<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: dunsany</title><link>https://news.ycombinator.com/user?id=dunsany</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 01:29:33 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=dunsany" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by dunsany in "The Gorman Paradox: Where Are All the AI-Generated Apps?"]]></title><description><![CDATA[
<p>Most of ours are internal-only because we don't need or want to release them to the public. Sometimes there isn't much of an UI - they're one-off vibe-coded apps for specialized functions within our organization meant for a small number of people. Beginning to think of the vibe-coded apps akin to spreadsheets with lots of macros.</p>
]]></description><pubDate>Sun, 14 Dec 2025 14:30:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=46263266</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=46263266</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46263266</guid></item><item><title><![CDATA[New comment by dunsany in "Learn Prolog Now (2006)"]]></title><description><![CDATA[
<p>Learn it now? I learned back in the 80s... and have since forgotten</p>
]]></description><pubDate>Wed, 12 Nov 2025 18:06:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=45903493</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=45903493</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45903493</guid></item><item><title><![CDATA[New comment by dunsany in "Monodraw"]]></title><description><![CDATA[
<p>Own it, love it... corporate standard is Lucidchart but prefer Monodraw.</p>
]]></description><pubDate>Wed, 27 Aug 2025 15:53:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=45041360</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=45041360</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45041360</guid></item><item><title><![CDATA[New comment by dunsany in "Careless People"]]></title><description><![CDATA[
<p>Have you heard the stories about Uber?</p>
]]></description><pubDate>Thu, 24 Apr 2025 11:54:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=43781623</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=43781623</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43781623</guid></item><item><title><![CDATA[IoT Vulnerability Assessment of the Irish IP Address Space]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.f5.com/labs/articles/threat-intelligence/iot-vulnerability-assessment-of-the-irish-ip-address-space">https://www.f5.com/labs/articles/threat-intelligence/iot-vulnerability-assessment-of-the-irish-ip-address-space</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=25145924">https://news.ycombinator.com/item?id=25145924</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 19 Nov 2020 03:33:40 +0000</pubDate><link>https://www.f5.com/labs/articles/threat-intelligence/iot-vulnerability-assessment-of-the-irish-ip-address-space</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=25145924</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25145924</guid></item><item><title><![CDATA[Making the Most of a Security Incident]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.f5.com/labs/articles/cisotociso/making-the-most-of-a-security-incident">https://www.f5.com/labs/articles/cisotociso/making-the-most-of-a-security-incident</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=23967425">https://news.ycombinator.com/item?id=23967425</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 27 Jul 2020 17:39:42 +0000</pubDate><link>https://www.f5.com/labs/articles/cisotociso/making-the-most-of-a-security-incident</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=23967425</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23967425</guid></item><item><title><![CDATA[Turing in His Grave: What Human Captcha Solvers Reveal About Control Design]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.f5.com/labs/articles/cisotociso/turing-in-his-grave--what-human-captcha-solvers-reveal-about-con">https://www.f5.com/labs/articles/cisotociso/turing-in-his-grave--what-human-captcha-solvers-reveal-about-con</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=23343502">https://news.ycombinator.com/item?id=23343502</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 28 May 2020 22:14:57 +0000</pubDate><link>https://www.f5.com/labs/articles/cisotociso/turing-in-his-grave--what-human-captcha-solvers-reveal-about-con</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=23343502</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23343502</guid></item><item><title><![CDATA[A Letter to the Present from a Post-Pandemic IT Director]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.f5.com/labs/articles/cisotociso/a-letter-to-the-present-from-a-post-pandemic-it-director">https://www.f5.com/labs/articles/cisotociso/a-letter-to-the-present-from-a-post-pandemic-it-director</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=23033216">https://news.ycombinator.com/item?id=23033216</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 30 Apr 2020 17:07:09 +0000</pubDate><link>https://www.f5.com/labs/articles/cisotociso/a-letter-to-the-present-from-a-post-pandemic-it-director</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=23033216</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23033216</guid></item><item><title><![CDATA[Hard Choices in Cybersecurity by Dan Geer]]></title><description><![CDATA[
<p>Article URL: <a href="http://geer.tinho.net/geer.cloudsecurityalliance.24ii20.txt">http://geer.tinho.net/geer.cloudsecurityalliance.24ii20.txt</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=22443546">https://news.ycombinator.com/item?id=22443546</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 28 Feb 2020 15:50:43 +0000</pubDate><link>http://geer.tinho.net/geer.cloudsecurityalliance.24ii20.txt</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=22443546</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22443546</guid></item><item><title><![CDATA[New comment by dunsany in "The US Secret Service mistook a cyberpunk RPG for a hacker's handbook"]]></title><description><![CDATA[
<p>Yeah, anyone remember this book about it? <a href="https://en.wikipedia.org/wiki/The_Hacker_Crackdown" rel="nofollow">https://en.wikipedia.org/wiki/The_Hacker_Crackdown</a></p>
]]></description><pubDate>Sat, 15 Feb 2020 01:03:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=22332161</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=22332161</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22332161</guid></item><item><title><![CDATA[Are Gen Z-Ers More Security Savvy Online Than Millennials?]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.f5.com/labs/articles/threat-intelligence/are-gen-z-ers-more-security-savvy-online-than-millennials-">https://www.f5.com/labs/articles/threat-intelligence/are-gen-z-ers-more-security-savvy-online-than-millennials-</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=22321061">https://news.ycombinator.com/item?id=22321061</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 13 Feb 2020 20:18:20 +0000</pubDate><link>https://www.f5.com/labs/articles/threat-intelligence/are-gen-z-ers-more-security-savvy-online-than-millennials-</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=22321061</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22321061</guid></item><item><title><![CDATA[Breach causes year after year? Same old, same old: web injections and phishing]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.f5.com/labs/articles/threat-intelligence/application-protection-research-series-executive-summary">https://www.f5.com/labs/articles/threat-intelligence/application-protection-research-series-executive-summary</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=21731368">https://news.ycombinator.com/item?id=21731368</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 07 Dec 2019 17:19:50 +0000</pubDate><link>https://www.f5.com/labs/articles/threat-intelligence/application-protection-research-series-executive-summary</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=21731368</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21731368</guid></item><item><title><![CDATA[Breaking Down the Door to Emergency Services Through Cellular IoT Gateways]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.f5.com/labs/articles/threat-intelligence/breaking-down-the-door-to-emergency-services-through-cellular-io">https://www.f5.com/labs/articles/threat-intelligence/breaking-down-the-door-to-emergency-services-through-cellular-io</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=17724625">https://news.ycombinator.com/item?id=17724625</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 09 Aug 2018 14:47:14 +0000</pubDate><link>https://www.f5.com/labs/articles/threat-intelligence/breaking-down-the-door-to-emergency-services-through-cellular-io</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=17724625</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17724625</guid></item><item><title><![CDATA[A Tale from the Early Days of Busting Hackers [audio]]]></title><description><![CDATA[
<p>Article URL: <a href="http://knkx.org/post/tale-early-days-busting-hackers">http://knkx.org/post/tale-early-days-busting-hackers</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=16145187">https://news.ycombinator.com/item?id=16145187</a></p>
<p>Points: 26</p>
<p># Comments: 6</p>
]]></description><pubDate>Sun, 14 Jan 2018 17:33:38 +0000</pubDate><link>http://knkx.org/post/tale-early-days-busting-hackers</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=16145187</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=16145187</guid></item><item><title><![CDATA['IT Security' finally starts to make sense]]></title><description><![CDATA[
<p>Article URL: <a href="http://www.bgdailynews.com/community/it-security-finally-starts-to-make-sense/article_1e7578b5-7e63-564f-a94b-ed8a65654948.html?utm_medium=social&utm_source=facebook&utm_campaign=user-share">http://www.bgdailynews.com/community/it-security-finally-starts-to-make-sense/article_1e7578b5-7e63-564f-a94b-ed8a65654948.html?utm_medium=social&utm_source=facebook&utm_campaign=user-share</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=13058997">https://news.ycombinator.com/item?id=13058997</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 28 Nov 2016 22:29:03 +0000</pubDate><link>http://www.bgdailynews.com/community/it-security-finally-starts-to-make-sense/article_1e7578b5-7e63-564f-a94b-ed8a65654948.html?utm_medium=social&amp;utm_source=facebook&amp;utm_campaign=user-share</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=13058997</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13058997</guid></item><item><title><![CDATA[New comment by dunsany in "What happens when your server is compromised and you get help from the FBI?"]]></title><description><![CDATA[
<p>I wrote a paper on the NW Hospital case that involved FBI investigation <a href="http://www.planetheidi.com/Pompon-VB2010.pdf" rel="nofollow">http://www.planetheidi.com/Pompon-VB2010.pdf</a></p>
]]></description><pubDate>Thu, 04 Jun 2015 04:06:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=9657395</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=9657395</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=9657395</guid></item><item><title><![CDATA[New comment by dunsany in "Cult of the Dead Cow Publications"]]></title><description><![CDATA[
<p>I remember seeing these guys at Defcon for the release of Back Orifice 2k.  Full-on rockstars</p>
]]></description><pubDate>Sun, 09 Nov 2014 17:05:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=8580257</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=8580257</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=8580257</guid></item><item><title><![CDATA[New comment by dunsany in "Why I use non-American English voices in my text to speech"]]></title><description><![CDATA[
<p>Yeah, the problem we found is that when we switched to non-American English, Siri expects us to be speaking it as well... and messes up what she understands.</p>
]]></description><pubDate>Mon, 10 Mar 2014 22:01:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=7375977</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=7375977</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7375977</guid></item><item><title><![CDATA[Hofstadter's Corollary on Remediation]]></title><description><![CDATA[
<p>Article URL: <a href="http://assumebreach.blogspot.com/2012/08/hofstadters-corollary-on-remediation.html">http://assumebreach.blogspot.com/2012/08/hofstadters-corollary-on-remediation.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=4339189">https://news.ycombinator.com/item?id=4339189</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 04 Aug 2012 18:21:24 +0000</pubDate><link>http://assumebreach.blogspot.com/2012/08/hofstadters-corollary-on-remediation.html</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=4339189</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=4339189</guid></item><item><title><![CDATA[New comment by dunsany in "Surprise Quiz Puzzle"]]></title><description><![CDATA[
<p><a href="http://en.wikipedia.org/wiki/Unexpected_hanging_paradox" rel="nofollow">http://en.wikipedia.org/wiki/Unexpected_hanging_paradox</a></p>
]]></description><pubDate>Tue, 03 Mar 2009 23:45:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=502240</link><dc:creator>dunsany</dc:creator><comments>https://news.ycombinator.com/item?id=502240</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=502240</guid></item></channel></rss>