google chrome – .htaccess to map to subdirectory AND force HTTPS

I have an Apache 2.4 server set up on a Synology Disk Station. The DocumentRoot of the web server, to which my domain name is mapped, seems to unavoidably be /web as I do not have access to the Apache httpd.conf file to reset this variable. I also have a Joomla installation located at /web/joomla/

I want the Joomla installation to be (or appear to be) the root of the site, i.e. somebody visiting example.com will be taken to example.com/joomla/index.php but still see example.com in the URL bar. I am attempting to write a .htaccess file in the server root (/web) which will rewrite the URLs to the /web/joomla subdirectory AND force https on all connections.

Here is what I have so far for an .htaccess file:

RewriteEngine on
RewriteBase /

# Rewrites all URLS without joomla in them
RewriteCond %{REQUEST_URI} !^/joomla/

# Rewrites all URLS with example in them
RewriteCond %{HTTP_HOST} ^(www.)?example.

# Rewrite all those to insert /joomla
RewriteRule ^(.*)$ /joomla/$1 (L)

# This works SOME of the time to redirect to https
Header always set Content-Security-Policy "upgrade-insecure-requests;"

# If a request tries to access /joomla directly, redirect it to its secured canonical version
RewriteCond %{THE_REQUEST} joomla/
RewriteRule ^joomla/(.*) http://example.com/$1 (R=301,L)

This seems to work some of the time in Chrome, redirecting to the Joomla installation and switching to https, but sometimes I need to force a hard reload repeatedly to get there. It NEVER works in Firefox, staying on http on the rare occasion that it loads the site at all.

I am very new to .htaccess and I am not sure I have developed the most elegant or comprehensive solution to the above problem. I have seen other examples online using RewriteCond %{HTTPS} !=on or RewriteCond %{SERVER_PORT} 80 together with various RewriteRule commands but I am not sure how to to combine these commands with the existing URL rewriting conditions and as a result I am sure I am missing the fringe scenarios.

Can somebody with more experience guide me through this? It would be greatly appreciated. I have been trying variations of scripts found online for a few days now but haven’t quite found the magic words.

crash – How many times i may force Ubuntu to shutdown with no problems?

I am using Ubuntu 15.10 on TBOX810-838-fl, this device is only be off by disconnect the power. the shutdown command does not work as SHUTDOWN it will work as RESTART.
I want to ask how many times Ubuntu can be forced to turn off and restart again with no problems nor crashed system.
Does forced-shutdown affect Ubuntu?
If it is working on the next boot fine and nothing happened nor crashed does that mean there is no problem?
Is there any specific Ubuntu version that can handle this more than others?

development – A Bitcoin locking script to force a certain payment to the receiver?

No, that is not possible, and doing so can be problematic.

Such scripts would need the ability to inspect the spending transaction and this is currently not allowed or possible; the script interpreter does not have access to other parts of the transaction.

Furthermore, if implemented naively, this could allow for widespread censorship and centralized control of Bitcoin. In essence, such scripts could be written to require that transactions do not send money to some blacklisted addresses, and at the same time require that all receivers in that transaction also have this same requirement. This could lead to services blacklisting some addresses, and then forcing their users to also blacklist those addresses when they withdraw from the exchange. And the recursive nature of that means that all subsequent transactions also have the same blacklist.

dnd 5e – Can a space from Phantasmal Force move?

Yes, and no

So there is a slight problem with the interpretation, but the end result could be the same.

Per the description,

On a failed save, you create a phantasmal object, creature, or other visible phenomenon of your choice that is no larger than a 10-foot cube and that is perceivable only to the target for the duration.

So the image could not be of an “infinite” hallway, merely 10 ft of hallway. However, the image can adjust as needed…

While a target is affected by the spell, the target treats the phantasm as if it were real. The target rationalizes any illogical outcomes from interacting with the phantasm

So the image could be of a 10 ft hallway, with a fireball going off at one end. But as you race to the far end, walls and ceiling keep attaching themselves meaning that as you run the corridor builds around you with the fireball in pursuit. Think of how Magneto pulls in metal plates to form a walkway as he strides.

So the initial description of “infinite hallway” would fail/not be allowed; it is possible to describe the illusion that keeps up with a moving target.

An example given in the description is:

For example, a target attempting to walk across a phantasmal bridge that spans a chasm falls once it steps onto the bridge. If the target survives the fall, it still believes that the bridge exists and comes up with some other explanation for its fall – it was pushed, it slipped, or a strong wind might have knocked it off.

So the person under the spell fell, but even though they are presumably no longer inside the spell range, the illusion still holds true in their mind.

output formatting – Force results to be displayed in traditional way

I want to get my output in the form that one writes by hand, I have tried with TraditionalForm, but it did not work.

I’ve looked at several answers in this SE group, but I can’t find any that help me.

enter image description here

a^(2/3) - a^(1/3) b^(1/3) + b^(2/3)
Power(a^2, (3)^-1) - Power(ab, (3)^-1) + Power(b^2, (3)^-1)
a^(3/4) - Sqrt(a) b^(1/4) + a^(1/4) Sqrt(b) - b^(3/4) 
Power(a^3, (4)^-1) - Power(a^2 b, (4)^-1) + Power(ab^2, (4)^-1) - 
  Power(b^3, (4)^-1)
a^(4/5) - a^(3/5) b^(1/5) + a^(2/5) b^(2/5) - a^(1/5) b^(3/5) + b^(4/5) 
Power(a^4, (5)^-1) - Power(a^3 b, (5)^-1) + Power(a^2 b^2, (5)^-1) -  
   Power(ab^3, (5)^-1) + Power(b^4, (5)^-1)

Is using Google Forms to share “passcode protected” information safe from brute force attacks?

I have recently seen many people use Google Forms as a way of sharing “passcode protected” information. They seem to have the first section of the form with a required field asking for a short piece of text (the “password”), and if the inputted text does not exactly match the required text, it gives you a custom error message telling you the “password” is incorrect. The second section of the form is the secret information, which you can’t see until you put in the correct “password” from the first form section. You don’t log in with a Google account either.

I’ve seen many schools use this as a way to share Zoom Meeting IDs and passwords with students. While it superficially seems to work well enough for most people, is this really a safe way of protecting private information? For example, are people who use Google forms to passcode protect information safe from things such as brute-force attacks? I’m fairly sure the “passwords” being used aren’t strong either.

As I force MMA to write the results in the traditional way?

As I get the output in the form that one writes by hand, I have tried with TraditionalForm, but it does not work

I’ve looked at several answers in the forum but I can’t find any that help

enter image description here

a^(2/3) - a^(1/3) b^(1/3) + b^(2/3) -> Power(a^2, (3)^-1) - Power(ab, (3)^-1) + Power(b^2, (3)^-1)

a^(3/4) - Sqrt(a) b^(1/4) + a^(1/4) Sqrt(b) - b^(3/4) -> Power(a^3, (4)^-1) - Power(a^2 b, (4)^-1) + Power(ab^2, (4)^-1) - Power(b^3, (4)^-1)

a^(4/5) - a^(3/5) b^(1/5) + a^(2/5) b^(2/5) - a^(1/5) b^(3/5) + b^(4/5) -> Power(a^4, (5)^-1)  - Power(a^3 b, (5)^-1) + Power(a^2 b^2, (5)^-1) - Power(ab^3, (5)^-1) + Power(b^4, (5)^-1)

How can I set up Chrome browser policy where I can force install an extension that users cannot access or remove

This was fairly easy on Windows, but I am very new to mac and it is making it difficult for me to understand much of google Chrome’s documentation on their site. Can somebody help me get started with it setting up the policy for force installing an extension that users cannot remove? Any help is appreciated.

google chrome – How can I force NYSE to show me a full, unfiltered list?

As you suggested, using the Developer Tools of the browser you can view the requests and response when refreshing the page. You hope with this sort of request that the “data” part of a page comes from an API and is a structured response such as XML or JSON.

In this case, there is the query to https://www.nyse.com/api/quotes/filter. If you look at the body of the request, it has a maxResultsPerPage. This is set to 10 by default but it seems you can adjust it so the API returns more JSON. It’s really just using your favourite tool to get and parse/present the data, knowing this API can be called.

For example, this one liner might help, having changed it to 100:

wget -Uri "https://www.nyse.com/api/quotes/filter" -Method "POST" -ContentType "application/json" -Body "{`"instrumentType`":`"EQUITY`",`"pageNumber`":1,`"sortColumn`":`"NORMALIZED_TICKER`",`"sortOrder`":`"ASC`",`"maxResultsPerPage`":100,`"filterToken`":`"`"}" | ConvertFrom-Json | % { $_ } | ogv

dnd 5e – Can the Command spell be used to force someone to drink poison?

It’s up to the DM.

The important bit here in the command spell description is:

The spell has no effect if the target is undead, if it doesn’t understand your language, or if your command is directly harmful to it.

If the affected creature discerns that the command is harmful to it, the spell fails. But how the creature interprets the command is up to the DM.

Command does not charm the target.

This is a reason this plan may not work. Command does not charm the target – they still understand you to be a foe. It seems reasonable that they would be suspicious of the liquid you offer to drink and may determine that it is directly harmful.

Because of this, I would rule that it wouldn’t work, but it would not be unreasonable to rule that it does work. Ask the DM.

After all, the spell description itself says it’s up to the DM:

Some typical commands and their effects follow. You might issue a command other than one described here. If you do so, the GM determines how the target behaves. If the target can’t follow your command, the spell ends.