frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Tiny C Compiler

https://bellard.org/tcc/
74•guerrilla•2h ago•33 comments

SectorC: A C Compiler in 512 bytes

https://xorvoid.com/sectorc.html
160•valyala•6h ago•29 comments

The F Word

http://muratbuffalo.blogspot.com/2026/02/friction.html
88•zdw•3d ago•39 comments

Speed up responses with fast mode

https://code.claude.com/docs/en/fast-mode
97•surprisetalk•5h ago•98 comments

Brookhaven Lab's RHIC concludes 25-year run with final collisions

https://www.hpcwire.com/off-the-wire/brookhaven-labs-rhic-concludes-25-year-run-with-final-collis...
39•gnufx•4h ago•43 comments

You Are Here

https://brooker.co.za/blog/2026/02/07/you-are-here.html
46•mltvc•2h ago•57 comments

Software factories and the agentic moment

https://factory.strongdm.ai/
122•mellosouls•8h ago•254 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
870•klaussilveira•1d ago•266 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
162•AlexeyBrin•11h ago•29 comments

Stories from 25 Years of Software Development

https://susam.net/twenty-five-years-of-computing.html
120•vinhnx•9h ago•14 comments

FDA intends to take action against non-FDA-approved GLP-1 drugs

https://www.fda.gov/news-events/press-announcements/fda-intends-take-action-against-non-fda-appro...
45•randycupertino•1h ago•45 comments

Show HN: Browser based state machine simulator and visualizer

https://svylabs.github.io/smac-viz/
6•sridhar87•4d ago•2 comments

First Proof

https://arxiv.org/abs/2602.05192
86•samasblack•8h ago•60 comments

Show HN: A luma dependent chroma compression algorithm (image compression)

https://www.bitsnbites.eu/a-spatial-domain-variable-block-size-luma-dependent-chroma-compression-...
24•mbitsnbites•3d ago•1 comments

Al Lowe on model trains, funny deaths and working with Disney

https://spillhistorie.no/2026/02/06/interview-with-sierra-veteran-al-lowe/
76•thelok•8h ago•15 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
256•jesperordrup•16h ago•84 comments

I write games in C (yes, C) (2016)

https://jonathanwhiting.com/writing/blog/games_in_c/
157•valyala•6h ago•137 comments

Start all of your commands with a comma (2009)

https://rhodesmill.org/brandon/2009/commands-with-comma/
541•theblazehen•3d ago•198 comments

Show HN: I saw this cool navigation reveal, so I made a simple HTML+CSS version

https://github.com/Momciloo/fun-with-clip-path
43•momciloo•6h ago•6 comments

The AI boom is causing shortages everywhere else

https://www.washingtonpost.com/technology/2026/02/07/ai-spending-economy-shortages/
224•1vuio0pswjnm7•12h ago•347 comments

Microsoft account bugs locked me out of Notepad – Are thin clients ruining PCs?

https://www.windowscentral.com/microsoft/windows-11/windows-locked-me-out-of-notepad-is-the-thin-...
63•josephcsible•4h ago•78 comments

Selection rather than prediction

https://voratiq.com/blog/selection-rather-than-prediction/
19•languid-photic•4d ago•5 comments

Reinforcement Learning from Human Feedback

https://rlhfbook.com/
104•onurkanbkrc•11h ago•5 comments

72M Points of Interest

https://tech.marksblogg.com/overture-places-pois.html
45•marklit•5d ago•6 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
130•videotopia•4d ago•42 comments

Coding agents have replaced every framework I used

https://blog.alaindichiappari.dev/p/software-engineering-is-back
284•alainrk•10h ago•464 comments

A Fresh Look at IBM 3270 Information Display System

https://www.rs-online.com/designspark/a-fresh-look-at-ibm-3270-information-display-system
54•rbanffy•4d ago•15 comments

France's homegrown open source online office suite

https://github.com/suitenumerique
664•nar001•10h ago•288 comments

Where did all the starships go?

https://www.datawrapper.de/blog/science-fiction-decline
113•speckx•4d ago•156 comments

Show HN: Kappal – CLI to Run Docker Compose YML on Kubernetes for Local Dev

https://github.com/sandys/kappal
42•sandGorgon•2d ago•17 comments
Open in hackernews

Make Your Own Backup System – Part 2: Forging the FreeBSD Backup Stronghold

https://it-notes.dragas.net/2025/07/29/make-your-own-backup-system-part-2-forging-the-freebsd-backup-stronghold/
122•todsacerdoti•6mo ago

Comments

benlivengood•6mo ago
I've had good luck using `zfs allow` to grant non-root backup users the ability to only add snapshots to their datasets to avoid the "attacker compromises prod and then jumps to the backup server and deleted the backups". It is an extra step to clean up old snapshots, but worth the risk-reduction.

You can also split administration up so that, e.g., my friend sending me snapshots can't even log in as root on his backup server.

soupbowl•6mo ago
A good tip thanks, I did not know about 'zfs allow', I'll be playing with that this weekend.
sgc•6mo ago
`zfs allow` is rather complex. What specific set of permissions are you allowing your users?
benlivengood•6mo ago
For the receiving side the user needs `receive` permission for the dataset to receive new snapshots, but it's convenient to grant `create,mount` as well so the user can send new child datasets which may have mount options in the source dataset, relying on inheritance for the allow permissions to apply to the child datasets.

On the sending side `send` is enough, but for tools like syncoid and znapzend `hold,release` are useful as well since typically they hold the latest snapshot on the source which the destination also has so that it can't be deleted on the source before it's used to send an incremental stream up to a newer snapshot only available on the source.

trod1234•6mo ago
Personally, I'm not seeing how this can possibly have any risk-reduction from a professional standpoint.

You rely upon the permissions model not being broken, but once you have a local login, even with limited perms...a large attack surface is suddenly opened, and the nature of attack surface is the odds immediately go up that there is some piece of code running locally that will allow local priv escalation.

Its relatively simple a lot of times to either escalate local privileges, or trick a green admin to escalate privileges for the attacker (i.e. bind-mount namespaces/ebpf).

If you aren't doing a one-way offline backup, it carries the same risks as replication and all the ransomware related risks through rolling/resource exhaustion.