Help us identify a fraudster in a public voting campaign

My question is, is there any way to find the owner of an IP address?

Yes, look for Reverse IP lookup and you can find a few free services with different information. It won't be that useful anyway, because if you can't preload his ISP, you won't get his name and address. And the ISP will not be ready to work together.

Can you mask or specify a dummy IP address?

It depends a lot on the platform. Typically, the returned IP is the IP that is used to access the form, so you can probably trust the information in your file.

Any insight would be helpful if you have any thoughts!

Your priority is to bring fairness to the competition, not to bring the scammer to justice. Don't waste time exposing the person behind the cheat, just the fraudulent voices.

You have a collection of emails, don't you? Send an email to each address with a confirmation link pointing to a page protected with a good CAPTCHA and ask for the first and last name again for confirmation. This can reduce the number of double votes you get, as it increases the work required for the fraudster.

And do not publicly disclose how many votes participants have so that you can remove the duplicate votes in the background without the attacker knowing that their votes have been disqualified. You can then silently remove all duplicate votes from the same IP address and compete fairer.

However, if one of the employees is involved, it will be more difficult to protect the fairness of the competition.

Frontend – Visually identify differences between two Mathematica functions


Let's say we have defined two functions in Mathematica.
I am interested in recognizing the differences between the two functions.


  f(x_,y_)= Module({t}, t= x+y; Sin(t));
  g(x_,y_)= Module({t}, t= x-y; Sin(t));

I want to be able to select both codes and let the front end highlight the color differences.

Mathematica graphics

This is something that word editors routinely do.


I don't know anything about front-end coding.

PS: One thing that would require this is the selection of two functions that may not be side by side in the notebook (although this can be avoided by duplicating the code, I think).

Could this be a good place to start?

 st1 = Definition(f) // ToString
 st2 = Definition(g) // ToString
 sa = SequenceAlignment(st1, st2);
   Flatten(sa /. {a_, b_} :> {Style(a, Red), "(", Style(b, Green), 

Mathematica graphics

Scripts – How do I identify VR videos on the command line? .. and batch delete them

Sometimes I accidentally download VR videos. I can't display VR videos on my Linux box (it doesn't work even on MacOS).

How to identify VR videos (mediainfo or similar tool) and delete them in a folder like /torrents/complete?

Here is sample video metadata:

$ mediainfo example.mp4
Complete name                            : example.mp4
Format                                   : MPEG-4
Format profile                           : Base Media
Codec ID                                 : isom (isom/iso2/avc1/mp41)
File size                                : 83.1 MiB
Duration                                 : 9 min 40 s
Overall bit rate                         : 1 201 kb/s
Writing application                      : Lavf58.0.100

ID                                       : 1
Format                                   : AVC
Format/Info                              : Advanced Video Codec
Format profile                           : High@L3.2
Format settings                          : CABAC / 4 Ref Frames
Format settings, CABAC                   : Yes
Format settings, ReFrames                : 4 frames
Codec ID                                 : avc1
Codec ID/Info                            : Advanced Video Coding
Duration                                 : 9 min 40 s
Bit rate                                 : 1 067 kb/s
Width                                    : 1 440 pixels
Height                                   : 720 pixels
Display aspect ratio                     : 2.000
Frame rate mode                          : Constant
Frame rate                               : 25.000 FPS
Color space                              : YUV
Chroma subsampling                       : 4:2:0
Bit depth                                : 8 bits
Scan type                                : Progressive
Bits/(Pixel*Frame)                       : 0.041
Stream size                              : 73.8 MiB (89%)
Writing library                          : x264 core 152 r19 ba24899
Encoding settings                        : cabac=1 / ref=1 / deblock=1:0:0 / analyse=0x3:0x3 / me=dia / subme=1 / psy=1 / psy_rd=1.00:0.00 / mixed_ref=0 / me_range=16 / chroma_me=1 / trellis=0 / 8x8dct=1 / cqm=0 / deadzone=21,11 / fast_pskip=1 / chroma_qp_offset=0 / threads=12 / lookahead_threads=2 / sliced_threads=0 / nr=0 / decimate=1 / interlaced=0 / bluray_compat=0 / constrained_intra=0 / bframes=3 / b_pyramid=2 / b_adapt=1 / b_bias=0 / direct=1 / weightb=1 / open_gop=0 / weightp=1 / keyint=125 / keyint_min=12 / scenecut=0 / intra_refresh=0 / rc=crf / mbtree=0 / crf=26.0 / qcomp=0.60 / qpmin=0 / qpmax=69 / qpstep=4 / ip_ratio=1.40 / pb_ratio=1.30 / aq=1:1.00
Codec configuration box                  : avcC

ID                                       : 2
Format                                   : AAC LC
Format/Info                              : Advanced Audio Codec Low Complexity
Codec ID                                 : mp4a-40-2
Duration                                 : 9 min 40 s
Bit rate mode                            : Constant
Bit rate                                 : 128 kb/s
Channel(s)                               : 6 channels
Channel layout                           : C L R Ls Rs LFE
Sampling rate                            : 48.0 kHz
Frame rate                               : 46.875 FPS (1024 SPF)
Compression mode                         : Lossy
Stream size                              : 8.86 MiB (11%)
Default                                  : Yes
Alternate group                          : 1

Identify the root cause of Windows Update, which prevents PCs from starting

Dozens of Windows 8 PCs in my area are shown Fatal Error: 0xC0000022 after installing KB4541505 or KB4541509. The automatic repair fails. They cannot be restored using System Restore. DISM cannot reset the update because the image cannot be maintained /Cleanup-Image will fail.

I have not approved the updates in WSUS and am in the process of re-mapping the affected PCs. Can I find out what's going on in any way? Fortunately, one of the PCs is currently free and can be used as a test machine. If I put it back in this state and then move the hard drive to another PC, are there any protocols that I can check?

The Microsoft Error Lookup Tool specifies 0xC0000022 as

  STATUS_ACCESS_DENIED                                          ntstatus.h
# {Access Denied}
# A process has requested access to an object, but has not
# been granted those access rights.

The error message that appears after restarting the update is truncated, but seems to be saying something about the registry.

What is my next step if I find the cause? These KBs are security updates for March 2020. Whatever causes this is likely to be included in the April 2020 rollups. Patches for Windows 8.1 computers are no longer a viable option. Would opening a support ticket at Microsoft bring anything useful?

Identify the probability space – clarity of definition

I read the following:

Enter the image description here

I want to write something down explicitly $ E_X ( has {Y} mid Y = 0, A = a) $. I think the relevant definitions are in:

I was told that $$ E_X (Y ^ | Y = 0, A = a) = frac {1} {(p (X mid Y = 0 & A = a)} int_ {X mid Y = 0, A = a} left ( int _ {(Y, A)} p (X, A, Y) dA dY right) has {Y} dX $$

However, I don't quite understand how this is derived. Can anyone help explain this?

Here is what I think. Generally $ E (X mid Y) = frac {1} {p (Y)} cdot E (X text {and} Y) $. The $$ int _ {(Y, A)} p (X, A, Y) dA dY = int_Y int_A p (X, A, Y) dA dY $$ is the limit density on X. Since we are conditioning on $ Y = 0 $ and $ A = A $ then $ has {Y} $ depends only on the covariates $ X $a function of $ X $. We want to find the expected value of this function.

Is the above a correct explanation of what is happening? I will be very happy about contributions.

Identify an error in a function

Related to: Approximation of an infinite series with different Mathematica functions

Enter the image description here

Enter the image description here

My questions are: Why can't I express f3 with a precision of 20 digits? What's up with f4?

Sorry in advance if it was a simple mistake.

f3(x_) :> For(Sum(((k + 1)/k!)*x^k, {k, 0, Infinity}), k <= 100, k++, print(f3)); 

f4(x_) :> Do(Print(Sum(((k + 1)/k!)*x^k, {k, 0, Infinity})), {k, 10}); 

Design – How do I identify the concepts of the lexical, syntactic and semantic level?


I'm trying to identify that lexical. syntactic and semantic Concepts on this Waze application screen, but I don't know if I really understood these concepts.

Are buttons considered a lexical level?

Is the function that performs the button syntactic?

Is the general idea of ​​the Waze app the semantic level?

Can anyone elaborate on these concepts and say what each element of this screen represents and why?

Transactions – how do attackers fake bitcoin blocks and how do you identify fake bitcoin blocks?

I've read that a block contains multiple Bitcoin transactions and an attacker could fake fake blocks.

Does this fake fake Bitcoin block cost the attacker money to mine or was it generated by the attacker node for free?

The blockchain is protected from attack, as the blockchain was programmed by Satoshi to validate and maintain the longest chain.

The forge block is disappearing from the blockchain network. This is wonderful, but what happens when an attacker fakes bitcoin blocks?

I even read that some of these forging blocks can have 2 to 3 confirmations. Is that true?

How can you identify these fake Bitcoin blocks instantly?