Trending February 2024 # How Does Powershell Wget Work With Examples? # Suggested March 2024 # Top 6 Popular

You are reading the article How Does Powershell Wget Work With Examples? updated in February 2024 on the website We hope that the information we have shared is helpful to you. If you find the content interesting and meaningful, please share it with your friends and continue to follow and support us for the latest updates. Suggested March 2024 How Does Powershell Wget Work With Examples?

Introduction to PowerShell wget

The PowerShell Wget, which is an alias for the Invoke-WebRequest in PowerShell, is a non-interactive utility that sends the request to the HTTP or HTTPS web page or the web services and parses the response and returns the collection of the links, images, and HTML elements and it also helps to download the files from the webpage, post or delete or modify the data on the website with the forms, checks the status of the websites, etc.

Start Your Free Data Science Course

Hadoop, Data Science, Statistics & others


[-UseBasicParsing] [-AllowUnencryptedAuthentication] [-UseDefaultCredentials] [-SkipCertificateCheck] [-DisableKeepAlive] [-ProxyUseDefaultCredentials] [-PassThru] [-Resume] [-SkipHttpErrorCheck] [-PreserveAuthorizationOnRedirect] [-SkipHeaderValidation]

If we check the Invoke-Webrequest syntax, PowerShell 7.1 version supports the 4 sets for this command.

The other 3 sets include the below extra parameters.



This means that you can not combine the above 2 parameters with the First set of certain parameters. For example, you can’t use the -Proxy and -NoProxy parameter together but set support the -NoProxy and -CustomMethod both together.

How does PowerShell wget works?

The Invoke-WebRequest was introduced in PowerShell 3.0 onwards and has become very popular for interacting with the webpage.

Wget is the name of the alias of the Invoke-WebRequest command in the PowerShell .Net framework version (v1.0 to 5.1).

Get-Alias -Name wget


While in the Powershell Core version (6.0 onwards), the wget alias name is replaced with the iwr command.

Get-Alias -Definition Invoke-Webrequest


Wget and iwr also have the same supported utility called curl, which is a Unix command but introduced as an alias of the Invoke-Webequest command.

Get-Alias -Definition Invoke-WebRequest


When you parse the web page using the Wget command, a few properties and methods are associated with this command. Let see what those members are.


There are various properties like Headers, Images, links, which you can retrieve directly through the wget command.

In the examples below, we will see how various parameters are supported with the wget command.

Examples of PowerShell wget

Given below are the examples of PowerShell wget:

Example #1

Using the wget command to check the website status

We can check the status of the webpage using the wget (Invoke-WebRequest) command.

wget -Uri $uri


StatusCode 200 means that the site is OK. You can check the various status codes on the wiki page link below.

Example #2

Exception handling in the Wget command.

Programming language uses the try/catch methods for exception handling. In this example, we will handle the non-existence website exception using the same method in PowerShell.



To catch the status code of the message.



Example #3

Downloading a file with the Wget command.

We can download files directly from the internet using the wget command as shown below. We are downloading a Web-based net framework from the MS website in this example, as shown below.

wget -Uri $uri -OutFile “C:tempnetframework.exe” -Verbose


The above command will keep the download file in the C:temp folder with the chúng tôi name.

Example #4

Downloading Images, links from the webpage.

With the wget widget, we can access the images or links from the website directly to the local system, as shown below.

$response = wget -Uri $uri

With the above command, the response from the webpage will be stored in the $Response variable. Thus, we can directly access those properties. But, first, let’s check the images stored on the website.



With some operation on the command above, you can download those images to the particular folder as shown below. It will download all the images from the link to the C:tempWebImages folder.

$imgurl = ($img.Split(‘?’))[0] $imgname = ($imgurl -split ‘/’)[-1] }


Similarly, you can access the links from the website.


Example #5

Converting Rest API content to JSON data using wget.

When we use the rest API to get the website data, that data is generally is in JavaScript Object Notation (JSON) format. Therefore, when we use the Invoke-RestMethod command, it directly converts the output to the JSON format, as shown below.


But using the wget command, we need to use some cmdlets to filter the content and then we can convert to the above output display format.

You will get the same output as the first one.

Example #6

Login to the website using the wget post method.

In the below example, we will use the LinkedIn website to log in using wget forms as shown below.

$form = $response.Forms[1] Write-Output “`n`nWebsite Status: $($r.StatusDescription)”



Wget or Invoke-WebRequest (Curl, iwr) is one of the best command-line tools for webpage scrapping and is used by various developers and scripters to call the APIs, pass, delete, modify, add the information to the APIs or the webpages without using the GUI and also helpful to deal with the various types or webpage errors and reporting purpose.

Recommended Articles

This is a guide to PowerShell wget. Here we discuss How does PowerShell wget work along with the examples and outputs. You may also have a look at the following articles to learn more –

You're reading How Does Powershell Wget Work With Examples?

How Does Risk Parity Work With Examples?

What is Risk Parity?

Start Your Free Investment Banking Course

Download Corporate Valuation, Investment Banking, Accounting, CFA Calculator & others

Explanation How Does Risk Parity Work?

The risk parity strategy uses leverage to diversify and reduce the equity risk of an investment portfolio while maintaining the returns at the long-term target level. Using leverage allows investment in lower-risk assets such that the overall portfolio’s return is similar to equity-like returns. The portfolio leverage (by borrowing) with a higher allocation to lower-risk assets delivers a higher return than a direct investment in higher-risk assets with a similar risk level. So, higher allocation goes into bonds compared to equities, as stocks are typically riskier than bonds. In this way, it ensures that risk contribution from both asset classes is equal. Next, it is essential to ensure that the cost of borrowing is sufficiently low such that the net return of the leveraged portfolio (= portfolio return -borrowing cost) exceeds the expected return of the traditional allocation. It is a compelling strategy for investors with easy access to borrowed funds.

Examples of Risk Parity

The following are examples of some of the best risk parity funds available in the world:

AQR Risk Parity II HV Fund (QRHIX): The fund was started on 5th November 2012, and as of 13th November 2023, its total assets under management (AuM) stand at ~$23 million. The fund allocation is such that ~37% of the AuM is invested in equities, ~26% in nominal interest rate bonds, and ~37% in inflation-linked bonds, which results in an equity and bond mix of 1:1.7. During the last three years/ 5 years/ since inception, the fund has generated return of 4.79%/ 6.70%/ 4.34%, which indicates that its performance has been slightly fluctuating with realized volatility of 12.5% since inception. The fund’s management fee and adjusted expenses ratio are 0.80% and 1.03%, respectively.

Horizons Resolve Adaptive Asset Allocation ETF (HRAA): The fund was started on 21st July 2024 as Horizons Global Risk Parity ETF (HRA), Canada’s first Global risk parity fund. On 30th July 2023, the fund was reorganized into Horizons Resolve Adaptive Asset Allocation ETF, and as of 20th September 2023, its total assets under management (AuM) stand at ~$70 million. The fund allocation is such that ~6% of the AuM is invested in equities and ~53% in bonds. Before reorganization, the fund generated returns of 1.35% in the last three years with a volatility of 5.75%. The fund’s management fee is 0.85% plus 15% of the amount by which the fund outperforms the high water mark.

Source: Horizon ETFs, Yahoo Finance

Who Invented Risk Parity?

It was Bridgewater Associates that first launched a risk parity fund by the name All Weather asset allocation strategy in the year 1996. Although the risk parity fund was introduced to the market by Bridgewater Associates, the term was not coined until 2005, when Edward Qian of PanAgora Asset Management first used this term in his authored white paper. In 2008, Andrew Zaytsevof Alan Biller and Associates named Risk Parity one of his investment categories. Soon, the entire asset management industry adopted the term.


Typically, any risky asset generates higher returns than plain cash. So, it makes sense to borrow and purchase risky assets (a.k.a. financial leverage) to earn higher portfolio returns. This strategy results in negative allocation to cash while the allocation to risky assets (mix of bonds and stocks) exceeds 100%. In the above chart, it can be seen that as compared to the traditional portfolio allocation of 60% to equities and 40% to bonds in the 3-asset risk parity portfolio, the portfolio allocation to equities has been halved and that of bonds has been increased three-fold resulting in negative allocation to cash (indicating borrowed fund). In this way, the portfolio risk contribution of equities is brought down while increasing that of bonds to ensure equal risk contribution of both the asset classes (considering zero risk for cash).

Criticisms Conclusion

So, it can be seen that the risk parity approach is an essential portfolio management strategy wherein the capital allocation is done in such a way that the risk contribution of each asset class is equal. The risk parity approach is believed to result in a higher Sharpe ratio, i.e., higher risk-adjusted return.

Recommended Articles

This is a guide to Risk Parity. Here we also discuss the introduction and how does it work? Along with examples. You may also have a look at the following articles to learn more –

How Does The Format Tag Work In Jsp With Examples?

Introduction to JSP format

Web development, programming languages, Software testing & others


Some dependent libraries should be included in the project’s lib folder as the format tag has dependencies in the JSTL library. You can either link a full set of libraries in jSTL or can target specific files as per your purpose. Two statements to be written before start writing the code to use the format tag are:

The prefix denotes the format one would like to use. One can get a complete list of “prefixes” with uri the same as above as per the requirements.

The syntaxes used by JSP Format are:

How does the format tag work in JSP?

JSP Format uses the JSTL library to use the inbuilt formatting options incorporated in predefined format tags with the help of various formats. The prerequisite to use formatting in JSP is that libraries should be attached and present in the lib folder of your project. The syntax above contains some of the common property names. Formatting can be done to match up the existing standards with the help of inbuilt properties, but sometimes the format is local; for example, we want a pricing rate format to be 1 rupee per word, i.e. “1/word”. To save this format, a new pattern or a local xml database has to be created. While just showing the time from “timestamp” is more of formatting from the existing pattern. These are explained in more detail with the help of examples provided in the below section.

Examples of JSP format

Some of the examples to demonstrate the use of the JSP format tag in JSP is explained below for a better understanding of the topic.

Example #1

Here is one of the items on the list, along with its price. The list in the background is a customized list along with its defined pricing style.


Example #2

Code : NewFile2.jsp


Explanation: This is an example of the pre-existing format used to display the inputted information in the applied format. The “fmt:parseDate” helps in identifying the use of formatter in JSP, which is dependent on the JSTL library. “Vale” attributes get the value to be passed into this tag, the “pattern” attribute helps JSP understand the pattern being inputted in the program, and the “var” attribute is used to identify the formatted data, which will be outputted. After the date is passed as input to this tag, then the output is provided in the form of string date and time. This pattern can be seen in the output screen.


JSP format is an easy tag that comes with many functionalities offered by JSP libraries, but it can be complex if looking for a customized, unique data format. Its simplicity does not outweigh the importance attached to this tag. This tag is used very commonly in many websites or businesses linked to finance, export, transportation, agriculture, and many more such sectors.

Recommended Articles

This is a guide to the JSP format. Here we discuss How does the format tag work in JSP and Examples, along with the codes and outputs. You may also have a look at the following articles to learn more –

How Does Ansible Firewalld Works With Examples

Introduction to Ansible Firewalld

In Ansible, we have many modules that provide us the ability to perform operational work on remote hosts. Especially, operations which are to be done on Linux remote hosts. One such module is named firewalld, which is used to manage firewall rules of Linux systems. In this topic, we are going to learn about Ansible Firewalld.

Start Your Free Software Development Course

Web development, programming languages, Software testing & others

As we know that Linux systems can have a firewalld daemon that is used to allow/block access to/from services, networks, and ports by updating running or permanent firewall rules on the machine via firewall-cmd utility. The same is managed by Ansible using the firewalld module.

Explaining the Ansible Firewalld

Ansible firewalld is the module that is used to update firewall rules on remote hosts. The remote hosts are the Linux machines here. Ports can be TCP or UDP, which can be enabled or disabled. Similarly, services can be allowed or blocked.

We should note below points while working with Ansible firewalld module: –

As per the latest Ansible firewalld module, the firewalld version on the hosts, where firewall rules will be modified, should have equal to or greater than 2.11.

This module is not tested in Debian based

Requires python2 bindings of firewalld. Where python2 bindings are not available, python3 bindings can be used but we must set ansible_python_interpreter to python3 interpreter path and install python3

There is a known limitation in Ansible firewalld due to which zone transactions must explicitly be permanent. This also means that when we add a zone and want to perform immediate actions on it, we need to reload the firewalld service. But take care while doing that because reloading firewalld will undo all non-permanent actions performed

This module is not guaranteed to have backward

Along with the above points, we should also know below terminologies which are heavily used in firewalld.

Zone: Zone is a logical network location which can be arbitrary but can be defined in terms of the network from which traffic will originate, or a location to which your local network interface is connected.

Services: Services are the series of ports and protocol combination which works as the socket, that our host is listening on, which then can be placed in one or more

Ports: These are the logical constructs which are representing a service endpoint

How Does Ansible Firewalld Works?

Because handling rules in an ad hoc way will end up in a mess and we need to spend hours and network support to identify the problematic parts in our firewall rules.

icmp_block: The icmp block we like to remove or add from or to a zone in firewall rules

immediate: if the permanent parameter is used, should this be applied

interface: The interface we like to remove or add to or from a zone in firewall rules

permanent: Should the configuration be in permanent rule, which persists across reboots or in running configuration temporarily. When this is “no”, then by default immediate is “yes”.

Acceptable values are either “yes” or “no”.

1. port: Name or port or port range to remove or add to or from firewalld. When giving ranges, it must be in the form of PORT/PROTOCOL or PORT-PORT/PROTOCOL for port

2. rich_rule: rich rule to add or remove to or from

3. service: The service which needs to be added or removed to or from firewalld. The service must be listed in the output of the “firewall-cmd –get-services” command on remote

4. source: The source network you would like to be removed or added to or from in firewalld rules.

5. state: Enable or disable a setting. Below are acceptable values from which present and absent

are used in case of zone level operation.





6. timeout: The time for which rule should be in effect when set as non-permanent

7. zone: The firewall zone to be added or removed. The public is default zone from upstream but this can be configured. Some out of box defaults are block, DMZ, external, internal, trusted, work. This list can be extended based on a per system

Example of Ansible Firewalld

Now by using examples, we will try to learn about Ansible firewalld, which you might have to use in day to day operations. We will take some examples, but before going there, we first understand our lab, we used for testing purpose.

Here we have an Ansible control server named ansible-controller and one remote host named host- remote. We will create playbooks and run Ansible commands on the ansible-controller node and see the results on the remote host.

Also, on the remote host, below is the current status of firewalld.

firewall-cmd --state

firewall-cmd --get-services

firewall-cmd --get-zone

firewall-cmd --list-all

We will use a playbook with below content: –

When we execute it like below we get below output: –

ansible-playbook ansible_firewalld_enable_service.yaml

firewall-cmd --list-all

In this example, we will see how to enable a port in remote host, for this we have a playbook like below content: –

port: 443/tcp state: enabled

ansible-playbook ansible_firewalld_disable_port.yaml

Now checking on the remote host, we will see this port is listed in the output of –list-all now like below, but it was not there previously: –

firewall-cmd --list-all

In this example, we will enable an ip range for a zone, for this we have a playbook like below, Note here that as we are doing a zone related transaction so for this to work we need to make it permanent and also immediately reload firewalld on the remote host, like below: –

name: we have to reload firewalld else zone transactions will not be realised command: firewall-cmd –reload

After executing this playbook we get the below output: –

ansible-playbook ansible_firewalld_enable_source_network.yaml

On the remote host, we can see that the mentioned network is listed on the concerned zone’s allowed list

firewall-cmd --zone=internal --list-all


As we have seen that Ansible firewalld is a very powerful module which can be very useful if you have supported network and your remote hosts are supportable in all ways. But points to note that it is not an easy task to have a track of all the firewall rule, especially when we have permanent and non- permanent rules. So that preparation is needed before-hand.

Recommended Articles

This is a guide to Ansible Firewalld. Here we discuss the introduction to Ansible Firewalld along with the working, detailed explanation and respective examples. You may also look at the following articles to learn more –

How Does Encryption Work?




A B C D E F G H I J K L M N O P Q R S T U V W X Y Z More alphabets and unbreakable encryption

The weaknesses of the Caesar substitution cipher can be slightly alleviated by using more than one shifted alphabet. The example below can be expanded to 26 shifted alphabets of which several are used at once, but not all of them.





Rather than doing a straight substitution this time we use addition, with a twist. Each letter of the alphabet is assigned a number, A is 0, B is 1, C is 2 and so on. I is the 9th letter of the alphabet, which means it has a value of 8. P (the letter below it on our one-time-cipher pad) 15. 8 + 15 = 25 which means X. The second letter of our message is S, which has the value 18. It just so happens that S is also the letter on our one-time pad (which isn’t an issue at all). 18 + 18 = 36. Now here is the twist, there is no 36th letter of the alphabet. So we perform what is called a modulus operation. What that basically means is that we divided the result by 26 (the number of letters in the alphabet) and use the remainder. 36 / 26 = 1 remainder 10. The letter with the value of 10 is K. If you continue doing this the final encrypted message is:

Computers are flexible, unlike mechanical boxes, computers can be programmed to perform lots of different operations on a message and the number and complexity of these operations can be altered relatively quickly.


Computers deal with binary numbers not just letters.

Exclusive OR (XOR) – This is a bit level logical operation that is applied to 2 input bits A and B. The Exclusive OR returns true or false (1 or 0) to the question, “A or B, but not, A and B”. You can think of it as, “one or the other but not both”. So, if A is 1 and B is 0 then that is one or the other, so the result is 1 (true). The same result applies to A is 0 and B is 1. But if A is 0 and B is 0 then the result is 0 (false), as both have the same value. False is also given for A is 1 and B is 1.

But the real magic of XOR is that it is reversible. If A XOR B = C then B XOR C = A, and A XOR C = B. This is very important for encryption as it means that data can be encrypted (where A is the data) using a key (B) to get the encrypted data (C). Later the encrypted data can be decrypted by XOR it with the key again to get the original data. The reason XOR is used in conjunction with complicated round functions and bit shifting operations is because on its own XOR can be broken using frequency analysis (because of the constantly repeating key).

Public key cryptography and wrap-up

How Iife Work In Javascript With Programming Examples

Introduction to JavaScript IIFE

The JavaScript Immediately Invoked Function Expression (IIFE) is a function which helps in providing a method that defines a sequence of a particular context. Once a variable is defined inside a function it is not possible to access it outside the function where it is defined. The functions which are created in JavaScript have named functions, anonymous functions and by making use of IIFE we can execute these as soon as they are mounted. This functionality makes them IIFE. Let us have a look in detail at how this function works

Start Your Free Software Development Course


Below is the syntax for JavaScript IIFE:

(function () { })();

Explanation: The primary use of this function is that the variables should be accessible only within the scope of the defined function that is there.

The declaration should begin with the keyword function(). In the function definition, you can define any statements which are to be performed. This function should be hoisted. A hoisted function is always placed at the start of the program or functional scope when the JavaScript code is being executed. You can also use the below syntax:

The parentheses let JavaScript know that there is a function expression and the last pair of parentheses will invoke the function.

How does IIFE work in JavaScript?

Let us see how does it work:


(function () { var userName = "Snehal"; function display(name) { alert("MyCode2.js: " + name); } display(userName); })();

The above code is an example of IIFE. The IIFE helps in including all functions and variables with the same name and they can be accessed globally. Here we define a function and in its definition,  we are creating a variable username. We immediately write another function that will display this username. This is the display function where we are sending the username as a parameter. We have created an alert for the same where we display the code script name and then by making use of IIFE we have simply called the function at the end. In this way we have called two functions one after the other. We have rather immediately invoked. Let us check a few examples to understand better.

Examples to Implement JavaScript IIFE

Below are the examples mentioned:

Example #1


// anonymous function #1 var isLucky = function() { var iife = Math.round(Math.random() * 100); return “You are checking Immediate Invoking Function Expression!”; } else { return “We are not in IIFE, better luck next time!”; } }; var me = isLucky(); alert(me); window.setTimeout(function() { alert(“JavaScript and EduCBA is awesome!!!”); }, 2000);

At first, the result is displayed as per the condition. When we again run the program the result is the else part. Once the time outspan is over then the output of the above program will be as below:

Explanation: The above script helps us understand the IIFE in Javascript better. Here we have created a function isLucky where we are rounding off a random number and then multiplying it by 100. The random number is being generated by the Math.random() function. After this number is generated then we check if the number is less or greater than 50. If the number is greater than 50 then the message will be displayed as: “You are checking Immediate Invoking Function Expression!”. Else the corresponding message for it will be displayed. Once this function is done we are calling it and storing it in a variable called me. Whatever message is returned it will be displayed in the form is an alert window in the browser. Just after this, another function is invoked. This function will time out and display another alert will be displayed. Below will be the output when we run for the first time.

Example #2

Let us take another example of IIFE. We can use this function without if else block as well.

(function() { var create = “I have learnt what is Immediate Invoking Function Expression from EduCBA successfully !!!”; alert(create); })(); window.setTimeout(function() { alert(“JavaScript and Edu is awesome!!!”); }, 2000);


The message is displayed as soon as the above code is run. Once the timeout happens below alert window turns up automatically.

Explanation: The above code is an example of a classic and simple IIFE. We create a function and immediately call it. We have not named this function with any name. We have just created a variable create. This function then uses this to display this message as the sun as the function is invoked. As per the syntax, we are bound to use the parenthesis correctly. If there are any misses in the parenthesis then the code will not give the desired result. We can easily invoke the function as soon as the function is declared and defined. We will just pass empty parentheses in order to invoke the function that we have created. We send the variable to create as a parameter to an alert. When the program is run the alert will be called and whatever is present in the created variable will be displayed in the alert window. We also created a similar function as in Example 1. This will work in a similar way. It will wait for timeout and will again display an alert window with the specified message. The timeout time we have mentioned here is 2 milliseconds. Once this is over the message will be displayed automatically. Let us see the output of the above code.


The Immediate Invoking Function Expression is an easy way of calling a function just after it is created. It helps in keeping the local variables local or global variables as global whenever required. It is fast and hence very efficient to use. It fulfills the programmer’s purpose of keeping the variables intact. IIFE can be used with a name or without any name. They can also be used with unary operators when needed.

Recommended Articles

This is a guide to JavaScript IIFE. Here we discuss an introduction to JavaScript IIFE, syntax, how does it work and programming examples. You can also go through our other related articles to learn more –

Update the detailed information about How Does Powershell Wget Work With Examples? on the website. We hope the article's content will meet your needs, and we will regularly update the information to provide you with the fastest and most accurate information. Have a great day!