🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos History

Authentication Evolution, MIT Athena, Domain Architecture, Ticket Forensics

Rare Space Dust Reveals a Shocking Link Between Very Different Asteroids
scitechdaily.com·4h
🦴Database Paleontology
The moon's dirty past
phys.org·18h
🦴Database Paleontology
Updated Nested ESXi 8.x & 9.0 Virtual Appliance
williamlam.com·1d
🕸️WASM Archives
Digital Forensics Round-Up, August 20 2025
forensicfocus.com·5d
📟Terminal Forensics
Looking back at my transition from Windows to Linux in an anti-customer age
scottrlarson.com·1d·
Discuss: Hacker News
🔌Operating system internals
Google wants Android app developers to verify their identity, this could affect sideloading apps
ghacks.net·2h
📜Proof Carrying Code
Builder Pattern in CDK
medium.com·12h·
Discuss: Hacker News
🧱Immutable Infrastructure
Electronics manufacturer Data I/O took offline operational systems following a ransomware attack
securityaffairs.com·1d
🛡Cybersecurity
“Day 10: Defending the Digital Gateway — A White Hat’s Exploration of Chrome’s Security…
infosecwriteups.com·1d
🔓Hacking
How Hackers Trick AI: The Hidden World of Prompt Injections and Jailbreaks
dev.to·1d·
Discuss: DEV
🔓Hacking
A Feminist Account of Intersectional Algorithmic Fairness
arxiv.org·4h
🌍Cultural Algorithms
A Defect Classification Framework for AI-Based Software Systems (AI-ODC)
arxiv.org·4h
👁️System Observability
Safe Is What We Call Things Later: Some Software Engineering Folklore
worksonmymachine.ai·1d·
Discuss: Hacker News
⚙️Proof Engineering
Analysis of Harpy's Constrained Trotting and Jumping Maneuver
arxiv.org·4h
🌀Differential Geometry
How to Benchmark Classical Machine Learning Workloads on Google Cloud
towardsdatascience.com·11h
⚡Performance Mythology
The Human-in-the-Loop Factor: Partnering With Amazon Q During a Production Incident
dev.to·2d·
Discuss: DEV
🛡️Error Boundaries
Improving Performance, Robustness, and Fairness of Radiographic AI Models with Finely-Controllable Synthetic Data
arxiv.org·4h
🏺Computational Archaeology
Mirai-based botnet campaign "Gayfemboy" also active in Germany
heise.de·19h
🚀Indie Hacking
Private Family Cloud with Multil Location High Availability Using Talos and Tailscale
reddit.com·1d·
Discuss: r/kubernetes
💿Proxmox HA
Pakistan-linked APT36 abuses Linux .desktop files to drop custom malware in new campaign
securityaffairs.com·23h
📟Terminal Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap