## Using Solve[] to find Eigenstates of a 1D Double Dirac Potential

I’d like to Solve

$$k^2 \equiv – \frac{2mE}{\hbar^2} = (- \frac{mA}{\hbar^2} (1+ e^{-2ka}))^2$$

for E, in terms of m, $$\hbar$$, A, a.

I tried using the following command:

Solve[-((2 m ene)/h^2) == (m^2 A^2)/h^4 (1 + E^(-2 a*Sqrt[-((2 m ene)/h^2)])), ene] 

Isn’t working well for this task. What do you recommend? At first glance it seems it could not be simple to solve "by hand".

Background: This problem comes from Solving a 1D Quantum well with 2 Symmetric Dirac’ Deltas $$\delta_a$$ and $$\delta_{-a}$$, where $$A$$ is the amplitude.

## Free-Attractions.com – potential for a multi million dollar auto pilot website

Free-Attractions.com

Was formerly a very popular site with backlinks on USAToday and tripadvisor etc.

Collected 300+ leads on the coming soon page. Has traffic. Content has been done for 3 States.

Why are you selling this site?

I don't have the time to complete this project

How is it monetized?

Currently being rebuilt, I envisage monetization via affiliate deals, private advertising for local businesses relevant to attractions.

If you sold just one adspace at a meagre sum…

Free-Attractions.com – potential for a multi million dollar auto pilot website

## Potential vulnerability in JSON response returning base 64 encoded image data, with the response being vulnerable to MIME sniffing

A JSON response in the API of a webapp is returning the base64 of a user-uploaded image, and there’s no X-Content-Type-Options Header to prevent MIME sniffing.

Could this be a potential vulnerability such as an XSS for the webapp by using steganography to edit the image with a payload, uploading it, and then MIME sniffing the JSON response? (or by any other means?)

## VirtualBox setup – running potential virus [duplicate]

Is my VirtualBox setup fine for running a potential virus/malware?

Here’s the screenshot of my settings – CLICK

Shared clipboard and drag n drop are off.

Let me know if anything else is required.

## Potential Example of an algorithm failure

I was looking an algorithm to solve a problem of finding whether and array contains a quadruple with sum = k,(k is input) mentioned at GeeksforGeeks. In one solution the approach mentioned is below,which i think i not correct:

1. Store all possible two elements pairs of array in some another auxiliary array and also store i,j indices of the elements.There will be $$C(n,2)$$ pairs.
2. Sort the auxiliary array.
3. Take two pointers,left=0 and right=n-1 to auxiliary array.

3.1. If auxiliary[left]+auxiliary[right]==k and there is no common index in elements represented by left and right, we return true.

3.2 else If auxiliary[left]+auxiliary[right]<k, we do left++

3.3 else we do right– 3.4 And this goes in continues loop until left<right or we get element at 3.1

Now my doubt is that in case sum of left and right elements=k and there is some common element between left and right,then this algo will do right–. I want to understand that why we do right– here and no left++ and the other way.I think there must be some example where this scenario will make algorithm fail but i am not able to produce that.Can some tell that whether it will indeed fail or prove that it is always correct?

## Is there a potential XSS in this html action attribute?

I’m working on a website and I noticed that if I go to the following URL: website.com/page?alert() this message is reflected in the action form. I tried to close the action attribute using double quotes in order to try a classic like " onload="alert(1)" but double quotes are URLencoded if i read the source code. Do you have some suggestion? Or is just a rabbit hole? Thanks

 <form method="post" action="./page?alert()" id="cn"> <div class="n"> 

## Potential Hack (Macbook/Edge/Teams/Remote)

A kind disclaimer, i’m new to this network and i have checked the guidelines about the nature of my question with no luck and still not sure if this is an appropriate one, so my apologise if i’m overstepping.

I have noticed earlier that my Macbook Pro camera light was lit on – the screen is turned off but not sleeping – the entire time the device was not being used or touched, i logged in to investigate and i have found that Microsoft Edge (Chromium) was on with a few tabs, the moment i have tried to navigate through it, edge broke and shutdown unexpectedly.

I opened it again, tried to access last tabs (Cmd+Shift+T) with no luck, I went through the browsing history and i have found a url for Microsoft Teams was accessed (same url was accessed some hours before with different parameters)

The very interesting thing about it, the url was accessed twice at a time when no one was using the Macbook, which i’m willing to take but the fact that it was followed by a crash made things seem a bit suspicious, looking into the console the only thing i was able to find in the log around the crash time is this:

Microsoft Edge[356]: BUG in libdispatch client: mach_recv, monitored resource vanished before the source cancel handler was invoked { 0x7fad88231bf0[source], ident: 56579 / 0xdd03, handler: 0x110c94610 }

Is there any explanation to how or why would such thing happen? should i be concerned or meh? (Any additional info i can provide upon request)

PS: Energy Settings currently prevents the Macbook from sleeping so no worries there, just does not explain why would it access the url randomly and crash the browser without retrieval.

## Anime Movie Site, Huge Potential Making Money

Why are you selling this site?
need money for other project

How is it monetized?

Does this site come with any social media accounts?
No

How much time does this site take to run?
only few minute to post new movie

What challenges are there with running this site?
SEO

## How can I play monsters and NPCs up to their potential?

In many cases discussions about balance in 3.5 will, inevitably, involve one side or another invoking an anecdote of the time they fought this monster, or a member of that class, and they didn’t suffer the problem being illustrated in the discussion at hand. In many cases it seems like these anecdotes come from a case of the monster or NPC not being played (tactically) or roleplayed (again tactically, since that’s part of 3.5’s roleplaying experience, but also in terms of personality) up to the potential illustrated by its ability scores, powers, and skills.

How can a GM learn to play these monsters and NPCs up to their potential?