🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛣️ BGP Hijacking

Route Security, Network Archaeology, Internet Routing, Protocol Analysis

Uber and Baidu are teaming up to deploy thousands of autonomous vehicles globally
engadget.com·2d
🔌Operating system internals
Quick guide to heuristic & bot programming contests
gmays.com·1d
⚡Proof Automation
Courts Favor Targeted eDiscovery Collections, but It Is Up to In-House Teams to Enable Such Cost Saving Proportional Efforts
blog.x1discovery.com·2d
⚖️Legal Compliance
Claude Code on Amazon Bedrock - Anthropic
docs.anthropic.com·7h
👑Isabelle
After managing 50+ security breaches, I documented our incident response framework with ready to use forensic scripts
ncse.info·4d·
Discuss: r/programming
🚨Incident Response
Cloudflare Starts Blocking Pirate Sites For UK Users
yro.slashdot.org·2d
🏴‍☠️Piracy
Folly: IOBuf and Zero-Copy Networking
uvdn7.github.io·4d·
Discuss: Hacker News
📋Format Specification
Don't sell shovels, sell treasure maps
platforms.substack.com·1d·
Discuss: Substack
🏠Homelab Archaeology
Situated Software (2004)
web.archive.org·1d·
Discuss: Hacker News
🚀Indie Hacking
Writing the Perfect Question (2010)
codeblog.jonskeet.uk·17h·
Discuss: Hacker News
🔗Constraint Handling
How Dartmouth Became the Ivy League’s Switzerland
newyorker.com·3h
🏛️Philosophy
A Neural Net For a Graphing Calculator?
hackaday.com·1d
🤖Advanced OCR
Doctor and husband jailed for selling stolen PPE on eBay
bbc.com·3h
🏴‍☠️Piracy
Oracle: 309 security updates for all possible products
heise.de·1d
🔓Hacking
Let the Games Begin: How Cybersecurity Competitions Build Skills, Careers, and Community
backblaze.com·2d
🎯Threat Hunting
Harness Adds Templates to Platform for Managing Infrastructure as Code
devops.com·3d
❄️Nix Adoption
Building High-Performance GraphQL Servers in Golang with Optimized Resolver Patterns
dev.to·3d·
Discuss: DEV
🌊Stream Processing
Vintage Hardware Find Includes Time Capsule of Data
hackaday.com·1d
💾vintage computing
Code Smell 307 - Naive Time Assumptions and How to Fix It
hackernoon.com·2d
🎯Gradual Typing
Maneuver Detection via a Confidence Dominance Maneuver Indicator
arxiv.org·4d
📊PCAP Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap