
Research
5 Malicious Chrome Extensions Enable Session Hijacking in Enterprise HR and ERP Systems
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.
relative-dest
Advanced tools
Calculate the relative path from a file's destination path to another directory or file.
Calculate the relative path from a file's destination path to another directory or file.
npm i relative-dest --save
var relative = require('relative-dest');
relative('dist/a/b/c.md', 'dist/public');
//=> '../../public'
relative('dist/a/b/c.md', 'assets');
//=> '../../../assets'
relative('a.md', 'dist/public/css');
//=> 'dist/public/css'
relative('a/b/c/', 'a/b/c/');
//=> '.'
Install dev dependencies:
node i -d && mocha
Pull requests and stars are always welcome. For bugs and feature requests, please create an issue
Jon Schlinkert
Copyright (c) 2014 Jon Schlinkert
Released under the MIT license
This file was generated by verb on December 20, 2014.
FAQs
Calculate the relative path from a file's destination path to another directory or file.
The npm package relative-dest receives a total of 601 weekly downloads. As such, relative-dest popularity was classified as not popular.
We found that relative-dest demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.

Research
Node.js patched a crash bug where AsyncLocalStorage could cause stack overflows to bypass error handlers and terminate production servers.

Research
/Security News
A malicious Chrome extension steals newly created MEXC API keys, exfiltrates them to Telegram, and enables full account takeover with trading and withdrawal rights.