• Home
  • Tools
    • Api authentication
    • HTML Password protection
    • Python Obfuscation
    • Base64 Encode/Decode
    • MD5 Hash generator
  • Blog
  • Contact us
    • Facebook
    • Twitter
  • Login
Blog
27th October 2019

Tracking down the developer of Android adware affecting millions of users

ESET researchers discovered a year-long adware campaign on Google Play and tracked down its operator. The apps involved, installed eight million times, use several tricks for stealth and persistence. The post Tracking down the developer of Android adware affecting...

Read more
0 comment

26th October 2019

Writing Asynchronous Tasks In Modern JavaScript

Writing Asynchronous Tasks In Modern JavaScript Writing Asynchronous Tasks In Modern JavaScript Jeremias Menichelli 2019-10-25T12:30:59+02:00 2019-10-26T08:36:35+00:00 JavaScript has two main characteristics as a programming language, both important to understand how our code will work. First is its synchronous nature,...

Read more
0 comment

26th October 2019

Your smart doorbell may be collecting more data than you think, study finds

The study tested 81 IoT devices to analyze their behavior and tracking habits, and in some cases brought rather surprising findings The post Your smart doorbell may be collecting more data than you think, study finds appeared first on...

Read more
0 comment

25th October 2019

Create A Bookmarking Application With FaunaDB, Netlify And 11ty

Create A Bookmarking Application With FaunaDB, Netlify And 11ty Create A Bookmarking Application With FaunaDB, Netlify And 11ty Bryan Robinson 2019-10-24T13:30:59+02:00 2019-10-25T04:07:31+00:00 The JAMstack (JavaScript, APIs and Markup) revolution is in full swing. Static sites are secure, fast, reliable...

Read more
0 comment

25th October 2019

Facebook lays out plan to protect elections

How is the social network preparing to curtail the spread of misinformation as the election season heats up? The post Facebook lays out plan to protect elections appeared first on WeLiveSecurity Sourced from Amer Owaida

Read more
0 comment

24th October 2019

Writing A Multiplayer Text Adventure Engine In Node.js: Game Engine Server Design (Part 2)

Writing A Multiplayer Text Adventure Engine In Node.js: Game Engine Server Design (Part 2) Writing A Multiplayer Text Adventure Engine In Node.js: Game Engine Server Design (Part 2) Fernando Doglio 2019-10-23T14:00:59+02:00 2019-10-24T00:09:05+00:00 After some careful consideration and actual implementation...

Read more
0 comment

24th October 2019

Smart cities must be cyber‑smart cities

As cities turn to IoT to address long-standing urban problems, what are the risks of leaving cybersecurity behind at the planning phase? The post Smart cities must be cyber‑smart cities appeared first on WeLiveSecurity Sourced from Andrew Lee

Read more
0 comment

22nd October 2019

A Guide To Optimizing Images For Mobile

A Guide To Optimizing Images For Mobile A Guide To Optimizing Images For Mobile Suzanne Scacca 2019-10-22T12:30:59+02:00 2019-10-22T19:36:35+00:00 (This is a sponsored article.) You know how critical it is to build websites that load quickly. All it takes is...

Read more
0 comment

22nd October 2019

NordVPN reveals breach at datacenter provider

The company says that the incident, going back to March 2018, affected only 1 out of its 3,000 servers The post NordVPN reveals breach at datacenter provider appeared first on WeLiveSecurity Sourced from Amer Owaida

Read more
0 comment

21st October 2019

Great Expectations: Using Story Principles To Anticipate What Your User Expects

Great Expectations: Using Story Principles To Anticipate What Your User Expects Great Expectations: Using Story Principles To Anticipate What Your User Expects John Rhea 2019-10-21T13:30:59+02:00 2019-10-21T15:37:13+00:00 Whether it’s in a novel, the latest box office smash, or when Uncle...

Read more
0 comment

  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • …
  • 156
  • 157
  • 158
  • 159
  • 160
  • Next

Categories

  • Cyber security
  • Web development

Recent Posts

30 June,2022 Jump Into July (2022 Desktop Wallpapers Edition)
29 June,2022 Smashing Podcast Episode 48 With Stephanie Eckles: Is Sass Still Relevant?
29 June,2022 The Link Between AWM Proxy & the Glupteba Botnet
28 June,2022 Demystifying The New Gatsby Framework
25 June,2022 How To Create A Vanilla JavaScript Gantt Chart: Adding Task Editing Features (Part 2)
Development tools

Main

  • Home
  • Blog
  • Login

Policy

  • Terms and Conditions
  • Copyright Policy

Tools

  • API authentication
  • Web page protection
  • PHP obfuscation
  • Base64 Encode/Decode
  • MD5 Hash generator

Contact us

  • Facebook
  • Twitter
contact@development-tools.net