View allAll Photos Tagged javascript

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

The same query as in the previous image, only 16 hours later...

 

More info here: postspectacular.com/work/socialcollider/start

 

Part of the official Google Chrome collection of original experiments demonstrating the superior JavaScript performance of Google's browser, the Social Collider reveals cross-connections between conversations on Twitter.

 

With the Internet's promise of instant and absolute connectedness, two things appear to be curiously underrepresented: both temporal and lateral perspective of our data-trails. Yet, the amount of data we are constantly producing provides a whole world of contexts, many of which can reveal astonishing relationships if only looked at through time.

 

This experiment explores these possibilities by starting with messages on the microblogging-platform Twitter. One can search for usernames or topics, which are tracked through time and visualized much like the way a particle collider draws pictures of subatomic matter. Posts that didn't resonate with anyone just connect to the next item in the stream. The ones that did, however, spin off and horizontally link to users or topics who relate to them, either directly or in terms of their content.

 

The Social Collider acts as a metaphorical instrument which can be used to make visible how memes get created and how they propagate. Ideally, it might catch the Zeitgeist at work.

 

Credits

 

Karsten Schmidt - concept, design & programming

Sascha Pohflepp - concept, design

 

Follow us on Twitter for updates:

@socialcollider, @toxi, @plugimi

Hm - writing code on this machine sucks.

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Taken at 2012.dotjs.eu on Nov 30, 2012 by Maurice Svay

Another example from Ernest Delgado, a developer at Google who created this impressive example of image manipulation in a canvas. Note that canvas JavaScript objects can be nested.

 

www.ernestdelgado.com/public-tests/canvasphoto/demo/canva...

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Javascript file with Lizard colorscheme

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

My beloved collection of JavaScript books :-)

My FlickrPM GreaseMonkey script working in conjunction with my Flickr Contacts Organiser GM script. The FlickrPM Mail PopUp window, lets you mail your contacts without leaving the page you are on. The mail popup window now also lists the users real name and location if they have listed them in their account.

 

FlickrPM Script Updated: 17th Dec 2013 : Fixed the mail popup window in Google Chrome.

 

FlickrPM is now compatible with Google Chrome and Opera as well as Firefox!

 

Get FlickrPM

 

Get Flickr Contacts Organiser

 

Get Flickr Contacts Organiser scripts here: steeev.freehostia.com/flickr/

 

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

This type of annotations is called popup.

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

11th APRIL, LONDON - Damjan Vujnovic shares when he decided to build mindmup.com. The two main goals, to learn cool stuff and have fun. What went right? What went wrong? What was most surprising? How did they test, monitor & troubleshoot? See the SkillsCast recording (film, code, slides) at bit.ly/16V3t3p

generated using the java-script capabilities of Structure Synth this is a parametric shape directly rendered in Structure Synth

Web design students, by using JavaScript, are remotely

controlling robots and showing their knowledge of

programming. This skill could lead them to future jobs as programmers and web designers. They used BB-8 from the movie Star Wars as their robot companion in programming. For controlling the robot, they used the Sphero Edu app. The app uses JavaScript to give remote commands for moving the robot.

 

Use this CC license format for this photo:

 

CC BY-NC-SA 3.0 IGO © UNESCO-UNEVOC/Vito Vidović

Does this mean I can have quarterly payments without the £5 premium then?

jsPDF es el proyecto de James Hall por el que conseguimos gracias a javascript generar documentos en formato PDF de forma dinámica.

 

+ ceslava.com/blog/jspdf-generador-dinmico-de-pdf-con-javas...

130511 html, javascript 객체지향 프로그래밍 세미나

Creating Interactive Data Visualizations for the Web with the JavaScript InfoVis Toolkit 2.0

 

The Web has never been more open to everyone. Open Data services exist in almost every web application: from social networking apps to governmental pages and the news, all this data can be instantly accessed by exposed APIs. However, although most of this data is offered in a simple interchange format, its structures are quite complex, ranging from complex networks to time-based information, hierarchical data or heavy graphs. Displaying this data in a manner that enables the viewer to gain some insight can be challenging, especially if we aim at providing some interaction and doing it in a cross-browser/cross-device manner. The JavaScript InfoVis Toolkit creates interactive data visualizations for the Web. It's based solely on Web Standards, leveraging the power of native browser technologies to provide insights on complex data. In this talk you will learn about the JavaScript InfoVis Toolkit and how it can help you create advanced data visualizations for the Web.

 

Keywords: JavaScript, Visualization, InfoVis, DataVis, VisualWeb

 

Target Audience: People wanting to create data visualizations for the web using major browsers and platforms.

 

Speaker Information

Nicolas Garcia Belmonte

Author JavaScript InfoVis Toolkit and V8-GL

 

Software Passion: Passionate about Web Standards and Information Visualization.

 

Twitter: @philogb

Blog: blog.thejit.org

Software: JavaScript InfoVis Toolkit V8-GL

 

About YOW! Australia 2010

The YOW! 2010 Australia Software Developer Conference is a unique opportunity for you to listen to and talk with international software experts in a relaxed setting.

 

Here's why you should want to attend:

 

* concise, technically-rich talks and workshops delivered

without the usual vendor-hype and marketing spin

* broad exposure to the latests tools and technologies,

processes and practices in the software industry

* "invitation only" speakers selected by an independent

international program committee from a network

of over 400 authors and experts

* a relaxed conference setting where you get the rare opportunity

to meet and talk with world-reknowned speakers face-to-face

* an intimate workshop setting where you are able

to benefit from an in-depth learning experience

* a truly unique opportunity to make contacts and network

with other talented Australian software professionals

* you'll be supporting a great charity. Ten dollars from every registration will be donated to the Endeavour Foundation.

 

website: YOW! 2010 Melbourne

venue: Jasper Hotel, Melbourne

1 3 5 6 7 ••• 79 80