• Home
  • Tools
    • Api authentication
    • HTML Password protection
    • Python Obfuscation
    • Base64 Encode/Decode
    • MD5 Hash generator
  • Blog
  • Contact us
    • Facebook
    • Twitter
  • Login
Blog
9th December 2019

Brand Illustration Systems: Drawing A Strong Visual Identity

Brand Illustration Systems: Drawing A Strong Visual Identity Brand Illustration Systems: Drawing A Strong Visual Identity Yihui Liu 2019-12-09T12:30:00+00:00 2019-12-09T20:10:09+00:00 In the flood of online content, companies live or die by their brand image. A brand image has to...

Read more
0 comment

9th December 2019

5 scam prevention tips for seniors

How can people who didn’t grow up with technology protect themselves against some of the most common types of online fraud? The post 5 scam prevention tips for seniors appeared first on WeLiveSecurity Sourced from Tomáš Foltýn

Read more
0 comment

8th December 2019

Smashing TV Live: Privacy UX, A Session With Vitaly Friedman

Smashing TV Live: Privacy UX, A Session With Vitaly Friedman Smashing TV Live: Privacy UX, A Session With Vitaly Friedman Vitaly Friedman 2019-12-03T11:00:00+00:00 2019-12-08T16:08:40+00:00 Cookie consent prompts, push notifications, app install prompts, video autoplays and annoying pop-ups. Every time...

Read more
0 comment

8th December 2019

Face scanning – privacy concern or identity protection?

What issues would face scanning attached to a mobile device resolve and, if used correctly, would it make the incursion into my privacy acceptable? The post Face scanning – privacy concern or identity protection? appeared first on WeLiveSecurity Sourced...

Read more
0 comment

7th December 2019

How To Design Profitable Sales Funnels On Mobile

How To Design Profitable Sales Funnels On Mobile How To Design Profitable Sales Funnels On Mobile Suzanne Scacca 2019-12-06T11:00:00+00:00 2019-12-07T12:07:14+00:00 A sales funnel is a set of invisible steps you lay before visitors that takes them from the point...

Read more
0 comment

7th December 2019

How to spot if your child is a victim of cyberbullying

What are some of the most common warning signs that your child is experiencing online harassment? The post How to spot if your child is a victim of cyberbullying appeared first on WeLiveSecurity Sourced from Editor

Read more
0 comment

6th December 2019

How To Build A Real-Time Multiplayer Virtual Reality Game (Part 2)

How To Build A Real-Time Multiplayer Virtual Reality Game (Part 2) How To Build A Real-Time Multiplayer Virtual Reality Game (Part 2) Alvin Wan 2019-12-05T11:00:00+00:00 2019-12-06T08:07:51+00:00 In this tutorial series, we will build a web-based multiplayer virtual reality game,...

Read more
0 comment

6th December 2019

80% of all Android apps encrypt traffic by default

Google keeps pushing in its mission for broader encryption adoption The post 80% of all Android apps encrypt traffic by default appeared first on WeLiveSecurity Sourced from Amer Owaida

Read more
0 comment

5th December 2019

Get Started With UI Design With These Tips To Speed Up Your Workflow

Get Started With UI Design With These Tips To Speed Up Your Workflow Get Started With UI Design With These Tips To Speed Up Your Workflow Tomáš Čakloš 2019-12-04T10:00:00+00:00 2019-12-05T03:36:59+00:00 This article is about creating limits and rules to...

Read more
0 comment

5th December 2019

Sale of 4 Million Stolen Cards Tied to Breaches at 4 Restaurant Chains

On Nov. 23, one of the cybercrime underground’s largest bazaars for buying and selling stolen payment card data announced the immediate availability of some four million freshly-hacked debit and credit cards. KrebsOnSecurity has learned this latest batch of cards...

Read more
0 comment

  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • …
  • 156
  • 157
  • 158
  • 159
  • 160
  • Next

Categories

  • Cyber security
  • Web development

Recent Posts

30 June,2022 Jump Into July (2022 Desktop Wallpapers Edition)
29 June,2022 Smashing Podcast Episode 48 With Stephanie Eckles: Is Sass Still Relevant?
29 June,2022 The Link Between AWM Proxy & the Glupteba Botnet
28 June,2022 Demystifying The New Gatsby Framework
25 June,2022 How To Create A Vanilla JavaScript Gantt Chart: Adding Task Editing Features (Part 2)
Development tools

Main

  • Home
  • Blog
  • Login

Policy

  • Terms and Conditions
  • Copyright Policy

Tools

  • API authentication
  • Web page protection
  • PHP obfuscation
  • Base64 Encode/Decode
  • MD5 Hash generator

Contact us

  • Facebook
  • Twitter
contact@development-tools.net