๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Hash Functions

Cryptographic Hashing, SHA Family, Collision Resistance, Digital Forensics

[Guest post] Was Mary lost in cyberspace? A domain name decision that aims to redefine the Oki Data criteria
ipkitten.blogspot.comยท1dยท
Discuss: ipkitten.blogspot.com
๐Ÿ“กDNS Archaeology
Manually fixing apt's "Unmet dependencies" error
dustri.orgยท1d
๐Ÿ“ฆPackage Managers
Double Maths First Thing: Issue 30
aperiodical.comยท1d
๐Ÿ“Mathematical Art
I trained like Anne Hathaway for a month, and it had some unexpected benefits
the-independent.comยท6h
๐Ÿ“ŠLearned Metrics
ssheven: A minimal new SSH client for Mac OS 7/8/9
github.comยท1d
๐ŸšNordic Shell
No Backdoors. No Kill Switches. No Spyware.
blogs.nvidia.comยท1dยท
Discuss: Hacker News, r/hardware
๐Ÿ–ฅ๏ธModern Terminals
Some thoughts on journals, refereeing, and the P vs NP problem
blog.computationalcomplexity.orgยท2dยท
Discuss: blog.computationalcomplexity.org, Hacker News, Hacker News
๐ŸŽฏPerformance Proofs
Arduino Obstacle Avoiding Robot - w/ Custom Chassis
hackster.ioยท2d
๐Ÿค–Tape Automation
The Machine, the Expert, and the Common Folks
towardsdatascience.comยท20h
๐ŸงฎKolmogorov Bounds
We Accidentally Built the Fastest On-Ramp to Visuals and Why It Matters
news.ycombinator.comยท4hยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธTerminal Renaissance
Venice Film Festival hacked, attendee data leaked online
techradar.comยท4h
๐Ÿ”“Hacking
Advancing Welding Defect Detection in Maritime Operations via Adapt-WeldNet and Defect Detection Interpretability Analysis
arxiv.orgยท3d
๐Ÿ”Vector Forensics
Machine Learning Fundamentals: machine learning example
dev.toยท3dยท
Discuss: DEV
๐ŸŒŠStream Processing
AI-Powered Job Matching System with Redis 8
dev.toยท7hยท
Discuss: DEV
โšกRedis Internals
SonicWall says recent attack wave involved previously disclosed flaw, not zero-day
cybersecuritydive.comยท1h
๐Ÿ”“Hacking
Why People Still Fall for Malware?
infosecwriteups.comยท10h
๐Ÿ”“Hacking
A safer memcpy with very limited use cases
subethasoftware.comยท5d
๐ŸงชBinary Fuzzing
Do We Need Pre-Processing for Deep Learning Based Ultrasound Shear Wave Elastography?
arxiv.orgยท11h
๐ŸŒ€Riemannian Computing
LoRA-based methods on Unet for transfer learning in Subarachnoid Hematoma Segmentation
arxiv.orgยท2d
๐Ÿง Machine Learning
COFFEE: A Shadow-Resilient Real-Time Pose Estimator for Unknown Tumbling Asteroids using Sparse Neural Networks
arxiv.orgยท1d
๐ŸŒ€Differential Geometry
Loading...Loading more...
AboutBlogChangelogRoadmap