What happens if modifications are made to the base entity while it is under the effects of a suppressed True Polymorph?

Posit the following situation: A wizard has True Polymorphed a stick into, say, an adult Silver Dragon, and maintained it for the full hour. He uses the thing as a mount, he’s kept it happy with the idea, and all is well with the world. An enemy catches them both in an antimagic field, and while he’s picking himself up off the ground, breaks the stick in half and hands the two halves to two goblins, who start running in opposite directions. What happens when the goblins in question clear the antimagic field?

Useful information for a self made DnD gamemaster screen [duplicate]

This question already has an answer here:

  • What sort of cheat sheets should a new DM have for a better flowing 5e game of Dungeons and Dragons? 5 answers

I am currently working on a hand-crafted gamemaster screen made out of wood for a good friend of mine. I am planning on not using the DnD 5e “orignal” GM Screen as inlay, but creating a unique layout. Since I am not that well versed in D&D I am now wondering which information would be good and useful for the DM that might be needed during campaigns.

I was also thinking of adding some blank boxes with headings, where the DM might write some Information that is useful for him depending on the campaign (this would of course be erasable since I am going to foil the inlay to be then written on with whiteboard markers).

Any suggestions for the pre-written information and the blank boxes to be written on are very appreciated. Also any additional advice or ideas are very welcome.

Can we deploy custom apps that is apps made Visual Studio on sharepoint 2013 team site?

If so then how can we deploy it. Because in my case it is hampering the UI of the team site. It is a simple hello world app. How can we add an app for team site I have created an app catalog site for team site and loaded my custom app. It is throwing some error, “Sorry, apps are turned off. If you know who runs the server, tell them to enable apps”.

Can potions of Magic Missile be made useful?

As I asked in a past question, when you drink a potion of magic missile you end up getting hit by the spells effect. Depending on the effect in the potion, this is fine to not fine.

But is there any way to make potions of magic missile useful where you are the drinker but get to use the spell to attack others? I know about Volatile Vaporizer pills and Vaporous Potion crafting, but these dont allow you to benefit from effects like alchemical allocation.

Mostly I was hoping to have a potion of MM and alchemical allocation and always have a MM thats usable. Or with the Potion Glutton get a MM every round for a swift action.

Should a retail web-site always return the same items for identical searches made by different users?

We supply a large number of products for purchase through our web-site. There is a new initiative to apply a third-party AI product to hijack searches to return products based on both the search term and predictions from browsing history and other people’s search history with successfully processed sales. If I now search for a keyword, I will get a different set of products returned than if someone else searches for the same thing. If I pass an URL of my search to a friend to compare the products, we will have different lists, so cannot discuss. The list, I find, changes day-to-day, on my own machine due to the AI’s suggestions.

Is this a design “no-no”?

Should the AI be solely used for recommendations and not for the core search results?

Is there any guideline to cite that makes suggestions on this?

I have also put this on: Software Recommendations

What ways can you monitor all changes made on a Linux server?

Sometimes we have contract developers that need to do work on the server (via ssh or sftp) and I’ve been looking for ways to monitor what they do on our Debian based server. We have ways of limiting access (restricting access by IP) so they only have access when we have them working on something but we would like to be able to monitor sessions in a way that we can see what they did (possible on desktop but I’m not sure if this is possible on a Linux server).

Sometimes contractors need privileged access to troubleshoot problems which may mean they can change nginx configs or modify databases. Privileged access also gives them the ability to add malicious code (logic bombs, etc) or break stuff by accident without knowing what they did to break it.

LXD isn’t a good enough option because it doesn’t monitor key entries and the resources contractors need access to (entire php web application stack) is the asset. So if they break it, we have to switch to a backup web server anyway. While chroot can be used to limit what the user can do, it’s not a monitoring tool.

The history file in Linux can be modified by the user and even if it couldn’t be modified, it doesn’t show commands run after entering a prompt (like after entering mysql or opening a file). Adding git to the root of the system has the same limitations.

We have a server that has the production database and native scripts for the website that we can quickly switch to in an emergency. But without a way to inventory who’s had access AND exactly what they have done, tracing blame or even defining what was done is a nightmare.

What solutions are available for this?
Are there any reliable key-loggers that can be used for this?
Are there any enterprise solutions for this?