Tkinter Text widgets are generally used for accepting multiline user input in the given text field. For a particular text document, the content may contain hyperlinks too which is useful in case we want to redirect the user. You can create hyperlinks within the text widget by using HyperLinkManager snippet in Python.The HyperLinkManager code snippet adds the hyperlink on the keyword within the text widget. Once the snippet has been downloaded, you can import it in the notebook by typing "from tkHyperLinkManager import HyperlinkManager"Example# Import the required libraries from tkinter import * from tkHyperLinkManager import HyperlinkManager import webbrowser from functools ... Read More
Open CV is a Python library that is used to work with Computer Vision and other artificial artifacts. Open CV has inbuilt functions and methods which provide access to work with Computer Vision in Artificial Intelligence and Machine Learning. Some of the examples of Open CV are: face detection, object detection, X-ray and other industrial uses.Using Tkinter Library, we can create an interactive application that uses OpenCV as the essential part of the application.To create the application, you are required to install OpenCV in your local machine and make sure that Python Pillow package is pre-installed. You can install these ... Read More
The Geometry Manager is one of the specific features in the Tkinter Library. It provides structure to all the Tkinter widgets in the window. The Geometry Manager is used for formatting the layout and position of the widget in a Tkinter application window.To format the look and appearance of any widget, we have three general methods in Geometry Manager.Pack Geometry ManagerGrid Geometry ManagerPlace Geometry ManagerEach Geometry Manager has some features that provide a different style and layout to the widgets. The Pack Geometry Manager is the most commonly used layout manager which gives access to add padding, margin, fill and ... Read More
In the Object-Oriented Programming Paradigm, Inheritance is used for acquiring the properties of the base class and using them in a derived class. Considering the case for a Tkinter application, we can inherit all the properties of a frame defined in a base class such as background color, foreground color, font properties, etc., into a derived class or a frame.In order to support Inheritance, we have to define a class that contains some basic properties of a frame such as height, width, bg, fg, font, etc.Example# Import Tkinter Library from tkinter import * # Create an instance of Tkinter ... Read More
There are various ways cybercriminals conduct illicit activities. With the advancement in security technology, it has become challenging for them to deceive the security programs and attack the device. So, they are using the traditional technique in modern ways to infiltrate the system. This technique is known as the Social Engineering attack.In this post, we would discuss what Social Engineering attack is, how it is planned and performed, and how to prevent it from happening to you.What is Social Engineering AttackThe Social Engineering attack is one of the oldest and traditional forms of attack in which the cybercriminals take advantage ... Read More
While browsing the Internet, many users might have received a pop-up alerting them of a virus attack on their system and asking for downloading an application to remove that virus. In anticipation of removing the virus, users download that application which is, in fact, a malicious program known as Scareware.Let us talk more about Scareware and learn how to deal with it.What is ScarewareScareware, also known as Fraudware, are malicious computer applications that pretend to be helpful to the user. As it is clear, the word Scareware is the combination of two terms, Scare and Software. It is basically the ... Read More
There are certain malware programs that are more dangerous than the others because of the level of havoc they create and the difficulty in detecting them. Other than the Ransomware and Trojans, most organizations are afraid of the Rootkits.Let us understand what Rootkit is, why it is considered one of the most dangerous cyberattacks, how it can be utilized, and how to prevent a Rootkit attack on your system.What is RootkitA Rootkit is a malicious computer program that provides the root level, i.e., the admin-level privileges, to the attacker behind it. The term Rootkit is derived from two words, Root ... Read More
On the Internet, you will find many legitimate programs whose functionalities are misused by intruders to carry out malicious activities. Such applications are known as Riskware.Let us discuss more on Riskware and how to prevent their attack.What is RiskwareThe term Riskware is coined using two words Risk and Software. Riskware is a legal program, but its functionalities and weakness can be exploited by cybercriminals for carrying out illicit activities. The attackers can use it to their advantage to delete, edit, block and perform other modifications on the files and applications of your system. It can also slow down your network ... Read More
Cybercriminals can go to any extent to infiltrate systems or networks with malware programs and perform illicit activities. They use several techniques to do that; one of those is the Social Engineering attack. One of the most dangerous and widely performed Social Engineering attack forms is Phishing, In this guide, we would know in detail what Phishing is, how it is performed, its examples and how to stay protected from it.What is PhishingPhishing is a type of Social Engineering attack in which the victims are psychologically manipulated to provide sensitive information or install malicious programs. It is similar to 'fishing.' ... Read More
Today Internet users see ads everywhere. While browsing the Internet, watching videos, playing games, advertisements are everywhere. Because of the popularity and reach of the ads to a larger audience, cybercriminals are using it as a medium to spread malicious files, and this is where Malvertising comes in.In this post, we would get to know what Malvertising is, how it works, its types, and how to protect against Malvertising.What is MalvertisingMalvertising is the term used for legitimate advertisements that intentionally or unintentionally promote malware programs. The term Malvertising is the fusion of two words, Malicious and Advertising.Most Internet users confuse ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP