๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
โœ… Archive Fixity

Checksum Verification, Data Integrity, Long-term Preservation, Error Detection

The Wages Of Complacency
irreal.orgยท2d
๐ŸงฌPostgreSQL Forensics
OpenIPC/firmware
github.comยท1d
๐Ÿ”“Open Source Software
My ISP wanted my opinion so I gave it to them
drmollytov.devยท7hยท
Discuss: Hacker News
๐Ÿดโ€โ˜ ๏ธPiracy
Teach Me to Think Like an Operator
5iprojects.comยท5hยท
Discuss: Hacker News
๐ŸšNordic Shell
Show HN: I Made a plugin-based workspace app to avoids bloat
hollow-space.vercel.appยท2dยท
Discuss: Hacker News
๐ŸŒ€Brotli Dictionary
Migrating from Substack to self-hosted Ghost: the details
citationneeded.newsยท20h
๐Ÿ“กRSS
Take Back Our Digital Infrastructure To Save Democracy
techdirt.comยท1dยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
Three bad things: threads, garbage collection, and nondeterministic destructors
apenwarr.caยท3dยท
Discuss: Hacker News
๐Ÿง Separation Logic
An explorer and visualizer for Go concurrency patterns
golangweekly.comยท1d
๐Ÿฆ€Rust Macros
Let's properly analyze an AI article for once
nibblestew.blogspot.comยท1dยท
Discuss: Hacker News, nibblestew.blogspot.com
๐Ÿง Intelligence Compression
Security flaws in key Nvidia enterprise tool could have let hackers run malware on Windows and Linux systems
techradar.comยท1d
๐Ÿ”“Hacking
The Hard Truth About Organizational Change: Why Technology Alone Isnโ€™t Enough
dev.toยท10hยท
Discuss: DEV
๐ŸŒCultural Algorithms
VexTrio Cybercrime Outfit Run by Legit Ad Tech Firms
darkreading.comยท6h
๐Ÿš€Indie Hacking
Centralized Dynamic State Estimation Algorithm for Detecting and Distinguishing Faults and Cyber Attacks in Power Systems
arxiv.orgยท1d
๐Ÿ‘๏ธSystem Observability
How to Protect Your FastAPI Public API with API Keys
dev.toยท1dยท
Discuss: DEV
๐Ÿ”ŒArchive APIs
๐Ÿง  GenAI as a Backend Engineer: Part 1 - Model Serving
dev.toยท5hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Show HN: Tab'd โ€“ Track and share AI and clipboard operations within your IDE
github.comยท2dยท
Discuss: Hacker News
๐Ÿ‘๏ธSystem Observability
Attractive Metadata Attack: Inducing LLM Agents to Invoke Malicious Tools
arxiv.orgยท1d
โšกProof Automation
Act Now: $100M in FY25 Cyber Grants for SLTTs Available Before August 15
tenable.comยท8h
๐Ÿ›กCybersecurity
Thinking with Nothinking Calibration: A New In-Context Learning Paradigm in Reasoning Large Language Models
arxiv.orgยท22h
๐ŸŽฏDependent Parsing
Loading...Loading more...
AboutBlogChangelogRoadmap