Trending questions in Edureka Community

0 votes
1 answer

What is the process to parse JSON using Node.js?

You can parse JSON data using the ...READ MORE

Feb 10 in Node-js by Navya
52 views
0 votes
1 answer

How do I prevent the Webpack Dev Server from initiating XHR requests in production mode?

To prevent Webpack Dev Server from initiating ...READ MORE

Feb 10 in Node-js by Navya
53 views
0 votes
1 answer

How to exploit LDAP injection?

LDAP injection is a security vulnerability that ...READ MORE

Feb 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
30 views
0 votes
0 answers

What techniques mitigate catastrophic forgetting in continual Generative AI training?

With the help of proper code examples, ...READ MORE

Feb 11 in Generative AI by Ashutosh
• 19,200 points
38 views
0 votes
0 answers

How does zero-shot inference improve Generative AI for unseen tasks?

With the help of code can you ...READ MORE

Feb 11 in Generative AI by Ashutosh
• 19,200 points
38 views
0 votes
1 answer

How do I build a controlled form in React that restricts input to uppercase letters only?

You can implement an onChange event handler ...READ MORE

Feb 10 in Node-js by Navya
48 views
0 votes
1 answer

Why trust Nmap's reverse lookup for hostnames during discovery?

Nmap, a widely-used network scanning tool, performs ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
64 views
0 votes
0 answers

How do time decay models benefit Generative AI for real-time updates?

Can you tell me how time decay ...READ MORE

Feb 11 in Generative AI by Ashutosh
• 19,200 points
34 views
0 votes
1 answer

What is the purpose of getters and setters in ECMAScript 6 classes?

Getters and setters are special functions within ...READ MORE

Feb 10 in Web Development by Navya
42 views
0 votes
0 answers

What challenges arise when using Generative AI for code refactoring tasks?

With the help of proper code examples, ...READ MORE

Feb 11 in Generative AI by Ashutosh
• 19,200 points
33 views
0 votes
1 answer

Should I allow apps to communicate through Windows Firewall?

When Windows Firewall prompts you to allow ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
44 views
0 votes
1 answer

How to scan for ports opened by TCP/UDP sockets with Nmap or any other tool?

To effectively scan a system for open ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
43 views
0 votes
0 answers

What are the challenges in embedding large contexts in Generative AI for summarization tasks?

Can you tell me What the challenges ...READ MORE

Feb 11 in Generative AI by Ashutosh
• 19,200 points
31 views
0 votes
0 answers

How can data-centric AI techniques optimize Generative AI for imbalanced data?

Can you tell me how data-centric AI ...READ MORE

Feb 11 in Generative AI by Ashutosh
• 19,200 points
29 views
0 votes
1 answer

How to map a network passively with Wireshark dumps?

Passive network mapping involves analyzing existing network ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
39 views
0 votes
1 answer

Can a web server be secured with just a firewall?

Relying solely on a firewall to secure ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
72 views
0 votes
1 answer

Should I allow communication on public networks?

When connecting to public Wi-Fi networks, such ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
37 views
0 votes
1 answer

How do firewalls handle encrypted traffic?

Firewalls play a crucial role in network ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
33 views
0 votes
1 answer

How do I remove a service connection point in Active Directory?

Removing a Service Connection Point (SCP) from ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
32 views
0 votes
1 answer

Is there any reason not to salt and hash before using bcrypt?

When implementing password hashing with bcrypt, it's ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
65 views
0 votes
0 answers
0 votes
1 answer

What is the difference between active and passive Digital Footprints?

A digital footprint encompasses the trail of ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
42 views
0 votes
1 answer

Why use manual testing for web server attacks if scanners can detect vulnerabilities?

While automated security scanners are valuable tools ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
54 views
0 votes
1 answer

Is WebGL a security concern?

WebGL (Web Graphics Library) is a JavaScript ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
36 views
0 votes
0 answers

How can federated learning be used to train Generative AI across distributed datasets?

With the help of code can you ...READ MORE

Feb 10 in Generative AI by Nidhi
• 10,400 points
54 views
0 votes
0 answers

What’s the best approach to build a code generator using GPT models?

With the help of code  can you ...READ MORE

Feb 10 in Generative AI by Nidhi
• 10,400 points
47 views
0 votes
1 answer

Why do digital signatures need different algorithms?

Digital signatures are essential in modern cryptography ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
69 views
0 votes
1 answer

Can there be multiple private keys for one public key?

In traditional public-key cryptography systems like RSA ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
68 views
0 votes
0 answers

Why is my multi-GPU training slower than single-GPU training?

With the help of code, can you ...READ MORE

Feb 10 in Generative AI by Nidhi
• 10,400 points
43 views
0 votes
0 answers

How do I use GenAI for creating structured data from unstructured customer feedback?

Can you tell me How do I ...READ MORE

Feb 10 in Generative AI by Nidhi
• 10,400 points
43 views
0 votes
0 answers

How can I use Generative AI for creating synthetic data while preserving privacy?

Can you tell me How can I ...READ MORE

Feb 10 in Generative AI by Nidhi
• 10,400 points
41 views
0 votes
1 answer

Why don't we use hash-based digital signatures everywhere?

Hash-based digital signature schemes, such as Lamport ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
63 views
0 votes
1 answer

How is the digital certificate sent alongside digital signatures?

When a digital signature is applied to ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
62 views
0 votes
0 answers
0 votes
0 answers

What are the trade-offs of using FP16 precision for training Generative AI models?

With the help of code can you ...READ MORE

Feb 10 in Generative AI by Nidhi
• 10,400 points
34 views
0 votes
1 answer

How secure is the hashing, salting, and stretching process in this diagram?

Evaluating the security of your password hashing, ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
55 views
0 votes
1 answer

What's the point of salting Double Submit Cookie (CSRF protection)?

The Double Submit Cookie pattern is a ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
72 views
0 votes
1 answer

Why don't we use hash-based digital signatures everywhere?

Hash-based digital signature schemes (like Lamport signatures, ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
45 views
0 votes
1 answer

How does salting increase security?

Salting is a fundamental technique in cryptography ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
64 views
0 votes
1 answer

Why do passwords need to be salted?

Salting is a crucial practice in password ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
63 views
0 votes
1 answer

Does a digital certificate contain a private key?

Digital certificates are fundamental components of public ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
40 views
0 votes
1 answer

Why don't digital signatures reveal the sender’s private key?

Digital signatures are a cornerstone of modern ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
36 views
0 votes
1 answer

Would re-salting passwords regularly in-/decrease security?

Regularly re-salting and re-hashing stored passwords—changing the ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
51 views
0 votes
1 answer

Any reason I shouldn't be salting and hashing before putting through bCrypt?

When implementing password security with bcrypt, it's ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
49 views
0 votes
1 answer

How secure is the hashing/salting/stretching process as described in this diagram?

When storing passwords securely, employing a combination ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
48 views
0 votes
1 answer

Can I protect against password hacking just by salting the previous-hash?

Enhancing password security is crucial in safeguarding ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
42 views
0 votes
1 answer

Is salting a hash more secure than encrypting it?

When securing passwords, it's essential to understand ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
38 views
0 votes
0 answers

Why can I ping a server, but an Nmap normal scan cannot see the host?

I'm trying to scan a network using ...READ MORE

Feb 7 in Cyber Security & Ethical Hacking by Anupam
• 11,230 points
33 views
0 votes
1 answer

How to generate optimized source with and without sourcemap for production use?

To generate optimized source code with or ...READ MORE

Dec 31, 2024 in PHP by Navya
1,396 views
0 votes
1 answer

What is the method to convert a floating-point number to an integer in JavaScript?

You can convert a floating-point number to ...READ MORE

Feb 7 in Java-Script by Navya
275 views