Hi I'm JD || Cyber Security Student || Learning Full Stack Development || Exploring Linux Commands & Ethical Hacking
<style>
.scrolling-glow {
font-size: 1.8em;
font-weight: bold;
white-space: nowrap;
overflow: hidden;
box-sizing: border-box;
color: #00ffff;
text-shadow: 0 0 5px #00ffff, 0 0 10px #00ffff, 0 0 20px #00ffff, 0 0 40px #00ffff;
animation: scrollText 15s linear infinite, glowFade 2s ease-in-out infinite alternate;
}
/* Scroll from right to left */
@keyframes scrollText {
0% {
transform: translateX(100%);
}
100% {
transform: translateX(-100%);
}
}
/* Glow Fade Animation */
@keyframes glowFade {
0% {
text-shadow: 0 0 5px #00ffff, 0 0 10px #00ffff, 0 0 20px #00ffff, 0 0 40px #00ffff;
opacity: 1;
}
50% {
text-shadow: 0 0 10px #00ffff, 0 0 20px #00ffff, 0 0 40px #00ffff, 0 0 80px #00ffff;
opacity: 0.7;
}
100% {
text-shadow: 0 0 5px #00ffff, 0 0 10px #00ffff, 0 0 20px #00ffff, 0 0 40px #00ffff;
opacity: 1;
}
}
</style>
- π‘οΈ Ethical Hacking Tools (Nmap, Wireshark, etc.)
- π‘ Capture The Flag (CTF) practice
- π Finding bugs and vulnerabilities
π¬ More coming soon... Stay tuned!