Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Capability Systems
Operating Systems, Security, Memory Safety, Sandboxing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
75312
posts in
655.2
ms
CVA6-CFI
: A First Glance at RISC-V Control-Flow Integrity Extensions
arxiv.org
ยท
2d
๐ก๏ธ
Intel CET
The Next Open Source Security Race:
Triage
at Machine Speed ...
socket.dev
ยท
1d
๐งช
Jepsen Testing
Secrets management with
SOPS
Guix --
fishinthecalculator
fishinthecalculator.me
ยท
8h
๐ก๏ธ
AMD SEV
0xrinful/dotfiles
: A clean, minimal
Niri
dotfiles for Arch-based Linux distributions.
github.com
ยท
1d
ยท
Discuss:
r/unixporn
๐ฅ๏ธ
SerenityOS
A Lot Of
Exciting
Changes To Look
Forward
To With Linux 6.20 -- Or Linux 7.0
phoronix.com
ยท
4h
๐ง
Linux
[Day 01] - My Journey from Laptop to Lab: Building a
Headless
Debian
Server for DevOps & AI
blog.zasela.site
ยท
1d
ยท
Discuss:
DEV
๐
Shuttle
abdimoallim/alloc
: A header-only C allocator library
github.com
ยท
39m
ยท
Discuss:
Hacker News
,
r/C_Programming
๐พ
Memory Allocators
Why Your AI
Assistant
Should Run at Home
dev.to
ยท
14h
ยท
Discuss:
DEV
๐ก๏ธ
AI Security
A Tale of Two Standards,
POSIX
and
Win32
(2005)
samba.org
ยท
1d
ยท
Discuss:
Hacker News
๐ง
Linux
Windows
PCs
fade
away
infoworld.com
ยท
2d
๐ป
Operating Systems
Show HN:
Standardized
robot brain with
hardware
safety
news.ycombinator.com
ยท
3h
ยท
Discuss:
Hacker News
๐ค
Robotics
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
ยท
18h
๐พ
Retro Computing
I
struggled
with system design until I learned these 114
concepts
newsletter.systemdesign.one
ยท
1d
๐๏ธ
System Design
OSTEP
Chapters
6,7
muratbuffalo.blogspot.com
ยท
3d
ยท
Discuss:
Blogger
โ๏ธ
Systems Programming
Linux Kernel
Runtime
Guard Reaches 1.0: A Major
Milestone
for
Runtime
Kernel Security
linuxjournal.com
ยท
3d
๐
BPF LSM
Analysis of active
exploitation
of
SolarWinds
Web Help Desk
microsoft.com
ยท
1d
๐
Userspace TCP Stacks
SystemRescue
system-rescue.org
ยท
3d
๐ง
Linux
The Future of Systems
novlabs.ai
ยท
1d
ยท
Discuss:
Hacker News
๐๏ธ
Systems Design
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
ยท
2d
ยท
Discuss:
Hacker News
๐
Intrusive Containers
A New Era for Security? Anthropic's Claude
Opus
4.6 Found 500
High-Severity
Vulnerabilities
it.slashdot.org
ยท
16h
๐
Security
Loading...
Loading more...
« Page 2
โข
Page 4 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help