Ever heard about browser fingerprinting? If Yes, you might be a privacy freak. If Not, do you care about your privacy in the World Wide Web? Well, if you belong to either, this article will help you to cover up or fill up what you have already interested in or known. Browser fingerprinting is one … Continue reading A Practical Guide to Minimise Browser Fingerprinting
“HealthXStream” is a privacy oriented, fully secure, health monitoring platform where patients and doctors get connected with each other to solve non-severe health problems. There are very few software applications in the world providing consumer grade doctor meetups through the mobile phone. Even from that few, “HealthXStream” being unique as it provides the real-time … Continue reading HealthXStream : A secured way to have a doctor meetup
You might have heard of a fully featured HTML WYSIWYG editor control called "TinyMCE". If you haven't, it is an HTML text area extender which adds customised text editing experience to the existing text area of the HTML page. It gives a functionality similar to the WordPad offered by Microsoft. Migration from its version 3 … Continue reading What happened to advImage plugin in TinyMCE?
Well, you might heard of a FAMOUS Nightly build called "Firefox Nightly". Or you might have not. This article suits if you do not have any idea what the Nightly version does. Let's get started. Personally, I like Firefox because, It protects user's privacy as it is open source and the community … Continue reading Why should we use Firefox Nightly?
“Cross the Game” is a multiplayer game written in Qt framework 5.5.1 with C++. It can run on Windows, Mac and Linux platforms without any issues. Most of the code base is not platform specific. The platform specific code has been nested with #if statements to make sure the program works in other … Continue reading “CrossTheGame” Inspired by C++ and Qt
“Even the best IPS technology is only marginally effective against DDoS attacks, and it is often possible for those waging the attack to consume all available bandwidth into your network. Whether the attacker swamps your server or your Internet pipe, the effect is the same: Users are unable to access resources on your network.” (Chapple, … Continue reading A DDoS Application Made By Me
"One of the problems we experienced was long latency when sending a message. The method we were using to send was reliable but slow, and there were limitations on how much we could improve it. With just a few weeks until launch, we ended up building a new mechanism that maintains a persistent connection … Continue reading Introduction to MQTT