Latest YouTube Video

Saturday, December 23, 2017

AA - Alcoholics Anonymous Ladies of the Morning Women's Support Group

AA - Alcoholics Anonymous Ladies of the Morning Women's Support Group. Sunday, December 24, 2017 11 a.m. - noon. For more information call AA at 800-245-1377 (24 hours a day, 7 days a week) No charge. Several AA support groups are available: The Somerville Recovery group meets every ...

from Google Alert - anonymous http://ift.tt/2BGXpXv
via IFTTT

Anonymous user 79a0d9

Name, Anonymous user 79a0d9. User since, دسمبر 20, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2kOZ7LS
via IFTTT

Anonymous user ce197c

Name, Anonymous user ce197c. User since, دسمبر 23, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2l4mdO3
via IFTTT

Anonymous user 547a10

Name, Anonymous user 547a10. User since, مئی 29, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2C2idrD
via IFTTT

Anonymous user cb5655

Name, Anonymous user cb5655. User since, دسمبر 22, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2BrQ1v4
via IFTTT

Interim Group Finance Director

Interim Group Finance Director in Accounting and public practice, Finance director with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2C49tla
via IFTTT

Graduate Business Analyst

Graduate Business Analyst in Marketing and advertising, Accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2BsAtqV
via IFTTT

Anonymous in a town that talks 2

Anonymous in a town that talks 2. By Con O'Donnell. Tweet. Published: December 2017; Format: Perfect Bound Softcover(B/W); Pages: 380. Size: 6x9. ISBN: 9781546286356. ×. Book Cover. Overview; Free Preview; About The Author; Customer Review; Editorial Review. This book charts catalogues ...

from Google Alert - anonymous http://ift.tt/2C3dbvb
via IFTTT

Anonymous user 8ca77b

Name, Anonymous user 8ca77b. User since, دسمبر 23, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2BrL1pX
via IFTTT

Anonymous user c8fe3a

Name, Anonymous user c8fe3a. User since, نومبر 19, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2C4Bfhk
via IFTTT

Anonymous user 7b14f9

Name, Anonymous user 7b14f9. User since, دسمبر 18, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2BrKpB0
via IFTTT

Send anonymous mail postage

For the moment, at least, there is no Federal statute prohibiting the sending of anonymous mail through the US Postal Service. If you want to "prank" your sister then you would have to do so from another Oct 13, 2010 · I wrote someone a card but I dont want to write my address. domain. It Buy postal ...

from Google Alert - anonymous http://ift.tt/2C4X8gs
via IFTTT

Anonymous ip test

To test if your anonymous torrent proxy or VPN Anonymous Web Surfing, Anonymous email, complete online anonymity in all protocols for total online protection, Anonymous pre-paid Visa cards, file encryption and more. A. Free Anonymity, Proxy, IP, Whois, DNS Check your proxy for anonymity ...

from Google Alert - anonymous http://ift.tt/2BrJMr8
via IFTTT

Christmas Cards From Anonymous

We're sorry, but your browser does not support this video. Please install Adobe Flash version 10 or later. UP NEXT. Couple Gets Married… "Christmas Cards From Anonymous" To The Homeless. CBS Philly. Duration: 01:41 23 hrs ago. SHARE · SHARE · TWEET · SHARE · EMAIL. CBS3's Ukee ...

from Google Alert - anonymous http://ift.tt/2C3d9n3
via IFTTT

Are you anonymous on sarahah

Sarahah, an anonymous messaging app on iOS and Android. "I told myself in November, 'You'll be satisfied with Aug 11, 2017 Sarahah (an Arabic term which means honesty) App that got everyone talking for the oddest reason has more than 50,000 followers on Facebook. So here is all the info on the ...

from Google Alert - anonymous http://ift.tt/2BrKdBM
via IFTTT

(#41457) · Issues

http://ift.tt/2l3slGo ``` NoMethodError: undefined method `id' for nil:NilClass lib/gitlab/checks/project_moved.rb:25:in `block in add_redirect_message' key = self.class.redirect_message_key(user.id, project.id) lib/gitlab/redis/wrapper.rb:17:in `block in with' @pool.with ...

from Google Alert - anonymous http://ift.tt/2kOEP5a
via IFTTT

▶ Joe Flacco goes for 237 yards and 2 TD as Ravens top Colts 23-16 to continue playoff push (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


Nancy cooper



Following: 102 - Followers: 1

December 23, 2017 at 05:00PM via Twitter http://twitter.com/trueloveneeded

📋 Ravens: WR Jeremy Maclin (knee) officially out vs. Colts; RB Terrance West active for 1st time in 10 weeks (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous 2016

Imagine for a moment, that in the future we eventually figure out how to live with each other in peace Anonymous in US theaters December 2, 2016 starring Callan McAuliffe, Lorraine Nicholson, Daniel Eric Gold, Clifton Collins Jr. youtube. Nov 28, 2016 It turns out that just as the 2016 presidential ...

from Google Alert - anonymous http://ift.tt/2kLRru1
via IFTTT

Anonymous#23557

This website uses cookies. By further browsing you consent to such use. OK Learn More · Diablo III. New to Diablo III? Try Free Now · Home · Game Guide · Rankings · Media · Forums · Buy Now · Log in now to enhance and personalize your experience! Anonymous #23557 WoSchafeSchweineSind.

from Google Alert - anonymous http://ift.tt/2l3zqXc
via IFTTT

Anonymous hack tools download

zip mega. how to become a hack Next anonymous hacker group free download - Anonymous Hacker Lock Screen, Anonymous Lock Screen Hacker, Anonymous Mobile Hacker Scary Prank Call : FREE, and many more programs Download Facebook Hacking Tool, Download Gmail Hacking Tool, ...

from Google Alert - anonymous http://ift.tt/2D4TX5o
via IFTTT

Can police trace anonymous text messages

Text-A-Tip allows people to send text messages via their cell phones to police. has “Tip411”, an anonymous tip service for just that purpose. A special computer server will encrypt your message and mask your identity before sending your tip to the Police. If a person sends threatening or abusive ...

from Google Alert - anonymous http://ift.tt/2BW16VY
via IFTTT

Zoosk browse anonymously

3,849 reviews for Zoosk, 3. Plus, see what singles have written about Zoosk. validcheats. It's quick, direct, and discreet. 73 Zoosk reviews. Thumbs up. Thumbs down. To browse anonymously Browse Anonymously. com started life as a Facebook App back in 2007, (anonymous) match per day the simple ...

from Google Alert - anonymous http://ift.tt/2D3TNv5
via IFTTT

8th St.'s surf is at least 5.09ft high

Maryland-Delaware, December 29, 2017 at 08:00AM

8th St. Summary
At 2:00 AM, surf min of 4.37ft. At 8:00 AM, surf min of 5.09ft. At 2:00 PM, surf min of 5.52ft. At 8:00 PM, surf min of 5.38ft.

Surf maximum: 5.87ft (1.79m)
Surf minimum: 5.09ft (1.55m)
Tide height: 1.04ft (0.32m)
Wind direction: ENE
Wind speed: 21.58 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

Comment



from Google Alert - anonymous http://ift.tt/2C3HSAB
via IFTTT

I have a new follower on Twitter


Marco Essomba
#Founder, #CTO @icybersecurity_ UK | I Help Clients Protect Digital Assets | Tweeting #Startups #CyberSecurity #CyberCrime #IoT #CyberSWAT | https://t.co/X078BfUfmF
Somewhere in UK CyberSpace 🤓
https://t.co/9S975NNHw9
Following: 21609 - Followers: 25827

December 23, 2017 at 04:29AM via Twitter http://twitter.com/marcoessomba

I have a new follower on Twitter


Arturo Duran
★ Strategic IT Biz. Dev. in Spain & LatAm | BSc (Hons) Astrophysics, MBA | Regional Manager @GovCloud | Cloud BigData IoT IIoT RegTech FinTech HealthIT
Madrid - Buenos Aires
http://t.co/WlsBpxBJ9c
Following: 21813 - Followers: 24649

December 23, 2017 at 04:24AM via Twitter http://twitter.com/ITCloudSpanish

Satori IoT Botnet Exploits Zero-Day to Zombify Huawei Routers

Although the original creators of the infamous IoT malware Mirai have already been arrested and sent to jail, the variants of the notorious botnet are still in the game due to the availability of its source code on the Internet. Hackers have widely used the infamous IoT malware to quietly amass an army of unsecured internet-of-things devices, including home and office routers, that could be


from The Hacker News http://ift.tt/2kJze04
via IFTTT

Anonymous user 8fbf4b

Name, Anonymous user 8fbf4b. User since, Dec. 1, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2l07i7u
via IFTTT

Christmas Cards From Anonymous

"Christmas Cards From Anonymous" To The Homeless. CBS Philly. Duration: 01:41 1 hr ago. SHARE · SHARE · TWEET · SHARE · EMAIL. CBS3's Ukee Washington Reports. READ MORE SEE LESS ...

from Google Alert - anonymous http://ift.tt/2kHkdMo
via IFTTT

Grey Sheeters Anonymous

All Brooklyn Public Library locations will be closed Sunday, December 24 through Monday, December 25 in observance of Christmas. SEARCH. CENTRAL LIBRARY – Open until 6:00 PM. HOURS + LOCATIONS. Arlington Library · Bay Ridge Library · Bedford Library · Borough Park Library · Brighton ...

from Google Alert - anonymous http://ift.tt/2l1ndlO
via IFTTT

Phaethon s Brood


Based on its well-measured orbit, 3200 Phaethon (sounds like FAY-eh-thon) is recognized as the source of the meteroid stream responsible for the annual Geminid meteor shower. Even though most meteor showers' parents are comets, 3200 Phaethon is a known and closely tracked near-Earth asteroid with a 1.4 year orbital period. Rocky and sun-baked, its perihelion or closest approach to the Sun is well within the orbit of innermost planet Mercury. In this telescopic field of view, the asteroid's rapid motion against faint background stars of the heroic constellation Perseus left a short trail during the two minute total exposure time. The parallel streaks of its meteoric children flashed much more quickly across the scene. The family portrait was recorded near the Geminid meteor shower's very active peak on December 13. That was just before 3200 Phaethon's historic December 16 closest approach to planet Earth. via NASA http://ift.tt/2kZD44i

Friday, December 22, 2017

Alcoholics anonymous meetings

Alcoholics anonymous meetings. resources below for a meeting list in that location and the surrounding area. Meeting Name does not require complete name. Calendar of events and contact information. Contact one of the A. Broward County Intergroup, Inc. West Maple Rd. Central Service Committee ...

from Google Alert - anonymous http://ift.tt/2zii4uK
via IFTTT

Narcotics Anonymous

Mustard Seed Group and the national organization of narcotics anonymous meet every Friday evening from 11pm-12:30am now until further notice at the New Beginnings Christian Community Church Center at 1130 East Market St. If you or someone you know is trying to deal with an addiction to drugs, ...

from Google Alert - anonymous http://ift.tt/2BEymnR
via IFTTT

Make this anonymous inner class a lambda example

Anonymous Inner Class Lets try to look with the help of examples the differences between Lambda and Anonymous Inner Classes. For example, the lambda Instead of creating anonymous inner class, we can create a lambda expression like This context plays the role analogous to that of the "closure" in ...

from Google Alert - anonymous http://ift.tt/2phxhg2
via IFTTT

"Christmas Cards From Anonymous" To The Homeless

"Christmas Cards From Anonymous" To The Homeless. CBS Philly. Duration: 01:41 17 mins ago. SHARE · SHARE · TWEET · SHARE · EMAIL. CBS3's Ukee Washington Reports. READ MORE SEE LESS ...

from Google Alert - anonymous http://ift.tt/2DvDAjf
via IFTTT

Anonymous Noise

Anonymous Noise 5 (Graphic Novel) : Fukuyama, Ryōko : Music and longing collide in this ballad of unrequited love! Nino Arisugawa, a girl who loves to sing, experiences her first heart-wrenching goodbye when her beloved childhood friend, Momo, moves away. And after Nino befriends Yuzu, a music ...

from Google Alert - anonymous http://ift.tt/2BA1lJn
via IFTTT

Blocking calls from anonymous callers

The marketing calls are driving me crazy. Is there a way to drop/block calls from callers with anonymous, blocked, etc. caller id? Any other...

from Google Alert - anonymous http://ift.tt/2kFsa4D
via IFTTT

Anonymous donor contributes gold coin to Moline Red Kettle

Moline, IL -- The Salvation Army Red Kettle Campaign got a boost thanks to a generous anonymous donor. A $25 Liberty gold coin was deposited in the Red Kettle at.

from Google Alert - anonymous http://ift.tt/2BY3ez8
via IFTTT

Ravens admit protest is one factor for "noticeable" no-shows at home games, in letter to fans (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Chinese Man Gets 5-Year Prison for Running 'Unauthorized' VPN Service

While continuing its crackdown on services that help Chinese citizens to bypass Great Firewall, Chinese authorities have sentenced a man to five-and-a-half years in prison for selling a VPN service without obtaining a proper license from the government. Earlier this year, the Chinese government announced a ban on "unauthorized" VPN services, making it mandatory for companies to obtain an


from The Hacker News http://ift.tt/2CZv2zN
via IFTTT

Anonymous ddos tool 2016 download

tips dream league soccer 2016 icon. 5 747. Whenever he wants to perform DDOS, of Zula Hack tool is now available for public download and use Hack Tool. Unlike slowloris here it can use switch over tor network and stay anonymous. Click here To download Jan 10, 2017 Voluntary botnets have seen ...

from Google Alert - anonymous http://ift.tt/2Du82u5
via IFTTT

Chrome ig story anonymous

Using Chrome IG Story Extension Anonymous 2 September 2017 at 19:03. Learn More. Micael Freddy - November 22, 2017. Search for friends, like a friend? lol. Clicking this enables “ Anonymous Viewing” mode. Unfortunately, this works only Nov 25, 2017 Instagram Stories are a fantastic hit, enabling ...

from Google Alert - anonymous http://ift.tt/2kHheTZ
via IFTTT

ISS Daily Summary Report – 12/21/2017

Marrow: Upon wakeup a 53S crewmember collected breath and ambient air samples. With operator assistance, the subject collected blood samples to support the Marrow investigation. The blood samples were processed in the centrifuge and placed in the Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI).  The Marrow investigation looks at the effect of microgravity … Continue reading "ISS Daily Summary Report – 12/21/2017"

from ISS On-Orbit Status Report http://ift.tt/2pbRJyV
via IFTTT

suggestion for anonymous report feedback

It would be nice if feedback would be send out to the people who reported other players like: "A player you have reported for abusive chat has been silenced for a period of time." In terms of data privacy protection this could be said without mentioning the silenced players name, because most of the time ...

from Google Alert - anonymous http://ift.tt/2kXYejC
via IFTTT

Action on anonymous/pseudonymous complaints

and Banks not to take action on anonymous/pseudonymous complaints. Reference Law and Justice Division's letter No. . No. MECHANISM. anonymous / pseudonymous and filed. Improving Vigilance Administration-Action on. ESTABLISHMENT OF PUBLIC COMPLAINTS RESOLUTION . ra. Jul 12 ...

from Google Alert - anonymous http://ift.tt/2paMDmx
via IFTTT

Is ko fi anonymous

Ko-fi. jpg. com. Anders also loves Ser Pounce who loves cream. co/PQs8ZveKDO. May 8, 2017 Last but not least I'd like to thank @uadudeloveswakana for encouraging me to get a ko-fi account and for buying me my first two coffees. LaGarcon•BW. My XBMC addons Complete your Kofi Anonymous ...

from Google Alert - anonymous http://ift.tt/2paVPaE
via IFTTT

Anonymous cgi proxy

Anonymous web proxy. Free Anonymous Proxy so you don't have to be a rocket scientist to get up and running with hide. An anonymous CGI Proxy is a type of proxy server that works through an encrypted web form Dec 14, 2017 Select URL to start surfing anonymously with random CGI Proxy, type your ...

from Google Alert - anonymous http://ift.tt/2BP1Fkx
via IFTTT

I have a new follower on Twitter


CompSecGlobal.com
Since '04 we've been providing the best Computer Security Solutions for home & business. Let us find the correct solutions for you. #AV #Backup #Firewall
Colorado, USA
https://t.co/Ia5LAObSdS
Following: 3933 - Followers: 4709

December 22, 2017 at 04:34AM via Twitter http://twitter.com/CompSecGlobal

I have a new follower on Twitter


LabCo NYC
Technology incubator in NYC
New York, NY
https://t.co/d6f9mCybWm
Following: 3192 - Followers: 3590

December 22, 2017 at 04:19AM via Twitter http://twitter.com/labco_nyc

anonymous galaxy



from Google Alert - anonymous http://ift.tt/2CWAiEC
via IFTTT

Beware of Cryptocurrency Mining Virus Spreading Through Facebook Messenger

If you receive a video file (packed in zip archive) sent by someone (or your friends) on your Facebook messenger — just don’t click on it. Researchers from security firm Trend Micro are warning users of a new cryptocurrency mining bot which is spreading through Facebook Messenger and targeting Google Chrome desktop users to take advantage of the recent surge in cryptocurrency prices. Dubbed


from The Hacker News http://ift.tt/2kXxPCc
via IFTTT

Nissan Finance Canada Suffers Data Breach — Notifies 1.13 Million Customers

It's the last month of this year, but possibly not the last data breach report. Nissan warns of a possible data breach of personal information on its customers who financed their vehicles through Nissan Canada Finance and INFINITI Financial Services Canada. Although the company says it does not know precisely how many customers were affected by the data breach, Nissan is contacting all of


from The Hacker News http://ift.tt/2kV4clh
via IFTTT

Gemini s Meteors


From dark skies above Heilongjiang province in northeastern China, meteors rain down on a wintry landscape in this beautiful composited night scene. The 48 meteors are part of last week's annual Geminid meteor shower. Despite temperatures of -28 degrees C, all were recorded in camera exposures made during the peak hour of the celestial spectacle. They stream away from the shower's radiant high above the horizon near the two bright stars of the zodiacal constellation of the Twins. A very active shower, this year the December 13-14 peak of the Geminids arrived just before the December 16 closest approach of asteroid 3200 Phaethon to planet Earth. Mysterious 3200 Phaethon is the Geminid shower's likely parent body. via NASA http://ift.tt/2BroLAI

Moon Phase and Libration, 2018

Dial-A-Moon Month: Day: UT Hour: init_user_date(); show_moon_image(); show_moon_info(); Click on the image to download a high-resolution version with labels for craters near the terminator. The animation archived on this page shows the geocentric phase, libration, position angle of the axis, and apparent diameter of the Moon throughout the year 2018, at hourly intervals. Until the end of 2018, the initial Dial-A-Moon image will be the frame from this animation for the current hour. More in this series: North 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 South 2018 | 2017 | 2016 | 2015 | 2014 | 2013 Lunar Reconnaissance Orbiter ( LRO ) has been in orbit around the Moon since the summer of 2009. Its laser altimeter ( LOLA ) and camera ( LROC ) are recording the rugged, airless lunar terrain in exceptional detail, making it possible to visualize the Moon with unprecedented fidelity. This is especially evident in the long shadows cast near the terminator, or day-night line. The pummeled, craggy landscape thrown into high relief at the terminator would be impossible to recreate in the computer without global terrain maps like those from LRO. The Moon always keeps the same face to us, but not exactly the same face. Because of the tilt and shape of its orbit, we see the Moon from slightly different angles over the course of a month. When a month is compressed into 24 seconds, as it is in this animation, our changing view of the Moon makes it look like it's wobbling. This wobble is called libration . The word comes from the Latin for "balance scale" (as does the name of the zodiac constellation Libra) and refers to the way such a scale tips up and down on alternating sides. The sub-Earth point gives the amount of libration in longitude and latitude. The sub-Earth point is also the apparent center of the Moon's disk and the location on the Moon where the Earth is directly overhead. The Moon is subject to other motions as well. It appears to roll back and forth around the sub-Earth point. The roll angle is given by the position angle of the axis, which is the angle of the Moon's north pole relative to celestial north. The Moon also approaches and recedes from us, appearing to grow and shrink. The two extremes, called perigee (near) and apogee (far), differ by about 14%. The most noticed monthly variation in the Moon's appearance is the cycle of phases , caused by the changing angle of the Sun as the Moon orbits the Earth. The cycle begins with the waxing (growing) crescent Moon visible in the west just after sunset. By first quarter, the Moon is high in the sky at sunset and sets around midnight. The full Moon rises at sunset and is high in the sky at midnight. The third quarter Moon is often surprisingly conspicuous in the daylit western sky long after sunrise. Celestial north is up in these images, corresponding to the view from the northern hemisphere. The descriptions of the print resolution stills also assume a northern hemisphere orientation. (There is also a south-up version of this page .) The Moon's Orbit From this birdseye view, it's somewhat easier to see that the phases of the Moon are an effect of the changing angles of the sun, Moon and Earth. The Moon is full when its orbit places it in the middle of the night side of the Earth. First and Third Quarter Moon occur when the Moon is along the day-night line on the Earth. The First Point of Aries is at the 3 o'clock position in the image. The sun is in this direction at the March equinox. You can check this by freezing the animation at the 1:03 mark, or by freezing the full animation with the time stamp near March 20 at 10:00 UTC. This direction serves as the zero point for both ecliptic longitude and right ascension. The north pole of the Earth is tilted 23.5 degrees toward the 12 o'clock position at the top of the image. The tilt of the Earth is important for understanding why the north pole of the Moon seems to swing back and forth. In the full animation, watch both the orbit and the "gyroscope" Moon in the lower left. The widest swings happen when the Moon is at the 3 o'clock and 9 o'clock positions. When the Moon is at the 3 o'clock position, the ground we're standing on is tilted to the left when we look at the Moon. At the 9 o'clock position, it's tilted to the right. The tilt itself doesn't change. We're just turned around, looking in the opposite direction. The subsolar and sub-Earth points are the locations on the Moon's surface where the sun or the Earth are directly overhead, at the zenith. A line pointing straight up at one of these points will be pointing toward the sun or the Earth. The sub-Earth point is also the apparent center of the Moon's disk as observed from the Earth. In the animation, the blue dot is the sub-Earth point, and the yellow dot is the subsolar point. The lunar latitude and longitude of the sub-Earth point is a measure of the Moon's libration. For example, when the blue dot moves to the left of the meridian (the line at 0 degrees longitude), an extra bit of the Moon's western limb is rotating into view, and when it moves above the equator, a bit of the far side beyond the north pole becomes visible. At any given time, half of the Moon is in sunlight, and the subsolar point is in the center of the lit half. Full Moon occurs when the subsolar point is near the center of the Moon's disk. When the subsolar point is somewhere on the far side of the Moon, observers on Earth see a crescent phase. The Moon's orbit around the Earth isn't a perfect circle. The orbit is slightly elliptical, and because of that, the Moon's distance from the Earth varies between 28 and 32 Earth diameters, or about 356,400 and 406,700 kilometers. In each orbit, the smallest distance is called perigee, from Greek words meaning "near earth," while the greatest distance is called apogee. The Moon looks largest at perigee because that's when it's closest to us. The animation follows the imaginary line connecting the Earth and the Moon as it sweeps around the Moon's orbit. From this vantage point, it's easy to see the variation in the Moon's distance. Both the distance and the sizes of the Earth and Moon are to scale in this view. In the HD-resolution frames, the Earth is 50 pixels wide, the Moon is 14 pixels wide, and the distance between them is about 1500 pixels, on average. Note too that the Earth appears to go through phases just like the Moon does. For someone standing on the surface of the Moon, the sun and the stars rise and set, but the Earth doesn't move in the sky. It goes through a monthly sequence of phases as the sun angle changes. The phases are the opposite of the Moon's. During New Moon here, the Earth is full as viewed from the Moon.

from NASA's Scientific Visualization Studio: Most Popular
via IFTTT

Thursday, December 21, 2017

Sexaholics anonymous

Sexaholics Anonymous (SA) is one of several twelve-step programs for compulsive sexual acting-out based on the original Twelve Steps of Alcoholics Anonymous. Here you will find locations for information meetings in Los Angeles, Orange & Santa Barbara Counties. To help you decide if you have a ...

from Google Alert - anonymous http://ift.tt/2pacmLX
via IFTTT

This Just In: Ravens WR Jeremy Maclin (knee) likely out Saturday vs. Colts (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

BofA CEO on Bitcoin: Is Anonymous Currency Wanted?

Dec.21 -- Brian Moynihan, chief executive officer at Bank of America, speaks with Bloomberg's David Westin about the merits of bitcoin as a currency and the bank's focus on the growth of real-time payments.

from Google Alert - anonymous http://ift.tt/2Bhw5ea
via IFTTT

Ravens: WR Jeremy Maclin (knee) could be game-time decision, says John Harbaugh (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

v/ - We have a 10 dollar donation from anonymous

We have a 10 dollar donation from anonymous: Hey guys, long time watcher, first time donator. It giv... - "/v/ - Video Games" is 4chan's imageboard dedicated to the discussion of PC and console video games.

from Google Alert - anonymous http://ift.tt/2BwEGh9
via IFTTT

Apple Admits Deliberately Slowing Older iPhones — Here’s Why

Why is my iPhone slow? Do you also ask this question again and again? Well, the biggest conspiracy theory floating around from years that Apple deliberately slows down performance on your older iPhones whenever the company is about to launch the next version of its flagship to push its sale is TRUE (at least partially). Apple has finally admitted that it does indeed intentionally slow down


from The Hacker News http://ift.tt/2pa6YbM
via IFTTT

ISS Daily Summary Report – 12/20/2017

Zebrafish Muscle 2: Following the fixation and stowing of experiment units (EUs) from Group A earlier this week, today the crew performed fixation on the EUs from Groups B and C and then stowed them in the refrigerator of the Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI). The results from Zebrafish Muscle 2 … Continue reading "ISS Daily Summary Report – 12/20/2017"

from ISS On-Orbit Status Report http://ift.tt/2p4x1AO
via IFTTT

Hackers Targeting Servers Running Database Services for Mining Cryptocurrency

Security researchers have discovered multiple attack campaigns conducted by an established Chinese criminal group that operates worldwide, targeting database servers for mining cryptocurrencies, exfiltrating sensitive data and building a DDoS botnet. The researchers from security firm GuardiCore Labs have analyzed thousands of attacks launched in recent months and identified at least three


from The Hacker News http://ift.tt/2CRHce7
via IFTTT

Tax Fears? Anonymous Cryptos Dash, Zcash and Monero Surge in Korea

The prices of three leading anonymous and privacy-focused cryptocurrencies Dash, Monero, and Zcash have surged in South Korea amidst local market's concerns over cryptocurrency investment tax policies.

from Google Alert - anonymous http://ift.tt/2Btnl8P
via IFTTT

Solstice Sun and Milky Way


Welcome to December's solstice, first day of winter in the north and summer for the southern hemisphere. Astronomical markers of the seasons, solstice and equinox dates are based on the Sun's place in its annual journey along the ecliptic, through planet Earth's sky. At this solstice, the Sun reaches its maximum southern declination of -23.5 degrees today at 16:28 UTC, while its right ascension coordinate on the celestial sphere is 18 hours. That puts the Sun in the constellation Sagittarius in a direction near the center of our Milky Way galaxy. In fact, if you could see today's Solstice Sun against faint background stars and nebulae (that's really hard to do, especially in the daytime ...) your view might look something like this composited panorama. To make it, images of our fair galaxy were taken under dark Namibian night skies, then stitched together in a panoramic view. From a snapshot made on December 21, 2015, the Sun was digitally overlayed as a brilliant star at today's northern winter solstice position, close to the center of the Milky Way. via NASA http://ift.tt/2oZxZOG

Incredible Solar Flare, Prominence Eruption and CME Event (SDO/HMI visible light)

On June 7, 2011, an M-2 flare occurred on the Sun which released a very large coronal mass ejection (CME). In this view in visible light seen by the SDO/HMI instrument, we can't even see the event. This view is provided as a comparison to how dramatic the event appears in extreme ultraviolet light, as seen in 3838 (304 Angstroms), 3839 (171 Angstroms), and 3840 (211 Angstroms), near ultraviolet light, 3841 (1700 Angstroms), presented a much less impressive event.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2BTqMoN
via IFTTT

Wednesday, December 20, 2017

Anonymous Donor Gifts Shopping Spree To Girl With Special Needs

The donor on Long Island is making holiday wishes come true. CBS2's Hazel Sanchez reports.

from Google Alert - anonymous http://ift.tt/2kQHsTi
via IFTTT

ECCNA.eu

ECCNA Kraków 2018. from ECCNA Kraków. LIVE. 00:00. 02:26. Like. Add to Watch Later. Share. Email. ECCNA 33 Portugal · NA Region Poland · European Delegates Meeting · NA World Services. © Narcotics Anonymous. Close Menu. Close Menu. undefined. :)

from Google Alert - anonymous http://ift.tt/2kxcroj
via IFTTT

Anonymous user 5cd12d

Name, Anonymous user 5cd12d. User since, Dec. 20, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2Djn1qm
via IFTTT

One Less Gun: Anonymous Tip Leads to the Recovery of Large Caliber Revolver and Ammunition ...

At about 11:45 AM on Tuesday December 19, 2017, officers assigned to District D-14 (Brighton) safely recovered a .44 caliber F.LLI Pietta revolver along with 100 rounds of .45 caliber ammunition after receiving an anonymous tip. The firearm and ammunition were located inside a plastic bag near the ...

from Google Alert - anonymous http://ift.tt/2p0yZCm
via IFTTT

Anonymous - Chef

Anonymous – Chef. Posted on December 20, 2017. Chef position is available. Cape and Islands location. Fine Dining. Year round. 5+ yrs Chef experience or 2 years Chef and 3+ years Sous Chef experience in fine dining. Experience with food and labor cost management systems. Comfort with a high ...

from Google Alert - anonymous http://ift.tt/2Dj7Ygn
via IFTTT

Orioles: The time to trade Manny Machado is now - Eddie Matz (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Forums

Welcome to the RC33 forum. As a RC33 website visitor you are invited to discuss any topic relevant to RC33 members. As for now, the forum is not moderated. Katja Lozar Manfreda RC33 Secretary. This forum contains 4 topics and 1 reply, and was last updated by Anonymous 5 months ago. Viewing 4 ...

from Google Alert - anonymous http://ift.tt/2BoyDuY
via IFTTT

Anonymous user cd6617

Name, Anonymous user cd6617. User since, Nov. 23, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2kuhB4b
via IFTTT

Anonymous external attack v2 download

Voici les cinq problèmes Anonymous external attack. 0 Denial of Service Attack tool for windows. Read more. 6. exe (SHA-1 df4b2644052584f40999b455ceecbb6c3bb37f0c). 0 Postado por Selevin Ratzara às 08:09. 0; All versions Anonymous External Attack En etkili ddos programından birisi Kullanıcı ...

from Google Alert - anonymous http://ift.tt/2kR8MAM
via IFTTT

Romanian Police Arrest 5 People for Spreading CTB Locker and Cerber Ransomware

Romanian police have arrested five individuals suspected of infecting tens of thousands of computers across Europe and the United States in recent years by spreading two infamous ransomware families—Cerber and CTB Locker. Under Operation Bakovia—a major global police operation conducted by Europol, the FBI and law enforcement agencies from Romanian, Dutch, and the UK—raided six houses in East


from The Hacker News http://ift.tt/2BnwtvM
via IFTTT

TheDjinnnn - ️Alcoholics Anonymous ️

TheDjinnnn - ❄ ❄️Alcoholics Anonymous ❄ ❄ - Dead by Daylight - Twitch.

from Google Alert - anonymous http://ift.tt/2z5dlfQ
via IFTTT

Orioles will remove Manny Machado from trade block if offers don't improve by Thursday, says GM Dan Duquette (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

MLB: Orioles RP Zach Britton out at least 6 months after rupturing Achilles tendon in workout - The Athletic (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

ISS Daily Summary Report – 12/19/2017

53S Docking:  53 Soyuz launched on Sunday, December 17th, and arrived at the ISS early this morning.  The Soyuz brought Anton Shkaplerov, Scott Tingle, and Norishige Kanai, and docked at 2:39 AM CST with hatch opening at 4:55 AM CST.  This begins the 54-6 stage, and returns the ISS crew to its nominal complement of … Continue reading "ISS Daily Summary Report – 12/19/2017"

from ISS On-Orbit Status Report http://ift.tt/2BQP7M0
via IFTTT

I have a new follower on Twitter


Immo & Finance
Veille sur la Finance, l'immobilier, le patrimoine et la défiscalisation. 10 d’expérience en conseil financier auprès des part. et des CGP. Dad, Golf & Tennis


Following: 13071 - Followers: 19263

December 20, 2017 at 10:14AM via Twitter http://twitter.com/GaspardRousseau

Anonymous user eb1baa

Name, Anonymous user eb1baa. User since, Dec. 20, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2z57YNK
via IFTTT

na meeting attendance card

#31 meeting attendance cards This paper, written in 2002, is meant to serve as a response to the numerous inquiries we have received from groups regarding meeting attendance cards. ATTENDANCE FORM FOR ALCOHOLICS/NARCOTICS ANONYMOUS ... member of the group signing this record of ...

from Google Alert - anonymous http://ift.tt/2Bln87v
via IFTTT

How to receive money anonymously online

Your transfer will be instantly available. anonymous payment methods If you need an email address – for example, to receive a username and password – use an anonymous email address (discussed at #2 below). Bottom line: Given Facebook's expansive reach — with 1. They can be purchased by the ...

from Google Alert - anonymous http://ift.tt/2z4XVIH
via IFTTT

Greedy North Korean Hackers Targeting Cryptocurrencies and Point-of-Sale Terminals

North Korean hackers has turned greedy. Security researchers have uncovered a new widespread malware campaign targeting cryptocurrency users, believed to be originated from Lazarus Group, a state-sponsored hacking group linked to the North Korean government. Active since 2009, Lazarus Group has been attributed to many high profile attacks, including Sony Pictures Hack, $81 million heists


from The Hacker News http://ift.tt/2z59b7P
via IFTTT

I have a new follower on Twitter


WisePops
WisePops is a conversion tool used by 2,000+ ecommerce and other websites to grow their email list, and promote important events (coupons, sales, new releases)

http://t.co/96V9uAqMi7
Following: 2262 - Followers: 3453

December 20, 2017 at 07:34AM via Twitter http://twitter.com/TheWisePops

I have a new follower on Twitter


AssetScan
AssetScan, a complete platform of hardware, software & data analytic services makes it easy for OEMs to connect products to the Industrial #IoT.
Eden Prairie, MN
https://t.co/vep4UcElht
Following: 11644 - Followers: 26051

December 20, 2017 at 05:50AM via Twitter http://twitter.com/ATEKAssetScan

Cache rebuild. Serve a SuperCache file to anonymous users while a new file is be

Support » Plugin: WP Super Cache » Cache rebuild. Serve a SuperCache file to anonymous users while a new file is be. Cache rebuild. Serve a SuperCache file to anonymous users while a new file is be. ihorsl. (@ihorsl). 16 minutes ago. Can anybody tell me what EXACTLY this option do. And how to ...

from Google Alert - anonymous http://ift.tt/2BEVtLI
via IFTTT

Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites

Buying popular plugins with a large user-base and using it for effortless malicious campaigns have become a new trend for bad actors. One such incident happened recently when the renowned developer BestWebSoft sold a popular Captcha WordPress plugin to an undisclosed buyer, who then modified the plugin to download and install a hidden backdoor. In a blog post published on Tuesday, WordFence


from The Hacker News http://ift.tt/2B95508
via IFTTT

[DECISION] Should we allow Anonymous Closures in Lambdas?

So I know I have a habit of using anonymous closures instead of declaring a scope and variables for a Lambda function, but it can harm readability and slow understanding should a newer user come along. It's also sometimes not the right choice( see square it discussion ), regardless of how nifty a trick it ...

from Google Alert - anonymous http://ift.tt/2kr7SeW
via IFTTT

I have a new follower on Twitter


TankScan®
TankScan® wireless tank monitoring lets customers check fluid levels in multiple tanks, across multiple sites, and save up to 30% on deliveries and collections.
Eden Prairie, MN
https://t.co/pYq2qEKeiX
Following: 8856 - Followers: 10801

December 20, 2017 at 04:25AM via Twitter http://twitter.com/ATEKTankScan

Tuesday, December 19, 2017

View Forum - CosmoCoffee

No new posts, How to resolve CAMB error : "STOP Must give num_massive number of integer physical neutrinos for each eigenstate". 0, 170, October 27 2017. Sarvesh Kumar Yadav · View latest post. No new posts, Activate me! 1, 7, September 30 2017. Anonymous View latest post. No new posts ...

from Google Alert - anonymous http://ift.tt/2D8sxwd
via IFTTT

Anonymous woman shopping in Internet

Crop mockup shot of woman in dress using laptop and credit card for shopping while relaxing in park.

from Google Alert - anonymous http://ift.tt/2oTgeRi
via IFTTT

Ravens: LB Terrell Suggs, S Eric Weddle and LB C.J. Mosley named to 2018 Pro Bowl (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Chicago Sun-Times, Mark Brown: Homeless memorial service honors anonymous lives

Benjamin Soto Ramirez was a late entry to the program for Tuesday's Chicago Homeless Persons Memorial service at Old St. Patrick's Church. Ramirez, 67, was beaten to death over the weekend, his body discovered on the sidewalk near the doorway where he usually slept in East Ukrainian Village.

from Google Alert - anonymous http://ift.tt/2D6sroJ
via IFTTT

Talk Back with Yik Yak? Exploring User Engagement via Anonymous Social Media in an Academic ...

ABSTRACT. This article presents results of a study of library-related posts on Yik Yak, a former social media app, and questions received via more traditional library-maintained virtual reference service platforms—namely, chat/instant messaging, SMS/text messaging, email, and LibAnswers' Query ...

from Google Alert - anonymous http://ift.tt/2yYYxQb
via IFTTT

Allow Anonymous Grading to be the default in SpeedGrader

Hello,. I'm submitting an idea on behalf of a few of my CS instructors. Currently in SpeedGrader, there is the ability to hide student names when reviewing and grading assignments. This is great but the setting needs to be turned on for each assignment. We were wondering if it would be possible to have ...

from Google Alert - anonymous http://ift.tt/2BKnJPx
via IFTTT

Emotions Anonymous is returning to the QC

Emotions Anonymous is returning to the Quad Cities beginning January 8th, 2018.

from Google Alert - anonymous http://ift.tt/2yYr5JA
via IFTTT

[FD] ESA-2017-157: EMC Data Domain DD OS Memory Overflow Vulnerability

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] ESA-2017-161: EMC Isilon OneFS NFS Export Security Setting Fallback Vulnerability

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] [CVE-2017-17753] Multiple Cross-Site Scripting (XSS) vulnerabilities in CSV Import-Export Wordpress Plugin

[FD] [CVE-2017-17744] Cross-Site Scripting (XSS) vulnerability in Custom Map WordPress Plugin

[FD] [CVE-2017-17719] Cross-Site Scripting (XSS) vulnerability in WordPress Concours Plugin

[FD] [SYSS-2017-027] Microsoft Windows Hello Face Authentication - Authentication Bypass by Spoofing (CWE-290)

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] SSD Advisory – Ichano AtHome IP Cameras Multiple Vulnerabilities

[FD] SSD Advisory – Huawei P8 wkupccpu debugfs Kernel Buffer Overflow

SSD Advisory – Huawei P8 wkupccpu debugfs Kernel Buffer Overflow Full report: http://ift.tt/2Bnc32S Twitter: @SecuriTeam_SSD Weibo: SecuriTeam_SSD Vulnerability Summary The following advisory describes a buffer overflow found in Huawei P8 Lite ALE-21 HI621sft, operating system versions EMUI 3.1 – wkupccpu debugfs driver. Huawei Technologies Co. Ltd. is “a multinational networking and telecommunications equipment and services company, it is the largest telecommunications equipment manufacturer in the world and the second largest smartphone manufacturer in the world” Credit A security researcher from, TRUEL IT, has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program Vendor response Huawei confirmed that the vulnerability is not present on their most current version (with EMUI 4.0 or later), the only affected version is 3.1 and prior, it is recommended that all customers of Huawei upgrade to the latest version of their OS. Vulnerability details The vulnerability allows an attacker with root privileges in an unprivileged SELinux domain to execute arbitrary code in the kernel context. The vulnerable code can be found in the wkupccpu debugfs driver. File Kernel Binary Image – function pwrctrl_debug_init() @ 0xf9c714:3 See Image 005 The instructions at offset 0xf9c78c and 0xf9c7b8 in the pwrctrl_debug_init function are the one responsible of registering the debugfs directory and file in the filesystem, which is then mounted within the /sys/kernel/debug/ system directory The driver implements the write handler in its wkupccpu_dbgfs_write function: See image 007 It is good to have in mind the signature of a typical write implementation, which is: === ssize_t (*write) (struct file *, const char *, size_t, loff_t *); === The first basic block shown above prepares the stack and reserves 0xb0 (176) bytes for the local variables: register X1 will contain the pointer to const char * argument buffer provided by the user. Lines from offset 0x666208 to 0x666218 are the one responsible to check if the pointer to const char * argument provided by the user and its size provided as the size_t argument can cause an arithmetic overflow. In case of arithmetic overflow, the flow will be redirected to the basic block at offset 0x666234 and the vulnerability will not be triggered; otherwise, the execution will proceed to basic block at offset 0x666220, which contains the vulnerable copy_from_user call. The following is the state of the registers when this call is reached: X0 will hold the pointer to the destination buffer: the analysis highlights that the buffer is 0x8b (128) bytes longs and resides locally to the function X1 will hold the pointer to the source buffer, which resides in user space and is usersupplied X2 register will hold the number of bytes to copy, which is determined by the size ofthe buffer pointed by X1 Since we control the value of X2 register, we can provide a buffer wider than 128 bytes, causing an out-of-bounds write on the stack that could lead to memory corruption.

Source: Gmail -> IFTTT-> Blogger

Re: [FD] Google supported XSS kit aka AdExchange iframe buster kit

[FD] Google supported XSS kit aka AdExchange iframe buster kit

Hi list, The DFP AdExchange service of Google (the service who provide ads) is distributing an "Iframe Buster Kit" in order to allow iframe ads to expand outside of the iFrame. This needs some bypass of the restriction applied to iframe, so Google provide a kit to install on your website: - Help Document: http://ift.tt/2oOFmbO - Kit: http://ift.tt/2D6Cn1y The kit contains several html and js files to be hosted on your domains. Some of those files (still provide by Google, remember) contains very visible XSS code: One of them is "predicta" that simply allow you to pass the domain of from where to load the javascript. Quick proof of concept: - http://ift.tt/2oLDFvP As expandable ads allow website to gain more ads revenue, those kits is present in a lot of website. Other "iframe buster kit" exist that are not provided by Google, and some of them are also vulnerable. From my list I have: - /admotion/afa-iframe.htm?iq=http://ift.tt/2D7hdAv - /ipinyou/py_buster.html?pybust=http://ift.tt/2D7hdAv - /rockabox/rockabox_buster.html?rbbust=http://ift.tt/2D7hdAv (look like different version exist however) - /undertone/iframe-buster.html?ajurl=http://ift.tt/2D7hdAv Some source: - Code of predicta_bf.html provide by Google in the kit: http://ift.tt/2oNYUND - Code of http://ift.tt/2D7hdAv : http://ift.tt/2D5ctLB - Code of rockabox: http://ift.tt/2oOFQPa Tr4L

Source: Gmail -> IFTTT-> Blogger

[FD] Multiple Vulnerabilities in TP-Link TL-SG108E - CVE-2017-17745, CVE-2017-17746, CVE-2017-17747

Overview

Source: Gmail -> IFTTT-> Blogger

Re: [FD] [oss-security] CVE-2017-17670: vlc: type conversion vulnerability

On Fri, Dec 15, 2017 at 05:28:45AM -0500, Stiepan wrote: > Nice job! By the way, when is back-porting of the fix to the current > stable version(s) envisioned? (I doubt most oss OS distributions use > the "HEAD of the VLC master branch", nor that most Windows or Mac > users use the latest bleeding-edge build, leaving a potentially large > window for exploitation if former versions don't get fixed; knowing > VLC's popularity, I think that the question should be seriously > considered) > And is there a standalone patch or workaround that could be used for > older versions (besides not opening mp4 videos anymore)? The MP4 module has undergone some major changes and unfortunately the VLC project probably won't backport a fix to 2.2.x.

Source: Gmail -> IFTTT-> Blogger

[FD] DefenseCode ThunderScan SAST Advisory: WordPress Booking Calendar Multiple Security Vulnerabilities

DefenseCode ThunderScan SAST Advisory: WordPress Booking Calendar              Multiple Security Vulnerabilities Advisory ID:    DC-2017-12-005 Advisory Title: WordPress Booking Calendar Plugin Multiple Vulnerabilities Advisory URL:   http://ift.tt/2rhPqdW Software:       WordPress Booking Calendar plugin Language:       PHP Version:        7.0/7.1 and below Vendor Status:  Vendor contacted, updates released Release Date:   2017/12/13 Risk:           Medium 1. General Overview =================== During the security audit of Booking Calendar plugin for WordPress CMS, multiple vulnerabilities were discovered using DefenseCode ThunderScan application source code security analysis platform. More information about ThunderScan is available at URL: http://ift.tt/Vn2J4r 2. Software Overview ==================== Booking Calendar plugin - described by the authors as the ultimate booking system for online reservation and availability checking service for your site. According to wordpress.org, it has more than 40,000 active installs. Homepage: http://ift.tt/1kglEJL http://ift.tt/1hpgwPN http://ift.tt/2CAzZio 3. Vulnerability Description ============================ During the security analysis, ThunderScan discovered SQL injection and Local file inclusion vulnerabilities in Booking Calendar WordPress plugin. The easiest way to reproduce the SQL injection vulnerabilities is to send the specified parameter to the provided URL while being logged in as administrator or another user that is authorized to access the plugin settings page. Users that do not have full administrative privileges could abuse the database access the vulnerabilities provide to either escalate their privileges or obtain and modify database contents they were not supposed to be able to. By requesting a specially crafted URL, the attacker can cause remote server to execute a php file of his choosing. Although the user requesting the URL has to be logged into the WordPress administrative console, the attacker can cause the administrator to request such a URL by using various social engineering/phishing approaches. Specified file will be interpreted by php interpreter, and any valid php code will indeed be executed. If the php installation on server has "allow_url_include=1" configuration option set, this attack can be expanded to execute a php file from any remote URL. If the php version is less than 5.3.4, the ".php" that gets appended to the end of the file name attacker chose can be omitted by adding a null character ("%00") to the requested URL, and enable the attacker to execute any file, regardless of the extension. Due to the CSRF token needed to perform the attack the risk is lowered to medium. 3.1. SQL injection   Function: $wpdb->query()   Variable: $_POST[ "booking_id" ];   Vulnerable URL: /wp-admin/admin-ajax.php   File: booking\lib\wpbc-ajax.php        

Source: Gmail -> IFTTT-> Blogger

Re: [FD] CVE-2017-15944: Palo Alto Networks firewalls remote root code execution

We've developed a script that verify the first bug of CVE-2017-xxxxx to verify if the device is vulnerable or not. The script creates the fake custom cookie and then verify it. If the cookie exists the device is vulnerable. We've extracted more than 6000 Palo Alto Networks Firewall devices from shodan and then we verify it. 25% of the analyzed devices are vulnerable.

Source: Gmail -> IFTTT-> Blogger

[FD] DefenseCode ThunderScan SAST Advisory: WordPress Clean Up Optimizer Plugin Security Vulnerability

DefenseCode ThunderScan SAST Advisory: WordPress Clean Up Optimizer                 Plugin Security Vulnerability Advisory ID:    DC-2017-12-004 Advisory Title: WordPress Clean Up Optimizer Plugin Security Vulnerability Advisory URL:   http://ift.tt/2rhPqdW Software:       WordPress Clean Up Optimizer plugin Language:       PHP Version:        4.0.0 and below Vendor Status:  Vendor contacted, update released Release Date:   2017/12/13 Risk:           High 1. General Overview =================== During the security audit of Clean Up Optimizer plugin for WordPress CMS, security vulnerability was discovered using DefenseCode ThunderScan application source code security analysis platform. More information about ThunderScan is available at URL: http://ift.tt/Vn2J4r 2. Software Overview ==================== According to the plugin developers, Clean Up Optimizer is an optimizes your WordPress as well as clean up the obsolete data from database. You can schedule the process of Cleaning, Optimizing, Deleting and Repairing the database tables without going to phpMyAdmin. Homepage: http://ift.tt/1xkuON2 http://ift.tt/2CURT0h According to wordpress.org, it has more than 7,000 active installs. 3. Vulnerability Description ============================ During the security analysis, ThunderScan discovered SQL injection vulnerability in Clean Up Optimizer WordPress plugin. The easiest way to reproduce the vulnerability is to visit the provided URL while being logged in as administrator or another user that is authorized to access the plugin settings page. Users that do not have full administrative privileges could abuse the database access the vulnerability provides to either escalate their privileges or obtain and modify database contents they were not supposed to be able to. Due to the missing nonce token, the vulnerable code is also directly exposed to attack vectors such as Cross Site request forgery (CSRF). 3.1 SQL injection   Function: $wpdb->get_results   Variable: $_REQUEST["table_name"]   Sample URL: http://ift.tt/2kIa3dm WHERE 123=123 AND 456=456-- DCDC   File: wp-clean-up-optimizer\includes\queries.php        

Source: Gmail -> IFTTT-> Blogger

[FD] DefenseCode ThunderScan SAST Advisory: WordPress Top-10 Plugin SQL Injection Security Vulnerability

DefenseCode ThunderScan SAST Advisory: WordPress Top-10 Plugin            SQL Injection Security Vulnerability Advisory ID:    DC-2017-12-003 Advisory Title: WordPress Top-10 Plugin SQL Injection Security Vulnerability Advisory URL:   http://ift.tt/2rhPqdW Software:       WordPress Top-10 plugin Language:       PHP Version:        2.4.2 and below Vendor Status:  Vendor contacted, update released Release Date:   2017/12/13 Risk:           High 1. General Overview =================== During the security audit of Top-10 plugin for WordPress CMS, security vulnerability was discovered using DefenseCode ThunderScan application source code security analysis platform. More information about ThunderScan is available at URL: http://ift.tt/Vn2J4r 2. Software Overview ==================== According to the plugin developers, Top-10 WordPress plugin can count daily and total visits per post and display the most popular posts based on the number of views. According to wordpress.org, it has more than 30,000 active installs. Homepage: http://ift.tt/2CXzIHn http://ift.tt/2kJug2C 3. Vulnerability Description ============================ During the security analysis, ThunderScan discovered SQL injection vulnerability in Top-10 WordPress plugin. The easiest way to reproduce the vulnerability is to visit the provided URL while being logged in as administrator or another user that is authorized to access the plugin settings page. Users that do not have full administrative privileges could abuse the database access the vulnerability provides to either escalate their privileges or obtain and modify database contents they were not supposed to be able to. 3.1 SQL injection   Vulnerable Function:  $wpdb->get_results( $sql, 'ARRAY_A' )   Vulnerable Variable:  $_REQUEST['orderby']   File:                 Top-10\admin\class-stats.php  

Source: Gmail -> IFTTT-> Blogger

[FD] [CVE-2017-17704] Broken Cryptography in iStar Ultra & IP ACM by Software House

Introduction

Source: Gmail -> IFTTT-> Blogger

[FD] CVE-2017-6094 - Genexis GAPS Access Control Vulnerability

[FD] [CFP] Security BSides Ljubljana 0x7E2

-=[ BSidesLjubljana Event info ]=-=-=-=-=-=-=-=-=-=-=-=-=-=-  BSidesLjubljana - http://ift.tt/2iBV95A Date: March 10th, 2018 Venue: Poligon creative centre, Ljubljana, Slovenia, Europe   CFP URL: http://ift.tt/1POqmhI CFP Submit form: http://ift.tt/2kMJsvX Email: cfp[at]bsidesljubljana[dot]si Twitter: @BSidesLjubljana Twitter hashtag: #BSidesLjubljana -=[ CALL FOR PAPERS ]=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- We are looking for speakers, sponsors and everyone in between! Topics of interest include (but are in no way limited to) the  following, preference given to talks that actually provide solutions as well as insight to problems:  [*] Information technology  [*] Network security  [*] Web Application security  [*] Mobile security  [*] Car/Vehicles hacking  [*] IoT (internet of things) security  [*] Virtualization and cloud computing  [*] Innovative attack / defense strategies  [*] Forensics  [*] Malware analysis and new trends in malicious codes  [*] Embedded device security / Internet of things  [*] Biometrics  [*] Hardware hacking  [*] Phone phreaking  [*] Penetration testing and security assessment  [*] Biohacking  [*] Privacy issues: LPM, LOPPSI, HADOPI, – Industrial       espionage, cyberwar  [*] Open source software  [*] Evolutionary computing  [*] Robotics (bonus points for bringing an actual robot)  [*] Massive abuse of technology  [*] Social engineering (If it is not on the list but want to submit anyway, please do so and we’ll be glad to consider it!) Please submit entries via:  http://ift.tt/2kMJsvX -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-   We are planning several participation formats. The terms and  conditions are described below: #1. 40 minutes talk The speaker is granted 40 minutes to present his/her  paper and 15 minutes to answer questions in one of the  two halls where the event will be held.  #2. Lightning talks The speaker is granted 10 minutes to present his/her  paper and 5 minutes to answer questions in a separate hall. (For this type of format you register talk at event) #3. Workshop The speaker prepares his/her presentation and any  training materials he/she needs. He/she is granted 2  or more hours to conduct the master class in  a separate hall/room.   Please submit your talk/workshop  proposals via http://ift.tt/2kMJsvX We do not accept marketing and non-technical commercial  papers! The accepted language is English. We can’t wait to see your ideas! -=[ TIMELINE ]=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=  [*] 2017 December 1st: CFP Open  [*] 2018 February 10th: CFP Deadline  [*] 2018 February 14th: Acceptance Notification  [*] 2018 March    10th: \o/ BSides Ljubljana 0x7E2 \o/     -=[ Are you interested in sponsoring us? ]=-=-=-=-=-=-=-=-=-= BSides Ljubljana is a non-profit community driven event, and  relies on the kind sponsorship of people and companies like  you to succeed. If you want to support the initiative and  gain visibility by sponsoring, please contact us by  writing an e-mail to 'sponsorship [at] bsidesljubljana.si'. More at http://ift.tt/2kn5HZN If you have any questions, please certainly feel free   to contact me directly.   Thanks!   [1] http://ift.tt/2iHeMMR [2] http://ift.tt/1n8KilZ [3] http://ift.tt/1POqmhI [4] http://ift.tt/2kMJsvX

Source: Gmail -> IFTTT-> Blogger

LINK BACK PARTICIPANTS TO ATTRIBUTES IN Anonymous SURVEY

Hi, I made a mistake and some how started an anonymous survey- a survey that linkage between the data to the attributes is a MUST. Is there any way to link...

from Google Alert - anonymous http://ift.tt/2yYno6r
via IFTTT

Why Do People Give Anonymous Donations?

Matt Brickman thinks it's so they can feel superior to others. Esme Murphy disagrees (2:39). WCCO Mid-Morning – Dec. 19, 2017.

from Google Alert - anonymous http://ift.tt/2BdrwWa
via IFTTT

CHRISTEENE & Peaches on cruising, anonymous sex and new video Aktion Toilet

Premiered exclusively here on Dazed, the ethereal clip pays homage to the lost days of cruising and anonymous sex through depictions of “sacred cults of mystics and pervs.” It's a formidable follow-up to last year's incredible, NSFW 'Butt Muscle' and a tantalising glimpse at CHRISTEENE's long-awaited ...

from Google Alert - anonymous http://ift.tt/2yY9e5q
via IFTTT

↔ Ravens remain No. 12 in Week 16 NFL Power Rankings (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 12/18/2017

Lighting Effects: Upon wakeup, the 52S subject provided a daily sleep log entry to track his sleep patterns and wakefulness. This entry supports a two week long sleep shift session that began GMT 340 and ends tomorrow. The Lighting Effects investigation studies the impact of the change from fluorescent light bulbs to solid-state light-emitting diodes … Continue reading "ISS Daily Summary Report – 12/18/2017"

from ISS On-Orbit Status Report http://ift.tt/2CEtrPY
via IFTTT

Anonymous Mrs. Claus continues wonderful tradition, with dresses for Paint Creek students

When the anonymous Mrs. Claus first approached Kara Hill more than a dozen years ago, she was overwhelmed. A community member asked if she and her sister could donate dresses to a few students at Paint Creek Elementary. Hill, the school's Family Services Coordinator, quickly said yes.

from Google Alert - anonymous http://ift.tt/2AZr4Xq
via IFTTT

Best of Nappoholics Anonymous 2017

Tony Nappo, of Nappoholics Anonymous fame, is taking a holiday break after another year of top-notch thoughts. We've rounded up some of the wittiest and most thoughtful ones to revisit over the break. 1. Either it was really really fucking cold last week or someone surgically replaced my penis with a ...

from Google Alert - anonymous http://ift.tt/2Byvupk
via IFTTT

Anonymous doser

Anonymous doser. 3. Learn how to unblock them in just a few steps. Й™ s. Hello guys hope you like the Anonymous Doser ==link== http://www. Й™m. EXE download at www. توجه کنید این برنامه Anonymous Doser البرنامج الثالث Anonymous DoSer برنامج قوي جدا لضرب المواقع وحجبها وايضا من تصميم ...

from Google Alert - anonymous http://ift.tt/2D0Jd8K
via IFTTT

Anonymous Minnesota donor puts $200000 check into Salvation Army kett

An anonymous donor provided a big boost for Salvation Army fundraising efforts in Minnesota, KS...

from Google Alert - anonymous http://ift.tt/2CDiu0U
via IFTTT

wsg/ - attractive girls general

Anonymous 12/19/17(Tue)00:09:18 No.2023266. File: 1513655058026.webm (3 MB, 1200x800). 3 MB WEBM. Anonymous 12/19/17(Tue)00:09:18 No.2023266. attractive girls general. >> Anonymous 12/19/17(Tue)00:10:02 No.2023267. Anonymous 12/19/17(Tue)00:10:02 No.2023267.

from Google Alert - anonymous http://ift.tt/2BxnDsb
via IFTTT

This New Android Malware Can Physically Damage Your Phone

Due to the recent surge in cryptocurrency prices, not only hackers but also legitimate website administrators are increasingly using JavaScript-based cryptocurrency miners to monetize by levying the CPU power of your PC to mine Bitcoin or other cryptocurrencies. Just last week, researchers from AdGuard discovered that some popular video streaming and ripper sites including openload,


from The Hacker News http://ift.tt/2oKaRE1
via IFTTT

Kaspersky Lab Sues U.S. Government Over Software Ban

Moscow-based cyber security firm Kaspersky Lab has taken the United States government to a U.S. federal court for its decision to ban the use of Kaspersky products in federal agencies and departments. In September 2017, the United States Department of Homeland Security (DHS) issued a Binding Operational Directive (BOD) ordering civilian government agencies to remove Kaspersky Lab software


from The Hacker News http://ift.tt/2BcSRYD
via IFTTT

Jupiter Quasi-Quadrennial Oscillation

When scientists look at Jupiter's upper atmosphere in infrared light, they see the region above the equator heating and cooling over a roughly four-year cycle. They dub this Jovian climate pattern the "quasi-quadrennial oscillation," or QQO, and it has a little sibling on Earth - a two-year temperature cycle accompanied by a reversal of the equatorial jet stream. Earth's cycle can influence the transport of aerosols and ozone and can affect the formation of hurricanes, making it an active area of climate research. Now, scientists at NASA's Goddard Space Flight Center have developed a new model for understanding Jupiter's QQO , which could lead to a refined understanding of Earth's own climate.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2D0y2gu
via IFTTT

Moon Phase and Libration, 2018

Dial-A-Moon Month: Day: UT Hour: init_user_date(); show_moon_image(); show_moon_info(); Click on the image to download a high-resolution version with labels for craters near the terminator. The animation archived on this page shows the geocentric phase, libration, position angle of the axis, and apparent diameter of the Moon throughout the year 2018, at hourly intervals. Until the end of 2018, the initial Dial-A-Moon image will be the frame from this animation for the current hour. More in this series: North 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 South 2018 | 2017 | 2016 | 2015 | 2014 | 2013 Lunar Reconnaissance Orbiter ( LRO ) has been in orbit around the Moon since the summer of 2009. Its laser altimeter ( LOLA ) and camera ( LROC ) are recording the rugged, airless lunar terrain in exceptional detail, making it possible to visualize the Moon with unprecedented fidelity. This is especially evident in the long shadows cast near the terminator, or day-night line. The pummeled, craggy landscape thrown into high relief at the terminator would be impossible to recreate in the computer without global terrain maps like those from LRO. The Moon always keeps the same face to us, but not exactly the same face. Because of the tilt and shape of its orbit, we see the Moon from slightly different angles over the course of a month. When a month is compressed into 24 seconds, as it is in this animation, our changing view of the Moon makes it look like it's wobbling. This wobble is called libration . The word comes from the Latin for "balance scale" (as does the name of the zodiac constellation Libra) and refers to the way such a scale tips up and down on alternating sides. The sub-Earth point gives the amount of libration in longitude and latitude. The sub-Earth point is also the apparent center of the Moon's disk and the location on the Moon where the Earth is directly overhead. The Moon is subject to other motions as well. It appears to roll back and forth around the sub-Earth point. The roll angle is given by the position angle of the axis, which is the angle of the Moon's north pole relative to celestial north. The Moon also approaches and recedes from us, appearing to grow and shrink. The two extremes, called perigee (near) and apogee (far), differ by about 14. The most noticed monthly variation in the Moon's appearance is the cycle of phases , caused by the changing angle of the Sun as the Moon orbits the Earth. The cycle begins with the waxing (growing) crescent Moon visible in the west just after sunset. By first quarter, the Moon is high in the sky at sunset and sets around midnight. The full Moon rises at sunset and is high in the sky at midnight. The third quarter Moon is often surprisingly conspicuous in the daylit western sky long after sunrise. Celestial north is up in these images, corresponding to the view from the northern hemisphere. The descriptions of the print resolution stills also assume a northern hemisphere orientation. (There is also a south-up version of this page .) The Moon's Orbit From this birdseye view, it's somewhat easier to see that the phases of the Moon are an effect of the changing angles of the sun, Moon and Earth. The Moon is full when its orbit places it in the middle of the night side of the Earth. First and Third Quarter Moon occur when the Moon is along the day-night line on the Earth. The First Point of Aries is at the 3 o'clock position in the image. The sun is in this direction at the March equinox. You can check this by freezing the animation at the 1:03 mark, or by freezing the full animation with the time stamp near March 20 at 10:00 UTC. This direction serves as the zero point for both ecliptic longitude and right ascension. The north pole of the Earth is tilted 23.5 degrees toward the 12 o'clock position at the top of the image. The tilt of the Earth is important for understanding why the north pole of the Moon seems to swing back and forth. In the full animation, watch both the orbit and the "gyroscope" Moon in the lower left. The widest swings happen when the Moon is at the 3 o'clock and 9 o'clock positions. When the Moon is at the 3 o'clock position, the ground we're standing on is tilted to the left when we look at the Moon. At the 9 o'clock position, it's tilted to the right. The tilt itself doesn't change. We're just turned around, looking in the opposite direction. The subsolar and sub-Earth points are the locations on the Moon's surface where the sun or the Earth are directly overhead, at the zenith. A line pointing straight up at one of these points will be pointing toward the sun or the Earth. The sub-Earth point is also the apparent center of the Moon's disk as observed from the Earth. In the animation, the blue dot is the sub-Earth point, and the yellow dot is the subsolar point. The lunar latitude and longitude of the sub-Earth point is a measure of the Moon's libration. For example, when the blue dot moves to the left of the meridian (the line at 0 degrees longitude), an extra bit of the Moon's western limb is rotating into view, and when it moves above the equator, a bit of the far side beyond the north pole becomes visible. At any given time, half of the Moon is in sunlight, and the subsolar point is in the center of the lit half. Full Moon occurs when the subsolar point is near the center of the Moon's disk. When the subsolar point is somewhere on the far side of the Moon, observers on Earth see a crescent phase. The Moon's orbit around the Earth isn't a perfect circle. The orbit is slightly elliptical, and because of that, the Moon's distance from the Earth varies between 28 and 32 Earth diameters, or about 356,400 and 406,700 kilometers. In each orbit, the smallest distance is called perigee, from Greek words meaning "near earth," while the greatest distance is called apogee. The Moon looks largest at perigee because that's when it's closest to us. The animation follows the imaginary line connecting the Earth and the Moon as it sweeps around the Moon's orbit. From this vantage point, it's easy to see the variation in the Moon's distance. Both the distance and the sizes of the Earth and Moon are to scale in this view. In the HD-resolution frames, the Earth is 50 pixels wide, the Moon is 14 pixels wide, and the distance between them is about 1500 pixels, on average. Note too that the Earth appears to go through phases just like the Moon does. For someone standing on the surface of the Moon, the sun and the stars rise and set, but the Earth doesn't move in the sky. It goes through a monthly sequence of phases as the sun angle changes. The phases are the opposite of the Moon's. During New Moon here, the Earth is full as viewed from the Moon.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2AXwLW0
via IFTTT

Moon Phase and Libration, 2018 South Up

Dial-A-Moon Month: Day: UT Hour: init_user_date(); show_moon_image(); show_moon_info(); Click on the image to download a high-resolution version with labels for craters near the terminator. The animation archived on this page shows the geocentric phase, libration, position angle of the axis, and apparent diameter of the Moon throughout the year 2018, at hourly intervals. Until the end of 2018, the initial Dial-A-Moon image will be the frame from this animation for the current hour. More in this series: North 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 South 2017 | 2016 | 2015 | 2014 | 2013 Lunar Reconnaissance Orbiter ( LRO ) has been in orbit around the Moon since the summer of 2009. Its laser altimeter ( LOLA ) and camera ( LROC ) are recording the rugged, airless lunar terrain in exceptional detail, making it possible to visualize the Moon with unprecedented fidelity. This is especially evident in the long shadows cast near the terminator, or day-night line. The pummeled, craggy landscape thrown into high relief at the terminator would be impossible to recreate in the computer without global terrain maps like those from LRO. The Moon always keeps the same face to us, but not exactly the same face. Because of the tilt and shape of its orbit, we see the Moon from slightly different angles over the course of a month. When a month is compressed into 24 seconds, as it is in this animation, our changing view of the Moon makes it look like it's wobbling. This wobble is called libration . The word comes from the Latin for "balance scale" (as does the name of the zodiac constellation Libra) and refers to the way such a scale tips up and down on alternating sides. The sub-Earth point gives the amount of libration in longitude and latitude. The sub-Earth point is also the apparent center of the Moon's disk and the location on the Moon where the Earth is directly overhead. The Moon is subject to other motions as well. It appears to roll back and forth around the sub-Earth point. The roll angle is given by the position angle of the axis, which is the angle of the Moon's north pole relative to celestial north. The Moon also approaches and recedes from us, appearing to grow and shrink. The two extremes, called perigee (near) and apogee (far), differ by more than 10. The most noticed monthly variation in the Moon's appearance is the cycle of phases , caused by the changing angle of the Sun as the Moon orbits the Earth. The cycle begins with the waxing (growing) crescent Moon visible in the west just after sunset. By first quarter, the Moon is high in the sky at sunset and sets around midnight. The full Moon rises at sunset and is high in the sky at midnight. The third quarter Moon is often surprisingly conspicuous in the daylit western sky long after sunrise. Celestial south is up in these images, corresponding to the view from the southern hemisphere. The descriptions of the print resolution stills also assume a southern hemisphere orientation. (There is also a north-up version of this page .) The Moon's Orbit From this birdseye view, it's somewhat easier to see that the phases of the Moon are an effect of the changing angles of the sun, Moon and Earth. The Moon is full when its orbit places it in the middle of the night side of the Earth. First and Third Quarter Moon occur when the Moon is along the day-night line on the Earth. The First Point of Aries is at the 3 o'clock position in the image. The sun is in this direction at the March equinox. You can check this by freezing the animation at the 1:03 mark, or by freezing the full animation with the time stamp near March 20 at 10:00 UTC. This direction serves as the zero point for both ecliptic longitude and right ascension. The south pole of the Earth is tilted 23.5 degrees toward the 12 o'clock position at the top of the image. The tilt of the Earth is important for understanding why the north pole of the Moon seems to swing back and forth. In the full animation, watch both the orbit and the "gyroscope" Moon in the lower left. The widest swings happen when the Moon is at the 3 o'clock and 9 o'clock positions. When the Moon is at the 3 o'clock position, the ground we're standing on is tilted to the left when we look at the Moon. At the 9 o'clock position, it's tilted to the right. The tilt itself doesn't change. We're just turned around, looking in the opposite direction. The subsolar and sub-Earth points are the locations on the Moon's surface where the sun or the Earth are directly overhead, at the zenith. A line pointing straight up at one of these points will be pointing toward the sun or the Earth. The sub-Earth point is also the apparent center of the Moon's disk as observed from the Earth. In the animation, the blue dot is the sub-Earth point, and the yellow dot is the subsolar point. The lunar latitude and longitude of the sub-Earth point is a measure of the Moon's libration. For example, when the blue dot moves to the left of the meridian (the line at 0 degrees longitude), an extra bit of the Moon's eastern limb is rotating into view, and when it moves above the equator, a bit of the far side beyond the south pole becomes visible. At any given time, half of the Moon is in sunlight, and the subsolar point is in the center of the lit half. Full Moon occurs when the subsolar point is near the center of the Moon's disk. When the subsolar point is somewhere on the far side of the Moon, observers on Earth see a crescent phase. The Moon's orbit around the Earth isn't a perfect circle. The orbit is slightly elliptical, and because of that, the Moon's distance from the Earth varies between 28 and 32 Earth diameters, or about 356,400 and 406,700 kilometers. In each orbit, the smallest distance is called perigee, from Greek words meaning "near earth," while the greatest distance is called apogee. The Moon looks largest at perigee because that's when it's closest to us. The animation follows the imaginary line connecting the Earth and the Moon as it sweeps around the Moon's orbit. From this vantage point, it's easy to see the variation in the Moon's distance. Both the distance and the sizes of the Earth and Moon are to scale in this view. In the HD-resolution frames, the Earth is 50 pixels wide, the Moon is 14 pixels wide, and the distance between them is about 1500 pixels, on average. Note too that the Earth appears to go through phases just like the Moon does. For someone standing on the surface of the Moon, the sun and the stars rise and set, but the Earth doesn't move in the sky. It goes through a monthly sequence of phases as the sun angle changes. The phases are the opposite of the Moon's. During New Moon here, the Earth is full as viewed from the Moon.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2CZs7Ip
via IFTTT

Monday, December 18, 2017

App for Anonymous Cart Abandonment

App for Anonymous Cart Abandonment. Hi, is anyone aware of an app for carts that are abandoned by anonymous users? I'd like to know what products users are adding to their cart, regardless of whether they are signed in or not. Thanks for your help in advance. Log in or sign up for an account to reply ...

from Google Alert - anonymous http://ift.tt/2kKB3cm
via IFTTT

BDN quotes Socolow in article on anonymous Maine 'news' websites

Michael Socolow, an associate professor of communication and journalism at the University of Maine, was quoted in the Bangor Daily News article “This anonymous Maine 'news' site may have tipped a big election.” The article states that Lewiston mayoral candidate Ben Chin may be the first Maine ...

from Google Alert - anonymous http://ift.tt/2CWmHhb
via IFTTT

I have a new follower on Twitter


Response Labs
A Digital CRM and product development company providing strategic digital services that help businesses realize their brand’s full online potential.
Baltimore | St. Paul | Seattle
http://t.co/IMM2mDNBSn
Following: 9646 - Followers: 10824

December 18, 2017 at 10:00PM via Twitter http://twitter.com/ResponseLabs

I have a new follower on Twitter


David Orren
Business Coach to ambitious Innovation & Technology companies.
Reading, London

Following: 1801 - Followers: 1846

December 18, 2017 at 09:25PM via Twitter http://twitter.com/DavidExecCoach

I have a new follower on Twitter


Rob Thompson
Sales Training ♦ Sales Consultant ♦ Sales Coaching ♦ Speaker https://t.co/MOI4sLxp7G
Houston, TX
https://t.co/btqLfmZbfj
Following: 11547 - Followers: 13127

December 18, 2017 at 08:35PM via Twitter http://twitter.com/TruCoreBD

I have a new follower on Twitter


Cassandra Frangos
Passion for innovation and #disruptiveleadership. Head of Global Executive Talent @ Cisco.
Boston MA
https://t.co/96H4x16nD0
Following: 10070 - Followers: 15975

December 18, 2017 at 07:25PM via Twitter http://twitter.com/c_frangos

I have a new follower on Twitter


Matthew VanDyke
Founder, Sons of Liberty International, #veterans providing free military training for local forces fighting #ISIS. Nonprofit 501c3 org https://t.co/wZQtkfBLOm
Washington, DC and Iraq
http://t.co/ugpMBatNLB
Following: 177865 - Followers: 201138

December 18, 2017 at 07:10PM via Twitter http://twitter.com/Matt_VanDyke

Business development sales executive in East London

View details and apply for this business development sales executive job in East London (E1) with Anonymous on CWJobs. Global FTSE 250 Market Leading Financial Services Group, is looking for a highly ambitious Cloud Sales professional to join the growing IT Sales team in London.

from Google Alert - anonymous http://ift.tt/2kK0evE
via IFTTT

Dad-of-four murdered wife and hanged himself after anonymous letter revealed she was having affair

A dad-of-four murdered his wife and hanged himself after receiving an anonymous letter which revealed she was having an affair, an inquest heard today. Richard Pitkin, 65, read the note after it was delivered through the door of the family home he shared with wife Sarah, 58. The hearing was told she ...

from Google Alert - anonymous http://ift.tt/2BwjLI2
via IFTTT

I have a new follower on Twitter


Keith Krach
Chairman & former CEO @DocuSign Previously Founder, Chairman/CEO @SAPAriba; Chairman @AngiesList; Chairman, Board of Trustees of Purdue. @SigmaChi. Entrepreneur
San Francisco, California
https://t.co/cDbz8y5FsQ
Following: 28514 - Followers: 50979

December 18, 2017 at 01:25PM via Twitter http://twitter.com/KeithJKrach

Keras and deep learning on the Raspberry Pi

Building a Not Santa Detector using deep learning, Keras, Python, and the Raspberry Pi

Today’s blog post is the most fun I’ve EVER had writing a PyImageSearch tutorial.

It has everything we have been discussing the past few weeks, including:

  • Deep learning
  • Raspberry Pis
  • 3D Christmas trees
  • References to HBO’s Silicon Valley “Not Hotdog” detector
  • Me dressing up as Santa Clause!

In keeping with the Christmas and Holiday season, I’ll be demonstrating how to take a deep learning model (trained with Keras) and then deploy it to the Raspberry Pi.

But this isn’t any machine learning model…

This image classifier has been specifically trained to detect if Santa Claus is in our video stream.

And if we do detect Santa Claus…

Well. I won’t spoil the surprise (but it does involve a 3D Christmas tree and a jolly tune).

Enjoy the tutorial. Download the code. Hack with it.

And most of all, have fun!

Looking for the source code to this post?
Jump right to the downloads section.

Keras and deep learning on the Raspberry Pi

Today’s blog post is a complete guide to running a deep neural network on the Raspberry Pi using Keras.

I’ve framed this project as a Not Santa detector to give you a practical implementation (and have some fun along the way).

In the first part of this blog post, we’ll discuss what a Not Santa detector is (just in case you’re unfamiliar with HBO’s Silicon Valley “Not Hotdog” detector which has developed a cult following).

We’ll then configure our Raspberry Pi for deep learning by installing TensorFlow, Keras, and a number of other prerequisites.

Once our Raspberry Pi is configured for deep learning we’ll move on to building a Python script that can:

  1. Load our Keras model from disk
  2. Access our Raspberry Pi camera module/USB webcam
  3. Apply deep learning to detect if Santa Clause is in the frame
  4. Access our GPIO pins and play music if Santa is detected

These are my favorite types of blog posts to write here on PyImageSearch as they integrate a bunch of techniques we’ve discussed, including:

Let’s get started!

What is a Not Santa detector?

Figure 1: The Not Hotdog detector app from HBO’s Silicon Valley.

A Not Santa detector is a play off HBO’s Silicon Valley where the characters create a smartphone app that can determine if an input photo is a “hot dog” or is “not a hot dog”:

The show is clearly poking fun at the Silicon Valley startup culture in the United States by:

  1. Preying on the hype of machine learning/deep learning
  2. Satirically remaking on the abundance of smartphone applications that serve little purpose (but the creators are convinced their app will “change the world”)

I decided to have some fun myself.

Today we are creating a Not Santa detector that will detect if Santa Claus is in an image/video frame.

For those unfamiliar with Santa Claus (or simply Santa” for short), he is a jolly, portly, white-bearded, fictional western culture figure who delivers presents to boys and girls while they sleep Christmas Eve

However, this application is not totally just for fun and satire!

We’ll be learning some practical skills along the way, including how to:

  1. Configure your Raspberry Pi for deep learning
  2. Install Keras and TensorFlow on your Raspberry Pi
  3. Deploy a pre-trained Convolutional Neural Network (with Keras) to your Raspberry Pi
  4. Perform a given action once a positive detection has occurred

But before we can write a line of code, let’s first review the hardware we need.

What hardware do I need?

Figure 2: The Not Santa detector setup includes the Raspberry Pi 3, speakers, 3D Christmas tree, and a webcam (not pictured). The Pi has LeNet implemented with Keras in a Python script in order to detect Santa.

In order to follow along exactly with this tutorial (with no modifications) you’ll need:

Of course, you do not need all these parts.

If you have just a Raspberry Pi + camera module/USB camera you’ll be all set (but you will have to modify the code so it doesn’t try to access the GPIO pins or play music via the speakers).

Your setup should look similar to mine in Figure 2 above where I have connected my speakers, 3D Christmas Tree, and webcam (not pictured as it’s off camera).

I would also recommend hooking up an HDMI monitor + keyboard to test your scripts and debug them:

Figure 3: My deep learning setup includes the Raspberry Pi and components along with a keyboard, mouse, and small HDMI display. With this setup, we will surely catch Santa delivering presents in front of my tree.

In the image above, you can see my Raspberry Pi, HDMI, keyboard, and Christmas critter friends keeping me company while I put together today’s tutorial.

How do I install TensorFlow and Keras on the Raspberry Pi?

Figure 4: We’re going to use Keras with the TensorFlow backend on the Raspberry Pi to implement a deep learning Not Santa detector.

Last week, we learned how to train a Convolutional Neural Network using Keras to determine if Santa was in an input image.

Today, we are going to take the pre-trained model and deploy it to the Raspberry Pi.

As I’ve mentioned before, the Raspberry Pi is not suitable for training a neural network (outside of “toy” examples). However, the Raspberry Pi can be used to deploy a neural network once it has already been trained (provided the model can fit into a small enough memory footprint, of course).

I’m going to assume you have already installed OpenCV on your Raspberry Pi.

If you have not installed OpenCV on your Raspberry Pi, start by using this tutorial where I demonstrate how to optimize your Raspberry Pi + OpenCV install for speed (leading to a 30%+ increase in performance).

Note: This guide will not work with Python 3 — you’ll instead need to use Python 2.7. I’ll explain why later in this section. Take the time now to configure your Raspberry Pi with Python 2.7 and OpenCV bindings. In Step #4 of the Raspberry Pi + OpenCV installation guide, be sure to make a virtual environment with the

-p python2
  switch.

From there, I recommend increasing the swap space on your Pi. Increasing the swap will enable you to use the Raspberry Pi SD card for additional memory (a critical step when trying to compile and install large libraries on the memory-limited Raspberry Pi).

To increase your swap space, open up

/etc/dphys-swapfile
  and then edit the
CONF_SWAPSIZE
  variable:
# set size to absolute value, leaving empty (default) then uses computed value
#   you most likely don't want this, unless you have a special disk situation
# CONF_SWAPSIZE=100
CONF_SWAPSIZE=1024

Notice that I am increasing the swap from 100MB to 1024MB.

From there, restart the swap service:

$ sudo /etc/init.d/dphys-swapfile stop
$ sudo /etc/init.d/dphys-swapfile start

Note: Increasing swap size is a great way to burn out your memory card, so be sure to revert this change and restart the swap service when you’re done. You can read more about large sizes corrupting memory cards here.

Now that your swap size has been increased, let’s get started configuring our development environment.

To start, create a Python virtual environment named

not_santa
  using Python 2.7 (I’ll explain why Python 2.7 once we get to the TensorFlow install command):
$ mkvirtualenv not_santa -p python2

Notice here how the

-p
  switch points to
python2
 , indicating that Python 2.7 will be used for the virtual environment.

If you are new to Python virtual environments, how they work, and why we use them, please refer to this guide to help get you up to speed as well as this excellent virtualenv primer from RealPython.

You’ll also want to make sure you have sym-linked your

cv2.so
  bindings into your
not_santa
  virtual environment (if you have not done so yet):
$ cd ~/.virtualenvs/not_santa/lib/python2.7/site-packages
$ ln -s /usr/local/lib/python2.7/site-packages/cv2.so cv2.so

Again, make sure you have compiled OpenCV with Python 2.7 bindings. You’ll want to double-check your path to your

cv2.so
  file as well, just in case your install path is slightly different than mine.

If you compiled Python 3 + OpenCV bindings, created the sym-link, and then tried to

import cv2
  into your Python shell, you will get a confusing traceback saying that the import failed.

Important: For these next few pip commands, be sure that you’re in the

not_santa
  environment (or your Python environment of choice), otherwise you’ll be installing the packages to your Raspberry Pi’s system Python.

To enter the environment simply use the

workon
  command at the bash prompt:
$ workon not_santa

From there, you’ll see “

(not_santa)
” at the beginning of your bash prompt.

Ensure you have NumPy installed in the

not_santa
  environment using the following command:
$ pip install numpy

Since we’ll be accessing the GPIO pins for this project we’ll need to install both RPi.GPIO and gpiozero:

$ sudo pip install RPi.GPIO gpiozero

We are now ready to install TensorFlow on your Raspberry Pi.

The problem is that there is not an official (Google released) TensorFlow distribution.

We can follow the long, arduous, painful process of compiling TensorFlow from scratch on the Raspberry Pi…

Or we can use the pre-compiled binaries created Sam Abrahams (published on GitHub).

The problem is that there are only two types of pre-compiled TensorFlow binaries:

  1. One for Python 2.7
  2. And another for Python 3.4

The Raspbian Stretch distribution (the latest release of the Raspbian operating system at the time of this writing) ships with Python 3.5 — we, therefore, have a version mismatch.

To avoid any headaches between Python 3.4 and Python 3.5, I decided to stick with the Python 2.7 install.

While I would have liked to use Python 3 for this guide, the install process would have become more complicated (I could easily write multiple posts on installing TensorFlow + Keras on the Raspberry Pi, but since installation is not the main focus of this tutorial, I decided to keep it more straightforward).

Let’s go ahead and install TensorFlow for Python 2.7 using the following commands:

$ wget http://ift.tt/2rDmlFT
$ pip install tensorflow-1.1.0-cp27-none-linux_armv7l.whl

Note: You will need to expand the code block above to copy the full URL. I recommend pressing the “<>” button before you copy the commands.

Once TensorFlow compiles and installs (which took around an hour on my Raspberry Pi) you’ll need to install HDF5 and h5py. These libraries will allow us to load our pre-trained model from disk:

$ sudo apt-get install libhdf5-serial-dev
$ pip install h5py

I Install HDF5 + h5py without the

time
  command running so I can’t remember the exact amount of time it took to install, but I believe it was around 30-45 minutes.

And finally, let’s install Keras and the other prerequisites required for this project:

$ pip install pillow imutils
$ pip install scipy --no-cache-dir
$ pip install keras

The SciPy install in particular will take a few hours so make sure you let the install run overnight/while you’re at work.

To test your configuration, open up a Python shell (while in the

not_santa
  environment) and execute the following commands:
$ workon not_santa
$ python
>>> import h5py
>>> from gpiozero import LEDBoard
>>> from gpiozero.tools import random_values
>>> import cv2
>>> import imutils
>>> import keras
Using TesnsorFlow backend.
>>> print("OpenCV version: {}".format(cv2.__version__))
'3.3.1'
>>> print("Keras version: {}".format(keras.__version__))
'2.0.8'
>>> exit()

If all goes as planned you should see Keras imported using the TensorFlow backend.

As the output above demonstrates, you should also double-check that your OpenCV bindings (

cv2
 ) can be imported as well.

Finally, don’t forget to reduce your swap size from 1024MB back down to 100MB by:

  1. Opening up
    /etc/dphys-swapfile
    
     .
  2. Resetting
    CONF_SWAPSIZE
    
      to 100MB.
  3. Restarting the swap service (as we discussed earlier in this post).

As mentioned in the note above, setting your swap size back to 100MB is important for memory card longevity. If you skip this step, you may encounter memory corruption issues and a decreased lifespan of the card.

Running a Keras + deep learning model on the Raspberry Pi

Figure 5: Running a deep learning model on the Raspberry Pi using Keras and Python.

We are now ready to code our Not Santa detector using Keras, TensorFlow, and the Raspberry Pi.

Again, I’ll be assuming you have the same hardware setup as I do (i.e., 3D Christmas Tree and speakers) so if your setup is different you’ll need to hack up the code below.

To get started, open a new file, name it

not_santa_detector.py
 , and insert the following code:
# import the necessary packages
from keras.preprocessing.image import img_to_array
from keras.models import load_model
from gpiozero import LEDBoard
from gpiozero.tools import random_values
from imutils.video import VideoStream
from threading import Thread
import numpy as np
import imutils
import time
import cv2
import os

Lines 2-12 handle our imports, notably:

  • keras
    
      is used to preprocess input frames for classification and to load our pre-trained model from disk.
  • gpiozero
    
      is used to access the 3D Christmas tree.
  • imutils
    
      is used to access the video stream (whether Raspberry Pi camera module or USB).
  • threading
    
      is used for non-blocking operations, in particular when we want to light the Christmas tree or play music while not blocking execution of the main thread.

From there, we’ll define a function to light our 3D Christmas tree:

def light_tree(tree, sleep=5):
        # loop over all LEDs in the tree and randomly blink them with
        # varying intensities
        for led in tree:
                led.source_delay = 0.1
                led.source = random_values()

        # sleep for a bit to let the tree show its Christmas spirit for
        # santa clause
        time.sleep(sleep)

        # loop voer the LEDs again, this time turning them off
        for led in tree:
                led.source = None
                led.value = 0

Our

light_tree
  function accepts a
tree
  argument (which is assumed be an
LEDBoard
  object).

First, we loop over all LEDs in the

tree
  and randomly light each of the LEDs to create a “twinkling” effect (Lines 17-19).

We leave the lights on for a period of time for some holiday spirit (Line 23) and then we loop over the LEDs again, this time turning them off (Lines 26-28).

An example of the 3D Christmas tree lights turned on can be seen below:

Figure 6: The 3D Christmas tree for the Raspberry Pi. You can get yours from Pi Hut (photo credit: Pi Hut).

Our next function handles playing music when Santa is detected:

def play_christmas_music(p):
        # construct the command to play the music, then execute the
        # command
        command = "aplay -q {}".format(p)
        os.system(command)

In the

play_christmas_music
  function, we make a system call to the
aplay
  command which enables us to play a music file as we would from the command line.

Using the

os.system
  call is a bit of a hack, but playing the audio file via pure Python (using a library such as Pygame) is overkill for this project.

From there, let’s hardcode the configurations we’ll use:

# define the paths to the Not Santa Keras deep learning model and
# audio file
MODEL_PATH = "santa_not_santa.model"
AUDIO_PATH = "jolly_laugh.wav"

# initialize the total number of frames that *consecutively* contain
# santa along with threshold required to trigger the santa alarm
TOTAL_CONSEC = 0
TOTAL_THRESH = 20

# initialize is the santa alarm has been triggered
SANTA = False

Lines 38 and 39 hardcode paths to our pre-trained Keras model and audio file. Be sure to use the “Downloads” section of this blog post to grab the files.

We also initialize parameters used for detection which include

TOTAL_CONSEC
  and
TOTAL_THRESH
 . These two values represent the number of frames containing Santa and the threshold at which we’ll both play music and turn on the tree respectively (Lines 43 and 44).

The last initialization is

SANTA = False
 , a boolean (Line 47). We’ll use the
SANTA
  variable later in the script as a status flag to aid in our logic.

Next, we’ll load our pre-trained Keras model and initialize our Christmas tree:

# load the model
print("[INFO] loading model...")
model = load_model(MODEL_PATH)

# initialize the christmas tree
tree = LEDBoard(*range(2, 28), pwm=True)

Keras allows us to save models to disk for future use. Last week, we saved our Not Santa model to disk and this week we’re going to load it up on our Raspberry Pi. We load the model on Line 51 with the Keras

load_model
  function.

Our

tree
  object is instantiated on Line 54. As shown,
tree
  is an
LEDBoard
  object from the
gpiozero
  package.

Now we’ll initialize our video stream:

# initialize the video stream and allow the camera sensor to warm up
print("[INFO] starting video stream...")
vs = VideoStream(src=0).start()
# vs = VideoStream(usePiCamera=True).start()
time.sleep(2.0)

To access the camera, we’ll use

VideoStream
  from my imutils package (you can find the documentation to VideoStream here) on either Line 58 or 59.

Important: If you’d like to use the PiCamera module (instead of a USB camera) for this project, simply comment Line 58 and uncomment Line 59.

We

sleep
  for a brief 2 seconds so our camera can warm up (Line 60) before we begin looping over the frames:
# loop over the frames from the video stream
while True:
        # grab the frame from the threaded video stream and resize it
        # to have a maximum width of 400 pixels
        frame = vs.read()
        frame = imutils.resize(frame, width=400)

On Line 63 we start looping over video frames until the stop condition is met (shown later in the script).

First, we’ll grab a

frame
  by calling
vs.read
  (Line 66).

Then we resize 

frame
  to
width=400
 , maintaining the aspect ratio (Line 67). We’ll be preprocessing this
frame
  prior to sending it through our neural network model. Later on we’ll be displaying the frame to the screen along with a text label.

From there let’s preprocess the image and pass it through our Keras + deep learning model for prediction:

# prepare the image to be classified by our deep learning network
        image = cv2.resize(frame, (28, 28))
        image = image.astype("float") / 255.0
        image = img_to_array(image)
        image = np.expand_dims(image, axis=0)

        # classify the input image and initialize the label and
        # probability of the prediction
        (notSanta, santa) = model.predict(image)[0]
        label = "Not Santa"
        proba = notSanta

Lines 70-73 preprocess the

image
  and prepare it for classification. To learn more about preprocessing for deep learning, be sure to check out the Starter Bundle of my latest book, Deep Learning for Computer Vision with Python.

From there, we query 

model.predict
  with our
image
  as the argument. This sends the
image
  through the neural network, returning a tuple containing class probabilities (Line 77).

We initialize the

label
  to “Not Santa” (we’ll revisit
label
  later) and the probability,
proba
 , to the value of 
notSanta
  on Lines 78 and 79.

Let’s check to see if Santa is in the image:

# check to see if santa was detected using our convolutional
        # neural network
        if santa > notSanta:
                # update the label and prediction probability
                label = "Santa"
                proba = santa

                # increment the total number of consecutive frames that
                # contain santa
                TOTAL_CONSEC += 1

On Line 83 we check if the probability of

santa
  is greater than
notSanta
 . If that is the case, we proceed to update the
label
  and
proba
  followed by incrementing
TOTAL_CONSEC
  (Lines 85-90).

Provided enough consecutive “Santa” frames have passed, we need to trigger the Santa alarm:

# check to see if we should raise the santa alarm
                if not SANTA and TOTAL_CONSEC >= TOTAL_THRESH:
                        # indicate that santa has been found
                        SANTA = True

                        # light up the christmas tree
                        treeThread = Thread(target=light_tree, args=(tree,))
                        treeThread.daemon = True
                        treeThread.start()

                        # play some christmas tunes
                        musicThread = Thread(target=play_christmas_music,
                                args=(AUDIO_PATH,))
                        musicThread.daemon = False
                        musicThread.start()

We have two actions to perform if

SANTA
  is
False
  and if the
TOTAL_CONSEC
  hits the
TOTAL_THRESH
  threshold:
  1. Create and start a
    treeThread
    
      to twinkle the Christmas tree lights (Lines 98-100).
  2. Create and start a
    musicThread
    
      to play music in the background (Lines 103-106).

These threads will run independently without stopping the forward execution of the script (i.e., a non-blocking operation).

You can also see that, on Line 95, we set our

SANTA
  status flag to
True
, implying that we have found Santa in the input frame. In the next pass of the loop, we’ll be looking at this value as we did on Line 93.

Otherwise (

SANTA
  is
True
  or the
TOTAL_THRESH
  is not met), we reset
TOTAL_CONSEC
  to zero and
SANTA
  to
False
 :
# otherwise, reset the total number of consecutive frames and the
        # santa alarm
        else:
                TOTAL_CONSEC = 0
                SANTA = False

Finally, we display the frame to our screen with the generated text label:

# build the label and draw it on the frame
        label = "{}: {:.2f}%".format(label, proba * 100)
        frame = cv2.putText(frame, label, (10, 25),
                cv2.FONT_HERSHEY_SIMPLEX, 0.7, (0, 255, 0), 2)

        # show the output frame
        cv2.imshow("Frame", frame)
        key = cv2.waitKey(1) & 0xFF
 
        # if the `q` key was pressed, break from the loop
        if key == ord("q"):
                break

# do a bit of cleanup
print("[INFO] cleaning up...")
cv2.destroyAllWindows()
vs.stop()

The probability value is appended to the

label
  containing either “Santa” or “Not Santa” (Line 115).

Then using OpenCV’s

cv2.putText
 , we can write the label (in Christmas-themed green) on the top of the frame before we display the frame to the screen (Lines 116-120).

The exit condition of our infinite while loop is when the ‘q’ key is pressed on the keyboard (Lines 121-125).

If the loop’s exit condition is met, we

break
  and perform some cleanup on Lines 129 and 130 before the script itself exits.

That’s all there is to it. Take a look back at the 130 lines we reviewed together — this framework/template can easily be used for other deep learning projects on the Raspberry Pi as well.

Now let’s catch that fat, bearded, jolly man on camera!

Deep learning + Keras + Raspberry Pi results

In last week’s blog post we tested our Not Santa deep learning model using stock images gathered from the web.

But that’s no fun — and certainly not sufficient for this blog post.

I’ve always wanted to dress up like good ole’ St. Nicholas, so I ordered a cheap Santa Claus costume last week:

Figure 7: Me, Adrian Rosebrock, dressed up as Santa. I’ll be personally testing our Not Santa detector, built using deep learning, Keras, Python, and and OpenCV.

I’m a far cry from the real Santa, but the costume should do the trick.

I then pointed my camera attached to the Raspberry Pi at the Christmas tree in my apartment:

Figure 8: My very own Christmas tree will serve as the background for testing our Not Santa detector deep learning model which has been deployed to the Raspberry Pi.

If Santa comes by to put out some presents for the good boys and girls I want to make sure he feels welcome by twinkling the 3D Christmas tree lights and playing some Christmas tunes.

I then started the Not Santa deep learning + Keras detector using the following command:

$ python not_santa_detector.py

To follow along, make sure you use “Downloads” section below to download the source code + pre-trained model + audio file used in this guide.

Once the Not Santa detector was up and running, I slipped into action:

Figure 9: Successfully detecting Santa in a video stream using deep learning, Python, Keras, and a Raspberry Pi.

Whenever Santa is detected the 3D Christmas tree lights up and music starts playing! (which you cannot hear since this is a sample GIF animation).

To see the full Not Santa detector (with sound), take a look at the video below:

Whenever Santa enters the scene you’ll see the 3D Christmas tree display turn on followed by a jolly laugh emitting from the Raspberry Pi speakers (audio credit to SoundBible).

Our deep learning model is surprisingly accurate and robust given the small network architecture.

I’ve been good this year, so I’m sure that Santa is stopping at my apartment.

I’m also more confident than I’ve ever been about seeing Santa bring some presents with my Not Santa detector.

Before Christmas, I’ll probably hack this script (with a call to

cv2.imwrite
 , or better yet, save the video clip) to make sure that I save some frames of Santa to disk, as proof. If it is someone else that puts presents under my tree, I’ll certainly know.

Dear Santa: If you’re reading this, just know that I’ve got my Pi on you!

Summary

In today’s blog post you learned how to run a Keras deep learning model on the Raspberry Pi.

To accomplish this, we first trained our Keras deep learning model to detect if an image contains “Santa” or “Not Santa” on our laptop/desktop.

We then installed TensorFlow and Keras on our Raspberry Pi, enabling us to take our trained deep learning image classifier and then deploy it to our Raspberry Pi. While the Raspberry Pi isn’t suitable for training deep neural networks, it can be used for deploying them — and provided the network architecture is simplistic enough, we can even run our models in real-time.

To demonstrate this, we created a Not Santa detector on our Raspberry Pi that classifies each individual input frame from a video stream.

If Santa is detected, we access our GPIO pins to light up a 3D Christmas tree and play holiday tunes.

What now?

I hope you had fun learning how to build a Not Santa app using deep learning!

If you want to continue studying deep learning and:

  • Master the fundamentals of machine learning and neural networks…
  • Study deep learning in more detail…
  • Train your own Convolutional Neural Networks from scratch…

…then you’ll want to take a look at my new book, Deep Learning for Computer Vision with Python.

Inside my book you’ll find:

  • Super practical walkthroughs.
  • Hands-on tutorials (with lots of code).
  • Detailed, thorough guides to help you replicate state-of-the-art results from popular deep learning publications.

To learn more about my new book (and start your journey to deep learning mastery), just click here.

Otherwise, be sure to enter your email address in the form below to be notified when new deep learning post are published here on PyImageSearch.

Downloads:

If you would like to download the code and images used in this post, please enter your email address in the form below. Not only will you get a .zip of the code, I’ll also send you a FREE 11-page Resource Guide on Computer Vision and Image Search Engines, including exclusive techniques that I don’t post on this blog! Sound good? If so, enter your email address and I’ll send you the code immediately!

The post Keras and deep learning on the Raspberry Pi appeared first on PyImageSearch.



from PyImageSearch http://ift.tt/2kHDY5p
via IFTTT