<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: igama</title><link>https://news.ycombinator.com/user?id=igama</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 18 Apr 2026 10:47:24 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=igama" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by igama in "Apple introduces new AirTag with longer range and improved findability"]]></title><description><![CDATA[
<p>Yes</p>
]]></description><pubDate>Mon, 26 Jan 2026 15:54:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=46767175</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=46767175</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46767175</guid></item><item><title><![CDATA[New comment by igama in "The worst programmer I know"]]></title><description><![CDATA[
<p>"Tim wasn’t delivering software; Tim was delivering a team that was delivering software. The entire team became more effective, more productive, more aligned, more idiomatic, more fun, because Tim was in the team." 
 - This happened years ago to me, with a manager pulling me aside and asking why my Tickets resolved were so low... They only cared about the number of tickets worked on...</p>
]]></description><pubDate>Sat, 02 Sep 2023 21:11:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=37365565</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=37365565</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37365565</guid></item><item><title><![CDATA[New comment by igama in "Why Data Breaches Don’t Hurt Stock Prices (2015)"]]></title><description><![CDATA[
<p>Because most people don't care about it and forget about it in the long term?</p>
]]></description><pubDate>Fri, 16 Sep 2022 10:59:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=32864498</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=32864498</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32864498</guid></item><item><title><![CDATA[New comment by igama in "Music for Programming"]]></title><description><![CDATA[
<p>Same for me. I find it boggling people that can listen to audiobooks, podcasts, to shows while working/coding.</p>
]]></description><pubDate>Thu, 07 Jul 2022 08:43:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=32011426</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=32011426</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32011426</guid></item><item><title><![CDATA[New comment by igama in "Check if your IP is exposing any ports. If you see 404 page, nothing is exposed"]]></title><description><![CDATA[
<p>Check the timestamp of the results ;)</p>
]]></description><pubDate>Tue, 22 Sep 2020 18:03:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=24557829</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=24557829</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24557829</guid></item><item><title><![CDATA[New comment by igama in "Check if your IP is exposing any ports. If you see 404 page, nothing is exposed"]]></title><description><![CDATA[
<p>The free page securityrating.io from BinaryEdge also provides that information.<p>For more complex queries about what is being exposed on IPs worldwide (IPV4 and IPV6) You can register a free account on app.binaryedge.io.<p>(Disclaimer: I'm part of the BinaryEdge team)</p>
]]></description><pubDate>Tue, 22 Sep 2020 18:01:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=24557798</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=24557798</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24557798</guid></item><item><title><![CDATA[New comment by igama in "Zoom says it won’t encrypt free calls so it can work more with law enforcement"]]></title><description><![CDATA[
<p>Reply by Alex Stamos:<p><a href="https://twitter.com/alexstamos/status/1268062452123496450" rel="nofollow">https://twitter.com/alexstamos/status/1268062452123496450</a></p>
]]></description><pubDate>Wed, 03 Jun 2020 08:10:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=23401132</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=23401132</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23401132</guid></item><item><title><![CDATA[New comment by igama in "Guide to running Elasticsearch in production"]]></title><description><![CDATA[
<p>No one can answer that for you, you need to test it out your self. Depends on size of documents, number of keys, volume of reads, etc etc. Spin up 1 instance and test it out ;)</p>
]]></description><pubDate>Wed, 26 Feb 2020 08:38:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=22421417</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=22421417</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22421417</guid></item><item><title><![CDATA[New comment by igama in "Guide to running Elasticsearch in production"]]></title><description><![CDATA[
<p>One way for example would be store all events you want to write to ElasticSearch to a Queue (like rabbit, Kafka, etc) then have a set of workers/importers (this can even be logstash with input from queue and output ES) that read the events from that queue and store them in ES.<p>This way your system becomes a sync, and your system above is not affected if ES becomes slow writing or goes down for a reason. Your events will remain stored in the queue waiting to be processed.</p>
]]></description><pubDate>Wed, 26 Feb 2020 08:34:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=22421404</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=22421404</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22421404</guid></item><item><title><![CDATA[New comment by igama in "Ask HN: What are your arguments in favor of end-to-end encryption?"]]></title><description><![CDATA[
<p>"If the Police have a legit reason to access a property they go to court and get a warrent, and if they need to they'll kick the door in to get in." 
That's what currently takes, place, Government doesn't have the keys, they have to use force to get in, or other methods. (However there are physical limits to materials, so there is usually a way to break in)<p>But, by having a special key that opens all the doors, anyone could copy it - yes rules can put in place to who as access, etc, etc, but by knowing there is a "hole" in each device, every possible malicious agent will try and break it as soon as possible. Then what?<p>We have seen examples by Law Enforcement officers using accesses to gather data that would required a court order, but they didn't have one, and it was for personal reasons. So, how does that work out?</p>
]]></description><pubDate>Fri, 04 Oct 2019 14:44:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=21158218</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=21158218</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21158218</guid></item><item><title><![CDATA[New comment by igama in "Security for Elasticsearch is now free"]]></title><description><![CDATA[
<p>Same feeling...</p>
]]></description><pubDate>Mon, 20 May 2019 22:08:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=19965788</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=19965788</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19965788</guid></item><item><title><![CDATA[New comment by igama in "Security for Elasticsearch is now free"]]></title><description><![CDATA[
<p>Opendistro was announced by AWS a few weeks ago. It’s their fork of ES with security features and some of the XPack functionality included.</p>
]]></description><pubDate>Mon, 20 May 2019 21:30:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=19965431</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=19965431</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19965431</guid></item><item><title><![CDATA[New comment by igama in "I scanned Austria"]]></title><description><![CDATA[
<p>Exposed (Open/NoAuth) Databases in Austria:
MongoDB: 26
ElasticSearch: 14
Memcached: 4
Redis: 6<p>Others:
Synology DiskStation NAS ftpd: 299</p>
]]></description><pubDate>Sat, 09 Feb 2019 13:24:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=19122119</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=19122119</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19122119</guid></item><item><title><![CDATA[RSync the old is still new – Exposed Files and Backups]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.binaryedge.io/2018/12/22/rsync-the-old-is-still-new/">https://blog.binaryedge.io/2018/12/22/rsync-the-old-is-still-new/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=18740881">https://news.ycombinator.com/item?id=18740881</a></p>
<p>Points: 5</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 22 Dec 2018 15:16:40 +0000</pubDate><link>https://blog.binaryedge.io/2018/12/22/rsync-the-old-is-still-new/</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=18740881</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18740881</guid></item><item><title><![CDATA[Publicly accessible .ENV files exposing Keys/Tokens]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.binaryedge.io/2018/12/19/publicly-accessible-env-files/">https://blog.binaryedge.io/2018/12/19/publicly-accessible-env-files/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=18715544">https://news.ycombinator.com/item?id=18715544</a></p>
<p>Points: 8</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 19 Dec 2018 13:50:23 +0000</pubDate><link>https://blog.binaryedge.io/2018/12/19/publicly-accessible-env-files/</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=18715544</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18715544</guid></item><item><title><![CDATA[New comment by igama in "Kubernetes clusters being hijacked to mine cryptocurrencies"]]></title><description><![CDATA[
<p>CTO Binaryedge here. For those wondering, We have detected more than 15k Kubernetes APIs with Auth. This post focuses on ~1.5k found without Auth, that are fully open.<p>It's not just a Kubernetes Problem. Like many have posted, many databases, other types of clusters, shares, are accessible without Auth for those that know how to look for them (not that hard now days), mainly malicious actors.</p>
]]></description><pubDate>Fri, 07 Dec 2018 09:25:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=18626212</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=18626212</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18626212</guid></item><item><title><![CDATA[New comment by igama in "Kubernetes clusters being hijacked to mine cryptocurrencies"]]></title><description><![CDATA[
<p>Exactly, the main story is Kubernetes being exploited in the wild and in large numbers, Crypto mining is just one of the "attacks" tacking place.</p>
]]></description><pubDate>Fri, 07 Dec 2018 08:48:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=18626062</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=18626062</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18626062</guid></item><item><title><![CDATA[Kubernetes clusters being hijacked to mine cryptocurrencies]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.binaryedge.io/2018/12/06/kubernetes-being-hijacked-worldwide/">https://blog.binaryedge.io/2018/12/06/kubernetes-being-hijacked-worldwide/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=18622062">https://news.ycombinator.com/item?id=18622062</a></p>
<p>Points: 183</p>
<p># Comments: 64</p>
]]></description><pubDate>Thu, 06 Dec 2018 20:49:00 +0000</pubDate><link>https://blog.binaryedge.io/2018/12/06/kubernetes-being-hijacked-worldwide/</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=18622062</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18622062</guid></item><item><title><![CDATA[New comment by igama in "[dead]"]]></title><description><![CDATA[
<p>We scan the entire internet space and create real-time threat intelligence streams and reports that show what is exposed on the internet. Our objective is to help you answer questions like:
- What services is your organization exposing?
- How many IOT devices are accessible?
- How many services/databases are miss-configured?
- What DataLeaks have affected a specific e-Mail?</p>
]]></description><pubDate>Fri, 23 Nov 2018 10:02:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=18515526</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=18515526</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18515526</guid></item><item><title><![CDATA[New comment by igama in "A hash table re-hash"]]></title><description><![CDATA[
<p>I've updated the link.</p>
]]></description><pubDate>Tue, 31 Jul 2018 10:25:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=17651953</link><dc:creator>igama</dc:creator><comments>https://news.ycombinator.com/item?id=17651953</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17651953</guid></item></channel></rss>