298 private links
Focus on privacy, protection against malicious code; encryption (of everything); extending the web; make it fast; easy to publish; customization per user; first-class experience for non-English-speakers; improve accessibility
Since the beginning of the year, 100 millions of request are made everyday. A record is registered the 10th of january with 110 millions of requests.
Stats about DDG are available here: https://duckduckgo.com/traffic
The "utf8" encoding only supports three bytes per character. The real UTF-8 encoding - which everybody uses, including you - needs up to four bytes per character.
So use utf8mb4
Syntax, timing function, looped animation, multi-step animation, alternating animations, shorthand values, fill modes (forwards and backwards), dynamic animations with CSS variables
DDoS attack, distributed denial of service attack. ➡️ attaque collective par saturation de service (ACSS).
denial of service attack, DoS attack. ➡️ attaque par interruption de service (AIS).
distributed denial of service attack, DDoS attack. ➡️ attaque collective par saturation de service.
DoS attack, denial of service attack. ➡️ attaque par interruption de service.
phreaking, telephone hack, telephone hijack. ➡️ escroquerie téléphonique.
SIM swapping. ➡️ usurpation de carte SIM.
swatting ➡️ alerte malveillante.
telephony denial of service (TDoS). ➡️
attaque par saturation téléphonique (AST).
I have to test this tool to organize my ideas in the right directory with contents instead of only one directory of notes !
Cette application web permet de calculer ses revenus dépendant du TJM ou du salaire brut annuel. Il es possible de paramétrer taux de prélèvement à la source et d'inclure le .
Why? Because none of these chapters answer the most important question a reader has, the entire time, WHY!?
This is a common problems in all classic courses 🤔
A good alternative to makefiles, that I can not master yet.
Tasks is on the contrary explicit !
The two pillars that a good notification is built upon: Give your users a chance to understand what they gain from notifications and ask for permission in context, not on page load.
Follow the guide https://stephaniewalter.design/blog/the-ultimate-guide-to-not-fck-up-push-notifications.
It has many tips in the article, or at least resources to studies or guide.
How to fingerprint, with CSS and the according project: https://github.com/OliverBrotchie/CSS-Fingerprint
I take up all of sebsauvage's points and translate them:
1) An NFT being only a pointer, the owner of the domain used in the pointer can change afterwards the pointed data.
2) Worse, one can even return different data depending on who comes to retrieve the resource.
Yes, the URL of this NFT registered in the blockchain is unalterable, but the data pointed to by this URL can change.But worse than that:
3) Almost all applications rely on APIs like OpenSea to display the contents of these pointers. But there are few such APIs, and they have in this case removed the Moxie NFT pointer.The URL of the Moxie NFT still exists in the blockchain, but the APIs no longer return it. This is a form of censorship.
The decentralization of the blockchain is completely negated by the centralization of the APIs.And finally to add to the ridiculousness of NFTs:
4) One can very well register this URL in other blockchains (there is no such thing as a single blockchain).
5) The inscription of a URL in a blockchain does not mean ownership. It's just data. The blockchain is a register (public and unalterable). The way this data is interpreted is not imposed.
Ready to use 3D background effects