๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ LDAP Injection

Directory Services, Authentication Bypass, Injection Attacks, Enterprise Security

The Heisig method for learning sinographs
languagelog.ldc.upenn.eduยท12h
๐Ÿ‡ฏ๐Ÿ‡ตJapanese Computing
Expert reveals the danger of pink soap scum โ€“ and how to get rid of it
the-independent.comยท2h
๐Ÿ“ฆContainer Security
A parcel locker adventure, and being an edge case
rubenerd.comยท10h
๐Ÿ—ƒ๏ธPunch Card Recovery
Google admits anti-competitive conduct involving Google Search in Australia
accc.gov.auยท10hยท
Discuss: Hacker News
โš–๏ธLegal Compliance
Miss Manners: Why do young people have to ruin photos this way?
mercurynews.comยท4h
๐Ÿ“•Bookbinding
Functional Analysis of Variance for Association Studies
arxiv.orgยท8h
๐Ÿ” Type-Level Programming
Cost-Effective Active Labeling for Data-Efficient Cervical Cell Classification
arxiv.orgยท8h
๐Ÿ”คCharacter Classification
NIRMAL Pooling: An Adaptive Max Pooling Approach with Non-linear Activation for Enhanced Image Classification
arxiv.orgยท8h
๐ŸŒ€Riemannian Computing
How Tenable One Helps Canadian Orgs Set Up Exposure Management Programs and Meet Compliance Demands
tenable.comยท3d
๐Ÿ”คEBCDIC Privacy
From Feedback to Failure: Automated Android Performance Issue Reproduction
arxiv.orgยท8h
๐Ÿ‘๏ธObservatory Systems
Someone's poking the bear with infostealers targeting Russian crypto developers
theregister.comยท6h
๐Ÿš€Indie Hacking
VFM-Guided Semi-Supervised Detection Transformer for Source-Free Object Detection in Remote Sensing Images
arxiv.orgยท8h
๐Ÿ“ŠLearned Metrics
Data Breach Trends Highlight Mobile and Credential Risks
zimperium.comยท3d
๐Ÿ’ฃCompression Security
GPT-5: Breakthroughs and Applications
dev.toยท8hยท
Discuss: DEV
๐ŸŽ™๏ธWhisper
Whiteboard to cloud in minutes using Amazon Q, Amazon Bedrock Data Automation, and Model Context Protocol
aws.amazon.comยท3d
๐Ÿ Homelab Orchestration
Server Hardware-Cooling Co-Design: Proactive Thermal Management via Reinforcement Learning
dev.toยท1dยท
Discuss: DEV
๐Ÿ–ฅ๏ธHardware Architecture
Making Qwen3 Think in Korean with Reinforcement Learning
arxiv.orgยท3d
๐ŸงฎSMT Solvers
Tasklin, a Python CLI to run multiple AI models
dev.toยท1dยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Automated Knowledge Graph Validation via Multi-Modal Deep Reasoning
dev.toยท4dยท
Discuss: DEV
๐Ÿ”—Constraint Handling
The Power of Modern AI: How Deep Learning Is Transforming Industries
dev.toยท5hยท
Discuss: DEV
๐Ÿง Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap