What's a balanced version of this vending machine?

One of my players wants to buy / put in service a vending machine that produces a potion of care a day. I like the idea, but I do not want it to break the game. What are the reasonable terms and possible prices?

lens – What's the biggest difference between these two big animal pictures?

The second image is "better" mainly because it is a fat glamorous cat that looks glamorous and dangerous. It's better for the same reason that James Dean's pictures are better than those of me.

In terms of composition, I appreciate the fact that the leopard photo is a portrait rather than a landscape (it is however a personal preference) and that all the cat is in the frame, with a narrow enough DoF to mean that you just get hints at most of them. I like the leaves in the RHS of the leopard photo. In your image, almost all the gorilla is missing, especially the left hand, which annoys me.

For the gorilla, I do not think you could have had it all (hmm, I feel bad about calling a gorilla "but not a leopard, which is interesting to a linguistic point of view) in the frame while keeping a special focus on what we eat is the focal point of the image. It might have been better to be closer (or more) and frame the interesting part. Maybe something like this:


Although I spent little time thinking about the composition when making this crop (she wants more space up, I think, but it's the top of the original mount, so there is not one). However, I am a bit pretentious, but I do not feel very good about cultures. Again it's just me.

This cropping as such is not really clear enough, even for me, especially for the eyes: I do not know if it's because I'm doing it from an already reduced JPEG file and / or that imgur further reduces the quality. But it may be that the resolution is not enough, in which case the answer is a longer goal or (better!) Closer ("if your images are not good enough, you're not close enough") . Or maybe the goal is wrong but I do not think so.

In terms of image quality and everything else: do not worry, your photo is fine. Again, it's just me: I love the pictures and the stories that they tell. I would be very happy if I had taken this picture.

(And of course, I'm always tempted to say that everything is better in black and white:


even with a very rudimentary conversion. Except that it does not look better: it looks more "filmed". because the slight blur now looks a bit like the 35mm B / W film, but it lacks the color of the thing eaten that is essential to the picture: it is therefore necessary to be in color. So I'm wrong about that.)

linux – What's up with my $ PATH?

I'm trying to make my personal cmake installation the default option for my user by adding a directory to PATHbut I am confused and hope to get some help.

I am remotely connected to a Linux environment. If I type echo $0 I receive -tcsh output. All I find online indicates that the PATH variable in tcsh is separated by spaces, but if I type echo $PATH I get a list of directories separated by :. It's bash-like.

If I type PATH=foo, I receive Command not found. If I try instead set PATH = foo, I can echo $PATH and get foo. It's like tcsh.

If I type which cmake I receive /bin/cmake. If I use set PATH = foo add my personal cmake installation at the beginning of PATH, I've still /bin/cmake. this seems to be PATH is not used at all.

How can I get which cmake to find my installation, and what do I miss that makes the above so confusing for me?

What's an embedded style sheet?

What's an embedded style sheet?

Multiplayer – What's a good LAN-aware engine for low-end computers?

I want to create local multiplayer video games in my old 32-bit Windows laptop. Until now, I've found ORX and that's all they claimed to be. Unfortunately, creating multiplayer games is not possible.

I'm trying to find an engine to achieve this.

Of course, the Unit is not an option because it requires 64 bits. And others need 4GB of memory to work …

I've created video games in C, but I'm sure there is a better hidden option somewhere.

Thank you-

private key – What's stopping a smartphone wallet from downloading my keys

Portfolio software uses different technologies to protect and hide our private keys such as mnemonics or simply by using private keys.

What would prevent them from patching their software to install a keylogger, take a screen capture or simply enter the memory and retrieve this private information?

hash – What's wrong with my e-voting system?

I am a theoretical physicist (doctoral candidate) and I am trying to familiarize myself with cryptography as a hobby. One of the interesting things I found is that a lot of respectable scientists say that electronic voting is not safe, so I started following the arguments they use. For example, submit trust to the authority so that it does its job honestly or sacrifice anonymity. Or impossibility to deal with anonymous bribers on the Internet. However, as there was no formal proof of this, I wanted to design a better, anonymous, transparent electronic voting system with a mechanism to fight corruption and coercion.

Setting up

  • The citizen receives a PIN identity card
  • The card contains a private key and a random string engraved during the production of the card. In addition, the card contains a log file for the signatures that have been created. (necessary to prevent the theft of identity).
  • The public key is made public without an identity relationship when the card is handed over to the person. To prevent tampering with the registry, the person would sign a most recent public key from the public key list. During the process, the citizen checks if the device contains the correct private key and the algorithm. To prevent unauthorized keys from being recorded in the registry, the person's identification data, such as his name, his place of residence (such as a city without a specific address), the first digits of the person a phone number are submitted to another database, which would be made public. This would allow citizens to verify the legitimacy and give the opportunity to choose a paper ballot. Another preventive option is that the key is signed by a public key already present in the general ledger.


The citizen has a device with screen and keypad, which serves as an interface with the identity card. No internet connection is allowed to prohibit malware. The vote for a user takes place after the following steps:

  • The user unlocks the card with his PIN
  • The user enters the information on the vote to vote.
  • The identity card calculates the hash sum from the information.
  • The message contains a hash sum and a random number (generated during the software burning process).
  • A private key signs the message. The signature contains the complete message and its encryption.
  • The person sends the message anonymously (for example, using Tor) to one of the many polling sites or a ballot box. (necessary to prevent DDOS attacks).
  • The elector checks anonymously that the vote has been delivered and acknowledged valid in a centralized ledger.


The public ledger contains signatures. On the other register, we have public keys that must have been used for a valid vote. The steps are as follows:

  • For each signature, a valid public key is found in the ledger by looping through all of them.
  • Valid signatures are published in a centralized public ledger with a corresponding public key.
  • So, count. A protocol to change the vote can be implemented.

Anti-corruption and anti-coercion mechanism

The power of anonymity on the Internet is the biggest weakness of many e-voting systems because it is so easy to buy votes without suffering consequences. I propose here a defense based on the will of the militants to search for places of corruption and to sell their votes so as to exhaust the capital of the bribes. Then, when the transaction is made, the activists submit their true ballot. This could be done in secret to prevent bribes from seeing the list of activists for the next election.

To distinguish free votes from forced votes, another identity card identifier may be created, in which the random string added to the message will be known to the department that is keeping the order. The elector could have chosen to choose the police department, which he would trust, which would not disclose the information to the bribes. The steps to set up such a system are as follows:

  • The voter creates a new ID on the identity card and chooses a PIN2 for that.
  • A new identifier also requires entering the random string that the card adds to the message before signing. That the voter generates on the local computer to have cryptographic strength.
  • It then generates another random number and makes a signature on this random number.

The voter goes to the police department, whom he trusts, and gives him the signature for security.

  • The police service places the signature in a secure database.
  • Then they generate a hash sum of the signature that they place in a big ledger.
  • The voter gets a paper certificate in case the police department does not recognize the right to change the vote after the elections.

Now, to make a false vote, the voter performs all the steps of the polling section, but only with the PIN2 code. The police department was continually scanning the registry for random strings and was doing its homework when the vote was found. It is also pretty clear that no one would dare to exploit social relationships to collect card codes and PINs, as there is no way to distinguish between real and fake ones.

What's new update or new rule on facebook ..?

Hello friends,

What's new update or new rule on facebook ..?

Active Directory – What's wrong with my file permissions for Group Policy Software deployment?

I'm trying to deploy Google Chrome Enterprise via Group Policy. As a result of Google's guide, I created a GPO, linked it to an organizational unit, and imported the ADX file with the rules (which unfold properly). I have created a folder on a file server with the msi installer. Permissions are set so that the computers in the domain have read and execute permissions. The software installation policy is set under Computer Configuration so that it is deployed on specific computers.

According to what I understood, if the software installation policy is set in the computer configuration, the Domain Computers account must have an authorization from read / execute because the software will be installed before a domain user account is connected. I've enabled MSI logging and I get it. in the log file:

MSI (s) (CC: 1C) (11: 37: 40: 405): SOURCEMGMT: Media enabled only if the package is secure.
MSI (s) (CC: 1C) (11: 37: 40: 405): SOURCEMGMT: Supplier search for product {b5fd80c4-8da4-3815-958f-d6e4afb1c5d0}
MSI (s) (CC: 1C) (11: 37: 40: 405): SOURCEMGMT: Addition of {b5fd80c4-8da4-3815-958f-d6e4afb1c5d0}; to a list of potential providers (pcode; disk; relpath).
MSI (s) (CC: 1C) (11: 37: 40: 405): SOURCEMGMT: Product verification in progress {b5fd80c4-8da4-3815-958f-d6e4afb1c5d0}
MSI (s) (CC: 1C) (11: 37: 40: 405): SOURCEMGMT: Support is enabled for the product.
MSI (s) (CC: 1C) (11: 37: 40: 405): SOURCEMGMT: Attempt to use LastUsedSource from the source list.
MSI (s) (CC: 1C) (11: 37: 40: 405): SOURCEMGMT: Processing the net source list.
MSI (s) (CC: 1C) (11: 37: 40: 405): SOURCEMGMT: attempt to source (server) (share) IT Software GroupPolicyDeploy.
MSI (s) (CC: 1C) (11: 37: 40: 405): Note: 1: 1402 2: HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Policies Explorer 3: 2
MSI (s) (CC: 1C) (11: 37: 40: 438): Note: 1: 2303 2: 5 3: (server) (share)
MSI (s) (CC: 1C) (11: 37: 40: 455): Note: 1: 2303 2: 5 3: (server) (share)
MSI (s) (CC: 1C) (11: 37: 40: 455): Note: 1: 2303 2: 5 3: (server) (share)
MSI (s) (CC: 1C) (11: 37: 40: 455): Note: 1: 1325 2: GroupPolicyDeploy
MSI (s) (CC: 1C) (11: 37: 40: 455): ConnectToSource: CreatePath / CreateFilePath failed with: -2147483648 1325 -2147483648
MSI (s) (CC: 1C) (11: 37: 40: 455): ConnectToSource (con't; t): CreatePath / CreateFilePath failed with: -2147483648 -2147483648
MSI (s) (CC: 1C) (11: 37: 40: 455): SOURCEMGMT: network source & # 39; (server) (share) IT Software GroupPolicyDeploy & # 39; is not valid.
MSI (s) (CC: 1C) (11: 37: 40: 455): Note: 1: 1706 2: -2147483647 3: GoogleChromeStandaloneEnterprise64.msi
MSI (s) (CC: 1C) (11: 37: 40: 455): SOURCEMGMT: list of processing media sources.
MSI (s) (CC: 1C) (11: 37: 40: 455): Note: 1: 2203 2: 3: -2147287037.
MSI (s) (CC: 1C) (11: 37: 40: 455): SOURCEMGMT: The source is not valid because of a missing / unreachable packet.
MSI (s) (CC: 1C) (11: 37: 40: 455): Note: 1: 1706 2: -2147483647 3: GoogleChromeStandaloneEnterprise64.msi
MSI (s) (CC: 1C) (11: 37: 40: 455): SOURCEMGMT: list of URL sources for processing.
MSI (s) (CC: 1C) (11: 37: 40: 455): Note: 1: 1402 2: UNKNOWN URL 3: 2
MSI (s) (CC: 1C) (11: 37: 40: 455): Note: 1: 1706 2: -2147483647 3: GoogleChromeStandaloneEnterprise64.msi
MSI (s) (CC: 1C) (11: 37: 40: 455): Note: 1: 1706 2: 3: GoogleChromeStandaloneEnterprise64.msi
MSI (s) (CC: 1C) (11: 37: 40: 455): SOURCEMGMT: Failed to resolve the source.

What's in the grove of a druid?

I started a 5th D & D campaign in Oerik (Greyhawk) with a druid in the party. I want to allow her to use the Druids groves on Anna B Meyer cards, but I can not find any information on their benefits, if any. I may be considering healing properties and perhaps a type of communication with other groves.

Has anyone used thickets of druids?