Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by wglb
Bicimals
1 points
wglb
2012-05-28T22:54:48Z
www.exploringbinary.com
Manhattanhenge
120 points
wglb
2012-05-28T16:18:59Z
www.haydenplanetarium.org
SKyWIper: A complex malware for targeted attacks
2 points
wglb
2012-05-28T14:18:18Z
www.crysys.hu
Fault attacks on secure chips: from glitch to flash
1 points
wglb
2012-05-28T13:01:01Z
www.cl.cam.ac.uk
Clinton: US wars with al-Qaida on the web
3 points
wglb
2012-05-24T11:32:27Z
www.boston.com
The Ultimate Counterfeiter Isn't a Crook—He's an Artist
6 points
wglb
2012-05-22T22:57:03Z
m.wired.com
Remote Malware Deployment and a Lil' AV Bypass
2 points
wglb
2012-05-22T20:34:32Z
pauldotcom.com
Data Breach At Experian Credit Reporting Service
1 points
wglb
2012-05-22T13:12:07Z
ivebeenmugged.typepad.com
The Last Mile for a Verification Problem
1 points
wglb
2012-05-22T13:08:34Z
blog.regehr.org
Touching Tarantulas
1 points
wglb
2012-05-22T12:22:14Z
www.northwestern.edu
Off-Path TCP Sequence Number Inference Attack
79 points
wglb
2012-05-22T12:20:36Z
web.eecs.umich.edu
Visualizing Galois Fields (Follow-up)
1 points
wglb
2012-05-22T12:06:18Z
nklein.com
Grep through code history with Git, Mercurial or SVN
1 points
wglb
2012-05-22T12:02:32Z
eli.thegreenplace.net
Have software feature/bug bounty programs been successful?
2 points
wglb
2012-05-21T22:12:14Z
www.quora.com
A Ring of Fire: The 2012 Annular Eclipse
2 points
wglb
2012-05-21T18:05:47Z
www.theatlantic.com
Facebook Takes Aim at Cross-Browser ‘LilyJade’ Worm
1 points
wglb
2012-05-20T16:08:08Z
krebsonsecurity.com
When Will Software Verification Matter?
1 points
wglb
2012-05-20T13:56:12Z
blog.regehr.org
How to choose an Authenticated Encryption mode
2 points
wglb
2012-05-20T13:05:47Z
blog.cryptographyengineering.com
I was wrong about Joy Christian
1 points
wglb
2012-05-20T13:01:47Z
www.scottaaronson.com
Sensplore
1 points
wglb
2012-05-20T12:34:29Z
www.tbray.org
150
151
152
153
154
155
156
157
158
159