🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔬 Archive Forensics

Digital Evidence, File Carving, Metadata Recovery, Timeline Analysis

Zuckerberg bygger hemligt AI-labb för miljarder
omni.se·3d
🇸🇪Swedish Cryptanalysis
Using the mdfind command line tool to find duplicate copies of an application on macOS Sequoia
derflounder.wordpress.com·5d
🏺ZIP Archaeology
How Science may help us smell the past (2017)
cen.acs.org·2d·
Discuss: Hacker News
🧪Manuscript Chemistry
Behind the Scenes: My "How Computers Really Work" Series on Computerphile
xania.org·3d
🧲RISC-V Archaeology
Platform security is not what you think it is
tirreno.com·2d·
Discuss: Hacker News
🛡Cybersecurity
Free Security Audits for Erlang and Elixir open source projects
erlang-solutions.com·1d·
Discuss: Lobsters, Hacker News
🌳Archive Merkle Trees
Expose and Circumvent SNI-Based QUIC Censorship of the Great Firewall of China
gfw.report·1d·
Discuss: Hacker News
🌐DNS over QUIC
Make Your Own Backup System – Part 2: Forging the FreeBSD Backup Stronghold
it-notes.dragas.net·4d·
Discuss: Lobsters, Hacker News
💿Backup Strategies
The First Few Milliseconds of an HTTPS Connection
moserware.com·4d·
Discuss: Hacker News
🔐Certificate Analysis
Cincinnati resident accused of threatening to kill 30K Black people days after megaviral attack video
the-independent.com·7h
📟Terminal Forensics
Police worker gets misconduct warning over handling of 999 call before four deaths
the-independent.com·1d
📟Terminal Forensics
Judge Pulls Opinion Full Of AI-Style Hallucinations, But No One Is Willing To Say It Was Written By AI
techdirt.com·2d·
Discuss: Hacker News
🧪Archive Fuzzing
Explainability Through Systematicity: The Hard Systematicity Challenge for Artificial Intelligence
arxiv.org·2d
🧠Machine Learning
Top 10 Python Libraries Every DevOps Engineer Should Master (With Use Cases & Code)
dev.to·12h·
Discuss: DEV
🏠Homelab Orchestration
Tag & Track: Automating Attendance with RFID and ESP8266
hackster.io·2d
📼Cassette Hacking
Understanding Streamable HTTP (the new one after SSE) of MCP Server/Client Architecture (+vs SSE)
dev.to·2d·
Discuss: DEV
⚡gRPC
CST Anti-UAV: A Thermal Infrared Benchmark for Tiny UAV Tracking in Complex Scenes
arxiv.org·1d
👁️Perceptual Hashing
Nimble 'Gunra' Ransomware Evolves With Linux Variant
darkreading.com·4d
🌳Archive Merkle Trees
China says US spies exploited Microsoft Exchange zero-day to steal military info
theregister.com·1d
🔓Hacking
Machine Learning Fundamentals: k-nearest neighbors project
dev.to·3d·
Discuss: DEV
🗂️Vector Search
Loading...Loading more...
AboutBlogChangelogRoadmap