The Complete Magazine on Open Source

Home Articles Posted by Mohit Raj

The author, who is a certified ethical hacker and EC Council Certified Security Analyst, has completed a Masters in Engineering (ME) in computer science from Thapar University, Patiala. He currently works in IBM India

Posts by Mohit Raj

,

Duplicate files have their uses, but when they are duplicated multiple times or under different names and in different directories, they can be a …

For U & Me
7.95K 0
,

This article presents a file search utility created by using the power of the versatile Python programming language. Read on to discover how it …

Developers
7.78K 0
,

In a scenario where we are using freely available public wireless networks all the time, security considerations are vital. Wireless attacks can be launched …

Admin
657 0
,

This article, which is an introduction to NoSQL databases, takes the reader through structured query languages and then on to MongoDB. It touches upon …

,

Wireless sniffing involves the capture of all the packets that pass through a given wireless network interface. Sniffing is one of the most effective …

,

This article shows how easily someone can pull off an attack on an 802.11 Wi-Fi network. The author sets up a mock attack using …

Admin
10.8K 7
,

IBM Worklight offers cross-platform portability of the application code, which is crucial during apps development. Worklight enables the development of rich HTML 5 and …