The Complete Magazine on Open Source

Home Articles Posted by Mohit Raj

Posts by : Mohit Raj

Author / 7 Posts
The author, who is a certified ethical hacker and EC Council Certified Security Analyst, has completed a Masters in Engineering (ME) in computer science from Thapar University, Patiala. He currently works in IBM India
,

Duplicate files have their uses, but when they are duplicated multiple times or under different names and in different directories, they can be a …

,

This article presents a file search utility created by using the power of the versatile Python programming language. Read on to discover how it …

,

In a scenario where we are using freely available public wireless networks all the time, security considerations are vital. Wireless attacks can be launched …

,

This article, which is an introduction to NoSQL databases, takes the reader through structured query languages and then on to MongoDB. It touches upon …

,

Wireless sniffing involves the capture of all the packets that pass through a given wireless network interface. Sniffing is one of the most effective …

,

This article shows how easily someone can pull off an attack on an 802.11 Wi-Fi network. The author sets up a mock attack using …

,

IBM Worklight offers cross-platform portability of the application code, which is crucial during apps development. Worklight enables the development of rich HTML 5 and …