🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Archive Encryption

Long-term Cryptography, Key Management, Preservation Security, Data Protection

Read more: Why bird flu could threaten traditional Swiss cheeses
swissinfo.ch·1d
🧬Copy Number Variants
What’s the best way of connecting to an HTTPS server
colinpaice.blog·2d
🌐NetworkProtocols
Sysbench for MySQL 5.6 thru 9.4 on a small server
smalldatum.blogspot.com·1d·
Discuss: smalldatum.blogspot.com
🦀Rusty Databases
Magnets Are on the Move
bnl.gov·1d·
Discuss: Hacker News
🧲Magnetic Tribology
Dev Gets 4 Years For Creating Kill Switch On Ex-Employer's Systems
yro.slashdot.org·20h
🔓Hacking
Technical Sales & Presales 101: The very basics
lukasniessen.com·1d·
Discuss: r/programming
⚙️Proof Engineering
Discrete optimization for on-call scheduling (2021)
rainforestqa.com·1d·
Discuss: Lobsters, Hacker News
🧮Compute Optimization
Learning to read code is more important than learning to write it (2018)
letterstoanewdeveloper.com·14h·
Discuss: Hacker News
📏Code Metrics
AWS in 2025: The Stuff You Think You Know That’s Now Wrong
lastweekinaws.com·2d·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Attackers patch 10.0 Apache ActiveMQ bug after gaining access to Linux systems
scworld.com·1d·
Discuss: Hacker News
🔓Hacking
Building a Lambda-Style Feature Platform with GCP Native Services
hackernoon.com·16h
🌀Brotli Internals
One Prompt, Zero Engineers: Your New Internal Dev
a16z.com·2d·
Discuss: Hacker News
🔄Language Evolution
"Python for Those Who Cannot Even", a Book by Claude Code
github.com·1d·
Discuss: Hacker News
📝Concrete Syntax
Activate Me!: Designing Efficient Activation Functions for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption
arxiv.org·5d
🔐Homomorphic Encryption
Ella box - The box you can hack!
hackster.io·2d
📟Terminal Physics
The Unseen Battleground: An Architect’s Retro on Streaming 1 Billion Minutes of Live Sports
hackernoon.com·2d
🌊Streaming Systems
PipeMagic Backdoor Resurfaces as Part of Play Ransomware Attack Chain
darkreading.com·3d
🔓Hacking
AI in Custom Software Development: Understanding Transformation of Coding, Testing and Launch
dev.to·18h·
Discuss: DEV
📏Code Metrics
Patching for persistence: How DripDropper Linux malware moves through the cloud
redcanary.com·3d
🔓Hacking
Developing Mobile Apps for Office Cleaning with Python and APIs
dev.to·1d·
Discuss: DEV
🔌Offline-first Apps
Loading...Loading more...
AboutBlogChangelogRoadmap