No Leak, No Problem – Bypassing ASLR with a ROP Chain to Gain RCE
(news.ycombinator.com)
301.
302.
Hardened Containers Look to Eliminate Common Source of Vulnerabilities
(darkreading.com)
303.
The American Tradition of Trying to Address Anxiety with Parks
(news.ycombinator.com)
304.
This simple map can help New Yorkers in need find food
(feeds.feedburner.com)
305.
5 signs you’re working for a performative manager (and how to outsmart them)
(feeds.feedburner.com)
306.
BAML is hiring compilers/rust engineers (YC W23)
(news.ycombinator.com)
307.
308.
309.
High-performance 2D graphics rendering on the CPU using sparse strips [pdf]
(news.ycombinator.com)
310.
Sysgpu – Experimental descendant of WebGPU written in Zig
(news.ycombinator.com)
311.
Zig is so cool, C is cooler
(news.ycombinator.com)
312.
313.
Two billion email addresses were exposed
(news.ycombinator.com)
314.
Why psychological safety is the oxygen of innovation
(feeds.feedburner.com)
315.
Stop worrying about your AI footprint. Look at the big picture instead.
(technologyreview.com)
316.
A P2P Vision for QUIC (2024)
(news.ycombinator.com)
317.
University of Pennsylvania confirms data stolen in cyberattack
(bleepingcomputer.com)
318.
SocketAddrV6 is not roundtrip serializable
(news.ycombinator.com)
319.
320.
321.
A change of address led to our Wise accounts being shut down
(news.ycombinator.com)
322.
Why IP address truncation fails at anonymization
(news.ycombinator.com)
323.
Feed the bots
(news.ycombinator.com)
324.
Load-time relocation of shared libraries (2011)
(news.ycombinator.com)
325.
Canada Fines Cybercrime Friendly Cryptomus $176M
(krebsonsecurity.com)
326.
Introduction to reverse-engineering vintage synth firmware
(news.ycombinator.com)
327.
ISP Blocking of No-IP's Dynamic DNS Enters Week 2
(news.ycombinator.com)
328.
329.
Vietnam Airlines Data Breach
(news.ycombinator.com)
330.
Why do we need MAC addresses?
(news.ycombinator.com)