Toggle navigation
Thing
r
Knowledge Organized
Home
About
Sign in
Sign up
HackerNews frontpage feed bot
hn
Web
news.ycombinator.com
Joined
December 2013
Things (38332)
Links
(38170)
Images
(13)
Videos
(149)
User feed
(72082)
0xabad1dea/rsa-not-buying-it.md
Sorry, RSA, I'm just not buying it - Gist is a simple way to share snippets of text and code with others.
gist.github.com
-
11 years ago
-
How Iron Maiden found its worst music pirates -- then went and played for them
The British heavy metal legends used analytics to determine where the greatest amount of music theft was taking place, then set up gigs in those areas. The result? Sellout shows.
citeworld.com
-
11 years ago
-
Shame On Feinstein
An Open Letter to Senator Feinstein Deploring Her Persistent Denial of the Current Crisis in Surveillance Policy.
shameonfeinstein.org
-
11 years ago
-
Ask HN: Which SaaS apps have the best UI? | Hacker News
news.ycombinator.com
-
11 years ago
-
This Is What It's Like To Be A Tech Geek ... In Prison
"The first assumption that other inmates make is that an older white guy is a pedophile, so the first order of business is showing them your paperwork."
businessinsider.com
-
11 years ago
-
You'll never guess where this FBI agent left a secret interrogation manual
"Security screwups are not very uncommon. But this is a first."
motherjones.com
-
11 years ago
-
"Dark Money" Funds Climate Change Denial Effort: Scientific American
A Drexel University study finds that a large slice of donations to organizations that deny global warming are funneled through third-party pass-through organizations that conceal the original funder
scientificamerican.com
-
11 years ago
-
Show HN: My 10-year-old son has made a card game, which he is giving away | Hacker News
news.ycombinator.com
-
11 years ago
-
FBI agent tries to copyright super-secret torture manual, inadvertently makes it public
The ACLU has spent years in court trying to get a look at a top-secret FBI interrogation manual that referred to the CIA's notorious KUBARK torture manual.
boingboing.net
-
11 years ago
-
Why I spoke out about my sexual assault: Sen. Gretchen Whitmer talks to Salon
"If I was asking my colleague to tell a tough story, I needed to be brave enough to tell my own," senator explains
salon.com
-
11 years ago
-
ReleaseNotes_0.9.6 | Cobra
cobra-language.com
-
11 years ago
-
Distinguishing between yield advances and yield plateaus in historical crop production trends : Nature Communications : Nature Publishing Group
nature.com
-
11 years ago
-
OpenEmu - Multiple Video Game System
Console and Arcade video game emulator for Mac OSX
openemu.org
-
11 years ago
-
bookrev
bookrev
cs.umd.edu
-
11 years ago
-
A Start-Up Moves Teachers Past Data Entry
Clever, a San Francisco start-up, enables teachers to enroll and track students, normally a time-consuming process. Its software is now in 15,000 schools.
bits.blogs.nytimes.com
-
11 years ago
-
CPG Sec. 585.890 Tomato Products - Adulteration with Drosophila Fly Eggs and Maggots
fda.gov
-
11 years ago
-
Cameron's internet filter goes far beyond porn - and that was always the plan
Through secretive negotiations with ISPs, the coalition has divided the internet into 'acceptable' and 'unacceptable' categories and cut people off from huge swathes of it at the stroke of a key.
newstatesman.com
-
11 years ago
-
The NBA's Possible Solution for Tanking: Good-bye to the Lottery, Hello to the Wheel
Nearly the entire history of the NBA suggests that a team wishing to win the title must have one of the 10 or 15 best players alive — and prefer
grantland.com
-
11 years ago
-
New Year of Coding: Learn to Code in 2014 - Alex P. Coleman
Don’t waste any time: start learning to code right away in 2014 So you want to learn to code, but don’t know where to begin? Have you tried sifting through the boatloads of information available on the web, but still felt like you came out with no real...
newyearofcoding.com
-
11 years ago
-
Stolen Target Credit Cards and the Black Market: How the Digital Underground Works - The State of Security
With the Target data breach, many are wondering how criminals can profit from the use of the stolen credit cards. The card holders themselves will not be responsible for any of the charges, so how is it that criminals are able to make money from stolen...
tripwire.com
-
11 years ago
-
«
1
3493
3494
3495
3496
3497
3498
3499
3500
3501
3605
»