I was in a game a while back, where my party and I were checking out a location where we are 80% sure a medusa was residing. Lots of stone statues around, missing people reports, etc. I had the idea of scouting the location out from a distance using Arcane Eye, to get an idea of the layout. About halfway through checking out the place, my brain kicks the idea: "Can you get turned to stone though the Arcane Eye?" At that point, I decided better safe than sorry, and dismissed the spell. I asked my DM afterwards, but he just said "Well, maybe you would have been fine maybe not" and wouldn’t give me a straight answer.
I’m looking for an answer to the following:
Are you susceptible while the sensor is within a creatures normal Gaze distance (usually 30") but you are not?
What if you and the sensor are both within the range of the Gaze, but you are only viewing it via the sensor (looking away, eyes closed, some sort of curtain or wall in between, etc)?
How can I see all the cracked passwords in John the Ripper? All passwords are stored in the john.pot file. When I try: "
john --show john.pot" ‘. I get the message: "
0 password hashes cracked, 0 left" Does anyone have a solution for this?
How to prevent Attacker from viewing whats on my android phone screen, can someone give me advice. Or suggest android apps to prevent this, not sure if they will work tho, thanks.
I mean, I’m trying to have a multi-language app (english-spanish), the app is not mine, so it has a lot of legacy code. There is some logic in the code kind of
Col.Caption = "Size"
So, I would like just to change the headers language but trying not to mess with the rest of the code.
When someone performs a search on a search engine and is presented a result page, he is a click away of becoming a visitor of one of the listed links. If you own site appears in the list, you could consider this person as a “potential visitor”.
However, “potential visitor” sounds a bit unclear. For example, this term could be used to designate someone who might be interested in the site at a later time, but this is not what we mean here. Is there a more specific term to name this person?
I have several SharePoint task lists synced to my Outlook but none of them display in my To-Do app. My outlook tasks that aren’t synced from sharepoint are displaying in To-Do, its just the SharePoint tasks that I am having trouble with. Thanks!
I have a requirement where the user is filling out the InfoPath form (saves to list) and adds an attachment. I need that attachment to also be copied over to a document library. However form my understanding this is not doable OOTB.
So another solution I found is I can put a link in the InfoPath form to the document library where they can upload their document. Then when they click on the list item to view the InfoPath form, I want to put a library web part under the InfoPath form toshow the form they uploaded to the document library that corresponds to that InfoPath form.
Is this possible how I am describing? If there is another solution please share as well.
thank you for any assistance.
very simple. I soon discovered a site that pays you if you enter certain codes given by them. Each code gives you $ 0.1. In 60 seconds you can type even 120 codes if you move fast which means $ 12. For starters, you need to make $ 150 for withdrawals, because they want a long-term partnership with you. Then at the second withdrawal,…
is an effective solution for earning on viewing advertising websites!
I wanted to ask a simple question… what are you doing to help your users view URLs in emails on mobile devices? Our training program is helping people to understand how to view URLs before clicking the actual link. On mobile devices this is difficult and every attempt is a risk due to having to hold press to highlight or copy the information.
What suggestions do you all have other than copying the URL into another app to view the text, disabling your cellular and wifi before attemping to hold-press to view the URL, or waiting until you reach a desktop device for suspiscious emails?
We have several endpoints which were authenticated using a bearer access-token. There was another endpoint which will renew/generate a new bearer access-token on passing valid secret_id and client_id.
Now a client is asking for a new endpoint which will give them their already generated bearer access-token as a response from DB on passing valid secret_id and client_id but I feel that it was wrong to have such an endpoint based on several other APIs that I have used in the past.
Are there any drawbacks on providing such an endpoint? Are there any security issues that i should be worried about?