## Microphone channel not detected in Unity

This is very specific to Unity.

A few testers are reporting that their microphone output isn’t being detected. The code below works for the vast majority of users, but certain microphones seem to be outputting on the wrong channel (R maybe)?

 AudioClip current_microphone_recording_clip = Microphone.Start(microphone_name, true, 30, 16000); 

How can I capture and analyze output from several channels? I don’t see any channels parameter for Microphone.Start

## Is malware programmed in high-level language will be more detected than malware programmed in low-level language?

I would like to know if a simple malware designed to execute commands received by a C&C will have the same result rate if programmed in :

• low-language like C++
• high-language like Python (converted to executable with a Python converter like auto-py-to-exe)

During the static and dynamic anlysis : Do Antivirus have the same facility to detect libraries used between low-level or high-level languages ?

I presume that rate detection of the malware will be more linked with the comportement of the malware?

## Detected if an undirected graph G has a cycle

Trying to understand complexity well, I found myself with the following problem.

Consider the following algorithm to detect if an undirected graph $$G = (V, E)$$ has a cycle.

Imagine that $$V = \{1 …|V|\}$$ (in other words that the vertices are numbered from $$1$$ to $$|V|$$ ). An explorer plants a flag on point $$1$$ and then moves on the graph according to the following principle.

• For each vertex $$u \in V$$ the different edges $$(u,v)$$ around the point $$u$$ can be ordered according to the size of $$v$$. So we can talk about the ith edge around $$u$$. . Note that if $$(u,v)$$ is the ith edge around $$u$$ it is possible that $$(v,u)$$ is not the ith edge around from $$v$$.
• If the explorer reaches the point $$u$$ of degree $$k$$ using the ith edge around $$u$$ then it starts from $$u$$ using the $$(i + 1)$$ th edge around from $$u$$. If $$i = k$$ then the explorer starts from the first edge around $$u$$.

As a first attempt, the explorer leaves point $$1$$ using the first edge around $$1$$. If it returns to point $$1$$ by a different edge then he concludes that $$G$$ contains a cycle.

If on the other hand it returns to point $$1$$ to across the same edge, then it begins its exploration again, starting by the second edge of point $$1$$, then the third edge and so on.

If he has exhausted all edges around $$1$$ and has always returned to $$1$$ by the same edge, so he plants his flag on point $$2$$ and so on.

My questions are :

1. how can we show that $$G$$ contains a cycle if and only if there is a point $$u$$ and an edge $$(u,v)$$ around $$u$$ such that the explorer leaving $$u$$ by the edge $$(u,v)$$ does not return to $$u$$ by $$(u,v)$$.
2. What is the is the space complexity of the algorithm described here?

## During kali installation on virtual box,avast detected a virus,how is it possible?

I was installing kaly on virtual box,on W7 host,and during the upgrading/installation package,avast has detected 2 threat,in particular on mimikaz package. Question is,how can avast “see” throug the VM?

The package hold for a bit on Host,before going in VM? I’ve always thought that 2 enviroment was isolated and separated. I downloaded kali from official site Thx for your guesses.

## Google Search Console: issues detected “Top Errors” Server Error (5xx). BUG?

Just got this email from Google Search Console:

This were the issues:

But when I inspected those live URL’s (using Google Search Console tool) they came back as “available to Google” and one of them was infact already indexed.

My app is a Single Page App built with React and Firebase.

I’m doing Server Side Rendering to robots using a Firebase Cloud Function ssrApp

There are no errors showing up on my function’s logs. Not on those dates (last crawled dates in the screen above), and no other dates.

QUESTION

I’m thinking this is a bug from Google Search. Has anyone seen this before?

Recently I got this other email from Google saying that some of my pages were blocked by robots.txt, which was clearly a bug (see link below). But the pages are different this time. They are not the same as the ones from the other error.

Google Search Console Warning: " Indexed, though blocked by robots.txt " (BUG)

## Does magic worn by the caster trigger the “magic detected” effect of the Detect Magic spell?

Would a wizard or cleric need to remove all magic items from their own person prior to casting the Detect Magic spell to know if there were any “unknown” magic around?

## Can you be detected while invisible?

If I have Invisibility running and see a Pitbull, does it automatically fail to detect me, or do we still make opposed stealth/evasion rolls?

On the one hand, Invisibility says it “will allow the Netrunner to pass unnoticed through the Net.” Plain reading: you’re not detected. (Except by SeeYa, which specifically counters invisibility.)

On the other hand, that would mean that one of the least expensive (in cost and memory usage) programs moots all the defenses of any system not employing SeeYa. And why does Invisibility even need a strength, if not to pit against detection programs’ strengths?

## Is this malware Gen:Variant.Fugrafa.15976 (B) [krnl.xmd] detected on NJStar Chinese word processor a false alarm?

I found this malware Gen:Variant.Fugrafa.15976 (B) [krnl.xmd] on NJStar Chinese word processor using Emisoft Emergency Kit to scan for malware. I have been using NJStar Chinese word processor for a long time and today is the first time I see this malware appearing during scan. I did a recent update of the virus definition.

I tried to google for more information on this malware but could not find anything. Could it be a false alarm?

Extracted from report;

C:\Program Files (x86)\NJStar Chinese WP6\update.dll    detected: Gen:Variant.Fugrafa.15976 (B) [krnl.xmd] 

## Brute-Force Attack detected in service log from IP(s)?

I got this ticket in my hosting control panel

Quote:

How can I block all these brute force attacks?

## What happens when an invisible creature is detected?

From the PHB, Appendix A on Conditions:

INVISIBLE

• An invisible creature is impossible to see without the aid of magic or a special sense. For the purpose of hiding, the creature is heavily obscured. The creature’s location can be detected by any noise it makes or any tracks it leaves.
• Attack rolls against the creature have disadvantage, and the creature’s attack rolls have advantage.

One of my players was sneaking around while invisible. Unfortunately, his Stealth roll failed to beat an NPC’s Passive Perception, so he was detected. What does ‘detected’ actually mean?

I ruled at the time that the NPC could tell someone was there but not exactly where (because she heard the noise made by someone moving), but RAW, did she know exactly where he was?