
Research
NPM targeted by malware campaign mimicking familiar library names
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
windows-locale
Advanced tools
Windows Language Code Identifier (LCID) for JavaScript
Module available through the npm registry. It can be installed using the npm
or yarn
command line tools.
# NPM
npm install windows-locale --save
# Or Using Yarn
yarn add windows-locale
const locale = require('windows-locale')
console.log(locale['pt-br'])
/*
{
language: 'Portuguese',
location: 'Brazil',
id: 1046,
tag: 'pt-BR',
version: 'ReleaseA'
}
*/
locale
List of Languages
locale[language]
Get Windows Language Code Identifier (LCID) information
NOTE: Source is winprotocoldoc.blob.core.windows.net/productionwindowsarchives/MS-LCID/%5bMS-LCID%5d.pdf
None
Pull requests and stars are always welcome. For bugs and feature requests, please create an issue. List of all contributors.
FAQs
Windows Language Code Identifier (LCID) for JavaScript
The npm package windows-locale receives a total of 18,972 weekly downloads. As such, windows-locale popularity was classified as popular.
We found that windows-locale demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
Research
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.