Feed aggregator
Calculus Bridge: What It Is, How to Prevent One and How It Affects Your Teeth
Rhombus: A New Spin on Macros Without All the Parentheses
Article URL: https://dl.acm.org/doi/10.1145/3622818
Comments URL: https://news.ycombinator.com/item?id=42041070
Points: 1
# Comments: 0
CSS Pokémon Cards
Article URL: https://github.com/simeydotme/pokemon-cards-css
Comments URL: https://news.ycombinator.com/item?id=42041068
Points: 2
# Comments: 0
Elon Musk's Robotaxi Dreams Are Premature
Article URL: https://www.wsj.com/business/autos/elon-musk-robotaxi-end-to-end-ai-plan-1827e2bd
Comments URL: https://news.ycombinator.com/item?id=42041048
Points: 1
# Comments: 0
Show HN: Twitter to Mastodon Tool
Article URL: https://twitter2mastodon.com
Comments URL: https://news.ycombinator.com/item?id=42041043
Points: 1
# Comments: 0
The Usenet Oracle
Article URL: https://internetoracle.org/
Comments URL: https://news.ycombinator.com/item?id=42041001
Points: 4
# Comments: 0
Four Posts on Instagram Destroyed Her Life
Article URL: https://www.nytimes.com/2024/11/03/magazine/israel-free-speech.html
Comments URL: https://news.ycombinator.com/item?id=42040993
Points: 1
# Comments: 1
A Missing IDE Feature
Article URL: https://matklad.github.io/2024/10/14/missing-ide-feature.html
Comments URL: https://news.ycombinator.com/item?id=42040987
Points: 9
# Comments: 2
Best Air Fryer Toaster Ovens for 2024
Mario & Luigi Brothership: Nintendo's Latest Mario RPG Is New, and Deserves a Switch 2
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-8957 PTZOptics PT30X-SDI/NDI Cameras OS Command Injection Vulnerability
- CVE-2024-8956 PTZOptics PT30X-SDI/NDI Cameras Authentication Bypass Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Literacy is good or bad, perhaps
Article URL: https://www.woman-of-letters.com/p/literacy-is-good-or-bad-perhaps
Comments URL: https://news.ycombinator.com/item?id=42040719
Points: 1
# Comments: 0
Why Pg_dump Is Amazing
Article URL: http://rhaas.blogspot.com/2024/11/why-pgdump-is-amazing.html
Comments URL: https://news.ycombinator.com/item?id=42040718
Points: 1
# Comments: 0
Is the Q Source the Origin of the Gospels?
Article URL: https://www.thecollector.com/q-source-origin-gospels/
Comments URL: https://news.ycombinator.com/item?id=42040706
Points: 1
# Comments: 0
Remove Xiaomi bloatwares using adb on Linux
Article URL: https://perdana.dev/remove-xiaomi-bloatwares-using-adb-on-linux/
Comments URL: https://news.ycombinator.com/item?id=42040701
Points: 1
# Comments: 0
Show HN: A site to get traffic and do-follow backlink for your SaaS
What you get:
High-quality do-follow backlink to enhance your SEO.
Featured listing on the directory for increased visibility.
Exposure to thousands of potential customers and early adopters.
Periodic shoutouts from the founder's Twitter account and newsletter.
Requirements:
Your service/application must be functional and deliver what it promises
It's 100% FREE to submit your startup (optional $29 to fast-track listing)
Comments URL: https://news.ycombinator.com/item?id=42040698
Points: 1
# Comments: 0
I Built a Summarizer Tool in 6 Hours Using Cursor Without Coding Experience
Article URL: https://summarizer.best
Comments URL: https://news.ycombinator.com/item?id=42040694
Points: 1
# Comments: 0
The Artificial State
Article URL: https://www.newyorker.com/magazine/2024/11/11/the-artificial-state
Comments URL: https://news.ycombinator.com/item?id=42040686
Points: 1
# Comments: 1
Okta Verify Desktop MFA for Windows Passwordless Login CVE-2024-9191
Article URL: https://trust.okta.com/security-advisories/okta-verify-desktop-mfa-for-windows-passwordless-login-cve-2024-9191/
Comments URL: https://news.ycombinator.com/item?id=42040663
Points: 1
# Comments: 0
The Americans Prepping for a Second Civil War
Article URL: https://www.newyorker.com/magazine/2024/11/11/among-the-civil-war-preppers
Comments URL: https://news.ycombinator.com/item?id=42040653
Points: 1
# Comments: 1