Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
Skippy's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
82872
posts in
541.4
ms
Loading...
Subscribe
Multi-stage robust optimization of reliability improvement for power transmission cyber-physical systems under
sequential
coordinated
attacks: an extreme attack...
sciencedirect.com
·
1d
🔒
Cybersecurity
Bui – TUI for
painless
Bubblewrap
sandboxing
smaller.fish
·
1d
·
Discuss:
Hacker News
🖥
Selfhosting
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Prompt injection in Google
Translate
reveals base model
behaviors
behind task-specific fine-tuning
lesswrong.com
·
17h
·
Discuss:
Hacker News
👨
Programming
Logistic
Regression, Average Marginal Effects, and the Linear Probability Model - Part II:
Coefficients
and AMEs of nested models
elff.eu
·
1d
👨
Programming
The Hidden Power of Online Server
IDEs
: Why Your Next Development
Environment
Might Be in Your Browser
codeground.ai
·
2d
·
Discuss:
DEV
👨
Programming
Burnout
is just "Thermal
Throttling
": A Debugging Guide for Engineers
amazon.com
·
1d
·
Discuss:
DEV
🔒
Cybersecurity
The Machine
Learned
Our Language
medium.com
·
20h
·
Discuss:
r/programming
👨
Programming
This
cyber
attack isn't real, yet people won't stop warning you about it
makeuseof.com
·
1d
🔒
Cybersecurity
Reddit-homelab-how-to-know-your-homelab-was-hacked.md
gist.github.com
·
5d
🔒
Cybersecurity
Spotting
and Handling Common Cybersecurity Threats in Everyday IT Work – A Practical Guide from an IT
Technician
dev.to
·
3d
·
Discuss:
DEV
🔒
Cybersecurity
How to
Dockerize
Your Application and
Deploy
It
freecodecamp.org
·
2d
🖥
Selfhosting
Five
Predictions
for
Cyber
Security Trends in 2026
heimdalsecurity.com
·
3d
🔒
Cybersecurity
Anatomy
of a
5-Layer
Defence Pipeline for AI Agent Memory
dev.to
·
12h
·
Discuss:
DEV
🔒
Cybersecurity
Build your own "private
Discord
": 5 self-hosted
alternatives
that put you in control
howtogeek.com
·
12h
🔒
Cybersecurity
Tip
of the Week #1: <code>
string
_view</code>
abseil.io
·
9h
👨
Programming
Tip
of the Week #177:
Assignability
vs. Data Member Types
abseil.io
·
9h
👨
Programming
I Solved an
OhSint
TryHackMe
Challenge as a Beginner — Here’s Everything I learned
medium.com
·
15h
🔒
Cybersecurity
Cooperative
Visitor
: A Template Technique for
Visitor
Creation
artima.com
·
9h
👨
Programming
A Brief Introduction to
Rvalue
References
artima.com
·
9h
👨
Programming
Living off the AI: The Next Evolution of
Attacker
Tradecraft
securityweek.com
·
1d
🔒
Cybersecurity
Loading...
Loading more...
« Page 13
•
Page 15 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help