Players constantly capture enemies and question them, how to deal with it?

I’m running a campaign for five sixth level players and the bard has hypnotic pattern. Whenever the party runs into any fights with enemies who can speak, they always find some way of making an enemy incapacitated or doing non-lethal damage so they can question them later.

This always makes me have to think of things for that otherwise silent NPC to say and it feels bad to make them say nothing and “force” the party to just kill them.


Is there any smooth roleplaying way to handle this situation?

How to capture an input device and prevent it’s default behavior

I have an RFID tag reader. But it works like a HID device (like a keyboard). It sends keystrokes to the computer when a tag is scanned. When I open notepad and scan a tag – it types the ID one digit at a time. Is there a way to create a program to listen to this device (or this port) and capture (intercept) all input. So that the keystrokes wouldn’t appear on my system but I could assign my own events when the device sends and input. I don’t want it to show up on Notepad.

I realize that the implementation can differ depending on the OS and programming language used. Ideally, I would like to make this work on both Windows and Linux. I would prefer to use something like Node.js but I suppose C could also be good.

I would appreciate any hints or pointing me in the right direction.

enter image description here

The camera does not capture movements in z-axis

I want to make a simple drag and drop card in Unity, where the card pops up a bit towards the screen when the drag begins (lifting effect), and then drops down back on the table when the drag ends.

My script looks like this:

public class Draggable : MonoBehaviour, IBeginDragHandler, IDragHandler, IEndDragHandler {     void IBeginDragHandler.OnBeginDrag(PointerEventData eventData)     {         this.transform.position = new Vector3(this.transform.position.x, this.transform.position.y, this.transform.position.z - 10);     }      public void OnDrag(PointerEventData eventData)     {         this.transform.position = new Vector3(Input.mousePosition.x, Input.mousePosition.y, -10);      }      public void OnEndDrag(PointerEventData eventData)     {         this.transform.position = new Vector3(this.transform.position.x, this.transform.position.y, this.transform.position.z + 10);      }   } 

The card is an image, and it is child of the canvas. The render mode for the canvas is Screen Space - Overlay.

The drag works correctly, but I cannot capture the movements in the z-axis.
It does capture the movements in the z-axis when I change the render mode. However, then the card is too far away in the z-axis, and it moves with an offset with respect to the mouse pointer.

As far as I understood, I need to do something about realtive distances, but I how can I force the mouse pointer to be on z=0 plane.

Why Do All Capture Packets Have 802.11 Prorocol and Broadcast Destination? [closed]

I am new to networking and packet sniffing. I have wireshark installed on my ubuntu machine. I am capturing packets but they all have 802.11 as protocol and Broadcast destination. I have enabled promiscuous mode and I set my network interface to monitor mode using airmon-ng check kill and then airmon-ng start wls1. I am listenning on wls1mon on wireshark. I don’t know what is causing this. I also tried to be on the same network as my test PC. But when I do this, I don’t capture packets even though the PC is youtube and having traffic coming over. I tried with tshark and it is the same problem. When I watched some videos on youtube about this, they all captured packets with different protocols. However, I didn’t pay attention wether they were on monitor or managed mode? Can someone please help me? What I am doing wrong?

Capture macOS/IOS system HTTPS packets

I tried to analyze the https traffic of apps on my MacBook and iPhone with Charles with SSL proxy (I use HTTP proxy for IOS and installed and trusted Charles certificate). I managed to decrypt most HTTPS traffic, however, when I discovered that I cannot connect to App Store on my iPhone when I was on the proxy, I realized none of apple’s traffic (AppStore, iCloud, etc) are decrypted by Charles (Charles was able of detecting those traffic by showing the domain name, but it said the client SSL handshake failed, same on macOS as well as IOS).

My speculation is that instead of relying on the system certificates, Apple uses a different, more restricted set of certificates to verify their own services (system level). I also heard about a technology called SSL pinning, which can achieve this feature.

I am not sure whether this is the case, if it is, how can we bypass this restriction?

How to capture a Genie?

I seem to remember there being a way that a character could capture Outsiders and seal these creatures away in small items, in order to create the stereotypical “Genie captured in an object” trope. However, the details of the process currently elude me.

Planar binding seemed like a good way to go, but as far as I can see it only traps such a creature within a particular space- Not in an object. So, if I would want to, for example, capture a genie inside a gemstone, how would I go about doing this?

Unable to See Network Clients during Deauth Capture Issue

bit of a general question here, would hope to learn more about exactly what is going on technically.

I’m attempting to test and capture a handshake from my own AP (an older Apple Airport router).

I’ve used various tools from airgeddon to wifite to fluxion to manual airodump-ng and the weird thing is: I cannot see a single client connect to the AP.

But my laptop and two mobile devices are connected. I’ve even disabled/enabled WiFi on the mobile device during a fluxion passive listening attack, mdk3 doesn’t work, nothing sees any clients.

I’ve also run the same experiment on a new Airport Extreme AP, and it captures just fine and sees clients.

For this, I’m using an ALFA adapter with the Ralink RT3070 chipset (802.11b/g/n) @ 2.5Ghz.

I’ll boot up the Nano which I just got recently next, but just curious as to WHY various tools are unable to see clients, therefore unable to deauth (or even passively listen) to ultimately capture the CAP