## Can a usb drive infect a hard drive without an OS

Specifically, I was trying to install windows 10 on a fresh new ssd, i was trying to use a usb to do it but it turns out I did not create the usb drive correctly, so I’m stuck on the “reboot and select proper boot devices” screen on my bios.

If the usb was infected, can it infect my ssd or my bios at this point?

## How do I show that Shortest-Cycle-Length is NL hard?

Shortest-Cycle-Length takes a graph G and a positive integer l, and outputs 1 if and only if the shortest cycle in G (if there is any) has a length l.

To show that above is NL hard, I tried to reduce STCONN (s-t connectivity), or maybe Cycle, but not sure where to go from here.

## [ Theater & Acting ] Open Question : Is It Hard To Become An Actress As Famous As Anna Kendrick?

I would like the level of success and career that Anna Kendrick has had.  I feel as though she is unsurpassed in terms of looks and fans. She’s not as rich as Meryl Streep, but she’s also younger and prettier than Meryl Streep and youth and beauty is what really matters. I wouldn’t really say she has talent. She’s an actress famous for her looks. If you disagree, then why is she always the love interest? If she wasn’t pretty, she would be nowhere.

I was trying to uninstall InDesign from my Windows 10 computer. To uninstall/update any of Adobe’s programs, you have to first update to the latest version of Creative Cloud, which is a hub that manages all its programs (PS, Illustrator, AfterEffects, etc). Once the update was complete, I uninstalled InDesign, but noticed that there was a small progress indicator on the top-right corner.

When I opened it, I saw that it said “File syncing” was in progress. I thought “What file syncing? I never asked to sync any files!”

I immediately paused the sync. Upon clicking on the settings icon, it turns out it was auto-syncing files from my entire C:/Users/[UserName]/Documents/ folder, without asking for any permission to do this! (I’ve since created an empty /Adobe subfolder so it doesn’t have anything to upload).

I think I stopped it before it was able to upload anything. Has Adobe been automatically uploading files from its users’ /Documents folder without their consent, or am I overreacting? If so, is there a way to blacklist all internet access to all of Adobe’s products? I don’t want the next update to reset these permissions, and having to worry about auto-syncing in future versions!

## Players get frustrated when they couldn’t solve a hard diplomatic problem, how to get them to think out of the box

Problem:

Players got themselves into a diplomatic problem that they know is probably above their pay grade in terms of difficulty. They spent a session trying to figure out this problem with talking to people, and rolling different charisma checks in order to try to persuade people they probably had no business persuading (rolls were average, arguments weren’t extremely compelling). The party didn’t plan any grand schemes, any extraordinary strategies, no clever ideas on the spot, but rather tried very basic head first dialogue.

This has happened in the past in regards to combat, and the party has with a recent deadly encounter had to think out of the box more (one player even said: “guys we need to plan more and think less about just hacking and slashing sometimes”). Now it’s a more diplomatic problem that doesn’t seem as easy as rolling a single charisma check and hoping it works out.

In the end, the party did not manage to solve the diplomatic problem (although there is room in the future for them to try again with the upper hand), and one of the players said they did not enjoy the session. Player enjoyment is my top priority. But I also think dnd is best when there’s risk, when you can fail rolls, when the PCs don’t always win (not that I actively seek this out though).

How can I get the party to perform less linearly in dialogue-related problems?

An example problem:

P: If trying to out smart a bad person with a lot of influence in the town

A: There are options for framing the person, bribing people, seeking dirt on this person to find their weakness, tarnishing their reputation, trying to prove their wrong doing by seeking out evidence, and a bunch of other possibilities.

I’ve tried to have a brief session-0 talk again about if they want dialogue-related problems handicapped, and they didn’t seem to take to that, but rather felt like they tried everything and didn’t know what else to do. I also did a postmortem on this problem and tried to give different options they could have tried, but I get a feeling the players feel like they still tried everything and failed and the session was “a waste” (even though they still got exp, still got some loot, and got some more plot).

Kind of at a loss of how to tackle this issue that isn’t just: “Go watch some dnd podcasts to get ideas, or go read X, Y, and Z resource on the subject”.

## Is there any security issue while two different process using different hard link of same file?

To reduce disk space I have planned to use a hard link instead of full copy, Is there any security issue while two different processes using different hard links of the same executable file as base?

## How to prove re-hard or co-re hard by reduction?

My question asks to show that $$FINITE_{TM}$$ is r.e. hard and co.re hard by reduction. My first idea is that we can show $$HALT_{TM}$$ that’s reducible to it. So, my assumption is to prove $$FINITE_{TM}$$ is r.e. hard, we can reduce $$HALT_{TM}$$ to $$FINITE_{TM}$$. And to show $$FINITE_{TM}$$ is co-r.e. hard, we can reduce $$\overline{HALT}_{TM}$$ to $$FINITE_{TM}$$. Does my assumption sound accurate? Any suggestions?

## Can second internal hard disk cause infection after reinstall?

Lets say I have two internal hard disks, one for the operating system the other for backups. If i make sure to delete the MBR and partition table with dd if=/dev/zero of=/dev/sda bs=512 count=2048 of the disk with the operating system to avoid the possibility of a boot sector virus.

If I reinstall in what ways can that second hard disk be used to cause an infection of the primary disk with the operating system?

I was reading thata boot sector viruses can even spread to other hard drives you have installed or physical media you have plugged into your system.

So what impact can a boot sector virus on a backup drive have on on the primary drive? And any other threats I may have missed? I guess it could effect USB sticks plugged in?

## How do you copy a web-hosts back up to your own hard drive?

How do you copy a web-hosts back up to your own hard drive or just backup to online storage?
What way do you do?
How often do you do it, Daily, Weekly, Monthly?

## Is it safe to disable SATA ports in the BIOS to isolate the corresponding hard drives from malware?

I have three SATA hard drives that I use every day. Suppose I disable the corresponding SATA ports of these hard drives through my BIOS, add another storage device to my PC, install another instance of Windows 10 and run unsafe executables on it – would my three SATA hard drives be completely isolated and safe?

As I understand it, unmounted partitions are at risk, but not partitions that I exclude by disabling the corresponding SATA ports.

Is this correct?