The Complete Magazine on Open Source

Home Articles Posted by Mohit Raj

The author, who is a certified ethical hacker and EC Council Certified Security Analyst, has completed a Masters in Engineering (ME) in computer science from Thapar University, Patiala. He currently works in IBM India

Posts by Mohit Raj

,

Searching text strings from files in a given folder is easily accomplished by using Python in Windows. While Linux has the grep command, Windows …

Developers
3.04K 0
,

Today, apart from relational tables, data is also available in other forms such as images, texts, blogs, lists, etc. Redis can be used as …

Developers
3.4K 0
,

Duplicate files have their uses, but when they are duplicated multiple times or under different names and in different directories, they can be a …

For U & Me
9.76K 2
,

This article presents a file search utility created by using the power of the versatile Python programming language. Read on to discover how it …

Developers
9.68K 1
,

In a scenario where we are using freely available public wireless networks all the time, security considerations are vital. Wireless attacks can be launched …

Admin
1.22K 0
,

This article, which is an introduction to NoSQL databases, takes the reader through structured query languages and then on to MongoDB. It touches upon …

,

Wireless sniffing involves the capture of all the packets that pass through a given wireless network interface. Sniffing is one of the most effective …

AdminHow-Tos
1.68K 0
,

This article shows how easily someone can pull off an attack on an 802.11 Wi-Fi network. The author sets up a mock attack using …

Admin
21.14K 8
,

IBM Worklight offers cross-platform portability of the application code, which is crucial during apps development. Worklight enables the development of rich HTML 5 and …