Welcome to www.programmer2programmer.net  Its all about Programming !


 Microsoft Certification
 Final Year Project Idea
 Connection Strings
 Password Recovery
 SQL Injection
 Encryption & Decryption
 LIVE Academic Project
 Project #1 - VB6, Access
  Project #2 - VB.Net, SQL
 Project #3 - ASP, Access
 Project #4 - ASP.NET, C#
 Project #5 - VB6, SQL
 Project #6 - Stegano
 Project #7 - C
 Project #8 - C++
 Project #9 - JAVA, MySQL
 Project #10- PHP, MySQL
 Project #11- JSP, Oracle
 Project #12- C# Face Exp
 Project #13- Mobile Bank
 Download MBA Project
 MBA Project Topic
 Project Viva Question
  2017 New Projects
 Project Synopsis Download
 University Question Paper and Assignment
 SMU - Question Paper
 SMU - Assignment
 SCDL - Assignment
 Interview Question Answer
 General & HR Round
 Visual Basic 6
 VB.Net & C#
 SQL Server
  Oracle and DBA

100% Tested
Ready Academic IT Projects

One stop solution for VB6, VB.Net, C#, ASP.Net, Crystal Report, Oracle, SQL Server, MySql, PHP, XML, AJAX ....
Home Personal Member Forum Source Project Tips Contact
Welcome Guest My Thread | Search | Active Topics | Members | Log In | Register

Programmer2Programmer.NET Forum >> Members >> Riya Walia

 Profile : Riya Walia


  User Name: Riya Walia   Joined: Saturday 24, Oct 2009 04:47 PM
  Forum Rank Beginer   Last Post Date: Saturday 24, Oct 2009 05:14 PM
        Number of Posts: 75
  Location India      
  Occupation: Student   Photo
  Gender: Female  
  Home Page  
Last 5 Post by Riya Walia
Topic:Hi.. please share, like, post comment at [UR]https://www.facebook.com/programmer2programmer/[/UR] [:)][:)][:)][:)]
Tuesday 23,August 2016 06:02

Topic:Denial of Service Attacks in Wireless Networks ================================================== [B]Abstract[/B] : The shared nature of the medium in wireless n etworks makes it easy for an adversary to launch a Wireless Den ial of Service (WDoS) attack. Recent studies, demonstrate that such attacks can be very easily accomplished using off-the shel f equipment. To give a simple example, a malicious node can con tinually transmit a radio signal in order to block any legitima te access to the medium and/or interfere with reception. This a ct is called jamming and the malicious nodes are referred to as jammers. Jamming techniques vary from simple ones based on the continual transmission of interference signals, to more sophis ticated attacks that aim at exploiting vulnerabilities of the p articular protocol used. In this survey, we present a detailed up-to-date discussion on the jamming attacks recorded in the li terature. We also describe various techniques proposed for dete cting the presence of jammers. Finally, we survey numerous mech anisms which attempt to protect the network from jamming attack s. We conclude with a summary and by suggesting future directio ns. For further details of this project please email at [B]ajprofessionals@gmail.com[/B]
Monday 08,August 2016 07:13
Sir.. please upload source code and project report of this project, want to use for my MCA IGNOU fin
al year project.

Topic:i cant download this project..help me right now
Thursday 14,January 2016 06:21
Plz share db files

Topic:MBA Project Viva Questions for HR, Marketing, Finance, Operatio ns, Supply Chain, etc. ==================================== 1. What is your project title? 2. Why you select this project work? 3. Why need to do project work? 4. How project help full for your career? 5. Explain short description about your project? 6. Who will get the benefit for this title? 7. What is the object of your project work? 8. Why did you select these objectives? 9. Tell me come important points from your project? 10. Any future benefit from project work?
Thursday 17,December 2015 08:20
Please post answers

Topic:HEllo I don't see any E-claim database attached. Please provide that ASAP
Friday 27,November 2015 06:38
Plzzz upload database


(C) Atanu Maity, 2006-2017