Lindy Hacker News | | submit
Articles written in 1998 that Hacker News still talks about.
Go back or forward one year. See all articles from 1990 to 1999.
1998The Economic Viability of Mars Colonization (aleph.se)
64 points | 6 years ago with 36 comments
1998Microsoft Security Bulletin MS98-010 – Critical (learn.microsoft.com)
64 points | 1 year ago with 45 comments
1998The Art of Hosting Good Conversations Online (rheingold.com)
64 points | 4 years ago with 9 comments
1998The Brown One, the Honey Eater, the Shaggy Coat, the Destroyer (charlierussellbears.com)
63 points | 6 years ago with 1 comments
1998Innovation in Violinmaking (josephcurtinstudios.com)
62 points | 6 years ago with 20 comments
1998Space-Related Applications of Forth (web.archive.org)
61 points | 3 years ago with 10 comments
1998Modernized time.h for ISO C (cl.cam.ac.uk)
61 points | 10 years ago with 17 comments
1998Pathfinder's priority inversion problem, discovered and fixed on Mars (users.cs.duke.edu)
61 points | 5 years ago with 10 comments
1998The Fall of Avalon Hill (home.earthlink.net)
60 points | 8 years ago with 53 comments
1998Five things we need to know about technological change (web.cs.ucdavis.edu)
58 points across 2 posts | 4 years ago with 1 comments
1998The Education of Marc Andreessen (businessweek.com)
58 points | 10 years ago with 10 comments
1998How Java’s Floating-Point Hurts Everyone Everywhere (cs.berkeley.edu)
57 points | 11 years ago with 72 comments
1998A Brief Guide to CLOS (aiai.ed.ac.uk)
56 points | 8 years ago with 7 comments
1998Bruno Buchberger’s algorithm: Gröbner bases and applications (www3.risc.jku.at)
55 points | 5 years ago with 4 comments
1998The dumbing-down of programming (archive.salon.com)
55 points | 15 years ago with 33 comments
1998SSA is Functional Programming (cs.princeton.edu)
54 points | 5 years ago with 23 comments
1998Is There an Artificial God? (biota.org)
54 points | 8 years ago with 90 comments
1998On Limited Editions (woodblock.com)
54 points | 11 months ago with 23 comments
1998The first port of Unix (uow.edu.au)
53 points | 9 years ago with 2 comments
1998PFX: How Not to Design a Crypto Protocol/Standard (cs.auckland.ac.nz)
53 points | 2 years ago with 12 comments
1998Yes, there is a better search engine (salon.com)
52 points | 11 years ago with 15 comments
1998The dumbing-down of programming (salon.com)
52 points | 14 years ago with 35 comments
1998A History of HTML (w3.org)
52 points | 2 years ago with 6 comments
1998The Ideal Mathematician (users-cs.au.dk)
51 points | 9 years ago with 10 comments
1998The Key Role of Impurities in Ancient Damascus Steel Blades (tms.org)
50 points | 3 years ago with 6 comments
1998Mac System 1.0 (www3.nd.edu)
49 points | 8 years ago with 42 comments
1998A Beautiful Mind (vanityfair.com)
47 points | 8 years ago with 10 comments
1998Growing a Language (cs.virginia.edu)
47 points | 9 years ago with 8 comments
1998Why Sealion Is Not an Option for Hitler to Win the War (philmasters.org.uk)
45 points | 8 years ago with 16 comments
1998The Java Ring: A Wearable Computer (nngroup.com)
45 points | 10 years ago with 25 comments
1998Winamp: A fast, flexible, high-fidelity music player for Windows (web.archive.org)
44 points | 3 years ago with 32 comments
1998Linux Weekly News (lwn.net)
43 points | 4 years ago with 8 comments
1998The Complexity Paradox (asktog.com)
43 points | 4 years ago with 17 comments
1998Field Guide for Designing Human Interaction with Intelligent Systems (ston.jsc.nasa.gov)
42 points | 6 years ago with 5 comments
1998Creating a Unix Application Using the Win32 API (linux.cz)
42 points | 9 years ago with 39 comments
1998Windows 98: Should you upgrade now or never? (cnn.com)
41 points | 3 years ago with 36 comments
1998A peephole optimiser for Java bytecodes (frippery.org)
40 points | 6 years ago with 3 comments
1998The War for Talent (fastcompany.com)
39 points | 2 years ago with 28 comments
1998Hypertext Gardens (eastgate.com)
33 points | 2 years ago with 3 comments
1998Everything a hacker needs to know about getting busted (phrack.org)
27 points | 2 years ago with 5 comments
1998Digger – Back and Digitally Remastered (digger.org)
27 points | 2 years ago with 11 comments
1998Understanding the DCOM Wire Protocol by Analyzing Network Data Packets (web.archive.org)
21 points | 1 year ago with 0 comments
1998Blackmail as a Victimless Crime: Reply to Altman (papers.ssrn.com)
17 points | 1 year ago with 92 comments

If you like quirky internet articles, you'll like the Unclutter reader mode too!