🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💿 Floppy Forensics

Disk Archaeology, Media Recovery, Format Analysis, Storage Investigation

After scam cost elderly East Bay woman $200K, police used fake cash to arrest courier
mercurynews.com·7h
🚨Incident Response
Lockerbie — The Eyewitness Evidence Against Megrahi : Exclusive Q&A with Pr Elizabeth Loftus [UPDATE : The Tiger’s Illusion and the Lockerbie Mirage: Perception...
inteltoday.org·1d
🔗Data Provenance
Records management in a hyperscale digital world
thinkingrecords.co.uk·1d
📄Document Digitization
Join the Old Computer Challenge, 2025 edition!
82mhz.net·23h
💾vintage computing
Smashing Security podcast #423: Operation Endgame, deepfakes, and dead slugs
grahamcluley.com·3d
🔓Hacking
[$] Supporting kernel development with large language models
lwn.net·2d
💻Local LLMs
Attacks on remote maintenance weak points in servers from HPE, Lenovo and Co.
heise.de·1d
🔓Hacking
Evaluating AI Systems: From Criteria to Pipelines
bassi.li·19h·
Discuss: Hacker News
📏Code Metrics
What is LZW compression?
dev.to·1d·
Discuss: DEV
🗜️LZW Variants
The Interactive Handbook on Data Structures and Algorithms
cartesian.app·4d·
Discuss: Lobsters, Hacker News, Hacker News
🌳Trie Structures
Mastering the Art of Linux
infosecwriteups.com·1d
🔩Systems Programming
Finding a 27-year-old easter egg in the Power Mac G3 ROM
downtowndougbrown.com·4d·
Discuss: Lobsters, Hacker News, r/programming
🖥️Vintage Macintosh
I built a Swift GraphQL client that generates the query using macros
github.com·2d·
Discuss: Hacker News
✅Format Verification
61 million US Verizon customers could be at risk after hacker posts potentially genuine database online - here's what you need to know
techradar.com·1d
🔓Hacking
Distilling Normalizing Flows
arxiv.org·1d
📥Feed Aggregation
Single Core Hundred Thousand Concurrency(1750947668443300)
dev.to·2d·
Discuss: DEV
🌊Stream Processing
How I Built a Smarter ZIP Engine with AI: My Day 9 & 10 Journey (Pagonic Project)
dev.to·2d·
Discuss: DEV
👁️Observatory Systems
Here is a creative heading for the blog post: "The Phantom Hackers: Unmasking the Invisible Foes of
dev.to·2d·
Discuss: DEV
🛡Cybersecurity
Claude wrote me this story of a dev learning kubernetes, too accurate
reddit.com·17h·
Discuss: r/kubernetes
📦Container Security
Rethinking Oversaturation in Classifier-Free Guidance via Low Frequency
arxiv.org·1d
📊Quantization
Loading...Loading more...
AboutBlogChangelogRoadmap