Research

Here I’ll have some articles and other resources from where I derive information when making design and content choices. For now it’s more of a repository, but soon I’ll use this page as a home for citations linked throughout the site. Rad.

Dev.To

  • Whether you're a DevSecOps engineer, pentester, or just a curious developer — staying ahead in cybersecurity means staying close to the open-source scene. In 2025, GitHub continues to be a goldmine of powerful, community-driven security tools. We’ve rounded up 8 standout projects — all free, open-source, and actively maintained — that are reshaping how we […]
  • Check out this Pen I made!
  • In the cryptocurrency industry, listing a token on an exchange is often perceived as a milestone—a signal of legitimacy, market validation, and growth potential. However, for developers and project teams, this milestone is just the beginning of a far more critical phase: sustaining visibility, engagement, and adoption post-listing. This article offers a developer-centric analysis of […]
  • I. Case Scenario and Value This case implements intelligent text recognition in mobile scenarios based on HarmonyOS 5’s AI vision capabilities. By invoking the device camera to capture images and combining with CoreVisionKit’s OCR (Optical Character Recognition) technology, it can quickly extract text information from images. Suitable for scenarios such as document digitization, certificate information […]
  • (Chhotanagpur Institute of Information Technology and Management) Introduction When I took admission in CIITM Dhanbad for the BCA program, I was very excited. I thought I would learn many new things and grow in the tech field. But after some time, I saw the real situation. Issues I Faced In the computer lab, only one […]

WordPress

The Hacker News

  • Google has announced a new feature in its Chrome browser that lets its built-in Password Manager automatically change a user's password when it detects the credentials to be compromised. "When Chrome detects a compromised password during sign in, Google Password Manager prompts the user with an option to fix it automatically," Google's Ashima Arora, Chirag […]
  • A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, including Amazon S3 buckets and Microsoft Azure endpoints, by leveraging misconfigurations in the Domain Name System (DNS) records. The hijacked domains are then used to host URLs that direct users to scams and malware via traffic distribution systems […]
  • An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities but incorporate covert functionality to exfiltrate data, receive commands, and execute arbitrary code. "The actor creates websites that masquerade as legitimate services, productivity tools, ad and media creation or analysis
  • Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to escalate privileges, manipulate other AWS services, and, in some cases, even fully compromise AWS accounts. "These roles, often created automatically or recommended during setup, grant overly broad permissions, such as full […]
  • In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISOs from global enterprises (200 from within the USA) to understand the strategies, tactics, and tools they use to cope with the thousands of security alerts, the persisting breaches and the growing cyber risks they have to handle. The findings reveal a complex […]

jQuery News

  • Last February, we released the first beta of jQuery 4.0.0. We’re now ready to release a second, and we expect a release candidate to come soon™. This release comes with a major rewrite to jQuery’s testing infrastructure, which removed all deprecated or under-supported dependencies. But the main change that warranted a second beta was a […]
  • jQuery’s influence on the web will always be evident. When it was first introduced in 2006, jQuery became a fundamental tool for web developers almost immediately. It simplified JavaScript programming, making it easier to manipulate HTML documents, handle events, perform animations, and much more. Since then, it has played and continues to play a major […]
  • jQuery 4.0.0 has been in the works for a long time, but it is now ready for a beta release! There’s a lot to cover, and the team is excited to see it released. We’ve got bug fixes, performance improvements, and some breaking changes. We removed support for IE
  • jQuery 3.7.1 has been released! This release fixes a regression from jQuery 3.6.0 that resulted in rounded dimensions for elements in Chrome and Safari. Also, a (mostly) internal Sizzle method, jQuery.find.tokenize that was on the jQuery object was accidentally removed when we removed Sizzle in jQuery 3.7.0. That method has been restored. As … Continue […]
  • jQuery 3.7.0 is now available! This release has it all: bug fixes, a new method, and a performance improvement! We even dropped our longtime selector engine: Sizzle. Or, I should say, we moved it into jQuery. jQuery no longer depends on Sizzle as a separate project, but has instead dropped its code directly into jQuery […]