To build jQuery, you need to have the latest Node.js/npm and git 1.7 or later. Earlier versions might work, but are not supported. For Windows, you have to download and install git and Node.js. OS X users should install Homebrew. Once Homebrew is installed, run brew install git to install git, and brew install node to install Node.js. Linux/BSD users should use their appropriate package managers to install git and Node.js, or build from source if you swing that way. Easy-peasy. Special builds can be created that exclude subsets of jQuery functionality. This allows for smaller custom builds when the builder is certain that those parts of jQuery are not being used. For example, an app that only used JSONP for $.ajax() and did not need to calculate offsets or positions of elements could exclude the offset and ajax/xhr modules. Any module may be excluded except for core, and selector. To exclude a module, pass its path relative to the src folder (without the .js extension). Some example modules that can be excluded are: Note: Excluding Sizzle will also exclude all jQuery selector extensions (such as effects/animatedSelector and css/hiddenVisibleSelectors). The build process shows a message for each dependent module it excludes or includes. As an option, you can set the module name for jQuery's AMD definition. By default, it is set to "jquery", which plays nicely with plugins and third-party libraries, but there may be cases where you'd like to change this. Simply set the "amd" option: For questions or requests regarding custom builds, please start a thread on the Developing jQuery Core section of the forum. Due to the combinatorics and custom nature of these builds, they are not regularly tested in jQuery's unit test process. The non-Sizzle selector engine currently does not pass unit tests because it is missing too much essential functionality.

Financial and Identity Safety

identity safety


As the holidays and holiday shopping approach, it’s a good time to think about financial and identity safety. Whether you are shopping at the mall or online, there are a number of things to think about to protect your financial well-being:

Protecting your credit cards:

  1. Keep your card number private.
  2. Limit the number of cards you carry.
  3. Some recommend that you sign the card immediately to protect you if someone else gets hold of it. Some say sign it with ‘Ask for additional ID’ so the vendor will verify that you are the owner of the card. In the world of ‘Slide your card’ yourself, this may not be effective.
  4. Draw a line through any blank lines when signing the receipt so no one can add additional charges or amounts. Make sure you total the bill when needed, such as in restaurants.
  5. Save your receipts and verify your purchases on your monthly statements.
  6. Don’t give the card number over the phone unless you initiated the call and you are talking to an enterprise you trust.
  7. Do not ever respond to an email that asks you for account information, even if it looks like a bank or company you trust.
  8. Consider paperless statements to remove any sensitive information from the postal system.
  9. Shred statements and other documents with personal information before you dispose of them.
  10. Keep your information current – notify your bank or credit card companies if you move; periodically check that they have your correct email, phone and address.
  11. Sign up for fraud alerts on your cell phone.
  12. Check your credit score annually through the three credit bureaus – Transunion, Experian, and Equifax. You are entitled to one free credit report per year.
  13. If using your credit card online, be sure the URL of the site you are on begins with ‘https:’ and not just ‘http’. The ‘s’ indicates that the site is secure.
  14. If your card is lost or stolen, report it immediately.
  15. Securely store (under lock and key at home) either a copy of your credit card or the credit card number and contact information. Then if your card is lost or stolen, you will have the information handy to report it.

Protect your Social Security number:

  1. Do not carry your Social Security card with you.
  2. If you are asked to provide it, ask why, and ask if another form of identification is acceptable. Employers and financial institutions do need the number for wage and tax reporting purposes.
  3. Do not enter it online unless it is a secure web site.

Protect your online information with good passwords:

  1. Use strong passwords – complexity and length are very important. A 12 character password is much, much harder to crack that a 5 or 6 character password.
  2. Do not use dictionary words, birthdates, children’s or pets’ names. Even though longer is better, do not use well known phrases or song lyrics unless you transform them. For example, one might use ‘iwtBotiWtWot!’ in place of ‘It was the best of times, it was the worst of times’. You could also string random words together (wiz@rdraBB1tbas3b@ll [wizard/rabbit/baseball]) to create a complex password. Intersperse use of special characters, upper case letters and numbers to add to the complexity.
  3. Do not save passwords on your computer.
  4. Do not use the same password for different sites.
  5. Consider using a password manager app on your computer or phone to keep track of your login credentials.
  6. Consider multifactor security, such as systems that require biometrics like a fingerprint or facial recognition.

Protect your phone and computer:

  1. Set your phone and computer to lock the screen after five minutes of inactivity.
  2. Install a ‘find your phone’ app – preferably one with an option to erase your phone’s data remotely if you are not able to recover the phone.
  3. Only download from trusted sites.
  4. When walking away from your computer at work, pressing the Windows key plus the letter L will lock the screen for you.
  5. Be careful of public Wi-Fi networks – other phones may be able to access yours.
  6. Keep your operating system up to date in order to have the most current security.
  7. Avoid storing or letting your phone ‘remember’ personal data such as passwords.
  8. Do not store personal data in an unencrypted format such as a notes app.
  9. When disposing of a computer, use a wipe utility program to overwrite the hard drive or remove the hard drive and physically destroy it.
  10. When disposing of your phone, remove the SIM card and other information stored on the phone such as the phone book, lists of calls made, photos, messages, and web search history. Your owner’s manual may be able to direct you in doing this.

Protect your paper:

  1. Limit what you carry.
  2. Shred receipts, credit offers, credit applications, insurance forms, physician statements, checks, bank statements, expired charge cards and similar documents.
  3. Remove and destroy labels from prescription bottles before you throw them out or recycle them.
  4. Take outgoing mail to a mailbox or the post office. Promptly remove mail from the mailbox.

It seems like a lot! These are, however, good habits we should adopt to protect our privacy.