View allAll Photos Tagged Javascript

Om nom nom... My site is complete! Tell me what you think.

  

***iOS users sorry that the site looks like shit on your puny browsers, love Apple***

 

www.patthepcwizard.com/?page=home

 

Coded by yours truly.

Yeah, that seems about right.

i wonder where that beloved piece of paper is..

Generated using javascript, HTML5 and canvas

I have created an Instagram page for the game Classic Space Adventure. You can follow it here if you are intrested.

 

Classic Space Adventure is a free fanmade webgame I have created that you play in your browser (Chrome or Firefox) using your keyboard, It is inspired by the Classic Space theme by LEGO®, so you will notice many of these sets in the game, recreated in a pixelated style.

 

Play the game here, or check out the webpage for the game here.

 

There is also a Facebook page for this game that you can follow.

FullStack 2016 - the conference on JavaScript, Node & Internet of Things, Wednesday, 13th - Friday, 15th July at CodeNode, London. Images Copyright www.edtelling.com. skillsmatter.com/conferences/7278-fullstack-2016-the-conf...

Generated and rendered in Structure Synth using javascript Math functions to generate the more flowing features.

FullStack 2016 - the conference on JavaScript, Node & Internet of Things, Wednesday, 13th - Friday, 15th July at CodeNode, London. Images Copyright www.edtelling.com. skillsmatter.com/conferences/7278-fullstack-2016-the-conf...

2 images generated using hjavascript/canvas/HTML5 combined as layers

'Nuff said. The good parts aren't that hard to learn. Use 'em.

Sketches for new JS piece made using Processing.js, native Javascript and Modelbuilder.js.

Keyboard on the foreground with blurred Javascript on the background.

FullStack 2016 - the conference on JavaScript, Node & Internet of Things, Wednesday, 13th - Friday, 15th July at CodeNode, London. Images Copyright www.edtelling.com. skillsmatter.com/conferences/7278-fullstack-2016-the-conf...

A little more customizable, colours and size can be changed. (I couldn't be arsed to make scaled-up versions of the play/pause buttons, but those should be larger as well.)

 

Also, this UI can be used to scrub through video - though I'm not sure it's appropriate given the simple, standard behaviour of scrubbing linearly across the width of the video, but the idea here is to experiment.

 

This was inspired by Apple's UI for the preview feature in the iTunes app on the iPhone, and other circular things. This is a demo which will be included as part of a pending SoundManager 2 release.

As a kid, I used to print program source code and would make edits while on family road trips during summer vacation. When I got back home, I'd type in the edits.

 

In taking a road trip I hadn't done in perhaps 15 years, it felt appropriate to revisit some old habits - this time, with about 45 pages of JavaScript.

 

Despite software's "virtual" nature, I think it's good to occasionally print and work on a physical copy of your ideas. Even if you don't work all of your notes back into the code, you still benefit from the mental exercise of thinking through and editing your work.

playing more with javascript and canvas. this is a brush to be controlled by mouse, though i could apply my epicycle engine to it as well.

This is an app that I built using Flickr's API. It shows a slideshow in your browser of anyone's photostream, or a search for photos with particular tags. Or just interesting photos! It's less polished than Flickr's own one, but at the time I wrote it, Flickr's own slideshow was sorely lacking (no fullscreen).

 

This is the original photo.

Keyboard on the foreground with blurred Javascript on the background.

It looks even cooler while it's drawing.

 

Go to Silkbrush

(Or, "Programmer/nerd humour") .. A little friday-afternoon fun on my dev environment.

JavaScript: The Good Parts

Unofficial JavaScript "JS" logo as a LEGO mosaic.

Book for learning Javascript

office, commercial and domestic - I agree.

 

And how delicious.com is that logo?

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

1 3 4 5 6 7 ••• 79 80