Hacker Newsnew | comments | show | ask | jobs | submit login
1.
Many Bitcoin wallets vulnerable to double-spending of confirmed transactions (bitcoin.org)
110 points by aburan28 4 hours ago | 25 comments
2.
Linux Uprobe: User-Level Dynamic Tracing (brendangregg.com)
9 points by adamnemecek 23 minutes ago | discuss
3.
How I met my identity thief (californiasunday.com)
39 points by pepys 3 hours ago | 11 comments
4.
Graphics Analysis of an NES Game's Select Menu (dustmop.io)
63 points by dustmop 5 hours ago | 5 comments
5.
Why won’t she get off Minecraft? (deangroom.wordpress.com)
62 points by tux 3 hours ago | 42 comments
6.
The Fiction of Self-Exposure (newyorker.com)
12 points by benbreen 2 hours ago | 1 comment
7.
Render realtime RethinkDB results in React (github.com)
88 points by g4k 8 hours ago | 32 comments
8.
How I’d redesign piano sheet music (medium.com)
114 points by cyanbane 6 hours ago | 88 comments
9.
Show HN: Silicon Valley Dictionary – Urban Dictionary Meets Silicon Valley (svdictionary.com)
97 points by kilimchoi 4 hours ago | 30 comments
10.
AWS Best Practices for DDoS Resiliency [pdf] (awsstatic.com)
65 points by chrisacky 8 hours ago | 26 comments
11.
Five Invaluable Techniques to Improve Regex Performance (loggly.com)
17 points by ScottWRobinson 3 hours ago | discuss
12.
Developing Web Applications with Haskell (docs.google.com)
7 points by corey 5 hours ago | discuss
13.
Before Wired, There Was the Eccentric “Mondo 2000” (wired.com)
36 points by MilnerRoute 6 hours ago | 23 comments
14.
Show HN: Another C++ Lua Wrapper (github.com)
3 points by vapourismo 36 minutes ago | discuss
15.
What kind of Web Components do we need? (hiddedevries.nl)
24 points by hdv 5 hours ago | 6 comments
16.
Should I use a Swift struct or a class? (sealedabstract.com)
40 points by ingve 5 hours ago | 37 comments
17.
Native Kernel Debugging with Acid (2000) [pdf] (vitanuova.com)
3 points by vezzy-fnord 40 minutes ago | discuss
18.
Lua client for Elasticsearch (github.com)
15 points by vampire_dk 3 hours ago | 3 comments
19.
Argentinean programmer's house raided after he found a security breach (twitter.com)
45 points by santiagobasulto 2 hours ago | 8 comments
20.
The Anti-Mac Interface (1996) (nngroup.com)
3 points by brudgers 52 minutes ago | discuss
21.
Scheme 9 interpreter ported to Plan 9 (again) (t3x.org)
74 points by nils-m-holm 12 hours ago | 30 comments
22.
Elasticsearch: The Definitive Guide (elastic.co)
5 points by singold 1 hour ago | discuss
23.
Developer Network Small-C Compiler book on CD-ROM (2005) (drdobbs.com)
4 points by kqr2 4 hours ago | discuss
24.
Streams: Mail 3.0 concept (tonsky.me)
91 points by scapbi 12 hours ago | 50 comments
25.
Symbolic Self-Completion, Attempted Influence, and Self-Deprecation (1981) [pdf] (interruptions.net)
65 points by anacleto 5 hours ago | 8 comments
26.
The Perfect Pac-Man (oxfordamerican.org)
24 points by JacobAldridge 8 hours ago | 10 comments
27.
Breakouts: Implementations of the game Breakout in various JavaScript engines (jsbreakouts.org)
20 points by damagednoob 7 hours ago | 1 comment
28.
Perf for low level Haskell profiling (fpcomplete.com)
31 points by psibi 10 hours ago | 5 comments
29.
The Underfunded, Disorganized Plan to Save Earth from the Next Giant Asteroid (vice.com)
31 points by fraqed 10 hours ago | 3 comments
30.
How to Word a Profit Sharing Agreement
14 points by neospice 3 hours ago | 9 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: