First Firefox Extension with Kotlin Javascript

Kotlin, my favourite programming language, has seen a fast adoption on platforms like Android or Server where the code is compiled to Java bytecode. However, as Kotlin also supports compilation to Javascript, the language is starting to receive attention in the Web ecosystem as well. So today i am going to show you How to create Firefox Extension Using KotlinJS.

While some content on writing web applications in Kotlin has been published, the niche of writing browser extensions has seemed to be ignored until now. That’s why in this post we are going explore the process of writing a simple extension for Firefox using Kotlin JS.

You must see this : Top 20 Daily used Kotlin Code Snippet

How to Create Firefox Extension Using KotlinJS?

The extension is based on Your first extension by Mozilla and will simply add a red border to the website.


For testing our Firefox extension, we will use the web-ext tool from Mozilla. To obtain it you need to install node.js and then run the following command in a terminal:

  1. npm install –global web-ext

Apart from that, we will be using IntelliJ IDEA 2017.2.6 with the Kotlin plugin version 1.1.60 to develop the extension.

You must aware of it : Kotlin Problems and How to avoid them?

Setting up the project with KotlinJS

Creating a new project using the KotlinJS (JavaScript) variant

In Intelli IDEA, we create a new Gradle based project and check the Kotlin (JavaScript) option.

We proceed through the wizard until the empty project is created and opened.

As the next step, we will enable the Dead Code Elimination plugin for KotlinJS. This is necessary because a Kotlin JS program needs to bundle the Kotlin stdlib which is over a megabyte in size. However, we can reduce the size of our compiled code drastically by removing code that’s never getting called.

You must see : Bye bye Gradle and Maven !! Say hello Kotlin Kobalt

To enable the plugin, simply add the following line to the build.gradle file.

  1. apply plugin: ‘kotlin-dce-js’

Creating the extension manifest

In the next step, we add the manifest file which is required for a Firefox extension. This fileis called manifest.json and resided in the root directory of our project. The file should have the following content.


“manifest_version”: 2,

“name”: “Kotlin Borderify”,

“version”: “1.0”,

“description”: “Adds a red border to”,

“content_scripts”: [


“matches”: [



“js”: [







In this file we declare that our extension will inject a content script in any website matching the pattern *://* . The necessary script files are are the Kotlin stdlib kotlin.js as well as our code in the kt-borderify.js file.

Full article and Source :


Justice League Movie Review

Justice League
Justice League

Today i am going to share Review and Rating of recent release movie Justice League.  It’s better than Batman v Superman. But it’s more successful as a trailer for Aquaman or TheFlash than as a movie of its own.

Justice League

Fueled by his restored faith in humanity and inspired by Superman’s selfless act, Bruce Wayne enlists the help of his newfound ally, Diana Prince, to face an even greater enemy.

FilmFed : Justice League Reviews & Ratings
FilmFed : Justice League Reviews & Ratings


Zack Snyder


Chris Terrio (screenplay by), Joss Whedon (screenplay by)


Ben Affleck

Let’s discuss what internet says about this movie:



As both a Marvel and Dc fan, this movie exceed all of expectations. Such a great hype and action packed film. I loved every single character and how well they developed together. I would see this movie 10 more times!! The only flaws I saw with the movie was some CGI but hey. Not every movie is perfect, the visuals were amazing and was just a epic movie to sit and watch and bring to life finally.

Rotten Tomatoes


Justice League leaps over a number of DC movies, but its single bound isn’t enough to shed the murky aesthetic, thin characters, and chaotic action that continue to dog the franchise.

Everyone involved in making “Justice League,” and everyone who will eventually see it, deserved something better than this.




Google Pixel 2 XL vs iPhone X: Which phone win the battle?

Google is challenging Apple with its second generation of smartphones, the Pixel 2. The Pixel 2 XL is the one closest in size to the iPhone X

Apple’s iPhone X and Google’s Pixel 2 XL has something common which both aiming to be come with the best smartphones on the market, and we’re all desperately waiting to be released.

maxresdefault (1).jpg

Both leading mobile company use very different OLED displays from different manufacturers. How do they compare and which is the best?


Let’s find out who will winner of this battle by some comparison which are given below :


The competition for displays is a close one between the iPhone X and Pixel 2 XL.

DISPLAY Pixel 2 XL iPhone X
Screen size (inches) 6.00 5.80
Resolution 1440×2880 pixels 1125×2436 pixels

According to above table Pixel 2 XL take a valuable lead against iPhone X.

See this also : Android Oreo Vs iOS 11 : Comparison you should know about this


The battery competition isn’t so close.

BATTERY Pixel 2 XL iPhone X
Battery capacity (mAh) 3520 2716
Removable battery No No
Weight (g) 175.00 174.00

The Pixel 2 XL packs a serious 3,520mAh battery that Google says can get up to seven hours of life in just 15 minutes of charging and took another lead against iPhone X.


A killer flagship phone needs a killer camera. Google and Apple both know this. iPhones always come with an impressive camera that Android cameras try to beat.

CAMERA Pixel 2 XL iPhone X
Rear camera 12.2-megapixel 12-megapixel
Flash Yes Yes
Front camera 8-megapixel 7-megapixel

Pixel 2 XL has high number features in this section also but due to iPhone’s camera quality reputations. iPhone X got a lead and battle is on 2-1 now.


Perhaps the most distinct and hardest to compare aspects of the Pixel 2 XL and iPhone X are the hardware inside and the software they run.

HARDWARE Pixel 2 XL iPhone X
Processor 1.9GHz octa-core hexa-core
Processor make Qualcomm Snapdragon 835 Apple A11 Bionic
Internal storage 64GB 64GB
Expandable storage No No
Expandable storage type
Expandable storage up to (GB)

Performance of the iPhone X is a bit more clear. The iPhone 8 and iPhone 8 Plus are already out, and they run the same operating system and hexa-core A11 Bionic chipset that come in the iPhone X. It snatched another one point with great comeback. Point is 2-2 now.


SENSORS Pixel 2 XL iPhone X
Compass/ Magnetometer Yes No
Proximity sensor Yes Yes
Accelerometer Yes Yes
Ambient light sensor Yes Yes
Gyroscope Yes Yes
Barometer Yes Yes
Temperature sensor No No

Google’s Pixel 2 XL take lead due to they have extra Compass/ Magnetometer sensor and now point table is elevate towards Google phone with 3-2 points.


Wi-Fi standards supported 802.11 a/b/g/n/ac 802.11 a/b/g/n/ac
Bluetooth Yes, v 5.00 Yes, v 5.00
NFC Yes Yes
Number of SIMs 1 1
SIM Type Nano-SIM Nano-SIM
4G/LTE Yes Yes

Connectivity configuration is all equal so we decide to give one-one point to both.


Comparing the iPhone X and the Pixel 2 XL and naming a winner is just as hard as comparing iOS and Android. They’re two different beasts, and each has ways of beating the other depending on what they’re competing over.

Points 4 3

When we get our hands on review units, we’ll have a better idea of which phone is really the best, but there’s no doubt both will be great.

Review : Password Recovery Software

You can easily get access to your system even when you do not remember the password. All you need to do in this situation is use the appropriate password recovery software and unlock your computer. There are many paid versions of software available in the market that can accomplish this task within no time.
Free Password Recovery Software Reviews
However, you can initially try your luck with the free resources and see if they can unlock your system. By choosing the leading password recovery programs available in the market, you can easily get this done without any investment.
The best part about choosing such software is that you need not have any technical expertise to get access to the locked computer. These programs are very simple to use and you can easily use them on most versions of Windows systems.
See the full post here >> Free Password Recovery Software Reviews
Considering all the features of these programs, you will notice that each one has its own advantages and you can choose them according to your convenience and individual requirements.
When you have lost access completely to your computer, you can initially choose the login password recovery software and gain entry to your system. Once you have done this, you can choose other options for data recovery if it is needed and restore the lost data on your system.
This can also restore the data that is lost due to accidental file deletion or format issues. It is always a good idea to choose open source programs for this purpose as there is no need to spend lots of money on expensive software to gain access to your locked computer.

Which Android Dependency Injection is best?

This post is a summary of first impressions of a few android related frameworks that we (Tell Me How Blog) tried out during a competences session recently.

What is Android Dependency Injection?


“Dagger constructs instances of your application classes and satisfies their dependencies. ”
Dagger is a dependency injection framework, unfortunately most of us did not manage to setupdagger or failed to get dagger running once setup. So I can not give a proper overview of dagger2.
Read more:


“Annotate fields with @InjectView and a view ID for Butter Knife to find and automatically cast the corresponding view in your layout.”
Butterkife is a view injection lib for android. As such it only handles injection of view components and does this using a InjectView annotation. So some boilerplate is removed and less code has to be written. Some of us found the result a bit harder to read and in some cases the reduction of code was not noticeably, but this is most likely true for the other injection frameworks to and not something specific for Butterknife. Setup was easy with just one dependency. Stack-traces was reportedly difficult to read when Butterknife was used.
Read more:

RoboGuice 3

“RoboGuice 3 takes the guesswork out of development. Inject your View, Resource, System Service, or any other object, and let RoboGuice 3 take care of the details.”
RoboGuice 3 is similar to AndroidAnnotations and Butterknife, easy to setup, two dependency’s needs to be added to the build file. This framework seems like it should be easy to use if you are already familiar with Guice, and even if you don’t its not that hard to understand and use. It is similar to the other dependency injection frameworks that you don’t get all that much for your money, but it’s easy to use and removes some boilerplate. The documentation could use a touch-up.
Read more:

Final Verdict:

The views on the frameworks above is the result of a 3 hour session where we tried them out and had a short discussion about each of them to sum up the experiences. Given the limited time we spent on each of the frameworks we might have missed some important things, if you find and mistakes or are missing some important information please post a comment below.

Read more >> Comparison of All Android Dependency Injection 


The user interface often contains a lot of cluttered code primarily because of the complicated logic it needs to handle. The presentation patterns are design primarily with one objective in mind, reducing the complex code in the presentation layer and making the code in the user interface clean and manageable.

In this post, I will present a discussion on the MVC, MVP, and MVVM design patterns and highlight when one should be the design of choice over the other.

Model View Controller

The Model View Controller (commonly known as MVC) framework helps you to build applications that are easier to test and maintain. It comprises of three major components, namely:

  1. Model — this is the layer that represents the application’s data
  2. View — this represents the presentation or the user interface layer
  3. Controller — this layer typically contains the business logic of your application

The primary objective of the MVC design pattern is separation of concerns to facilitate testability. The Model View Controller design pattern enables you to isolate the concerns and makes your application’s code easier to test and maintain. In a typical MVC design, the request first arrives at the controller which binds the model with the corresponding view. In the MVC design pattern, the view and the controller makes use of strategy design and the view and the model are synchronized using the observer design. Hence, we may say that MVC is a compound pattern. The controller and the view are loosely coupled and one controller can be used by multiple views. The view subscribes to the changes in the model.

Model View Presenter

The MVP (Model View Presenter) design pattern also comprises of three components – the model, the view and the presenter. In the MVP design pattern, the Controller (in MVC) is replaced by the Presenter.

You can see : Android MVP Pattern Example

Unlike the MVC design pattern, the Presenter refers back to the view due to which mocking of the view is easier and unit testing of applications that leverage the MVP design pattern over the MVC design pattern are much easier. In the MVP design pattern, the presenter manipulates the model and also updates the view. There are two variations of this design. These include the following.

  1. Passive View — in this strategy, the view is not aware of the model and the presenter updates the view to reflect the changes in the model.
  2. Supervising Controller — in this strategy, the view interacts with the model directly to bind data to the data controls without the intervention of the presenter. The presenter is responsible for updating the model. It manipulates the view only if needed — if you need a complex user interface logic to be executed.

While both these variants promote testability of the presentation logic, the passive view variant is preferred over the other variant (supervising controller) as far as testability is concerned primarily because you have all the view updated logic inside the presenter.

The MVP design pattern is preferred over MVC when your application needs to provide support for multiple user interface technologies. It is also preferred if you have complex user interface with a lot of user interaction. If you would like to have automated unit test on the user interface of your application, the MVP design pattern is well suited and preferred over the traditional MVC design.

Model – View – ViewModel (MVVM)

The Model – View – ViewModel (MVVM) is a variation of Martin Fowler’s Presentation Model design pattern. The MVVM is a refinement of the popular MVC design and the ViewModel in MVVM is used to facilitation Presentation Separation. In the MVVM the logic is stored in the presenter and the view is completely isolated from the model.

See this : Top 10 Programming Architectural Patterns

While the presenter isn’t aware of the view, the view is aware of the presenter — the presenter in MVVM is used to represent an abstract view of the user interface. A passive view implies that the view doesn’t have any knowledge of the model. In the MVVM design pattern, the View is active and contains behaviors, events and data binding information. Note that the view in MVVM is not responsible for managing the state information — the view is rather synchronized with the viewmodel. The viewmodel in MVVM is responsible for presentation separation and exposes methods and commands to manage the state of a view and manipulate the model.

How does the view and the viewmodel in MVVM communicate? Well, the view and the viewmodel in MVVM communicates using methods, properties and events. The bi-directional databinding or the two way databinding between the view and the viewmodel ensures that the models and properties in the viewmodel is in sync with the view. The MVVM design pattern is well suited in applications that need support for bi-directional databinding.

Google Play Protect – New Security features 

Thanks to the increasing number of security holes and increased number of cyber attacks, protecting your phone is more important than ever before.

Google knows this so they’ve begun rolling out Google Play Protect which was originally announced at I/O 2017.

Essentially a part of the company’s existing security services, Google Play Protect begins rolling out today to Google Mobile Services 11 and up. You can find out which version of Google Mobile Services your device is running by heading to Settings > Google > Security > Verify Apps.

You can read some comparison with Google Oreo :

Compared to the existing security services,Play Protect is more visible and better highlights the security it’s providing.

Google says it will automatically scan apps from the Play Store that are installed on your phone to ensure they’re safe; any apps that don’t measure up will either be blocked or removed from your device.

Play Protect is still rolling out to the Google Play Store and will appear in the Updates section.  Apps will soon also include a “Verified by Google Play Protect” badge to help reassure you.

The security system that never sleeps

Google Play Protect continuously works to keep your device, data and apps safe. It actively scans your device and is constantly improving to make sure that you have the latest in mobile security. Your device is automatically scanned around the clock to give you peace of mind.

One less worry for over a billion users

Backed by the strength of Google, Play Protect brings control to your fingertips while giving guidance along the way. Together, we lay out the ideal security blanket for your mobile device. Consider yourself covered.

Control within reach, even if your device isn’t

If you’ve misplaced your device, just take a breath. Find My Device has you covered. You can locate your device by signing into your Google account, or even call it directly from your browser. Lock your phone remotely or display a message on the lock screen, so that if someone finds it they know whom to contact. If you’re convinced it’s lost for good, you can erase all your data. Crisis averted.