🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 Distributed Hash Tables

P2P Networks, Consistent Hashing, Decentralized Storage, DHT Routing

Taking Down Booters: The Cat-and-Mouse Game
lightbluetouchpaper.org·1d
🎫Kerberos Exploitation
EventSourcingDB 1.1 offers more flexible consistency control and signed events
heise.de·4d
🌊Streaming Databases
22.00.0127 Tags are dumb. I'm going to fix tags
johnnydecimal.com·23h
🔍Archive Semantics
Plastics-to-syngas photocatalysed by Co–Ga2O3 nanosheets
pmc.ncbi.nlm.nih.gov·14h·
Discuss: Hacker News
🧪Cassette Chemistry
How the tz database works (2020)
yatsushi.com·3h·
Discuss: Hacker News
🔤Character Encoding
When the Web Closes the Door
words.narain.io·1d·
Discuss: Hacker News
⏳Time Capsule Networks
Splitting a long string in lines efficiently
lemire.me·5h·
Discuss: Hacker News
⚡SIMD Optimization
Connect to a Local Ollama AI Instance From Within Your LAN
thenewstack.io·1d
🛠System administration
Predictive Personalized Behavioral Intervention via Dynamic Network Optimization for Chronic Disease Management
dev.to·20h·
Discuss: DEV
🏠Home Automation
Show HN: Inception: Automatic Rust Trait Implementation by Induction
github.com·1d·
Discuss: Hacker News, r/rust
🦀Rust Macros
TraceLLM: Security Diagnosis Through Traces and Smart Contracts in Ethereum
arxiv.org·3d
🔗Hash Chains
How to Actually Hit $10K MRR in 2025 (No BS, Just What Works)
dev.to·1d·
Discuss: DEV
🖥️Self-hosted Infrastructure
Building and Deploying Kubemate: An AI-Powered Kubernetes DevOps Chatbot on AWS Elastic Beanstalk
dev.to·9h·
Discuss: DEV
📦Container Security
Automated Anomaly Detection in Network Traffic via Multi-Variant Temporal Bayesian Networks
dev.to·17h·
Discuss: DEV
🕵️Network Forensics
Unlock the Black Box: AI-Powered Optimization for Any Problem
dev.to·2d·
Discuss: DEV
⚡Incremental Computation
Dynamic Energy Grid Optimization via Adaptive Multi-Agent Reinforcement Learning
dev.to·1d·
Discuss: DEV
⚡Incremental Computation
How Data-Driven Token Marketing Services Redefine Crypto Growth
dev.to·2d·
Discuss: DEV
📊Feed Optimization
Show HN: I Built a Rails Active Storage Adapter for BunnyCDN Storage
github.com·1d·
Discuss: Hacker News
🔄Sync Engine
Show HN: Integration Security Top 10: An OWASP-style framework
github.com·18h·
Discuss: Hacker News
🛡️WASM Sandboxing
BIDO: A Unified Approach to Address Obfuscation and Concept Drift Challenges in Image-based Malware Detection
arxiv.org·2d
🔗Binary Similarity
Loading...Loading more...
AboutBlogChangelogRoadmap