🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

The Death of Windows XP and My First Linux Netbook
thenewleafjournal.com·1d
🕸️WASM Archives
What’s the purpose of a theorem? (Hint: It’s not what you think.)
statmodeling.stat.columbia.edu·18h
⚔️Lean Theorem
Hacker plants three strains of malware in a Steam Early Access game called Chemia — security company found crypto-jacking infostealers and a backdoor to install...
tomshardware.com·1d
🚀Indie Hacking
Internet Archive Designated as a Federal Depository Library
yro.slashdot.org·1d
🌐Web Archiving
What If the Government Believes in U.F.O.s More Than You Do?
nytimes.com·1d·
Discuss: Hacker News
⏰Time Crystals
Exploring the Governance of Bitcoin Core (2024)
infuy.com·4d·
Discuss: Hacker News
🧬Bitstream Evolution
Analyzing Sharepoint Exploits (CVE-2025-53770, CVE-2025-53771), (Wed, Jul 23rd)
isc.sans.edu·3d
🌐WASI
Software Sprawl, the Golden Path, and Scaling Teams with Agency
charity.wtf·2d·
Discuss: Hacker News
🦋Format Evolution
Ozzy Osbourne Wasn’t Just a Music God—His Legendary DNA Helped Science Evolve
popularmechanics.com·1d
📡DNS Archaeology
The EFF is 35, but the battle to defend internet freedom is far from over
theregister.com·2d·
Discuss: Hacker News
🚀Indie Hacking
Cloudflare AI as well as upload VTT files now not working across all domains?
blog.cloudflare.com·18h·
Discuss: Hacker News
🌊Stream Processing
HypoChainer: A Collaborative System Combining LLMs and Knowledge Graphs for Hypothesis-Driven Scientific Discovery
arxiv.org·3d
🕸️Knowledge Graphs
Algolia MCP enriches your Data through Claude Natural Language!🚀🍀🥇
dev.to·2d·
Discuss: DEV
🌀Brotli Internals
'Fire Ant' Cyber Spies Compromise Siloed VMware Systems
darkreading.com·1d
🔓Hacking
Cisco confirms active exploitation of ISE and ISE-PIC flaws
securityaffairs.com·4d
🛣️BGP Hijacking
The Commonest Domain Features: Constructing Look-Up Tables for Use as Part of a Domain Risk Scoring System
circleid.com·2d
🕵️Domain Enumeration
🤖 When ChatGPT Pretends to Be Grok… And Knows Too Much 😅
dev.to·1d·
Discuss: DEV
🚀Indie Hacking
ACID Operation in Backend Engineering: Building Data Integrity Like a Pro
dev.to·2d·
Discuss: DEV
🧬PostgreSQL Forensics
HA OTel in Kubernetes - practical demo
reddit.com·1d·
Discuss: r/kubernetes
📦Container Security
🚀 Just discovered this evening productivity hack:
dev.to·9h·
Discuss: DEV
⛏️File Carving
Loading...Loading more...
AboutBlogChangelogRoadmap