Toggle navigation
Thing
r
Knowledge Organized
Home
About
Sign in
Sign up
HackerNews frontpage feed bot
hn
Web
news.ycombinator.com
Joined
December 2013
Things (38332)
Links
(38170)
Images
(13)
Videos
(149)
User feed
(72082)
Securing the Network Time Protocol - ACM Queue
queue.acm.org
-
11 years ago
-
SEO penalties of moving our blog to a subdomain
iwantmyname.com
-
11 years ago
-
Cameras, Goodbye
Photography in the age of the iPhone
craigmod.com
-
11 years ago
-
DNSdumpster.com - dns recon and research, find and lookup dns records
Find dns records in order to identify the Internet footprint of an organization. Recon that enables deeper security assessments and understanding of the potential attack surface.
dnsdumpster.com
-
11 years ago
-
The Case of the Vanishing Private Eyes
How 19th-century America's biggest, most dogged detective agency went on to get unceremoniously acquired 100 years later by a Swedish conglomerate
theatlantic.com
-
11 years ago
-
link
lavryengineering.com
-
11 years ago
-
How to Make a Bouncing Ball Game
DS PROGRAMMING TUTORIAL
ekid.nintendev.com
-
11 years ago
-
Build and Explore Twitter Lists - Electoral
Electoral provides tools to quickly build powerful Twitter Lists to stay up to date on your interests and find the right people to listen to.
electoralhq.com
-
11 years ago
-
ZALA films: Counting from Infinity
zalafilms.com
-
11 years ago
-
An early modern color guide
As I was answering a reference question yesterday relating to heraldic funeral processions in Folger MS V.a.447---a heraldic miscellany written by John Guillim shortly after he was made Portsmouth ...
collation.folger.edu
-
11 years ago
-
Chicago's Gangster Past, Minus the Romance
A collection of photographs from the <em>Chicago Tribune</em> archives rejects spectacle in favor of brutal, messy truth.
citylab.com
-
11 years ago
-
SpaceX Has Pinpointed The Problem That Caused The Falcon9 Rocket To Crash Land
Most of the rocket was not recovered.
businessinsider.com
-
11 years ago
-
Don’t leave developers in the dark
As a teenager, I remember playing strategy games like X-COM, Civilization, and Red Alert. These games use a mechanic known as "the fog of war." When a player starts the game, they are immersed in a...
sprint.ly
-
11 years ago
-
In the loop, all the time
Waldo is a window into your best friends' lives
trywaldo.com
-
11 years ago
-
Issue 128 - google-security-research - Windows: Impersonation Check Bypass With CryptProtectMemory and CRYPTPROTECTMEMORY_SAME_LOGON flag - Google Security Research - Google Project Hosting
code.google.com
-
11 years ago
-
A twist on planetary origins
New study finds meteorites were byproducts of planetary formation, not building blocks.
newsoffice.mit.edu
-
11 years ago
-
[1501.02876] Deep Image: Scaling up Image Recognition
arxiv.org
-
11 years ago
-
Unprecedented Level of Human Harm to Sea Life Is Forecast
Scientists find what they say are clear signs that humans are beginning to damage oceans on an unprecedented scale.
nytimes.com
-
11 years ago
-
PipelineDB (YC W14) is hiring engineers | Hacker News
news.ycombinator.com
-
11 years ago
-
link
kkbooks.net
-
11 years ago
-
«
1
1249
1250
1251
1252
1253
1254
1255
1256
1257
3605
»