🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💧 Manuscript Watermarks

Paper Analysis, Dating Methods, Provenance Research, Digital Imaging

Inside the MSHTML Exploit: A SOC Analyst’s Walkthrough of CVE-2021–40444
infosecwriteups.com·1d
🔓Hacking
[$] Libxml2's "no security embargoes" policy
lwn.net·4h
🔓Free and open source
University 3D prints replica of 500-year-old-prosthetic hand — original was made from wrought iron, replica from PLA filament
tomshardware.com·5h
🤖AI Paleography
A.I. Is Homogenizing Our Thoughts
newyorker.com·4h
🏛Digital humanities
Why document-borne malware needs to be back on the radar for organization
techradar.com·1d
🔓Hacking
Are Judeo-Christian Values the Foundation of American Democracy?
hackernoon.com·3d
📜Text Collation
Building Digital Preservation Skills Using the DPC’s Novice to Know-How (N2KH) Courses
saaers.wordpress.com·2d
🔄Archival Workflows
Music copyright, how many sucks of the sav?
aardvark.co.nz·4h
🏴‍☠️Piracy
Capturing my handwriting in a searchable digital format – the long way round
colinramsay.co.uk·1d·
Discuss: Hacker News
📲Digitization
Merging AI and underwater photography to reveal hidden ocean worlds
news.mit.edu·5h
📸TIFF Archaeology
Linguistics vs. archeology and (physical) anthropology
languagelog.ldc.upenn.edu·19h
📡Frequency Archaeology
A guide book for a time traveler
uniqueatpenn.wordpress.com·3h
🏛Digital humanities
StainPIDR: A Pathological Image Decouplingand Reconstruction Method for StainNormalization Based on Color VectorQuantization and Structure Restaining
arxiv.org·1d
📄OCR
North Korea - Cyber Threat Actor Profile
cstromblad.com·1h
🇸🇪Nordic Cryptography
Program Execution, follow-up
windowsir.blogspot.com·7h·
Discuss: www.blogger.com
⚡Performance Tools
Portable Network Graphics (PNG) Specification (Third Edition)
w3.org·23h·
Discuss: Hacker News
🕸️WebP Analysis
National Archives to restrict public access starting July 7
archives.gov·22h·
Discuss: Hacker News
🌡️Archive Physics
Explaining software and computational methods
blog.khinsen.net·19h
📝Concrete Syntax
Designing for the Eye
nubero.ch·11h·
Discuss: Hacker News
🖋Typography
The Inefficiency in Digital Forensics
cyb3rops.medium.com·2d
🚨Incident Response
Loading...Loading more...
AboutBlogChangelogRoadmap