“Let Us Calculate”: Leibniz, Llull, and the Computational Imagination
Three hundred years after the death of Gottfried Wilhelm Leibniz and seven hundred years after the birth of Ramon Llull, Jonathan Gray looks at how their early visions of computation and the...
View ArticleProtect Your Library the Medieval Way, with Horrifying Book Curses
A 15th century portrait of a scribe. Jean Le Tavernier/Public domainIn the Middle Ages, creating a book could take years. A scribe would bend over his copy table, illuminated only by natural...
View ArticleGoogle’s top news link for ‘final election results’ is a fake news site
The Post's Dan Balz explores some of the factors behind President-elect Donald Trump's victory against his Democratic opponent, Hillary Clinton. (Bastien Inzaurralde/The Washington Post)If you head to...
View ArticleJTAGing Mobile Phones
OverviewI always thought JTAG was hard, then I tried it, and realized it was actually very easy (most of the time). Pretty much anyone can learn to do this in 8 hours of soldering practice. Really,...
View ArticleMaine Ranked Choice Voting Initiative Approved
From BallotpediaThe Maine Ranked Choice Voting Initiative, also known as Question 5, was on the November 8, 2016, ballot in Maine as an indirect initiated state statute. It was approved. A "yes" vote...
View ArticleHierarchical Object Detection with Deep Reinforcement Learning
A joint collaboration between:SummaryWe present a method for performing hierarchical object detection in images guided by a deep reinforcement learning agent. The key idea is to focus on those parts of...
View ArticleTermbox-Go – A minimalistic Go curses library
README.mdTermbox is a library that provides a minimalistic API which allows the programmer to write text-based user interfaces. The library is crossplatform and has both terminal-based implementations...
View ArticleBlacknurse – Low bandwidth ICMP firewall attack
Blacknurse is a low bandwidth ICMP attack that is capable of doing denial of service to well known firewalls. Most ICMP attacks that we see are based on ICMP Type 8 Code 0 also called a ping flood...
View ArticleLeonard Cohen on Poetry, Music and Why He Left the Zen Monastery
TERRY GROSS, HOST: This is FRESH AIR. I'm Terry Gross. Leonard Cohen has a new album called "You Want It Darker," which gives us the perfect opportunity to listen back to the interview I recorded with...
View ArticleKill the newsletter: Convert newsletters into RSS feeds
Introduction I love newsletters, but I hate receiving e-mails. Call me an oldie, but I still use RSS feeds to read my news and e-mails for communication. And I prefer to keep those two separate....
View ArticleWhy Chrome 53 Is Rejecting Chase Bank's Symantec Certificate
Update (Thursday, November 10, 2016): Due to a bug in Chrome, versions of Chrome 53 that are more than 10 weeks old now display this error message for all websites using Symantec certificates that were...
View ArticleWebhook Tester
Webhook Tester allows you to easily test webhooks and other types of HTTP requests.Here's your unique URL:http://{{ domain }}/{{ token.uuid }}(try it!)Any requests sent to that URL are instantly logged...
View ArticleInternet Freedom Wanes as Governments Target Messaging, Social Apps
Freedom House reviews restrictions to Internet access and how it's used around the world, weighing whether countries are free, partly free or not free in terms of Internet freedom. Freedom Househide...
View Article“I have toyota corola”
Modern cars have fancy infotainment setups, big screens and all sorts of computers with networked functionality built-in. Part of that fanciness is increasingly often a curl install. curl is a part of...
View ArticleGuerrilla Bike Lanes: San Francisco Makes Illicit Infrastructure Permanent
Toggle NavigationEpisodesArticlesAboutThe ShowThe StaffContactPressSponsorsDonateSubscribeiTunesPodcast FeedSite FeedNewsletter Search FacebookTwitterInstagramTumblrStore
View ArticleCompromising a Linux desktop using 6502 opcodes on the NES
OverviewA vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc....
View ArticleWazer introduces the first desktop water-jet cutter
The phrase “desktop fabrication” has for the most part meant 3D printers and laser cutters. There are also small computer-numerical-control (CNC) mills and routers to be had, but until now you’d be...
View ArticleGwen Ifill, Award-Winning Political Reporter and Author, Dies at 61
PhotoGwen Ifill reported for The Washington Post and The New York Times.Credit Brendan Smialowski/Getty Images for Meet The Press Gwen Ifill, an award-winning television journalist for NBC and PBS,...
View ArticleFullstack Academy (YC S12) is hiring developers who love teaching
Fullstack Academy is the premier software development school located in the Financial District of Manhattan. Y Combinator backed and named “Best Coding Bootcamp of 2015” by SkilledUp, our school has...
View ArticleAsk HN: Best encrypted messaging app atm?
At the moment, Signal and Wire seem to be the best options. They have open-source clients, end-to-end encryption, are easy enough to use that even less-computer savy people can be realistically...
View Article