🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Hash Functions

Cryptographic Hashing, SHA Family, Collision Resistance, Digital Forensics

Ruby on Rails creator David Heinemeier Hansson says he looks for 2 key things when hiring
businessinsider.com·7m
🐚Nordic Shell
Moan-routine: LO's Predicate Signatures
lmika.org·2d
🔗Functional Compilers
Reverse Engineering the Firmware Loader for an X-Rite Spectrophotometer
adam.zeloof.xyz·2d·
Discuss: Hacker News
⚡Circuit Archaeology
Next-gen SSDs achieve 28 GByte/s and many more IOPS
heise.de·1d
🖥️Modern Terminals
SFrame-based stack unwinding for the kernel
lwn.net·2d·
Discuss: Hacker News
🔩Systems Programming
At my wits end..
i.redd.it·1d·
Discuss: r/homelab
📐Linear Algebra
Python Testing and Debugging for beginners
dev.to·1d·
Discuss: DEV
🔍Concolic Testing
Athlete or Hacker? Russian basketball player accused in U.S. ransomware case
securityaffairs.com·1d
🔓Hacking
Api Requests and Validators in Go
dev.to·21h·
Discuss: DEV
⚡gRPC
🚀 Introducing CodeWhiz: Your AI-Powered Code Commenting Sidekick for VS Code 🧠✨
dev.to·4h·
Discuss: DEV
🔗Concatenative Languages
Forget ransomware - most firms think quantum computing is the biggest security risk to come
techradar.com·1d
🔐Quantum Security
Fix the Click: Preventing the ClickFix Attack Vector
unit42.paloaltonetworks.com·3d
🎫Kerberos Exploitation
Full-Stack DIY Smart Home: ESP8266/STM32, MQTT & WebSockets
hackster.io·16h
🏠Home Automation
Playing Snake with Digital Microfluidics
hackaday.com·16h
🎮Vintage Gaming
Extract Invoice Data Automatically Using LangChain
dev.to·3h·
Discuss: DEV
📄Document Digitization
Who wants to play with my love hole?
github.com·12h·
Discuss: Hacker News
λLambda Formalization
Python Memory Optimization: Essential Techniques for Data-Intensive Applications That Actually Work
dev.to·2d·
Discuss: DEV
🔩Systems Programming
Consistent and Asymptotically Efficient Localization from Bearing-only Measurements
arxiv.org·2d
🧠Machine Learning
McDonald’s job app exposes data of 64 Million applicants
securityaffairs.com·22h
🔓Hacking
QuHE: Optimizing Utility-Cost in Quantum Key Distribution and Homomorphic Encryption Enabled Secure Edge Computing Networks
arxiv.org·4d
🔲Lattice Cryptography
Loading...Loading more...
AboutBlogChangelogRoadmap