Skip to main content

Fwd: [URGENT] CRIME ALERT

On October 5, at 10:05 p.m., a UIC student was the victim of an
off-campus strong-arm robbery in the 2300 block of West Flournoy.  The
victim stated he was approached from the rear by two subjects, who
punched him in the face and demanded his book bag.  The student
surrendered his belongings, and the offenders fled on foot west on
Flournoy and then northbound on Western Avenue.  The victim suffered
minor facial contusions but refused medical attention.

UIC Police offer the following security tips:

-Be aware of your surroundings. Use all five of your senses to be
alert for danger, and when walking alone, don't wear headphones or
earbuds.
-Try to travel in groups when possible, particularly after dark.
-Use well-lit walkways.
-On campus, look for the location of the nearest emergency call box
(there are more than 1,500 across campus.)
-The emergency number for UIC Police is 5-5555 or 312-355-5555, which
should be set on speed-dial on your cell phone.
-Report crime promptly to police.

The UICPD/CPD Joint Robbery Task Force will conduct the follow-up
investigation.  Both offenders are described as black males, 15-17
years old, 5-7 to 5-9 in height and 150-170 pounds, with brown eyes,
dark complexions, and black hair in buzz-cut style, wearing dark
clothes. Anyone with information is asked to call UIC Police at
312-996-2830.

Approximate location mapped: http://g.co/maps/5dz63

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...