Hacker News new | past | comments | ask | show | jobs | submit | jenandre's submissions login
1. Building an AI Code Review Agent with Claude Code (seekmaro.com)
4 points by jenandre 15 days ago | past
2. How venture capitalists make money and why it matters to you (reverbadvisors.com)
8 points by jenandre on Nov 6, 2017 | past
3. When it comes to debugging, believe no one (medium.com/fun_cuddles)
2 points by jenandre on March 30, 2017 | past
4. Introduction to Sysdig Falco (komand.com)
3 points by jenandre on June 17, 2016 | past
5. GDB for fun and profit (komand.com)
1 point by jenandre on June 16, 2016 | past
6. Introduction to Osquery for Threat Detection and DFIR (komand.com)
2 points by jenandre on June 15, 2016 | past
7. My Experience with Linux of the 90s, or Why I Have Linux Desktop PTSD (medium.com/fun_cuddles)
2 points by jenandre on Feb 14, 2016 | past
8. The West Coast Offense for Startups (cortlandtjohnson.com)
2 points by jenandre on Oct 13, 2015 | past
9. RPC over Docker containers as plugins (github.com/jandre)
2 points by jenandre on Oct 12, 2015 | past
10. Keys to Building a Successful Cybersecurity Startup: Credibility,Maturity&Trust (cortlandtjohnson.com)
1 point by jenandre on Oct 8, 2015 | past
11. Show HN: Codetainer – A Docker container in your browser (github.com/codetainerapp)
42 points by jenandre on Oct 3, 2015 | past | 9 comments
12. Show HN: Codetainer – A Docker container in your browser (github.com/codetainerapp)
4 points by jenandre on Oct 2, 2015 | past
13. Safe-commit-hook: prevent developers from checking in sensitive files (github.com/jandre)
42 points by jenandre on Oct 1, 2015 | past | 8 comments
14. Pitching Your Cybersecurity Startup: Do’s and Don'ts (linkedin.com)
2 points by jenandre on Sept 30, 2015 | past
15. Hacker news for security (securityhq.io)
3 points by jenandre on Sept 3, 2015 | past
16. What's all the hubbub about vulnerable Docker images? (dockersecurity.org)
1 point by jenandre on June 1, 2015 | past
17. After all this time, we still can’t crypto (medium.com/fun_cuddles)
2 points by jenandre on April 4, 2015 | past
18. Who Watches the Watchmen? Securing Configuration Management Systems (threatstack.com)
1 point by jenandre on Feb 25, 2015 | past
19. The Linux “Grinch” Vulnerability: Separating Fact from FUD (threatstack.com)
2 points by jenandre on Dec 18, 2014 | past
20. Hackers or Engineers? Who to hire for your startup, and why (medium.com/fun_cuddles)
1 point by jenandre on Oct 27, 2014 | past
21. A Tale of Nagios and the Bash Vulnerability (threatstack.com)
5 points by jenandre on Sept 25, 2014 | past
22. Docker breakout exploit analysis (medium.com/fun_cuddles)
16 points by jenandre on June 18, 2014 | past | 2 comments
23. Startups, Security, and Noble Vision (medium.com/fun_cuddles)
1 point by jenandre on June 1, 2014 | past
24. Dune is in your head (boingboing.net)
2 points by jenandre on March 30, 2014 | past
25. Free startup idea: fix micropayments for content (medium.com/p)
1 point by jenandre on Feb 22, 2014 | past
26. Opening files in node.js considered harmful (medium.com/p)
3 points by jenandre on Jan 18, 2014 | past
27. One Day of Go (gist.github.com)
4 points by jenandre on Jan 2, 2014 | past
28. "Yt? Seeing something odd in the logs..." (medium.com/p)
2 points by jenandre on Dec 27, 2013 | past
29. Cloud Security is not a binary question (medium.com/p)
2 points by jenandre on Nov 21, 2013 | past
30. Setting up a Kernel Debug Environment (for pussies) (gist.github.com)
1 point by jenandre on Nov 11, 2013 | past

Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: