1. Subdomain.center – discover all subdomains for a domain

Total comment counts : 36

Summary

The article discusses how Subdomain Center uses a combination of tools, including Apache’s Nutch, Calidog’s Certstream, OpenAI’s Embedding Models, and some proprietary tools, to identify more subdomains than any other service. The service has implemented a rate limit of 3 requests per minute to prevent abuse, but they apologize for any downtime or delays that may occur. They humorously mention that their servers are sometimes overwhelmed by both demanding users and a less powerful infrastructure. The service is also referred to as a command-line utility.

Top 1 Comment Summary

The article explains that it is no longer possible to hide anything on the internet because regular scans of the full IPv4 range are conducted by various entities. If a port is opened on a public IP, it will be found, especially if it is on a standard port. The author emphasizes that many people are still unaware of this fact and may inadvertently expose services without authentication on public IPs. The article also mentions Certificate Transparency logs, which make it impossible to hide an HTTPS service without a wildcard certificate. The author recommends using tools like crt.sh, subdomain.center, hackertarget.com, and Detectify to find exposed subdomains, and suggests using a brute-force tool like Sublist3r to complement the search.

Top 2 Comment Summary

The article claims that it is not possible for a website to gather information on “all subdomains” unless it is performing a specific action. The article suggests that the website may be a scraper or guesser that uses methods such as certificate transparency and common names to gather information. However, the article concludes that these claims are false.

2. Tracking Austrian grocery prices by scraping store sites

Total comment counts : 42

Summary

error

Top 1 Comment Summary

The article states that prices in supermarkets are significantly higher in Austria compared to Germany. The author provides several reasons for this, including less price sensitivity among Austrian consumers, higher logistics costs due to lower population density and difficult-to-reach locations, slightly higher VAT in Austria, higher wages for supermarket and logistics workers in Austria compared to Germany, and a higher density of supermarkets in Austria. The author argues that consumer choices and preferences play a significant role in the higher prices, suggesting that if Austrians were more price-conscious like Germans, prices would decrease.

Top 2 Comment Summary

The author, an Austrian developer and consumer, expresses frustration over being ripped off for no reason and seeing no change. However, they appreciate Mario for remaining focused on the topic and not becoming overwhelmed.

3. Everyday uses for PVC water pipe

Total comment counts : 40

Summary

The article you provided is showing an error message that states the requested resource could not be found on the server.

Top 1 Comment Summary

The article describes how people on YouTube use PVC, cutting, heating, and flattening it to create scale models. The article highlights a remarkable working excavator built using this technique.

Top 2 Comment Summary

The article explains that using PVC water pipes in your house is generally not allowed according to plumbing codes. This is because PVC loses strength at higher temperatures, making it unsuitable for household hot water. Manufacturers do not rate PVC pipes for temperatures above 140 degrees F. CPVC, on the other hand, has better hot water performance and can be easily found. It can also be glued like PVC if the right glue is used. However, CPVC pipes are usually sold in “copper tube size” instead of Schedule 40/80, but this allows many push-to-connect fittings to work with CPVC pipes.

4. enron :: discover the power of WHY (2001)

Total comment counts : 23

Summary

error

Top 1 Comment Summary

The author recounts their experience interviewing at Enron in late 2001. Despite the company’s later downfall, the interview process was comprehensive and satisfying. The job market was tough at the time, and Enron seemed like a great opportunity compared to other options. The author was impressed by the company’s opulence, high pay, and the enthusiasm of the software professionals working there. They were largely unaware of the brewing scandals surrounding Enron during the interview. After a successful interview, the author expected to receive an offer, but the collapse of Enron occurred, leaving all of the employees jobless. The author sold some Enron merchandise they received at the interview years later at a garage sale.

Top 2 Comment Summary

The author joined a fiber optics networking division of an energy trading company called Dynegy after the dotcom crash. However, Dynegy backed out of a planned buyout with Enron due to Enron’s accounting scandal. This led to a legal battle between Enron and Dynegy, resulting in job layoffs. The author had multiple managers during their 11 months of employment and was one of the few remaining employees in the headquarters. They also kept a photo of Jeff Skilling, who was involved in the Enron scandal, as their desktop background.

5. Johnny Cash Has Been Everywhere (Man)

Total comment counts : 28

Summary

error

Top 1 Comment Summary

The article is about the song “I’ve Been Everywhere” and how the placenames mentioned in the song were originally Australian but were adapted for the North American market.

Top 2 Comment Summary

The article suggests that as computer scientists, we should assume that the person took the shortest path between their final destinations instead of traveling between them sequentially.

6. The first week of US v. Google – Defaults are everything and nobody likes Bing

Total comment counts : 19

Summary

The US Justice Department has launched a major antitrust trial against Google, alleging that the company used anti-competitive tactics to maintain its dominant position in the search engine market. The government argues that Google’s success is not simply due to a good design, but to coercive deals that have stifled competition. The trial, which is expected to last 10 weeks, began quietly with a small crowd in the courtroom. The case focuses on Google’s use of default search deals and the vast amount of search data it collects to improve its engine, creating a feedback loop that makes it difficult for competitors to catch up. The Justice Department is drawing parallels to the antitrust case against Microsoft in the 1990s, but Google argues that the situations are different and that it is facing punishment for its success. The trial will determine whether Google’s actions benefit consumers or hinder competition.

Top 1 Comment Summary

The article discusses criticism of excerpts from an interview with Sridhar Ramaswamy, the former head of Google AdWords and founder of Neeva. Schmidtlein, the subject of the criticism, claims that the excerpts are cherry-picked and taken out of context. The author questions the validity of the “out of context” defense and highlights that the article fails to mention Ramaswamy’s previous role at Google.

Top 2 Comment Summary

The article expresses disappointment with the focus on defaults in relation to Microsoft’s conglomerated system. It argues that the tying of various parts of the system makes it difficult for smaller corporations to compete. The capturing of the search default on Android is seen as a minor aspect of their overall strategy, and the article suggests that Google could pay for the default or allow users to choose, which would have minimal impact on the search market. The article also mentions the question of whether consumer harm applies to free products like search engines.

7. Relational is more than SQL

Total comment counts : 10

Summary

The article announces that Fauna, a company working on globally distributed systems and serverless databases, is hiring. It also encourages readers to subscribe to their newsletter to receive blog posts, development tips, tricks, and learning materials directly in their inbox.

Top 1 Comment Summary

The article discusses a new product called Fauna, which the author discovered through a promotional article. The author found the article interesting because they work with databases, and they were intrigued by the fact that the author of the article was an industry veteran. The article provides information about SQL and affirms the author’s existing knowledge. In the final section, the author mentions that they learned about Fauna through the article and praises the marketing approach used.

Top 2 Comment Summary

The article discusses PRQL, a revamped version of SQL designed to improve the data transformation experience for data scientists, data analysts, and analytics engineers. PRQL combines the eternal nature of Relational Algebra with the modern ergonomics and composability of functional languages. It is an open-source compiler that produces SQL code, allowing users to work with their current databases. PRQL is committed to remaining open-source and independent.

8. Horcrux: Split your file into encrypted fragments

Total comment counts : 36

Summary

The article discusses a tool called “horcrux” that allows users to split a file into encrypted fragments, similar to the concept of horcruxes in the Harry Potter universe. The tool has two commands: “split” and “bind”. By using the “split” command, users can choose the number of horcruxes they want and the number required to resurrect the original file. The horcrux files can then be dispersed in various locations. The “bind” command is used to combine the horcruxes back into the original file. The tool utilizes the Shamir Secret Sharing Scheme to break an encryption key into parts that can be recombined using a certain threshold. It is based on Hashicorp’s implementation from their vault repository.

Top 1 Comment Summary

The article describes a tool that uses the AES algorithm in Output Feedback (OFB) mode to encrypt/decrypt files. However, it should be noted that this tool does not guarantee the integrity of the ciphertext, as it does not provide a Message Authentication Code (MAC) for verification.

Top 2 Comment Summary

The article discusses an innovative paper-based backup tool called “paperback” that utilizes Shamir Secret Sharing technology. This tool allows users to create paper copies of files and distribute them to different individuals for secure storage. The aim is to provide a robust backup system that can be restored optically if needed. The tool is available on GitHub for further exploration.

9. Pixel Sea: Search 88x31 badges and 32x32 icons

Total comment counts : 15

Summary

error

Top 1 Comment Summary

The article is a list of websites with links provided for each one. The websites are described as being entertaining.

Top 2 Comment Summary

The article discusses an opportunity for readers to create their own Antipixel-style badge at a website called acasystems.com. The author expresses their fondness for the design of these badges.

10. Show HN: exaequOS - a new OS running in a web browser

Total comment counts : 18

Summary

error

Top 1 Comment Summary

This article discusses an operating system built using a kernel and userland programs that can run on it. The file system in this OS is queried over HTTP and not cached, potentially to allow multiple users to access and update the same remote filesystem. However, there are some bugs and issues mentioned, such as hanging when using pipes to chain commands and the failure of subsequent commands after using an append file redirection.

Top 2 Comment Summary

The article suggests that Web Assembly enables the creation of web applications with a better user experience without relying heavily on HTML, HTTP, XML, JavaScript, and browsers. The author wishes for a new standard in this area to avoid individual developers creating their own thin client app solutions. The article also mentions various UI best practices and standards for desktop applications.