Author: Karthikeyan KC

Photo of the 'tracking protection' text from Firefox's private browsing window.

What Type of Information Is Leaked by Your Browser?

Explore the type of personal data that can be leaked or revealed by the modern web browsers with just a single visit to a website. Also find out how individual anonymized data are pieced together, to form a unique fingerprint of the user that can be tracked even across browsers.

Hypothetical rendition of intense solar flare activity

How Solar Flares Work?

Explore how Sun powers itself and find out how solar flare works. Also, find out the difference between a solar flare and a Coronal Mass Ejection event.

An SDRAM DDR3 chip being cold booted for a cold boot attack.

How Cold Boot Attack Works?

A cold boot attack is quite an interesting method of data extraction where one exploits a basic vulnerability of the computer’s RAM to sniff out any useful temporary information (encryption keys) stored in it —...

Star wars digital remastering comparison.

How Digital Remastering of a Film Works?

Digitally remastering a film is a painstaking art of reviving the old films to accommodate the application of modern enhancements for digital preservation. In this edition, we explore remastering and the fundamental process involved in restoring a film.