🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💿 Floppy Forensics

Disk Archaeology, Media Recovery, Format Analysis, Storage Investigation

Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.com·6h
🔍NTLM Forensics
Exploring Modern Warehousing and Data Mining
dev.to·7h·
Discuss: DEV
🧬PostgreSQL Forensics
$28 external HDD on Amazon actually does what it claims, still not a good buy
arstechnica.com·20h·
Discuss: Hacker News
💿WORM Storage
Program Execution, follow-up
windowsir.blogspot.com·2h·
Discuss: www.blogger.com
⚡Performance Tools
Digital Forensics Round-Up, June 25 2025
forensicfocus.com·28m
🔬Archive Forensics
How much slower is random access, really?
samestep.com·1d·
Discuss: Hacker News
📼Tape Encoding
27-year-old Easter egg found in the Apple Power Mac G3's ROM— creating a RAM disk with the name 'secret ROM image' unveils a hidden file
tomshardware.com·4h
🖥️Vintage Macintosh
Reflecting on disklabels, to put softraid volumes on optical discs!
research.exoticsilicon.com·2d
💿Optical Media
New old tape drive scraping sounds, but passing all tests successfully?
reddit.com·1d·
Discuss: r/homelab
⚙️Cassette Mechanics
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.com·20h
💿Optical Forensics
DOS Commands Across Home Computers: Apple, IBM & Commodore
nerdlypleasures.blogspot.com·2d·
Discuss: nerdlypleasures.blogspot.com
💾Floppy Formats
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.com·23h
🛡️eBPF Security
PDP-11 Replica: The PiDP-11
obsolescence.dev·1h·
Discuss: Hacker News
💾vintage computing
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.org·1d
🦠Malware Analysis
How keys are used in FileVault and encryption
eclecticlight.co·8h·
Discuss: Lobsters, Hacker News
💣Compression Security
New: Improve Apache Iceberg query performance in Amazon S3 with sort and z-order compaction
aws.amazon.com·18h
🔄Burrows-Wheeler
iPRES Digital Preservation Bake Off 2025 - Amuse Bouche Challenge: Tiny Tools, Tasty Wins
ipres2025.nz·2d
🔄Archival Workflows
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·2h
🦠Malware Analysis
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.com·1d
🔓Password Cracking
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.com·17h
🔗Data Provenance
Loading...Loading more...
AboutBlogChangelogRoadmap