Hacker Newsnew | past | comments | ask | show | jobs | submit | jjguy's submissionslogin
1.What caused the large AWS outage? (pragmaticengineer.com)
8 points by jjguy 84 days ago | past | 1 comment
2.Supply-Chain Firewall: Protecting Developers from Malicious Open Source Packages (datadoghq.com)
5 points by jjguy on Dec 7, 2024 | past
3.iPhone Mirroring at work may expose employees’ personal information (sevcosecurity.com)
58 points by jjguy on Oct 8, 2024 | past | 73 comments
4.Don't use iPhone Screen Mirroring on a work computer (sevcosecurity.com)
5 points by jjguy on Sept 27, 2024 | past | 1 comment
5.Show HN: Cybersecurity Company Jingle Service (sodiumhalogen.com)
1 point by jjguy on April 1, 2023 | past
6.Did a Chinese Hack Kill Canada’s Greatest Tech Company? (bloomberg.com)
6 points by jjguy on July 2, 2020 | past | 1 comment
7.Steven Sinofsky on Apple’s pricing strategy (twitter.com/stevesi)
1 point by jjguy on Jan 5, 2019 | past
8.Updated NIST 800-63 finalized with new identity and authorization guidelines (govdelivery.com)
3 points by jjguy on June 27, 2017 | past
9.Security startup Carbon Black merging with Bit9 (carbonblack.com)
1 point by jjguy on Feb 13, 2014 | past
10.The Design of Everyday Things Online Course Launches (udacity.com)
2 points by jjguy on Dec 18, 2013 | past
11.FAA to Allow Airlines to Expand Use of Personal Electronics (faa.gov)
9 points by jjguy on Oct 31, 2013 | past
12.Ex-CIA chief Michael Hayden: What Edward Snowden did (cnn.com)
7 points by jjguy on July 20, 2013 | past | 2 comments
13.Show HN: my startup - a "distributed process monitor" for the enterprise (carbonblack.com)
2 points by jjguy on June 28, 2013 | past
14.Microsoft Announcing New Bounty Programs (technet.com)
6 points by jjguy on June 19, 2013 | past | 2 comments
15.Blackstone invests in enterprise information security startup Carbon Black (carbonblack.com)
1 point by jjguy on April 30, 2013 | past
16.LinkedIn is down; java stack traces (linkedin.com)
1 point by jjguy on March 20, 2013 | past
17.Nate Silver's NCAA Final Four Bracket (nytimes.com)
2 points by jjguy on March 19, 2013 | past
18.Exponential decay as an alternative to circular buffers (awelonblue.wordpress.com)
2 points by jjguy on Feb 23, 2013 | past
19.Google Hacking Database from Johnny Long (hackersforcharity.org)
2 points by jjguy on Jan 25, 2013 | past
20.Inappropriate Use of Adobe Code Signing Certificate (adobe.com)
84 points by jjguy on Sept 27, 2012 | past | 13 comments
21.HN's tptacek on how to break into a security job (krebsonsecurity.com)
3 points by jjguy on June 25, 2012 | past
22.Ross Anderson: Debunking Cybercrime Myths (lightbluetouchpaper.org)
3 points by jjguy on June 18, 2012 | past
23.Remind HN: DEFCON CTF registration closes tomorrow (ddtek.biz)
2 points by jjguy on May 30, 2012 | past
24.The quest to replace passwords (lightbluetouchpaper.org)
2 points by jjguy on May 22, 2012 | past
25.Real world antivirus performance: 30 days with 43 different antivirus products (getcarbonblack.com)
1 point by jjguy on March 30, 2012 | past
26.Exploit code released for MS12-020, remote pre-auth vuln in RDP (aluigi.org)
1 point by jjguy on March 16, 2012 | past
27.Bathsheba Sculpture - art embodied as 3D printed mathematical sculptures (bathsheba.com)
4 points by jjguy on Feb 2, 2012 | past
28.The legal history of "fuck" (2007) [pdf] (cardozolawreview.com)
49 points by jjguy on Nov 20, 2011 | past | 27 comments
29. Forget TrueCrypt, use self-encrypting drives. Gear-level crypto. (seagate.com)
1 point by jjguy on Sept 2, 2011 | past | 1 comment
30.List of the 100 all-time best non-fiction books (guardian.co.uk)
3 points by jjguy on June 14, 2011 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: