Hackernoon Icon


A community-contributed magazine for hackers.
hackernoon.com • 5 Stories
All Sources

Alex Buzin Hackernoon

Writing a JavaScript tweening engine with Between.js

Alex Buzin: A month ago I decided to try my skills in writing own tweening engine and here’s how I did it… Tweening, in case you're wondering, is the process of animating an object from one position to another. You specify the start/end positions (or images) and the tweening engine handles all of the inbetween states. This post by Alex is a great way to introduce yourself to the topic.


Ives van Hoorne Hackernoon

CodeSandbox Containers is in beta

CodeSandbox Containers was just announced by Ives van Hoorne on Hacker Noon. Today we’re happy to announce CodeSandbox Containers. We execute your code on a server, which allows you to work on any JavaScript project that works locally. But you gotta use it so they can test things and get it right. We can only test CodeSandbox Containers fully when we have other people using it. ... Please don’t use it for any project with files you don’t want publicly exposed. There’s also the chance that the service might be down because of things that we haven’t foreseen yet, in which case you’ll see a nice warning message. We will dedicate the coming months to squash every bug we can find, when we think that CodeSandbox Containers is stable enough to remove the beta warning we will announce this.


Hackernoon Icon Hackernoon

I'm harvesting credit card numbers and passwords from your site. Here's how.

This is pretty scary regardless if it's based on a true story or not. When I first wrote this code back in 2015, it was of no use at all sitting on my computer. I needed to get it out into the world. Out into your site. Lucky for me, we live in an age where people install npm packages like they’re popping pain killers. So, npm was to be my distribution method. I would need to come up with some borderline-useful package that people would install without thinking — my Trojan horse. Oh and then there was this — this is an excellent opportunity for taking over npm packages and injecting malware by malicious people.

0:00 / 0:00