#programming #JavaScript
Huge beautiful #study of JS, its technologies and frameworks:
https://2019.stateofjs.com/
Huge beautiful #study of JS, its technologies and frameworks:
https://2019.stateofjs.com/
Stateofjs
The State of JavaScript 2019
Discover the most popular JavaScript features & technologies of the year.
#security
Big move: Have I Been Pwned, a site with a collection of information on leaks that allows you to receive notification that your information has leaked somewhere, if this happens → it goes from a private Troy Hunt project to open source:
https://www.troyhunt.com/im-open-sourcing-the-have-i-been-pwned-code-base/
Big move: Have I Been Pwned, a site with a collection of information on leaks that allows you to receive notification that your information has leaked somewhere, if this happens → it goes from a private Troy Hunt project to open source:
https://www.troyhunt.com/im-open-sourcing-the-have-i-been-pwned-code-base/
Troy Hunt
I'm Open Sourcing the Have I Been Pwned Code Base
Let me just cut straight to it: I'm going to open source the Have I Been Pwned code base. The decision has been a while coming and it took a failed M&A process to get here, but the code will be turned over to the public for the betterment of the project and…
#Windows #tools
Curious/nice set of utilities, I recommend trying:
https://github.com/microsoft/PowerToys
Curious/nice set of utilities, I recommend trying:
https://github.com/microsoft/PowerToys
GitHub
GitHub - microsoft/PowerToys: Microsoft PowerToys is a collection of utilities that supercharge productivity and customization…
Microsoft PowerToys is a collection of utilities that supercharge productivity and customization on Windows - microsoft/PowerToys
#security #Bluetooth
Seems very critical 🤔
https://www.zdnet.com/article/blurtooth-vulnerability-lets-attackers-overwrite-bluetooth-authentication-keys/
Seems very critical 🤔
https://www.zdnet.com/article/blurtooth-vulnerability-lets-attackers-overwrite-bluetooth-authentication-keys/
ZDNet
BLURtooth vulnerability lets attackers overwrite Bluetooth authentication keys
All devices using the Bluetooth standard 4.0 through 5.0 are vulnerable. Patches not immediately available.