Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
Show HN: Generating fantasy maps – an interactive exploration
(
mewo2.com
)
408 points
by
mewo2
4 hours ago
|
hide
|
21 comments
2.
Women’s Gymnastics Deserves Better TV Coverage
(
newyorker.com
)
50 points
by
r-w
1 hour ago
|
hide
|
28 comments
3.
Why It Doesn't Pay to Be a People Pleaser
(
berkeley.edu
)
26 points
by
alwaysmetara
1 hour ago
|
hide
|
11 comments
4.
Show HN: Give 7B people an instant physical address
(
github.com
)
157 points
by
roberdam
4 hours ago
|
hide
|
99 comments
5.
Type Punning Functions in C
(
evanmiller.org
)
13 points
by
heliostatic
28 minutes ago
|
hide
|
1 comment
6.
FreeBSD Core statement on recent freebsd-update and related vulnerabilities
(
freebsd.org
)
51 points
by
werid
2 hours ago
|
hide
|
6 comments
7.
American Bar Association votes to DRM the law, put it behind a EULA
(
boingboing.net
)
89 points
by
walterbell
58 minutes ago
|
hide
|
26 comments
8.
Eliminating the largest cause of death in jetliner accidents
(
bloomberg.com
)
36 points
by
forrest_t
2 hours ago
|
hide
|
5 comments
9.
This JPEG is also a webpage
(
coredump.cx
)
6 points
by
cocoflunchy
28 minutes ago
|
hide
|
discuss
10.
Image Completion with Deep Learning in TensorFlow
(
bamos.github.io
)
62 points
by
semanser
4 hours ago
|
hide
|
2 comments
11.
How does gdb work?
(
jvns.ca
)
236 points
by
deafcalculus
10 hours ago
|
hide
|
39 comments
12.
I don't think the Port Authority would like it if you looked at this photo
(
plus.google.com
)
98 points
by
jrockway
48 minutes ago
|
hide
|
23 comments
13.
Love Logistics? We're changing the way inventory is distributed iCracked (YC W12)
50 minutes ago
|
hide
14.
Gathering honey from a weed (2013)
(
the-life-i-read.blogspot.com
)
9 points
by
aaron695
1 hour ago
|
hide
|
2 comments
15.
Why scaling and parallelism remain hard even with new tools and languages
(
erlang-solutions.com
)
14 points
by
andradinu
2 hours ago
|
hide
|
1 comment
16.
Microsoft proves backdoor keys are a bad idea
(
theregister.co.uk
)
3 points
by
ChuckMcM
16 minutes ago
|
hide
|
discuss
17.
Secure Golden Key Boot
(
rol.im
)
155 points
by
dmitrygr
9 hours ago
|
hide
|
41 comments
18.
Flip Feng Shui: A new cross-VM exploitation vector
(
vusec.net
)
35 points
by
Rafert
4 hours ago
|
hide
|
4 comments
19.
MASSCAN: Mass IP port scanner
(
github.com
)
37 points
by
ntumlin
4 hours ago
|
hide
|
28 comments
20.
Flash and Chrome
(
googleblog.com
)
219 points
by
rayshan
11 hours ago
|
hide
|
128 comments
21.
A TCP weakness in Linux systems allows network traffic hijack
(
isssource.com
)
80 points
by
attilagyorffy
7 hours ago
|
hide
|
15 comments
22.
The boss, not the workload, causes workplace depression
(
sciencenordic.com
)
86 points
by
signa11
2 hours ago
|
hide
|
18 comments
23.
On Cybersecurity and Being Targeted
(
kennethreitz.org
)
237 points
by
kenneth_reitz
13 hours ago
|
hide
|
101 comments
24.
Cursory hack – Fake address bar interaction
(
jameshfisher.github.io
)
70 points
by
benjaminbenben
6 hours ago
|
hide
|
28 comments
25.
R: text analysis of Trump’s tweets
(
r-bloggers.com
)
74 points
by
ingve
2 hours ago
|
hide
|
5 comments
26.
Ask HN: 8 years working, now 3-4 months off to learn. Looking for advice
161 points
by
ramblerman
10 hours ago
|
hide
|
56 comments
27.
Librevault: Open source zero-knowledge peer-to-peer file sync
(
librevault.com
)
18 points
by
im_dario
2 hours ago
|
hide
|
3 comments
28.
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous [pdf]
(
ucr.edu
)
24 points
by
jfindley
5 hours ago
|
hide
|
discuss
29.
Playability Test of 100 Humble Bundle Games on Linux
(
forteller.net
)
146 points
by
unhammer
7 hours ago
|
hide
|
99 comments
30.
Ask HN: What are good reads for designing APIs?
3 points
by
adnanh
14 minutes ago
|
hide
|
1 comment
More
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: