🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔧 Error Correction

Reed-Solomon, BCH Codes, Hamming Distance, Forward Error Correction

USPS! It’s not possible for me to use your Change of Address tool
chriscoyier.net·3h
🌐BGP Security
Duo Proximity Verification: Deployable phishing-resistant MFA
duo.com·2d
🏺Kerberos Archaeology
CapCut Con: Apple Phishing & Card-Stealing Refund Ruse
cofense.com·2d
🎫Kerberos Attacks
More resilient, flexible networking for the cloud workloads that matter
digitalocean.com·2d
🖥️Self-hosted Infrastructure
Show HN: A game from LinkedIn zip game
zipgame.net·1d·
Discuss: Hacker News
🏺ZIP Archaeology
Why Postgres needs better connection security defaults
neon.com·3d·
Discuss: Hacker News
🗄️PostgreSQL WAL
Combinatorial Explosion of Versions 5 Years Later
worklifenotes.com·1d·
Discuss: Hacker News
🦋Format Evolution
Show HN: AppifyText – AI text-to-app tool that builds internal tools
appifytext.ai·1d·
Discuss: Hacker News
🎙️Whisper
TRAI Tags Are Here — Identify Promotional, Service & Govt SMS Instantly!
infosecwriteups.com·9h
🖋Typography
MUVERA: Making multi-vector retrieval as fast as single-vector search
research.google·3d·
Discuss: Hacker News, r/LocalLLaMA, r/programming
🧮Vector Embeddings
How to Fix Your Context
dbreunig.com·2d·
Discuss: Hacker News
✨Effect Handlers
Microsoft is phasing out passwords soon – here's why passkeys are replacing them and what to do next
techradar.com·3h
🏺Kerberos Archaeology
Supporting Deterministic Traffic on Standard NICs
arxiv.org·4d
📡Network Calculus
Another Go variable dumper and interface/types explorer!
reddit.com·1d·
Discuss: r/golang
🔧Binary Parsing
From Zero to Your First Valid Vulnerability Report in 7 Days
infosecwriteups.com·9h
🔓Hacking
Estimating Technical Loss without Power Flows: A Practical, Data-Driven Approach for Loss Estimation in Distribution Grids
arxiv.org·1d
👁️System Observability
Free Hugo Autotranslator for Github Pages
dev.to·1d·
Discuss: DEV
🔄Migration Tools
IPv6 and Proxying Enhancements in DragonFly BSD
discoverbsd.com·2d
🛡️eBPF Security
U-R-VEDA: Integrating UNET, Residual Links, Edge and Dual Attention, and Vision Transformer for Accurate Semantic Segmentation of CMRs
arxiv.org·1d
🌀Riemannian Computing
Flame Graph Performance Truth Analysis(1751110891345100)
dev.to·7h·
Discuss: DEV
⚡Performance Tools
Loading...Loading more...
AboutBlogChangelogRoadmap