View allAll Photos Tagged Javascript

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

The same query as in the previous image, only 16 hours later...

 

More info here: postspectacular.com/work/socialcollider/start

 

Part of the official Google Chrome collection of original experiments demonstrating the superior JavaScript performance of Google's browser, the Social Collider reveals cross-connections between conversations on Twitter.

 

With the Internet's promise of instant and absolute connectedness, two things appear to be curiously underrepresented: both temporal and lateral perspective of our data-trails. Yet, the amount of data we are constantly producing provides a whole world of contexts, many of which can reveal astonishing relationships if only looked at through time.

 

This experiment explores these possibilities by starting with messages on the microblogging-platform Twitter. One can search for usernames or topics, which are tracked through time and visualized much like the way a particle collider draws pictures of subatomic matter. Posts that didn't resonate with anyone just connect to the next item in the stream. The ones that did, however, spin off and horizontally link to users or topics who relate to them, either directly or in terms of their content.

 

The Social Collider acts as a metaphorical instrument which can be used to make visible how memes get created and how they propagate. Ideally, it might catch the Zeitgeist at work.

 

Credits

 

Karsten Schmidt - concept, design & programming

Sascha Pohflepp - concept, design

 

Follow us on Twitter for updates:

@socialcollider, @toxi, @plugimi

Hm - writing code on this machine sucks.

Taken at dotJS 2017 in Paris on December 1, 2017 by Nicolas Ravelli

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Taken at 2012.dotjs.eu on Nov 30, 2012 by Maurice Svay

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Javascript file with Lizard colorscheme

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

My beloved collection of JavaScript books :-)

Annual JavaScript CPU-burning experiment / stress test: "SnowStorm"

Trying to get SoundManager 2 working for a particular case playing M4A files; he might have found a bug. TBD.

 

(Edit): Nope, I forgot.. Turns out you can't automatically have new Audio('annoying-sound.mp3').play() start, Apple thought of that; the user must initiate/start playback of the audio, via click on a link or something similar. You can call load() however without requiring user interaction.

 

Additionally, the iPad will only play one sound at a time.

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

This type of annotations is called popup.

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Taken at dotJS 2017 in Paris on December 1, 2017 by Nicolas Ravelli

11th APRIL, LONDON - Damjan Vujnovic shares when he decided to build mindmup.com. The two main goals, to learn cool stuff and have fun. What went right? What went wrong? What was most surprising? How did they test, monitor & troubleshoot? See the SkillsCast recording (film, code, slides) at bit.ly/16V3t3p

generated using the java-script capabilities of Structure Synth this is a parametric shape directly rendered in Structure Synth

11th APRIL, LONDON - Damjan Vujnovic shares when he decided to build mindmup.com. The two main goals, to learn cool stuff and have fun. What went right? What went wrong? What was most surprising? How did they test, monitor & troubleshoot? See the SkillsCast recording (film, code, slides) at bit.ly/16V3t3p

jsPDF es el proyecto de James Hall por el que conseguimos gracias a javascript generar documentos en formato PDF de forma dinámica.

 

+ ceslava.com/blog/jspdf-generador-dinmico-de-pdf-con-javas...

130511 html, javascript 객체지향 프로그래밍 세미나

pastie.caboo.se/150231

 

This is the Javascript I wrote for the previous type image.

1 3 5 6 7 ••• 79 80