Feed aggregator

Show HN: Printable Classics – Free printable classic books for hobby bookbinders

Hacker News - Mon, 02/09/2026 - 7:09am

I created a site (https://printableclassics.com) that allows you to download classic books and customize things like the font size, page size, and the cover.

As part of this, I wrote a software pipeline that takes epubs, html files, or pdfs and converts them into formatted books with custom covers, page numbers, chapter formatting, etc.

I used an LLM for categorizing the books. There's a nice way to filter such that you could easily find "Young Adult, Ancient, Fantasy" for example.

When downloading from the site, the PDFS are rendered in a work queue. Hopefully the server I'm using won't get overwhelmed. It takes around 10-15 seconds to generate for most books.

Most of the books currently on the site are from Standard Ebooks. I plan to add more books from Archive.org and Project Gutenberg over time.

I also created a little guide on how you can print and bind books at home with around $200 in equipment. (https://printableclassics.com/print-guide)

Printable versions of the Harvard Classics are available here: https://printableclassics.com/harvard_classics This is an example of direct PDF conversion.

Hopefully this is useful to some people. I plan to use the books here for home education myself so it will at least be useful to me. I'd like to add a guide with top suggestions by age level and some educational theory on how I made the selections. I'm happy to take any feedback on the site or answer any questions.

There is also the option to have the books professionally printed through a print on demand provider. I'm hoping that could be a way to pay for the site hosting.

Thanks for checking it out!

Comments URL: https://news.ycombinator.com/item?id=46944365

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Susscore – Open-source link scanner to check if a URL is sketchy

Hacker News - Mon, 02/09/2026 - 7:02am

Hey HN! I built susscore because I got tired of hovering over links wondering "is this a phish?"

It's fully open source and runs 11 checks in real-time:

• Domain age & reputation • SSL certificate validation • Known phishing database lookup • Brand impersonation detection (40+ brands) • URL pattern analysis (typosquatting, suspicious paths) • Redirect chain inspection • And more... No signup, no tracking, just paste and go.

GitHub: https://github.com/rebelchris/susscore

Built with Next.js. PRs welcome, especially for adding more brand patterns or regional phishing detection.

What checks would you want to see added?

Comments URL: https://news.ycombinator.com/item?id=46944321

Points: 1

# Comments: 0

Categories: Hacker News

SmarterTools Hit by Ransomware via Vulnerability in Its Own Product

Security Week - Mon, 02/09/2026 - 7:02am

SmarterTools says customers were impacted after hackers compromised a data center used for quality control testing.

The post SmarterTools Hit by Ransomware via Vulnerability in Its Own Product appeared first on SecurityWeek.

Categories: SecurityWeek

Don't Throw Away Your Laptop: How To Install Windows 11 On Unsupported Hardware

CNET Feed - Mon, 02/09/2026 - 7:01am
Some Windows 10 computers that are flagged as incompatible can actually support the upgrade with specific settings enabled.&
Categories: CNET

Show HN: Open-source zero-trust framework for AI agents- 12 services, all tested

Hacker News - Mon, 02/09/2026 - 7:01am

Author here. We've been building agent trust infrastructure for ~1 year (12 microservices for identity, behavior monitoring, data governance, etc). When the CSA published their Agentic Trust Framework spec, we realized our stack maps to all 5 elements — but the spec has no reference implementation. So we built one. What we added that the spec leaves open: - Maturity model runtime (agents earn autonomy through 5 promotion gates) - Policy-as-code segmentation engine (real-time access decisions) - Circuit breaker for incident response (auto-containment) Everything is MIT. You can clone the repo and run `npm test` — 25 contract validation tests. Repo: https://github.com/yogami/atf-reference-implementation Interactive demo: https://berlinailabs.de/atf-demo.html Happy to answer architecture questions.

Comments URL: https://news.ycombinator.com/item?id=46944314

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: FederalGifts – What foreign governments give American officials

Hacker News - Mon, 02/09/2026 - 7:00am

Every year, foreign governments give gifts to US government officials — everything from jeweled swords to luxury watches to ornate rugs. Federal law requires these to be disclosed (and most go to the National Archives, since officials can't keep gifts worth over ~$480).

I built FederalGifts to make this data browsable and searchable. You can explore by:

- Individual gifts (with descriptions and estimated values)

- Recipients (which officials received the most?)

- Donor countries (which nations give the most lavishly?)

- Agencies

Some interesting finds: Saudi Arabia and UAE consistently give the most expensive gifts. The most common gifts are jewelry, decorative items, and books. The State Department receives the lion's share.

The data comes from the Federal Register and State Department disclosures — public information that's technically available but practically impossible to browse.

Built with Rails and open data. No login required, no tracking.

Comments URL: https://news.ycombinator.com/item?id=46944309

Points: 1

# Comments: 0

Categories: Hacker News

AI Is Here to Replace Nuclear Treaties. Scared Yet?

Wired Security - Mon, 02/09/2026 - 6:30am
The last major nuclear arms treaty between the US and Russia just expired. Some experts believe a combination of satellite surveillance, AI, and human reviewers can take its place. Others, not so much.
Categories: Wired Security

Show HN: Bypassed query layer of SQLite,accessed b-tree APIs for KV store

Hacker News - Mon, 02/09/2026 - 6:17am

I’ve been experimenting with using SQLite as a key–value store without going through the SQL layer.

SQLite’s B-Tree implementation is extremely mature and well-tested, but most access goes through the SQL compiler, VDBE, and query planner. I wanted to see what happens if you bypass all of that and interact directly with the B-Tree APIs.

The result is a small prototype KV store that:

Uses SQLite’s internal B-Tree interfaces directly

Avoids parsing, planning, and VDBE execution

Keeps SQLite’s ACID guarantees intact

In local benchmarks with mixed read/write workloads, this approach showed noticeably lower overhead compared to equivalent SQL-based access patterns.

please let me know if you face any bug, let me know area of improvements that i can add in it.

Comments URL: https://news.ycombinator.com/item?id=46944018

Points: 1

# Comments: 0

Categories: Hacker News

The Network Is Reliable

Hacker News - Mon, 02/09/2026 - 6:14am
Categories: Hacker News

Pages