๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ก DNS Archaeology

Historical Records, Protocol Evolution, Name System Heritage, Internet History

Call for Papers: Oral Histories with the Dead
archivespublishing.comยท11h
๐ŸŽผAudio Paleography
Weeknotes #339 โ€” Lone Star
andrewdoran.ukยท1d
๐Ÿ“กNetwork Archaeology
Digg v4 and lessons not learned
dfarq.homeip.netยท1d
๐Ÿ“ฐRSS Archaeology
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.comยท2d
๐Ÿ‘๏ธSystem Observability
Phishing Kits Uncovered: Methods and Tactics Used to Evade SEGs, Sandboxes, and Analysts
cofense.comยท1d
๐ŸŽซKerberos Exploitation
New dinosaur species is the punk rock version of an ankylosaur
arstechnica.comยท10h
๐ŸฆดDatabase Paleontology
A Conversation with Amazon CTO Werner Vogels
softwareengineeringdaily.comยท16h
๐Ÿ Homelab Archaeology
Salt Typhoon hacking campaign goes beyond previously disclosed targets, world cyber agencies say
cyberscoop.comยท1d
๐Ÿ›กCybersecurity
OpenAI and Anthropic share findings from a joint safety evaluation
openai.comยท1dยท
Discuss: Hacker News
๐Ÿ“Code Metrics
How to Slow Down a Program? And Why it Can Be Useful.
stefan-marr.deยท1dยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿš€Compiler Optimizations
Ask HN: ChatSherlock โ€“ Looking for Technical Validation
chatsherlock.comยท9hยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
How Software is Transforming Commercial Fence Company Operations
dev.toยท2hยท
Discuss: DEV
๐Ÿ”Capability Systems
SOLID Principles In 2025 In Practice With Python And UML Examples
dev.toยท5hยท
Discuss: DEV
๐ŸšShell Calculus
DeepAtlas: a tool for effective manifold learning
arxiv.orgยท21h
๐ŸŒ€Riemannian Computing
The Resurgence of IoT Malware: Inside the Mirai-Based Gayfemboy Botnet Campaign
fortinet.comยท2dยท
Discuss: Hacker News
๐ŸŒDNS Security
SSL certificate requirements are becoming obnoxious
chrislockard.netยท2dยท
Discuss: Hacker News
๐Ÿ”Certificate Analysis
Trends #8: Developers use AI more, but they trust it much less
newsletter.techworld-with-milan.comยท10hยท
Discuss: r/programming
๐Ÿ”„Language Evolution
Global warning of Chinese cyberattacks on telecommunications infrastructure
heise.deยท18h
๐Ÿ›กCybersecurity
Reliable Weak-to-Strong Monitoring of LLM Agents
arxiv.orgยท21h
๐ŸŽฏThreat Hunting
Ghost Pages by Drew Trainor โ€“ A Comprehensive Review of This Page-Building Solution
dev.toยท5hยท
Discuss: DEV
๐Ÿ“‡Indexing Strategies
Loading...Loading more...
AboutBlogChangelogRoadmap