๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ—ƒ๏ธ Database Forensics

SQL Investigation, Transaction Analysis, Recovery Techniques, Evidence Extraction

Trace Every Identity Action with Teleport Identity Security
goteleport.comยท3d
๐Ÿ”—Data Provenance
ZFS Summer Article Roundup: Smart Hardware Advice
klarasystems.comยท1d
๐Ÿ’ฟZFS Internals
Looking for Daybooks in the Archives
flickr.orgยท1d
๐ŸŒณB-tree Archaeology
OCI, Oh My: Remote Code Execution on Oracle Cloud Shell and Code Editor Integrated Services
tenable.comยท1d
๐Ÿ”CBOR
Near-cryogenic direct air capture using adsorbents
pubs.rsc.orgยท1dยท
Discuss: Hacker News
๐ŸŒก๏ธPreservation Physics
The โ€œWorking from Chinaโ€ Problem
magoo.medium.comยท8hยท
Discuss: Hacker News
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
Show HN: DataRamen, a Fast SQL Explorer with Automatic Joins and Data Navigation
dataramen.xyzยท1dยท
Discuss: Hacker News
๐Ÿ—„๏ธDatabase Internals
State of the Art of Prompt Engineering โ€ข Mike Taylor โ€ข GOTO 2025
youtube.comยท17h
๐Ÿ–ฅ๏ธTerminal Renaissance
Microsoft Names Threat Actors
learn.microsoft.comยท7hยท
Discuss: Hacker News
๐ŸŽซKerberos Exploitation
Show HN: 1.5B LLM routing model that aligns to preferences, not leaderboards
huggingface.coยท8hยท
Discuss: Hacker News
๐Ÿ“ABNF Parsing
From Alerts to Intelligence: A Novel LLM-Aided Framework for Host-based Intrusion Detection
arxiv.orgยท2d
๐ŸŽฏThreat Hunting
Refining Coarse-Grained Molecular Topologies: A Bayesian Optimization Approach
arxiv.orgยท1h
๐ŸŒComputational Topology
Bridging Boundaries: How to Foster Effective Research Collaborations Across Affiliations in the Field of Trust and Safety
arxiv.orgยท1h
๐Ÿ“ŠCitation Graphs
A Guide to Fixed Asset Verification
dev.toยท2dยท
Discuss: DEV
โœ…Archive Validation
Malware found embedded in DNS, the system that makes the internet usable, except when it doesn't
tomshardware.comยท1dยท
Discuss: Hacker News
๐ŸŒDNS Security
Show HN: Object database for LLMs that persists across chats (MCP server)
dry.aiยท10hยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
Migrating over 30 lambdas from Serverless Framework with LLMs
intmaker.comยท19hยท
Discuss: Hacker News
๐Ÿฆ‹Format Metamorphosis
To be a better programmer, write little proofs in your head
the-nerve-blog.ghost.ioยท3dยท
Discuss: Hacker News, r/programming
๐Ÿ›ก๏ธPreservation Proofs
Day 4 of Learning System Design: Mastering Consistent Hashing
dev.toยท17hยท
Discuss: DEV
๐ŸŒDistributed Hash
Building Production-Grade Network Telemetry: A gRPC Journey Into the Heart of Network Monitoring
dev.toยท1dยท
Discuss: DEV
๐Ÿ“กNetwork Monitoring
Loading...Loading more...
AboutBlogChangelogRoadmap