## Is the empty string and some words of even length are elements of this set?

$$L = \{w \in \{a,b\}^*| \text{the first, the middle, and the last characters of w are identical}\}$$.

I have my answers, but I need confirmation:

Is the empty string $$\epsilon \in L$$? Yes. Reason: there is no first, middle, or last character to break the rule.

Words of even length, assuming the first and last characters of them are identical, again, must be in $$L$$, as there is no middle character to break the rule in such words.

This is in the context of theory of computation by the way.

## Are these homebrew attempts at recreating some blast shape invocations from NWN2 balanced for 5e?

In Neverwinter Nights 2, which is based on 3.5e, there were five “blast shape” invocations available to warlocks: Hideous Blast, Eldritch Spear, Eldritch Chain, Eldritch Cone and Eldritch Doom. Now, I know that warlock invocations worked differently in 3.5e to 5e (based on how they’re implemented in this game, primarily), but I wanted to convert some of these into 5e Eldritch Invocations.

Arguably, Hideous Blow could be thought of as being roughly equivalent to Eldritch Smite from 5e (XGtE, p. 56; even though it doesn’t actually modify eldritch blast), and Eldritch Spear already exists in 5e (as a way to increase the range of eldritch blast), so the remaining three are the ones I have attempted to convert.

Here are my attempts at each of the three invocations, with some commentary below each one to explain my thought process.

### Eldritch Chain

Prerequisite: 5th level, eldritch blast cantrip

This blast shape invocation allows you to improve your eldritch blast by turning it into an arc of energy that “jumps” from the first target to others. When you cast eldritch blast, on a hit, you can choose to target an additional creature of your choice within 30 feet of the target with the same beam. Make a ranged attack roll against the additional creature, which takes half of the damage dealt to the target on a hit. You can only use this invocation once per turn with one beam, although you may choose to do so after you know whether a beam hits its target.

When you reach 11th level, your chain can target two additional creatures, both of whom take half of the damage dealt to the original target on a hit, and when you reach 17th level, your chain can target three additional creatures, all of whom take half of the damage dealt to the original target on a hit. You choose the targets in succession, and each subsequent target must be within 30 feet of the previous target of the chain (not the original target). The chain cannot target the same creature more than once (although it can target a creature hit with a different beam that turn), and on a miss, the chain ends and you cannot target any further creatures with the chain.

In NWN2 (and presumably 3.5e), Eldritch Blast only ever fired one beam, and Eldritch Chain was a way of making that hit more enemies, but each additional enemy only took half damage. Considering that eldritch blast in 5e can target multiple creatures already, I wanted to come up with something that felt unique.

I considered having each beam jump to only one addition target to deal half damage, but then a level 17 warlock could hit eight creatures with this thing, which seemed overpowered (and wouldn’t “look right” compared to what it looked like in NWN2, where the one beam would jump to different targets, not four different beams that each jump to one other target).

In the end, I decided to have it target a few additional creatures, but for half damage (Agonizing Blast would be taken into consideration for the original target’s damage, so isn’t added again to each of the chain’s targets), which is the same as in 3.5e, but only on one of the beams, not each beam. Yes, this still increases the number of creatures you can hit each turn, and therefore increases the damage output of eldritch blast, but hopefully the half damage mitigates that somewhat; also, you’ve still got to roll to hit them, so there’s a chance that you’ll simply miss and then it’s no different to not having the invocation at all.

That said, it’s still a clear improvement on RAW eldritch blast, so if it needs to be nerfed further, I could reduce the range to 10 feet or something, although unless the targets are spread out, this won’t really matter. Losing the second paragraph when you reach higher levels is also something that can be dropped, but hopefully not since that would also nerf the look/flavour of Eldritch Chain. I’d still like to keep it as an “at-will” ability, but increasing the damage output of a cantrip is pretty big, so another way to nerf it is to say that you must use it or Agonizing Blast (per beam, so your non-chain beams can still use Agonizing Blast). Depends on how powerful it is as-written above…

### Eldritch Cone

Prerequisite: 12th level, eldritch blast cantrip

This blast shape invocation allows you to invoke your eldritch blast as a 15-foot cone. Each creature within the cone must make a Dexterity saving throw. A creature takes 1d10 force damage on a failed save, or half as much damage on a successful one.

For Eldritch Cone, I’ve simply used the standard cone spell implementation, like burning hands, but it only does the same amount of damage as one beam, to balance out the fact that you can hit multiple enemies with it. My intention is for Agonizing Blast to be included in this damage, so it’s actually 1d10 + 5 force damage for an optimised warlock.

I originally had it as a 30-foot cone that did 3d10 force damage, same as the normal damage output for eldritch blast (which would have increased to 4d10), but that was so powerful that I could only justify that as being once per rest or something, and I’d prefer to keep these as being something that can be used “at-will” to keep that 3.5e feel, so hopefully having a cone shaped cantrip is useful enough to justify only dealing 1d10 damage in a 15-foot cone to be balanced; I’m not sure if even having a cone cantrip is inherently overpowered, or whether the small damage and range somehow makes it underpowered, but hopefully it’s balanced.

### Eldritch Doom

Prerequisite: 18th level, eldritch blast cantrip

This blast shape invocation allows you to invoke your eldritch blast as the dreaded eldritch doom. This causes bolts of mystical power to lash out and savage all targets within a 20 foot area originating from a point you can see within 120 feet of you. Each creature within that area must make a Dexterity saving throw. A creature takes 1d10 force damage on a failed save, or half as much damage on a successful one.

For Eldritch Doom, I’ve implemented it as basically a force fireball, dealing the same damage as a single beam. As above, my intention is for Agonizing Blast to be included in this damage, so it’s actually 1d10 + 5 force damage for an optimised warlock.

I originally had it at 4d10, same as all four beams combined, and had the range at 30-feet, but this would be massively overpowered without a “once per rest” cap on it, but these caps kinda go against what blast shape invocations were about, so as before, I hope that the AOE shape alone is worth an invocation, since you now have a weak at-will force fireball, but without that being inherently overpowered.

Are these three invocations balanced when compared to the other Eldritch Invocations? Specifically, do they make eldritch blast overpowered in a way that dealing reduced damage and taking up a choice of an Eldritch Invocation doesn’t counterbalance?

## What are some good resources out there to help me build an online and offline file converter?

I’m hoping to build both an online and offline file converter (upload a file, convert it to some other specified format, download the new format) as a project. Are there any resources that experienced programmers/hackers/computer scientists recommend? Much appreciated.

## What are some real world applications of graphs?

Can you give some real world examples of what graphs algorithms people are actually using in applications?

Given a complicated graphs, say social networks, what properties/quantity people want to know about them?

## What are some ways I can use Project and Global Verified lists?

I really haven’t played with cross-posting on different projects’ verified lists.
Or, used the Global Verified (or other three) lists.
I understand that the global list may have posts on niche-specific targets, like (e.g.) pinball machines, tulip bulbs, and lightbulbs and so would it be weird to try posting a new site that focuses on vegan food using the global list, or one of the other niche projects’ lists?
Are there any negatives to using my own verified lists?
Could it be perceived as spam if I post multiple links to different pages of the same domain on a single target?

## Some confusion about indexing

HI,
Recently I procured GSA SER EN software. I had GSA SEO indexer. I started a project in GSA SER EN using option with indexing with GSA SEO indexer. But unfortunately I found it does not send automatically but I need to press button “test”. After pressing test button, it send ONLY 10 links to my GSA SEO indexer while my GSA SER EN shows already 970 dofollow links have been created.
Thus, I tried to configure Elite indexer with proper API Key but it also does not send any link automatically I need to press button “test” and after that it send only 10 links to Elite indexer too.
Very confusing. Could you please guide me how to correct this? May be I am configuring something wrong.

## Why do some monsters have so much HP?

My level 4 party ran into a minotaur and it was really tough to kill. I looked up its stats in the Monster Manual and it apparently has 9d10+27 HP, which seems crazy high for a monster that’s lower level than us (it’s CR 3). What’s up with that?

## Is there some mechanisms in PHP to assign “less trust” to scripts in a given dir? (not a duplicate) [closed]

Kindly stop redirecting my questions to that unrelated one which doesn’t answer my question whatsoever. I’ve already read every answer there and it doesn’t help at all. If it did, why would I ask this much more specific question?

This has been a continuous worry and problem for me for ages:

For practical and logical reasons, I am forced to trust some third-party PHP libraries. These are installed, updated and managed with Composer, and live in C:\PHP-untrusted-external, entirely separated from my own PHP scripts, which live in C:\PHP-my-own.

The scripts in C:\PHP-my-own include and make use of the libraries in C:\PHP-untrusted-external.

Since there is no way that anyone, especially not I, could ever vet all the third-party code, and all updates, I’m looking for some way to “secure” or “sandbox” these in some way, even if it’s just partial.

Basically, I’m worried that one day, an update will make an edit such as:

unlink('C:\'); 

Or:

phone_home_to_hacker_server(\$  contents_of_my_harddrive); 

If that happened, the scripts would happily run and do those actions. Nothing prevents them from doing so.

Is there really no way to specify in the php.ini configuration file, something like:

security.sandbox_dir = "C:\PHP-untrusted-external" 

Or:

security.refuse_network_connections_for_dir = "C:\PHP-untrusted-external" security.refuse_disk_io_for_dir = "C:\PHP-untrusted-external" 

… or something like that?

I don’t understand Docker. I have tried it countless times, and it makes no sense whatsoever to me. I don’t want Docker. I don’t want to deal with containers. Correction: I can’t deal with it. I’ve tried to, but didn’t understand it. Several times.

I just want PHP to support this in itself, and it seems more than reasonable to me. Doesn’t it seem reasonable to you?

The saying that “at some point, you have to trust other people” is way too generic/vague to apply here. It’s bypassing the problem. I don’t trust people at all, and for good reason. It seems idiotic that we are (apparently) just supposed to sit around and wait for the disaster to happen. At least if I could prevent the third-party scripts form doing anything with the file system and network, that would go some way toward mitigating this issue. It still won’t make the scripts unable to lie about the numbers/data they return to me, but at least they can’t directly “phone home” or delete random files.

## Need some contextual verified link ( Niches: Android Application like play store)

I need a project including tier 3 link building strategy with a complete video tutorial (How I use it and how I create a tier 3 backlinks profile) and niches related verified links. PM me details including price.