Can a D&D5e Wizard cast a Ritual Spell as many times as he wants during the day?

I’m a newbie D&D5e Wizard player and was intrigued by the Ritual tag and it’s major benefits for Wizards.

I’d like to ask if a Ritual Spell in my Spellbook can be cast multiple times a day, without the need for a rest, assuming I have plentiful components to cast said spell? … Thanks, Walts

How does a company check the password received from your phone keypad during a call?

I had to call customer service recently regarding my 401(k) and robo call in the beginning asked me to enter my social security number using the keypad followed by a # and then asked for my account password using the keypad followed by # where special characters are *.

If the passwords are stored as hashes in their database, how is it possible that they can compare your input and verify it matches the password stored?

Punched in through a keypad, Hunter21 becomes 48683721 which would be indistinguishable from gtmtd7b1. It does not seem reasonable to compare all possible combinations of 48683721 to the hash because when including special characters and capitalization, it becomes more complex.

My only thought would be that they are storing my password as plaintext and comparing my keypad entered value to it and that would be concerning. I suppose when I first create the password they could convert it to the keypad equivalent number and hash/store that.

Is this common practice?

When during movement does Guardian Of Faith deal damage?

The Guardian of Faith spell states something like…

A Large spectral guardian appears and hovers for the duration in an unoccupied space of your choice that you can see within range. The guardian occupies that space and is indistinct except for a gleaming sword and shield emblazoned with the symbol of your deity.

Any creature hostile to you that moves to a space within 10 feet of the guardian must succeed on a Dexterity saving throw. The creature takes 20 radiant damage on a failed save, or half as much damage on a successful one. The guardian vanishes when it has dealt a total of 60 damage.

Is this assumed that as soon as a creature stops in one of the squares around the guardian, it instantly takes the damage (less the saving throw)? E.g. in some combat situations…

  • Creature ends its movement within range, will take damage.
  • Creature moves through the Guardian’s range but does not stop, no damage

Am I understanding this spell properly? Seems like it would only really be useful to place in difficult terrain, or at some sort of objective point where the party actually has to stop for a moment (e.g. to unlock a door, climb, etc).

Can you cast two spells from a Ring of spell storing during the same round using an action and a bonus action?

So I just got acquainted with the existence of Rings of spell storing.

I was wondering: If I had Beacon of Hope and Sanctuary stored in it, could I use the ring to cast both spells on the same turn? Or would it count as 2 actions instead of 1 action and 1 bonus action?

Month end handling during log archival in CPanel

I’ve got a website on shared hosting under CPanel 86.0.21. Under Metrics/"Raw access", there’s a checkbox to enable discarding previous month’s logs. How does that work, exactly?

The log processing runs every 24 hours, CPanel says that much. I’d assume it doesn’t happen exactly at midnight. Does it do the discarding on the first day of the next month? If so, what happens to the log records from the last day of the previous month – are those never archived?

Secure a virtual machine during a lab exercise

I recently started the Offensive Security AWAE course. On their connectivity guide page, they warn about the hazards of connecting to their labs:

you will be exposing your computers’ VPN IP to other students taking the course with you. Due to the nature of the course (and its participants!), your computer may be subjected to attacks originating from the VPN network. This is true even if you are located behind a NAT device.

I contacted them and asked what I could do to secure my PC (Windows 10 with the VMware VM, running Kali Linux), and their answer was, that I could "separate the IP segment of my VM with the host machine", but they couldn’t help me regarding how to achieve that.

Can someone please help me finding information how to achieve that with the VMware VM?

How realistic is the risk that someone ‘hacks’ into my machine?

Are there other measures I can take to reduce any risks?

Is revealing phone number during OTP verification process consifered vulnerability?

One of the common way of implementing 2FA is using phone number Text message or Call with OTP. As I can see, usually web services show something like "OTP was sent to the number +*********34". Is is done because revealing the number is considered a vulnerability? If yes, then which one, is it described anywhere? I guess it has something to do with not wanting to show too much info about the user. This info might be used be social engineering, but maybe there is something else?

Having a link to a trusted location with the description would be great as well.

When a user registers their mobile number during sign up, how can we verify that they really own the mobile number?

A lot of websites send a 4-digit or 6-digit one-time code to a mobile number via SMS or phone call when the user registers a mobile number on the website?

Is this a secure way to validate the ownership of mobile number? Are there any issues with it?

If it is not secure, are there any better alternatives?