Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π‘οΈ Packet Filtering
Firewalls, Network Security, eBPF, Traffic Control
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
76385
posts in
1.10
s
How to Find and
Edit
the Hosts File in Windows 11 (Block
Websites
)
techviral.net
Β·
2d
π
Netfilter
OpenAI Explains URL-Based Data
Exfiltration
Mitigations
in New Paper
embracethered.com
Β·
2d
π‘οΈ
AI Security
Internet
Coordination
in Times of War
labs.ripe.net
Β·
2d
π
Network Protocols
The
FCC
Is Planning to Make Changes To TV & Radioβs Emergency
Alert
System
cordcuttersnews.com
Β·
2d
π
Network Security
What Is Network Cloud Security?
securityscorecard.com
Β·
3d
π
Network Security
UDP
vs. TCP in Multiplayer Gaming: State
Synchronization
and Lag Compensation
systemdr.substack.com
Β·
2d
Β·
Discuss:
r/programming
π‘
QUIC Loss Detection
Malicious
use of virtual machine infrastructure
sophos.com
Β·
3d
π‘οΈ
AMD SEV
Telnet
Critical
CVE
tenable.com
Β·
3d
Β·
Discuss:
r/selfhosted
π
eBPF
Your AI Agent Will
Betray
You (Unless You Build It These
Guardrails
)
dev.to
Β·
3h
Β·
Discuss:
DEV
π‘οΈ
AI Security
eBPF
is Eating Kubernetes Security: Why Every
DevOps
Engineer Should Care in 2026
dev.to
Β·
2d
Β·
Discuss:
DEV
π
eBPF
Fixing Intel
e1000e
NIC
hangs on Proxmox nodes
garrettlaman.com
Β·
2d
π
Userspace TCP Stacks
Writing an
RSS
reader in 80 lines of
bash
yobibyte.github.io
Β·
3d
Β·
Discuss:
Hacker News
π
Shell Scripting
Reddit-homelab-how-to-know-your-homelab-was-hacked.md
gist.github.com
Β·
4d
π
Security
CISA
Orders Removal of
Unsupported
Edge Devices to Reduce Federal Network Risk
thehackernews.com
Β·
1d
π
Hardware Security
The Port 19
Chargen
Amplification
Attack on Financial Institutions (2013)
connected.app
Β·
3d
Β·
Discuss:
Hacker News
π
Network Protocols
From Automation to Infection (Part II): Reverse Shells, Semantic Worms, and Cognitive
Rootkits
in
OpenClaw
Skills
blog.virustotal.com
Β·
2d
Β·
Discuss:
blog.virustotal.com
π
Binary Exploitation
Things
Unix
can do
atomically
rcrowley.org
Β·
1d
Β·
Discuss:
Hacker News
π
Futex
martin-ger/esp32
_
nat
_router: A simple
NAT
Router for the ESP32
github.com
Β·
6d
π
Netfilter
OpenSSL
3 performance issues causing a
scalability
and security dilemma for organizations
techradar.com
Β·
1d
π
Performance
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
Β·
1d
Β·
Discuss:
Hacker News
π
Intrusive Containers
Loading...
Loading more...
« Page 6
β’
Page 8 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help