warning removed

This commit is contained in:
abhishek muge 2023-07-29 13:03:50 +00:00
parent abff9283dc
commit af409245fb
2 changed files with 25 additions and 25 deletions

View File

@ -38,14 +38,14 @@ const UserInputMain = styled.form`
z-index: 2;
`;
const FindIpButton = styled.a`
margin: 0.5rem;
cursor: pointer;
display: block;
text-align: center;
color: ${colors.primary};
text-decoration: underline;
`;
// const FindIpButton = styled.a`
// margin: 0.5rem;
// cursor: pointer;
// display: block;
// text-align: center;
// color: ${colors.primary};
// text-decoration: underline;
// `;
const ErrorMessage = styled.p`
color: ${colors.danger};
@ -126,22 +126,22 @@ const Home = (): JSX.Element => {
if (!isError) setErrMsg('');
};
const findIpAddress = () => {
setUserInput('');
setPlaceholder('Looking up your IP...');
setInputDisabled(true);
fetch('https://ipapi.co/json/')
.then(function(response) {
response.json().then(jsonData => {
setUserInput(jsonData.ip);
setPlaceholder(defaultPlaceholder);
setInputDisabled(true);
});
})
.catch(function(error) {
console.log('Failed to get IP address :\'(', error)
});
};
// const findIpAddress = () => {
// setUserInput('');
// setPlaceholder('Looking up your IP...');
// setInputDisabled(true);
// fetch('https://ipapi.co/json/')
// .then(function(response) {
// response.json().then(jsonData => {
// setUserInput(jsonData.ip);
// setPlaceholder(defaultPlaceholder);
// setInputDisabled(true);
// });
// })
// .catch(function(error) {
// console.log('Failed to get IP address :\'(', error)
// });
// };
const formSubmitEvent = (event: FormEvent<HTMLFormElement>) => {
event.preventDefault();

View File

@ -261,7 +261,7 @@ const docs: Doc[] = [
id: "dnssec",
title: "DNS Security Extensions",
description:
"Without DNSSEC, it\'s possible for MITM attackers to spoof records and lead users to phishing sites. This is because the DNS system includes no built-in methods to verify that the response to the request was not forged, or that any other part of the process wasnt interrupted by an attacker. The DNS Security Extensions (DNSSEC) secures DNS lookups by signing your DNS records using public keys, so browsers can detect if the response has been tampered with. Another solution to this issue is DoH (DNS over HTTPS) and DoT (DNS over TLD).",
"Without DNSSEC, it\"'s possible for MITM attackers to spoof records and lead users to phishing sites. This is because the DNS system includes no built-in methods to verify that the response to the request was not forged, or that any other part of the process wasnt interrupted by an attacker. The DNS Security Extensions (DNSSEC) secures DNS lookups by signing your DNS records using public keys, so browsers can detect if the response has been tampered with. Another solution to this issue is DoH (DNS over HTTPS) and DoT (DNS over TLD).",
use: "DNSSEC information provides insight into an organization's level of cybersecurity maturity and potential vulnerabilities, particularly around DNS spoofing and cache poisoning. If no DNS secururity (DNSSEC, DoH, DoT, etc) is implemented, this may provide an entry point for an attacker.",
resources: [
"https://dnssec-analyzer.verisignlabs.com/",