Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
bombata053's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
83063
posts in
726.3
ms
Loading...
Subscribe
AutoCAD
2d
and 3d
dev.to
·
1d
·
Discuss:
DEV
🎨
Computer Graphics
New
ransomware
spotted with a 'coding mistake' that means even the hackers can't
decrypt
the files
pcgamer.com
·
20h
💣
Binary Exploitation
Linear Systems and
Eigenvalue
Problems: Open Questions from a
Simons
Workshop
arxiv.org
·
1d
📐
Matrix Theory
Show HN: The
Librarian
creates artifacts while a model
finishes
its work
librarian.fieldtheory.dev
·
16h
·
Discuss:
Hacker News
🎨
Computer Graphics
C++ creator calls for action to
address
'
serious
attacks'
theregister.com
·
1d
·
Discuss:
r/programming
💣
Binary Exploitation
Intersection
of Two Linked
Lists
dev.to
·
18h
·
Discuss:
DEV
🌳
Red-Black Trees
On
Computation
and
Reinforcement
Learning
arxiv.org
·
1d
🔄
Dynamic Programming
RUSTSEC-2025-0146
: Vulnerability in
sha-rust
rustsec.org
·
1d
💣
Binary Exploitation
Style tips for less
experienced
developers
coding with AI
honnibal.dev
·
1d
·
Discuss:
Hacker News
λ
Functional Programming
Automatic
Programming
Returns
cyber-omelette.com
·
9h
·
Discuss:
Hacker News
💻
programming
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
11h
·
Discuss:
Hacker News
💣
Binary Exploitation
Learning
Zig
and writing an
editor
, just for fun
noahwbaldwin.me
·
10h
·
Discuss:
r/Zig
💻
programming
🎲 TypeScript
strictness
is
non-monotonic
: strict-null-checks and no-implicit-any interact
huonw.github.io
·
16h
λ
Functional Programming
Neural population
geometry
and optimal coding of tasks with shared
latent
structure
nature.com
·
1d
📈
Optimization
computer graphics, maths, shaders,
fractals
,
demoscene
iquilezles.org
·
4d
🎨
Computer Graphics
Your Design System Needs an
Enforcer
nngroup.com
·
18h
🏗️
Design Patterns
Escape
The
Algorithm
kill-the-newsletter.com
·
19h
⚙
algorithms
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Finding all the roots of a
polynomial
using the
QR
algorithm
johndcook.com
·
12h
🔵
Eigenvalues
Token
Smuggling
:How Non-Standard
Encoding
Bypass AI Security
instatunnel.my
·
1d
·
Discuss:
Hacker News
,
r/programming
💣
Binary Exploitation
Private Data Space Model
privatedata.space
·
2d
λ
Functional Programming
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help