Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by m-a-u-r-i-c-e-
Wow Such cheese Man uses Dogecoin to buy pizza and beer in Hawaii.
1 points
C--
2014-02-14T22:49:14Z
www.washingtonpost.com
The Tesco hack – here’s how it (probably) happened
2 points
jonathan-r
2014-02-14T08:59:05Z
www.troyhunt.com
Project Canvas: a BMC inspired process for project communication
1 points
Karstend-c
2014-02-13T08:30:22Z
oresundstartups.com
WTF Valentines Day Site: Endless Porno Kisses
1 points
M-artin
2014-02-12T20:40:10Z
endlesspornokisses.com
Learning R interactively with the Swirl package
8 points
E-for-Endetta
2014-02-11T14:26:56Z
flowingdata.com
Felicia Day's haircut just became headline news, thanks to sexism
1 points
jack-r-abbit
2014-02-06T19:41:19Z
www.dailydot.com
The coin prince: inside Bitcoin's first big money-laundering scandal
6 points
jack-r-abbit
2014-02-04T19:13:16Z
www.theverge.com
Life is too short for puzzling bug reports.
1 points
c-ei-po
2014-02-01T20:20:06Z
www.getapp.com
Adventures in Go land: high performance custom HTTP(S) service
3 points
C--
2014-01-28T21:43:08Z
aruiz.synaptia.net
Soylent 1.0 Final Nutrition
5 points
jack-r-abbit
2014-01-28T18:49:42Z
blog.soylent.me
Google Pwnium 4 Invites Hackers to Attack Chrome OS at CanSecWest
1 points
i-hacker
2014-01-27T13:15:14Z
blog.insecure.in
Poll: Do you actually use the product you are working on?
144 points
k-i-m
2014-01-26T18:07:32Z
news.ycombinator.com
A better boarding pass? One frustrated flier’s idea
1 points
jack-r-abbit
2014-01-24T20:07:03Z
travel.yahoo.com
’123456′ Declared Worst Internet Password of 2013
1 points
i-hacker
2014-01-23T12:52:41Z
blog.insecure.in
Microsoft Remotely Removed Tor Browser Bundle from more than 2 Million Systems
8 points
i-hacker
2014-01-21T15:01:34Z
blog.insecure.in
How simple image manipulation can get using imagine in a Symfony2 application
1 points
benja-M-1
2014-01-17T13:52:49Z
www.theodo.fr
MIT University Website Defaced by Anonymous Hackers in Honor of Aaron Swartz
1 points
i-hacker
2014-01-16T14:40:14Z
blog.insecure.in
4096-bit RSA Key Extraction Attack via Acoustic Cryptanalysis
1 points
i-hacker
2014-01-07T07:49:20Z
blog.insecure.in
PowerUp 3.0 - Smartphone Controlled Paper Airplane
2 points
C--
2014-01-04T16:41:30Z
www.kickstarter.com
EBay Remote Code Execution Vulnerability Demonstrated
1 points
i-hacker
2013-12-19T13:29:10Z
blog.insecure.in
116
117
118
119
120
121
122
123
124
125