๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒฒ B-tree Forensics

Database Recovery, Page Analysis, Corruption Detection, Storage Archaeology

Introduction to the Fundamentals of Amazon Redshift
redshift-observatory.chยท5h
๐Ÿ—ƒ๏ธDatabase Storage
Black-Box Test Code Fault Localization Driven by Large Language Models and Execution Estimation
arxiv.orgยท10h
๐Ÿ”Concolic Testing
Real-world performance comparison of ebtree/cebtree/rbtree
wtarreau.blogspot.comยท2dยท
Discuss: wtarreau.blogspot.com, Hacker News
๐ŸŒฒB-tree Variants
5 huge stumbling blocks to legacy mainframe EOL
techradar.comยท7h
๐Ÿ›๏ธMainframe Archaeology
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท5h
๐Ÿ”NTLM Forensics
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comยท16h
๐Ÿ”—Data Provenance
Program Execution, follow-up
windowsir.blogspot.comยท1hยท
Discuss: www.blogger.com
โšกPerformance Tools
Exploring Modern Warehousing and Data Mining
dev.toยท7hยท
Discuss: DEV
๐ŸงฌPostgreSQL Forensics
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
forensicfocus.comยท23h
๐Ÿ”ฌArchive Forensics
New: Improve Apache Iceberg query performance in Amazon S3 with sort and z-order compaction
aws.amazon.comยท17h
๐Ÿ”„Burrows-Wheeler
Database Relationships Explained: From Theory to Rails Implementation From Core Concepts to Building Robust Rails Applications
blog.codeminer42.comยท1d
๐Ÿ—„๏ธDatabase Internals
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.comยท23h
๐Ÿ›ก๏ธeBPF Security
How to (Almost) solve cybersecurity once and for all
adaptive.liveยท17hยท
Discuss: Hacker News
๐Ÿ”Systems Hardening
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesnโ€™t)
blog.elcomsoft.comยท1d
๐Ÿ”“Password Cracking
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.comยท1d
๐ŸŒณArchive Merkle Trees
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.comยท20h
๐Ÿ’ฟOptical Forensics
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comยท4h
๐ŸŽซKerberos Attacks
Data Has No Moat!
towardsdatascience.comยท18h
๐ŸบDatabase Archaeology
Slashing CI Costs at Uber
uber.comยท4hยท
Discuss: Hacker News
๐Ÿ”„Reproducible Builds
Encrypting identifiers in practice
sjoerdlangkemper.nlยท9h
๐ŸŒŠStream Ciphers
Loading...Loading more...
AboutBlogChangelogRoadmap