Hacker News new | past | comments | ask | show | jobs | submit | r11t's submissions login
31. The Worrisome State of the Information Security Industry (zeltser.com)
1 point by r11t on Jan 15, 2011 | past
32. Did China's economy overtake the U.S. in 2010? (foreignpolicy.com)
1 point by r11t on Jan 14, 2011 | past
33. 10 Immutable Laws of Security (microsoft.com)
2 points by r11t on Jan 14, 2011 | past
34. Software Craftsmanship, Beyond The Hype (infoq.com)
1 point by r11t on Jan 14, 2011 | past
35. Is Lockheed Martin Shadowing You? (cbsnews.com)
3 points by r11t on Jan 13, 2011 | past | 1 comment
36. Guide to hardening WordPress (codex.wordpress.org)
2 points by r11t on Jan 13, 2011 | past
37. Flowchart : Should you work for Free? (jhische.com)
151 points by r11t on Jan 13, 2011 | past | 30 comments
38. How To Secure a Security Product (acrossecurity.com)
1 point by r11t on Jan 12, 2011 | past
39. Gawker makes a hash of non-ASCII characters in passwords (theregister.co.uk)
2 points by r11t on Jan 12, 2011 | past
40. BIOS Password Backdoors in Laptops (dogber1.blogspot.com)
3 points by r11t on Jan 11, 2011 | past
41. Concurrency in Go: A Call Center Tutorial (mprescient.com)
1 point by r11t on Jan 11, 2011 | past
42. PlayStation 3 hack – how it happened and what it means (guardian.co.uk)
1 point by r11t on Jan 10, 2011 | past
43. Tricks For Defeating SSL In Practice (blackhat.com)
2 points by r11t on Jan 10, 2011 | past
44. Invisible IP Addresses (fnsecurity.blogspot.com)
1 point by r11t on Jan 10, 2011 | past
45. With Autos At CES, Are Vehicle Hacks Far Behind? (threatpost.com)
1 point by r11t on Jan 9, 2011 | past
46. Vim offers strong file encryption with Blowfish (techrepublic.com.com)
2 points by r11t on Jan 8, 2011 | past
47. Designs, Lessons and Advice from Building Large Distributed Systems (cornell.edu)
6 points by r11t on Jan 8, 2011 | past
48. Feds charge two for allegedly exploiting video poker bug (arstechnica.com)
2 points by r11t on Jan 7, 2011 | past | 1 comment
49. Specifying That a Server Supports TLS (ietf.org)
1 point by r11t on Jan 6, 2011 | past
50. Infiltrating a Botnet (cisco.com)
2 points by r11t on Jan 6, 2011 | past | 1 comment
51. Dubai assassins used email trojan to track Hamas victim (theregister.co.uk)
3 points by r11t on Jan 6, 2011 | past
52. A Vulnerability in My Heart
1 point by r11t on Jan 6, 2011 | past
53. So You Like Big Data… (thenoisychannel.com)
2 points by r11t on Jan 4, 2011 | past
54. Rename all jpeg files by their exposure date (Bash) (neverfear.org)
1 point by r11t on Jan 4, 2011 | past
55. Scalable memory allocation using jemalloc (facebook.com)
125 points by r11t on Jan 3, 2011 | past | 11 comments
56. Crash Data for Mozilla Firefox (crash-stats.mozilla.com)
3 points by r11t on Jan 3, 2011 | past
57. Adding ASLR (Address space layout randomization) to Jailbroken iPhones (antid0te.com)
3 points by r11t on Jan 3, 2011 | past
58. Fast Web Performance Starts with DNS (circleid.com)
4 points by r11t on Jan 3, 2011 | past
59. Android Reverse Engineering (thomascannon.net)
67 points by r11t on Jan 2, 2011 | past | 11 comments
60. Preliminary patch for OpenCL support in John The Ripper (openwall.com)
1 point by r11t on Jan 1, 2011 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: