## Game physics of tearing apart

For a game I’m programming I’m looking for a kind of realistic mechanic for simulating the tearing apart of objects. Let me explain:

I have a given point p in a 2-dimensional space (possible later also more dimensions so a solution should be scalable, which i assume is not the problem) and I have a number of forces f1, f2, …, fn acting on this point p. So normally this point moves over time according to the combination of this forces. But now I’m looking for a kind of realistic mechanic that if forces vary strongly the point/objects gets split up in two points/objects that move in different directions.

Here a simple visual example:

three "similar" forces resulting in one single force (the point will move according to this single vector)

three forces that "tear" the point apart and result in two vectors (point will be split up in two new points that move according two the respective vector)

I amuse we need two give the point some kind of inner force, that defines how easy it is to tear the point apart?

By kind of realistic I mean something that doesn’t need to be extremely realistic according to the real world physics but something that would fell kind of real in a video game. So an additional benefit would be that it can be easily computed.

## Game physics of tearing apart

For a game I’m programming I’m looking for a kind of realistic mechanic for simulating the tearing apart of objects. Let me explain:

I have a given point p in a 2-dimensional space (possible later also more dimensions so a solution should be scalable, which i assume is not the problem) and I have a number of forces f1, f2, …, fn acting on this point p. So normally this point moves over time according to the combination of this forces. But now I’m looking for a kind of realistic mechanic that if forces vary strongly the point/objects gets split up in two points/objects that move in different directions.

Here a simple visual example:

three "similar" forces resulting in one single force (the point will move according to this single vector)

three forces that "tear" the point apart and result in two vectors (point will be split up in two new points that move according two the respective vector)

I amuse we need two give the point some kind of inner force, that defines how easy it is to tear the point apart?

By kind of realistic I mean something that doesn’t need to be extremely realistic according to the real world physics but something that would fell kind of real in a video game. So an additional benefit would be that it can be easily computed.

## Does Telekinetic Projectile allow choosing both projectile and target within range even if they are further apart than 30 feet?

Telekinetic Projectile allows you to "hurl [an] object that is within range […] at the target". The spell’s range is 30 feet.

My reading of this is that both the target and the object must be picked from within 30 feet from the caster. But nothing states that the path that the projectile flies (from object to target) must be less than 30 feet.

Are my assumptions correct or have I missed any relevant rules?

Also, if so, does the path between them have to be clear as to not provide Cover for the target?

``Object <- 30ft -> caster <- 30ft -> target        <-         ~60ft          -> ``

## How to leave trails that are equidistant apart from each other

I want bunch of circles to follow the player while keeping a distance apart. So far I have this:

``local p = {   x=0,   y=0,   life={     {x=0,y=0},     {x=0,y=0},     {x=0,y=0},     {x=0,y=0}   } }   local last={x=p.x,y=p.y} for l in all(p.life) do   l.x = lerp(last.x,l.x,0.5)   l.y = lerp(last.y,l.y,0.5)   circfill(l.x,l.y,2,7)   last={x=l.x,y=l.y} end ``

But this makes it so the circles collapse into each other and the player. I want the circles to have a distance between themselves and the player.

I’ve also tried this:

``  l.x = lerp(last.x*0.8,l.x,0.5) ``

This leaves a distance as I want but the trail is always on the upper left, barely following player.

I want the trail to stay always behind the player.

Probably I can achieve this by stop following if the distance is less than threshold.

## Attacking through a malicious HTML file apart from XSS through Javascript

I recently came across a behavior in a web application where the application (through the use of the header ‘Content-Disposition: attachment’) offers to download an HTML file instead of allowing it to get parsed by the browser. Interestingly, the GET requests to the URL that lets you download the HTML page passes the absolute path of the HTML file that will be downloaded – starting all the way from `/usr/local....<snip>/public/mypage.html` . If an attacker has the privilege to upload an HTML file to this location (public), apart from an XSS attack, what else can he/she do on the machine of a victim who downloads and open the HTML file crafted by the attacker.

I am aware of the XSS attacks , that one can do by injecting some malicious Javascript in the HTML file. Would like to know what else an attacker can get done outside of Javascript XSS attacks.

## Why are the 5e releases spaced so far apart?

Why do the 5e releases (modules/books) seem to be coming at such a slow pace?

I think there’s maybe two releases this year. At that rate, it seems like it will take forever to get things like alternate campaign settings, modules for high-level play, an official map of the Forgotten Realms, 5e approaches to other classic settings, a full explanation of the 5e canon – that kind of thing.

I have no problems filling in the blanks myself, and even adapting old stuff (I think 5e works very well for that), but I do like buying the official stuff when it comes out, and I wish more of it did.

Any reason things are coming at such a trickle? Was 4e that way too?

## Can one Hag be apart of multiple Covens, and gain the benefits? Can one Coven of Hags form multiple covens using the same set of Hags?

I’ve been messing around with Hag Covens and not that I don’t think they are weak or anything (because they are anything but), I just wanted to add some extra flare to a particular Hag I’ve got in my world.

I’m curious if it’s possible for one Hag to be apart of multiple Covens and the rules for that, or for three Hags to form more than one Coven using the same three hags, in order to gain more coven spells and such?

## Does formal specification of UX needs special language apart from the general specification languages?

I am fan of Alloy and CASL specification languages and my question is – what is the common practice regarding the formal methods in UX? Does UX require distinct specification languages? Generally one can use any specification language to describe: 1) the graphical layout of the screen and available commands; 2) the content of the available commands. UX just gives additional constraints on the specification, some non-logical (outside, empirical) guidelines of the content on the specification. Or I am wrong and computer science community has special methods for modern graphical web/mobile/TV/device/wearable programming and for modern UX programming?

## Does Facebook use any other CDN apart from Akamai? Encountered fbcdn.net subdomain that does not belong to Akamai

I received a notice from my third-party firewall application (Little Snitch) that when I had Facebook open, my browser (Chrome 46.0.2490.80 on El Capitan 10.11.1) was attempting to connect to “scontent.fper1-1.fna.fbcdn.net” and “scontent.fmel1-1.fna.fbcdn.net”. Having never seen these particular variations on the fbcdn domain before despite daily use of Facebook and having used LS for a while, it was a little suspicious to me.

Looking up the IP addresses (150.101.84.17 and 150.101.84.145 respectively) point to Internode, an ISP located in Adelaide, Australia (I live in Australia, but not Adelaide) and AFAIK, Facebook does not use their CDN and I don’t think Internode even provides such services.

But the domain is fbcdn.net. right? And if that’s so, which is legit domain used by Facebook for content/cookies etc, even if the IP addresses don’t resolve to Facebook or Akamai, it should be fine? Nothing suspicious?

## What is the significance of the other file extracted apart from the PE file in malware analysis

I noticed that whenever the contents of the malware is extracted, there will be a PE file and another file(‘2’). Is it an important file? Thanks (mal02 is the given file, 1.exe and 2 are the extracted contents)