| | The TCP/IP Drinking Game (valerieaurora.org) |
| 1 point by pinhead on Feb 16, 2015 | past |
|
| | More adventures in self-doxxing: my online dating profile (valerieaurora.org) |
| 1 point by zdw on Feb 15, 2015 | past |
|
| | How feminism helped me solve one of file systems’ oldest conundrums (valerieaurora.org) |
| 67 points by zdw on Oct 6, 2014 | past | 116 comments |
|
| | Suicide and society: Where does responsibility for preventing suicide lie? (valerieaurora.org) |
| 2 points by majke on July 13, 2014 | past |
|
| | Handy tips for my Internet harassers (valerieaurora.org) |
| 1 point by jordigh on May 16, 2014 | past |
|
| | Here’s my favorite operating systems war story, what’s yours? (valerieaurora.org) |
| 191 points by luu on May 2, 2014 | past | 24 comments |
|
| | The TCP/IP Drinking Game (valerieaurora.org) |
| 9 points by luu on May 1, 2014 | past |
|
| | Lifetimes of cryptographic hash functions (valerieaurora.org) |
| 54 points by luu on April 30, 2014 | past | 15 comments |
|
| | Synthesis: An Efficient Implementation of Fundamental Operating System Services (valerieaurora.org) |
| 1 point by luu on April 8, 2014 | past |
|
| | Trying to get paid to work on diversity in tech? Read this. (valerieaurora.org) |
| 1 point by redcat on Dec 31, 2013 | past |
|
| | Here’s my favorite operating systems war story, what’s yours? (valerieaurora.org) |
| 8 points by bryanlarsen on Dec 17, 2013 | past |
|
| | Guide to cryptographic hashes for content-based addressing (2007) (valerieaurora.org) |
| 51 points by atmosx on Sept 10, 2013 | past | 21 comments |
|
| | Lifetimes of cryptographic hash functions (valerieaurora.org) |
| 153 points by tswicegood on July 29, 2013 | past | 52 comments |
|
| | Synthesis: An Efficient Implementation of Fundamental Operating System Services (valerieaurora.org) |
| 2 points by antoni on May 12, 2013 | past |
|
| | Suicide and society: Where does responsibility for preventing suicide lie? (valerieaurora.org) |
| 2 points by pajju on Jan 12, 2013 | past |
|
| | Lifetimes of cryptographic hash functions (updated) (valerieaurora.org) |
| 2 points by ibotty on Nov 18, 2012 | past |
|
| | The code monkey's guide to cryptographic hashes for content-based addressing (valerieaurora.org) |
| 3 points by r11t on June 20, 2011 | past |
|
| | Lifetimes of cryptographic hash functions (valerieaurora.org) |
| 15 points by phiggy on June 1, 2011 | past |
|
| | On the necessity of assholes (valerieaurora.org) |
| 4 points by jnoller on May 20, 2011 | past |
|
| | The TCP/IP Drinking Game (valerieaurora.org) |
| 47 points by rythie on Dec 3, 2010 | past | 14 comments |
|
| | Synthesis: research OS based around self-modifying code (valerieaurora.org) |
| 1 point by chipsy on Nov 19, 2009 | past |
|