TransWikia.com

Recent Questions (Page 149)

Let's help others by answering their questions!

Is the Birkhoff Theorem valid for the FLRW metric?

The FLRW metric, in the case of positive scalar curvature, is: $ds^2 =- c^2 dt^2+a(t)^2left(dw^2+sin^{2}w(dtheta^2+sin^2theta dphi^2)right)$. The Birkhoff’s theorem states that "any spherically symmetric solution of the vacuum field...

1

Physics Asked on 2 years ago

Can you 'derive' mathematical approximations made from Taylor approximations from limiting cases in real life?

Here, the natural length of the string is $l_o$, and pulling the string up by $x$ increases its...

1

Physics Asked on 2 years ago

Newton's third law (action and reaction) and work done with a wheel

I'm aware of the common misunderstanding about action and reaction canceling each other; they don't because they don't act on the same object. This is about a more subtle...

2

Physics Asked on 2 years ago

How does Fermat's principle make light choose a straight path over a short path?

This is a thought experiment where I have made a "C" shaped hole inside diamond. The refractive index $(mu)$ of diamond is 2.45....

4

Physics Asked on 2 years ago

Why are the principal planes where principal stresses occur perpendicular to each other?

Equation of principal angles: $$tan 2theta_p=frac{2tau_{xy}}{sigma_x-sigma_y}$$ Equation of principal stresses:$$sigma_{max}, sigma_{min} = {sigma_{xx} + sigma_{yy} over 2} pmsqrt{ left( {sigma_{xx} - sigma_{yy} over 2} right)^2 +...

1

Physics Asked on 2 years ago

Recording sound and getting the frequency of any given point

Not entirely sure if this question goes on this site, but I think it covers this one more than the others. I need to record some audio of human speech...

1

Sound Design Asked on 2 years ago

Contact Microphone Noise Isolation

I have a piezo contact microphone which I am using to detect running water in a pipe. I intend to use this signal to determine the time at which water...

0

Sound Design Asked by Groger on 2 years ago

How to know if an RFI/LFI attack was successful?

Let's say that an attacker wants to search websites for RFI/LFI vulnerability with a script, he's fuzzing the URL with a list of remote/local files. And he prints the headers...

2

Information Security Asked by user226295 on 2 years ago

Is javascript fingerprinting becoming obsolete?

Okta recently sent out an email to admins about changes to their new device detection strategy. According to them:Due to browser advancements in anonymous web browsing, JavaScript fingerprinting techniques...

1

Information Security Asked by Indigenuity on 2 years ago

What is the most restrictive way to allow IPv6 ICMP requests on iptables?

This is what I have so far but it is pretty open.*filter:INPUT DROP [0:0]:FORWARD DROP [0:0]:OUTPUT DROP [0:0]-A INPUT -p ipv6-icmp -j ACCEPT-A INPUT -i lo -j ACCEPT-A OUTPUT...

0

Information Security Asked on 2 years ago

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP