
Research
Security News
The Growing Risk of Malicious Browser Extensions
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
##The Problem
I find it hard to manage my todo list in any application (Evernote, Trello, Wunderlist). It's just a mental barrier to switch context open an application, find the list or notebook and then finally type in the todo item. This gem aims to solve my problem by providing a command line alternative that is simple to add to a list, create a new list or sublist and check items off a list.
Add this line to your application's Gemfile:
gem '2do'
And then execute:
$ bundle
Or install it yourself as:
$ gem install 2do
In order to setup todo on your machine you'll need to do the following:
-Todo persists the lists to $HOME/todo/ so make sure that is available and writable
Todo can be used in the following ways:
Add a task to the general list:
todo add 'get some milk'
Add a task to the general list with priority:
todo add 'get some milk' -p high
This will push the item to the top of the list.
Add a task to a specific list:
todo add 'get some milk' -l groceries
Recall a list
todo lists groceries
This returnes
'get some milk' | due date: tomorrow | priority: high
Mark a task as done
todo finish 'get some milk' -l groceries
Delete a task
todo remove 'get some milk' -l groceries
git checkout -b my-new-feature
)git commit -am 'Add some feature'
)git push origin my-new-feature
)FAQs
Unknown package
We found that 2do demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
Research
Security News
An in-depth analysis of credential stealers, crypto drainers, cryptojackers, and clipboard hijackers abusing open source package registries to compromise Web3 development environments.
Security News
pnpm 10.12.1 introduces a global virtual store for faster installs and new options for managing dependencies with version catalogs.