Latest YouTube Video

Saturday, July 1, 2017

Live|Tv|; Manny Pacquiao vs Jeff Horn 2017 Live..Free..

Live|T.v|; Manny Pacquiao vs Jeff Horn 2017 Live..Free.. Posted by Anonymous 5sc on July 01, 2017. on-----and-----what-----are-----the-----odds?

from Google Alert - anonymous http://ift.tt/2seioYS
via IFTTT

Fox[live] Manny Pacquiao vs Jeff Horn LIVE Boxing stream 2017

... Jeff Horn LIVE Boxing stream 2017. Fox[live] Manny Pacquiao vs Jeff Horn LIVE Boxing stream 2017. Posted by Anonymous 5sc on July 01, 2017.

from Google Alert - anonymous http://ift.tt/2tDmjme
via IFTTT

Anonymous donor will partially match donations for Salvation Army soup kitchen

Anonymous donor will partially match donations for Salvation Army soup ... soup kitchen will be matched to the tune of $1 by an anonymous donor.

from Google Alert - anonymous http://ift.tt/2t4jtVZ
via IFTTT

Anonymous 3

... iPhone app! Get the App. Continue to Allihoopa. Anonymous 3. Build on this. Share. Facebook · Twitter · Google Plus · Tumblr · Email. Embed code.

from Google Alert - anonymous http://ift.tt/2t43uau
via IFTTT

Kepler

Embed: Artists Anonymous. Release. $21.99. Length 9:30; Released 2017-07-01; BPM 128; Key D min; Genre Deep House; Label Techno LogyX.

from Google Alert - anonymous http://ift.tt/2twvp3X
via IFTTT

Assistant Manager job with Anonymous | 1406618

Assistant Manager in with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2uvQ0lL
via IFTTT

I have a new follower on Twitter


Mark Krake
Co-founder, perpetual innovator & continuous community worker @metasfresh #opensource #ERP. #freesoftware, Open Source and #UX enthusiast.
Bonn, Deutschland
https://t.co/svNErnohSW
Following: 12332 - Followers: 13400

July 01, 2017 at 09:51AM via Twitter http://twitter.com/markkrake

WordPress Plugin Used by 300,000+ Sites Found Vulnerable to SQL Injection Attack

A SQL Injection vulnerability has been discovered in one of the most popular Wordpress plugins, installed on over 300,000 websites, which could be exploited by hackers to steal databases and possibly hijack the affected sites remotely. The flaw has been discovered in the highly popular WP Statistics plugin, which allows site administrators to get detailed information related to the number of


from The Hacker News http://ift.tt/2taZxiJ
via IFTTT

[LIVE.TV]..NBA Free Agency Special Live Free NBA Game

This summary is not available. Please click here to view the post.

[Free(Live)]..All Blacks vs Lions 2017 Live Streaming National Rugby

posted by Anonymous | 5sc. July 01, 2017. British & Irish Lions vs New Zealand Live Stream - TOTAL SPORTEK 23 hours ago - British & Irish Lions ...

from Google Alert - anonymous http://ift.tt/2tuHlmI
via IFTTT

3D Lava Falls of Mars


Get out your red/cyan glasses and gaze across lava falls of Mars. The stereo anaglyph was created by combining two images recorded by the HiRISE camera onboard Mars Reconnaissance Orbiter. The multi-level falls were created as flowing lava breached sections of the northern rim of a 30-kilometer diameter martian crater, located in the western part of the Red Planet's volcanic Tharsis region. As the molten lava cascaded down the crater wall and terraces to reach the crater floor it left the distinctly rough, fan-shaped flows on the steeper slopes. North is up and the breathtaking 3D view is 5 kilometers wide. via NASA http://ift.tt/2upJIny

Friday, June 30, 2017

Oscar Negrete vs Sergio Frias Live Stream

Posted by Anonymous 5sc on June 30, 2017. [PDF]Live*(((Online)))*Oscar-----Negrete-----vs-----Sergio-----Frias-----Live-----Stream-----.

from Google Alert - anonymous http://ift.tt/2uttOsD
via IFTTT

Join The Conversation

Easter vs Shafikov Live Boxing 2017. (L.i.v.e-F.r.e.e)!@!//~Easter vs Shafikov Live Boxing 2017. Posted by Anonymous 5sc on June 30, 2017.

from Google Alert - anonymous http://ift.tt/2tvrRi0
via IFTTT

[FD] ESA-2017-063: RSA Archer® GRC Platform Multiple Vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] Schneider Electric Pro-Face WinGP – Runtime.exe – Insecure Library Loading Allows Code Execution

[ICS] Schneider Electric Pro-Face WinGP – Runtime.exe – Insecure Library Loading Allows Code Execution Vendor: Schneider Electric Equipment: Pro-Face WinGP Vulnerability: Uncontrolled Search Path Element (DLL side-loading) Advisory URL: http://ift.tt/2saxKOh

Source: Gmail -> IFTTT-> Blogger

[FD] Microsoft Dynamic CRM 2016 - Cross-Site Scripting vulnerability

[Fox~Live] Shafikov vs Easter Live Stream June, 30, 2017

[Live] Shafikov vs Easter Live Stream - The Center at Foresight Wtach Here Live Now http://ift.tt/2tvinDm.

from Google Alert - anonymous http://ift.tt/2uts1Uk
via IFTTT

Orioles place P Stefan Crichton (right shoulder strain) on 10-day DL, recall P Miguel Castro (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

COPIRG Applauds Introduction of Bill to End Anonymous Shell Companies

This Wednesday, Representatives Peter King (R-NY) and Carolyn Maloney (D-NY) introduced the Corporate Transparency Act (H.R. 3089). Senators ...

from Google Alert - anonymous http://ift.tt/2t9VNOB
via IFTTT

[FD] Humax Digital HG100R multiple vulnerabilities

Humax Digital HG100R multiple vulnerabilities Device: Humax HG100R Software Version: VER 2.0.6 - Backup file download (CVE-2017-7315) An issue was discovered on Humax Digital HG100R 2.0.6 devices, a modem commonly used by ISPs to provide ADSL internet service to household and small business users. (CHECA ESSA INFO) To download the backup file it's not required the use of credentials or any authentication, and the router credentials are stored in plaintext inside the backup. PoC wget http://ift.tt/2svtxnv strings GatewaySettings.bin | grep -A 1 admin

Source: Gmail -> IFTTT-> Blogger

Wikileaks Reveals CIA Malware that Hacks Linux Computers

WikiLeaks has just published a new batch of the ongoing Vault 7 leak, this time detailing an alleged CIA project that allowed the agency to hack and remotely spy on computers running the Linux operating systems. Dubbed OutlawCountry, the project allows the CIA hackers to redirect all outbound network traffic on the targeted computer to CIA controlled computer systems for exfiltrate and


from The Hacker News http://ift.tt/2usy2AD
via IFTTT

Ravens: TE Darren Waller suspended at least one year for violating NFL's substance abuse policy (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

InspiroBot, Potter House Quiz, Travel Ban, Cosby Tour, Anonymous vs. Nasa, Google Fine, 1984 ...

INTRO: 0:25 InspiroBot.me Harry Potter House Quiz Bevs Like These HEADLINES: 7:25 Travel Ban Reinstated Cosby Tour Anonymous/NASA Google ...

from Google Alert - anonymous http://ift.tt/2sZU4gj
via IFTTT

Obnoxious and Anonymous: Restore Streaming Privileges

Please review the wrongful ban on live streaming on the Obnoxious and Anonymous channel. There is absolutely no inappropriate...

from Google Alert - anonymous http://ift.tt/2sZvcp1
via IFTTT

Flix Anonymous - Episode 32

Trev and Steve are excited about the new film by director Edgar Wright called Baby Driver. They give you the goods on Despicable Me 3 and react to ...

from Google Alert - anonymous http://ift.tt/2tsuC3S
via IFTTT

ISS Daily Summary Report – 6/29/2017

Extremophiles:  In preparation for Session C of the Extremophiles investigation the crew wiped designated surfaces in Node 1, Node 3 and the Cupola with sterile wet wipes and placed them into a Biolab Thermal Control Unit.  Archaea and extremophilic bacteria have not been considered as significant contributors to the microbiome on the ISS. The Extremophiles experiment will add critical knowledge about the microbial diversity on the ISS.  The experiment will Isolate and characterize archaea and extremophilic bacteria by sampling selected locations inside the Station.  Changes in archaea and extremophilic bacteria over a period of at least 3 months will be assessed.  The population of archaea and extremophilic bacteria on the ISS will be compared with that of spacecraft clean rooms and visiting vehicles. Rodent Research-5 (RR-5) Systemic Therapy of NELL-1 for Osteoporosis: The crew reviewed material on live animal return operations and discussed those operations with the Payload Developer. They then set up the Animal Transporter for return of 10 RR-5 mice on SpX-11, powered up the Transporter, installed food bars and activated water lixits.  Because spaceflight has significant and rapid effects on the musculoskeletal system, it is important to investigate targeted therapies that could ameliorate some of the detrimental effects of spaceflight. The NELL-1 drug being studied in the RR-5 investigation has the potential to slow or reverse bone loss during spaceflight.  NanoRacks Module-52:  The crew performed a status check of subexperiments inside NanoRacks Module-52.  Photographs and video were taken of the petri dishes.  NanoRacks Module-52 is a collection of 6 student-led biological experiments photo-documenting the life-cycle of various molds and bacteria on petri plates in microgravity.  NanoRacks Module-48:  The crew took photos for the NanoRacks Module-48 investigation for downlink to the ground.  NanoRacks Module-48 connects students on Earth to the space program by sending their photographs and messages to the ISS along with plant seeds that are germinated after being returned to Earth. The investigation increases awareness of humans’ ability to access space, spurring interest in the space program and encouraging students to pursue careers in science, technology, engineering, and math. On Board Training (OBT) Dragon Robotics On Board Trainer (RoBOT): In preparation for SpX-11 unberth and release currently planned for Sunday, July 2, the crew completed this 70-minute training session during which they practiced 2 Dragon release runs. They also reviewed departure monitoring and procedures to prevent loss of/recovery of attitude control in the event of a loss of comm with ground teams during free-flyer release.  SpaceX (SpX)-11 Cargo Operations: The crew completed approximately 57 hours of cargo operations with approximately 5 hours of packing remaining. SpX-11 is scheduled to unberth on July 2nd, 2017.  Today’s Planned Activities All activities were completed unless otherwise noted. Health Maintenance System (HMS) Periodic Health Status (PHS) Evaluation Setup JEM Airlock Depressurization Health Maintenance System (HMS) Periodic Health Status (PHS) Evaluation Health Maintenance System (HMS) Periodic Health Status (PHS) Stow Hardware NanoRacks Module-52 Status R&R of Onboard Heating Unit (БПО) (1 ea.) in Vozdukh NanoRacks Module-48 Imagery R&R of Condensate Water Processor [СРВ-К2М] Hoses Extremophiles Session C JEM Camera Robot Cable Swap Extremophiles Photo Shooting Formaldehyde Monitoring Kit (FMK) Stow Operation Rodent Research 5 ARS Review Rodent Research 5 Live Animal Return Review Rodent Research Crew Conference Rodent Research 5 Transporter Setup JEM Airlock Vent Crew Medical Officer (CMO) Proficiency Training CO Partial Pressure Measurement at the Central Post using USOS CSA-CP Gas Analyzer ROBoT Software Startup JEM Airlock Vent Confirmation MSPR Combustion Chamber (CC) Valve 2 Operation [Aborted] On-board Training (OBT) Dragon Departure Review Cargo Transfer from 67P (SM Aft). IMS Update On-board Training (OBT) Dragon Robotics Onboard Trainer (ROBoT) Release Combustion Integrated Rack Alignment Guide Install Completed Task List Items Genes in Space Biomolecule Sequencer Stop Ground Activities All activities were completed unless otherwise noted. Rodent Research Transporter setup JEMAL depress/vent monitoring OBT – Dragon RoBOT Release Three-Day Look Ahead: Friday, 06/30: NanoRacks Module 9 ops, POLAR transfer to Dragon, StemCell media change Saturday, 07/01: Crew off duty, housekeeping Sunday, 07/02: SpX-11 unberth QUICK ISS Status – Environmental Control Group:   Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off           [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Process Trace Contaminant Control System (TCCS) Lab Full up Trace Contaminant Control System (TCCS) Node 3 Off  

from ISS On-Orbit Status Report http://ift.tt/2u6iOlm
via IFTTT

[FD] SEC Consult SA-20170630-0 :: Multiple critical vulnerabilities in OSCI-Transport library 1.2 for German e-Government

We have published an accompanying blog post to this technical advisory with further information: German version with less technical details as an overview: http://ift.tt/2tsPaJc English version containing more detailed attack scenario descriptions: http://ift.tt/2uqz8N6 SEC Consult Vulnerability Lab Security Advisory < 20170630-0 > ======================================================================= title: Multiple critical vulnerabilities product: OSCI-Transport library 1.2 for German e-Government vulnerable version: 1.6.1 fixed version: 1.7.1 CVE number: CVE-2017-10668 (Padding Oracle) CVE-2017-10669 (Signature Wrapping) CVE-2017-10670 (XXE) impact: Critical homepage: http://www.xoev.de found: 01/2017 by: Wolfgang Ettlinger (Office Vienna) Marc Nimmerrichter (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich http://ift.tt/1mGHMNR ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

Windows 10 to Get Built-in Protection Against Most Ransomware Attacks

Ransomware Ransomware Everywhere Not a Single Place to Hide! But, Microsoft has a simple solution to this problem to protect millions of its users against most ransomware attacks. Two massive ransomware attacks — WannaCry and Petya (also known as NotPetya) — in a month have caused chaos and disruption worldwide, forcing hospitals, ATMs, shipping companies, governments, airports and car


from The Hacker News http://ift.tt/2sojVzP
via IFTTT

NGC 7814: The Little Sombrero in Pegasus


Point your telescope toward the high flying constellation Pegasus and you can find this expanse of Milky Way stars and distant galaxies. Dominated by NGC 7814, the pretty field of view would almost be covered by a full moon. NGC 7814 is sometimes called the Little Sombrero for its resemblance to the brighter more famous M104, the Sombrero Galaxy. Both Sombrero and Little Sombrero are spiral galaxies seen edge-on, and both have extensive halos and central bulges cut by a thin disk with thinner dust lanes in silhouette. In fact, NGC 7814 is some 40 million light-years away and an estimated 60,000 light-years across. That actually makes the Little Sombrero about the same physical size as its better known namesake, appearing smaller and fainter only because it is farther away. Very faint dwarf galaxies, potentially a satellites of NGC 7814, have been discovered in deep exposures of Little Sombrero. via NASA http://ift.tt/2tn1Cun

Thursday, June 29, 2017

Orioles Video: Ubaldo Jimenez strikes out eight Blue Jays over eight scoreless innings in 2-0 win (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

agrafix/superrecord

Haskell: Supercharged anonymous records. Contribute to superrecord development by creating an account on GitHub.

from Google Alert - anonymous http://ift.tt/2tvPkk3
via IFTTT

Orioles Video: Caleb Joseph lines RBI single to right-center during 2-0 victory over Blue Jays (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Please help! Webform wont send anonymous messages!

It works fine when I am logged in with Administrator privilege, however when sending anonymously the message is not being sent. Thankfully they are ...

from Google Alert - anonymous http://ift.tt/2tqwvOI
via IFTTT

Ravens conflicted on whether to bring back LB Zach Orr, agent tells 105.7 The Fan (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Access denied for user anonymous with X-CSRF-Token and Cookie

Hi, I'm trying with no success to update users with Services 7.x-3.19 and Drupal 7.56. I can login, logout and register but I can't get user information or ...

from Google Alert - anonymous http://ift.tt/2tucirF
via IFTTT

Orioles Interview: Trey Mancini reflects on rookie season, favorite ballparks and first MLB at-bat; listen now in ESPN App (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Not just a privacy threat.

Not just a privacy threat. Also inviting a new style 'add me' snap – i've seen several appear across the world. But things will settle down and the good ...

from Google Alert - anonymous http://ift.tt/2s5vEiE
via IFTTT

ISS Daily Summary Report – 6/28/2017

Rodent Research-5 (RR-5) Systemic Therapy of NELL-1 for Osteoporosis: The two animal habitats that will remain on ISS following SpX-11 departure were cleaned and restocked with new food bars.  Because spaceflight has significant and rapid effects on the musculoskeletal system it is important to investigate targeted therapies that could ameliorate some of the detrimental effects of spaceflight. The NELL-1 drug being studied in the RR-5 investigation has the potential to slow or reverse bone loss during spaceflight. Electrostatic Levitation Furnace (ELF):  The crew exchanged sample holders in the ELF. They also removed samples that had been lost in the Holder Cartridge to prevent interference with the subsequent experiment.  The ELF is an experimental facility designed to levitate, melt and solidify materials by containerless processing techniques using the Electrostatic Levitation method. With this facility, thermophysical properties of high temperature melts can be measured and solidification from deeply undercooled melts can be achieved.  Food Acceptability:  The crew reviewed reference material and completed a Food Acceptability questionnaire. This investigation hopes to determine the impact of repeat consumption on food acceptability on ISS within the current closed-variety spaceflight food system. Results will be used in developing strategies to improve food system composition to support crew health and performance on long duration missions. Portable Emergency Provisions (PEPs) Inspection: The crew completed this regularly scheduled maintenance to verify that Portable Fire Extinguishers (PFE), Extension Hose Tee Kits (EHTK), Portable Breathing Apparatuses (PBA) and pre-breathe masks are free of damage to ensure functionality.  Mobile Servicing System (MSS) Operations: Yesterday evening, Robotics Ground Controllers maneuvered the Space Station Remote Manipulator System (SSRMS) and Special Purpose Dexterous Manipulator (SPDM) Arm1 to stow the Roll Out Solar Array (ROSA) Flight Releasable Attachment Mechanism (FRAM) in Dragon Trunk Site 2.  SPDM Arm1 then released the ROSA FRAM Micro-Square Fixture (MSF) and the SSRMS lifted the SPDM out of the Dragon Trunk and maneuvered it to a park position.   Today’s Planned Activities All activities were completed unless otherwise noted. Controlling and Charging of Soyuz 735 Samsung Tablets Greetings Video Recording Test Video Recording for Russia Today TV Channel Preparation of Reports for Roscosmos Web Site and Social Media РСПИ. File Deletion from Onboard Memory Device (БЗУ) URAGAN. Observation and Photography ECON-M. Observation and Photography Combustion Integrated Rack Alignment Guide Removal ORLAN-MK #6 Leg Shell Replacement XF305 Camcorder Setup Electrostatic Levitation Furnace(ELF) sample Cartridge Retrieval Portable Emergency Provisions (PEPS) Inspection Electrostatic Levitation Furnace(ELF) Sample Holder Exchange Electrostatic Levitation Furnace(ELF) Sample Removal ORLAN-MK #6 Leak Check Hardware Restow Electrostatic Levitation Furnace(ELF) sample Cartridge Installation Cleaning of FGB Central Fan ЦВ1 Screens O2 Repress from Section 2 of Progress 435 (DC1) Oxygen Supply Facility (СРПК) – start Polar Sample Transfer From MELFI ISS O2 Repress from Section 2 of Progress 435 (DC1) Oxygen Supply Facility (СРПК) – end Monitoring of ИП-1 Sensors Installation Switch of БКС Х322/10 on CA325 Monounits of the First and Second REGUL-OS Radio Control and Communication System Food Acceptability Reference Material Review Cargo Transfer to Dragon Food Acceptability Questionnaire – Subject Rodent Research Node 2 Camcorder Video Setup Rodent Research Habitat 1-4 Restock Completed Task List Items Genes in Space MWA Preparation Genes in Space with Biomolecule Sequencer Hardware Gather Genes in Space MELFI Retrieve Genes in Space with Biomolecule Sequencer Proof on Concept Initialization Ground Activities All activities were completed unless otherwise noted. POLAR/MELFI transfer to Dragon Rodent Research habitat restock T2 ground power cycle Three-Day Look Ahead: Thursday, 06/29: NanoRacks Module 48 ops, Rodent Research, Dragon departure OBT Friday, 06/30: NanoRacks Module 9 ops, POLAR transfer to Dragon, StemCell media change Saturday, 07/01: Rodent habitat stow, POLAR/DCB transfer to Dragon, Dragon egress, N2 CPA install QUICK ISS Status – Environmental Control Group:   Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off           [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Process Trace Contaminant Control System (TCCS) Lab Full up Trace Contaminant Control System (TCCS) Node 3 Off  

from ISS On-Orbit Status Report http://ift.tt/2unskQt
via IFTTT

Original Author of Petya Ransomware is Back & He Wants to Help NotPetya Victims

The author of original Petya ransomware is back. After a long 6 months of silence, the author of now infamous Petya ransomware appeared on Twitter today to help victims unlock their files encrypted by a new version of Petya, also known as NotPetya. "We're back having a look in NotPetya," tweeted Janus, a name Petya creator previously chose for himself from a James Bond villain. "Maybe it's


from The Hacker News http://ift.tt/2sVkUGl
via IFTTT

[InsideNothing] leroyjhunt liked your post "[FD] [ERPSCAN-16-036] SAP ASE ODATA SERVER - DENIAL OF SERVICE"



Source: Gmail -> IFTTT-> Blogger

Telegram Agrees to Register With Russia to Avoid Ban, But Won't Share User Data

After being threatened with a ban in Russia, end-to-end encrypted Telegram messaging app has finally agreed to register with new Russian Data Protection Laws, but its founder has assured that the company will not comply to share users' confidential data at any cost. Russia's communications watchdog Roskomnadzor had recently threatened to block Telegram if the service did not hand over


from The Hacker News http://ift.tt/2tsdZG7
via IFTTT

Anonymous John

53243321112 2322454524596653106322 2788803423565 7441638. Type, Starts, Wins, Places, Prize Money, Strike Rate, P/L (£1 stake) ...

from Google Alert - anonymous http://ift.tt/2u1etAb
via IFTTT

Your Linux Machine Can Be Hacked Remotely With Just A Malicious DNS Response

A critical vulnerability has been discovered in Systemd, the popular init system and service manager for Linux operating systems, that could allow remote attackers to potentially trigger a buffer overflow to execute malicious code on the targeted machines via a DNS response. The vulnerability, designated as CVE-2017-9445, actually resides in the 'dns_packet_new' function of 'systemd-resolved,


from The Hacker News http://ift.tt/2spvDFu
via IFTTT

Symbiotic R Aquarii


A long recognized naked-eye variable star, R Aquarii is actually an interacting binary star system, two stars that seem to have a close, symbiotic relationship. About 710 light years away, it consists of a cool red giant star and hot, dense white dwarf star in mutual orbit around their common center of mass. The binary system's visible light is dominated by the red giant, itself a Mira-type long period variable star. But material in cool giant star's extended envelope is pulled by gravity onto the surface of the smaller, denser white dwarf, eventually triggering a thermonuclear explosion and blasting material into space. Optical image data (red) shows the still expanding ring of debris originating from a blast that would have been seen in the early 1770s. The evolution of less understood energetic events producing high energy emission in the R Aquarii system has been monitored since 2000 using Chandra X-ray Observatory data (blue). The composite field of view is less that a light-year across at the estimated distance of R Aquarii. via NASA http://ift.tt/2tjeNfX

Nats GM slams anonymous player for questioning his lack of bullpen upgrades

Nats GM slams anonymous player for questioning his lack of bullpen upgrades. theScore. Washington Nationals general manager Mike Rizzo is sick ...

from Google Alert - anonymous http://ift.tt/2s3UUFM
via IFTTT

Wednesday, June 28, 2017

ceramics-Collected works of Niklas

Veld van achtenveertig tegels met… anonymous ... Veld van achtenveertig tegels met… anonymous ... Concave bowl with dots on white… anonymous.

from Google Alert - anonymous http://ift.tt/2sohJmP
via IFTTT

Its been fascinating.

Its been fascinating.” is published by Imrat Jn in Affiliates Anonymous.

from Google Alert - anonymous http://ift.tt/2tqqjqj
via IFTTT

I have a new follower on Twitter


Giving Artfully Kids
Help Build A Generation of Kindness | Empower kids to make a difference through crafting | Join our FB community & inspire kids in your life to give through art

https://t.co/docofhPA0U
Following: 2494 - Followers: 1620

June 28, 2017 at 05:32PM via Twitter http://twitter.com/GivingArtfully

Ravens: Teammates lobby Zach Orr to stay in Baltimore after ending brief retirement (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

[FREE] Portugal vs Chile Live Stream

by Anonymous 5sc on June 28, 2017. [Live..TV] Portugal vs Chile Confederations Cup Semi-final 2017 Live Stream On Free....[Live..TV] Portugal vs ...

from Google Alert - anonymous http://ift.tt/2ujN4sy
via IFTTT

Turns Out New Petya is Not a Ransomware, It’s a Destructive Wiper Malware

What if I say the Tuesday's devastating global malware outbreak was not due to any ransomware infection? Yes, the Petya ransomware attacks that began infecting computers in several countries, including Russia, Ukraine, France, India and the United States on Tuesday and demands $300 ransom was not designed with the intention of restoring the computers at all. According to a new analysis, the


from The Hacker News http://ift.tt/2tlLWaX
via IFTTT

[FD] [CORE-2017-0003] - Kaspersky Anti-Virus File Server Multiple Vulnerabilities

1. *Advisory Information* Title: Kaspersky Anti-Virus File Server Multiple Vulnerabilities Advisory ID: CORE-2017-0003 Advisory URL: http://ift.tt/2tYq4Qo Date published: 2017-06-28 Date of last update: 2017-06-28 Vendors contacted: Kaspersky Release mode: Forced release 2. *Vulnerability Information* Class: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') [CWE-79], Cross-Site Request Forgery [CWE-352], Improper Privilege Management [CWE-269], Improper Limitation of a Pathname to a Restricted Directory [CWE-22] Impact: Code execution, Security bypass, Information leak Remotely Exploitable: Yes Locally Exploitable: Yes CVE Name: CVE-2017-9813, CVE-2017-9810, CVE-2017-9811, CVE-2017-9812 3. *Vulnerability Description* From Kaspersky Lab's website: "Large corporate networks that use file servers running on different platforms can be a real headache when it comes to antivirus protection. Kaspersky Anti-Virus for Linux File Server is part of our range of new and refreshed products, solutions and services for heterogeneous networks. It provides a superior protection with Samba server integration and other features that can protect workstations and file servers in even the most complex heterogeneous networks. It is also certified VMware Ready and supports current versions of FreeBSD for integrated, future-proof protection." Multiple vulnerabilities were found in the Kaspersky Anti-Virus for Linux File Server [2] Web Management Console. It is possible for a remote attacker to abuse these vulnerabilities and gain command execution as root. 4. *Vulnerable Packages* . Kaspersky Anti-Virus for Linux File Server 8.0.3.297 [2] Other products and versions might be affected, but they were not tested. 5. *Vendor Information, Solutions and Workarounds* Kaspersky [1] published the following Maintenance Pack: . Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312): http://ift.tt/2tYQO31 6. *Credits* This vulnerability was discovered and researched by Leandro Barragan and Maximiliano Vidal from Core Security Consulting Services. The publication of this advisory was coordinated by Alberto Solino from Core Advisories Team. 7. *Technical Description / Proof of Concept Code* Kaspersky Anti-virus for Linux File Server comes bundled with a Web Management Console to monitor the application's status and manage its operation. One specific feature allows configuring shell scripts to be executed when certain events occur. This functionality is vulnerable to cross-site request forgery, allowing code execution in the context of the web application as the kluser account. The vulnerability is described in section 7.1. Moreover, it is possible to elevate privileges from kluser to root by abusing the quarantine functionality provided by the kav4fs-control system binary. This is described in section 7.2. Additional web application vulnerabilities were found, including a reflected cross-site scripting vulnerability (7.3) and a path traversal vulnerability (7.4). 7.1. *Cross-site Request Forgery leading to Remote Command Execution* [CVE-2017-9810]: There are no Anti-CSRF tokens in any forms on the web interface. This would allow an attacker to submit authenticated requests when an authenticated user browses an attacker-controlled domain. The following request will update the notification settings to run a shell command when an object is moved to quarantine. For the full list of events refer to the product's documentation. Note that it is possible to add a script to all existing events in a single request, widening the window of exploitation. The proof-of-concept creates the file /tmp/pepperoni. Shell commands are run as the lower privilege kluser. Payload: /--

Source: Gmail -> IFTTT-> Blogger

Microsoft Adding Artificial-Intelligence Based Advanced Antivirus to Windows 10

Microsoft is making every effort to make its Windows operating system more secure and advanced than ever before by beefing up its security practices and hardening it against hackers and cyber attacks in its next release. With the launch of its Windows 10 Creator Update (also known as RedStone 3), which is expected to release sometime between September and October 2017, Microsoft is planning


from The Hacker News http://ift.tt/2tptpLh
via IFTTT

Here's How CIA Malware Tracks Geo-Location of its Targets

WikiLeaks has just published a new batch of the ongoing Vault 7 leak, and this time the whistleblowing website has unveiled a classified malware for that tracks geo-location of targeted PCs and laptops running the Microsoft Windows operating system. In short, the malware does it by capturing the IDs of nearby public hotspots and then matching them with the global database of public Wi-Fi


from The Hacker News http://ift.tt/2slXLZS
via IFTTT

Ravens: Zach Orr considering comeback five months after retiring with a congenital spine and neck condition (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 6/27/2017

Cardiac Stem Cells:  In support of the ongoing Cardiac Stem Cells investigation, the crew changed out the media in one of the BioCell Habitats in the Microgravity Science Glovebox (MSG).  Cardiac Stem Cells investigates how microgravity affects stem cells and the factors that govern their activity, in order to clarify the role of stem cells in cardiac biology and tissue regeneration.  This investigation also supports research into the possible acceleration of the aging process in microgravity.  Lighting Effects: The crew set up and configured the Light Meter hardware and took readings in the Cupola, which uses the legacy General Luminaire Assembly (GLA). The Lighting Effects experiment hopes to better quantify and qualify how lighting can effect habitability of spacecraft. The light bulbs on the ISS are being replaced with a new system designed for improved crew health and wellness. The Lighting Effects investigation studies the impact of the change from fluorescent light bulbs to solid-state light-emitting diodes (LEDs) with adjustable intensity and color and aims to determine if the new lights can improve crew circadian rhythms, sleep, and cognitive performance. Results from this investigation also have major implications for people on Earth who use electric lights. NanoRacks Module 9: The crew activated mixture tubes in support of the NanoRacks-National Center for Earth and Space Science-Casper (NanoRacks-NCESSE-Casper) investigation.  NCESSE supports various schools and student-designed experiments that address challenges of living and working in space. The program is also a key initiative for U.S. science, technology, engineering and math (STEM), that strives to educate and inspire the next generation of scientists and engineers to work on the space program.  The specific investigations supported today include Growth and Development of Fathead Minnows in Microgravity, Does the Structure of a Fairy Shrimp Change in Microgravity?, Soybean Germination in Microgravity, and Benefits of Mint. Mobile Servicing System (MSS) Operations: Yesterday afternoon and overnight, Robotics Ground Controllers maneuvered Special Purpose Dexterous Manipulator (SPDM) Arm1 to grasp the Roll Out Solar Array (ROSA) Payload Jettison Micro-Square Fixture (MSF).  At 4:15pm CDT Controllers applied power to the ROSA Jettison Motors and the ROSA Payload was jettisoned from ISS.  Next they maneuvered the Space Station Remote Manipulator System (SSRMS) and SPDM to release Arm1 from the ROSA Jettison MSF to grasp the ROSA Flight Releasable Attachment Mechanism (FRAM) MSF with Arm1 and to release Arm2 from the ROSA Operations MSF.  Finally the SSRMS and SPDM were maneuvered to position the ROSA FRAM at the Dragon Trunk threshold in preparation for stowing it later today.  Potable Water Dispenser Relocation: The crew installed a potable water tee on the Node 1 to Node 3 portion of the potable water hose to provide a connection for the PWD. The crew then transferred the PWD from ExPRESS-6 to the galley rack. Commercial Orbital Transport Services (COTS) UHF Communication Unit (CUCU) Checkout:  In preparation for the upcoming SpaceX-11 departure planned for July 2nd, the crew coordinated with ground teams to activate the CUCU System and perform a Crew Command Panel (CCP) checkout. CUCU provides a command and telemetry communications link between ISS and Dragon during free flight operations in the vicinity of ISS.    Today’s Planned Activities All activities were completed unless otherwise noted. Test Video Recording for Russia Today TV Channel Preparation of Reports for Roscosmos Web Site and Social Media URAGAN. Observation and Photography ECON-M. Observation and Photography ARED Photo/TV Reminder Glacier 4 Sample Remove Total Organic Carbon Analyzer (TOCA) Water Recovery System (WRS) Sample Analysis Replacement of sleeves and leg shells on ORLAN-МК #6 – prep ARED Quarterly Inspection Crew Medical Officer (CMO) Proficiency Training ORLAN-МК #6 sleeves R&R Lighting Effects Light Meter Readings Alternate 1 СК ОРЛАН-МК №6 sleeves replacement – help European Modular Cultivation System Gas Valve Close Environmental Health System (EHS) – Formaldehyde Monitoring Kit (FMK) Deployment Operations Environmental Health System (EHS) Grab Sample Container (GSC) Sampling Operations Dragon Lithium Hydroxide Filter Bag Remove and Replace ORLAN-МК #6 leak check. Countermeasures System (CMS) Heart Rate Monitor (HRM) iPad Downlink Cardiac Stem Cells SABL Insertion Cardiac Stem Cells Media Change 1 BioCell Habitat WHC Pre-Treat Tank Remove & Replace Progress 435 (DC1) stow ops for the hardware to be disposed of, with IMS update Photo T/V (P/TV) Advanced Resistive Exercise Device (ARED) Exercise Video Setup Node 2 Nadir Vestibule Outfitting Kit (VOK) Gather NanoRacks Module 9 Ops Session 4 Galley Potable Water Dispenser (PWD) Installation Photo/TV Camcorder Setup Verification TOCA Sample Data Record Photo/TV Camcorder Setup Verification Crew Medical Officer (CMO) Proficiency Training Photo/TV CUCU Video Setup COTS UHF Communication Unit (CUCU) Crew Command Panel (CCP) Checkout Photo TV CUCU Video Deactivation Telescience Resource Kit Laptop Setup Completed Task List Items Crew powers down, unplugs, and stows Fast Neutron Spectrometer hardware Ground Activities All activities were completed unless otherwise noted. SSRMS Ops for ROSA FRAM Install into Drago Trunk CUCU Checkout Three-Day Look Ahead: Wednesday, 06/28: ELF sample holder exchange, sample transfer from MELFI to POLAR, WHC pre-treat tank R&R, Rodent Habitat restock Thursday, 06/29: NanoRacks Module 48 ops, Rodent Research, Dragon departure OBT Friday, 06/30: NanoRacks Module 9 ops, POLAR transfer to Dragon, StemCell media change  QUICK ISS Status – Environmental Control Group:   Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off           [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Process Trace Contaminant Control System (TCCS) Lab Full up Trace Contaminant Control System (TCCS) Node 3 Off  

from ISS On-Orbit Status Report http://ift.tt/2toiFN5
via IFTTT

'Shadow Brokers' Threatens to Unmask A Hacker Who Worked With NSA

The Shadow Brokers, a notorious hacking group that leaked US cyberweapons — which were also abused by the recent ransomware disasters WannaCry and Petya or NotPetya — has now threatened to unmask the identity of a former hacker who worked for the NSA. Besides this, the Shadow Brokers group has also doubled the price for its monthly subscription model of NSA's built hacking tools and zero-day


from The Hacker News http://ift.tt/2t0bcRu
via IFTTT

Critical Skype Bug Lets Hackers Remotely Execute Malicious Code

A critical vulnerability has been discovered in Microsoft-owned most popular free web messaging and voice calling service Skype that could allow hackers to remotely execute malicious code and crash systems. Skype is a free online service that allows users to communicate with peers by voice, video, and instant messaging over the Internet. The service was acquired by Microsoft Corporation in


from The Hacker News http://ift.tt/2ugXnxu
via IFTTT

I have a new follower on Twitter


Canada & Chill
Reviews, Rating and Discussions about the best movies on Netflix Canada. Written by Canadian for Canadians! Discover the Movies you should be watching! 🎬
Toronto, Ontario
https://t.co/dUhNaLK5oi
Following: 1188 - Followers: 123

June 28, 2017 at 02:42AM via Twitter http://twitter.com/canadaandchill

Composite Messier 20 and 21


The beautiful Trifid Nebula, also known as Messier 20, lies about 5,000 light-years away, a colorful study in cosmic contrasts. It shares this nearly 1 degree wide field with open star cluster Messier 21 (top left). Trisected by dust lanes the Trifid itself is about 40 light-years across and a mere 300,000 years old. That makes it one of the youngest star forming regions in our sky, with newborn and embryonic stars embedded in its natal dust and gas clouds. Estimates of the distance to open star cluster M21 are similar to M20's, but though they share this gorgeous telescopic skyscape there is no apparent connection between the two. M21's stars are much older, about 8 million years old. M20 and M21 are easy to find with even a small telescope in the nebula rich constellation Sagittarius. In fact, this well-composed scene is a composite from two different telescopes. Using narrowband data it blends a high resolution image of M20 with a wider field image extending to M21. via NASA http://ift.tt/2tdOffI

Tuesday, June 27, 2017

Razorcoin – RZR Cryptocurrency Private Send Anonymous Network?

Razor aims to solve this problem by integrating its Digital currency platform with the popular anonymous Tor network, thereby arriving at a solution ...

from Google Alert - anonymous http://ift.tt/2tiKkP7
via IFTTT

Anonymous VS. NASA

Anonymous VS. NASA. Cornwall, ON, Canada / 104.5 Fresh Radio. Jimmy Kalaitzis. June 27, 2017 03:19 pm. Truth is out there!

from Google Alert - anonymous http://ift.tt/2tmm2Em
via IFTTT

SDS - Anonymous NASA Hack

Anonymous has stated they have hacked NASA and found information that NASA is readying to inform the world that they have evidence of Intelligent ...

from Google Alert - anonymous http://ift.tt/2sXQ2U2
via IFTTT

Een Kindelien zo Loveliek (Anonymous)

Misc. Comments. Since time immemorial this Christmas carol was sung in the St Plechelmus church in Oldenzaal (NL). It was also part of a "Collection ...

from Google Alert - anonymous http://ift.tt/2tgS3g2
via IFTTT

Q&A: Do Ravens have Super Bowl-caliber defense? Our AFC North reporters aren't buying it (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


Socially Rich
"The #1 Instagram Growth Service" The Huffington Post.

https://t.co/npgKZ6LCIu
Following: 5295 - Followers: 7134

June 27, 2017 at 10:49AM via Twitter http://twitter.com/sociallyrichco

Petya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry

Watch out, readers! It is ransomware, another WannaCry, another wide-spread attack. The Wannacry ransomware is not dead yet and another large scale ransomware attack is making chaos worldwide, shutting down computers at corporates, power supplies and banks across Russia, Ukraine, India, and Europe and demanding demands $300 in bitcoins. According to multiple sources, a new variant of Petya


from The Hacker News http://ift.tt/2tSaXYP
via IFTTT

ISS Daily Summary Report – 6/26/2017

Roll Out Solar Array (ROSA): On Sunday, three attempts to retract ROSA solar array were unsuccessful.  Imagery showed the array was not lining up correctly (“telescoping”), preventing the locking of ROSA’s latches which is required for return in Dragon. Teams met and agreed to stand down on further retraction attempts due to the risk of getting stuck in an off nominal configuration with a partially retracted array. ROSA was left fully deployed following the last attempt and jettison was approved which was completed today at 4:15PM CDT to the nadir and aft of ISS.  Seedling Growth 3: The crew completed the second of two six-day growth sessions for Seedling Growth 3 today. They removed Experiment Containers from the European Modular Cultivation System (EMCS), processed the samples, and stowed them in the Biolab Thermal Control Unit. The samples from this and the previous run will be returned on SpaceX-11. This is the third part of the Seedling Growth Experiment series using the small flowering plant Arabidopsis thaliana to investigate the effects of gravity on the cellular signaling mechanisms of light sensing in plants (phototropism), and to investigate cell growth and proliferation responses to light stimulation under microgravity conditions.  Microbial Tracking-2 (MT-2):  Yesterday the crew collected saliva samples for the Microbial Tracking-2 investigation and placed them in a Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI).  MT-2 monitors the different types of microbes that are present on ISS over a 1 year period.  After the samples are returned to Earth, a molecular analysis of the RNA and DNA will be conducted to identify the specific microbes that are present on ISS in order to understand the microbial flora diversity on the ISS and how it changes over time.  Human Research Program (HRP): A crewmember collected Flight Day 60 urine and blood samples yesterday and today for Biochem Profile and blood and air samples for Marrow. The Biochem Profile experiment tests blood and urine samples obtained from astronauts before, during and after spaceflight.  Specific proteins and chemicals in the samples are used as biomarkers, or indicators of health. Post-flight analysis yields a database of samples and test results which scientists can use in their study of the effects of spaceflight on the body. The Marrow investigation identifies the effect of microgravity on bone marrow.  It is believed that microgravity, like long-duration bed rest on Earth, has a negative effect on blood cell production in bone marrow. Today’s Planned Activities All activities were completed unless otherwise noted. Test Video Recording for Russia Today TV Channel Preparation of Reports for Roscosmos Web Site and Social Media URAGAN. Observation and Photography ECON-M. Observation and Photography Marrow Breath And Ambient Air Sample Collection – Subject Reminder HRF Generic Frozen Blood Collection MO-8. Hardware setup Reminder HRF Generic Urine Collection End Body Mass Measurement – BMMD HRF Generic Frozen Blood Collection Double Spin Collection – Subject Body Mass Measurement – BMMD Body Mass Measurement – BMMD HRF Generic Frozen Blood Collection Double Spin Collection – Operator MO-8 Concluding ops HRF Generic Refrigerated Centrifuge Double Spin Configuration 1 HRF Generic Urine Collection Male – Subject HRF Generic Sample MELFI Insertion Operations HRF Generic Refrigerated Centrifuge Double Spin Configuration 2 HRF Generic Sample MELFI Insertion HRF Generic Refrigerated Centrifuge Spin Conclude Early unstow, priority, and US cargo transfers from Progress 436 (SM Aft) and IMS Ops HRF Generic Frozen Blood Collection Conclude Stow JEM Camera Robot Activation HRF Generic Urine Collection Stow Cargo Transfer to Dragon Cell Biology Experiment Facility (CBEF) and Video Compression and Recording Unit 2 (VRU2) Cable Reconfiguration 2 Examination of bio electrical activity of heart at rest Multipurpose Small Payload Rack (MSPR) Experiment Laptop Terminal (ELT) Cables Connection Seedling Growth-3 Maintenance Work Area Preparation. Removal of 800А (А105) battery Multipurpose Small Payload Rack (MSPR) Experiment Laptop Terminal (ELT) RS485 Converter Connection Seedling Growth-3 Maintenance Work Area Configuration. JEM Camera Robot Deactivation Dragon Locker Remove 2 Removal of 800А (А101) battery Re-install 800А battery from А105 slot to А101 slot Seedling Growth 3 TCU removal Advanced Resistive Exercise Device (ARED) Cylinder Flywheel Evacuation Countermeasures System (CMS) Treadmill 2 System (T2) Monthly Inspection SPHERES USB Stow EML Gas Valves Opening Collecting SM and FGB Air Samples Using АК-1М Sampler Seedling Growth-3 Camcorder Setup Seedling Growth-3 Run 2 EC Removal from EMCS Rotor B Request to RS1 with variable Seedling Growth-3 Sample Processing of ECs Rotor B Run 2 Seedling Growth-3 Run 2 EC Removal from EMCS Rotor A Seedling Growth-3 EMCS Cold Stowage Bag MELFI Insertion Seedling Growth-3 Sample Processing of ECs from Rotor A Run 2 Seedling Growth-3 Sample Processing with FixBox Rotor A Run 2 Tightening of DC1 – Progress 435 QD screw clamps Seedling Growth-3 EMCS Reference Experiment Container Insertion Telescience Resource Kit Laptop Setup Environmental Health System (EHS) – Surface Sampler Kit (SSK) and Microbial Air Sampler (MAS) Analysis T + 5 Dragon Cargo Operations Conference Seedling Growth 3 TCU insertion Seedling Growth-3 Post-Sample Processing Cleanup after Run 2. Evening Preparation Work Habitability Narrated Task Video Setup – Subject Seedling Growth-3 MWA Deconfigure. Habitability Narrated Task Video End – Subject Completed Task List Items Columbus PK4 Hard Drive Pouch Trash [Completed GMT 176] Crew Medical Officer (CMO) Proficiency Training [Completed GMT 176] Empty three Double Cold bags and prepare them for SpX-11 return [Completed GMT 176] Ground Activities All activities were completed unless otherwise noted. P1UPOB ETVCG troubleshooting Seedling Growth 3 Ops Three-Day Look Ahead: Tuesday, 06/27: StemCell media changeout, OBT CMO, Dragon LiOH filter bag R&R Wednesday, 06/28: ELF sample holder exchange, sample transfer from MELFI to POLAR, WHC pre-treat tank R&R, Rodent Habitat restock Thursday, 06/29: NanoRacks Module 48 ops, Rodent Research, Dragon departure OBT QUICK ISS Status – Environmental Control Group:   Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off           [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer […]

from ISS On-Orbit Status Report http://ift.tt/2tiStTY
via IFTTT

Google Gets Record-Breaking $2.7 Billion Fine for Manipulating Search Results

Google has just lost its biggest regulatory battle! Google has been hit with a record-breaking $2.7 billion (€2.42 billion) fine by the European antitrust officials for unfairly manipulating search results since 2008. After a lengthy seven-year investigation that was launched in 2010 after several rivals complaint, the European Commission on Tuesday imposed this 'biggest even financial


from The Hacker News http://ift.tt/2tgcElk
via IFTTT

[FD] Freeware Advanced Audio Decoder 2 (FAAD2) multiple vulnerabilities

Freeware Advanced Audio Decoder 2 (FAAD2) multiple vulnerabilities ================ Author : qflb.wu =============== Introduction: ============= FAAD2 is a decoder for a lossy sound compression scheme specified in MPEG-2 Part 7 and MPEG-4 Part 3 standards and known as Advanced Audio Coding (AAC). Affected version: ===== 2.7 Vulnerability Description: ========================== 1. the mp4ff_read_stsd function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 can cause a denial of service(invalid memory read and application crash) via a crafted mp4 file. ./faad faad2_2.7_mp4ff_read_stsd_invalid_memory_read.mp4 -o out.wav ASAN:SIGSEGV ================================================================= ==79726==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000014 (pc 0x0000004a8cd5 sp 0x7ffe49bd3c20 bp 0x7ffe49bd3d20 T0) #0 0x4a8cd4 in mp4ff_read_stsd /home/a/Downloads/faad2-2.7/common/mp4ff/mp4atom.c:386 #1 0x4a8cd4 in mp4ff_atom_read /home/a/Downloads/faad2-2.7/common/mp4ff/mp4atom.c:671 #2 0x49e426 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:173 #3 0x49b514 in parse_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:214 #4 0x49a731 in mp4ff_open_read /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:43 #5 0x47f80f in decodeMP4file /home/a/Downloads/faad2-2.7/frontend/main.c:778 #6 0x47f80f in main /home/a/Downloads/faad2-2.7/frontend/main.c:1246 #7 0x7f21554edec4 (/lib/x86_64-linux-gnu/libc.so.6+0x21ec4) #8 0x47cecc in _start (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x47cecc) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/a/Downloads/faad2-2.7/common/mp4ff/mp4atom.c:386 mp4ff_read_stsd ==79726==ABORTING POC: faad2_2.7_mp4ff_read_stsd_invalid_memory_read.mp4 CVE: CVE-2017-9218 2. the mp4ff_read_stsc function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 can cause a denial of service (memory allocation error and application crash) via a crafted mp4 file. ./faad faad2_2.7_mp4ff_read_stsc_memory_allocation_error.mp4 -o out.wav ==81366==ERROR: AddressSanitizer failed to allocate 0xac003000 (2885693440) bytes of LargeMmapAllocator: 12 ==81366==Process memory map follows: 0x000000400000-0x0000004db000/home/a/Downloads/faad2-2.7/frontend/.libs/faad 0x0000006db000-0x0000006dc000/home/a/Downloads/faad2-2.7/frontend/.libs/faad 0x0000006dc000-0x0000006e1000/home/a/Downloads/faad2-2.7/frontend/.libs/faad 0x0000006e1000-0x000001b25000 0x00007fff7000-0x00008fff7000 ... ==81366==End of process memory map. ==81366======== #0 0x46cd8f in __asan::AsanCheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x46cd8f) #1 0x4725f1 in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x4725f1) #2 0x476ebe in __sanitizer::MmapOrDie(unsigned long, char const*) (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x476ebe) #3 0x432598 in __sanitizer::LargeMmapAllocator<__asan::AsanMapUnmapCallback>::Allocate(__sanitizer::AllocatorStats*, unsigned long, unsigned long) (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x432598) #4 0x42e5db in __asan::Allocate(unsigned long, unsigned long, __sanitizer::StackTrace*, __asan::AllocType, bool) (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x42e5db) #5 0x466e26 in __interceptor_malloc (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x466e26) #6 0x4aae52 in mp4ff_read_stsc /home/a/Downloads/faad2-2.7/common/mp4ff/mp4atom.c:423 #7 0x4aae52 in mp4ff_atom_read /home/a/Downloads/faad2-2.7/common/mp4ff/mp4atom.c:665 #8 0x49e426 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:173 #9 0x49e386 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:171 #10 0x49e386 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:171 #11 0x49e386 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:171 #12 0x49e386 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:171 #13 0x49b514 in parse_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:214 #14 0x49a731 in mp4ff_open_read /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:43 #15 0x47f80f in decodeMP4file /home/a/Downloads/faad2-2.7/frontend/main.c:778 #16 0x47f80f in main /home/a/Downloads/faad2-2.7/frontend/main.c:1246 #17 0x7f7260e5cec4 (/lib/x86_64-linux-gnu/libc.so.6+0x21ec4) #18 0x47cecc in _start (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x47cecc) POC: faad2_2.7_mp4ff_read_stsc_memory_allocation_error.mp4 CVE: CVE-2017-9219 3. the mp4ff_read_stco function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 can cause a denial of service (memory allocation error) via a crafted mp4 file. ./faad faad2_2.7_mp4ff_read_stco_memory_allocation_error.mp4 -o out.wav ==81459==WARNING: AddressSanitizer failed to allocate 0xfffffffe18000000 bytes ==81459==AddressSanitizer's allocator is terminating the process instead of returning 0 ==81459==If you don't like this behavior set allocator_may_return_null=1 ==81459== #0 0x46cd8f in __asan::AsanCheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x46cd8f) #1 0x4725f1 in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x4725f1) #2 0x471330 in __sanitizer::AllocatorReturnNull() (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x471330) #3 0x466e26 in __interceptor_malloc (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x466e26) #4 0x4aab2f in mp4ff_read_stco /home/a/Downloads/faad2-2.7/common/mp4ff/mp4atom.c:448 #5 0x4aab2f in mp4ff_atom_read /home/a/Downloads/faad2-2.7/common/mp4ff/mp4atom.c:668 #6 0x49e426 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:173 #7 0x49e386 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:171 #8 0x49e386 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:171 #9 0x49e386 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:171 #10 0x49e386 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:171 #11 0x49b514 in parse_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:214 #12 0x49a731 in mp4ff_open_read /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:43 #13 0x47f80f in decodeMP4file /home/a/Downloads/faad2-2.7/frontend/main.c:778 #14 0x47f80f in main /home/a/Downloads/faad2-2.7/frontend/main.c:1246 #15 0x7f3a7dd64ec4 (/lib/x86_64-linux-gnu/libc.so.6+0x21ec4) #16 0x47cecc in _start (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x47cecc) POC: faad2_2.7_mp4ff_read_stco_memory_allocation_error.mp4 CVE: CVE-2017-9220 4. the mp4ff_read_mdhd function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 can cause a denial of service(invalid memory read and application crash) via a crafted mp4 file. ./faad faad2_2.7_mp4ff_read_mdhd_invalid_memory_read.mp4 -o out.wav ASAN:SIGSEGV ================================================================= ==81533==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000009c (pc 0x0000004abd74 sp 0x7ffd8d1bb470 bp 0x7ffd8d1bb570 T0) #0 0x4abd73 in mp4ff_read_mdhd /home/a/Downloads/faad2-2.7/common/mp4ff/mp4atom.c:614 #1 0x4abd73 in mp4ff_atom_read /home/a/Downloads/faad2-2.7/common/mp4ff/mp4atom.c:677 #2 0x49e426 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:173 #3 0x49e386 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:171 #4 0x49b514 in parse_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:214 #5 0x49a731 in mp4ff_open_read /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:43 #6 0x47f80f in decodeMP4file /home/a/Downloads/faad2-2.7/frontend/main.c:778 #7 0x47f80f in main /home/a/Downloads/faad2-2.7/frontend/main.c:1246 #8 0x7f16f7a77ec4 (/lib/x86_64-linux-gnu/libc.so.6+0x21ec4) #9 0x47cecc in _start (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x47cecc) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/a/Downloads/faad2-2.7/common/mp4ff/mp4atom.c:614 mp4ff_read_mdhd ==81533==ABORTING POC: faad2_2.7_mp4ff_read_mdhd_invalid_memory_read.mp4 CVE: CVE-2017-9221 5. the mp4ff_parse_tag function in common/mp4ff/mp4meta.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 can to cause a denial of service(infinite loop and CPU consumption) via a crafted mp4 file. ./faad faad2_2.7_mp4ff_parse_tag_infinite_loop.mp4 -o out.wav POC: faad2_2.7_mp4ff_parse_tag_infinite_loop.mp4 CVE: CVE-2017-9222 6. the mp4ff_read_stts function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 can cause a denial of service(invalid memory read and application crash) via a crafted mp4 file. ./faad faad2_2.7_mp4ff_read_stts_invalid_memory_read.mp4 -o out.wav ASAN:SIGSEGV ================================================================= ==86670==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000028 (pc 0x0000004aa0d1 sp 0x7ffc40cbbb80 bp 0x7ffc40cbbc80 T0) #0 0x4aa0d0 in mp4ff_read_stts /home/a/Downloads/faad2-2.7/common/mp4ff/mp4atom.c:495 #1 0x4aa0d0 in mp4ff_atom_read /home/a/Downloads/faad2-2.7/common/mp4ff/mp4atom.c:659 #2 0x49e426 in parse_sub_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:173 #3 0x49b514 in parse_atoms /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:214 #4 0x49a731 in mp4ff_open_read /home/a/Downloads/faad2-2.7/common/mp4ff/mp4ff.c:43 #5 0x47f80f in decodeMP4file /home/a/Downloads/faad2-2.7/frontend/main.c:778 #6 0x47f80f in main /home/a/Downloads/faad2-2.7/frontend/main.c:1246 #7 0x7f0f9cfbeec4 (/lib/x86_64-linux-gnu/libc.so.6+0x21ec4) #8 0x47cecc in _start (/home/a/Downloads/faad2-2.7/frontend/.libs/faad+0x47cecc) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/a/Downloads/faad2-2.7/common/mp4ff/mp4atom.c:495 mp4ff_read_stts ==86670==ABORTING POC: faad2_2.7_mp4ff_read_stts_invalid_memory_read.mp4 CVE: CVE-2017-9223 7. the mp4ff_read_stsd function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 can cause a denial of service(large loop and CPU consumption) via a crafted mp4 file. ./faad faad2_2.7_mp4ff_read_stsd_large_loop.mp4 -o out.wav static int32_t mp4ff_read_stsd(mp4ff_t *f) { int32_t i; uint8_t header_size = 0; mp4ff_read_char(f); /* version */ mp4ff_read_int24(f); /* flags */ f->track[f->total_tracks - 1]->stsd_entry_count = mp4ff_read_int32(f); <========== for (i = 0; i < f->track[f->total_tracks - 1]->stsd_entry_count; i++) <========== { uint64_t skip = mp4ff_position(f); uint64_t size; uint8_t atom_type = 0; size = mp4ff_atom_read_header(f, &atom_type, &header_size); skip += size; if (atom_type == ATOM_MP4A) { f->track[f->total_tracks - 1]->type = TRACK_AUDIO; mp4ff_read_mp4a(f); } else if (atom_type == ATOM_MP4V) { f->track[f->total_tracks - 1]->type = TRACK_VIDEO; } else if (atom_type == ATOM_MP4S) { f->track[f->total_tracks - 1]->type = TRACK_SYSTEM; } else { f->track[f->total_tracks - 1]->type = TRACK_UNKNOWN; } mp4ff_set_position(f, skip); } return 0; } POC: faad2_2.7_mp4ff_read_stsd_large_loop.mp4 CVE: CVE-2017-9253 8. the mp4ff_read_stts function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 can cause a denial of service(large loop and CPU consumption) via a crafted mp4 file. ./faad faad2_2.7_mp4ff_read_stts_large_loop.mp4 -o out.wav static int32_t mp4ff_read_stts(mp4ff_t *f) { int32_t i; mp4ff_track_t * p_track = f->track[f->total_tracks - 1]; if (p_track->stts_entry_count) return 0; mp4ff_read_char(f); /* version */ mp4ff_read_int24(f); /* flags */ p_track->stts_entry_count = mp4ff_read_int32(f); <============ p_track->stts_sample_count = (int32_t*)malloc(p_track->stts_entry_count * sizeof(int32_t)); p_track->stts_sample_delta = (int32_t*)malloc(p_track->stts_entry_count * sizeof(int32_t)); if (p_track->stts_sample_count == 0 || p_track->stts_sample_delta == 0) { if (p_track->stts_sample_count) {free(p_track->stts_sample_count);p_track->stts_sample_count=0;} if (p_track->stts_sample_delta) {free(p_track->stts_sample_delta);p_track->stts_sample_delta=0;} p_track->stts_entry_count = 0; return 0; } else { for (i = 0; i < f->track[f->total_tracks - 1]->stts_entry_count; i++) <=========== { p_track->stts_sample_count[i] = mp4ff_read_int32(f); p_track->stts_sample_delta[i] = mp4ff_read_int32(f); } return 1; } } POC: faad2_2.7_mp4ff_read_stts_large_loop.mp4 CVE: CVE-2017-9254 9. the mp4ff_read_stsc function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 can cause a denial of service(large loop and CPU consumption) via a crafted mp4 file. ./faad faad2_2.7_mp4ff_read_stsc_large_loop.mp4 -o out.wav static int32_t mp4ff_read_stsc(mp4ff_t *f) { int32_t i; mp4ff_read_char(f); /* version */ mp4ff_read_int24(f); /* flags */ f->track[f->total_tracks - 1]->stsc_entry_count = mp4ff_read_int32(f); <======== f->track[f->total_tracks - 1]->stsc_first_chunk = (int32_t*)malloc(f->track[f->total_tracks - 1]->stsc_entry_count*sizeof(int32_t)); f->track[f->total_tracks - 1]->stsc_samples_per_chunk = (int32_t*)malloc(f->track[f->total_tracks - 1]->stsc_entry_count*sizeof(int32_t)); f->track[f->total_tracks - 1]->stsc_sample_desc_index = (int32_t*)malloc(f->track[f->total_tracks - 1]->stsc_entry_count*sizeof(int32_t)); for (i = 0; i < f->track[f->total_tracks - 1]->stsc_entry_count; i++) <======== { f->track[f->total_tracks - 1]->stsc_first_chunk[i] = mp4ff_read_int32(f); f->track[f->total_tracks - 1]->stsc_samples_per_chunk[i] = mp4ff_read_int32(f); f->track[f->total_tracks - 1]->stsc_sample_desc_index[i] = mp4ff_read_int32(f); } return 0; } POC: faad2_2.7_mp4ff_read_stsc_large_loop.mp4 CVE: CVE-2017-9255 10. the mp4ff_read_stco function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 can cause a denial of service(large loop and CPU consumption) via a crafted mp4 file. ./faad faad2_2.7_mp4ff_read_stco_large_loop.mp4 -o out.wav static int32_t mp4ff_read_stco(mp4ff_t *f) { int32_t i; mp4ff_read_char(f); /* version */ mp4ff_read_int24(f); /* flags */ f->track[f->total_tracks - 1]->stco_entry_count = mp4ff_read_int32(f); <======== f->track[f->total_tracks - 1]->stco_chunk_offset = (int32_t*)malloc(f->track[f->total_tracks - 1]->stco_entry_count*sizeof(int32_t)); for (i = 0; i < f->track[f->total_tracks - 1]->stco_entry_count; i++) <======== { f->track[f->total_tracks - 1]->stco_chunk_offset[i] = mp4ff_read_int32(f); } return 0; } POC: faad2_2.7_mp4ff_read_stco_large_loop.mp4 CVE: CVE-2017-9256 11. the mp4ff_read_ctts in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows can cause a denial of service(large loop and CPU consumption) via a crafted mp4 file. static int32_t mp4ff_read_ctts(mp4ff_t *f) { int32_t i; mp4ff_track_t * p_track = f->track[f->total_tracks - 1]; <======== if (p_track->ctts_entry_count) return 0; mp4ff_read_char(f); /* version */ mp4ff_read_int24(f); /* flags */ p_track->ctts_entry_count = mp4ff_read_int32(f); <======== p_track->ctts_sample_count = (int32_t*)malloc(p_track->ctts_entry_count * sizeof(int32_t)); p_track->ctts_sample_offset = (int32_t*)malloc(p_track->ctts_entry_count * sizeof(int32_t)); if (p_track->ctts_sample_count == 0 || p_track->ctts_sample_offset == 0) { if (p_track->ctts_sample_count) {free(p_track->ctts_sample_count);p_track->ctts_sample_count=0;} if (p_track->ctts_sample_offset) {free(p_track->ctts_sample_offset);p_track->ctts_sample_offset=0;} p_track->ctts_entry_count = 0; return 0; } else { for (i = 0; i < f->track[f->total_tracks - 1]->ctts_entry_count; i++) <======== { p_track->ctts_sample_count[i] = mp4ff_read_int32(f); p_track->ctts_sample_offset[i] = mp4ff_read_int32(f); } return 1; } } CVE: CVE-2017-9257 =============================== qflb.wu () dbappsecurity com cn

Source: Gmail -> IFTTT-> Blogger

Search results for Anonymous

by Anonymous. eBook. Borrow. Available · Title details for Laura Middleton; Her Brother and her Lover by Anonymous.

from Google Alert - anonymous http://ift.tt/2sgxmNm
via IFTTT

The M81 Galaxy Group through the Integrated Flux Nebula


Distant galaxies and nearby nebulas highlight this deep image of the M81 Group of galaxies. First and foremost in this 80-exposure mosaic is the grand design spiral galaxy M81, the largest galaxy in the image, visible on the lower right. M81 is gravitationally interacting with M82 just above it, a large galaxy with an unusual halo of filamentary red-glowing gas. Around the image many other galaxies from the M81 Group of galaxies can be seen, as well as many foreground Milky Way stars. This whole galaxy menagerie is seen through the glow of an Integrated Flux Nebula (IFN), a vast and complex screen of diffuse gas and dust also in our Milky Way Galaxy. Details of the red and yellow IFN, digitally enhanced, were imaged by a new wide-field camera recently installed at the Teide Observatory in the Canary Islands of Spain. via NASA http://ift.tt/2t7WOsw

Monday, June 26, 2017

[FD] DefenseCode Security Advisory: IBM DB2 Command Line Processor Buffer Overflow

DefenseCode Security Advisory IBM DB2 Command Line Processor Buffer Overflow Advisory ID: DC-2017-04-002 Advisory Title: IBM DB2 Command Line Processor Buffer Overflow Advisory URL: http://ift.tt/2td06vo Software: IBM DB2 Version: V9.7, V10.1, V10.5 and V11.1 on all platforms Vendor Status: Vendor Contacted / Fixed (CVE-2017-1297) Release Date: 26.06.2017 Risk: High 1. General Overview =================== IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) Command Line Process (CLP) is vulnerable to a stack based buffer overflow, caused by improper bounds checking which could allow an attacker to execute arbitrary code. The vulnerability is triggered by providing an overly long procedure name inside a CALL statement. 2. Software Overview =================== DB2 is a database product from IBM. It is a Relational Database Management System. DB2 is designed to store, analyze and retrieve the data efficiently. DB2 currently supports Linux, UNIX and Windows platforms. db2bp is a persistent background process for the DB2 Command Line Processor, and it is the process which actually connects to the database. 3. Brief Vulnerability Description ================================== By providing a specially crafted command file to the db2 CLP utility, it is possible to cause a buffer overflow and possibly hijack the execution flow of the program. Crafted file contains a CALL statement with an overly long procedure parameter. 3.1 Proof of Concept The following python script will generate a proof of concept .sql crash test file that can be used to verify the vulnerability:

Source: Gmail -> IFTTT-> Blogger

[FD] Vulnerabilities in D-Link DIR-100

Hello list! There are Brute Force and Cross-Site Request Forgery vulnerabilities in D-Link DIR-100.

Source: Gmail -> IFTTT-> Blogger

Hacker Group Anonymous Claims NASA Is About To Reveal The Existence Of Alien Life

The hacktavist group Anonymous have claimed that NASA is aware of the existence of intelligent alien life and will soon be releasing the news to the ...

from Google Alert - anonymous http://ift.tt/2tfXxsx
via IFTTT

[FD] malicious hypervisor aka root-kit hypervisor threat is rel

NUI Galway Commits to Introducing Anonymous Marking for new Academic Year

On Thursday the 20th of April, NUI Galway's Academic Council approved a proposal to introduce Anonymous Marking of exams commencing in the ...

from Google Alert - anonymous http://ift.tt/2sfrTGr
via IFTTT

How do I let anonymous users create issues ONLY via the Issue Collector?

Currently, I have an issue collector working - however visitors to the root URL of the JIRA instance see a "Create" button, are able to see.

from Google Alert - anonymous http://ift.tt/2tdVeFY
via IFTTT

Sponsorship Podcast 5

6075 Zenith Court NE • Rio Rancho, New Mexico 87144-6424. USA Tel 505-891-2664 • USA Fax 505-891-4320. © 2017 Overeaters Anonymous, Inc.

from Google Alert - anonymous http://ift.tt/2sU0g7S
via IFTTT

Former Ravens S Matt Elam's drug charges dropped in Miami-Dade County (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous - AGM

Anonymous - AGM – Boston Restaurant Jobs - BostonChefs.com's Industry Insider, the best jobs at Boston restaurants.

from Google Alert - anonymous http://ift.tt/2rUxouF
via IFTTT

Russia Threatens to Ban Telegram Messaging App, Says It Was Used By Terrorists

Russia has threatened a ban against Telegram end-to-end encrypted messaging app, after Pavel Durov, its founder, refused to sign up to the country's new data protection laws. Russia's FSB intelligence service said on Monday that the terrorists who killed 15 people in Saint Petersburg in April had used the Telegram encrypted messaging service to plot the attacks. <!-- adsense --> According to


from The Hacker News http://ift.tt/2tNJ3Nw
via IFTTT

Labeling superpixel colorfulness with OpenCV and Python

After our previous post on computing image colorfulness was published, Stephan, a PyImageSearch reader, left a comment on the tutorial asking if there was a method to compute the colorfulness of specific regions of an image (rather than the entire image).

There are multiple ways of attacking this problem. The first could be to apply a sliding window to loop over the image and compute the colorfulness score for each ROI. An image pyramid could even be applied if the colorfulness of a specific region needed to be computed at multiple scales.

However, a better approach would be to use superpixels. Superpixels are extracted via a segmentation algorithm that groups pixels into (non-rectangular) regions based on their local color/texture. In the case of the popular SLIC superpixel algorithm, image regions are grouped based on a local version of k-means clustering algorithm in the L*a*b* color space.

Given that superpixels will give us a much more natural segmentation of the input image than sliding windows, we can compute the colorfulness of specific regions in an image by:

  1. Applying superpixel segmentation to the input image.
  2. Looping over each of the superpixels individually and computing their respective colorfulness scores.
  3. Maintaining a mask that contains the colorfulness score for each superpixel.

Based on this mask we can then visualize the most colorful regions of the image. Regions of the image that are more colorful will have larger colorful metric scores, while regions that are less colorful will smaller values.

To learn more about superpixels and computing image colorfulness, just keep reading.

Looking for the source code to this post?
Jump right to the downloads section.

Labeling superpixel colorfulness with OpenCV and Python

In the first part of this blog post we will learn how to apply the SLIC algorithm to extract superpixels from our input image. The original 2010 publication by Achanta et al., SLIC Superpixels, goes into the details of the methodology and technique. We also briefly covered SLIC superpixels in this blog post for readers who want a more concise overview of the algorithm.

Given these superpixels, we’ll loop over them individually and compute their colorfulness score, taking care to compute the colorfulness metric for the specific region and not the entire image (as we did in our previous post).

After we implement our script, we’ll apply our combination of superpixel + image colorfulness to a set of input images.

Using superpixels for segmentation

Let’s get started by opening up a new file in your favorite editor or IDE, name it

colorful_regions.py
 , and insert the following code:
# import the necessary packages
from skimage.exposure import rescale_intensity
from skimage.segmentation import slic
from skimage.util import img_as_float
from skimage import io
import numpy as np
import argparse
import cv2

The first Lines 1-8 handle our imports — as you can see we make heavy use of several scikit-image functions in this tutorial.

The

slic
  function will be used to compute superpixels (scikit-image documentation).

Next, we will define our colorfulness metric function with a minor modification from the previous post where it was introduced:

def segment_colorfulness(image, mask):
        # split the image into its respective RGB components, then mask
        # each of the individual RGB channels so we can compute
        # statistics only for the masked region
        (B, G, R) = cv2.split(image.astype("float"))
        R = np.ma.masked_array(R, mask=mask)
        G = np.ma.masked_array(B, mask=mask)
        B = np.ma.masked_array(B, mask=mask)

        # compute rg = R - G
        rg = np.absolute(R - G)

        # compute yb = 0.5 * (R + G) - B
        yb = np.absolute(0.5 * (R + G) - B)

        # compute the mean and standard deviation of both `rg` and `yb`,
        # then combine them
        stdRoot = np.sqrt((rg.std() ** 2) + (yb.std() ** 2))
        meanRoot = np.sqrt((rg.mean() ** 2) + (yb.mean() ** 2))

        # derive the "colorfulness" metric and return it
        return stdRoot + (0.3 * meanRoot)

Lines 10-31 represent our colorfulness metric function, which has been adapted to compute the colorfulness for a specific region of an image.

The region can be any shape as we take advantage of NumPy masked arrays — only pixels part of the mask will be included in the computation.

For the specified

mask
  region of a particular
image
 , the
segment_colorfulness
  function performs the following tasks:
  1. Splits the image into RGB component channels (Line 14).
  2. Masks the
    image
    
      using
    mask
    
      (for each channel) so that the colorfulness is only performed on the area specified — in this case the region will be our superpixel (Lines 15-17).
  3. Uses the
    R
    
      and
    G
    
      components to compute
    rg
    
      (Line 20).
  4. Uses the RGB components to compute
    yb
    
      (Lines 23).
  5. Computes the mean and standard deviation of
    rg
    
      and
    yb
    
      whilst combining them (Lines 27 and 28).
  6. Does the final calculation of the metric and returns (Line 31) it to the calling function.

Now that our key colorfulness function is defined, the next step is to parse our command line arguments:

# construct the argument parse and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-i", "--image", required=True,
        help="path to input image")
ap.add_argument("-s", "--segments", type=int, default=100,
        help="# of superpixels")
args = vars(ap.parse_args())

On Lines 34-39 we make use of

argparse
  to define two arguments:
  1. --image
    
     : The path to our input image.
  2. --segments
    
     : The number of superpixels. The SLIC Superpixels paper shows examples of breaking an image up into different numbers of superpixels. This parameter is fun to experiment with (as it controls the level of granularity of your resulting superpixels); however we’ll be working with a
    default=100
    
     . The smaller the value, the fewer and larger the superpixels, allowing the algorithm running faster. The larger the number of segments, the more fine-grained the segmentation, but SLIC will take longer to run (due to more clusters needing to be computed).

Now it’s time to load the image into memory, allocate space for our visualization, and compute SLIC superpixel segmentation:

# load the image in OpenCV format so we can draw on it later, then
# allocate memory for the superpixel colorfulness visualization
orig = cv2.imread(args["image"])
vis = np.zeros(orig.shape[:2], dtype="float")

# load the image and apply SLIC superpixel segmentation to it via
# scikit-image
image = io.imread(args["image"])
segments = slic(img_as_float(image), n_segments=args["segments"],
        slic_zero=True)

On Line 43 we load our command line argument

--image
  into memory as
orig
  (OpenCV format).

We follow this step by allocating memory with the same shape (width and height) as the original input image for our visualization image,

vis
 .

Next, we load the command line argument

--image
  into memory as
image
 , this time in scikit-image format. The reason we use scikit-image’s
io.imread
  here is because OpenCV loads images in BGR order rather than RGB format (which scikit-image does). The
slic
  function will convert our input
image
  to the L*a*b* color space during the superpixel generation process assuming our image is in RGB format.

Therefore we have two choices:

  1. Load the image with OpenCV, clone it, and then swap the ordering of the channels.
  2. Simply load a copy of the original image using scikit-image.

Either approach is valid and will result in the same output.

Superpixels are calculated by a call to

slic
  where we specify
image
 ,
n_segments
 , and the 
slic_zero
 switch. Specifying
slic_zero=True
  indicates that we want to use the zero parameter version of SLIC, an extension to the original algorithm that does not require us to manually tune parameters to the algorithm. We refer to the superpixels as
segments
  for the rest of the script.

Now let’s compute the colorfulness of each superpixel:

# loop over each of the unique superpixels
for v in np.unique(segments):
        # construct a mask for the segment so we can compute image
        # statistics for *only* the masked region
        mask = np.ones(image.shape[:2])
        mask[segments == v] = 0

        # compute the superpixel colorfulness, then update the
        # visualization array
        C = segment_colorfulness(orig, mask)
        vis[segments == v] = C

We start by looping over each of the individual

segments
  on Line 52.

Lines 56 and 57 are responsible for constructing a

mask
  for the current superpixel. The
mask
  will have the same width and height as our input image and will be filled (initially) with an array of ones (Line 56).

Keep in mind that when using NumPy masked arrays, that a given entry in an array is only included in a computation if the corresponding

mask
  value is set to zero (implying that the pixel is unmasked). If the value in the
mask
  is one, then the value is assumed to be masked and is hence ignored.

Here we initially set all pixels to masked, then set only the pixels part of the current superpixel to unmasked (Line 57).

Using our

orig
  image and our
mask
  as parameters to
segment_colorfulness
 , we can compute
C
, which is the colorfulness of the superpixel (Line 61).

Then, we update our visualization array,

vis
 , with the value of
C
(Line 62).

At this point, we have answered PyImageSearch reader, Stephan’s question — we have computed the colorfulness for different regions of an image.

Naturally we will want to see our results, so let’s continue by constructing a transparent overlay visualization for the most/least colorful regions in our input image:

# scale the visualization image from an unrestricted floating point
# to unsigned 8-bit integer array so we can use it with OpenCV and
# display it to our screen
vis = rescale_intensity(vis, out_range=(0, 255)).astype("uint8")

# overlay the superpixel colorfulness visualization on the original
# image
alpha = 0.6
overlay = np.dstack([vis] * 3)
output = orig.copy()
cv2.addWeighted(overlay, alpha, output, 1 - alpha, 0, output)

Since

vis
  is currently a floating point array, it is necessary to re-scale it to a typical 8-bit unsigned integer [0-255] array. This is important so that we can display the output image to our screen with OpenCV. We accomplish this by using the
rescale_intensity
  function (from
skimage.exposure
 ) on Line 67.

Now we’ll overlay the superpixel colorfulness visualization on top of the original image. We’ve already discussed transparent overlays and the

cv2.addWeighted
  (and associated parameters), so please refer to this blog post for more details on how transparent overlays are constructed.

Finally, let’s display images to the screen and close out this script:

# show the output images
cv2.imshow("Input", orig)
cv2.imshow("Visualization", vis)
cv2.imshow("Output", output)
cv2.waitKey(0)

We will display three images to the screen using

cv2.imshow
, including:
  1. orig
    
     : Our input image.
  2. vis
    
     : Our visualization image (i.e., level of colorfulness for each of the superpixel regions).
  3. output
    
     : Our output image.

Superpixel and colorfulness metric results

Let’s see our Python script in action — open a terminal,

workon
  your virtual environment if you are using one (highly recommended), and enter the following command:
$ python colorful_regions.py --image images/example_01.jpg

Figure 1: Computing a region-based colorfulness score using superpixel segmentation.

On the left you can see the original input image, a photo of myself exploring Antelope Canyon, arguably the most beautiful slot canyon in the United States. Here we can see a mixture of colors due to the light filtering in from above.

In the middle we have our computed visualization for each of the 100 superpixels. Dark regions in this visualization refer to less colorful regions while light regions indicate more colorful.

Here we can see the least colorful regions are around the walls of the canyon, closest to the camera — this is where the least light is researching.

The most colorful regions of the input image are found where the light is directly reaching inside the canyon, illuminating part of the wall like candlelight.

Finally, on the right we have our original input image overlaid with the colorfulness visualization — this image allows us to more easily identify the most/least colorful regions of the image.

The following image is a photo of myself in Boston by the iconic Citgo sign overlooking Kenmore square:

$ python colorful_regions.py --image images/example_02.jpg

Figure 2: Using superpixels, we can first segment our image, and then compute a colorfulness score for each region.

Here we can see the least colorful regions of the image are towards the bottom where the shadow is obscuring much of the sidewalk. The more colorful regions can be found towards the sign and sky itself.

Finally, here is a photo from Rainbow Point, the highest elevation in Bryce Canyon:

$ python colorful_regions.py --image images/example_03.jpg

Figure 3: Labeling individual superpixels in an image based on how “colorful” each region is.

Notice here that my black hoodie and shorts are the least colorful regions of the image, while the sky and foliage towards the center of the photo are the most colorful.

Summary

In today’s blog post we learned how to use the SLIC segmentation algorithm to compute superpixels for an input image.

We then accessed each of the individual superpixels and applied our colorfulness metric.

The colorfulness scores for each region were combined into a mask, revealing the most colorful and least colorful regions of the input image.

Given this computation, we were able to visualize the colorfulness of each region in two ways:

  1. By examining the raw
    vis
    
      mask.
  2. Creating a transparent overlay that laid
    vis
    
      on top of the original image.

In practice, we could use this technique to threshold the mask and extract only the most/least colorful regions.

To be notified when future tutorials are published here on PyImageSearch, be sure to enter your email address in the form below!

Downloads:

If you would like to download the code and images used in this post, please enter your email address in the form below. Not only will you get a .zip of the code, I’ll also send you a FREE 11-page Resource Guide on Computer Vision and Image Search Engines, including exclusive techniques that I don’t post on this blog! Sound good? If so, enter your email address and I’ll send you the code immediately!

The post Labeling superpixel colorfulness with OpenCV and Python appeared first on PyImageSearch.



from PyImageSearch http://ift.tt/2sIiA5e
via IFTTT