Hacker News
@hackernewslive
24.5K
subscribers
216K
links
Download Telegram
Join
Hacker News
24.5K subscribers
Hacker News
Intel vs. Samsung vs. TSMC
Article
,
Comments
Semiconductor Engineering
Intel Vs. Samsung Vs. TSMC
Foundry competition heats up in three dimensions and with novel technologies as planar scaling benefits diminish.
👍
2
🌭
2
Hacker News
Letsencrypt Supports Wildcard Certificates
Article
,
Comments
letsencrypt.org
FAQ
This FAQ is divided into the following sections:
General Questions Technical Questions General Questions What services does Let’s Encrypt offer? Let’s Encrypt is a global Certificate Authority (CA). We let people and organizations around the world obtain…
👍
17
🥱
4
❤
2
🌭
1
Hacker News
Deluge of Fake Mac App Store Reviews
Article
,
Comments
🌭
4
Hacker News
Managing Classic Mac OS Resources in ResEdit
Article
,
Comments
The Eclectic Light Company
Managing Classic Mac OS resources in ResEdit
Classic Mac OS stored a great deal of structured data in the resource forks of its files. Those were edited using ResEdit, an essential tool for every advanced user.
🥰
6
🌭
1
Hacker News
Exercise: Minesweeper in 100 lines of Ruby
Article
,
Comments
Radan Skorić’s website
Exercise: Minesweeper in 100 lines of clean Ruby
This article is part 1. Part 2 uses code from this article to make the game multiplayer using Rails and Hotwire.
🌭
3
👏
1
Hacker News
X.com
refuses to open with Firefox strict tracking protection enabled
Article
,
Comments
X (formerly Twitter)
X. It’s what’s happening
From breaking news and entertainment to sports and politics, get the full story with all the live commentary.
🥰
29
🤬
18
🖕
7
🤡
5
👍
2
🤮
2
🌭
2
Hacker News
The Luckfox Pico Mini B – Linux in a Thumbnail
Article
,
Comments
Tao of Mac
The Luckfox Pico Mini B
A while back during my spate of RK3588 reviews, I came across Luckfox and found their development boards intriguing, since they were markete...
❤
6
🌭
1
Hacker News
"Maxwell's equations of software" examined (2008)
Article
,
Comments
Righto
"Maxwell's equations of software" examined
A recent post quotes Alan Kay's statement that expressing Lisp in itself is the " Maxwell's Equations of Software ": Yes, that was the bi...
🌭
2
Hacker News
Former Bungie, Pokémon lawyer explains how they caught leakers
Article
,
Comments
Bloomberg.com
Former Bungie, Pokémon Lawyer Explains How They Caught Leakers
A veteran investigator of video-game leaks reveals the tricks of the trade
🤣
4
👍
3
👎
3
🤔
1
🤬
1
🌭
1
Hacker News
How to use the new counted_by attribute in C (and Linux)
Article
,
Comments
Gustavo A. R. Silva
How to use the new counted_by attribute in C (and Linux) — Gustavo A. R. Silva
The counted\by attribute The countedby attribute was introduced in Clang-18 and will soon be available in GCC-15. Its purpose is to as...
👍
8
🤔
2
😁
1
🌭
1
Hacker News
"Any sufficiently bad software update is indistinguishable from a cyberattack"
Article
,
Comments
X (formerly Twitter)
Leigh Honeywell (more at @hypatia.bsky.social) (@leighhoneywell) on X
Any sufficiently bad software update is indistinguishable from a cyberattack…
😁
25
👍
12
🌭
3
👎
1
🤔
1
Hacker News
What is the significance of the character "j" at the end of a Roman Numeral?
Article
,
Comments
Genealogy & Family History Stack Exchange
What is the significance of the character "j" at the end of a Roman Numeral?
While using an old (1907) book of trannoscriptions (on-line) The Parish Register of Gargrave in the County of York , I was puzzled by the number of dates recorded in the 16th and early 17th centuries...
👍
11
✍
3
👎
1
🌭
1
Hacker News
Ridiculous vulnerability disclosure process with CrowdStrike Falcon [2022]
Article
,
Comments
Modzero
Ridiculous vulnerability disclosure process with CrowdStrike Falcon Sensor | mod%log
We found a security related issue in most recent CrowdStrike Falcon Sensor. The bug itself is not worth a blogpost, as the severity is pretty low. However, we'd like to shed some light on a vulnerability submission and disclosure process with CrowdStrike:…
🤣
7
👌
6
👍
2
🌭
1
Hacker News
rr – record and replay debugger for C/C++
Article
,
Comments
🤔
4
🌭
2
👀
2
👍
1
Hacker News
Syscall.sh
Article
,
Comments
Linux System Calls quick and easy
Linux System Calls and Call Conventions for most architechtures
👍
11
🌭
1
Hacker News
Zettlr: One-Stop Publication Workbench
Article
,
Comments
Zettlr
Your One-Stop Publication Workbench
Your One-Stop Publication Workbench. Author Markdown documents with ease. For researchers, journalists, and writers.
👌
2
👍
1
🥱
1
🌭
1
Hacker News
Museum Fatigue
Article
,
Comments
🥱
9
🌭
2
🤔
1
💊
1
Hacker News
Building a Galaksija
Article
,
Comments
Vlado Vince
Building a Galaksija, Part I: The Tech - Vlado Vince
Note: this is the first part of three articles about my experience building a 1980s Yugoslav 8-bit computer called the Galaksija. This part is mostly focused on the technical aspects of building this computer. Part II will focus on the history and the cultural…
😍
4
🌭
1
Hacker News
User returns after 100k-hours ban to continue conversation that got them banned
Article
,
Comments
PC Gamer
Tabletop game forumite achieves posting godhood, emerging from the void after 100,000 hour 11 year ban to continue the same argument…
No, I am not revealing my username.
😎
63
🤣
22
🏆
4
🤡
3
🤝
2
🗿
2
👍
1
🌭
1
Hacker News
Let's blame the dev who pressed "Deploy"
Article
,
Comments
yield code();
Let's blame the dev who pressed "Deploy" - Dmitry Kudryavtsev
Following the CrowdStrike outage, I've stumbled upon an articles that claims that developers should have consequences. Do they?
🤡
27
👏
9
👍
4
🤣
4
👎
2
💩
2
👌
1
🌭
1
Hacker News
American Institute of Mathematics: Approved Open Textbooks
Article
,
Comments
❤
5
🗿
3
🌭
1
TWeb.init({scrollToPost:'hackernewslive/185769'});