Latest YouTube Video

Saturday, October 14, 2017

Anonymous google sites

When you visit a Jan 14, 2014 · If you're worried about your privacy being invaded online, the way to go would be anonymous search engines.

from Google Alert - anonymous http://ift.tt/2wWQzH7
via IFTTT

Alcoholics anonymous 12 steps list

Twelve Steps and Twelve Traditions . AA World Services, Inc. Apr 29, 2013 Learn about the Alcoholics Anonymous 12-step program here.

from Google Alert - anonymous http://ift.tt/2yoooE6
via IFTTT

College admissions predictions.

View real student profiles to see their academic background, extracurriculars, and college admissions chances. Sign up for Parchment to see your ...

from Google Alert - anonymous http://ift.tt/2xFBIA3
via IFTTT

Anonymous user 729469

Name, Anonymous user 729469. User since, October 9, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not ...

from Google Alert - anonymous http://ift.tt/2kOExOf
via IFTTT

Anonymous fox hack

We see this video every couple years or so. Anonymous is a loosely associated international network of activist and hacktivist entities. Nov 5, 2013 Fox ...

from Google Alert - anonymous http://ift.tt/2xFeomh
via IFTTT

Anonymous tinder app

What is Tinder? By Jared Mandel | it is completely anonymous unless you both “like” one another. Apparently, dating apps are the new It's all ...

from Google Alert - anonymous http://ift.tt/2ymciJR
via IFTTT

Pay anonymously with paypal

Corporations such as Amazon, PayPal, BankAmerica, Swiss bank Federal agents arrested 14 suspected Anonymous members Tuesday on charges ...

from Google Alert - anonymous http://ift.tt/2ynTE6f
via IFTTT

cameron russell is sharing anonymous stories of models who have been sexually assaulted - iD

She has asked to remain anonymous but asked that I share her words here because the photographer still works in the industry. She wants to ...

from Google Alert - anonymous http://ift.tt/2ggNA9a
via IFTTT

All Sky Steve


Familiar green and red tinted auroral emission floods the sky along the northern (top) horizon in this fish-eye panorama projection from September 27. On the mild, clear evening the Milky Way tracks through the zenith of a southern Alberta sky and ends where the six-day-old Moon sets in the southwest. The odd, isolated, pink and whitish arc across the south has come to be known as Steve. The name was given to the phenomenon by the Alberta Aurora Chasers Facebook group who had recorded appearances of the aurora-like feature. Sometimes mistakenly identified as a proton aurora or proton arc, the mysterious Steve arcs seem associated with aurorae but appear closer to the equator than the auroral curtains. Widely documented by citizen scientists and recently directly explored by a Swarm mission satellite, Steve arcs have been measured as thermal emission from flowing gas rather than emission excited by energetic electrons. Even though a reverse-engineered acronym that fits the originally friendly name is Sudden Thermal Emission from Velocity Enhancement, his origin is still mysterious. via NASA http://ift.tt/2ykOVlG

Ukraine Police Warns of New NotPetya-Style Large Scale CyberAttack

Remember NotPetya? The Ransomware that shut down thousands of businesses, organisations and banks in Ukraine as well as different parts of Europe in June this year. Now, Ukrainian government authorities are once again warning its citizens to brace themselves for next wave of "large-scale" NotPetya-like cyber attack. According to a press release published Thursday by the Secret Service of


from The Hacker News http://ift.tt/2gjjUYV
via IFTTT

Friday, October 13, 2017

Flix Anonymous - Episode 44

Trev and Steve are back for another episode of Flix Anonymous but they have flipped the switch and have been released from their cages. It's now 30 ...

from Google Alert - anonymous http://ift.tt/2xFaYVu
via IFTTT

St. Mary's Art Department Receives Anonymous Donation Of Equipment

The St. Mary's Art Department was recently given the gift of a generous and anonymous donation, a kiln and a pottery wheel to produce pottery.

from Google Alert - anonymous http://ift.tt/2ynpUqv
via IFTTT

Model shares anonymous stories of industry predators

In an eye-opening series of Instagram posts, Cameron Russell is revealing shocking stories of harassment.

from Google Alert - anonymous http://ift.tt/2ggnX8u
via IFTTT

Ravens: RB Terrance West and G Matt Skura out, DT Brandon Williams doubtful for Sunday vs. Bears (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Download anonymous survey responses

I conducted an anonymous midterm course assessment using a Survey. I can see each individual response under "show student survey results" in the.

from Google Alert - anonymous http://ift.tt/2kMBIgG
via IFTTT

American Journal of Sexuality Education

This study is a content analysis of anonymous questions about sex (N = 645) asked by ninth-grade students from the greater Los Angeles area.

from Google Alert - anonymous http://ift.tt/2xD3ylj
via IFTTT

[FD] [RCESEC-2017-002][CVE-2017-14956] AlienVault USM v5.4.2 "/ossim/report/wizard_email.php" Cross-Site Request Forgery leading to Sensitive Information Disclosure

RCE Security Advisory http://ift.tt/1FlL0Pz 1. ADVISORY INFORMATION ======================= Product: AlienVault USM Vendor URL: http://ift.tt/N7gGnz Type: Cross-Site Request Forgery [CWE-253] Date found: 2017-09-22 Date published: 2017-10-13 CVSSv3 Score: 6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) CVE: CVE-2017-14956 2. CREDITS ========== This vulnerability was discovered and researched by Julien Ahrens from RCE Security. 3. VERSIONS AFFECTED ==================== AlienVault USM 5.4.2 (current) older versions may be affected too. 4. INTRODUCTION =============== AlienVault Unified Security Management (USM) is a comprehensive approach to security monitoring, delivered in a unified platform. The USM platform includes five essential security capabilities that provide resource-constrained organizations with all the security essentials needed for effective threat detection, incident response, and compliance, in a single pane of glass. (from the vendor's homepage) 5. VULNERABILITY DETAILS ======================== AlienVault USM v5.4.2 offers authenticated users the functionality to generate and afterwards export generated compliance reports via the script located at "/ossim/report/wizard_email.php". Besides offering an export via a local file download, the script does also offer the possibility to send out any report via email to a given address (either in PDF or XLSX format). An exemplary request to send the pre-defined report "PCI_DSS_3_2__Vulnerability_Details" to the email address "email@example.com" looks like the following: http://ift.tt/2xDeIH7 The base64-encoded HTTP GET "name" parameter can be replaced with any other of the approx. 240 pre-defined reports, that are shipped with AlienVault USM since they do all have hardcoded identifiers, such as: - Alarm_Report - Ticket_Report - Business_and_Compliance - HIPAA_List_of_identified_ePHI_assets - PCI_DSS_3_2_Database_Users_Added - VulnerabilitiesReport etc. Since there is no anti-CSRF token protecting this functionality, it is vulnerable to Cross-Site Request Forgery attacks. An exemplary exploit to send the "PCI_DSS_3_2__Vulnerability_Details" report as a PDF-file to "email@example.com" could look like the following:
6. RISK ======= To successfully exploit this vulnerability a user with rights to access the compliance reports must be tricked into visiting an arbitrary website while having an authenticated session in the application. The vulnerability allows remote attackers to trigger a report generation and send the report out to an arbitrary email address, which may lead to the disclosure of very sensitive internal reporting information stored in AlienVault USM through pre-defined reports such as: - Alarms - Assets Inventory - Compliance Reports such as PCI DSS and HIPAA - Raw Logs - Security Events - Security Operations - Tickets - User Activity 7. SOLUTION =========== None. 8. REPORT TIMELINE ================== 2017-09-22: Discovery of the vulnerability 2017-09-22: Sent full vulnerability details to publicly listed security email address 2016-10-01: MITRE assigns CVE-2017-14956 2017-10-03: No response from vendor, notified vendor again 2017-10-13: No response from vendor 2017-10-13: Public disclosure according to disclosure policy 9. REFERENCES ============= http://ift.tt/2g8o5mE http://ift.tt/2ygDVGI

Source: Gmail -> IFTTT-> Blogger

[FD] Multiple vulnerabilities in OpenText Documentum Content Server

CVE Identifier: CVE-2017-15012 Vendor: OpenText Affected products: OpenText Documentum Content Server (all versions) Researcher: Andrey B. Panfilov CVSS v3 Base Score: 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) Fix: not available Description: Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) does not properly validate input of PUT_FILE RPC-command which allows any authenticated user to hijack arbitrary file from Content Server filesystem, because some files on Content Server filesystem are security-sensitive this security flaw leads to privilege escalation CVE Identifier: CVE-2017-15013 Vendor: OpenText Affected products: OpenText Documentum Content Server (all versions) Researcher: Andrey B. Panfilov CVSS v3 Base Score: 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) Fix: not available Description: Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) contains following design gap, which allows authenticated user to gain privileges of superuser: Content Server stores information about uploaded files in dmr_content objects, which are queryable and "editable" (before release 7.2P02 any authenticated user was able to edit dmr_content objects, now any authenticated user may delete dmr_content object and them create new one with the old identifier) by authenticated users, this allows any authenticated user to replace content of security-sensitive dmr_content objects (for example, dmr_content related to dm_method objects) and gain superuser privileges CVE Identifier: CVE-2017-15014 Vendor: OpenText Affected products: OpenText Documentum Content Server (all versions) Researcher: Andrey B. Panfilov CVSS v3 Base Score: 4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) Fix: not available Description: Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) contains following design gap, which allows authenticated user to download arbitrary content files regardless attacker's repository permissions: when authenticated user upload content to repository he performs following steps: - calls START_PUSH RPC-command - uploads file to content server - calls END_PUSH_V2 RPC-command, here Content Server returns DATA_TICKET (integer), purposed to identify the location of the uploaded file on Content Server filesystem - further user creates dmr_content object in repository, which has value of data_ticket equal to the value of DATA_TICKET received at the end of END_PUSH_V2 call As the result of such design any authenticated user may create his own dmr_content object, pointing to already existing content of Content Server filesystem CVE Identifier: CVE-2017-15276 Vendor: OpenText Affected products: OpenText Documentum Content Server (all versions) Researcher: Andrey B. Panfilov CVSS v3 Base Score: 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) Fix: not available Description: Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) contains following design gap, which allows authenticated user to gain privileges of superuser: Content Server allows to upload content using batches (TAR archives), when unpacking TAR archives Content Server fails to verify contents of TAR archive which causes path traversal vulnerability via symlinks, because some files on Content Server filesystem are security-sensitive this security flaw leads to privilege escalation

Source: Gmail -> IFTTT-> Blogger

[FD] Advisory X41-2017-008: Multiple Vulnerabilities in Shadowsocks

X41 D-Sec GmbH Security Advisory: X41-2017-008 Multiple Vulnerabilities in Shadowsocks ======================================= Overview

Source: Gmail -> IFTTT-> Blogger

New Ransomware Not Just Encrypts Your Android But Also Changes PIN Lock

DoubleLocker—as the name suggests, it locks device twice. Security researchers from cybersecurity firm ESET have discovered a new Android ransomware that not just encrypts users’ data, but also locks them out of their devices by changing lock screen PIN. On top of that: DoubleLocker is the first-ever ransomware to misuse Android accessibility—a feature that provides users alternative ways


from The Hacker News http://ift.tt/2g8GRup
via IFTTT

Ravens: Jimmy Smith (Achilles) returns to practice after missing last two days (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous Outer Identity non-determinisim - eduroam

I've created an anonymous outer identity service in clearpass and it works well most of the time. The primary reason was to separate the realm.

from Google Alert - anonymous http://ift.tt/2g6uheQ
via IFTTT

ISS Daily Summary Report – 10/12/2017

68P Launch and Dock Delay:  68P was planned for launch at 04:30 AM Central time, but the launch was aborted during final countdown.  Russian teams are looking into the cause of the abort.  The next launch opportunity is Saturday morning at 03:47 AM Central, with docking two days later on Monday morning. Multi-Omics Sample Collections: A 52S crewmember collected saliva samples and completed a questionnaire for the Japan Aerospace Exploration Agency (JAXA) Multi-Omics experiment. The samples were placed into the Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI). The Multi-omics analysis of human microbial-metabolic cross-talk in the space ecosystem (Multi-Omics) investigation evaluates the impacts of space environment and prebiotics on astronauts’ immune function, by combining the data obtained from the measurements of changes in the gut microbiological composition, metabolites profiles, and the immune system. Combustion Integrated Rack (CIR) Maintenance: The crew performed maintenance activities in the CIR by replacing a window and the CIR Interface Resource Ring (IRR) vent filter inside the combustion chamber due to fuel and combustion by-product buildup. The CIR is used to perform combustion experiments in microgravity. The CIR can be reconfigured easily on orbit to accommodate a variety of combustion experiments. It consists of an optics bench, a combustion chamber, a fuel and oxidizer management system, environmental management systems, and interfaces for science diagnostics and experiment specific equipment. Combustion Integrated Rack (CIR) Configuration for Advanced Combustion via Microgravity Experiments (ACME): The crew continued to conduct ACME insertion configurations that began yesterday, by disconnecting water umbilicals at CIR Z-Panel to remove water pressure from the rack and then remove the Multi-user Droplet Combustion Apparatus (MDCA) Chamber Insert Assembly (CIA) from the CIR combustion chamber for the final time. The ACME chamber insert for the first set of test points was configured and connected into the CIR combustion chamber.  After the water umbilicals were reconnected to Z-Panel, the crew checked for leaks. The ACME investigation is a set of five independent studies of gaseous flames to be conducted in the CIR. ACME’s primary goal is to improve fuel efficiency and reduce pollutant production in practical combustion on Earth. Its secondary goal is to improve spacecraft fire prevention through innovative research focused on materials flammability.  Fine Motor Skills (FMS): A 51S crewmember conducted a Flight Day 75 FMS session executed on a touchscreen tablet, where the subject performed a series of interactive tasks. The investigation studies how fine motor skills are affected by long-term microgravity exposure, different phases of microgravity adaptation, and sensorimotor recovery after returning to Earth gravity. The goal of FMS is to answer how fine motor performance in microgravity trends/varies over the duration of a six-month and year-long space mission; how fine motor performance on orbit compares with that of a closely matched participant on Earth; and how performance trends/varies before and after gravitational transitions, including the periods of early flight adaptation, and very early/near immediate post-flight periods. Veg-03 Operations: The crew checked and photo documented the status of the plants in the Veggie facility, and evaluated the plant pillows to determine if additional watering was required. The Veg-03 investigation uses the Veggie plant growth facility to cultivate a type of cabbage, lettuce and mizuna which are harvested on-orbit with samples returned to Earth for testing.  Organisms grow differently in space, from single-celled bacteria to plants and humans. Future long-duration space missions will require crew members to grow their own food, so understanding how plants respond to microgravity is an important step toward that goal. Veg-03 uses the Veggie plant growth facility to cultivate a type of cabbage, lettuce and mizuna which are harvested on-orbit with samples returned to Earth for testing. USOS Extra-Vehicular Activity (EVA) #46 Preparations:  Today the crew reconfigured necessary EVA tools and resized an EVA Mobility Unit (EMU) in support of next week’s EVA.  The goals of this EVA include Removal and Replacement (R&R) of the degraded CP13 camera and lubrication of the Latching End Effector (LEE) B. Today’s Planned Activities All activities were completed unless otherwise noted. Multi Omics Saliva Operations Multi Omics Saliva sample MELFI Insertion Multi Omics Question KUBIK Temperature Logger Deinstallation KUBIK Temperature Adjustment to 38°C ISS Crew and ГОГУ (RSA Flight Control Team) Weekly Conference USOS Window Shutter Close ISS HAM Radio Power Down Extravehicular Activity (EVA) Tool Configuring Inventory Management System (IMS) conference Treadmill 2 (T2) Exercise Video Equipment Setup Fine Motor Skills Experiment Test – Subject Vacuum Cleaning ВД1 and ВД2 air ducts in MRM2 Photography of the БД-2 treadmill belt edge and screen form of Belt tab Progress 436 [AO] Cargo Transfers and IMS Ops At Home In Space Culture Photo СОЖ Maintenance ACME Insertion Configuration CIR Window Replacement In Flight Maintenance (IFM) Waste and Hygiene Compartment (WHC) Pre-Treat Tank and Dose Pump Remove & Replace Monitoring shutter closure on windows 6, 8, 9, 12, 13, 14. EML Reprogramming Cable installation CIR Vent Filter Replacement MPEG2 Multicast Test via Ku-band (Activation/Deactivation of TV data and MPEG2 Multicast controls). Tagup with specialists Preparation for Progress 437 Docking Fluids Integrated Rack Hardware Gather Progress 437 Docking to DC1 Activation of MPEG2 Multicast TV Monitoring Equipment. Tagup with specialists Combustion Integrated Rack Front End Cap Close Extravehicular Mobility Unit (EMU) Long Life Battery (LLB) Terminate Activation of mpeg2 multicast video recording mode Combustion Integrated Rack Rack Doors Close VEG-03 Plant Photo Closing Applications and Downlink of MPEG2 Multicast Video via OCA Combustion Integrated Rack Hardware Return Health Maintenance System (HMS) Spaceflight Cognitive Assessment Tool for Windows (WinSCAT) Test CHeCS Rack stowage reconfiguration BIOPLENKA. Installation of Thermostat ТБУ-В No.05 In Flight Maintenance (IFM) Waste and Hygiene Compartment (WHC) Full Fill EML Reprogramming Cable removal PRODUTSENT. ТБУ-В No.2 Incubator Setup Progress 436 [AO] Stowage for Disposal and IMS Ops BIOPLENKA. Installation of Cryogem-03 Extravehicular Mobility Unit (EMU) Resize Water Recovery System Waste Water Tank Drain Emergency RS ISS VHF-1 Comm Checkout from USOS IMS Update Regenerative Environmental Control and Life Support System (RGN) Wastewater Storage Tank Assembly (WSTA) Fill Flight Director/ISS CREW CONFERENCE CONTENT. Experiment Ops  Completed Task […]

from ISS On-Orbit Status Report http://ift.tt/2yhIApb
via IFTTT

Anonymous Ltd

jobs with Anonymous Ltd to view and apply for now with Independent Jobs.

from Google Alert - anonymous http://ift.tt/2yI3hhi
via IFTTT

Scam Alert: Your Trusted Friends Can Hack Your Facebook Account

If you receive a message from any of your Facebook Friends asking for urgent help to recover their Facebook account, since they've added you as one of their 'Trusted Contacts'—just don’t blindly believe it. Researchers have detected a new Facebook phishing scam that can even trick an experienced technical user into falling victim to the scam, helping an attacker gain access to your Facebook


from The Hacker News http://ift.tt/2xDw1rh
via IFTTT

Thursday, October 12, 2017

Priority: Anonymous & Moderated Marking

About Priority: Anonymous & Moderated Marking. Home · Activity · Content · Images · People · Subspaces and Projects · Events; More. Log in to follow, ...

from Google Alert - anonymous http://ift.tt/2wS13HC
via IFTTT

8th Street, Ocean City, MD's surf is at least 5.15ft high

Maryland-Delaware, October 14, 2017 at 10:00PM

8th Street, Ocean City, MD Summary
At 4:00 AM, surf min of 6.04ft. At 10:00 AM, surf min of 5.51ft. At 4:00 PM, surf min of 5.11ft. At 10:00 PM, surf min of 5.15ft.

Surf maximum: 5.8ft (1.77m)
Surf minimum: 5.15ft (1.57m)
Tide height: 0.41ft (0.12m)
Wind direction: S
Wind speed: 10.17 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

Alcoholics Anonymous symbol (AA)

I created an Addicts Victorious sign http://ift.tt/2kLsFfI and a Narcotics Anonymous sign ...

from Google Alert - anonymous http://ift.tt/2xAPvgh
via IFTTT

How do I iteratively fill a large matrix within an anonymous function?

I have developed the method and applied it to a simpler problem with excellent results. In order to do this I defined the following anonymous functions ...

from Google Alert - anonymous http://ift.tt/2xDqpgC
via IFTTT

Anonymous access

Solved: Hello @Community, I have a power query with a REST api call: authKey = "Bearer blablablaKey", url =

from Google Alert - anonymous http://ift.tt/2yhkknu
via IFTTT

How to Be Even More Anonymous Online

To protect your privacy online, we explain how Tor offers better anonymity than a VPN.

from Google Alert - anonymous http://ift.tt/2z3UYZi
via IFTTT

ISS Daily Summary Report – 10/11/2017

NeuroMapping: Today two 52S crewmembers set up the NeuroMapping hardware and performed their Flight Day 30 tests in “strapped in” and “free floating” body configurations. During the test, the crewmembers executed three Behavioral Assessments: mental rotation, sensorimotor adaptation, and motor-cognitive dual tasking. The NeuroMapping investigation studies whether long-duration spaceflight causes changes to brain structure and function, motor control, or multi-tasking abilities. It also measures how long it would take for the brain and body to recover from possible changes. Previous research and anecdotal evidence from astronauts suggests movement control and cognition can be affected in microgravity. The NeuroMapping investigation performs structural and functional magnetic resonance brain imaging (MRI and fMRI) to assess any changes that occur after spending months on the ISS. Combustion Integrated Rack (CIR) Configuration for Advanced Combustion via Microgravity Experiments (ACME): To support the ACME payload investigation, the crew disconnected water umbilicals at the CIR Z-Panel to remove water pressure from the rack and then removed the Multi-user Droplet Combustion Apparatus (MDCA) Chamber Insert Assembly (CIA) from the CIR combustion chamber for the final time. The ACME chamber insert for the first set of test points was configured and connected into the CIR Combustion Chamber.  After the water umbilicals were reconnected to the Z-Panel, the crew performed a leak check. Due to the amount of hardware requiring installation, activities will be conducted over the next two days. The ACME investigation is a set of five independent studies of gaseous flames to be conducted in the CIR. ACME’s primary goal is to improved fuel efficiency and reduced pollutant production in practical combustion on Earth. Its secondary goal is to improve spacecraft fire prevention through innovative research focused on materials flammability. Post Extra Vehicular Activity (EVA) Tasks: Today crewmembers participated in an EVA debrief conference with ground specialists, preformed battery maintenance, and serviced the water system on the Extravehicular Mobility Units (EMUs) used during yesterday’s EVA. During US EVA #45 the crew successfully Removed and Replaced (R&R) the External Television Camera Group (ETVCG) located at Camera Port 9 (CP9) and lubricated the newly installed Latching End Effector (LEE) A on the Space Station Robotic Manipulator System (SSRMS).   Today’s Planned Activities All activities were completed unless otherwise noted. Calf Volume Measurement SPLANKH. EGEG Recording. SPLANKH. Photography of the Experiment Session KUBIK Temperature Adjustment to 6°C ISS HAM Video Power Up Multi Omics Item Gathering Study of veins in lower extremities. Snapshot of Cardiomed windows on MSE-Med PK-4 Flexhose connection to Neon gas bottle Nikon still camera sync with station time Health Maintenance System (HMS) Periodic Health Status (PHS) Post EVA Examination Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Drain Public Affairs Office (PAO) Event in High Definition (HD) in Columbus PK-4 Gas Supply Flexhose disconnection for storage NeuroMapping Experiment Neurocognitive Test Video – Subject RELAKSATSIYA. Parameter Settings Adjustment. Regenerative Environmental Control and Life Support System (RGN) Wastewater Storage Tank Assembly (WSTA) Fill RELAKSATSIYA. Observation. ISS HAM Service Module Pass Manufacturing Device Print Removal and Stow Metal Oxide (METOX) Regeneration Termination Public Affairs Office (PAO) Social Media Event Extravehicular Mobility Unit (EMU) Long Life Battery (LLB) Initiate Battery Stowage Assembly (BSA) Operation Initiation Filling (separation) of ЕДВ (КОВ) for Elektron or ЕДВ-СВ Rodnik Bag Audit ACME MWA Prep Plug-in Plan (PiP) GFCI Cable Swap СОЖ Maintenance Combustion Integrated Rack Rack Doors Open Extravehicular Mobility Unit (EMU) Water Recharge Polar IMAK Sample Swap Combustion Integrated Rack Front End Cap Open Polar Desiccant Pack insert Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Fill ACME Insertion Configuration 1 Download Pille Dosimeter Readings Pille Dosimeter Readout after US EVA IMS Update Extravehicular Activity (EVA) Debrie Completed Task List Activities None Ground Activities All activities were completed unless otherwise noted. SSRMS Walkoff Standard commanding Three-Day Look Ahead: Thursday, 10/12: CIR Ops and ACME Config, WHC Dose Pump R&R, EVA 46 Tool Config Friday, 10/13: ETVCG Build, FIR Reconfiguration, DECLIC Hose Return, EVA Procedure Review and Conference Saturday, 10/14: Housekeeping Tasks, Crew Off-Day QUICK ISS Status – Environmental Control Group:   Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off           [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Standby Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Full Up Trace Contaminant Control System (TCCS) Node 3 Off  

from ISS On-Orbit Status Report http://ift.tt/2ye9OiU
via IFTTT

I have a new follower on Twitter


VIVA Holdings
VIVA - The future of finance & your financial future. VIVA Crowns = Business License. Get yours at https://t.co/AyhF9ijlGU #cryptocurrency #FinTech #VIVAconomy

https://t.co/fV6gJD7J2v
Following: 2382 - Followers: 2881

October 12, 2017 at 10:46AM via Twitter http://twitter.com/viva_coin

Online Training for CISA, CISM, and CISSP Cyber Security Certifications

Believe it or not, but any computer connected to the Internet is vulnerable to cyber attacks. With more money at risk and data breaches at a rise, more certified cyber security experts and professionals are needed by every corporate and organisation to prevent themselves from hackers and cyber thieves. That's why jobs in the cyber security field have gone up 80% over the past three years


from The Hacker News http://ift.tt/2qES9hy
via IFTTT

MS Office Built-in Feature Allows Malware Execution Without Macros Enabled

Since new forms of cybercrime are on the rise, traditional techniques seem to be shifting towards more clandestine that involve the exploitation of standard system tools and protocols, which are not always monitored. Security researchers at Cisco's Talos threat research group have discovered one such attack campaign spreading malware-equipped Microsoft Word documents that perform code


from The Hacker News http://ift.tt/2gxnKdZ
via IFTTT

Buggy Microsoft Outlook Sending Encrypted S/MIME Emails With Plaintext Copy For Months

Beware, If you are using S/MIME protocol over Microsoft Outlook to encrypt your email communication, you need to watch out. From at least last 6 months, your messages were being sent in both encrypted and unencrypted forms, exposing all your secret and sensitive communications to potential eavesdroppers. S/MIME, or Secure/Multipurpose Internet Mail Extensions, is an end-to-end encryption


from The Hacker News http://ift.tt/2gz84qw
via IFTTT

NGC 1365: Majestic Island Universe


Barred spiral galaxy NGC 1365 is truly a majestic island universe some 200,000 light-years across. Located a mere 60 million light-years away toward the chemical constellation Fornax, NGC 1365 is a dominant member of the well-studied Fornax galaxy cluster. This impressively sharp color image shows intense star forming regions at the ends of the bar and along the spiral arms, and details of dust lanes cutting across the galaxy's bright core. At the core lies a supermassive black hole. Astronomers think NGC 1365's prominent bar plays a crucial role in the galaxy's evolution, drawing gas and dust into a star-forming maelstrom and ultimately feeding material into the central black hole. via NASA http://ift.tt/2g120qf

Wednesday, October 11, 2017

Anonymous downloads are no longer supported

... Content; JGI Home · Genome Portal · Login. Please log in or register a free account to download the data. Requested resource or function is.

from Google Alert - anonymous http://ift.tt/2z1wAr0
via IFTTT

Online tool for anonymous agricultural complaints

The ACCC has launched a new online tool for the agriculture sector to anonymously report concerns about competition or fair trading issues.

from Google Alert - anonymous http://ift.tt/2zgNcfz
via IFTTT

Drexel Caves to Anonymous Internet Trolls, Places Tenured Professor on Administrative Leave

Drexel Caves to Anonymous Internet Trolls, Places Tenured Professor on Administrative Leave. George Ciccariello-Maher, tenured associate ...

from Google Alert - anonymous http://ift.tt/2i4gLgb
via IFTTT

Anonymous user 6fc542

Name, Anonymous user 6fc542. User since, August 31, 2017. Number of add-ons developed, 1 theme. Average rating of developer's add-ons, Not yet ...

from Google Alert - anonymous http://ift.tt/2i3PdYj
via IFTTT

Lisa (Century Meeting)

Lisa (Century Meeting). October 11, 2017 L Y. Lisa (Century Meeting). OASF. Share. Audry (Century Meeting) → · MEETINGS EVENTS FOR ...

from Google Alert - anonymous http://ift.tt/2kHi2e0
via IFTTT

Staying Anonymous on the Blockchain: Concerns and Techniques

Yet there are concerns that online currency transactions may not be as anonymous as many wish. In this post, we will discuss several tools that make ...

from Google Alert - anonymous http://ift.tt/2g1LXbG
via IFTTT

ISS Daily Summary Report – 10/10/2017

USOS Extra Vehicular Activity (EVA) #45: Today Randy Bresnik (as EV1) and Mark Vande Hei (as EV2) successfully performed US EVA #45 with a Phased Elapsed Time (PET) of 6:26. The primary goal of today’s EVA was to Remove and Replace (R&R) the External Television Camera Group (ETVCG) located at Camera Port 9 (CP9) and to lubricate the newly installed Latching End Effector (LEE) A on the Space Station Robotic Manipulator System (SSRMS). The LEE A was installed onto the SSRMS last week during USOS EVA #44.  Additional tasks accomplished include: Airlock High Pressure Gas Tank (HPGT) handle tie back, rotation of the Pump/Flow Control Subassembly (PFCS), R&R of the Mobile Base System (MBS) mast Camera/Light/PTU Assembly (CLPA) lens cover, removal of a handrail from Node 3, and BDCU MLI Removal.  At Home in Space:  The crew took photographs today to document the current on-orbit ISS culture. This Canadian Space Agency investigation assesses culture, values, and psychosocial adaptation of astronauts to a space environment shared by multinational crews on long-duration missions. It is hypothesized that astronauts develop a shared space culture that is an adaptive strategy for handling cultural differences and they deal with the isolated confined environment of the spacecraft by creating a home in space. At Home in Space also uses questionnaires to investigate individual and culturally related differences, family functioning, values, coping with stress, and post-experience growth. Today’s Planned Activities All activities are on schedule unless otherwise noted. Extravehicular Activity (EVA) Reminder for EVA In-Suit Light Exercise (ISLE) Preparation External Wireless Instrumentation System Network Control Unit EVA Inhibit LAB Wireless Access Point Port Inhibit ISS HAM Radio and Video Power Down USOS Extravehicular Activity (EVA) Communication Configuration EVA COTS UHF Communication Unit (CUCU)  Verify off USOS Window Shutter Close Extravehicular Activity (EVA) In-Suit Light Exercise (ISLE) Preparation KUBIK Temperature Adjustment to 20°C Verify that SM Window Shutters #6, 8, 9, 12, 13, 14 are closed. CALCIUM. Session 7 of the Experiment Extravehicular Mobility Unit (EMU) Purge Monitoring of ИП-1 Sensors Installation Extravehicular Mobility Unit (EMU) In-Suit Light Exercise (ISLE) Prebreathe Video Recording of Greetings VIZIR. Preparation. Tagup with specialists if required PK-4 Flexhose connection to Cleaning gas bottle Crewlock Depress Crewlock Post Depress Crewlock Egress Airlock High Pressure Gas Tank (HPGT) Reconfig SSRMS Setup and Worksite Interface (WIF) Adapter Install SSRMS EVA Support Articulating Portable Foot Restraint (APFR) and Worksite Interface Extender (WIFEX) Setup [АСУ] Set R&R  Pump and Flow Control Subassembly (PFCS) Rotate СОЖ Maintenance CP9 External TV Camera Group (ETVCG) R&R Vacuum Cleaning of Ventilation Screens on FGB Interior Panels 201, 301, and 401 VIZIR. Closeout Operations Mobile Base System (MBS) Mast Camera Light Pan-Tilt Assembly (CLPA) Lens Cover R&R SSRMS Cleanup Special Purpose Dexterous Manipulator (SPDM) Latching End Effector (LEE) Lube Worksite Interface (WIF) Adapter Remove Worksite Cleanup Node 3 Handrail Remove Articulating Portable Foot Restraint (APFR) Cleanup SPLANKH. Preparation for the Experiment Crewlock Ingress IMS Delta File Prep Regenerative Environmental Control and Life Support System (RGN) Wastewater Storage Tank Assembly (WSTA) Fill [Deferred] At Home In Space Culture Photo PK-4 Flexhose disconnection from Cleaning bottle ACME Session Review EVA Glove Photo Setup Crewlock Pre Repress Crewlock Repress Extra Vehicular Activity (EVA) Post-EVA Activities Post Extravehicular Activity (EVA) Communication Deconfiguration EVA Glove Photo Downlink Extravehicular Activity (EVA) Camera Image Downlink Photo/TV Extravehicular Activity (EVA) GoPro Downlink Metal Oxide (METOX) Regeneration Initiation External Wireless Instrumentation System (EWIS) Network Control Unit (NCU) Enable LAB Wireless Access Point Port Enable  Completed Task List Activities At Home In Space Questionnaire [GMT 283] Stowage audit of COL Endcone  [GMT 283] Total Organic Carbon Analyzer (TOCA) Protoflight Unit #3 (PFU3) Close Out and Stow [GMT 283] Ground Activities All activities are on schedule unless otherwise noted. Support for EVA Standard commanding Three-Day Look Ahead: Wednesday, 10/11: Urine Transfer, ACME Chamber Install and Config, Neuromapping, HAM Radio Ops Thursday, 10/12: CIR Ops and ACME Config, WHC Dose Pump R&R, EVA 46 Tool Config Friday, 10/13: ETVCG Build, FIR Reconfiguration, DECLIC Hose Return, EVA Procedure Review and Conference QUICK ISS Status – Environmental Control Group:   Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off          [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Operate Carbon Dioxide Removal Assembly (CDRA) Node 3 Startup Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Full Up Trace Contaminant Control System (TCCS) Node 3 Off    

from ISS On-Orbit Status Report http://ift.tt/2wO6PtW
via IFTTT

Israel Hacked Kaspersky, Caught Russian Spies Hacking American Spies, But...

The cold cyber war has just turned hot. According to a story published today by the New York Times, Israeli government hackers hacked into Kaspersky’s network in 2015 and caught Russian government hackers red-handed hacking US government hackers with the help of Kaspersky. In other words — Russia spying on America, Israel spying on Russia and America spying on everyone. What the F^#% is


from The Hacker News http://ift.tt/2yfNF3r
via IFTTT

Kitchen Porter

View details and apply for this kitchen porter job in Victoria, South West London (SW1) with Anonymous on Caterer.com. Kitchen Porter (15% ...

from Google Alert - anonymous http://ift.tt/2yECa6F
via IFTTT

Hackers Steal $60 Million from Taiwanese Bank; Two Suspects Arrested

A Taiwanese bank has become the latest to fall victim to hackers siphoning off millions of dollars by targeting the backbone of the world financial system, SWIFT. SWIFT, or Society for Worldwide Interbank Telecommunication, is a global financial messaging system that thousands of banks and commercial organizations across the world use to transfer billions of dollars every day. Hackers


from The Hacker News http://ift.tt/2i2pijE
via IFTTT

Microsoft Issues Patches For Severe Flaws, Including Office Zero-Day & DNS Attack

As part of its "October Patch Tuesday," Microsoft has today released a large batch of security updates to patch a total of 62 vulnerabilities in its products, including a severe MS office zero-day flaw that has been exploited in the wild. Security updates also include patches for Microsoft Windows operating systems, Internet Explorer, Microsoft Edge, Skype, Microsoft Lync and Microsoft


from The Hacker News http://ift.tt/2wNHLCY
via IFTTT

EFS-to-EFS Backup Solution

Overview of the collection of anonymous data for the EFS-to-EFS backup solution.

from Google Alert - anonymous http://ift.tt/2y9Dzla
via IFTTT

[InsideNothing] jeffreydhairston liked your post "[FD] Kajona 4.7: XSS & Directory Traversal"



Source: Gmail -> IFTTT-> Blogger

[InsideNothing] jeffreydhairston liked your post "[InsideNothing] charlesdoliver liked your post "[InsideNothing] Web Development liked your post "[InsideNothing] hitebook.net liked your post "[FD] Kajona 4.7: XSS & Directory Traversal""""



Source: Gmail -> IFTTT-> Blogger

Star Cluster NGC 362 from Hubble


If our Sun were near the center of NGC 362, the night sky would glow like a jewel box of bright stars. Hundreds of stars would glow brighter than Sirius, and in many different colors. Although these stars could become part of breathtaking constellations and intricate folklore, it would be difficult for planetary inhabitants there to see -- and hence understand -- the greater universe beyond. NGC 362 is one of only about 170 globular clusters of stars that exist in our Milky Way Galaxy. This star cluster is one of the younger globulars, forming likely well after our Galaxy. NGC 362 can be found with the unaided eye nearly in front of the Small Magellanic Cloud, and angularly close to the second brightest globular cluster known, 47 Tucanae. The featured image was taken with the Hubble Space Telescope to help better understand how massive stars end up near the center of some globular clusters. via NASA http://ift.tt/2zc33My

Tuesday, October 10, 2017

Anonymous - Executive Chef/Kitchen Manager

Anonymous - Executive Chef/Kitchen Manager – Boston Restaurant Jobs - BostonChefs.com's Industry Insider, the best jobs at Boston restaurants.

from Google Alert - anonymous http://ift.tt/2y9UIsz
via IFTTT

Bulk extract of anonymous activity

Anyone know of a way to download all activity even from anonymous visitors? We would like to use it for internal reporting and both the bulk extract ...

from Google Alert - anonymous http://ift.tt/2wMtEy7
via IFTTT

OnePlus Secretly Collects Way More Data Than It Should — Here’s How to Disable It

There is terrible news for all OnePlus lovers. Your OnePlus handset, running OxygenOS—the company's custom version of the Android operating system, is collecting way more data on its users than it requires. A recent blog post published today by security researcher Christopher Moore on his website detailed the data collection practice by the Shenzhen-based Chinese smartphone maker, revealing


from The Hacker News http://ift.tt/2xv9m0q
via IFTTT

Report: Anonymous location tracking proves difficult for individual privacy

A Freedom of Information request for London's transport regulator to release "anonymized" data from a four-week trial to map travel flows, ...

from Google Alert - anonymous http://ift.tt/2hZLPhc
via IFTTT

Watch Out! Difficult-to-Detect Phishing Attack Can Steal Your Apple ID Password

Can you detect which one of the above screens—asking an iPhone user for iCloud password—is original and which is fake? Well, you would agree that both screenshots are almost identical, but the pop-up shown in the second image is fake—a perfect phishing attack that can be used to trick even the most careful users on the Internet. Felix Krause, an iOS developer and founder of Fastlane.Tools,


from The Hacker News http://ift.tt/2y91WPI
via IFTTT

[FD] Executable installers are vulnerable^WEVIL (case 54): escalation of privilege with PostgresSQL installers for Windows

[FD] OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) - SQL Injection

(This is re-submission of corrected advisory due to accidental CVE-ID swapping) Title: OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) - SQL Injection Author: Marcin Woloszyn Date: 27. September 2017 CVE: CVE-2017-14758 Affected Software: ================== OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) Exploit was tested on: ====================== v4.5SP1 Patch 13 (older versions might be affected as well) SQL Injection: ============== Due to lack of prepared statements an application is prone to SQL Injection attacks. Potential attacker can retrieve data from application database by exploiting the issue. Vector :

Source: Gmail -> IFTTT-> Blogger

[FD] SSD Advisory – Vacron NVR Remote Command Execution

SSD Advisory – Vacron NVR Remote Command Execution Full report: http://ift.tt/2z77Rmc Twitter: @SecuriTeam_SSD Weibo: SecuriTeam_SSD Vulnerability Summary The following advisory describes a remote command execution vulnerability. VACRON Specializing in “various types of mobile monitoring, CCTV monitoring system, IP remote image monitoring system monitoring and other related production, and can accept ODM, OEM and other customized orders, the main products: driving recorder, CCTV analog monitoring system, CMS, IP Cam, etc.” Credit An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program. Vendor response We tried to contact Vacron since September 5 2017, repeated attempts to establish contact went unanswered. At this time there is no solution or workaround for the vulnerability.

Source: Gmail -> IFTTT-> Blogger

Re: [FD] SmartBear SoapUI - Remote Code Execution via Deserialization

For users of the "next" branch, if you've built the project since Feb 3rd, you're probably safe (RMI/Cajo disabled and libraries updated): http://ift.tt/2y6nwnZ http://ift.tt/2gafcgh -HN

Source: Gmail -> IFTTT-> Blogger

[FD] ArcGIS Server 10.3.1: RMIClassLoader useCodebaseOnly=false RCE

Using an Esri-provided image on Azure's Marketplace, ArcGIS Server 10.3.1 started Java's rmid on port 1098 and explicitly set the property java.rmi.server.useCodebaseOnly equal to false. Screenshot: http://ift.tt/2yD2s9r As discussed on Oracle's website, the default value of java.rmi.server.useCodebaseOnly was changed to true in Java 7 Update 21, with a remark that setting it to false could create a risk of RCE. Link: http://ift.tt/171nbMZ While the version of Java included in ArcGIS Server 10.3.1 appears to be Java 7 Update 76, which would have the more secure default setting, that is irrelevant due to the ArcGIS solution manually changing it. Screenshot: http://ift.tt/2y8ogZK When an attacker can remotely reach rmid on the victim server, and the victim server can reach a web server on a machine controlled by the attacker, this is relatively easily exploited to gain RCE. Video: http://ift.tt/2g9MeNl Administrators are encouraged to use a tool such as Process Explorer or wmic to ensure that the command line arguments passed to rmid have the java.rmi.server.useCodebaseOnly property equal to true. During testing, Esri-provided images on Azure's Marketplace for ArcGIS Server 10.4.1 and 10.5.1 were found to set that property to true; administrators may try updating to a newer version of ArcGIS Server, and/or contacting Esri for assistance. If an update is required but not immediately possible, consider firewall rules to block access to rmid from systems that have no need to connect to it.

Source: Gmail -> IFTTT-> Blogger

Re: [FD] ArcGIS Server 10.3.1: RMIClassLoader useCodebaseOnly=false RCE

[FD] DefenseCode ThunderScan SAST Advisory: WordPress Ad Widget Plugin Local File Inclusion Security Vulnerability

              DefenseCode ThunderScan SAST Advisory          WordPress Ad Widget Plugin Local File Inclusion                      Security Vulnerability Advisory ID:    DC-2017-01-001 Advisory Title: WordPress Ad Widget Plugin Local file Inclusion  Security Vulnerability Advisory URL:   http://ift.tt/2rhPqdW Software:       WordPress Ad Widget plugin Language:       PHP Version:        2.10.0 and below Vendor Status:  Vendor contacted, update released Release Date:   2017/10/10 Risk:           Medium 1. General Overview =================== During the security audit of Ad Widget plugin for WordPress CMS, security vulnerability was discovered using DefenseCode ThunderScan application source code security analysis platform. More information about ThunderScan is available at URL: http://ift.tt/Vn2J4r 2. Software Overview ==================== According to the plugin developers, Ad Widget enables it's users to easily upload ad images and ad code to their sidebar, for those that don't need or want a complicated ad management system. According to wordpress.org, it has more than 30,000 active installs. Homepage: http://ift.tt/1EgnCmo http://ift.tt/2xwW9iU http://ift.tt/2xuZCmP         3. Vulnerability Description ============================ During the security analysis, ThunderScan discovered Local File Inclusion vulnerability in WP Ad Widget plugin. By requesting a specially crafted URL, the attacker can cause remote server to execute a php file of his choosing. Although the user requesting the URL has to be logged into the WordPress administrative console, the attacker can cause the administrator to request such a URL by using various social engineering/phishing approaches. Specified file will be interpreted by php interpreter, and any valid php code will indeed be executed. If the php installation on server has "allow_url_include=1" configuration option set, this attack can be expanded to execute a php file from any remote URL. If the php version is less than 5.3.4, the ".php" that gets appended to the end of the file name attacker chose can be omitted by adding a null character ("%00") to the requested URL, and enable the attacker to execute any file, regardless of the extension. 3.1. Local File Inclusion   File:       ad-widget\views\modal\index.php   Fucntion:   require "$page.php";   Variable:   $_GET['step'];   Sample URL: http://ift.tt/2xwRXzA   File: ad-widget\views\modal\index.php    

Source: Gmail -> IFTTT-> Blogger

Microsoft Cortana Can Now Read Your Skype Messages to Make Chat Smarter

Microsoft today announced built-in support for Cortana—an artificial intelligence-powered smart assistant—in Skype messenger on Android as well as iOS devices. What purpose does it serve? Microsoft wants its AI-based smart assistance to understand your conversations and help you with quick suggestions, ideas and information right inside your chat window. "Cortana can also help you organize


from The Hacker News http://ift.tt/2xwytLk
via IFTTT

📈 Ravens rise 4 spots to No. 18 in Week 6 NFL Power Rankings (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Brazilian politician: “Freedom of expression is guaranteed, but it cannot be anonymous”

Freedom of expression is not doing well in Brazil. A new law approved last Thursday by the Brazilian Congress allows political parties and candidates ...

from Google Alert - anonymous http://ift.tt/2kBiI4F
via IFTTT

ISS Daily Summary Report – 10/09/2017

Multi-Omics Sample Collections: A 52S crewmember collected fecal samples for the Japan Aerospace Exploration Agency (JAXA) Multi-Omics experiment. The samples were placed into the Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI). The Multi-omics analysis of human microbial-metabolic cross-talk in the space ecosystem (Multi-Omics) investigation evaluates the impacts of space environment and prebiotics on astronauts’ immune function, by combining the data obtained from the measurements of changes in the gut microbiological composition, metabolites profiles, and the immune system. Veg-03 Operations: The crew photodocumented the status of the plants in the Veggie facility, and evaluated the plant pillows to determine if additional watering is required. The Veg-03 investigation uses the Veggie plant growth facility to cultivate a type of cabbage, lettuce and mizuna which are harvested on-orbit with samples returned to Earth for testing.  Organisms grow differently in space, from single-celled bacteria to plants and humans. Future long-duration space missions will require crew members to grow their own food, so understanding how plants respond to microgravity is an important step toward that goal. Veg-03 uses the Veggie plant growth facility to cultivate a type of cabbage, lettuce and mizuna which are harvested on-orbit with samples returned to Earth for testing. USOS Extra Vehicular Activity (EVA) 45 Preparation: Today the crew reconfigured necessary EVA tools, reviewed procedures, and participated in a conference with ground EVA planners in support of next week’s EVA.  The goals of this EVA include: Removal and Replacement of the degraded CP9 camera and lubrication of the Latching End Effector (LEE) B. External Robotics Operations:  Over the weekend, robotics ground controllers walked the Space Station Remote Manipulator System (SSRMS) onto Mobile Base System (MBS) Power Data Grapple Fixture 3 (PDGF3).  They then maneuvered SSRMS as required to perform a video and imagery survey of the Latching End Effector B (LEE-B) snare cables using an External High Definition Camera (EHDC).  Once the survey was completed, the SSRMS was walked off onto MBS PDGF4 in preparation of US EVA 45 scheduled tomorrow (GMT 283).  Today’s Planned Activities All activities were completed unless otherwise noted. TORU OBT. Tagup with Instructor Multi Omics Fecal Sample Operations KUBIK 6 Setup Multi Omics Fecal Sample MELFI Insertion Columbus WOOV9,10 Inspection Adjustment of KUBIK sensor signal to e-box US Extravehicular Activity (EVA) Tether Inspection KUBIK Temperature Measurement Environmental Health System (EHS) Total Organic Carbon Analyzer (TOCA) Water Recovery System (WRS) Sample Analysis Extravehicular Activity (EVA) Tool Configuring BIOCARD. Experiment Session Assistance BIOCARD. Experiment Session VEG-03 Plant Photo Extravehicular Activity (EVA) Tool Audit Progress 436 [AO] Cargo Transfers and IMS Ops Extravehicular Activity (EVA) Procedure Review PELLE Data Download & deployment before EVA MOTOCARD. Experiment Session Extravehicular Activity (EVA) Node 1 Vacuum Access Port (VAP) Check Regenerative Environmental Control and Life Support System (RGN) Wastewater Storage Tank Assembly (WSTA) Fill ЕДВ Inspection Environmental Health System (EHS) Total Organic Carbon Analyzer (TOCA) Sample Data Record MOTOCARD. Photography of “Diasled” holster and БП-015 unit СОЖ maintenance Extravehicular Mobility Unit (EMU) Cuff Checklist Print Equipment Lock (E-LK) Preparation Contingency Water Container (CWC) Locate Extravehicular Activity (EVA) Procedure Conference Exercise Data Downlink via OCA  Completed Task List Activities Emergency Mask OBT Questionnaire ESA-PAO-CABOT ESA-PAO-CPR ESA-PAO-EUINST ESA PAO Recorded Message Science Festival EVA BAYONET RECEPTACLE CLEAN Extravehicular Glove Inspection Health Maintenance System (HMS) Spaceflight Cognitive Assessment Tool for Windows (WinSCAT) Test Printer Troubleshoot VEG-03 Plant Pillow Water VEG-03 Plant Pillow Water WHC Trash Photograph Ground Activities All activities were completed unless otherwise noted. CDRA blower fan speed test Standard commanding Three-Day Look Ahead: Tuesday, 10/09: US EVA 45 Wednesday, 10/11: Urine Transfer, ACME Chamber Install and Config, Neuromapping, HAM Radio Ops Thursday, 10/12: CIR Ops and ACME Config, WHC Dose Pump R&R, EVA 46 Tool Config  QUICK ISS Status – Environmental Control Group:   Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off           [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Operate Carbon Dioxide Removal Assembly (CDRA) Node 3 Standby Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Full Up Trace Contaminant Control System (TCCS) Node 3 Off    

from ISS On-Orbit Status Report http://ift.tt/2i1Xko5
via IFTTT

Warning: Millions Of P0rnHub Users Hit With Malvertising Attack

Researchers from cybersecurity firm Proofpoint have recently discovered a large-scale malvertising campaign that exposed millions of Internet users in the United States, Canada, the UK, and Australia to malware infections. Active for more than a year and still ongoing, the malware campaign is being conducted by a hacking group called KovCoreG, which is well known for distributing Kovter ad


from The Hacker News http://ift.tt/2y9SDwQ
via IFTTT

anonymous.b6b480

User of QuickBooks Learn & Support, Helpful Votes: 0, Questions Asked: 1, Answered: 0.

from Google Alert - anonymous http://ift.tt/2i0yrJA
via IFTTT

PitchBook Review: Inaccurate data by Anonymous Reviewer

What are the best aspects of this product? Has a lot of investment information for companies which isn't available anywhere else. What aspects are ...

from Google Alert - anonymous http://ift.tt/2hYXywj
via IFTTT

Monday, October 9, 2017

Anonymous Interviews Dissertation Proposal Example – 647444

Anonymous interviews dissertation proposal – rmpclub.orgDissertation proposal interviews Anonymous Sample Essay on Inventory Control Seven ...

from Google Alert - anonymous http://ift.tt/2g6zIy8
via IFTTT

Alcohols anonymous in Punta Cana

My partner and I are traveling to the Iberostar Dominicana hotel in Punta Cana December 3rd through December 10th and are looking for an American ...

from Google Alert - anonymous http://ift.tt/2xvinl7
via IFTTT

Seg. 1) Anonymous

Martin Kilcoyne and Charlie Marlow are broadcasting from Aberdeen Golf Club in Eureka discussing the big “sports” stories of the day. The post The ...

from Google Alert - anonymous http://ift.tt/2kC8sZI
via IFTTT

Christine Hewitt, CFAX Santas Anonymous

Christine Hewitt, CFAX Santas Anonymous.

from Google Alert - anonymous http://ift.tt/2gou1bQ
via IFTTT

The influence of anonymous peers on prosocial behavior

Purpose. The purpose of this study was to examine anonymous peer influence on college students' prosocial behavior, specifically behavior for the ...

from Google Alert - anonymous http://ift.tt/2gpKCfv
via IFTTT

anonymous

THE BOY WHO NEVER CRIED Part 1. The story is about a boy Akshay, his struggles his longing for his family and why he never cried. 0. 4 Launches.

from Google Alert - anonymous http://ift.tt/2i0RuUl
via IFTTT

Optimizing OpenCV on the Raspberry Pi

This tutorial is meant for advanced Raspberry Pi users who are looking to milk every last bit of performance out of their Pi for computer vision and image processing using OpenCV.

I’ll be assuming:

  1. You have worked through my previous Raspberry Pi + OpenCV install tutorials (ideally multiple times).
  2. You are comfortable with the command line and Unix environments.

Since this is an advanced guide, I’ll be doing less hand holding and instead focusing on the optimizations themselves. If you get stuck or run into an error, you’ll need to refer back to the previous tutorials I offer here on PyImageSearch.

By the time you finish this tutorial, your Raspberry Pi will enjoy a 30% speed increase when executing OpenCV and Python scripts.

To learn more about optimizing OpenCV on your Raspberry Pi, just keep reading.

Looking for the source code to this post?
Jump right to the downloads section.

Optimizing OpenCV on the Raspberry Pi

A couple weeks ago I demonstrated how to deploy a deep neural network to your Raspberry Pi.

The results were satisfactory, taking approximately 1.7 seconds to classify an image using GoogLeNet and 0.9 seconds for SqueezeNet, respectively.

However, I was left wondering if we could do better.

While we cannot train neural networks on the Raspberry Pi, we can deploy pre-trained networks to our Pi — provided we can optimize the Raspberry Pi sufficiently (and the network can fit into the limited memory of the Pi hardware).

In the remainder of this tutorial, we will discuss the optimizations we will leverage during our OpenCV installation, followed by walking through the seven installation steps.

After our optimized OpenCV compile is installed, we’ll run a few quick tests determine if our new OpenCV install is faster than the previous one.

My goal here to demonstrate that the optimizations are in fact much faster on the Raspberry Pi 3 and you should not hesitate to use them in your own projects.

NEON and FVPV3

In my research on how to optimize the Raspberry Pi for OpenCV I came across this excellent article by Sagi Zeevi.

Inside the tutorial Sagi recommends using:

  1. NEON
  2. VFPV3
  3. And optionally Threading Building Blocks (TBB)

I’m not a big fan of TBB as (1) the performance gains are meager and (2) they are a royal pain in the ass to install on the Raspberry Pi.

The most bang for your buck is going to come from NEON and VFPV3.

ARM NEON is an optimization architecture extension for ARM processors. It was designed by the ARM engineers specifically for faster video processing, image processing, speech recognition, and machine learning. This optimization supports Single Instruction Multiple Data (SIMD) (as opposed to SISD, MISD, MIMD), which describes an architecture where multiple processing elements in the pipeline perform operations on multiple data points (hardware) all executed with a single instruction.

The ARM engineers also built VFPV3, a floating point optimization, into the chip our Raspberry Pi 3’s use. The ARM page linked here describes features included in this optimization such as configurable rounding modes and customizable default not a number (NaN) behavior.

What this means for us is that our neural network is likely to run faster because the ARM processor on the Raspberry Pi 3 has hardware optimizations that we can take advantage of with the 4× ARM Cortex-A53, 1.2GHz processor.

I think you’ll be really impressed with the results, so let’s go ahead and get your optimized OpenCV installed on the Raspberry Pi.

Step #1: Expand filesystem and reclaim space

For the remainder of this tutorial I’ll be making the following assumptions:

  1. You are working with a brand new, fresh install of Raspbian Stretch.
  2. This is not the first time you have installed OpenCV on the Raspberry Pi using Python virtual environments. If it is, please get your feet wet using one of my introductory OpenCV install guides.
  3. You are comfortable with the command line and Unix environments.
  4. You know how to debug CMake output for common errors (Python virtual environment not found, missing Python libraries, etc.).

Again, this tutorial is an advanced guide so I’ll presenting the commands and only providing an explanation if it is pertinent — by and large, you should know what these commands do before you execute them.

The first step is to run,

raspi-config
and expand your filesystem:
$ sudo raspi-config

And then reboot your Raspberry Pi:

$ sudo reboot

From there, delete both Wolfram Engine and LibreOffice to reclaim ~1GB of space on your Raspberry Pi:

$ sudo apt-get purge wolfram-engine
$ sudo apt-get purge libreoffice*
$ sudo apt-get clean
$ sudo apt-get autoremove

Step #2: Install dependencies

The following commands will update and upgrade any existing packages, followed by installing dependencies, I/O libraries, and optimization packages for OpenCV:

$ sudo apt-get update && sudo apt-get upgrade
$ sudo apt-get install build-essential cmake pkg-config
$ sudo apt-get install libjpeg-dev libtiff5-dev libjasper-dev libpng12-dev
$ sudo apt-get install libavcodec-dev libavformat-dev libswscale-dev libv4l-dev
$ sudo apt-get install libxvidcore-dev libx264-dev
$ sudo apt-get install libgtk2.0-dev libgtk-3-dev
$ sudo apt-get install libcanberra-gtk*
$ sudo apt-get install libatlas-base-dev gfortran
$ sudo apt-get install python2.7-dev python3-dev

This entire process should take about 5 minutes.

Note: I added 

libcanberra-gtk*
  which grabs the ARM specific GTK to prevent GTK warnings (not errors; warnings) you may encounter when running Python + OpenCV scripts on the Raspberry Pi.

Step #3: Download the OpenCV source code

Next, download the OpenCV source code for both the opencv and opencv_contrib repositories, followed by unarchiving them:

$ cd ~
$ wget -O opencv.zip http://ift.tt/2x4vwWB
$ unzip opencv.zip
$ wget -O opencv_contrib.zip http://ift.tt/2xIPYcC
$ unzip opencv_contrib.zip

Note: You will need to click the “<=>” button in the toolbar of the codeblock above to grab the full paths to the zip archives.

For this blog post, we’ll be using OpenCV 3.3; however, as newer versions of OpenCV are released you can update the corresponding version numbers.

Step #4: Create your Python virtual environment and install NumPy

We’ll be using Python virtual environments, a best practice when working with Python.

You can install pip, virtualenv, and virtualenvwrapper using the following commands:

$ wget http://ift.tt/1mn7OFn
$ sudo python get-pip.py
$ sudo python3 get-pip.py
$ sudo pip install virtualenv virtualenvwrapper
$ sudo rm -rf ~/.cache/pip

Once both

virtualenv
  and
virtualenvwrapper
  have been installed, open up your
~/.profile
  and append the following lines to the bottom of the file, using your favorite terminal-based text editor such as
vim
 ,
emacs
 , or
nano
 :
# virtualenv and virtualenvwrapper
export WORKON_HOME=$HOME/.virtualenvs
source /usr/local/bin/virtualenvwrapper.sh

From there, reload your

~/.profile
  file to apply the changes to your current bash session:
$ source ~/.profile

You’ll need to run

source ~/.profile
  each time you open a new terminal/SSH into your Pi to ensure your system variables have been set properly (it also loads this file on boot).

Next, create your Python 3 virtual environment:

$ mkvirtualenv cv -p python3

Here I am creating a Python virtual environment named

cv
  using Python 3 (alternatively, you may also use Python 2.7 by changing the
-p
  switch to 
python2
 ).

You can name the virtual environment whatever you want, but I use

cv
  as the standard naming convention here on PyImageSearch.

Finally, install NumPy into the Python virtual environment:

$ pip install numpy

Step #5: Compile and install the optimized OpenCV library for Raspberry Pi

We’re now ready to compile and install the optimized version of Raspberry Pi.

Ensure you are in the

cv
  virtual environment using the
workon
  command:
$ workon cv

And from there configure your build:

$ cd ~/opencv-3.3.0/
$ mkdir build
$ cd build
$ cmake -D CMAKE_BUILD_TYPE=RELEASE \
    -D CMAKE_INSTALL_PREFIX=/usr/local \
    -D OPENCV_EXTRA_MODULES_PATH=~/opencv_contrib-3.3.0/modules \
    -D ENABLE_NEON=ON \
    -D ENABLE_VFPV3=ON \
    -D BUILD_TESTS=OFF \
    -D INSTALL_PYTHON_EXAMPLES=OFF \
    -D BUILD_EXAMPLES=OFF ..

Notice how the NEON and VFPV3 flags have been enabled.

If you’re using Python 2.7, your “Python 2” section should look like this:

Figure 1: Running CMake to generate the build files for OpenCV 3.3. OpenCV will correctly be built with Python 2.7 and NumPy from our cv virtualenv.

Otherwise, if you’re compiling OpenCV for Python 3, check the “Python 3” output of CMake:

Figure 2: After running CMake, Python 3 + NumPy are correctly set from within our cv virtualenv on the Raspberry Pi.

Notice how the

Interpreter
 ,
Libraries
 ,
numpy
 , and
packages path
  variables have been properly set.

Before you start the compile I would suggest increasing your swap space. This will enable you to compile OpenCV with all four cores of the Raspberry Pi without the compile hanging due to memory exhausting.

Open up your

/etc/dphys-swapfile
  file and then edit the
CONF_SWAPSIZE
  variable:
# set size to absolute value, leaving empty (default) then uses computed value
#   you most likely don't want this, unless you have an special disk situation
# CONF_SWAPSIZE=100
CONF_SWAPSIZE=1024

Notice that I’m increasing the swap from 100MB to 1024MB. This is the secret sauce to compiling OpenCV with multiple cores on the Raspbian Stretch.

If you do not perform this step it’s very likely that your Pi will hang.

From there, restart the swap service:

$ sudo /etc/init.d/dphys-swapfile stop
$ sudo /etc/init.d/dphys-swapfile start

Note: Increasing swap size is a great way to burn out your Raspberry Pi microSD card. Flash-based storage have limited number of writes you can perform until the card is essentially unable to hold the 1’s and 0’s anymore. We’ll only be enabling large swap for a short period of time, so it’s not a big deal. Regardless, be sure to backup your 

.img
  file after installing OpenCV + Python just in case your card dies unexpectedly early. You can read more about large swap sizes corrupting memory cards on this page.

Now that we’ve updated the swap size, kick off the optimized OpenCV compile using all four cores:

$ make -j4

Figure 3: Our optimized compile of OpenCV 3.3 for the Raspberry Pi 3 has been completed successfully.

Assuming OpenCV compiled without error (as in my screenshot above), you can install your optimized version of OpenCV on your Raspberry Pi:

$ sudo make install
$ sudo ldconfig

Don’t forget to go back to your

/etc/dphys-swapfile
  file and:
  1. Reset
    CONF_SWAPSIZE
    
      to 100MB.
  2. Restart the swap service.

Step #6: Finish installing your optimized OpenCV on the Raspberry Pi

If you compiled OpenCV for Python 3, you need to issue the following commands to sym-link the

cv2.so
  bindings into your
cv
  virtual environment:
$ cd /usr/local/lib/python3.5/site-packages/
$ sudo mv cv2.cpython-35m-arm-linux-gnueabihf.so cv2.so
$ cd ~/.virtualenvs/cv/lib/python3.5/site-packages/
$ ln -s /usr/local/lib/python3.5/site-packages/cv2.so cv2.so

Keep in mind that the exact paths will need to be updated depending if you are using Python 3.4, Python 3.5, Python 3.6, etc.

If you instead compiled OpenCV for Python 2.7, you can use these commands to sym-link your

cv2.so
  file into the
cv
  virtual environment:
$ cd ~/.virtualenvs/cv/lib/python2.7/site-packages/
$ ln -s /usr/local/lib/python2.7/site-packages/cv2.so cv2.so

Step 7: Testing your optimized OpenCV + Raspberry Pi install

As a quick sanity check, access the

cv
  virtual environment, fire up a Python shell and try to import the OpenCV library:
$ source ~/.profile
$ workon cv
$ python
>>> import cv2
>>> cv2.__version__
'3.3.0'
>>>

Congratulations! You’ve just installed an optimized OpenCV 3.3 on your Raspberry Pi 3.

So, how good are these optimizations?

After working through this tutorial you’re probably curious how good these OpenCV + Raspberry Pi optimizations are.

Given that we just optimized for floating point operations a great test would be to run a pre-trained deep neural network on the Raspberry Pi, similar to what we did last week.

Go ahead and use the “Downloads” section of this blog post to download our pre-trained Convolutional Neural Networks + example images + classification script.

From there, fire up a shell and execute the following command:

$ python pi_deep_learning.py --prototxt models/bvlc_googlenet.prototxt \
        --model models/bvlc_googlenet.caffemodel --labels synset_words.txt \
        --image images/barbershop.png
[INFO] loading model...
[INFO] classification took 0.87173 seconds
[INFO] 1. label: barbershop, probability: 0.78055
[INFO] 2. label: barber chair, probability: 0.2194
[INFO] 3. label: rocking chair, probability: 3.4663e-05
[INFO] 4. label: restaurant, probability: 3.7258e-06
[INFO] 5. label: hair spray, probability: 1.4715e-06

Figure 4: Running an image of a “barbershop” through GoogLeNet on the Raspberry Pi 3 with an optimized install of OpenCV 3.3 achieves a 48.82% speedup.

Here you can see that GoogLeNet classified our image in 0.87 seconds, which is a massive 48.82% improvement from last week’s 1.7 seconds.

Let’s give SqueezeNet a try:

$ python pi_deep_learning.py --prototxt models/squeezenet_v1.0.prototxt \
        --model models/squeezenet_v1.0.caffemodel --labels synset_words.txt \
        --image images/barbershop.png
[INFO] loading model...
[INFO] classification took 0.4777 seconds
[INFO] 1. label: barbershop, probability: 0.80578
[INFO] 2. label: barber chair, probability: 0.15124
[INFO] 3. label: half track, probability: 0.0052872
[INFO] 4. label: restaurant, probability: 0.0040124
[INFO] 5. label: desktop computer, probability: 0.0033352

Figure 5: Squeezenet on the Raspberry Pi 3 also achieves performance gains using our optimized install of OpenCV 3.3.

Here we can see that SqueezeNet correctly classified the input image in 0.47 seconds, another huge improvement from the 0.9 seconds from last week (47.78%).

Based on our results, it’s very clear that our OpenCV optimizations have made a significant impact.

Summary

In today’s blog post, you learned how to optimize your OpenCV install on the Raspberry Pi.

These optimizations came from updating our CMake command to include NEON and VFPV3. When benchmarking OpenCV this leads to an approximate 30% increase in speed. However, when applied strictly to the new

dnn
  module in OpenCV 3, we are seeing an increase of over 48%!

I hope you enjoyed this tutorial and enjoy your optimized OpenCV + Raspberry Pi!

But before you go…

Be sure to check out other Raspberry Pi posts on my blog, and consider entering your email address in the form below to be notified when future deep learning/Raspberry Pi posts are published here on PyImageSearch.

Downloads:

If you would like to download the code and images used in this post, please enter your email address in the form below. Not only will you get a .zip of the code, I’ll also send you a FREE 11-page Resource Guide on Computer Vision and Image Search Engines, including exclusive techniques that I don’t post on this blog! Sound good? If so, enter your email address and I’ll send you the code immediately!

The post Optimizing OpenCV on the Raspberry Pi appeared first on PyImageSearch.



from PyImageSearch http://ift.tt/2gnVMRZ
via IFTTT