Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by code-geek
Purpose: Why Creation Transcends Evolution That Has None of It
1 points
art-of-code
2014-11-16T15:45:31Z
www.elisoriano.com
The Minitransaction: An Alternative to Multi-Paxos and Raft
58 points
topher-the-geek
2014-07-12T19:14:31Z
blog.treode.com
TreodeDB: Open Source Distributed Transaction Key-Value Store
15 points
topher-the-geek
2014-06-25T18:05:23Z
github.com
TreodeDB: A Distributed Transactional Key-Value Store in Scala
2 points
topher-the-geek
2014-06-24T13:47:31Z
github.com
Generate Rainbow Tables Using WinRTGen
1 points
geek-kb
2014-05-26T23:27:04Z
geek-kb.com
Tutorial to Hack WEP wireless network and gain access to the network.
3 points
geek-kb
2014-05-03T22:29:39Z
geek-kb.com
Hack Facebook, Twitter, Paypal Password with NjRat – the complete guide
1 points
geek-kb
2014-04-25T09:00:16Z
geek-kb.com
Armitage – A Step by Step guide on How to Use to Hack Windows
1 points
geek-kb
2014-04-22T09:20:23Z
geek-kb.com
Mobile Network Performance and Content Delivery – Part 2
1 points
penguin-geek
2014-03-22T14:22:56Z
aqualab.cs.northwestern.edu
Christchurch transport card flaws expose identities, grant free bus rides
1 points
aj-code
2013-11-15T22:30:25Z
www.scmagazine.com.au
Grammar of computer languages | Backus–Naur Form
1 points
codeful
2013-11-05T06:29:41Z
en.wikipedia.org
Cracking Authy's Encrypted Cloud Backup
2 points
aj-code
2013-10-24T00:39:11Z
shinynightmares.wordpress.com
Treode: Relational Model, Modern Interface
4 points
topher-the-geek
2013-08-15T14:00:49Z
treode.com
Tell me about your experience with Parse, Meteor, etc.
1 points
topher-the-geek
2013-06-19T17:58:12Z
docs.google.com
Network auth timing attacks against hashed passwords
1 points
aj-code
2013-06-18T01:08:06Z
github.com
Show HN: M# Programming Language
3 points
geeks
2013-05-28T13:16:09Z
www.msharp.co.uk
Profiling Java 8 Lambdas With DPJ
2 points
code-dog
2013-03-16T20:27:55Z
nerds-central.blogspot.com
Java swapping large objects to disk automatically
2 points
code-dog
2012-12-31T09:48:59Z
nerds-central.blogspot.co.uk
Weak,Soft and Phantom References - When & When Not To Use
2 points
code-dog
2012-12-22T17:21:01Z
www.javaadvent.com
Java Advent Calendar
3 points
code-dog
2012-12-02T09:19:59Z
nerds-central.blogspot.com
15
16
17
18
19
20