• Home
  • Tools
    • Api authentication
    • HTML Password protection
    • Python Obfuscation
    • Base64 Encode/Decode
    • MD5 Hash generator
  • Blog
  • Contact us
    • Facebook
    • Twitter
  • Login
Blog
27th January 2019

Designing Emotional Interfaces Of The Future

Designing Emotional Interfaces Of The Future Designing Emotional Interfaces Of The Future Gleb Kuznetsov 2019-01-23T13:00:12+01:00 2019-01-26T14:53:41+00:00 Emotions play a vital role in our decision-making process. One second of emotion can change the whole reality for people engaging with a...

Read more
0 comment

27th January 2019

Former employee blamed for hack of WordPress plugin maker

The plugin’s users are recommended to change their passwords on WPML’s website following havoc reportedly wrought by a disgruntled ex-employee The post Former employee blamed for hack of WordPress plugin maker appeared first on WeLiveSecurity Sourced from Tomáš Foltýn

Read more
0 comment

26th January 2019

How Web Designers Can Contribute To Mobile-First Marketing

How Web Designers Can Contribute To Mobile-First Marketing How Web Designers Can Contribute To Mobile-First Marketing Suzanne Scacca 2019-01-24T22:30:22+01:00 2019-01-25T23:39:59+00:00 I recently wrote about why we should be working on retiring unnecessary design elements instead of adding more stuff...

Read more
0 comment

26th January 2019

Can you spot the phish? Take Google’s test

Everybody loves quizzes. So why not take this one and hone your phish-spotting prowess? The post Can you spot the phish? Take Google’s test appeared first on WeLiveSecurity Sourced from Tomáš Foltýn

Read more
0 comment

24th January 2019

Table Design Patterns On The Web

Table Design Patterns On The Web Table Design Patterns On The Web Huijing Chen 2019-01-24T13:30:57+01:00 2019-01-24T13:55:24+00:00 Tables are a design pattern for displaying large amounts of data in rows and columns, making them efficient for doing comparative analysis on...

Read more
0 comment

24th January 2019

Cybersecurity Barometer: Cybercrime’s impact on privacy and security

Study shows the majority of Americans fear the misuse of their personal data supplied to websites, and view cybercrime as a threat to their country The post Cybersecurity Barometer: Cybercrime’s impact on privacy and security appeared first on WeLiveSecurity...

Read more
0 comment

23rd January 2019

The Smashing Survey: Join In!

The Smashing Survey: Join In! The Smashing Survey: Join In! Rachel Andrew 2019-01-22T13:00:09+01:00 2019-01-23T08:08:17+00:00 Our entire aim here at Smashing Magazine — and my focus as Editor-in-Chief — is to provide the most helpful and interesting content and resources...

Read more
0 comment

23rd January 2019

Google fined €50 million for violating EU data privacy rules

France’s data protection watchdog issues the first major penalty under the EU’s new privacy regime The post Google fined €50 million for violating EU data privacy rules appeared first on WeLiveSecurity Sourced from Tomáš Foltýn

Read more
0 comment

22nd January 2019

Introducing The Component-Based API

Introducing The Component-Based API Introducing The Component-Based API Leonardo Losoviz 2019-01-21T13:00:21+01:00 2019-01-21T18:50:44+00:00 An API is the communication channel for an application to load data from the server. In the world of APIs, REST has been the more established methodology,...

Read more
0 comment

22nd January 2019

Twitter bug may have exposed private tweets of Android users for years

If you use Twitter for Android and want your tweets to be private, you may want to play safe and review your settings The post Twitter bug may have exposed private tweets of Android users for years appeared first...

Read more
0 comment

  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • Next

Categories

  • Cyber security
  • Web development

Recent Posts

30 June,2022 Jump Into July (2022 Desktop Wallpapers Edition)
29 June,2022 Smashing Podcast Episode 48 With Stephanie Eckles: Is Sass Still Relevant?
29 June,2022 The Link Between AWM Proxy & the Glupteba Botnet
28 June,2022 Demystifying The New Gatsby Framework
25 June,2022 How To Create A Vanilla JavaScript Gantt Chart: Adding Task Editing Features (Part 2)
Development tools

Main

  • Home
  • Blog
  • Login

Policy

  • Terms and Conditions
  • Copyright Policy

Tools

  • API authentication
  • Web page protection
  • PHP obfuscation
  • Base64 Encode/Decode
  • MD5 Hash generator

Contact us

  • Facebook
  • Twitter
contact@development-tools.net