Dictionary attack

This is a tutorial about how to perform a dummy dictionary attack and how web-masters can prevent a dictionary attack. Wikipedia defines Dictionary attack as, In cryptanalysis and computer security, a dictionary attack is a …

Finally….

This is one of the question you find being asked when browse for around 10-15 minutes. “Your message has not been sent. Discard your message?” from Gmail. “Are you sure you want to navigate from …

Google Maps

I have been using Google Maps for a long time (a nice way to kill time) and now I am using the Google Map API to create my own site (not a nice way to …

SSH Client…

I guess every GNU/Linux user must have sshed from one comp to another sometime or the other. We have different servers for various purposes in our college and ssh is a common thing. Most of …

LDTP Editor

Want to use LDTP to test your application? Or do you want to automate the actions you do often? Or are you a GNU/Linux user who want to show “magic” to your friends by recording …

Gedit Plugin

In this article, we’ll see how to write plugins for Gedit. Since plugin development is easy in Python, I’m planning to explain this using Python. When the first caveman programmer chiseled the first program on …

External Tools

  Often you would like to have a feature in gedit like, Compile when F7 is pressed, Compile and Run when F8 is pressed and more and more. One simple (grrr…) solution for this is …

Gedit

Every GNU/Linux user must be knowing about Gedit. This tiny text editor which comes with gnome is much more powerful than we all think. A few customizations and adding a few plugins will convert this …

Slice…

Slice notation is one of the powerful feature in python using which can be used for operations like substr, str_reverse etc etc. The slice notation is really powerful for strings. I’m not very sure whether …