• Home
  • Tools
    • Api authentication
    • HTML Password protection
    • Python Obfuscation
    • Base64 Encode/Decode
    • MD5 Hash generator
  • Blog
  • Contact us
    • Facebook
    • Twitter
  • Login
Blog
8th November 2019

Meet “Inclusive Components”, A New Printed Book By Heydon Pickering

Meet “Inclusive Components”, A New Printed Book By Heydon Pickering Meet “Inclusive Components”, A New Printed Book By Heydon Pickering Vitaly Friedman 2019-11-07T12:30:00+00:00 2019-11-08T05:35:35+00:00 The web is full of interfaces that leave people out. Of course, it’s not designers’...

Read more
0 comment

8th November 2019

How much do data breaches affect stock prices?

A study looks at just how badly the news of a data breach affects the company’s share price, revealing some surprising findings The post How much do data breaches affect stock prices? appeared first on WeLiveSecurity Sourced from Tomáš...

Read more
0 comment

7th November 2019

Writing A Multiplayer Text Adventure Engine In Node.js: Adding Chat Into Our Game (Part 4)

Writing A Multiplayer Text Adventure Engine In Node.js: Adding Chat Into Our Game (Part 4) Writing A Multiplayer Text Adventure Engine In Node.js: Adding Chat Into Our Game (Part 4) Fernando Doglio 2019-11-06T11:00:00+02:00 2019-11-07T01:36:57+00:00 Any platform that allows for...

Read more
0 comment

7th November 2019

Five ways to strengthen employee cybersecurity awareness

How can organizations foster a workplace environment that enables employees to acquire the skills needed to keep cyber-threats at bay? The post Five ways to strengthen employee cybersecurity awareness appeared first on WeLiveSecurity Sourced from Juan Manuel Harán

Read more
0 comment

5th November 2019

Smashing Podcast Episode 2 With Liz Elcoate: What’s So Great About Freelancing?

Smashing Podcast Episode 2 With Liz Elcoate: What’s So Great About Freelancing? Smashing Podcast Episode 2 With Liz Elcoate: What’s So Great About Freelancing? Drew McLellan 2019-11-05T16:00:59+02:00 2019-11-05T21:09:28+00:00 In this episode of the Smashing Podcast we take a look...

Read more
0 comment

5th November 2019

Android keyboard app caught red‑handed trying to make sneaky purchases

The virtual keyboard app ai.type, which has racked up 40 million downloads, has been found to sign up users to premium services without their consent The post Android keyboard app caught red‑handed trying to make sneaky purchases appeared first...

Read more
0 comment

4th November 2019

Creating Online Environments That Work Well For Older Users

Creating Online Environments That Work Well For Older Users Creating Online Environments That Work Well For Older Users Barry Rueger 2019-11-04T13:00:59+02:00 2019-11-04T17:08:40+00:00 With the single exception of my 94-year-old mother, I don’t know a single person over the age...

Read more
0 comment

4th November 2019

Antimalware Day 2019: Building a culture of cybersecurity awareness

The introduction to a series of articles marking this year’s Antimalware Day and highlighting the importance of cyber-readiness The post Antimalware Day 2019: Building a culture of cybersecurity awareness appeared first on WeLiveSecurity Sourced from Tomáš Foltýn

Read more
0 comment

3rd November 2019

Creativity Sparks Shining Through The Fog (November 2019 Wallpapers Edition)

Creativity Sparks Shining Through The Fog (November 2019 Wallpapers Edition) Creativity Sparks Shining Through The Fog (November 2019 Wallpapers Edition) Cosima Mielke 2019-10-31T12:00:00+02:00 2019-11-03T13:07:40+00:00 The fascinating world of aviation, classic movies, sweet childhood memories — these are just some...

Read more
0 comment

3rd November 2019

Breaches at NetworkSolutions, Register.com, and Web.com

Top domain name registrars NetworkSolutions.com, Register.com and Web.com are asking customers to reset their passwords after discovering an intrusion in August 2019 in which customer account information was accessed. A notice to customers at notice.web.com. “On October 16, 2019,...

Read more
0 comment

  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • …
  • 156
  • 157
  • 158
  • 159
  • 160
  • Next

Categories

  • Cyber security
  • Web development

Recent Posts

30 June,2022 Jump Into July (2022 Desktop Wallpapers Edition)
29 June,2022 Smashing Podcast Episode 48 With Stephanie Eckles: Is Sass Still Relevant?
29 June,2022 The Link Between AWM Proxy & the Glupteba Botnet
28 June,2022 Demystifying The New Gatsby Framework
25 June,2022 How To Create A Vanilla JavaScript Gantt Chart: Adding Task Editing Features (Part 2)
Development tools

Main

  • Home
  • Blog
  • Login

Policy

  • Terms and Conditions
  • Copyright Policy

Tools

  • API authentication
  • Web page protection
  • PHP obfuscation
  • Base64 Encode/Decode
  • MD5 Hash generator

Contact us

  • Facebook
  • Twitter
contact@development-tools.net