Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
How to Prevent the next Heartbleed (2014) (dwheeler.com)
2 points by weinzierl on May 29, 2016 | past
Fixing Posix Filenames: Control Characters, Leading Dashes, and Other Problems (dwheeler.com)
2 points by tambourine_man on Jan 31, 2016 | past
Introduction to the Autotools (2012) (dwheeler.com)
112 points by ingve on Jan 31, 2016 | past | 55 comments
Generally Recognized as Mature (GRAM) OSS/FS Programs (dwheeler.com)
1 point by kluck on April 24, 2015 | past
Countering Trusting Trust Through Diverse Double-Compiling (DDC) (dwheeler.com)
15 points by lobo_tuerto on Feb 24, 2015 | past | 6 comments
Filenames and Pathnames in Shell: How to Do It Correctly (dwheeler.com)
2 points by panic on Feb 11, 2015 | past
Filenames and Pathnames in Shell: How to Do It Correctly (2010) (dwheeler.com)
85 points by thefox on Feb 9, 2015 | past | 20 comments
More Than a Gigabuck: Estimating GNU/Linux's Size (2001) (dwheeler.com)
2 points by pmoriarty on Dec 2, 2014 | past
The Apple goto fail vulnerability: lessons learned (dwheeler.com)
4 points by AndreyKarpov on Nov 26, 2014 | past
“Shellshock” (dwheeler.com)
92 points by bronson on Oct 8, 2014 | past | 22 comments
Filenames and Pathnames in Shell: How to Do It Correctly (dwheeler.com)
9 points by santosha on Sept 18, 2014 | past | 2 comments
Ada, C, C++, and Java vs. The Steelman (1997) (dwheeler.com)
32 points by diegoperini on May 17, 2014 | past | 25 comments
How programmers can prevent the next Heartbleed (dwheeler.com)
1 point by slyall on May 2, 2014 | past
How to Prevent the next Heartbleed (dwheeler.com)
13 points by sarahj on April 30, 2014 | past
Vulnerability bidding wars and vulnerability economics (dwheeler.com)
3 points by robin_reala on Nov 26, 2013 | past
Fixing Unix Filenames (2012) (dwheeler.com)
107 points by laurent123456 on Oct 31, 2013 | past | 76 comments
Readable s-expressions for Lisp-based languages (dwheeler.com)
2 points by andreypopp on Oct 15, 2013 | past
Countering Trojan Horse Attacks on Compilers (dwheeler.com)
2 points by lelf on Sept 12, 2013 | past
The Most Important Software Innovations, and Software Patents (dwheeler.com)
1 point by ksrm on Aug 30, 2013 | past
Countering Trojan Horse attacks on Compilers (dwheeler.com)
2 points by mazsa on Feb 22, 2013 | past | 2 comments
Fixing Unix/Linux/Posix Filenames (dwheeler.com)
3 points by decklin on Jan 24, 2013 | past
Filenames and Pathnames in Shell: How to do it correctly (dwheeler.com)
5 points by martincmartin on Oct 19, 2012 | past
Fixing Unix Filenames: Control Characters, Leading Dashes, and Other Problems (dwheeler.com)
52 points by ralph on Sept 6, 2012 | past | 43 comments
SLOCCount (dwheeler.com)
1 point by ankurpatel on June 12, 2012 | past
Insecure open source software libraries? (dwheeler.com)
3 points by sciurus on April 9, 2012 | past | 1 comment
Fixing *nix filneame (dwheeler.com)
2 points by gcmalloc on March 6, 2012 | past
Filenames and Pathnames in Shell: How to do it correctly (dwheeler.com)
4 points by gmartres on March 4, 2012 | past
Microsoft Was The 5th Corporate Contributor to the Linux Kernel 3.0.0 (dwheeler.com)
2 points by wslh on July 16, 2011 | past
Fixing Unix/Linux/Posix Filenames (dwheeler.com)
1 point by ptramo on June 26, 2011 | past
Sweet-expressions: A readable format for Lisp-like languages (dwheeler.com)
85 points by evanrmurphy on Nov 26, 2010 | past | 81 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: