Forwarded from Learn Web Development
Javascript Weekly 07
• News A 'Self-Parking Car' in 500 Lines of Code
• News Bangle.js 2: The Open JavaScript Powered Smart Watch
• News ⭐️ Professional JavaScript Learning Path
• News JSXGraph: Dynamic Mathematics Rendering with JS
• News 7GUIs in JavaScript
• News Let’s Dive Into Cypress For End-to-End Testing
• News My Top Vue.js Interview Questions
• News Sorting JavaScript Arrays by Nested Properties
• News How To Build an Interactive Dashboard
• News Comparing Methods for Appending and Inserting with JavaScript
• News Three New Next.js Features and How to Use Them
• News Faster React Apps with Memoization
• News Explore JavaScript Dependencies with Lighthouse Treemap
• News All-Star Lineup Announced for Cloud Engineering Summit - Save Your Seat
• News Single Page Application vs Multi Page Application with Rich Harris
• News PptxGenJS: Create PowerPoint Presentations with JavaScript
• News melonJS 9.1.0: A Lightweight JavaScript and HTML5 Game Engine
• News Threads.js 1.7: Web Workers Meet Worker Threads
• News Deliver Cleaner and Safer JavaScript Code - Right in Your IDE
• News DOCX 7.1: A Declarative API to Generate .docx Files
• News construct-js: A Library for Creating Byte Level Data Structures
• News RacketScript: An Experimental Racket to JS Compiler
Tags: #Javascriptweekly #Javascript #JS #weekly
• News A 'Self-Parking Car' in 500 Lines of Code
• News Bangle.js 2: The Open JavaScript Powered Smart Watch
• News ⭐️ Professional JavaScript Learning Path
• News JSXGraph: Dynamic Mathematics Rendering with JS
• News 7GUIs in JavaScript
• News Let’s Dive Into Cypress For End-to-End Testing
• News My Top Vue.js Interview Questions
• News Sorting JavaScript Arrays by Nested Properties
• News How To Build an Interactive Dashboard
• News Comparing Methods for Appending and Inserting with JavaScript
• News Three New Next.js Features and How to Use Them
• News Faster React Apps with Memoization
• News Explore JavaScript Dependencies with Lighthouse Treemap
• News All-Star Lineup Announced for Cloud Engineering Summit - Save Your Seat
• News Single Page Application vs Multi Page Application with Rich Harris
• News PptxGenJS: Create PowerPoint Presentations with JavaScript
• News melonJS 9.1.0: A Lightweight JavaScript and HTML5 Game Engine
• News Threads.js 1.7: Web Workers Meet Worker Threads
• News Deliver Cleaner and Safer JavaScript Code - Right in Your IDE
• News DOCX 7.1: A Declarative API to Generate .docx Files
• News construct-js: A Library for Creating Byte Level Data Structures
• News RacketScript: An Experimental Racket to JS Compiler
Tags: #Javascriptweekly #Javascript #JS #weekly
Forwarded from Cyber Punk™
How to DELETE 99.9% of your digital footprint from the internet
Step 1: Preliminary Requirements
Go through each email you can think of that you've used in the past 10 years.
You'll want to recover them if you've lost access, so that you can access other websites you may have signed up to using them.
Step 2: Deleting old accounts from forgotten services
Use the search function on your e-mail and look for phrases such as "Sign up" or "Welcome"
Recover account and login into each service that pops up (that you received a sign-up email) from.
Now look around the service for a delete account function, google around by searching ``"delete account" + "<service>"
If there isn't one, google or look around for a support e-mail to request for them to delete your account.
For some services, you may want to purge all content and messages before you delete the account, as the account may be archived and a hacker or external entity may access this information at a later date.
That's something to bare in mind.
Step 3: Checking if your information has been compromised already.
Now you should have a list of all your usernames and all the services, ranging from streaming services to e-mails.
You need to use something called boolean searches to properly use Google to locate this info
I'll be using ``s to denote normal quotations, as you will need to use the normal "" signs to perform these searches.
You need to google your account name
"<account_name>"
Sometimes maybe your account name + password like so:
"<account>" + "<password>"
You should see possibly pastebin links or underground databases publicly accessible on the internet, or possibly leaked private information.
This is normal. It happens to a lot of services.
Note down what passwords/information was comprimised.
Step 3d: Some database leaks are a bit more private and are still being shared/sold in private circles, but you can use this website:
haveibeenpwned.com/
To check if you've been compromised, so you can change your live information to be different.
Step 4: Removing yourself from Google.
So now you've deleted your Facebook accounts, but when you google your name and location using boolean searches, there is cached information/links about yourself.
There is a solution for that, called the Google Console.
Step 4b: You can use Google Console at:
https://search.google.com/search-console/remove-outdated-content?utm_source=wmx&utm_medium=deprecation-pane&utm_content=removals
You can request for them to delete/update their search engine (which usually takes months organically) to remove those cached results if you provide a link to each.
Go through various google searches and do this
Step 5: Protecting yourself against Google legally tracking you (for the most part).
You should be disallowing Google to legally touch any of your data
Here you can go through each of Google's services:
https://myactivity.google.com/activitycontrols
Protecting yourself against other services
Any other services you wish to use, you need to strip down the privacy settings to the absolute core.
If you want to use Facebook, make sure you make it almost entirely private, so people can't access private photos.
Step 6: Deleting old e-mails
Now you've just access to your old e-mails, it's time to delete them too.
Delete any e-mails you no longer need access to
DO NOT DELETE E-MAILS YOU MAY NEED IN THE FUTURE.
If you do need them, change security questions and password.
Step 7: Securing accounts
You should be REGULARLY changing your passwords on services every 6 months
Why?
Because new hackers gain access to new databases daily, and they'll start using that information to bruce force, or in the future, to personally attack you.
Do NOT use any passwords similar to each other.
Hackers are smart. Especially when it's a personal attack.
They will easily combine your old passwords with your home address, or date of birth to accomplish finding your password to something they need.
Step 1: Preliminary Requirements
Go through each email you can think of that you've used in the past 10 years.
You'll want to recover them if you've lost access, so that you can access other websites you may have signed up to using them.
Step 2: Deleting old accounts from forgotten services
Use the search function on your e-mail and look for phrases such as "Sign up" or "Welcome"
Recover account and login into each service that pops up (that you received a sign-up email) from.
Now look around the service for a delete account function, google around by searching ``"delete account" + "<service>"
If there isn't one, google or look around for a support e-mail to request for them to delete your account.
For some services, you may want to purge all content and messages before you delete the account, as the account may be archived and a hacker or external entity may access this information at a later date.
That's something to bare in mind.
Step 3: Checking if your information has been compromised already.
Now you should have a list of all your usernames and all the services, ranging from streaming services to e-mails.
You need to use something called boolean searches to properly use Google to locate this info
I'll be using ``s to denote normal quotations, as you will need to use the normal "" signs to perform these searches.
You need to google your account name
"<account_name>"
Sometimes maybe your account name + password like so:
"<account>" + "<password>"
You should see possibly pastebin links or underground databases publicly accessible on the internet, or possibly leaked private information.
This is normal. It happens to a lot of services.
Note down what passwords/information was comprimised.
Step 3d: Some database leaks are a bit more private and are still being shared/sold in private circles, but you can use this website:
haveibeenpwned.com/
To check if you've been compromised, so you can change your live information to be different.
Step 4: Removing yourself from Google.
So now you've deleted your Facebook accounts, but when you google your name and location using boolean searches, there is cached information/links about yourself.
There is a solution for that, called the Google Console.
Step 4b: You can use Google Console at:
https://search.google.com/search-console/remove-outdated-content?utm_source=wmx&utm_medium=deprecation-pane&utm_content=removals
You can request for them to delete/update their search engine (which usually takes months organically) to remove those cached results if you provide a link to each.
Go through various google searches and do this
Step 5: Protecting yourself against Google legally tracking you (for the most part).
You should be disallowing Google to legally touch any of your data
Here you can go through each of Google's services:
https://myactivity.google.com/activitycontrols
Protecting yourself against other services
Any other services you wish to use, you need to strip down the privacy settings to the absolute core.
If you want to use Facebook, make sure you make it almost entirely private, so people can't access private photos.
Step 6: Deleting old e-mails
Now you've just access to your old e-mails, it's time to delete them too.
Delete any e-mails you no longer need access to
DO NOT DELETE E-MAILS YOU MAY NEED IN THE FUTURE.
If you do need them, change security questions and password.
Step 7: Securing accounts
You should be REGULARLY changing your passwords on services every 6 months
Why?
Because new hackers gain access to new databases daily, and they'll start using that information to bruce force, or in the future, to personally attack you.
Do NOT use any passwords similar to each other.
Hackers are smart. Especially when it's a personal attack.
They will easily combine your old passwords with your home address, or date of birth to accomplish finding your password to something they need.
Forwarded from Cyber Punk™
Once they are in, some services will give them access to EVERYTHING and it's damn near impossible to get them out after they are in.
Good news is a lot of services are updating this, so that you can only have one session active at once.
Before you never knew who was in.
Step 8: PROTECTING your internet connection.
You should be using a VPN when using the internet.
DO NOT use a VPN when dealing with banking services or anything confidential, but do use it when publicly surfing the internet.
Using DuckDuckGo in combination with this will help
Using a VPN that has no logs.
You need to make sure your VPN has had a PUBLIC audit to ensure that it has NO LOGS.
this means that it has no record of what you have used their internet connection for.
And when you use a VPN, it's hard for your ISP to know either.
Step 9: USING Burner accounts
You should be using burner accounts on known intrusive services such as Google by using a fake name and information.
This is LEGAL and you should do it to avoid having your information data mined across services.
Step 10: REGULARLY deleting your internet content.
You should be regularly deleting your tweets and old photos.
This data can be used against you to cross-reference your accounts and find more personal information.
Hackers will find a target and analyze them for months.
Hackers will use your old internet information to do some of this analyzing in retrospect to piece together who your social circle is to find a vulnerability.
Anyone can be attacked. You just haven't been a target yet.
Defend yourself through prevention.
Don't believe me?
https://www.theverge.com/platform/amp/2019/10/11/20910551/stalker-attacked-pop-idol-reflection-pupils-selfies-videos-photos-google-street-view-japan?__twitter_impression=true
This is nothing. Very simple with the tools EVERYONE has access to today.
Good news is a lot of services are updating this, so that you can only have one session active at once.
Before you never knew who was in.
Step 8: PROTECTING your internet connection.
You should be using a VPN when using the internet.
DO NOT use a VPN when dealing with banking services or anything confidential, but do use it when publicly surfing the internet.
Using DuckDuckGo in combination with this will help
Using a VPN that has no logs.
You need to make sure your VPN has had a PUBLIC audit to ensure that it has NO LOGS.
this means that it has no record of what you have used their internet connection for.
And when you use a VPN, it's hard for your ISP to know either.
Step 9: USING Burner accounts
You should be using burner accounts on known intrusive services such as Google by using a fake name and information.
This is LEGAL and you should do it to avoid having your information data mined across services.
Step 10: REGULARLY deleting your internet content.
You should be regularly deleting your tweets and old photos.
This data can be used against you to cross-reference your accounts and find more personal information.
Hackers will find a target and analyze them for months.
Hackers will use your old internet information to do some of this analyzing in retrospect to piece together who your social circle is to find a vulnerability.
Anyone can be attacked. You just haven't been a target yet.
Defend yourself through prevention.
Don't believe me?
https://www.theverge.com/platform/amp/2019/10/11/20910551/stalker-attacked-pop-idol-reflection-pupils-selfies-videos-photos-google-street-view-japan?__twitter_impression=true
This is nothing. Very simple with the tools EVERYONE has access to today.
Implemented type safety on Prism ORM and GraphQL, which will be used as API in Next JS
https://blog.logrocket.com/end-to-end-type-safety-nextjs-prisma-graphql/
---
How to implement Debounce and Throttle in React JS
https://blog.logrocket.com/how-and-when-to-debounce-or-throttle-in-react/
---
How to make Progressive Web Apps mode in Next JS application
https://dev.to/byteslash/how-to-create-a-pwa-with-next-js-4dbm
---
#react #nextjs #debounce #graphql #prisma
https://blog.logrocket.com/end-to-end-type-safety-nextjs-prisma-graphql/
---
How to implement Debounce and Throttle in React JS
https://blog.logrocket.com/how-and-when-to-debounce-or-throttle-in-react/
---
How to make Progressive Web Apps mode in Next JS application
https://dev.to/byteslash/how-to-create-a-pwa-with-next-js-4dbm
---
#react #nextjs #debounce #graphql #prisma
An update to the VS Code/Codium text editor is available with the following release notes.
- Split editors within the same group
- Locked editor groups
- Better display of deleted and readonly files
- Bracket pair guides
- Fixed terminal dimensions
- Jupiter Notebook improvements
- Platform-specific extensions
- Virtual Workspaces extension guide
- Advanced container configuration
Full details can be seen in the following changelog
https://code.visualstudio.com/updates/v1_61
#vscode #release
- Split editors within the same group
- Locked editor groups
- Better display of deleted and readonly files
- Bracket pair guides
- Fixed terminal dimensions
- Jupiter Notebook improvements
- Platform-specific extensions
- Virtual Workspaces extension guide
- Advanced container configuration
Full details can be seen in the following changelog
https://code.visualstudio.com/updates/v1_61
#vscode #release
Sending email from Node JS using Nodemailer
https://javascript.plainenglish.io/send-emails-with-node-js-a-how-to-guide-820f62c14932
—-
How to deploy Node JS application to Heroku hosting service
https://yflooi.medium.com/host-a-node-js-api-on-heroku-94ba62f685dc
—-
#nodejs #nodemailer #heroku
https://javascript.plainenglish.io/send-emails-with-node-js-a-how-to-guide-820f62c14932
—-
How to deploy Node JS application to Heroku hosting service
https://yflooi.medium.com/host-a-node-js-api-on-heroku-94ba62f685dc
—-
#nodejs #nodemailer #heroku
Introduction to Streams API in Node JS and JavaScript for reading and writing data
https://css-tricks.com/web-streams-everywhere-and-fetch-for-node-js/
#nodejs #streams
https://css-tricks.com/web-streams-everywhere-and-fetch-for-node-js/
#nodejs #streams
Create a file upload function and resume feature using Node JS
https://medium.com/before-semicolon/how-to-create-a-resumable-multifile-uploader-with-javascript-b077cece11c7
—-
Reference some JavaScript and Node JS based projects
https://javascript.plainenglish.io/14-top-node-js-open-source-projects-%EF%B8%8F-413a807da2d2
—-
Some mistakes to avoid for Node JS based app developers
https://javascript.plainenglish.io/9-common-mistakes-nodejs-developers-make-87e9672a2e18
—-
Tips for securing Node JS backend from CSRF vulnerability attacks
https://levelup.gitconnected.com/prevent-csrf-attacks-in-node-js-application-d71df3704944
#nodejs #upload #resume #multifile #security #csrf
https://medium.com/before-semicolon/how-to-create-a-resumable-multifile-uploader-with-javascript-b077cece11c7
—-
Reference some JavaScript and Node JS based projects
https://javascript.plainenglish.io/14-top-node-js-open-source-projects-%EF%B8%8F-413a807da2d2
—-
Some mistakes to avoid for Node JS based app developers
https://javascript.plainenglish.io/9-common-mistakes-nodejs-developers-make-87e9672a2e18
—-
Tips for securing Node JS backend from CSRF vulnerability attacks
https://levelup.gitconnected.com/prevent-csrf-attacks-in-node-js-application-d71df3704944
#nodejs #upload #resume #multifile #security #csrf
Introduction of new techniques for HTML DOM manipulation with JavaScript, using the Sanitizer API
https://web.dev/sanitizer/
#dom #sanitizer
https://web.dev/sanitizer/
#dom #sanitizer
Reference some JavaScript-based chat libraries
https://hackernoon.com/5-best-javascript-chat-libraries
---
Know what the Babel JS library is
https://dev.to/alexeagleson/building-a-modern-web-stack-babel-3hfp
---
Get to know the bind and map methods that are often encountered in JavaScript data manipulation
https://javascript.plainenglish.io/javascript-map-and-bind-methods-to-the-rescue-696c37d428b4
---
#library #chat #bind #map #babel
https://hackernoon.com/5-best-javascript-chat-libraries
---
Know what the Babel JS library is
https://dev.to/alexeagleson/building-a-modern-web-stack-babel-3hfp
---
Get to know the bind and map methods that are often encountered in JavaScript data manipulation
https://javascript.plainenglish.io/javascript-map-and-bind-methods-to-the-rescue-696c37d428b4
---
#library #chat #bind #map #babel
HTMLCSSJSCombined.pdf
8.9 MB
Hi everyone 👋
Check the pdf notes for 👆
💢 Html
💢 CSS and
💢 js
Check the pdf notes for 👆
💢 Html
💢 CSS and
💢 js
frontend.png
748.6 KB
Check the pic for 👆
💢Frontend roadmap
💢Frontend roadmap
Creating Form Validation in React JS
https://www.freecodecamp.org/news/add-form-validation-in-react-app-with-react-hook-form/
---
Long practice introduction to React JS framework with Freecodecamp
https://www.freecodecamp.org/news/learn-react-js-in-this-free-7-hour-course/
---
Tips and tricks for React JS user developers
https://dev.to/ruppysuppy/5-tips-every-react-developer-should-know-1ghh
---
#react #form #validation #course
https://www.freecodecamp.org/news/add-form-validation-in-react-app-with-react-hook-form/
---
Long practice introduction to React JS framework with Freecodecamp
https://www.freecodecamp.org/news/learn-react-js-in-this-free-7-hour-course/
---
Tips and tricks for React JS user developers
https://dev.to/ruppysuppy/5-tips-every-react-developer-should-know-1ghh
---
#react #form #validation #course
Forwarded from Pavel Durov
🎂 As I am turning 37, I put together a list of 3 undervalued and 7 overvalued things in life.
3️⃣ Undervalued
1. Sleep. Sleep gives a boost to immunity, creativity and psychological well-being.
2. Nature. Nature is the environment that we are biologically designed to feel good in.
3. Solitude. Being alone offers the freedom to make spiritual and intellectual breakthroughs.
7️⃣ Overvalued
1. Big cities. Big cities are sources of pollution, crime and noise. It's good to have access to their resources, but advisable to live outside their borders.
2. Restaurants. Restaurants offer the slowest and least efficient way to eat. Cooking at home allows for healthier diets and more control over ingredients.
3. Hot weather. Sunny weather can bring about not only a lax attitude, but also a risk of cancer and faster aging. Colder temperatures, on the contrary, clarify spirit, body and mind.
4. Fashion. The endless quest to conform with ever-changing trends is expensive and unnecessary. Focusing on comfortable clothes makes life simpler and frees space for things that matter.
5. Real estate. Buying real estate often limits one's choices and is a questionable investment. Renting gives more freedom to move and explore different locations.
6. Social media. The incessant flow of junk cluttering our minds from social media decreases our happiness and creativity. Disconnecting from these internet services is the best thing we can do on any given day.
7. Celebrity advice. Famous people often give unwarranted advice outside their fields of expertise. For all important things in life, it's best to rely on hard science and expert opinion.
3️⃣ Undervalued
1. Sleep. Sleep gives a boost to immunity, creativity and psychological well-being.
2. Nature. Nature is the environment that we are biologically designed to feel good in.
3. Solitude. Being alone offers the freedom to make spiritual and intellectual breakthroughs.
7️⃣ Overvalued
1. Big cities. Big cities are sources of pollution, crime and noise. It's good to have access to their resources, but advisable to live outside their borders.
2. Restaurants. Restaurants offer the slowest and least efficient way to eat. Cooking at home allows for healthier diets and more control over ingredients.
3. Hot weather. Sunny weather can bring about not only a lax attitude, but also a risk of cancer and faster aging. Colder temperatures, on the contrary, clarify spirit, body and mind.
4. Fashion. The endless quest to conform with ever-changing trends is expensive and unnecessary. Focusing on comfortable clothes makes life simpler and frees space for things that matter.
5. Real estate. Buying real estate often limits one's choices and is a questionable investment. Renting gives more freedom to move and explore different locations.
6. Social media. The incessant flow of junk cluttering our minds from social media decreases our happiness and creativity. Disconnecting from these internet services is the best thing we can do on any given day.
7. Celebrity advice. Famous people often give unwarranted advice outside their fields of expertise. For all important things in life, it's best to rely on hard science and expert opinion.