Fixed Headers and Jump Links? The Solution is scroll-margin-top

.mega-header::before { content: “”; position: absolute; top: 0; right: 0; width: 75%; height: 90%; background-image: radial-gradient(ellipse closest-side, rgba(15, 14, 22, 0.5), #100e17), url(https://res.cloudinary.com/css-tricks/image/fetch/w_1200,q_auto,f_auto/https://css-tricks.com/wp-content/uploads/2020/02/sticky-header.gif); background-size: cover; background-repeat: no-repeat; opacity: 0.75; } The problem: you click a jump link like <a href=”#header-3″>Jump</a> which links to something like <h3 id=”header-3″>Header</h3>. That’s totally fine, until you have a position: […]

Read more
Inflection Point I An interview with AltaML’s managing director about AI’s role in shaping Calgary’s digital future

“If you cannot get rid of the family skeleton, you may as well make it dance.” – George Bernard Shaw Calgary, the historical heart of the Canadian oil & gas industry, is at a once-in-an-epoch inflection point that will determine our destiny for this next millennium and beyond. Energy sources and technologies that have powered […]

Read more
Emotet Malware Rears Its Ugly Head Again

Enterprise VulnerabilitiesFrom DHS/US-CERT’s National Vulnerability Database CVE-2012-1093PUBLISHED: 2020-02-21 The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during package installation. CVE-2012-0828PUBLISHED: 2020-02-21 Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause […]

Read more
Landing that dream data scientist position

The data scientist role emerged as a sought-after position during the 2010s. Demand for data scientists is continuing to grow. Mr. Khaled Hasna, a technical recruiter with IT-IQ Inc. observes, “significant growth in demand for data science in the finance and insurance sectors – anywhere where risk assessment is required.” The numbers back this up. […]

Read more
NRC Health Ransomware Attack Prompts Patient Data Concerns

The organization, which sells patient administration tools to hospitals, could not confirm whether patient data was accessed. A Feb. 11 ransomware attack targeting NRC Health has driven concerns about the security of patient data stored on the organization’s servers. NRC Health manages patient survey systems and works with 75% of the 200 largest hospital chains […]

Read more
A Guide to Console Commands

.mega-header::before { content: “”; position: absolute; top: 0; right: 0; width: 75%; height: 90%; background-image: radial-gradient(ellipse closest-side, rgba(15, 14, 22, 0.5), #100e17), url(https://res.cloudinary.com/css-tricks/image/fetch/w_1200,q_auto,f_auto/https://css-tricks.com/wp-content/uploads/2020/02/console-commands.png); background-size: cover; background-repeat: no-repeat; opacity: 0.75; } The developer’s debugging console has been available in one form or another in web browsers for many years. Starting out as a means for errors […]

Read more
Up close and personal with Linux malware

What are the main security threats facing Linux? A Q&A with ESET Senior Malware Researcher Marc‑Etienne M.Léveillé, whose work has been instrumental in uncovering a number of malware strains hitting Linux servers. Chances are that the very word ‘Linux’ conjures up images of near-impenetrable security. However, Linux-based computer systems and applications running on them increasingly […]

Read more
How To Build A Simple Cryptocurrency Blockchain In Node.js

About The Author Alfrick Opidi is an experienced web developer with a passion in exploring how emerging technologies can be utilized to create performant, productive, and … More about Alfrick … This tutorial demonstrates how to create a simple cryptocurrency, called smashingCoin, using the concepts of JavaScript classes and Node.js. Give it a try — […]

Read more
Top