Lots of updates in March! Many of the games (including word search / picture puzzles) have been updated to work better on small screens and lots of background changes to improve download speed and simplify maintenance! More details on the home page https://ssjx.co.uk

#games #javascript

Welcome to ssjx.co.uk - Games and applications for Windows, Web Browsers, Java, Cybiko and Amiga!

Find games and applications for Windows, Web Browsers, Java, Cybiko and Amiga!

🥳 New JavaScript Database (JSDB) release

• Fix: Now properly handling array indices on `JSTable.PERSIST` events in the `keypath` property that’s passed to the event handler.

Just noticed that the pretty keypaths of the JavaScript deltas written to the append-only log were ignoring array indices while playing with a new database introspection call I’m adding to the Kitten Interactive Shell (REPL) and fixed it.

I’ll be updating Kitten shortly to use this version of JSDB and I haven’t forgotten my promise to record a little video of the new Kitten Introspection API.

Enjoy!

💕

https://codeberg.org/small-tech/jsdb#readme

#JavaScriptDatabase #javascript #database #JSDB #SmallTech #SmallWeb #NodeJS

Incredible milestone! ✨🚀 It’s truly inspiring to see how accessible it’s become to build your own JavaScript framework from the ground up. Innovation at its finest! 💡🙌 #Javascript #WebDevelopment #Innovation #TechCommunity

RE: https://bsky.app/profile/did:plc:6gbm7hkapyhjt2jghosdzwv2/post/3migjjuhcwd2y
Oh, look! Yet another scroll-stopping #Forbes masterpiece: a guide to #vaporware from a company that might as well be selling #unicorn #tears 🦄💧. Who knew you needed #JavaScript just to contemplate the #existential #void of OpenAI's non-existent products? 🤔✨
https://www.forbes.com/sites/phoebeliu/2026/03/31/openai-graveyard-deals-and-products-havent-happened-openai/ #OpenAI #HackerNews #ngated
The Graveyard Of OpenAI’s Dead Products And Incomplete Deals

As it announces one of the biggest funding rounds in history, OpenAI has trumpeted hundreds of billions in other deals and products—including Sora—that haven’t yet become reality.

Forbes

Just made a little correction to the JavaScript Database (JSDB) Table Events section:

Previously, the example that listens for the JSTable.PERSIST event was erroneously stating that the table was deleted when the `type` property in the event handlers parameter object was JSTable.DELETE. It now correctly states that the value at `keypath` was deleted.

I also documented the JSTable.PERSIST types so they wouldn’t be confused with the JSTable event types (persist and delete; the latter of which does actually signal that the table – i.e., the append-only JavaScript log – was deleted.

https://codeberg.org/small-tech/jsdb#table-events

#SmallWeb #SmallTech #JavaScript #database #JSDB #documentation #events #fix

jsdb

A zero-dependency, transparent, in-memory, streaming write-on-update JavaScript database for the Small Web that persists to a JavaScript transaction log.

Codeberg.org

From Inbox to Intrusion: Multi‑Stage Remcos RAT and C2‑Delivered Payloads in Network

This multi-stage fileless Remcos RAT attack leverages a phishing-delivered JavaScript dropper to trigger a reflective PowerShell loader that executes payloads entirely in memory. The infection chain utilizes obfuscation techniques like rotational XOR and Base64 encoding to reconstruct .NET payloads, significantly reducing the disk-based detection footprint. Stealth is maintained by using aspnet_compiler.exe as a LOLBin to proxy malicious execution and dynamically retrieving the final payload from a remote C2 server.

Pulse ID: 69cd1ac8518646002a1a0fbc
Pulse Link: https://otx.alienvault.com/pulse/69cd1ac8518646002a1a0fbc
Pulse Author: AlienVault
Created: 2026-04-01 13:16:56

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#ASPNet #ASPNet_Compiler #CyberSecurity #InfoSec #Java #JavaScript #NET #OTX #OpenThreatExchange #Phishing #PowerShell #Proxy #RAT #Remcos #RemcosRAT #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

You Can Use Same Variable Name TWICE?!

🔥 NO WAY! Destructuring allows DUPLICATE variable names in the same statement! const {a, a} = obj is VALID JavaScript! Last one silently wins. ESLint doesn't catch this by default. Tag a dev who needs to see this!

#javascript #javascripttricks #codingchallenge #destructuring #javascriptes6 #javascriptquiz #javascriptweird #javascriptwtf #javascriptbugs #codinginterview #codingtips #javascriptshorts

https://www.youtube.com/watch?v=1fs8zval7Hk

You Can Use Same Variable Name TWICE?! #codingchallenge

YouTube

Claude Code Unpacked : A visual guide (ccunpacked.dev)

https://ccunpacked.dev/

#webdev #javascript #programming #claude #leak

Claude Code Unpacked

What actually happens when you type a message into Claude Code? The agent loop, 40+ tools, multi-agent orchestration, and unreleased features, mapped from source.

Claude Code Unpacked

Those of you who follow me for some time know that I have many creative fields I like and I change between them. So, one of them is game development.

Currently I re-create Super Mario Bros. 3 with the Phaser library in JavaScript. It's fun and I learn more about how Toshihiko Nakago coded Mario's movement.
With those game re-creations I improve the mechanics of my own games.

I know, you should stick to one theme to not confuse your followers. Do you would like me to stick to one area like generative art, drawing, gamedev or sculpting?
Please let me know in a reply.

#game #javascript #supermario #phaserjs #nintendo #games #art #mastoart #fediart #noai #code #artwork #minimalism #creativecoding #random #arts #artistsonmastodon

(animation / remake)

Hindi mo kailangan ng JavaScript para mag-truncate ng text.

https://www.youtube.com/watch?v=K-zhRHQjPxg

#CSS #HTML #WebDevelopment #JavaScript

You don't need Pretext | Text truncation with just CSS

YouTube
×

Alerta global: Hackean «Axios», la librería usada por millones para propagar malware

Un atacante ha logrado comprometer el proyecto de código abierto Axios, una de las herramientas más utilizadas en el desarrollo web moderno, inyectando código malicioso que afecta a millones de aplicaciones (Fuente Google).

La comunidad de desarrollo de software está en máxima alerta tras la confirmación de un ataque de cadena de suministro contra Axios, la popular librería de JavaScript utilizada para realizar peticiones HTTP. Según los informes de seguridad, un actor malintencionado obtuvo acceso no autorizado a las credenciales de publicación en el registro NPM, lo que le permitió liberar versiones infectadas que contienen un troyano de acceso remoto (RAT). Dado que Axios es una dependencia crítica para gigantes tecnológicos y millones de sitios web, el alcance potencial de esta infección es masivo, permitiendo a los atacantes el robo de credenciales, claves de API y datos sensibles de los servidores afectados.

El malware detectado en las versiones comprometidas se activa de forma silenciosa al momento de la instalación, estableciendo una conexión con un servidor de comando y control externo. Los expertos en ciberseguridad instan a los desarrolladores a auditar sus archivos de bloqueo (lockfiles) de inmediato y degradar o actualizar a las versiones limpias verificadas por los mantenedores oficiales del proyecto. Este incidente reaviva el debate sobre la seguridad en el ecosistema de código abierto y la vulnerabilidad de proyectos mantenidos por pocos individuos que son pilares de la infraestructura digital global.

Como medida de mitigación, se recomienda el uso de herramientas de escaneo de dependencias y la implementación de la autenticación de dos factores en todos los repositorios de código. La rapidez con la que se ha propagado el código malicioso subraya los riesgos de las actualizaciones automáticas en entornos de producción sin una verificación previa. Por ahora, el equipo de Axios ha recuperado el control del proyecto, pero el daño reputacional y el riesgo de seguridad residual para quienes no actualicen sus sistemas sigue siendo una amenaza crítica y activa.

«Hemos atribuido el ataque a un presunto grupo de ciberdelincuentes norcoreanos al que identificamos como UNC1069 Â», declaró John Hultquist, analista jefe del Grupo de Inteligencia de Amenazas de Google. «Los hackers norcoreanos tienen amplia experiencia en ataques a la cadena de suministro, que históricamente han utilizado para robar criptomonedas. Aún se desconoce el alcance total de este incidente, pero dada la popularidad del paquete comprometido, prevemos que tendrá repercusiones de gran alcance».

#Alerta #arielmcorg #Axios #CódigoAbierto #ciberseguridad #hackeo #infosertec #javascript #malware #PORTADA #Programación #SeguridadDigital #tecnología