View allAll Photos Tagged Javascript

Hm - writing code on this machine sucks.

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Taken at 2012.dotjs.eu on Nov 30, 2012 by Maurice Svay

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Javascript file with Lizard colorscheme

Trying to get SoundManager 2 working for a particular case playing M4A files; he might have found a bug. TBD.

 

(Edit): Nope, I forgot.. Turns out you can't automatically have new Audio('annoying-sound.mp3').play() start, Apple thought of that; the user must initiate/start playback of the audio, via click on a link or something similar. You can call load() however without requiring user interaction.

 

Additionally, the iPad will only play one sound at a time.

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Annual JavaScript CPU-burning experiment / stress test: "SnowStorm"

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

FullStack 2016 - the conference on JavaScript, Node & Internet of Things, Wednesday, 13th - Friday, 15th July at CodeNode, London. Images Copyright www.edtelling.com. skillsmatter.com/conferences/7278-fullstack-2016-the-conf...

This type of annotations is called popup.

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Web design students, by using JavaScript, are remotely

controlling robots and showing their knowledge of

programming. This skill could lead them to future jobs as programmers and web designers. They used BB-8 from the movie Star Wars as their robot companion in programming. For controlling the robot, they used the Sphero Edu app. The app uses JavaScript to give remote commands for moving the robot.

 

Use this CC license format for this photo:

 

CC BY-NC-SA 3.0 IGO © UNESCO-UNEVOC/Vito Vidović

11th APRIL, LONDON - Damjan Vujnovic shares when he decided to build mindmup.com. The two main goals, to learn cool stuff and have fun. What went right? What went wrong? What was most surprising? How did they test, monitor & troubleshoot? See the SkillsCast recording (film, code, slides) at bit.ly/16V3t3p

generated using the java-script capabilities of Structure Synth this is a parametric shape directly rendered in Structure Synth

Taken at dotJS 2017 in Paris on December 1, 2017 by Nicolas Ravelli

11th APRIL, LONDON - Damjan Vujnovic shares when he decided to build mindmup.com. The two main goals, to learn cool stuff and have fun. What went right? What went wrong? What was most surprising? How did they test, monitor & troubleshoot? See the SkillsCast recording (film, code, slides) at bit.ly/16V3t3p

Does this mean I can have quarterly payments without the £5 premium then?

Taken at dotJS 2017 in Paris on December 1, 2017 by Nicolas Ravelli

jsPDF es el proyecto de James Hall por el que conseguimos gracias a javascript generar documentos en formato PDF de forma dinámica.

 

+ ceslava.com/blog/jspdf-generador-dinmico-de-pdf-con-javas...

130511 html, javascript 객체지향 프로그래밍 세미나

Creating Interactive Data Visualizations for the Web with the JavaScript InfoVis Toolkit 2.0

 

The Web has never been more open to everyone. Open Data services exist in almost every web application: from social networking apps to governmental pages and the news, all this data can be instantly accessed by exposed APIs. However, although most of this data is offered in a simple interchange format, its structures are quite complex, ranging from complex networks to time-based information, hierarchical data or heavy graphs. Displaying this data in a manner that enables the viewer to gain some insight can be challenging, especially if we aim at providing some interaction and doing it in a cross-browser/cross-device manner. The JavaScript InfoVis Toolkit creates interactive data visualizations for the Web. It's based solely on Web Standards, leveraging the power of native browser technologies to provide insights on complex data. In this talk you will learn about the JavaScript InfoVis Toolkit and how it can help you create advanced data visualizations for the Web.

 

Keywords: JavaScript, Visualization, InfoVis, DataVis, VisualWeb

 

Target Audience: People wanting to create data visualizations for the web using major browsers and platforms.

 

Speaker Information

Nicolas Garcia Belmonte

Author JavaScript InfoVis Toolkit and V8-GL

 

Software Passion: Passionate about Web Standards and Information Visualization.

 

Twitter: @philogb

Blog: blog.thejit.org

Software: JavaScript InfoVis Toolkit V8-GL

 

About YOW! Australia 2010

The YOW! 2010 Australia Software Developer Conference is a unique opportunity for you to listen to and talk with international software experts in a relaxed setting.

 

Here's why you should want to attend:

 

* concise, technically-rich talks and workshops delivered

without the usual vendor-hype and marketing spin

* broad exposure to the latests tools and technologies,

processes and practices in the software industry

* "invitation only" speakers selected by an independent

international program committee from a network

of over 400 authors and experts

* a relaxed conference setting where you get the rare opportunity

to meet and talk with world-reknowned speakers face-to-face

* an intimate workshop setting where you are able

to benefit from an in-depth learning experience

* a truly unique opportunity to make contacts and network

with other talented Australian software professionals

* you'll be supporting a great charity. Ten dollars from every registration will be donated to the Endeavour Foundation.

 

website: YOW! 2010 Melbourne

venue: Jasper Hotel, Melbourne

pastie.caboo.se/150231

 

This is the Javascript I wrote for the previous type image.

Best viewed large

Made with HTML5 and JavaScript

 

See more photos and abstract drawings in my gallery on DeviantArt:

www.deviantart.com/ciokkolata

Thank you!

1 3 5 6 7 ••• 79 80