## Using a giant-kin bow as a firbolg

1. It’s as big of a bow as you’ll find
2. You’ve got the stats
3. +50% range for the giant-kin long bow.
4. As with other bows/arrows, if you find magical arrows they’ll each have the features of that kind of magical arrow.

### But firbolgs start out as melee fighters, not bow fighters

Granted, you can work through the details with your DM and find solutions, but:

“The entries for weapon and nonweapon proficiencies list each humanoid race’s initial selections. Unless the DM approves another proficiency, or a special kit is taken, PCs of a particular humanoid race must select their initial proficiencies from their lists.” (p. 16, Complete Book of Humanoids)

Initially, as a Firbolg, you won’t begin the adventure as proficient with a bow. Your can ask your DM to approve the bow proficiency, or, you may need to wait a few levels to add proficiency with that bow to your PC’s list of proficient weapons. That will be governed by whatever class you end up playing.

Firbolg’s initial weapons proficiencies are with: club, halberd, 2H sword {they wield human sized two-handed swords one-handed}, giantkin halberd, giantkin 2H sword (Source: Complete Guide to Humanoids (this is consistent with the MM entry))

If you want to begin with proficiency with the bow, you may want to choose the voadkyn rather than the firbolg for your starting PC race. Up to you.

Once proficient, you will be able to fire 2 arrows per round with basic proficiency, both of which get your strength damage: so each one is 1d8 + 7 on a hit. I am not sure how you arrived at that strength score (20/94%) during character generation: I’ll leave it to you and your DM to figure out if the damage bonus is greater than a +7. (The +7 is based on a strength of 19). If the 20/94% damage bonus is higher than +7, then sub in that bonus for the +7 above.

As with most things in AD&D: work with your DM. You may end up having to accept a non-proficiency penalty for each attack roll until you can earn a proficiency slot for that bow. Or, you can (hopefully) talk your DM into letting you begin as proficient with that weapon.

(Thanks to @Glazius for assistance in preparing this answer)

## Ip allocation logs – Information Security Stack Exchange

In India, the big ISPs have internet users north of 200 million. How are they able to keep ip allocation logs for upwards of seven years, while ensuring proper security measures, efficient retrieval etc.?
It doesn’t add up, seeing that it’s not possible to monetize ip logs.

## network – What technical and/or patent information exists for Apple’s discontinued ‘Back to My Mac’ (BTMM) service, and/or what are possible replacements

Apple discontinued the ‘Back to My Mac’ service in 2019 after twelve years of operation.

As I understand it, this used a combination of Wide-Area Bonjour, a VPN, and probably some sort of iCloud database/directory to automatically keep all of the Macs signed in under a particular AppleID on a VPN so that they could communicate and use built-in services such as file sharing (AFP/SMB), screen sharing, and SSH through NATs and with dynamic IP addresses. No network configuration was required, once one had signed into a computer with their AppleID and enabling the checkbox for ‘Back to My Mac’ in Settings.

The other computers appeared in the Finder (and in other applications, such as Terminal) just as they currently do if they were on the same network.

I believe the AppleTV (and possibly other devices) were also used to provide Wake-on-LAN functionality.

It is possible that Apple discontinued this for any number of these (or other) reasons:

1. to minimize their engineering / maintenance costs
2. to drive iCloud Drive storage revenue
3. they had been licensing some of the underlying technology since the beginning, and wanted to avoid those costs
4. a key component was found to be covered by someone else’s patent, and they were unwilling or unable to license that

It is of note, however, that they disabled the feature for all existing installations of older operating systems, instead of just making it an unsupported / depreciated feature.

Questions:

• if either of the last two reasons are true, does anyone know the patent numbers (or patent holders) and technologies that were licensed?

• are there any open-source replacements for this functionality (beyond what Apple mentions in the above link)?

• what technical references are available documenting Apple’s implementation and what is still missing to create an open-source replacement?

• do you know of any other online discussions of this topic that can be linked to this question?

Thank you!!

## http – From a beginner. How to extract useful information from a extensive output?

`~\$ sudo nmap -dd -A -6 -T5 --open wwww.url_site.com`

That gives a output of almost 2000 lines. So, from a more experienced user: what I should look?

My intention was to found open ports with vulnerable services (little experience with that too).

`dd - I assume that debugging was make it more easy to understand`

`A - It seems useful all the times. `

`-t5 - It was the most fast option`

`IPv6 - Since it's more modern than IPv4`

## Mod-security and WordPress WAF – Information Security Stack Exchange

On my WordPress websites (on LEMP stack with Nginx) I normally install a WAF plugin such as Ninja Firewall or Wordfence.

I was wondering if a better practice would be to replace them with a host-based WAF like mod-security (I guess that running both wouldn’t be recommended…).

## Is using Google Forms to share “passcode protected” information safe from brute force attacks?

I have recently seen many people use Google Forms as a way of sharing “passcode protected” information. They seem to have the first section of the form with a required field asking for a short piece of text (the “password”), and if the inputted text does not exactly match the required text, it gives you a custom error message telling you the “password” is incorrect. The second section of the form is the secret information, which you can’t see until you put in the correct “password” from the first form section. You don’t log in with a Google account either.

I’ve seen many schools use this as a way to share Zoom Meeting IDs and passwords with students. While it superficially seems to work well enough for most people, is this really a safe way of protecting private information? For example, are people who use Google forms to passcode protect information safe from things such as brute-force attacks? I’m fairly sure the “passwords” being used aren’t strong either.

## Mod \$2\$ information on perfect matchings in general graphs

Determinant modulo $$2$$ of biadjacency matrix of bipartite graphs provide mod $$2$$ information on number of perfect matchings on bipartite graphs providing polynomial complexity in bipartite situations.

Is there a similar trick for general graphs which is in polynomial complexity?

## high sierra – Where is opendirectory/accounts/login information stored on macos

I have encountered this problem of slow login (How can I debug an extremely slow login?), and have not found a solution. However, this phenomenon does not exist if I boot up into a fresh system. Since I have a backup of the system sometime ago that was working, I think that if I copy all the system files from that backup over, and then reinstall the system, the issue should be resolved. However, I don’t want to copy all system files, because some of them can be outdated, some of them can be databases that are regularly updated, etc. Hence, I wonder if I can just copy over the opendirectory folders over and see if things get better (I have backups so I’m not afraid of breaking the system), but I don’t know where is that information stored on disk. Where is the data files stored for opendirectory?

## How to know all the available information under a domain

If I run `dig gmail.com A` I get

``````; <<>> DiG 9.16.1 <<>> gmail.com A
;; global options: +cmd
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34113
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;gmail.com.         IN  A

gmail.com.      198 IN  A   216.58.208.101

;; Query time: 16 msec
;; SERVER: 62.179.104.196#53(62.179.104.196)
;; WHEN: Sun Nov 15 11:41:30 CET 2020
;; MSG SIZE  rcvd: 54
``````

If I run `dig gmail.com MX`

``````; <<>> DiG 9.16.1 <<>> gmail.com MX
;; global options: +cmd
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2168
;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;gmail.com.         IN  MX

gmail.com.      3600    IN  MX  40 alt4.gmail-smtp-in.l.google.com.
gmail.com.      3600    IN  MX  10 alt1.gmail-smtp-in.l.google.com.
gmail.com.      3600    IN  MX  20 alt2.gmail-smtp-in.l.google.com.
gmail.com.      3600    IN  MX  5 gmail-smtp-in.l.google.com.
gmail.com.      3600    IN  MX  30 alt3.gmail-smtp-in.l.google.com.

;; Query time: 116 msec
;; SERVER: 62.179.104.196#53(62.179.104.196)
;; WHEN: Sun Nov 15 11:41:55 CET 2020
;; MSG SIZE  rcvd: 161
``````

Without trial and error is there a way, a command to run that shows the other records that are available (apart from A and MX records)?

## No information displayed for older purchases on eBay – Why?

If i click on some of my previous purchases on Ebay, i cant see the original listing, this tends to happen with older purchases.

Any idea why this is, and if there is anyway around it so i can see old purchases ?