What are recognized ways for searching a specific string like “video234.mp4” in the DOM of a large indexing site with pre-existing pages?

I’m trying to search off a whole site for specific string in the source code of a specific page that exists on the site, I’m thinking of a scrawler to do this, is a scrawler intended to do this or are there more efficient way?

Unlike indexing sites like Google etc, which results can vary even if the same request is made another time, this site does only have pages created by the user which makes it a bit more easier to make it possible to search off the site. The content isn’t served by javascript so this isn’t an obstacle.

Industry secure file format like .OFX Open Financial Exchange File [closed]

The .OFX Open Financial Exchange File is a file format created for financial data exchanges between financial institutions.

I was wondering if in the IT security realm, such a file format exists.

My goal would be to use and customize it so that my backend API entry points (that is another story, don’t worry about that)

How do I tell my friends that I feel like some of the PCs are being left out?

So im in this dnd campaign and there’s two main problems I have: one my character’s personality is very bard-like but I didn’t know what bards were so now another PC is filling that role and I feel useless as a rogue, two is that there are two PCs who have been very open from the get go and have imediatly formed close connections with NPCs and such. Because of that, they’ve become the center of attention- one time the dm even said that we could do whatever and another PC even said “I don’t know, I don’t have connections like everyone else,”. I know that I need to talk to my friends about this, but I’m scared about this blowing up into something (these are my only friends, we’ve had conflicts like this in the past but we were WAY younger). And I know that we’re more mature and we can probably work things out, but I’m still terrified of doing this and don’t even know how to go about this.

Are Half-Elves supposed to have a slender build like Elves, or are they supposed to have a build that’s intermediate between Humans and Elves? [5e]

The Player’s Handbook’s weight descriptions for Half-Elves are inconsistent. The Half-Elf section in Chapter 2 (pg. 38) says:

They range from under 5 feet to about 6 feet tall, and from 100 to 180 pounds, with men only slightly taller and heavier than women.

However, the “Height and Weight Range” table in Chapter 4 (pg. 121) gives a weight formula for Half-Elves of 110 + (2d8) x (2d4), which is 114 to 238 pounds.

This is very different.

Do we have any reason to label one description Correct and the other A Mistake? The 2018 PHB Errata are silent on this point.

Looking at the rest of the table’s formulas, Humans are 114 to 270 lbs, whereas Wood Elves are 102 to 180 lbs and High Elves are 92 to 170 lbs. (I’ve excluded the Drow because they’re significantly shorter.)

So are Half-Elves supposed to have a slender build like elves (100-180 lbs), or are they supposed to have a build that’s intermediate between Human and Elf (114-238 lbs)?

[As a side note, changing the Half-Elves’ weight modifier in the table from its current 2d4 (which is like a Human’s) to only 1d4 (like the Wood and High Elves’) would yield a calculated range of 112 to 176 pounds.]

Is destructuring a heap (taking down a heap) also O(n) like building a heap? If so, can the selection problem be solved by this method in O(n) time?

If we can build up a heap with time O(n), can we take down a heap also by O(n)? (by delete-max repeatedly).

Intuitively, it may feel it is, because it is like the reverse of build it up.

If building a heap is O(n) in the worst case, including the numbers are all adding by ascending order, then taking the heap down is exactly the “reverse in time” operation, and it is O(n), but this may not be the “worst case” of taking it down.

If taking down a heap is really O(n), can’t the selection problem be solved by building a heap, and then taking it down (k – 1) time, to find the kth max number?

i like to know when microsoft going stop montoring our computers, and takeing files that they no right to

do u know how impossable it is to disable windows tracking. most u think just moveing few setting u done, currently there is over 100 gpo settings that must be eather turn on of off, then gpo must be appled to computer, forget firewall microsoft servers are hardcoded in the os, u must disable all task,in trasmiting information, go to regisitery disable termaml server setting start up to 4 and if this not enouf u have block access to rdp, ftp as on all computers there is a active ftp server weather or not u installed it and a acktive http server, now we have other probems remote cmd, remote power shell. all office sends out to microsoft servers, currently there over 7000 data centers that some share with apple and cisco, microsoft will take passwords user names and encription certifices i have logs showing they do just this, that they tied linux in to windows was better way to access bouth os, as there servers gose on and off line takeing bits of infomraiton, over time they can vr your hole system and wach all u do and they do have abuilt to wach what u do and recored it, micrsofot admited to hacking with nsa they was supose to remove remote desktop but the move past this they found new way accessing all the computers, worse is nsa not only ones gets all your information, most gose to chana u all did know most all the code is writen in chana so is apple and cisco, and we ask why is it so easy to get hack, these busness would never pay to have a hack proof software as i did offer a way for them to do it, that system would be totaly trasparnet, but then microsoft could not get the files eather, so how beat microsoft at there own game, what i do is find microsoft certifices and remove remote access and access to the encraption system and to athenacattion, but they can target any server or pc, and sence they recored what u do they undo just about anything, so why trust micrsoft now i can prove microsoft did for two years target my network, i do have logs to prove it, was no hacker and microsoft them selfs said yes they was on my network logs prove it , as they work with cisco becomes hard to block them , now i like know why micrsooft keeps changeing sercruty settings on my network i do have there remote login certifices and ip address and they montor all gpo set ups why, u all have no right to this informaton so why are u takeing it, so again why trust microsoft

Can a changeling player character look like a skeleton?

I have an for a changeling character, but instead of appearing in a human form or stuff like that, I want them to look like a skeleton. I’m thinking a grim reaper-type character, but I know I can’t really pick skeleton as a race option. I would be using the changeling from Eberron: Rising from the Last War.

Can a changeling PC use the Shapechanger trait to look like a skeleton?

[ Politics ] Open Question : Why is Trump suddenly acting like he cares about the coronavirus crises?

He said “no” to early testing and free test kits from the WHO. He was briefed weeks ago about this coming threat and sat on his tiny hands and went golfing. He’s got blood on his hands, and the scared markets are in free fall because of his failures. F Donald J. Trump!