What are deceptive design patterns and how can you spot them? | The Mozilla Blog
Deceptive design patterns are tricks used by websites and apps to get you to do things you might not otherwise do, like buy things, sign up for services or
En octobre 2019, pendant un workshop étudiant dans lequel nous cherchions à re-designer le web, j’ai eu l’idée avec Labo.mg de concevoir un navigateur internet « low-tech » (je vous dét…
A good philosophy to live by at work is to “always be quitting”. No, don’t be constantly thinking of leaving your job 😱. But act as if you might leave on short notice 😎. Counterintuitively, this will make you a better engineer and open up growth opportunities. A thread 👇.
The Mental Health Patterns Library is a public library that contains a set of principles, patterns and examples for the design and delivery of digital services and products that address mental health needs.
This specification defines a mechanism for expressing user decisions about personal data processing under the European Union’s data protection regulations, and similar regulations outside the EU. The mechanism functions through the exchange of HTTP headers between the user agent and the web server, or through an equivalent JavaScript interface.
‘If Google’s data centre water consumption was a pyramid of jugs, it would tower thousands of feet into Arizona’s cloudless sky.’ Nikitha Sattiraju reports
Zphisher - Automated Phishing Tool in Kali Linux - GeeksforGeeks
A Computer Science portal for geeks. It contains well written, well thought and well explained computer science and programming articles, quizzes and practice/competitive programming/company interview Questions.
testjavascript/nodejs-integration-tests-best-practices: ✅ Master the art of the most powerful testing technique for Node.js: Component tests. Including super-comprehensive best practices list and an example app (August 2021)
✅ Master the art of the most powerful testing technique for Node.js: Component tests. Including super-comprehensive best practices list and an example app (August 2021) - testjavascript/nodejs-int...
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
CVEdetails.com is a free CVE security vulnerability database/information source. You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time
DNSdumpster.com - dns recon and research, find and lookup dns records
Find dns records in order to identify the Internet footprint of an organization. Recon that enables deeper security assessments and discovery of the attack surface.
Les services cloud s’appuient sur de nombreux serveurs répartis à travers le monde. Contrairement aux déchets pour lesquels les impacts environnementaux sont directement visibles, ceux du matériel informatique le sont moins. Néanmoins, ils ne sont pas pour autant inexistants.
A Complete Guide To Accessibility Tooling — Smashing Magazine
In a new short series of posts, we highlight some of the useful tools and techniques for developers and designers. Recently we’ve covered HTML Emails and SVG Generators. This time we look into different kinds of tools to help you streamline your accessibility testing process. Don’t miss the next one.
(Long read)Half of the roughly 13 trillion photos taken since 1900 were shot in the last five years. In fact, more photos were taken in 2020 than in the entire twentieth century. Digital is the great accelerator. Digital puts everything on speed: extraction, production, consumption, waste generation.Digital is physical. Data consumes electricity. D...