Creates a Skeleton Loading on a web element that is an embed from another web page
https://dev.to/murtuzaalisurti/skeleton-loading-for-social-media-embeds-using-css-and-javascript-4njb
---
#embed #skeleton #social
https://dev.to/murtuzaalisurti/skeleton-loading-for-social-media-embeds-using-css-and-javascript-4njb
---
#embed #skeleton #social
Create a Countdown Timer application with Javascript HTML and CSS
https://youtu.be/PIiMSMz7KzM
#Countdown #Timer #Javascript
https://youtu.be/PIiMSMz7KzM
#Countdown #Timer #Javascript
Theatre.js is an animation library for high-fidelity motion graphics.
https://www.theatrejs.com/
#animation #theatrejs
https://www.theatrejs.com/
#animation #theatrejs
🔰JavaScript Course.🔰
🔺The Complete Guide Everything you need to know about Promises in JavaScript.
Link 🔗:
https://telegra.ph/JavaScript-Course-10-02
#Javascript #Course
🔺The Complete Guide Everything you need to know about Promises in JavaScript.
Link 🔗:
https://telegra.ph/JavaScript-Course-10-02
#Javascript #Course
Using Dynamo Db as database on MERN Stack
https://creativedesignsguru.com/dern-stack-alternative-mern/
#mern #dynamodb
https://creativedesignsguru.com/dern-stack-alternative-mern/
#mern #dynamodb
Forwarded from Learn Web Development
Javascript Weekly 07
• News A 'Self-Parking Car' in 500 Lines of Code
• News Bangle.js 2: The Open JavaScript Powered Smart Watch
• News ⭐️ Professional JavaScript Learning Path
• News JSXGraph: Dynamic Mathematics Rendering with JS
• News 7GUIs in JavaScript
• News Let’s Dive Into Cypress For End-to-End Testing
• News My Top Vue.js Interview Questions
• News Sorting JavaScript Arrays by Nested Properties
• News How To Build an Interactive Dashboard
• News Comparing Methods for Appending and Inserting with JavaScript
• News Three New Next.js Features and How to Use Them
• News Faster React Apps with Memoization
• News Explore JavaScript Dependencies with Lighthouse Treemap
• News All-Star Lineup Announced for Cloud Engineering Summit - Save Your Seat
• News Single Page Application vs Multi Page Application with Rich Harris
• News PptxGenJS: Create PowerPoint Presentations with JavaScript
• News melonJS 9.1.0: A Lightweight JavaScript and HTML5 Game Engine
• News Threads.js 1.7: Web Workers Meet Worker Threads
• News Deliver Cleaner and Safer JavaScript Code - Right in Your IDE
• News DOCX 7.1: A Declarative API to Generate .docx Files
• News construct-js: A Library for Creating Byte Level Data Structures
• News RacketScript: An Experimental Racket to JS Compiler
Tags: #Javascriptweekly #Javascript #JS #weekly
• News A 'Self-Parking Car' in 500 Lines of Code
• News Bangle.js 2: The Open JavaScript Powered Smart Watch
• News ⭐️ Professional JavaScript Learning Path
• News JSXGraph: Dynamic Mathematics Rendering with JS
• News 7GUIs in JavaScript
• News Let’s Dive Into Cypress For End-to-End Testing
• News My Top Vue.js Interview Questions
• News Sorting JavaScript Arrays by Nested Properties
• News How To Build an Interactive Dashboard
• News Comparing Methods for Appending and Inserting with JavaScript
• News Three New Next.js Features and How to Use Them
• News Faster React Apps with Memoization
• News Explore JavaScript Dependencies with Lighthouse Treemap
• News All-Star Lineup Announced for Cloud Engineering Summit - Save Your Seat
• News Single Page Application vs Multi Page Application with Rich Harris
• News PptxGenJS: Create PowerPoint Presentations with JavaScript
• News melonJS 9.1.0: A Lightweight JavaScript and HTML5 Game Engine
• News Threads.js 1.7: Web Workers Meet Worker Threads
• News Deliver Cleaner and Safer JavaScript Code - Right in Your IDE
• News DOCX 7.1: A Declarative API to Generate .docx Files
• News construct-js: A Library for Creating Byte Level Data Structures
• News RacketScript: An Experimental Racket to JS Compiler
Tags: #Javascriptweekly #Javascript #JS #weekly
Forwarded from Cyber Punk™
How to DELETE 99.9% of your digital footprint from the internet
Step 1: Preliminary Requirements
Go through each email you can think of that you've used in the past 10 years.
You'll want to recover them if you've lost access, so that you can access other websites you may have signed up to using them.
Step 2: Deleting old accounts from forgotten services
Use the search function on your e-mail and look for phrases such as "Sign up" or "Welcome"
Recover account and login into each service that pops up (that you received a sign-up email) from.
Now look around the service for a delete account function, google around by searching ``"delete account" + "<service>"
If there isn't one, google or look around for a support e-mail to request for them to delete your account.
For some services, you may want to purge all content and messages before you delete the account, as the account may be archived and a hacker or external entity may access this information at a later date.
That's something to bare in mind.
Step 3: Checking if your information has been compromised already.
Now you should have a list of all your usernames and all the services, ranging from streaming services to e-mails.
You need to use something called boolean searches to properly use Google to locate this info
I'll be using ``s to denote normal quotations, as you will need to use the normal "" signs to perform these searches.
You need to google your account name
"<account_name>"
Sometimes maybe your account name + password like so:
"<account>" + "<password>"
You should see possibly pastebin links or underground databases publicly accessible on the internet, or possibly leaked private information.
This is normal. It happens to a lot of services.
Note down what passwords/information was comprimised.
Step 3d: Some database leaks are a bit more private and are still being shared/sold in private circles, but you can use this website:
haveibeenpwned.com/
To check if you've been compromised, so you can change your live information to be different.
Step 4: Removing yourself from Google.
So now you've deleted your Facebook accounts, but when you google your name and location using boolean searches, there is cached information/links about yourself.
There is a solution for that, called the Google Console.
Step 4b: You can use Google Console at:
https://search.google.com/search-console/remove-outdated-content?utm_source=wmx&utm_medium=deprecation-pane&utm_content=removals
You can request for them to delete/update their search engine (which usually takes months organically) to remove those cached results if you provide a link to each.
Go through various google searches and do this
Step 5: Protecting yourself against Google legally tracking you (for the most part).
You should be disallowing Google to legally touch any of your data
Here you can go through each of Google's services:
https://myactivity.google.com/activitycontrols
Protecting yourself against other services
Any other services you wish to use, you need to strip down the privacy settings to the absolute core.
If you want to use Facebook, make sure you make it almost entirely private, so people can't access private photos.
Step 6: Deleting old e-mails
Now you've just access to your old e-mails, it's time to delete them too.
Delete any e-mails you no longer need access to
DO NOT DELETE E-MAILS YOU MAY NEED IN THE FUTURE.
If you do need them, change security questions and password.
Step 7: Securing accounts
You should be REGULARLY changing your passwords on services every 6 months
Why?
Because new hackers gain access to new databases daily, and they'll start using that information to bruce force, or in the future, to personally attack you.
Do NOT use any passwords similar to each other.
Hackers are smart. Especially when it's a personal attack.
They will easily combine your old passwords with your home address, or date of birth to accomplish finding your password to something they need.
Step 1: Preliminary Requirements
Go through each email you can think of that you've used in the past 10 years.
You'll want to recover them if you've lost access, so that you can access other websites you may have signed up to using them.
Step 2: Deleting old accounts from forgotten services
Use the search function on your e-mail and look for phrases such as "Sign up" or "Welcome"
Recover account and login into each service that pops up (that you received a sign-up email) from.
Now look around the service for a delete account function, google around by searching ``"delete account" + "<service>"
If there isn't one, google or look around for a support e-mail to request for them to delete your account.
For some services, you may want to purge all content and messages before you delete the account, as the account may be archived and a hacker or external entity may access this information at a later date.
That's something to bare in mind.
Step 3: Checking if your information has been compromised already.
Now you should have a list of all your usernames and all the services, ranging from streaming services to e-mails.
You need to use something called boolean searches to properly use Google to locate this info
I'll be using ``s to denote normal quotations, as you will need to use the normal "" signs to perform these searches.
You need to google your account name
"<account_name>"
Sometimes maybe your account name + password like so:
"<account>" + "<password>"
You should see possibly pastebin links or underground databases publicly accessible on the internet, or possibly leaked private information.
This is normal. It happens to a lot of services.
Note down what passwords/information was comprimised.
Step 3d: Some database leaks are a bit more private and are still being shared/sold in private circles, but you can use this website:
haveibeenpwned.com/
To check if you've been compromised, so you can change your live information to be different.
Step 4: Removing yourself from Google.
So now you've deleted your Facebook accounts, but when you google your name and location using boolean searches, there is cached information/links about yourself.
There is a solution for that, called the Google Console.
Step 4b: You can use Google Console at:
https://search.google.com/search-console/remove-outdated-content?utm_source=wmx&utm_medium=deprecation-pane&utm_content=removals
You can request for them to delete/update their search engine (which usually takes months organically) to remove those cached results if you provide a link to each.
Go through various google searches and do this
Step 5: Protecting yourself against Google legally tracking you (for the most part).
You should be disallowing Google to legally touch any of your data
Here you can go through each of Google's services:
https://myactivity.google.com/activitycontrols
Protecting yourself against other services
Any other services you wish to use, you need to strip down the privacy settings to the absolute core.
If you want to use Facebook, make sure you make it almost entirely private, so people can't access private photos.
Step 6: Deleting old e-mails
Now you've just access to your old e-mails, it's time to delete them too.
Delete any e-mails you no longer need access to
DO NOT DELETE E-MAILS YOU MAY NEED IN THE FUTURE.
If you do need them, change security questions and password.
Step 7: Securing accounts
You should be REGULARLY changing your passwords on services every 6 months
Why?
Because new hackers gain access to new databases daily, and they'll start using that information to bruce force, or in the future, to personally attack you.
Do NOT use any passwords similar to each other.
Hackers are smart. Especially when it's a personal attack.
They will easily combine your old passwords with your home address, or date of birth to accomplish finding your password to something they need.
Forwarded from Cyber Punk™
Once they are in, some services will give them access to EVERYTHING and it's damn near impossible to get them out after they are in.
Good news is a lot of services are updating this, so that you can only have one session active at once.
Before you never knew who was in.
Step 8: PROTECTING your internet connection.
You should be using a VPN when using the internet.
DO NOT use a VPN when dealing with banking services or anything confidential, but do use it when publicly surfing the internet.
Using DuckDuckGo in combination with this will help
Using a VPN that has no logs.
You need to make sure your VPN has had a PUBLIC audit to ensure that it has NO LOGS.
this means that it has no record of what you have used their internet connection for.
And when you use a VPN, it's hard for your ISP to know either.
Step 9: USING Burner accounts
You should be using burner accounts on known intrusive services such as Google by using a fake name and information.
This is LEGAL and you should do it to avoid having your information data mined across services.
Step 10: REGULARLY deleting your internet content.
You should be regularly deleting your tweets and old photos.
This data can be used against you to cross-reference your accounts and find more personal information.
Hackers will find a target and analyze them for months.
Hackers will use your old internet information to do some of this analyzing in retrospect to piece together who your social circle is to find a vulnerability.
Anyone can be attacked. You just haven't been a target yet.
Defend yourself through prevention.
Don't believe me?
https://www.theverge.com/platform/amp/2019/10/11/20910551/stalker-attacked-pop-idol-reflection-pupils-selfies-videos-photos-google-street-view-japan?__twitter_impression=true
This is nothing. Very simple with the tools EVERYONE has access to today.
Good news is a lot of services are updating this, so that you can only have one session active at once.
Before you never knew who was in.
Step 8: PROTECTING your internet connection.
You should be using a VPN when using the internet.
DO NOT use a VPN when dealing with banking services or anything confidential, but do use it when publicly surfing the internet.
Using DuckDuckGo in combination with this will help
Using a VPN that has no logs.
You need to make sure your VPN has had a PUBLIC audit to ensure that it has NO LOGS.
this means that it has no record of what you have used their internet connection for.
And when you use a VPN, it's hard for your ISP to know either.
Step 9: USING Burner accounts
You should be using burner accounts on known intrusive services such as Google by using a fake name and information.
This is LEGAL and you should do it to avoid having your information data mined across services.
Step 10: REGULARLY deleting your internet content.
You should be regularly deleting your tweets and old photos.
This data can be used against you to cross-reference your accounts and find more personal information.
Hackers will find a target and analyze them for months.
Hackers will use your old internet information to do some of this analyzing in retrospect to piece together who your social circle is to find a vulnerability.
Anyone can be attacked. You just haven't been a target yet.
Defend yourself through prevention.
Don't believe me?
https://www.theverge.com/platform/amp/2019/10/11/20910551/stalker-attacked-pop-idol-reflection-pupils-selfies-videos-photos-google-street-view-japan?__twitter_impression=true
This is nothing. Very simple with the tools EVERYONE has access to today.
Implemented type safety on Prism ORM and GraphQL, which will be used as API in Next JS
https://blog.logrocket.com/end-to-end-type-safety-nextjs-prisma-graphql/
---
How to implement Debounce and Throttle in React JS
https://blog.logrocket.com/how-and-when-to-debounce-or-throttle-in-react/
---
How to make Progressive Web Apps mode in Next JS application
https://dev.to/byteslash/how-to-create-a-pwa-with-next-js-4dbm
---
#react #nextjs #debounce #graphql #prisma
https://blog.logrocket.com/end-to-end-type-safety-nextjs-prisma-graphql/
---
How to implement Debounce and Throttle in React JS
https://blog.logrocket.com/how-and-when-to-debounce-or-throttle-in-react/
---
How to make Progressive Web Apps mode in Next JS application
https://dev.to/byteslash/how-to-create-a-pwa-with-next-js-4dbm
---
#react #nextjs #debounce #graphql #prisma
An update to the VS Code/Codium text editor is available with the following release notes.
- Split editors within the same group
- Locked editor groups
- Better display of deleted and readonly files
- Bracket pair guides
- Fixed terminal dimensions
- Jupiter Notebook improvements
- Platform-specific extensions
- Virtual Workspaces extension guide
- Advanced container configuration
Full details can be seen in the following changelog
https://code.visualstudio.com/updates/v1_61
#vscode #release
- Split editors within the same group
- Locked editor groups
- Better display of deleted and readonly files
- Bracket pair guides
- Fixed terminal dimensions
- Jupiter Notebook improvements
- Platform-specific extensions
- Virtual Workspaces extension guide
- Advanced container configuration
Full details can be seen in the following changelog
https://code.visualstudio.com/updates/v1_61
#vscode #release
Sending email from Node JS using Nodemailer
https://javascript.plainenglish.io/send-emails-with-node-js-a-how-to-guide-820f62c14932
—-
How to deploy Node JS application to Heroku hosting service
https://yflooi.medium.com/host-a-node-js-api-on-heroku-94ba62f685dc
—-
#nodejs #nodemailer #heroku
https://javascript.plainenglish.io/send-emails-with-node-js-a-how-to-guide-820f62c14932
—-
How to deploy Node JS application to Heroku hosting service
https://yflooi.medium.com/host-a-node-js-api-on-heroku-94ba62f685dc
—-
#nodejs #nodemailer #heroku
Introduction to Streams API in Node JS and JavaScript for reading and writing data
https://css-tricks.com/web-streams-everywhere-and-fetch-for-node-js/
#nodejs #streams
https://css-tricks.com/web-streams-everywhere-and-fetch-for-node-js/
#nodejs #streams
Create a file upload function and resume feature using Node JS
https://medium.com/before-semicolon/how-to-create-a-resumable-multifile-uploader-with-javascript-b077cece11c7
—-
Reference some JavaScript and Node JS based projects
https://javascript.plainenglish.io/14-top-node-js-open-source-projects-%EF%B8%8F-413a807da2d2
—-
Some mistakes to avoid for Node JS based app developers
https://javascript.plainenglish.io/9-common-mistakes-nodejs-developers-make-87e9672a2e18
—-
Tips for securing Node JS backend from CSRF vulnerability attacks
https://levelup.gitconnected.com/prevent-csrf-attacks-in-node-js-application-d71df3704944
#nodejs #upload #resume #multifile #security #csrf
https://medium.com/before-semicolon/how-to-create-a-resumable-multifile-uploader-with-javascript-b077cece11c7
—-
Reference some JavaScript and Node JS based projects
https://javascript.plainenglish.io/14-top-node-js-open-source-projects-%EF%B8%8F-413a807da2d2
—-
Some mistakes to avoid for Node JS based app developers
https://javascript.plainenglish.io/9-common-mistakes-nodejs-developers-make-87e9672a2e18
—-
Tips for securing Node JS backend from CSRF vulnerability attacks
https://levelup.gitconnected.com/prevent-csrf-attacks-in-node-js-application-d71df3704944
#nodejs #upload #resume #multifile #security #csrf
Introduction of new techniques for HTML DOM manipulation with JavaScript, using the Sanitizer API
https://web.dev/sanitizer/
#dom #sanitizer
https://web.dev/sanitizer/
#dom #sanitizer
Reference some JavaScript-based chat libraries
https://hackernoon.com/5-best-javascript-chat-libraries
---
Know what the Babel JS library is
https://dev.to/alexeagleson/building-a-modern-web-stack-babel-3hfp
---
Get to know the bind and map methods that are often encountered in JavaScript data manipulation
https://javascript.plainenglish.io/javascript-map-and-bind-methods-to-the-rescue-696c37d428b4
---
#library #chat #bind #map #babel
https://hackernoon.com/5-best-javascript-chat-libraries
---
Know what the Babel JS library is
https://dev.to/alexeagleson/building-a-modern-web-stack-babel-3hfp
---
Get to know the bind and map methods that are often encountered in JavaScript data manipulation
https://javascript.plainenglish.io/javascript-map-and-bind-methods-to-the-rescue-696c37d428b4
---
#library #chat #bind #map #babel
HTMLCSSJSCombined.pdf
8.9 MB
Hi everyone 👋
Check the pdf notes for 👆
💢 Html
💢 CSS and
💢 js
Check the pdf notes for 👆
💢 Html
💢 CSS and
💢 js
frontend.png
748.6 KB
Check the pic for 👆
💢Frontend roadmap
💢Frontend roadmap