• Home
  • Tools
    • Api authentication
    • HTML Password protection
    • Python Obfuscation
    • Base64 Encode/Decode
    • MD5 Hash generator
  • Blog
  • Contact us
    • Facebook
    • Twitter
  • Login
Blog
30th December 2020

A Practical Introduction To Dependency Injection

The concept of Dependency Injection is, at its core, a fundamentally simple notion. It is, however, commonly presented in a manner alongside the more theoretical concepts of Inversion of Control, Dependency Inversion, the SOLID Principles, and so forth. To...

Read more
0 comment

30th December 2020

21 arrested after allegedly using stolen logins to commit fraud

UK police also give some food for thought to those on the verge of breaking the law The post 21 arrested after allegedly using stolen logins to commit fraud appeared first on WeLiveSecurity Sourced from Tomáš Foltýn

Read more
0 comment

29th December 2020

Smashing Podcast Episode 32: Review Of The Year 2020

In this episode, we’re taking a look back at 2020. Who did we speak to in our episodes this year, and what did we learn? Let’s listen back to some clips to find out. Show Notes You can find...

Read more
0 comment

29th December 2020

Patch Tuesday, Good Riddance 2020 Edition

Microsoft today issued its final batch of security updates for Windows PCs in 2020, ending the year with a relatively light patch load. Nine of the 58 security vulnerabilities addressed this month earned Microsoft’s most-dire “critical” label, meaning they...

Read more
0 comment

28th December 2020

Payment Processing Giant TSYS: Ransomware Incident “Immaterial” to Company

Payment card processing giant TSYS suffered a ransomware attack earlier this month. Since then reams of data stolen from the company have been posted online, with the attackers promising to publish more in the coming days. But the company...

Read more
0 comment

27th December 2020

Smart tech gifts: How to keep your kids and family safe

Cyberthreats can take the fun out of connected gadgets – here’s how to make sure your children enjoy the tech without putting themselves or their family at risk The post Smart tech gifts: How to keep your kids and...

Read more
0 comment

26th December 2020

Feature Prioritizing: Ways To Reduce Subjectivity And Bias

How familiar is this scenario: A team employs modern decision-making methods and performs all design-thinking rituals, but the result remains guesswork. Or this: Soon after having prioritized all features, the key stakeholders change their mind and you have to...

Read more
0 comment

25th December 2020

U.S. Treasury, Commerce Depts. Hacked Through SolarWinds Compromise

Communications at the U.S. Treasury and Commerce Departments were reportedly compromised by a supply chain attack on SolarWinds, a security vendor that helps the federal government and a range of Fortune 500 companies monitor the health of their IT...

Read more
0 comment

24th December 2020

What’s Coming To VueX?

Vuex is the solution for state management in Vue applications. The next version — Vuex 4 — is making its way through the final steps before officially releasing. This release will bring full compatibility with Vue 3, but doesn’t...

Read more
0 comment

24th December 2020

7 ways malware can get into your device

You know that malware is bad, but are you also aware of the various common ways in which it can infiltrate your devices? The post 7 ways malware can get into your device appeared first on WeLiveSecurity Sourced from...

Read more
0 comment

  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • …
  • 90
  • 91
  • 92
  • 93
  • 94
  • Next

Categories

  • Cyber security
  • Web development

Recent Posts

27 February,2021 Building User Trust In UX Design
27 February,2021 Championing worthy causes: How ESET gives a helping hand
25 February,2021 Building A Discord Bot Using Discord.js
25 February,2021 Google’s Password Checkup tool rolling out to Android devices
24 February,2021 Material Design Text Fields Are Badly Designed
Development tools

Main

  • Home
  • Blog
  • Login

Policy

  • Terms and Conditions
  • Copyright Policy

Tools

  • API authentication
  • Web page protection
  • PHP obfuscation
  • Base64 Encode/Decode
  • MD5 Hash generator

Contact us

  • Facebook
  • Twitter
contact@development-tools.net