• Home
  • Tools
    • Api authentication
    • HTML Password protection
    • Python Obfuscation
    • Base64 Encode/Decode
    • MD5 Hash generator
  • Blog
  • Contact us
    • Facebook
    • Twitter
  • Login
Blog
26th June 2020

Inspired Design Decisions With Giovanni Pintori: Publicity Becomes An Art Form

Inspired Design Decisions With Giovanni Pintori: Publicity Becomes An Art Form Inspired Design Decisions With Giovanni Pintori: Publicity Becomes An Art Form Andrew Clarke 2020-06-26T14:00:00+00:00 2020-06-26T17:33:52+00:00 With one or two occasional exceptions, I’ve spent the past twenty-two years designing...

Read more
0 comment

26th June 2020

Facial recognition technology banned in another US city

In a move lauded by privacy advocates, Boston joins the ranks of cities that have voted down the municipal use of the technology The post Facial recognition technology banned in another US city appeared first on WeLiveSecurity Sourced from...

Read more
0 comment

25th June 2020

Django Highlights: Wrangling Static Assets And Media Files (Part 4)

Django Highlights: Wrangling Static Assets And Media Files (Part 4) Django Highlights: Wrangling Static Assets And Media Files (Part 4) Philip Kiely 2020-06-25T12:30:00+00:00 2020-06-25T13:36:36+00:00 Django websites involve a lot of files. It’s not just source code for the configuration,...

Read more
0 comment

25th June 2020

Majority of new remote employees use their personal laptops for work

And many of them didn’t receive any new security training or tools from their employer to properly secure the devices, a study finds The post Majority of new remote employees use their personal laptops for work appeared first on...

Read more
0 comment

24th June 2020

How Web Designers Can Help Restaurants Move Into Digital Experiences

How Web Designers Can Help Restaurants Move Into Digital Experiences How Web Designers Can Help Restaurants Move Into Digital Experiences Suzanne Scacca 2020-06-23T12:00:00+00:00 2020-06-24T09:34:49+00:00 As much as I’ve always loved the experience of going out to eat and ordering...

Read more
0 comment

24th June 2020

New ransomware posing as COVID‑19 tracing app targets Canada; ESET offers decryptor

ESET researchers dissect an Android app that masquerades as an official COVID-19 contact-tracing app and encrypts files on the victim’s device The post New ransomware posing as COVID‑19 tracing app targets Canada; ESET offers decryptor appeared first on WeLiveSecurity...

Read more
0 comment

23rd June 2020

An Introduction To SWR: React Hooks For Remote Data Fetching

An Introduction To SWR: React Hooks For Remote Data Fetching An Introduction To SWR: React Hooks For Remote Data Fetching Ibrahima Ndaw 2020-06-22T12:00:00+00:00 2020-06-23T05:33:41+00:00 SWR is a lightweight library created by Vercel (formerly ZEIT) that allows fetching, caching, or...

Read more
0 comment

23rd June 2020

Scam uses Elon Musk’s name to trick people out of US$2 million in bitcoin

The giveaway scheme uses the tech titan’s name as part of Bitcoin addresses for extra credibility The post Scam uses Elon Musk’s name to trick people out of US$2 million in bitcoin appeared first on WeLiveSecurity Sourced from Amer...

Read more
0 comment

22nd June 2020

Mirage JS Deep Dive: Using Mirage JS And Cypress For UI Testing (Part 4)

Mirage JS Deep Dive: Using Mirage JS And Cypress For UI Testing (Part 4) Mirage JS Deep Dive: Using Mirage JS And Cypress For UI Testing (Part 4) Kelvin Omereshone 2020-06-17T10:30:00+00:00 2020-06-22T01:04:39+00:00 One of my favorite quotes about software...

Read more
0 comment

22nd June 2020

Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies

ESET researchers uncover targeted attacks against high-profile aerospace and military companies The post Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies appeared first on WeLiveSecurity Sourced from Dominik Breitenbacher

Read more
0 comment

  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • …
  • 90
  • 91
  • 92
  • 93
  • 94
  • Next

Categories

  • Cyber security
  • Web development

Recent Posts

27 February,2021 Building User Trust In UX Design
27 February,2021 Championing worthy causes: How ESET gives a helping hand
25 February,2021 Building A Discord Bot Using Discord.js
25 February,2021 Google’s Password Checkup tool rolling out to Android devices
24 February,2021 Material Design Text Fields Are Badly Designed
Development tools

Main

  • Home
  • Blog
  • Login

Policy

  • Terms and Conditions
  • Copyright Policy

Tools

  • API authentication
  • Web page protection
  • PHP obfuscation
  • Base64 Encode/Decode
  • MD5 Hash generator

Contact us

  • Facebook
  • Twitter
contact@development-tools.net