/*! elementor-pro - v3.26.0 - 17-12-2024 */ (()=>{"use strict";class Screenshot extends elementorModules.ViewModule{getDefaultSettings(){return{empty_content_headline:"Empty Content.",crop:{width:1200,height:1500},excluded_external_css_urls:["https://kit-pro.fontawesome.com"],external_images_urls:["https://i.ytimg.com"],timeout:15e3,render_timeout:5e3,timerLabel:null,timer_label:`${ElementorScreenshotConfig.post_id} - timer`,image_placeholder:"data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=",isDebug:elementorCommonConfig.isElementorDebug,isDebugSvg:!1,...ElementorScreenshotConfig}}getDefaultElements(){const e=jQuery(ElementorScreenshotConfig.selector),t=e.find(".elementor-section-wrap > .elementor-section, .elementor > .elementor-section");return{$elementor:e,$sections:t,$firstSection:t.first(),$notElementorElements:elementorCommon.elements.$body.find("> *:not(style, link)").not(e),$head:jQuery("head")}}onInit(){return super.onInit(),this.log("Screenshot init","time"),this.timeoutTimer=setTimeout(this.screenshotFailed.bind(this),this.getSettings("timeout")),this.captureScreenshot()}captureScreenshot(){return this.elements.$elementor.length||(elementorCommon.helpers.consoleWarn("Screenshots: The content of this page is empty, the module will create a fake conent just for this screenshot."),this.createFakeContent()),this.removeUnnecessaryElements(),this.handleIFrames(),this.removeFirstSectionMargin(),this.handleLinks(),this.loadExternalCss(),this.loadExternalImages(),Promise.resolve().then(this.createImage.bind(this)).then(this.createImageElement.bind(this)).then(this.cropCanvas.bind(this)).then(this.save.bind(this)).then(this.screenshotSucceed.bind(this)).catch(this.screenshotFailed.bind(this))}createFakeContent(){this.elements.$elementor=jQuery("
").css({height:this.getSettings("crop.height"),width:this.getSettings("crop.width"),display:"flex",alignItems:"center",justifyContent:"center"}),this.elements.$elementor.append(jQuery("

").css({fontSize:"85px"}).html(this.getSettings("empty_content_headline"))),document.body.prepend(this.elements.$elementor)}loadExternalCss(){const e=[this.getSettings("home_url"),...this.getSettings("excluded_external_css_urls")].map((e=>`[href^="${e}"]`)).join(", ");jQuery("link").not(e).each(((e,t)=>{const s=jQuery(t),n=s.clone();n.attr("href",this.getScreenshotProxyUrl(s.attr("href"))),this.elements.$head.append(n),s.remove()}))}loadExternalImages(){const e=this.getSettings("external_images_urls").map((e=>`img[src^="${e}"]`)).join(", ");jQuery(e).each(((e,t)=>{const s=jQuery(t);s.attr("src",this.getScreenshotProxyUrl(s.attr("src")))}))}handleIFrames(){this.elements.$elementor.find("iframe").each(((e,t)=>{const s=jQuery(t),n=jQuery("
",{css:{background:"gray",width:s.width(),height:s.height()}});s.before(n),s.remove()}))}removeUnnecessaryElements(){let e=0;this.elements.$sections.filter(((t,s)=>{let n=!1;return e>=this.getSettings("crop.height")&&(n=!0),e+=jQuery(s).outerHeight(),n})).each(((e,t)=>{t.remove()})),this.elements.$notElementorElements.remove()}handleLinks(){elementorCommon.elements.$body.find("a").attr("href","/")}removeFirstSectionMargin(){this.elements.$firstSection.css({marginTop:0})}createImage(){const e=new Promise((e=>{window.addEventListener("load",(()=>{e()}))})),t=new Promise((e=>{setTimeout((()=>{e()}),this.getSettings("render_timeout"))}));return Promise.race([e,t]).then((()=>{if(this.log("Start creating screenshot."),this.getSettings("isDebugSvg"))return domtoimage.toSvg(document.body,{imagePlaceholder:this.getSettings("image_placeholder")}).then((e=>this.download(e))),Promise.reject("Debug SVG.");return/^((?!chrome|android).)*safari/i.test(window.userAgent)?(this.log('Creating screenshot with "html2canvas"'),html2canvas(document.body).then((e=>e.toDataURL("image/png")))):(this.log('Creating screenshot with "dom-to-image"'),domtoimage.toPng(document.body,{imagePlaceholder:this.getSettings("image_placeholder")}))}))}download(e){const t=jQuery("",{href:e,download:"debugSvg.svg",html:"Download SVG"});elementorCommon.elements.$body.append(t),t.trigger("click")}createImageElement(e){const t=new Image;return t.src=e,new Promise((e=>{t.onload=()=>e(t)}))}cropCanvas(e){const t=this.getSettings("crop.width"),s=this.getSettings("crop.height"),n=document.createElement("canvas"),i=n.getContext("2d"),o=t/e.width;return n.width=t,n.height=s>e.height?e.height:s,i.drawImage(e,0,0,e.width,e.height,0,0,e.width*o,e.height*o),Promise.resolve(n)}save(e){return new Promise(((t,s)=>{elementorCommon.ajax.addRequest("screenshot_save",{data:{post_id:this.getSettings("post_id"),screenshot:e.toDataURL("image/png")},success:e=>{this.log(`Screenshot created: ${encodeURI(e)}`),t(e)},error:()=>{this.log("Failed to create screenshot."),s()}})}))}markAsFailed(){return new Promise(((e,t)=>{elementorCommon.ajax.addRequest("screenshot_failed",{data:{post_id:this.getSettings("post_id")},success:()=>{this.log("Marked as failed."),e()},error:()=>{this.log("Failed to mark this screenshot as failed."),t()}})}))}getScreenshotProxyUrl(e){return`${this.getSettings("home_url")}?screenshot_proxy&nonce=${this.getSettings("nonce")}&href=${e}`}screenshotSucceed(e){this.screenshotDone(!0,e)}screenshotFailed(e){this.log(e,null),this.markAsFailed().then((()=>this.screenshotDone(!1)))}screenshotDone(e){let t=arguments.length>1&&void 0!==arguments[1]?arguments[1]:null;clearTimeout(this.timeoutTimer),this.timeoutTimer=null,window.parent.postMessage({name:"capture-screenshot-done",success:e,id:this.getSettings("post_id"),imageUrl:t},"*"),this.log(`Screenshot ${e?"Succeed":"Failed"}.`,"timeEnd")}log(e){let t=arguments.length>1&&void 0!==arguments[1]?arguments[1]:"timeLog";this.getSettings("isDebug")&&(console.log("string"==typeof e?`${this.getSettings("post_id")} - ${e}`:e),t&&console[t](this.getSettings("timer_label")))}}jQuery((()=>{new Screenshot}))})(); The Tach - Page 3 of 14 -

ByteDance seeks $1.1 million damages from an intern in an AI breach

ByteDance $1.1 million damages

TikTok and Douyin owning ByteDance have joined other giant companies in suing a former intern in a high-profile case. This legal action accuses the intern, identified by the surname Tian, of tampering with crucial code and disrupting a pivotal AI training project. ByteDance alleges that Tian’s actions caused significant delays and resource waste, prompting the … Read more

Amazon Japan Under Antitrust Investigation: Insights and Implications

for

Authorities are closely monitoring Amazon Japan as they look into potential antitrust violations in the company’s operations. The Japan Fair Trade Commission (JFTC) is responsible for this regulatory analysis, which aims to address claims of unequal supplier behavior. The results, which highlight the significance of upholding fair trade standards and encouraging rivalry in the market, … Read more

Bootkitty: The First UEFI Bootkit Targeting Linux Servers

Bootkit Targeting Linux Servers

The cybersecurity landscape has witnessed a groundbreaking revelation with the discovery of Bootkitty, the first UEFI bootkit targeting Linux servers. This marks a significant shift, as such advanced bootkits have primarily been associated with Windows systems. The existence of this threat calls for further protection of Linux servers against new and developing attacks in cyberspace. … Read more

INTERPOL Busts Cybercrime: 1K Arrests, 134K Networks Down

INTERPOL

Organised digital criminal networks have suffered a serious setback as a result of INTERPOL’s worldwide cybercrime campaign. Disrupting illicit online activity, the INTERPOL cybercrime sweep resulted in 1,006 arrests and the dismantling of 134,089 harmful networks. This significant accomplishment emphasizes how crucial cybersecurity enforcement is in the fight against growing cyberthreats.  Unpacking the INTERPOL Scale … Read more

Hackers Use Typosquatted Libraries to Hide Backdoors That Enable SSH Access

Hackers

Find the way how Hackers use Typosquatting Libraries to get to the systems through the backdoor. Introduction to Typosquatting in Libraries Typosquatting can be described as an intelligent and deceptive approach that cybercriminals use. It involves creating fake versions of popular software libraries with slightly altered names. Developers often accidentally download these libraries because of … Read more

Kernel Secures Binance Labs Funding to Redefine Restaking on BNB Chain

Kernel Secures Binance Labs

Kernel Secures Binance Labs Funding has reached a crucial step in designing new Restacking solutions for the BNB Chain network. It is a great recognition for Kernel but also a major step in rethinking trust decentralization and scalability in the cryptosphere. The Binance coin, BNB through Kernel with the backing of Binance Labs will now … Read more

Fondo Aims to Mitigate the American Accountant Shortage with AI Bookkeeping Service

American Accountant Shortage

There is increasingly becoming a huge problem commonly referred to as the American Accountant Shortage that continues to undermine business operations throughout the United States of America. With the increased establishment of various companies as a result of high entrepreneurship, there has been a rapid and drastic increase in demand for accountants to manage various … Read more

Information Technology Regains Its Mojo with Big Wins in September and October Momentum

Information Technology

Discover how Information Technology achieved major wins in September and gained exciting momentum for October. A Stellar Comeback: September’s Big Wins for IT September proved to be a golden month for information technology. The industry thrived like never before, from significant software launches to innovative hardware upgrades. Companies like Microsoft and Google unveiled cutting-edge tools … Read more

Russian Hackers Exploit Wi-Fi to Breach U.S. Firm in ‘Nearest Neighbor Attack’

Nearest Neighbor Attack

Russian state-sponsored hackers, APT28 Fancy Bear, Forest Blizzard, or Sofacy successfully executed a sophisticated Nearest Neighbor Attack on a U.S. company. This operation, involving a breach of the target’s enterprise Wi-Fi network from thousands of miles away, highlights the risks of advanced hacking techniques. The attack exploited the networks belonging to other related organizations as … Read more