SMIME email decryption using a private key – what am I doing wrong?

I have an encrypted .eml file and a private key. I’ve looked it up a lot on the internet but couldn’t find a way to decrypt the email using OpenSSL. I’ve tried this command:
smime -decrypt -in encrypted.eml inkey privatekey.key -out decrypted.eml
and each time I get this error:

OpenSSL> smime -decrypt -in encrypted.eml inkey privatekey.key -out decrypted.eml
No recipient certificate or key specified
smime: Use -help for summary.

I have also tried converting the private key to a .pem file but it still displays the same message. both files are in the same folder as the openssl.exe application is, before that I couldn’t get it to work at all.

I clearly am doing something wrong, what is it exactly?

How to stop malicious WIFI from doing (whatever it wants to do)?

Was reading this: How to check if a Wi-Fi network is safe to connect to?

When I came across some comments

I can redirect you to other pages without your interaction. Install key loggers. Heck if your browser runs activeX objects I could open a shell on your machine without your knowledge. That last example is rare these days but what’s not rare is tricking you into installing a shell for me, keylogging, session stealing, and redirection.

Or as I mentioned in my post, drop a crypto miner on your machine with the tool I wrote

Written by Anthony Russell in the comments of his answer.

So, this looks bad, obviously. What I want to know is how can I stop these attacks? Blocking javascript sounds like a good start, the original post also suggested to check my device for open ports (they did not demonstrate how to shut them though). What else? Is there a fool-proof way to prevent these sort of (virus injection? remote control?) attacks? I am not talking about logging, though. That’s a given when you connect to any network.

What I’m most worried about is virus injection. But other attacks (like key loggers) mentioned above are concerns too. Just share whatever comes to mind. I’m sure other people will fill in the blanks.

Sorry if I sound like a complete noob. That’s because I am. Sorry in advance.

Will carrier servers allow the ISP to see anything I’m doing even on a VPN?

AFAIK, if the connection to the VPN server is properly set up, the ISP is not able to see any of the traffic.

Nevertheless, I just found a worrying comment to this blog post:

I Just wanted to double check with the experts of this website: is it true what the guy states in his comment?

That is, if I am routing all my traffic through a mobile hotspot with a prepaid sim card, using a VPN on both devices (say a laptop and the mobile phone acting as hotspot), will the ISP be able to see anything but a connection getting into the VPN?

The answer to this question would have been a sound NO, but this guy adding the details of a “carrier server” and a prepaid SIM made me doubtful, as he seems to know more than me.

Mounted combat, movement, free actions, dismounting, then free attack. Am I doing it right?

I have lvl 6 Half Orc Paladin with the shield master feat riding a worg. The paladin is Spd 30 the Worg is speed 50. I move forward speed x and spear a human with the lance 1d12+str+smite. I move forward 5 feet(reach) then as a bonus action I use shield master to knock the human prone. After that I dismount, and use my extra attack to stab my long sword 1d8+str+smite into a the prone human. Can I do this?

If so how far away from the human can I start and complete the action?
2(dash)*30(Ork speed)=x-5(closing 5 feet)- 1/2*30(ork speed used for dismount) 60=x-5-1/2*30 60=x-20=40 X=40 feet? Or am I doing it all wrong?

Why does two different ways of doing the same thing differ so much?

a = 1.0 i = 0 while a != 0: … a = a/2 … i = i+1 … print(a,i) The above program ended at i=1075(I know that ideally the while loop shouldn’t have ended, and the reason why it stopped was because of the memory limit of the computer). Now, look at the next program. a = 1.0 b = 1.0 i = 0 while a+b != b: … a = a/2 … i = i+1 … print(a,i) This program ended at i=53. Why is there a big difference here? Why does the first program go up to 1075 iterations, while the latter goes up to 53? Also, when I tried a+b+c!=b+c, it went till just 52, furthermore a+b+c+d!=b+c+d went till 51. Why isn’t there a big difference here?

What is this function syntax doing? [duplicate]

I’m trying to work my way through another person’s notebook. I came across this function definition:

H[cpl_] :=   H[cpl] = Function[y,     Sqrt[(1. + y + RneuT[cpl][y] + RL[cpl]*y^4)/        2./(1 + RneuT[cpl][1]/2. + RL[cpl]/2.)]/y] 

What’s going on here with the H[cpl_] := H[cpl] = … syntax? This appears to be explicitly assigning the return value – which is, itself, a function – to the return value of this function. I can’t find any documentation on this syntax. Could anyone explain what’s going on or give me relevant link?