🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ’Ώ Floppy Forensics

Disk Archaeology, Media Recovery, Format Analysis, Storage Investigation

iPRES Digital Preservation Bake Off 2025 - Amuse Bouche Challenge: Tiny Tools, Tasty Wins
ipres2025.nzΒ·2d
πŸ”„Archival Workflows
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·7h
🦠Malware Analysis
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.comΒ·2d
πŸ”“Password Cracking
How PC makers exploited BIOS copyright strings to unlock trial software during the Windows 95 era
techspot.comΒ·38m
πŸ”’Hardware Attestation
Beyond Theory – Interview with Jill Delaney by Juan Alonso
ica.orgΒ·4h
πŸ›οΈPREMIS
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comΒ·22h
πŸ”—Data Provenance
5 huge stumbling blocks to legacy mainframe EOL
techradar.comΒ·12h
πŸ›οΈMainframe Archaeology
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.orgΒ·1d
πŸ”’Bitwise Algorithms
LSFMM+BPF 2025 reporting complete
lwn.netΒ·6h
πŸ“¦METS Standards
HackRF Pro Pre-Order: Frequency Range and RF Performance Improvements, USB-C, TCXO Added
rtl-sdr.comΒ·17h
πŸ“žWebRTC
Single-function Devices in the World of the Everything Machine
chrbutler.comΒ·1dΒ·
Discuss: Hacker News
πŸ’Ύvintage computing
Introduction to the Fundamentals of Amazon Redshift
redshift-observatory.chΒ·11h
πŸ—ƒοΈDatabase Storage
Fixes for five Lix CVEs
lix.systemsΒ·1dΒ·
Discuss: Lobsters
❄️Nix Adoption
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.comΒ·11h
🦠Malware Analysis
The Tao of Bespoke Electronics
hackaday.comΒ·2h
πŸ’Ύvintage computing
The cryptoterrestrial hypothesis: a covert earthly explanation for UAP
researchgate.netΒ·6hΒ·
Discuss: Hacker News
🏺Kerberos Archaeology
Valuable News – 2025/06/23
vermaden.wordpress.comΒ·2d
πŸ”ŒOperating system internals
Week 25 – 2025
thisweekin4n6.comΒ·3d
🌐WARC Forensics
A computer worth 7k$ and the question if it had internet
berti92.github.ioΒ·5hΒ·
Discuss: Hacker News
πŸ”“Hacking
The Inefficiency in Digital Forensics
cyb3rops.medium.comΒ·2d
🚨Incident Response
Loading...Loading more...
AboutBlogChangelogRoadmap