## How can I trim my sprite as it passes through a portal in a 2D scenario, using OpenGL?

It is a very simple question, but after a brief search and a reading of "similar questions", I have not yet found an answer.

I'm creating a 2D game with OpenGL and I came across a problem: let's say I wanted to create portals. An entity can enter a portal A and exit the corresponding portal B. Transforming coordinates and speed of the entity is easy, but it would create a "hard" texture teleportation.
Which means: although half of the entity is in Portal A, it will not be restored to the corresponding B side.
How could I create a smooth transition?

My first idea was: I define the fields "exit" and "entry" containing the transformation function (Matrix). Now, when an entity enters the exit zone, the entity is also drawn into the input area using the input zone transformation matrix. / Release. But to draw it twice would still pose the difficulty, namely that I had to cut the entity on the "back" portals. (The entity must disappear behind Portal A by entering).

So, my second thought was that there should be a solution using shader (vertex?)? But what would such a shader look like? (Code example would be nice, but not necessary, I would rather have an answer "what the shader would do"). Would I define the uniforms (exit and entry areas) that the shader would cut / transform ("move") the vertices?

What does a typical solution look like for this break? Where can I read about this type of problem? I found only 3D versions, where the view of portal B should be rendered in portal A. But that does not solve the problem of moving objects that move … I think
In my opinion, changing the order of the prints or displaying something above the back of the portals is not the right solution, as this could create strange behavior in certain situations. (Portal B is just behind Gate A. For example, one of them would be overdraft, I think.)

## Passport Stamps – Scenario that may occur during a future trip that I could do later

I am a dual citizen of a country from North Africa and from a European country. For specific reasons, I hold a passport from this country of North Africa and ONLY from the identity card of this European country. After traveling from Europe to this country, I had a vacation. The. For registration, when registering, I can technically display only the European identity card, as Europe allows all its citizens to enter with an identity card ( and of course, having entered the other country with my North African passport and stamped it, I will do the same for EXIT), but the question arises at this point because, as far as Concerning the inhabitants of this specific country, they can literally interact with this thing out of ignorance and obstinacy, which means they can refuse to let me do it. board the flight despise to have the right to enter. For example, they may ask me for a PR and pretend that a piece of identification is not proof. How can I convince them that I can effectively? Note that I do not ask you HOW TO TRAVEL WITH 2 PASSPORTS, BUT this way because of my particular situation.

## ux designer – Context Scenario

I have started studying the design of interaction at the university this year.

Discuss how contextual scenarios are developed and how they are used in the design process.

I tried to search for it on Google, but the only results I found were about "Scenarios" in general.

I could not find anything in the details specific to Context Scenarios

For example, an article gave a general overview of "Scenarios" and briefly mentioned different types such as Context, Keypath, etc., but again, nothing very detailed.

Can you help me, please, and maybe give me useful resources that could help me answer the question above?

Thank you very much for any help.

## 5th dnd – Is there a scenario in which a gnoll flesh thief can move at least 45 feet during his bonus action Rampage?

A standard Gnoll Flesh Gnawer (Volo, 154) must choose between each action option and naturally has no more action.

In the normal scenario, the creature can either use its Multiattaque or Sudden precipitation. They can not normally do both.

S & # 39; they chose Sudden precipitation, there is no action left to launch a melee attack that would trigger the rampage.

It's here that haste(PHB, 250) comes into play. If they are under this spell, then they have the option to make an attack with only one weapon. In this scenario, they could use their Sudden precipitation as main action, and then make another attack with their weapon haste action. If they had to reduce a target to 0HP with this attack, they could then trigger the rampage.

Not only that, but their base speed would be 60 rather than 30. Sudden precipitation would give a speed of 120. And if they connected and triggered rampage, then they would have 30 more (because half of their current is now 30, not 15)

## design – Is the observable pattern the right tool for this scenario?

This seems to be a good use of the observer model, which theoretically dissociates the different types of objects. However, I am not sure that the scenario is enough.

Suppose you have `smallTower` and `bigTower` with different resource needs. The orchestration according to your scenario would need to know what type of tower should be built, create the tower object (which knows the necessary resources), then check if the player has enough resources and book it, and then subscribe to tower notifications, build the tower and inform the elements that the tower is built to use the reserved resources.

As you can see, in this scenario, there is interdependence between the tower, the player, and the table before the notification can take place. Especially considering that the tower belongs to the player. It is also strange to have to subscribe to the new object before you can make sure it can be built.

I suggest to consider the use of the generator model (beware: the GoF generator, not the Bloch model). The responsibility of this object would be to verify that the building is feasible and then orchestrate the relationship between the board, the tower and the player.

This builder should know the interface of the 3 objects and would depend on them. But the other objects would remain as coupled as possible.

You could always have an observer for all the events that might interest the tower (completed tower, damaged tower, destroyed tower).

## unit – Debugging this Spherecast Scenario

I currently have a problem in my custom character controller. I have a code that moves the transformation.postion.y of a Gameobject to simulate gravity and the ground is detected with the help of SphereCast. SphereCast is projected from the center of the body down. And then I have a big cube as a field.

When I position the character very high above the cube, and then press the Play button, the character falls and SphereCast detects a hit (scenario 1). But when I always position it above the cube but not at the height of the first example, the SphereCast does not detect a hit (scenario 2). So, it detects a success only when I launch it very high. And this only happens during the first race, because I have a jump function and when I do the first scenario (touches the ground) and then I do a jump, the landing after the jump is detected by SphereCast even if the jump is at the same height as the scenario 2..

My next step is to add a stop point in SphereCast reached when playing Scenario 2, frame by frame. The problem is that when frame-by-frame scenario 2 is detected by SphereCast, I do not know how to solve this problem.

Summary:

• SphereCast touches the ground when the character is placed high above the ground, then the play button (scenario 1)
• SphereCast does not touch the ground when the character is placed high enough above the ground, then press the play button (scenario 2)
• If scenario 2 is done frame by frame, SphereCast reaches
• Need ideas on how to debug

## exploit – Complex XSS Operating Scenario

I want to exploit XSS vulnerability. But my operating scenario is a bit different rather than stealing cookies via XSS, sending them to the attacker and reusing them later (life is hard).

We have a self-written forum with 3 levels of user:

• user
• moderator (can ban / cancel user ban, delete messages, close topics)

We have several pitfalls during the operation process:

• First of all, we are just one regular user
• Session cookie at `HttpOnly=1` flag activated. So, we can not just steal cookies and log in as moderator / admin
• Actions like user ban / unban, delete / create a topic, delete / post a message require `anti-CSRF tokens`. We must collect these chips with XSS.
• We know that moderator / admin has extra buttons, extra pages. They have a very special extended functionality (interface) to administer this forum. Since we are just one regular user we do not know exactly what their interface looks like, so we'll call it unknown interface (We can compare it to stackoverflowor Facebookof mod / admin browser interface). So obviously we have to to explore it's in real time.
• We know that `phpmyadmin` installed, but can only be accessed from the local network (IP Check / Firewall). Only admin can access it (because its `IP` matches). So we need that XSS to log in as admin via his assets Navigator in phpmyadmin (we found via Arbitrary File Read Vulnerability database identification information)
• Since IP controls are implemented, there are several pages accessible only by administrator of his local network. If we try to access it from the outside, they will come back 404 not found. So we need adminThe browser of (with its IP) to scan this site with tools such as: `DirBuster`, `sqlmap`etc. So we need some kind of API. And yes I would like to play internal network attacks (source (PDF, thesis))
• XSS must survive by closing a tab (where user / admin / mod it's injected) = we need persistence

I have an audience `FreeBSD 11.1` server with root access (in reality only local
VirtualBoxbut imagine that it is public). I tested it with several tools and I failed:

• JSShell (requires python packages like `werkzeug`, `flask`etc. after the installation of all, it always fails (in comparison SQL injection tool `sqlmap` works like a charm just by installing it like `pkg install sqlmap` with default `python 2.7` delivered with `FreeBSD`))
• BeEF (requires ruby. there are problems with `libdl.so` because it requires compiling code. So it does not work. I spent several days looking for solutions on Google, compiling my own data, and so on. `FreeBSD 11.2` or move to another BONEis not an option, sorry.)
• xssshell-xsstunnell (XSS Shell uses the ASP + MS Access database, so no)
• JShell (written in python. obviously too simple for my purpose)

All server headers are "correct" (from the attackers' point of view) in the sense that XSS is very exploitable. We can work around `NoScript`, `uMatrix`, `Chromes Auditor`etc.

How can I exploit it? I really want to tweak Chuck Norris <3

## object-oriented – Sequence diagram, main scenario of the "Save a company" use case

About the sequence diagram above, consider the following:

I.The internal actor is the "Company", which is responsible for informing the data to perform the registration of the company.

As the initial interface, the class "Register Company" is used. To register businesses, it is understood that the objects "Branch of activity" and "Postal code" are already registered.

For each object represented, one can see that a "lifeline" has started and when the object begins to interact, the control center is used; his messages are numbered and ordered.

IV.After the execution of operations, the receiving object "Company" sends a message back to the sender interface "Form_Cadastrar Empresa", represented in the dotted line.

The correct elements are:

## Should my sitemap and robots.txt have HTTP or https URLs for the given scenario?

#### Battery Exchange Network

The Stack Exchange network includes 175 question-and-answer communities, including Stack Overflow, the largest and most reliable online community on which developers can learn, share knowledge and build their careers.

Visit Stack Exchange

## Theory of complexity – The relationship between matrix inversion, the algorithm HHL and the unlikely scenario that \$ BQP = PSPACE \$

I'm studying the quantum computing algorithm presented in the article Quantum Algorithm for Systems of Linear Equations}.

Without going through all the details, the HHL algorithm can apply an inverted matrix to a normalized vector prepared in a quantum state in time complexity. $$tilde {O} ( log (N) s ^ 2 kappa ^ 2 / epsilon)$$, that is, to solve $$A | x rangle = | b rangle$$, he calculates an estimate $$| x rangle = A ^ {- 1} | b rangle$$ or

$$N$$ is the dimension of the matrix

$$s$$ the scarcity of the matrix

$$kappa$$ is the condition number of the matrix

$$epsilon$$ is the desired error related

In an argument for the optimality of the algorithm, the authors construct a reduction of a general quantum circuit to a matrix inversion problem with a proof (page 4).

Now, here's where I'm confused, the authors write:

Reducing a general quantum circuit to a matrix inversion problem also implies that our algorithm can not be substantially improved (with standard assumptions). If the execution time could be made polylogarithmic in $$kappa$$, then everything
solvable problem $$n$$ the qubits could be solved in poly (n) time (that is, $$BQP = PSPACE$$), a very unlikely possibility

Why does this imply that $$BQP = PSPACE$$? All ideas are very appreciated.