Latest YouTube Video

Saturday, December 16, 2017

Alcoholics anonymous meetings

Like most websites Alcoholics Anonymous (GB) Ltd. Please Note: This meeting schedule is confidential and must not be used as a mailing list, or for any other purpose outside A. For information about online meetings/online groups: http://aa-intergroup. If you need help to stop drinking now, call ...

from Google Alert - anonymous http://ift.tt/2j8FvRN
via IFTTT

Anonymous ftp privilege escalation

High. workings of the exploit, which I recommend you do, it can be found here: Linux Kernel 3. FTP, and Mail server The fourth vulnerability is a local privilege escalation and can be utilized in How fun of privilege escalation Red UsersService Users Windows Anonymous FTP Webshell Privilege ...

from Google Alert - anonymous http://ift.tt/2zifV5P
via IFTTT

Free anonymous text app

Text Me - Free Texting & Calls. When you text or call If you have a premium Phoner number, you can send and receive text to another Phoner user for free. 7. To send an anonymous tip via text message to the South Carolina DNR, text the keyword SCDNR and your tip to 847411. Google Voice.

from Google Alert - anonymous http://ift.tt/2jakLce
via IFTTT

Alcoholics anonymous winnipeg

A. Alcoholics Anonymous is a fellowship of men and women who share their experience, Winnipeg, Manitoba Winnipeg, Manitoba Alcoholics Anonymous (AA) meeting directory. 7-8. Alcoholics Anonymous in Manitoba. OktSOBERfest. Winnipeg, Manitoba, Canada. AA Beyond Belief provides a space ...

from Google Alert - anonymous http://ift.tt/2zijqcp
via IFTTT

Anonymous Acts (Five Star Enterprises)

Find helpful customer reviews and review ratings for Anonymous Acts (Five Star Enterprises) at Amazon.com. Read honest and unbiased product reviews from our users.

from Google Alert - anonymous http://ift.tt/2AI0ouk
via IFTTT

inline anonymous fn

How can I exclude js like this (function() function addEventListener(element,event,handler) if(element.addEventListener) element.addEventListener(event,handler,false). or else if(element.attachEvent) element.attachEvent('on'+event,handler). or jQuery(function($) $(document).ready(function() if(/MSIE ...

from Google Alert - anonymous http://ift.tt/2AIq0XJ
via IFTTT

Anonymous texting apk

1. digitalclockwork. Send and Receive. 6 and all version history for Android. 4 for Android. When someone texts you back, you will get a notification and see the message right in the app. 3 free Communication Android App (com. Download Anonymous Texting APK for PC. 6 uk. anonymoustexting free- ...

from Google Alert - anonymous http://ift.tt/2AYhtEr
via IFTTT

Anonymous capybara google

You might see a name you don't recognize or "anonymous animals" viewing your document, spreadsheet, or presentation. Anonymous Elephant. a. Can anybody tell me what is the exact problem. Share. remember. Get the free Stranger Things To Do app now from the App Store or Google Play. In other ...

from Google Alert - anonymous http://ift.tt/2jbiLQV
via IFTTT

How to stay anonymous on tor

S. onion sites than I do on the clearnet, am I perfectly anonymous . You will never be able to stay anonymous on the internet, Tor is free software for enabling anonymous communication. Read on to find out. When you want to shut down, turn off the computer, unplug it, and then remove the usb.

from Google Alert - anonymous http://ift.tt/2CpD84r
via IFTTT

Why Cubs should make Addison Russell-for-Manny Machado blockbuster trade - Jesse Rogers (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Hack craigslist anonymous email

Working Subscribe Subscribed Unsubscribe 6. Hacked by someone I sent an anonymous message on how did he hack me and where can I go to so they would have your email, right? Craigslist doesn't hide your Pretty much what the title says. Oct 23, 2007 How was he unmasked? CL is virtually ...

from Google Alert - anonymous http://ift.tt/2BxleA7
via IFTTT

Anonymous online payment

A lot of companies are starting to accept BitCoin more and more. Its virtually %100 anonymous. Right now, there are a number of services that offer "anonymous" payments through Mar 29, 2015 ShadowCash (SDC) is a decentralised crypto currency with a focus on privacy and anonymity, one of the ...

from Google Alert - anonymous http://ift.tt/2AF4Fi3
via IFTTT

How to leave anonymous google review 2017

Jun 8, 2012 It would be nice to know if there are places for reviews that are anonymous. A little off-topic, but you can learn more about steps you can take to be safe on the Internet by visiting the Google Safety Center. I am a bankruptcy attorney and my clients want to write me reviews but they don't want ...

from Google Alert - anonymous http://ift.tt/2j5p0po
via IFTTT

Anonymous browsing sites

Our VPN service hides your IP, ensures privacy and unblocks all of your favorite content online. Right after all, there are numerous vendors on the web for this Comparison of popular anonymous surfing services and aolutions. Find necessary info, domain in archive. As long There is a handy address bar ...

from Google Alert - anonymous http://ift.tt/2zfNcyh
via IFTTT

Snapchat anonymous

The social polling app allows users to create multiple-choice polls for sharing on Snapchat and other platforms. How does it work?Read writing about Snapchat in Affiliates Anonymous. You Can Link Your Sarahah Account On Snapchat. The app has become a favorite of teenagers, who use it to link ...

from Google Alert - anonymous http://ift.tt/2CGITf1
via IFTTT

Anonymous relay exchange 2016

Under Remote network settings, remove the default IP ranges add specific IP addresses or IP ranges that is required to allow anonymous SMTP relay from. This allows inbound internet email to be Mar 6, 2016 Configuring internal and external relay in Exchange Server 2016. Oct 21, 2015 Internal SMTP ...

from Google Alert - anonymous http://ift.tt/2Cl9DAX
via IFTTT

First Time Delivering For 630 CHED Santa's Anonymous? Me Too!

Hey guys! This weekend is a big one for 630 CHED Santa's Anonymous as it's their Delivery Weekend! Every year ...

from Google Alert - anonymous http://ift.tt/2BhASgj
via IFTTT

Anonymous text

The anonymity of the communication makes it a comfortable place for someone to share a Aug 30, 2017 The texts on this page are likely to have individual authors, but we don't know who they are. com, we know that you are tired of paying text messaging fees. Sending anonymous text from fake no.

from Google Alert - anonymous http://ift.tt/2ClJ12F
via IFTTT

I have a new follower on Twitter


Actu Coworking
Toute l'actualité du #coworking en France et ailleurs. #bureau #Workplace #QVT #Immobilier #startup #incubateur
Paris, France

Following: 2078 - Followers: 2908

December 16, 2017 at 04:00AM via Twitter http://twitter.com/Actu_Coworking

Pre-Installed Password Manager On Windows 10 Lets Hackers Steal All Your Passwords

If you are running Windows 10 on your PC, then there are chances that your computer contains a pre-installed 3rd-party password manager that lets attackers steal all your credentials remotely. Starting from Windows 10 Anniversary Update (Version 1607), Microsoft added a new feature called Content Delivery Manager that silently installs new "suggested apps" without asking for users’ permission


from The Hacker News http://ift.tt/2j7xlJy
via IFTTT

A Wintry Shower


Four Geminids flash through northern skies in this wintry night skyscape. The bright fireball and 3 fainter meteors were captured in a single 10 second exposure, near the peak of December's Geminid meteor shower. Reflecting the fireball's greenish light, a partially frozen Lake Edith in Alberta Canada's Jasper National Park lies in the foreground, with the Canadian Rocky Mountains ranging along the northern horizon. Of course, the glacial lake is cold even in summer. But photographer Jack Fusco reports that he experienced -9 degree C temperatures that night while enjoying one of the most active meteor showers he's ever seen. via NASA http://ift.tt/2CyewHQ

AvatarBuilder

Steps to reproduce: 1. Open user attached project 2. Open test.unity scene 3. Play the scene 4. Observe the freeze/crash Expected re...

from Google Alert - anonymous http://ift.tt/2CCaI8m
via IFTTT

Friday, December 15, 2017

Anonymous tip leads to arrest of man accused of murdering father

PORTLAND, OR -- An anonymous tip led to the arrest of a man accused of murdering his father in southeast Portland nearly two weeks ago. Police had asked for the public's help locating 30-year-old Tyler Wayne Nees and a warrant was issued for his arrest. Police said Nees stabbed and killed his ...

from Google Alert - anonymous http://ift.tt/2yGxybP
via IFTTT

Global Subsidiary Assistant Accountant

Global Subsidiary Assistant Accountant in Accounting and public practice, Assistant accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2jZ0hnK
via IFTTT

Accounts Payable Assistant

Accounts Payable Assistant in Accounting and public practice, Accounts payable with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2kzTjFg
via IFTTT

I have a new follower on Twitter


Travis Translator AI
Travis is the pocket-sized Instant #Voice #Translating Device. Go global and speak local. ✈ Get yours on #Indiegogo now⬇️
Rotterdam, The Netherlands
https://t.co/6YmsdZUq6m
Following: 8799 - Followers: 8965

December 15, 2017 at 07:35PM via Twitter http://twitter.com/travisglobal

Matt Lauer's Anonymous Whistleblower's Lawyer Says His Client Is

The newsman was fired from NBC News in November after allegations of 'inappropriate sexual behavior' were brought against him.

from Google Alert - anonymous http://ift.tt/2kzSb4t
via IFTTT

Quality translation with good price

What are the best aspects of this product? The plateform and interactivity with the translator is great. The translations where good (french->german) The rapidity of the service. What aspects are problematic or could work better? Maybe the price could be lower. But it's important to keep this level of quality, ...

from Google Alert - anonymous http://ift.tt/2jXo9Iw
via IFTTT

Forensic Accountant

Forensic Accountant in Accounting and public practice, Accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2CjwWek
via IFTTT

Finance Manager

Finance Manager in Accounting and public practice, Finance manager with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2Bfxfrp
via IFTTT

Group Accountant

Group Accountant in Accounting and public practice, Group accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2CjwRaw
via IFTTT

Cost Accountant

Cost Accountant in Accounting and public practice, Accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2BgaRhw
via IFTTT

Hub hullabaloo stirred by anonymous leaflet

By Maurice Garvey AN ANONYMOUS leaflet distributed in Walkinstown prior to public meetings surrounding the new homeless hub on Balfe Road – led to sca...

from Google Alert - anonymous http://ift.tt/2ofqG5f
via IFTTT

EU agrees on new ground-breaking rules to end anonymous companies, but falls short on trusts

Publicly revealing the real owners behind EU companies will help stop anonymous companies acting as the 'getaway cars' for corruption, tax evasion, drug trafficking and arms trading. The European Parliament should be congratulated for pushing for an ambitious deal in the face of opposition from ...

from Google Alert - anonymous http://ift.tt/2Cy4jex
via IFTTT

Re: [FD] [oss-security] CVE-2017-17670: vlc: type conversion vulnerability

Nice job! By the way, when is back-porting of the fix to the current stable version(s) envisioned? (I doubt most oss OS distributions use the "HEAD of the VLC master branch", nor that most Windows or Mac users use the latest bleeding-edge build, leaving a potentially large window for exploitation if former versions don't get fixed; knowing VLC's popularity, I think that the question should be seriously considered) And is there a standalone patch or workaround that could be used for older versions (besides not opening mp4 videos anymore)? >

Source: Gmail -> IFTTT-> Blogger

[FD] APPLE-SA-2017-12-13-6 Additional information for APPLE-SA-2017-12-6-2 iOS 11.2

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] APPLE-SA-2017-12-13-7 Additional information for APPLE-SA-2017-12-6-4 tvOS 11.2

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] APPLE-SA-2017-12-13-3 iCloud for Windows 7.2

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] SSD Advisory – vBulletin cacheTemplates Unauthenticated Remote Arbitrary File Deletion

SSD Advisory – vBulletin cacheTemplates Unauthenticated Remote Arbitrary File Deletion Full report: http://ift.tt/2nVEhyp Twitter: @SecuriTeam_SSD Weibo: SecuriTeam_SSD Vulnerability Summary The following advisory describes a unauthenticated deserialization vulnerability that leads to arbitrary delete files and, under certain circumstances, code execution found in vBulletin version 5. vBulletin, also known as vB, is “a widespread proprietary Internet forum software package developed by vBulletin Solutions, Inc., based on PHP and MySQL database server. vBulletin powers many of the largest social sites on the web, with over 100,000 sites built on it, including Fortune 500 and Alexa Top 1M companies websites and forums. According to the latest W3Techs1 statistics, vBulletin version 4 holds more than 55% of the vBulletin market share, while version 3 and 5 divide the remaining percentage”. Credit A security researcher from, TRUEL IT ( @truel_it ), has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program. Vendor response We tried to contact vBulletin since November 21 2017, repeated attempts to establish contact went unanswered. At this time there is no solution or workaround for these vulnerabilities. Vulnerability details Unsafe usage of PHP’s unserialize() on user-supplied input allows an unauthenticated attacker to delete arbitrary files and, under certain circumstances, execute arbitrary code on a vBulletin installation. vB_Library_Template’s cacheTemplates() function, which is an publicly exposed API which allows to fetch information on a set of given templates from the database in order to store them inside a cache variable. File core/vb/api/template.php – function cacheTemplates(): === public function cacheTemplates($templates, $templateidlist, $skip_bbcode_style = false, $force_set = false) { return vB_Library::instance('template')->cacheTemplates($templates, $templateidlist, $skip_bbcode_style, $for === Let’s take a look at $templateidlist – core/vb/library/template.php – function cacheTemplates(): === public function cacheTemplates($templates, $templateidlist, $skip_bbcode_style = false, $force_set = false) { $vboptions = vB::getDatastore() // vB_Library_Style::switchCssStyle() may pass us a templateidlist that's already unserialized. if (!is_array($templateidlist)) { $templateidlist = unserialize($templateidlist); } foreach ($templates AS $template) { if (isset($templateidlist[$template])) { $templateids[] = intval($templateidlist[$template]); } } if (!empty($templateids)) { $temps = vB::getDbAssertor(array('title', 'textonly', 'template_un', 'template')); // cache templates foreach ($temps as $temp) { if (empty(self::$templatecache["$temp[title]"]) OR $force_set) { self::$templatecache["$temp[title]"] = $this; } } } if (!$skip_bbcode_style) { self::$bbcode_style = array( 'code' => &$templateassoc['bbcode_code_styleid'], 'html' => &$templateassoc['bbcode_html_styleid'], 'php' => &$templateassoc['bbcode_php_styleid'], 'quote' => &$templateassoc['bbcode_quote_styleid'] ); } } === $temnplateidlist variable, which can come directly from user-input, is directly supplied to unserialize(), resulting in an arbitrary deserialization primitive.

Source: Gmail -> IFTTT-> Blogger

[FD] SSD Advisory – vBulletin routestring Unauthenticated Remote Code Execution

SSD Advisory – vBulletin routestring Unauthenticated Remote Code Execution Full report: http://ift.tt/2nVEhyp Twitter: @SecuriTeam_SSD Weibo: SecuriTeam_SSD Vulnerability Summary The following advisory describes a unauthenticated file inclusion vulnerability that leads to remote code execution found in vBulletin version 5. vBulletin, also known as vB, is a widespread proprietary Internet forum software package developed by vBulletin Solutions, Inc., based on PHP and MySQL database server. vBulletin powers many of the largest social sites on the web, with over 100,000 sites built on it, including Fortune 500 and Alexa Top 1M companies websites and forums. According to the latest W3Techs1 statistics, vBulletin version 4 holds more than 55% of the vBulletin market share, while version 3 and 5 divide the remaining percentage Credit An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program Vendor response We tried to contact vBulletin since November 21 2017, repeated attempts to establish contact went unanswered. At this time there is no solution or workaround for these vulnerabilities. Vulnerability details vBulletin contains a vulnerability that can allow a remote attacker to include any file from the vBulletin server and execute arbitrary PHP code. An unauthenticated user is able to send a GET request to /index.php which can then trigger the file inclusion vulnerability with parameter routestring=. The request allows an attacker to create a crafted request to Vbulletin server installed on Windows OS and include any file on the web server. Listing of /index.php: === /* 48 */ $app = vB5_Frontend_Application::init('config.php'); /* 49 */ //todo, move this back so we can catch notices in the startup code. For now, we can set the value in the php.ini /* 50 */ //file to catch these situations. /* 51 */ // We report all errors here because we have to make Application Notice free /* 52 */ error_reporting(E_ALL | E_STRICT); /* 53 */ /* 54 */ $config = vB5_Config::instance(); /* 55 */ if (!$config->report_all_php_errors) { /* 56 */ // Note that E_STRICT became part of E_ALL in PHP 5.4 /* 57 */ error_reporting(E_ALL & ~(E_NOTICE | E_STRICT)); /* 58 */ } /* 59 */ /* 60 */ $routing = $app->getRouter(); /* 61 */ $method = $routing->getAction(); /* 62 */ $template = $routing->getTemplate(); /* 63 */ $class = $routing->getControllerClass(); /* 64 */ /* 65 */ if (!class_exists($class)) /* 66 */ { /* 67 */ // @todo - this needs a proper error message /* 68 */ die("Couldn't find controller file for $class"); /* 69 */ } /* 70 */ /* 71 */ vB5_Frontend_ExplainQueries::initialize(); /* 72 */ $c = new $class($template); /* 73 */ /* 74 */ call_user_func_array(array(&$c, $method), $routing->getArguments()); /* 75 */ /* 76 */ vB5_Frontend_ExplainQueries::finish(); === Let’s take a closer look on vB5_Frontend_Application::init() – Listing of /includes/vb5/frontend/application.php: === /* 15 */ public static function init($configFile) /* 16 */ { /* 17 */ parent::init($configFile); /* 18 */ /* 19 */ self::$instance = new vB5_Frontend_Application(); /* 20 */ self::$instance->router = new vB5_Frontend_Routing(); /* 21 */ self::$instance->router->setRoutes(); /* ... */ === We can see that setRoutes() is called: Listing of /includes/vb5/frontend/routing.php: === /* 47 */ public function setRoutes() /* 48 */ { /* 49 */ $this->processQueryString(); /* 50 */ /* 51 */ //TODO: this is a very basic and straight forward way of parsing the URI, we need to improve it /* 52 */ //$path = isset($_SERVER['PATH_INFO']) ? $_SERVER['PATH_INFO'] : ''; /* 53 */ /* 54 */ if (isset($_GET['routestring'])) /* 55 */ { /* 56 */ $path = $_GET['routestring']; /* ... */ /* 73 */ } /* 74 */ /* 75 */ if (strlen($path) AND $path{0} == '/') /* 76 */ { /* 77 */ $path = substr($path, 1); /* 78 */ } /* 79 */ /* 80 */ //If there is an invalid image, js, or css request we wind up here. We can't process any of them /* 81 */ if (strlen($path) > 2 ) /* 82 */ { /* 83 */ $ext = strtolower(substr($path, -4)) ; /* 84 */ if (($ext == /* 47 */ public function setRoutes() /* 48 */ { /* 49 */ $this->processQueryString(); /* 50 */ /* 51 */ //TODO: this is a very basic and straight forward way of parsing the URI, we need to improve it /* 52 */ //$path = isset($_SERVER['PATH_INFO']) ? $_SERVER['PATH_INFO'] : ''; /* 53 */ /* 54 */ if (isset($_GET['routestring'])) /* 55 */ { /* 56 */ $path = $_GET['routestring']; /* ... */ /* 73 */ } /* 74 */ /* 75 */ if (strlen($path) AND $path{0} == '/') /* 76 */ { /* 77 */ $path = substr($path, 1); /* 78 */ } /* 79 */ /* 80 */ //If there is an invalid image, js, or css request we wind up here. We can't process any of them /* 81 */ if (strlen($path) > 2 ) /* 82 */ { /* 83 */ $ext = strtolower(substr($path, -4)) ; /* 84 */ if (($ext == '.gif') OR ($ext == '.png') OR ($ext == '.jpg') OR ($ext == '.css') /* 85 */ OR (strtolower(substr($path, -3)) == '.js') ) /* 86 */ { /* 87 */ header("HTTP/1.0 404 Not Found"); /* 88 */ die(''); /* 89 */ } /* 90 */ } /* 91 */ /* 92 */ try /* 93 */ { /* 94 */ $message = ''; // Start with no error. /* 95 */ $route = Api_InterfaceAbstract::instance()->callApi('route', 'getRoute', array('pathInfo' => $path, 'queryString' => $_SERVER['QUERY_STRING'])); /* 96 */ } /* 97 */ catch (Exception $e) /* 98 */ { /* ... */ /* 106 */ } /* ... */ /* 127 */ if (!empty($route)) /* 128 */ { /* ... */ /* 188 */ } /* 189 */ else /* 190 */ { /* 191 */ // if no route was matched, try to parse route as /controller/method /* 192 */ $stripped_path = preg_replace('/[^a-z0-9\/-_.]+/i', '', trim(strval($path), '/')); /* ... */ /* 229 */ } /* 230 */ /* 231 */ //this could be a legacy file that we need to proxy. The relay controller will handle /* 232 */ //cases where this is not a valid file. Only handle files in the "root directory". We'll /* 233 */ //handle deeper paths via more standard routes. /* 234 */ if (strpos($path, '/') === false) /* 235 */ { /* 236 */ $this->controller = 'relay'; /* 237 */ $this->action = 'legacy'; /* 238 */ $this->template = ''; /* 239 */ $this->arguments = array($path); /* 240 */ $this->queryParameters = array(); /* 241 */ return; /* 242 */ } /* 243 */ /* 244 */ vB5_ApplicationAbstract::checkState(); /* 245 */ /* 246 */ throw new vB5_Exception_404("invalid_page_url"); /* 247 */ } ) ) /* 86 */ { /* 87 */ header("HTTP/1.0 404 Not Found"); /* 88 */ die(''); /* 89 */ } /* 90 */ } /* 92 */ try /* 93 */ { /* 94 */ $message = ''; // Start with no error. /* 95 */ $route = Api_InterfaceAbstract::instance()->callApi('route', 'getRoute', array('pathInfo' => $path, 'queryString' => $_SERVER['QUERY_STRING'])); /* 96 */ } /* 97 */ catch (Exception $e) /* 98 */ { /* ... */ /* 106 */ } /* ... */ /* 127 */ if (!empty($route)) /* 128 */ { /* ... */ /* 188 */ } /* 189 */ else /* 190 */ { /* 191 */ // if no route was matched, try to parse route as /controller/method /* 192 */ $stripped_path = preg_replace('/[^a-z0-9\/-_.]+/i', '', trim(strval($path), '/')); /* ... */ /* 229 */ } /* 230 */ /* 231 */ //this could be a legacy file that we need to proxy. The relay controller will handle /* 232 */ //cases where this is not a valid file. Only handle files in the "root directory". We'll /* 233 */ //handle deeper paths via more standard routes. /* 234 */ if (strpos($path, '/') === false) /* 235 */ { /* 236 */ $this->controller = 'relay'; /* 237 */ $this->action = 'legacy'; /* 238 */ $this->template = ''; /* 239 */ $this->arguments = array($path); /* 240 */ $this->queryParameters = array(); /* 241 */ return; /* 242 */ } /* … */ === So if our routestring does not end with ‘.gif’, ‘.png’, ‘.jpg’, ‘.css’ or ‘.js’ and does not contain ‘/’ char vBulletin will call legacy() method from vB5_Frontend_Controller_Relay – /includes/vb5/frontend/controller/relay.php: === /* 63 */ public function legacy($file) /* 64 */ { /* 65 */ $api = Api_InterfaceAbstract::instance(); /* 66 */ $api->relay($file); /* 67 */ } === If we will check relay() from Api_Interface_Collapsed class – /include/api/interface/collapsed.php: === /* 117 */ public function relay($file) /* 118 */ { /* 119 */ $filePath = vB5_Config::instance()->core_path . '/' . $file; /* 120 */ /* 121 */ if ($file AND file_exists($filePath)) /* 122 */ { /* 123 */ //hack because the admincp/modcp files won't return so the remaining processing in /* 124 */ //index.php won't take place. If we better integrate the admincp into the /* 125 */ //frontend, we can (and should) remove this. /* 126 */ vB_Shutdown::instance()->add(array('vB5_Frontend_ExplainQueries', 'finish')); /* 127 */ require_once($filePath); /* 128 */ } /* ... */ === As we could see an attacker is not able to use ‘/’ in the $file so he cannot change current directory on Linux. But for Windows he can use ‘\’ as path delimiter and is able to specify any desired file (he can use ‘\..\’ trick as well) and it will be included by php. If we want to include file with extension like ‘.gif’, ‘.png’, ‘.jpg’, ‘.css’ or ‘.js’ we will need to bypass the mentioned check in setRoutes() method. This can be easily done by adding dot (‘.’) or space (‘%20’) to the filename.

Source: Gmail -> IFTTT-> Blogger

[FD] CVE-2017-17670: vlc: type conversion vulnerability

About ===== A type conversion vulnerability exist in the MP4 demux module in VLC <=2.2.8. This issue has been assigned CVE-2017-17670 and it could be used to cause an arbitrary free. Details ======= MP4 is a container format for video, audio, subtitles and images. The various parts of an .mp4 are organized as hierarchical boxes/atoms in big-endian byte ordering [1]. VLC processes these boxes by using a lookup table: vlc-2.2.8/modules/demux/mp4/libmp4.c ,-

Source: Gmail -> IFTTT-> Blogger

[FD] [CONVISO-17-003] - Zoom Linux Client Command Injection Vulnerability (RCE)

[FD] [CONVISO-17-002] - Zoom Linux Client Stack-based Buffer Overflow Vulnerability

[FD] SyncBreeze <= 10.2.12 - Denial of Service

============================================= MGC ALERT 2017-007 - Original release date: November 30, 2017 - Last revised: December 14, 2017 - Discovered by: Manuel García Cárdenas - Severity: 7,5/10 (CVSS Base Score) - CVE-ID: CVE-2017-17088 ============================================= I. VULNERABILITY

Source: Gmail -> IFTTT-> Blogger

Real jb anonymous

thoughts from your friends. Even [“The. houseguest, but unprintable advice about dealing with personal challenges]. If so, it might be possible that . real. a mask). , is that as a society. (i. anywhere, from an Internet café in Malaysia to a Michigan suburb. e. Oct 1, 2017. Hi-Fi. without identifying. true.

from Google Alert - anonymous http://ift.tt/2kAbnyO
via IFTTT

elastic/elasticsearch

Elasticsearch version ( bin/elasticsearch --version ): 6.1.0. Plugins installed: []. JVM version : 1.8.0_152. OS version : Mac OS X 10.13.2. Description of the problem including expected versus actual behavior: Anonymous filters aggregation returns a named result using integers as keys when a bool query ...

from Google Alert - anonymous http://ift.tt/2jYCy7e
via IFTTT

Terrified

The lawyer of the anonymous woman whose single accusation of “inappropriate sexual behavior” led to veteran The Today Show anchor Matt Lauer's swift firing at the end of November by NBC News pled with those searching for his client's identity to stop because she is “terrified.” In an interview with ...

from Google Alert - anonymous http://ift.tt/2kxucCN
via IFTTT

Anonymous Letter

Anonymous Letter. Delete. Save. Save as Draft. Cancel. Loading Loading. p. 2. Loading Loading. p. 3. Loading Loading. « Page Note 1 of 14 1. » Anonymous Letter. Contents. Anonymous Letter p.1. Original Document (PDF) » · Print Notes ». Related Article ». Contributed by: Amita Parashar, NPR. «.

from Google Alert - anonymous http://ift.tt/2BrxBhe
via IFTTT

Real jb anonymous

to use Realis: Step1: Choose one question. houseguest, but unprintable advice about dealing with personal challenges]. could be behind their laptops. Feb 9, 2012. 3, 10. JB. warm affection for one another as between [family], and a. Donor”],. Im a. thoughts from your friends. Realis is where to ask any ...

from Google Alert - anonymous http://ift.tt/2B2JNlI
via IFTTT

TRITON Malware Targeting Critical Infrastructure Could Cause Physical Damage

Security researchers have uncovered another nasty piece of malware designed specifically to target industrial control systems (ICS) with a potential to cause health and life-threatening accidents. Dubbed Triton, also known as Trisis, the ICS malware has been designed to target Triconex Safety Instrumented System (SIS) controllers made by Schneider Electric—an autonomous control system that


from The Hacker News http://ift.tt/2odRT8D
via IFTTT

Geminids of the North


Earth's annual Geminid meteor shower did not disappoint as our fair planet plowed through dust from active asteroid 3200 Phaethon. Captured in this northern hemisphere nightscape, the meteors stream away from the shower's radiant in Gemini. To create the image, 37 individual frames recording meteor streaks were taken over period of 8.5 hours during the night of December 12/13. In the final composite they were selected and registered against the starry sky above a radio telescope dish of MUSER, a solar-dedicated radio telescope array at astronomically-named Mingantu Station in Inner Mongolia, China, about 400 kilometers from Beijing. Sirius, alpha star of Canis Major, shines brightly just above the radio dish and the Milky Way stretches toward the zenith. Yellowish Betelgeuse is a standout in Orion to the right of the northen Milky Way. The shower's radiant is at top left, high above the horizon near Castor and Pollux the twin stars of Gemini. The radiant effect is due to perspective as the parallel meteor tracks appear to converge in the distance. Gemini's meteors enter Earth's atmosphere traveling at about 22 kilometers per second. via NASA http://ift.tt/2BkhPVp

Anonymous user 7c8e93

Name, Anonymous user 7c8e93. User since, دسمبر 14, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2o8CMgw
via IFTTT

Anonymous donor pays $40000 in layaway bills at Pennsylvania Walmart

Santa B” has struck again, and more than 200 families received a wonderful Christmas gi...

from Google Alert - anonymous http://ift.tt/2yvsqHm
via IFTTT

Thursday, December 14, 2017

Orioles assessing options and still debating whether or not to trade Manny Machado (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Dealership Accountant

Dealership Accountant in Accounting and public practice, Accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2ApEMCA
via IFTTT

Client Accountant

Client Accountant in Accounting and public practice, Accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2BpZohK
via IFTTT

head chef

View details and apply for this head chef job in Edinburgh (EH10) with Anonymous Recruiter on Caterer.com. Chop House are recruiting for an experienced Head Chef to launch their third city centre steak restaurant in early 2018.

from Google Alert - anonymous http://ift.tt/2Apkedo
via IFTTT

MLB Hot Stove: Which team makes the move for Orioles' Manny Machado? - Buster Olney (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Anonymous user 344403

Name, Anonymous user 344403. User since, دسمبر 14, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2C5WJ9R
via IFTTT

Orioles Buzz: GM Dan Duquette says he will look at Manny Machado trade options after winter meetings (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

ISS Daily Summary Report – 12/13/2017

51 Soyuz (51S) Undock and Landing Preparations:  The crew completed packing the cargo for return on 51S.  Randy Bresnik handed over command of the ISS to Alexander Misurkin. Following the Change of Command, the new Commander’s Soyuz crew became prime for emergencies.  Bresnik, Sergey Ryazanskiy, and Paolo Nespoli will undock from the ISS at 11:13 … Continue reading "ISS Daily Summary Report – 12/13/2017"

from ISS On-Orbit Status Report http://ift.tt/2ktIjJl
via IFTTT

Anonymous image board by state

s intended purpose is discussion of. State. image board. The Overchan is a directory of anonymous imageboards from around the world. PEOPLE is a feature documentary film about the over 23 million Americans living in long-term recovery from addiction to alcohol and other drugs. board. University.

from Google Alert - anonymous http://ift.tt/2AYa8S1
via IFTTT

Free anonymous proxy sites

list is updated every 10 minutes to keep fresh. anonymous. free proxy. to surf anonymously & protect your online identity. . THE list of high quality working proxies. free anonymous proxy. Web. Programs:. Free Proxy is defined as any proxy server provided for free. to hide your IP address while you surf ...

from Google Alert - anonymous http://ift.tt/2yrFM7p
via IFTTT

Configure SMTP for Anonymous mail

How to configure SMTP without username and password. it is giving me authentication error but SMTP using Powershell is working fine for same @badita please help.

from Google Alert - anonymous http://ift.tt/2yrCyRr
via IFTTT

Bolt: anonymous payment channels for decentralized currencies

Bolt: anonymous payment channels for decentralized currencies Green and Miers et al., CCS'17 Yesterday we spent some time looking at what payment channels are, their role in helping Bitcoin to scale by taking some of the load off of the chain, and some payment channels constructions such as direct ...

from Google Alert - anonymous http://ift.tt/2AE624B
via IFTTT

Zero-Day Remote 'Root' Exploit Disclosed In AT&T DirecTV WVB Devices

Security researchers have publicly disclosed an unpatched zero-day vulnerability in the firmware of AT&T DirecTV WVB kit after trying to get the device manufacturer to patch this easy-to-exploit flaw over the past few months. The problem is with a core component of the Genie DVR system that's shipped free of cost with DirecTV and can be easily exploited by hackers to gain root access and take


from The Hacker News http://ift.tt/2Chtm59
via IFTTT

New island forms in Tonga

The evolution of the newly-erupted "surtseyan" island (~ 180 hectares in area) in the Kingdom of Tonga in the Southwestern Pacific is documented in a time-lapse sequences of perspective views using a time-series of DigitalGlobe WorldView images from just after the eruption ended in late January 2015 until late September 2017. These meter-resolution views were generated using Digital Elevation Models (DEMs) created by the NASA- led science team using stereo-pairs of DigitalGlobe Worldview images, and have allowed the erosional history of this unique island to be studied from a never-before-possible spaceborne perspective. The impact of marine abrasion on the somewhat fragile volcanic-ash landscapes is evident as the southern and southeastern margins of the new island, informally known as Hunga Tonga Hunga Ha'apai (HTHH), recede, while deposition of a widening isthmus grows to the northeast. Research results from NASA-funded science team led by James B. Garvin (NASA GSFC), Daniel A. Slayback (SSAI), Vicki Ferrini (Columbia) recently submitted for publication in the AGU's Geophysical Research Letters journal suggest the island's lifetime may be extended for another 25-30 years if geochemical fortification continues to protect key regions. The HTHH island is the first surtseyan eruption-based island to have persisted as "new land" for more than 6 months since Surtsey erupted near Iceland in 1963. Studies of the landscape evolution of pristine volcanic islands of this variety previously relied on a combination of aerial photography, field mapping, and laboratory sample analysis, but this new work enables an optimized approach via advanced satellite optical and radar imaging in combination with ship-based bathymetric mapping. Results of this work can be applied to understanding numerous small volcanic landforms on Mars whose formation may have been in shallow-water environments during epochs when persistent surface water was present. Field photography and sampling of the HTHH island "system" by French sailors who served as citizen geoscientists for the NASA project greatly enhanced the project and validated several key interpretations. (Special thanks to NASA Earth Sciences RRNES program, French sailors Damien Grouille and Cecile Sabau of the sailing vessel Colibri, and to the Schmidt Ocean Institute R/V Falkor).

from NASA's Scientific Visualization Studio: Most Popular
via IFTTT

Wednesday, December 13, 2017

Ravens: Alex Collins wears dark visor on helmet to help with long-time migraine battle (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous - FOH & BOH positions

Anonymous – FOH & BOH positions. Posted on December 13, 2017. Upscale, open kitchen concept in downtown Needham is looking to re-launch under a new brand. We are looking for motivated and skilled workers to become part of our team. Openings in both the front and back of the house.

from Google Alert - anonymous http://ift.tt/2ATYqbb
via IFTTT

Anonymous

Anonymous. //. Bayern München 1 FC Köln live score video stream and H2H results sofascorecombayernmunchen1fckolnwdbsxdb FREE Live······▻ http://ift.tt/2hkKuMW FREE Live······▻ http://ift.tt/2hkKuMW FREE Live······▻ http://ift.tt/2o0e69N;...

from Google Alert - anonymous http://ift.tt/2CfgHju
via IFTTT

I have a new follower on Twitter


David Geer #geercom
Technology writer/journalist David Geer writes about cybersecurity & technology. "It's a trade secret. I could tell you, but then I'd have to encrypt you."
Northeast Ohio
http://t.co/V7loGWBuem
Following: 28703 - Followers: 33665

December 13, 2017 at 01:24PM via Twitter http://twitter.com/geercom

symfony/symfony

admin: pattern: "^/%admin_prefix%" provider: fos_userbundle form_login: login_path: fos_user_security_login_admin check_path: fos_user_security_check_admin failure_path: fos_user_security_login_admin csrf_token_generator: security.csrf.token_manager default_target_path: dashboard logout: ...

from Google Alert - anonymous http://ift.tt/2ACV7bu
via IFTTT

[FD] AST-2017-012: Remote Crash Vulnerability in RTCP Stack

Asterisk Project Security Advisory - AST-2017-012 Product Asterisk Summary Remote Crash Vulnerability in RTCP Stack Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated Sessions Severity Moderate Exploits Known No Reported On October 30, 2017 Reported By Tzafrir Cohen and Vitezslav Novy Posted On December 13, 2017 Last Updated On December 12, 2017 Advisory Contact Jcolp AT digium DOT com CVE Name Description If a compound RTCP packet is received containing more than one report (for example a Receiver Report and a Sender Report) the RTCP stack will incorrectly store report information outside of allocated memory potentially causing a crash. For all versions of Asterisk this vulnerability requires an active call to be established. For versions of Asterisk 13.17.2, 14.6.2, 15.0.0, 13.13-cert6 and greater an additional level of security is placed upon RTCP packets. If the probation period for incoming RTP traffic has passed any received RTCP packets must contain the same SSRC as the RTP traffic. If the RTCP packets do not then they are dropped. This ensures other parties can not inject RTCP packets without they themselves establishing an active call. Resolution The RTCP stack has been changed so the report information is always stored in allocated memory. The provided patches can be applied to the appropriate version or the latest version of Asterisk can be installed to receive the fix. Affected Versions Product Release Series Asterisk Open Source 13.x All Versions Asterisk Open Source 14.x All Versions Asterisk Open Source 15.x All Versions Certified Asterisk 13.13 All Versions Corrected In Product Release Asterisk Open Source 13.18.4, 14.7.4, 15.1.4 Certified Asterisk 13.13-cert9 Patches SVN URL Revision http://ift.tt/2BZXHEo Asterisk 13 http://ift.tt/2ATBcBU Asterisk 14 http://ift.tt/2BZYfdq Asterisk 15 http://ift.tt/2ATBcSq Certified Asterisk 13.13 Links http://ift.tt/2BZYg0Y http://ift.tt/2AUkfr3 Asterisk Project Security Advisories are posted at http://ift.tt/12wGWyz This document may be superseded by later versions; if so, the latest version will be posted at http://ift.tt/2ASlxCK and http://ift.tt/2BZXKjy Revision History Date Editor Revisions Made November 30, 2017 Joshua Colp Initial Revision Asterisk Project Security Advisory - AST-2017-012 Copyright © 2017 Digium, Inc. All Rights Reserved. Permission is hereby granted to distribute and publish this advisory in its original, unaltered form.

Source: Gmail -> IFTTT-> Blogger

ISS Daily Summary Report – 12/12/2017

NanoRacks Vuze (One Strange Rock) Camera Operations in the Service Module: The crew used the NanoRacks Vuze camera to record 3-Dementional 360-degree videos inside of the ISS. The handheld camera was used in the USOS and Russian Segment to capture long corridor footage to give the viewer a 3D perspective of floating through the ISS. … Continue reading "ISS Daily Summary Report – 12/12/2017"

from ISS On-Orbit Status Report http://ift.tt/2AU9m8F
via IFTTT

Two Hackers Plead Guilty to Creating & Using Mirai Botnet for Massive DDoS Attacks

The U.S. federal officials have arrested two hackers who have pleaded guilty to computer-crimes charges for creating and distributing Mirai botnet that crippled some of the world's biggest and most popular websites by launching the massive DDoS attacks last year. According to the federal court documents unsealed Tuesday, Paras Jha and Josiah White were indicted by an Alaska court last week on


from The Hacker News http://ift.tt/2iZI9cj
via IFTTT

I have a new follower on Twitter


247 SEO Expert
SEO Expert | Passionate Digital Marketing Team of Native Speakers | Top 100 SEO Experts 2017 | 6 Languages | Call @didierdelmer on +44 208 123 00 78
London, England
https://t.co/DSSTh39ZbJ
Following: 3302 - Followers: 4255

December 13, 2017 at 07:39AM via Twitter http://twitter.com/247seoexpert

Password Stealing Apps With Over A Million Downloads Found On Google Play Store

Even after so many efforts by Google like launching bug bounty program and preventing apps from using Android accessibility services, malicious applications somehow manage to get into Play Store and infect people with malicious software. The same happened once again when security researchers discovered at least 85 applications in Google Play Store that were designed to steal credentials from


from The Hacker News http://ift.tt/2z7HwXd
via IFTTT

Manage anonymous user flow

Manage anonymous user flow. I have a custom REST API that takes in user & password and get an access token from Auth0 via a custom database connection, on successful login. The Client app will send the access token to the server on every request and the server will fulfill the request after ...

from Google Alert - anonymous http://ift.tt/2BZMwMa
via IFTTT

Bolt: anonymous payment channels for decentralized currencies

Bolt: anonymous payment channels for decentralized currencies Green and Miers et al., CCS'17 In which I tried not to rant. But did end up ranting just a little bit... The world of blockchains and cryptocurrencies seems to be growing at quite a pace. Yesterday we looked at Solidus, which provides ...

from Google Alert - anonymous http://ift.tt/2AQi2g6
via IFTTT

How to export a donor as anonymous

Clients when exporting information from The Raiser's Edge, may wish for the donor's name to show as anonymous like it does in reports. Article Number: 115084. Products: Raiser's Edge RE. This functionality is not possible. The donor name will always display in the export. Some other fields like ...

from Google Alert - anonymous http://ift.tt/2BZgmR0
via IFTTT

Help solve crimes by providing anonymous tips

You can be an integral part of ensuring your neighborhood is safe. Cobb County Police Department needs your help to solve crimes. Providing tips is a safe, anonymous and effective way to prevent and solve unlawful acts. You can anonymously call or email your crime tips to 770-499-4111 or ...

from Google Alert - anonymous http://ift.tt/2AR4YHz
via IFTTT

Anonymous user faaa89

Name, Anonymous user faaa89. User since, Dec. 13, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2Ag3qpg
via IFTTT

New island forms in Tonga

The evolution of the newly-erupted "surtseyan" island ( 180 hectares in area) in the Kingdom of Tonga in the Southwestern Pacific is documented in a time-lapse sequences of perspective views using a time-series of DigitalGlobe WorldView images from just after the eruption ended in late January 2015 until late September 2017. These meter-resolution views were generated using Digital Elevation Models (DEMs) created by the NASA- led science team using stereo-pairs of DigitalGlobe Worldview images, and have allowed the erosional history of this unique island to be studied from a never-before-possible spaceborne perspective. The impact of marine abrasion on the somewhat fragile volcanic-ash landscapes is evident as the southern and southeastern margins of the new island, informally known as Hunga Tonga Hunga Ha'apai (HTHH), recede, while deposition of a widening isthmus grows to the northeast. Research results from NASA-funded science team led by James B. Garvin (NASA GSFC), Daniel A. Slayback (SSAI), Vicki Ferrini (Columbia) recently submitted for publication in the AGU's Geophysical Research Letters journal suggest the island's lifetime may be extended for another 25-30 years if geochemical fortification continues to protect key regions. The HTHH island is the first surtseyan eruption-based island to have persisted as "new land" for more than 6 months since Surtsey erupted near Iceland in 1963. Studies of the landscape evolution of pristine volcanic islands of this variety previously relied on a combination of aerial photography, field mapping, and laboratory sample analysis, but this new work enables an optimized approach via advanced satellite optical and radar imaging in combination with ship-based bathymetric mapping. Results of this work can be applied to understanding numerous small volcanic landforms on Mars whose formation may have been in shallow-water environments during epochs when persistent surface water was present. Field photography and sampling of the HTHH island "system" by French sailors who served as citizen geoscientists for the NASA project greatly enhanced the project and validated several key interpretations. (Special thanks to NASA Earth Sciences RRNES program, French sailors Damien Grouille and Cecile Sabau of the sailing vessel Colibri, and to the Schmidt Ocean Institute R/V Falkor).

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2C9vpbC
via IFTTT

[FD] Meinberg LANTIME Web Configuration Utility - Arbitrary File Upload

Title: Meinberg LANTIME Web Configuration Utility - Arbitrary File Upload (Path Traversal) Author: Jakub Palaczynski CVE: CVE-2017-16788 Exploit was tested on: ====================== Meinberg LANTIME Web Configuration Utility 6.16.008 Vulnerability affects: ====================== All LTOS6 firmware releases before 6.24.004 Vulnerability: ************** Arbitrary File Upload (Path Traversal): ======================================= It is possible to upload any file to any location on the server. Proof of Concept: "Upload Groupkey" functionality allows for uploading any file to any location on the server. An attacker may use path traversal to store files in for example cron.d directory and execute them automatically to get root access on the system. This vulnerability allows for getting root access on the system from Admin-User access. Contact: ======== Jakub[dot]Palaczynski[at]gmail[dot]com

Source: Gmail -> IFTTT-> Blogger

Tuesday, December 12, 2017

Buck Showalter wants to continue managing Orioles after his contract expires in 2018 (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

I have a new follower on Twitter


George Boomer
Passions: predictive analysis, discrete-choice modeling, fader-hardie forecasting, New Yorker humor, & our Jack Russell Terriers.
San Diego, CA
https://t.co/vz4TwwaWxh
Following: 3540 - Followers: 3811

December 12, 2017 at 07:39PM via Twitter http://twitter.com/StatWizards

Orioles may move Manny Machado to shortstop if he's not traded (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Anonymous surveys

I'm curious to know if the survey's I email out are able to be kept anonymous, as in the person answering does not have to leave their name and email?

from Google Alert - anonymous http://ift.tt/2krsbrZ
via IFTTT

▶ QB Robert Griffin III reveals he worked out for Chargers in offseason, came close to playing for Ravens (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

anonymous recruiter

View details and apply for this assistant restaurant manager job in West London (W12) with anonymous recruiter on Caterer.com. About The Real Greek The Real Greek is a small and friendly company with fantastic training and development, a competitive pay structure and plenty of opportunities to ...

from Google Alert - anonymous http://ift.tt/2ANPwf7
via IFTTT

Anonymous user 5205b1

Name, Anonymous user 5205b1. User since, Dec. 12, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2BWkktn
via IFTTT

Winter Meetings Buzz: Orioles not shopping Manny Machado but are getting calls and listening - Jerry Crasnick (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

ROBOT Attack: 19-Year-Old Bleichenbacher Attack On RSA Encryption Reintroduced

A 19-year-old vulnerability has been re-discovered in the RSA implementation from at least 8 different vendors—including F5, Citrix, and Cisco—that can give remote attackers access to encrypted messages. Dubbed ROBOT (Return of Bleichenbacher's Oracle Attack), the attack allows an attacker to perform RSA decryption and cryptographic operations using the private key configured on the


from The Hacker News http://ift.tt/2l2TmNI
via IFTTT

Free shipping + holiday deals!

Supporting your journey at every stage See the best PARTS of the season...   View in browser 1 800 463 9275   What's New Special Offers Exclusive Brands All Manufacturers           Featured Highlights     Stand-Alone CAN FD Controller W/SPI Interface, 14 SOIC First automotive grade thyristor in D²PAK package 3 Phase Power Line Filter The MCP2517FD is a cost-effective and small-footprint External CAN FD Controller that can be easily added to a microcontroller with an available SPI interface. ST extends its 1200V SCR series with the TN3050H automotive-grade 30A thyristors. General purpose 3 phase industrial EMC filter with high insertion loss properties. Shop Now ► Shop Now ► Shop Now ►   Panasonic Metal Composite Power Inductor High Frequency SMPM Connectors Keysight 34465A 6½ digit, Performance Truevolt DMM Panasonic Metal Composite Power Inductors offer excellent characteristics for high-end automotive and industrial applications compared to ferrite technology. Miniaturized high frequency coaxial cable and PCB connectors offered in both push-on and snap-on mating styles for quick installation. Get more insight quickly: Truevolt DMM's graphical capabilities such as trend and histogram charts offer more insights quickly. Both models also provide a data logging mode for easier trend analysis and a digitizing mode for capturing transients. Shop Now ► Shop Now ► Shop Now ►     We're Passive Aggressive!   Explore our expanded range of passive components. Caps, resistors, inductors & more. In stock and ready to ship today.   Shop Now ►         Newark element14 © 2017 Newark element14. All Rights Reserved.     This email was sent by: Newark element14 300 S. Riverside Plaza, Suite 2200 Chicago, IL, 60606, USA   This email has been sent to you based on your most recent email subscription preferences. Please note, all emails are governed by our privacy policy and you can update your email marketing preferences at any time. To manage your subscriptions for future Product, offers, surveys, events or service messages, you must contact us. We respect your right to privacy - View Our Policy | Update Profile | One-Click Unsubscribe Newark element14 300 S. Riverside Plaza, Suite 2200 Chicago, IL 60606 USA    

Source: Gmail -> IFTTT-> Blogger

📈 Ravens rise one spot to No. 12 in Week 15 NFL Power Rankings (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 12/11/2017

Probiotics Operations: Over the weekend, a crewmember completed the fourth and final sampling phase of the JAXA Probiotic investigation. The first half of the sampling phase was completed on GMT 343 with fecal sample collections. The second half of the sampling phase included saliva sample collections and a questionnaire, which was completed the following day. … Continue reading "ISS Daily Summary Report – 12/11/2017"

from ISS On-Orbit Status Report http://ift.tt/2yhUI82
via IFTTT

wsg/ - Girls mirrin

Anonymous Girls mirrin 12/12/17(Tue)04:16:59 No.2013609. File: 1497717191750.webm (186 KB, 720x404). 186 KB WEBM. Girls mirrin Anonymous 12/12/17(Tue)04:16:59 No.2013609. Girls being smitten. Girls checking somebody out. >> Anonymous 12/12/17(Tue)04:17:44 No.2013610. Anonymous ...

from Google Alert - anonymous http://ift.tt/2z3X4LD
via IFTTT

best way to get anonymous Bitcoin. create my own Bitcoin mining pool

[12/12/2017]] ⓨ best way to get anonymous Bitcoin. create my own Bitcoin mining pool.

from Google Alert - anonymous http://ift.tt/2Ac74ka
via IFTTT

A7= largest free Bitcoin :: free anonymous Bitcoin wallet

12/12/2017# ~A7= largest free Bitcoin :: free anonymous Bitcoin wallet.

from Google Alert - anonymous http://ift.tt/2z3hODm
via IFTTT

General ledger Accountant (Temporary Position)

General ledger Accountant (Temporary Position) in Accounting and public practice, Accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2AbGMOP
via IFTTT

Top 20 Corporate Tax Senior

Top 20 Corporate Tax Senior in Accounting and public practice, Tax with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2z2SiOd
via IFTTT

Anonymous user 0255ce

Name, Anonymous user 0255ce. User since, Dec. 12, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2Ac4wSZ
via IFTTT

Can you remain anonymous if you win the lottery in texas

Can you remain anonymous if you win the lottery in texas. C. But some use The Powerball that gives the lottery its name is the one that makes it so hard to win the big jackpot. John Jordan. We invite you to participate in our Blaze poll on the lottery. Poll Icon. 6 . First of all, if you can preserve any kind of ...

from Google Alert - anonymous http://ift.tt/2z35OBz
via IFTTT

Anonymous user f702a4

Name, Anonymous user f702a4. User since, Dec. 12, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2B7JVTg
via IFTTT

I have a new follower on Twitter


Sparkles Summers
#WasNotGoingToTell & #RecipesForTransformation Nov 2017. Living with Passion & Purpose; a Purpose Journey, Army Vet, Military Mom & Motivational Writer - Faith
There is Power In Purpose!
https://t.co/dfM9ZgYOyA
Following: 11047 - Followers: 12313

December 12, 2017 at 05:49AM via Twitter http://twitter.com/ForwardPressed

I have a new follower on Twitter


Sachin Lulla
Global Vice President #IBM Auto, A&D Strategy & Solutions #Watson #IoT #AI #IIoT #SelfDriving #Cognitive #DeepLearning #MachineLearnning #Autonomous #Blockchain
Florida, USA
https://t.co/4ZyG9FgkYe
Following: 30411 - Followers: 33477

December 12, 2017 at 05:19AM via Twitter http://twitter.com/SachinLulla

Collection of 1.4 Billion Plain-Text Leaked Passwords Found Circulating Online

Hackers always first go for the weakest link to quickly gain access to your online accounts. Online users habit of reusing the same password across multiple services gives hackers opportunity to use the credentials gathered from a data breach to break into their other online accounts. Researchers from security firm 4iQ have now discovered a new collective database on the dark web (released


from The Hacker News http://ift.tt/2AemZ1b
via IFTTT

I have a new follower on Twitter


Manjeet Rege, PhD
Speaker. Author. Educator. #BigData #MachineLearning #Analytics
Minneapolis, MN
https://t.co/G1nbkB6GIu
Following: 15016 - Followers: 18515

December 12, 2017 at 04:04AM via Twitter http://twitter.com/ManjeetRege

Bitcoin mining aliexpress. Bitcoin generator by anonymous

[12/12/2017] Ⓦ Bitcoin mining aliexpress. Bitcoin generator by anonymous.

from Google Alert - anonymous http://ift.tt/2l1aT96
via IFTTT

Beilue: No more shovels as anonymous donor steps up to help Adobe Pet Cemetery owner

“I thought about it all day,” she said, “and even woke up in the middle of the night. What should I do?” Smith, 26, is the owner of the Adobe Pet Cemetery located off Rockwell Road. Though her mom and sister help some, it's basically just her. As chronicled in a column on Dec. 4, Smith bought the ...

from Google Alert - anonymous http://ift.tt/2AvtXTU
via IFTTT

Google Researcher Releases iOS Exploit—Could Enable iOS 11 Jailbreak

As promised last week, Google's Project Zero researcher Ian Beer now publicly disclosed an exploit that works on almost all 64-bit Apple devices running iOS 11.1.2 or earlier, which can be used to build an iOS jailbreak, allowing users to run apps from non-Apple sources. On Monday morning, Beer shared the details on the exploit, dubbed "tfp0," which leveraged double-free memory corruption


from The Hacker News http://ift.tt/2ygvSpc
via IFTTT

Monday, December 11, 2017

Anonymous - Chef de Cuisine & Sous Chefs

Anonymous – Chef de Cuisine & Sous Chefs. Posted on December 11, 2017. A South Boston restaurant group with Italian, Mexican, & American concepts is seeking a Chef De Cuisine and Sous Chefs to join their team. Applicants should have 2-4 years of experience as a sous chef in a fast-paced, ...

from Google Alert - anonymous http://ift.tt/2BVd4hr
via IFTTT

A Quote from an Anonymous Candidate

"First they Ignore you, then they Laugh at you, then they Fight you, then you get a take home Coding Assignment"

from Google Alert - anonymous http://ift.tt/2ALVWvl
via IFTTT

University receives 1 million dollar anonymous gift

The estate gift from an anonymous donor is intended for scholarship endowments to benefit students pursuing a degree in education. Morgan Patrick Morgan (cq), development officer at the ULM Foundation, announced the gift at a news conference Monday. “The donor is a ULM alumna and a retired ...

from Google Alert - anonymous http://ift.tt/2BUOdKS
via IFTTT

I have a new follower on Twitter


RyanFoland #GingerMC
International Speaker 🌎 | Creator of #313Method | Blackbelt of Branding 🥋 | Comm manager @UCIrvine👍 | ❤ ⛵🌬 | AKA #GingerMC:🎙️ ryan@ryanfoland.com
Long Beach, CA
https://t.co/mqmNlc7CD5
Following: 264387 - Followers: 288810

December 11, 2017 at 07:49PM via Twitter http://twitter.com/ryanfoland

JuliaLang/julia

julia - The Julia Language: A fresh approach to technical computing.

from Google Alert - anonymous http://ift.tt/2AMrSzK
via IFTTT

Anonymous user 5f75c6

Name, Anonymous user 5f75c6. User since, Dec. 11, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2BTetVG
via IFTTT

How to deal with negative anonymous feedback

Professionals should resist the temptation to react angrily to negative anonymous feedback from peers or to advocate changing the review process. Instead, ignore useless feedback and focus on getting helpful pointers from your supervisors, writes Rob Walker.

from Google Alert - anonymous http://ift.tt/2BU0f6Z
via IFTTT

ISS Daily Summary Report – 12/08/2017

Lighting Effects: A 52S crewmember logged into the sleep log application and provided a sleep log entry to track his daily sleep patterns and wakefulness. This entry supports a two week long sleep shift session that began earlier this week.The Lighting Effects investigation studies the impact of the change from fluorescent light bulbs to solid-state … Continue reading "ISS Daily Summary Report – 12/08/2017"

from ISS On-Orbit Status Report http://ift.tt/2Bd3ZEg
via IFTTT

Anonymous lists government targets for cyberattacks

Hacker group Anonymous last week posted a threat of cyberattacks to the governments of the US and Israel in response to American foreign policy. Among the websites listed as part of the attacks are those of the White House, Social Security Administration and IRS.

from Google Alert - anonymous http://ift.tt/2AfaOkA
via IFTTT

Newly Uncovered 'MoneyTaker' Hacker Group Stole Millions from U.S. & Russian Banks

Security researchers have uncovered a previously undetected group of Russian-speaking hackers that has silently been targeting Banks, financial institutions, and legal firms, primarily in the United States, UK, and Russia. Moscow-based security firm Group-IB published a 36-page report on Monday, providing details about the newly-disclosed hacking group, dubbed MoneyTaker, which has been


from The Hacker News http://ift.tt/2kZgywg
via IFTTT

I have a new follower on Twitter


Mike Donaldson
Entrepreneur, Helping people realize their dreams, Caribbean fanatic, snorkeling, Video Marketing Trainer, Travel, Boating, Enjoying life
Formerly CA now London, OH
http://t.co/t7P6eLsiL0
Following: 13430 - Followers: 17255

December 11, 2017 at 11:14AM via Twitter http://twitter.com/GetfreedomMike

Image classification with Keras and deep learning

The Christmas season holds a special place in my heart.

Not because I’m particularly religious or spiritual. Not because I enjoy cold weather. And certainly not because I relish the taste of eggnog (the consistency alone makes my stomach turn).

Instead, Christmas means a lot to me because of my dad.

As I mentioned in a post a few weeks ago, I had a particularly rough childhood. There was a lot of mental illness in my family. I had to grow up fast in that environment and there were times where I missed out on the innocence of being a kid and living in the moment.

But somehow, through all that struggle, my dad made Christmas a glowing beacon of happiness.

Perhaps one of my favorite memories as a kid was when I was in kindergarten (5-6 years old). I had just gotten off the bus, book bag in hand.

I was walking down our long, curvy driveway where at the bottom of the hill I saw my dad laying out Christmas lights which would later decorate our house, bushes, and trees, transforming our home into a Christmas wonderland.

I took off like a rocket, carelessly running down the driveway (as only a child can), unzipped winter coat billowing behind me as I ran, shouting:

“Wait for me, dad!”

I didn’t want to miss out on the decorating festivities.

For the next few hours, my dad patiently helped me untangle the knotted ball of Christmas lights, lay them out, and then watched as I haphazardly threw the lights over the bushes and trees (that were many times my size), ruining any methodical, well-planned decorating blueprint he had so tirelessly designed.

Once I was finished he smiled proudly. He didn’t need any words. His smile confessed that my decorating was the best he had ever seen.

This is just one example of the many, many times my dad made Christmas special for me (despite what else may have been going on in the family).

He probably didn’t even know he was crafting a lifelong memory in my mind — he just wanted to make me happy.

Each year, when Christmas rolls around, I try to slow down, reduce stress, and enjoy the time of year.

Without my dad, I wouldn’t be where I am today — and I certainly wouldn’t have made it through my childhood.

In honor of the Christmas season I’d like to dedicate this blog post to my dad.

Even if you’re busy, don’t have the time, or simply don’t care about deep learning (the subject matter of today’s tutorial), slow down and give this blog post a read, if for nothing else than for my dad.

I hope you enjoy it.

Looking for the source code to this post?
Jump right to the downloads section.

Image classification with Keras and deep learning

This blog post is part two in our three part series of building a Not Santa deep learning classifier (i.e., a deep learning model that can recognize if Santa Clause is in an image or not):

  1. Part 1: Deep learning + Google Images for training data
  2. Part 2: Training a Santa/Not Santa detector using deep learning (this post)
  3. Part 3: Deploying a Santa/Not Santa deep learning detector to the Raspberry Pi (next week’s post)

In the first part of this tutorial we’ll examine our “Santa” and “Not Santa” datasets.

Together, these images will enable us to train a Convolutional Neural Network using Python and Keras to detect if Santa is in an image.

Once we’ve explored our training images, we’ll move on to training the seminal LeNet architecture. We’ll use a smaller network architecture to ensure readers without expensive GPUs can still follow along with this tutorial. This will also ensure beginners can understand the fundamentals of deep learning with Convolutional Neural Networks with Keras and Python.

Finally, we’ll evaluate our Not Santa model on a series of images, then discuss a few limitations to our approach (and how to further extend it).

Our “Santa” and “Not Santa” dataset

Figure 1: A subset of the dataset for the Not Santa detector. Included are (left) Santa images extracted from Google Images and (right) images sampled from the UKBench dataset.

In order to train our Not Santa deep learning model, we require two sets of images:

  • Images containing Santa (“Santa”).
  • Images that do not contain Santa (“Not Santa”).

Last week we used our Google Images hack to quickly grab training images for deep learning networks.

In this case, we can see a sample of the 461 images containing Santa gathered using technique (Figure 1, left).

I then randomly sampled 461 images that do not contain Santa (Figure 1, right) from the UKBench dataset, a collection of ~10,000 images used for building and evaluating Content-based Image Retrieval (CBIR) systems (i.e., image search engines).

Used together, these two image sets will enable us to train our Not Santa deep learning model.

Your first image classifier with Convolutional Neural Networks and Keras

Figure 2: The LeNet architecture consists of two sets of convolutional, activation, and pooling layers, followed by a fully-connected layer, activation, another fully-connected, and finally a softmax classifier. We’ll be implementing this network architecture using Keras and Python (image source).

The LetNet architecture is an excellent “first image classifier” for Convolutional Neural Networks. Originally designed for classifying handwritten digits, we can easily extend it to other types of images as well.

This tutorial is meant to be an introduction to image classification using deep learning, Keras, and Python so I will not be discussing the inner-workings of each layer. If you are interested in taking a deep dive into deep learning, please take a look at my book, Deep Learning for Computer Vision with Python, where I discuss deep learning in detail (and with lots of code + practical, hands-on implementations as well).

Let’s go ahead and define the network architecture. Open up a new file name it

lenet.py
 , and insert the following code:

Note: You’ll want to use the “Downloads” section of this post to download the source code + example images before running the code. I’ve included the code below as a matter of completeness, but you’ll want to ensure your directory structure matches mine.

# import the necessary packages
from keras.models import Sequential
from keras.layers.convolutional import Conv2D
from keras.layers.convolutional import MaxPooling2D
from keras.layers.core import Activation
from keras.layers.core import Flatten
from keras.layers.core import Dense
from keras import backend as K

class LeNet:
        @staticmethod
        def build(width, height, depth, classes):
                # initialize the model
                model = Sequential()
                inputShape = (height, width, depth)

                # if we are using "channels first", update the input shape
                if K.image_data_format() == "channels_first":
                        inputShape = (depth, height, width)

Lines 2-8 handle importing our required Python packages. The

Conv2D
  class is responsible for performing convolution. We can use the
MaxPooling2D
  class for max-pooling operations. As the name suggests, the
Activation
  class applies a particular activation function. When we are ready to
Flatten
  our network topology into fully-connected,
Dense
  layer(s) we can use the respective class names.

The

LeNet
  class is defined on Line 10 followed by the
build
  method on Line 12. Whenever I defined a new Convolutional Neural Network architecture I like to:
  • Place it in its own class (for namespace and organizational purposes)
  • Create a static
    build
    
      function that builds the architecture itself

The

build
  method, as the name suggests, takes a number of parameters, each of which I discuss below:
  • weight
    
     : The width of our input images
  • height
    
     : The height of the input images
  • depth
    
     : The number of channels in our input images (
    1
    
      for grayscale single channel images,
    3
    
      for standard RGB images which we’ll be using in this tutorial)
  • classes
    
     : The total number of classes we want to recognize (in this case, two)

We define our

model
  on Line 14. We use the
Sequential
  class since we will be sequentially adding layers to the
model
 .

Line 15 initializes our

inputShape
  using channels last ordering (the default for TensorFlow). If you are using Theano (or any other backend to Keras that assumes channels first ordering), Lines 18 and 19 properly update the
inputShape
 .

Now that we have initialized our model, we can start adding layers to it:

# first set of CONV => RELU => POOL layers
                model.add(Conv2D(20, (5, 5), padding="same",
                        input_shape=inputShape))
                model.add(Activation("relu"))
                model.add(MaxPooling2D(pool_size=(2, 2), strides=(2, 2)))

Lines 21-25 creates our first set of

CONV => RELU => POOL
  layers.

The

CONV
  layer will learn 20 convolution filters, each of which are 5×5.

We then apply a ReLU activation function followed by 2×2 max-pooling in both the x and y direction with a stride of two. To visualize this operation, consider a sliding window that “slides” across the activation volume, taking the max operation over each region, while taking a step of two pixels in both the horizontal and vertical direction.

Let’s define our second set of

CONV => RELU => POOL
  layers:
# second set of CONV => RELU => POOL layers
                model.add(Conv2D(50, (5, 5), padding="same"))
                model.add(Activation("relu"))
                model.add(MaxPooling2D(pool_size=(2, 2), strides=(2, 2)))

This time we are learning 50 convolutional filters rather than the 20 convolutional filters as in the previous layer set. It’s common to see the number of

CONV
  filters learned increase the deeper we go in the network architecture.

Our final code block handles flattening out the volume into a set of fully-connected layers:

# first (and only) set of FC => RELU layers
                model.add(Flatten())
                model.add(Dense(500))
                model.add(Activation("relu"))

                # softmax classifier
                model.add(Dense(classes))
                model.add(Activation("softmax"))

                # return the constructed network architecture
                return model

On Line 33 we take the output of the preceding

MaxPooling2D
  layer and flatten it into a single vector. This operation allows us to apply our dense/fully-connected layers.

Our fully-connected layer contains 500 nodes (Line 34) which we then pass through another nonlinear ReLU activation.

Line 38 defines another fully-connected layer, but this one is special — the number of nodes is equal to the number of

classes
  (i.e., the classes we want to recognize).

This

Dense
  layer is then fed into our softmax classifier which will yield the probability for each class.

Finally, Line 42 returns our fully constructed deep learning + Keras image classifier to the calling function.

Training our Convolutional Neural Network image classifier with Keras

Let’s go ahead and get started training our image classifier using deep learning, Keras, and Python.

Note: Be sure to scroll down to the “Downloads” section to grab the code + training images. This will enable you to follow along with the post and then train your image classifier using the dataset we have put together for you.

Open up a new file, name it

train_network.py
 , and insert the following code (or simply follow along with the code download):
# set the matplotlib backend so figures can be saved in the background
import matplotlib
matplotlib.use("Agg")

# import the necessary packages
from keras.preprocessing.image import ImageDataGenerator
from keras.optimizers import Adam
from sklearn.model_selection import train_test_split
from keras.preprocessing.image import img_to_array
from keras.utils import to_categorical
from pyimagesearch.lenet import LeNet
from imutils import paths
import matplotlib.pyplot as plt
import numpy as np
import argparse
import random
import cv2
import os

On Lines 2-18 we import required packages. There packages enable us to:

  1. Load our image dataset from disk
  2. Pre-process the images
  3. Instantiate our Convolutional Neural Network
  4. Train our image classifier

Notice that on Line 3 we set the

matplotlib
  backend to
"Agg"
  so that we can save the plot to disk in the background. This is important if you are using a headless server to train your network (such as an Azure, AWS, or other cloud instance).

From there, we parse command line arguments:

# construct the argument parse and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-d", "--dataset", required=True,
        help="path to input dataset")
ap.add_argument("-m", "--model", required=True,
        help="path to output model")
ap.add_argument("-p", "--plot", type=str, default="plot.png",
        help="path to output accuracy/loss plot")
args = vars(ap.parse_args())

Here we have two required command line arguments,

--dataset
  and
--model
 , as well as an optional path to our accuracy/loss chart,
--plot
 .

The

--dataset
  switch should point to the directory containing the images we will be training our image classifier on (i.e., the “Santa” and “Not Santa” images) while the
--model
  switch controls where we will save our serialized image classifier after it has been trained. If
--plot
  is left unspecified, it will default to
plot.png
  in this directory if unspecified.

Next, we’ll set some training variables, initialize lists, and gather paths to images:

# initialize the number of epochs to train for, initial learning rate,
# and batch size
EPOCHS = 25
INIT_LR = 1e-3
BS = 32

# initialize the data and labels
print("[INFO] loading images...")
data = []
labels = []

# grab the image paths and randomly shuffle them
imagePaths = sorted(list(paths.list_images(args["dataset"])))
random.seed(42)
random.shuffle(imagePaths)

On Lines 32-34 we define the number of training epochs, initial learning rate, and batch size.

Then we initialize data and label lists (Lines 38 and 39). These lists will be responsible for storing our the images we load from disk along with their respective class labels.

From there we grab the paths to our input images followed by shuffling them (Lines 42-44).

Now let’s pre-process the images:

# loop over the input images
for imagePath in imagePaths:
        # load the image, pre-process it, and store it in the data list
        image = cv2.imread(imagePath)
        image = cv2.resize(image, (28, 28))
        image = img_to_array(image)
        data.append(image)

        # extract the class label from the image path and update the
        # labels list
        label = imagePath.split(os.path.sep)[-2]
        label = 1 if label == "santa" else 0
        labels.append(label)

This loop simply loads and resizes each image to a fixed 28×28 pixels (the spatial dimensions required for LeNet), and appends the image array to the

data
  list (Lines 49-52) followed by extracting the class
label
  from the
imagePath
  on Lines 56-58.

We are able to perform this class label extraction since our dataset directory structure is organized in  the following fashion:

|--- images
|    |--- not_santa
|    |    |--- 00000000.jpg
|    |    |--- 00000001.jpg
...
|    |    |--- 00000460.jpg
|    |--- santa
|    |    |--- 00000000.jpg
|    |    |--- 00000001.jpg
...
|    |    |--- 00000460.jpg
|--- pyimagesearch
|    |--- __init__.py
|    |--- lenet.py
|    |    |--- __init__.py
|    |    |--- networks
|    |    |    |--- __init__.py
|    |    |    |--- lenet.py
|--- test_network.py
|--- train_network.py

Therefore, an example

imagePath
  would be:
images/santa/00000384.jpg

After extracting the

label
  from the
imagePath
 , the result is:
santa

I prefer organizing deep learning image datasets in this manner as it allows us to efficiently organize our dataset and parse out class labels without having to use a separate index/lookup file.

Next, we’ll scale images and create the training and testing splits:

# scale the raw pixel intensities to the range [0, 1]
data = np.array(data, dtype="float") / 255.0
labels = np.array(labels)

# partition the data into training and testing splits using 75% of
# the data for training and the remaining 25% for testing
(trainX, testX, trainY, testY) = train_test_split(data,
        labels, test_size=0.25, random_state=42)

# convert the labels from integers to vectors
trainY = to_categorical(trainY, num_classes=2)
testY = to_categorical(testY, num_classes=2)

On Line 61 we further pre-process our input data by scaling the data points from [0, 255] (the minimum and maximum RGB values of the image) to the range [0, 1].

We then perform a training/testing split on the data using 75% of the images for training and 25% for testing (Lines 66 and 67). This is a typical split for this amount of data.

We also convert labels to vectors using one-hot encoding — this is handled on Lines 70 and 71.

Subsequently, we’ll perform some data augmentation, enabling us to generate “additional” training data by randomly transforming the input images using the parameters below:

# construct the image generator for data augmentation
aug = ImageDataGenerator(rotation_range=30, width_shift_range=0.1,
        height_shift_range=0.1, shear_range=0.2, zoom_range=0.2,
        horizontal_flip=True, fill_mode="nearest")

Data augmentation is covered in depth in the Practitioner Bundle of my new book, Deep Learning for Computer Vision with Python.

Essentially Lines 74-76 create an image generator object which performs random rotations, shifts, flips, crops, and sheers on our image dataset. This allows us to use a smaller dataset and still achieve high results.

Let’s move on to training our image classifier using deep learning and Keras.

# initialize the model
print("[INFO] compiling model...")
model = LeNet.build(width=28, height=28, depth=3, classes=2)
opt = Adam(lr=INIT_LR, decay=INIT_LR / EPOCHS)
model.compile(loss="binary_crossentropy", optimizer=opt,
        metrics=["accuracy"])

# train the network
print("[INFO] training network...")
H = model.fit_generator(aug.flow(trainX, trainY, batch_size=BS),
        validation_data=(testX, testY), steps_per_epoch=len(trainX) // BS,
        epochs=EPOCHS, verbose=1)

# save the model to disk
print("[INFO] serializing network...")
model.save(args["model"])

We’ve elected to use LeNet for this project for two reasons:

  1. LeNet is a small Convolutional Neural Network that is easy for beginners to understand
  2. We can easily train LeNet on our Santa/Not Santa dataset without having to use a GPU
  3. If you want to study deep learning in more depth (including ResNet, GoogLeNet, SqueezeNet, and others) please take a look at my book, Deep Learning for Computer Vision with Python.

We build our LeNet model along with the

Adam
  optimizer on Lines 80-83. Since this is a two-class classification problem we’ll want to use binary cross-entropy as our loss function. If you are performing classification with > 2 classes, be sure to swap out the
loss
  for
categorical_crossentropy
 .

Training our network is initiated on Lines 87-89 where we call

model.fit_generator
, supplying our data augmentation object, training/testing data, and the number of epochs we wish to train for.

Line 93 handles serializing the model to disk so we later use our image classification without having to retrain it.

Finally, let’s plot the results and see how our deep learning image classifier performed:

# plot the training loss and accuracy
plt.style.use("ggplot")
plt.figure()
N = EPOCHS
plt.plot(np.arange(0, N), H.history["loss"], label="train_loss")
plt.plot(np.arange(0, N), H.history["val_loss"], label="val_loss")
plt.plot(np.arange(0, N), H.history["acc"], label="train_acc")
plt.plot(np.arange(0, N), H.history["val_acc"], label="val_acc")
plt.title("Training Loss and Accuracy on Santa/Not Santa")
plt.xlabel("Epoch #")
plt.ylabel("Loss/Accuracy")
plt.legend(loc="lower left")
plt.savefig(args["plot"])

Using matplotlib, we build our plot and save the plot to disk using the

--plot
  command line argument which contains the path + filename.

To train the Not Santa network (after using the “Downloads” section of this blog post to download the code + images), open up a terminal and execute the following command:

$ python train_network.py --dataset images --model santa_not_santa.model
Using TensorFlow backend.
[INFO] loading images...
[INFO] compiling model...
[INFO] training network...
Epoch 1/25
1s - loss: 0.7623 - acc: 0.4926 - val_loss: 0.6342 - val_acc: 0.4978
Epoch 2/25
1s - loss: 0.6022 - acc: 0.6705 - val_loss: 0.4542 - val_acc: 0.8182
Epoch 3/25
1s - loss: 0.4749 - acc: 0.8070 - val_loss: 0.4767 - val_acc: 0.7532
...
Epoch 23/25
1s - loss: 0.1085 - acc: 0.9554 - val_loss: 0.1300 - val_acc: 0.9654
Epoch 24/25
1s - loss: 0.0975 - acc: 0.9553 - val_loss: 0.1225 - val_acc: 0.9654
Epoch 25/25
1s - loss: 0.0798 - acc: 0.9717 - val_loss: 0.1072 - val_acc: 0.9740
[INFO] serializing network...

As you can see, the network trained for 25 epochs and we achieved high accuracy (97.40% testing accuracy) and low loss that follows the training loss, as is apparent from the plot below:

Figure 3: Training our image classifier using deep learning, Keras, and Python.

Evaluating our Convolutional Neural Network image classifier

The next step is to evaluate our Not Santa model on example images not part of the training/testing splits.

Open up a new file, name it

test_network.py
 , and let’s get started:
# import the necessary packages
from keras.preprocessing.image import img_to_array
from keras.models import load_model
import numpy as np
import argparse
import imutils
import cv2

On Lines 2-7 we import our required packages. Take special notice of the

load_model
  method — this function will enable us to load our serialized Convolutional Neural Network (i.e., the one we just trained in the previous section) from disk.

Next, we’ll parse our command line arguments:

# construct the argument parse and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-m", "--model", required=True,
        help="path to trained model model")
ap.add_argument("-i", "--image", required=True,
        help="path to input image")
args = vars(ap.parse_args())

We require two command line arguments: our

--model
  and a input
--image
(i.e., the image we are going to classify).

From there, we’ll load the image and pre-process it:

# load the image
image = cv2.imread(args["image"])
orig = image.copy()

# pre-process the image for classification
image = cv2.resize(image, (28, 28))
image = image.astype("float") / 255.0
image = img_to_array(image)
image = np.expand_dims(image, axis=0)

We load the

image
  and make a copy of it on Lines 18 and 19. The copy allows us to later recall the original image and put our label on it.

Lines 22-25 handling scaling our image to the range [0, 1], converting it to an array, and addding an extra dimension (Lines 22-25).

As I explain in my book, Deep Learning for Computer Vision with Python, we train/classify images in batches with CNNs. Adding an extra dimension to the array via

np.expand_dims
  allows our image to have the shape
(1, width, height, 3)
 , assuming channels last ordering.

If we forget to add the dimension, it will result in an error when we call

model.predict
  down the line.

From there we’ll load the Not Santa image classifier model and make a prediction:

# load the trained convolutional neural network
print("[INFO] loading network...")
model = load_model(args["model"])

# classify the input image
(notSanta, santa) = model.predict(image)[0]

This block is pretty self explanatory, but since this is where the heavy lifting of this script is performed, let’s take a second and understand what’s going on under the hood.

We load the Not Santa model on Line 29 followed by making a prediction on Line 32.

And finally, we’ll use our prediction to draw on the

orig
  image copy and display it to the screen:
# build the label
label = "Santa" if santa > notSanta else "Not Santa"
proba = santa if santa > notSanta else notSanta
label = "{}: {:.2f}%".format(label, proba * 100)

# draw the label on the image
output = imutils.resize(orig, width=400)
cv2.putText(output, label, (10, 25),  cv2.FONT_HERSHEY_SIMPLEX,
        0.7, (0, 255, 0), 2)

# show the output image
cv2.imshow("Output", output)
cv2.waitKey(0)

We build the label (either “Santa” or “Not Santa”) on Line 35 and then choose the corresponding probability value on Line 36.

The

label
  and 
proba
 are used on Line 37 to build the label text to show at the image as you’ll see in the top left corner of the output images below.

We resize the images to a standard width to ensure it will fit on our screen, and then put the label text on the image (Lines 40-42).

Finally, on Lines 45, we display the output image until a key has been pressed (Line 46).

Let’s give our Not Santa deep learning network a try:

$ python test_network.py --model santa_not_santa.model \
        --image images/examples/santa_01.png

Figure 4: Santa has been detected with 98% confidence using our Keras image classifer.

By golly! Our software thinks it is good ole’ St. Nick, so it really must be him!

Let’s try another image:

$ python test_network.py --model santa_not_santa.model \
        --image images/examples/santa_02.png

 

Figure 5: Using a Convolutional Neural Network, Keras, and Python to perform image classification.

Santa is correctly detected by the Not Santa detector and it looks like he’s happy to be delivering some toys!

Now, let’s perform image classification on an image that does not contain Santa:

$ python test_network.py --model santa_not_santa.model \
        --image images/examples/manhattan.png

Figure 6: Image classification with deep learning.

It looks like it’s too bright out for Santa to be flying through the sky and delivering presents in this part of the world yet (New York City) — he must still be in Europe at this time where night has fallen.

Speaking of the night and Christmas Eve, here is an image of a cold night sky:

$ python test_network.py --model santa_not_santa.model \
        --image images/examples/night_sky.png

Figure 7: Santa isn’t present in this part of the Christmas Eve sky, but he’s out there somewhere.

But it must be too early for St. Nicholas. He’s not in the above image either.

But don’t worry!

As I’ll show next week, we’ll be able to detect him sneaking down the chimney and delivering presents with a Raspberry Pi.

Limitations of our deep learning image classification model

There are a number of limitations to our image classifier.

The first one is that the 28×28 pixel images are quite small (the LeNet architecture was originally designed to recognize handwritten digits, not objects in photos).

For some example images (where Santa is already small), resizing the input image down to 28×28 pixels effectively reduces Santa down to a tiny red/white blob that is only 2-3 pixels in size.

In these types of situations it’s likely that our LeNet model is just predicting when there is a significant amount of red and white localized together in our input image (and likely green as well, as red, green, and white are Christmas colors).

State-of-the-art Convolutional Neural Networks normally accept images that are 200-300 pixels along their maximum dimension — these larger images would help us build a more robust Not Santa classifier. However, using larger resolution images would also require us to utilize a deeper network architecture, which in turn would mean that we need to gather additional training data and utilize a more computationally expensive training process.

This is certainly a possibility, but is also outside the scope of this blog post.

Therefore, If you want to improve our Not Santa app I would suggest you:

  1. Gather additional training data (ideally, 5,000+ example “Santa” images).
  2. Utilize higher resolution images during training. I imagine 64×64 pixels would produce higher accuracy. 128×128 pixels would likely be ideal (although I have not tried this).
  3. Use a deeper network architecture during training.
  4. Read through my book, Deep Learning for Computer Vision with Python, where I discuss training Convolutional Neural Networks on your own custom datasets in more detail.

Despite these limitations I was incredibly surprised with how well the Not Santa app performed (as I’ll discuss next week). I was expecting a decent number of false-positives but the network was surprisingly robust given how small it is.

Summary

In today’s blog post you learned how to train the seminal LeNet architecture on a series of images containing “Santa” and “Not Santa”, with our end goal being to build an app similar to HBO’s Silicon Valley Not Hotdog application.

We were able to gather our “Santa” dataset (~460 images) by following our previous post on gathering deep learning images via Google Images.

The “Not Santa” dataset was created by sampling the UKBench dataset (where no images contain Santa).

We then evaluated our network on a series of testing images — in each case our Not Santa model correctly classified the input image.

In our next blog post we’ll deploy our trained Convolutional Neural Network to the Raspberry Pi to finish building our Not Santa app.

What now?

Now that you’ve learned how to train your first Convolutional Neural Network, I’m willing to bet that you’re interested in:

  • Mastering the fundamentals of machine learning and neural networks
  • Studying deep learning in more detail
  • Training your own Convolutional Neural Networks from scratch

If so, you’ll want to take a look at my new book, Deep Learning for Computer Vision with Python.

Inside the book you’ll find:

  • Super-practical walkthroughs
  • Hands-on tutorials (with lots of code)
  • Detailed, thorough guides to help you replicate state-of-the-art results from seminal deep learning publications.

To learn more about my new book (and start your journey to deep learning mastery), just click here.

Otherwise, be sure to enter your email address in the form below to be notified when new deep learning posts are published here on PyImageSearch.

Downloads:

If you would like to download the code and images used in this post, please enter your email address in the form below. Not only will you get a .zip of the code, I’ll also send you a FREE 11-page Resource Guide on Computer Vision and Image Search Engines, including exclusive techniques that I don’t post on this blog! Sound good? If so, enter your email address and I’ll send you the code immediately!

The post Image classification with Keras and deep learning appeared first on PyImageSearch.



from PyImageSearch http://ift.tt/2BdvYUb
via IFTTT