View allAll Photos Tagged Javascript,
Om nom nom... My site is complete! Tell me what you think.
***iOS users sorry that the site looks like shit on your puny browsers, love Apple***
www.patthepcwizard.com/?page=home
Coded by yours truly.
";alert(1);"
";alert(document.domain);//
<![CDATA[<!DOCTYPE doc [ %dtd;]>]]>
<!DOCTYPE root [%a;]>
<!DOCTYPE root [%a;]>
<!DOCTYPE root [%a;]>
<!DOCTYPE root [%a;]>
">*/alert(1)///*
"xxxxxxxx'yyyyy</img
for((i)in(self))eval(i)(1)
?q=#x
1"-->
#>'"">
#>'>"
xss%27%2balert(1)%2b%27
">"
#>'>">
">
alert(1)
\x3Cscript\x3Ealert(document.domain);\x3C\x2Fscript\x3E
javascript:alert(document.domain);//http://g00gle.des
I have created an Instagram page for the game Classic Space Adventure. You can follow it here if you are intrested.
Classic Space Adventure is a free fanmade webgame I have created that you play in your browser (Chrome or Firefox) using your keyboard, It is inspired by the Classic Space theme by LEGO®, so you will notice many of these sets in the game, recreated in a pixelated style.
Play the game here, or check out the webpage for the game here.
There is also a Facebook page for this game that you can follow.
FullStack 2016 - the conference on JavaScript, Node & Internet of Things, Wednesday, 13th - Friday, 15th July at CodeNode, London. Images Copyright www.edtelling.com. skillsmatter.com/conferences/7278-fullstack-2016-the-conf...
Generated and rendered in Structure Synth using javascript Math functions to generate the more flowing features.
Skils Matter - Progressive .NET Tutorials 2016, Wednesday, 22nd - Friday, 24th June at CodeNode, London. Images copyright www.edtelling.com. www.skillsmatter.com/conferences/7235-progressive-dot-net...
Best viewed large
Made with HTML5 and JavaScript
See more photos and abstract drawings in my gallery on DeviantArt:
Thank you!
The design conference for people who make websites
An Event Apart is an intensely educational two-day learning session for passionate practitioners of standards-based web design. If you care about code as well as content, usability as well as design, An Event Apart is the conference you’ve been waiting for.
Dedicated to the proposition that the creators of great web experiences deserve a great learning experience, An Event Apart brings together twelve of the leading minds in web design for two days of non-stop inspiration and enlightenment.
As a kid, I used to print program source code and would make edits while on family road trips during summer vacation. When I got back home, I'd type in the edits.
In taking a road trip I hadn't done in perhaps 15 years, it felt appropriate to revisit some old habits - this time, with about 45 pages of JavaScript.
Despite software's "virtual" nature, I think it's good to occasionally print and work on a physical copy of your ideas. Even if you don't work all of your notes back into the code, you still benefit from the mental exercise of thinking through and editing your work.
A little more customizable, colours and size can be changed. (I couldn't be arsed to make scaled-up versions of the play/pause buttons, but those should be larger as well.)
Also, this UI can be used to scrub through video - though I'm not sure it's appropriate given the simple, standard behaviour of scrubbing linearly across the width of the video, but the idea here is to experiment.
This was inspired by Apple's UI for the preview feature in the iTunes app on the iPhone, and other circular things. This is a demo which will be included as part of a pending SoundManager 2 release.
playing more with javascript and canvas. this is a brush to be controlled by mouse, though i could apply my epicycle engine to it as well.
(function(w,doc) {
if (!w.__utlWdgt ) {
w.__utlWdgt = true;
var d = doc, s = d.createElement('script'), g = 'getElementsByTagName';
s.type = 'text/javascript'; s.charset='UTF-8'; s.async = true;
s.src = ('https:' == w.location.protocol ? 'https' : 'http') +...
zatvor.net/fotograf-udaljaet-telefony-s-fotografij-pokazy...
zatvor.net/wp-content/uploads/2015/10/portraits-holding-d...
(function(w,doc) {
if (!w.__utlWdgt ) {
w.__utlWdgt = true;
var d = doc, s = d.createElement('script'), g = 'getElementsByTagName';
s.type = 'text/javascript'; s.charset='UTF-8'; s.async = true;
s.src = ('https:' == w.location.protocol ? 'https' : 'http') +...
zatvor.net/spletenie-staryh-i-novyh-snimkov
i2.wp.com/zatvor.net/wp-content/uploads/2016/03/i-combine...
remeshing surfaces in javascript with the Ball Pivot Algorithm. You can see the prototype here: n-e-r-v-o-u-s.com/projects/remesh
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware