๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ LDAP Injection

Directory Services, Authentication Bypass, Injection Attacks, Enterprise Security

Safeguarded AI Meeting
golem.ph.utexas.eduยท4d
๐ŸŽฏThreat Hunting
To monitor my backups, I had to first invent the universe
blog.tjll.netยท3d
๐Ÿ“ŠHomelab Monitoring
Dyna โ€“ Logic Programming for Machine Learning
dyna.orgยท1dยท
Discuss: Lobsters, Hacker News, r/compsci
๐Ÿ”—Constraint Handling
Why Zapier Won My Time Back from N8n
brianchristner.ioยท4dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Recovery APP for wrongly formatted HDD.
forums.anandtech.comยท12h
๐Ÿ’พDisk Utilities
Managing Risks from Large Digital Loads Using Coordinated Grid-Forming Storage Network
arxiv.orgยท14h
๐Ÿ Homelab Clusters
A Dynamically Weighted ADMM Framework for Byzantine Resilience
arxiv.orgยท14h
๐ŸคConsensus Algorithms
Designing for Engaging Communication Between Parents and Young Adult Children Through Shared Music Experiences
arxiv.orgยท14h
๐ŸŽตMusic Universality
Codeberg beset by AI bots that now bypass Anubis tarpit
theregister.comยท2d
๐Ÿš€Indie Hacking
WSL2 Vulnerability Could Lead To Elevating Local Privileges
phoronix.comยท5d
๐Ÿ‘‘RISC-V Privilege
Boosting Mixed-Initiative Co-Creativity in Game Design: A Tutorial
arxiv.orgยท14h
๐Ÿ”ฒCellular Automata
Autonomous Microgravity Bone Density Augmentation via Bio-Acoustic Resonance Stimulation
dev.toยท20hยท
Discuss: DEV
๐ŸงฒMagnetic Recording
Fine-Grained VLM Fine-tuning via Latent Hierarchical Adapter Learning
arxiv.orgยท14h
๐Ÿ’ปLocal LLMs
How Causal Abstraction Underpins Computational Explanation
arxiv.orgยท14h
โœจEffect Handlers
Ebyte ECB31-PB โ€“ A Raspberry Pi Model A-sized industrial SBC with Allwinner T113-S3 or T113-S4 SoC
cnx-software.comยท1h
๐Ÿ”ŒSingle Board PC
Adaptive Fault-Tolerant Antenna Array Synthesis via Bayesian Optimization and Reinforcement Learning
dev.toยท3dยท
Discuss: DEV
๐Ÿ›ก๏ธError Boundaries
Yeah I'm Vibe Coding
dev.toยท1dยท
Discuss: DEV
๐ŸŽ™๏ธWhisper
Precision Anomaly Detection in Micro-Channel Electropolishing via Bayesian Neural Networks
dev.toยท16hยท
Discuss: DEV
โš™๏ธModern Assembly
Cisco named a Leader in IDC MarketScape Hybrid Firewall Vendor Assessment
blogs.cisco.comยท4d
๐Ÿ“กNetwork Monitoring
New downgrade attack can bypass FIDO auth in Microsoft Entra ID
bleepingcomputer.comยท4dยท
Discuss: Hacker News
๐ŸŽฏNTLM Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap