Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🐛 Debugging Techniques
GDB, LLDB, Profiling, Memory Analysis, Performance Tuning
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
573
posts in
7.2
ms
Speeding Up
IAMTrail
: One Boto3 Process Instead of 1,500 CLI
Invocations
📦
UV Package Manager
zoph.me
·
6d
Part I — The original
quantitative
case: internet infrastructure is not
OK
🛡️
Security Research
securesql.info
·
1d
Fewer
Computers
, Fewer Problems: Going Local With Builds &
Deployments
⚙️
Dotfiles
blog.jim-nielsen.com
·
19h
Spark creator
bags
computing
gong
for making big data a little bit smaller
⚙️
Systems Programming
theregister.com
·
18h
Security through
chaos
🔓
Binary Exploitation
phpunit.expert
·
2d
Exposing
an Agentic
Pipeline
as an MCP Server
🔌
LSP Protocol
walsenburgtech.com
·
3d
Conceptual Machines releases
MAGDA
, a FREE AI-assisted
DAW
💬
Prompt Engineering
bedroomproducersblog.com
·
19h
AI systems Can Fail
Catastrophically
Without
Crashing
🏗️
System Design
spectrum.ieee.org
·
2d
MindDump
🔍
Reverse Engineering
kuber.studio
·
19h
Shipyard
is a cross-platform CI orchestration layer that coordinates validation for AI agents working across parallel
worktrees
⚙️
Systems Programming
danielraffel.me
·
1d
The Building Block Economy
🌐
Open Source
mitchellh.com
·
3d
·
Lobsters
,
Hacker News
Framework warns of further increases in RAM and SSD costs: The memory crisis is now
affecting
repairable
PCs as well
⚙️
Systems Programming
igorslab.de
·
1d
PKLITE
supplement 6: Min/max
alloc
., part 1
🔓
Binary Exploitation
entropymine.wordpress.com
·
4d
Fedora
44: Best New Features
💻
Terminal Emulators
debugpoint.com
·
1d
Anthropic’s Project
Glasswing
—restricting Claude
Mythos
to security researchers—sounds necessary to me
🛡️
Security Research
simonwillison.net
·
2d
·
Hacker News
Why your files are
slowly
dying
🔓
Binary Exploitation
behindtheviewfinder.com
·
3d
The
bottleneck
shifts
to distribution
🌐
Open Source
newsletter.squishy.computer
·
2d
Part II — Third-party
libraries
: the vulnerability layer nobody
counted
🔓
Binary Exploitation
securesql.info
·
20h
Systems
Thinking
and Test
Cases
✅
Testing Strategies
testpappy.wordpress.com
·
6d
Container smoke testing with
Goss
: stop guessing if your
.env
works
✅
Pytest
blog.zolty.systems
·
4d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help