From c25fa2202f58ef0387becaaea2c42753bae668c1 Mon Sep 17 00:00:00 2001 From: hornetfighter515 Date: Fri, 23 Jul 2021 00:49:49 -0400 Subject: [PATCH] color theming with JS --- src/ef/news_scroll.css | 1 + src/ef/news_scroll.html | 83 +++++++++++++++++++++-------------------- src/ef/news_scroll.js | 21 ++++++++++- src/ef/palette.css | 21 ++++++++--- src/sample_1.html | 1 + 5 files changed, 79 insertions(+), 48 deletions(-) diff --git a/src/ef/news_scroll.css b/src/ef/news_scroll.css index 2f3f97c..ad9b364 100644 --- a/src/ef/news_scroll.css +++ b/src/ef/news_scroll.css @@ -45,6 +45,7 @@ a{ .news-article{ color:var(--text); + font-family: var(--font-family); -webkit-transition-duration: 0.3s; transition-duration: 0.3s; padding:5px; diff --git a/src/ef/news_scroll.html b/src/ef/news_scroll.html index 078ca5d..0465b3f 100644 --- a/src/ef/news_scroll.html +++ b/src/ef/news_scroll.html @@ -7,12 +7,49 @@ - +
- + +
+

+ APT Hackers Distributed Android Trojan via Syrian e-Government Portal +

+

An advanced persistent threat (APT) actor has been tracked in a new campaign deploying Android malware via the Syrian e-Government Web Portal, indicating an upgraded arsenal designed to compromise victims. +"To the best of our knowledge, this is the first time that the group has been publicly observed using malicious Android applications as part of its attacks," Trend Micro researchers Zhengyu...

+
+
+ +
+

+ Reduce End-User Password Change Frustrations +

+

Organizations today must give attention to their cybersecurity posture, including policies, procedures, and technical solutions for cybersecurity challenges.  +This often results in a greater burden on the IT service desk staff as end-users encounter issues related to security software, policies, and password restrictions.  +One of the most common areas where security may cause challenges for...

+
+
+ +
+

+ Oracle Warns of Critical Remotely Exploitable Weblogic Server Flaws +

+

Oracle on Tuesday released its quarterly Critical Patch Update for July 2021 with 342 fixes spanning across multiple products, some of which could be exploited by a remote attacker to take control of an affected system. +Chief among them is CVE-2019-2729, a critical deserialization vulnerability via XMLDecoder in Oracle WebLogic Server Web Services that's remotely exploitable without...

+
+
+ +
+

+ Another Hacker Arrested for 2020 Twitter Hack and Massive Bitcoin Scam +

+

A U.K. citizen has been arrested in the Spanish town of Estepona over his alleged involvement in the July 2020 hack of Twitter, resulting in the compromise of 130 high-profile accounts. +Joseph O'Connor, 22, has been charged with intentionally accessing a computer without authorization and obtaining information from a protected computer, as well as for making extortive communications. The Spanish...

+
+
+

Malicious NPM Package Caught Stealing Users' Saved Passwords From Browsers @@ -26,8 +63,8 @@ The package in question, named "nodejs_net_server" and downloaded over 1,283 tim

XLoader Windows InfoStealer Malware Now Upgraded to Attack macOS Systems

-

Cybersecurity researchers on Wednesday disclosed details of an evolving malware that has now been upgraded to steal sensitive information from Apple's macOS operating system. -The malware, dubbed "XLoader," is a successor to another well-known Windows-based info stealer called Formbook that's known to vacuum credentials from various web browsers, collect screenshots, log keystrokes, and download...

+

A popular malware known for stealing sensitive information from Windows machines has evolved into a new strain capable of also targeting Apple's macOS operating system. +The upgraded malware, dubbed "XLoader," is a successor to another well-known Windows-based info stealer called Formbook that's known to vacuum credentials from various web browsers, capture screenshots, record keystrokes, and...

@@ -54,7 +91,7 @@ Surprisingly, leaner teams have a much greater chance than...

+The vulnerability has been nicknamed "SeriousSAM.""Starting with Windows 10...

@@ -202,42 +239,6 @@ The latest patch resolves a total of eight issues, one of which concerns a type

Microsoft on Thursday shared fresh guidance on yet another vulnerability affecting the Windows Print Spooler service, stating that it's working to address it in an upcoming security update. Tracked as CVE-2021-34481 (CVSS score: 7.8), the issue concerns a local privilege escalation flaw that could be abused to perform unauthorized actions on the system. The company credited security researcher...

-
- - -
-

- China's Cyberspies Targeting Southeast Asian Government Entities -

-

A sweeping and "highly active campaign" that originally set its sights on Myanmar has broadened its focus to strike a number of targets located in the Philippines, according to new research. -Russian cybersecurity firm Kaspersky, which first spotted the infections in October 2020, attributed them to a threat actor it tracks as "LuminousMoth," which it connected with medium to high confidence to a...

-
-
- -
-

- New Zero-Trust API Offers Mobile Carrier Authentication to Developers -

-

Zero Trust is increasingly being adopted as the best strategy to maintain application security and prevent data breaches. To help achieve progress on Zero Trust, there is now a new, easy way to implement continuous user verification by connecting directly to the authentication systems used by mobile operators – without the overhead of processing or storing user data.  -Before we show you how it...

-
-
- -
-

- Ransomware Attacks Targeting Unpatched EOL SonicWall SMA 100 VPN Appliances -

-

Networking equipment maker SonicWall is alerting customers of an "imminent" ransomware campaign targeting its Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products running unpatched and end-of-life 8.x firmware. -The warning comes more than a month after reports emerged that remote access vulnerabilities in SonicWall SRA 4600 VPN appliances (CVE-2019-7481) are being...

-
-
- -
-

- Google Details iOS, Chrome, IE Zero-Day Flaws Exploited Recently in the Wild -

-

Threat intelligence researchers from Google on Wednesday shed more light on four in-the-wild zero-days in Chrome, Safari, and Internet Explorer browsers that were exploited by malicious actors in different campaigns since the start of the year. -What's more, three of the four zero-days were engineered by commercial providers and sold to and used by government-backed actors, contributing to an...

diff --git a/src/ef/news_scroll.js b/src/ef/news_scroll.js index 2830923..a8a7e51 100644 --- a/src/ef/news_scroll.js +++ b/src/ef/news_scroll.js @@ -5,10 +5,28 @@ var speedjump = 30; // ADJUST SCROLL JUMPING = RANGE 20 TO 40 var nextdelay = 0; // SECOND SCROLL DELAY IN SECONDS 0 = QUICKEST var topspace = "2px"; // TOP SPACING FIRST TIME SCROLLING var frameheight = 176; // IF YOU RESIZE THE CSS HEIGHT, EDIT THIS HEIGHT TO MATCH +var color_theme = "light"; // CHANGE THIS TO WHAT YOU WANT FROM palette.css + +window.onload=function(){ + SetColor("news_iframe_scroll") +} + +id=function(n){return document.getElementById(n);}; current = (scrollspeed); +function SetColor(el_id){ + el = id(el_id); + if(el!=null){ + console.log("El is not null."); + el.setAttribute("color-theme", color_theme); + } + else{ + console.log("el " + el_id + " was null") + } +} + function HeightData(){ AreaHeight=dataobj.offsetHeight if (AreaHeight===0){ @@ -20,7 +38,8 @@ function HeightData(){ } function NewsScrollStart(){ - dataobj=document.all? document.all.NewsDiv : document.getElementById("NewsDiv") + SetColor("news-scroll-body") + dataobj=document.all? document.all.NewsDiv : id("NewsDiv") dataobj.style.top=topspace setTimeout("HeightData()",( startdelay * 1000 )) } diff --git a/src/ef/palette.css b/src/ef/palette.css index db48a35..b91f0ae 100644 --- a/src/ef/palette.css +++ b/src/ef/palette.css @@ -1,7 +1,4 @@ :root{ - /* - Todo: make the colors right - */ --hornet-blue: #302efe; --hornet-red: #E3073F; @@ -9,11 +6,12 @@ --hornet-black:#050515; --hornet-gray:#989098; + --hornet-white:#DDDDFF; font-family: Verdana, Geneva, sans-serif; } .light, body[color-theme="light"],div[color-theme="dark"]{ - --bg: #DDDDFF; + --bg: var(--hornet-white); --text: var(--hornet-black); --link: var(--hornet-blue); --clicked-link: purple; @@ -42,7 +40,7 @@ --primary: #00ff00; --accent: var(--hornet-blue); --warning: red; - --font-family: var(--hornet-font); + --font-family:DejaVu Sans Mono,Bitstream Vera Sans Mono,Courier New, monospace; } .hornetfighter-red, body[color-theme="hornetfighter-red"], div[color-theme="hornetfighter-red"]{ @@ -53,5 +51,16 @@ --primary:var(--hornet-black); --accent: var(--hornet-blue); --warning: var(--hornet-black); - --font-family: var(--hornet-font); + --font-family: var(--hornet-font) +} + +.hornetfighter-blue, body[color-theme="hornetfighter-blue"], div[color-theme="hornetfighter-blue"]{ + --bg:var(--hornet-blue); + --text:var(--hornet-white); + --link: var(--hornet-gray); + --clicked-link: var(--hornet-gray); + --primary:var(--hornet-black); + --accent: var(--hornet-red); + --warning: var(--hornet-black); + --font-family: var(--hornet-font) } \ No newline at end of file diff --git a/src/sample_1.html b/src/sample_1.html index 7a0e679..a5f842a 100644 --- a/src/sample_1.html +++ b/src/sample_1.html @@ -31,6 +31,7 @@ +