本文整理汇总了TypeScript中angular2-modal/plugins/bootstrap.Modal.open方法的典型用法代码示例。如果您正苦于以下问题:TypeScript Modal.open方法的具体用法?TypeScript Modal.open怎么用?TypeScript Modal.open使用的例子?那么恭喜您, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在类angular2-modal/plugins/bootstrap.Modal
的用法示例。
在下文中一共展示了Modal.open方法的9个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的TypeScript代码示例。
示例1: openGeoint
openGeoint() {
this.modal.open(
CustomModal,
overlayConfigFactory(
{
isBlocking: false,
title: 'GEOINT',
image: 'geoint.png',
content: '24/06/17 – The Visint Corps of the NCA captured successfully the Islamic State’s leader in Yemen, Abu Bilal al-Harby:',
},
BSModalContext,
),
);
}
示例2: openOsint
openOsint() {
this.modal.open(
CustomModal,
overlayConfigFactory(
{
isBlocking: false,
title: 'OSINT',
image: 'socialnetworks.png',
content: '',
},
BSModalContext,
),
);
}
示例3: openSigint
openSigint() {
this.modal.open(
CustomModal,
overlayConfigFactory(
{
isBlocking: false,
title: 'SIGINT',
image: 'sigint.png',
content:
'24/06/17 – The Saudi Intelligence units of the Interior Ministry intercepted a phone call between two men, who are associated with ISIS, in which they had planned to commit a double suicide attack on the Grand Mosque in Mecca, at the peak of the Hajj.',
},
BSModalContext,
),
);
}
示例4: openModal
openModal() {
this.modal.open(
CustomModal,
overlayConfigFactory(
{
isBlocking: false,
title: 'اليمن: الحوثيون يطلقون صاروخا على سفينة إماراتية',
image: 'yemens stability 7 arabic.jpg',
content: 'اطلق الحوثيون في الليلة الفاصلة لأمس الأربعاء واليوم الخميس 15 جوان 2017، صاروخا على سفينة إماراتية قبالة ساحل اليمن مما أسفر عن إصابة أحد أفراد الطاقم.\n\nوجاء في بيان لوكالة الأنباء السعودية نقلا "تعرضت سفينة إماراتية لدى خروجها من ميناء المخا اليمني لهجوم بصاروخ موجه نفذته الميليشيات الحوثية، دون أن يسفر عن أضرار في السفينة... ونتج عن ذلك إصابة شخص واحد من الطاقم"\nويجدر الذكر أن ميناء المخا المطل على البحر الأحمر قريب من مضيق باب المندب الذي تمر عبره معظم شحنات النفط بالعالم.',
},
BSModalContext,
),
);
}
示例5: openHumint
openHumint() {
this.modal.open(
CustomModal,
overlayConfigFactory(
{
isBlocking: false,
title: 'HUMINT',
image: 'humint.png',
content:
'09/09/16 – CIA Humint reports indicate that Islamic state and al-Qaeda in the Arabian Peninsula (AQAP) are working together in Yemen in order to maximise their efficiency in counteracting counterterrorism, as opposed to the way al-Qaeda branches and IS do in their remainder territories.\
',
},
BSModalContext,
),
);
}
示例6: openCyber
openCyber() {
this.modal.open(
CustomModal,
overlayConfigFactory(
{
isBlocking: false,
title: 'CYBER',
image: 'cyber.png',
content:
'09/05/16 – At the end of April 2015, the US Government announced the first attack conducted by the Cyber Command against online activities conducted by members of the ISIS. The war against the Islamic State also has cyberspace as a battlefield, for this reason, the US Cyber Command plans to run hacking operations and uses cyber weapons to destroy computer systems used by the ISIL, to destroy it functions (e.g. propaganda, economic support to militants) and to track its cyber hubs.\
At the recent meeting held in Hanover, Germany, the US President Barack Obama discussed with other leaders about the cyber strategy to contrast the Islamic State online.\
In March, Senior Pentagon officials confirmed the US Army’s first use of information warfare operations against the Islamic State as part of the campaign conducted to take back the Iraqi city of Mosul.\
The US military is using cyber tools to contrast the ISIS troops in the area, interfering members’ operation and communication.\
Skill shortage\
Security experts believe that the IS could speed up the growth of its cyber capabilities by paying cyber mercenaries or recruiting young hackers.\
Earlier 2016, intelligence experts reported that members of the IS were willing to pay Indian hackers to hack into government websites and gain access to sensitive documents. The members of the ISIS aim to create a database of potential Indian candidates from social media, who will hack government websites will receive up to $10,000 for every successful security breach.\
“There are various underground communities online where hackers interact regularly. Our investigation reveals that for the past six months, lucrative offers for stealing government data came pouring in and hackers were offered a huge sum. Such amount has never been offered to any Indian hacker before. We found that the offers were being made to spread ISIS reach in the country,” said the cyber-crime expert Kislay Choudhary.\
The hack of Government systems could allow terrorists to gather intelligence on their targets; the intelligence is aware that the Dash is focusing its recruiting activity on the Indian hacking community; many hackers are based out of various parts of South India, including Kashmir, Maharashtra, and Rajasthan.\
',
},
BSModalContext,
),
);
}
示例7: onClick2
onClick2() {
return this.modal.open(CustomModal, overlayConfigFactory({}, BSModalContext));
}
示例8: openWinnerDialog
openWinnerDialog() {
return this.modal.open(WinnerModal);
}
示例9: showAreaAddModal
showAreaAddModal() {
return this.modal.open(AreaAddModal, overlayConfigFactory({}, BSModalContext));
}