๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ฟ Floppy Forensics
Disk Archaeology, Media Recovery, Format Analysis, Storage Investigation
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Google Cache Is Gone, I Like This Way Better: How to View Archived Websites
pcmag.com
ยท
1d
ยท
Discuss:
Hacker News
๐
Web Archiving
Networking for Systems Administrators
mwl.io
ยท
1d
ยท
Discuss:
Hacker News
๐
DNS over QUIC
Today it's cheating, tomorrow it's fair. Cluely for B2B mystery shopping
hovrai.com
ยท
3d
ยท
Discuss:
Hacker News
๐งฌ
PostgreSQL Forensics
Inspecting Service Traffic with mirrord dump
metalbear.co
ยท
1d
ยท
Discuss:
Lobsters
,
Hacker News
๐
eBPF
First NetHack ascension, and insights into the AI capabilities it requires
mikaelhenaff.substack.com
ยท
8h
ยท
Discuss:
Substack
๐ฒ
Cellular Automata
Show HN: Logcat.ai โ AI-powered observability for Operating Systems | Free Beta
logcat.ai
ยท
1d
ยท
Discuss:
Hacker News
๐
eBPF
Flame Graph Performance Truth Analysis๏ผ1750918443851900๏ผ
dev.to
ยท
8h
ยท
Discuss:
DEV
โก
Performance Tools
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.org
ยท
11h
๐
Manuscript Tokenization
C++ Seeding Surprises (2015)
pcg-random.org
ยท
22h
ยท
Discuss:
Hacker News
๐ข
Bitwise Algorithms
How to (Almost) solve cybersecurity once and for all
adaptive.live
ยท
1d
ยท
Discuss:
Hacker News
๐
Systems Hardening
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.to
ยท
1d
ยท
Discuss:
DEV
๐ง
Machine Learning
Memory Safety in Web Rust System Zero Cost Secure๏ผ1750885516953300๏ผ
dev.to
ยท
18h
ยท
Discuss:
DEV
๐ฆ
Rust Borrowing
new2
dev.to
ยท
12h
ยท
Discuss:
DEV
๐ง
Query Planners
Learning High-Quality Latent Representations for Anomaly Detection and Signal Integrity Enhancement in High-Speed Signals
arxiv.org
ยท
2d
๐ง
Machine Learning
Show HN: Anagnorisis, local data-management with trainable recommendation engine
github.com
ยท
16h
ยท
Discuss:
Hacker News
๐ค
Archive Automation
When "Yes" Means Nothing: An LLMs Failure to Isolate a Localization Bug
blog.kortlepel.com
ยท
2d
ยท
Discuss:
Hacker News
๐
Fuzzing
Efficient Malware Detection with Optimized Learning on High-Dimensional Features
arxiv.org
ยท
2d
๐ฆ
Malware Analysis
Implementing Post Quantum algorithms in PKCS #11 - DevConf.CZ 2025
youtube.com
ยท
6h
๐
Quantum Security
Show HN: What it took to make QKD work in RAM
qsymbolic.com
ยท
1h
ยท
Discuss:
Hacker News
๐
Quantum Security
Day 5/100: Working with Strings โ Basics to Formatting
dev.to
ยท
9h
ยท
Discuss:
DEV
๐
Concrete Syntax
Loading...
Loading more...
« Page 5
โข
Page 7 »