Tape Library and Show Off
i.redd.it·3h·
Discuss: r/homelab
📼Cassette Archaeology
Nix pills
nixos.org·17h
❄️Nixpkgs
Automated Artifact Detection & Classification in Microscopy Image Datasets
dev.to·1d·
Discuss: DEV
📄Document Digitization
Optimizing a QuickTake Image Decoder for the Apple II’s 6502
hackaday.com·9h
🍎Apple II Heritage
Episode 166 - Beyond the PDP-11
adventofcomputing.libsyn.com·2h
🧲RISC-V Archaeology
Security Affairs newsletter Round 544 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·14h
🛡Cybersecurity
The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·10h·
Discuss: Hacker News
🔐PKI Archaeology
rblhost: Exploring Rust’s Role in Embedded Development Tools
mcuoneclipse.com·7h
🦀Embedded Rust
This rugged SSD survived my bag, pocket, and a few drops - but I'm still wary of the build quality
techradar.com·9h
💾Floppy Imaging
I have created a tutorial on how to install Mint with BTRFS and Full Disk Encryption!
gist.github.com·4h·
Discuss: r/linux
🔒Secure Boot
Are Software Registries Inherently Insecure?
developers.slashdot.org·49m
📦Container Security
Fun with HyperLogLog and SIMD
vaktibabat.github.io·1d·
📊HyperLogLog
A Man Spent 6 Years Searching the Same Farm—and Finally Discovered a 1,900-Year-Old Roman Treasure
popularmechanics.com·13h
🏺Kerberos Archaeology
Practical ZFS Performance Tuning: ARC, L2ARC, and SLOG Explained
discoverbsd.com·15h
🔍eBPF
TryHackMe Infinity Shell Walkthrough: Web Shell Forensics & CTF Guide
infosecwriteups.com·1d
📟Terminal Forensics
Help understanding detailed ssd report? Should i keep these SSD's?
reddit.com·1d·
Discuss: r/homelab
🗄️File Systems
YouTube Video Finder: Find Lost Videos in Archives
github.com·8h·
Discuss: Hacker News
🏺ZIP Archaeology
AKF: A modern synthesis framework for building datasets in digital forensics
sciencedirect.com·1d
🔍FLAC Forensics
Measuring scaleup for Postgres 18.0 with sysbench
smalldatum.blogspot.com·8h·
📊Performance Profiling
Beginner’s guide to malware analysis and reverse engineering
intezer.com·3d
🦠Malware Analysis