## Revolution Slider – Hide a layer forever at the end of first loop

Is it possible to hide a layer once and forever in Revolution Slider? I’d like to show a logo only at the beginning of the slider (when you first load that page) and then hide it once and forever, keeping the rest of the slider go in loop as usual… I can’t find a “Play Once” option for layer animations anywhere…

## Find the key points of the outer layer of n overlapping rectangles – Divide and Conquer

Given a set of $$n$$ rectangles depicted as: $$[Li, Ri, Hi]$$ whereby the corners of the $$i-th$$ rectangle are – $$(Li, 0), (Ri,0), (Li, Hi)$$ and $$(Ri, Hi)$$.

The goal is to print all of the key points of the outer layer of the $$n$$ overlapping rectangles (given in a list).

Key points $$(Xj, Yj)$$ are the points that collectively portray the outer layer of the rectangles – look at the example below:

Given the two blocks [4, 13, 4] and [2, 7, 10] the output should be: [2,0], [2,10], [7,10], [7,4], [13,4] and [13,0] (The points that are marked red).

This should be done in $$O(nlogn)$$ time where $$n$$ is the number of buildings (rectangles).

I have tried to solve this problem by –

(1) Sorting the blocks by priority: $$Li$$ then $$Ri$$ then $$Hi$$.

(2) Compare any two blocks: $$[Li, Ri, Hi]$$ and $$[Li+1, Ri+1, Hi+1]$$ (15 different cases like Li==Li+1 and Hi< Hi+1 and stuff like this).

(3) Remove/add points according to condition (using AVL)

This works in some cases, but in others it fails miserably. I think this can be solved by Convex Hull algorithms, we have only learned the divide and conquer method so far – but I cannot link between this question and this method. I hope you can help me with this one!

Thank you

## If someone is using multiple Illusion effects, how do they layer?

Say if someone is using a Hat of Disguise, the Rogue ACF Mimic, Alter Self Spell, and a Disguise Self Spell?

Which effect would be seen?

## Does TLS (Transport Layer Security) protect against deliberate tampering or accidental corruption?

If someone tampers with data being transmitted over HTTPS using TLS, would that result in a corrupted decrypted message or would it result in the error being detected such as through a cryptographic checksum and retransmitted?

This has security implications as well as accidental corruption implications (https://stackoverflow.com/questions/3830206/can-a-tcp-checksum-fail-to-detect-an-error-if-yes-how-is-this-dealt-with).

## Can I get a double layer protection if I use both desktop & browser based VPN?

Let’s say, if I use both NordVPN’s own software (random VPN location) and its Google Chrome VPN extension (random VPN location), does this add an extra layer of protection/encryption – means hiding internet activity from ISP and/or from your network plus an encryption- ?

Or connecting to the VPN server via NordVPN software plus Epic browser’s VPN, what kind of protection is that?

Is it double layer or just connecting to different ports?

## Network layer attacks

What are different types of network layer attacks . Why firewall cannot prevent these attacks and specifically IPS is needed to block these attacks ? What techniques does IPS apply to mitigate the network layer attacks ?

## How does the forget layer of an LSTM work?

Can someone explain the mathematical intuition behind the forget layer of an LSTM?

So as far as I understand it, the cell state is essentially long term memory embedding (correct me if I’m wrong), but I’m also assuming it’s a matrix. Then the forget vector is calculated by concatenating the previous hidden state and the current input and adding the bias to it, then putting that through a sigmoid function that outputs a vector then that gets multiplied by the cell state matrix.

How does a concatenation of the hidden state of the previous input and the current input with the bias help with what to forget?

Why is the previous hidden state, current input and the bias put into a sigmoid function? Is there some special characteristic of a sigmoid that creates a vector of important embeddings?

I’d really like to understand the theory behind calculating the cell states and hidden states. Most people just tell me to treat it like a black box, but I think that, in order to have a successful application of LSTMs to a problem, I need to know what’s going on under the hood. If anyone has any resources that are good for learning the theory behind why cell state and hidden state calculation extract key features in short and long term memory I’d love to read it.

## Should Anti Virus and Anti Malware layer be the first layer in web application stack or can it seat behind services?

Can you have Anti Virus and Anti Malware layer sitting deep with the microservice layer and have the malicious file flow through all the services ? Argument being the file is in memory and not getting processed until the service we will put the Anti Virus and Anti Malware layer on.

Shouldn’t this be stopped at the routing layer of the application?

## Can I permanently banish a devil from one layer of the Hells to another using the Banishment spell?

Can I permanently banish a devil from one layer of the Hells to another using the banishment spell?

Let’s say my party is on Avernus. They are attacked by a devil who’s native to Dis (or some other layer of the Nine Hells), and one of the characters casts banishment on it. Are Dis and Avernus considered two different planes, or would the devil be banished to a harmless demiplane for 1 minute?

## VPN as a temporary layer of security?

I have a startup working on Django app, that will be processing sensitive personal and financial information. We’re just finalizing a prototype of the product (no paying clients, no investors), so we’re under-staffed on a limited budget.

Our product is a B2B tool, the first users of the prototype will be just a few employees in 2 companies. As a temporary security measure, I am considering setting up a VPN for them and making the production servers inaccessible for public.

It was a pain in the ass to set up for me – OpenVPN server, routing, internal DNS, now HTTPS (not really needed but browses give warnings to the end user). It looks like it will be even more pain to maintain it.

Is a VPN something you would actually do to increase security of an application? Or maybe I’m overthinking and it’s generally safe to host Django apps in public (there is no open sign-up, only a login form is really public).

Can you recommend a step-by-step guide / checklist that I should go through before releasing a Django app to public?