๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ—œ๏ธ ZIP Forensics

Archive Investigation, Metadata Recovery, Compression Analysis, Format Validation

Sneaky swirls: 'Hidden' vortices could influence how soil and snow move
phys.orgยท3h
๐ŸบComputational Archaeology
CLI Tools That Support Previews, Dry Runs or Non-Destructive Actions
nickjanetakis.comยท12h
๐Ÿ›ก๏ธCLI Security
Episode 163 - Ever Heard of the PDP-11?
adventofcomputing.libsyn.comยท1d
๐Ÿ’พvintage computing
A.I. Is Coming for Culture
newyorker.comยท1d
๐ŸŽฏContent Recommendation
Blast from the past: Facit A2400 terminal
jpmens.netยท14h
๐Ÿ’พvintage computing
Research Worth Reading Week 32/2025
pentesterlab.comยท1d
๐Ÿ”“Hacking
Enigma Crypto Transmission on Saturday August 30, 2025 @ 2000 GMT
radiomarine.orgยท6hยท
Discuss: Hacker News
๐Ÿ”Polish Cryptanalysis
NotebookLM's Video Overviews are now available in 80 languages
blog.googleยท20hยท
Discuss: Hacker News
๐ŸŽฌVideo Codecs
Winetricks/winetricks
github.comยท10h
๐Ÿ”„Sync Engine
Convenient 'Copy as cURL': explicit, executable, editable request replays
huonw.github.ioยท12hยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
Explaining Fully Homomorphic Encryption to My Mom
olshansky.medium.comยท8hยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
The history of digital ethics
arxiv.orgยท8h
โš–๏ธArchive Ethics
7 Steps to Mastering No Code Automation with n8n for Data Professionals
kdnuggets.comยท23h
๐ŸŒŠStream Processing
Claude Code Gets a Second Opinion from GPT-5
proxymock.ioยท21hยท
Discuss: Hacker News
โšกProof Automation
AWS, Cloudflare, Digital Ocean, and Google helped Feds investigate alleged Rapper Bot DDoS perp
theregister.comยท1d
๐Ÿ”“Hacking
Accelerating Historical K-Core Search in Temporal Graphs
arxiv.orgยท8h
๐Ÿ•ธ๏ธNeo4j
MMCIG: Multimodal Cover Image Generation for Text-only Documents and Its Dataset Construction via Pseudo-labeling
arxiv.orgยท8h
๐Ÿ‘๏ธOCR Verification
Evaluation and LLM-Guided Learning of ICD Coding Rationales
arxiv.orgยท8h
๐Ÿ”—Constraint Handling
ZAPS: A Zero-Knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy
arxiv.orgยท8h
๐ŸŒณArchive Merkle Trees
First Place Solution to the MLCAS 2025 GWFSS Challenge: The Devil is in the Detail and Minority
arxiv.orgยท8h
๐ŸงฎKolmogorov Complexity
Loading...Loading more...
AboutBlogChangelogRoadmap