University of Georgia researchers are hoping solar-powered wells will help preserve water quality and cattle health on isolated Georgia cattle farms. The system uses solar panels to power an electric well pump that provides water for cattle on isolated pastures. It has been used for the past year in Madison County where a farmer found that less than five hours of sunlight a day was enough to keep water tanks full. “Isolated livestock need water, and either the farmer has to take water to the livestock or we can use solar power to pump water (from a well),” said Gary Hawkins, the UGA College of Agricultural and Environmental Sciences researcher who designed and installed the system. The Madison County site is a demonstration system installed as part of a U.S. Department of Agriculture Natural Resource Conservation Service Conservation Innovation Grant. The grant provided funds to test how these systems work and how much they cost to operate. Hawkins and Madison County Extension agent Adam Speir hosted a field day on December 6 that attracted about 40 farmers from middle and northeast Georgia. The solar-powered pumps allow farmers to install watering troughs on their most isolated pastures, helping keep livestock out of streams and ponds. Allowing cows to wade into and drink from farm ponds and streams can have a severely negative impact on water quality across the state. Well-fed troughs also offer farmers a way to guard against drought, which often dries up surface water drinking sources rendering some pastures unsuitable. “It’s been shown that livestock can have higher weight gains on fresh water rather than from surface water,” Speir said. “It’s definitely a good risk management strategy for livestock producers.” One of the largest challenges to providing well water to pastures has been running the electrical lines needed to power the well pumps from the nearest electrical feeder line to far flung pastures. This system circumvents that problem. Where it could feasibly cost a farmer $20,000 to run an electrical line to a pasture, setting up the solar power stations costs about $8,000. The solar panel power stations can also be mounted on a trailer and moved from well to well depending on the location of the cattle, Hawkins said. “The power that’s used to pump the water from the well isn’t the largest benefit,” Speir said. “It’s the cost savings of not having to run electricity to that well if it’s a long way from the main electrical lines.” And the alternative energy system offers farmers a way to hedge against rising electricity or diesel prices.David Allen, the farmer who hosted the field day, installed a 1,500-gallon storage tank so that water would be ready for his cattle at night or on cloudy days. The storage tank replaces the need for expensive batteries that require maintenance.The hyper-efficient pump used in Allen’s system pumps about 6.9 gallons per minute and will fill his storage tank on just four hours of sunlight. “(Hawkins) sized the system so even if we just had four or five hours of sunlight you still would have the power you need to pump what you need for your situation,” Speir said. Farmers can contact their local USDA-NRCS office for potential cost-share assistance through the Environmental Quality Incentive Program (EQIP), which could reimburse them for a percentage of the solar powered system if this is included in the local working groups plans.
Mayor Alfredo Marañon III, for his part, said that the hospitalization fees and medication needs of the patients have already been paid by the city government. Food packs will also be distributed to them. (With a report from PNA/PN) As a Good Friday tradition, Sagay City residentsusually serve linugaw while observingfasting. Afuang added yesterday that the patientswere already discharged from the hospitals. BACOLOD City – For eating linugaw with intoxicating yam or locally known as kayos, around 80 persons from three villages in Sagay City, Negros Occidental were rushed to two hospitals. The CDRRMO brought the affectedresidents of barangays Lopez Jaena, Rizal and Poblacion 2, who complained ofstomach pains, nausea and vomiting, to the Alfredo E. Marañon Sr. MemorialDistrict Hospital (AEMSMDH) and the Lopez District Farmers Hospital, Inc. onApril 10. Wally Afuang, head of Sagay’s CityDisaster Risk Reduction and Management Office (CDRRMO), said that their rescueteam ferried 61 patients while the rest were assisted by village officials. Health personnel of the Alfredo E. Marañon Sr. Memorial District Hospital in Sagay City, Negros Occidental attend patients who fell ill after eating linugaw, which contained intoxicating yam on April 10. SAGAY CDRRMO Dr. Cyrille Adraneda, attendingphysician at the AEMSMDH, said that intoxicating yamcontains cyanide, according to the University of the Philippines-PhilippineGeneral Hospital National Poison Management and Control Center. Cyanide is a natural toxin found in somefood plants. Toxic substances, when not processed properly, can bring harm tohuman health and cause food poisoning. According to Afuang, a resident from oneof the villages harvested intoxicating yam and shared it to his relatives to beused as an ingredient in making linugaw.
0Shares0000He was swiftly joined by his Sweden team-mates after his goal separated the two sides with just over 20 minutes to playSAINT PETERSBURG, Russia, July 3 – Sweden reached the World Cup quarter-finals for the first time in 24 years after Emil Forsberg’s deflected shot earned a scrappy 1-0 win over Switzerland on Tuesday.This was far from a classic at the Saint Petersburg Stadium and if Colombia or England’s players were watching on from Moscow, they could be forgiven for feeling bullish about their prospects in the last eight. Switzerland’s Michael Lang was sent off in injury-time for a last-ditch push on Martin Olsson and referee Damir Skomina downgraded his penalty to a free-kick on the edge of the area. But the game was already up.Forsberg’s second-half strike, which deflected off the unfortunate Manuel Akanji, means Sweden are through to the World Cup last eight for the first time since 1994 in the United States.Their route to the quarters has not been easy and, what they have lost in the individual brilliance of Zlatan Ibrahimovic, they appear to have gained in grit, determination and collective spirit.Their next opponents would be foolish to take them lightly.The one blemish on the victory was a yellow card for defender Mikael Lustig, who will now be suspended for the quarter-final in Samara on Saturday.Both sides had been hampered by suspensions here too, with Switzerland more badly affected. They were without both Fabian Schaer and captain Stephan Lichtsteiner at the back, prompting Johan Djourou and Lang to come in.For Sweden, Gustav Svensson replaced Sebastian Larsson in midfield.After back-to-back penalty shoot-outs, Brazil versus Mexico and Belgium’s pulsating comeback against Japan, there was always a danger this last-16 tie would struggle to deliver, even on low expectations.It was a contest that lacked quality, particularly in the final third, where both teams were often painfully imprecise.Victor Lindelof slipped on the ball in the first 10 seconds and that set the tone for the first half, which was largely a collection of mishit passes, heavy touches and skewed shots.There were chances and Sweden had most of them. Marcus Berg blasted over when set free early on and then saw his finish blocked following a poor clearance by Swiss goalkeeper Yann Sommer.After a slow start, and Lustig’s foul on Josip Drmic, Switzerland grew in confidence and should have scored when Blerim Dzemaili snatched at Steven Zuber’s pull-back.At the other end, Albin Ekdal was even closer, and completely free, when he sidefooted Lustig’s cross over.Rather than let loose, both teams tightened after the interval, and Forsberg’s goal came out of the blue. With space on the edge of the box, his dummy did for Granit Xhaka before the shot was helped in by the outstretched foot of Akanji.Switzerland twice went close to grabbing an equaliser, as Djourou’s header dribbled agonisingly across the goal-line and substitute Haris Seferovic drew a late save from close range.Olsson was pushed in the back by Lang with only Sommer to beat in injury-time, with Skomina initially awarding a penalty but changing his decision to a free-kick after he consulted the replay. Lang’s red card stood and Sweden held on.0Shares0000(Visited 1 times, 1 visits today)
Tags: Free State Starsmartin kizzaPSLSC Villa Kizza (right) and Katsvairo (left) during their unveiling at Free States Stars (Agency Photo)South African Premiership side Free State Stars have unveiled Ugandan winger Martin Kizza as their new signing.Kizza called it quits with SC villa at the end of last season and has been linked with moves to Serbia and Croatia, that never materialised.After months minus competitive football, he now joins an ever increasing list of Ugandan plying in South AfricaAccording to Free state’s website, Kizza has penned a deal to feature for the club until the end of the season with an option for a two year deal if he impresses.“Kizza, meanwhile, has been drafted in from Ugandan giants SC Villa. The 21-year-old received his first call-up to the Ugandan national side in September last year….,” read a statement on the club website.Kizza was unveiled along with another January acquisition, Michelle Katsvairo.“The duo (Kizza and Michelle Katsvairo) have signed until the end of the season with the option to extend by a further two years.Kizza was one of the best perfomers in the league last season and earned a call up for the national team ahead of the Chan finals in 2018 that were held in Morocco.In the PSL, he joins compatriots Denis Onyango (Sundowns), Allan Kateregga (Cape Town City) and Godfrey Walusimbi (Kaizer Chiefs) as the only Ugandans in the league.Comments
17 January 2008South African winemakers exported more than R3-billion worth of wine in 2006, making the country the ninth largest exporter of the product, according to the International Trade Probe, a report compiled by the National Agricultural Marketing Association (NAMC).The report, released in November, aims to create general awareness of trade-related issues by reporting statistics and inviting viewpoints from people involved in trade.According to the report, wine was South Africa’s top exported agricultural product in 2006, with the value of exports amounting to some R3.565-billion and accounting for 11.3% of exports of produce.Business Report reported on Wednesday that the country’s wine exports amounted to just over US$530-million out of total global wine exports of $22.47-billion – leaving South Africa as the world’s ninth largest exporter of wine, just ahead of Argentina.According to the paper, the leading exporters of wine were France ($7.8-billion), Italy ($4-billion) and Australia ($2-billion).“The UK was by far the largest destination for local wines, with imports of $148.5-million, or 28% of overseas sales,” the publication reported.Earlier data from the SA Wine Industry and Information System (SAWIS) showed that South African wine exports were on the rise again, recording a 16% increase in volumes sold for the first 11 months of 2007, as compared to the same period in 2006.Commenting on the figures on Wines.co.za earlier this month, Wines of SA CEO Su Birch said the industry expected exports for the full year to exceed the 300-million litre mark, which would be a record for the country.Key to the increase in sales has been diversifying away from traditional markets like the UK and the Netherlands toward new consumers in countries like Sweden, Germany and even the United States.According to the International Trade Probe, other agricultural produce with significant export values included fresh and dried citrus fruit, earning R3.52-billion, and sugar, which earned R2.57-billion from exports.The report adds that South Africa has been a net exporter of agricultural produce since 1992, when imports were at their highest level, with the sector being an important earner of foreign currency.SAinfo reporter Want to use this article in your publication or on your website?See: Using SAinfo material
3 Areas of Your Business that Need Tech Now Cognitive Automation is the Immediate Future of… The mission is clear: infiltrate the target corporate network in order to obtain corporate data and perhaps even some intellectual property along the way. Tools on hand? Just you, a clean Internet-connected machine and 15 minutes of uninterrupted time.With just a little knowledge, that’s plenty of time to get inside a supposedly unbreachable network—just by building your own botnet.What’s A Botnet, Again?Simply put, a botnet is a network of malware-infected computers that are remote-controlled by a command server. Whoever controls the botnet can make those zombie computers do bad stuff—launching distributed denial-of-service attacks is one favorite pastime—or just exploit them to harvest passwords and to access other private information within, say, a corporate network.See also Does It Really Take A Government To Launch Cloud-Based Cyberattacks?Botnets have been overshadowed recently by criminal phishing expeditions, nation-state hacks and zero-day attacks, but they represent a type of threat no one should dismiss lightly. Botnet zombies are already pervasive inside home and business networks—in part because ordinary security measures often don’t protect against them.But it’s also true that setting up a botnet is ridiculously easy. Simon Mullis, systems engineer at the security vendor FireEye, recently walked me through the process of creating a malware package that would install and infect an end-user system on a target network, turning it into a zombie that would do our bidding.The premise of the exercise was straightforward: Infect a target system that started off completely free of malware. Of course, Mullis wasn’t blasting a hapless PC with zombie malware; he just targeted a clean Window virtual machine he’d set up himself. To control the bot, he created his own command-and-control system by spinning up a LAMP server on Amazon Web Service’s EC2 platform. (He used EC2 simply for its convenience; he could just as easily have run the demonstration from a physical server right there in his office.)How To Build A BotnetOpening his browser, Mullis searched for a botnet builder tool for malware known as Ice IX. Google’s top response to his particular query—which I’m not going to reveal here—yielded a site that offered the tool for free. Ice IX is a nasty little piece of malware that injects a fake Facebook page into a victim’s browser that collects credit card information under false pretenses.Any malware, though, would have done just as well. Using methods and tools that can be found online in minutes, a botnet creator can create a central command and control server and then use social engineering to inject malware onto the victim’s computer—by, say, emailing an innocuous looking but disguised file, or tricking a user into downloading the file from a compromised website.After downloading and installing the Ice IX kit software, Mullis started up its bot builder kit and began to set up the parameters for the malware—specifying, for instance, how often the malware would communicate with the command server, what actions it would undertake and even how it would hide from anti-virus scans. Much of this work was simply a matter of filling in appropriate fields in the Ice IX builder kit’s straightforward Windows interface.Some of the rest required editing the Ice IX kit’s powerful setup.txt script. Individual command lines in that script might direct the malware to take screenshots of pages that were visited by the zombie machine’s browser on a certain domain, such as a bank web site. Or have the malware tell the zombie machine’s browser to block sites (such as anti-virus updating sites) altogether. It can also redirect legitimate site URLs to malevolent sites intended to collect critical information—credit card numbers, Social Security numbers, passwords. You name it.Once he’d set the malware’s specifications, including the location of its controlling command server, Mullis uploaded Ice IX-produced files to his LAMP server. And presto—he had a fully configured botnet command server.Congratulations On Your New Botnet!Constructing the bot and prepping the command server is the first half of the equation. Next up is the task of encrypting and packing the infected file that will deliver containing the bot-installation malware on the target machine. The file is usually a PDF or document file, as those are the ones many users will click without thinking when faced with a phishing email or a malicious website.The malware delivery file is created with a ‘crypter and packer software, and is sent to the target for infection with the aforementioned social engineering practices. At this point, the zombied computer can now be under the author’s control.After delivering the malware package to his Windows virtual machine, Mullis simulated a user double-clicking on the file, packaged to appear as a PDF document. The file suddenly vanished from the desktop of the virtual Windows PC; its malware package was already running invisibly in the background, installing the bot software and seizing control. An unsuspecting user could easily be completely unaware that her system had just been zombified.The Bot Goes To WorkSuppose some unscrupulous individual had just zombified a corporate PC in the real world. What happens next?If the goal is network infiltration, the zombie can now read email and monitor traffic and communications, enabling its overseer to work his way through the organization in hopes of sniffing out passwords, identifying specific databases containing engineering secrets, and fingering users with greater administrative powers. At every opportunity, the botmaster spreads more malware to other computers, bolstering the ranks of his zombie horde within the corporate network and improving the odds that he’ll stumble across something juicy.And if he needs to grant his zombies new powers, all the botmaster has to do is upload new malware packages to the infected computers. This highlights one of the major dangers of botnets—they can be customized to perform just about any type of illicit activity the botmaster wants. It’s is a slower and less flashy method of attack than zero-day attacks that exploit known weaknesses in the software running on PCs and servers. But it can be every bit as effective.Botnet infiltration works so well in part because most people will tend to trust files that appear to have originated with other employees inside the company’s network. People will almost always pass along files from sources they know. And that’s a very large problem: Mullis estimated that “around 95% of the organizations we work with has this type of malware somewhere on their networks.”And while creating a botnet like this isn’t the sort of thing any person off the street could do, it’s uncomfortably close. You need some basic knowledge of how webservers are constructed—in particular, some familiarity with back-end databases like MySQL that have become ubiquitous for managing all the information stored on websites. If you’ve ever run a website, you could do this.See also BotClouds: How Botnets Now Offer Crime-As-A-ServiceThe website Mullis visited to download Ice IX kit in the first place listed the 14 steps for installing and using the software right on the download page. Step 14? “Profit.”Welcome To The Big LeaguesMullis’ point in running this demo was to underscore just how powerful malware-creation tools have become, how simple they are for relatively unsophisticated computer jockeys to use—and just how easy it is to find them. These tools are far beyond the level of sophistication the talented amateurs known as “script kiddies” once used: In just 13 minutes, anyone with a modicum of knowledge can use simplified point-and-click tools to build malware that can steal identities and corporate secrets alike without breaking a (metaphorical) sweat.See also The Hackers Are WinningAnd that’s just what Mullis found with a few Google searches; one can only imagine what tools the big-league hackers have at their disposal. That, Mullis said, is the real problem: Malware creation is frightenly easy to create for nearly all levels of hackers, thanks to the easy availability of these malware builder kits. The really dangerous malware is light-years beyond what prepackaged tools like the Ice IX kit can produce.Complicating this is the fact that anti-virus software is often unaware of this kind of malware. Zombie-type malware can only be detected if the anti-virus vendor has managed to get a signature for the malware in question. This is often difficult, since this malware takes active pains to avoid detection.In the arms race between hackers and users, the hackers are winning. The sheer volume of available malware-building kits makes that clear. Eventually, defenders should be able to catch up, but for now, it’s open season for incautious users. Image courtesy of Shutterstock IT + Project Management: A Love Affair Tags:#botnet#security Massive Non-Desk Workforce is an Opportunity fo… brian proffitt Related Posts
ICC Champions Trophy: Virat Kohli’s captaincy was fantastic against South Africa, says Sourav Ganguly
Are you looking for a thrilling career in the sports industry? Touch Football Australia is seeking suitably qualified applicants for the key leadership position of Sport Operations Manager – Victoria, based in our Melbourne branch office. Applications for this opportunity close at 5pm EST on Friday, 15 May 2015. To see the position description, please click on the attachment below. For further information or to lodge your application for this career opportunity, please email [email protected]stouch.com.au. Related Filespd_sops_sport_ops_manager_updated_format_01-pdfRelated LinksPosition Vacant
Kolkata: Baruipur Central Correctional Home (BCCH) has come up with several modern facilities for the inmates, as well as foolproof security for them. The state Correctional Administration (CA) department has developed the BCCH as a model correctional home which was inaugurated by Chief Minister Mamata Banerjee last year.A senior official of the CA department that the inmates are getting three star facilities in the Baruipur central correctional home. Two televisions have been set up on two opposite sides of walls so that the inmates can enjoy various TV programmes. Also Read – Bengal family worships Muslim girl as Goddess Durga in Kumari PujaChicken, fish and eggs are provided to the inmates on respective days. The BCCH has already been equipped with several facilities like a modern kitchen, a big dining space and more space for the inmates. The inmates of the Alipore Central Correctional Home (ACCH) were already shifted to Baruipur. Some more facilities are coming up. To ensure enough security and for better surveillance, a large number of CCTVs have been installed at Baruipur central correctional home. The CA department has given special emphasis on security at BCCH and have taken all possible measures for a fooproof security mechanism. According to a senior official of the department, steps are being taken to develop all the correctional homes along the line of BCCH. There are plans to set up gymnasium and separate infrastructure for playing games like hockey, football and badminton in other correctional homes. There will be facilities of a library and also an auditorium for holding workshops for the inmates.