Rijul Rajesh

Rijul Rajesh @rijultp

About: Dev | Technical Writer | Learner | Powered by ☕ and 🐧

Joined:
Nov 12, 2023

Rijul Rajesh
articles - 140 total

Meet MIC: The Digital Security Guard in Your Wi-Fi

Hello, I'm Rijul Rajesh. I’m building LiveReview, a private AI code review tool that runs on your LLM...

Learn More 5 0Aug 22

Beginner’s Guide to Wordlists and Crunch for Password Testing

If you are new to cybersecurity or penetration testing, one term you will encounter frequently is...

Learn More 15 0Aug 19

Understanding Why LLMs Respond the Way They Do with Reverse Mechanistic Localization

Imagine you’re listening to your favorite band. Suddenly, in one song, there’s a guitar solo that...

Learn More 15 0Aug 17

Airodump-ng for Beginners: Scanning and Monitoring Wi-Fi Networks

When it comes to Wi-Fi security and penetration testing, one of the most well-known tools in the...

Learn More 5 0Aug 15

The 4-Way Handshake Explained: How Wi-Fi Keeps Your Data Safe

When you connect to a Wi-Fi network that uses WPA or WPA2 security, your device and the router go...

Learn More 15 0Aug 13

WEP Encryption Explained: How It Worked and Why It Failed

Before WPA2 and WPA3 became the gold standards of WiFi security, there was WEP, short for Wired...

Learn More 10 0Aug 11

The Hidden Bug in Go: Variable Shadowing Explained

If you’ve been writing Go for a while, you might have run into a strange situation where a variable...

Learn More 10 0Aug 10

Packet Sniffing 101: How to Focus on a Specific Wi-Fi Network

Packet sniffing isn’t always about listening to everything in the air. Sometimes, you want to focus...

Learn More 10 0Aug 8

Not All Wi-Fi Is Visible: How Bands Limit What Your Adapter Detects

If you’re just stepping into the world of wireless security, understanding Wi-Fi bands is...

Learn More 5 0Aug 6

Unboxing the Black Box: Understanding AI with Reverse Mechanistic Localization

Imagine you’re listening to your favorite band. Suddenly, in one song, there’s a guitar solo that...

Learn More 10 1Aug 4

LLM Hallucinations: When AI Goes Off the Rails

Language models have become surprisingly capable at many tasks, from writing code to answering...

Learn More 10 0Aug 3

BeEF Explained: Ethical Hacking with the Browser Exploitation Framework

BeEF, short for Browser Exploitation Framework. It’s not as famous as Metasploit, but it’s a powerful...

Learn More 10 0Aug 1

Let the AI Run Code: Inside the REPL Loop

If you’ve ever tinkered in a Python shell or tested a JavaScript snippet in the browser console,...

Learn More 10 0Jul 30

CDNs Explained: Push vs Pull and How They Speed Up Your Website

Have you ever noticed how some websites load almost instantly, no matter where you are in the world?...

Learn More 6 0Jul 29

Gatekeepers in APIs and Services: How are they used

In any well-architected system, some components exist not to perform fancy tasks, but to ensure...

Learn More 8 0Jul 27

Understanding Linux File Structure: What Goes Where

If you're just starting with Linux, the file system can feel like a maze. There's no "C: drive", no...

Learn More 5 0Jul 24

Helping Designers and Developers Align: Design System vs Component Library

If you've been working with modern front-end development or UI/UX design, you've likely heard the...

Learn More 15 0Jul 22

Decoupled by Design: A Developer’s Guide to Microservices

When we talk about how modern applications are built, one term shows up over and over:...

Learn More 5 0Jul 20

DigitalOcean Explained: Droplets, Databases, and Developer Tools

If you're new to the world of cloud hosting or just getting started with deploying your projects...

Learn More 13 0Jul 16

From JSON to BSON: The Data Format MongoDB Actually Uses

If you’ve worked with MongoDB or other document-based databases, you may have come across BSON. It...

Learn More 15 0Jul 15

Understanding IPv4 and IPv6: What Every Developer Should Know

As a developer, especially if you’re working with networking, web applications, or services that...

Learn More 15 0Jul 13

Organize Your Projects Better with Symlinks (and Save Time)

You've probably heard the term "symlink" tossed around. Maybe you've seen it in dotfile repos, or...

Learn More 10 0Jul 11

Redis Teleportation: Moving Data from Prod to Local in Minutes

Working with Redis in production can be a double-edged sword. It’s fast, powerful, and stores a lot...

Learn More 10 0Jul 9

You’ve Heard of SSL/TLS—Now Actually Understand It

If you’ve ever configured HTTPS on a website, integrated a payment gateway, or dealt with API...

Learn More 11 0Jul 7

The Developer’s Superpower Isn’t Just Code — It’s the Questions They Ask

In the fast-changing world of technology, there’s one skill that’s becoming more valuable than...

Learn More 17 0Jul 5

How Redis Handles Concurrent Updates Without Traditional Locks

In the world of concurrent systems, data consistency is both a challenge and a priority. When...

Learn More 12 0Jul 4

Agentic AI: How Autonomous Agents Are Changing the Game

In recent years, the field of artificial intelligence has evolved rapidly, moving beyond simple...

Learn More 11 0Jul 3

How Redis Slow Log Helps You Debug Laggy Commands

If you're working with Redis in production, performance is everything. Redis is known for its speed,...

Learn More 12 0Jul 2

Track, Analyze, and Simplify: RedisTimeSeries for Real-Time Data

When working on applications like IoT monitoring, financial analytics, or server metrics tracking,...

Learn More 10 0Jun 29

Redis for Maps and Locations: Understanding Geospatial Indexing

If you've ever used an app to find the nearest ATM, track a delivery, or hail a ride, you're...

Learn More 11 0Jun 28