## fragmentation in ipv4 is done at source or routers or at both

fragmentation in ipv4 is done at source or routers? according to what i read, fragmentation can be avoided at source, by doing segmentation at transport layer wisely to match MTU of source network… we can also avoid fragmentation at routers by using PMTUD(path MTU discovery), where we use ICMP packets with dummy port to determine smallest MTU size required in path from source to destination. Then segmentation done at source to match smallest MTU in the path… so, fragmentation is done at both source or routers as per requirements if we don’t use above methods.. is it correct?

## Is there a publicly available source/ list of blacklisted emails or emails associated with malicious activity?

I want to build a simple tool that just checks if an email or email domain is risky or not.

Is there a publicly available list of risky emails that I can do a simple cross reference on?

For example, check if the email person@dangerous-hackers.com or the domain dangerous-hackers.com is on one of these lists.

Any ideas?

## Is there any written RAW definition for ‘Immunity’ in the Source Books?

When reading stat blocks in the Monster Manual there’s once in a while a mention of monsters having immunity to certain damage types.

While the natural language understanding of that is certainly clear, I could never find a written definition akin to those for resistance, vulnerability, etc.

Is there any RAW definition for immunity in the source books?

## using HW random number generator as source of entropy

Currently I am using haveged on my server as source of entropy.

My Server is used as KVM hypervisor, to run virtual machines.

I did not use haveged at the beginning, and I noticed the VMs were draining the entropy pool from the server. Sometimes, when VMs were started SSH waited for enough entropy (to generate session keys, I guess).

Now with haveged, I don’t have this problem anymore.

But I would like to try to use a HW random number generator. I am not saying haveged is bad, but true HW random number generator can only make the entropy better. I have seen some HW RNG which work on basis of Geiger counter, some which collect noise from microphone, and so on.

Which are most reasonable to use ? Could somebody perhaps recommend some specific one ?

Ideally, I would like it to be connected over serial port. Second best would be over USB.

## What DC should I use for someone trying to survive solely with an alchemy jug as their source of food and water?

They have no other access to sustenance or magic. There are no negative environmental effects beyond the complete lack of food/water in the surroundings.

The jug provides one of the following quantities of liquid per day:
$$\begin{array}{c|c} \text{Liquid} & \text{Max Amount} \ \hline \text{Acid} & \text{8 ounces} \ \text{Basic poison} & \text{1/2 ounces} \ \text{Beer} & \text{4 gallons} \ \text{Honey} & \text{1 gallon} \ \text{Mayonnaise} & \text{2 gallons} \ \text{Oil} & \text{1 quart} \ \text{Vinegar} & \text{2 gallons} \ \text{Water, fresh} & \text{8 gallons} \ \text{Water, salt} & \text{12 gallons} \ \text{Wine} & \text{1 gallon} \ \end{array}$$

## Does DFS in an unweighted DAG find the shortest path for each vertex from a source?

I have many questions which related to this topic. I saw somewhere that a topological sorting can be used to find shortest path, and in DAG it can even find shortest weighted paths of all vertex by asking about each vertex whether it’s weighted higher than edge plus previous vertex. The point is, I don’t understand since we are in DAG why isn’t DFS alone enough to find shortest paths. Both weighted and unweighted. I also don’t understand why we need a stack in topological sort. If you were to perform a DFS on some DAG. It will automatically produce a topological sort, if you do a pre-order DFS traverse.

## What was the source of this Magic Items PDF found on Wizards’ website?

This “New Magic Items” PDF, found in the files section of the Wizards of the Coast website, has been shared around on various forums and linked in handbooks over the years. It has several fairly useful items, such as the mantle of rage, but when going through the WotC website, it’s nowhere to be found. What’s the source on it?

(This question came to mind because of a comment by @HeyICanChan wondering about the source of this obscure article, and I ended up wondering as well.)

## Connecting with SSRS using XML Data Source leads to 401 Unauthorized

I am currently working on Report Builder 2.0 with Reporting Services 2008 and am trying to connect to a SharePoint 2013 site using an XML data source query. SharePoint and Report Builder/Services are on different servers. I enter the correct connection string to the SharePoint lists and have tried to connect through “use current Windows user,” manually entering credentials as Windows credentials, and “do not use credentials” but each of these options lead to a 401 unauthorized error. I looked around for solutions and have gotten suggestions of double hop or untrusted connections. Does anyone know what the problem is and how I would go about resolving it?

## What is the source for 5e defaulting to plain English readings of non-game terms?

In many discussions involving rules interpretations the meaning of words is often called into question. Often, people will claim that if the game doesn’t define the term that it defaults to the plain English reading of the word.

Is this stated somewhere explicitly in the rules or in designer comments? What is the source (or sources) for this claim?

## What is the source for 5e defaulting to plain English readings of non-game terms?

In many discussions involving rules interpretations the meaning of words is often called into question. Often, people will claim that if the game doesn’t define the term that it defaults to the plain English reading of the word.

Is this stated somewhere explicitly in the rules or in designer comments? What is the source (or sources) for this claim?