๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“‹ records management
Watch Joan Baez Endearingly Imitate Bob Dylan (1972)
openculture.comยท2h
๐Ÿ•ฏ๏ธWax Cylinders
Joomla Security Testing Guide 2025 : Recon and Exploitation
hackertarget.comยท5h
๐Ÿ›ก๏ธSecurity Headers
Knowledge and Common Knowledge in a Distributed Environment, Part 1
emptysqua.reยท1d
๐Ÿ”ฒCellular Automata
Show HN: Evaluating LLMs on creative writing via reader usage, not benchmarks
narrator.shยท17hยท
Discuss: Hacker News
๐ŸŽฏContent Recommendation
Can't open bank account due to silly address mismatch
news.ycombinator.comยท18hยท
Discuss: Hacker News
โš™Backus-Naur Form
Priscilla Presley spent years fighting her former business partners over money. Then they dropped a medical bombshell
the-independent.comยท13h
๐ŸบKerberos Archaeology
Supreme Court allows enforcement of Mississippi social media age verification law
the-independent.comยท16h
โš–๏ธLegal Compliance
Microsoft launches Windows 365 Reserve: Cloud PCs for emergencies
heise.deยท1d
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Not So Direct I/O
jmcph4.devยท3dยท
Discuss: Lobsters, Hacker News
๐Ÿ’ฟZFS Internals
Show HN: An open-source,security first,local-first memory tool for AI assistants
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐ŸŒWASI
Fragmented security: the hidden threat undermining your cyber defenses
techradar.comยท1d
๐Ÿ”“Hacking
Show HN: CCCP โ€“ a programmable, context-aware compression protocol (early stage)
news.ycombinator.comยท16hยท
Discuss: Hacker News
๐ŸŒŠStreaming Compression
Why I Built DNSRedo.com and How It Solves the Domain Management Mess
dev.toยท1dยท
Discuss: DEV
๐Ÿ“กDNS Archaeology
Build a Real-World IROPS Re-accommodation Workflow with KaibanJS
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStreaming Systems
Why some companies are making it extra difficult to delete your data
mercurynews.comยท1d
๐Ÿ”คEBCDIC Privacy
A Robust Pipeline for Differentially Private Federated Learning on Imbalanced Clinical Data using SMOTETomek and FedProx
arxiv.orgยท7h
๐ŸคSecure Multiparty
Darknet offer: Tens of thousands of ID scans stolen from Italian hotels
heise.deยท1d
๐ŸบKerberos Archaeology
Using Large Language Models to Measure Symptom Severity in Patients At Risk for Schizophrenia
arxiv.orgยท7h
๐ŸŽ™๏ธWhisper
The Best AI Web Scraper Tools in 2025: Top Picks, Features & Pricing
hackernoon.comยท23h
๐Ÿค–Archive Automation
The Equality Delete Problem in Apache Iceberg
blog.dataengineerthings.orgยท2dยท
Discuss: Hacker News
๐Ÿ—„๏ธPostgreSQL WAL
Loading...Loading more...
AboutBlogChangelogRoadmap