Hacker Newsnew | past | comments | ask | show | jobs | submit | danielmiessler's submissionslogin
1.An MVC Primer (danielmiessler.com)
1 point by danielmiessler on Oct 18, 2015 | past
2.A Blockchain Primer (danielmiessler.com)
1 point by danielmiessler on Oct 15, 2015 | past
3.A Collection of Technical Primers (danielmiessler.com)
2 points by danielmiessler on Oct 14, 2015 | past
4.The Real Internet of Things (danielmiessler.com)
2 points by danielmiessler on Oct 8, 2015 | past
5.A tmux Tutorial and Primer (danielmiessler.com)
3 points by danielmiessler on Oct 6, 2015 | past
6.Visual Analytics and Threat Intelligence with Raffael Marty [video] (darkreading.com)
1 point by danielmiessler on Oct 1, 2015 | past
7.Continuous Delivery versus Continuous Deployment (oreilly.com)
1 point by danielmiessler on Oct 1, 2015 | past
8.To Master Vim, Use It Like Language (danielmiessler.com)
250 points by danielmiessler on Oct 1, 2015 | past | 119 comments
9.Derbycon 2015 Videos (irongeek.com)
1 point by danielmiessler on Oct 1, 2015 | past
10.To Master Vim, Use It Like Language (danielmiessler.com)
11 points by danielmiessler on Oct 1, 2015 | past
11.A vim Tutorial and Primer (danielmiessler.com)
3 points by danielmiessler on Sept 28, 2015 | past
12.Git History is Forever (brooksgarrett.com)
1 point by danielmiessler on Sept 11, 2015 | past
13.The 3 Principles of Secure Design Maturity (danielmiessler.com)
1 point by danielmiessler on Sept 10, 2015 | past
14.The Coming Need for Electromagnetic Spectrum Security (ESS) (danielmiessler.com)
1 point by danielmiessler on Sept 9, 2015 | past
15.The Difference Between a Vulnerability Assessment and a Penetration Test (danielmiessler.com)
1 point by danielmiessler on Sept 8, 2015 | past
16.Saying Goodbye to Google Services (danielmiessler.com)
25 points by danielmiessler on Sept 6, 2015 | past | 4 comments
17.Collection of Less Commonly Used Unix Commands (danielmiessler.com)
4 points by danielmiessler on Sept 6, 2015 | past
18.The Problem with Security Conference Training (danielmiessler.com)
2 points by danielmiessler on Sept 5, 2015 | past
19.How Insurance Will Consume Information Security (danielmiessler.com)
2 points by danielmiessler on Sept 4, 2015 | past
20.What the U.S. Should Do with Edward Snowden (danielmiessler.com)
1 point by danielmiessler on July 9, 2015 | past | 2 comments
21.Flattening organizations (oreilly.com)
2 points by danielmiessler on July 8, 2015 | past
22.Real-time analytics within the transaction (oreilly.com)
1 point by danielmiessler on July 7, 2015 | past
23.On Curation and Quality (danielmiessler.com)
1 point by danielmiessler on July 7, 2015 | past
24.The crazy economics of inflight Wi-Fi (fortune.com)
1 point by danielmiessler on July 7, 2015 | past
25.Unpacking technical jargon in machine learning (oreilly.com)
1 point by danielmiessler on July 7, 2015 | past
26.Locust – A modern load testing framework (locust.io)
127 points by danielmiessler on July 1, 2015 | past | 21 comments
27.Stop Being Proud of Complexity (danielmiessler.com)
2 points by danielmiessler on June 30, 2015 | past
28.The Art of Testing Less Without Sacrificing Quality (acolyer.org)
8 points by danielmiessler on June 26, 2015 | past
29.If You're Not Profiling, You're Not Doing Security (danielmiessler.com)
2 points by danielmiessler on June 26, 2015 | past
30.A tcpdump Primer with Examples (danielmiessler.com)
2 points by danielmiessler on June 25, 2015 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: