Hacker Newsnew | past | comments | ask | show | jobs | submit | 2011-05-05login
Stories from May 5, 2011
Go back a day, month, or year. Go forward a day, month, or year.
1.Techniques To Simplify Sign-Ups and Log-Ins (smashingmagazine.com)
416 points by cwan on May 5, 2011 | 175 comments
2.DHS asks Mozilla to take down MafiaaFire add-on (lockshot.wordpress.com)
368 points by akavlie on May 5, 2011 | 75 comments
3.Mysterious US Helicopter Used in Bin Laden Raid (wired.com)
282 points by Element_ on May 5, 2011 | 128 comments
4.Hacking Hacker News Headlines (metamarketsgroup.com)
275 points by th0ma5 on May 5, 2011 | 34 comments
5.A $4.8M model airport with computer controlled vehicles (news.com.au)
214 points by mmcconnell1618 on May 5, 2011 | 46 comments
6.The story of George — ayttm's most prolific non-developing contributor (bluesmoon.info)
212 points by bluesmoon on May 5, 2011 | 8 comments
7.British hackers: stop voting for lizards; start voting for people today (reprog.wordpress.com)
199 points by MikeTaylor on May 5, 2011 | 101 comments
8.Sony was running unpatched Apache with no firewall for months before breach (consumerist.com)
188 points by joshes on May 5, 2011 | 65 comments
9.Silicon Milkroundabout: Forget the banks, come and join a London startup (siliconmilkroundabout.com)
169 points by lucraft on May 5, 2011 | 147 comments
10.Front End Development Guidelines (taitems.tumblr.com)
154 points by taitems on May 5, 2011 | 49 comments
11.Oracle Ordered to Reduce Claims Against Google From 132 to 3 (groklaw.net)
142 points by gluegadget on May 5, 2011 | 38 comments
12.52 Years and $750 Million Prove Einstein Was Right (nytimes.com)
134 points by jonburs on May 5, 2011 | 31 comments
13.Leveling Up: Career Advancement for Software Developers (peterlyons.com)
129 points by focusaurus on May 5, 2011 | 39 comments
14.How to Beat High Airfares (nytimes.com)
129 points by aaronbrethorst on May 5, 2011 | 133 comments
15.New stable release of Go (golang.org)
129 points by uriel on May 5, 2011 | 80 comments
16.8GB MicroSD Atari 810 disk drive, built to scale (rossum.posterous.com)
127 points by a1k0n on May 5, 2011 | 9 comments
17.What are some startup ideas that persistently fail? (quora.com)
121 points by helwr on May 5, 2011 | 91 comments
18.Why linux doesn't have a "wheel" group (administratosphere.wordpress.com)
118 points by j_baker on May 5, 2011 | 62 comments
19.LastPass requesting password reset after facing unknown anomaly (lastpass.com)
111 points by sathyabhat on May 5, 2011 | 63 comments
20.FBI chastened by court for lying about existence of surveillance records (eff.org)
109 points by grellas on May 5, 2011 | 13 comments
21.Thrift vs. Protocol Buffers (floatingsun.net)
108 points by peterb on May 5, 2011 | 24 comments
22.Amazon's Jeff Bezos Backs Nuclear Startup General Fusion (gigaom.com)
103 points by hornokplease on May 5, 2011 | 47 comments
23.The Myth of the Rule of Law (msb.edu)
100 points by ataggart on May 5, 2011 | 35 comments
24.Steve Wozniak Calls Paul Allen A Patent Troll (itproportal.com)
90 points by chanks on May 5, 2011 | 18 comments
25.The Wall Street Journal Launches a WikiLeaks Competitor, SafeHouse (theatlantic.com)
89 points by ssclafani on May 5, 2011 | 78 comments
26.Go at Heroku - build your own Chubby (theregister.co.uk)
96 points by timclark on May 5, 2011 | 21 comments
27.Facebook considering $3-4Bn buyout of Skype (mashable.com)
84 points by pitdesi on May 5, 2011 | 62 comments
Herman Miller Aeron Chair
81 points | parent

WSJ Terms about Confidentiality:

3. Request Confidentiality: If you would like us to consider treating your submission as confidential before providing any materials, please make this request through this online submission form. Please note that until we mutually decide to enter into a confidential relationship, any information you send to us (including contact information) can be used for any purpose, as outlined in point 1 above, and described more fully below in the Limitations section). If we enter into a confidential relationship, Dow Jones will take all available measures to protect your identity while remaining in compliance with all applicable laws.

Wikileaks version:

2.3 Protection for you

Wikileaks does not record any source-identifying information and there are a number of mechanisms in place to protect even the most sensitive submitted documents from being sourced. We do not keep any logs. We can not comply with requests for information on sources because we simply do not have the information to begin with. Similarly we can not see your real identity in any anonymised chat sessions with us. Our only knowledge of you as a source is if you provide a coded name to us. A lot of careful thought by world experts in security technologies has gone into the design of these systems to provide the maximum protection to you. Wikileaks has never revealed a source.

30.How decompilers work (archfinch.com)
82 points by drx on May 5, 2011 | 59 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: