This question was prompted by a long Wikipedia session with me reading tons of articles on cryptography, causing far more questions than it answered.
Let’s say that I and another person know each other. We plan to do something important and dangerous. We need to send messages back and forth long-distance. We conclude that all purchasable hardware and software is compromised, and therefore devise our own scheme:
- I pull out the network cable from my computer, randomly generate a huge table numbered like 1, 2, 3, 4, 5… both horizontally and vertically, filled with random alphabetic letters, fitting on a standard A4 paper.
- I print out two copies of this table.
- I destroy the computer.
- I keep one copy myself and give the other copy to the other person, who is sitting with me.
I tell him that, in order to send a message to me, or decrypt messages from me, he is to find any letter in the table corresponding to the character he needs to type in English, for example “A”, and check which number column and row it exists in. For example, it may be in the 3rd column on the 16th row. That means he is supposed to type “3” followed by a randomly picked letter followed by “16” on the blank paper, followed by another random letter. He is then to continue like this until he has a message such as:
First of all, how would anyone ever be able to tell that the letters are all nonsensical and not used for anything other than separating the numbers? And even if they did, what do the numbers mean? They have no way of knowing this unless they have a copy of our sheet which only exists in two copies in the world and was generated by an offline computer which is now physically destroyed.
And we wouldn’t be using the same column+row value each time for each letter, as they are found many times around the table.
And, what if to further complicate everything, we decide to write the messages in reverse? Or to do every other look-up in reverse, so that the columns and rows are swapped every other character? With just a few simple rules like that, it seems like they could never, ever decrypt our messages, even with the most powerful computers in the world.
I probably am making a fool out of myself here, but I seriously don’t understand how anyone, no matter how smart, given unlimited time, could ever break this cipher/encryption scheme which I just came up with quickly without having any expertise in the field. I clearly must be missing something.
The picture is of a Dell KB522 multimedia keyboard. I have just made a clean installation of my system with windows 10 and installed chrome with ublock. By pressing the “internet” key (the multimedia key above F1), my default browser will open. Now, this is getting tricky.
If my default browser is Edge, it will open edge as many times as I press this internet key.
If my default browser is chrome, it will open chrome one time with a blank tab but as soon as I hit this internet key a second time, chrome will navigate to delta-search dot com.
The drivers for the keyboard are the default keyboard driver from windows. Adware removal tool by TSA will find only the history entry and cache of delta-search after I hit the internet key mutiple times in chrome.
Question is, where does it come from? Is my chrome/google account the problem?
This is already happening for years. I switched my setup several times over the years, even had a complete hardware switch where I went from AMD to Intel but the kind of keyboard is the same.
Can a Bard use Glyph of Warding even though they do not “prepare” spells?
In looking at the reasonable boundaries of using Glyph of Warding in the game, I came across a dilemma in the wording of the spell when it comes to classes that do not have “prepared spells”, but have “known spells instead.
Glyph of Warding says that “you can store a prepared spell”, however this wording becomes an issue when interpreting whether a Bard can or cannot use this spell.
A bard does not per se “prepare” their spells. Yet, the spell is listed in the Bard Spells section in the Player’s Handbook (p.207). Hrumpf! It is listed as a Bard spell which normally suggest that it is intended to be used by a Bard as part of their magical repertoire, but the wording needs clarification.
So, for the purposes of interpreting the wording in Glyph of Warding, can we equate “prepared spell” with “known spell”, which would mean the Bard can actually use this spell?
Spell Glyph. You can store a prepared spell of 3rd level or lower in the glyph by casting it as part of creating the glyph. The spell must target a single creature or an area. The spell being stored has no immediate effect when cast in this way. When the glyph is triggered, the stored spell is cast. If the spell has a target, it targets the creature that triggered the glyph. If the spell affects an area, the area is centered on that creature. If the spell summons hostile creatures or creates harmful objects or traps, they appear as close as possible to the intruder and attack it. If the spell requires concentration, it lasts until the end of its full duration. (PHB p.245)
Special thanks to BBeast for kindly mentioning this issue in his answer to: Can you store Hex in a Glyph of Warding?
Windows 10 Home’s default account lock system for the admin account is not completely secure because there are multiple free password recovery tools & ways available that can be used by a non-admin to reset/bypass the admin password.
How to secure Windows 10 Home admin’s data & installed programs behind a password, even when programs like Office, Chrome, etc. are opened and running in the background with some documents/pages opened in it?
I have two tables
bar has column
a that references
foo.id as a foreign key. When creating table
foo, the error
column "a" referenced in foreign key constraint does not exist is given. This is obvious and intended. However, the creation of these two tables are handled by two different entities that of which I cannot control. It’s guaranteed that no data will be added to either table until both are successfully created, but the creation itself may happen out-of-order. Is there a way to force the creation of
bar even though
foo does not exist?
We are painting over bathroom partitions and metal doors in a restaurant. Seems repainting is about 1/4-1/3 the cost of replacement of items. They are bad, but not too bad. We are creating as near as possible a factory finish. Everything had to be taken apart, sanded, primed, painted. This is not ordinary primer or acrylic paint. In fact we had to sand away some amateurishly applied acrylic paints on some pieces and that was extra work. The paint and primer MUST be sprayed on to get as close to the factory powder coat finish as possible. If a powder coating company did the job, it was close to the cost of replacement, about $ 1,500 per room. We did both rooms for $ 1,000 and that included painting all the metal plus all the drywall and ceilings. They want the paint from the ceiling and walls. That’s fine, it is a custom color. It is about a quart for the walls and less than a quart for the ceilings. We have about a quart left over from the partitions. This is not exactly a custom color. It is the most popular of about 50 possible colors. We use it all the time. It is worth about $ 20 and we use it often. The paint can’t be brushed on or rolled on. It will look like crap. It must be sprayed. The client doesn’t fully grasp this is not an ordinary paint. Margins are too thin to give away something he couldn’t possibly use. Besides, it was not part of the work order. He is withholding the final payment on the whole place, about $ 1,000 because he wants this paint. Do I just give it to him and make him happy? My guess I will never work for him again and the place will not make it 6 months.
I have a few VPS and Databases in GCP, I can access them by whitelisting my IP, but just few months ago my ISP rollout their CGNAT and I was affected. As far as I know CGNAT, allow multiple subscriber to have a single public IP.
Is still safe to whitelist my IP or I need another means or extra layer of protection?
Can someone help???
I know I’m uploading relatively high-res photos, and yet they’re still not filling the frames of the image gallery I’m creating in the post.
I’ve set the switch to “Crop” in the gallery setting, and still when I preview on the front end, they’re not filling the frames.
Is there a code or site-wide solution to this? I’m managing so many posts and it’s such a hassle to have to go into “image editor” and tweak individual photos when possible.
Our group has two different interpretations of Wind Wall.
A wall of strong wind rises from the ground at a point you choose within range. You can make the wall up to 50 feet long, 15 feet high, and 1 foot thick. You can shape the wall in any way you choose so long as it makes one continuous path along the ground.
Interpretation 1: The wall must be vertical, and the wind blows straight upward.
Interpretation 2: The wall can be angled or even curved, as long as the wind is blowing at some upward angle, even if it’s just a few degrees above horizontal.
So, in the following diagram, is the leftmost configuration the only acceptable configuration, or do the two rightmost configurations also work?
Today I have written a very informative post about web developers who struggle to build beautiful websites. I use to struggle but after I learned these concepts my designs got better a lot. Hope you find it useful …