Using strong passwords is a great first step in increasing the security of your online logins. But even with a password in place that can’t be easily guessed, an account is vulnerable to other types of attacks. One common scenario involves someone impersonating you and resetting your password to one they choose. The result is that they have access to your account, while you are locked out. To defend against this type of attack, many web services allow you to set up two factor authentication (2FA).
Configuring and using a password manager is a critical building block of your online security. Continue reading “Securing Your Digital Life, Part 1: Choosing a password manager”
After cutting my teeth on Ajax by writing code using
XMLHttpRequest (XHR), the arrival of Fetch was like a sunny day after a week of rain. Although Fetch uses a now common pattern that has been replicated in a number of popular frameworks, it’s important to understand what Fetch can and can’t do, as well as which browsers support it and which don’t, in order to successfully roll it out in your own code.
When you work with data on the modern web, you mostly likely work with JSON. Almost every web service offers a data stream in JSON, which has significant advantages over its predecessor, XML. With JSON, a simple
I recently gave a lab presentation that led users through a few basic approaches to testing web documents and apps. I focused on the following five techniques that beginning front-end developers could do on their own computers for free:
- Desktop browsers
- Device simulators
- Virtual machines
- Synced devices
- Web-based services
Keep reading for details and links on the tools we used.
I recently presented on CSS animations at the Cengage Learning Computing Conference. Some useful resources for exploring this topic:
I also created a few gists to illustrate CSS transforms, transitions, and keyframe animations:
As you build and debug more websites and web applications, eventually you’ll come upon an issue that is not a bug in your code, but a but in the code for a browser itself. Fortunately, most major browsers support bug reporting by developers, and provide public access to the state of each reported bug. To play a constructive role in the process:
- Do your research first. Any bug you find has likely already been reported by another developer.
- Follow bug reporting guidelines. For your bug report to be helpful, it’s important that you provide all the information necessary for browser makers to recreate and fix your bug.
More details below the fold.
The ability to use a search engine like Google or Bing effectively is a fundamental skill in today’s economy. With a vast array of reference materials and expert advice freely available online, the most valuable team members — across a wide variety of jobs — know how to quickly find accurate and reliable information.
Using search engines effectively encompasses three broad skills:
- Specifying the information you want
- Constructing a query
- Identifying reputable sources
Explanation and examples below.
Want to plug into stackoverflow.com but not sure how? My advice:
1. Answer new questions
2. Focus on your area of expertise
3. Keep at it
Details below the fold.