Latest YouTube Video

Saturday, August 5, 2017

Depression Anonymous; The Big Book on Depression Addiction

When you feel depressed, suffering from a deep sadness, do you feel powerless over your mood? Does your life feel unmanageable because of it?

from Google Alert - anonymous http://ift.tt/2vBDFjH
via IFTTT

opt out of having anonymous data shared with 3rd parties

I have received an email this week about being able to opt out of having anonymous data shared with 3rd parties by Optus. I cant find how to do this.

from Google Alert - anonymous http://ift.tt/2ucyQtw
via IFTTT

Orioles send P Chris Tillman to the bullpen (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Chris is Anonymous

Chris is Anonymous (@chrisisanonymous) from Chester, NY, United States. 29 from Ny. Love to laugh. Twitter @chrisisanonym 18+ please.

from Google Alert - anonymous http://ift.tt/2uvcXVQ
via IFTTT

Anonymous - Assistant General Manager

Anonymous - Assistant General Manager – Boston Restaurant Jobs - BostonChefs.com's Industry Insider, the best jobs at Boston restaurants.

from Google Alert - anonymous http://ift.tt/2vBHpm0
via IFTTT

GSoC - Mid evaluation presentation - Anonymous patient registration project

Here's my short video on current progress of the Anonymous Patient registration Project. Do let me know your suggestions.. :slight_smile:

from Google Alert - anonymous http://ift.tt/2wuopCo
via IFTTT

Marcus Hutchins (MalwareTech) Gets $30,000 Bail, But Can't Leave United States

Marcus Hutchins, the malware analyst who helped stop global Wannacry menace, has reportedly pleaded not guilty to charges of creating and distributing the infamous Kronos banking malware and is set to release on $30,000 bail on Monday. Hutchins, the 23-year-old who operates under the alias MalwareTech on Twitter, stormed to fame and hailed as a hero over two months ago when he stopped a


from The Hacker News http://ift.tt/2vBIaM4
via IFTTT

Gravity s Grin


Albert Einstein's general theory of relativity, published over 100 years ago, predicted the phenomenon of gravitational lensing. And that's what gives these distant galaxies such a whimsical appearance, seen through the looking glass of X-ray and optical image data from the Chandra and Hubble space telescopes. Nicknamed the Cheshire Cat galaxy group, the group's two large elliptical galaxies are suggestively framed by arcs. The arcs are optical images of distant background galaxies lensed by the foreground group's total distribution of gravitational mass. Of course, that gravitational mass is dominated by dark matter. The two large elliptical "eye" galaxies represent the brightest members of their own galaxy groups which are merging. Their relative collisional speed of nearly 1,350 kilometers/second heats gas to millions of degrees producing the X-ray glow shown in purple hues. Curiouser about galaxy group mergers? The Cheshire Cat group grins in the constellation Ursa Major, some 4.6 billion light-years away. via NASA http://ift.tt/2fdbVf2

AR2665: The Lonely Sunspot of Solar Minimum

A large, lone sunspot group marches across the solar disk over a period of almost two weeks. The spot group stands out during this minimum in solar activity. During the nearly two weeks of observations, a couple of instrument calibration maneuvers occurred. One happened on July 5, starting around 13:30UT (ending around 16:10UT), and another on July 12 around 15:10 UT (ending around 21:10UT).

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2wg4AzB
via IFTTT

Friday, August 4, 2017

Anonymous tip leads to seven drug arrests

Anonymous tip leads to seven drug arrests. 08/04/2017. Salyersville, Ky.--The Magoffin County Sheriff's Department responded a complaint of a ...

from Google Alert - anonymous http://ift.tt/2vyZfp2
via IFTTT

▶ Tigers and Orioles forget inning is over, leading to befuddled looks on the diamond - #SCNotTop10 (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Flix Anonymous - Episode 36

Trev and Steve spend 30 minutes reviewing this week's crop of new film releases like The Dark Tower. Is the Academy Award hype justified for the ...

from Google Alert - anonymous http://ift.tt/2vyao9Q
via IFTTT

Orioles: Trey Mancini will miss Friday vs. Tigers after fouling ball off knee Thursday (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Producer at Anonymous Content Seeks Assistant

Producer at Anonymous Content Seeks Assistant · August 4, 2017. You must Login or Register to view this content. Share This Share on Facebook ...

from Google Alert - anonymous http://ift.tt/2usvjXp
via IFTTT

▶ #ICYMI: Manny Machado, Orioles go around the horn for 5-4-3 triple play (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

This Just In: Ravens sign Austin Howard, who's expected to compete for starting RT spot - Adam Schefter (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Ravens close to finalizing deal with former Raiders OT Austin Howard - Adam Schefter (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 8/03/2017

Sarcolab-3:  With assistance from an operator, a USOS crewmember ingressed the Muscle Atrophy Research & Exercise System (MARES) chair in the Columbus module, installed the Electromyograph and Percutaneous Electrical Stimulation (PEMS) device and adjusted pads and constraints for the Sarcolab-3 ankle protocol.  The operator then collected ultrasound images of the subject’s right leg during exercise activities. Ground experts are evaluating anomalies that occurred during the investigation that prevented completion of today’s session.  Later in the day a crewmember installed the mechanisms specific to the knee configuration for Sarcolab-3 operations tomorrow. The data collected for Sarcolab-3 will be compared to pre and post flight measurements to assess the impact of hypothesized microgravity induced muscle loss.  Myotendinous and Neuromuscular Adaptation to Long-term Spaceflight (Sarcolab) investigates the adaptation and deterioration of the soleus (calf muscle) where it joins the Achilles tendon, which links it to the heel and carries loads from the entire body. Muscle fiber samples are taken from crew members before and after flight and analyzed for changes in structural and chemical properties. MRI and ultrasound tests and electrode stimulation are conducted to help assess muscle and tendon changes caused by microgravity exposure. Electrostatic Levitation Furnace (ELF): The crew replaced sample cartridges in the ELF, an experimental facility designed to levitate, melt and solidify materials by containerless processing techniques using the Electrostatic Levitation method. With this facility, thermophysical properties of high temperature melts can be measured, and solidification from deeply undercooled melts can be achieved. NanoRacks Platforms 2 and 3: The crew installed NanoRacks Platform 2 and 3 in the Japanese Experiment Module (JEM) to support investigation hardware arriving on SpaceX-12.  These NanoRack platforms are multipurpose research facilities that provide power and data transfer capabilities for NanoRacks Module investigations. Improved Payload Ethernet Hub Gateway (iPEHG):  The crew installed an iPEHG in Express Rack (ER) 4. The new iPEHG design corrects performance limitations often experienced by the older PEHGs.  Mobile Servicing System (MSS) Operations: Yesterday afternoon, Robotics Ground Controllers translated the Mobile Transporter (MT) from Worksite 8 (WS8) to WS4. They then stowed Special Purpose Dexterous Manipulator (SPDM) on Mobile Base System (MBS) Power Data Grapple Fixture 2 (PDGF2) and walked the Space Station Remote Manipulator System (SSRMS) off MBS PDGF3 onto the Lab PDGF. Today’s Planned Activities All activities were completed unless otherwise noted. Express Rack 4 Rotate Prep Fine Motor Skills Experiment Test – Subject Measuring Partial CO Pressure in RS using US portable CSA-CP device Gathering EVA-43 Equipment and Tools. Consolidation of EVA bundles. Electrostatic Levitation Furnace(ELF) sample Cartridge Retrieval MARES Ankle Shaving Preparation Electrostatic Levitation Furnace(ELF) Chamber Clean Ultrasound 2 HRF Rack 2 Power On MARES Ultrasound Session Assistance MARES Ultrasound session Electrostatic Levitation Furnace(ELF) sample Cartridge Installation PEHG Hardware Install MARES subject electrodes equipment Ultrasound 2 Guided Data Export MARES subject electrodes equipment assistance BIOCARD. Experiment Session (assist) BIOCARD. Experiment Session Space Automated Bioproduct Lab Filter Clean Handover of Increment 52 Crew Human Research Facility Ultrasound 2 power off and stowage MARES Power On and Battery Charge CALCIUM. Experiment Session 10 Inspection and photography of SM window shutters SARCOLAB. MARES knee configuration installation Express Rack 4 Umbilical Mate Habitability Human Factors Directed Observations – Subject Long Duration Sorbent Testbed Status Check. Rodent Research Access Unit Clean MARES Battery Charge control MELFI 1 Switch Repair CIR Hardware Gather NanoRacks Platform-2 Install NanoRacks Platform-3 Install Two-Phase Flow (TPF) Experiment Laptop Terminal 2 (ELT2) Setup Multi-purpose Small Payload Rack (MSPR) Two-Phase Flow Experiment Equipment Activation Robot Startup Completed Task List Items None Ground Activities All activities were completed unless otherwise noted. ER4 iPEHG install support SSRMS 50S Starboard survey Three-Day Look Ahead: Friday, 08/04: Dragon OBT, RR5 fixative swap, Cupola window #6 scratch pane R&R Saturday, 08/05: RR5 fixative swap, housekeeping Sunday, 08/06: RR5 fixative swap, crew off duty QUICK ISS Status – Environmental Control Group:   Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off           [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Standby Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Full up Trace Contaminant Control System (TCCS) Node 3 Off  

from ISS On-Orbit Status Report http://ift.tt/2vwtL2W
via IFTTT

I have a new follower on Twitter


MotoGo
Car mechanic. Underappreciated but love life! And Cars of course
Austin, TX

Following: 572 - Followers: 1202

August 04, 2017 at 07:51AM via Twitter http://twitter.com/MotorGoer

[FD] t2'17: Challenge – a break from tradition

This year’s pre-conference challenge will be a t2 exclusive bug bounty. For more information on how to participate, please see: http://ift.tt/2vyJIGv As we’ve been organizing challenges for over a decade, you might wonder why change now? For several years in a row, the challenge participant numbers have been steadily declining, despite increased efforts put into creating the technical puzzles, challenge descriptions and back stories, and actual promotion. It’s not just the number of submissions, but also the downloads and page views. Thomas Malmberg[0] kindly pointed out that with conference challenges we’re competing for people’s time – this is the arena where also bug bounties play. It was time for us to either adapt or perish. This being t2, failure was not an option and quitting is something you do for apps, not in real life. With conference budgets one simply does not organize a bug bounty – you need friends’ help for that. That is the reason we partnered up with LocalTapiola[1] to provide you a t2 exclusive bug bounty, targeting a real world business application running in production environment. To make sure the spirit of t2 challenges is still there, we are emphasizing the vulnerability quality and proof of exploitability. The challenge is not a speed competition – the most elegant and meaningful vulnerability submission will receive the free ticket, and we have adjusted the whole bug bounty process to reflect that. Once you convert someone else’s medium severity local file read into unauthenticated remote code execution, you start to value proper analysis and investigation into the technical details of a vulnerability. In other words, 2002 called – they want their apache-scalp.c[2] back. The 15 year anniversary is a pure co-incidence, as is Dave Aitel’s headline keynote[3] at t2’17, the stars just happened to align the right way, like good exploitation primitives after putting in the time and effort. The challenge is dead. Long live the challenge. We hope you enjoy the reinvigorated format! [0] https://twitter.com/tsmalmbe [1] http://ift.tt/2u9Ih1f [2] http://ift.tt/2lWyXox [3] http://ift.tt/2uagiyg

Source: Gmail -> IFTTT-> Blogger

[FD] Format Factory DLL Hijacking Vulnerability

Format Factory DLL Hijacking Vulnerability Product

Source: Gmail -> IFTTT-> Blogger

I have a new follower on Twitter


Golang UK Conference
Golang UK Conference is an annual event for go developers: professional development, industry updates & training. Coming August 16th*, 17th and 18th 2017.
London, UK
https://t.co/YNYtZda0DW
Following: 3638 - Followers: 2242

August 04, 2017 at 04:46AM via Twitter http://twitter.com/GolangUKconf

Hacker Sentenced to 46 Months in Prison for Spreading Linux Malware

A Russian man accused of infecting tens of thousands of computer servers worldwide to generate millions in fraudulent payments has been imprisoned for 46 months (nearly four years) in a United States' federal prison. 41-year-old Maxim Senakh, of Velikii Novgorod, was arrested by Finnish police in August 2015 for his role in the development and maintenance of the infamous Linux botnet called


from The Hacker News http://ift.tt/2u6mROb
via IFTTT

Staff of the Michigan State Medical Society

Yvette Rosier wrote - Michael Kelly, son of the late Kevin Kelly, is an organizer for Fleece and Thank You, a charitable organization that assembles ...

from Google Alert - anonymous http://ift.tt/2vys7i7
via IFTTT

Entrepreneurs Anonymous

Entrepreneurs Anonymous - Past Team | crunchbase.

from Google Alert - anonymous http://ift.tt/2v4uvKg
via IFTTT

North North Temperate Zone Little Red Spot


On July 11, the Juno spacecraft once again swung near the turbulent Jovian cloud tops. On its seventh orbital closest approach this perijove passage brought Juno within 3,500 kilometers of the Solar System's largest planetary atmosphere. Near perijove the rotating JunoCam was able to record this stunning, clear view of one of Jupiter's signature vortices. About 8,000 kilometers in diameter, the anticyclonic storm system was spotted in Jupiter's North North Temperate Zone in the 1990s. That makes it about half the size of an older and better known Jovian anticyclone, the Great Red Spot, but only a little smaller than planet Earth. At times taking on reddish hues, the enormous storm system is fondly known as a North North Temperate Zone Little Red Spot. via NASA http://ift.tt/2vkZKU4

▶ Manny Machado swings so hard that he completely whiffs and ends up on his back - #SCNotTop10 (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Thursday, August 3, 2017

Curb Your Enthusiasm: The Anonymous Quiz

Curb Your Enthusiasm: The Anonymous Quiz [18]. THIS IS WHAT WE DO To celebrate the new season of Curb Your Enthusiasm, bring a pen (mints ...

from Google Alert - anonymous http://ift.tt/2wqcZ2u
via IFTTT

Students Promote Positivity Through Anonymous Social Media Page

The Instagram account @LNBeauts was launched in 2014 by its then-anonymous creator Mary Francis Stuff. Stuff was in her senior year at Lawrence ...

from Google Alert - anonymous http://ift.tt/2hripHY
via IFTTT

Global Witness' response to new US Senate bill aimed at ending anonymous companies used as ...

Today, with the introduction of the Corporate Transparency Act, the US Senate reaffirmed their commitment to putting an end to anonymous shell ...

from Google Alert - anonymous http://ift.tt/2fcvh4b
via IFTTT

Ravens: Ryan Mallett shakes off struggles, delivers best camp practice - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


Wave
Meeting up with your friends & family was never easier! Find out now for free why we are already millions of people waving ;)
Universe
https://t.co/iLmmNE3LXj
Following: 98087 - Followers: 131295

August 03, 2017 at 04:06PM via Twitter http://twitter.com/WaveApplication

Docker for Windows 2016 recreates anonymous volumes on container recreate

Docker for Windows 2016 recreates anonymous volumes on container recreate #34392. Open. drnybble opened this Issue 19 minutes ago · 0 ...

from Google Alert - anonymous http://ift.tt/2u7RJCf
via IFTTT

I have a new follower on Twitter


Mark Stevenson
#Data❗️ Head Hunter | London | USA #Data❗️ Science | Noodles | Music | #Data❗️ Analytics | @nakamaglobal
London, England
https://t.co/cFLNJcfS40
Following: 9635 - Followers: 61633

August 03, 2017 at 02:06PM via Twitter http://twitter.com/TheDataAgent

FBI Arrested Researcher Who Found ‘Kill-Switch’ to Stop Wannacry Ransomware

The 22-year-old British security researcher who gained fame for discovering the "kill switch" that stopped the outbreak of the WannaCry ransomware—has been reportedly arrested in the United States after attending the Def Con hacking conference in Las Vegas. Marcus Hutchins, operates under the alias MalwareTech on Twitter, was detained by the FBI in the state of Nevada, a friend of Hutchins


from The Hacker News http://ift.tt/2v2N5T9
via IFTTT

anonymous java class generation using jdt and lombok

I'm trying to generate a field or local variable with anonymous class initialization in eclipse using lombok. If I run the code everything works fine but the ...

from Google Alert - anonymous http://ift.tt/2hrxp8N
via IFTTT

Hackers Behind WannaCry Ransomware Withdraw $143,000 From Bitcoin Wallets

The cyber criminals behind the global WannaCry ransomware attack that caused chaos worldwide have finally cashed out their ransom payments. Nearly three months ago, the WannaCry ransomware shut down hospitals, telecom providers, and many businesses worldwide, infecting hundreds of thousands of computers in more than 150 countries, encrypting files and then charging victims $300-$600 for the keys


from The Hacker News http://ift.tt/2vsMnAD
via IFTTT

ISS Daily Summary Report – 8/02/2017

Sarcolab-3:  With assistance from an operator, a Russian crewmember ingressed the Muscle Atrophy Research & Exercise System (MARES) chair in the Columbus module, installed the Electromyograph and Percutaneous Electrical Stimulation (PEMS) device and adjusted pads and constraints for the Sarcolab-3 ankle protocol.  The operator then collected ultrasound images of the subject’s right leg. The data collected for Sarcolab-3 will be compared to pre and postflight measurements to assess the impact of hypothesized microgravity induced muscle loss.  Myotendinous and Neuromuscular Adaptation to Long-term Spaceflight (Sarcolab) investigates the adaptation and deterioration of the soleus (calf muscle) where it joins the Achilles tendon, which links it to the heel and carries loads from the entire body. Muscle fiber samples are taken from crew members before and after flight, and analyzed for changes in structural and chemical properties. MRI and ultrasound tests and electrode stimulation are conducted to help assess muscle and tendon changes caused by microgravity exposure. Rodent Research-5 (RR-5) Systemic Therapy of NELL-1 for Osteoporosis:  The crew completed the final day of bone scans and sampling for RR-5.  Because spaceflight has significant and rapid effects on the musculoskeletal system, it is important to investigate targeted therapies that could ameliorate some of the detrimental effects of spaceflight. The NELL-1 drug being studied in the RR-5 investigation has the potential to slow or reverse bone loss during spaceflight. MagVector:  The crew performed closeout and cleanup activities for science run 10 of MagVector.  The European Space Agency (ESA) MagVector investigation studies how Earth’s magnetic field interacts with an electrical conductor. Using extremely sensitive magnetic sensors placed around and above a conductor, researchers can gain insight into ways that the magnetic field influences how conductors work. This research not only helps improve future International Space Station experiments and electrical experiments, but it could offer insights into how magnetic fields influence electrical conductors in general – the backbone of our technology. Space Headaches:  The 51 Soyuz (51S) USOS crewmembers continued filling out daily questionnaires for the ESA Space Headaches investigation today. The questionnaires are used during the first week of the USOS crewmember’s arrival at the ISS. The Space Headaches investigation collects information that may help in the development of methods to alleviate associated symptoms and improvement in the well-being and performance of crewmembers in space. Headaches during space flight can negatively affect mental and physical capacities of crewmembers that can influence performance during a space mission. Food Acceptability:  The crew completed a Food Acceptability questionnaire. The investigation seeks to determine the impact of repetitive consumption of food currently available from the spaceflight food system.  Results will be used in developing strategies to improve food system composition to support crew health and performance on long duration missions.  Extravehicular Mobility Unit (EMU) Cooling Loop Maintenance: The crew performed ionic and particulate filtration and biocidal maintenance on EMUs 3006 and 3008 and Airlock cooling water loops. A water sample was taken for conductivity testing. On Board Training (OBT) ISS Emergency Hardware Familiarization: The 51S crew completed this OBT to review the emergency equipment and configuration of the ISS. Mobile Servicing System (MSS) Operations: Last evening, Robotics Ground Controllers maneuvered the Space Station Remote Manipulator System (SSRMS) and the Special Purpose Dexterous Manipulator (SPDM) outboard of the Port Solar Alpha Rotary Joint (SARJ) to support troubleshooting of the P6 Long Spacer outboard spare Pump Flow Control Subassembly (PFCS). After de-mating the PFCS’s two Fluid Quick Disconnect Couplings (FQDCs) and unfastening its tie-down bolt, SPDM Orbit Replaceable Unit (ORU) Tool Changeout Mechanism 1 (OTCM1) unfastened its H4 bolt to electrically de-mated the PFCS from P6.  The Remote Power Controller for this PFCS was then closed to see if it would trip, which it did not.  After the RPC had been re-opened, OTCM1 re-mated the PFCS. The RPC was then closed again and it tripped with a true overcurrent.  OTCM1 re-fastened the PFCS tie-down bolt and then the SSRMS and SPDM were maneuvered back inboard of the SARJ and configured for the Mobile Transporter translation from Work Site (WS) 8 to WS4 scheduled later today.  Today’s Planned Activities All activities were completed unless otherwise noted. Miniature Exercise Device Operations Session Soyuz 735 Samsung PC Battery check and recharge (if charge level is below 80%) Test video coverage for RT channel CONTENT. Experiment Ops PILOT-T. Experiment Ops Preparation of Reports for Roscosmos web site and social media URAGAN. Observation and Photography ECON-M. Observation and photography Extravehicular Mobility Unit (EMU) Cooling Loop Maintenance Scrub Initiation Handover of Increment 52 Crew RS Photo Cameras Sync Up to Station Time SARCOLAB (MARES) Compound Specific Analyzer-Combustion Products (CSA-CP) Checkout Part 2 Extravehicular Mobility Unit (EMU) Post Scrub Cooling Loop Water (H2O) Sample Extravehicular Mobility Unit (EMU) Cooling Loop Maintenance Iodination Extravehicular Mobility Unit (EMU) Conductivity Test JEM ORU Xfer I/F Gather Health Maintenance System (HMS) Automated External Defibrillator (AED) Inspection IMAK Unpack Troubleshooting RSS2 laptop Inter-computer exchange [МКО] application. IPEHG Installation Review Crew Medical Officer (CMO) Proficiency Training EVA Extravehicular Mobility Unit (EMU) Cooling Loop Scrub Deconfiguration ISS Crew Orientation Rodent Research 5 Sample Operations ISS Crew Orientation Video Recording of Greetings Stow Syringes used in H2O Conductivity Test Familiarization with Auxiliary Computer System HRF Generic Refrigerated Centrifuge Spin Conclude Space Headaches – Daily Questionnaire Integrated Emergency Procedure Review Emergency Mask OBT HRF Generic Refrigerated Centrifuge Spin Conclude Final Food Acceptability Questionnaire – Subject Systems Operations Data File (SODF) EVA BOOK UPDATE USB Jumpdrive Return and PPS1 Reconfiguration ISS Emergency Hardware Familiarization OBT PEHG Hardware Install  Completed Task List Items iPad Air 2 FIT Settings Update Ground Activities All activities were completed unless otherwise noted. EMU loop scrub support RR5 ops support MT translate from WS8 to WS4 and SPDM stow Three-Day Look Ahead: Thursday, 08/03: Fine Motor Skills, MARES ops, ER4 iPEHG install, Meteor hard drive swap, SABL filter cleaning Friday, 08/04: Dragon OBT, RR5 fixative swap, Cupola window #6 scratch pane R&R Saturday, 08/05: RR5 fixative swap, housekeeping QUICK ISS Status – Environmental Control Group:   Component Status Elektron On Vozdukh Manual [СКВ] 1 – […]

from ISS On-Orbit Status Report http://ift.tt/2v2sZYY
via IFTTT

This is How CIA Disables Security Cameras During Hollywood-Style Operations

In last 20 years, we have seen hundreds of caper/heist movies where spies or bank robbers hijack surveillance cameras of secure premises to either stop recording or set up an endless loop for covert operations without leaving any evidence. Whenever I see such scenes in a movie, I wonder and ask myself: Does this happen in real-life? Yes, it does, trust me—at least CIA agents are doing this.


from The Hacker News http://ift.tt/2umV1MT
via IFTTT

[InsideNothing] Computer liked your post "[FD] DefenseCode Security Advisory: IBM DB2 Command Line Processor Buffer Overflow"



Source: Gmail -> IFTTT-> Blogger

Hackers Hijacked Chrome Extension for Web Developers With Over 1 Million Users

From past few years, spammers and cyber criminals were buying web extensions from their developers and then updating them without informing their users to inject bulk advertisements into every website user visits in order to generate large revenue. But now they have shifted their business model—instead of investing, spammers have started a new wave of phishing attacks aimed at hijacking


from The Hacker News http://ift.tt/2hqCOwV
via IFTTT

An anonymous boost for Chappaqua Performing Arts Center

The Chappaqua Performing Arts Center is an auditorium that was build by the founders of Readers' Digest, on a property now called Chappaqua ...

from Google Alert - anonymous http://ift.tt/2umpoDl
via IFTTT

FREE & Anonymous

Trapped in a monotonous relationship? Miss feeling passion and excitement? Relive the passion - find an affair! 100% anonymous and discreet.

from Google Alert - anonymous http://ift.tt/2hp2Pwu
via IFTTT

Pelican Nebula Close Up


The prominent ridge of emission featured in this vivid skyscape is designated IC 5067. Part of a larger emission region with a distinctive shape, popularly called The Pelican Nebula, the ridge spans about 10 light-years and follows the curve of the cosmic pelican's head and neck. Fantastic, dark shapes inhabiting the view are clouds of cool gas and dust sculpted by energetic radiation from young, hot, massive stars. But stars are also forming within the dark shapes. Twin jets emerging from the tip of the long, dark tendril left of center are the telltale signs of an embedded protostar cataloged as Herbig-Haro 555 (HH 555). In fact, other Herbig-Haro objects indicating the presence of protostars are found within the frame. The Pelican Nebula itself, also known as IC 5070, is about 2,000 light-years away. To find it, look northeast of bright star Deneb in the high flying constellation Cygnus. via NASA http://ift.tt/2f7Hbfv

Wednesday, August 2, 2017

▶ Caleb Joseph uncorks two-run blast to pad the lead in 6-0 win over Royals (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Anonymous-I by opabobby

collab Separate tracks available on request. Lyric and Vocal would be nice.

from Google Alert - anonymous http://ift.tt/2wmN386
via IFTTT

Ravens: John Harbaugh says indications have been "very positive" about Joe Flacco's back (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

How are student numbers allocated in anonymous

Hi, How are student numbers allocated when anonymous marking is turned on? I thought it was to do with the first student interacting with a course.

from Google Alert - anonymous http://ift.tt/2vkbo1z
via IFTTT

Preview does not work for anonymous users

I have a webform that anonymous users fill out. I would like to use the preview button, but I'm getting php warnings (see below) when the 'previous' ...

from Google Alert - anonymous http://ift.tt/2vuhVap
via IFTTT

Ravens: Joe Flacco trying to look past brutal camp start; "Things happen to guys" (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

O Sanctissima (Anonymous)

O Sanctissima (Anonymous) ... Work Title, O Sanctissima. Alternative. Title. Composer, Anonymous. Key, D major. Librettist, Unknown. Language ...

from Google Alert - anonymous http://ift.tt/2ukFkG1
via IFTTT

New IoT Bill Proposes Security Standards for Smart Devices

By this time, almost every one of you owns at least one internet-connected device—better known as the "Internet of things"—at your home, but how secure is your device? We have recently seen Car hacking that could risk anyone's life, Hoverboard hacking, even hacking of a so-called smart Gun and also the widespread hacks of insecure CCTV cameras, routers and other internet-connected home


from The Hacker News http://ift.tt/2u0o21P
via IFTTT

This Just In: Ozzie Newsome says Steve Bisciotti hasn't told Ravens they can't sign Colin Kaepernick (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

NFL: John Harbaugh and Ozzie Newsome support Colin Kaepernick signing, but Ravens owner resistant - Dianna Russini (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Inside the Orioles' baffling decision not to sell at trade deadline - Eddie Matz (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

ISS Daily Summary Report – 8/01/2017

Sarcolab-3:  With assistance from a Russian operator, a USOS crewmember ingressed the Muscle Atrophy Research & Exercise System (MARES) chair in the Columbus module and adjusted pads and constraints for the Sarcolab-3 ankle protocol. The operator then collected ultrasound images of the subject’s right leg. Ground experts are evaluating anomalies that occurred during the investigation that prevented completion of the session.  The data collected for Sarcolab-3 will be compared to pre and post flight measurements to assess the impact of hypothesized microgravity induced muscle loss.  Myotendinous and Neuromuscular Adaptation to Long-term Spaceflight (Sarcolab) investigates the adaptation and deterioration of the soleus (calf muscle) where it joins the Achilles tendon, which links it to the heel and carries loads from the entire body. Muscle fiber samples are taken from crew members before and after flight, and analyzed for changes in structural and chemical properties. MRI and ultrasound tests and electrode stimulation are conducted to help assess muscle and tendon changes caused by microgravity exposure. Rodent Research-5 (RR-5) Systemic Therapy of NELL-1 for Osteoporosis: The crew completed the third of four days of bone scans and sampling for RR-5.  Because spaceflight has significant and rapid effects on the musculoskeletal system, it is important to investigate targeted therapies that could ameliorate some of the detrimental effects of spaceflight. The NELL-1 drug being studied in the RR-5 investigation has the potential to slow or reverse bone loss during spaceflight. Space Headaches:  The 51 Soyuz (51S) USOS crewmembers continued completion of daily questionnaires for the European Space Agency (ESA) Space Headaches investigation. The daily questionnaires are used during the first week of USOS crewmember’s arrival at the ISS. The Space Headaches investigation collects information that may help in the development of methods to alleviate associated symptoms and improvement in the well-being and performance of crewmembers in space. Headaches during space flight can negatively affect mental and physical capacities of crewmembers that can influence performance during a space mission. Japanese Experiment Module (JEM) Layer 2 Ethernet and Multiplexer (LEHX):  The crew removed and replaced the LEHX 1553B module. The LEHX has experienced communication issues since December, 2016 with an increase in their frequency over time.  Tropical Cyclone: This morning the crew took pictures of the Category 3 Typhoon Noru in the western Pacific. The Tropical Cyclone investigation is used to capture images of tropical cyclones and hurricanes that are rated at Category 3 or greater on the Saffir-Simpson scale. A pseudo-stereoscopic method is used to determine the altitudes of the cloud tops near the center (eye) of a cyclone by precisely tracking the apparent positions of cloud features with respect to the Earth and how those positions change over time as an observer (the ISS in this case) passes over the storm. The photographic images will be used to demonstrate that pseudo-spectroscopy can be used to measure the cloud altitudes to sufficient precision so that, when combined with other remote-sensing data, an accurate determination of the intensity of hurricane or cyclone can be made.  Express Rack (ER) 4 Quick Disconnect (QD) Maintenance: During a Rack Interface Controller (RIC) R&R in 2012, the crew demated umbilicals behind the rack and observed 3 different leaking QDs. A workaround was developed to contain the leaks but teams advised that QD troubleshooting and maintenance should be scheduled prior to rotating the rack again. This Thursday, the crew is scheduled to remove the Payload Ethernet Hub Bridge (PEHB) and replace it with an Improved Payload Ethernet Hub Gateway (iPEHG) which requires ER4 rotation. Today the crew performed this corrective QD maintenance ahead of Thursday’s planned activities.  Today’s Planned Activities All activities were completed unless otherwise noted. Test video coverage for RT channel PILOT-T. Experiment Ops Preparation of Reports for Roscosmos web site and social media Preventive Maintenance of SM Ventilation Subsystem. Group А ECON-M. Observation and photography Microbial Tracking-2 Body Sample Collection Microbial Tracking-2 Saliva Sample MELFI Insert Tropical Cyclone Untended Operations Fine Motor Skills Experiment Test – Subject JEM Layer2 Ethernet Hub and Multiplexer (LEHX) 1553B Task Review Microbial Tracking-2 Saliva Stow JEMRMS Backup Controller (BUC) Power On JEM Layer 2 Ethernet and Multiplexer (LEHX) Removal DECLIC Facility and High Temperature Insert CTB Retrieve Human Research Facility Ultrasound 2 set up and power on Soyuz 736 Samsung Tablet Recharge, Initiate Verification of ИП-1 Flow Sensor Position Tropical Cyclone Hardware Closeout MARES Ultrasound session [Not completed] MCT Manual Scan Alternate Verification of ИП-1 Flow Sensor Position Preventive Maintenance of SM Ventilation Subsystem. Group А Ultrasound 2 Guided Data Export JEM Layer 2 Ethernet and Multiplexer (LEHX) 1553B Removal and Replacement Quick Disconnect (QD) Maintenance for ExPRESS Rack 4 Part 1 JEM Layer 2 Ethernet and Multiplexer (LEHX) Installation Part 1 JEM Camera Robot Cable Swap DECLIC Facility and High Temperature Insert Removal Installation of the DOSIS 3D passive detector packs in Columbus and photo documentation. JEMRMS BUC Power Off MARES Ankle setting adjustments Quick Disconnect (QD) Maintenance for ExPRESS Rack 4 Part 2 Rodent Research Node 2 Camcorder Video Setup JEM Layer 2 Ethernet and Multiplexer (LEHX) Installation Part 2 SARCOLAB. MARES and Laptop Power OFF Rodent Research 5 Dissection 2A Rodent Research 5 Dissection 2B Soyuz 736 Samsung tablet recharging, terminate Preparation of spacesuit replaceable elements, service and personal gear ISS Crew Orientation Rodent Research Refrigerated Centrifuge Setup Rodent Research Bone Densitometer Scan Rodent Research MELFI Insert HRF Generic Refrigerated Centrifuge Spin Conclude ARED Handover Video Review ISS Crew Adaptation Rodent Research Refrigerated Centrifuge Configure Rodent Research 5 Dissection 2B HRF Generic Refrigerated Centrifuge Spin Conclude Final ISS HAM Service Module Pass Rodent Research Locker Preparation Space Headaches – Daily Questionnaire Combustion Integrated Rack Alignment Guide Install Completed Task List Items Wanted Poster for T2 Utility Box Wanted Poster: Bacteria Filter Ground Activities All activities were completed unless otherwise noted. Rodent Research Support SPDM Pump Flow Control Subassembly Troubleshooting Three-Day Look Ahead: Wednesday, 08/02: Rodent Research operations, NanoRacks 2 removal/PEHG install, CBEF video cable reconfig, MARES ops, OBT ISS Emergency hardware review Thursday, 08/03: Fine Motor Skills, MARES ops, […]

from ISS On-Orbit Status Report http://ift.tt/2viyCov
via IFTTT

Online Certifications Training for CISA, CISM, and CISSP

Believe it or not, but any computer connected to the Internet is vulnerable to cyber attacks. With more money at risk and data breaches at a rise, more certified cyber security experts and professionals are needed by every corporate and organisation to prevent themselves from hackers and cyber thieves. That's why jobs in the cyber security field have gone up 80% over the past three years


from The Hacker News http://ift.tt/2qES9hy
via IFTTT

I have a new follower on Twitter


Better Front Dev
Best #frontend news and content. I tweet in english and french.


Following: 2839 - Followers: 3828

August 02, 2017 at 08:46AM via Twitter http://twitter.com/BetterFrontDev

WannaCry Inspires Banking Trojan to Add Self-Spreading Ability

Although the wave of WannaCry and Petya ransomware has now been slowed down, money-motivated hackers and cyber criminals have taken lessons from the global outbreaks to make their malware more powerful. Security researchers have now discovered at least one group of cyber criminals that are attempting to give its banking Trojan the self-spreading worm-like capabilities that made recent ransomware


from The Hacker News http://ift.tt/2hnyheu
via IFTTT

[FD] CVE-2017-1500 - Relected XSS in IBM WorkLight OAuth Server Web Api

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

Alexa, Are You Spying On Me? Not Really, Maybe, It's Complex!

Do you own an Amazon Echo? So are you also worried about hackers turning out your device into a covert listening device? Just relax, if there's no NSA, no CIA or none of your above-skilled friends after you. Since yesterday there have been several reports on Amazon Echo hack that could allow a hacker to turn your smart speaker into a covert listening device, but users don’t need to worry


from The Hacker News http://ift.tt/2tZ34jy
via IFTTT

Temple Emanuel of the Merrimack Valley

$270. MONEY RAISED. Temple Emanuel. Anonymous. Anonymous. Anonymous. $5. Anonymous. Anonymous. $25. Anonymous. $50. Anonymous.

from Google Alert - anonymous http://ift.tt/2u3gIqk
via IFTTT

The Dust Monster in IC 1396


Is there a monster in IC 1396? Known to some as the Elephant's Trunk Nebula, parts of gas and dust clouds of this star formation region may appear to take on foreboding forms, some nearly human. The only real monster here, however, is a bright young star too far from Earth to hurt us. Energetic light from this star is eating away the dust of the dark cometary globule near the top of the featured image. Jets and winds of particles emitted from this star are also pushing away ambient gas and dust. Nearly 3,000 light-years distant, the relatively faint IC 1396 complex covers a much larger region on the sky than shown here, with an apparent width of more than 10 full moons. via NASA http://ift.tt/2f3TuJE

Tuesday, August 1, 2017

Anonymous Donation Settles NYC Dispute Over Immigration Services

An anonymous donor has stepped in to help settle a budget dispute between Mayor Bill de Blasio and City Council Speaker Melissa Mark-Viverito ...

from Google Alert - anonymous http://ift.tt/2uhRNKG
via IFTTT

Ray Lewis advises Colin Kaepernick to "let your play speak for itself" (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Aussie Best Friend

Beautiful Stories From Anonymous People #72 August 1, 2017. An Aussie opens up about his family's history which includes tales of drug dealing, ...

from Google Alert - anonymous http://ift.tt/2hlS2mG
via IFTTT

Anonymous user a24dfa

Name, Anonymous user a24dfa. User since, July 25, 2017. Number of add-ons developed, 1 theme. Average rating of developer's add-ons, Not yet ...

from Google Alert - anonymous http://ift.tt/2f5EOKi
via IFTTT

Ravens: Ryan Mallett not concerned with interest in Colin Kaepernick; "We're worried about the Ravens right now" (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

▶ John Harbaugh says he is enjoying process of evaluating Colin Kaepernick (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

[GitHub] A new public key was added to your account

The following SSH key was added to your account: DO tms web 00:8e:ad:4c:7b:1f:15:14:e8:f9:bb:fd:30:f7:0b:93 If you believe this key was added in error, you can remove the key and disable access at the following location: http://ift.tt/238MQng

Source: Gmail -> IFTTT-> Blogger

Ravens rookie TE Crockett Gillmore out for season after knee surgery (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 7/31/2017

Rodent Research-5 (RR-5) Systemic Therapy of NELL-1 for Osteoporosis:  On Sunday the crew completed the first day of bone scans and sampling for RR-5.  Later today they will perform the second set of scans and sampling operations.  Because spaceflight has significant and rapid effects on the musculoskeletal system, it is important to investigate targeted therapies that could ameliorate some of the detrimental effects of spaceflight. The NELL-1 drug being studied in the RR-5 investigation has the potential to slow or reverse bone loss during spaceflight. Marrow:  Over the weekend two crewmembers collected breath, air and blood samples for the Marrow investigation. They collected blood samples today as well. The blood samples are collected, processed in the centrifuge and placed in the Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI).  The Marrow investigation looks at the effect of microgravity on bone marrow. It is believed that microgravity, like long-duration bed rest on Earth, has a negative effect on the bone marrow and the blood cells that are produced in the bone marrow.  Fine Motor Skills (FMS): On Saturday the crew completed a series of interactive tasks during a FMS session. The investigation studies how the fine motor skills are effected by long-term microgravity exposure, different phases of microgravity adaptation, and sensorimotor recovery after returning to Earth gravity. The goal of the investigation is to determine how fine motor performance in microgravity varies over the duration of six-month and year-long space missions; how fine motor performance on orbit compares with that of a closely matched participant on Earth; and how performance varies before and after gravitational transitions, including periods of early flight adaptation and very early/near immediate post-flight periods. Space Headaches:  Over the weekend the 51S USOS crewmembers completed daily questionnaires for Space Headaches.  They will complete additional questionnaires later today.  The European Space Agency (ESA) Space Headaches investigation collects information that may help in the development of methods to alleviate associated symptoms and improvement in the well-being and performance of crewmembers in space. Headaches during space flight can negatively affect mental and physical capacities of crewmembers that can influence performance during a space mission.  Sarcolab-3: The crew set up and configured the Muscle Atrophy Research & Exercise System (MARES) facility in the Columbus module for Sarcolab-3 operations.  They installed the Ankle configuration and Electromyograph and Percutaneous Electrical Stimulation (PEMS) devices on MARES. The data collected for Sarcolab-3 will be compared to pre and post flight measurements to assess the impact of hypothesized microgravity induced muscle loss.  Myotendinous and Neuromuscular Adaptation to Long-term Spaceflight (Sarcolab) investigates the adaptation and deterioration of the soleus, or calf muscle, where it joins the Achilles tendon, which links it to the heel and carries loads from the entire body. Muscle fiber samples are taken from crew members before and after flight, and analyzed for changes in structural and chemical properties. MRI and ultrasound tests and electrode stimulation are conducted to help assess muscle and tendon changes caused by microgravity exposure. Bigelow Expandable Activity Module (BEAM):  The crew ingressed the BEAM, flipped the 10 mm thick Radiation Environment Monitor (REM) shield and photographed it. This REM Shield was previously printed on the 3D printer onboard the ISS and installed in the BEAM.  BEAM is an experimental expandable module attached to the ISS.  Expandable modules weigh less and take up less room on a rocket than a traditional module, while allowing additional space for living and working. They provide protection from solar and cosmic radiation, space debris, and other contaminants. Crews traveling to the moon, Mars, asteroids, or other destinations may be able to use them as habitable structures. Dose Distribution Inside the ISS – 3D (DOSIS 3D): The crew installed passive radiation detectors in the Columbus module in support of European Space Agency’s (ESA’s) DOSIS 3D investigation. Data from the various active and passive radiation detectors installed in the ISS are used in the determination of the radiation field parameters absorbed doses and dose equivalents inside the ISS. A concise three dimensional (3D) dose distribution map of all the segments of the ISS will be developed, based on this data and data from JAXA and NASA monitoring devices. Emergency Roles & Responsibilities Review: With the arrival of 51S, all crew members participated in this review. Items of discussion included crew accountability, access to escape vehicles and CDR responsibilities. Each crew member must be fully aware of procedure strategy and intent due to the complex nature of an emergency event.  Today’s Planned Activities All activities were completed unless otherwise noted. ODF Books Update on iPAD Test video coverage for RT channel COSMOCARD. Preparation and start of a 24 h- long ECG recording  Preparation of Reports for Roscosmos web site and social media ECON-M. Observation and photography Marrow Breath And Ambient Air Sample Collection МО-8. Configuration Setup Reminder 2 Marrow CSA Generic Frozen Blood Collection CSA Generic Frozen Blood Collection 25 Minutes – Subject Body Mass Measurement – BMMD CSA Generic Refrigerated Centrifuge Configure Handover SARCOLAB-3 day 1 reminder JEM Airlock Press МО-8. Closeout Ops CSA Generic Refrigerated Centrifuge Spin Conclude Handover CSA Generic Sample MELFI Insertion CSA Generic Frozen Blood Collection Conclude And Stow Handover Water Recovery System (WRS) Sample Analysis RADIOSKAF. Test checks of nanosatellites Water Recovery and Management Condensate Pump Gather JEM Airlock Leak Check Water Recovery and Management Condensate Pumping Init Combustion Integrated Rack Alignment Guide Removal Glacier Desiccant Swap SARCOLAB-3 Big Picture reading Deactivation of Soyuz 735 Gas Analyzer Procedures, preliminary EVA-43 timeline review, DVD viewingWater Recovery and Management Condensate Pumping Term ARED Handover Video Review MARES deployment Water Recovery and Management Condensate Pumping Restow In Flight Maintenance (IFM) Waste and Hygiene Compartment (WHC) Full Fill – Handover MARES Power On and Battery Charge MARES Ankle configuration installation Bringing ODF up to date using Soyuz 736 delivered files ISS Crew Adaptation Rodent Research Node 2 Camcorder Video Setup MARES Battery Charge Rodent Research 5 Dissection 2A Rodent Research 5 Dissection 2B Rodent Research Refrigerated Centrifuge Setup Test activation of Vozdukh Atmosphere Purification […]

from ISS On-Orbit Status Report http://ift.tt/2vjCLs3
via IFTTT

ANONYMOUS

we are here. you have our attention. your church your court your city hall your phone and cable companies. WE KNOW! watch for us. we are you. send ...

from Google Alert - anonymous http://ift.tt/2tZp1mX
via IFTTT

Dangerous Mobile Banking Trojan Gets 'Keylogger' to Steal Everything

Cyber criminals are becoming more adept, innovative, and stealthy with each passing day. They have now shifted from traditional to more clandestine techniques that come with limitless attack vectors and are harder to detect. Security researchers have discovered that one of the most dangerous Android banking Trojan families has now been modified to add a keylogger to its recent strain, giving


from The Hacker News http://ift.tt/2hjEb0l
via IFTTT

[FD] Stored XSS in Salutation Responsive WordPress + BuddyPress Theme could allow logged-in users to do almost anything an admin can (WordPress plugin)

Details ================ Software: Salutation Responsive WordPress + BuddyPress Theme Version: 3.0.15 Homepage: http://ift.tt/2cHClUN Advisory report: http://ift.tt/2tTIMIy CVE: Awaiting assignment CVSS: 4.9 (Medium; AV:N/AC:M/Au:S/C:P/I:P/A:N) Description ================ Stored XSS in Salutation Responsive WordPress + BuddyPress Theme could allow logged-in users to do almost anything an admin can Vulnerability ================ The theme contains JavaScript (assets/js/onLoad.js) which iterates through .section-tabs a and puts every href value it finds into jQuery(). jQuery() doesn’t just search for elements which match a selector (i.e. jQuery(\'.section-tabs\')), it also creates elements (i.e. jQuery(\'
\')). $(\'.section-tabs\').simpleSlideTop(); // ... $.fn.simpleSlideTop = function(opts) { // ... contentID = $(this).attr(\'href\'); $(contentID).hide(); An attacker without the unfiltered_html capability would be able to inject arbitrary HTML as if they had the unfiltered_html capability. With the ability to inject arbitrary HTML, the attacker is able add JavaScript which causes a logged-in administrator user to do almost anything – including creating new user accounts, deleting posts, and more. Proof of concept ================ Click the activate button on the theme Install and activate Revolution Slider plugin Create a new user with role of Author (by default, Authors do not possess the unfiltered_html capability) Log in as that user Visit “Add New Post” screen Switch the editor to “Text” mode Enter the following:  Press “Publish” Press “View post” You will see an alertbox appear showing the value “1” For comparison, if the same user account enters  or , it will be blocked by WordPress. Mitigations ================ Upgrade to version 3.0.16 or later. Disclosure policy ================ dxw believes in responsible disclosure. Your attention is drawn to our disclosure policy: http://ift.tt/1B6NWzd Please contact us on security@dxw.com to acknowledge this report if you received it via a third party (for example, plugins@wordpress.org) as they generally cannot communicate with us on your behalf. This vulnerability will be published if we do not receive a response to this report with 14 days. Timeline ================ 2017-04-26: Discovered 2017-07-25: Reported via contact form on http://para.llel.us/ 2017-07-25: Vendor reported issue fixed in 3.0.16 2017-07-31: Advisory published Discovered by dxw: ================ Tom Adams Please visit security.dxw.com for more information.

Source: Gmail -> IFTTT-> Blogger

[FD] libmad memory corruption vulnerability

libmad memory corruption vulnerability ================ Author : qflb.wu =============== Introduction: ============= libmad is a high-quality MPEG audio decoder capable of 24-bit output. Affected version: ===== 0.15.1b Vulnerability Description: ========================== the mad_decoder_run function in decoder.c in libmad 0.15.1b can cause a denial of service(memory corruption) via a crafted mp3 file. I found this bug when I test mpg321 0.3.2 which used the libmad library. ./mpg321 libmad_0.15.1b_memory_corruption.mp3

Source: Gmail -> IFTTT-> Blogger

[FD] CSRF vulnerabilities in D-Link DVG-5402SP

Hello list! There are multiple Cross-Site Request Forgery vulnerabilities in D-Link DVG-5402SP VoIP Router.

Source: Gmail -> IFTTT-> Blogger

Re: [FD] libao memory corruption vulnerability

On Mon, Jul 31, 2017 at 02:26:36PM +0800, qflb.wu wrote: > libao memory corruption vulnerability > > ./mpg321 libao_1.2.0_memory_corruption.mp3 > > CVE-2017-11548 Did you also test this with the latest version of the library? Issues like these might not be fixed by backporting in distros. Did you report this to the upstream?

Source: Gmail -> IFTTT-> Blogger

Perseid Meteors over Turkey


The Perseid Meteor Shower, usually the best meteor shower of the year, will peak late next week. A person watching a clear sky from a dark location might see a bright meteor every minute. These meteors are actually specks of rock that have broken off Comet Swift-Tuttle and continued to orbit the Sun until they vaporize in Earth's atmosphere. The featured composite image shows a outburst of Perseids as they appeared over Turkey during last year's meteor shower. Enough meteors were captured to trace the shower's radiant back to the constellation of Perseus on the far left. The tail-end of the Perseids will still be going during the total solar eclipse on August 21, creating a rare opportunity for some lucky astrophotographers to image a Perseid meteor during the day. via NASA http://ift.tt/2hgcaXB

NASA Studies Hurricane Matthew

Hurricane Matthew was the first Category 5 Atlantic hurricane in almost ten years. Its torrential rains and winds caused significant damage and loss of life as it coursed through the Caribbean and up along the southeastern U.S. coast. Researchers use a combination of satellite observations to re-create a multi-dimensional picture of the hurricane in order to study the complex atmospheric interactions.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2uQbg92
via IFTTT

Monday, July 31, 2017

▶ Chris Davis tries to finish routine play but ball goes right through hole in his glove - #SCNotTop10 (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

▶ Craig Gentry smacks 9th-inning bases-loaded single for 2-1 walk-off win over Royals (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Anonymous foodies want to help you find hidden gems

Anonymous foodies want to help you find hidden gems. Secret group of foodies share favourite Sudbury hotspots. Local food expert wants to help ...

from Google Alert - anonymous http://ift.tt/2hivof7
via IFTTT

Anonymous - Chef de Cuisine

A well established fine dining restaurant group is currently seeking a passionate & detail oriented individual to join their team as their new Chef de ...

from Google Alert - anonymous http://ift.tt/2vn5tsH
via IFTTT

Gott ist unsre Zuversicht und Stärke

Gott ist unsre Zuversicht und Stärke (Anonymous) ... Composer, Anonymous. Key, B-flat major. First Publication. 1780 ca. in 34 Motetten (No.9).

from Google Alert - anonymous http://ift.tt/2ue74fv
via IFTTT

Dodgers and Yankees stock up while Orioles miss out - Dave Schoenfield's MLB trade deadline winners and losers (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Orioles place Mark Trumbo (ribs) on 10-day DL (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Furman receives $1 million gift from anonymous donor

The school said Monday the gift is from a donor who wants to remain anonymous. Johnson spent 24 years coaching at Furman, including eight as the ...

from Google Alert - anonymous http://ift.tt/2weP2v8
via IFTTT

Orioles acquire SS Tim Beckham from Rays in exchange for minor league P Tobias Myers (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Furman Football Program Receives $1 Million Gift From Anonymous Donor

Commitment honors former Paladin coach Bobby Johnson. GREENVILLE, S.C. — An anonymous donor has given Furman University a $1 million gift ...

from Google Alert - anonymous http://ift.tt/2tS2iFj
via IFTTT

HBO Hacked — 'Game of Thrones' Scripts & Other Episodes Leaked Online

If you are a die heart fan of 'Game of Thrones' series, there's good news for you, but obviously bad for HBO. Hackers claim to have stolen 1.5 terabytes of data from HBO, including episodes of HBO shows yet to release online and information on the current season of Game of Thrones. What's more? The hackers have already leaked upcoming episodes of the shows "Ballers" and "Room 104" on the


from The Hacker News http://ift.tt/2vbvKKj
via IFTTT

▶ Brandon Williams engages in adorable dance-off with young Ravens fan (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Someone Hijacks A Popular Chrome Extension to Push Malware

Phishers have recently hacked an extension for Google Chrome after compromising the Chrome Web Store account of German developer team a9t9 software and abused to distribute spam messages to unsuspecting users. Dubbed Copyfish, the extension allows users to extract text from images, PDF documents and video, and has more than 37,500 users. Unfortunately, the Chrome extension of Copyfish has


from The Hacker News http://ift.tt/2f1r4QH
via IFTTT

Ravens sign QB Josh Woodrum, who was released by Bills on May 24; QB David Olson waived (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Ravens: Michael Campanaro (toe) passes physical, will be activated from PUP list (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Bank check OCR with OpenCV and Python (Part II)

Today’s blog post is Part II in our two part series on OCR’ing bank check account and routing numbers using OpenCV, Python, and computer vision techniques.

Last week we learned how to extract MICR E-13B digits and symbols from input images. Today we are going to take this knowledge and use it to actually recognize each of the characters, thereby allowing us to OCR the actual bank check and routing number.

To learn how to OCR bank checks with Python and OpenCV, just keep reading.

Looking for the source code to this post?
Jump right to the downloads section.

Bank check OCR with OpenCV and Python

In Part I of this series we learned how to localize each of the fourteen MICR E-13B font characters used on bank checks.

Ten of these characters are digits, which form our actual account number and routing number. The remaining four characters are special symbols used by the bank to mark separations between routing numbers, account numbers, and any other information encoded on the check.

The image below displays all fourteen characters that we will be OCR’ing in this tutorial:

Figure 1: The fourteen MICR E-13B characters used in bank checks. We will write Python + OpenCV code to recognize each of these characters.

The list below displays the four symbols:

  • ⑆ Transit (delimit bank branch routing transit #)
  • ⑈ On-us (delimit customer account number)
  • ⑇ Amount (delimit transaction amount)
  • ⑉ Dash (delimit parts of numbers, such as routing or account)

Since OpenCV does not allow us to draw Unicode characters on images, we’ll use the following ASCII character mappings in our code to indicate the Transit, Amount, On-us, and Dash:

  • T = ⑆
  • U = ⑈
  • A = ⑇
  • D = ⑉

Now that we are able to actually localize the digits and symbols, we can apply template matching in a similar manner as we did in our credit card OCR post in order to perform OCR.

Reading account and routing numbers using OpenCV

In order to build our bank check OCR system, we’ll be reusing some of the code from last week. If you haven’t already read Part I of this series, take the time now to go back and read through it — the explanation of the

extract_digitis_and_symbols
  function is especially important and critical to localizing the bank check characters.

With that said, let’s go ahead and open a new file, name it

bank_check_ocr.py
 , and insert the following code:
# import the necessary packages
from skimage.segmentation import clear_border
from imutils import contours
import numpy as np
import argparse
import imutils
import cv2

Lines 2-7 handle our standard imports. If you’re familiar with this blog, these imports should be nothing new. If you don’t have any of these packages on your system, you can perform the following to get them installed:

  1. Install OpenCV using the relevant instructions for your system (while ensuring you’re following any Python virtualenv commands).
  2. Activate your Python virtualenv and install packages:
    1. $ workon cv
      
    2. $ pip install numpy
      
    3. $ pip install skimage
      
    4. $ pip install imutils
      

Note: for any of the pip commands you may use the

--upgrade
  flag to update whether or not you already have the software installed.

Now that we’ve got our dependencies installed, let’s quickly review the function covered last week in Part I of this series:

def extract_digits_and_symbols(image, charCnts, minW=5, minH=15):
        # grab the internal Python iterator for the list of character
        # contours, then  initialize the character ROI and location
        # lists, respectively
        charIter = charCnts.__iter__()
        rois = []
        locs = []

        # keep looping over the character contours until we reach the end
        # of the list
        while True:
                try:
                        # grab the next character contour from the list, compute
                        # its bounding box, and initialize the ROI
                        c = next(charIter)
                        (cX, cY, cW, cH) = cv2.boundingRect(c)
                        roi = None

                        # check to see if the width and height are sufficiently
                        # large, indicating that we have found a digit
                        if cW >= minW and cH >= minH:
                                # extract the ROI
                                roi = image[cY:cY + cH, cX:cX + cW]
                                rois.append(roi)
                                locs.append((cX, cY, cX + cW, cY + cH))

This function has one goal — to find and localize digits and symbols based on contours. This is accomplished via iterating through the contours list,

charCnts
 , and keeping track of the regions of interest and ROI locations (
rois
  and
locs
 ) in two lists that are returned at the end of the function.

On Line 29 we check to see if the bounding rectangle of the contour is at least as wide and tall as a digit. If it is, we extract and append the

roi
  (Lines 31 and 32) followed by appending the location of the ROI to
locs
  (Line 33). Otherwise, we take the following actions:
# otherwise, we are examining one of the special symbols
                        else:
                                # MICR symbols include three separate parts, so we
                                # need to grab the next two parts from our iterator,
                                # followed by initializing the bounding box
                                # coordinates for the symbol
                                parts = [c, next(charIter), next(charIter)]
                                (sXA, sYA, sXB, sYB) = (np.inf, np.inf, -np.inf,
                                        -np.inf)

                                # loop over the parts
                                for p in parts:
                                        # compute the bounding box for the part, then
                                        # update our bookkeeping variables
                                        (pX, pY, pW, pH) = cv2.boundingRect(p)
                                        sXA = min(sXA, pX)
                                        sYA = min(sYA, pY)
                                        sXB = max(sXB, pX + pW)
                                        sYB = max(sYB, pY + pH)

                                # extract the ROI
                                roi = image[sYA:sYB, sXA:sXB]
                                rois.append(roi)
                                locs.append((sXA, sYA, sXB, sYB))

In the above code block, we have determined that a contour is part of a special symbol (such as Transit, Dash, etc.). In this case, we take the current contour and the

next
  two contours (using Python iterators which we discussed last week) on Line 41.

These

parts
  of a special symbol are looped over so that we can calculate the bounding box for extracting the 
roi
 around all three contours (Lines 46-53). Then, as we did before, we extract the
roi
  and append it to
rois
  (Lines 56 and 57) followed by appending its location to
locs
  (Line 58).

Finally, we need to catch a

StopIteration
  exception to gracefully exit our function:
# we have reached the end of the iterator; gracefully break
                # from the loop
                except StopIteration:
                        break

        # return a tuple of the ROIs and locations
        return (rois, locs)

Once we have reached the end of the

charCnts
  list (and there are no further entries in the list), a
next
  call on
charCnts
  will result in a
StopIteration
  exception being throw. Catching this exception allows us to
break
  from our loop (Lines 62 and 63).

Finally, we return a 2-tuple containing

rois
  and corresponding
locs
 .

That was a quick recap of the

extract_digits_and_symbols
  function — for a complete, detailed review, please refer to last week’s blog post.

Now it’s time to get to the new material. First, we’ll go through a couple code blocks that should also be a bit familiar:

# construct the argument parse and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-i", "--image", required=True,
        help="path to input image")
ap.add_argument("-r", "--reference", required=True,
        help="path to reference MICR E-13B font")
args = vars(ap.parse_args())

Lines 69-74 handle our command line argument parsing. In this script, we’ll make use of both the input

--image
  and
--reference
  MICR E-13B font image.

Let’s initialize our special characters (since they can’t be represented with Unicode in OpenCV) as well as pre-process our reference image:

# initialize the list of reference character names, in the same
# order as they appear in the reference image where the digits
# their names and:
# T = Transit (delimit bank branch routing transit #)
# U = On-us (delimit customer account number)
# A = Amount (delimit transaction amount)
# D = Dash (delimit parts of numbers, such as routing or account)
charNames = ["1", "2", "3", "4", "5", "6", "7", "8", "9", "0",
        "T", "U", "A", "D"]

# load the reference MICR image from disk, convert it to grayscale,
# and threshold it, such that the digits appear as *white* on a
# *black* background
ref = cv2.imread(args["reference"])
ref = cv2.cvtColor(ref, cv2.COLOR_BGR2GRAY)
ref = imutils.resize(ref, width=400)
ref = cv2.threshold(ref, 0, 255, cv2.THRESH_BINARY_INV |
        cv2.THRESH_OTSU)[1]

Lines 83 and 84 build a list of the character names including digits and special symbols.

Then, we load the

--reference
  image while converting to grayscale and resizing, followed by inverse thresholding (Lines 89-93).

Below you can see the output of pre-processing our reference image:

Figure 2: The MICR E-13B font for the digits 0-9 and four special symbols. We will be using this font along with template matching to OCR our bank check images.

Now we’re ready to find and sort contours in

ref
 :
# find contours in the MICR image (i.e,. the outlines of the
# characters) and sort them from left to right
refCnts = cv2.findContours(ref.copy(), cv2.RETR_EXTERNAL,
        cv2.CHAIN_APPROX_SIMPLE)
refCnts = refCnts[0] if imutils.is_cv2() else refCnts[1]
refCnts = contours.sort_contours(refCnts, method="left-to-right")[0]

Reference image contours are computed on Lines 97 and 98 followed by updating the

refCnts
  depending on which OpenCV version we are running (Line 99).

We sort the

refCnts
  from left to right on Line 100.

At this point, we have our reference contours in an organized fashion. The next step is to extract the digits and symbols followed by building a dictionary of character ROIs:

# extract the digits and symbols from the list of contours, then
# initialize a dictionary to map the character name to the ROI
refROIs = extract_digits_and_symbols(ref, refCnts,
        minW=10, minH=20)[0]
chars = {}

# loop over the reference ROIs
for (name, roi) in zip(charNames, refROIs):
        # resize the ROI to a fixed size, then update the characters
        # dictionary, mapping the character name to the ROI
        roi = cv2.resize(roi, (36, 36)) 
        chars[name] = roi

We call the

extract_digits_and_symbols
  function on Lines 104 and 105 providing the
ref
  image and
refCnts
 .

We then initialize a

chars
  dictionary on Line 106. We populate this dictionary in the loop spanning Lines 109-113. In the dictionary, the character
name
(key)  is associated with the
roi
  image (value).

Next, we’ll instantiate a kernel and load and extract the bottom 20% of the check image which contains the account number:

# initialize a rectangular kernel (wider than it is tall) along with
# an empty list to store the output of the check OCR
rectKernel = cv2.getStructuringElement(cv2.MORPH_RECT, (17, 7))
output = []

# load the input image, grab its dimensions, and apply array slicing
# to keep only the bottom 20% of the image (that's where the account
# information is)
image = cv2.imread(args["image"])
(h, w,) = image.shape[:2]
delta = int(h - (h * 0.2))
bottom = image[delta:h, 0:w]

We’ll apply a rectangular kernel to perform some morphological operations (initialized on Line 117). We also initialize an

output
  list to contain the characters at the bottom of the check. We’ll print these characters to the terminal and also draw them on the check image later.

Lines 123-126 simply load the

image
 , grab the dimensions, and extract the bottom 20% of the check image.

Note: This is not rotation invariant — if your check could possibly be rotated, appearing upside down or vertical, then you will need to add logic in to rotate it first. Applying a top-down perspective transform on the check (such as in our document scanner post) can help with task.

Below you can find our example check input image:

Figure 3: The example input bank check that we are going to OCR and extract the routing number and account number from (source).

Next, let’s convert the check to grayscale and apply a morphological transformation:

# convert the bottom image to grayscale, then apply a blackhat
# morphological operator to find dark regions against a light
# background (i.e., the routing and account numbers)
gray = cv2.cvtColor(bottom, cv2.COLOR_BGR2GRAY)
blackhat = cv2.morphologyEx(gray, cv2.MORPH_BLACKHAT, rectKernel)

On Line 131 we convert the bottom of the check image to grayscale and on Line 132 we use the blackhat morphological operator to find dark regions against a light background. This operation makes use of our

rectKernel
 .

The result reveal our account and routing numbers:

Figure 5: Applying black hat morphological operation reveals our bank account number and routing number from the rest of the check.

 

Now let’s compute the Scharr gradient in the x-direction:

# compute the Scharr gradient of the blackhat image, then scale
# the rest back into the range [0, 255]
gradX = cv2.Sobel(blackhat, ddepth=cv2.CV_32F, dx=1, dy=0,
        ksize=-1)
gradX = np.absolute(gradX)
(minVal, maxVal) = (np.min(gradX), np.max(gradX))
gradX = (255 * ((gradX - minVal) / (maxVal - minVal)))
gradX = gradX.astype("uint8")

Using our blackhat operator, we compute the Scharr gradient with the

cv2.Sobel
  function (Lines 136 and 137). We take the element-wise absolute value of
gradX
  on on Line 138.

Then we scale the

gradX
  to the range [0-255] on Lines 139-141:

Figure 6: Computing the Scharr gradient magnitude representation of the bank check image reveals vertical changes in the gradient.

Let’s see if we can close the gaps between the characters and binarize the image:

# apply a closing operation using the rectangular kernel to help
# cloes gaps in between rounting and account digits, then apply
# Otsu's thresholding method to binarize the image
gradX = cv2.morphologyEx(gradX, cv2.MORPH_CLOSE, rectKernel)
thresh = cv2.threshold(gradX, 0, 255,
        cv2.THRESH_BINARY | cv2.THRESH_OTSU)[1]

On Line 146, we utilize our kernel again while applying a closing operation. We follow this by performing a binary threshold on Lines 147 and 148.

The result of this operation can be seen below:

Figure 7: Thresholding our gradient magnitude representation reveals possible regions that contain the bank check account number and routing number.

When pre-processing a check image our morphological + thresholding operations will undoubtedly leave “false-positive” detection regions — we can apply a bit of extra processing to help remove these operations:

# remove any pixels that are touching the borders of the image (this
# simply helps us in the next step when we prune contours)
thresh = clear_border(thresh)

Line 152 simply clears the border by removing image border pixels; the result is subtle but will prove to be very helpful:

Figure 8: To help remove noise we can clear any connected components that lie on the border of the image.

As the image above displays, we have clearly four our three groupings of numbers on the check. But how did we go about actually extracting each of the individual groups? The following code block will show us how:

# find contours in the thresholded image, then initialize the
# list of group locations
groupCnts = cv2.findContours(thresh.copy(), cv2.RETR_EXTERNAL,
        cv2.CHAIN_APPROX_SIMPLE)
groupCnts = groupCnts[0] if imutils.is_cv2() else groupCnts[1]
groupLocs = []

# loop over the group contours
for (i, c) in enumerate(groupCnts):
        # compute the bounding box of the contour
        (x, y, w, h) = cv2.boundingRect(c)

        # only accept the contour region as a grouping of characters if
        # the ROI is sufficiently large
        if w > 50 and h > 15:
                groupLocs.append((x, y, w, h))

# sort the digit locations from left-to-right
groupLocs = sorted(groupLocs, key=lambda x:x[0])

On Lines 156-158 we find our contours also take care of the pesky OpenCV version incompatibility.

Next, we initialize a list to contain our number group locations (Line 159).

Looping over the

groupCnts
 , we determine the contour bounding box (Line 164), and check to see if the box parameters qualify as a grouping of characters — if they are, we append the ROI values to
groupLocs
  (Lines 168 and 169).

Using lambdas, we sort the digit locations from left to right (Line 172).

Our group regions are shown on this image:

Figure 9: Applying contour filtering allows us to find the (1) account number, (2) routing number, and (3) additional information groups on the bank check.

Next, let’s loop over the group locations:

# loop over the group locations
for (gX, gY, gW, gH) in groupLocs:
        # initialize the group output of characters
        groupOutput = []

        # extract the group ROI of characters from the grayscale
        # image, then apply thresholding to segment the digits from
        # the background of the credit card
        group = gray[gY - 5:gY + gH + 5, gX - 5:gX + gW + 5]
        group = cv2.threshold(group, 0, 255,
                cv2.THRESH_BINARY_INV | cv2.THRESH_OTSU)[1]

        cv2.imshow("Group", group)
        cv2.waitKey(0)

        # find character contours in the group, then sort them from
        # left to right
        charCnts = cv2.findContours(group.copy(), cv2.RETR_EXTERNAL,
                cv2.CHAIN_APPROX_SIMPLE)
        charCnts = charCnts[0] if imutils.is_cv2() else charCnts[1]
        charCnts = contours.sort_contours(charCnts,
                method="left-to-right")[0]

In the loop, first, we initialize a

groupOutput
  list which will later be appended to the
output
  list (Line 177).

Subsequently, we extract the character grouping ROI from the image (Line 182) and threshold it (Lines 183 and 184).

For developmental and debugging purposes (Lines 186 and 187) we show the group to the screen and wait for a keypress before moving onward (feel free to remove this code from your script if you so wish).

We find and sort character contours within the group on Lines 191-195. The results of this step are shown in Figure 10.

 

Figure 10: By using the (x, y)-coordinates of the locations, we can extract each group from the thresholded image. Given the group, contour detection allows us to detect each individual character.

Now, let’s extract digits and symbols with our function and then loop over the

rois
 :
# find the characters and symbols in the group
        (rois, locs) = extract_digits_and_symbols(group, charCnts)

        # loop over the ROIs from the group
        for roi in rois:
                # initialize the list of template matching scores and
                # resize the ROI to a fixed size
                scores = []
                roi = cv2.resize(roi, (36, 36))

                # loop over the reference character name and corresponding
                # ROI
                for charName in charNames:
                        # apply correlation-based template matching, take the
                        # score, and update the scores list
                        result = cv2.matchTemplate(roi, chars[charName],
                                cv2.TM_CCOEFF)
                        (_, score, _, _) = cv2.minMaxLoc(result)
                        scores.append(score)

                # the classification for the character ROI will be the
                # reference character name with the *largest* template
                # matching score
                groupOutput.append(charNames[np.argmax(scores)])

On Line 198, we provide the

group
  and
charCnts
  to the
extract_digits_and_symbols
  function, which returns
rois
  and
locs
 .

We loop over the

rois
 , first initializing a template matching score list, followed by resizing the
roi
  to known dimensions.

We loop over the character names and perform template matching which compares the query image

roi
  to the possible character images (they are stored in the
chars
  dictionary and indexed by
charName
 ) on Lines 212 and 213.

To extract a template matching

score
  for this operation, we use the
cv2.minMaxLoc
  function, and subsequently, we append it to
scores
  on Line 215.

The last step in this code block is to take the maximum

score
  from
scores
  and use it to find the character name — we append the result to
groupOutput
  (Line 220).

You can read more about this template matching-based approach to OCR in our previous blog post on Credit Card OCR.

Next, we’ll draw on the original

image
  append the
groupOutput
  result to a list named
output
 .
# draw (padded) bounding box surrounding the group along with
        # the OCR output of the group
        cv2.rectangle(image, (gX - 10, gY + delta - 10),
                (gX + gW + 10, gY + gY + delta), (0, 0, 255), 2)
        cv2.putText(image, "".join(groupOutput),
                (gX - 10, gY + delta - 25), cv2.FONT_HERSHEY_SIMPLEX,
                0.95, (0, 0, 255), 3)

        # add the group output to the overall check OCR output
        output.append("".join(groupOutput))

Lines 224 and 225 handle drawing a red rectangle around the

groups
  and Lines 226-228 draw the group output characters (routing, checking, and check numbers) on the image.

Finally, we append the

groupOutput
  characters to an
output
  string (Line 231).

Our final step is to write the OCR text to our terminal and display the final output image:

# display the output check OCR information to the screen
print("Check OCR: {}".format(" ".join(output)))
cv2.imshow("Check OCR", image)
cv2.waitKey(0)

We print the OCR results to the terminal, display the image to the screen, and wait until a key is pressed to exit on Lines 234-236.

Let’s see how our bank check OCR system performs in the next section.

Bank check OCR results

To apply our bank check OCR algorithm, make sure you use the “Downloads” section of this blog post to download the source code + example image.

From there, execute the following command:

$ python bank_check_ocr.py --image example_check.png \
        --reference micr_e13b_reference.png

The results of our hard work can be seen below:

Figure 11: Using OpenCV and Python, we have been able to correctly OCR our bank account number and routing number from an image of a check.

Improving our bank check OCR system

In this particular example, we were able to get away with using basic template matching as our character recognition algorithm.

However, template matching is not the most reliable method for character recognition, especially for real-world images that are likely to be much noisier and harder to segment.

In these cases, it would be best to train your own HOG + Linear SVM classifier or a Convolutional Neural Network. To accomplish this, you’ll want to create a dataset of check images and manually label and extract each digit in the image. I would recommend having 1,000-5,000 digits per character and then training your classifier.

From there, you’ll be able to enjoy much higher character classification accuracy — the biggest problem is simply creating/obtaining such a dataset.

Since checks by their very nature contain sensitive information, it’s often hard to find a dataset that is not only (1) representative of real-world bank check images but is also (2) cheap/easy to license.

Many of these datasets belong to the banks themselves, making it hard for computer vision researchers and developers to work with them.

Summary

In today’s blog post we learned how to apply back check OCR to images using OpenCV, Python, and template matching. In fact, this is the same method that we used for credit card OCR — the primary difference is that we had to take special care to extract each MICR E-13B symbol, especially when these symbols contain multiple contours.

However, while our template matching method worked correctly on this particular example image, real-world inputs are likely to be much more noisy, making it harder for us to extract the digits and symbols using simple contour techniques.

In these situations, it would be best to localize each of the digits and characters followed by applying machine learning to obtain higher digit classification accuracy. Methods such as Histogram of Oriented Gradients + Linear SVM and deep learning will obtain better digit and symbol recognition accuracy on real-world images that contain more noise.

If you are interested in learning more about HOG + Linear SVM along with deep learning, be sure to take a look at the PyImageSearch Gurus course.

And before you go, be sure to enter your email address in the form below to be notified when future blog posts are published!

Downloads:

If you would like to download the code and images used in this post, please enter your email address in the form below. Not only will you get a .zip of the code, I’ll also send you a FREE 11-page Resource Guide on Computer Vision and Image Search Engines, including exclusive techniques that I don’t post on this blog! Sound good? If so, enter your email address and I’ll send you the code immediately!

The post Bank check OCR with OpenCV and Python (Part II) appeared first on PyImageSearch.



from PyImageSearch http://ift.tt/2we3yDs
via IFTTT