๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿบ Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

These rocks are probably the last remains of Earth's early crust
newscientist.comยท20h
๐Ÿ—๏ธPaleocryptography
FOSS Weekly #25.26: Torvalds-Gates Showdown, Hyprland Premium, Fedora's 32-bit Debacle, Xfce Themes and More Linux Stuff
itsfoss.comยท1d
๐ŸงFOSS
Cosplaying as a Telco: VCF Southwest 2025
michaelwashere.netยท1d
๐Ÿ’พvintage computing
New DDoS Attack Record โ€“ The MSP Cyber News Snapshot โ€“ June 26th
heimdalsecurity.comยท23h
๐Ÿ”“Hacking
I Tried Out Claude AI's New App Creator, and I Didn't Have to Use Any Coding
lifehacker.comยท2h
๐Ÿš€Indie Hacking
SigNoz (YC W21, Open Source Datadog) Is Hiring DevRel Engineers (Remote)(US)
ycombinator.comยท20hยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
A CRDT-based Messenger in 12 Lines of Bash Using a Synced Folder
holdtherobot.comยท1dยท
Discuss: Lobsters, Hacker News, Hacker News
๐Ÿ”€CRDT
Amazon Bedrock Agents observability using Arize AI
aws.amazon.comยท2d
๐Ÿค–Network Automation
Cosmoe: New C++ toolkit for building native Wayland apps
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Fighting logs with Log Detective - DevConf.CZ 2025
youtube.comยท1d
๐Ÿ“Log Parsing
Unla: Instantly turn APIs n MCP servers into MCP servers,no code changes needed
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
AI Agent Architecture and the Autonomous Enterprise
dev.toยท4hยท
Discuss: DEV
โš™๏ธTLA+
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols๏ผˆ1750952117902400๏ผ‰
dev.toยท23hยท
Discuss: DEV
๐ŸŒNetwork Protocols
Probing AI Safety with Source Code
arxiv.orgยท1d
โœจEffect Handlers
Day 9 - Kicking Off Sprint 1 โ€“ Authentication, Workspaces, and Case Management
dev.toยท3dยท
Discuss: DEV
๐Ÿ”—Data Provenance
U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท1d
๐Ÿ”“Hacking
61 million US Verizon customers could be at risk after hacker posts potentially genuine database online - here's what you need to know
techradar.comยท1h
๐Ÿ”“Hacking
HarmonyOS Terms โ€“ Developer Rant Edition
dev.toยท5hยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
Connect Claude AI with Obsidian: A Game-Changer for Knowledge Management ๐Ÿš€
dev.toยท2dยท
Discuss: DEV
๐Ÿค–Archive Automation
The Googly way of Making AI Agents
dev.toยท3hยท
Discuss: DEV
โšกProof Automation
Loading...Loading more...
AboutBlogChangelogRoadmap