## How do you use D&D Next monster statistics (e.g. in “Murder in Baldur’s Gate”) with 5e?

I would like to test 5e and have acquired the “Murder in Baldur’s Gate” adventure.

Now I find that the monster statistics in the adventure are “D&D Next”, the playtesting version of 5e. There are no classes for any NPC, just “Actions”, “Traits” and a Level for Encounter Building.

So: How do I use such statistics with 5e? Is there a conversion tool for “D&D Next” to 5e or am I missing something critical?

## Will this Setup Protect My Data Files from Malware (e.g. Ransomware)?

I set up an external drive for data backup (an SD card inside my laptop card slot). In addition, I connect with a cloud drive for offsite backup (an app that I run only when syncing files).

I always sign in and use my laptop as a ‘standard’ user. My external drive is set for UAC ‘read’ privilege only.

I then set my data sync app to run as admin only – meaning I need to type in the admin password before data can be synced to my external drive and to the cloud.

Of course I will remain vigilant about keeping OS and apps updated and avoid clicking email links or downloading unsolicited payloads,etc. — but in case I miss something and a ransomware comes through, will my Win 10 system stop that ransomware from encrypting my external drive?

## Proving Problems are Undecidable/ Semi decidable? E.g. Halting Problem, Membership Problem?

I am having issues finding similarities in different cases where a problem such as the Halting Problem or the Accept-Λ problem is reduced to the Membership problem to prove that it is semi-decidable and undecidable.

Each one is different to the last in some way which is a lot of information

I get the individual processes but is there a ‘method’ that I can apply to other problems that I haven’t come across before e.g. reducing the Uniform Halting Problem to the Halting Problem?

## Is it a security issue that underlying infrastructure (like e.g. Kubernetes cluster) can easily be revealed?

I have recently found out that a very common setup of Kubernetes for some use cases of access over TLS returns an invalid certificate with name Kubernetes Ingress Controller Fake Certificate. I.e. making it obvious to anyone that one is using Kubernetes.

So the question is not really so much about Kubernetes itself, but if disclosing such information about underlying infrastructure is considered undesirable or it does not matter?

P.S. Kuberentes information in more details:

Default installation of nginx ingress controller provides a “fallback” (called a default backend) that will respond to anything it does not know about. Sounds good, but the thing is that it does not have TLS configured, but does answer on port 443 as well and returns an (obviously) invalid certificate with name Kubernetes Ingress Controller Fake Certificate.

## Can someone hack my phone by sending me a file (e.g. PDF) via Whatsapp?

My work requires (and depends on) Whatsapp for daily sharing of files with many people (PDF, PowerPoint, Word, Images, Web links…), and I was wondering if it is possible that someone can hack our phones by sending us malware via Whatsapp.

For example, let’s say they send me a virus that pretends to be a legitimate PDF. Is it okay to “just install it” on Whatsapp? What happens if I installed it but never opened it? Can that affect my phone or I have to open/view it?

This is extremely important to me and my team, and I will share your answers with them because we seriously need more awareness on this. Thanks!

## how to display Sin[Subscript[\alpha,i]/2] as $s_{bar{\alpha}_2}$ using e.g., Makeboxes?

I learnt that we can use Makeboxes to display Sin[\alpha_i] as $$s_{\alpha_i}$$ as follows:

  (*MakeBoxes[Sin[Subscript[\[Alpha],i_]],StandardForm]:=  MakeBoxes[Subscript[Subscript["s",\[Alpha]],i],StandardForm] 

but can’t find a way to make Sin[Subscript[[Alpha],i]/2] display as $$s_{\bar{\alpha}_2}$$, regardless of in fraction form or in $$a/b$$ form. I have been looking for this for quite a long time, but with no luck. I checked the documentation, but can’t understand how Makeboxes works, especially in this context.

Could someone help to produce such a way so that it can take effect on both calculations involving fraction form or $$a/b$$ form? It’d be even better if some explanation on how to do it is provided.

## Does Mind Blast work through barriers (e.g. walls)?

I’m specifically looking at the elder brain’s mind blast. Based on the line of effect rules for spells, I would say no… But it’s not a spell really. Based on logic, I would say yes, because psychic attacks wouldn’t be affected by physical barriers (unless we’re assuming it’s creating a physical force with its mind?). Any thoughts?

## What are the downsides of asking your current users to participate in a study (e.g. for new functionality)?

What I mean is, you rarely see companies put some form of banner out there on their homepage saying:

“Hey, we’re developing some new stuff and would like our customer’s opinions on it. Take a quick test!”

Usually, they do those tests behind closed veils and with specifically filtered testers (e.g. in remote testing).

So my question is, what is the primary reason for that?

These thoughts come to mind as arguments against it:

• Only specific users would participate and skew the perspective. The average user, who is the main buyer, will ignore it; while the power or frequent users will use the chance to complain or inject their very specific wishes.
• Your users are also accustomed to the site by now and will most probably view any new design changes as “bad” and will vote for keeping what they already know.

On the other hand, these are the things that could be said in favor of it:

• You can get insight into problems that only long-term users might face, while new users do not even know they exist.
• You build more loyalty due to the trust you display for their opinion.

I guess I kind of answered my own question, as it usually depends on context. You use foreign, new users to test things that are supposed to attract new paying customers, while you can ask existing users when you want to improve deeper & more complex functionality.

But it seems you never see the second case, but most always the first one.

Does anyone have further points to add to the two lists or other thoughts related to that?

## Can a creature without its own will (e.g. zombies, golems) be a “willing creature” when controlled?

In D&D 5e it appears that willing creature is defined by consent.

Zombies, skeletons, and golems all essentially have no will, but while they are under the control of someone, can they be willing creatures for the purposes of spells?

For example, could a necromancer bring along her zombie minions when using the teleport spell?

## can goverment trace person based e.g. on motherboard hardware id?

Piece of hardware has hardware id, i am interested how hackers do it – when even if they are in internet cafe, or somewhere on public wifi and using TOR, or some other form of protection. Supposing goverment would somehow got their hardware id, would they be able to trace it back to them ? I am think hackers probably use some modified hardware, or stolen etc. But i am just curious how it is.