๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”ฌ Archive Forensics

Digital Evidence, File Carving, Metadata Recovery, Timeline Analysis

Show HN: legacy-use โ€“ add REST APIs to legacy software with computer-use
legacy-use.comยท2dยท
Discuss: Hacker News
๐Ÿ”ŒArchive APIs
Erotic mosaic stolen by Nazi captain in second world war returned to Pompeii
theguardian.comยท19h
๐Ÿ“šDocumentation Archaeology
Show HN: BGRemovePro โ€“ A fast background remover for AI-generated images
bgremovepro.comยท2dยท
Discuss: Hacker News
๐Ÿ“ธPNG Optimization
Book Notes: The Dark Art of Linear Algebra by Seth Braver โ€” Chapter 1 Review
ruslanspivak.comยท20h
๐Ÿ“Mathematical Art
A summer of security: empowering cyber defenders with AI
blog.googleยท1dยท
Discuss: Hacker News
๐Ÿ Homelab Automation
Functional Abstract Interpretation
simon.peytonjones.orgยท1dยท
Discuss: Hacker News
๐Ÿ”—Functional Compilers
๏ธโ€โ™‚๏ธ Mastering OSINT: How to Find Information on Anyone
infosecwriteups.comยท1d
๐Ÿ”ŽOSINT Techniques
A former Big Tech hiring manager shares how to avoid the AI 'sameness epidemic' and stand out in your job application
businessinsider.comยท2h
๐Ÿ‡ธ๐Ÿ‡ชNordic Algorithms
LuCI on MGMT - Day 7
dev.toยท7hยท
Discuss: DEV
๐Ÿ“ปHomebrew Protocols
Joint space-time wind field data extrapolation and uncertainty quantification using nonparametric Bayesian dictionary learning
arxiv.orgยท7h
๐ŸงฎKolmogorov Bounds
Python Fundamentals: build
dev.toยท22hยท
Discuss: DEV
๐Ÿ”„Reproducible Builds
When Familiarity Remains: Procedural Memory, Symbolic Anchors, and Digital Engagement in Dementia Care
arxiv.orgยท1d
๐ŸŒCultural Computing
Belk hit by May cyberattack: DragonForce stole 150GB of data
securityaffairs.comยท22h
๐Ÿ›กCybersecurity
Machine Learning Fundamentals: data preprocessing with python
dev.toยท1dยท
Discuss: DEV
โš™๏ธBatch Processing
Agent-based visualization of streaming text
arxiv.orgยท1d
๐Ÿ“ฐRSS Archaeology
Robust-Multi-Task Gradient Boosting
arxiv.orgยท7h
๐Ÿ“ŠLearned Metrics
We Built a Private Algorand Network to Crack the Code of Transaction Ordering
hackernoon.comยท19h
๐ŸคConsensus Algorithms
Introducing Amazon S3 Vectors: First cloud storage with native vector support at scale (preview)
aws.amazon.comยท11hยท
Discuss: Hacker News
๐Ÿ—‚๏ธVector Databases
NarrLV: Towards a Comprehensive Narrative-Centric Evaluation for Long Video Generation Models
arxiv.orgยท7h
๐Ÿ“ŠRate-Distortion Theory
Experts uncover critical flaws in Kigen eSIM technology affecting billions
securityaffairs.comยท2d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap