View allAll Photos Tagged javascript

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

11th APRIL, LONDON - Damjan Vujnovic shares when he decided to build mindmup.com. The two main goals, to learn cool stuff and have fun. What went right? What went wrong? What was most surprising? How did they test, monitor & troubleshoot? See the SkillsCast recording (film, code, slides) at bit.ly/16V3t3p

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

The same query as in the previous image, only 16 hours later...

 

More info here: postspectacular.com/work/socialcollider/start

 

Part of the official Google Chrome collection of original experiments demonstrating the superior JavaScript performance of Google's browser, the Social Collider reveals cross-connections between conversations on Twitter.

 

With the Internet's promise of instant and absolute connectedness, two things appear to be curiously underrepresented: both temporal and lateral perspective of our data-trails. Yet, the amount of data we are constantly producing provides a whole world of contexts, many of which can reveal astonishing relationships if only looked at through time.

 

This experiment explores these possibilities by starting with messages on the microblogging-platform Twitter. One can search for usernames or topics, which are tracked through time and visualized much like the way a particle collider draws pictures of subatomic matter. Posts that didn't resonate with anyone just connect to the next item in the stream. The ones that did, however, spin off and horizontally link to users or topics who relate to them, either directly or in terms of their content.

 

The Social Collider acts as a metaphorical instrument which can be used to make visible how memes get created and how they propagate. Ideally, it might catch the Zeitgeist at work.

 

Credits

 

Karsten Schmidt - concept, design & programming

Sascha Pohflepp - concept, design

 

Follow us on Twitter for updates:

@socialcollider, @toxi, @plugimi

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Taken at 2012.dotjs.eu on Nov 30, 2012 by Maurice Svay

Another example from Ernest Delgado, a developer at Google who created this impressive example of image manipulation in a canvas. Note that canvas JavaScript objects can be nested.

 

www.ernestdelgado.com/public-tests/canvasphoto/demo/canva...

Javascript file with Lizard colorscheme

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

My beloved collection of JavaScript books :-)

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

FullStack 2016 - the conference on JavaScript, Node & Internet of Things, Wednesday, 13th - Friday, 15th July at CodeNode, London. Images Copyright www.edtelling.com. skillsmatter.com/conferences/7278-fullstack-2016-the-conf...

This type of annotations is called popup.

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Taken at dotJS 2017 in Paris on December 1, 2017 by Nicolas Ravelli

11th APRIL, LONDON - Damjan Vujnovic shares when he decided to build mindmup.com. The two main goals, to learn cool stuff and have fun. What went right? What went wrong? What was most surprising? How did they test, monitor & troubleshoot? See the SkillsCast recording (film, code, slides) at bit.ly/16V3t3p

generated using the java-script capabilities of Structure Synth this is a parametric shape directly rendered in Structure Synth

Web design students, by using JavaScript, are remotely

controlling robots and showing their knowledge of

programming. This skill could lead them to future jobs as programmers and web designers. They used BB-8 from the movie Star Wars as their robot companion in programming. For controlling the robot, they used the Sphero Edu app. The app uses JavaScript to give remote commands for moving the robot.

 

Use this CC license format for this photo:

 

CC BY-NC-SA 3.0 IGO © UNESCO-UNEVOC/Vito Vidović

11th APRIL, LONDON - Damjan Vujnovic shares when he decided to build mindmup.com. The two main goals, to learn cool stuff and have fun. What went right? What went wrong? What was most surprising? How did they test, monitor & troubleshoot? See the SkillsCast recording (film, code, slides) at bit.ly/16V3t3p

Does this mean I can have quarterly payments without the £5 premium then?

jsPDF es el proyecto de James Hall por el que conseguimos gracias a javascript generar documentos en formato PDF de forma dinámica.

 

+ ceslava.com/blog/jspdf-generador-dinmico-de-pdf-con-javas...

130511 html, javascript 객체지향 프로그래밍 세미나

1 3 5 6 7 ••• 79 80