What came first: the CNAME or the A record?

https://cf-assets.www.cloudflare.com/zkvhlag99gkb/33gSgvPllx4ibpXHBDvENW/0fd0d5b5e7f2c7cc6ab79cf7f71b55fa/image1.png
A routine update to 1.1.1.1 caused DNS resolution failures due to a subtle shift in CNAME record ordering. The issue was resolved by reverting the change and proposing a new standard to clarify CNAME ordering in DNS responses.

Understanding C++ Ownership System

C++ ownership model involves object creation, destruction, and reference management through RAII, references, and move semantics. Understanding these concepts is crucial for writing and reading modern C++ code, avoiding bugs, and ensuring correct memory management.

Nearly a third of social media research has undisclosed ties to industry

Notes on Apple's Nano Texture (2025)

https://jon.bo/nano-texture/side-by-side-white.jpg
The Nano Texture display is great for reducing glare in various lighting conditions, making it ideal for outdoor use and environments with intense lighting. However, it requires more maintenance to keep clean and may not be suitable for those with chaotic environments or who don't mind glare.

Graphics In Flatland – 2D ray tracing [video]

https://content.presspage.com/uploads/1369/6fb3a477-f620-47e5-b562-b3d659303c26/1920_gettyimages-2234299196.jpg?10000
A new study from The University of Manchester found little evidence that social media or gaming cause mental health problems in young teenagers. The study suggests technology habits alone do not drive mental health difficulties, but rather are influenced by how young people are feeling.

I was a top 0.01% Cursor user, then switched to Claude Code 2.0

https://blog.silennai.com/articles/claude-code/curve-cursor-claude.jpeg
The user has consolidated knowledge on Claude Code, a tool for creating AI agents that can write code, and shares their experience and best practices for using it, including tips on workflow, debugging, and testing. They also discuss the importance of context management, compacting, and transferring context, as well as the use of plugins and commands to streamline the coding process.

Fix macOS 26 (Tahoe) exaggerated rounded corners

https://opengraph.githubassets.com/08819cd34ef12bd5b529dbcd05f6734736120fbf7593950db75181c6640f8553/makalin/CornerFix
CornerFix restores sharp display edges in macOS 26 and newer by drawing unobtrusive overlay caps. It's a safe, non-invasive solution to bring back straight edges without hacking system files.

Simple Sabotage Field Manual (1944) [pdf]

The Strategic Services document outlines a plan for simple sabotage, a type of non-violent resistance that involves disrupting the enemy's operations through everyday actions, such as damaging equipment or supplies. The goal is to encourage citizens to engage in simple sabotage, which can be done using ordinary tools and materials, to harass and demoralize the enemy and support the war effort.

The coming industrialisation of exploit generation with LLMs

https://sean.heelan.io/wp-content/uploads/2009/05/cropped-oxford_7602.jpg?w=200
Recently I ran an experiment where I built agents on top of Opus 4.5 and GPT-5.2 and then challenged them to write exploits for a zeroday vulnerability in the QuickJS Javascript interpreter. I added a variety of modern exploit mitigations, various constraints (like assuming an unknown heap starting state, or forbidding hardcoded offsets in the exploits) and different objectives (spawn a ...

Show HN: Subth.ink – write something and see how many others wrote the same

A user submitted a thought with contents "hello world". The thought was stored with a SHA256 hash and an unsalted MD5 hash.

Conditions in the Intel 8087 floating-point chip's microcode

https://static.righto.com/images/8087-conditions/8087-die-labeled-w450.jpg
The Intel 8087 floating-point coprocessor uses 49 types of conditional tests in its microcode to perform calculations. These conditions are implemented using a tree-based multiplexer circuit that selects one of 64 possible conditions based on microcode bits.

Level S4 solar radiation event

https://www.swpc.noaa.gov/sites/default/files/styles/pad_sides_large/public/top_news/G4%20Alert%201938%20UTC%2019%20Jan%202026.png?itok=lAMS4XVB

From Nevada to Kansas by Glider

https://weglidefiles.b-cdn.net/15996/images/3RwYfoDIjjoJanzQZLegMHuc_medium.jpg
Gordon Boettger scored 1,496.70 points with a flight of 1,112 mi starting from Minden-Tahoe on 12/19/2025. Average speed was 94 mph with a total flight duration of 12h 32m in a Arcus J.

Show HN: A creative coding library for making art with desktop windows

https://opengraph.githubassets.com/a31f7f7c3ae8b895f70c58ac32c31619595cc2074d71e695624980adc191e0a3/willmeyers/window-art
The code creates windows with different colors, animates their positions and colors, and displays media. It also displays text and waits for user input.

Sending Data over Offline Finding Networks

https://cc-sw.com/wp-content/uploads/2025/08/findmy_workflow-1024x670.png
Researchers developed a custom protocol for unidirectional data transmission using Apple's Find My and Google's Find Hub networks, which rely on crowd-sourced location reports from billions of devices. The protocol establishes a robust, portable, and secure communication channel, and the researchers demonstrated its feasibility by transmitting data across various architectures and device types.

CSS Web Components for marketing sites (2024)

https://hawkticehurst.com/imgs/ephemeral-canvas.jpg
User argues that regular web components are not suitable for marketing website design systems due to JavaScript dependency. They propose using HTML Web Components with minimal JavaScript and leveraging CSS for functionality and styling.

Targeted Bets: An alternative approach to the job hunt

The tech job market has been tough, leaving many applicants feeling hopeless. I've seen this first hand in my conversations with dozens of friends and across more than 100 job interviews. Here is my response to these people: you can drastically increase your odds of getting a job by making targeted bets rather than broadly applying and hoping something sticks. A targeted bet begins with ...

Show HN: An interactive physics simulator with 1000's of balls, in your terminal

https://raw.githubusercontent.com/minimaxir/ballin/main/docs/header.webp
ballin is a fun TUI app written in Rust that simulates thousands of logical balls, but despite the inherent character constraints of a terminal, you can see the realistic physics of the balls in action: Extremely high performance using the rapier 2D Rust physics engine: it can handle physics actions on 10,000 balls at effective 120+ FPS! Clicking the balls to cause a repulsing burst, or by ...

Weight Transfer for RL Post-Training in under 2 seconds

https://framerusercontent.com/images/iTnnwJb1aPX64GiqUgfdmgLsy78.jpeg?width=1456&height=816
We recently achieved 1.3-second cross-machine parameter updates for Kimi-K2 (1T parameters), transferring weights from 256 training GPUs (BF16) to 128 inference GPUs (FP8). In asynchronous reinforcement learning fine-tuning, training and inference run on separate GPUs. After each training step, new weights must be pushed to inference nodes. Many existing frameworks take several seconds—or ...

Threads edges out X in daily mobile users, new data shows

https://techcrunch.com/wp-content/uploads/2026/01/threads-x-similarweb.png?w=680
Threads had 141.5 million daily active users on iOS and Android as of January 7, 2026, while X had 125 million daily active users on mobile devices. Threads' growth may be driven by cross-promotions and new features, while X faces controversy over its AI, Grok.

Show HN: Pipenet – A Modern Alternative to Localtunnel

pipenet is used for tunneling capabilities, connecting local MCP servers with remote AI clients. It can be embedded in tools and used with custom subdomains, servers, and domains.

Letter from a Birmingham Jail (1963)

Martin Luther King Jr. responds to criticism of his civil rights activities in Birmingham, arguing that nonviolent direct action is necessary to bring about change. He emphasizes the importance of standing up against unjust laws and systems of oppression.

Bypassing Gemma and Qwen safety with raw strings

https://substackcdn.com/image/fetch/$s_!QZ7m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcbf6301d-6be9-4faf-b60c-1b597ca9a3cc_2528x1696.png
The safety of large language models relies on specific formatting, and bypassing this formatting can cause models to generate harmful content. This vulnerability, known as the "format mismatch attack," is not fixed and remains in open-source models, highlighting the need for more robust safety measures.

There's a hidden Android setting that spots fake cell towers

https://static0.howtogeekimages.com/wordpress/wp-content/uploads/2026/01/android-robot-with-spying-cell-tower.jpg?&fit=crop&w=1600&h=900
Android phones can be vulnerable to fake cell towers called Stingrays, which can intercept calls and texts. Google has added security features to Android 16, but they are only available on the Pixel 10 series, which can be enabled in the Mobile Network Security settings.

The assistant axis: situating and stabilizing the character of LLMs

https://www.anthropic.com/_next/image?url=https%3A%2F%2Fwww-cdn.anthropic.com%2Fimages%2F4zrzovbb%2Fwebsite%2F021f5a89f9b3ba1755f9a2315bc63be855259532-3840x1762.png&w=3840&q=75
When you talk to a large language model, you can think of yourself as talking to a character. In the first stage of model training, pre-training, LLMs are asked to read vast amounts of text. Through this, they learn to simulate heroes, villains, philosophers, programmers, and just about every other character archetype under the sun. In the next stage, post-training, we select one particular ...

A decentralized peer-to-peer messaging application that operates over Bluetooth

Bitchat is a decentralized messaging app using Bluetooth mesh networks, no internet required. It provides censorship resistance and infrastructure independence.

Fix your robots.txt or your site disappears from Google

https://www.alanwsmith.com/neo-files/theme-files/og-images/main-og-image.jpg
Googlebot stops crawling a site if it can't access the robots.txt file. Creating a simple text file named robots.txt at the site's root with permission for Googlebot to access the site resolves the issue.

San Francisco coyote swims to Alcatraz

px-captcha

Mammals have evolved into ant eaters 12 times since the dinosaur age – study (2025)

This page will redirect in a moment...