🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“‘ Feed Archaeology

RSS History, Syndication Evolution, Protocol Heritage, Web Standards

Detect Narrative Threats with AI Personas
askrally.comΒ·2dΒ·
Discuss: Hacker News
πŸ“°RSS Reading Practices
Machine Learning Fundamentals: active learning with python
dev.toΒ·1hΒ·
Discuss: DEV
🧠Machine Learning
Portable Network Graphics (PNG) Specification (Third Edition)
w3.orgΒ·22hΒ·
Discuss: Hacker News
πŸ•ΈοΈWebP Analysis
[$] Libxml2's "no security embargoes" policy
lwn.netΒ·3h
πŸ”“Free and open source
My Homelab (now in a 10" rack)
reddit.comΒ·2hΒ·
Discuss: r/homelab
🏠HomeLab
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.comΒ·10h
πŸ”“Hacking
Could Open Table Formats End the Reign of Snowflake and Databricks?
prequel.coΒ·1hΒ·
Discuss: Hacker News
πŸ“šMARC Evolution
On Rails: A New Podcast from the Rails Foundation
rubyonrails.orgΒ·2hΒ·
Discuss: Hacker News
πŸ“‘RSS Extensions
Building Real-Time SMS, WhatsApp and Slack Alerts
thenewstack.ioΒ·1h
🌊Stream Processing
Ossification and the Internet
blog.apnic.netΒ·12h
πŸ“‘Network Archaeology
Video Compression for Spatiotemporal Earth System Data
arxiv.orgΒ·15h
πŸ“ŠRate-Distortion Theory
HackRF Pro Pre-Order: Frequency Range and RF Performance Improvements, USB-C, TCXO Added
rtl-sdr.comΒ·16h
πŸ“žWebRTC
Google Cache Is Gone, I Like This Way Better: How to View Archived Websites
pcmag.comΒ·5hΒ·
Discuss: Hacker News
🌐Web Archiving
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comΒ·9h
🎫Kerberos Attacks
in and out, quick appview adventure | futur | WhiteWind blog
whtwnd.comΒ·10h
πŸ”„Sync Engine
Driving cost-efficiency and speed in claims data processing with Amazon Nova Micro and Amazon Nova Lite
aws.amazon.comΒ·2h
🌊Stream Processing
Local Elasticsearch Playground: A Practical Introduction and hands-on test (and moving to a RAG solution)
dev.toΒ·1dΒ·
Discuss: DEV
🏺ZIP Archaeology
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·6h
🦠Malware Analysis
A Standard for Human-Centered Investigation Playbooks
chrissanders.orgΒ·14m
🎯Threat Hunting
Using OpenTelemetry to Diagnose a Critical Memory Leak
hackernoon.comΒ·3h
πŸ‘οΈSystem Observability
Loading...Loading more...
AboutBlogChangelogRoadmap