🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“‘ DNS Archaeology

Historical Records, Protocol Evolution, Name System Heritage, Internet History

Surfshark reaffirms its commitment to user privacy in independent audit
techradar.comΒ·3h
🏺Kerberos Archaeology
[$] Libxml2's "no security embargoes" policy
lwn.netΒ·4h
πŸ”“Free and open source
Building Digital Preservation Skills Using the DPC’s Novice to Know-How (N2KH) Courses
saaers.wordpress.comΒ·2d
πŸ”„Archival Workflows
Worth Reading 062425
rule11.techΒ·4h
🌐DNS over QUIC
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comΒ·10h
🎫Kerberos Attacks
How to Prove That An Email Was Received
metaspike.comΒ·21m
πŸ“„Document Digitization
Google Cache Is Gone, I Like This Way Better: How to View Archived Websites
pcmag.comΒ·7hΒ·
Discuss: Hacker News
🌐Web Archiving
Ancient DNA Reveals Mysterious New Group of Humans in Colombia With No Genetic Ties to People Today
smithsonianmag.comΒ·3h
πŸ‘ͺGeneology
Deep Dive into DNS: Super Smart Address Book
axonshield.comΒ·5dΒ·
Discuss: Hacker News
πŸ“‘Network Protocol Design
How to Quantify Risk and Communicate Effectively: Step 4 to TruRiskβ„’
blog.qualys.comΒ·5h
🎯Threat Hunting
Unsupervised Learning NO. 486
newsletter.danielmiessler.comΒ·2d
πŸ•΅οΈVector Smuggling
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.comΒ·1d
πŸ›‘οΈeBPF Security
How To Prepare Your API for AI Agents
thenewstack.ioΒ·6h
πŸ”ŒInterface Evolution
Machine Learning Fundamentals: active learning project
dev.toΒ·4hΒ·
Discuss: DEV
🧠Machine Learning
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.comΒ·1d
🎫Kerberos Exploitation
Linguistics vs. archeology and (physical) anthropology
languagelog.ldc.upenn.eduΒ·19h
πŸ“‘Frequency Archaeology
New: Improve Apache Iceberg query performance in Amazon S3 with sort and z-order compaction
aws.amazon.comΒ·23h
πŸ”„Burrows-Wheeler
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·8h
🦠Malware Analysis
Scans for Ichano AtHome IP Cameras, (Mon, Jun 23rd)
isc.sans.eduΒ·2d
🌐BGP Security
Beyond the Hype: 16 Must-Have Resources for Navigating the XR and Metaverse Frontier
dev.toΒ·22hΒ·
Discuss: DEV
πŸ•ΈοΈKnowledge Graphs
Loading...Loading more...
AboutBlogChangelogRoadmap