Hacker News
Linking pages
- AI and Leviathan: Part III - by Samuel Hammond https://www.secondbest.ca/p/ai-and-leviathan-part-iii 897 comments
- When Nerds Collide. My intersectionality will have weirdoes… | by Meredith L. Patterson | Medium https://medium.com/@maradydd/when-nerds-collide-31895b01e68c 347 comments
- Surprisingly Turing-Complete · Gwern.net https://www.gwern.net/Turing-complete 303 comments
- ~ajxs/Giving Ada a Chance https://ajxs.me/blog/Giving_Ada_a_chance.html 295 comments
- The Great Rewriting In Rust – De Programmatica Ipsum https://deprogrammaticaipsum.com/the-great-rewriting-in-rust/ 218 comments
- Heartbleed disclosure timeline: who knew what and when http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html 112 comments
- That time I built an LD_PRELOAD worm - lcamtuf’s thing https://lcamtuf.substack.com/p/that-time-i-built-an-ld_preload-worm 58 comments
- Is Java More Secure than C? https://insights.sei.cmu.edu/sei_blog/2015/10/is-java-more-secure-than-c.html 54 comments
- Is cybersecurity an unsolvable problem? | Ars Technica https://arstechnica.com/?p=1937362 49 comments
- GitHub - rekihattori/awesome-programmers: A list of history's greatest software engineers and tech pioneers https://github.com/rekihattori/awesome-programmers 44 comments
- Sins of Software Security http://www.codinghorror.com/blog/archives/000841.html 13 comments
- Is cybersecurity an unsolvable problem? | Ars Technica https://arstechnica.com/features/2023/05/is-cybersecurity-an-unsolvable-problem/ 13 comments
- Putting the “S” Back Into SSH | Dave Dribin’s Blog http://www.dribin.org/dave/blog/archives/2007/08/21/ssh_agent/ 7 comments
- Open Letter to G8: What Happens When the Internet Breaks? | HuffPost Impact http://www.huffingtonpost.com/juliette-powell/open-letter-to-g8-what-ha_1_b_868937.html 5 comments
- The 38 most important dates in cybersecurity history https://www.lydiaoncybersecurity.com/important-dates-in-cybersecurity-history-2/ 3 comments
- The Most Controversial Hacking Cases of the Past Decade | WIRED http://www.wired.com/2015/10/cfaa-computer-fraud-abuse-act-most-controversial-computer-hacking-cases/ 1 comment
- How Leopard Will Improve Your Security - TidBITS http://db.tidbits.com/article/9251 1 comment
- How startup sausage gets made: The Launch Pad reviewed | Ars Technica http://arstechnica.com/business/2012/09/how-startup-sausage-gets-made-the-launch-pad-reviewed/ 1 comment
- 28th Anniversary of the Morris Internet Worm https://rietta.com/blog/2016/11/02/28th-anniversary-of-the-morris-internet-worm/ 0 comments
- How I messed up my artsy app’s launch | by Morpheu5 | HackerNoon.com | Medium https://medium.com/@morpheu5/how-i-messed-up-my-artsy-apps-launch-e684111de532#.gdgyn1k3k 0 comments
Related searches:
Search whole site: site:wikipedia.org
Search title: Morris worm - Wikipedia
See how to search.