Detecting Creatures with Scent

My druid has the Wild Shape Focus spell, and one ability that it grants (via pest form) is “imprecise scent 30 ft.” I read through the relevant rules, and I’m not sure when this ability would be useful.

Imprecise Senses: Hearing is an imprecise sense– it cannot detect the full range of detail that a precise sense can. You can usually sense a creature automatically with an imprecise sense, but it has the hidden condition instead of the observed condition. It might be undetected by you if it’s using Stealth or is in an environment that distorts the sense, such as a noisy room in the case of hearing. In those cases, you have to use the Seek basic action to detect the creature. At best, an imprecise sense can be used to make an undetected creature (or one you didn’t even know was there) merely hidden– it can’t make the creature observed.

Scent: Scent involves sensing creatures or objects by smell, and is usually a vague sense. The range is listed in the ability, and it functions only if the creature or object being detected emits an aroma (for instance, incorporeal creatures usually do not exude an aroma).

Most creatures can hear [citation needed]. It seems like the only advantage to having scent is that, in the unlikely scenario that someone is hiding from you in a noisy room, you have a second imprecise ability you can use to sense them– but common sense holds that, while you can try to hide your noise pretty easily, you cannot hope to hide your scent without specific gear or magical assistance. Is there any rules difference between hiding from a creature with scent and hiding from a creature with hearing?

Detecting Logical Replication Error on Postgres v10 on AWS RDS CloudWatch metrics

https://www.postgresql.org/docs/10/logical-replication-restrictions.html States: “When the schema is changed on the publisher and replicated data starts arriving at the subscriber but does not fit into the table schema, replication will error until the schema is updated”

How do we detect/query for these errors on Postgres?

I tried

SELECT * FROM pg_stat_subscription; 

but it shows that it received the publisher’s message. It errored out when I changed publisher’s schema and subcriber stopped getting updates.

on AWS, the RDS cloudwatch metrics related to it is:

OldestReplicationSlotLag (The lagging size of the replica lagging the most in terms of WAL data received. Applies to PostgreSQL)

but I don’t think this is the right metric if I want to know if my updates have corrected applied to the subscriber replica database.

Detecting (and locating) rogue PXE server on a local area network

The computers on our office building are (via BIOS) configured to boot PXE as first option.
This is a useful setting, as long as, when needed, we can remotely restore non-booting machines and all that stuff.

But, if someone sets up a rogue PXE server, machines could be compromised at next reboot (i.e: automatic Windows reboots), so being able to detect such server is a must.

What methods could I use to test if there is any PXE Server running on my local network?
If possible, obtaining some info (like IP or MAC) to locate this rogue server could be fine.

Assumptions:

  • The network already has a DHCP server running. PXE and DHCP server are not on the same device/computer.

Detecting rotational symmetries of spatial structures

I have a spatial graph-like structure. The structure consists of vertices in the 3D space and connecting edges. Are there any algorithms available that would identify the rotational symmetries of these structures? In particular, I’m interested in all the rotational axis along which I can rotate the structure to overlap itself, as well as the degree of rotation. For example, an equilateral triangle (3 vertices + 3 edges) would have one rotational axis perpendicular to its plane, with a degree of 3 and 3 others in its plane, with a degree of 2 each. The closest I could find are molecular packages identifying the symmetry groups of molecular structures. I would prefer not to go that far as I’m only interested in rotational symmetries and not entire group theory description of structures.

Retroarch not detecting controller

I have an Xbox One controller I am trying to connect to Retroarch. It used to work very well in the past and for whatever reason has stopped. Thus far, nothing has helped. When I go to Settings > Input > User 1 Binds and try to to find the controller under “User 1 Device Index”, nothing shows up. I have used the arrow keys to look for it, but it just stays “Disabled”. So far, I have tried:

sudo snap connect retroarch:raw-usb sudo snap connect retroarch:joystick

reinstalling Retroarch from every source I can (3 different versions in the software center, also tried Snap)

building from source (can’t do it because I get an public key-related error for output after the command: sudo add-apt-repository ppa:libretro/stable )

tried changing the drivers (under Settings > Drivers) for input and joystick to every conceivable permutation

I’m tearing my hair out with this unsolvable problem, send help.

Algorithm for detecting overlaps

This is a real-world application, not a student assignment.

Suppose a list of events of that have startTime and endTime, and some overlap information. In pseudocode:

class Event {     Time startTime;     Time endTime;     bool overlapsStart;     bool overlapsEnd; } 

Events are considered overlaping if and only if their times intersect, but it’s not considered overlap if some event just “touches” another (starts exactly when some other finishes).

There are two types of event: NormalEvent and EmptyEvent.


What I want?

For each event in the list, I want to:

1) Remove all EmptyEvents that overlap another event of any type. In special, if some EmptyEvent overlaps another EmptyEvent, only one needs to be removed, so that the overlap ceases.

2) The NormalEvents are first ordered by startTime, and then their booleans are set:

  • overlapsStart is true if the event overlaps some event that comes before it.

  • overlapsEnd is true if the event overlaps some event that comes after it.


A trivial example:

event1 = 6:00AM ➜ 8:00AM  

and

event2 = 7:00AM ➜ 9:00AM 

then:

event1.overlapsStart == false event1.overlapsEnd == true  event2.overlapsStart == true event2.overlapsEnd == false 

Another example:

Now, this is what happens if some event “contains” another:

event1 = 6:00AM ➜ 9:00AM  

and

event2 = 7:00AM ➜ 8:00AM 

then, first event1 is put before event2, since it starts before. Then:

event1.overlapsStart == false event1.overlapsEnd == true  event2.overlapsStart == true event2.overlapsEnd == false 

Naive implementation: I could analyze each event in turn, one by one, looking at all other events. That’s easy, however this is too slow for a large number of events.

My question: What’s an efficient way of solving this?

Monitoring and detecting AdSense issues on your site

Our Ads Monitor service can continuously track AdSense ads displayed on your site and timely inform you of potential revenue affecting issues.

It works with the Ads Monitor agent that periodically visits your site as a regular user from a desktop or a mobile device and captures displayed ads. The service analyses the ads and reports to you in a convenient daily or weekly email digest. On the Ads Monitor site you can review the ads for any time period and…

Monitoring and detecting AdSense issues on your site

Monitoring and detecting AdSense issues on your site

Our Ads Monitor service can continuously track AdSense ads displayed on your site and timely inform you of potential revenue affecting issues.

It works with the Ads Monitor agent that periodically visits your site as a regular user from a desktop or a mobile device and captures displayed ads. The service analyses the ads and reports to you in a convenient daily or weekly email digest. On the Ads Monitor site you can review the ads for any time period and…

Monitoring and detecting AdSense issues on your site

TLS connection – Detecting data breach / manipulation [duplicate]

This question already has an answer here:

  • Protect SSL connections from MITM for users with modified clients 2 answers
  • How can I prevent a man-in-the-middle (MITM) attack on my Android app API? 2 answers

I need some help in creating a secure connection using TLS.

I have a downloadable software that connects to our server using TLS connection. We want to ensure that the data sent by client to the server is secure and cannot be seen or manipulated by the user of our software.

I have bundled our CA certificate with the software so that it can verify the host and man-in-the-middle attack. CA certificate is self-signed certificate generated by openssl.

+---------------------+                      +----------------+ |                     |                      |                | |                     |      TLS connection  |                | |  Client Software    +                      |                | |  + Our CA certificate +------------------->+  Server        | |                     +                      |                | |                     |                      |                | +---------------------+                      +----------------+ 

However, what happens if a user who downloaded the software spoofs the DNS/ARP poisoning, replaces CA certificate with the fake one and creates man-in-the-middle situation to manipulate/view the traffic. In this case, the CA validation will pass and client software will not be able to detect any abnormal behaviour.

+----------+------+           +------+-----------+          +-----------------+ |   Client +      |           | MITM +           |          |  Server         | |   Fake CA cert  |  TLS      | our CA cert      |    TLS   |                 | |                 +---------->+                  +--------->+                 | |                 |           |                  |          |                 | +-----------------+           +------------------+          +-----------------+ 

So possibly using CA certificate is not of much help here.

Any suggestions on how to ensure that the client software make a secure connection with server which can not be compromised by situation like one described above.

5 VirusTotal engines detecting the apk as malicious file. Should I be worried?

I don’t usually download apps from untrusted sources or which are not available on play store but for some reason I really need to install this apk and just to make sure it is not malicious, after downloading the apk I submitted it to Virus Total and there five engines detected the apk file.

So as an average Android user what I understand from the above detection that it is just a adware(after some googling). But there are many technical details about this on Virus Total report. So I don’t really understand it. I am no Android Security expert that’s why I am asking here if anyone can tell that this app is malicious or just a false positive?

PS1 I am not really asking for free Malware Analysis for me, what I am asking is just have a look on those detections(maybe you have seen them before or they are known) to help me decide that I should install that apk or not?

PS2 I am not supporting piracy or anything, asking in general about the detections VirusTotal have found. Those detection can be in any app not necessarily this one