View allAll Photos Tagged JAVASCRIPT
Om nom nom... My site is complete! Tell me what you think.
***iOS users sorry that the site looks like shit on your puny browsers, love Apple***
www.patthepcwizard.com/?page=home
Coded by yours truly.
Classic Space Adventure is a free fanmade webgame I have created in Javascript, that is inspired by the Classic Space theme by LEGO®. You play in your web browser (Chrome or Firefox) using your keyboard (no download needed).
In this photo I show how the game looked like at the start of the development in 2016 compared to today, 2018. At first I just used very simple graphics for some of the objects (like the ones with a cross) before creating the real art. The resolution was also lower with fewer colors.
The game itself you can play here, or check out the webpage for the game here.
There is also a Facebook page for this game that you can follow and read more about the game.
Feel free to ask if you have any questions about the game!
I have created an Instagram page for the game Classic Space Adventure. You can follow it here if you are intrested.
Classic Space Adventure is a free fanmade webgame I have created that you play in your browser (Chrome or Firefox) using your keyboard, It is inspired by the Classic Space theme by LEGO®, so you will notice many of these sets in the game, recreated in a pixelated style.
Play the game here, or check out the webpage for the game here.
There is also a Facebook page for this game that you can follow.
Generated and rendered in Structure Synth using javascript Math functions to generate the more flowing features.
This is a neat little program, "the son of defdb and pngthermal," posted on encode.ru, a forum about compression algorithms. The program is available for Mac, Windows and Linux. The author explains the colours here. For example, red is "expansion" (>= 8 bits), with "midnight blue" being "strictly less than a bit."
Interestingly, the author makes the argument that if you really want to shave bytes, write your HTML5 <!DOCTYPE> in lower-case; it compresses better that way. (2 bytes, he says.)
The program can export varying widths and sizes, and also has a color-blind mode.
This is a cropped screenshot of the soundmanager2.js file, which actually compresses very well overall (there is much more blue further down the image.) To make these sorts of images, gzip whatever.js and then run gzthermal on the resulting .js.gz output.
I also need to thank a co-worker, probably Bert Saw, for sharing this. I've had that forum post open in a tab for a few days now, and have completely forgotten where I found it.
I've written a Flickr Image Gallery in JavaScript, built on the Dojo Ajax Toolkit (http://www.dojotoolkit.org). See www.skynet.ie/~sos/ajax/imagegallery.php for more information, including download and usage instructions.
I blogged about this widget at http://shaneosullivan.wordpress.com/2007/07/03/flickr-and-dojo-image-gallery/
To see your own Flickr pictures displayed on the widget, see www.skynet.ie/~sos/ajax/yourpics.php
A new version of this widget, for Dojo 1.0 & later) is now available from the Dojo project itself (I dontated it a while ago). See my blog posting for more info - shaneosullivan.wordpress.com/2007/10/13/introducing-the-n...
playing more with javascript and canvas. this is a brush to be controlled by mouse, though i could apply my epicycle engine to it as well.
This is an app that I built using Flickr's API. It shows a slideshow in your browser of anyone's photostream, or a search for photos with particular tags. Or just interesting photos! It's less polished than Flickr's own one, but at the time I wrote it, Flickr's own slideshow was sorely lacking (no fullscreen).
This is the original photo.
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware