If you’ve ever been in a hotel with a smart TV, there’s a decent chance you logged into your Google account on it to consume Netflix or other content. After all, those devices are locked down… right? Well, as it turns out, those devices can actually leak the inboxes of people who have logged into them, and you should immediately remotely log out of your Google account if you’ve logged into one before.
Source: xda-developers.com
[DAY 18-20] I Built A Game & A Calorie Counter In Javascript
Hi everyone! Welcome back to my blog where I document the things I learned in web development. I do this because it helps retain the information and concepts as it is some sort of an active recall.On days 18-20, I built a text-based role-playing game and a calorie counter to learn basic Javascript concepts and form validation. 10 things I learned: JavaScript interacts with HTML using the … [Read More...]
Useful Web APIs For Your Next Project
There are plenty of native web APIs that have a variety of uses.Here are 5 useful APIs that I use quite often in my web development projects. Clipboard API The clipboard API is a simple method to copy text to a user's clipboard. This can be used in a wide range of applications such as URL shorteners or blogs, where you want to add a copy button to copy content. To copy text, you first need an … [Read More...]
Building an Animated Cute Lion Using HTML and CSS
IntroductionWelcome back to Day 27 of the #100DaysOfCode Challenge! Today, we're going to dive into creating a fun and adorable project: an animated cute lion using HTML and CSS. This project will not only add a touch of creativity to your coding journey but also help you enhance your skills in HTML and CSS animation. Before We Begin Before we dive into the coding process, make sure you have a … [Read More...]
Beginner's Guide to IndexedDB: Illustrated with Easy-to-Follow Block Diagrams
What is IndexedDB?In simple terms, IndexedDB is a client-side storage technique like LocalStorage and SessionStorage. But what sets it apart and makes it far more powerful than the other alternatives is it's: Ability to manage large amounts of structured data including files/blobs or other binary types Ability to create indexes for efficient querying of data (and hence the name "Indexed" … [Read More...]
Starting My Next.js Journey: A Dive into Client-Side and Server-Side Rendering
Hey there, fellow learners! Today marks the beginning of my journey into the world of Next.js, and I couldn't be more excited to share my experiences with you all. After delving into the intricacies of backend architecture in my previous studies, I felt ready to explore the frontend world with a tool that promises a lot: Next.js. One of the first things that caught my attention was the unique file … [Read More...]
Comparing Next.js vs React.js: A Comprehensive Analysis
React.js and Next.js are both influential technologies in the world of web development. While React.js serves as a robust JavaScript library for constructing user interfaces, Next.js acts as a framework built atop React.js, offering additional functionalities like server-side rendering (SSR) and routing. This in-depth comparison aims to explore and analyze the intricacies of Next.js and React.js … [Read More...]
From Rabbit R1 drama to making a GPU from scratch, here are the top stories of the week
If you didn't keep up with the news this week, you missed some cool projects. There were a ton of cool Raspberry Pi projects this week, plus someone reviving a PC from the late '80s with MS-DOS 4. Plus, if you're thinking about getting the Rabbit R1, perhaps you should check out the recent drama surrounding it before you fork over any money. Source: xda-developers.com … [Read More...]
How to configure your router to use WPA2
When you use a wireless router to access the internet, you are basically transferring and receiving data by converting it into radio signals. Unless properly secured, this form of communication leaves devices wide open to be spied upon, and hackers can steal potentially sensitive information whenever you send or view it. The best way to keep your wireless connections safe is with encryption, and … [Read More...]
12 examples of how Windows BSODs can strike anywhere
Just about everyone is familiar with the infamous Windows Blue Screen of Death (BSOD). This splash screen is displayed when the operating system encounters an error where it's unable to recover and needs to reboot the system. A BSOD can be caused by software, hardware, or Windows itself. While we normally see such errors on desktop and laptop PCs, it is possible to spot a BSOD in public since many … [Read More...]
How to hard reset an iPhone
Sometimes, a hard reset or force restart of an iPhone is necessary. It might be because certain apps or functions arent working properly, or something has gone awry, like the phone isnt responding. Whatever the reason, its an act that all of us will have to perform at least once during the time you own the device, likely multiple times. The process is different depending on which model phone you … [Read More...]