Hacker News new | past | comments | ask | show | jobs | submit | justinludwig's submissions login
1. Elixir/Erlang Hot Swapping Code (2016) (kennyballou.com)
225 points by justinludwig 6 months ago | past | 112 comments
2. Linux connection tracking and (Slow) DNS (isc.org)
48 points by justinludwig 7 months ago | past | 16 comments
3. Wayland Apps in WireGuard Docker Containers (procustodibus.com)
49 points by justinludwig 8 months ago | past | 10 comments
4. What Is a BOI Report? (legalzoom.com)
1 point by justinludwig 10 months ago | past
5. Cybersecurity Code of Honor (montreat.edu)
1 point by justinludwig 10 months ago | past
6. Flowtables: A Netfilter/Nftables Fastpath (thermalcircle.de)
9 points by justinludwig on Jan 3, 2024 | past
7. Connection Tracking (Conntrack): Design and Implementation Inside Linux Kernel (arthurchiao.art)
15 points by justinludwig on Nov 12, 2023 | past
8. Containers: Rootful, Rootless, Privileged and Super Privileged (infosecadalid.com)
2 points by justinludwig on Oct 24, 2023 | past
9. Goodbye, Jenkins Hello, Sourcehut (welkup.com)
3 points by justinludwig on Oct 9, 2023 | past
10. An Opinionated Yubikey Set-Up Guide (procustodibus.com)
143 points by justinludwig on Sept 14, 2023 | past | 72 comments
11. Interviews in the Age of AI: Ditch Leetcode – Try Code Reviews Instead (chrlschn.dev)
1 point by justinludwig on Sept 7, 2023 | past
12. Elixir/Erlang Secure Coding and Deployment Hardening Guidelines (erlef.github.io)
195 points by justinludwig on Aug 31, 2023 | past | 3 comments
13. How to FIDO (fido-alliance.github.io)
3 points by justinludwig on April 6, 2023 | past
14. What is Keyoxide? The thing Keybase once was (keyoxide.org)
3 points by justinludwig on Feb 9, 2023 | past
15. Fears mount that Cop27 app could be used by Egypt to surveil regime’s critics (theguardian.com)
1 point by justinludwig on Nov 10, 2022 | past | 1 comment
16. Zero Trust Architecture with WireGuard (procustodibus.com)
1 point by justinludwig on Aug 31, 2022 | past
17. LXD Containers for Wayland GUI Apps (swwomm.com)
7 points by justinludwig on Aug 29, 2022 | past
18. Implementing a Zero Trust Architecture (nist.gov)
230 points by justinludwig on Aug 9, 2022 | past | 64 comments
19. Observations on selected NIST post-quantum algorithms from Thomas Pornin (nccgroup.com)
1 point by justinludwig on July 30, 2022 | past
20. WireGuard Multi-Factor Authentication with Pro Custodibus (procustodibus.com)
1 point by justinludwig on July 7, 2022 | past
21. Poor Man's BeyondCorp with WireGuard (procustodibus.com)
5 points by justinludwig on March 10, 2022 | past
22. Log4j vulnerability: what should boards be asking? (ncsc.gov.uk)
1 point by justinludwig on Dec 21, 2021 | past
23. Federal Zero Trust Strategy (cyber.gov)
1 point by justinludwig on Sept 8, 2021 | past
24. AWS will offer free Multi-Factor Authentication devices to customers (amazon.com)
3 points by justinludwig on Aug 27, 2021 | past | 2 comments
25. Distributed Weakness Filing: a community-driven project to assign CVE IDs (github.com/distributedweaknessfiling)
1 point by justinludwig on May 9, 2021 | past
26. Chinese hackers compromise dozens of government agencies, defense contractors (washingtonpost.com)
4 points by justinludwig on April 22, 2021 | past
27. Possible Jenkins Project Infrastructure Compromise (jenkins.io)
19 points by justinludwig on April 23, 2016 | past | 1 comment
28. Advancing the Security of Juniper Products (juniper.net)
1 point by justinludwig on Jan 10, 2016 | past
29. A little POODLE left in GnuTLS (old versions) (hboeck.de)
2 points by justinludwig on Dec 1, 2015 | past
30. Unboxing Linux/Mumblehard Malware (welivesecurity.com)
1 point by justinludwig on April 30, 2015 | past

Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: