Trending questions in Edureka Community

0 votes
0 answers

How do I set Resharper's language level for ECMAScript 6?

With the help of code can you ...READ MORE

Feb 10 in Node-js by Ashutosh
• 16,740 points
35 views
0 votes
0 answers

How can I find the first array element that matches a specific boolean condition in JavaScript?

With the help of code can you ...READ MORE

Feb 10 in Node-js by Ashutosh
• 16,740 points
34 views
0 votes
0 answers

How can I check if an array contains a particular string in TypeScript?

With the help of code example can ...READ MORE

Feb 10 in Node-js by Ashutosh
• 16,740 points
33 views
0 votes
0 answers

How can I use Generative AI for creating synthetic data while preserving privacy?

Can you tell me How can I ...READ MORE

Feb 10 in Generative AI by Nidhi
• 7,560 points
32 views
0 votes
0 answers

How can federated learning be used to train Generative AI across distributed datasets?

With the help of code can you ...READ MORE

Feb 10 in Generative AI by Nidhi
• 7,560 points
32 views
0 votes
0 answers

How does V8 differ from ECMAScript standards?

Can you tell me How does V8 ...READ MORE

Feb 10 in Node-js by Ashutosh
• 16,740 points
32 views
0 votes
0 answers

How do I transform an array into an object?

With the hep of code can you ...READ MORE

Feb 10 in Node-js by Ashutosh
• 16,740 points
32 views
0 votes
0 answers

Why is my multi-GPU training slower than single-GPU training?

With the help of code, can you ...READ MORE

Feb 10 in Generative AI by Nidhi
• 7,560 points
31 views
0 votes
0 answers

What is the process to parse JSON using Node.js?

With the help of code can you ...READ MORE

Feb 10 in Node-js by Ashutosh
• 16,740 points
31 views
0 votes
0 answers
0 votes
0 answers

What is the purpose of getters and setters in ECMAScript 6 classes?

With the help of proper code example ...READ MORE

Feb 10 in Web Development by Ashutosh
• 16,740 points
28 views
0 votes
0 answers

How do I use GenAI for creating structured data from unstructured customer feedback?

Can you tell me How do I ...READ MORE

Feb 10 in Generative AI by Nidhi
• 7,560 points
27 views
0 votes
0 answers

What are the trade-offs of using FP16 precision for training Generative AI models?

With the help of code can you ...READ MORE

Feb 10 in Generative AI by Nidhi
• 7,560 points
27 views
0 votes
0 answers

Does ListView inherently support lazy loading?

With the help of code can you ...READ MORE

Feb 10 in JQuery by Ashutosh
• 16,740 points
24 views
0 votes
0 answers

Check if table exists in SQL Server

I want this to be the last ...READ MORE

Aug 21, 2022 in Database by Kithuzzz
• 38,000 points
39,056 views
0 votes
0 answers

Is a router a better device for an IoT botnet than devices within its network?

I've read about IoT botnets and how ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
56 views
0 votes
0 answers

Can static IP addressing prevent IoT botnets?

I’ve read that some IoT botnets rely ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
50 views
0 votes
0 answers

Do I need a Gateway Firewall for an IoT network?

I’m setting up an IoT network and ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
49 views
0 votes
0 answers

How do you secure IoT devices?

With IoT devices being common attack targets, ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
46 views
0 votes
0 answers

Should the local network be checked first to access IoT devices?

I’ve noticed that some IoT devices prioritize ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
43 views
0 votes
0 answers

How do you check whether the password is strong or not?

I want to ensure that passwords meet ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
40 views
0 votes
0 answers

How do I get a list of service accounts in Active Directory?

I need to list all service accounts ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
36 views
0 votes
0 answers

Why trust Nmap's reverse lookup for hostnames during discovery?

During Nmap scans, I see that it ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
33 views
0 votes
0 answers

What are the negative aspects of creating fake security footprints?

I've heard about fake security footprints, where ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
30 views
0 votes
0 answers

What is the difference between active and passive Digital Footprints?

I've been researching digital footprints and found ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
25 views
0 votes
0 answers

How do I find unused service accounts in Active Directory?

Our AD environment contains several service accounts, ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
24 views
0 votes
0 answers

Is WebGL a security concern?

I’ve heard that WebGL (Web Graphics Library) ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
24 views
0 votes
0 answers

Why can I ping a server, but an Nmap normal scan cannot see the host?

I'm trying to scan a network using ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
22 views
0 votes
0 answers

How to exploit LDAP injection?

I'm studying LDAP injection for cybersecurity research ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
21 views
0 votes
0 answers

Should I allow apps to communicate through Windows Firewall?

Windows Firewall often asks whether an application ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
21 views
0 votes
0 answers

Should I allow communication on public networks?

When connecting to a public network (like ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
21 views
0 votes
0 answers
0 votes
0 answers

How to map a network passively with Wireshark dumps?

I want to analyze a network passively ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
20 views
0 votes
0 answers

How do I remove a service connection point in Active Directory?

I need to remove a Service Connection ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
20 views
0 votes
0 answers

How do firewalls handle encrypted traffic?

Most modern websites and services use HTTPS ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
20 views
0 votes
0 answers

What is the difference between active and passive digital footprints?

I’ve heard about digital footprints being categorized ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
49 views
0 votes
0 answers

Can a web server be secured with just a firewall?

I know firewalls play a crucial role ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
43 views
0 votes
0 answers

Is there any reason not to salt and hash before using bcrypt?

I’ve seen some recommendations suggesting that you ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
41 views
0 votes
0 answers

What's the point of salting Double Submit Cookie (CSRF protection)?

I came across the concept of salting ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
39 views
0 votes
0 answers

Why don't we use hash-based digital signatures everywhere?

I’ve read about hash-based signature schemes like ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
37 views
0 votes
0 answers

Why do digital signatures need different algorithms?

I'm trying to understand why we use ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
37 views
0 votes
0 answers

Can there be multiple private keys for one public key?

I know that in public-key cryptography, each ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
36 views
0 votes
0 answers

Why do passwords need to be salted?

Many security guidelines insist on using salts ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
33 views
0 votes
0 answers

Why use manual testing for web server attacks if scanners can detect vulnerabilities?

With so many automated security scanners available, ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
32 views
0 votes
0 answers

How secure is the hashing, salting, and stretching process in this diagram?

Looking at this diagram, I want to ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
32 views
0 votes
0 answers

How does salting increase security?

I understand that salting adds randomness to ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
32 views
0 votes
0 answers

Why don't we use hash-based digital signatures everywhere?

I've been researching hash-based digital signatures like ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
31 views
0 votes
0 answers

How is the digital certificate sent alongside digital signatures?

When a digital signature is used to ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Nidhi
• 7,560 points
31 views
0 votes
0 answers

How secure is the hashing/salting/stretching process as described in this diagram?

When storing passwords securely, we often use ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
30 views
0 votes
0 answers

Would re-salting passwords regularly in-/decrease security?

I've been wondering about the impact of ...READ MORE

Feb 6 in Cyber Security & Ethical Hacking by Anupam
• 9,730 points
29 views