Hacker Newsnew | past | comments | ask | show | jobs | submit | atulagarwal's submissionslogin
1.AdSense Policy Update: Ad Limits per Page Lifted, Valuable Inventory Introduced (adpushup.com)
3 points by atulagarwal on Aug 22, 2016 | past
2.So, You Want to Move Your Startup to Silicon Valley. Now What? (entrepreneur.com)
1 point by atulagarwal on March 31, 2015 | past
3.Lcamtuf's Technical “whitepaper” for afl-fuzz (coredump.cx)
3 points by atulagarwal on Feb 3, 2015 | past
4.Stenography & Reversing Multilayer .NET Malware (cisco.com)
2 points by atulagarwal on Nov 18, 2014 | past | 1 comment
5.Vulnerability in Kerberos Could Allow Elevation of Privilege (technet.microsoft.com)
4 points by atulagarwal on Nov 18, 2014 | past
6.Disarming and Bypassing EMET 5.1 (offensive-security.com)
2 points by atulagarwal on Nov 18, 2014 | past
7.Fuzzing random programs without execve() (lcamtuf.blogspot.com)
7 points by atulagarwal on Nov 17, 2014 | past
8.Abusing Samsung KNOX to remotely install a malicious application (quarkslab.com)
3 points by atulagarwal on Nov 17, 2014 | past
9.Hardening the RPKI Against Faulty or Misbehaving Authorities (bu.edu)
2 points by atulagarwal on Nov 17, 2014 | past
10.Deep Dive into the (Joomla) HikaShop Vulnerability (sucuri.net)
2 points by atulagarwal on Nov 17, 2014 | past
11.Google has peering servers to cache videos at ISP level (peering.google.com)
1 point by atulagarwal on Nov 13, 2014 | past
12.Mozilla updates Firefox with Forget button and DuckDuckGo search (venturebeat.com)
2 points by atulagarwal on Nov 12, 2014 | past
13.Stuxnet 'Patient Zero' Attack Targets Revealed (darkreading.com)
2 points by atulagarwal on Nov 12, 2014 | past
14.A Php Implementation of Benjamin Donelly's Ball and Chain (github.com/eqbot)
1 point by atulagarwal on Nov 11, 2014 | past
15.From 0-Day to Exploit - Buffer Overflow in Belkin N750 (CVE-2014-1635) (integrity.pt)
52 points by atulagarwal on Nov 10, 2014 | past | 8 comments
16.EMET 5.1 is available (technet.com)
1 point by atulagarwal on Nov 10, 2014 | past
17.China ELF botnet malware infection and distribution scheme unleashed (malwaremustdie.org)
1 point by atulagarwal on Nov 10, 2014 | past
18.`dpkg' format string vulnerability. CVE-2014-8625 (internot.info)
4 points by atulagarwal on Nov 10, 2014 | past
19.List of non-qualifying bug-bounty reports (Google) (sites.google.com)
4 points by atulagarwal on Nov 10, 2014 | past
20.Google Bug Hunter University (sites.google.com)
4 points by atulagarwal on Nov 10, 2014 | past | 2 comments
21.Pulling JPEGs out of thin air (lcamtuf.blogspot.com)
444 points by atulagarwal on Nov 7, 2014 | past | 83 comments
22.Security researchers have every right to be paranoid about LinkedIn Intro (venturebeat.com)
3 points by atulagarwal on Oct 29, 2013 | past
23.How “1000X” Technologies They Hope Will Bring Earth Online (techcrunch.com)
1 point by atulagarwal on Sept 17, 2013 | past
24.Oracle’s Java Security Fails (krebsonsecurity.com)
1 point by atulagarwal on Sept 5, 2013 | past
25.Guide to Getting Traffic (adpushup.com)
8 points by atulagarwal on Aug 15, 2013 | past
26.History of Online Advertising (adpushup.com)
2 points by atulagarwal on Aug 15, 2013 | past | 1 comment
27.History of Online Advertising
3 points by atulagarwal on Aug 15, 2013 | past
28.Stats about Conversion Rate Optimization and A/B Testing (adpushup.com)
4 points by atulagarwal on July 21, 2013 | past
29.Facts about Banner and Display Advertising (adpushup.com)
13 points by atulagarwal on July 10, 2013 | past | 5 comments
30.Indian Toon Porn Godess 'Savita Bhabhi' gets movie & a subscription-based model (indiatimes.com)
2 points by atulagarwal on May 13, 2013 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: