Is it safe to bring an item like a Bag of Holding into a Genie Warlock’s Bottle?

Since the Genie’s Vessel is described as an object/vessel and never as an item, is it safe to bring a Portable Hole, Bag of Holding, or Heward’s Handy Haversack into the bottle?
If your vessel is a ring per the examples, is it splitting hairs to not call it an item?

Genie’s Vessel: — Tashas p.73
The vessel is a Tiny object, and you can use it as a spellcasting focus for your warlock spells.

Bottled Respite: — Tashas p.74
The interior of the vessel is an extradimensional space in the shape of a 20-foot-radius cylinder, 20 feet high, and resembles your vessel.

Bag of Holding: — DMG p.154
Placing a bag of holding inside an extradimensional space created by a Heward’s handy haversack, portable hole, or similar item instantly destroys both items and opens a gate to the Astral Plane.

Is it safe to pg_dump and pg_restore a new postgres database that has malware?

I’m pretty sure there is a crypto bot eating up my CPU through a postgres script. I would like to create an entirely new VM, and move my database with it using pg_dump and pg_restore. I already checked my postgres for new users, tables, databases; couldn’t find anything odd there which could comprise me if I move my data. I’m a little worried however because the bot is some how getting access to my postgres, and nothing else on my VM.

Thank you for the help.

Is it always safe to use WITH SCHEMABINDING in a UDF?

SO I have been reading about WITH SCHEMABINDING and how it can improve the performance of queries using a scalar UDF by omitting the table spool operator from the execution plan. I think I understand halloween protection.

My question is: If I add WITH SCHEMABINDING to a UDF used in a SP is it possible that a SP does not give the same results? If yes in what scenario?

Is it safe to use the Windows “Compress directory to save space” feature on the directory that contains my MySQL general log file?

I have changed MySQL 8 on my Windows 10 development machine to write logfiles (general log and slow queries log) to "E:\mysql logfiles". I’d like to compress this directory using the Windows "Compress Directory to save space" advanced feature in the Windows 10 directory properties to save space (currently my logfile is over 50 GB). I’m wondering though: is this a good idea? Or will this break MySQL in (subtle or not) ways?

Is it safe to extract file from potentially infected disk

I have a hard drive used for years, there are windows and many personal files on it. What I called "files" are images, musics, documents (pdf or docx), but not programs. All the "files" were not initially infected. As I said in the title, the hard drive may be infected by malware (I did not safely use it).

My question is : can I extract these personal files on a safe computer without risk of contamination ? In other words, may these files be infected and spread malware ?

Is Deluge safe to use still when it’s not been updated since the first part of 2017?

https://dev.deluge-torrent.org/wiki/Download

https://ftp.osuosl.org/pub/deluge/windows/?C=M;O=D

The latest version of Deluge for Windows that can actually be downloaded and installed is deluge-1.3.15-win32-py2.7.exe from 2017-05-12.

That’s well over three years ago now!

They have been discussing the problems of releasing the new version for years, but nothing comes from it. Like so many slowly dying (but never quite gone) projects I’ve painfully witnessed in the last many years.

Doesn’t this more than likely make it extremely unsafe for me to be running this software on my machine? I feel as if it’s an open door to my machine, almost certainly containing unpatched exploits.

Yet the sad reality is that there are no alternatives. uTorrent is an ad-infested spyware nightmare since many years, and others… well, just like with browsers, I’ve given up on searching because there’s just nothing out there. Nobody seems to care one bit about the entirely desktop computer anymore.

Can I still use this ancient software? If so, how much longer?

Just adding basic token by POST parameter for securing the API. It is safe?

Let’s say I have an address for an API like this:

mywebsite.com/api/mydata 

If accessed, a JSON will appear like this:

[   {     "id":"1",     "name":"John"   },   {     "id":"2",     "name":"Smith"   } ] 

The result defaults will be displaying the entire data if a post has no parameters. If you use post "ID" and the ID parameter value is one of the existing data in the API, it will only display objects from the data selected based on the ID. The API can be accessed by anyone. API needs to be accessed using token parameters to secure the data.

Let’s say I add a token parameter to be able to access data like this:

yourtoken="yourtoken"  if (post_param[token]==yourtoken) {   // Displaying JSON } 

so if you want to open the API, you need to add a token parameter.

Is simple security like this worth using? what vulnerabilities will arise if I use this? is there a better way than this?