Latest YouTube Video

Saturday, January 6, 2018

'Recovery groups aren't anonymous'

Addicts and vulnerable people are being warned about joining support groups on Facebook that claim to be anonymous but aren't.

from Google Alert - anonymous http://ift.tt/2m3b5kP
via IFTTT

[FD] Wickr Inc - App Clock & Message Deletion Glitch P2 - Bug Bounty

Wickr Inc - App Clock & Message Deletion Glitch P2  - Bug Bounty (Document) [PDF] URL: http://ift.tt/2CFlA95 Vulnerability Magazine: http://ift.tt/2ETHQtz

Source: Gmail -> IFTTT-> Blogger

Addicts warned: Facebook groups are not anonymous | American Tower Corporation

Tens of thousands of addicts and vulnerable people are being warned about joining support groups on Facebook that claim to be anonymous but aren't. Dozens of recovery groups for afflictions such as gambling addiction, sex addiction, alcoholism and drug abuse describe themselves as “anonymous” ...

from Google Alert - anonymous http://ift.tt/2m6rru6
via IFTTT

Anonymous - Liebig soep - 1950s

Offered in Catawiki's Poster auction: Anonymous - Liebig soep - 1950s. Original print in very good condition.

from Google Alert - anonymous http://ift.tt/2AyDMvi
via IFTTT

Accounts Assistant

Accounts Assistant in Accounting and public practice, Accounts assistant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2COqbGp
via IFTTT

Finance Analyst

Finance Analyst in Defence and military, Finance analyst with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2AxnCT4
via IFTTT

Format Manuscript/Mixed Material

Results: 1-2 of 2 | Refined by: Original Format: Manuscript/Mixed Material Remove Look Inside: George Washington Papers, Series 4, General Correspondence: Anonymous to George Washington, October 23, 1789, Signed, Orina (mgw4.098_0965_0966/) Remove ...

from Google Alert - anonymous http://ift.tt/2CwlOvc
via IFTTT

Friday, January 5, 2018

How to join anonymous

Anonymous - Cyber-vigilantes to some, terrorists to others, Sep 03, 2017 · Anonymous – Cyber-vigilantes to some, terrorists to others, and recently described as some of the most influential people in the world. More How To Join Anonymous videos Mar 24, 2015 · Anonymous - How to join Anonymous ...

from Google Alert - anonymous http://ift.tt/2EcnhqT
via IFTTT

Ravens hire James Urban as QB coach (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous Tips

Anonymous Crime Tip Form. If you have seen a crime committed or something you are concerned about that occurred on campus and you would like to report it, please fill out the form below. The form is completely anonymous. For Crimes in Progress or Emergencies, call 202-885-3636 Immediately.

from Google Alert - anonymous http://ift.tt/2CL5OsK
via IFTTT

I have a new follower on Twitter


Matthew Lamons
CEO - https://t.co/5sAGUheIFb - AI to simplify how we set see and share life work and play. AI Evangelist, Tech & Society Futurist, SciFi Fan.

https://t.co/Dk1jI2O7HX
Following: 15413 - Followers: 15818

January 05, 2018 at 02:37PM via Twitter http://twitter.com/mlamons1

PTCMART Comic Face Mask Anonymous White Gift Set - Of 10 Pcs

Buy PTCMART Comic Face Mask Anonymous White Gift Set - Of 10 Pcs online at best price in India from ShopClues.com. Get excited offers, read PTCMART Comic Face Mask Anonymous White Gift Set - Of 10 Pcs reviews & compare prices online. Avail Fast delivery & CoD options across India.

from Google Alert - anonymous http://ift.tt/2CUsDrn
via IFTTT

[FD] ESA-2018-001: EMC Avamar Server, NetWorker Virtual Edition and Integrated Data Protection Appliance Multiple Security Vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] RCE in DuoLingo’s TinyCards App for Android [CVE-2017-16905]

[Original post here: http://ift.tt/2lZHLfc] SUMMARY The TinyCards Android application provided by DuoLingo can be injected with malicious content by an MITM attacker. Because this application is a web-app framed in an Android WebView, this can lead directly to remote code execution (RCE) within the app. The root cause is lack of SSL being used on app startup when the initial web content is loaded into the WebView. The vendor has fixed this issue in v1.0 (version code 10) that was released via Google Play Store on November 20th, 2017 and users should install the latest version. MITRE has assigned # CVE-2017-16905 to track this issue. VULNERABILITY DETAILS TinyCards is a flashcard application for preparing for tests and memorizing vocabulary. It is made by DuoLingo, which provides a platform for learning new languages. While monitoring network traffic of a test device running Android, we observed that during application startup an initial HTTP call is made to a non-HTTPS site, which then redirects to an HTTPS version. Further research into the application revealed that the application is essentially a thin browser wrapper using Android’s WebView around a web application loaded remotely. Because the initial call is done without HTTPS, it is possible for an MITM attacker to intercept this traffic and inject their own content. Since this is a web app, this can result in remote code execution within the application since all the content is web based. Screenshots of the captured traffic and relevant source code are in the blog post STEPS TO REPLICATE (ON UBUNTU 17.10) 1. Install the application on the Android device but do not start it. 2. Install dnsmasq and NGINX on the Linux host: sudo apt-get install dnsmasq nginx 3. Modify the /etc/hosts file to add the following entry to map PIA’s domain name to the Linux host: 192.168.1.x tinycards.duolingo.com 4. Configure /etc/dnsmasq.conf file to listen on the IP and restart DNSMASQ listen-address=192.168.1.x sudo /etc/init.d/dnsmasq restart 5. Add a file with malicious content (you may need to use sudo): cd /var/www/html echo powned >index.html 6. Modify the settings on the Android test phone to static, set DNS to point to “192.168.1.x”. AT THIS POINT – Android will resolve DNS against the Linux computer and serve the large servers file 7. Open the app on the Android device and observe injected content. All testing was done on v1.0 (version code 9) of the Android application using a Linux host running Ubuntu v17.10 and Android test device running Android v7. VENDOR RESPONSE AND MITIGATION To fix this issue, the vendor has changed the initial URL for web content being loaded within the app to use SSL. The vendor has fixed this issue in v1.0 (version code 10) that was released via Google Play Store on November 20th, 2017 and users should install the latest version. BOUNTY INFORMATION DuoLingo doesn’t currently offer bounties, however, this bug has fulfilled the requirements of Google Play Security Reward Program and a bounty has been paid from that program. REFERENCES CVE-ID: CVE-2017-16905 HackerOne Reports: # 281605 (DuoLingo) - http://ift.tt/2CFXLxo and # 293444 (Google Play Rewards) - http://ift.tt/2m0FakW CREDITS We would like to thank the vendor for the quick turnaround and fix for this vulnerability. Text of the advisory written by Yakov Shafranovich. TIMELINE 2017-10-21: Report opened with the vendor via HackerOne to clarify scope 2017-11-06: Technical details of vulnerability provided to the vendor via HackerOne 2017-11-07: Report triaged and being reviewed by the vendor 2017-11-20: Vendor patched the issue and asked for testing of the fix 2017-11-20: Fix confirmed, communication regarding disclosure 2017-11-28: Report submitted to Google’s Play Rewards program via HackerOne 2017-11-29: Rejection received due to scope, follow-up communication with Google regarding scope 2017-12-04: Follow-up conversation about disclosure with Google and the vendor 2017-12-05: Disclosure requested from DuoLingo via HackerOne 2018-01-04: Public disclosure on HackerOne, and publication of this advisory

Source: Gmail -> IFTTT-> Blogger

[FD] SSD Advisory – Livebox Fibra (Orange Router) Multiple Vulnerabilities

SSD Advisory – Livebox Fibra (Orange Router) Multiple Vulnerabilities Full report: http://ift.tt/2DVOTk2 Twitter: @SecuriTeam_SSD Weibo: SecuriTeam_SSD Vulnerabilities Summary The following advisory describes four (4) vulnerabilities found in Livebox Fibra router version AR_LBFIBRA\_sp-00.03.04.112S. It is possible to chain the vulnerabilities into remote code execution. The “Livebox Fibra” router is “manufactured by Arcadyan for Orange and Jazztel in Spain” The vulnerabilities found in Arcadyan routers are: Unauthenticated configuration information leak Hard-coded credentials Memory leak Stack buffer Overflow Credit An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program Vendor response Arcadyan and Orange were informed of the vulnerabilities and patched them. Vulnerabilities details Unauthenticated configuration information leak and weak usage of default users The “Livebox Fibra” router web server does not properly filter GET request, an unauthenticated user can send the following GET request and get the configuration file from the router: === `http://IP/cgi/cgi_network_connected.js` === The router uses an insecure way to get the configuration variables, it loads JavaScript files dinamically that set JS variables with the router configuration information. Hard-coded credentials Default users that can be used to log in in the router’s website is: ApiUsr, with the password ApiUsrPass and orangecare with password orange. Memory leak The router’s web server allows to configure multiple configuration variables. In order to configure one of those variables, it makes a POST request like the following: === ``` POST /apply.cgi HTTP/1.1 Host: 192.168.1.1 Accept-Encoding: gzip, deflate Connection: keep-alive Proxy-Connection: keep-alive Accept: */* User-Agent: A Accept-Language: es-ES;q=1 Content-Length: 400 pi=[CSRF_TOKEN]&SET0=[CFG_VAR_ID]%3D[CFG_VAR_VALUE] ``` === CSRF_TOKEN – CSRF Token that changes for every POST request (We can generate a new token and use it in a new request on: http://IP/cgi/renewPi.js) CFG_VAR_ID – identifies the configuration variable that you want to modify (It changes at the same time that the CSRF_TOKEN changes). We can get the CFG_VAR_ID values from http://IP/cgi/cgi_sys_smtp.js CFG_VAR_VALUE is the new value for the configuration variable In order to trigger the vulnerability, we sent a POST request to change the configuration (with correct “pi” and CFG_VAR_ID”) and a greater “Content-Length” for the request. The server uses the “Content-Length” calculate the length of the new value and then it uses the calculated size in “strncpy”. We can play with information in the POST request in order to achieve that “malloc” allocates our configuration value in an interesting zone in memory. The server correctly allocates memory for our new value, but in order to read and save the new configuration value, it reads out of bounds due to a bad calculation of the length (based on the “Content-length” header). Stack buffer Overflow The router’s has an API that provides the configuration variables values in JSON – It is used by the smartphone app, called ‘Mi Livebox’. “/API/Services/Notifications/EmailNotification” returns a JSON object with the email address configured to receive notifications when a new device connects to the network or when a new phone call arrives. The function is vulnerable to buffer-overflow in the URL request parser If we make a request like the following we will triage the vulnerability: === `http://IP/API/Services/Notifications/[A repeated 243 times]` === We overwrite the following registers (MIPS Big Endian): s0, s1, s2, s3 and ra. Since we control **ra** we can control the flow of the program and jump to our shellcode. In order to exploit this vulnerability we have two problems: ASLR We cannot use special bytes on our exploit (spaces, null bytes..) This vulnerability is not exploitable by itself, but we can use the memory leak explained before in order to leak some memory address and calculate the Libc base. Then, we can use ROP gadgets from the libc or another lib, and finally get remote code execution.

Source: Gmail -> IFTTT-> Blogger

[FD] [CVE-2017-7998] Gespage stored cross-site-scripting (XSS) vulnerability

Ravens considering drafting QB to develop behind Joe Flacco - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 1/4/2018

NanoRacks External Platform (NREP)-3 Payload Swap:  Today crewmembers extended the JEM A/L slide table into the JEM Pressurized Module (JPM) and exchanged payloads on NREP by removing the External Platform Module 2 (Charge Injector Device), External Platform Module 4 (Dependable Microprocessor) before installing the External Platform Module 5 (Cavalier) on NREP. The slide table was … Continue reading "ISS Daily Summary Report – 1/4/2018"

from ISS On-Orbit Status Report http://ift.tt/2EcCU1Q
via IFTTT

Critical Unpatched Flaws Disclosed In Western Digital 'My Cloud' Storage Devices

Security researchers have discovered several severe vulnerabilities and a secret hard-coded backdoor in Western Digital's My Cloud NAS devices that could allow remote attackers to gain unrestricted root access to the device. Western Digital's My Cloud (WDMyCloud) is one of the most popular network-attached storage devices which is being used by individuals and businesses to host their files,


from The Hacker News http://ift.tt/2AvH2aU
via IFTTT

Management couple in Edwyn Ralph, Bromyard (HR7) | Anonymous

View details and apply for this management couple job in Edwyn Ralph, Bromyard (HR7) with Anonymous on Caterer.com. We're looking for a Management Couple (chef + front of house) to run the day to day operations of a delightful country dining inn set in an affluent area between Ludlow and ...

from Google Alert - anonymous http://ift.tt/2EZ2IPY
via IFTTT

[Guide] How to Protect Your Devices Against Meltdown and Spectre Attacks

Recently uncovered two huge processor vulnerabilities called Meltdown and Spectre have taken the whole world by storm, while vendors are rushing out to patch the vulnerabilities in its products. The issues apply to all modern processors and affect nearly all operating systems (Windows, Linux, Android, iOS, macOS, FreeBSD, and more), smartphones and other computing devices made in the past 20


from The Hacker News http://ift.tt/2CLfIuY
via IFTTT

GOLD in Geostationary Orbit

The GOLD instrument will be riding as a passenger instrument onboard a commercial communications satellite positioned in geostationary orbit. GOLD will scan the disk and limb of Earth with an ultraviolet imaging spectrograph to measure the response of Earth's ionosphere to the various forcings in the Sun-Earth system.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2qtvtkA
via IFTTT

Carina over Lake Ballard


A jewel of the southern sky, the Great Carina Nebula, also known as NGC 3372, is one of our galaxy's largest star forming regions. Easily visible to the unaided eye it stands high above the signature hill of Lake Ballard, ephemeral salt lake of Western Australia, in this serene night skyscape from December 25, 2017. The Milky Way itself stretches beyond the southern horizon. Along the Milky Way, bright stars Alpha and Beta Centauri lie just above the hill's right flank, with the Southern Cross and dark Coalsack Nebula above the hill top. Based on a 22 panel mosaic, the scene was cropped to reveal more closely the beauty of this region of the southern Milky Way. On that short summer night, a star tracking camera mount was used to record the mosaic images of the sky, but turned off to image the foreground in moonlight. via NASA http://ift.tt/2AllL3u

Thursday, January 4, 2018

Config XML file not found in View of Teasers for Anonymous

My intention is to use the powerful 'Manage Display' capabilities in Display Suite to produce an almost identical Teaser display to the Default display for a particular content type, our main ubercart product type. This DS Teaser will be loaded in a View of Teasers to show one node. So this view will be ...

from Google Alert - anonymous http://ift.tt/2CI6iQW
via IFTTT

8th St.'s surf is Good

January 04, 2018 at 07:00PM, the surf is Good!

8th St. Summary


Surf: head high + to 3 ft overhead
Maximum: 2.448m (8.03ft)
Minimum: 1.836m (6.02ft)

Maryland-Delaware Summary


from Surfline http://ift.tt/1kVmigH
via IFTTT

Putting together the Q&A for our Anonymous Player Parting Thoughts - Do you have a question?

I am putting together my questions for my anonymous player Q&A. We aren't going to ask them to answer questions in the Alley afterward as we have done...

from Google Alert - anonymous http://ift.tt/2qkpZIS
via IFTTT

Head Chef

View details and apply for this head chef job in Central London / West End (W1) with Anonymous on Caterer.com. Head Chef - Central London VERY competitive salary package A very well established Italian Restaurant is looking for an ambitious and passionate Head Chef to manage all aspects of the ...

from Google Alert - anonymous http://ift.tt/2lXXTyu
via IFTTT

free BTC opinioni. BTC generator by anonymous

[04/01/2018] Ⓥ free BTC opinioni. BTC generator by anonymous.

from Google Alert - anonymous http://ift.tt/2CBOqGG
via IFTTT

Care Manager

View details and apply for this care manager job in Edgware (HA8) with Anonymous on totaljobs. Job Title: Registered Care Manager Location: Edgware – candidates will ideally live locally or within a reasonable commuting distance (30 minutes maximum) Salary: £30k to £33k depending on experience ...

from Google Alert - anonymous http://ift.tt/2CGfVQp
via IFTTT

8th St.'s surf is Good

January 03, 2018 at 07:00PM, the surf is Good!

8th St. Summary


Surf: head high + to 3 ft overhead
Maximum: 2.448m (8.03ft)
Minimum: 1.836m (6.02ft)

Maryland-Delaware Summary


from Surfline http://ift.tt/1kVmigH
via IFTTT

Anonymous Crime Tips

Community members can submit an anonymous tip for crimes suspected to occur on campus.

from Google Alert - anonymous http://ift.tt/2Cs64cH
via IFTTT

Ravens: OC Marty Mornhinweg will return, John Harbaugh announces; No. 27 offense in NFL this season (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 1/3/2018

Circadian Rhythms:  Today a 53S crewmember instrumented himself with Thermolab Double Sensors and mount the Thermolab Unit to their belt, and began 36 hours of monitoring for the Circadian Rhythm investigation.  Circadian Rhythms investigates the role of synchronized circadian rhythms, or the “biological clock,” and how it changes during long-duration spaceflight. Researchers hypothesize that a … Continue reading "ISS Daily Summary Report – 1/3/2018"

from ISS On-Orbit Status Report http://ift.tt/2CF73KS
via IFTTT

Anonymous Listener Who Found Backpack Full of Cash

An anonymous listeners found a backpack full of cash in Allison Park and he thinks it's the answer to all of his prayers. What should he do with it?

from Google Alert - anonymous http://ift.tt/2CSe33T
via IFTTT

Hundreds of GPS Location Tracking Services Leaving User Data Open to Hackers

Security researchers have unearthed multiple vulnerabilities in hundreds of GPS services that could enable attackers to expose a whole host of sensitive data on millions of online location tracking devices managed by vulnerable GPS services. The series of vulnerabilities discovered by two security researchers, Vangelis Stykas and Michael Gruhn, who dubbed the bugs as 'Trackmageddon' in a


from The Hacker News http://ift.tt/2E4Troo
via IFTTT

Overeaters Anonymous – Jade

Jade always knew that food played a larger part in her life than her family or friends and being slightly overweight led to bullying and name calling at school. Seeking isolation where she could eat without criticism led to her increasing weight over school holidays, exacerbating the problem. Being a fairly ...

from Google Alert - anonymous http://ift.tt/2E6qgBp
via IFTTT

Evolving Systems Anonymous Helpline

Anonymous verbal reports may be submitted by calling +13038021040. Please include as much specific information as possible. Your call is recorded by the Evolving Systems voicemail system. No matter what number you place your call from neither your extension nor your phone number is recorded.

from Google Alert - anonymous http://ift.tt/2EWY4Cf
via IFTTT

Facilities District Manager

Posted 1 day ago. Facilities Manager District Manager Worker Category: Full Time Location:  Los Angeles CA...See this and similar jobs on LinkedIn.

from Google Alert - anonymous http://ift.tt/2E6GDh1
via IFTTT

tensorflow/tensorflow

@rumanQu rumanQu changed the title from Numerous Linking errors in Tensorflow 1.3.1 Windows build with GPU to Numerous::`anonymous namespace':: Linking errors in Tensorflow 1.3.1 Windows build with GPU 9 hours from now ...

from Google Alert - anonymous http://ift.tt/2E2MaoQ
via IFTTT

(04/01/2018) ⑿ Bitcoin mining sites free : Bitcoin generator by anonymous

(04/01/2018) ⑿ Bitcoin mining sites free : Bitcoin generator by anonymous.

from Google Alert - anonymous http://ift.tt/2lSW4mp
via IFTTT

M1: The Incredible Expanding Crab


The Crab Nebula is cataloged as M1, the first on Charles Messier's famous list of things which are not comets. In fact, the Crab is now known to be a supernova remnant, an expanding cloud of debris from the explosion of a massive star. The violent birth of the Crab was witnessed by astronomers in the year 1054. Roughly 10 light-years across today, the nebula is still expanding at a rate of over 1,000 kilometers per second. Over the past decade, its expansion has been documented in this stunning time-lapse movie. In each year from 2008 to 2017, an image was produced with the same telescope and camera from a remote observatory in Austria. Combined in the time-lapse movie, the 10 images represent 32 hours of total integration time. The sharp, processed frames even reveal the dynamic energetic emission within the incredible expanding Crab. The Crab Nebula lies about 6,500 light-years away in the constellation Taurus. via NASA http://ift.tt/2lPMoZZ

Wednesday, January 3, 2018

⑷ best way to get anonymous BTC

[04/01/2018]] ⑷ best way to get anonymous BTC ~ how to get more than 8 connections BTC.

from Google Alert - anonymous http://ift.tt/2CD4k4i
via IFTTT

Senior Credit Controller

Senior Credit Controller in Accountancy with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2AiVy5P
via IFTTT

PA to Finance Director

PA to Finance Director in Accountancy with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2CCFEt1
via IFTTT

Anonymous user 5157f0

by Anonymous user 5157f0 on Jan. 3, 2018 · permalink. It's a nice, pleasant design. I like it and it suits me. It doesn't do anything spectacular, but it is what it is! Title; Review *. Rating * 1 star 2 stars 3 stars 4 stars 5 stars. * Required fields. or Cancel. To create your own collections, you must have a Mozilla ...

from Google Alert - anonymous http://ift.tt/2EQ7jUD
via IFTTT

Cafe manager in South East London (SE24) | Anonymous Recruiter

View details and apply for this cafe manager job in South East London (SE24) with Anonymous Recruiter on Caterer.com. Café Manager BOH & FOH Mimosa Foods - London Crystal Palace £24k - £29k depending on experience At Mimosa we make some of the London's tastiest freshly prepared ...

from Google Alert - anonymous http://ift.tt/2E2eI1Q
via IFTTT

Alcoholics Anonymous Meeting

Unity Health Current Facts As the leading healthcare provider in an eight-county area, Unity Health associates strive to improve the quality of health and well-being for the communities it serves through compassionate care. Unity Health is the largest employer in an eight-county area with more than 2000 ...

from Google Alert - anonymous http://ift.tt/2CCPiuA
via IFTTT

Contact HP - Anonymous выбранное



from Google Alert - anonymous http://ift.tt/2lSlxvp
via IFTTT

I have a new follower on Twitter



I'm just tweeting my feelings, my thoughts and what I want. I love following people too.
Philippines

Following: 18806 - Followers: 19838

January 03, 2018 at 07:51PM via Twitter http://twitter.com/Bookslest

Alison B (Century Meeting, 2017)

Alison B (Century Meeting, 2017). January 3, 2018 OASF. Alison (Century Meeting). OASF. Share. Rebecca A (Century Meeting, 2017) → · MEETINGS EVENTS FOR NEWCOMERS FOR MEDICAL PROFESSIONALS About OASF IntergrouP OA WORLD SERVICE. To suggest updates to this site, Please ...

from Google Alert - anonymous http://ift.tt/2CysX26
via IFTTT

Stampers Anonymous Scribble Woodland Tim Holtz Cling Stamps, 7" x 8.5"

See pricing info, deals and product reviews for Stampers Anonymous Scribble Woodland Tim Holtz Cling Stamps, 7" x 8.5" (CMS-282) at Quill.com. Order online today and get fast, free shipping for your business.

from Google Alert - anonymous http://ift.tt/2E0jFYU
via IFTTT

Huge Flaw Found in Intel Processors; Patch Could Hit 5-30% CPU Performance

The first week of the new year has not yet been completed, and very soon a massive vulnerability is going to hit hundreds of millions of Windows, Linux, and Mac users worldwide. According to a blog post published yesterday, the core team of Linux kernel development has prepared a critical kernel update without releasing much information about the vulnerability. Multiple researchers on


from The Hacker News http://ift.tt/2E08H5R
via IFTTT

Anonymous - m4m

Im looking for a younger bottom in the area that just wants some discreet no strings sex Good looking hung clean and fit here Send pix and stats please and no diseases because I'm clean and wanna...

from Google Alert - anonymous http://ift.tt/2qiS3MP
via IFTTT

ISS Daily Summary Report – 1/29/2018

Amyloid: Over the weekend, the crew retrieved the third set of Amyloid samples from the measurement experiment unit on the Cell Biology Experiment Facility (CBEF) and placed them in a Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI). Amyloid fibrils prepared in the microgravity environment of the ISS will be returned to Earth for … Continue reading "ISS Daily Summary Report – 1/29/2018"

from ISS On-Orbit Status Report http://ift.tt/2qkMBsV
via IFTTT

ISS Daily Summary Report – 12/29/2017

Synthetic Bone BioCell Operations: The crew completed microscopy operations for Synthetic Bone and then took a sample from each well on the Synthetic Bone Multiwell BioCell and exchanged the fluids with media in each well.  The samples were placed in a Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI).  This experiment uses facilities aboard … Continue reading "ISS Daily Summary Report – 12/29/2017"

from ISS On-Orbit Status Report http://ift.tt/2lONVi4
via IFTTT

I have a new follower on Twitter


Bundl
We build startups with corporations, from the ground up 🚀 #corporateventure #entrepreneur
Antwerp, Belgium
https://t.co/N5TYyNpftH
Following: 4254 - Followers: 4421

January 03, 2018 at 06:46AM via Twitter http://twitter.com/Bundl

Alcoholics Anonymous

St. Bruno's is a Roman Catholic Parish of the Archdiocese of Milwaukee, Wisconsin. We are a family-friendly parish in the small village of Dousman, WI. We have 750 households and more than 2000 members. We have a wonderful spirit of community, fantastic singing and participation at Mass, and an ...

from Google Alert - anonymous http://ift.tt/2DVzfFo
via IFTTT

I have a new follower on Twitter


Katy Pollard
Proud Yorkshire lass and founder of Listening Pig: helping small businesses get high profile media coverage. HuffPost blogger https://t.co/KE3ry125YJ
Leeds, England
https://t.co/5FKfHXsWoq
Following: 8456 - Followers: 10189

January 03, 2018 at 04:21AM via Twitter http://twitter.com/listeningpig

I have a new follower on Twitter


Bruce Martin Nigro
Doctor of Podiatric Medicine, Serial Entrepreneur, Family Comes First, Winelover, Weekend Athlete, Hack Golfer, Traded my Bucket-List for a Liv.-List !
Florida's Space Coast
https://t.co/g5hvKl4weM
Following: 7021 - Followers: 8140

January 03, 2018 at 04:21AM via Twitter http://twitter.com/BruceMNigro

Jan 20: South Korea's Reported Date to Ban Anonymous Crypto Trading

The South Korean government will reportedly enforce new rules banning the use of anonymous cryptocurrency trading accounts from January 20h. According to Korean news agency Yonhap, the government is turning up its scrutiny on the burgeoning local cryptocurrency market to curb speculative ...

from Google Alert - anonymous http://ift.tt/2DWh5TU
via IFTTT

Re: [FD] "." (period) in file extension(s) in windows

On Tue, 2 Jan 2018, Gynvael Coldwind wrote: > It's the same with spaces btw (see also James Forshaw's mention of this > in his post [1]): That's almost as hilarious as the Mac: ozzie:~ dave$ date > test ozzie:~ dave$ cAT TeSt Wed Jan 3 16:03:19 AEDT 2018 ozzie:~ dave$ ls -l Test -rw-r--r-- 1 dave staff 30 Jan 3 16:03 Test ozzie:~ dave$ Yep; case-insensitive, sort of... Amongst other things it means that you can't have both "Makefile" and "makefile" (a fairly common trick) and completely screws up RSYNC when symlinks to CamelCase files are used (I'm looking at you, Perl...).

Source: Gmail -> IFTTT-> Blogger

[FD] ChromeOS Doesn’t Always Use SSL During Startup [CVE-2017-15397]

[Original at: http://ift.tt/2lNBSSm] SUMMARY ChromeOS did not use SSL in all network calls originating from the ChromeVox component during startup. This could potentially have allowed an MITM attacker to inject content into ChromeOS or crash the device. The vendor (Google) fixed this issue in Chrome M62. Google has assigned CVE-2017-15397 to track this issue. DETAILS ChromeOS is the operating system developed by Google that runs on ChromeBook devices. It is build on top of Linux and around the Chrome browser. By monitoring network traffic using a proxy we noticed that some network calls originating from the ChromeVox component did not use SSL. These calls occured during the startup process before a user logged in. Because these calls did not use SSL, it would be possible for an MITM attacker, in theory, to either inject their own content into ChromeOS, or crash the device by sending a very large packet. We did not conduct any follow-up testing to confirm either of these two possibilities. To reproduce: 1. Setup a proxy with WiFi. 2. Switch ChromeOS device to use proxy. 3. Restart the device and on the login screen enable ChromeVox. 4. Observe calls to HTTP without SSL. All testing was done on an Acer ChromeBook, running Chrome version 51.0.2704.106 *stable) and ChromeOS version 8172.62.0 (stable). VENDOR RESPONSE This issue was responsibly reported to the vendor via the Chromium bug tracker. The vendor fixed this issue in ChromeOS release M62 and assigned CVE-2017-15397 to track it. REFERENCES CVE ID: CVE-2017-15397 - http://ift.tt/2CwNaEI Chromium Bug # 627300 - http://ift.tt/2lHvUCi Bounty Information This bug qualified for a bounty under the terms of the Google Chrome Rewardsbounty program, and a bounty payment has been received. Credits Advisory written by Yakov Shafranovich. Timeline 2016-07-12: Initial report to the vendor 2017-09-18: Issue patched by the vendor 2017-10-26: CVE assigned by the vendor 2018-01-01: Public disclosure

Source: Gmail -> IFTTT-> Blogger

Re: [FD] "." (period) in file extension(s) in windows

The Helix Nebula from CFHT


Will our Sun look like this one day? The Helix Nebula is one of brightest and closest examples of a planetary nebula, a gas cloud created at the end of the life of a Sun-like star. The outer gasses of the star expelled into space appear from our vantage point as if we are looking down a helix. The remnant central stellar core, destined to become a white dwarf star, glows in light so energetic it causes the previously expelled gas to fluoresce. The Helix Nebula, given a technical designation of NGC 7293, lies about 700 light-years away towards the constellation of the Water Bearer (Aquarius) and spans about 2.5 light-years. The featured picture was taken with the Canada-France-Hawaii Telescope (CFHT) located atop a dormant volcano in Hawaii, USA. A close-up of the inner edge of the Helix Nebula shows complex gas knots of unknown origin. via NASA http://ift.tt/2qcaum9

Tuesday, January 2, 2018

Anonymous

Anonymous. //. ······▻ FREE WATCH LIVE NOW. Footer. Rainforest Action Network Logo. 425 Bush Street, Suite 300. San Francisco, CA 94108. 415-398-4404 - Main Office · 1-800-989-7246 - Membership Hotline · ran@ran.org · Mission and Values · Staff · Board of Directors · Contact · Financial ...

from Google Alert - anonymous http://ift.tt/2CuyEhL
via IFTTT

Anonymous user 8eb8c1

Name, Anonymous user 8eb8c1. User since, Nov. 27, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2lIwbWi
via IFTTT

mlp/ - Anonymous in Equestria: Memorial Edition

Anonymous in Equestria: Memorial Edition - "/mlp/ - Pony" is 4chan's imageboard dedicated to the discussion of My Little Pony: Friendship is Magic.

from Google Alert - anonymous http://ift.tt/2CGUwDe
via IFTTT

Anonymous: Inside The Meeting

Follows two recovering alcoholics and one recovering drug addict as they attend a 12-step meeting and share their experience, strength and hope with others...

from Google Alert - anonymous http://ift.tt/2Cd9r7e
via IFTTT

Anonymous user bb325f

Developer Information. Name, Anonymous user bb325f. User since, Jan. 2, 2018. Number of add-ons developed, 1 theme. Average rating of developer's add-ons, Not yet rated. View all. Themes I've created. Unió Veïnal. by Anonymous user bb325f. 0 Daily Users. Add. My Reviews. No add-on reviews ...

from Google Alert - anonymous http://ift.tt/2CGoNSL
via IFTTT

Anonymous - Chef

Anonymous – Chef. Posted on January 02, 2018. An award winning, farm-to-table restaurant just outside Boston is looking for a talented chef to join their team. This restaurant is for people who are passionate about the farm to table movement, scratch cooking, and have a predisposition to provide ...

from Google Alert - anonymous http://ift.tt/2lFCo5s
via IFTTT

Disable Anonymous users from seeing qlik menu

Hello All, I want to setup where anonymous users can not see the qlik menu, is there a security rule I can put in place?

from Google Alert - anonymous http://ift.tt/2qaWGIJ
via IFTTT

Anonymous 119982

Anonymous 119982 started a new project Joulukalenterisukka 2017 Novita 7 Veljestä. 2.1. 19:10. PATTERNS · SEARCH FOR PATTERNS · YARNS · SEARCH FOR YARNS · TOOLS · MAGAZINES · KNITTERY · I KNIT · CONTACT DETAILS · NOVITA OY Kiviaidankatu 2 00210 Helsinki +358 (9) 613 176.

from Google Alert - anonymous http://ift.tt/2lFn09k
via IFTTT

Anonymous bands/musicians

Anonymous bands/musicians - "/mu/ - Music" is 4chan's imageboard for discussing all types of music.

from Google Alert - anonymous http://ift.tt/2qcOoA3
via IFTTT

Anonymous Feminist Street Artist Bambi Isn't Backing Down

In this tumultuous political era, the anonymous, feminist British street artist Bambi is not sitting quiet. With work that focuses on a plethora of social issues, including modern female identity—specifically in relation to pervasive patriarchal culture—Bambi, known in some circles as the “female Banksy,” ...

from Google Alert - anonymous http://ift.tt/2lHV0Sf
via IFTTT

Critical Flaw Reported In phpMyAdmin Lets Attackers Damage Databases

A critical security vulnerability has been reported in phpMyAdmin—one of the most popular applications for managing the MySQL database—which could allow remote attackers to perform dangerous database operations just by tricking administrators into clicking a link. Discovered by an Indian security researcher, Ashutosh Barot, the vulnerability is a cross-site request forgery (CSRF) attack and


from The Hacker News http://ift.tt/2CdeUL8
via IFTTT

Drafter in Knott Mill, Manchester (M1) | Anonymous

View details and apply for this drafter job in Knott Mill, Manchester (M1) with Anonymous on totaljobs. I am currently recruiting for Two personal insolvency drafters to join our warm family orientated office environment.

from Google Alert - anonymous http://ift.tt/2DTb5uX
via IFTTT

Chef de Partie

View details and apply for this chef de partie job in Maidenhead (SL6) with Anonymous on Caterer.com. Permanent Chef De Partie in Maidenhead wanted for a Hotel.

from Google Alert - anonymous http://ift.tt/2CDUNqw
via IFTTT

Flaw In Major Browsers Allows 3rd-Party Scripts to Steal Your Saved Passwords

Security researchers have uncovered how marketing companies have started exploiting an 11-year-old bug in browsers' built-in password managers, which allow them to secretly steal your email address for targeted advertising across different browsers and devices. The major concern is that the same loophole could allow malicious actors to steal your saved usernames and passwords from browsers


from The Hacker News http://ift.tt/2CDxXzi
via IFTTT

Unpatched Apple macOS 0-Day Kernel Exploit Disclosed, Allows Root Access

A security researcher on New Year's eve made public the details of an unpatched security vulnerability in Apple's macOS operating system that can be exploited to take complete control of a system. On the first day of 2018, a researcher using the online moniker Siguza released the details of the unpatched zero-day macOS vulnerability, which he suggests is at least 15 years old, and


from The Hacker News http://ift.tt/2A3MW2M
via IFTTT

Unexpected X Rays from Perseus Galaxy Cluster


Why does the Perseus galaxy cluster shine so strangely in one specific color of X-rays? No one is sure, but a much-debated hypothesis holds that these X-rays are a clue to the long-sought identity of dark matter. At the center of this mystery is a 3.5 Kilo-electronvolt (KeV) X-ray color that appears to glow excessively only when regions well outside the cluster center are observed, whereas the area directly surrounding a likely central supermassive black hole is actually deficient in 3.5 KeV X-rays. One proposed resolution -- quite controversial -- is that something never seen before might be present: florescent dark matter (FDM). This form of particle dark matter might be able to absorb 3.5 KeV X-radiation. If operating, FDM, after absorption, might later emit these X-rays from all over the cluster, creating an emission line. However, when seen superposed in front of the central region surrounding the black hole, FDM's absorption would be more prominent, creating an absorption line. Pictured, a composite image of the Perseus galaxy cluster shows visible and radio light in red, and X-ray light from the Earth-orbiting Chandra Observatory in blue. via NASA http://ift.tt/2q7I6BP

Monday, January 1, 2018

12 de Julio

Buy 12 de Julio: Read Digital Music Reviews - Amazon.com.

from Google Alert - anonymous http://ift.tt/2EuFMI4
via IFTTT

Anonymous, French, 17th century

Head of a Woman. Artist: Anonymous, French, 17th century. Date: second half 17th century. Medium: Black chalk on gray paper. Dimensions: 12 1/4 (patched at bottom to 13 5/8) x 10 1/4 in. Classification: Drawings. Credit Line: Rogers Fund, 1907. Accession Number: 07.282.2. Not on view. Provenance.

from Google Alert - anonymous http://ift.tt/2Eq7Koq
via IFTTT

Anonymous users do not see the gpx graphics

Hi, So the module works fine now and I really love it. Nice job ! One question remains : anonymous users do not see the picture of the gpx file, they can only download it. As soon as I login, I see the picture. I can not find any permissions that influence this ... Regards, Hans.

from Google Alert - anonymous http://ift.tt/2DJ998k
via IFTTT

I have a new follower on Twitter


Onur YUKSEKTEPELI
Owner and Chief Technology Solutions Architect at Nephocraft. Entrepreneur, Technology Enthusiast, Speaker, Writer, Microsoft MVP
Istanbul
https://t.co/TWZuCrcljF
Following: 6578 - Followers: 7245

January 01, 2018 at 01:26PM via Twitter http://twitter.com/oyuksektepeli

Anonymous Radio 24/7 Live. A new radio station in your area!

Anonymous Radio Redux, formerly AnonRadioUS started as a small single weekly show hosted on Dark City Radio. Soon after arriving on the network the show was disbanded. There were vast differences in personalities. We then went on to form our own station on Spreaker. Anonymous Radio Redux ...

from Google Alert - anonymous http://ift.tt/2lwYebn
via IFTTT

Ravens LB C.J. Mosley confirms DC Dean Pees is retiring (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Taking screenshots with OpenCV and Python

Happy New Year!

It’s now officially 2018…which also means that PyImageSearch is (almost) four years old!

I published the very first blog post on Monday, January 12th 2014. Since then over 230 posts have been published, along with two books and a full-fledged course.

At the beginning of every New Year I take some quiet time to reflect.

I grab my notebook + a couple pens (leaving my laptop and phone at home; no distractions) and head to the local cafe in my neighborhood. I then sit there and reflect on the past year and ask myself the following questions:

  • What went well and gave me life?
  • What went poorly and sucked life from me?
  • How can I double-down on the positive, life-giving aspects?
  • How can I get the negative aspects off my plate (or at least minimize their impact on my life)?

These four questions (and my thoughts on them) ultimately shape the upcoming year.

But most of all, the past four years running PyImageSearch has always been at the top of my list for “life-giving”.

Thank you for making PyImageSearch possible. Running this blog is truly the best part of my day.

Without you PyImageSearch would not be possible.

And in honor of that, today I am going to answer a question I received from Shelby, a PyImageSearch reader:

Hi Adrian, I’ve been reading PyImageSearch for the past couple of years. One topic I’m curious about is taking screenshots with OpenCV. Is this possible?

I’d like to build an app that can automatically control the user’s screen and it requires screenshots. But I’m not sure how to go about it.

Shelby’s question is a great one.

Building a computer vision system to automatically control or analyze what is on a user’s screen is a great project.

Once we have the screenshot we can identify elements on a screen using template matching, keypoint matching, or local invariant descriptors.

The problem is actually obtaining the screenshot in the first place.

We call this data acquisition — and in some cases, acquiring the data is actually harder than
applying the computer vision or machine learning itself.

To learn how to take screenshots with OpenCV and Python, just keep reading.

Looking for the source code to this post?
Jump right to the downloads section.

Taking screenshots with OpenCV and Python

Today’s blog post is broken down into two sections.

In the first section, we’ll learn how to install the PyAutoGUI library. This library is responsible for actually capturing our screenshots to disk or directly to memory.

From there we’ll learn how to use PyAutoGUI and OpenCV together to obtain our screenshots.

Installing PyAutoGUI for screenshots

You can find instructions for installing PyAutoGUI in their install documentation; however, as a matter of completeness, I have included the instructions below.

highly recommend that you install the PyAutoGUI into your Python virtual environment for computer vision (as we have done for all other install tutorials here on PyImageSearch).

Discussing virtual environments in detail is beyond the scope of this blog post; however, I encourage you to set up an environment for computer vision (including OpenCV and other tools) by following the installation instructions for your system available here.

macOS

Installing PyAutoGUI for macOS is very straightforward. As stated above, you’ll want to be sure you’re “inside” your virtual environment prior to executing the following pip commands:

$ workon your_virtualenv
$ pip install pillow imutils
$ pip install pyobjc-core
$ pip install pyobjc
$ pip install pyautogui

Ubuntu or Raspbian

To install PyAutoGUI for Ubuntu (or Raspbian), you’ll need to make use of both Aptitude and pip. Again, before the pip commands, be sure that you’re working on your Python virtual environment:

$ sudo apt-get install scrot
$ sudo apt-get install python-tk python-dev
$ sudo apt-get install python3-tk python3-dev
$ workon your_virtualenv
$ pip install pillow imutils
$ pip install python3_xlib python-xlib
$ pip install pyautogui

Screenshots and screen captures with OpenCV and Python

Now that PyAutoGUI is installed, let’s take our first screenshot with OpenCV and Python.

Open up a new file, name it

take_screenshot.py
 , and insert the following code:
# import the necessary packages
import numpy as np
import pyautogui
import imutils
import cv2

On Lines 2-5 we’re importing our required packages, notably

pyautogui
 .

From there we’ll take a screenshot via two different methods.

In the first method, we take the screenshot and store it in memory for immediate use:

# take a screenshot of the screen and store it in memory, then
# convert the PIL/Pillow image to an OpenCV compatible NumPy array
# and finally write the image to disk
image = pyautogui.screenshot()
image = cv2.cvtColor(np.array(image), cv2.COLOR_RGB2BGR)
cv2.imwrite("in_memory_to_disk.png", image)

Line 10 shows that we’re grabbing a screenshot with

pyautogui.screenshot
 and storing it as
image
  (again, this image is stored in memory it is not saved to disk).

Easy, huh?

Not so fast!

PyAutoGUI actually stores the image as a PIL/Pillow image, so we need to perform an additional step before the image can be used with OpenCV.

On Line 11 we convert the image to a NumPy array and swap the color channels from RGB ordering (what PIL/Pillow uses) to BGR (what OpenCV expects). That’s all that’s required for making our screenshot image OpenCV-compatible.

From here the sky is the limit with what you can do. You could detect buttons displayed on the screen or even determine the coordinates of where the mouse is on the screen.

We won’t do either of those tasks today. Instead, let’s just write the image to disk with

cv2.imwrite
  to ensure the process worked correctly (Line 12).

The second method (where we write the screenshot to disk) is even easier:

# this time take a screenshot directly to disk
pyautogui.screenshot("straight_to_disk.png")

As shown, this one-liner writes the image straight to disk. Enough said.

We could stop there, but for a sanity check, let’s make sure that OpenCV can also open + display the screenshot:

# we can then load our screenshot from disk in OpenCV format
image = cv2.imread("straight_to_disk.png")
cv2.imshow("Screenshot", imutils.resize(image, width=600))
cv2.waitKey(0)

Here, we read the image from disk. Then we resize and display it on the screen until a key is pressed.

That’s it!

As you can tell, PyAutoGui is dead simple thanks to the hard work of Al Sweigart.

Let’s see if it worked.

To test this script, open up a terminal and execute the following command:

$ python take_screenshot.py

And here’s our desktop screenshot shown within our desktop…proving that the screenshot was taken and displayed:

Figure 1: Taking a screenshot with Python, OpenCV, and PyAutoGUI on macOS.

Notice how in the terminal the Python script is running (implying that the screenshot is currently being taken).

After the script exits, I have two new files in my working directory:

in_memory_to_disk.png
  and
straight_to_disk.png
 .

Let’s list contents of the directory:

$ ls -al
total 18760
drwxr-xr-x@ 5 adrian  staff      160 Jan 01 10:04 .
drwxr-xr-x@ 8 adrian  staff      256 Jan 01 20:38 ..
-rw-r--r--@ 1 adrian  staff  4348537 Jan 01 09:59 in_memory_to_disk.png
-rw-r--r--@ 1 adrian  staff  5248098 Jan 01 09:59 straight_to_disk.png
-rw-r--r--@ 1 adrian  staff      703 Jan 01 09:59 take_screenshot.py

As you can see, I’ve got my

take_screenshot.py
  script and both screenshot PNG images

Now that we have our screenshot in OpenCV format, we can apply any “standard” computer vision or image processing operation that we wish, including edge detection, template matching, keypoint matching, object detection, etc.

In a future blog post, I’ll be demonstrating how to detect elements on a screen followed by controlling the entire GUI from the PyAutoGUI library based on what our computer vision algorithms detect.

Stay tuned for this post in early 2018!

Summary

In today’s blog post we learned how to take screenshots using OpenCV, Python, and the PyAutoGUI library.

Using PyAutoGUI we can easily capture screenshots directly to disk or to memory, which we can then convert to OpenCV/NumPy format.

Screenshots are an important first step when creating computer vision software that can automatically control GUI operations on the screen, including automatically moving the mouse, clicking the mouse, and registering keyboard events.

In future blog posts, we’ll learn how we can automatically control our entire computer via computer vision and the PyAutoGUI.

To be notified when future blog posts are published here on PyImageSearch, just enter your email address in the form below!

Downloads:

If you would like to download the code and images used in this post, please enter your email address in the form below. Not only will you get a .zip of the code, I’ll also send you a FREE 11-page Resource Guide on Computer Vision and Image Search Engines, including exclusive techniques that I don’t post on this blog! Sound good? If so, enter your email address and I’ll send you the code immediately!

The post Taking screenshots with OpenCV and Python appeared first on PyImageSearch.



from PyImageSearch http://ift.tt/2CzGQtA
via IFTTT

Forever 21 Confirms Security Breach Exposed Customer Credit Card Details

First notified in November of a data breach incident, popular clothing retailer Forever 21 has now confirmed that hackers stole credit card information from its stores throughout the country for several months during 2017. Although the company did not yet specify the total number of its customers affected by the breach, it did confirm that malware was installed on some point of sale (POS)


from The Hacker News http://ift.tt/2lyT8KX
via IFTTT

Sunday, December 31, 2017

▶ Terrell Suggs says loss to Bengals most devastating defeat in Ravens career; "It's like a bad dream" (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous That Dude

Listen to songs and albums by Anonymous That Dude, including "Mind Blown (feat. Anonymous That Dude)", "One More (feat. Kevin Gates)", "The Way I Wanna" and many more. Free with Apple Music subscription.

from Google Alert - anonymous http://ift.tt/2C3hpzC
via IFTTT

anonymous openings

I haven't played for awhile, so I thought I would play a lot of anonymous games to get back into playing. Strangely, 90+% of my anonymous white opponen…

from Google Alert - anonymous http://ift.tt/2q34vjO
via IFTTT

📋 Ravens: WRs Breshad Perriman and Jeremy Maclin among 7 inactives vs. Bengals (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

bitcoin anonymous

Bulletproofs, a technological innovation proposed by Stanford University's Applied Cryptography Group and several Blockstream developers, could enable bitcoin users to transact with enhanced privacy, even when making on-chain transactions. Contrary to mainstream media reports, bitcoin ...

from Google Alert - anonymous http://ift.tt/2DG0UK7
via IFTTT

Anonymous user bab653

Name, Anonymous user bab653. User since, دسمبر 31, 2017. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet rated ...

from Google Alert - anonymous http://ift.tt/2CuXv1K
via IFTTT

Make matches anonymous until the match ends

Make the opposing teams unable to contact each other via whisper, map-chat, say-chat, and mail, also their names should be hidden during matches in SPvP covered by a generic title.

from Google Alert - anonymous http://ift.tt/2lqkBPy
via IFTTT

To Fly Free in Space


What would it be like to fly free in space? At about 100 meters from the cargo bay of the space shuttle Challenger, Bruce McCandless II was living the dream -- floating farther out than anyone had ever been before. Guided by a Manned Maneuvering Unit (MMU), astronaut McCandless, pictured, was floating free in space. McCandless and fellow NASA astronaut Robert Stewart were the first to experience such an "untethered space walk" during Space Shuttle mission 41-B in 1984. The MMU worked by shooting jets of nitrogen and was used to help deploy and retrieve satellites. With a mass over 140 kilograms, an MMU is heavy on Earth, but, like everything, is weightless when drifting in orbit. The MMU was replaced with the SAFER backpack propulsion unit. via NASA http://ift.tt/2BTtHdT

Ravens: DC Dean Pees plans to retire after season - Adam Schefter (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT