Post

Visualizzazione dei post da ottobre, 2020

C Language and Mathematics. In this example execute a regression for equation y=a+bx.

Immagine
  C Language and Mathematics. In this example execute a regression for equation y=a+bx. Below an example. #mathematics #c #gcc #programming #unix #linux #bsd #backend #research #fullstack #businessintelligence #physics #shell #bash    

Working on Unix BSD.

Immagine
  Working on Unix BSD. #bsd #unix #linux #shell #bash #programming #backend #research #systemadministrator #database      

Ethical Hacking and Malicious jpeg. In this example, i have write text encrypted in jpeg, but it's possible inoculate command ,too.

Immagine
  Ethical Hacking and Malicious jpeg. In this example, i have write text encrypted in jpeg, but it's possible inoculate command ,too. #c #unix #linux #bsd #ethicalhacking #cybersecurity #penetrationtesting #shellcode #malware #osint #backend      

Ethical Hacking/Cyber Security. Retrieve information about probably DDOS attack. In thi example, use 'tcpdump' command with 'A' parameter.

Immagine
  Ethical Hacking/Cyber Security. Retrieve information about probably DDOS attack. In thi example, use 'tcpdump' command with 'A' parameter. View 'man tcpdump' guide. #ethicalhacking #cybersecurity #malware #ddos #shellcode #osint #linux #unix #bsd #backend #penetrationtesting      

Postgresql and Left Outer Join.

Immagine
  Postgresql and Left Outer Join. Below an example. #postgresql #database #dba #sql #unix #linux #bsd #backend #fullstack #cluster #shell #bash #plsql      

Perl Language and BioInformatics. In this example execute the calculate of reverse complement of strand of DNA.

Immagine
  Perl Language and BioInformatics. In this example execute the calculate of reverse complement of strand of DNA. Example. #perl #research #bioinformatics #dna #rna #backend #fullstack #shell #bash #linux #unix #bsd      

C Language and Cryptography. In this example, ecnrypt text file with Blowfish Algorithm.

Immagine
  C Language and Cryptography. In this example, ecnrypt text file with Blowfish Algorithm. #blowfish #c #gcc #c ++ #g ++ #encryption #cryptography #ethicalhacking #cybersecurity #malware #hacking #shellcode #backend #fullstack #research #blockchain      

C language Unix. How to create file and put string on it.

Immagine
  C language Unix. How to create file and put string on it. Example. #gcc #c #unix #linux #bsd #shell #bash #txt #string #research #backend #fullstack #programming #ethicalhacking #posix      

Python Language and Statistics Interpolation. Below an example.

Immagine
Python Language and Statistics Interpolation. Below an example. #python #statistics #interpolation #mathematics #backend #linux #unix #bsd #fullstack #research #genetics #bioinformatics #cybersecurity #ethicalhaking #shell #bash      

Non Linear and Chaotic map in the Genetics computation. C++ Language and Chaos Algorithm. Bioinformatics.

Immagine
  Non Linear and Chaotic map in the Genetics computation. C++ Language and Chaos Algorithm. Bioinformatics. #c ++ #g ++ #c #gcc #chaos #genetics #bionformatics #research #backend #fullstack #unix #linux #bsd #shell #bash #dna #rna    

OpenBsd and Ethical Hacking. In this example use nmap in modality 'offensive' to gathering information beyond firewall.

Immagine
OpenBsd and Ethical Hacking. In this example use nmap in modality 'offensive' to gathering information beyond firewall. #openbsd #unix #ethicalhacking #nmap #penetrationtesting #cybersecurity #scanning #linux #bsd #osint #blackhat #firewall #backend #hacking #malware #shellcode      

Postgresql. An example of function'cast' for numbers.

Immagine
  Postgresql. An example of function'cast' for numbers. #postgresql #dba #database #sql #cast #backend #fullstack #reporting #businessintelligence #linux #unix #bsd #mssqlserver #shell #bash      

Python Language and Cryptography. Hill Encryption algorithm.

Immagine
Python Language and Cryptography. Hill Encryption algorithm. Example. #hill #encryption #decryption #forensic #osint #cryptography #backend #ethicalhacking #cybersecurity #malware #shellcode #research #linux #unix #bsd      

Linux and Mathematics. In this example use 'maxima' framework in Lisp language, for any exercise of integrate.

Immagine
Linux and Mathematics. In this example use 'maxima' framework in Lisp language, for any exercise of integrate. #linux #mathematics #lisp #unix #bsd #research #backend #fullstack #shell #bash #maxima      

C Language and Laplace Transform. Mathematics.

Immagine
C Language and Laplace Transform. Mathematics. Example. #mathematics #laplace #transform #physics #c #gcc #backend #fullstack #research #linux #unix #bsd #shell #bash        

Perl Language and Bioinformatics. Below, three example show how to concat DNA string and transform in RNA, through script perl.

Immagine
  Perl Language and Bioinformatics. Below, three example show how to concat DNA string and transform in RNA, through script perl. Examples. #rna #dna #bionformatics #perl #research #unix #linux #bsd #programming #shell #bash #backend #fullstack      

Perl Language and Postgresql . How to extract data using library 'DBI'.

Immagine
  Perl Language and Postgresql . How to extract data using library 'DBI'. Example. #perl #dbi #dba #database #postgresql #linux #unix #bsd #shell #bash #research #backend #fullstack #script      

Postgresql. An example of manual Backup and anoyher Backup with shell script.

Immagine
  Postgresql. An example of manual Backup and anoyher Backup with shell script. #bash #shell #script #postgresql #database #dba #backend #backup #linux #unix #bsd #disasterandrecovery #query #batch #cron      

C language and Ethical Hacking. How to change HEAD in page HTML retrieved, with library 'curl'.

Immagine
  C language and Ethical Hacking. How to change HEAD in page HTML retrieved, with library 'curl'. #c #gcc #curl #ethicalhacking #cybersecurity #penetrationtesting #malware #shellcode #linux #unix #bsd #shell #bash #osint      

C language and Cryptography. How to build a program for encrypt file txt.

Immagine
  C language and Cryptography. How to build a program for encrypt file txt. Example. #c #gcc #encryption #cryptography #linux #backend #research #malware #shellcode #hacking #ethicalhacking #cybersecurity #osint #forensic      

Python Language and Statistic Distribution Examples.

Immagine
  Python Language and Statistic Distribution Examples. #python #statistics #mathematics #linux #backend #fullstack #research #linux #bsd #unix #shell #bash