternoon, approximately 17 hours remain to be completed.  Cygnus is scheduled to unberth from ISS on February 19th.   Japanese Experiment Module (JEM) Internal Port Camera:  Peake worked to relocate the JEM internal port camera slightly lower from its current position over the JEM Airlock. The new position will avoid interference with upcoming Stowage Frame installation.   Power Strip (PS)-120 Junction Box Installation:  Peak has installed a PS-120 Junction Box within the JEM today. Once installed, he changed the power source for the Freezer-Refrigerator Of STirling cycle (FROST) from Utility Outlet Panel (UOP) to the newly installed junction box.   Sound Level Measurements and Acoustic Blanket:  Kopra configured and checked out a new Sound Level Meter, then obtained sound level measurements in Node 3.  There was not sufficient time to complete the Acoustic Blanket installation today, therefore the activity will be deferred to an alternate day.  The two Acoustic Blankets that were to be installed today were intended to reduce the noise coming from Treadmill 2 (T2), especially near the runner’s head.     Today’s Planned Activities All activities were completed unless otherwise noted. JEM System Laptop Terminal Reboot WRS Water Sample Analysis JEMAL – Depress and Vent WRM. Condensate Pumping Initiation RGN – recycle tank drain into EDV EVA Medical Kit Configuration Brine and urine transfer from EDV-U to Progress 429 (SM Aft) Rodnik H2O Tank and Flushing Connector JPM – Internal camera relocation Photo/TV Battery Charge Initiation Scheduled Maintenance of Compound Specific Analyzer- Combustion Products (CSA-CP) Checkout of BETA-08 Data Output Device (УСИ) using Gamma-1M Equipment WRM.  Terminate Condensate Pumping Health Maintenance System (HMS) – Food Frequency Questionnaire Telemetry checkout of Orlan systems, Orlan interface unit (БСС), comm, and biomed parameters JEM – Installation of PS-120 Junction Box Comm reconfig into initial after Orlan Comm. Check Specific EVA Procedures Study Cygnus Cargo Operations DC1 EV hatch1 pusher checkout JEMAL – Verifying depressurization complete ESA Weekly Crew Conference JEM Airlock Depressurization and Vent Confirmation Story Time (ST) – Photography Photo/Video Equipment Battery Changeout TOCA Data Recording ALGOMETRIA. Search and stowage of TTA-Data No.05 data storage device Cygnus Cargo Operations IMS and Stowage Conference Checkout of Sound Level Meter SLEEP – Configuration and data download Sound level measurements СОЖ Maintenance IMS Delta File Prep Preventive Maintenance of FS1 Laptop (Cleaning and rebooting) BRI Monthly Maintenance Cygnus Cargo Operations SLM Acoustic Blanket Install [Deferred] Preventive Maintenance of SM АСП-О Hatch Sealing Mechanism and Progress 429 [АСА] Hatch door (SM Aft) before RS EVA Progress 429 (SM Aft) Activation, Air Duct Removal Removal of ССВП Screw Clamps from SM Aft and MPEG2 Video Recording of SM Aft – Progress 429 interface.Video downlink via OCA ALGOMETRIA. Experiment Ops SM Aft – Progress 429 Hatch Closure ПрК-СУ and СУ – ТГК 429 (SM Aft) Hatch Leak Check SLM Data Transfer Warning/Emergency Book Deployment Health Maintenance System (HMS) – Food Frequency Questionnaire INTERACTION-2. Experiment Ops Cygnus – Cargo Operations Tagup Terminate Photo/Video Battery Charge JRNL – Journal Entry COGNITION – Experiment Ops and Filling Questionnaire   Completed Task List Items None   Ground Activities All activities were completed unless otherwise noted. Nominal System Commanding   Three-Day Look Ahead: Friday, 01/29: Cygnus Cargo Transfer, BASS-M Ops, Lonestar Deploy, Kelly Day Off Saturday, 01/30: Crew Day Off, Weekly Cleaning Sunday, 01/31:  Crew Day Off   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Operate Carbon Dioxide Removal Assembly (CDRA) Node 3 Override Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Full Up Trace Contaminant Control System (TCCS) Node 3 Off  

from ISS On-Orbit Status Report http://ift.tt/1QKk3xV
via IFTTT

Let anonymous to see the widgets, but not to vote

I'm not sure how I can realise that, I would like to let anonymous users see the actual like/dislike widgets(and maybe count too), but to use it, they ...

from Google Alert - anonymous http://ift.tt/1SNGX93
via IFTTT

Critical OpenSSL Flaw Allows Hackers to Decrypt HTTPS Traffic

The OpenSSL Foundation has released the promised patch for a high severity vulnerability in its cryptographic code library that let attackers obtain the key to decrypt HTTPS-based communications and other Transport layer security (TLS) channels. OpenSSL is an open-source library that is the most widely used in applications for secure data transfers. Most websites use it to enable Secure


from The Hacker News http://ift.tt/1KeDWfe
via IFTTT

The anonymous source who confirmed Challenger's fatal cold weather flaw finally reveals his ...

The anonymous source who confirmed Challenger's fatal cold weather flaw finally reveals his identity. Bob Ebeling, 89, told his wife the night before ...

from Google Alert - anonymous http://ift.tt/23x8VJX
via IFTTT

Elliptical M60, Spiral NGC 4647


Giant elliptical galaxy M60 and spiral galaxy NGC 4647 do look like an odd couple in this sharp cosmic portrait from the Hubble Space Telescope. But they are found in a region of space where galaxies tend to gather, on the eastern side of the nearby Virgo Galaxy Cluster. About 54 million light-years distant, bright M60's simpler egg-like shape is created by its randomly swarming older stars, while NGC 4647's young blue stars, gas and dust are organized into winding arms rotating in a flattened disk. Spiral NGC 4647 is estimated to be more distant than M60, some 63 million light-years away. Also known as Arp 116, the pair of galaxies may be on the verge of a significant gravitational encounter, though. M60 (aka NGC 4649) is about 120,000 light-years across. The smaller NGC 4647 spans around 90,000 light-years, about the size of our own Milky Way. via NASA http://ift.tt/1ZVsRBG

Thursday, January 28, 2016

Efficient Hill-Climber for Multi-Objective Pseudo-Boolean Optimization. (arXiv:1601.07596v1 [cs.AI])

Local search algorithms and iterated local search algorithms are a basic technique. Local search can be a stand along search methods, but it can also be hybridized with evolutionary algorithms. Recently, it has been shown that it is possible to identify improving moves in Hamming neighborhoods for k-bounded pseudo-Boolean optimization problems in constant time. This means that local search does not need to enumerate neighborhoods to find improving moves. It also means that evolutionary algorithms do not need to use random mutation as a operator, except perhaps as a way to escape local optima. In this paper, we show how improving moves can be identified in constant time for multiobjective problems that are expressed as k-bounded pseudo-Boolean functions. In particular, multiobjective forms of NK Landscapes and Mk Landscapes are considered.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1OTf9fN
via IFTTT

Anonymous user object in twig has null timezone. Expected site default timezone.

Problem/Motivation When formatting datetime in twig and printing the timezone{{ datetime|date('g:i A T') }} An anonymous user has a null timezone ...

from Google Alert - anonymous http://ift.tt/1SMW3M4
via IFTTT

Anonymous $1M donation to help finish Kearney trail

Anonymous $1M donation to help finish Kearney trail. Courtesy/City of Kearney. Image from the Archway-Cherry section (Phase I) that is already ...

from Google Alert - anonymous http://ift.tt/1nBsj8l
via IFTTT

clash of clans hack tool by anonymous team

... CLICK HERE FOR MORE INFO (link is external) ◅◅◅ ▻▻ Click here :::: clash of clans hack tool by anonymous team (link is external) ◅◅◅

from Google Alert - anonymous http://ift.tt/20vEgKB
via IFTTT

network-anonymous-i2p

network-anonymous-i2p 0.10.0. Haskell API for I2P anonymous networking http://ift.tt/1XpDzUYanonymous-i2p · LTS Haskell 5.0 ...

from Google Alert - anonymous http://ift.tt/20vvXhZ
via IFTTT

[FD] New Era Company CMS - (id) SQL Injection Vulnerability

Document Title: =============== New Era Company CMS - (id) SQL Injection Vulnerability References (Source): ==================== http://ift.tt/1JHTl7P Release Date: ============= 2016-01-28 Vulnerability Laboratory ID (VL-ID): ==================================== 1678 Common Vulnerability Scoring System: ==================================== 8.1 Product & Service Introduction: =============================== Website now is providing Brand positioning, managing desired perception, communication business objectives and delivering consumers requirements, all of these and more are considered in developing a rewarding online experience for your customers and clients. We start with understanding your online presence, your audience characteristics, your business model and overall objectives. These insights will be captured through a series of meeting and competitor analysis sessions with your marketing team. Our website packages provide a convenient, affordable and timely solution for business owners who need to go live on the web without ignoring quality parameters. We work closely with our customers to create websites that enhance their company\\\\\\\'s brand image while incorporating the necessary development procedures that match with recent standards. - Building corporate websites, branded sites, e-commerce sites - Building campaign microsites, campaign landing pages, and unbranded public websites - Tracking, analyzing, and reporting customer data - Integrating generated websites with social media sites and other online trends and tools (Copy of the Vendor Homepage: www.e-messages.net ) Abstract Advisory Information: ============================== An independent vulnerability laboratory research group discovered a sql injection web vulnerability in the official New Era Company content management system (2016-Q1). Vulnerability Disclosure Timeline: ================================== 2016-01-28: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== New Era Company Product: New Era Company - Content Management System (Websites) 2016 Q1 Exploitation Technique: ======================= Remote Severity Level: =============== High Technical Details & Description: ================================ A remote sql injection web vulnerability has been discovered in the official New Era Company content management system (2016-Q1). The vulnerability allows remote attackers to execute own sql commands to compromise the web-applicaation or connected dbms. The vulnerability is located in the `id` value of the `details.php` file. Remote attackers are able to execute sql commands by injection of malicious statements via GET method request. The vulnerability is located on the application-side and the request method to inject/execute is GET. The security vulnerability is a classic order by sql injection in the `id` value. The security risk of the sql injection vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 8.1. Exploitation of the remote sql injection web vulnerability requires no user interaction or privileged web-application user account. Successful exploitation of the remote sql injection results in database management system, web-server and web-application compromise. Request Method(s): [+] GET Vulnerable File(s): [+] details.php Vulnerable Parameter(s): [+] id Proof of Concept (PoC): ======================= The sql injection web vulnerabilities can be exploited by remote attackers without privileged web-application user account or user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Dork(s): intext:"powered by New Era company" PoC: Exploitation http://localhost:8080/details.php?id=-1'[SQL INJECTION VULNERABILITY!

Source: Gmail -> IFTTT-> Blogger

[FD] Trend Micro Direct Pass - Filter Bypass & Persistent Web Vulnerability

Document Title: =============== Trend Micro Direct Pass - Filter Bypass & Persistent Web Vulnerability References (Source): ==================== http://ift.tt/1KH7HjV Video: http://ift.tt/1nR2cdr Release Date: ============= 2016-01-28 Vulnerability Laboratory ID (VL-ID): ==================================== 1661 Common Vulnerability Scoring System: ==================================== 6.6 Product & Service Introduction: =============================== DirectPass runs as a local console and browser plug-in but can also sync between multiple PC installations through your Trend Micro account. Unlike LastPass 1.72 (free, 5 stars), Dashlane (free, 4.5 stars), and RoboForm Everywhere 7 ($19.95 direct, 4.5 stars), it doesn`t let you log in to your saved credentials online. However, it will sync with free DirectPass apps for Android and iPhone. You can also test a free edition that manages just five passwords. DirectPass can export its data for import to another DirectPass installation. It can also import login data from LastPass. Hoping to get a fast start, I imported my 200+ LastPass logins. The results were disappointing. For starters, DirectPass doesn`t include the ability to categorize sites, so my passwords came through as an unordered list, a very long list. There`s no way to sort the list, and no provision to search for a particular login. For some reason, clicking in the list`s scroll bar doesn`t scroll down by one `page` of items. Instead, it scrolls to the corresponding location in the list. Finding any particular login required tediously scrolling through the entire list. (Copy of the Vendor Homepage: http://ift.tt/1ORFdHZ ) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered a filter bypass and persistent vulnerability in the official Trend Micro DirectPass web-application. Vulnerability Disclosure Timeline: ================================== 2016-01-16: Researcher Notification & Coordination (Benjamin Kunz Mejri - Evolution Security GmbH) 2016-01-17: Vendor Notification (Trend Micro Security Team) 2016-01-18: Vendor Response/Feedback (Trend Micro Security Team) 2016-01-21: Vendor Fix/Patch (Trend Micro Developer Team) 2016-01-27: Security Bulletin (Trend Micro Security Team) [Acknowledgements] 2016-01-28: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Trend Micro Product: DirectPass 2016 Q1 Exploitation Technique: ======================= Remote Severity Level: =============== High Technical Details & Description: ================================ A filter bypass issue and corss site request forgery web vulnerability has been discovered in the official Trend Micro Direct Pass web-application. The vulnerability allows remote attackers to bypass the input filter to inject own malicious script codes to the application-side of the online-service. This persistent vulnerability allows an attacker to execute javascript inside the password hint box! This would allow an attacker to trick a victim to logging into an account and then when the victim inserts a wrong master-password, a malicious javascript payload executes. The vulnerability is located on the application-side and the request method to inject is POST. The validation of the input is wrong encoded and suffers from a persistent vulnerability. The security risk of the filter bypass and persistent validation vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 6.1. Exploitation of the persistent input validation web vulnerability requires a low privileged direct-pass user account with restricted access and low or medium user interaction. Successful exploitation of the vulnerability results in session hijacking, persistent phishing, persistent external redirects to malicious source and persistent manipulation of affected or connected application modules. Vulnerable Module(s): [+] Password Hint - Input Box Affected Module(s): [+] Direct Pass - Web Application Proof of Concept (PoC): ======================= The vulnerability can be exploited by remote attackers with low privileged web-application user account and low user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Go to http://ift.tt/16jO7JH and sign-in 2. Go to http://ift.tt/1ORFbQg 3. Change your master password 4. Then insert your master password 5. Then insert the new master password and confirm master password 6. For the Hint, right-click on the box and click inspect element and remove maxlength="20" from the code 7. Then put ur XSS payload into the Hint box! 8. Logout from your account 9. Login to your account 10. Insert your master-password wrong and your XSS payload executes! Note: This vulnerability also effects the beta/duplicated version of the website: http://ift.tt/1QGcuIx PoC Video: https://www.youtube.com/watch?v=vXCdjK6O-Pc Solution - Fix & Patch: ======================= The vulnerability can be patched by a secure parse and encode of the vulnerable password hint input. Disallow special chars and restrict the input via filter exception. Security Risk: ============== The security risk of the input validation web vulnerability and filter bypass in the direct-pass web-application of trend micro is estimated as high. (CVSS 6.6) Credits & Authors: ================== Karim Rahal [Karim@karimrahal.com / KarimMTV@elitesec.org] - @KarimMTV [http://ift.tt/1ORFdI2] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2016 | Vulnerability Laboratory - [Evolution Security GmbH]™

Source: Gmail -> IFTTT-> Blogger

ISS Daily Summary Report – 01/27/16

Burning and Suppression of Solids – Milliken (BASS-M):  Yesterday Kopra completed reconfiguration of the Microgravity Science Glovebox (MSG) Facility and started setup of hardware for BASS-M.  Today he completed the BASS-M setup.  During the setup, there was an issue with the data from the power/video unit.  He was able perform troubleshooting and recover the data, however due to the extended time the first BASS-M run had to be deferred.  The BASS-M investigation tests flame-retardant cotton fabrics to determine how well they resist burning in microgravity. Results benefit research on flame-retardant textiles that can be used on Earth and in space.   Low Earth Orbiting Navigation Experiment for Spacecraft Testing Autonomous Rendezvous and Docking (LONESTAR):  Today Kelly and Peake opened the Japanese Experiment Module (JEM) Airlock inner hatch and extended the Airlock Slide Table into the JEM.  They then installed the Cyclops deployer on the Slide Table, installed a Small Fine Arm (SFA) Plate on Cyclops, and then installed the Lonestar on Cyclops.  Lonestar contains satellites AggieSat4 (built by Texas A&M University students) and Bevo-2 (built by University of Texas students).  Deployment is planned for Friday, January 29.  After free-flying safely away from the ISS, AggieSat4 will eject the BEVO-2 satellite.  Both satellites then perform cross-linking communications, exchange data, link to GPS, and transmit to ground radio stations.  LONESTAR is used to further develop and refines autonomous navigation, rendezvous and docking software and procedures.  Future NASA missions to destinations such as asteroids and other celestial bodies require the use of autonomous navigation systems.   Cognition:  Peake performed his Flight Day 46 session of the Cognition experiment today.  The Individualized Real-Time Neurocognitive Assessment Toolkit for Space Flight Fatigue (Cognition) investigation is a battery of tests that measure how spaceflight-related physical changes, such as microgravity and lack of sleep, can affect cognitive performance. Cognition includes ten brief computerized tests that cover a wide range of cognitive functions, and provides immediate feedback on current and past test results. The software used allows for real-time measurement of cognitive performance while in space.   Dynamic Surf 3: Peake exchanged the Video Recording Unit (VRU) hard disk drive within JAXA’s Image Processing Unit (IPU) for the Dynamic Surf 3 investigation.  A disk drive filled with data generated from the experiment was replaced with a fresh drive for continued recording.  The Dynamic Surf 3 investigation is part of a series of JAXA experiments designed to provide insight into the underlying principles of Marangoni convection.  These experiments demonstrate in microgravity the flow transition phenomena from steady to oscillatory, chaotic, and finally turbulent.  Observations are made of fluid convection during formation of a silicone oil liquid bridge that is generated by differential heating of two discs within the Fluid Physics Experiment Facility (FPEF). The results of this investigation could ultimately drive the design and development of more efficient fluid flow based systems and devices.   Ras Labs-CASIS-ISS Project for Synthetic Muscle: Resistance to Radiation (Synthetic Muscle):  Peake took a set of historical photos of the synthetic muscle samples.  The purpose of this investigation is to measure the effects of radiation on proprietary synthetic muscle materials in space and earth environments. Robots made of these materials could provide assistance to humans in space, enhance survivability of robots during deep space travel, and provide support in extreme radiation environments on Earth.   Fine Water Mist Portable Fire Extinguishers (PFE) Deployment:  Kopra deployed two Fine Water Mist PFEs today. Once the Fine Water Mist PFEs were stowed in the USOS Portable Emergency Provision (PEP) locations, Kopra attached new instruction cue cards to the exterior of each location. Fine Water Mist PFEs are the preferred type of fire extinguisher for open cabin fire scenarios, but cannot be used behind racks. In the event that a Fine Water Mist PFE is unavailable, a CO2 PFE may still be used.   Orbital ATK (OA)-4 Cargo Operations:  All three USOS Crew will continue transferring Cygnus cargo to ISS today. As of yesterday afternoon, approximately 22 hours remain to be completed.  Cygnus is scheduled to unberth from ISS on February 19th.   ISS Reboost:  ISS performed a reboost this afternoon using the Progress 61P thrusters.  This reboost is the second in a series of reboosts to target the planned conditions for the Soyuz 44 landing on March 2nd, Soyuz 46 four orbit rendezvous on March 19th, and Progress 63 four orbit rendezvous on March 31st. ISS Reboost.   Payload Multiplexer/Demultiplexer (MDM) #2 Loss Of Communications:  Overnight Payload MDM #2 experienced a High Rate Data Link (HRDL) card latch up, which prevented communications with the MDM and ISS Payloads.  Flight Controllers attempted to command a reset of the card twice without success. They then commanded a MDM transition to Payload MDM #1 and have restored communications to ISS Payloads.  Later, Ground teams powercycled Payload MDM #2 in order to recover communications with the unit. The MDM is currently serving as a backup to Payload MDM #1.     Today’s Planned Activities All activities were completed unless otherwise noted. Environmental Health System (EHS) Microbial Capture Device (MCD) – In-flight Microbiology Water analysis and data recording Cygnus Cargo Operations TV conference  with participants of the 10th S.P. Korolev Russian National Youth Readings SYN_MUSCL – Photography CYCLOPS – Big Picture Overview Video Of Greetings Video Footage for Roscosmos Press Service VEG-01 – Plant Photo JEMAL – Slide Table extension CYCLOPS – P/L Installation on JEM Airlock Slide Table Study of cardiovascular system under graded physical load on VELO Pumping brine and urine from EDV-U to Progress 429 (SM Aft) Rodnik H2O Tank and Flushing Connector Operator assistance in study of cardiovascular system under graded physical load on VELO Replacement of СО2 Filter Unit (БФ) ИК0501 (Install No.166 (00068062R, СМ1РО_4_449_1 bag 249-17). Dismantled СО2 Filter Unit 00068061R  – for disposal.  Reflect changes in IMS) Verification of ИП-1 Flow Sensor Position Operator assistance in study of cardiovascular system under graded physical load on VELO Study of Cardiovascular System Under Graded Physical Load on VELO JEMAL – Slide Table Retraction BASSM – Preparation Operations […]

from ISS On-Orbit Status Report http://ift.tt/1nR2Jfp
via IFTTT

Anonymous Is Still Steamed At Conan

Anonymous Is Still Steamed At Conan. January 28, 2016 Share 0 Comments · Share on Reddit.com. It seems like Conan may have ACCIDENTALLY ...

from Google Alert - anonymous http://ift.tt/20uI9iR
via IFTTT

Anonymous

'Anonymous'. Due to continued growth, we are currently looking to expand our successful London electrical services team at our Head Office in W1 ...

from Google Alert - anonymous http://ift.tt/1PHpNK1
via IFTTT

Dan Carter relishing anonymous lifestyle

Dan Carter has hit form at new club Racing 92. The former All Black is enjoying life out of the spotlight.

from Google Alert - anonymous http://ift.tt/1lVxdvg
via IFTTT

An Airglow Fan from Lake to Sky


Why would the sky look like a giant fan? Airglow. The featured intermittent green glow appeared to rise from a lake through the arch of our Milky Way Galaxy, as captured last summer next to Bryce Canyon in Utah, USA. The unusual pattern was created by atmospheric gravity waves, ripples of alternating air pressure that can grow with height as the air thins, in this case about 90 kilometers up. Unlike auroras powered by collisions with energetic charged particles and seen at high latitudes, airglow is due to chemiluminescence, the production of light in a chemical reaction. More typically seen near the horizon, airglow keeps the night sky from ever being completely dark. via NASA http://ift.tt/1lRVIJA

Wednesday, January 27, 2016

Re-reading the Historiographical Purpose and Strategies of the First

In 1116, the burghers of Sahagún (Castile and León, Spain) forced the abbot of the local monastery to confirm a charter blunting the terms of their ...

from Google Alert - anonymous http://ift.tt/1Scz8dq
via IFTTT

Bachelor's thesis on generative probabilistic programming (in Russian language, June 2014). (arXiv:1601.07224v1 [cs.AI])

This Bachelor's thesis, written in Russian, is devoted to a relatively new direction in the field of machine learning and artificial intelligence, namely probabilistic programming. The thesis gives a brief overview to the already existing probabilistic programming languages: Church, Venture, and Anglican. It also describes the results of the first experiments on the automatic induction of probabilistic programs. The thesis was submitted, in June 2014, in partial fulfilment of the requirements for the degree of Bachelor of Science in Mathematics in the Department of Mathematics and Computer Science, Siberian Federal University, Krasnoyarsk, Russia. The work, which is described in this thesis, has been performing in 2012-2014 in the Massachusetts Institute of Technology and in the University of Oxford by the colleagues of the author and by himself.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1ROFLlu
via IFTTT

Font Identification in Historical Documents Using Active Learning. (arXiv:1601.07252v1 [cs.CV])

Identifying the type of font (e.g., Roman, Blackletter) used in historical documents can help optical character recognition (OCR) systems produce more accurate text transcriptions. Towards this end, we present an active-learning strategy that can significantly reduce the number of labeled samples needed to train a font classifier. Our approach extracts image-based features that exploit geometric differences between fonts at the word level, and combines them into a bag-of-word representation for each page in a document. We evaluate six sampling strategies based on uncertainty, dissimilarity and diversity criteria, and test them on a database containing over 3,000 historical documents with Blackletter, Roman and Mixed fonts. Our results show that a combination of uncertainty and diversity achieves the highest predictive accuracy (89% of test cases correctly classified) while requiring only a small fraction of the data (17%) to be labeled. We discuss the implications of this result for mass digitization projects of historical documents.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1npeeds
via IFTTT

Quantum machine learning with glow for episodic tasks and decision games. (arXiv:1601.07358v1 [quant-ph])

We consider a general class of models, where a reinforcement learning (RL) agent learns from cyclic interactions with an external environment via classical signals. Perceptual inputs are encoded as quantum states, which are subsequently transformed by a quantum channel representing the agent's memory, while the outcomes of measurements performed at the channel's output determine the agent's actions. The learning takes place via stepwise modifications of the channel properties. They are described by an update rule that is inspired by the projective simulation (PS) model and equipped with a glow mechanism that allows for a backpropagation of policy changes, analogous to the eligibility traces in RL and edge glow in PS. In this way, the model combines features of PS with the ability for generalization, offered by its physical embodiment as a quantum system. We apply the agent to various setups of an invasion game and a grid world, which serve as elementary model tasks allowing a direct comparison with a basic classical PS agent.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1npenhd
via IFTTT

A First Attempt to Cloud-Based User Verification in Distributed System. (arXiv:1601.07446v1 [cs.NE])

In this paper, the idea of client verification in distributed systems is presented. The proposed solution presents a sample system where client verification through cloud resources using input signature is discussed. For different signatures the proposed method has been examined. Research results are presented and discussed to show potential advantages.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1SkqKXw
via IFTTT

Learning and Tuning Meta-heuristics in Plan Space Planning. (arXiv:1601.07483v1 [cs.AI])

In recent years, the planning community has observed that techniques for learning heuristic functions have yielded improvements in performance. One approach is to use offline learning to learn predictive models from existing heuristics in a domain dependent manner. These learned models are deployed as new heuristic functions. The learned models can in turn be tuned online using a domain independent error correction approach to further enhance their informativeness. The online tuning approach is domain independent but instance specific, and contributes to improved performance for individual instances as planning proceeds. Consequently it is more effective in larger problems.

In this paper, we mention two approaches applicable in Partial Order Causal Link (POCL) Planning that is also known as Plan Space Planning. First, we endeavor to enhance the performance of a POCL planner by giving an algorithm for supervised learning. Second, we then discuss an online error minimization approach in POCL framework to minimize the step-error associated with the offline learned models thus enhancing their informativeness. Our evaluation shows that the learning approaches scale up the performance of the planner over standard benchmarks, specially for larger problems.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1OQx9Hm
via IFTTT

How do you revise your belief set with %$;@*?. (arXiv:1504.05381v3 [cs.AI] UPDATED)

In the classic AGM belief revision theory, beliefs are static and do not change their own shape. For instance, if p is accepted by a rational agent, it will remain p to the agent. But such rarely happens to us. Often, when we accept some information p, what is actually accepted is not the whole p, but only a portion of it; not necessarily because we select the portion but because p must be perceived. Only the perceived p is accepted; and the perception is subject to what we already believe (know). What may, however, happen to the rest of p that initially escaped our attention? In this work we argue that the invisible part is also accepted to the agent, if only unconsciously. Hence some parts of p are accepted as visible, while some other parts as latent, beliefs. The division is not static. As the set of beliefs changes, what were hidden may become visible. We present a perception-based belief theory that incorporates latent beliefs.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1EqbaoL
via IFTTT

Latent Belief Theory and Belief Dependencies: A Solution to the Recovery Problem in the Belief Set Theories. (arXiv:1507.01425v4 [cs.AI] UPDATED)

The AGM recovery postulate says: assume a set of propositions X; assume that it is consistent and that it is closed under logical consequences; remove a belief P from the set minimally, but make sure that the resultant set is again some set of propositions X' which is closed under the logical consequences; now add P again and close the set under the logical consequences; and we should get a set of propositions that contains all the propositions that were in X. This postulate has since met objections; many have observed that it could bear counter-intuitive results. Nevertheless, the attempts that have been made so far to amend it either recovered the postulate in full, had to relinquish the assumption of the logical closure altogether, or else had to introduce fresh controversies of their own. We provide a solution to the recovery paradox in this work. Our theoretical basis is the recently proposed belief theory with latent beliefs (simply the latent belief theory for short). Firstly, through examples, we will illustrate that the vanilla latent belief theory can be made more expressive. We will identify that a latent belief, when it becomes visible, may remain visible only while the beliefs that triggered it into the agent's consciousness are in the agent's belief set. In order that such situations can be also handled, we will enrich the latent belief theory with belief dependencies among attributive beliefs, recording the information as to which belief is supported of its existence by which beliefs. We will show that the enriched latent belief theory does not possess the recovery property. The closure by logical consequences is maintained in the theory, however. Hence it serves as a solution to the open problem in the belief set theories.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1eAmItL
via IFTTT

I have a new follower on Twitter


ACI
Uniting young people and students around the world to eradicate corruption through education, empowerment & global campaigns. RT's & follows ≠ endorsements
International
http://t.co/FmJu1R1XpJ
Following: 4573 - Followers: 6961

January 27, 2016 at 07:34PM via Twitter http://twitter.com/AntiCorruptIntl

[FD] CarolinaCon-12 - March 2016 - FINAL ANNOUNCEMENT

CarolinaCon-12 will be held on March 4th-6th, 2016 in Raleigh NC. For the cheap price of $40 YOU could get a full weekend of talks, hacks, contests, and parties. Regarding the price increase to $40, it was forced due to ever-rising venue costs. But we promise to provide more value via; great talks, great side events, kickass new attendee badges, cool giveaways, etc. We've selected as many presentations as we can fit into the lineup. Here they are, in no particular order: - Mo Money Mo Problems: The Cashout - Benjamin Brown - Breaking Android apps for fun and profit - Bill Sempf - Gettin’ Vishy with it - Owen / Snide- @LinuxBlog - Buffer Overflows for x86, x86_64 and ARM - John F. Davis (Math 400) - Surprise! Everything can kill you. - fort - Advanced Reconnaissance Framework - Solray - Introducing PS>Attack, a portable PowerShell attack toolkit - Jared Haight - Reverse Engineer iOS apps because reasons - twinlol - FLOSS every day – automatically extracting obfuscated strings from malware - Moritz Raabe and William Ballenthin - John the Ripper sits in the next cubicle: Cracking passwords in a Corporate environment - Steve Passino - Dynamic Analysis with Windows Performance Toolkit - DeBuG (John deGruyter) - Deploying a Shadow Threat Intel Capability: Understanding YOUR Adversaries without Expensive Security Tools - grecs - AR Hacking: How to turn One Gun Into Five Guns - Deviant Ollam - Reporting for Hackers - Jon Molesa @th3mojo - Never Go Full Spectrum - Cyber Randy - I Am The Liquor - Jim Lahey CarolinaCon-12 Contests/Challenges/Events: - Capture The Flag - Crypto Challenge - Lockpicking Village - Hardware Hack-Shop - Hacker Trivia - Unofficial CC Shootout LODGING: If you're traveling and wish to stay at the Con hotel here is the direct link to the CarolinaCon discount group rate: http://ift.tt/20oXphs NOTE: The website defaults to March 3rd-6th instead of March 4th-6th and the group rate is no longer available on March 3rd. So make sure that you change the reservation dates to get the group rate. ATTENTION: The discount group rate on Hilton hotel rooms expires THIS weekend on JANUARY 31st 2016, so act quickly if you plan on staying at the hotel for all of the weekend fun and you want the group rate. CarolinaCon formal proceedings/talks will run; - 7pm to 11pm on Friday - 10am to 9pm on Saturday - 10am to 4pm on Sunday For presentation abstracts, speaker bios, the final schedule, side event information, and all the other exciting details (as they develop and as our webmaster gets to them) stay tuned to: http://ift.tt/VcphB8 ADVERTISERS / VENDORS / SPONSORS: There are no advertisers, vendors, or sponsors allowed at CarolinaCon....ever. Please don't waste your time or ours in asking. CarolinaCon has been Rated "M" for Mature. Peace, Vic

Source: Gmail -> IFTTT-> Blogger

[FD] HCA0005 - Liberty Global - Horizon HD STB - predictable WiFi passphrase

------------------------------------------------------------------------

Source: Gmail -> IFTTT-> Blogger

[FD] Multiple security issues in MOVEit Managed File Transfer application

During a security investigation multiple security issues have been discovered in the MOVEit File Transfer web- and mobile application from Ipswitch, Inc. * CVE-2015-7675: Unauthorized access to arbitrary files and documents http://ift.tt/1PFpRKa * CVE-2015-7676: Insecure default configuration (Persistant XSS) http://ift.tt/1KFWTT2 * CVE-2015-7677: Enumeration of existing FileIDs http://ift.tt/1PFpRKc * CVE-2015-7678: CSRF http://ift.tt/1KFWVKL * CVE-2015-7679: Reflected XSS http://ift.tt/1PFpRKf * CVE-2015-7680: Enumeration of existing usernames http://ift.tt/1KFWW0Z

Source: Gmail -> IFTTT-> Blogger

[FD] [ERPSCAN-15-024] SAP HANA hdbindexserver - Memory corruption

[ERPSCAN-15-024] SAP HANA hdbindexserver - Memory corruption Application: SAP HANA Versions Affected: SAP HANA 1.00.095 Vendor URL: http://SAP.com Bugs: Memory corruption, RCE Reported: 17.07.2015 Vendor response: 18.07.2015 Date of Public Advisory: 13.10.2015 Reference: SAP Security Note 2197428 Author: Mathieu Geli (ERPScan) Description 1. ADVISORY INFORMATION Title: SAP HANA 1.00.095 Advisory ID: [ERPSCAN-15-024] Risk: Hight Advisory URL: http://ift.tt/1KSZkQN Date published: 13.10.2015 Vendors contacted: SAP 2. VULNERABILITY INFORMATION Class: Memory corruption, RCE Impact: full system compromise Remotely Exploitable: Yes Locally Exploitable: No CVE Name: CVE-2015-7986 CVSS Information CVSS Base Score: 9.3 / 10 CVSS Base Vector: AV : Access Vector (Related exploit range) Network (N) AC : Access Complexity (Required attack complexity) Medium (M) Au : Authentication (Level of authentication needed to exploit) None (N) C : Impact to Confidentiality Complete (C) I : Impact to Integrity Complete (C) A : Impact to Availability Complete (C) 3. VULNERABILITY DESCRIPTION A buffer overflow vulnerability exists in SAP HANA interface. If an attacker has a network access to the SQL interface or the SAP HANA Extended Application Services interface of an SAP HANA system, the vulnerability enables the attacker to inject code into the working memory that is subsequently executed by the application. It can also be used to cause a general fault in the product causing the product to terminate. Proof of concept This authentication request should be replayed 10 times. curl -v -XPOST http://hana:8000/sap/hana/xs/formLogin/login.xscfunc -H 'Content-type: application/x-www-form-urlencoded; charset=UTF-8' -H 'X-csrf-token: unsafe' -d 'xs-username=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA' 4. VULNERABLE PACKAGES SAP HANA 1.00.095.00 Other versions are probably affected too, but they were not checked. 5. SOLUTIONS AND WORKAROUNDS To correct this vulnerability, install SAP Security Note 2197428 6. AUTHOR Mathieu Geli (ERPScan) 7. TECHNICAL DESCRIPTION An anonymous attacker can use a special HTTP request to corrupt SAP HANA index server memory. 8. REPORT TIMELINE Send: 17.07.2015 Reported: 17.07.2015 Vendor response: 18.07.2015 Date of Public Advisory: 13.10.2015 9. REFERENCES http://ift.tt/1KSZkQN 10. ABOUT ERPScan Research The company’s expertise is based on the research subdivision of ERPScan, which is engaged in vulnerability research and analysis of critical enterprise applications. It has achieved multiple acknowledgments from the largest software vendors like SAP, Oracle, Microsoft, IBM, VMware, HP for discovering more than 400 vulnerabilities in their solutions (200 of them just in SAP!). ERPScan researchers are proud to have exposed new types of vulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be nominated for the best server-side vulnerability at BlackHat 2013. ERPScan experts have been invited to speak, present, and train at 60+ prime international security conferences in 25+ countries across the continents. These include BlackHat, RSA, HITB, and private SAP trainings in several Fortune 2000 companies. ERPScan researchers lead the project EAS-SEC, which is focused on enterprise application security research and awareness. They have published 3 exhaustive annual award-winning surveys about SAP security. ERPScan experts have been interviewed by leading media resources and featured in specialized info-sec publications worldwide. These include Reuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading, Heise, and Chinabyte, to name a few. We have highly qualified experts in staff with experience in many different fields of security, from web applications and mobile/embedded to reverse engineering and ICS/SCADA systems, accumulating their experience to conduct the best SAP security research. 11. ABOUT ERPScan ERPScan is the most respected and credible Business Application Security provider. Founded in 2010, the company operates globally and enables large Oil and Gas, Financial and Retail organizations to secure their mission-critical processes. Named as an ‘Emerging Vendor’ in Security by CRN, listed among “TOP 100 SAP Solution providers” and distinguished by 30+ other awards, ERPScan is the leading SAP SE partner in discovering and resolving security vulnerabilities. ERPScan consultants work with SAP SE in Walldorf to assist in improving the security of their latest solutions. ERPScan’s primary mission is to close the gap between technical and business security, and provide solutions to evaluate and secure SAP and Oracle ERP systems and business-critical applications from both, cyber-attacks as well as internal fraud. Usually our clients are large enterprises, Fortune 2000 companies and managed service providers whose requirements are to actively monitor and manage security of vast SAP landscapes on a global scale. We ‘follow the sun’ and function in two hubs, located in the Palo Alto and Amsterdam to provide threat intelligence services, agile support and operate local offices and partner network spanning 20+ countries around the globe. Adress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301 Phone: 650.798.5255 Twitter: @erpscan Scoop-it: Business Application Security

Source: Gmail -> IFTTT-> Blogger

[FD] Recon 2016 Call For Papers - June 17 - 19, 2016 - Montreal, Canada

\ + -6)) + + \ + + + + + ▀▄ ▄▀ ▄█▀███▀█▄ █▀███████▀█ █ █▀▀▀▀▀█ █ . - ., _ ▀▀ ▀▀ __\u/__ ' ' ## + ## ## \ / - + - ,__. _=. .:. ! /5\ _|=='|_ ||::| | | _|. !,'', | | | | |'| \ _^_ / _-_|||::| |==|_ .| | __,- |.T.|.;"!\| |:. | | /_|_\ | :|||: | | |c :|.:|_|. :__ |.: |--|==| | .| | ~ ((O)) ~ | =4||:.| __|. | |_7. | |.|...|

Source: Gmail -> IFTTT-> Blogger

[FD] McAfee File Lock Driver - Kernel Stack Based BOF

* CVE: CVE-2015-8773 * Vendor: McAfee - Intel Security * Reported by: Kyriakos Economou * Date of Release: 26/01/2016 * Date of Fix: N/A * Affected Products: Multiple * Affected Version: McPvDrv.sys v4.6.111.0 * Fixed Version: N/A Description: McAfee File Lock Driver does not handle correctly GUIDs of the encrypted vaults, which allows to crash the host by crafting a specific IOCTL with a malformed Vault GUID which is used to identify an object of FILE_DEVICE_DISK DeviceType, causing a kernel stack based buffer overflow. We have verified this issue in the lastest McAfee File Lock v5.x which ships with McAfee total protection suite. However, other products that include this package will also be affected. Vulnerable module: McPvDrv.sys v4.6.111.0 Earlier versions of this kernel driver are probably affected by the same issue. Impact: The return address is protected by a security cookie, so exploiting this issue further than crashing the host doesn't seem to be possible. Technical Details: GUID example: 867ba474 34 00 65 00 39 00 38 00 37 00 66 00 61 00 34 00 2d 00 39 00 66 00 38 00 4.e.9.8.7.f.a.4.-.9.f.8. 867ba48c 33 00 2d 00 34 00 30 00 61 00 64 00 2d 00 61 00 61 00 31 00 66 00 2d 00 3.-.4.0.a.d.-.a.a.1.f.-. 867ba4a4 62 00 35 00 33 00 65 00 61 00 35 00 64 00 63 00 00 00 00 00 00 00 00 00 b.5.3.e.a.5.d.c........ Parsing GUID: 95e77094 8b4d08 mov ecx,dword ptr [ebp+8] <-- Pointer to Vault's GUID (unicode) 95e77097 0fb701 movzx eax,word ptr [ecx] <-- start reading GUID 95e7709a 83c40c add esp,0Ch 95e7709d 6685c0 test ax,ax 95e770a0 7426 je McPvDrv+0x30c8 (95e770c8) 95e770a2 0fb7c0 movzx eax,ax 95e770a5 8d957cffffff lea edx,[ebp-84h]

Source: Gmail -> IFTTT-> Blogger

[FD] McAfee File Lock Driver - Kernel Memory Leak

[FD] McAfee File Lock Driver - Kernel Memory Leak

[FD] HCA0005 - Liberty Global - Horizon HD STB - predictable WiFi

------------------------------------------------------------------------

Source: Gmail -> IFTTT-> Blogger

[FD] SAP Hana Cloud 4 XSS

Greetings Upon communication with the SAP team, i was told to send over the advisory to you. Please read and revert

Source: Gmail -> IFTTT-> Blogger

[FD] Authentication bypass in PHP File Manager 0.9.8

PHP File Manager 0.9.8 (http://ift.tt/1CoQpSE) is vulnerable to authentication bypass due to insecure implementation of register globals emulation. An attacker is able to override the blockKeys array and thus build a valid session and access all the protected functionality (including execution of shell commands) without actual knowledge of the password set. PoC URLs: http://host/phpfm.php?blockKeys[]=&fm_self=FOOO&loggedon=d41d8cd98f00b204e9800998ecf8427e&action=5 http://host/phpfm.php?blockKeys[]=&fm_self=FOOO&loggedon=d41d8cd98f00b204e9800998ecf8427e&action=6&cmd=ls%20-la Timeline: 2016-01-04: Original report to the developer 2016-01-04: CVE ID requested from MITRE 2016-01-11: Report resent to the developer 2016-01-18: Notification sent to the developer about disclosing the vulnerability on 25th of January 2016-01-18: Disclosure Imre Rad Search-Lab Ltd. http://ift.tt/23u5fZr http://www.scademy.com/

Source: Gmail -> IFTTT-> Blogger

[FD] PHP LiteSpeed SAPI out of boundaries read due to missing input validation

The LiteSpeed SAPI module in PHP did not sanitize several fields of the LSAPI request correctly. In the source file sapi/litespeed/lsapilib.c, the parseRequest function calculated addresses of thesevariables in the following way: pReq->m_pScriptFile = pReq->m_pReqBuf + pReq->m_pHeader->m_scriptFileOff; pReq->m_pScriptName = pReq->m_pReqBuf + pReq->m_pHeader->m_scriptNameOff; pReq->m_pQueryString = pReq->m_pReqBuf + pReq->m_pHeader->m_queryStringOff; pReq->m_pRequestMethod = pReq->m_pReqBuf + pReq->m_pHeader->m_requestMethodOff; These variables were then exported, so they become available in PHP code through the $_SERVER array. These offset fields (eg. m_scriptFileOff) of the header were not validated at all, so a segmentation fault occured in the SAPI process after it received an invalid value. Access to the SAPI socket is a prerequisite of the attack. The fix is available with the commit: http://ift.tt/1QtdOMZ The fixed versions of PHP are: 5.5.31, 5.6.17 and 7.0.2. Imre Rad Search-Lab Ltd. http://ift.tt/23u5fZr http://www.scademy.com/

Source: Gmail -> IFTTT-> Blogger

[FD] PHP LiteSpeed SAPI secret key improper disposal

In suEXEC_Daemon mode of the LiteSpeed web server spawns one PHP master process during startup. It is running as root and accepts LSAPI requests, which in turn specify what user under the script should run. The LSAPI request is authenticated with a MAC, which is based on preshared random key between the the PHP and the web server. We found, the Litespeed PHP SAPI module did not clear this secret in its child processes so it was available in the PHP process memory space of the child processes. The fix is available with the commit http://ift.tt/1Urdm2Z The fixed versions of PHP are: 5.5.31, 5.6.17 and 7.0.2. More information: http://ift.tt/1lTvPcw Imre Rad Search-Lab Ltd. http://ift.tt/23u5fZr http://www.scademy.com/

Source: Gmail -> IFTTT-> Blogger

[FD] PHP-FPM fpm_log.c memory leak and buffer overflow

The FastCGI Process Manager (FPM) SAPI of PHP was vulnerable to memory leak and buffer overflow in the access logging feature. PHP-FPM offers customization of the access log lines based on format string variables which can be specified with the access.format option of the FPM configuration file. The log lines were compiled in php-fpm.c. The %{something}e fields were processed at line 237: len2 = snprintf(b, FPM_LOG_BUFFER - len, "%s", env ? env : "-"); ... len += len2; ... if (!test && strlen(buffer) > 0) { buffer[len] = '\n'; write(fpm_log_fd, buffer, len + 1); } In case the string being appended to the access log line buffer was longer than the remaining space, the len variable became longer than the buffer (FPM_LOG_BUFFER) size, because snprintf returns the number of characters (excluding the terminating null byte) which would have been written to the final string if enough space had been available. Then the PHP engine performed an out-of-boundaries read and also wrote a \n character outside of the allocated memory. The fix is available with the commit http://ift.tt/23u5fZp The fixed versions of PHP are: 5.5.31, 5.6.17 and 7.0.2. More information: http://ift.tt/1lTvPcw Imre Rad Search-Lab Ltd. http://ift.tt/23u5fZr http://www.scademy.com/

Source: Gmail -> IFTTT-> Blogger