🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💾 Data Preservation

Archive.org

Call for Participants: Regional Training Programme “Emergency Response for Documentary Heritage”
ica.org·1d
📋PREMIS Events
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.com·21h
🔗Data Provenance
Introducing Bridge Files
overturemaps.org·5h
🔌Archive APIs
NREL Maps Out US Data Infrastructure
hackaday.com·16h
📦METS Standards
A guide book for a time traveler
uniqueatpenn.wordpress.com·2h
🏛Digital humanities
Rescuing dendritic cell interstitial motility sustains antitumour immunity
nature.com·2h
🧬Copy Number Variants
Emilio De Capitani — The lone legal battler fighting ‘confidentiality by default’
euobserver.com·1d
⚖️Archive Ethics
CA: Stop the Corporate Cover Up Act (S.B. 690)
act.eff.org·18h
🕵️Vector Smuggling
‘A dog cemetery would not be treated like this’: the fight to preserve Black burial grounds in the US
theguardian.com·3h
👪Geneology
Begin Blog Experiment of No Tags and Only 8 Categories
wisdomandwonder.com·2d
🔗Online Curation
WinRAR exploit enables attackers to run malicious code on your PC — critical vulnerability patched in latest beta update
tomshardware.com·4h
💣ZIP Vulnerabilities
5 Cloud Storage Best Practices for AI Workloads
backblaze.com·1d
💾Persistence Strategies
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
forensicfocus.com·1d
🔬Archive Forensics
Introduction to the Fundamentals of Amazon Redshift
redshift-observatory.ch·9h
🗃️Database Storage
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.com·12h
📝Concrete Syntax
Can You Patch a Protobuf File? Not Really—and Here’s Why
hackernoon.com·11h
📋Protocol Buffers
They don't make 'em like that any more: Sony DTC-700 audio DAT player/recorder
kevinboone.me·2d·
Discuss: Hacker News
📼DAT Archives
Deep Dive into Databend UDF, implementing your data solutions with Python, WASM
databend.com·4h·
Discuss: Hacker News
📋DFDL
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.com·10h
🔍NTLM Forensics
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.org·16h·
Discuss: Hacker News
🔐Homomorphic Encryption
Loading...Loading more...
AboutBlogChangelogRoadmap