More from Geekswipe Network - Swyde

Photo of the 'tracking protection' text from Firefox's private browsing window.

What Type of Information Is Leaked by Your Browser?

Explore the type of personal data that can be leaked or revealed by the modern web browsers with just a single visit to a website. Also find out how individual anonymized data are pieced together, to form a unique fingerprint of the user that can be tracked even across browsers.

Hypothetical rendition of intense solar flare activity

How Solar Flares Work?

Explore how Sun powers itself and find out how solar flare works. Also, find out the difference between a solar flare and a Coronal Mass Ejection event.

An SDRAM DDR3 chip being cold booted for a cold boot attack.

How Cold Boot Attack Works?

A cold boot attack is quite an interesting method of data extraction where one exploits a basic vulnerability of the computer’s RAM to sniff out any useful temporary information (encryption keys) stored in it —...

An artistic representation of a holographic image

How Holograms Work?

Holograms are one of the counter-intuitive concepts in physics to explain. In this edition, we shall explore what holograms are, the process behind capturing those spectacular parallax images and understand the underlying simplicity of holography....