๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿง  Memory Forensics

RAM Analysis, Process Investigation, Volatile Evidence, Memory Dumps

Ways Your Collection Can Bite the Dust
andersonarchival.comยท2d
โœ…Archive Proofs
Hackers Are Targeting Your Salesforce: What You Need to Know
lmgsecurity.comยท1d
๐Ÿ”“Hacking
Masimo sues feds to stop Apple Watch pulse oximetry restoration
appleinsider.comยท1dยท
Discuss: Hacker News
๐Ÿ”ฌHardware Forensics
Trial begins for former Danish minister accused of possessing child sexual abuse material
euronews.comยท1d
๐Ÿ’ฟDAT Forensics
Festival packing list 2025: What to bring to Reading & Leeds, Creamfields and more
the-independent.comยท1d
โญAwesome lists
Report: Microsoft's latest Windows 11 24H2 update breaks SSDs/HDDs, may corrupt your data
neowin.netยท5dยท
Discuss: Hacker News, r/hardware
๐Ÿ”ŒOperating system internals
Nvidia reportedly orders suppliers to stop work on China AI chip but says new chip in the works
euronews.comยท16h
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
Everything Is Correlated
gwern.netยท14hยท
Discuss: Hacker News
๐Ÿ“กInformation theory
This chip designer you've never heard of reveals first thermodynamic silicon in a bid to reduce AI's unsustainable energy consumption
techradar.comยท1d
โšกHomebrew CPUs
This Waterproof Soundcore Speaker Is Nearly 30% Right Now
lifehacker.comยท1d
๐ŸŽตSound Archaeology
What Debugging JavaScript on WebAssembly Looks Like
thenewstack.ioยท1d
๐Ÿ•ธ๏ธWebAssembly
If Windows 12 is anything like this concept, I'd switch from Windows 11 (or 10) in a heartbeat
techradar.comยท1d
๐Ÿ”ŒOperating system internals
A shocking amount of companies are knowingly shipping insecure code - and it might be hard to recover
techradar.comยท4d
๐Ÿ“Code Metrics
AI or Obsolete: Why Developers Need AI in Their Workflow
dev.toยท1dยท
Discuss: DEV
๐Ÿ”„Language Evolution
ATOM - Line Follower Robot
hackster.ioยท1d
โš™๏ธCassette Mechanics
Avalue EMX-TWLP โ€“ A Twin Lake mini-ITX motherboard for industrial applications
cnx-software.comยท2d
๐Ÿ–ฅ๏ธModern Terminals
Fake Employees Pose Real Security Risks
darkreading.comยท1d
๐Ÿ”“Hacking
4 techniques to prevent brute force attacks
fingerprint.comยท4d
๐Ÿ”“Password Cracking
Who Sees What? Structured Thought-Action Sequences for Epistemic Reasoning in LLMs
arxiv.orgยท1d
๐Ÿ“Linear Logic
Small Commits, Big Wins: How Atomic Changes Transform Developer Life
hackernoon.comยท3d
๐Ÿ”„Reproducible Builds
Loading...Loading more...
AboutBlogChangelogRoadmap