## Cannot submit valid form in FormFunction

I have a simple `FormFunction` like this:

``FormFunction[{"expr" -> ToExpression}, HTTPRequestData[] &] ``

When I use CloudDeploy, it works as normal. But when I use `SocketListen` and `GenerateHTTPResponse` to establish a server, my Chrome seems have submitted no data as I can’t Find it in the results of HTTPRequestData.

I’ve tried remote server(instead of local), `#expr`(instead of `HTTPRequestData`), none of them works. If I use `APIFunction` as the backend and `URLRead` as the client, everything is OK.

What’s missing for the submission compared to the WolframCloud one?

## Is this a valid heuristic for Dots and Boxes to reduce the branching factor of the search tree?

I am implementing an AI based on the MiniMax algorithm that plays the game Dots and Boxes. I would like to reduce the branching factor of the search tree, by introducing a heuristic rule that limits the number of successor states. However, I am not sure whether there exist any situations, where this rule would exclude the optimal move and make the AI play worse.

In the game 2 players take turns, until one of them captures a box, after which they have to make another move, possibly capturing another box etc. For this purpose, I define successor states of $$S$$ to be all states, where the opponent gets the move, or the terminal state. If a player made a capture and still has to make another move, then the current state is not yet a successor state of $$S$$ – the player has to continue making moves until they’re unable to.

My rule is as follows:
Assume a player makes a series of captures from a starting state $$S$$ and ends it with a move $$m$$, after which the turn goes to the opponent. Then it’s always better or at least not worse for the player to have made as many captures as possible before finishing the sequence with $$m$$.

This means that any state $$S$$ always has less successors, then there are legal moves. All successors where the player captures $$n$$ boxes and finishes with move $$m$$ are discarded, unless $$n$$ is the maximum number of boxes that can be captured such that $$m$$ can still be a finishing move. For example, in the following state:

immediately capturing the 4 boxes leads to a loss, while dividing them into 2 small chains, 2 boxes each, with the move (2,2)-(2,3) leads to a victory. The optimal strategy is consistent with the rule, as it would not be possible to finish with the move (2,2)-(2,3), if any of the boxes were captured. The rule excludes all successors, where the player captures 1 or 2 boxes, from being considered.

## Can I test ssl connection locally with a valid certificate (CA) with local dns?

I have a wildcard valid certificate signed by Certificate Authority. Is it possible to test the https locally from the server without a registered DNS?

My idea is to bind the domain name with 127.0.0.1 in `/etc/hosts`.

The HTML is running on Nginx container and I am using centos 7.

Is it possible to make an SSL handshake with `curl https://<dnsname>.<name>.com:443` or it needs to be public DNS?

Note: ICMP is disabled but the server is connected to internet

## Can bruteforce attacks be prevented with tables of valid inputs?

Can this method of encryption prevent bruteforce attacks?

If I had a hypothetical table (or function) where every grammatically valid sentence (in existence, limited to some number of words) was given an associated number, e.g:

``"Good morning, how are you." = 3283 "Today is a nice day." = 2183 ``

Then added a number (as a key), e.g:

``3283 + 1234 = 4516 ``

Wouldn’t this final output of `4516` be effectively protected against bruteforce attacks?

Ignoring the difficulty of producing a hashtable/function capable of reducing every valid input into a single number, and the issue of sending the key `1234` securely.

Is there any way of finding the original input only from the output?

Is limiting the domain of the encryption to only valid inputs, an effective method of preventing bruteforce attacks?

If so is there any practical example of this? Why or why not?

## Is this a valid use of Deflect Missiles according to RAW?

A level 3 monk is wielding a dagger in each hand, without the two weapon style or duel wielder feat. He makes a melee attack then as a bonus action makes a ranged attack by throwing a dagger straight in the air above him. His turn ends before it falls and if it hits him he uses his reaction to catch and throw it.

## How to code an algorithm to generate a random but valid train track layout?

I am wondering if I have quantity C of curved tracks and quantity S of straight tracks, how I could write a computer program to design a “random” layout using all of those tracks, such that the following rules are satisfied:

1) The tracks, when all connected, form a closed (continuous) loop for the train to go around.

2) Ramps, bending of tracks, bumping of tracks, crossing of tracks are all not allowed.

So would the computer program have to create a geometric model and remember the exact positions of each track or is there some simpler way to code this? I want to be able to “push a button” and the computer “spits out” a valid “new” layout for me.

Do I need to give the exact measurements of the 2 types of tracks? If so, I can provide those.

I have some coding skills but I need to know an algorithm first before I can code something meaningful (other than just testing a few parts of a candidate algorithm)

## Is it a valid or acceptable practice to develop a separate page to meet accessibility requirements?

I recently visited some websites that seems to be using either deprecated technology (e.g. Flash) or contain a lot of complex front end javascript code to create the interaction of the user interface.

Some of these websites provide a link or button that takes you to a accessibility mode page which strips all the unnecessary features and provide just the content that is optimised for screen readers and provide other accessible features (e.g. keyboard navigation).

With accessibility being such a big focus today, and inclusive design slowly being incorporated into many of the standard design systems, is it still seen as an acceptable practice to provide a separate page to meet accessibility guidelines (i.e. WCAG 2.0)? Are there other reasons why this might be a better strategy/option in the current design and development culture?

## Is editing a link using inspect element a valid XSS attack?

Using inspect element, I can edit a link so it becomes:

``<a id=x tabindex=1 onactivate=alert(1)>StackOverlow Question Title here</a> ``

When clicked upon it opens a popup in edge with the text “1”. Is it a possible XSS attack?

## Java assignment declaration valid or invalid [on hold]

Question: Why are the following assignments all invalid? Please can you explain why for each individual assignment. I had thought one or two of them were okay given we imported toyPackage.

Given the classes below, indicate whether the assignments are valid or invalid. Notice that we are using two packages.

package toyPackage; public class Toy { protected int size; static int max; public static final int temp = 10; }

package experiment; import toyPackage.*;

public class Driver { public static void main(String[] args) { Toy p = new Toy(); p.size = 10; /* Invalid / p.max = 20; / Invalid / Toy.max = 30; / Invalid / Toy.temp = 40; / Invalid */ } }

## how can i test if FBconnect app api key is valid or not

i am new to api testing and i have found a fbconnect api key and id of a webapp. i have reported it and its in triage state currently. but the analyst asked me to verify the key if its valid or we have rely on program to verify the key. the problem is program can change secret key in 2 minutes if they dont want to pay. so is there any way for me to check if its valid or not??

so how do i use it to access or login to app for verification. also suggest a safe way to test this if you can.