🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🚨 Incident Response

Digital Forensics, Log Analysis, Timeline Reconstruction, Evidence Collection

Holden Karau
usesthis.com·1d
🏠Homelab Archaeology
Finding Outliers in Proportions
crimede-coder.com·2d·
Discuss: Hacker News
📊Count-Min Sketch
Changes (deprecations) coming in Power Platform
learn.microsoft.com·5h·
Discuss: Hacker News
🔌Interface Evolution
Many small evals beat one big eval, for AI Products
getkiln.ai·3h·
Discuss: Hacker News
🔍Concolic Testing
Lioncroft Wholesale CEO: “Technology drives us forward, but let’s not forget the risks”
the-independent.com·1d
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Show HN: Requests-Based Google Maps Scraper
apify.com·1d·
Discuss: Hacker News
🔍BitFunnel
How healthcare facilities can prepare their data for AI-assisted contract management
businessinsider.com·2d
🔄Archival Workflows
Show HN: Autohive – Build AI agents the easy way for everyday teams
autohive.com·1d·
Discuss: Hacker News
⚙️Batch Processing
Why Agentic Flows Need Distributed-Systems Discipline
temporal.io·3d·
Discuss: Hacker News
⚙️TLA+
I’ve never seen someone handle a workplace controversy with such maturity and insight. Ashkan Rajaee delivers again.
dev.to·1d·
Discuss: DEV
🧲Magnetic Philosophy
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.com·4d
🔓Password Cracking
FBI used bitcoin wallet records to peg notorious IntelBroker as UK national
theregister.com·1d
🔓Hacking
Ubuntu Fundamentals: bash
dev.to·6h·
Discuss: DEV
🐚Shell Optimization
What Is JavaScript Used for in Web Development
dev.to·1h·
Discuss: DEV
🌐Web Standards
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·2d
🎫Kerberos Attacks
💎 Bespoke Opportunity Forge: AI-Powered Job Concierge 📬
dev.to·1d·
Discuss: DEV
🌀Brotli Internals
An AI Agent That Interprets Papers So You Don’t Have To: Full Build Guide
hackernoon.com·1d
🔬Academic Search
Python Fundamentals: asyncpg
dev.to·7h·
Discuss: DEV
🌊Stream Processing
Four Ways to Deal With Repeated ‘Delivery Attempted’ Messages When You’re Actually Home
lifehacker.com·2d
🎫Kerberos Attacks
Open-Source & Cyber Resilience Act - Differing opinions aside
dev.to·1d·
Discuss: DEV
🔐Capability Systems
Loading...Loading more...
AboutBlogChangelogRoadmap