Giving C a Superpower

https://i.ibb.co.com/ZpKKd4FS/grep-bench-recursive-Dirs.png
The user wrote a C23 grep clone called cgrep using a custom header file called safe_c.h that provides modern safety features from C++ and Rust, making C code safer and more convenient to write. The custom header file includes features such as RAII semantics, smart pointers, automated reference counting, type-safe vectors, and explicit error handling, which help prevent common C pitfalls like ...

Show HN: I built a synth for my daughter

https://bitsnpieces.dev/assets/posts/2025-11-10-a-synth-for-my-daughter/prototype-enclosure.jpeg
The user built a portable step-sequencer synthesizer for their daughter's third birthday, learning about microcontrollers, CAD, and PCB design in the process. They created a functional prototype with an OLED screen and a SAM2695 synthesizer module, but now face challenges in bringing the product to market due to regulatory and financial hurdles.

GCC 16 considering changing default to C++20

https://inbox.sourceware.org/.within.website/x/cmd/anubis/static/img/pensive.webp?cacheBuster=1.23.0
Please wait a moment while we ensure the security of your connection.

Craft Chrome Devtools Protocol (CDP) commands with the new command editor

https://developer.chrome.com/static/blog/cdp-command-editor/image/the-command-line-bar-the-45dda192c7625.png
Chrome DevTools introduced a new CDP editor to simplify command input and reduce documentation lookup. The editor offers auto-completion, auto-population of command parameters, and real-time error checking to improve prototyping speed.

Quest for Permissively Licensed PDF Library in C#

https://duerrenberger.dev/blog/wp-content/uploads/2025/10/20251029_174122-edited-scaled.jpg
The author is searching for a permissively licensed PDF rendering solution for .NET and found QuestPDF as a promising option. MigraDoc is another viable solution that supports PDF creation with limitations.

Building a Simple Search Engine That Works

A custom search engine was built to use existing databases, respecting current architecture and giving full control over its workings. It tokenizes text into searchable pieces, scores matches based on relevance, and uses SQL queries for performance and control.
https://opengraph.githubassets.com/bb2eacd87990ff5f7a7c40a8d4d81739db576c7abb666341c2d9f3168303ef4e/resiprocate/resiprocate
dum (Dialog Usage Manager) library: high level SIP library for creating SIP user agents (no media stack) To create an in-tree build: Navigate to git root folder where top level CMakeLists.txt file is If you want to start fresh either delete the out of tree build directory or delete the CMakeCache.txt file. Some linux packages can be hard to track down. If you don't need the features that ...

Heretic: Automatic censorship removal for language models

https://private-user-images.githubusercontent.com/2702526/514848515-d71a5efa-d6be-4705-a817-63332afb2d15.png?jwt=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.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.SWAUdHTG6HgO3WMuUwjqfMwmvqUgPgiRpzAf6N51-F0
Heretic is a tool that removes censorship from transformer-based language models without post-training. It works automatically and produces high-quality decensored models.

A file format uncracked for 20 years

https://landaire.net/processed_images/banner.c9874fccf7528554.png
The user is trying to reverse engineer the file format of the original Xbox game Splinter Cell, specifically the common.lin file which contains 54 Unreal Engine Package files, and is attempting to dump individual files from this filesystem to look for cut content. After a week of static recompilation and analysis, the user decided to inject code into the game using XboxImageExploder and ...

Listen to Database Changes Through the Postgres WAL

https://peterullrich.com/og-image/listen-to-database-changes-through-the-postgres-wal
You want to listen to Postgres database changes in real-time without using NOTIFY/pg_notify due to its performance issues and limitations. You can use the WAL (Write Ahead Log) to listen to database changes by configuring the wal_level to logical, creating a publication, and setting up a replication slot.

Fastmcpp (Fastmcp for C++)

https://opengraph.githubassets.com/c474fff3a45991ad30d71d4ce64fa11d943a868778663ddc151b3fce86f393f0/0xeb/fastmcpp
fastmcpp is a C++ port of the Python fastmcp library, providing native performance for MCP servers and clients with a small dependency set. It currently supports STDIO, HTTP/SSE, and WebSocket transport layers.

A 1961 Relay Computer Running in the Browser

https://minivac.greg.technology/og-minivac.jpg
A 1961 relay computer running in your browser

PicoIDE – An open IDE/ATAPI drive emulator

https://picoide.com/picoide_evt2_angle.jpg
PicoIDE currently emulates one drive but plans to support two devices in future updates. It has a 3.5" enclosure launch and may offer other form factors later.

The fate of "small" open source

https://nolanlawson.com/wp-content/uploads/2023/01/profile_17.jpg?w=300
The author of blob-util, a popular npm package, notes that AI-generated code may replace small utility libraries like theirs. The author believes that AI prioritizes instant answers over teaching and understanding, potentially reducing the need for educational open source projects.

I finally understand Cloudflare Zero Trust tunnels

https://david.coffee/cloudflare-zero-trust-tunnels/banner.jpeg
The user learned Cloudflare Zero Trust + Warp to overcome Tailscale limitations and now uses it for various purposes including connecting private networks, exposing private services to the public, and creating fully private networks.

Open-source Zig book

https://www.zigbook.net/og-zigbook.webp
Zigbook is a comprehensive, open-source guide to the Zig programming language, packed with hands-on chapters, projects, and real-world examples.

The Pragmatic Programmer: 20th Anniversary Edition (2023)

https://www.ahalbert.com/assets/tpp20.jpg
The Pragmatic Programmer book provides valuable advice for software engineers, covering topics such as responsibility, communication, and debugging. The book emphasizes the importance of flexibility, reversibility, and decoupling in code, and offers practical tips for implementing these principles.

FPGA Based IBM-PC-XT

https://bit-hack.net/wp-content/uploads/2025/11/img_5334.jpg?w=1024
The user recreated an IBM XT Personal Computer from the 1980s using a mix of authentic parts and modern technology, with a goal to play the EGA version of Monkey Island 1 on it. They designed and implemented the hardware and software components, including a low-power NEC V20 CPU, SRAM chip, FPGA board, and peripherals, and successfully achieved mouse support, hard drive with write access, and ...

Neuroscientists track the neural activity underlying an “aha”

https://www.quantamagazine.org/wp-content/uploads/2025/11/Aha-Moment-cr-Irene-Perez-Lede.webp
Researchers found that insight experiences are linked to increased activity in the ventral occipitotemporal cortex, amygdala, and hippocampus. This neural signature is associated with stronger memories and more accurate solutions.

Runit Linux: Complete Guide to Unix Init Scheme with Service Supervision

https://codelucky.com/wp-content/uploads/2024/08/Logo-15-August.png
runit is a lightweight Unix init scheme with service supervision for robust system management. It provides a simple and reliable alternative to traditional init systems with automatic service supervision and graceful shutdown.

Z3 API in Python: From Sudoku to N-Queens in Under 20 Lines (2015)

https://ericpony.github.io/z3py-tutorial/examples/sudoku.png
Z3 is a high-performance theorem prover developed at microsoft research. it uses the same operator precedence of the python language, so no python background is needed if you want to learn how to use the tool offline. the following example shows how traverse the constraints asserted into the solver, and collect performance statistics for the check method. z3py also provides functions for ...

Fourier Transforms

https://www.continuummechanics.org/images/fourier/cartoon_fourier_cat.jpg
The author discusses the misuse and misinterpretation of Fourier transforms in various fields, particularly in acoustics and vibrations. They argue that an FFT is simply a curve-fit of sine and cosine functions to given data, and that results should be scrutinized for accuracy.

Mixing Is the Heartbeat of Deep Lakes. At Crater Lake, It's Slowing Down

https://www.quantamagazine.org/wp-content/uploads/2025/11/Crater-Lake_cr.Katie-Falkenberg-Lede-1720x1354.webp
Scientists at Crater Lake in Oregon measured its water clarity using a Secchi disc, finding it to be 78 feet, an unusually cloudy reading. The lake's clarity is getting clearer due to warmer surface water temperatures.

A new chapter begins for EV batteries with the expiry of key LFP patents

https://www.shoosmiths.com/-/media/images/articles/banners-month-9-2022/pat-whelen-rxt252rzqly-unsplash.jpg
LFP battery technology is now freely accessible after key patents expired in 2022, shifting global battery strategies. Companies are securing patents around secondary innovation to enhance energy density and safety.

The evolution of rationality: How chimps process conflicting evidence

https://cdn.arstechnica.net/wp-content/uploads/2025/11/GettyImages-1451038709-640x427.jpg
Aristotle believed humans are rational due to forming views based on evidence and reconsidering it. However, a study found chimpanzees can also form and revise beliefs based on evidence, showing they may be almost as rational as humans.

US startup Substrate announces chipmaking tool that it says will rival ASML

https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1PlQfU.img?w=534&h=401&m=4&q=74
U.S. startup Substrate claims to have developed a chipmaking tool that can rival ASML's advanced lithography equipment. This innovation is the first step in their plan to establish a U.S.-based contract chip-manufacturing business, aiming to significantly reduce chipmaking costs and compete with TSMC. The company has secured $100 million in funding and attracted interest from government officials.

Why Castrol Honda Superbike crashes on (most) modern systems

https://seri.tools/blog/castrol-honda-superbike/jewelcase.webp
A friend gave me a 1998 motorbike racing game, Castrol Honda Superbike World Champions, which I tried to run on my Windows 7 machine but it crashed.

Supercookie: Browser Fingerprinting via Favicon (2021)

https://camo.githubusercontent.com/272799d3dd981f0335a930bb7fdd97a41e4fc62c9187d81554e75eaf36a1454b/687474703a2f2f7375706572636f6f6b69652e6d652f66617669636f6e2e69636f
A supercookie uses favicons to assign a unique ID to website visitors, persisting even in incognito mode and through cache clearing. This ID can be used to track users across websites, affecting top browsers including Chrome, Firefox, and Safari.

"Snarky"; "Snark"

https://notoneoffbritishisms.com/wp-content/uploads/2025/10/screenshot-2025-10-13-at-3.09.04-pm-1.png?w=786
The word "snarky" originated in the 19th century with meanings like "to make a snoring noise" or "to fret, grumble." It gained popularity in the early 20th century, especially in Britain, before rising globally in the late 20th century.

I have recordings proving Coinbase knew about breach months before disclosure

https://jonathanclark.com/images/coinbase-breach/hero-timeline.png
A Coinbase customer reported a sophisticated phishing attack in January 2025, but the company failed to investigate and respond to their questions about data compromise. The customer later discovered that Coinbase had been breached in late 2024, with attackers bribing contractors to steal sensitive customer data, affecting less than 1% of the customer base.