๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽฏ NTLM Attacks

Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

That Gmail Delivery Status Notification Is Probably a Scam
lifehacker.comยท1d
๐Ÿ“กFeed Security
Generating C functions and prototypes using macros โ€“ part 2
subethasoftware.comยท1d
๐Ÿฆ€Rust Macros
LibreOffice Stakes Claim as Strategic Sovereignty Tool For Governments
news.slashdot.orgยท18h
๐Ÿ”“Open Source Software
It took 7 versions, but my landing page is live. Time for the final roast
v2.qranalytica.comยท23hยท
Discuss: Hacker News
๐Ÿ“ฑQR Archaeology
Why Is Everyone Buying Change Data Capture?
estuary.devยท15hยท
Discuss: Hacker News
๐ŸŒŠStream Processing
DOGE accused of copying entire Social Security database to insecure cloud system
arstechnica.comยท13hยท
Discuss: Hacker News
๐Ÿ”—Data Provenance
5 Core I/O Models Every Software Engineer Should Know
alexpham.devยท2dยท
Discuss: r/programming
๐Ÿ”ฉSystems Programming
The AI-Native OS: Rethinking the Operating System from First Principles
medium.comยท14hยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Learning Interior Point Method for AC and DC Optimal Power Flow
arxiv.orgยท6h
๐Ÿง Machine Learning
Nevada forced to close state government offices following wide-ranging 'network security incident' - here's what we know
techradar.comยท17h
๐Ÿ›กCybersecurity
When One Hospital Gets Ransomware, Others Feel the Pain
darkreading.comยท13h
๐Ÿ”“Hacking
Farmers Insurance discloses a data breach impacting 1.1M customers
securityaffairs.comยท13h
๐Ÿ›กCybersecurity
Profiling in Go: A Practical Guide to Finding Performance Bottlenecks
dev.toยท14hยท
Discuss: DEV
๐Ÿ“ŠPerformance Profiling
Troubleshooting EKS with MCP: The Good, the Bad, and the Ugly (plus the Setup)
dev.toยท23hยท
Discuss: DEV
๐Ÿ“ฆContainer Security
Universal Dynamics with Globally Controlled Analog Quantum Simulators
arxiv.orgยท6h
โš›๏ธQuantum Circuits
k-NN Classification and Model Evaluation
dev.toยท1dยท
Discuss: DEV
๐Ÿง Machine Learning
Shellshock: The Bash Bug That Shook the Internet
infosecwriteups.comยท2d
โœ…Shell Verification
WoW: A Window-to-Window Incremental Index for Range-Filtering Approximate Nearest Neighbor Search
arxiv.orgยท6h
๐Ÿ—‚๏ธVector Databases
Password manager: Browser extensions can enable data theft
heise.deยท5d
๐Ÿ”“Password Cracking
Some anecdotes from vibe-coding a Sublime Text plugin
willett.ioยท2dยท
Discuss: Hacker News
๐Ÿ”—Concatenative Languages
Loading...Loading more...
AboutBlogChangelogRoadmap