## HELP! – Can’t create not even 1 article link!

Hi,
Today, for some reason, i can’r create not even article link.
I check my proxies and they are working fine. I try to change setting, cleaning cache but nothing fixes the issue.
I also get many captchas like the one in the screenshot starting from yesterday.

Right now ONLY blog comments are working…
Any idea what happen?

Thanks.

## Fonts appear darker even using the same rgba values

I’m trying to build a layout like google drive, and have managed to get as close as possible. One thing I’ve noticed is, even when I’m using the same font roboto 13px and the same rgba values rgba(0,0,0,0.72): the font on my site appears a bit darker than the one on google’s site. How can this be happening? When looking at the two in Chrome Dev Tools there’s a difference in contrast. How do I set this contrast value? Google’s is 9.29 and mine is 1.42. Can this be causing the difference?

My Image

## Why is a threshold determined for Byzantine Fault Tolerance of an “Asynchronous” network? (where it cannot tolerate even one faulty node)

In following answer (LINK: https://bitcoin.stackexchange.com/a/58908/41513), it has been shown that for Asynchronous Byzantine Agreement:

“we cannot tolerate 1/3 or more of the nodes being dishonest or we lose either safety or liveness.”

For this proof, the following conditions/requirements has been considered:

1. Our system is asynchronous.
2. Some participants may be malicious.
3. We want safety.
4. We want liveness.

A fundamental question is that:

With considering the well-known paper titled: “Impossibility of Distributed Consensus with One Faulty Process” (LINK: https://apps.dtic.mil/dtic/tr/fulltext/u2/a132503.pdf)

showing that:

no completely asynchronous consensus protocol can tolerate even a single unannounced process death,

Can we still assume that the network is asynchronous ? As in that case the network cannot tolerate even one faulty node.

## Does Astral Projection makes a vampire even more vulnerable or harder to kill?

A vampire still have a soul (spirit) in 3.5 as far as I know so since Astral projection states:¸

If the cord is broken, you are killed, astrally and physically

Dying ”physically” or having it’s body destroyed only forces the vampire to go to mist form and go into it’s resting place.

Being killed ”astrally” just mean your new form ”died” and you normally return to your physical body, if the silvery cord is severed then even your material body dies, but that does not affect the vampire. (I might be wrong here)

As far as I understand, it would be clever for a vampire to be even more careful and only go out in his astral form (wich is not exclusive to the Astral plane, even if you are transported there, you can come back with your astral form in the material plane if I remember correctly from a post I saw). His material body would be not too far from it’s resting place, in an extremely secure area, so if it dies, it would just be in his coffin and regenerate. (a fortress with a lot of adamantium doors to break etc. before reaching one of it’s many resting place in a demi-plane so good luck reaching it in 1 hour ;))

## How to create CFG for $L := \{x| \#_0(x) \text{ is even and } \#_1(x) \text{ is odd}\}$

Create an CFG for all strings over {0, 1} that have the an even number of 0’s and an odd number of 1’s.

Also, I have a hint HINT: It may be easier to come up with 4 CFGs – even 0’s, even 1’s, odd 0’s odd 1’s, even 0’s odd 1’s, odd 1’s, even 0’s – and combine them …

But I can’t understand how it works

Who can help?

## How would anyone ever break even this basic, amateurish cipher/encryption scheme?

This question was prompted by a long Wikipedia session with me reading tons of articles on cryptography, causing far more questions than it answered.

Let’s say that I and another person know each other. We plan to do something important and dangerous. We need to send messages back and forth long-distance. We conclude that all purchasable hardware and software is compromised, and therefore devise our own scheme:

1. I pull out the network cable from my computer, randomly generate a huge table numbered like 1, 2, 3, 4, 5… both horizontally and vertically, filled with random alphabetic letters, fitting on a standard A4 paper.
2. I print out two copies of this table.
3. I destroy the computer.
4. I keep one copy myself and give the other copy to the other person, who is sitting with me.
5. I tell him that, in order to send a message to me, or decrypt messages from me, he is to find any letter in the table corresponding to the character he needs to type in English, for example “A”, and check which number column and row it exists in. For example, it may be in the 3rd column on the 16th row. That means he is supposed to type “3” followed by a randomly picked letter followed by “16” on the blank paper, followed by another random letter. He is then to continue like this until he has a message such as:

1A56B8L13X8C32E9L210D…

First of all, how would anyone ever be able to tell that the letters are all nonsensical and not used for anything other than separating the numbers? And even if they did, what do the numbers mean? They have no way of knowing this unless they have a copy of our sheet which only exists in two copies in the world and was generated by an offline computer which is now physically destroyed.

And we wouldn’t be using the same column+row value each time for each letter, as they are found many times around the table.

And, what if to further complicate everything, we decide to write the messages in reverse? Or to do every other look-up in reverse, so that the columns and rows are swapped every other character? With just a few simple rules like that, it seems like they could never, ever decrypt our messages, even with the most powerful computers in the world.

I probably am making a fool out of myself here, but I seriously don’t understand how anyone, no matter how smart, given unlimited time, could ever break this cipher/encryption scheme which I just came up with quickly without having any expertise in the field. I clearly must be missing something.

## Delta Search staying in system even after clean install

The picture is of a Dell KB522 multimedia keyboard. I have just made a clean installation of my system with windows 10 and installed chrome with ublock. By pressing the “internet” key (the multimedia key above F1), my default browser will open. Now, this is getting tricky.

If my default browser is Edge, it will open edge as many times as I press this internet key.

If my default browser is chrome, it will open chrome one time with a blank tab but as soon as I hit this internet key a second time, chrome will navigate to delta-search dot com.

The drivers for the keyboard are the default keyboard driver from windows. Adware removal tool by TSA will find only the history entry and cache of delta-search after I hit the internet key mutiple times in chrome.

Question is, where does it come from? Is my chrome/google account the problem?

This is already happening for years. I switched my setup several times over the years, even had a complete hardware switch where I went from AMD to Intel but the kind of keyboard is the same.

## Can a Bard use Glyph of Warding even though they do not “prepare” spells? [duplicate]

Can a Bard use Glyph of Warding even though they do not “prepare” spells?

In looking at the reasonable boundaries of using Glyph of Warding in the game, I came across a dilemma in the wording of the spell when it comes to classes that do not have “prepared spells”, but have “known spells instead.

Glyph of Warding says that “you can store a prepared spell”, however this wording becomes an issue when interpreting whether a Bard can or cannot use this spell.

A bard does not per se “prepare” their spells. Yet, the spell is listed in the Bard Spells section in the Player’s Handbook (p.207). Hrumpf! It is listed as a Bard spell which normally suggest that it is intended to be used by a Bard as part of their magical repertoire, but the wording needs clarification.

So, for the purposes of interpreting the wording in Glyph of Warding, can we equate “prepared spell” with “known spell”, which would mean the Bard can actually use this spell?

Spell Glyph. You can store a prepared spell of 3rd level or lower in the glyph by casting it as part of creating the glyph. The spell must target a single creature or an area. The spell being stored has no immediate effect when cast in this way. When the glyph is triggered, the stored spell is cast. If the spell has a target, it targets the creature that triggered the glyph. If the spell affects an area, the area is centered on that creature. If the spell summons hostile creatures or creates harmful objects or traps, they appear as close as possible to the intruder and attack it. If the spell requires concentration, it lasts until the end of its full duration. (PHB p.245)

Special thanks to BBeast for kindly mentioning this issue in his answer to: Can you store Hex in a Glyph of Warding?

## Secure Windows 10 Home admin’s data behind a password, even when user apps are running

Windows 10 Home’s default account lock system for the admin account is not completely secure because there are multiple free password recovery tools & ways available that can be used by a non-admin to reset/bypass the admin password.

How to secure Windows 10 Home admin’s data & installed programs behind a password, even when programs like Office, Chrome, etc. are opened and running in the background with some documents/pages opened in it?