frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

I turned myself into an AI-generated deathbot – here's what I found

https://www.bbc.com/news/articles/c93wjywz5p5o
1•cmsefton•9m ago•0 comments

Management style doesn't predict survival

https://orchidfiles.com/management-style-doesnt-predict-survival/
1•theorchid•10m ago•0 comments

One Generation Runs the Country. The Next Cashed in on Crypto

https://www.wsj.com/finance/currencies/trump-sons-crypto-billions-1e7f1414
1•impish9208•11m ago•1 comments

"I Was Wrong": Why the Civil War Is Running Late [video][2h21m]

https://www.youtube.com/watch?v=RDmkKZ7vAkI
1•Bender•12m ago•0 comments

Show HN: A sandboxed execution environment for AI agents via WASM

https://github.com/Parassharmaa/agent-sandbox
1•paraaz•15m ago•0 comments

Wine-Staging 11.2 Brings More Patches to Help Adobe Photoshop on Linux

https://www.phoronix.com/news/Wine-Staging-11.2
2•doener•15m ago•0 comments

The Nature of the Beast

https://cinemasojourns.com/2026/02/07/the-nature-of-the-beast/
1•jjgreen•16m ago•0 comments

From Prediction to Compilation: A Manifesto for Intrinsically Reliable AI

1•JanusPater•16m ago•0 comments

Show HN: Curated list of 1000 open source alternatives to proprietary software

https://opensrc.me
1•ZenithSoftware•18m ago•0 comments

AI's Real Problem Is Illegitimacy, Not Hallucination

1•JanusPater•19m ago•1 comments

'I fell into it': ex-criminal hackers urge UK pupils to use web skills for good

https://www.theguardian.com/technology/2026/feb/08/i-fell-into-it-ex-criminal-hackers-urge-manche...
1•robaato•19m ago•0 comments

Why 175-Year-Old Glassmaker Corning Is Suddenly an AI Superstar

https://www.wsj.com/tech/corning-fiber-optics-ai-e045ba3b
1•bookofjoe•20m ago•1 comments

Keeping WSL Alive

https://shift1w.com/blog/keeping-wsl-alive/
1•jakesocks•21m ago•0 comments

Unlocking core memories with GoldSrc engine and CS 1.6 (2025)

https://www.danielbrendel.com/blog/43-unlocking-core-memories-with-goldsrc-engine
3•foxiel•22m ago•0 comments

Gtrace an advanced network path analysis tool

https://github.com/hervehildenbrand/gtrace
2•jimaek•22m ago•0 comments

America does not trust Putin or Trump

https://re-russia.net/en/review/809/
1•mnky9800n•26m ago•0 comments

Let's Do Music in Linux [video]

https://www.youtube.com/watch?v=IHgsOdoLuBU
1•mariuz•27m ago•0 comments

"Nothing" is the secret to structuring your work

https://www.vangemert.dev/blog/nothing
1•spmvg•30m ago•0 comments

AI Makes the Easy Part Easier and the Hard Part Harder

https://www.blundergoat.com/articles/ai-makes-the-easy-part-easier-and-the-hard-part-harder
1•birdculture•32m ago•0 comments

Show HN: Fine-tuned Qwen2.5-7B on 100 films for probabilistic story graphs

https://cinegraphs.ai/
1•graphpilled•32m ago•1 comments

A failed wantrepreneur's view on common startup advice

https://developerwithacat.com/blog/202602/startup-advice/
1•mmarian•32m ago•0 comments

Show HN: BestClaw Simple OpenClaw/MoltBot for non tech people

https://bestclaw.host/
2•nihey•33m ago•0 comments

AI is making me anxious and stupid

https://tom.so/posts/ai-is-making-me-anxious-and-stupid
1•tomupom•36m ago•0 comments

Show HN: Real-time path tracing of medical CT volumes in the browser via WebGPU

https://grenzwert.net/
2•MickGorobets•40m ago•1 comments

United States – Crypto Scam Help – Intelligence Cyber Wizard Safe Guide

1•Forensics•43m ago•0 comments

What to Do After a Crypto Scam (USA) Intelligence Cyber Wizard Explained

1•Forensics•44m ago•0 comments

The Physics of 588: A 17.64μm Isolation Barrier Strategy for 5nm Process

https://github.com/eggpine84-del/NHE-CODING
1•eggpine84•44m ago•0 comments

My Eighth Year as a Bootstrapped Founder

https://mtlynch.io/bootstrapped-founder-year-8/
1•mtlynch•45m ago•0 comments

Data Modelling Open Source

https://github.com/sqlmodel/sqlmodel
2•Sean766•48m ago•0 comments

Mid-life transitions

https://blogs.gnome.org/chergert/2026/02/06/mid-life-transitions/
2•pabs3•48m ago•0 comments
Open in hackernews

Ansible battle tested hardening for Linux, SSH, Nginx, MySQL

https://github.com/dev-sec/ansible-collection-hardening
95•walterbell•1mo ago

Comments

yjftsjthsd-h•3w ago
"battle tested" how? Widely deployed? Red teamed and shown to actually help?
observationist•3w ago
They've got a red-team type process they apply repeatedly, you have to piece things together from the changelogs to get a grasp on what they're doing. They've built a positive feedback loop on which to iterate improvements in security, and bundled it in a way to be used effectively with Ansible.

They're following CIS guidelines, so if you're in a situation where that matters, it's probably a solid starting point for building things you need to have compliant and predictable. Could probably save weeks of effort, depending on the size of the team.

schurzi•3w ago
Deployed and actively used by some larger european companies, we also got feedback from some US companies that use parts of our work to harden their systems.
mhb•3w ago
What does this mean?
ggm•3w ago
If you have compliance for contractual reasons (e/g you are the supply chain for an entity which has been declared to be a national-strategic service delivery) then this would probably help get you over the line to meet minimum proofs you have tried to comply with the obligations.

So, "what does this mean" is "it means you can tender to sell services to people who put CIS obligations in the contract"

mhb•3w ago
Thanks.
Spivak•3w ago
These playbooks apply the CIS benchmarks, very very useful for compliance. I use them at $dayjob to build our base AMIs.

As for whether they actually harden your servers, that's up for you to decide if you think that CIS actually helps. It certainly does reduce attack surface.

wingmanjd•3w ago
At my $DAYJOB, we have a bunch in-house saltstack states for applying the CIS benchmarks for Ubuntu, Debian, and CentOS. I never looked into it, but I always wondered if I'd be allowed to publish them publicly.
bhattisatish•3w ago
Well there is one available for oscap at https://github.com/ComplianceAsCode/content
hackernudes•3w ago
Context: https://www.cisecurity.org/cis-benchmarks, https://www.cisecurity.org/about-us

"""The CIS Benchmarks® are prescriptive configuration recommendations for more than 25+ vendor product families. They represent the consensus-based effort of cybersecurity experts globally to help you protect your systems against threats more confidently."""

infocollector•3w ago
https://learn.cisecurity.org/benchmarks - this seems broken at least right now. Are these benchmarks on github so that I can download and run it on a linux box?
firesteelrain•3w ago
You used to have to make an account to download them.
viraptor•3w ago
> decide if you think that CIS actually helps. It certainly does reduce attack surface.

Official Ubuntu cis docker images in AWS:

- change the sysctls which do not apply to containers

- install a file consistency checker, which likely makes no sense in a dedicated container

- install tcpwrappers which you'll probably never use... for compliance reasons

- adjust system user password policies which you're probably not using at all

Unless you need to tick some compliance boxes in the quickest and most silly way, go for CIS. If you don't, schedule some time with a security person at your company to create a real threat model and change the things that will make an impact.

Spivak•3w ago
I feel like a lot of companies need to check compliance boxes. We apply CIS benchmarks as part of getting our SOC 2. They're not required explicitly but they're easy to apply and auditors accept it without any fanfare.

I haven't run into any situations where container images need to have CIS benchmarks applied, only VMs.

TacticalCoder•3w ago
The Linux hardening list lists quite some modifications but what hardening is made to SSH compared to a stock config? For Linux they summarize the list of hardened changes but for SSH I couldn't find it.

For SSH it's basically a list of default values with a comment saying "change this if you must". Some summary as to what is hardened compared to a stock SSH install would be nice.

observationist•3w ago
https://github.com/dev-sec/ansible-collection-hardening/blob...

The changelogs contain a summary of actions and changes, and full changelogs go into detail.

imcritic•3w ago
That's a poor answer. Changelogs are logs of changes between versions of a project.
schurzi•3w ago
Maintainer here, we use a collection of baselines that are derived from internal guidelines and CIS benchmarks. The baselines have some more information as to what is done. For example SSH: https://github.com/dev-sec/ssh-baseline
ornornor•3w ago
About ansible: I really like the idea and popularity of ansible but find it so painful to use. YAML sucks, and testing is not straightforward (I use molecule in docker containers with geerlingguy’s spécial images)

What’s your workflow for writing tested playbooks?

tuananh•3w ago
wait until you have to use puppet :D
jdmoreira•3w ago
claude code is really good at it from my experience
JimBlackwood•3w ago
What do you want to do in a playbook that requires it to be tested?

We keep our roles very simple and they will not do anything complicated. Ansible is for configuring a machine, that’s it.

If we need to do anything more complicated, we’ll write it in a testable program (usually in Go).

ornornor•2w ago
What do you do that doesn't need to be tested?

I have a playbook for my dotfiles/rebuilding a personal machine from scratch. So I test that the files end up where they're supposed to be, the permissions, the packages, that whatever software I installed from source are indeed setup correctly and running, etc.

Same for roles that need to provably configure a piece of software.

tuananh•3w ago
I would much prefer to use RHEL/Fedora image mode for this. Use Dockerfile syntax. Immutable. Easy to update/rollback. CIS hardening baked in.

```

[customizations.openscap]

datastream = "/usr/share/xml/scap/ssg/content/ssg-rhel10-ds.xml"

profile_id = "xccdf_org.ssgproject.content_profile_cis"

custom_remediate_script_path = "/your/custom/script.sh"

```