How can I discourage gluttony while still granting buffs?

In Wendy’s Feast of Legends, characters gain bonuses for foods eaten by their players.

The game explicitly mentions that buffs stack and there are a total 6 different food items (briefly: burger, chicken, frosty, drink, fries, salad).

A particularly health-reckless power-gamer could gorge themselves on in order to gain limitless bonuses. Of course the intersection between power gamers and players of Wendy’s Feast of Legends should be fairly small, but even so.

It also feels unscrupulous to deny bonuses to someone that brought their own food that doesn’t fall into those categories (soup, for example), or doesn’t consume certain food items (beef, for example).

How can I fairly offer buffs (and debuffs?) without directly involving player-food-consumption?

If a Shadow Magic sorcerer replaces Darkness with another spell, can they still cast it?

The Shadow Magic sorcerous origin learns darkness as an extra known spell. They also gain additional ways of casting darkness.

When you reach 3rd level in this class, you learn the darkness spell, which doesn’t count against your number of sorcerer spells known. In addition, you can cast it by spending 2 sorcery points or by expending a spell slot. If you cast it with sorcery points, you can see through the darkness created by the spell.

And whenever a sorcerer gains a sorcerer level, their Spellcasting feature lets them exchange one of their known sorcerer spells for another sorcerer spell.

Additionally, when you gain a level in this class, you can choose one of the sorcerer spells you know and replace it with another spell from the sorcerer spell list, which also must be of a level for which you have spell slots.

Suppose when this sorcerer reaches 4th (or higher) level, they replace darkness with another sorcerer spell of their choice. For the purposes of this question, assume they do not know darkness from other sources such as racial traits or multiclassing.

Despite not knowing the darkness spell anymore, can they still cast it by spending sorcery points? Can they still cast it by expending a spell slot?

If I do not need to breathe, do I still need my heart and lungs?

Mystic has the a discipline which states

While focused on this discipline, you no longer need to eat, breathe…

So would I still need my heart and lungs since I have no use for them anymore? Can I just scoop out all of my internal organs since I also don’t need my stomache as well? It could be helpful when playing dead or just hiding stuff inside of my body

Ubuntu (18.04) and Windows 10 dual boot, still no grub after bcdedit?

I follow online instruction of dual boot installation (https://itsfoss.com/install-ubuntu-1404-dual-boot-mode-windows-8-81-uefi/). I don’t see the grub menu after restarting, so I run the following command.

bcdedit /set "{bootmgr}" path \EFI\ubuntu\grubx64.efi 

Still, grub menu doesn’t show up. This is the output of firmware list.

C:\WINDOWS\system32>bcdedit /enum firmware  Firmware Boot Manager --------------------- identifier              {fwbootmgr} displayorder            {bootmgr}                         {50c9cf6a-342b-11e6-9bc2-806e6f6e6963}                         {54105881-342c-11e6-9bc4-902b3437cf9f}                         {de81aff9-3432-11e6-aa8c-a9c6ab883861}                         {de81aff6-3432-11e6-aa8c-a9c6ab883861} timeout                 2  Windows Boot Manager -------------------- identifier              {bootmgr} device                  partition=\Device\HarddiskVolume2 path                    \EFI\ubuntu\grubx64.efi description             Windows Boot Manager locale                  en-US inherit                 {globalsettings} flightsigning           Yes default                 {current} resumeobject            {385bbc4f-b349-11e9-adc8-8f2df3855239} displayorder            {current} toolsdisplayorder       {memdiag} timeout                 30  Firmware Application (101fffff) ------------------------------- identifier              {50c9cf6a-342b-11e6-9bc2-806e6f6e6963} device                  partition=\Device\HarddiskVolume2 path                    \EFI\BOOT\BOOTX64.EFI description             UEFI: Hard Drive  Firmware Application (101fffff) ------------------------------- identifier              {54105881-342c-11e6-9bc4-902b3437cf9f} device                  partition=\Device\HarddiskVolume9 path                    \EFI\BOOT\BOOTX64.EFI description             UEFI: Hard Drive  Firmware Application (101fffff) ------------------------------- identifier              {de81aff6-3432-11e6-aa8c-a9c6ab883861} description             CD/DVD Drive  Firmware Application (101fffff) ------------------------------- identifier              {de81aff9-3432-11e6-aa8c-a9c6ab883861} description             Hard Drive 

Anything missing here? Thanks for the help.

Launch forms in a Dialog set to “No”, but dialogs are still launching

I’m using Sharepoint Online, and in the advanced list settings I have “Launch forms in a dialog?” option set to no. However in the (Modern) list view it continues to open item details and editing in the slide out modal.

How/Can I force item details to redirect to a page instead of opening a model in the modern list view?

Am I protecting myself well or can I still be traced back to?

I am practicing penetration testing as a newbie on a website (which allows this), and would like to know what traces I can leave that could be used to trace back to me.

My setup consist of: • My laptop which uses Ubuntu as a host OS. • Kali linux inside a virtual machine. ∆ This will be a temporary OS that I will delete after the attack. • An external wifi adapter with a spoofed MAC and IP address. ∆ I use an external USB wifi adapter so I am not using the network card built into my laptop which is tied to laptoo identity. ∆ I spoof the MAC address using Macchanger on both the internal and USB wifi cards so the real MAC address is not used. ∆ I spoof the IP address which i do by creating IP packets which have a modified source address in order to hide the identity. • Proton VPN. ∆ This is to not reveal my real location, since a spoofed IP and MAC address would not change your location but only the identity of the network card. • Connected to a public wifi with no account creation. ∆ In case of a trace back to my location even if a VPN is used, it would not be my home or some other identifiable location, but instead a network with a lot of other users. • I have no identifiable files on my real OS in case the trace broke through the VM.

I would like to know how I could still be identified as a person even though I use all of the above protections, and how the trace could break through the VM?