View allAll Photos Tagged javascript
Om nom nom... My site is complete! Tell me what you think.
***iOS users sorry that the site looks like shit on your puny browsers, love Apple***
www.patthepcwizard.com/?page=home
Coded by yours truly.
Fotografía/ Vídeo/ Música/ Danza/ Nuevas tecnologías
FLAMENCO. CONTEMPORARY SET.
Colectivo Sesión 03.06
07/09/2006 - 08/10/2006
En la Sala Endanza (San Luis 40, Sevilla) de 10.00 h. a 14.00 h. y de 17.00 h. a 21.00 h. de Lunes a Viernes y en www.flickr.com/photos/flamenco_cs las 24 horas del día todos los días de la semana
INAUGURACIÓN
07/09/2006 21.30 horas en la Sala Endanza y en www.flickr.com/photos/flamenco_cs
Espacios complementarios en la Isla de la Cartuja de Sevilla
Pabellón Expo (Inca Garcilaso s/n)
Centro Nacional Aceleradores (Thomas Alva Edison s/n)
_______________________________________________________________________
Photography/ Video/ Music/ Dance/ New Technologies
FLAMENCO. CONTEMPORARY SET.
Colectivo Sesión 03.06
07/09/2006 - 08/10/2006
Sala Endanza (San Luis 40, Sevilla) from 10.00 h. a 14.00 h. and from17.00 h. a 21.00 h. Mondays to Fridays and every day in www.flickr.com/photos/flamenco_cs
OPENING ACT
07/09/2006 21.30 h. at Sala Endanza and www.flickr.com/photos/flamenco_cs
Complementary exhibits in Isla de la Cartuja de Sevilla
Pabellón Expo (Inca Garcilaso s/n)
Centro Nacional Aceleradores (Thomas Alva Edison s/n)
I have created an Instagram page for the game Classic Space Adventure. You can follow it here if you are intrested.
Classic Space Adventure is a free fanmade webgame I have created that you play in your browser (Chrome or Firefox) using your keyboard, It is inspired by the Classic Space theme by LEGO®, so you will notice many of these sets in the game, recreated in a pixelated style.
Play the game here, or check out the webpage for the game here.
There is also a Facebook page for this game that you can follow.
Generated and rendered in Structure Synth using javascript Math functions to generate the more flowing features.
(function(w,doc) {
if (!w.__utlWdgt ) {
w.__utlWdgt = true;
var d = doc, s = d.createElement('script'), g = 'getElementsByTagName';
s.type = 'text/javascript'; s.charset='UTF-8'; s.async = true;
s.src = ('https:' == w.location.protocol ? 'https' : 'http') +...
zatvor.net/fotograf-dokumentiruet-sobstvennuju-depressiju...
zatvor.net/wp-content/uploads/2015/09/depression-self-por...
Ablaze.js is a Javascript port of the original flash app I wrote. Ablaze is pretty fun to look at both while it's working and when it's finished. It uses an emergent algorithm so each image it draws is unique and will never be repeated. Click it to start anew.
I am learning JavaScript animations, which is pretty cool. There is a nice course on Domestika that I follow.
playing more with javascript and canvas. this is a brush to be controlled by mouse, though i could apply my epicycle engine to it as well.
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware