๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
โ„ nix
Commonly Abused Administrative Utilities: A Hidden Risk to Enterprise Security
blackhillsinfosec.comยท1d
๐Ÿ”“LDAP Injection
One Tech Tip: Ditch the chatbots and take your AI nature apps on a birdwatching hike
the-independent.comยท16h
๐Ÿ”—Binary Similarity
FB19914338
furbo.orgยท2dยท
Discuss: Hacker News
๐ŸงฌBitstream Evolution
My Own WTF, or How to Not Handle URL Redirects
deanebarker.netยท1dยท
Discuss: Hacker News
๐ŸŒDNS Security
Can We Build Trustable Hardware? (2019)
bunniestudios.comยท12hยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
Arbitraging Down LLM Inference to the Cost of Electricity
inference.netยท5hยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
A New Screen Upgrade for the GBA
hackaday.comยท1d
๐ŸŽฎGameboy Emulation
From Stoplights to On-Ramps: A Comprehensive Set of Crash Rate Benchmarks for Freeway and Surface Street ADS Evaluation
arxiv.orgยท20h
โœจAlgebraic Effects
Regarding formatting issues with AI-generated copy
dev.toยท1dยท
Discuss: DEV
โœ…Format Verification
STARec: An Efficient Agent Framework for Recommender Systems via Autonomous Deliberate Reasoning
arxiv.orgยท1d
๐Ÿค–AI Curation
Anthropic Changes Training Data Policy from Opt-In to Opt-Out
anthropic.comยท8hยท
Discuss: Hacker News
๐Ÿ”คEBCDIC Privacy
Counterfactual Reward Model Training for Bias Mitigation in Multimodal Reinforcement Learning
arxiv.orgยท20h
๐Ÿง Machine Learning
China linked UNC6384 targeted diplomats by hijacking web traffic
securityaffairs.comยท1d
๐Ÿ›กCybersecurity
For all you rack mounted NUC feins
reddit.comยท19hยท
Discuss: r/homelab
โš™๏ธDIY Electronics
Optimize Go Performance: Value vs. Pointer Types for Fewer Memory Allocations
dev.toยท1dยท
Discuss: DEV
๐Ÿง Memory Allocators
The Ultimate Guide to Buying Old Yahoo accounts
dev.toยท11hยท
Discuss: DEV
๐Ÿ”BitFunnel
Abhinav Sarkar: A Fast Bytecode VM for Arithmetic: The Compiler
abhinavsarkar.netยท5d
๐Ÿ”—Functional Compilers
5 Tokens to Invest In as the Fed Ends Program That Increased Bank Scrutiny of Crypto
hackernoon.comยท1d
๐Ÿ”—Hash Chains
Research, Review, Rebuild: Intelligent Modernisation with MCP and Strategic Prompting
martinfowler.comยท1d
๐Ÿฆ‹Format Metamorphosis
GhostBSD 25.02 adds 'Gershwin' desktop for a Mac-like twist
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Loading...Loading more...
AboutBlogChangelogRoadmap