Posit the following situation: A wizard has True Polymorphed a stick into, say, an adult Silver Dragon, and maintained it for the full hour. He uses the thing as a mount, he’s kept it happy with the idea, and all is well with the world. An enemy catches them both in an antimagic field, and while he’s picking himself up off the ground, breaks the stick in half and hands the two halves to two goblins, who start running in opposite directions. What happens when the goblins in question clear the antimagic field?
This question already has an answer here:
- What sort of cheat sheets should a new DM have for a better flowing 5e game of Dungeons and Dragons? 5 answers
I am currently working on a hand-crafted gamemaster screen made out of wood for a good friend of mine. I am planning on not using the DnD 5e “orignal” GM Screen as inlay, but creating a unique layout. Since I am not that well versed in D&D I am now wondering which information would be good and useful for the DM that might be needed during campaigns.
I was also thinking of adding some blank boxes with headings, where the DM might write some Information that is useful for him depending on the campaign (this would of course be erasable since I am going to foil the inlay to be then written on with whiteboard markers).
Any suggestions for the pre-written information and the blank boxes to be written on are very appreciated. Also any additional advice or ideas are very welcome.
If so then how can we deploy it. Because in my case it is hampering the UI of the team site. It is a simple hello world app. How can we add an app for team site I have created an app catalog site for team site and loaded my custom app. It is throwing some error, “Sorry, apps are turned off. If you know who runs the server, tell them to enable apps”.
As I asked in a past question, when you drink a potion of magic missile you end up getting hit by the spells effect. Depending on the effect in the potion, this is fine to not fine.
But is there any way to make potions of magic missile useful where you are the drinker but get to use the spell to attack others? I know about Volatile Vaporizer pills and Vaporous Potion crafting, but these dont allow you to benefit from effects like alchemical allocation.
Mostly I was hoping to have a potion of MM and alchemical allocation and always have a MM thats usable. Or with the Potion Glutton get a MM every round for a swift action.
We supply a large number of products for purchase through our web-site. There is a new initiative to apply a third-party AI product to hijack searches to return products based on both the search term and predictions from browsing history and other people’s search history with successfully processed sales. If I now search for a keyword, I will get a different set of products returned than if someone else searches for the same thing. If I pass an URL of my search to a friend to compare the products, we will have different lists, so cannot discuss. The list, I find, changes day-to-day, on my own machine due to the AI’s suggestions.
Is this a design “no-no”?
Should the AI be solely used for recommendations and not for the core search results?
Is there any guideline to cite that makes suggestions on this?
I have also put this on: Software Recommendations
when we should subtract from products number? once user put them on his basket or when payment is made? how long should goods remain in basket and if someone put a good on his basket , we should consider it sold and subtract from our numbers.
I’d like to detect when my computer sends a request to a domain, say http://example.com and automatically run a bash command when it happens.
Sometimes we have contract developers that need to do work on the server (via
sftp) and I’ve been looking for ways to monitor what they do on our Debian based server. We have ways of limiting access (restricting access by IP) so they only have access when we have them working on something but we would like to be able to monitor sessions in a way that we can see what they did (possible on desktop but I’m not sure if this is possible on a Linux server).
Sometimes contractors need privileged access to troubleshoot problems which may mean they can change
nginx configs or modify databases. Privileged access also gives them the ability to add malicious code (logic bombs, etc) or break stuff by accident without knowing what they did to break it.
LXD isn’t a good enough option because it doesn’t monitor key entries and the resources contractors need access to (entire php web application stack) is the asset. So if they break it, we have to switch to a backup web server anyway. While
chroot can be used to limit what the user can do, it’s not a monitoring tool.
history file in Linux can be modified by the user and even if it couldn’t be modified, it doesn’t show commands run after entering a prompt (like after entering
mysql or opening a file). Adding
git to the root of the system has the same limitations.
We have a server that has the production database and native scripts for the website that we can quickly switch to in an emergency. But without a way to inventory who’s had access AND exactly what they have done, tracing blame or even defining what was done is a nightmare.
What solutions are available for this?
Are there any reliable key-loggers that can be used for this?
Are there any enterprise solutions for this?
Could Rust monster or maybe Gray ooze make adamantine weapon rust? Or maybe adamantine doesn’t rust at all?
I prepare the presentation about design in the Health Care area.
If you work or worked on some medical project, and have a few minutes to answer the questions, please fill this Goggle Form in:
Thanks a lot!