Exploring previously unknown area with a drone algorithm [on hold]

I’m working on a drone platform for mapping indoor environment based on depth and image proccesing.
I’m looking for an algorithm for exploring previously unknown area, something like a house with a few rooms (assuming one floor for now). Cleaning robot exploring style.

For a start, I preferred to use software package/SDK, free/open source, but payment for a good SDK is also considerable.

It can be very naive and non optimized, and can assume 2D problem if it easier.

I google it, saw a lot of academic articles but I need something more practical for a start.

Any suggestion?

How to access ubuntu shared folder in vmware from local area network?

I share a folder inside ubuntu by right click – Local Network Share. when I check it with

net usershare info –long I am getting the result as

[testom] path=/home/edadmin/Public/testom comment= usershare_acl=Everyone:F, guest_ok=y

From windows explorer I tried the path like this\testom – Nothing comes up ? when I input IP only its saying folder is empty ? Please help me to resolve this I dont know much on linux. Please advice. Thank in advance

Detecting (and locating) rogue PXE server on a local area network

The computers on our office building are (via BIOS) configured to boot PXE as first option.
This is a useful setting, as long as, when needed, we can remotely restore non-booting machines and all that stuff.

But, if someone sets up a rogue PXE server, machines could be compromised at next reboot (i.e: automatic Windows reboots), so being able to detect such server is a must.

What methods could I use to test if there is any PXE Server running on my local network?
If possible, obtaining some info (like IP or MAC) to locate this rogue server could be fine.


  • The network already has a DHCP server running. PXE and DHCP server are not on the same device/computer.

What geographical area would be the easiest start for players in a Vampire : The Masquerade today?

After discussing to some friends that visits some country all over the world, I find myself thinking about “Where it will be easy to be a vampire?” (Yes I know, I ask myself weirds questions), that I transform into “What geographical area would be the easiest start for players in a Vampire : The Masquerade today?”

As I search, I decide to cut the world in 9 areas (I tried to use facts and only that, and it was really interesting):

  • Western Europe: No bearing weapons allowed, so hunting is easier in early night, but a lot of peoples doesn’t go outside in late night.
  • Eastern Europe: More weapons, weapon bearing allowed officially or in a roundabout way so hunting is harder, but government have more information control so the Masquerade is easier to preserve, but Firstlight will find you easier too.
  • North America: Weapon bearing allowed in most cases so hunting more dangerous, but their is peoples are outside all night long so it’s easier to find a prey, but everything is open 24/7 so you can live without needing a ghoul.
  • South America: Like the Eastern Europe, but with more nature, so Werewolves might go kill you more often
  • Africa: The whole area is more or less in war, live as human is hard, and so it is to Kindred
  • Middle East: The Antediluvians are here and awakens, so it’s not a good area to be a Kindred (or a human bein)
  • North Asia: Most part of North Asia is the Russia, so it’s like the Eastern Europe
  • South Asia: Governement is strong, so the masquerade is easier to preserve, but Firstlight will find you easier too. Kuei-Jins are here so maybe it’s hard to be a Kindred
  • Oceania: “The whole fauna and flora want to kill you” meme don’t apply to you, and weapon controll is getting bigger now, so hunting is easier

So I think Oceania is the easiest area to start as a vampire, followed by Western Europe and North America. But I might be wrong in the statements I made with my researches (as I just take 2 hours to do so).

Does Area of Effect spells reveal hidden or invisible enemies?

As a question that came up from this discussion about whether Mind Blank foils all attempts to gain information about the target, can area of effect spells be used to reveal enemies?

In the example of a fireball spell. Fireball does not have to target an enemy directly; the caster can specify a specific location, and the fireball effects the entire area within the spells radius.

But would that fireball reveal to the caster any hidden or invisible enemies or things in that area?

When does the Spike Growth spell’s area of effect become visible?

The spike growth spell states:

When a creature moves into or within the area, it takes 2d4 piercing damage for every 5 feet it travels.
The transformation of the ground is camouflaged to look natural. Any creature that can’t see the area at the time the spell is cast must make a Wisdom (Perception) check against your spell save DC to recognize the terrain as hazardous before entering it.

I’m uncertain how recognizing the terrain works:
Does succeeding on the Wisdom (Perception) check reveal the entire area of effect or only the square(s) you were about to enter?
If you take damage from spike growth are you now aware of the area of effect or is it still camouflaged?

Overlapped display: how to set a “blocked” area?

I would love to use two 24″ overlapped as they don’t fit into the cubicle I’m working on. I used Kubuntu’s “Displays” tool to overlap them and they work as expected but I would like that apps that are running in the display to the right (see picture) maximize only to the visible ( non-overlapped ) space, instead of the full width of the display.

How can I achieve something like this ?

Current settings:

Kubuntu Displays

Security aspect in the API gateway area

I am currently planning security testing procedures within an API gateway. We want to define in advance what we expect to be covered on the security level.

Scanning REST APIs (see http://docs.w3af.org/en/latest/scan-rest-apis.html)

  • SQL Injection
  • Command Injection
  • Header Injection
  • Cross-site scripting – reflected.
  • Cross-site scripting – stored.
  • Cross-site scripting – dom based.
  • Missing security headers
  • Sensitive Information disclosure in response headers
  • Sensitive Information disclosure in error messages
  • Missing Server Side input Validation
  • Unwanted use of HTTP methods
  • Improper HTTP Response

Vulnerabilities Test

  • Login (Anonymous user )
  • Login (Registert User)
  • UI (Authentification)
  • Weak Session ID Test
  • Sensitiv Information Disclosure – phpinfo.php Test
  • Weak Password Policy Test
  • Verb Tempering Test
  • Direct Dynamic Code Execution – Eval Injection
  • Cross site Scripting – reflected
  • SQL Injection
  • Command Injection.
  • Header Injection.
  • Cross-site scripting – stored.
  • Cross-site scripting – dom based.
  • Missing security headers.
  • Malicious JS script execution.
  • Using components with known vulnerabilities.
  • Jquery Vulnerabilities
  • Angularjs Vulnerabilities.
  • Bootstrap Vulnerabilities
  • Sensitive Information disclosure in response headers.
  • Sensitive Information disclosure in error messages.
  • Missing Server Side Validation.
  • Javascript Dynamic Code Execution.
  • Sensitive Data Exposure


Especially the factor penetration tests in the REST API area (here in the special gateway) is somehow not yet completely clarified on our site. Therefore we still need more information here.

Are the approaches we have given here sufficient? Here there are approaches to implement this on the one hand via a tooling correspondingly via a Jenkins automation.

The projects that are behind the API gateway are to be tested in the V area. This will also be done by an appropriate tooling that meets our requirements.

But are there points, rules, or approaches we have not yet thought about in this area?