🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
✅ Archive Validation

Fixity Checking, Corruption Detection, Integrity Verification, Preservation Workflows

A distributed systems reliability glossary
antithesis.com·19h·
Discuss: Lobsters, Hacker News, r/programming
✅Archive Fixity
Checking data integrity
eclecticlight.co·4h
✅Checksum Validation
Stop Fighting Image Formats: A Developer's Guide to Streamlined Image Processing
dev.to·4h·
Discuss: DEV
📸PNG Optimization
An engineer’s path from data loss to software preservation
softwareheritage.org·8h
🔄Archival Workflows
Family Archives and the Holocaust
medium.com·1d
📜Family History Data
Courts Favor Targeted eDiscovery Collections, but It Is Up to In-House Teams to Enable Such Cost Saving Proportional Efforts
blog.x1discovery.com·16h
⚖️Legal Compliance
MT4DP: Data Poisoning Attack Detection for DL-based Code Search Models via Metamorphic Testing
arxiv.org·6h
🧮Z3 Solver
The hard truth about soft deletion
thoughtbot.com·10h
⛏️SQL Archaeology
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.org·2d
🌐DNS Security
Show HN: I built a no-code ETL tool (v0.2) to clean messy CSVs using prompts
news.ycombinator.com·18h·
Discuss: Hacker News
🚚Data Migration
Forensic journey: Breaking down the UserAssist artifact structure
securelist.com·2d
🔍NTLM Archaeology
Smarter AI for Critical Operations: Why Data Matters
thenewstack.io·17h
🌊Stream Processing
Training in Uyo Enables Participants to Take Their First Steps in Open Data
blog.okfn.org·1d
🔗Data Provenance
Show HN: From Zod schema to agent-ready MCP server – minimal, typed, deployable
github.com·20h·
Discuss: Hacker News
🔐CBOR
Building End-to-End Data Pipelines: From Data Ingestion to Analysis
kdnuggets.com·20h
🌊Stream Processing
Enabling Rapid Genomic Analysis with Illumina Dragen on Amazon EC2 F2 Instances
aws.amazon.com·12h·
Discuss: Hacker News
⚙️Compression Benchmarking
To be a better programmer, write little proofs in your head
the-nerve-blog.ghost.io·1d·
Discuss: Hacker News, r/programming
🛡️Preservation Proofs
Fileless DPAPI Credential Extraction With PowerShell
infosecwriteups.com·1d
🎯NTLM Attacks
A Guide to Fixed Asset Verification
dev.to·1d·
Discuss: DEV
🛡️Archive Verification
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com·11h·
Discuss: Lobsters, Hacker News
🛡️eBPF Security
Loading...Loading more...
AboutBlogChangelogRoadmap