Tabloid: The Clickbait Headline Programming Language
tabloid.vercel.app
Ironclad – formally verified, real-time capable, Unix-like OS kernel
ironclad-os.org
Reverse engineering Codex CLI to get GPT-5-Codex-Mini to draw me a pelican
simonwillison.net
Largest cargo sailboat completes first Atlantic crossing
marineinsight.com
Marko – A declarative, HTML‑based language
markojs.com
Study identifies weaknesses in how AI systems are evaluated
oii.ox.ac.uk
Open-source communications by bouncing signals off the Moon
open.space
Show HN: Hephaestus – Autonomous Multi-Agent Orchestration Framework
github.com
Syntax and Semantics of Programming Languages (1995)
homepage.cs.uiowa.edu
Control structures in programming languages: from goto to algebraic effects
xavierleroy.org
Defeating Kaslr by Doing Nothing at All
googleprojectzero.blogspot.com
Debugging BeagleBoard USB boot with a sniffer: fixing omap_loader on modern PCs
downtowndougbrown.com
Avería: The Average Font (2011)
iotic.com
Show HN: Geofenced chat communities anyone can create
vicinity.social
How to build your own VPN, or: the history of WARP
blog.cloudflare.com
Judge denies request to exempt Flock footage from Public Records Act
goskagit.com
Cloudflare scrubs Aisuru botnet from top domains list
krebsonsecurity.com
Show HN: PingStalker – A a macOS tool for network engineers
pingstalker.com
My first fifteen compilers (2019)
blog.sigplan.org
Valdi – A cross-platform UI framework that delivers native performance
github.com
Hi HN - I’m the developer of PingStalker, a macOS utility I built to see what’s really happening on the LAN/WLAN.
I live in the CLI, but when it came to discovery and monitoring, I found it limiting. So I built a GUI that brings my favorite tools together in one place.
PingStalker started because I wanted to know if something on the network was scanning my machine. I also wanted quick access to core details—external IP, Wi-Fi data, and local topology. Then I wanted more: fast, reliable scans using ARP tables and ICMP.
As a Wi-Fi engineer, I couldn’t stop there. I kept adding ways to surface what’s actually going on behind the scenes.
A few highlights:
- Performs ARP, ICMP, mDNS, and DNS scans to discover every device on your subnet, showing IP, MAC, vendor, and open ports.
- Continuously monitors selected hosts (“live ping”) to visualize latency spikes, missed pings, and reconnects.
- Detects VLANs on trunk or hybrid ports, exposing when your Mac is sitting on a tagged interface.
- Captures just the important live traffic — DHCP events, ARP broadcasts, 802.1X authentication, LLDP/CDP neighbor data, ICMP packets, and off-subnet chatter — to give you a real-time pulse of your network.
- Decodes mDNS traffic into human-readable form (that one took months of deep dives, but the output is finally clear and useful).
- Built my own custom vendor-logo database: I wrote a tool that links MAC OUIs with their companies, fetches each vendor’s favicon, and stores them locally so scan results feel alive and recognizable.
Under the hood it’s written in Swift. It uses low-level BSD sockets for ping and ARP, plus Apple’s Network framework for interface enumeration. The rest relies on familiar command-line tools. It’s fast.
I’d love feedback from anyone who builds or uses network diagnostic tools:
- Does this fill a gap you’ve run into on macOS?
- Any ideas for improving scan speed or how traffic events are visualized?
- What else would you like to see?
Details and screenshots: https://pingstalker.com
Happy to answer any technical questions about the implementation, Swift APIs, or macOS permission model.