Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
Many Bitcoin wallets vulnerable to double-spending of confirmed transactions
(bitcoin.org)
110 points
by
aburan28
4 hours ago
|
25 comments
2.
Linux Uprobe: User-Level Dynamic Tracing
(brendangregg.com)
9 points
by
adamnemecek
23 minutes ago
|
discuss
3.
How I met my identity thief
(californiasunday.com)
39 points
by
pepys
3 hours ago
|
11 comments
4.
Graphics Analysis of an NES Game's Select Menu
(dustmop.io)
63 points
by
dustmop
5 hours ago
|
5 comments
5.
Why won’t she get off Minecraft?
(deangroom.wordpress.com)
62 points
by
tux
3 hours ago
|
42 comments
6.
The Fiction of Self-Exposure
(newyorker.com)
12 points
by
benbreen
2 hours ago
|
1 comment
7.
Render realtime RethinkDB results in React
(github.com)
88 points
by
g4k
8 hours ago
|
32 comments
8.
How I’d redesign piano sheet music
(medium.com)
114 points
by
cyanbane
6 hours ago
|
88 comments
9.
Show HN: Silicon Valley Dictionary – Urban Dictionary Meets Silicon Valley
(svdictionary.com)
97 points
by
kilimchoi
4 hours ago
|
30 comments
10.
AWS Best Practices for DDoS Resiliency [pdf]
(awsstatic.com)
65 points
by
chrisacky
8 hours ago
|
26 comments
11.
Five Invaluable Techniques to Improve Regex Performance
(loggly.com)
17 points
by
ScottWRobinson
3 hours ago
|
discuss
12.
Developing Web Applications with Haskell
(docs.google.com)
7 points
by
corey
5 hours ago
|
discuss
13.
Before Wired, There Was the Eccentric “Mondo 2000”
(wired.com)
36 points
by
MilnerRoute
6 hours ago
|
23 comments
14.
Show HN: Another C++ Lua Wrapper
(github.com)
3 points
by
vapourismo
36 minutes ago
|
discuss
15.
What kind of Web Components do we need?
(hiddedevries.nl)
24 points
by
hdv
5 hours ago
|
6 comments
16.
Should I use a Swift struct or a class?
(sealedabstract.com)
40 points
by
ingve
5 hours ago
|
37 comments
17.
Native Kernel Debugging with Acid (2000) [pdf]
(vitanuova.com)
3 points
by
vezzy-fnord
40 minutes ago
|
discuss
18.
Lua client for Elasticsearch
(github.com)
15 points
by
vampire_dk
3 hours ago
|
3 comments
19.
Argentinean programmer's house raided after he found a security breach
(twitter.com)
45 points
by
santiagobasulto
2 hours ago
|
8 comments
20.
The Anti-Mac Interface (1996)
(nngroup.com)
3 points
by
brudgers
52 minutes ago
|
discuss
21.
Scheme 9 interpreter ported to Plan 9 (again)
(t3x.org)
74 points
by
nils-m-holm
12 hours ago
|
30 comments
22.
Elasticsearch: The Definitive Guide
(elastic.co)
5 points
by
singold
1 hour ago
|
discuss
23.
Developer Network Small-C Compiler book on CD-ROM (2005)
(drdobbs.com)
4 points
by
kqr2
4 hours ago
|
discuss
24.
Streams: Mail 3.0 concept
(tonsky.me)
91 points
by
scapbi
12 hours ago
|
50 comments
25.
Symbolic Self-Completion, Attempted Influence, and Self-Deprecation (1981) [pdf]
(interruptions.net)
65 points
by
anacleto
5 hours ago
|
8 comments
26.
The Perfect Pac-Man
(oxfordamerican.org)
24 points
by
JacobAldridge
8 hours ago
|
10 comments
27.
Breakouts: Implementations of the game Breakout in various JavaScript engines
(jsbreakouts.org)
20 points
by
damagednoob
7 hours ago
|
1 comment
28.
Perf for low level Haskell profiling
(fpcomplete.com)
31 points
by
psibi
10 hours ago
|
5 comments
29.
The Underfunded, Disorganized Plan to Save Earth from the Next Giant Asteroid
(vice.com)
31 points
by
fraqed
10 hours ago
|
3 comments
30.
How to Word a Profit Sharing Agreement
14 points
by
neospice
3 hours ago
|
9 comments
More
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: