Can the original form of a familiar be detected by Truesight?

Further to the question "How to determine if an animal is a familiar or a regular beast?", can the original form of a familiar be detected by Truesight?

PHB pg 185 includes the following in the description of Truesight:

"perceives the original form of a shapechanger or a creature that is transformed by magic."

PHB pg 240 includes the following in the description of the Find Familiar spell:

Appearing in an unoccupied space within range, the familiar has the statistics of the chosen form, though it is a celestial, fey, or fiend (your choice) instead of a beast."

Where it gets more complicated is that also in the description of the Find Familiar spell, it indicates:

You gain the services of a familiar, a spirit that takes an animal form you choose

I found this question "Is a soul or spirit a creature?" regarding creatures and spirits, but I don’t believe the answer addresses whether a spirit is a creature.

I also found this question "What exactly is a fey fiend celestial spirit?" regarding spirits, but again I don’t believe it addresses whether a spirit is a creature (although it is very long so I may have missed something).

However, MM pg 279 includes this in the description of the Specter (Wights and Wraiths also have references to being spirits):

A specter is the angry, unfettered spirit of a humanoid

Accordingly, has the celestial, fey or fiend been "transformed by magic", and is its spirit a "creature", such that its original form would be apparent to someone with Truesight?

Can the alarm spell be detected by mundane means such as a normal perception check?

The alarm spell in the players handbook reads as follows:

You set an alarm against unwanted intrusion. Choose a door, a window, or an area within range that is no larger than a 20-foot cube. Until the spell ends, an alarm alerts you whenever a Tiny or larger creature touches or enters the warded area. When you cast the spell, you can designate creatures that won’t set off the alarm. You also choose whether the alarm is mental or audible. A mental alarm alerts you with a ping in your mind if you are within 1 mile of the warded area. This ping awakens you if you are sleeping. An audible alarm produces the sound of a hand bell for 10 seconds within 60 feet

Are there any examples in officially published modules or rulings, errata etc. that indicate whether the alarm spell is visible via a perception check vs the spells DC or whether the spell is invisible and must be detected through a spell such as detect magic or find traps?

We’ve detected an issue on your IAB TC string [Adsense-EU-Consent]

I’m having a problem with the new policy that applied to the EU

The issue is the following which i couldn’t understand nothing of it.

enter image description here

Error number 2.1a at

I added GDPR Plugin for my website, how ever the RED bar is still popping at the top

I’m asking if anyone know how to fix this

enter image description here

Chrome Vulnerabilities are detected in vulnerability scan even after upgraded with latest versions

Had few chrome vulnerabilities [CVE-2020-6420] detected by BI(Retina). Upgraded the affected machines to chrome version 84.0.4147.89. After re-scan still the same vulnerabilities are detected.

Anyone experienced it before ? please help to resolve

In what ways can a druid’s Wild Shape be detected?

I’m a relative newcomer to D&D 5th Ed. and am playing a druid fond of Wild Shape. I’d like to know in what ways it can be detected by NPCs (or even fellow PCs). It appears that this is a sort of debated subject, as to how and whether Detect Magic works on it or not.

I read through the question, Detecting Wild Shape with a Mythal, but I’ve no idea what a Mythal is. In portions of the question and its answers, there seems to be various interpretations of how Detect Magic might work (or not). It seems to me that the ability is a sort of innate or supernatural ability, and whether it is "magical" or not is somewhat ambiguous.

My reason for asking is that Detect Magic seems to be a relatively low-level spell and thus makes Wild Shape (for espionage, surveillance, scouting, etc.) somewhat less dependable.

In another answer by Neil Slater, this excerpt seems applicable:

…the consensus in groups I have played in … is that Detect Magic is equivalent to "Detect Spells, Spell-like Effects and Enchantments". That is, it will detect spells in progress, spell-like powers of monsters, and permanent enchantments on scrolls, and standard magic weapons. Under that interpretation, will not detect supernatural powers, such as a druid’s Wild Shape…

Is there a more recent consensus on how this mechanic might work?

Finally, Detect Magic aside, in what other ways can a druid’s Wild Shape be detected or nullified?

Is it possible for a passive tap to be detected or avoided by a malware or sophisticated actor?

I have been using a passive tap for my home network for years now, until recently I had to be more careful in order to try and find or better say investigate a possible infection.

Now I did not find any anomaly on the traffic of the said machines after hours of monitoring (I did not try VPN on those machines to prevent the malware being able to avoid detection) but I am facing a serious dilemma,

I was wondering,

Is it technically possible for a malware, or a sophisticated attacker to detect the presence of a listening/monitoring passive network tap?

Is it possible for a malware, a backdoor, a privacy infringing or spying product like Intel management engine (the OS on the many Intel CPUs) to wait for a VPN connection, Tor, or presence of a secure proxy or tunnel to establish their connection, hence making passive taps practically fruitless?

I am grateful for this community and trying to help keep the world a little bit safer. Thank you everyone.

“No engine matches” and “wrong engine detected” from previously imported and identified websites

I am a bit at a loss here…

I have read all the “no engine matches” threads here, but what I experience is different and I have no idea why.

Below I will state what I did and what happened.

– I have a list from previously scraped websites from hrefer and wanted to use them in SER
– Went to SER > options > Advanced > Tools > Import URLS (Identify platform and sort in) and imported that list
– After waiting one day the list was successfully imported and indeed I now had many files in “C:\Users\Administrator\AppData\Roaming\GSA Search Engine Ranker\site_list-identified” and all had the correct websites in them
– Now I wanted to use those identified websites for my new project in SER.
– To make things easier, I decided to only post on forums and therefore selected only “Forum Post” in “Type of backlinks to create” underneath options settings of the project
– Read post and made sure all settings were as stated under header “How can I use GSA as posting tool for my own list?”
– When I first started my new project a message popped up that no search engines were selected and that I needed to import my list
– Went to the main screen of SER, right clicked the project, Import target urls and selected “from site lists”
– There I selected only “Identified” and on the next screen all forum engines were pre-selected and therefore just clicked OK.
– Program said the list was imported successfully and “please note that current URL’s will have to be proceed to the end until you see something in the log”
– Started the project, here the strange things happened…
– I got many, many messages stating “No engine matches” and “wrong engine detected”.

This is very strange to me, as during import all sites were already matched to an engine, so how come that all of a sudden during posting the program states that the previously matched websites are now un-matched?

– Is the program for some reason re-identifying the previously identified websites? If so, why?
– Is it a problem with the new version? The identifying was with version 6.42 and posting was done with 6.43
– Has it something to do with “please note that current URL’s will have to be proceed to the end until you see something in the log”? As I don’t really understand what is meant by this?

Thanks for your input.

Microphone channel not detected in Unity

This is very specific to Unity.

A few testers are reporting that their microphone output isn’t being detected. The code below works for the vast majority of users, but certain microphones seem to be outputting on the wrong channel (R maybe)?

 AudioClip current_microphone_recording_clip = Microphone.Start(microphone_name, true, 30, 16000); 

How can I capture and analyze output from several channels? I don’t see any channels parameter for Microphone.Start

Is malware programmed in high-level language will be more detected than malware programmed in low-level language?

I would like to know if a simple malware designed to execute commands received by a C&C will have the same result rate if programmed in :

  • low-language like C++
  • high-language like Python (converted to executable with a Python converter like auto-py-to-exe)

During the static and dynamic anlysis : Do Antivirus have the same facility to detect libraries used between low-level or high-level languages ?

I presume that rate detection of the malware will be more linked with the comportement of the malware?

Detected if an undirected graph G has a cycle

Trying to understand complexity well, I found myself with the following problem.

Consider the following algorithm to detect if an undirected graph $ G = (V, E)$ has a cycle.

Imagine that $ V = \{1 …|V|\}$ (in other words that the vertices are numbered from $ 1$ to $ |V|$ ). An explorer plants a flag on point $ 1$ and then moves on the graph according to the following principle.

  • For each vertex $ u \in V$ the different edges $ (u,v)$ around the point $ u$ can be ordered according to the size of $ v$ . So we can talk about the ith edge around $ u$ . . Note that if $ (u,v)$ is the ith edge around $ u$ it is possible that $ (v,u)$ is not the ith edge around from $ v$ .
  • If the explorer reaches the point $ u$ of degree $ k$ using the ith edge around $ u$ then it starts from $ u$ using the $ (i + 1)$ th edge around from $ u$ . If $ i = k$ then the explorer starts from the first edge around $ u$ .

As a first attempt, the explorer leaves point $ 1$ using the first edge around $ 1$ . If it returns to point $ 1$ by a different edge then he concludes that $ G$ contains a cycle.

If on the other hand it returns to point $ 1$ to across the same edge, then it begins its exploration again, starting by the second edge of point $ 1$ , then the third edge and so on.

If he has exhausted all edges around $ 1$ and has always returned to $ 1$ by the same edge, so he plants his flag on point $ 2$ and so on.

My questions are :

  1. how can we show that $ G$ contains a cycle if and only if there is a point $ u$ and an edge $ (u,v)$ around $ u$ such that the explorer leaving $ u$ by the edge $ (u,v)$ does not return to $ u$ by $ (u,v)$ .
  2. What is the is the space complexity of the algorithm described here?