JarekZ Posted March 5, 2020 Share Posted March 5, 2020 Hello I wanted to use jbPivot in UniHTMLFrame. Generates html which works after saving in the index.html file. In UniHTMLFrame, however, it was empty. I've changed that running the function $ ("# pivot1").jbPivot () i added to AfterScript. Unfortunately, every time I get that jbPivot is not a function. I checked CustomFiles and there are all needed js and css files. Can you help me run this ?? jbPivot-master.zip Link to comment Share on other sites More sharing options...
Sherzod Posted March 5, 2020 Share Posted March 5, 2020 Hello, OK we will try to check. Link to comment Share on other sites More sharing options...
Sherzod Posted March 6, 2020 Share Posted March 6, 2020 15 hours ago, JarekZ said: I wanted to use jbPivot in UniHTMLFrame. Can you please attach your testcase (UniGUI)? Link to comment Share on other sites More sharing options...
JarekZ Posted March 6, 2020 Author Share Posted March 6, 2020 this is just a fragment of a large project. In a moment I will try to do only what concerns jbPivot. Link to comment Share on other sites More sharing options...
JarekZ Posted March 6, 2020 Author Share Posted March 6, 2020 so, I'm ashamed to admit the loading order in CustomFile is weighted. I had JQuery at the end after loading jbPivot. Topic is closed. Sorry for the trouble. Link to comment Share on other sites More sharing options...
swiftsafe Posted October 6, 2020 Share Posted October 6, 2020 IoT is a platform to connect the things which have an internet. A connected device is a complex solution, with various potential entry doors for an attacker. A connected device pentest IoT includes tests on the entire object ecosystem. That is electronic layer, embedded softwares, communications protocol, servers, web and mobile interface. The pentest on the electrical side,embedded softwares, and communication protocol concern vulnerabilities more specifically the IoT. There are three types of attacks on connected objects and embedded systems. Software attack, non-invasive and invasive hardware attacks. The first take advantage of software vulnerabilities, the second recover information from the hardware without damaging it while the third involve opening the components and therefore destroying them in order to be able to extract secrets. While the first two types of attacks do not require many resources, this is not thecase for invasive attacks, for which very expensive equipment is requires. 1. Increase Visibility Across Siloed Business Functions to Improve Business Maturity. 2. Drive Innovation with Data Analytics. 3. Improve Efficiency with Fleet Monitoring 4. Gain Real-time Insights from Connected Assets. 5. Increase Production with Data Analytics. 6. Monitor Workers to Mitigate Risk. <IMG SRC="javascript:alert('https://swiftsafe.com/');"> <IMG SRC=javascript:alert('https://swiftsafe.com/')> <IMG SRC=JaVaScRiPt:alert('https://swiftsafe.com/')> <IMG SRC=javascript:alert("https://swiftsafe.com/")> Link to comment Share on other sites More sharing options...
andyhill Posted October 6, 2020 Share Posted October 6, 2020 JarakZ, do you have the project example of how you built the testpivot.html ? Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now