๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“‹ Manuscript Analysis

Digital Paleography, Historical Documents, Text Recognition, Cultural Heritage

Counting Org mode headlines
mbork.plยท1d
๐Ÿ—๏ธConstructive Logic
Introducing the Qualys App Picker: Easier, Faster Navigation for All Your Security Applications
blog.qualys.comยท16h
๐Ÿ“ฆPackage Managers
Full size pictures in FreshRSS
thefoggiest.devยท1d
๐Ÿ“กRSS
Get Back To WARP
binary.ninjaยท3d
๐ŸงชBinary Fuzzing
The Size of Adobe Reader Installers Through The Years
sigwait.orgยท22hยท
Discuss: Hacker News
๐Ÿ“„PDF Internals
For the Singularity to Truly Arrive, Weโ€™d Need a Machine That Eats the Sun
popularmechanics.comยท18h
๐Ÿ”ฒCellular Automata
Safeguarding VS Code against prompt injections
github.blogยท15hยท
Discuss: Hacker News
๐ŸŒWASI
'From outgroup hate to ingroup love': How political crises cause a shift in viral online content
phys.orgยท12h
๐ŸŽฏRecommendation Metrics
Kramer Intelligence Offers AI Services to U.S. Government for $1 per Agency
medium.comยท16hยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
Invention as Exploration
symmetrybroken.comยท2dยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
The Leverage Paradox in AI
indiehackers.comยท8hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
โšก From MapReduce to Spark: Why In-Memory Beats Disk I/O
dev.toยท12hยท
Discuss: DEV
๐ŸŒŠApache Kafka
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
hackaday.comยท3d
๐Ÿ”“Hacking
Why I Built an "Awesome List" for Data Analysis (And How It Can Help You)
dev.toยท5dยท
Discuss: DEV
๐ŸŒWARC Mining
Straddling Two Platforms: From Twitter to Mastodon, an Analysis of the Evolution of an Unfinished Social Media Migration
arxiv.orgยท3h
๐Ÿ“ฐRSS Archaeology
What is Backpropagation?
dev.toยท2dยท
Discuss: DEV
๐Ÿง Machine Learning
Fast-Spreading, Complex Phishing Campaign Installs RATs
darkreading.comยท15h
๐Ÿ”“Hacking
Python Scripts for Botox Data Analysis
dev.toยท2dยท
Discuss: DEV
๐Ÿฆ Malware Analysis
Tech With Tim: How to Build an Advanced AI Agent with Search (LangGraph, Python, Bright Data & More)
dev.toยท1dยท
Discuss: DEV
๐Ÿค–AI Curation
Pakistan-linked APT36 abuses Linux .desktop files to drop custom malware in new campaign
securityaffairs.comยท22h
๐Ÿ“ŸTerminal Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap