Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
The TCP/IP Drinking Game (valerieaurora.org)
1 point by pinhead on Feb 16, 2015 | past
More adventures in self-doxxing: my online dating profile (valerieaurora.org)
1 point by zdw on Feb 15, 2015 | past
How feminism helped me solve one of file systems’ oldest conundrums (valerieaurora.org)
67 points by zdw on Oct 6, 2014 | past | 116 comments
Suicide and society: Where does responsibility for preventing suicide lie? (valerieaurora.org)
2 points by majke on July 13, 2014 | past
Handy tips for my Internet harassers (valerieaurora.org)
1 point by jordigh on May 16, 2014 | past
Here’s my favorite operating systems war story, what’s yours? (valerieaurora.org)
191 points by luu on May 2, 2014 | past | 24 comments
The TCP/IP Drinking Game (valerieaurora.org)
9 points by luu on May 1, 2014 | past
Lifetimes of cryptographic hash functions (valerieaurora.org)
54 points by luu on April 30, 2014 | past | 15 comments
Synthesis: An Efficient Implementation of Fundamental Operating System Services (valerieaurora.org)
1 point by luu on April 8, 2014 | past
Trying to get paid to work on diversity in tech? Read this. (valerieaurora.org)
1 point by redcat on Dec 31, 2013 | past
Here’s my favorite operating systems war story, what’s yours? (valerieaurora.org)
8 points by bryanlarsen on Dec 17, 2013 | past
Guide to cryptographic hashes for content-based addressing (2007) (valerieaurora.org)
51 points by atmosx on Sept 10, 2013 | past | 21 comments
Lifetimes of cryptographic hash functions (valerieaurora.org)
153 points by tswicegood on July 29, 2013 | past | 52 comments
Synthesis: An Efficient Implementation of Fundamental Operating System Services (valerieaurora.org)
2 points by antoni on May 12, 2013 | past
Suicide and society: Where does responsibility for preventing suicide lie? (valerieaurora.org)
2 points by pajju on Jan 12, 2013 | past
Lifetimes of cryptographic hash functions (updated) (valerieaurora.org)
2 points by ibotty on Nov 18, 2012 | past
The code monkey's guide to cryptographic hashes for content-based addressing (valerieaurora.org)
3 points by r11t on June 20, 2011 | past
Lifetimes of cryptographic hash functions (valerieaurora.org)
15 points by phiggy on June 1, 2011 | past
On the necessity of assholes (valerieaurora.org)
4 points by jnoller on May 20, 2011 | past
The TCP/IP Drinking Game (valerieaurora.org)
47 points by rythie on Dec 3, 2010 | past | 14 comments
Synthesis: research OS based around self-modifying code (valerieaurora.org)
1 point by chipsy on Nov 19, 2009 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: