Hacker Newsnew | past | comments | ask | show | jobs | submit | reader_1000's submissionslogin
1.Dental flossing may lower risk of stroke from blood clots, irregular heartbeats (heart.org)
2 points by reader_1000 9 months ago | past
2.Twin Films (wikipedia.org)
2 points by reader_1000 on Dec 29, 2024 | past
3.Are All ByteBuffers Equal? (github.com/kullanici0606)
1 point by reader_1000 on Feb 5, 2024 | past
4.Hints and Principles for Computer System Design [pdf] (microsoft.com)
5 points by reader_1000 on Dec 9, 2020 | past | 2 comments
5.Sort function C++ segmentation fault (stackoverflow.com)
2 points by reader_1000 on Sept 29, 2020 | past | 1 comment
6.The EMV Standard: Break, Fix, Verify (emvrace.github.io)
2 points by reader_1000 on Aug 27, 2020 | past
7.Install Linux from a running Windows system, without need for a live USB (github.com/mikeslattery)
195 points by reader_1000 on June 13, 2020 | past | 66 comments
8.We abused Slack's TURN servers to gain access to internal services (rtcsec.com)
381 points by reader_1000 on April 7, 2020 | past | 78 comments
9.New action to disrupt world’s largest online criminal network (blogs.microsoft.com)
2 points by reader_1000 on March 10, 2020 | past
10.Psychological Research on Conspiracy Beliefs: Associations W. Personality Traits (frontiersin.org)
1 point by reader_1000 on Jan 13, 2020 | past | 1 comment
11.Reversing a real-world 249 bytes backdoor (anee.me)
57 points by reader_1000 on Dec 22, 2019 | past | 6 comments
12.Fortinet SSL VPN vulnerability from May 2019 being exploited in wild (opensecurity.global)
3 points by reader_1000 on Aug 22, 2019 | past
13.Where Are the Startups? Loss of Dynamism Is Impeding Growth (nytimes.com)
2 points by reader_1000 on Feb 6, 2018 | past
14.Q&A with PHK: Integrating H/2 into Varnish Cache (varnish-software.com)
2 points by reader_1000 on May 16, 2016 | past
15.How InfoSec Security Controls Create Vulnerability (technet.microsoft.com)
1 point by reader_1000 on March 11, 2016 | past | 1 comment
16.Gfverif: fast and easy verification of finite-field arithmetic (cryptojedi.org)
7 points by reader_1000 on Jan 1, 2016 | past | 1 comment
17.Bad life advice – Replay attacks against HTTPS (valverde.me)
2 points by reader_1000 on Dec 16, 2015 | past
18.A decisionmaker's guide to buying security appliances and gateways (addxorrol.blogspot.com)
8 points by reader_1000 on Dec 16, 2015 | past | 2 comments
19.Visual Representation of SQL Joins (2009) (codeproject.com)
2 points by reader_1000 on Dec 12, 2015 | past
20.CVE-2015-5327 kernel: User triggerable out-of-bounds read (openwall.com)
1 point by reader_1000 on Nov 30, 2015 | past
21.Totally Isolated TLS Unwrapping Server (opsmate.com)
45 points by reader_1000 on Nov 22, 2015 | past | 19 comments
22.Are there any negative consequences to having a ton of files on the desktop? (msdn.com)
2 points by reader_1000 on Oct 26, 2015 | past
23.“gcc will quietly break nearly half of all the packages that it compiles” (metzdowd.com)
71 points by reader_1000 on Oct 24, 2015 | past | 106 comments
24.Varnish Wishlist (kly.no)
4 points by reader_1000 on Sept 28, 2015 | past
25.Offline Windows Password and Registry Editor (pogostick.net)
1 point by reader_1000 on Sept 14, 2015 | past
26.Double-slit experiment (wikipedia.org)
2 points by reader_1000 on June 13, 2015 | past
27.Optimization Considerations: Rebuilding this site (nickcraver.com)
1 point by reader_1000 on April 2, 2015 | past
28.The Worst Day of Your Life [pdf] (thebuild.com)
1 point by reader_1000 on Feb 16, 2015 | past
29.One-stop performance analysis using atop (lwn.net)
34 points by reader_1000 on Dec 19, 2014 | past | 4 comments
30.Scalable Event Multiplexing: epoll vs. kqueue (2012) (eecs.berkeley.edu)
1 point by reader_1000 on Dec 8, 2014 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: