Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
This JPEG is also a webpage
(
coredump.cx
)
135 points
by
cocoflunchy
1 hour ago
|
hide
|
62 comments
2.
Show HN: Generating fantasy maps – an interactive exploration
(
mewo2.com
)
492 points
by
mewo2
5 hours ago
|
hide
|
31 comments
3.
Show HN: Give 7B people an instant physical address
(
github.com
)
195 points
by
roberdam
5 hours ago
|
hide
|
114 comments
4.
Type Punning Functions in C
(
evanmiller.org
)
36 points
by
heliostatic
1 hour ago
|
hide
|
13 comments
5.
FreeBSD Core statement on recent freebsd-update and related vulnerabilities
(
freebsd.org
)
67 points
by
werid
3 hours ago
|
hide
|
7 comments
6.
Microsoft proves backdoor keys are a bad idea
(
theregister.co.uk
)
59 points
by
ChuckMcM
1 hour ago
|
hide
|
10 comments
7.
The Million-Key Question: Investigating the Origins of RSA Public Keys
(
usenix.org
)
14 points
by
dc352
1 hour ago
|
hide
|
discuss
8.
Don Bateman’s terrain mapping device
(
bloomberg.com
)
54 points
by
forrest_t
3 hours ago
|
hide
|
16 comments
9.
Image Completion with Deep Learning in TensorFlow
(
bamos.github.io
)
84 points
by
semanser
5 hours ago
|
hide
|
3 comments
10.
Python 3 on Google App Engine flexible environment now in beta
(
googleblog.com
)
38 points
by
arouzrokh
49 minutes ago
|
hide
|
7 comments
11.
Why It Doesn't Pay to Be a People Pleaser
(
berkeley.edu
)
63 points
by
alwaysmetara
2 hours ago
|
hide
|
33 comments
12.
American Bar Association votes to DRM referenced material made public
(
boingboing.net
)
122 points
by
walterbell
1 hour ago
|
hide
|
51 comments
13.
How does gdb work?
(
jvns.ca
)
254 points
by
deafcalculus
11 hours ago
|
hide
|
42 comments
14.
Gathering honey from a weed (2013)
(
the-life-i-read.blogspot.com
)
17 points
by
aaron695
2 hours ago
|
hide
|
4 comments
15.
Why scaling and parallelism remain hard even with new tools and languages
(
erlang-solutions.com
)
25 points
by
andradinu
3 hours ago
|
hide
|
4 comments
16.
I don't think the Port Authority would like it if you looked at this photo
(
plus.google.com
)
159 points
by
jrockway
1 hour ago
|
hide
|
68 comments
17.
Ask HN: What are good reads for designing APIs?
34 points
by
adnanh
1 hour ago
|
hide
|
17 comments
18.
Secure Golden Key Boot
(
rol.im
)
162 points
by
dmitrygr
10 hours ago
|
hide
|
44 comments
19.
From first principles: Why I bet on Scala.js
(
lihaoyi.com
)
17 points
by
lihaoyi
2 hours ago
|
hide
|
5 comments
20.
Love Logistics? We're changing the way inventory is distributed iCracked (YC W12)
1 hour ago
|
hide
21.
Flash and Chrome
(
googleblog.com
)
227 points
by
rayshan
12 hours ago
|
hide
|
135 comments
22.
Mom macro set for groff
(
schaffter.ca
)
6 points
by
Tomte
1 hour ago
|
hide
|
discuss
23.
Flip Feng Shui: A new cross-VM exploitation vector
(
vusec.net
)
39 points
by
Rafert
5 hours ago
|
hide
|
4 comments
24.
Librevault: Open source zero-knowledge peer-to-peer file sync
(
librevault.com
)
33 points
by
im_dario
3 hours ago
|
hide
|
7 comments
25.
MASSCAN: Mass IP port scanner
(
github.com
)
44 points
by
ntumlin
5 hours ago
|
hide
|
29 comments
26.
A TCP weakness in Linux systems allows network traffic hijack
(
isssource.com
)
89 points
by
attilagyorffy
8 hours ago
|
hide
|
18 comments
27.
The boss, not the workload, causes workplace depression
(
sciencenordic.com
)
111 points
by
signa11
3 hours ago
|
hide
|
24 comments
28.
On Cybersecurity and Being Targeted
(
kennethreitz.org
)
245 points
by
kenneth_reitz
14 hours ago
|
hide
|
106 comments
29.
How to play a lot of different video games with the same algorithm
(
togelius.blogspot.com
)
3 points
by
togelius
50 minutes ago
|
hide
|
1 comment
30.
Distraction Can Make You a Faster Cyclist
(
nautil.us
)
6 points
by
dnetesn
1 hour ago
|
hide
|
2 comments
More
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: