Would an Imp be resistant to the bludgeoning damage from a Mace of Warning? [duplicate]

The Damage Resistances for a 5E Imp are:

Cold; Bludgeoning, Piercing, and Slashing from Nonmagical Attacks that aren’t Silvered

Would this Imp be resistant to damage from a Mace of Warning?

  • You could argue "Yes" because any Weapon of Warning should be considered a magical weapon, and therefore the damage it deals is considered magical.
  • You could argue "No", with a liberal interpretation of the resistances, because the mace is not silvered.

Router Security Warning in Logs

I’m getting regular attacks

2020-07-29 14:44:42 Security Warning ‭Intrusion -> SRC= DST= LEN=40 TOS=0x00 PREC=0x00 TTL=235 ID=63607 PROTO=TCP SPT=52363 DPT=1433 WIN‭ 

it’s every 10 mins as I can see

I changed wifi password and made it hidden AP and the attacks still coming.

I even disconnected all devices and the logs keep getting this attack

Should I be worried?

2020-07-29 14:54:05 Security Warning ‭Intrusion -> SRC= DST= LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=40337 PROTO=TCP SPT=42068 DPT=3378 WINDO‭ 

Warning message (re. php) on the blog page

I’ve got a message below (the part “xyz/blog-name.com” was changed). That error message is not because of a Plug-in, as the message doesn’t disappear even I stop all Plug-ins.

“Warning: Use of undefined constant php – assumed ‘php’ (this will throw an Error in a future version of PHP) in /home/xyz/blog-name.com/public_html/wp-content/themes/stingerplus-child/st-footer-content.php on line 20″

The line 20 in my wp currently reads as fallows;

<a href="<?php//echo esc_url( home_url( '/' ) ); ?>"><?php// bloginfo( 'description' ); ?></a> 

Can anyone please advise me what is wrong here…? Thanks

PHP Warning: Invalid argument supplied for foreach() in /home/padtvro/public_html/wp-content/themes/claudia/content.php on line 30

I have a problem, it is generated in woprdpree in cpanel error log this error: PHP Warning: Invalid argument supplied for foreach () in /home/padtvro/public_html/wp-content/themes/claudia/content.php on line 30 If I delete it, it appears again in 6-7 hours. What’s the problem?

<section id="contents" class="clearfix"><div class="row main_content"><div class="container content_wraper"><?php the_breadcrumb(); ?><div class="grid_8" id="content"><div class="widget_container content_page"><?php require_once dirname(__FILE__) . '/include/cat.php'; ?>  </div></div><div class="grid_4 p7ehc-a" id="sidebar"> <?php $  ge_sidebar = '';                  if (is_search()) {                       $  ge_sidebar = of_get_option('se_sidebar','');                     }else if(is_category() ) {                          $  category = get_the_category();                                               $  cn_sidebar ='';                         foreach($  category as $  ca_id) {                             if(empty($  cn_sidebar)) { $  cn_sidebar = of_get_option('cat_'.$  ca_id->term_id);}                                                        }                          if(empty($  cn_sidebar)) {                             $  ge_sidebar = of_get_option('cat_sidebar','');                         } else { $  ge_sidebar = $  cn_sidebar; }                       } else if(is_author() ) {                          $  ge_sidebar = of_get_option('au_sidebar','');                      }else if(is_tag() ) {                          $  tags = get_the_tags();                                               $  cn_sidebar ='';                         foreach($  tags as $  tg_id) {                             if(empty($  cn_sidebar)) { $  cn_sidebar = of_get_option('tag_'.$  tg_id->term_id);}                                                       }                          if(empty($  cn_sidebar)) {                             $  ge_sidebar = of_get_option('tag_sidebar','');                         } else { $  ge_sidebar = $  cn_sidebar; }                     }                                   $  dyn_sidebar ='';                 if(!empty($  ge_sidebar)) {   $  dyn_sidebar = $  ge_sidebar; };                                foreach ( $  GLOBALS['wp_registered_sidebars'] as $  sidebar ) {                     if($  sidebar['name'] == $  dyn_sidebar)                         {                              $  dyn_sidebar = $  sidebar['id'];                         }                 }                   if(!empty($  dyn_sidebar)) {                     if (is_active_sidebar($  dyn_sidebar)) : dynamic_sidebar($  dyn_sidebar);                     endif;                   } else{                     if (is_active_sidebar('center-sidebar')) : dynamic_sidebar('center-sidebar');                     endif;                 }      ?></div><div class="clear"></div></div></div></section>  

Why do I get this warning when using a null conditional operator?

In the OnTriggerEnter2D function of my Bullet script, I have the following code:

private void OnTriggerEnter2D(Collider2D other) {      if (other.CompareTag("Enemy"))      {          var enemy = other.GetComponent<Enemy>();          enemy?.Death();      } } 

The reason for the null conditional operator (the question mark) in enemy?.Death() is because the Death function actually destroys the Enemy component script, so it suppresses an error when the bullet hits the enemy again. It’s supposed to be shorthand for:

if (enemy != null)     enemy.Death(); 

The code works; the error is suppressed. However, the IDE that I’m using, Jetbeans Rider, gives the following warning:

‘?.’ on a type deriving from ‘UnityEngine.Object’ bypasses the lifetime check on the underlying Unity object.

What does that mean exactly? Should I continue using the null conditional operator?

Google security warning on rclone

I am setting up some new configurations with rclone to backup stuff to google drive. I am configuring application with the steps on https://rclone.org/drive/#making-your-own-client-id

When I am going through google’s oauth process, I am presented with a warning from google enter image description here

I have got the binary from rclone’s github release page. Should I still be worried about malware in the app, or google is just being paranoid ?

OpenSSL 1.1.1b warning:*** WARNING : deprecated key derivation used. Using -iter or -pbkdf2 would be better

We have a homework assignment to encrypt the famous Tux.ppm using aes with ecb and cbc mode. We have to show and outline how insecure the ecb mode is…

So is there any way to ignore this warning?

*** WARNING : deprecated key derivation used. Using -iter or -pbkdf2 would be better.