🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏺 Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

Is time a “process” or “content”
hypertexthero.com·4h
🌡️Preservation Physics
IS-IS 3-Way Handshake and the Power of SHOULD
blog.ipspace.net·2d
🌐NetworkProtocols
Hacker With 'Political Agenda' Stole Data From Columbia, University Says
news.slashdot.org·18h
🔓Hacking
Beyond Downtime: Architectural Resilience on Hyperscalers
cacm.acm.org·6h
🖥️Self-hosted Infrastructure
Judge orders EverQuest emulator to halt content and put profits in escrow
massivelyop.com·1d·
Discuss: Hacker News
🏴‍☠️Piracy
Using ClickHouse Cloud for Real Time Sports Analytics
benjaminwootton.com·4h·
Discuss: Hacker News
📊Count-Min Sketch
Critical correctness bug in Lix
lix.systems·3d·
Discuss: Lobsters, Hacker News
❄️Nixpkgs
my official list of post-glitch.com hosting options
livelaugh.blog·1d·
Discuss: Hacker News
🚀Indie Hacking
goHardDrive Leaked Personal Data for Thousands of Customers
mtlynch.io·1d·
Discuss: Lobsters, Hacker News, r/selfhosted
💿WORM Storage
Understanding the World as Entropic – Part 1
entropic.mataroa.blog·6h·
Discuss: Hacker News
🔲Cellular Automata
Tested: The Best Bluetooth Speakers for the Powerful Sound Your Music Deserves
popularmechanics.com·22h
🎵Audio Streaming
Unveiling hedgehog topological defects in three dimensional glasses
phys.org·4h
🕸️Algebraic Topology
Reducing the Risk of Missing Prior Art: A Guide for IP Pros
dev.to·16h·
Discuss: DEV
🔄Archival Workflows
Servers and thin clients in every home is the future they stole from us
osnews.com·22h·
Discuss: Hacker News
🔌Operating system internals
Building an Islamic Prayer Times App with Modern Web Technologies
dev.to·2h·
Discuss: DEV
🌐Web Standards
Building Spokane Tech: Part 1
dev.to·1d·
Discuss: DEV
🌊Stream Processing
1 Year Later: Lessons Learned From the CrowdStrike Outage
darkreading.com·1d
🔓Hacking
Startup tools: very amazing complicated system but by prompting - Firebase Studio, Claude code
dev.to·6h·
Discuss: DEV
🎛️Feed Filtering
Building an XDR Integration With Splunk Attack Analyzer
blogs.cisco.com·1d
🔌Interface Evolution
We've All Been Wrong: Phishing Training Doesn't Work
darkreading.com·2d
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap