The answers in the Question: A question about Celerity spells confused me…
Some people claim that immediate actions are resolved in the order they are called wich I agree, except in the case of celerity because it says you can interrupt with it:
The Celerity spell states:
(…)When you cast this spell, you can immediately take a standard action, as if you had readied an action. You can even interrupt another creature’s turn when you cast this spell(…)
Immediate Actions Much like a swift action , an immediate action consumes a very small amount of time, but represents a larger expenditure of effort and energy than a free action . However, unlike a swift action, an immediate action can be performed at any time — even if it’s not your turn. Casting feather fall is an immediate action, since the spell can be cast at any time. Using an immediate action on your turn is the same as using a swift action, and counts as your swift action for that turn. You cannot use another immediate action or a swift action until after your next turn if you have used an immediate action when it is not currently your turn (effectively, using an immediate action before your turn is equivalent to using your swift action for the coming turn). You also cannot use an immediate action if you are flat-footed .
So with this info let’s say a fighter wants to attack you, you have to call your celerity before the attack roll right? If a mage wants to cast a spell, you have to call your celerity before the spell benefits/roll etc. is called (to interrupt them of course), why can’t you do the same while the wizard using celerity (let’s say not on his turn), you could just interrupt his standard action (given by celerity) with celerity?
I’d like a RAW reference if possible (FAQ or pathfinder is acceptable if there’s nothing in 3.X)
I’m trying to figure out if the data created by a Mac user on a local mac is truly secure from other users on that same mac. For example, on MacOS Catalina, I have three accounts:
- User 1 (Standard)
- User 2 (Standard)
Each user as a discreat robust password. FileVault is enabled.
If User 2 saves data in their private (non-shared) folder, is there anyway for User 1, or Administrator to access that data without User 2’s password?
All three users are me. I use User 1 account for everything personal. I only use Administrator for administrator functions. I’ve created User 2, to use for working at home, for the purpose of segregating sensitive work documents from my personal account. My thought is that if User 1 account gets hacked or compromised, can a hacker get the information I saved on the same computer as User 2?
The only thing I can think of is if hacker gains access to Admin account, then a key logger can be installed and capture my credentials when logging into User 2.
It has come up in game a couple of times that a player might want to cast a spell that has a casting time of 1 bonus action using their “main” action (if they have another bonus action they also want to take on that turn, such as giving bardic inspiration, or controlling a Bigby’s hand, etc.)
On the face of it, it seems obvious that something (a bonus action) that is usually much faster than a full action could be done as your full action. Although the question comes up most often with respect to spellcasting, if I house rule this, I would rule that any bonus action can be taken as a regular action instead; however, I would not allow the same type of bonus action to be taken twice (so no giving bardic inspiration to two allies on the same turn, for instance).
Are there any abusive or overpowered combinations I should be wary of if I were to allow a character to take 2 bonus actions instead of one regular action and one bonus action on a turn?
The issue of casting two bonus-action spells would not come up because the rule against casting 2 spells on your turn unless one of them is a cantrip with a casting time of 1 action would still be in effect:
PHB p. 203 (under Bonus Action casting time)
You can’t cast another spell during the same turn, except for a cantrip with a casting time of 1 action.
I know it’s hard to prove/justify a negative answer to a question like this, but I’d be happy to get answers that say you don’t think there would be any issues if you describe how you came to that conclusion.
Recently a paper has been released about SHA-1 chosen prefix collision.
They present what a chosen prefix collision is, but I don’t understand how is it more interesting than a standard collision ? They briefly mention x509 rogue certificate, but I still can’t get the point.
Can anyone explain to me how interesting it is compared to standard collisions ? Hopefully with an example a bit more detailed ?
Thanks in advance !
I’ve heard both terms “logic operation” or “logical operation” used. Is either more common?
This question already has an answer here:
- Are plants creatures or objects? 2 answers
If a player chopped a tree with an axe, leaving a big wedge cut into it, could it be healed with say, a cleric’s Cure Wounds?
It says a ‘Creature’, which I would suppose means any living thing, although I guess undead are also creatures since it has an explicit comment about the spell not working on them.
I am asked about my opinion in a case as follows:
Someone visited a (totally legal, in fact US government) website A and identified themselves. At a very different point in time they – allegedly – visited a (doubtlessly very) illegal website B.
US law enforcement claims there is no doubt that the access to B was by the same person/from the same PC as the access to A. If the identification were based on the client’s IPv4 address (outside the US!), say, I’d argue that these are typically reassigned to new client’s every few hours or days (not to mention shared/NATed use by multiple entities, including WiFi guests), hence is at most very weak evidence. In addition, it currently seems that the non-US ISP was not asked to reveal the identity of their customer associated with the IP in question at the point of time in question. Rather the claim of identity is by comparison with said access to A. Meanwhile, it seems that the identification is not claimed to be done by IPv4 address, but rather by something referenced as a “GUID” identifying the PC. I am not aware of a standard or wide-spread use of any such GUID in any internet protocol that would allow cross-site identification between sites that do not even wish to collaborate on such an issue.
Note that the term GUID was specifically mentioned, i.e., we are not talking about browser fingerprinting or cookies.
Q: Is there anything “GUID-like” that can act as described to identify a PC/device across multiple unrelated(!) sites? In TCP? In http? In TLS? “Anywhere else” in the process?
puma shoes sale sent shock waves through the sneaker industry this summer with the surprising announcement that they were re-launching their long-dormant basketball line. With the signings of promising rookies like Marvin Bagley III, DeAndre Ayton, and Michael Porter, the German brand is aiming to make inroads on a market that’s long been dominated by the likes of Nike and adidas. Now, it’s time for their first real foray into basketball footwear in over two decades, as the inagural Clyde Court Disrupt is set to drop soon. The shoe takes cues from the classic Puma Clyde but isn’t tied down by the past — as it features a knit upper and Puma’s brand-new hybrid cushioning technology to ensure modern-day performance. Arriving in a bright combo of reddish-orange and yellow, the shoes also boast a black knit formstripe graphic and a “1973” hit on the heel tab, nodding to the first-ever release of the Clyde.
Founder of Detroit sneaker shop Burn Rubber, Rick Williams presents his next sneaker collaboration under his Distinct Life imprint, teaming up with Puma on the puma ignite shoes pack that includes one classic and one modern model. Inspired by his own black and white photography, the two-shoe pack includes the IGNITE Limitless and Suede V2 in black, white, and grey color schemes for a clean, simple, and strong look. Both sneakers also feature a selection of Rick’s photos visible underneath the clear outsoles and on the sockliners.
puma suede classic mens’s year-long celebration of 50 year’s of the illustriously influential Suede silhouette has resulted in a number of esteemed collaborative efforts with the likes of Bobbito Garcia and The Weeknd. Now, the German Sportswear Brand is set to team up with the German creative director of high fashion labels, Chanel and Fendi. While neither of those labels are German, the connection between the iconic sneaker brand and Karl Lagerfeld is apparent. Lagerfeld’s signature style is well-documented, as he is almost always photographed in a suit and with a pair of black sunglasses on. This new two-piece set of Suedes pays homage to his luxe fashion trends, as the black version equips two suit jacket lapels, while the grey variety ushers in a boisterous forefoot sunglasses shape.
With a vast majority of the NBA’s elite battling it out in the playoffs for their chance to claim an ever-elusive Larry O’Brien Trophy, puma sneakers sale has released a timely colorway of the Clyde Court Disrupt dubbed the “Title Run.” With victory comes luxury, so the “Title Run” is dressed in a championship-esque gilded palette complete with metallic gold accents, and even features shimmering gold thread woven into its fabric. Although looking good is indeed important, you’ll also need to be at your highest level of play if you aim to take home the hardware, so these Puma Hoops kicks feature custom cushioning technology.
We have an SP2019 test farm running SharePoint Server 2019 Standard, version 16.0.10351.20000 (October 2019). I have a few questions regarding compatibility between SPFX development and SP2019 on-premise:
Is it important to keep the SP2019 environment updated with the latest monthly release in order to ensure compatibility with the latest version of the SharePoint Framework?
Is there any guidance regarding development targeting SP2019 standard edition vs. enterprise (article, blog post)?
Some on-line posts state that SPFX should be kept at version 1.4.1 for SP2019. Is this still true?
Does anyone have any experience regarding possible deployment issues when development is performed on SharePoint Online? Development environment is O365.
Thanks in advance!
I open project LWRP to donwload free unity assets and then transfer what is good to my project LWRP.
I tried to get some particle system. I copyed the all settings and then I found shader “Standard Unlite” is not working in my project !. I tried to use the LWRP shaders but didn’t give me the same result ? How to solve this ?