🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ RISC-V Security

Hardware Extensions, PMP, Secure Enclaves, Open Security

This Mac App Lets You Create As Many Virtual Desktops As You Want
lifehacker.com·1h
🖥️Vintage Macintosh
Donkey Kong Country 2 and Open Bus
jsgroth.dev·2d
🎮GameBoy Architecture
Shane Kennedy - Software Engineer
shaneikennedy.xyz·3d
🦀Rust Macros
How keys are used in FileVault and encryption
eclecticlight.co·2d·
Discuss: Lobsters, Hacker News
💣Compression Security
Malicious Python Package Typosquats Popular passlib Library, Shuts Down Windows Systems
socket.dev·3d·
Discuss: Hacker News
🎯NTLM Attacks
PDP-11 Replica: The PiDP-11
obsolescence.dev·2d·
Discuss: Hacker News
💾vintage computing
Rust Forge Conf 2025 Schedule Announced
newsletter.rustforgeconf.com·8h
🦀Rust Macros
In which I write a library-quality B+ tree with the genies
tidyfirst.substack.com·2d·
Discuss: Substack
🦀Rust Macros
Raspberry Pi Compute Module 5: Revolutionary Advancements in Embedded Computing
dev.to·2d·
Discuss: DEV
🖥️Modern Terminals
What We’ve Learned from 5 Months of Hackbot Activity
hackerone.com·1d
🔓Hacking
Cybercriminals are abusing LLMs to help them with hacking activities
techradar.com·4h
🔓Hacking
Quantum computing: secure in the long term thanks to QKD
heise.de·2d
🔐Quantum Security
Minimal Firewall – New Windows Firewall Front End
github.com·2d·
Discuss: Hacker News
🛡️eBPF Security
Ubuntu Fundamentals: rolling release
dev.to·1d·
Discuss: DEV
📦Package Managers
Here is a creative heading for the blog post: "The Phantom Hackers: Unmasking the Invisible Foes of
dev.to·1d·
Discuss: DEV
🛡Cybersecurity
Global Reach — The New Scale of Chinese Cyberthreats
paloaltonetworks.com·1d
🎯Threat Hunting
Cache Breakdown Prevention with Go’s singleflight
dev.to·2h·
Discuss: DEV
🔄Sync Engine
Hackaday Podcast Episode 326: A DIY Pockel Cell, Funny Materials to 3D Print With, and Pwning a Nissan Leaf
hackaday.com·4h
⚙️Cassette Mechanics
AI Security Posture Management (AISPM): How to Handle AI Agent Security
hackernoon.com·2d
🎯Threat Hunting
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.to·1d·
Discuss: DEV
🔗Data Provenance
Loading...Loading more...
AboutBlogChangelogRoadmap