script for update game resources automatically in MySQL database

would you please tell me how I can update my MySQL database automatically when some event finished? for example when player send some resources to another player there is time should be appearing and when a time finished. the database should be updated automatically .even if the player was offline or browser was closed.

thanks for your time

Best Regards

GSA Website Contact lists, tutorials, resources and more!

Are you struggling with some or all of the contact form sending process?

Do you own GSA Website Contact but find it challenging to get enough contact forms to submit to?

Do you want to be able sell even more products with contact form marketing?

 

A contact form marketing membership helps solve all of these issues by giving you access to:

Optimal Settings and Configuration

Training materials and Mini Tutorials

400K+ contact lists – prefiltered contact forms – per month

Master Opt Out list

Abuse and Complainer list to help you avoid issues

Information on legal compliance

Resources to help you, including discounts codes, Required Tools, Helpful Tools, Hosting, etc..

Plus more

 

Currently we are in Phase 2 of development and we are adding mini tutorials and other helpful resources.  Phase 3 of development will include a private forum where members can share their experiences and what is working, as well as help other members. 

 

Find out more here:

https://contactformmarketing.com/

 

Currently this service is in a growth stage and will ultimately be $ 147 per month, however we are currently offering Early Bird pricing to a handful of members.  If you sign up at the discounted pricing, you get to keep it for as long as you are a member.  Plus you get to give valuable feedback and help shape the future of the membership platform. 

The current price is only

$ 147

$ 67 per month

and you keep that price for as long as you remain a member.

The Price will increase to $ 97 on Nov 25th 2020.  Then additional increases will follow as more content is added.

 

Sign up now to grow your business and lock in the price!

What’s the meaning of “resources external to the SQL Server computer are needed” in Microsoft’s SQL documentation?

In Microsoft’s SQL Server documentation on Windows service account configuration, the decision to use either a VA (virtual account) or a MSA (managed service account) hinges on whether

resources external to the SQL Server computer are needed

What exactly does this phrase mean here? I’m seeking an explanation that makes sense to an ‘accidental DBA’ with minimal experience of SQL Server, or Windows Server, configuration. What counts as a ‘resource’ here, and what kinds of ‘need’ are relevant?

Context: I have a fresh SQL Server 2019 VM on Azure, which was configured with VAs out-of-the-box, and I’m trying to decide whether we need to switch to using MSAs. I have found multiple other questions concerning this same documentation page and/or the same basic decision between VAs or MSAs (or regular AD Accounts) – but none really explain this specific phrase in a way that helps me apply it to my particular scenario. Which is essentially a data warehouse use-case: data will be coming into this SQL instance from external sources, but that’ll be managed by a third-party DW automation application running SSIS scripts, not directly by the SQL engine. (This application has its own AD service accounts.)

Whilst I’ve explained my specific scenario here to try to clarify the question, I’m keen for a generic answer so anyone with any SQL Server use case can evaluate this "resources external to the SQL Server" phrase for their needs. Specific answers for my use case are also welcome.

Where can I find experiential-based resources for West Marches/Open Table games?

I’m currently getting ready to run an Open Party/West Marches style game with a pool of about 16 players. We’ll be using 5e, but my question is system-agnostic.

I of course started with Ben Robbins’ "Grand Experiments: West Marches" blog posts (here: http://arsludi.lamemage.com/index.php/78/grand-experiments-west-marches/ ), but after reading those and Justin Alexander’s "Open Table Manifesto" https://thealexandrian.net/wordpress/38643/roleplaying-games/open-table-manifesto I’m having a tough time finding anything else experiential. Pretty much every other resource I find references one of those two to define the playstyle, says they think it’s a neat idea they’d like to try, and stops there.

I can’t say I’m shocked; building a sandbox like this is a lot of work and I don’t know that I’d want to go to the trouble of annotating it for strangers on the internet. It’s almost shocking that it’s happened twice.

That being said, I’m specifically looking for things similar to Ben’s West Marches: Running Your Own http://arsludi.lamemage.com/index.php/94/west-marches-running-your-own/ where a GM who has actually run an Open Party/West March style game for some time gives experience-based advice.

Of highest import is anything that gives insight on managing in-game vs. real-world time with multiple parties.

Distribution of resources from providers to maximum number of receivers

Consider there is a city with $ n$ residents who are in need of internet and there are $ m$ internet providers in the city. Here in the city every resident needs internet and every resident knows what providers are available to him. Formally let resident $ i$ has list of providers $ a_i$ . Also each provider has a maximum number of connections he can give, that is, provider $ i$ can have at max $ k_i$ connections. Find the optimal way of providing internet so that the number of residents having internet is maximum.

My thoughts on the question is that this question looks like a derivative of knack-pack problem with constraints, which suggests dynamic programing but i am unable to find the states. Could anyone help me?

Getting numerous HEAD requests by Java user agents to resources that require authentication to view within a web application. Should I block them?

I have recently started using Cloudflare’s firewall in front of a web application. This app has a limited user base of selected applicants and they must log in to view anything. There is no public registration form and nothing within the portal can be accessed without an account.

Since moving the DNS to Cloudflare I can see we are receiving numerous daily HEAD requests to paths that are only accessible within the portal.

These requests come from one of two groups of IP addresses from the United States (we are not a US-based company; our own hosting is based in AWS Ireland region and we’re pretty sure at least 99% of our users have never been US-based):

Java User Agents

  • User agent is Java/1.8.0_171 or some other minor update version.
  • The ASN is listed as Digital Ocean.
  • The IP addresses all seem to have had similar behaviour reported previously, almost all against WordPress sites. Note that we’re not using WordPress here.

Empty User Agent

  • No user agent string.
  • The ASN is listed as Amazon Web Services.
  • The IP addresses have very little reported activity and do not seem at all connected to the Java requests.

Other Notes

  • The resources being requested are dynamic URLs containing what are essentially order numbers. We generate new orders every day, and they are visible to everyone using the portal.
  • I was unable to find any of the URLs indexed by Google. They don’t seem to be publicly available anywhere. There is only one publicly accessible page of the site, which is indexed.
  • We have potentially identified one user who seems to have viewed all the pages that are showing up in the firewall logs (we know this because he shows up in our custom analytics for the web app itself). We have a working relationship with our users and we’re almost certain he’s not based in the US.

I am aware that a HEAD request in itself is nothing malicious and that browsers sometimes make HEAD requests. Does the Java user agent, or lack of a user agent in some cases, make this activity suspicious? I already block empty user agents and Java user agents through the firewall, although I think Cloudflare by default blocks Java as part of its browser integrity checks.

Questions

  1. Is there any reason why these might be legitimate requests that I shouldn’t block? The fact it’s a HEAD request from a Java user agent suggests no, right?

  2. One idea we had is that one of the users is sharing links to these internal URLs via some outside channel, to outsource work or something. Is it possible some kind of scraper or something has picked up these links and is spamming them now? As I say, I was unable to find them publicly indexed.

  3. Is it possible the user we think is connected has some sort of malware on their machine which is picking up their browser activity and then making those requests?

  4. Could the user have some sort of software that is completely innocent which would make Java based HEAD requests like this, based on their web browsing activity?

Any advice as to how I should continue this investigation? Or other thoughts about what these requests are?

Is it possible to use the resources of a second computer to supplement the power for a principal one? [closed]

I’m using COMSOL to set up some models and I have two computers – one that is weak and has the license on and a second one which is very powerful and I would like to use the weak computer with the license to set up the model, the geometry, boundary conditions etc, and the second one for carrying the heavy stuff – the the computation. Are there any ways to do something like this? This questions is more general than just COMSOL. Is there any way to use the resources of a second computer to supplement the power of the first one?

How to determine if particular .NET/ASP.NET version has known vulnerabilities by version-build number using Microsoft resources?

I’m trying to find any list which can help finding if particular ASP.NET version has known vulnerabilities by version-build number. Googling doesn’t help. Is there a known list by microsoft which can help me, containing all existing build numbers (like “ASP.NET Version:2.0.50727.8813”), or any other way of checking if security patches has been already applied, for example the list of security patches with build numbers to which it updates the components? https://www.cvedetails.com/ doesn’t help because it doesn’t contain build information, only lists major versions.

Firefox and Chrome load resources with max-age differently?

I’m trying to troubleshoot something on the client and I believe it has something to do with the the browser caching requests.

I’m loading the same page on Firefox and Chrome (Canary). When I look in the network tab, I see different behavior.

There server response has a max-age set for cache control. I see that Chrome always loads from (disk cache) if max-age has not been reached. But for Firefox, I’ll see it load the resource not from cache once in a while before max-age has been reached. Also I’m seeing 304 ‘not modified’ in Firefox, but not in Chrome.

Can someone help explain what I’m seeing?

Here are some screenshots of the Network tabs… Firefox network tab Chrome network tab