which plugins are proper to make one site for find cohabitant [closed]

ّI have seen this website (https://hamkhoone.com/) which is for finding cohabitant in Persian.

I searched to find its CMS by google and don’ find the CMS on it: enter image description here but found some technology used on it by wappalyzer Chrome add-ones as you can see: enter image description here

So i like to know by installing which plugin in WordPress site?

I have made one free WordPress example on this link which could be used to test and install suggested module on it and its user name is: Admins user name is :admin Password is :pass

Also it would be great if you share the WordPress bask up file for building similar site if you have tried on it.

Thanks.

Google Search Console not showing proper other pages results (they are indexed)

i have a website and than i have a wordpress blog in /blog route of that site they are kind of independent for now since i havent done any internal linking on them so i created this new post n my blog and submitted it for indexing it got positive results and its also showing up on google but i cant see its results on google search console does any one know why?

side note: i havent submitted site map for now.(and if its because of site map than is it possible to view results without sitemap?)

What is the proper CR for this homebrewed Souls-esque NPC?

Returning for another year of a gothic horror adventure, I wanted to try my hand at creating a truly difficult encounter. Following on past my original npcs I opted to turn a certain Dark Souls boss into a DnD npc. However, my bravado got the better of me. And now I am forced to accept that I may have designed this npc in a way that makes them way too small a challenge for a group of mid-level players. I was aiming for the CR 12-15 range.

What is the proper CR for this creature given their abilities?

Once again, the calculator just doesn’t seem to cut it. There’s a lot of interactions between different abilities and legendary actions. It’s enough to make my head spin and I just can’t wrap my head around it all. But for completeness sake, the calculator says CR 12 based off a CR 10 Defense and CR 13 Offense.


Sister Lorelei

Medium undead, neutral

Armor Class: 17 (natural armor)
Hit Points: 90 (20d8)
Speed: 40 ft.

STR – 11 (+0)
DEX – 19 (+4)
CON – 10 (+0)
INT – 14 (+2)
WIS – 15 (+2)
CHA – 20 (+5)

Saving Throws: Dex +9, Con +5, Cha +10
Skills: History +5, Insight +7, Religion +5, Stealth +9
Damage Resistances
Damage Immunities: Necrotic, Poison; Bludgeoning, Piercing, and Slashing from Nonmagical Attacks
Condition Immunities: Charmed, Exhaustion, Frightened, Paralyzed, Poisoned
Senses: Passive Perception 12
Languages: The languages they knew in life
Challenge: ???

Traits

Magic Resistance. Sister Lorelei has advantage on saving throws against spells and other magical effects.

Nimble Escape. Sister Lorelei can take the Dash, Disengage or Hide action as a bonus action on each of their turns.

Rejuvenation. If Sister Lorelei is destroyed, she gains a new body in 24 hours if their frozen heart is intact, regaining all her hit points and becoming active again. The new body appears within 5 ft. of sister lorelei’s frozen heart.

Spellcasting. Sister Lorelei is a 14th-level spellcaster. Its spellcasting ability is Charisma (spell save DC 18, +10 to hit with spell attacks).
Sister Lorelei has the following sorcerer spells prepared:
Cantrips (at will): chill touch, control flames, frostbite, ray of frost, shape water, true strike
1st level (4 slots): burning hands, detect magic, jump
2nd level (3 slots): mirror image, misty step
3rd level (3 slots): fireball, haste
4th level (3 slots): greater invisibility, wall of fire
5th level (2 slots): cone of cold, enervation
6th level (1 slot): investiture of ice
7th level (1 slot): fire storm

Turn Resistance. Sister Lorelai has advantage on saving throws against any effect that turns undead.

Actions

Multiattack. Sister Lorelei makes two attacks with her spectral sickle and one attack with her reaping scythe.

Reaping Scythe. Melee Weapon Attack: +9 to hit, reach 5 ft., one target. Hit: 9 (1d10+4) slashing damage + 7 (2d6) necrotic damage

Spectral Sickle. Melee Weapon Attack: +9 to hit, reach 5 ft., one target. Hit: 6 (1d4+4) piercing damage + 7 (2d6) cold damage.

Legendary Actions

Sister Lorelei can take 3 legendary actions, choosing from the options below. Only one legendary action option can be used at a time and only at the end of another creature’s turn. Sister Lorelei regains spent legendary actions at the start of its turn.

Cantrip Sister Lorelei casts a cantrip.

Move Sister Lorelei moves up to their speed without provoking opportunity attacks

Reaping Scythe Sister Lorelei makes a Reaping Scythe attack.

Spectral Evanescence Sister Lorelei becomes magically invisible for up to 1 minute or until immediately after they make an attack roll.

How do I determine the proper bonuses for my attack and damage rolls? [closed]

I am a half orc monk at level 14. I am using a homebrew gun called the demon of powder, which has 6 charges that it expends instead of regular bullets as ammo. My stats are 14 20 14 8 15 10 in order. in the description of the weapon it says i get +5 to both hit and damage rolls, but on dndbeyond it says i have +6 to hit and 2d8+6 for damage. My DM said that the regular damage for this is 2d8. I’m very confused where dndbeyond is getting the 6s from. Additionally, should i manually add in the +5 to hit from the description or is it already included?

Thanks!

Proper complexity function definition

Following the book Computational Complexity from Christos H. Papadimitrious I found an example of proper complexity function that I can not understand (Example 7.1 in the book):

The function$ f(n) = \lceil\log{n}\rceil$ is a proper complexity function. use the three-string Turing Machine $ M_f$ as follows:

  1. Its first cursor moves slowly from left to right,
  2. The second string counts in binary the number of input symbols (using a binary successor),
  3. Erase the second string and copying all symbols to the output as quasi blank symbols.

I am not able to see the point 2 (so what is happening in the middle tape). I do not know how a machine is able to count the number of digits of an input of size say $ n$ .

Chkrootkit and Rkhunter – What other tools are capable and proper to diagnose risks and/or infections?

PREAMBLE

I’m on the internet for a while looking for the right security tools to locate and diagnose malware on Linux servers. Tools capable of doing system scans on Linux. Tools with capabilities and characteristics similar to Chkrootkit and Rkhunter.

I know that there are many tools to find malware like ClamAV, Linux Malware Detect (maldet), Sophos and Lynis. But most of these tools are intended for system hardening, file servers, email servers or shared hosted environments…

The only tools capable or proper to do system scans on Linux systems that I have found so far are Chkrootkit and Rkhunter, as we can see in a successful detection made by Chkrootkit in this thread https://unix.stackexchange.com/a/567413/61742 .

That is, the other tools are not able to deal with risks for the Linux system itself, such as detecting if the system is infected. In general they are only able to scan specific folders and tell you whether a file is dangerous or not and remove it.

Contrary to what is thought by many people, Linux is vulnerable to malware. Tools like Chkrootkit and Rkhunter play a very important role!

According to the good experiences I had with my servers in my infrastructure, the best way to find malware on Linux is to use several tools together as done in this tool that I made available to the community https://github.com/eduardolucioac/private_tux (BSD-3-Clause license) and that I use on my infrastructure daily.

Finally, I think this question is very relevant to the community, it needs to be done and it was done in the right place!

NOTE: I’m the author of Private_Tux and it has no commercial purposes (BSD-3-Clause license).


QUESTION

What other tools are capable and proper to diagnose risks and/or infections (malware) in the Linux system?

Proper vulnerability scan on LAN devices (nmap)

I’m playing around with nmap sometimes to understand and remember different parameters. I would like to scan devices on my LAN for vulnerabilities. Something like:

$ nmap -sU --script vuln 192.168.52.0/24 -v

I got pretty much accurate information about devices and vulnerabilities on my LAN in stdout, but its not pretty readable so my question is: what is a good manner to perform a representative vulnerability scan on the local network (192.168.52.0/24)? I was thinking about -oX, and I am curious to different new manners.

Regards, Lajos.