Can spells with different types of components be cast in the same action?

Would someone who is casting something with a Somatic and Material component, say Minor Illusion, also be able to cast something with only a Verbal component, say Thaumaturgy, in the same action? I’m making a character who will be casting these cantrips on a regular basis for cosmetic changes, and want to know if there is an official ruling on this.

What does it mean to get an email from someone with a different actual sender?

I got a strange email and I just want to confirm my suspicions.

For background, I have my own email server which I set up using iRedMail on a VPS. I have an acquaintance who most likely has be on their address book, although I don’t have them on mine.

I got a highly suspect email with "Urgent! <acquaintance’s name>" as the subject, and a body that just said they need a favour. Looking at the headers of the email, I see that the Sender field is an unrelated university email address from another country, while the From field is my acquaintance’s name and a different email address than the one I had communicated with them in the past.

My hypothesis is that their account got hacked, the hacker stole their address book and is sending a scam to all of their contacts.

My fear is that my own server got hacked, or something. My email setup did not complain about this email even though I have virus scanning, and I expect that the regular checks (DKIM, SPF etc.) were done.

Can anyone confirm my hypothesis?

Applied Pi calculus: Evaluation context that distinguishes replication with different restrictions

For an exercise, I need to find an evaluation context $ C[\_]$ s.t. the transition systems of $ C[X]$ and $ C[Y]$ are different (=they are not bisimulation equivalent), where $ X$ and $ Y$ are the following processes:

$ $ X = ( \nu z) (!\overline{c}\langle z \rangle.0)$ $ and $ $ Y= !((\nu z) \overline{c}\langle z \rangle.0)$ $

Intuitively, the difference seems to be that in process $ X$ , all replications of the process output the same $ z$ on channel $ c$ , while in process $ Y$ , all processes output a different $ z$ . Is this correct? And how could this be used to construct an evaluation context such that $ C[X] \neq C[Y]$ ?

Do racial features which grant advantage on specific ability/skill checks provide a benefit skill checks made with different abilities?

The rules for making skill checks are usually cut and dried. If a character is making a check to see if they can swim against a current, this would usually be a Strength (Athletics) check.

But the rules allow for unique circumstances to require skill checks with atypical abilities.

For example, if you have to swim from an offshore island to the mainland, your DM might call for a Constitution check to see if you have the stamina to make it that far. In this case, your DM might allow you to apply your proficiency in Athletics and ask for a Constitution (Athletics) check.

Certain races afford the character advantage on specific checks (most commonly Wisdom (Perception) checks that involve smell or vision).

I can imagine a situation where a DM might request an Intelligence (Perception) check to see if a character is able to identify which of two glasses of wine is poisoned or a Constitution (Perception) check to see if a character can keep their eyes on something flying very close to the sun without squinting.

In these atypical scenarios, does the creature’s racial benefit still give them advantage on the check in spite of the fact that the fundamental ability being used with their skill is not the one explicitly cited in the description of their racial feature?

Is a LAN to LAN with different subnet configuration secure?

I plan to implement the following network configuration :

Internet [(cable A)]

Router A (192.168.0.x)[(WAN:cable A)(LAN1:cable B)(LAN2:)(LAN3:)(LAN4:)]

Router B (192.168.1.x)[(WAN:)(LAN1:cable B)(LAN2:)(LAN3:)(LAN4:)]

The first LAN port of router A is connected into the first LAN port of router B, but both routers are in a different subnet.

Usually, when I setup two routers together, I do a double NAT configuraton (LAN to WAN) or a LAN to LAN in the same subnet.

I know the following facts: In a double NAT configuration such as this one,

Internet [(cable A)]

Router A (192.168.0.x)[(WAN:cable A)(LAN1:cable B)(LAN2:)(LAN3:)(LAN4:)]

Router B (192.168.1.x)[(WAN:cable B)(LAN1:)(LAN2:)(LAN3:)(LAN4:)]

Hosts from router B can communicate with hosts from router A. Hosts from router A can’t communicate with hosts from router B.

In a LAN to LAN in the same subnet configuration, any hosts can communicate to any. It’s the same subnet.


In the network configuration I plan to implement, LAN to LAN but in a different subnet, I noticed that hosts from both network can’t be reached. Is this a secure way to isolate networks, at least better than double NAT ?

The connected router B gets an IP address in the router A subnet (192.168.0.x).

Also, I did not have to define any static routes to get internet access, I have difficulties to understand how this is possible since router A gateway does not ping.

Problems ranking in different countries for .com TLD

Certain page on my site shows up on the first page of ‘google.com’ but when I’m searching for the same phrase in google by changing the country in the Google’s search settings, it doesn’t show up on the 1st page.

Say for instance, if I search for this phrase: hire a zoho developer It appears on the Google’s first page.

But the same page is not showing up on the first page of the Google search results for the same phrase when I’m changing the country in the Google Search settings.

My competitors’ sites rank consistently across all geographical versions of Google. Is there something I am missing out on? 

Is it normal to see two different IP addresses in the arp table when you run the arp -a check?

Long story short I noticed that there are two different IP addresses in the ARP table when I ran the arp check. I suspect my computer might have been compromised because when I ran similar check on my other computer it only returns one IP address instead of two. I’m not running any VPN or anything if it would clear any misunderstanding, it’s why I’m puzzled by this.

SSH fingerprints(GitHub) differ when connecting to different routers

You can see that the two fingerprints differ, the second(PcziX…) is the legit that can be found here: https://help.github.com/en/github/authenticating-to-github/githubs-ssh-key-fingerprints

I couldn’t find anything about the first(nThbg6…) So, what changed between attempt 1 and 2?

Attempt 1: I setup an old router yesterday as a repeater with OpenWrt. It is connected with WiFi to the main router and with ethernet to my PC.

Attempt 2: Directly connect to router WiFi with my PC

attempt1:

▶ git push origin master The authenticity of host 'github.com (140.82.118.4)' can't be established. RSA key fingerprint is SHA256:PcziXGZE5iMp0Sm9dWn5qtfd/d7a+WOxIoQEL5pT33E. Are you sure you want to continue connecting (yes/no)? no Host key verification failed. fatal: Could not read from remote repository.  Please make sure you have the correct access rights and the repository exists. 

attempt2:

▶ git push origin master The authenticity of host 'github.com (140.82.118.4)' can't be established. RSA key fingerprint is SHA256:nThbg6kXUpJWGl7E1IGOCspRomTxdCARLviKw6E5SY8. Are you sure you want to continue connecting (yes/no)?  

I clean flashed the router yesterday and checked the checksum too.

Any ideas what’s going on?

Giving different passwords to the app servers to access the same database. Pros and Cons?

Let’s say we have

  • one db server.

  • three app servers with full database access.

Which scenario is the best?

  1. Each app server connects to that one database with different passwords.

Example: app srv 1 uses : “$ PSD$ Passwrod3” and app srv 2 uses “sometH$ ing else13pass” and so on.

  1. Every app server connects to that one database server with the same db password.

Technically, even if the servers have three different passwords, if one is hacked, the hacker will have full access to the database. So, we can use one password to make things easy for developers.

Is there any counter explanation that would justify using three different db passwords to “increase security”?

What could be the reasons for two different OTP messages for the same merchant when we do online transactions through debit card?

While I was doing a transaction (say adding money to one of the mobile wallets) through a SBI debit card, I could see two different OTP messages for different transactions. (Please refer to the image)

Say one time I am adding X amount, So I was getting OTP message from SBI but in the next transaction when I was adding Y amount, I was getting OTP message from BHIM SBI Pay.

What could be the reasons behind it? Is it becuase of the payment gateway (Like PayU,CC Avenue) or somethineg else? Has anyone else observed the OTP message coming in the name of BHIM SBI Pay / SBIPAY? AD-SBIPAY

TM-SBIOTP