How wil google identify me with just my phone number?

How wil google identify me with just my phone number?

I have a few email accounts with gmail. I create a different one for some websites like
I do this because most of the times emails sent from shared servers get rejected by gmail. Do not even land in spam. Just plain rejected…
SEMrush

I haven’t logged in to one of those accounts for a while, and today when I logged in, google asked me for the alternate email.
I entered that.

Then on next page google says,
“We want to make sure its you who owns this account”, enter phone number.

Since I have never entered my phone number in that account,
so how will google know its me, using a new phone number?

Anybody hacking can enter their phone, verify the account, login and do anything they want.

Then when real me goes to login, google will send code to that phone which hacker entered, and will lock me out of my own account…

What right does google has to ask me for my phone number?
That too “forced” asking?

If I want to enter a number, I will do it by my own choice. Why is google force stopping login?
I could have some important emails there.
I already verified my alternate email.
Could even click a link sent to that one.
Why phone number?

There is a button “try another way” at bottom. But its just for show. Nothing happens. Comes back to same “enter phone” page…

Why are all these websites forcing things on us?
Its becoming too much now.

Everyone seems to be imposing something or the other and we the users are supposed to silently follow orders…

 

pathfinder 1e – Can a character take 10 or 20 on a Spellcraft check to identify magical items?

This came up in this question:
What’s an efficient way to handle magical item identification?. Many people suggested taking 10 on Spellcraft checks to identify magical items. I certainly see the appeal—but is it possible in all cases?

I thought that taking 10 or 20 was only possible if many attempts could be made and failure was not harmful (or if it was, the character accepted the harm). Since some magical items could be cursed or booby-trapped, it seems that trying to identify the item could be enough to trigger its harmful effects. By trying to identify such items, a character may be in “immediate danger” without knowing it. Does this mean that one cannot take 10 or 20?

For convenience, here’s what Paizo says about it (link):

Taking 10 and Taking 20

A skill check represents an attempt to
accomplish some goal, usually while under some sort of time pressure
or distraction. Sometimes, though, a character can use a skill under
more favorable conditions, increasing the odds of success.

Taking 10:

When your character is not in immediate danger or distracted, you may choose to take 10. Instead of rolling 1d20 for the
skill check, calculate your result as if you had rolled a 10. For many
routine tasks, taking 10 makes them automatically successful.
Distractions or threats (such as combat) make it impossible for a
character to take 10. In most cases, taking 10 is purely a safety
measure—you know (or expect) that an average roll will succeed but
fear that a poor roll might fail, so you elect to settle for the
average roll (a 10). Taking 10 is especially useful in situations
where a particularly high roll wouldn’t help.

Taking 20:

When you have plenty of time, you are faced with no threats or distractions, and the skill being attempted carries no
penalties for failure, you can take 20. In other words, if you roll a
d20 enough times, eventually you will get a 20. Instead of rolling
1d20 for the skill check, just calculate your result as if you had
rolled a 20.

Taking 20 means you are trying until you get it right, and it assumes
that you fail many times before succeeding. Taking 20 takes 20 times
as long as making a single check would take (usually 2 minutes for a
skill that takes 1 round or less to perform).

Since taking 20 assumes that your character will fail many times
before succeeding, your character would automatically incur any
penalties for failure before he or she could complete the task (hence
why it is generally not allowed with skills that carry such
penalties). Common “take 20” skills include Disable Device (when used
to open locks), Escape Artist, and Perception (when attempting to find
traps).

dnd 5e – Can you identify telepathically received messages sent through spells like Sending as magical via Detect Magic?

An enemy casts Sending to communicate with a player from far away. In this example, the player character doesn’t know anything about the Sending spell and he might think he is just hearing voices or going crazy.

Another player casts Detect Magic to scan the area. Can this player detect the presence of the telepathic message inside the first players head via Detect Magic as an evocation spell.

logs – Identify which user or process initiated normal shutdown?

I’d like to identify why (who, what) showdown my MacBook Pro while it was left unattended. Some unsaved work was lost. It is fairly likely that a careless admin script was run through some automated means by my company. No one initiated shutdown through the GUI or keyboard. I’d like to discover more so that I can start a conversation with IT. (I have admin privaleges on my own laptop, and so does employer.) MacOS 10.14.6

$ log show --predicate 'eventMessage contains "Previous shutdown cause"' --last 24h
Filtering the log data using "composedMessage CONTAINS "Previous shutdown cause""

Timestamp        Thread   Type     Activity    PID  TTL  
2020-10-15 19:11 0xcf     Default  0x0         0    0    kernel: (AppleSMC) Previous shutdown cause: 5
------------------------------------------------------------------------------------------------------

Code 5 means:

Correct Shut Down. Shutdown was initiated normally, from the macOS Shut Down menu or other shutdown command such as /sbin/shutdown. This does not indicate an issue with your system.

$ last
myusername  ttys003                   Fri Oct 16 06:38   still logged in
myusername  ttys002                   Thu Oct 15 19:14   still logged in
myusername  ttys001                   Thu Oct 15 19:14   still logged in
myusername  ttys000                   Thu Oct 15 19:14   still logged in
myusername  console                   Thu Oct 15 19:13   still logged in
reboot    ~                         Thu Oct 15 19:11 
myusername  ttys002                   Wed Oct 14 09:44 - crash (1+09:27)
The pseudo-user reboot logs in at reboots of the system, thus ``last
reboot'' will give an indication of mean time between reboot.

How do I identify my EarPods lightning are original?

When I connect my EarPods bought along with iPhone from suspect source I can see sth like this:

enter image description here
enter image description here

Is not weird? Are they original or not?

transactions – Is it possible to identify the exchange or type of wallet used with an address

When I first started my journey in crypto I didn’t keep adequate records and have misplaced some funds. I have a receiving address and need to associate it to an exchange or possibly wallet type as I am not sure which it is. If I can identify a direction I should be able to re-engineer my login. I checked into blockchain.com, walletexplorer & bitcoin.com but all I see is a ton of addresses and no clear path on how to drill down to the final destination…or if I even can.

At the risk of giving away the farm here, the address is
0x1602373edae1fd41e369ac54ddd66868117f97cb (it is an ETH adddress)

Thanks in advance for any help.

io – Interpreting /proc/diskstat values to identify potential I/O bottleneck

I’m investigating some semi-regular unit test timeouts on our test runners, with test cleanup (close temp database, remove temp directory) taking well over 10s. I can reproduce the issue when using a slower storage medium (like a plain USB-stick), which lead me to investigate potential I/O bottlenecks on our test hosts.

I’ve found out that we’re running the tests in docker containers, hosted on Linux virtual machines. Several VMs seem to share the same physical disk and even more VMs share the same host (I don’t have information yet about the disk type/configuration). I assume that this could very well be the source of the problem, but I need data to verify the issue.

We’re aggregating statistics from the VMs via Prometheus, but ultimately that should be the same as, for example, interpreting /proc/diskstat.

During the test execution timespan when looking at Field 10 (# of milliseconds spent doing I/Os) I get values ranging from 260 up to 950 and even 1 000ms. I’m not sure if I’m interpreting that correctly, but that looks like quite busy (and potentially bottlenecked) I/O to me.

Looking at Field 11 paints an even wilder picture, with values ranging from 13 000ms up to >240 000ms.

Am I correctly assuming that these values are not great? I’m not exactly sure how to interpret them.

identify this – What are the mountains visible in these photos?

the first, second and 4th image show a large, unforested area with a distinctly differently colored patch. this appears to match the Manpur region on Nasa satellite maps of Nepal (the yellow area circled below), although it also could match the kathmandu region (yellow dots):

enter image description here

Mount Everest lies in the orange circle. I’ve tried to match that area to the image:

enter image description here

My best guess is that Mount Everest lies in the orange circle. this seems to match the general topography of the Mount Everest area: really high mountains surrounding a valley where the mountains taper off slowly. In addition, on the second image, you can almost see what looks like the Annapurna pass between Nepal and Tibet straight ahead from the Manpur region, the area where the mountains don’t appear to have snow.

This is only a rough estimate, but to the extent of my knowledge of the region, I think it’s the most likely candidate. If the area with the differently colored patch is actually the Kathmandu capital region, the orange dotted mountains are a more likely candidate for Mount Everest. I do not know enough about Nepal to be sure of either claim.

Too many activated fonts – identify those in use and remove/archive others

Is there a way in Font Book to identify which (non-system) fonts are currently activated and required by Applications AND vice-versa which can be safely disabled (or removed from /Font folders?

Looking to significantly reduce the Font options in dropdown menu for FCPX and other Apps.

algorithms – How to identify certain pathes in directed graph?

For the lack of a better way to explain my problem, I’ve drawn an example directed graph as you can see below. The edges are annotated with letters. What algorithm could achieve such an annotation?

My approach right now would first find all possible paths through the graph. Then, following every path, I would count how often each edge was visited. The number of visitations would then indicate the different sub graphs (A-D). But this would already stop working for a symmetric graph.

I feel like I’m missing the obvious solution. Could anyone please help?

Example Graph