Articles on Trending Technologies

Technical articles with clear explanations and examples

How to check the lock state of a callback list using jQuery?

Manav Sarkar
Manav Sarkar
Updated on 20-Jul-2022 245 Views

In this tutorial, we will learn how to check the lock-state of a callback list using jQuery. The lock is a callback list in jQuery in the current state. We can toggle the lock state so that additional changes cannot be made unless required.SyntaxThe callbacks list is locked and checked as follows −// Get callbacks list at current state var callbacks = $.Callbacks() // Lock the callbacks list callbacks.lock() // Check callbacks is locked or not console.log(callbacks.locked())AlgorithmFirst we receive the callbacks list at the current state using the Callbacks() function.Then we lock it using the lock() function and ...

Read More

How to attach a function to be executed before an Ajax request is sent using jQuery?

Manav Sarkar
Manav Sarkar
Updated on 20-Jul-2022 2K+ Views

In this tutorial, we will learn How to attach a function to be executed before an Ajax request is sent using jQuery. Ajax requests are typically HTTP requests that are called by the browser for different tasks such as GET, POST, etc. So when the tasks are performed, we can register a handler using the ajaxSend() function of jQuery. This event is called by jQuery whenever an ajax request is to be made.SyntaxUse the following syntax to register a handler before an ajax request −$(document).ajaxSend(function () {    console.log('Triggered ajaxStart. Started Request') })We have an Ajax request. Before sending the ...

Read More

How to add the previous set of elements on the stack to the current set in jQuery?

Manav Sarkar
Manav Sarkar
Updated on 19-Jul-2022 357 Views

jQuery is a feature-rich JavaScript library. We can perform a lot of actions with the help of jQuery which would otherwise require writing large pieces of code. It makes DOM manipulation, event handling, animation, ajax, etc. very easy.In this tutorial, we will learn to add the previous set of elements on the stack to the current set. jQuery maintains an internal stack of the changes that are performed to the matched stack. When the DOM traversal functions or methods are called, the new elements are pushed into the stack. So to use previous stack elements, the addBack() method is called.SyntaxWe ...

Read More

What is Remote Computer Access?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 19-Jul-2022 789 Views

Remote Computer AccessImagine your old grandmother wants to fill out an online form for her medical insurance or get any help from you, but she is at her house far away, don't worry; remote access is the way to solve your problem. Remote computer access meansgetting authorized access to another computer virtually from another physicallocation; it allows you to access the files, applications, and all of the data.Remote access is beneficial for personal and business purposes, from remotepersonal computers to servicing client PCs.How Does Remote Computer Access Work?Remote access connects a remote user to a host computer via the internet. ...

Read More

What is Open Web Application Security Project (OWASP)?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 19-Jul-2022 1K+ Views

Open Web Application Security Project (OWASP) is a non-profit organization committed to enhancing software security. OWASP is based on an 'open community' approach, allowing anybody to engage in and contribute to projects, events, online conversations, and other activities.OWASP's guiding concept is that all resources and information on their website are free and freely accessible to anybody. OWASP offers a variety of tools, videos, forums, initiatives, and events, among other things. In a nutshell, OWASP is a one-stop-shop for everything web application security, supported by the collective wisdom and expertise of its open community contributors. It is best known for its ...

Read More

What is Network Traffic Analysis in Cybersecurity?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 19-Jul-2022 2K+ Views

The practice of intercepting, recording, and analyzing network traffic communication patterns to discover and respond to security concerns is known as network traffic analysis (NTA). Gartner coined the word to describe an emerging security product sector.Implementing a system that can continually monitor network traffic can provide you with the information you need to improve network performance, reduce your attack surface, boost security, and better manage your resources. Knowing how to monitor network traffic, though, isn't enough. It's also essential to think about the data sources for your network monitoring tool; 'flow data' (from devices like routers) and 'packet data' are ...

Read More

What is Information Flow Control under Cybersecurity?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 19-Jul-2022 4K+ Views

What is Information Flow Control?Information Flow Control (IFC) is a new idea in which a system may track data movement from one location to another and stop it if it isn't wanted. It's a security technique that keeps track of information flow between a system and the rest of the world, also known as the Internet. Users want their credentials to remain private; thus, IFC employs type systems and enforces this through compile-time type checking.Controlling how information is disseminated by computing systems is critical for data security. Access control has traditionally been the primary technique for stopping information from being ...

Read More

What is Information Assurance? How Is It Different from Information Security?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 19-Jul-2022 2K+ Views

What is Information Assurance?Information Assurance (IA) is the process of identifying and managing information-related risks as well as the procedures required to secure information systems like computers and networks. Information Assurance refers to the practice of ensuring the confidentiality, integrity, availability, and non-repudiation of essential information and associated information systems. It is a strategic process that focuseson policy deployment rather than infrastructure development.Data integrity ensures that data hasn't been changed, such as by virus assaults. Availability refers to ensuring that data is available and not obstructed by malware or ransomware. Authentication systems ensure that only authorized users have access to ...

Read More

What is GDPR in EU's New Data Protection Law?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 19-Jul-2022 474 Views

The General Data Protection Regulation (GDPR) is the most comprehensive privacy and security law in the world. Despite the fact that it was designed and enacted by the European Union (EU), it imposes duties on enterprises everywhere that target or collects data about EU citizens. The regulation became effective on May 25, 2018. Those that break the GDPR's privacy and security regulations will face severe fines, with penalties ranging in the tens of millions of euros.The GDPR signals Europe's hard position on data privacy and security when more individuals commit their personal data to cloud services, and data breaches are ...

Read More

What is Doxxing? (How People Dox and How to Avoid Doxxing)

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 19-Jul-2022 1K+ Views

People can use various methods to take revenge on the person they hate or have a rift with; Doxxing is one way to do that on the Internet. In this post, we would discuss what Doxxing is, why and how people Dox, and how to avoid Doxxing happening with you.What is Doxxing?Doxxing is a form of cyberbullying in which the attacker gets the sensitive information of the victim, such as phone number, social security number, address, sexual orientation, pictures, videos, and more. After getting all such information, the attacker would leak them to the public portal or social media channels ...

Read More
Showing 43611–43620 of 61,297 articles
Advertisements