🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
✅ Archive Checksums

Integrity Verification, Hash Trees, Fixity Checking, Data Validation

ZFS in Virtualization: Storage Backend for the Pros
klarasystems.com·12h
💿ZFS Internals
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.com·1d
🛡️eBPF Security
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·17h
🦠Malware Analysis
Getting Started with Obsidian Bases
obsidian.rocks·20h
🕸️Knowledge Graphs
The one-more-re-nightmare compiler (2021)
applied-langua.ge·1d·
Discuss: Lobsters, Hacker News, r/programming
🔍RegEx Engines
in and out, quick appview adventure | futur | WhiteWind blog
whtwnd.com·20h
🔄Sync Engine
Excalidraw+ Is Now SoC 2 Certified
plus.excalidraw.com·2d·
Discuss: Hacker News
🔐PKI Archaeology
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.org·1h
📃Manuscript Tokenization
Debugging memory leaks in Postgres, jemalloc edition
enterprisedb.com·1d·
Discuss: Hacker News
🗄️PostgreSQL WAL
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·21h
🦠Malware Analysis
How and Why to Use Patches
dev.to·1d·
Discuss: DEV
📦Package Managers
15 Critical Steps to Secure Your Linux Server: Complete Security Guide
dev.to·1d·
Discuss: DEV
🏠Homelab Security
Rust Web Framework Analysis Deep Dive Safety Features(1750734074777000)
dev.to·2d·
Discuss: DEV
🦀Rust Borrowing
Real-world performance comparison of ebtree/cebtree/rbtree
wtarreau.blogspot.com·3d·
Discuss: wtarreau.blogspot.com, Hacker News
🌲B-tree Variants
Simple API monitoring, analytics and request logging for Chi, Echo, Fiber, and Gin
reddit.com·1d·
Discuss: r/golang
🌀Brotli Internals
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.to·7h·
Discuss: DEV
🔗Data Provenance
Can You Patch a Protobuf File? Not Really—and Here’s Why
hackernoon.com·22h
📋Protocol Buffers
Floating-Point Data Transformation for Lossless Compression
arxiv.org·2d
🌊Streaming Compression
️ Stop API Key Leaks Before They Cost You — Meet KeySentry
infosecwriteups.com·1d
🚀Indie Hacking
DSPy for Rubyists
github.com·1d·
Discuss: Hacker News
🌀Brotli Internals
Loading...Loading more...
AboutBlogChangelogRoadmap