I exported my database and content to a new WordPress. Everything works fine, except that every post is showing under today’s date, instead of the published date like it should be (the actual published date is the good one in the dashboard though).
It was working correctly in my last WordPress (5.0.11). The new one is 5.6.1. Here’s the PHP related to the date in my theme :
<span class="post-date"> <?php $ date = date_i18n( get_option( 'date_format' ), strtotime( get_the_date( 'r' ) ) ); printf( esc_html_x( 'Publié le %s', 'Publié le DATE', 'chosen' ), $ date ); ?> </span>
Any idea what happened?
I noticed a process on the server which has been running for more than 12 days, which I think coincides with the last time MySQL was restarted.
mysql> SHOW FULL PROCESSLIST; +---------+-----------------+-----------+------+---------+---------+------------------------+-----------------------+ | Id | User | Host | db | Command | Time | State | Info | +---------+-----------------+-----------+------+---------+---------+------------------------+-----------------------+ | 5 | event_scheduler | localhost | NULL | Daemon | 1098372 | Waiting on empty queue | NULL | | 1774483 | root | localhost | NULL | Query | 0 | starting | SHOW FULL PROCESSLIST | +---------+-----------------+-----------+------+---------+---------+------------------------+-----------------------+ 2 rows in set (0.00 sec)
There are no events, and I haven’t attempted to created any.
mysql> SELECT * FROM information_schema.EVENTS; Empty set (0.00 sec)
This is actively using up to 8% of my server’s CPU.
Is there a way of determining what this is, or why it was started? Will this try to run every time I restart MySQL? If so, what is it ‘waiting’ for and do I need to tweak my configuration at all to prevent this?
Ocular spell states:
(…)When you release an ocular spell, its effect changes to a ray with a range of up to 60 feet. If the spell previously would have affected multiple creatures, it now affects only the creature struck by the ray. You must succeed on a ranged touch attack to strike your target with an ocular spell, and the target is still permitted any saving throw allowed by the spell.(…)
Every spell that has a touch attack (melee/range) Do have a critical hit chance (20X2)
So If I was to release an Ocular Fireball (only affects 1 creature now and it still gets the Reflex Half saving throw though). It could indeed be a critical hit.
I know fireball might not be the best spell for this combination, it was just for the sake of the question.
The latest version of Deluge for Windows that can actually be downloaded and installed is
deluge-1.3.15-win32-py2.7.exe from 2017-05-12.
That’s well over three years ago now!
They have been discussing the problems of releasing the new version for years, but nothing comes from it. Like so many slowly dying (but never quite gone) projects I’ve painfully witnessed in the last many years.
Doesn’t this more than likely make it extremely unsafe for me to be running this software on my machine? I feel as if it’s an open door to my machine, almost certainly containing unpatched exploits.
Yet the sad reality is that there are no alternatives. uTorrent is an ad-infested spyware nightmare since many years, and others… well, just like with browsers, I’ve given up on searching because there’s just nothing out there. Nobody seems to care one bit about the entirely desktop computer anymore.
Can I still use this ancient software? If so, how much longer?
Since WP 5.5 just released and now you can set plugins to auto-update, can this be done via wp-cli? Looking at the documentation, I don’t see a sub-command for it: https://developer.wordpress.org/cli/commands/plugin/
I manage a lot of WordPress sites, most of which are OK to auto-update and would save me a lot of time if they did, as well as reducing security risks.
I’d like to enable auto-updates for plugins across over many wordpress sites. Any solutions?
The rules say that creatures in a heavily obscured area “effectively suffer from the blinded condition”.
The blinded condition states:
Attacks rolls against the creature have advantage, and the creature’s attack rolls have disadvantage.
So when the Darkness spell (to use one example) is cast, combatants gain advantage and disadvantage when attacking others who are also inside the area, which cancel out.
Since they then cancel each other out and attacks are made normally, what really changes?
In the last week, I have gotten an alarming number of text messages from my banks 2FA system sending me verification codes. I believe this indicates my password has been compromised. I’ve had my account for 9 years and nothing like this has ever happened before. I recently added my significant other to the account as a joint holder.
I haven’t contacted my bank yet (although I plan to) but honestly, I don’t imagine they will do anything except for advising me to change my password. And I will. But here’s why I’m reluctant to do that.
In the 2 years that we’ve been together, my SO has had frequent hacks on her various accounts and is constantly getting fraudulent charges on her accounts. A month ago, her Amazon Prime account was being hacked and used to buy digital content, and every time she changed her password the account was being hacked again within a day or two.
Seeing all of this, I believe there might be a keylogger or some other malware on her phone. I’ve mentioned this possibility, but according to her, "iPhones don’t get viruses."
Other than contacting the bank and letting them know what I have seen, and changing the password to the account, what can I do to put the lid on this before it boils over? If it was me, I would go through the phone and delete any app that looked questionable, but since it’s not my phone and my partner isn’t willing to acknowledge the problem, I can’t do that. Maybe I’m jumping to conclusions as well. Any suggestions for an anti-malware scan, or other ways to lock down the security?
I though I’d use burp suite but it only catches request (not the building of a request by Js)
What can I do to do that ?
Also, I thought I’d use browser debugger but strangely, none of the loaded JS seems to be generating the session token. One of the JS just do that and I see it later in burp interceptor.
Any help here ?