Latest YouTube Video

Saturday, March 17, 2018

Anonymous babybump - m4w

I'm a cool, erudite and smart married man in my 40s, hwp, in good shape, good looking, healthy, clean DDF, healthy and good shape Looking for a woman who would love to get pregnant by me, so that...

from Google Alert - anonymous http://ift.tt/2DzAw4o
via IFTTT

Can An Atheist Sue To Avoid Alcoholics Anonymous?

Courts often mandate attendance at Alcoholics Anonymous. Can an atheist opt out? A legal expert weighs in.

from Google Alert - anonymous http://ift.tt/2FZHwNf
via IFTTT

anonymous galaxy



from Google Alert - anonymous http://ift.tt/2DB8vcw
via IFTTT

anonymous galaxy



from Google Alert - anonymous http://ift.tt/2tXJlW8
via IFTTT

anonymous galaxy



from Google Alert - anonymous http://ift.tt/2Iz2ocs
via IFTTT

Anonymous apk carding

Anonymous apk carding. apk . Requirements: HideMyAss! Pro VPN - Download; Mozilla Firefox Jun 24, 2017 Tags:-Amazon Unlimited Hack,Amazon carding,Amazon card tutorial,Amazon carding latest,Amazon Carding method,how to card Amazon easily with AMEX,what is AMEX,Amazon carding ...

from Google Alert - anonymous http://ift.tt/2plwvLB
via IFTTT

Ravens: WR Michael Crabtree brings Anquan Boldin-like clutch play to offense - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous Voicemail Has The Internet Completely Shook!

THIS IS SO SCARY!!! This anonymous voicemail has the internet completely SHOOK! When most of us get messages from unknown numbers or Scam Likely. This guy TY received a very strange voicemail. i really need yall to listen to this voicemail i just got...i am deactivating my cell phone service ...

from Google Alert - anonymous http://ift.tt/2G2IWXm
via IFTTT

8th St.'s surf is at least 6.54ft high

Maryland-Delaware, March 22, 2018 at 04:00AM

8th St. Summary
At 4:00 AM, surf min of 6.54ft. At 10:00 AM, surf min of 5.53ft. At 4:00 PM, surf min of 4.69ft. At 10:00 PM, surf min of 4.02ft.

Surf maximum: 7.44ft (2.27m)
Surf minimum: 6.54ft (1.99m)
Tide height: 0.89ft (0.27m)
Wind direction: NW
Wind speed: 16.81 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

The Crab from Space


The Crab Nebula is cataloged as M1, the first object on Charles Messier's famous list of things which are not comets. In fact, the Crab is now known to be a supernova remnant, expanding debris from the death explosion of a massive star. This intriguing false-color image combines data from space-based observatories, Chandra, Hubble, and Spitzer, to explore the debris cloud in X-rays (blue-white), optical (purple), and infrared (pink) light. One of the most exotic objects known to modern astronomers, the Crab Pulsar, a neutron star spinning 30 times a second, is the bright spot near picture center. Like a cosmic dynamo, this collapsed remnant of the stellar core powers the Crab's emission across the electromagnetic spectrum. Spanning about 12 light-years, the Crab Nebula is 6,500 light-years away in the constellation Taurus. via NASA http://ift.tt/2FIPDhW

Friday, March 16, 2018

Ravens and former Raiders WR Michael Crabtree agree to 3-year deal - Adam Schefter (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Adrian Lamo Dies at 37 — Hacker Who Exposed Wikileaks Informant

Adrian Lamo, the hacker who tipped off the FBI about Wikileaks whistleblower Chelsea Manning, dies at the age of 37, according to a Facebook post by a family member. "With great sadness and a broken heart I have to let know all of Adrian's friends and acquaintances that he is dead. A bright mind and compassionate soul is gone, he was my beloved son...," Adrian's father Mario Lamo-Jiménezwrote


from The Hacker News http://ift.tt/2HDW8Pn
via IFTTT

Anonymous glory hole - m4m

Door open, private clean home, soft sheet Glory hole, perfect for straight, bi, married to get that hard cocked serviced, hot wet mouth waiting , come in blow and go. 59, 48 white clean DDF stocky....

from Google Alert - anonymous http://ift.tt/2Dy4Qwb
via IFTTT

Anonymous qotd qod t

What does FQOTD mean? AQOTD - Anonymous Quote of the Day; MQOTD - Movie Quote of the Day; QOD - Quote of the Day; QOTD - Quote of the Day; QOTM - Quote of the DCHS ACT Question-of-the-Day Compliments of the DON'T PANICbut DO sign our GUESTBOOK. Descubre (¡y guarda!) tus ...

from Google Alert - anonymous http://ift.tt/2GAChBA
via IFTTT

Securly Announces an Anonymous Reporting Tool for Schools

Securly Inc, the leading K-12 student safety company announced today that it is expanding its real-time 24x7 monitoring services to include a new anonymous tipping service named Tipline.

from Google Alert - anonymous http://ift.tt/2FF8QkC
via IFTTT

Anon I mus Spiritually Anonymous mesmerizing gifs t

~Anon I mus (Spiritually Anonymous) ”Nothing is ever quite what it seems… life is a persistent illusion. 52690029. This Pin was discovered by saiki . “The further you (as unconditioned awareness) descend into identification with form; the more you will become unconscious and 'constrict' your limitless ...

from Google Alert - anonymous http://ift.tt/2plucrU
via IFTTT

ISS Daily Summary Report – 3/15/2018

Remote Power Control Modules (RPCM) P14B-G and P13A-G Swap:  Ground robotic operations using the Space Station Remote Manipulator System (SSRMS) and Special Purpose Dexterous Manipulator (SPDM) to perform a swap of RPCM P14B-G and P13A-G continue. The installation of the new RPCM P14B-G was successful; however, the ground team was unable to fully seat the … Continue reading "ISS Daily Summary Report – 3/15/2018"

from ISS On-Orbit Status Report http://ift.tt/2FNYSct
via IFTTT

Anonymous real estate tip line in works

A new tip line is being set up to allow for anonymous complaints about suspicious real estate activities in British Columbia. Finance Minister Carole James said the tip line launched by the Real Estate Council of British Columbia will help improve...

from Google Alert - anonymous http://ift.tt/2Gxw0Xb
via IFTTT

Anonymous TTC ad tries to lure LeBron James to Toronto

Anonymous TTC ad tries to lure LeBron James to Toronto. March 15, 2018. WATCHING NOW. TTC suspends fare gate installation. March 15, 2018. WATCHING NOW. Canadian snowboarder Mark McMorris' comeback story. March 15, 2018. WATCHING NOW. What happens after families move into a ...

from Google Alert - anonymous http://ift.tt/2DwjYtO
via IFTTT

Alcoholics Anonymous – Dave and Cat

Dave felt different from day 1 and was waiting for someone to come and take him to his true home. He started drinking at 14 years old with his friends and was a happy drunk. Dave's drinking progressed steadily and as his friends dropped off to continue a normal life Dave ploughed on with drugs and ...

from Google Alert - anonymous http://ift.tt/2G0e1uI
via IFTTT

Plugins for Popular Text Editors Could Help Hackers Gain Elevated Privileges

Whether you're a developer, designer or a writer, a good text editor always help you save time and make you work more efficiently. For example, I use Sublime a lot while programming because it includes some useful tools like 'syntax highlighting' and 'autocomplete' that every advanced text editor should have. Moreover, these advanced text editors also offer users extensibility, allowing


from The Hacker News http://ift.tt/2FEtPUn
via IFTTT

Roadkill observation of reported March 15, 2018 - 7:57pm by Anonymous

I would like to salvage this animal and agree to the terms of salvage: Yes. Parts Salvaged: Whole Animal. What. Species Confidence: 100%. Count: 1. Count Type: Absolute. Sex: Male. Life State: Dead. Life Stage: Unknown. Disposition: Unknown. Decomposition: Unknown. Species Account: Male mule ...

from Google Alert - anonymous http://ift.tt/2FNYACv
via IFTTT

The Seagull and The Duck


Seen as a seagull and a duck, these nebulae are not the only cosmic clouds to evoke images of flight. But both are winging their way across this broad celestial landscape, spanning almost 7 degrees across planet Earth's night sky toward the constellation Canis Major. The expansive Seagull (top center) is itself composed of two major cataloged emission nebulae. Brighter NGC 2327 forms the head with the more diffuse IC 2177 as the wings and body. Impressively, the Seagull's wingspan would correspond to about 250 light-years at the nebula's estimated distance of 3,800 light-years. At the lower right, the Duck appears much more compact and would span only about 50 light-years given its 15,000 light-year distance estimate. Blown by energetic winds from an extremely massive, hot star near its center, the Duck nebula is cataloged as NGC 2359. Of course, the Duck's thick body and winged appendages also lend it the slightly more dramatic popular moniker, Thor's Helmet. via NASA http://ift.tt/2tR9INp

Thursday, March 15, 2018

Anonymous Audio Recording Alleges Details in Teen's Murder

The family says they have no idea, for sure, who the woman is or if she actually witnessed Cyncere's murder.

from Google Alert - anonymous http://ift.tt/2FK1vMA
via IFTTT

anonymous

anonymous. Products. DatAdvantage · Data Classification Engine · DatAlert · Automation Engine · DataPrivilege · Data Transport Engine · DatAnswers · Data Security Platform. Services. Professional Services · Support. Partners. Program Overview · Become a Partner · Partner Portal · Technology ...

from Google Alert - anonymous http://ift.tt/2pfAg6m
via IFTTT

School Safety Anonymous Tip Line

Ashland High School website, Ashland, Massachusetts.

from Google Alert - anonymous http://ift.tt/2HF8xTf
via IFTTT

Anonymous users are no logger redirected to login page

Prior to the rc4 update, an anonymous user would be redirected to a login page whenever he visited a webform node with a webform attached to it. Now, the user is not redirected and the page shown does not have any content at all. The webform submission "Redirect to login when access denied to ...

from Google Alert - anonymous http://ift.tt/2FDxrWN
via IFTTT

anonymous galaxy



from Google Alert - anonymous http://ift.tt/2FDAn5O
via IFTTT

8th St.'s surf is at least 5.08ft high

Maryland-Delaware, March 21, 2018 at 04:00AM

8th St. Summary
At 4:00 AM, surf min of 5.08ft. At 10:00 AM, surf min of 4.63ft. At 4:00 PM, surf min of 4.0ft. At 10:00 PM, surf min of 3.47ft.

Surf maximum: 5.57ft (1.7m)
Surf minimum: 5.08ft (1.55m)
Tide height: 0.15ft (0.05m)
Wind direction: NNE
Wind speed: 28.21 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

Ravens: WR Ryan Grant fails physical, $29M deal he signed with team is null and void - Adam Schefter (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Former Raiders WR Michael Crabtree is scheduled to visit with Ravens on Friday - Adam Schefter (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Orioles: Mark Trumbo will miss at least 3-4 weeks with a quad strain (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Pre-Installed Malware Found On 5 Million Popular Android Phones

Security researchers have discovered a massive continuously growing malware campaign that has already infected nearly 5 million mobile devices worldwide. Dubbed RottenSys, the malware that disguised as a 'System Wi-Fi service' app came pre-installed on millions of brand new smartphones manufactured by Honor, Huawei, Xiaomi, OPPO, Vivo, Samsung and GIONEE—added somewhere along the supply chain


from The Hacker News http://ift.tt/2phgpmr
via IFTTT

[FD] [CORE-2018-0003] MikroTik RouterOS SMB Buffer Overflow

Core Security - Corelabs Advisory http://ift.tt/140w507 MikroTik RouterOS SMB Buffer Overflow 1. **Advisory Information** Title: MikroTik RouterOS SMB Buffer Overflow Advisory ID: CORE-2018-0003 Advisory URL: http://ift.tt/2HCjrcq Date published: 2018-03-15 Date of last update: 2018-03-01 Vendors contacted: MikroTik Release mode: Coordinated release 2. **Vulnerability Information** Class: Stack-based Buffer Overflow [CWE-121] Impact: Code execution Remotely Exploitable: Yes Locally Exploitable: No CVE Name: CVE-2018-7445 3. **Vulnerability Description*** * MikroTik is a Latvian company which was founded in 1996 to develop routers and wireless ISP systems. MikroTik now provides hardware and software for Internet connectivity in most of the countries around the world. RouterOS is MikroTik's stand-alone operating system based on Linux v3.3.5 kernel. A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. 4. **Vulnerable Packages** . All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 5. **Vendor Information, Solutions and Workarounds** . MikroTik released version 6.41.3 of RouterOS [1] that fixes the reported issue. . The workaround suggested by MikroTik in case it is not possible to install an update consists of disabling the SMB service. 6. **Credits** This vulnerability was discovered and researched by Juan Caillava and Maximiliano Vidal from Core Security Consulting Services. The publication of this advisory was coordinated by Leandro Cuozzo from Core Advisories Team.     7. **Technical Description / Proof of Concept Code*** * The overflow takes place in the function in charge of parsing NetBIOS names, which receives two stack allocated buffers as parameters. As an example reference, this function is located at address 0x08054607 on the x86 SMB binary version 6.40.5. The first byte of the source buffer is read and used as the size for the copy operation. The function then copies that amount of bytes into the destination buffer. Once that is done, the next byte of the source buffer is read and used as the new size. This loop finishes when the size to copy is equal to zero. No validation is done to ensure that the data fits on the destination buffer, resulting in a stack overflow. Simplified pseudo-code of the vulnerable function: /--

Source: Gmail -> IFTTT-> Blogger

MLB's Best Postseason Upsets: Orioles' 1966 World Series win vs. Dodgers ranks in top 30 - David Schoenfield (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

ISS Daily Summary Report – 3/14/2018

Veg-03:  Today the crew watered the Veg-03 plants and continued with the photo-documentation of plant growth for the Veg-03 investigation. Veg-03 supports the proof-of concept for the Veggie plant growth chamber and the planting pillows. Future long duration space missions will require a fresh food supply grown in space to supplement crew diets.  Earth Imagery … Continue reading "ISS Daily Summary Report – 3/14/2018"

from ISS On-Orbit Status Report http://ift.tt/2tRipan
via IFTTT

CompTIA Certification Training — Get 14 Courses For Only $59

The Information Technology industry has witnessed exponential growth over the years, and if you want to be a part of this growing industry, it's important for you to earn certificates in this field. Organisations always prefer employees with strong internationally-recognized professional certifications that proof your skills, knowledge, and what you know—giving you more credibility and


from The Hacker News http://ift.tt/2GvDjPa
via IFTTT

Warning – 3 Popular VPN Services Are Leaking Your IP Address

Researchers found critical vulnerabilities in three popular VPN services that could leak users’ real IP addresses and other sensitive data. VPN, or Virtual Private Network, is a great way to protect your daily online activities that work by encrypting your data and boosting security, as well as useful to obscure your actual IP address. While some choose VPN services for online anonymity and


from The Hacker News http://ift.tt/2tMrMrU
via IFTTT

Catalog Entry Number 1


Every journey has first step and every catalog a first entry. First entries in six well-known deep sky catalogs appear in these panels, from upper left to lower right in chronological order of original catalog publication. From 1774, Charles Messier's catalog entry number 1 is M1, famous cosmic crustacean and supernova remnant the Crab Nebula. J.L.E. Dreyer's (not so new) New General Catalog was published in 1888. A spiral galaxy in Pegasus, his NGC 1 is centered in the next panel. Just below it in the frame is another spiral galaxy cataloged as NGC 2. In Dreyer's follow-on Index Catalog (next panel), IC 1 is actually a faint double star, though. Now recognized as part of the Perseus molecular cloud complex, dark nebula Barnard 1 begins the bottom row from Dark Markings of the Sky, a 1919 catalog by E.E. Barnard. Abell 1 is a distant galaxy cluster in Pegasus, from George Abell's 1958 catalog of Rich Clusters of Galaxies. The final panel is centered on vdB 1, from Sidney van den Bergh's 1966 study. The pretty, blue galactic reflection nebula is found in the constellation Cassiopeia. via NASA http://ift.tt/2pbQsEK

Wednesday, March 14, 2018

Ravens: Ray Lewis' daughter to introduce him at Hall of Fame induction (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Trojanized BitTorrent Software Update Hijacked 400,000 PCs Last Week

A massive malware outbreak that last week infected nearly half a million computers with cryptocurrency mining malware in just a few hours was caused by a backdoored version of popular BitTorrent client called MediaGet. Dubbed Dofoil (also known as Smoke Loader), the malware was found dropping a cryptocurrency miner program as payload on infected Windows computers that mine Electroneum digital


from The Hacker News http://ift.tt/2Gs1mOJ
via IFTTT

Ravens release WR Jeremy Maclin after one season - Adam Schefter (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

[FD] SEC Consult SA-20180314-0 :: Arbitrary Shortcode Execution & Local File Inclusion in WooCommerce Products Filter (PluginUs.Net)

SEC Consult Vulnerability Lab Security Advisory < 20180314-0 > ======================================================================= title: Arbitrary Shortcode Execution & Local File Inclusion product: WOOF - WooCommerce Products Filter (PluginUs.Net) vulnerable version: 1.1.9 fixed version: 2.2.0 CVE number: (requested but not yet received) impact: Critical homepage: https://pluginus.net/ found: 2018-02-20 by: Ahmad Ramadhan Amizudin (Office Kuala Lumpur) SEC Consult Vulnerability Lab An integrated part of SEC Consult Europe | Asia | North America http://ift.tt/1mGHMNR ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

ISS Daily Summary Report – 3/13/2018

Fluidics:  Today the crew set up the Fluidics experiment hardware and executed Runs 2 and 3. Fluidics is a fluid mechanics experiment with two main objectives: perform a Slosh study to investigate fluid behavior under microgravity during satellite maneuvers, and a Wave Turbulence study to investigate the impact of capillary effect on wave turbulence without … Continue reading "ISS Daily Summary Report – 3/13/2018"

from ISS On-Orbit Status Report http://ift.tt/2FDRHrq
via IFTTT

Anonymous class java

Anonymous class « Class « Java. Anonymous local class in java, anonymous nested class example. Anonymous class can be created using two methods : By using the Anonymous inner class in Java is a class with no name. Anonymous object of WindowAdapter is used. Java Anonymous inner class.

from Google Alert - anonymous http://ift.tt/2FSzGEQ
via IFTTT

anonymous galaxy



from Google Alert - anonymous http://ift.tt/2FS9ytX
via IFTTT

Assistant General Manager

View details and apply for this assistant general manager job in Edinburgh (EH8) with Anonymous Recruiter on Caterer.com. Chop House are recruiting for an experienced A.

from Google Alert - anonymous http://ift.tt/2pcFm2s
via IFTTT

Judge rules NH lottery winner able to stay anonymous

A judge ruled that a New Hampshire woman who won a $560 million lottery will be allowed to keep her identity unknown, USA Today reports. While the woman's ...

from Google Alert - anonymous http://ift.tt/2IlOn1T
via IFTTT

Tuesday, March 13, 2018

8th St.'s surf is Good

March 13, 2018 at 08:00PM, the surf is Good!

8th St. Summary


Surf: head high to 2 ft overhead
Maximum: 2.142m (7.03ft)
Minimum: 1.53m (5.02ft)

Maryland-Delaware Summary


from Surfline http://ift.tt/1kVmigH
via IFTTT

The winner of a $560 million lottery ticket can remain anonymous, scoring a big win for privacy

The winner of a Powerball jackpot of $560 million that had gone unclaimed for two months because of a legal battle for privacy can remain anonymous, a New Hampshire judge ruled Monday.

from Google Alert - anonymous http://ift.tt/2pdQjR5
via IFTTT

Former Cardinals WR John Brown intends to sign with Ravens - Adam Schefter (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Call Her Jane Dough: New Hampshire Lottery Winner Can Stay Anonymous, Court Says

A judge in Hillsborough County has ruled that a woman who won a $560 million Powerball jackpot can collect her cash without revealing her name. Only her hometown will be revealed. (Image credit: Steven Senne/AP) …read more. Source: ...

from Google Alert - anonymous http://ift.tt/2Gqp2Ds
via IFTTT

An Anonymous Fourteenth-Century Treatise on "Insolubles": Text and Study

An Anonymous Fourteenth-Century Treatise on "Insolubles": Text and Study. Spade, Paul Vincent; Brinkley, Richard. Keywords: Insolubles; Insolubilia; Richard Brinkley; Brinkley; Thomas Bradwardine; Bradwardine; William of Ockham; Ockham; John Dumbleton; Dumbleton; Robert Fland; Fland; ...

from Google Alert - anonymous http://ift.tt/2FEs8Cr
via IFTTT

Anonymous donor gives ponies to Virginia island herd

Anonymous donor gives ponies to Virginia island herd. Anonymous donor gives ponies to Virginia island herd. Published on 2018-03-13. Post navigation. Detroit to close all 3 municipal golf courses later this month · Parents charged after son fatally shot 9-year-old daughter. Recent Posts. HTC donates ...

from Google Alert - anonymous http://ift.tt/2Ik3mJv
via IFTTT

Where would Orioles rank if every MLB player were in his prime? - Sam Miller (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

[FD] hardwear.io CFP is Open & New Security Training in Berlin!

Greetings from hardwear.io! We would like to share few exciting updates that you can expect from hardwear.io in 2018! First of all, we are very proud to announce that hardwear.io is going to hold its first Security Training in Berlin! Dates: 26 – 27 April 2018 Venue: Novotel Am Tiergarten, Berlin, Germany Hardware Security Trainings: - Practical IOT Hacking by Aseem Jakhar - Low-Level Hardware Reversing by Javier-Vazquez Vidal & Ferdinand - Side-Channel Attacks 101 by Lejla Batina & Kostas Papagiannopoulos - Practical Car Hacking by Guillaume Heilles Registration is Open. Pre-con proces available till 31st March 2018. Hardwear.io Conference & Training 2018 will traditionally take place in The Hague for the 4th time! Mark your calendars to: Training: 11-12 September Conference: 13-14 September Venue: NH Hotels, The Hague, the Netherlands hardwear.io 2018 Call For Papers is Open till 9th May 2018! Get your research ready for another successful year! Best Regards, Yuliya Pliavaka Mob. +91-7720825835 <+91%2077208%2025835> / Linkedin www.hardwear.io Hardware Security Conference www.nullcon.net Nullcon Information Security Conference www.payatu.com Payatu Technologies

Source: Gmail -> IFTTT-> Blogger

[FD] DEWESoft X3 SP1 (64-bit) installer / Remote Internal Command Access - CVE-2018-7756

[FD] SQL Injection in Textpattern <= 4.6.2

============================================= MGC ALERT 2018-002 - Original release date: February 12, 2018 - Last revised: March 12, 2018 - Discovered by: Manuel García Cárdenas - Severity: 7,1/10 (CVSS Base Score) - CVE-ID: CVE-2018-7474 ============================================= I. VULNERABILITY

Source: Gmail -> IFTTT-> Blogger

Re: [FD] BitDefender Total Security 2018 - Insecure Pipe Permissions

Pseudonymous sex and anonymous experts

Trump and Stormy can use pseudonyms to protect privacy. So can cops. But when activists do it, they're prosecuted.

from Google Alert - anonymous http://ift.tt/2tITqpL
via IFTTT

CredSSP Flaw in Remote Desktop Protocol Affects All Versions of Windows

A critical vulnerability has been discovered in Credential Security Support Provider protocol (CredSSP) that affects all versions of Windows to date and could allow remote attackers to exploit RDP and WinRM to steal data and run malicious code. CredSSP protocol has been designed to be used by RDP (Remote Desktop Protocol) and Windows Remote Management (WinRM) that takes care of securely


from The Hacker News http://ift.tt/2IlZ8B8
via IFTTT

Anonymous donor gives Chincoteague ponies to Virginia herd

Anonymous donor gives Chincoteague ponies to Virginia herd. March 13, 2018 Travel. SALISBURY, Md. (AP) — Virginia's herd of wild Chincoteague ponies is growing, thanks to an anonymous donor. The Chincoteague Volunteer Fire Company spokeswoman Denise Bowden tells The Daily Times of ...

from Google Alert - anonymous http://ift.tt/2FxYpiy
via IFTTT

Call Her Jane Dough: New Hampshire Lottery Winner Can Stay Anonymous, Court Says

A New Hampshire lottery winner can keep her cash and her anonymity, a judge has ruled. The winner of a $560 Powerball jackpot in January had signed her.

from Google Alert - anonymous http://ift.tt/2FB8DyD
via IFTTT

13 Critical Flaws Discovered in AMD Ryzen and EPYC Processors

Security researchers have discovered 13 critical Spectre/Meltdown-like vulnerabilities throughout AMD's Ryzen and EPYC lines of processors that could allow attackers to access sensitive data, install persistent malware inside the chip, and gain full access to the compromised systems. All these vulnerabilities lie in the secure part of the AMD's Zen architecture processors and chipsets—


from The Hacker News http://ift.tt/2GlUP8h
via IFTTT

[FD] PayPal Inc Increases Bug Bounty Payments in 2018 up to 30.000$

Title: PayPal Inc Increases Bug Bounty Payments in 2018 up to 30.000$ URL: http://ift.tt/2pacngg #bugbounty #security #research #infosec

Source: Gmail -> IFTTT-> Blogger

[FD] PayPal Inc - New Venmo Bug Bounty Program

Title: PayPal Inc - New Venmo Bug Bounty Program URL: http://ift.tt/2CJFr2h

Source: Gmail -> IFTTT-> Blogger

ISS Daily Summary Report – 3/12/2018

Fluidics:  Today the crew set up the Fluidics experiment hardware and executed Run 1. Fluidics is a fluid mechanics experiment with two main objectives: perform a Slosh study to investigate fluid behavior under microgravity during satellite maneuvers, and a Wave Turbulence study to investigate the impact of capillary effect on wave turbulence without being masked … Continue reading "ISS Daily Summary Report – 3/12/2018"

from ISS On-Orbit Status Report http://ift.tt/2DnWTtt
via IFTTT

Ravens create $4.8M in cap space by releasing RB Danny Woodhead and OL Austin Howard - NFL Network (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

8th St.'s surf is Good

March 12, 2018 at 08:00PM, the surf is Good!

8th St. Summary


Surf: head high to 2 ft overhead
Maximum: 2.142m (7.03ft)
Minimum: 1.53m (5.02ft)

Maryland-Delaware Summary


from Surfline http://ift.tt/1kVmigH
via IFTTT

anonymous

Orangebag.nl, brands en basics. De grootste online fashion shop met uitgebreide collecties van meer dan honderd merken voor vrouwen, mannen en kinderen. Gezien in de bladen, bij ons te vinden.

from Google Alert - anonymous http://ift.tt/2FFf7J3
via IFTTT

[FD] [RT-SA-2017-012] Shopware Cart Accessible by Third-Party Websites

Advisory: Shopware Cart Accessible by Third-Party Websites RedTeam Pentesting discovered that the shopping cart implemented by Shopware offers an insecure API. Malicious, third-party websites may abuse this API to list, add or remove products from a user's cart. Details ======= Product: Shopware Affected Versions: 4.0.1 - 5.3.7 Fixed Versions: > 5.4.0 Vulnerability Type: Cross-Site Request Forgery Security Risk: low Vendor URL: https://shopware.com Vendor Status: fixed version released Advisory URL: http://ift.tt/2IpWZog Advisory Status: published CVE: GENERIC-MAP-NOMATCH CVE URL: http://ift.tt/1jQGmEN Introduction ============ "Shopware 5 is the next generation of open source e-commerce software made in Germany. Based on bleeding edge technologies like Symfony 2, Doctrine 2 & Zend Framework Shopware comes as the perfect platform for your next e-commerce project. Furthermore Shopware 5 provides an event-driven plugin system and an advanced hook system, giving you the ability to customize every part of the platform." (from the Shopware GitHub repository [1]) More Details ============ The Shopware web application provides users with a virtual shopping cart to collect products prior to checkout. This cart is displayed to the user as a modal sidebar appearing at the right edge of the browser window. Consequently, Shopware implements several API endpoints to allow JavaScript code to perform shopping cart operations. These endpoints are implemented in the "Shopware_Controllers_Frontend_Checkout" class and can be reached through the following paths: * /checkout/ajaxCart * /checkout/ajaxAddArticleCart * /checkout/ajaxDeleteArticleCart RedTeam Pentesting discovered that API endpoints support JSONP by specifying a URL parameter named callback. The origin of calls to the cart API is not validated. Therefore, any third-party website may make use of this API. If a customer of a Shopware shop visits a malicious, attacker-controlled website, JavaScript code on this site may access the user's shopping cart. Proof of Concept ================ The following JavaScript snippets demonstrate how to access the cart of a Shopware shop at "https://example.net" from a third-party website. The "getJSON" function of jQuery 3 is used to interface with the JSONP API. By running the following code, the contents of a cart may be retrieved. The result of the API call is displayed on the browser's developer console.

Source: Gmail -> IFTTT-> Blogger

Judge rules $560M Powerball jackpot winner can remain anonymous

Judge rules $560M Powerball jackpot winner can remain anonymous. Judge rules $560M Powerball jackpot winner can remain anonymous. Published on 2018-03-12By Samuel Chamberlain ...

from Google Alert - anonymous http://ift.tt/2tMdQ1k
via IFTTT

Update Samba Servers Immediately to Patch Password Reset and DoS Vulnerabilities

Samba has just released new security patches for two critical vulnerabilities that could allow unprivileged remote attackers to launch DoS attacks against servers and change any other users' passwords, including admin's. Samba is open-source software (re-implementation of SMB networking protocol) that runs on the majority of operating systems available today, including Windows, Linux, UNIX,


from The Hacker News http://ift.tt/2GoE5O0
via IFTTT

anonymous galaxy



from Google Alert - anonymous http://ift.tt/2p9JHDf
via IFTTT

Mac Software Mines Cryptocurrency in Exchange for Free Access to Premium Account

Nothing comes for free, especially online. Would you be okay with allowing a few paid services to mine cryptocurrencies using your system instead of paying the subscription fee? Most free websites and services often rely on advertising revenue to survive, but now there is a new way to make money—using customers’ computer to generate virtual currencies. It was found that a scheduling app,


from The Hacker News http://ift.tt/2Imc3Dd
via IFTTT

Monday, March 12, 2018

Dating A Banker Anonymous

WKYT Are Marriage, Matrimonial, recommend you another three website Meet singles in Nigeria and you do Banker Anonymous for Meet People Muslim Men Started Here profiles below HSV-1, HSV-2. Meet singles in Lagos Muslims in the world Mingle2s free Muslim personal many dating like location, ...

from Google Alert - anonymous http://ift.tt/2p2qtAr
via IFTTT

Judge

A judge ruled Monday that a New Hampshire woman who won a Powerball jackpot worth nearly $560 million can keep her identity private, but not her hometown.

from Google Alert - anonymous http://ift.tt/2p9q12A
via IFTTT

New Hampshire judge rules $560M Powerball winner can remain anonymous

(CONCORD, N.H.) — A judge in Concord, New Hampshire, ruled on Monday that the $560 Powerball jackpot winner who sued to keep remain anonymous, despite signing her ticket with her actual name, can keep the riches and her name withheld from the public. The New Hampshire Lottery ...

from Google Alert - anonymous http://ift.tt/2IkjVFr
via IFTTT

Anonymous Tip Leads to Arrest of Two Suspects

The Hart County Sheriff's office responded to a complaint on Tuesday at the Horse Cave Motel concerning Andre Goodman.

from Google Alert - anonymous http://ift.tt/2FCkUyX
via IFTTT

MOSQUITO Attack Allows Air-Gapped Computers to Covertly Exchange Data

The team of security researchers—who last month demonstrated how attackers could steal data from air-gapped computers protected inside a Faraday cage—are back with its new research showing how two (or more) air-gapped PCs placed in the same room can covertly exchange data via ultrasonic waves. Air-gapped computers are believed to be the most secure setup wherein the systems remain isolated


from The Hacker News http://ift.tt/2Dky3e3
via IFTTT

Saddle

Gold, brass, wood, processed rawhide. 1 set A saddle with gilt brass and embossed plates, support for palanquin, fenders of painted.

from Google Alert - anonymous http://ift.tt/2FzgwR3
via IFTTT

[FD] SEC Consult SA-20180312-0 :: Multiple Critical Vulnerabilities in SecurEnvoy SecurMail

SEC Consult Vulnerability Lab Security Advisory < 20180312-0 > ======================================================================= title: Multiple Critical Vulnerabilities product: SecurEnvoy SecurMail vulnerable version: 9.1.501 fixed version: 9.2.501 or hotfix patch "1_012018" CVE number: CVE-2018-7701, CVE-2018-7702, CVE-2018-7703, CVE-2018-7704, CVE-2018-7705, CVE-2018-7706, CVE-2018-7707 impact: Critical homepage: http://ift.tt/1JMJ2O3 found: 2017-11 by: W. Ettlinger (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult Europe | Asia | North America http://ift.tt/1mGHMNR ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

Way-too-early trade deadline preview: Why Orioles could be sellers and deal Manny Machado - Bradford Doolittle (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Ravens will release CB Lardarius Webb - Josina Anderson (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

The Pineapple Fund

Find out about the Pineapple Fund - A charitable organization started by an Anonymous donor who has given out $86 million in Bitcoin to many different charities and causes.

from Google Alert - anonymous http://ift.tt/2Glwuzm
via IFTTT

Can I be reimbursed for burial expenses?

SUPPORT THE FUTURE OF VETERANS ANONYMOUS. Help us do more and do it better. Together, we are building a connected, streamlined platform of services so that every single person who has been in the military can connect to all the support they need. We envision a one-click future for our vets.

from Google Alert - anonymous http://ift.tt/2DlHbPi
via IFTTT

Orioles to launch program allowing children age 9 and younger to attend games for free (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Python, argparse, and command line arguments

Today we are going to discuss a fundamental developer, engineer, and computer scientist skill — command line arguments.

Specifically, we’ll be discussing:

  • What are command line arguments
  • Why we use command line arguments
  • How to parse command line arguments with Python

Command line arguments are an elementary skill that you must learn how to use, especially if you are trying to apply more advanced computer vision, image processing, or deep learning concepts.

If you are new to command line arguments or do not know how to use them that’s okay! But you still need to take the time to educate yourself on how to use them — this post will help you do exactly that.

By the end of today’s post you will have a strong understanding of command line arguments, how they work, and how to use them.

Looking for the source code to this post?
Jump right to the downloads section.

Python, argparse, and command line arguments

Each day I receive 3-5 emails or comments from PyImageSearch readers who are struggling with command line arguments.

In fact, just an hour before I decided to write this blog post, I received the following email from Arjun:

Hey Adrian, I just downloaded the source code to your deep learning face detection blog post, but when I execute it I get the following error:

$ python detect_faces.py
usage: detect_faces.py [-h] -i IMAGE -p PROTOTXT -m MODEL [-c CONFIDENCE]
detect_faces.py: error: the following arguments are required: -i/–image, -p/–prototxt, -m/–model

Help!

Arjun is far from alone in struggling with this error.

Many other readers run into similar problems when working with command line arguments — but the honest truth is that nearly all of these errors can be avoided by taking the time to educate yourself on command line arguments.

Inside the rest of today’s post you’ll learn that command line arguments are a lot easier to work with than they seem (even if you have never used them before).

You’ll find that you do not have to modify a single line of code to work with them. And by the end of the post you’ll be able to work with command line arguments like a pro.

Let’s get started.

What are command line arguments?

Command line arguments are flags given to a program/script at runtime. They contain additional information for our program so that it can execute.

Not all programs have command line arguments as not all programs need them. That being said, on this blog we make extensive use of command line arguments in our Python scripts and I’d even go so far to say that 98% of the articles on this blog make use of them.

Why do we use command line arguments?

As stated, command line arguments give additional information to a program at runtime.

This allows us to give our program different input on the fly without changing the code.

You can draw the analogy that a command line argument is similar to a function parameter. If you know how functions are declared and called in various programming languages, then you’ll immediately feel at home when you discover how to use command line arguments.

Given that this is computer vision and image processing blog, a lot of the arguments you’ll see here are image paths or video paths.

In the case of deep learning, for which this blog is also known, you’ll see model paths or epoch counts as command line arguments.

In the remainder of today’s post we will learn about the Python argparse package via two script examples.

I’ll also be showing how PyCharm users can run a script without ever leaving PyCharm if they so choose.

The argparse Python library

Figure 1: My terminal screen is used to run a Python script with command line arguments.

First, let’s make a new script, naming it

simple_example.py
 :
# import the necessary packages
import argparse

# construct the argument parse and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-n", "--name", required=True,
        help="name of the user")
args = vars(ap.parse_args())

# display a friendly message to the user
print("Hi there {}, it's nice to meet you!".format(args["name"]))

First, we need the

argparse
  package, so we go ahead and import it on Line 2.

On Line 5 we instantiate the

ArgumentParser
  object as
ap
 .

Then on Lines 6 and 7 we add our only argument, 

--name
 . We must specify both shorthand (
-n
) and longhand versions (
--name
)  where either flag could be used in the command line. This is a required argument as is noted by
required=True
 .

The

help
  string from Line 7 will give additional information in the terminal if you need it. To view the command usage help you may enter the following in the terminal (output directly below):
$ python simple_example.py --help
usage: simple_example.py [-h] -n NAME

optional arguments:
  -h, --help            show this help message and exit
  -n NAME, --name NAME  name of the user

Notice how I specified all three of:

  1. The executable (
    python
    
     )
  2. Our Python script file (
    simple_example.py
    
     )
  3. And an argument (
    --help
    
     ) in order to print the usage.

Line 8 of the script instructs Python and the

argparse
  library to parse the command line arguments. I also call
vars
  on the object to turn the parsed command line arguments into a Python dictionary where the key to the dictionary is the name of the command line argument and the value is value of the dictionary supplied for the command line argument. To see this in action I would suggest inserting a
print(args)
  statement into the code.

While optional, I prefer converting the arguments object to a dictionary so I can execute the script via my command line or in a Jupyter Notebook. When using a Jupyter Notebook I can simply delete the command line arguments parsing code and insert a dictionary named

args
  with any hardcoded values.

Now you’re probably wondering: How can I access the value from the command line argument argument?

That’s simple, and there’s an example on Line 11 of the script.

In the format string, we specify

args["name"]
 . As you’ll see shortly, we’ll print our name to the screen dynamically with this command line argument.

Here are the steps we need to take in order to execute our

simple_example.py
  script:
  1. Step 1: Download the zip accompanying this blog post from the “Downloads” section into a location on your machine of your choosing (I would suggest the Desktop for sake of simplicity).
  2. Step 2: Open a terminal and change directory to where the zip lives.
  3. Step 3: Unzip.
  4. Step 4: Change directory again, this time into the new directory that was just extracted.
  5. Step 5: Execute the program (with command line arguments) and view the output.

On this blog, I show commands and their arguments in a “shell” codeblock. The

$
  at the beginning of the prompt is your queue that this is a terminal command and you should enter the command after the
$
  character along with your preferred arguments similar to or exactly as written.

I’ve taken care of Step 1 by downloading the code to this lesson to my Desktop in my PyImageSearch directory for easy access.

From there, I entered the following commands and generated the accompanying output:

$ cd ~/Desktop/PyImageSearch
$
$ unzip command-line-arguments.zip
...
$
$ cd command-line-arguments
$ pwd
/Users/adrianrosebrock/Desktop
$
$ python simple_example.py --name Adrian
Hi there Adrian, it's nice to meet you!
$
$ python simple_example.py --name Stephanie
Hi there Stephanie, it's nice to meet you!
$
$ python simple_example.py --name YourNameHere
Hi there YourNameHere, it's nice to meet you!

Let’s walk through what I’ve demonstrated in the terminal above while referring to Steps 2-5.

Step 2:

I changed directory to where I downloaded the zip for this lesson (Line 1).

I pressed the enter/return button on Line 2 to make the output easier to read. This is optional.

Step 3:

I unzipped the .zip file associated with this lesson (Line 3).

The

...
  on Line 4 signifies that there was output from the unzipping process but I am not showing it here. Note that output doesn’t have a preceding
$
 .

Step 4:

Next I need to change directory into the folder that I just unzipped (Line 6).

Just to be sure I’m where I need to be, I print my working directory on Line 7 with the output being shown on Line 8.

Step 5:

I execute the command with argument on Line 10. I’m specifying my name after the

--name
  flag. As long as my name doesn’t have any spaces, it will be displayed properly in the output.

The output is displayed on Line 11. Notice how the script dynamically shows my name exactly as I entered it in the command. Command line arguments are powerful and allow you to test your program with different input without changing a line of code.

Lines 13-17 demonstrate two additional examples that my script with no code changes will print a given name. Try it yourself with your own name…or maybe that of your nemesis.

Note: If I execute Step 5 without command line arguments (or with incorrect ones), I’ll see usage/error information printed as is shown.

$ python simple_example.py
usage: simple_example.py [-h] -n NAME
simple_example.py: error: argument -n/--name is required

This simple example helped us to grasp the concept of command line arguments; however it is not very useful to print a sentence containing our name.

In the next section I’ll provide a more practical example of using command line arguments

Parsing command line arguments with Python

Figure 2: Using the argparse Python package you can easily parse command line arguments in the terminal/command line.

In this next example we’ll be counting shapes in any given input image while annotating an output image that gets written to disk.

We’ll be making use of command line arguments again to specify the input image path and the output image path.

The image processing technicals will be light for this explanation — after all we’re just making this example for the purposes of command line arguments.

So let’s create a new file called

shape_counter.py
  and start coding:
Codeblock #1: Lines 1-20# import the necessary packages
import argparse
import imutils
import cv2

# construct the argument parser and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-i", "--input", required=True,
        help="path to input image")
ap.add_argument("-o", "--output", required=True,
        help="path to output image")
args = vars(ap.parse_args())

# load the input image from disk
image = cv2.imread(args["input"])

# convert the image to grayscale, blur it, and threshold it
gray = cv2.cvtColor(image, cv2.COLOR_BGR2GRAY)
blurred = cv2.GaussianBlur(gray, (5,5), 0)
thresh = cv2.threshold(blurred, 60, 255, cv2.THRESH_BINARY)[1]

We import

argparse
  on Line 2 — this is the package that will help us parse and access our command line arguments.

Then, on Lines 7-12 we parse two command line arguments. The code is very readable on these lines and you can see how to format an argument.

Let’s take the

--input
  argument as an example.

On Line 7 we instantiate the

ArgumentParser
  object as
ap
 .

Then on Lines 8 and 9 we add our

--input
  argument. We must specify shorthand and longhand versions (
-i
  and
--input
 ) where either flag could be used in the command line. This is a required argument as is noted by
required=True
 . The
help
  string will give additional information in the terminal as I demonstrated above.

Similarly, on Lines 10 and 11, we specify our

--output
  argument which is also required.

From there we load the image using the path. Remember, the input image path is contained in

args["input"]
 , so that is the parameter to
cv2.imread
 .

Simple, right?

The rest of the lines are image processing specific, so if you’ve landed on this blog without any OpenCV or image processing skills, you might want to poke around in the archives for further explanations on these concepts.

On Lines 18-20 we complete three operations:

  1. Convert the
    image
    
      to grayscale.
  2. Blur the grayscale image.
  3. Threshold the
    blurred
    
      image.

We’re ready to find and draw shape contours:

# extract contours from the image
cnts = cv2.findContours(thresh.copy(), cv2.RETR_EXTERNAL,
        cv2.CHAIN_APPROX_SIMPLE)
cnts = cnts[0] if imutils.is_cv2() else cnts[1]

# loop over the contours and draw them on the input image
for c in cnts:
        cv2.drawContours(image, [c], -1, (0, 0, 255), 2)

# display the total number of shapes on the image
text = "I found {} total shapes".format(len(cnts))
cv2.putText(image, text, (10, 20), cv2.FONT_HERSHEY_SIMPLEX, 0.5,
                (0, 0, 255), 2)

# write the output image to disk
cv2.imwrite(args["output"], image)

On Lines 23-25 we’re finding shape contours in the

thresh
  image.

From there, we draw the contours on the input image (Lines 28 and 29).

To learn more about contours, please see Finding Shapes in Images using Python and OpenCV and the contours tag archives. I also discuss contours and other image processing fundamentals in my book, Practical Python and OpenCV + Case Studies.

Then we assemble and put text on the image (Lines 32-34). The text contains the total number of shapes.

Lastly, we make use of our

--output
  image path argument to write the image to disk with
cv2.imwrite
  (Line 37).

Let’s execute the command with our two arguments:

$ python shape_counter.py --input input_01.png --output output_01.png

If you inspect your working directory, you’ll notice the

output_01.png
  image is now present:

Figure 3: Shapes have been counted with our Python + OpenCV script which takes in command line arguments.

Let’s execute the command again with different arguments:

$ python shape_counter.py --input input_02.png --output output_02.png

Again, you’ll notice a new output file in your directory:

output_02.png
 .

Figure 4: Three shapes have been detected with OpenCV and Python by simply changing the command line arguments.

Now, take a step back. and consider what we have done from a command line arguments perspective.

What we did here is use one script with no changes and provided it different arguments. The

--input
  argument contained the path/filename of the input image and likewise with
--output
 .

The concept is extremely simple and I hope this has cleared up how to use command line arguments. Before we wrap up this post, let’s take a look at what not to do.

How to not parse command line arguments

Every now and then I see readers who attempt to modify the code itself to accept command line arguments.

A great example of how not to parse command line arguments can be seen by starting with our command line arguments on Lines 6-12 from the previous section:

# construct the argument parser and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-i", "--input", required=True,
        help="path to input image")
ap.add_argument("-o", "--output", required=True,
        help="path to output image")
args = vars(ap.parse_args())

I’ve seen readers mistakenly try to update the argument parsing code to include the actual path to the input image:

# construct the argument parser and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-i", "C:\example\input_image.png", required=True,
        help="path to input image")
ap.add_argument("-o", "C:\example\output_image.png", required=True,
        help="path to output image")
args = vars(ap.parse_args())

Or in a list ditch effort, try to use the

help
  parameter to include the file path:
# construct the argument parser and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-i", "--input", required=True,
        help="/home/pi/my_input.png")
ap.add_argument("-o", "--output", required=True,
        help="/home/pi/output_image.png")
args = vars(ap.parse_args())

Keep in mind that the code itself does not need to be updated.

Take a second to open up your terminal, navigate to where your code lives, and then execute the script, making sure to provide the command line arguments.

I want to share another “gotcha” with you. Sometimes on this blog, my command line argument flags have a ‘-‘ (dash) in them such as

--features-db
 . It’s a little bit confusing and a bit of a nuissance that when grabbing the value contained by the argument, you need to use a ‘_’ (underscore).

This is demonstrated in this excerpt from the PyImageSearch Gurus course Content Based Image Retrieval Module:

# construct the argument parser and parse the arguments
ap = argparse.ArgumentParser()
ap.add_argument("-d", "--dataset", required=True, help="Path to the directory of indexed images")
ap.add_argument("-f", "--features-db", required=True, help="Path to the features database")
ap.add_argument("-c", "--codebook", required=True, help="Path to the codebook")
ap.add_argument("-o", "--output", required=True, help="Path to output directory")
args = vars(ap.parse_args())

# load the codebook and open the features database
vocab = pickle.loads(open(args["codebook"], "rb").read())
featuresDB = h5py.File(args["features_db"], mode="r")
print("[INFO] starting distance computations...")

Notice on the highlighted lines that I’ve defined the argument as

--features-db
 (with a dash), but I reference it by
args["features_db"]
 (with an underscore). This is because the
argparse
  Python library replaces dashes with underscores during the parsing.

You can do it!

Command line arguments may take some practice or getting used to if you are new to working in a terminal — but I have faith in you!

Don’t get discouraged.

Take your time.

And keep practicing.

Before you know it, you’ll have mastered command line arguments — take the time now to invest in your education and this valuable skill!

Setting your command line arguments via an IDE

From time to time I receive emails and blog comments asking how to run Python scripts from within their IDE.

About 90% of the time the question is similar to:

Hi Adrian,

Help! I can’t get the code to run.

How can I run the code from your blog post with PyCharm?

PyCharm and other IDEs are great tools that are packed with features. I love PyCharm and I use it daily.

While it’s possible to run a script with command line arguments in an IDE, I do not advise it.

You really need to get comfortable with the command line when you’re doing development. It actually saves time to use the terminal rather than to click around the GUI of your IDE and set up the arguments.

In an effort to serve the community, I’m providing two screencasts that were captured by David Hoffman — you’ll hear my familiar voice as I recorded the voiceover to explain the steps.

Step 1 is to grab the code to this tutorial (or another one on this blog if you are so inclined) via the “Downloads” section.

As you’ll see in the video, David downloaded the code into a folder residing on his desktop. Once you’ve put the download somewhere convenient for you, press play and follow along:

David and I took it a step further to demonstrate that you can select a virtual environment for your PyCharm run configuration.

The second example in this blog post requires that you have OpenCV installed.

Since David was a student of the PyImageSearch Gurus course, he used his

gurus
  virtual environment. You can select an environment on your own system that you’ve set up with OpenCV. If you don’t have such an environment, you should follow my OpenCV installation instructions.

To watch the more advanced PyCharm + Run Configuration which uses command line arguments, click play below.

As you can see, both examples are relatively easy. PyCharm provides a convenient way to test code without using your terminal. I’m still partial to using the terminal as I’ve always got it open anyway for the many tasks that PyCharm can’t handle.

Did your virtual environment not show up in PyCharm?

Don’t worry!

You might just need to browse to the

~/.virtualenvs
  folder and select your interpreter (all from within the PyCharm Run Configuration screen).

So, what’s next?

I hope this tutorial helped you get up to speed with command line arguments and how to use them. Chances are, if you’re reading this tutorial you may be a bit new to the Python programming language and the OpenCV library.

If so, that’s totally okay!

I was in the same boat as you when I first started working with Python years and years ago. I would spend hours trying new examples, running code, re-coding the entire script, re-running it, and trying to reproduce the results.

As you might imagine, I’m a big fan of learning by example, so a good next step would be to have some fun and read this blog post on detecting cats in images/videos. This tutorial is meant to be very hands-on and demonstrate how you can (quickly) build a Python + OpenCV application to detect the presence of cats in images. It also includes command line arguments so you can practice your skills from this post.

And if you’re really interested in leveling-up your computer vision skills, you should definitely check out my book, Practical Python and OpenCV + Case Studies. My book not only covers the basics of computer vision and image processing, but also teaches you how to solve real-world computer vision problems including face detection in images and video streamsobject tracking in video, and handwriting recognition.

Thousands of PyImageSearch readers have used Practical Python and OpenCV to learn both the fundamentals of the Python programming language and the OpenCV library at the same time. Each and every line of code in the book is thoroughly documented, ensuring you understand exactly what each piece of code is doing.

To learn more about my book, and how it can help you on your path to Python + OpenCV mastery, just click here.

Summary

In today’s blog post you learned how to utilize command line arguments using the Python programming language.

You also learned how to utilize the

argparse
  library for parsing command line arguments.

At this point you should now understand the fundamentals of command line arguments and the role they play in software, programs, and scripts.

As you saw, when used correctly, you do not have to modify any code to work with command line arguments — just open up a terminal, navigate to your Python script, and execute it!

Additionally, if you are new to the Python programming language and want to level up your Python coding skills, I have put together a list of my favorite resources to learn Python as a guest post on the SimpleProgrammer blog — be sure to give it a look.

If you enjoyed today’s blog post be sure enter your email address in the form below to be notified when future blog posts are published!

Downloads:

If you would like to download the code and images used in this post, please enter your email address in the form below. Not only will you get a .zip of the code, I’ll also send you a FREE 11-page Resource Guide on Computer Vision and Image Search Engines, including exclusive techniques that I don’t post on this blog! Sound good? If so, enter your email address and I’ll send you the code immediately!

The post Python, argparse, and command line arguments appeared first on PyImageSearch.



from PyImageSearch http://ift.tt/2Hty6Xw
via IFTTT

ISS Daily Summary Report – 3/09/2018

Electro-static Levitation Furnace (ELF):  Today the crew exchanged the sample cartridges within ELF to prepare for upcoming ground commanded operations.  The newly installed cartridge was found to be slightly misaligned and an activity is planned for next week to resolve the issue.  The ELF is an experimental facility designed to levitate, melt and solidify materials … Continue reading "ISS Daily Summary Report – 3/09/2018"

from ISS On-Orbit Status Report http://ift.tt/2IlYGDc
via IFTTT

Flying over the Earth at Night II


What would it be like to orbit the Earth? The International Space Station (ISS) does this every 90 minutes, and sometimes the astronauts on board take image sequences that are made into videos. The featured time-lapse video shows many visual spectacles of the dark Earth below. First, as the video begins, green and red auroras are visible on the upper left above white clouds. Soon city lights come into view, and it becomes clear you are flying over North America, eventually passing over Florida. In the second sequence you fly over Europe and Africa, eventually passing over the Nile River. Brief flashes of light are lightning in storms. Stars far in the distance can be seen rising through the greenish-gold glow of the Earth's atmosphere. via NASA http://ift.tt/2HrQDTJ

Sunday, March 11, 2018

Addictive Eaters Anonymous Meeting

Addictive Eaters Anonymous meeting held every Monday at 7.30pm in Teach Mhuire, 38 Lower Gardiner street, Dublin 1. Everyone is welcome. The...225303830.

from Google Alert - anonymous http://ift.tt/2p4vEyU
via IFTTT