I noticed a process on the server which has been running for more than 12 days, which I think coincides with the last time MySQL was restarted.
mysql> SHOW FULL PROCESSLIST; +---------+-----------------+-----------+------+---------+---------+------------------------+-----------------------+ | Id | User | Host | db | Command | Time | State | Info | +---------+-----------------+-----------+------+---------+---------+------------------------+-----------------------+ | 5 | event_scheduler | localhost | NULL | Daemon | 1098372 | Waiting on empty queue | NULL | | 1774483 | root | localhost | NULL | Query | 0 | starting | SHOW FULL PROCESSLIST | +---------+-----------------+-----------+------+---------+---------+------------------------+-----------------------+ 2 rows in set (0.00 sec)
There are no events, and I haven’t attempted to created any.
mysql> SELECT * FROM information_schema.EVENTS; Empty set (0.00 sec)
This is actively using up to 8% of my server’s CPU.
Is there a way of determining what this is, or why it was started? Will this try to run every time I restart MySQL? If so, what is it ‘waiting’ for and do I need to tweak my configuration at all to prevent this?
Ocular spell states:
(…)When you release an ocular spell, its effect changes to a ray with a range of up to 60 feet. If the spell previously would have affected multiple creatures, it now affects only the creature struck by the ray. You must succeed on a ranged touch attack to strike your target with an ocular spell, and the target is still permitted any saving throw allowed by the spell.(…)
Every spell that has a touch attack (melee/range) Do have a critical hit chance (20X2)
So If I was to release an Ocular Fireball (only affects 1 creature now and it still gets the Reflex Half saving throw though). It could indeed be a critical hit.
I know fireball might not be the best spell for this combination, it was just for the sake of the question.
The latest version of Deluge for Windows that can actually be downloaded and installed is
deluge-1.3.15-win32-py2.7.exe from 2017-05-12.
That’s well over three years ago now!
They have been discussing the problems of releasing the new version for years, but nothing comes from it. Like so many slowly dying (but never quite gone) projects I’ve painfully witnessed in the last many years.
Doesn’t this more than likely make it extremely unsafe for me to be running this software on my machine? I feel as if it’s an open door to my machine, almost certainly containing unpatched exploits.
Yet the sad reality is that there are no alternatives. uTorrent is an ad-infested spyware nightmare since many years, and others… well, just like with browsers, I’ve given up on searching because there’s just nothing out there. Nobody seems to care one bit about the entirely desktop computer anymore.
Can I still use this ancient software? If so, how much longer?
Since WP 5.5 just released and now you can set plugins to auto-update, can this be done via wp-cli? Looking at the documentation, I don’t see a sub-command for it: https://developer.wordpress.org/cli/commands/plugin/
I manage a lot of WordPress sites, most of which are OK to auto-update and would save me a lot of time if they did, as well as reducing security risks.
I’d like to enable auto-updates for plugins across over many wordpress sites. Any solutions?
since the recent update which i just updated to 14.75
i cannot select the engines on the left (when the engines are showing) & cannot right click on engines on left (i.e. to select just dofollow engines)
the engines on the left only show when you restart gsa ser, other wise there is just a blank space on the left where the engines should be, it says “where to submit 343” but below that just a blank space, this is just since the lest update
The rules say that creatures in a heavily obscured area “effectively suffer from the blinded condition”.
The blinded condition states:
Attacks rolls against the creature have advantage, and the creature’s attack rolls have disadvantage.
So when the Darkness spell (to use one example) is cast, combatants gain advantage and disadvantage when attacking others who are also inside the area, which cancel out.
Since they then cancel each other out and attacks are made normally, what really changes?
In the last week, I have gotten an alarming number of text messages from my banks 2FA system sending me verification codes. I believe this indicates my password has been compromised. I’ve had my account for 9 years and nothing like this has ever happened before. I recently added my significant other to the account as a joint holder.
I haven’t contacted my bank yet (although I plan to) but honestly, I don’t imagine they will do anything except for advising me to change my password. And I will. But here’s why I’m reluctant to do that.
In the 2 years that we’ve been together, my SO has had frequent hacks on her various accounts and is constantly getting fraudulent charges on her accounts. A month ago, her Amazon Prime account was being hacked and used to buy digital content, and every time she changed her password the account was being hacked again within a day or two.
Seeing all of this, I believe there might be a keylogger or some other malware on her phone. I’ve mentioned this possibility, but according to her, "iPhones don’t get viruses."
Other than contacting the bank and letting them know what I have seen, and changing the password to the account, what can I do to put the lid on this before it boils over? If it was me, I would go through the phone and delete any app that looked questionable, but since it’s not my phone and my partner isn’t willing to acknowledge the problem, I can’t do that. Maybe I’m jumping to conclusions as well. Any suggestions for an anti-malware scan, or other ways to lock down the security?
I though I’d use burp suite but it only catches request (not the building of a request by Js)
What can I do to do that ?
Also, I thought I’d use browser debugger but strangely, none of the loaded JS seems to be generating the session token. One of the JS just do that and I see it later in burp interceptor.
Any help here ?
Why are you selling this site? Focus on other activities, so allow someone else to benefit from it.
How is it monetized? Google Adsense and affiliate program links.
Does this site come with any social media accounts? Yes.
How much time does this site take to run? 10 hours a week.
What challenges are there with running this site? Updating it.
Age of site: Founded in 1999 with the name/brand LitLinks. Switched to…
Award-Winning Literary Portal Running Since 1999 Goes on Sale!
In D&D 5e, Tomb of Annihilation includes Dragonbait, a saurial. His stat block claims that he can understand Common but not speak it, due to the strange way in which saurials communicate. From Tomb of Annihilation, p. 218:
Languages understands Common but can’t speak
Is there any evidence, either in 5e (which I assume is just what’s presented in Tomb of Annihilation) or anything from previous editions of D&D, that suggests that Dragonbait (whether it’s about Dragonbait specifically or saurials generally) can read or write Common, since he can apparently understand it?