Trending questions in Edureka Community

0 votes
0 answers

How can DNS poisoning be used to compromise web applications?

I am studying network security and want ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by Nidhi
• 10,400 points
59 views
0 votes
0 answers
0 votes
1 answer
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

During multi-domain training, the generator overfits to dominant domains. How can domain balance be achieved?

Can i know During multi-domain training, the ...READ MORE

Feb 21 in Generative AI by Ashutosh
• 19,200 points
28 views
0 votes
1 answer
0 votes
0 answers
0 votes
0 answers

Is there a way to ignore touch events on Text in React Native, or can they be managed differently?

Can you tell me if Is there ...READ MORE

Feb 21 in Node-js by Nidhi
• 10,400 points
22 views
0 votes
0 answers
0 votes
0 answers

How can you debug learning plateaus in a transformer-based GAN for novel text generation?

Can you tell me How can you ...READ MORE

Feb 21 in Generative AI by Ashutosh
• 19,200 points
24 views
0 votes
0 answers
0 votes
0 answers

During large-scale training, your GPU memory runs out. How can you optimize model parallelism?

Can i know During large-scale training, your ...READ MORE

Feb 21 in Generative AI by Ashutosh
• 19,200 points
22 views
0 votes
1 answer

Creating Facet Plots in Power BI? – Is there a way to create facet plots (small multiples) in Power BI? Any workarounds or custom visuals?

Power BI has built-in small multiple functions ...READ MORE

Feb 19 in Power BI by anonymous
• 16,180 points
52 views
0 votes
1 answer

How to script a privilege escalation attack simulation in Linux?

Simulating a privilege escalation attack in Linux ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
63 views
0 votes
1 answer

How to configure WAF rules for mitigating RFI attacks?

Mitigating Remote File Inclusion (RFI) attacks is ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
48 views
0 votes
1 answer

How can you exploit file upload vulnerabilities in PHP apps?

File upload vulnerabilities in PHP applications pose ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
45 views
0 votes
1 answer

How to automate a vulnerability assessment lifecycle in Python?

Automating a vulnerability assessment lifecycle using Python ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
42 views
0 votes
1 answer

How to automate vulnerability scanning using OpenVAS?

Automating vulnerability scanning with OpenVAS enhances your ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
40 views
0 votes
1 answer

How to write a Python script for XSS vulnerability detection?

Detecting Cross-Site Scripting (XSS) vulnerabilities is crucial ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
39 views
0 votes
1 answer

How do you track failed login attempts using ELK Stack?

Monitoring failed login attempts is crucial for ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
35 views
0 votes
1 answer

How do you detect brute force login attempts in Apache logs?

Monitoring Apache web server logs is essential ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
29 views
0 votes
1 answer

how to find ip address in cmd

1. Open the Command Prompt.   a. Click the Start icon, ...READ MORE

Feb 9, 2022 in Cyber Security & Ethical Hacking by Edureka
• 13,620 points
47,824 views
0 votes
1 answer
0 votes
1 answer

Performing CRUD Analysis in Power BI? – How do you analyze Create, Read, Update, Delete (CRUD) operations using Power BI?

Monitoring CRUD changes in Power BI should ...READ MORE

Feb 18 in Power BI by anonymous
• 16,180 points
50 views
0 votes
0 answers

During code completion tasks, the model produces insecure code snippets. How can security filters be enforced?

Can I know? During code completion tasks, ...READ MORE

Feb 19 in Generative AI by Ashutosh
• 19,200 points
50 views
0 votes
0 answers
0 votes
1 answer

How to secure a Linux web server?

Securing a Linux web server involves implementing ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
49 views
0 votes
1 answer

Integrating AnyLogic Database with Power BI? – Has anyone successfully connected an AnyLogic simulation database to Power BI?

Integrating the AnyLogic database with Power BI ...READ MORE

Feb 18 in Power BI by anonymous
• 16,300 points
34 views
0 votes
0 answers
0 votes
0 answers
0 votes
1 answer

Why were Infinity and NaN excluded from JSON, and what is JSON’s role in ECMAScript?

JSON's Role in ECMAScript: ECMAScript, the standard upon ...READ MORE

Feb 21 in Node-js by Kavya
104 views
0 votes
1 answer

How do you detect SQL injection attacks?

Detecting SQL injection (SQLi) attacks is crucial ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
46 views
0 votes
0 answers
0 votes
1 answer

How to detect open ports on a web server using Python?

Conducting a security audit to identify open ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
41 views
0 votes
0 answers
0 votes
1 answer

What are the defensive measures against session hijacking attacks?

Session hijacking is a critical security concern ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
36 views
0 votes
1 answer

How to use Burp Suite to analyze a web application attack?

Burp Suite is a comprehensive platform for ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
35 views
0 votes
0 answers
0 votes
0 answers

Why are Python visuals slower in Power BI Service compared to Desktop? Any optimizations?

Why Are My Python Visuals Slower in ...READ MORE

Feb 18 in Power BI by Evanjalin
• 16,180 points
57 views
0 votes
1 answer

Can apps access other apps RAM on iOS?

iOS enforces strict memory isolation between applications ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
31 views
0 votes
1 answer

Is Safari a safe browser for iPhone?

Safari on iPhone is designed with a ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
31 views
0 votes
1 answer

How can I ensure the correct this is accessed inside a callback function?

In JavaScript, the value of this within ...READ MORE

Feb 21 in Node-js by Kavya
86 views
0 votes
1 answer

How can you automate patch management with PowerShell?

Automating patch management across multiple Windows machines ...READ MORE

Feb 18 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
27 views