can someone start the msftconnecttest? [on hold]

as i was away from home. i came home to a computer with a login screen to one of my networking devices (provides wifi and stuff) in a browser (firefox) tab. i checked the history and found that the login page was accessed in the same minute as the msftconnecttest. i looked up msftconnecttest, i dont think it would try to login into a device using a browser tab. Is this fishy? im on windows 10.The PIC

We know someone is scrying on us. Is there ANYTHING we can do about it?

It would be unusual, to me, if there were no spell in the world that could “feedback” (as my DM puts it) on the scryer. We’re usually really creative about this sort of thing, but on this we have no ideas.

Otherwise, besides continuing to try to detect the scrying orb and then casting a spell (or throwing a thick blanket over it), or spending all our time in deep caves, there is nothing we can do.

I suppose we might be able to detect person somehow? That, at least, would be something—though we do not know who it is who is scrying. We just know that it’s happening regularly (’cause we are such big heroes, and about to try to foil a war, is why).

Where can I find someone that will sit with me and explain the analytics reports from my iPhone and computer? [on hold]

This may seem like a dumb question to most people, BUT PLEASE READ THIS!! I AM BEYOND DESPERATE to get rid of a hacker that is digitally stalking me and terrorizing me. I picked your forum because there is so much of the same code writing that I see on my phone. This has been going on for over a year now and I have only found 1 computer forensics website on online. They are a company in Denmark and do not work for consumers, so they wouldn’t even help me. The hackers are my now ex-roommate and 2 other women that are continuously in our phones. For instance the other day I turned on Voice Memo on my husband’s phone and it showed the location to be at a completely different location a couple of miles away from my real address. Then, on my phone, I went to my maps app to get directions to a place and it said that I was at a college campus in a completely different city than where I live. I NEED SOMEONE THAT CAN READ CODE and explain to me what is system operations and what is from the hacker. I have become obsessed with this problem, which just adds to the problems the hackers have created. I find myself going down worm holes (many, A LOT) because of some piece of information I found on the phone or computer and I feel that it is NOT PART OF THE NORMAL OPERATING SYSTEM FUNCTIONS. Since March of this year I have had no Wi-Fi, no cable, no data until about 3 weeks ago when I had it turned back on because I need it to my job, no debit cards, and no social media. I think they are intercepting the signal at the tower that is in the middle of a field way out in the country. Also, I think I found some of their portals/backdoor/link that they have been using to get into my devices. They are relentless, methodical and cruel. They are 50% responsible for my son getting fired from his job because they spoofed his number to call the owner of the company and a couple of other employees at 2am and hang up on them. They track me, all of my text messages are forwarded to someone, my phone calls are recorded, and they turn microphones on to listen to whatever is going on. They are also trying to convince me my husband is having an affair. There is so much that has happened over the last year that I cannot even remember them all. I AM ON MY KNEES BEGGING FOR SOME KIND OF HELP. We can do a remote login or whatever it takes. I have a new job, my dream job at that, and I cannot afford for them to be in the company laptop computer. It is a new company so there isn’t an office yet, which means I am working from home or the library until we get an office.

I NEED A WIN, PLEASE. It is not in my disposition to just let someone get away with this. Plus they are constantly doing things to my phone, like changing my settings, to let me know they are still there. Thank you for your time and reading this. Any advice and/or help given will be GREATLY APPRECIATED.


How do social media apps notify you when someone else takes a screenshot of your profile?

Social media apps like snapchat, instagram, viber.. Etc notify you if you someone takes a screenshot of your profile, chat, conversation, story.. Etc.

How can the app findout that you are taking a screenshot of their conversation, profile,story?

Links:( ( (

Does the Chaos Bolt spell have to target someone else if the energy would leap to a new target?

In Xanathar’s Guide to Everything (p. 151), the spell Chaos Bolt includes the following:

If you roll the same number on both d8s, the chaotic energy leaps from the target to a different creature of your choice within 30 feet of it. Make a new attack roll against the new target, and make a new damage roll, which could cause the chaotic energy to leap again.

Let’s say I cast Chaos Bolt, it hits, and I roll two of the same number on my d8s. However, the party is fighting a lone enemy, so there are no other creatures I want to target.

Can I “choose” to target no-one, since the spell description says “of your choice”, or does it happen regardless, and I just have to choose which party member takes the hit?

In summary, can I choose not to make this extra attack?

How do I handle someone who never ever wants to pull?

I am getting ready to host my first game of Dread and the question that is really bugging me is what happens if a player (and I have one in mind) absolutely refuses to pull every single time?

Dread is pretty clear that you can only kill a character if the tower falls, how do you handle a player who refuses to pull a block every single time?

Can someone can hack my Facebook if i give someone my browser for a while?

As anyone can see network data using browser developer tool, can someone get access to my cookies or API keys by just turning on the developer tool in Chrome or Firefox?

For example, imagine a webapp that sends api key in header with each request. Could someone see this key by just turning on “inspect” in Chrome?

Likewise, if i have an active Facebook session and I gave my system to someone for browsing, could they check for cookies or api keys by just using “inspect” in Chrome?

Is there any way to avoid this?