sharepoint online – The click of the SPFx JQuery Dialog button does not find a public service

I am new to TypeScript and SPFx development.

I have a jquery UI dialog and a public function in the same class that makes some MSGRAPH calls after clicking the button.

Clicking on the button returns with an error:

this.addAlert is not a function

I think the problem is that the dialog code runs outside the context of the web part and therefore does not know the function available in the context of the web part.

How can I use the button to run in the context of the Web Part?

Here is the dialog code.

    public render(): void {

    this.domElement.innerHTML = AlertTemplate.templateHtml;
    const dialogOptions: JQueryUI.DialogOptions = {
      width: "50%",
      height: "auto",
      buttons: {
        "Subscribe": function (e) {
        "No Thanks": function (e) {
        "Ask me later": function (e) {
          this.addAlert("Ask Me Later");

    jQuery('.dialog', this.domElement).dialog(dialogOptions);

addAlert function

public addAlert(status: string): void {
var url = "/sites/" + + "/lists";
var listId = "";
var email = this.getCurrentUserEmail();
var recordExists = false;
let item: SubscriptionListItem;
  .then((client: MSGraphClient): void => {
      .filter("equals=(displayName, 'Subscriptions'")
      .get((err, res) => {
        if (err) {
        listId =;

router – I ran a port scan of my public IP address and found that the ports I had not opened (forwarded) were open

today i was trying to demonstrate something to a friend so i performed a port scan of my public ip address, my home network and found ports that i didn & # 39; had not opened (transferred) to be opened. I am optimized online, could this just be a problem with my network or is it something to worry about? how can i find services on these ports? is it worth trying to talk to someone at best?
attached is a picture of my port scan, and my router's configuration page to show the differences.

the ports in question are 3394, 5473 and 18017

enter description of image here

Router configuration page
Thanks for the help.

Is the use of Tor in public WIFI secure?

Using the Tor network to visit web pages in public wifi is secure or not because The Tor will help us anonymize (to hide metadata such as visit URLs) and HTTPS helps us prevent content . Will Tor and HTTPS requests help us to secure our navigation and our other stubs?

opendkim – Can I use a different public key for DKIM signatures for the same domain?

Can I have separate public keys for the following:

I am using a key table, so my initial feeling is to create the keys using a different selector and since I am using the key table, the selector referenced in opendkim.conf will be ignored. Am I on the right track and if not, how could I accomplish using 2 keys for the same domain but different emails as above.

ssh – Importing the server's public key into FileZilla

How do I import the server's public key into FileZilla?

I can access my server from SSH and I have the privilege of seeing what it contains /etc/ssh. I can generate hash fingerprints for these public keys.

But is there a button in FileZilla that actually allows me to import this authentication information from the server? Or should I do "Trust-On-First-Use" for my server?

portfolio – Question on public addresses

2009 private key btc but no address.
I was given BTC in 2009 and I also mined for a few weeks.
My father always had all the hard drives he had ever used. So I found a few files that have private keys.

I was looking for an address and I found some private keys instead.
So I have questions. Were the public and / or private keys for 2009 and 2010 in the same format? If this is the case, all of the instructions I find relate to all portfolios that are not 10 years old.
So how can I get the real address of the private key?

Is just going to create a new address? Would she even recognize such an old private key? According to an article, I read that the update was not compatible with the old version used and that certain modifications had to be made to make everything compatible again. So with my wallet. Having been offline all this time, I think additional steps will be required to recover my bitcoin.
Is there anyone who would take a moment to give me step by step instructions on how to do this?

I seriously quit my job to find my old BTC and I am at a loss. I am not computer savvy. I also don't have any knowledge outside of the basics about what I'm doing here. It takes years to learn this stuff.
Btw, no walle.datfile. just private keys. I'm not entirely sure that wallet.dat was even a thing in 2009

public key infrastructure – If I derive an encryption key from an SSH private key, will it be "secure"

I would like to use my SSH keys to encrypt my data. Since it is fairly trivial to unlock my SSH key on connection, I can easily connect an SSH agent and get my private key rather than having to keep another passphrase.

If I use AES to encrypt my data with a 256 bit key, I have to make sure that my key is this size, which will not be the case with the direct use of my key SSH, in general. This means that I could hash my private key directly with SHA256.

Now, would that provide additional "security" if I repeatedly hack my private key? Also, if I included a random salt unique to each "secret", would that further help secure the "secret"?


  1. unlock private SSH key via SSH agent
  2. use SSH agent to get private key
  3. generate random salt
  4. hash salt with private key multiple times to generate a unique key for the secret
  5. store the salt and the secret

To decrypt

  1. use the stored salt and rehash to generate a unique key
  2. encrypt with the unique key generated

scan – Public IP address to legally test?

Port scanning can never be considered cybercrime, because it is the service that responds on that port and the protocol that is considered the target; The port and protocol are the attack vehicle, not the attack itself.
Any knot that keeps a door open is a knot that provides service: it all depends on how you interrogate it and what information you get.
When your browser connects to a web server, before getting the page, it performs a port scan on that server.

tls – Where do the certificate's public and private keys take place?

I was reading this topic that talks about the process of making contact and exchanging keys

The article states that the client and the server agree on the encryption suite algorithm (which is asymmetric) which they will use for key exchange, then they will use the key private generated to exchange data securely. From my understanding of the article, the encryption suite algorithm will generate its public and private keys as in the example below to exchange the symmetric private key for the data exchange. if my understanding is correct, then what is the advantage of having a certificate of public and private keys if these keys will not be used for data exchange?

enter description of image here

Best Public Relations Agency in Delhi, India – Social Media Marketing (SMM)

Do you have a brand but you don't know how to succeed? Meet the brand consultants of Transcendent Strategy, the best Lifestyle Public Relations Agency today and take advantage of their incomparable advice and services. They will assess you with new and innovative strategies to help you grow and improve your brand.