Explore the type of personal data that can be leaked or revealed by the modern web browsers with just a single visit to a website. Also find out how individual anonymized data are pieced together, to form a unique fingerprint of the user that can be tracked even across browsers.
Author: Karthikeyan KC
Explore how Sun powers itself and find out how solar flare works. Also, find out the difference between a solar flare and a Coronal Mass Ejection event.
A cold boot attack is quite an interesting method of data extraction where one exploits a basic vulnerability of the computer’s RAM to sniff out any useful temporary information (encryption keys) stored in it —...
Digitally remastering a film is a painstaking art of reviving the old films to accommodate the application of modern enhancements for digital preservation. In this edition, we explore remastering and the fundamental process involved in restoring a film.