2014 Archive
1771.
Everything you need to know about cryptography in 1 hour (2010) [pdf] (daemonology.net)
1772.
LibreSSL: FIPS mode is not coming back (marc.info)
1773.
Facebook's std::vector optimization (github.com)
1774.
You Got Your Web Browser in my Compiler (randomascii.wordpress.com)
1775.
Smart Guy Productivity Pitfalls (bookofhook.blogspot.de)
1776.
Hard disk hacking (spritesmods.com)
1777.
Ask HN: What small webapps do you know that have a large audience?
1778.
Burnout (kristinn.ghost.io)
1779.
How to throttle the FCC to dial up modem speeds (gist.github.com)
1780.
Even with 2FA, Google accounts can be hacked with just a phone number (ello.co)
1781.
Once Celebrated in Russia, Programmer Pavel Durov Chooses Exile (nytimes.com)
1782.
Send money to debit cards (stripe.com)
1783.
2048 in 4D (huonw.github.io)
1784.
Ask HN: How best to learn software design principles?
1785.
“The Mill” – It just might Work (jakob.engbloms.se)
1786.
Seznam, a Czech search company, previews 3D maps (beta.mapy.cz)
1787.
Frequency (xkcd.com)
1788.
Nginx has replaced Apache as the most used web server among the top 10,000 sites (w3techs.com)
1789.
Building Good Docker Images (jonathan.bergknoff.com)
1790.
Remy – Computer-generated TCP congestion algorithm (web.mit.edu)
1791.
How the NSA Threatens National Security (schneier.com)
1792.
Soda May Age You as Much as Smoking (time.com)
1793.
Wanna know what product your competitor is working on? Try Slack (tanay.co.in)
1794.
For Sale: 50,000 Bitcoins (usmarshals.gov)
1795.
Tell HN: Server Status
1796.
Powerful, highly stealthy Linux trojan may have infected victims for years (arstechnica.com)
1797.
Tabnabbing: A New Type of Phishing Attack (2010) (azarask.in)
1798.
US cybercrime laws being used to target security researchers (theguardian.com)
1799.
Snowden Documents Reveal Surveillance and Pressure Tactics Aimed at WikiLeaks (firstlook.org)
1800.
Phoenix – Elixir Web Framework (github.com)