I’m an Ex Giants fan (bad management) and currently have no favorite teams, but I feel bad for Aaron Rodgers because he’s a nice guy and waited so long to return to the Superbowl. Packers played so well this year, how could 49ers beat them so badly?
So I was wondering since the Rogue Thief has the ability Use Magic Device which states –
You have learned enough about the workings of magic that you can improvise the use of items even when they are not intended for you. You ignore all class, race, and level requirements on the use of Magic Items
Would this ability overcome the class restrictions of a Wizard and allow a Thief Rogue to use it’s Spellbook?
The warlock’s One with Shadows eldritch invocation presents an interesting opportunity: it gives you invisibility without requiring concentration. Specifically (PHB, p. 111):
One with Shadows
Prerequisite: 5th level
When you are in an area of dim light or darkness, you can use your action to become invisible until you move or take an action or a reaction.
Unlike the invisibility spell, this would not necessarily end if the warlock became unconscious. However, the wording that says that this spell ends if you “move or take an action or a reaction” seems to imply that this invisibility is usually intended to last for a very short duration.
But it occurred to me that outside of combat, people often don’t do much that technically requires an action, especially if they are at rest. And at other times, it has been indicated that “moving” (for the purpose of magical triggers) refers to moving in the sense of spending movement to change your location on a 2D grid (not becoming prone, or standing up from prone).
So I was wondering: could a warlock use an action to Hide1, then use the One with Shadows invocation to become invisible, then simply lie down and go to sleep for 8 hours (for a long rest), while remaining invisible (and likely hidden)?
Put another way: is there some action, reaction, or move required during a long rest?
1 I included the part about Hiding because according to the rules as written, an unhidden creature that is invisible is still apparent to creatures around it (it can’t be seen, but they know where it is). So I wanted to include the hiding part to avoid that argument. And I did so beforehand, because using the Hide action while invisible would break the invisibility.
I had an idea a little while back to have an ID card with a QR code on it that you kept in your wallet. When you want to access your passwords (view them directly), you need your ID card and to scan it with your password protected iPhone. This then reveals your desired passwords.
But I’m thinking about it more and it doesn’t seem to offer any extra “security” or protection of your passwords. You have your phone password memorized, so that’s secure. Once you get into your phone and open the customized QR reading password app, you could just have direct access to your passwords right there instead of having the QR code layer. But, say we add the QR code step, of scanning the QR code to get access. Maybe it only works on your phone. So you have your phone password and a QR code protecting your password.
Does something like this offer any extra security? I’m thinking along the lines of n-factor auth and having an actual physical ID card in the mix.
If I know the hash of a program you intend to install is d306c9f6c5…, if I generate some other file that hashes to that value, I could wreak all sorts of havoc. – from https://nakamoto.com/hash-functions/
Theoretically, If you know the hash of a program one intends to install and you generate another file that hashes to that value what could you do?
Inspired by What is the lowest level at which a human can beat the 100m world record (or: the presumed human limit) without using magic?, which I read just after finishing the Athens Marathon last November. Earlier in 2019, Kenyan athlete Eliud Kipchoge ran the marathon distance (42.195 km, about 26.2 miles)
somewhat an order of magnitude faster than me in an amazing time of just under 2 hours, during the Ineos 1:59 Challenge.
Most D&D optimization attempts are aimed at short periods/distances (focused on combat situations), so for a change I’d like my (human) athlete to perform a feat of endurance: break the marathon distance record. What is the minimum level at which this can be achieved? A level 12 Monk has a base speed of 30ft + 40ft (assuming they’re unarmed) = 70ft, which, extrapolating the ‘Movement and Distance’ table on page 162 of my 3.5e Player’s Handbook translates to a Hustle speed of 14 miles an hour. A second hour of hustling incurs 1 point of nonlethal damage, and makes the character fatigued (I know how that feels) but doesn’t influence movement speed, so this monk should cross the finish line after 1:52 and a bit.
Since, unlike Usain Bolt, Eliud Kipchoge got some help from others (pacemakers, nutrition provided by a
horseback bike rider, pacing lasers) during this record attempt, our human athlete character is allowed to invoke the help of their fellow party members, but magic is still out of the question; otherwise, you could just hire a bunch of Sorcerers, located at specific intervals on the track, each casting Expeditious Retreats for a continuous 30ft/round bonus.
Assume D&D 3.5e rules, and any officially rule book is allowed (I only have the Core Rulebooks, which for instance (AFAICT) don’t contain a feat which increases movement). When in doubt, the contest rules in the linked question apply (except for the assistance of up to five party members, which are the same level as the athlete).
This question already has an answer here:
- Can you leave objects behind in the ethereal plane? 2 answers
Lets say you ready an action, that when you are on the ethereal plane you will drop your weapon. Does this work, would you return to the material plane without a weapon? Could you blink again and pick it back up later?
Blink: …you vanish from your current plane of existence and appear in the Etheral Plane… At the start of you next turn, and when the spell ends if you are on the Etheral Plane, you return to an unoccupied space of your choice that you can see within 10 feet of the space you vanished from.
A scenario where this could be very useful, imagine you are holding a ticking time bomb, you blink into the ethereal plane drop the bomb and blink back just in time, saving your party from the explosion.
So, as per the question already asks, my party is facing a more than deadly challenge due to some errors we made and I want my character to give a small speech in which, some part of it will include a hold person cast of the most powerful enemies.
Would that be able to work RAW?
I am a junior web developer,
all I know mostly is about web development ,
I have no skills and knowledge about system security ,
I know little about Linux OS.
I work in a company which is developing some embedded product,
So in this R&D department , some developers built a build-server for development ,
they make our own docker image , run docker , including CI/CD and gitlab service in this server ,
this build-server connect with AD server ,
our developer could add self’s public Key in this server ,
then remote login to this server with ssh and doing development in this server.
we call it is DevOps
this server only works in company’s intranet or VPN, not open for public internet.
above is question background information
Few months ago ,
I read some IT security blogs that talks about docker security issues ,
it says because of the architecture of docker is different from tranditional VM ,
so if the docker images is backdoored , then the whole system will be easily hacked.
I just wondering….
If I suppose that who built this build-server is not a good guy ,
he backdoored the docker images ,
is it possible that my account in this build-server could be hacked or usurp???
I mean even I use the public key and ssh login , without keyin password manually,
does this risk still exist??
the second question :
if the first question above is TRUE. then how could I do to protect my self.
I mean , if the bad guy usurp my account and doing something bad thing
(for example : leak development codebase of company by my account , or doing other attacks by my account.)
how could I do to prove I am innocent ??
here is a presupposition :
I can not discuss these suspicions thinking with my colleague ,
because I have no evidence about those things,
I just worry about these becoming true ,
so I want to doing something preventions, just in case.
I also have no authorization to check or validate the server.
What could I do?
backup my login logs of my laptop periodically ??
(but it seems irrelevent to the build-server)
could someone helps me , tell my what to do???
please , I need practical suggests.
I am mostly interested in the branch of web hacking (the one most used by bug hunters), usually the two types of hackers are the black hat hackers, those who attack, and the white hat hackers the ones who defends.
My question is: If someone learned web hacking for the purpose of defending and searching for bugs, how can this field of study affect his daily life protection and privacy? Would it be useful to learn this type of hacking for personal security? (i.e. the security of my laptop and network etc.)
And what could be some best branches of hacking that are useful for securing and protecting myself? And what other benefits would I get by learning hacking assuming that I am not considering it as my future career like working as cyber security or something?