Home Featured

Featured

Featured posts

CPU vulnerabilities exploited by Meltdown and Spectre

NOTE: Microsoft released Security Advisory 18002 on Wednesday, January 3, 2018 announcing mitigation for...

Latest Google Dorks List Collection for SQL Injection 2018

Google Help you to Find Vulnerable Websites that Indexes in Google Search Results. Here we are providing latest collection of Google SQL dorks. More than a million of people searching...

Mathematical Genealogy | Math ∩ Programming

As a fun side project to distract me from my abysmal progress on my book, I decided to play around with the math genealogy graph! For those who don’t know, since...

​Wix.com: Make the Web Your Playground

(This is a sponsored post.)Here's something you can do: kick off 2018 with your own professional website. The only thing you'll need to get started is your imagination, a little...

Weekly Sponsor: PSPDFKit ? – Little Bites of Cocoa – Tips and techniques for...

This week, we're welcoming back an awesome sponsor to LBOC, it's PSPDFKit! PSPDFKit delivers an intuitive & seamless SDK for integrating PDF functionality into apps on...

Weekly News for Designers № 418

Get FullStory for Free, Forever. 10 Dev Talks & Presentations on the Future of CSS – A collection of top talks from UX conferences worldwide. From Bootstrap to CSS Grid – Using...

Numerals · An A List Apart Article

When it comes to numbers we have just ten digits. Throw in a comma and a period and we’ve got grand total of twelve characters. You might not think that...

Weekly Sponsor: Buddybuild ?? – Little Bites of Cocoa – Tips and techniques for...

We're very happy to welcome back one of our favorite sponsors again this week. It's buddybuild! Long time readers will remember that buddybuild is a fantastic mobile...

The Story of CSS Grid, from Its Creators · An A List Apart Article

On October 17th, Microsoft’s Edge browser shipped its implementation of CSS Grid. This is a milestone for a number of reasons. First, it means that all major browsers now support...

APLICATIONS

The Ransomware Survival Handbook – Help Net Security

When a ransomware infection spreads through your network, its goal is to encrypt any files it can access (even...

HOT NEWS