🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ eBPF Security

Kernel Programming, Runtime Monitoring, Network Filtering, Syscall Tracing

DCP-o-matic • Re: Veriying DCP on Synology NAS via CLI
dcpomatic.com·2d
🛠System administration
Type-Hinting DataFrames for Static Analysis and Runtime Validation
medium.com·1d·
Discuss: Hacker News
🧮Algebraic Datatypes
API Design 101: From Basics to Best Practices
javarevisited.substack.com·17h·
Discuss: Substack, r/programming
⚡gRPC
Wubular: Rubular Reimagined in Ruby+WASM
rubyelders.com·1d·
Discuss: Hacker News
🌀Brotli Internals
The Right to Read
gnu.org·12h·
Discuss: Hacker News
🏴‍☠️Piracy
Complete Guide to Self-Hosting Next.js at Scale
dlhck.com·1d·
Discuss: Hacker News
🔄Sync Engine
Home Assistant + Ubiquiti + AI = Home Automation Magic
troyhunt.com·11h·
Discuss: Hacker News
🏠Home Automation
sshPilot, your SSH connection editor/manager releaes new version
reddit.com·1d·
Discuss: r/linux
📟Terminals
Block unsafe prompts targeting your LLM endpoints with Firewall for AI
blog.cloudflare.com·1d
🛡️CLI Security
Explaining Fully Homomorphic Encryption to My Mom
olshansky.medium.com·1d·
Discuss: Hacker News
🔐Homomorphic Encryption
A Bitcoin Core Code Analysis
binaryigor.com·2d·
Discuss: Hacker News
🧬Bitstream Evolution
Model-based Testing Distributed Systems with P Language (2021)
mydistributed.systems·1d·
Discuss: Lobsters, Hacker News, r/programming
📞Session Types
PRISM: Robust VLM Alignment with Principled Reasoning for Integrated Safety in Multimodality
arxiv.org·15h
💻Local LLMs
How far should I go with security in my cluster?
reddit.com·6h·
Discuss: r/kubernetes
📦Container Security
MCP Gateways: Managing Multiple Servers Like a Pro
dev.to·1d·
Discuss: DEV
🕸️Mesh Networks
The Hidden Risk of Consumer Devices in the Hybrid Workforce
darkreading.com·1d
🏠Homelab Security
vLLM on x86: Because Not Everyone Can Afford a GPU Cluster
dev.to·1d·
Discuss: DEV
⚡Homebrew CPUs
Social Engineering in Security: Key Threats and Prevention- UK
dev.to·8h·
Discuss: DEV
🛡Cybersecurity
25th August – Threat Intelligence Report
research.checkpoint.com·2d
🔓Hacking
Spectrum – catching clojure.spec conform errors at compile time
github.com·2h·
Discuss: Hacker News
🔗Functional Compilers
Loading...Loading more...
AboutBlogChangelogRoadmap