Unkown files and folder are coming on root inside the folder [closed]

I have strange issue automatically folder creating on root level like this https:// here is domain.com/ledger/ and this ledger folder dont know how it came and some of files name like this 60ltf4re.php

Should I use Two or One Instance of WordPress for Main & Blog Site? [closed]

I have a main site https://www.example.com/ and a blog site under the subfolder https://www.example.com/blogs/ . Whether I should use two separate instances of WordPress for them or use one instance?

I have asked this question on https://wordpress.org/support/topic/use-two-or-one-instance-of-wordpress-for-main-blog-site/#new-topic-0 . But the question does not draw much attention. So I have to ask here.

Partial correctness for array multiplication [closed]

Can someone help me to prove partial correctness and termination for array multiplication.

iptables – How to redirect port 80 to 8080 while keeping 8080 closed to the Internet?

I have a VM running CentOS with a web server I use for hosting random services I deploy over there, so in order to make it reachable from the Internet I opened port 80 using iptables. Since the web server itself is running as a service under a dedicated user that is not root, it is not able to use port 80 directly. Thus, after giving the docs a read, I added a redirection from port 80 to 8080 so the web server could be bound to that port (I do plan to add support for HTTPS later, maybe I will buy a proper domain and then use Let’s Encrypt or something).

So far it has been working fine, but more recently I have noticed that the port 8080 was left open wide as well, so any requests targeting either port 80 or 8080 would get the same response. The thing is, I need only port 80 to be reachable from outside, because somehow my provider considers leaving the port 8080 open some sort of potential abuse? Either way, I don’t want external requests directed to port 8080 to get a response, only those who target port 80 should get any.

So far, this is how my config file for iptables looks like:

*nat
:PREROUTING ACCEPT (89:7936)
:INPUT ACCEPT (70:3812)
:OUTPUT ACCEPT (41:2756)
:POSTROUTING ACCEPT (41:2756)
-A PREROUTING -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 8080
COMMIT
*filter
:INPUT ACCEPT (916:134290)
:FORWARD ACCEPT (0:0)
:OUTPUT ACCEPT (819:117300)
:f2b-sshd - (0:0)
-A INPUT -p tcp -m multiport --dports 22 -j f2b-sshd
-A INPUT -p tcp -m tcp --dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p icmp -j ACCEPT
-A INPUT -p tcp -m tcp --dport 8080 -m state --state NEW,ESTABLISHED -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
-A INPUT -j REJECT --reject-with icmp-host-prohibited
-A FORWARD -j REJECT --reject-with icmp-host-prohibited
COMMIT

I tried removing the rule that opens the port 8080, but after reloading iptables the server would not respond to requests from port 80 either. More recently I have been thinking of maybe adding another redirection rule that would change the source IP to something specific to accept in port 8080, but I am not sure if that will work. I need guidance here.

Note: I’m not too experienced with this tool, that is the main source of my doubts. Also, perhaps I’m missing some rules that could be useful, so any suggestions for new rules in the comments below will be appreciated.

How do you make encounters totally lethal [closed]

I’ll take 5 answers for this one and then combine all of them to make the world’s most lethal encounter.

Ad model vs 0.99 a month [closed]

Just trying to figure which revenue model is better. What brings most revenue per user?

How powerful is the Blood Hunter class? [closed]

Someone sent me their character sheet for a session today and asked if they could make a Bloodhunter. I looked over some of their abilities and it seems pretty strong, but maybe that’s because I’m still pretty new to DnD and trying to DM for people. Still, I was wondering if others knew if it was OP or pretty balanced? I should also note we roll for stats (roll 4 dice take the highest 3), so they have fairly high attributes.

Alcune funzioni di sistema non sono attive. Cosa posso fare? [closed]

Alcuni funzioni di sistema non sono attive. Cosa posso fare?

definition – Is there a standard phrase that expresses that a finite set is closed under addition with respect to the maximum of the given set?

As the title states, I’m curious if there is a succinct way to express that a set, say a set of positive integers, is closed under addition with respect to the maximum of the given set. For example, if $A$ is a non-empty finite collection of positive integers, I would like to articulate in a succinct way the following property: for all $a,a^{star} in A$, if $a+a^{star} leq max A$, then $a+a^{star} in A$.

The above property is clear enough but is there a pithy way to express the above property? For example, $mathbb{Z}_+$ is closed under addition, and we know exactly that this phrase means for all $a,b in mathbb{Z}_+, a+b in mathbb{Z}_+$

Thanks!

reference request – What is the state-of-the-art for solving polynomials systems over fields that are not algebraically closed?

I am not working in the field of algorithmic algebraic geometry – yet, for my current work, I need some results from it.

More specifically, what is the state-of-the-art when it comes to solving (whatever “solving” means in this case) system of polynomials of fields that are not algebraically closed, whose ideal has dimension $>0$?
Could you recommend a survey paper that summarizes what has been achieved so far?

For the case of $0$-dimensional ideals, there seems to exist many heavily cited papers, like “Solving Zero-dimensional Algebraic Systems” by D. Lazard, which seem mostly to be concerned with finding ways of to display the system of polynomials in a nice way (e.g. triangularly). Are these articles already superseded, or does it make sense to read them?