frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Pairfuse – Professional Photoshoots for Couples

https://pairfuse.com
1•katerina198b•1m ago•0 comments

Windscribe – We'll move HQ and take our taxes elsewhere

https://twitter.com/windscribecom/status/2055044048122003569
1•mvdwoord•3m ago•0 comments

America is experiencing a productivity miracle

https://www.economist.com/finance-and-economics/2026/05/11/america-is-experiencing-a-productivity...
1•edward•4m ago•0 comments

UUID vs. NanoID – ID Generation Compared

https://tools.pinusx.com/compare/uuid-vs-nanoid
1•ankitg12•5m ago•0 comments

One-of-One Indirapuram Sets a New Standard for Luxury Living

https://realty.economictimes.indiatimes.com/news/brand-connect-initiative/harmandeep-singh-kandha...
1•KirtiKKapoor•5m ago•0 comments

Court upholds discrimination ruling after male excluded from female-only app

https://www.abc.net.au/news/2026-05-15/nsw-tickle-v-giggle-judgement-transgender-woman/106682498
1•wrwr•5m ago•0 comments

Get best online coupons and promo codes and deals of hot brands

https://www.timelycoupons.com
1•oopp0302•6m ago•0 comments

Ask HN: How to be SOC2 Type 2 compliant as a solo-entreprenuer?

3•sochix•9m ago•2 comments

Zero-day exploit defeats default Windows 11 BitLocker protections

https://arstechnica.com/security/2026/05/zero-day-exploit-completely-defeats-default-windows-11-b...
2•ndsipa_pomu•11m ago•0 comments

Have you switched to AI for heart monitoring during physical activity yet?

1•accofrisk•12m ago•1 comments

Slopsmith: A Self-Hosted Rocksmith Alternative That Runs in Docker

https://github.com/byrongamatos/slopsmith
1•steveharing1•13m ago•0 comments

Jelly Tide: My Honest 30-Day Results (Shocking Before and After)

https://finance.yahoo.com/sectors/healthcare/articles/jelly-tide-gummies-exploding-2026-154100263...
1•ragymkalu•20m ago•0 comments

Establishing AI and data sovereignty in the age of autonomous systems

https://www.technologyreview.com/2026/05/14/1137168/establishing-ai-and-data-sovereignty-in-the-a...
2•joozio•20m ago•0 comments

Turn a bare VPS into an operational fortress in 15 minutes and 1 command

1•rockballslab•21m ago•0 comments

Cerebras risked dinner plate-sized AI accelerators. Today it's worth $66B

https://www.theregister.com/ai-ml/2026/05/15/cerebras-wafer-scale-ai-bet-delivers-blockbuster-ipo...
1•beardyw•23m ago•0 comments

'Everyone is unhappy': Meta faces grim mood, plans 8k layoffs soon amid cuts

https://www.aol.com/finance/everyone-unhappy-meta-employees-describe-151500588.html
4•01-_-•24m ago•0 comments

AI that improves itself indefinitely

https://techcrunch.com/2026/05/14/what-happens-when-ai-starts-building-itself/
3•russfink•25m ago•0 comments

PyCon US 2026 Typing Summit Recap

https://bernat.tech/posts/pycon-us-2026-typing-summit-recap/
2•gaborbernat•25m ago•1 comments

Morgan Stanley Bitcoin ETF $MSBT got an official listing announcement from NYSE

https://twitter.com/EricBalchunas/status/2036831654392561983
3•janandonly•27m ago•0 comments

The era of 15GB free Gmail storage is ending

https://www.androidauthority.com/google-gmail-5gb-free-storage-test-3667002/
4•01-_-•29m ago•0 comments

Android rolling out AI-powered "Contextual suggestion" learning from your habits

https://9to5google.com/2026/05/13/android-contextual-suggestions/
2•theanonymousone•29m ago•0 comments

AI makes weak engineers less harmful

https://www.seangoedecke.com/ai-makes-weak-engineers-less-harmful/
2•vismit2000•31m ago•0 comments

Google lets you move passkeys to another password manager on Android

https://www.androidauthority.com/google-passkeys-move-to-another-password-manager-android-3666965/
1•vdelitz•32m ago•0 comments

Out of the Tar Pit (2006) [pdf]

https://curtclifton.net/papers/MoseleyMarks06a.pdf
1•theanonymousone•41m ago•0 comments

A Design Space and Interaction Model of Abstraction in Interactive Systems

https://arxiv.org/abs/2605.11344
1•mrauha•41m ago•0 comments

Helpful tools from Google to keep your accounts safe

https://blog.google/innovation-and-ai/technology/safety-security/world-password-day-2026/
2•vdelitz•45m ago•0 comments

Make It Blink: Over-the-Air Exploitation of the Philips Hue Bridge

https://www.synacktiv.com/en/publications/make-it-blink-over-the-air-exploitation-of-the-philips-...
1•pieterr•51m ago•0 comments

Visual Chronology of Science and Discovery (2025)

https://invention.cards/
1•pimgeek•52m ago•1 comments

Mullvad VPN users have connectivity issues with Supabase

https://status.supabase.com/incidents/ybxpvtjys08w
1•dinoqqq•53m ago•0 comments

The Infinity Machine – Demis Hassabis and the Quest for Superintelligence

https://www.penguinrandomhouse.com/books/752231/the-infinity-machine-by-sebastian-mallaby/
2•zmeden•53m ago•0 comments
Open in hackernews

Ask HN: One mistake or hack that taught you the most?

1•SyntaxErrorist•1h ago
I have made plenty of mistakes and tried hacks that failed but yes each failure taught lessons i'll never forgot. What's your one mistake or hack that taught you more than success?

Comments

Clikdeo•1h ago
working under an elf gives you nothing
SyntaxErrorist•1h ago
Yeah bad environment teach hard lessons fast.
spacedcowboy•23m ago
Waaay back in the mists of time, when behemoths roamed the plains and cell phones smaller than bricks had yet to be invented, I was an undergraduate student in Physics at Imperial College, London.

The physics teaching lab had a large number of BBC Micro computers, these were the precursor to the ARM RiscOS ones made by Acorn, and physics departments loved them because (a) they were full of ports that could be attached to experiments for data-gathering, and (b) they were easy to use and had a (for the time) fairly high-res screen for displaying results.

One of those ports was the "econet" port, which linked all the computers together to a fileserver with (gasp) a hard disk on it, giving a primitive (by today's standards) networking ability.

So we were all given YR1.<letter><letter> usernames, and the letters more or less corresponded with our initials. I figured out that they'd actually just made all combinations of YR1.AA to YR1.ZZ, so I logged into a spare one for deniability using the supplied default password (it was a different age...), bought a copy of the "Advanced User Guide" and the "Econet user guide" and history was about to be made...

Myself and a couple of friends decided we'd write a networked virus - viruses weren't very common in those days, they mainly came on floppy disks for Amigas or Atari ST's and did something nasty to your computer. Networked computers were rare outside of government or big business, so the opportunity was there, and we took it :)

I probably ought to say that the virus didn't do anything destructive, it just appended "Copyright (c) The Virus, 1988" to the end of any directory listing (get a directory listing was one of the vectors).

[technical aside]

The BBC micro had two different "interrupt" type mechanisms ("events" and "interrupts"), and the OS was highly vectored (so on an interrupt or event, the 6502 would jump to the location provided by a table of 2-byte entries in RAM, with the event/interrupt being the index into that table).

Everything was vectored, "get a character", "write a byte to a device", "perform an OS call", ... And all the devices (floppy disk, network, ...) were implemented in a similar manner. It was a hackers dream of a computer, really.

[/aside]

What we also did was enable the virus from any event (key-press mainly) or interrupt (VBI, NMI,...), and the events enabled the interrupts, and the interrupts enabled the events. We also made it re-enable itself specifically when you typed "*." (which made the "get a directory listing on the current device" OS call) - this was sneaky, we thought, because if you'd somehow managed to disable the other code, you'd do a "*." to see if the virus was still there...

The virus wrote itself as !Boot in the root directory of the current media (and of course hid that entry from view, so you couldn't see it) which meant the next time you used that account, it would be activated on that machine.

Come April Fools day, we decided we were ready. We put the virus on one machine in the lab, one of the 10 machines that were in the "damn I need to get my lab-report written up" section that wasn't actually in the lab itself, but was still networked to your account.

We were sitting in the same section updating our own lab work, and heard the "WTF!" Students gathered round, the affected person logged out, went to a different machine (thinking there was a problem with the machine) and logged in there, infecting that second machine with the virus. Someone else logged into the first machine, and they were infected too... Since the !Boot file was on the account on the network server, turning the machine off/on and then logging in re-infected the machine...

It spread like wildfire.

We had built in a vulcan-death-grip-style "disable the virus" key combination, so we wouldn't be affected, and thought ourselves very clever. The idea was not to be affected, but soon after release it was necessary to ignore that because 3 accounts unaccountably (sorry!) uninfected would have stood out like a sore thumb.

A couple of days later, an all-students meeting was called. "Authority" was taking this very seriously, they shut down the network, turned off all the machines, and disinfected the network server by hand, removing the !Boot file from every account. They said something along the lines of "this was not funny, don't do it again or there'll be serious consequences". Everyone went back, and life went on.

About a week later, the virus again raced through the network, infecting every account in a matter of hours. We hadn't re-released it, and with some horror, realised what had happened - someone had done a "*." on their backup floppy disk, and then brought it back into the lab and booted from it, infecting the machine, and thereafter the network. The thing was too damn infectious for its own good.

If we thought "Authority" had no sense of humour last time, this time the meeting was very short, the message was "when we find who did this, we will expel them". Excrement and Fans were in close proximity. Hitting each other, one might say. We couldn't "own up", it was too late. We had no control over what people did with their floppy disks, and things had escalated way too far. We came up with a plan...

We wrote another virus.

Hear me out. This one was silent, had a time-to-die (when it would delete itself) of about 2 months, and (virtually) "pressed" the key combination that deleted the old virus. We purposefully infected lots of machines with the new virus, waited, and prayed.

Things worked out fine. Everyone got infected with the new virus for a while, which destroyed the old one, without being aware of that fact, "Authority" thought they'd laid down the law and been taken seriously, and we managed to not get expelled.

And breathe

I have never written anything remotely like a virus ever since.