Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
calculagraph
Advanced tools
multifunctional calculagraph, support Node.js, Browser and RequireJS
多功能计时器
Here is an English edition
##安装
npm install calculagraph
Node.js
var Calculagraph = require('calculagraph');
Browser Global
console.log(Calculagraph);
RequireJS
define(['Calculagraph'], function(Calculagraph){
console.log(Calculagraph);
});
var time = new Calculagraph();
如果没有设置, 则默认为0。 当起始时间为0的时候, 逆时计时会自动停止。
time.set(20); // 设置起始时间为20秒
可以看下面的例子
increase 递增计时绑定
descrease 递减计时绑定
set 设置起始的时间, 需要在调用decrease或者increase时运行
stop 停止计时, 同时清空计时状态。
parse 暂停计时, 保留计时状态
restore 恢复上一次暂停时的计时状态
restart 重启计时,如果之前设置了起始时间, 则从起始时间开始运行。
若检测到AMD加载器,暴露Calculagraph构造函数,且不再将Calculagraph暴露到全局下
var time = new Calculagraph();
time.set(30);
time.decrease(function(time){
console.log(time);
}, 30, 500, function(){
console.log('finishde');
});
var time = new Calculagraph();
time.set(15);
time.increase(function(time){
console.log(time);
}, 20, 1000, function(){
console.log('finished');
});
FAQs
multifunctional calculagraph, support Node.js, Browser and RequireJS
The npm package calculagraph receives a total of 0 weekly downloads. As such, calculagraph popularity was classified as not popular.
We found that calculagraph demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.