Technology and startup enthusiasts making a dent in the universe.
See all
Members (319,271)
Bilal Shaheen's profile photo
Brian Paone's profile photo
Condor Epic's profile photo
DB Cooper's profile photo
Dale Bustad's profile photo
Jason Kolb's profile photo
Jeremy Kolb's profile photo
Michael Keely's profile photo
Michael Mahemoff's profile photo
Scott Kocher's profile photo
A.Gayathri Gayu's profile photo
AJ Skilz's profile photo
A D Home Improvement Centre Ltd.'s profile photo
0041 3160's profile photo
1 Chicago Carpet Cleaner's profile photo
A.C. Ault's profile photo
AFAQ ABID's profile photo
ABRAHAM JEROME's profile photo
AGUS ARDIYANSYAH's profile photo
510milkman's profile photo
A. Dieringer's profile photo
AFF UNTEDARMY's profile photo
AAKASH DAS's profile photo
AK B's profile photo

Stream

Join this community to post or comment
Pinned by moderator

Brian Paone
moderator

Discussion  - 
 
A friendly reminder, hackerinos - we aren't here for blackhattery. So asking for cracks, codes, and other such nonsense probably isn't the best of ideas here.

Enjoy your Sunday! -bp
329
26
Perilordbaden Powel's profile photoHeather Mccoy's profile photo
 
A recap of IBM Interconnect and the rise of #MQTT due to the prominence of connected devices. #iot #api
The glitz and glamour of the Strip was the perfect locale for this enormous and lively conference hosted by IBM and showcasing some of the latest trends in cloud, API, and Internet of Things.
1
Add a comment...
 
My g.f. is into tech really heavy, but she is very sneaky. Need help. Some one hit me up. 
1
Valdis Kletnieks's profile photolost-n- here again's profile photo
5 comments
 
She has complete access to my phone. &Accounts through by way of her skills with knowledge as a contr. developer. I'm 20yrs.older than her, l know nosey people get their fealings hurt. I have never snooped nor l I. It the principle. She needs to understand trust is key. I was young & wild as hell not to long ago. 
Add a comment...
 
 
Right now there is no way to tell if your computer has been compromised. This needs to change.
It's an interesting time to be a computer security researcher. Last week, Kaspersky Lab released a report about a new family of malware from an entity they called "The Equation Group". The report demonstrated for the first time that firmware-based attacks, previously only demonstrated in lab settings, have been used in the wild by malware authors.
7 comments on original post
5
2
MEGA Leon's profile photoBenjamin Hamilton's profile photoJoel 'Senpai' Farris's profile photoCynthia Runge's profile photo
2 comments
 
Ok
Add a comment...

AskApache

Discussion  - 
 
If you have the means, you have the right to challenge an entire nation.. even the entire world. Work hard
3
Add a comment...

Jeff Douglas

HN Links  - 
 
We were surprised the other day when we realized that If Programming Languages were didn't have a category for beer. It seemed like such a tragic mistake, so I naturally started a shared doc at Appirio and began to collect ideas. Here's what we came up with. Let us know if we missed anything ...
8
3
Benjamin Hamilton's profile photoFelipe Calderon Barragan's profile photoPaul Glaze's profile photoRanganathan Venkatachariar's profile photo
3 comments
 
Gotta love a cold one
Add a comment...
 
Developing real time app using Socket.io and Nodej.js :)
6
1
Josh Huff's profile photo
Add a comment...
 
Wordpress is one of the most widely used, if not the most widely used, blogging platform. Even sites that are not exactly designed as blogs (news) or publishing sites could be using Wordpress for their content management. It has a plugin system and that is where the most recent vulnerabilities have been found.
 
Is there any way to hack a weblog? 
16 comments on original post
1
Add a comment...
 
Is there any way to hack a weblog? 
1
1
Sam D's profile photoTata Love's profile photoJustin Dearing's profile photo
16 comments
 
Hackers are creepy individuals
Add a comment...

J Powell

HN Links  - 
 
low introducing the 9 5XMKYghOCEXuGM 252F the hotel 983 I have to pay for the room and 29 I 8l Google Now: http://youtu.be/pPqliPzHYyc
1

About this community

Welcome to the Hacker News community, an awesome place for you to ask questions, show off your latest project, share interesting links, and discuss technology news. *Important* Although the community title has 'hacker' in it, it doesn't mean we hack things or do anything illegal. See "What is a 'hacker'?" below. *Important* If you have a tech support question, there are other forums for that, go there. We are here to talk about tech, not to fix it. *Important* If you share a link, add some context. Explain why it's relevant to the community.
Planet Earth
2
1
Johnny Acevedo's profile photoLucas Johannes's profile photo
 
Peleas. De. Mujeres. En. LA. Calls...
 ·  Translate
Add a comment...

Sunit P

Discussion  - 
 
Hi friends. Can anyone sugesst any app to track my mobile by imei number.
Pls pls
2
Kevin M's profile photo
Kevin M
 
Try prey from preyproject
Add a comment...
 
Lol or ouch?
Ride-sharing service subpoenas GitHub for IP addresses that accessed security key.
12
3
Brian Taylor's profile photoJosh Sabboth's profile photoJason McKinney's profile photoInter Action's profile photo
4 comments
 
I'd have to say, "Both!" From what I've heard about this so-called company, it sounds about par for the course. "Why bother with anything other than how to increase profits when the cash keeps on rolling in", seems to be their philosophy. Oh, no! Cash will be going out, should they get sued. I guess we'll see some kind of action from them if it goes down like that.
Add a comment...
 
Tripwire concludes its series on some of the most notorious cyber criminals brought to justice with Noor Aziz and Farhan Arshad, two of the most wanted #hackers by the FBI who defrauded telecommunications companies, government agencies, and private individuals of over $50 million.

By David Bisson​ of +Tripwire, Inc.
Tripwire now concludes its series on some of the most notorious cyber criminals brought to justice with Noor Aziz and Farhan Arshad
3
AskApache's profile photo
 
Nice
Add a comment...

Sai Priya Mahajan

Announcements  - 
 
Hey Guys! Check out Eatlo! Food - order in 20 seconds, get in 20 mins!
Guilt-free meals designed and prepared by professional chefs, delivered in ...
1
Add a comment...

Mora Tama

Discussion  - 
1
Add a comment...
 
 
Check out these resources your church can use reach your community during Easter from @RethinkChurch! http://ow.ly/JKodd #UMC
At Easter time, people aren’t just looking for colored eggs and chocolate bunnies. Here are resources your church can use to help people in your community find the deeper, more fulfilling things for which they are searching this season: love, hope, joy.
View original post
5
Dagon Gracie's profile photo
 
Nope! 😊
Add a comment...

rumbo roky

Discussion  - 
 
#android secret codes!
Complete Information About your android Phone *#*#4636#*#* .These android secrets are useful to find out the full information about your android device ...
23
10
Brandon Mandeville's profile photousama shahid's profile photohumza shakir's profile photoAnnalize Maxwell's profile photo
 
I have a galaxy s4, and non of these codes work. Either the phone "makes a call" to the code, or it shows up a screen that says the USSD code is wrong.
Add a comment...

david olmos

Discussion  - 
 
Has anybody heard of this DLL PROGRAM IF IT'S GOOD.
1
Justin N's profile photodavid olmos's profile photo
2 comments
 
Oh yeah lol its called dynamic link library system. It collections all my data but I don't know who collects it's. 
Add a comment...