Post

Visualizzazione dei post da novembre, 2020

C Language and how to manage list with node. In this example use struct for manage nodes.

Immagine
C Language and how to manage list with node. In this example use struct for manage nodes. #nodes #list #fifo #lifo #c #gcc #unix #linux #backend #fullstack #programming #research #mathematics #physics      

Unix BSD, how to permissions scheme. Below ana example how to create user , create group and add user to group.

Immagine
  Unix BSD, how to permissions scheme. Below ana example how to create user , create group and add user to group. #unix #bsd #linux #administration #systems #systemegineering #systems #backend #cloud #aws #bash #shell #aix      

Ethical Hacking and Penetration Testing. In thi example show 'nmap' command with parameter 'script http', for retrieve data about web server on router.

Immagine
  Ethical Hacking and Penetration Testing. In thi example show 'nmap' command with parameter 'script http', for retrieve data about web server on router. #nmap #hacking #penetrationtesting #cybersecurity #script #malware #shellcode #unix #linux #vapt #apt #blackhat #offensive    

Linux Administration and 'stat' function in Linux Systems. The 'stat' function display many information about file, for example, UID and GID user, block of allocation memory,access rights etc..

Immagine
  Linux Administration and 'stat' function in Linux Systems. The 'stat' function display many information about file, for example, UID and GID user, block of allocation memory,access rights etc.. #linuxadministration #stat #filesystem #linux #unix #backend #shell #bash      

Perl Language and Bioinformatics. In this example, show the 'POP' operations, for shift characters in the strings.

Immagine
  Perl Language and Bioinformatics. In this example, show the 'POP' operations, for shift characters in the strings. #perl #bioinformatics #research #pop #fifo #lifo #script #unix #linux #shell #bash #backend #fullstack      

Python Language and quadratic equation. Mathematics.

Immagine
  Python Language and quadratic equation. Mathematics. #python #mathematics #physics #research #backend #fullstack #statistics #unix #linux      

Linux Administration, working on scanner with 'sane' software and driver customized.

Immagine
  Linux Administration, working on scanner with 'sane' software and driver customized. #linuxadministration #sane #xsane #scanner #print #ocr #linux #unix #backend #fullstack #systemengineering #system      

Mysql Administration and JSON function 'JSON_ARRAYAGG()'. The JSON_ARRAYAGG function is used to create an array of JSON documents from several rows.

Immagine
  Mysql Administration and JSON function 'JSON_ARRAYAGG()'. The JSON_ARRAYAGG function is used to create an array of JSON documents from several rows. Example. #mysql #sql #dba #query #json #json_arrayagg #reporting #backend #fullstack #database #bigdata      

Ethical Hacking and ARP Poisoning Spoofing, with framework 'metasploit'.

Immagine
  Ethical Hacking and ARP Poisoning Spoofing, with framework 'metasploit'. Example. #ethicalhacking #cybersecurity #penetrationtesting #malware #shellcode #spoofing #arp #poisoning #meatsploit #backend #research #unix #linux    

C Language and calculate indefinition integrate, with method 'Montecarlo'.

Immagine
  C Language and calculate indefinition integrate, with method 'Montecarlo'. Below an example. #c #gcc #mathematics #physics #montecarlo #research #statistics #backend #fullstack #unix #linux        

Ethical hacking and Reverse Engineering with command 'od' and various parameters.

Immagine
  Ethical hacking and Reverse Engineering with command 'od' and various parameters. Below any examples. #od #reverseengineering #ethicalhacking #cybersecurity #malware #shellcode #linux #unix #shell #bash #backend #penetrationtesting      

C Language and Mathematics Examples. In the first, compile the program for Fibonacci Series. In the second, compile same program, with option for dynamic external library.

Immagine
  C Language and Mathematics Examples. In the first, compile the program for Fibonacci Series. In the second, compile same program, with option for dynamic external library. #c #gcc #mathematics #fibonacci #mathematics #research #library #shared #backend #fullstack #unix #linux      

Postgresql and how to use module 'earthdistance', for find the distance between two points, in miles.

Immagine
  Postgresql and how to use module 'earthdistance', for find the distance between two points, in miles. #postgresql #database #dba #sql #query #earthdistance #backend #fullstack #bigdata #unix #linux      

Ethical Hacking/ Penetration Testing. How to use command 'ping' with clause '-n'. Ping sweep is used to identify the live host from a range of IP addresses by sending the ICMP ECHO request and the ICMP ECHO reply.

Immagine
  Ethical Hacking/ Penetration Testing. How to use command 'ping' with clause '-n'. Ping sweep is used to identify the live host from a range of IP addresses by sending the ICMP ECHO request and the ICMP ECHO reply. #ethicalhacking #penetrationtesting #hacking #cybersecurity      

Postgresql and how to use extension 'hstore'. This extension help to store sets of key/value pairs within a single PostgreSQL value.

Immagine
  Postgresql and how to use extension 'hstore'. This extension help to store sets of key/value pairs within a single PostgreSQL value. This can be useful in many cases. #postgresql #database #sql #dba #backend #fullstack #reporting #bigdata #json #query #unix #linux #plsql #pgsql      

Mysql Database and C Language. How to connect and extract data by code, with paramaters for compiler, customized.

Immagine
  Mysql Database and C Language. How to connect and extract data by code, with paramaters for compiler, customized. Below an example. #mysql #database #dba #sql #reporting #c #gcc #backend #fullstack #c_ansi #c_unix #linux #unix #shell #bash      

Linux Administration Script Language Bash, example for count line in file.

Immagine
  Linux Administration Script Language Bash, example for count line in file. #script #bash #shell #linux #linuxadministration #backend #sql #database #dba #unix #bigdata      

Ethical Hacking. How to perform nmap execution with paramaters 'oa_externalrange', for stored report about work of retrieving data and penetration testing.

Immagine
  Ethical Hacking. How to perform nmap execution with paramaters 'oa_externalrange', for stored report about work of retrieving data and penetration testing. #penetrationtesting #ethicalhacking #nmap #osint #cybersecurity #hacking #linux #unix      

MsSqlServer/Transact Sql. How to create Stored Procedure.

Immagine
  MsSqlServer/Transact Sql. How to create Stored Procedure. Below an example. #mssqlserver #tsql #sql #query #dba #stored #backend #fullstack #reporting      

Postgresql and 'update' instruction with calc on 'set'.

Immagine
  Postgresql and 'update' instruction with calc on 'set'. Example. #postgresql #sql #database #dba #update #set #calc #backend #fullstack #reporting      

Linux Administration and 'sed' command for fast replace strings.

Immagine
  Linux Administration and 'sed' command for fast replace strings. Below an example. #linuxadministration #sed #bigdata #linux #unix #sql #csv #txt #text #replacefast #shell #bash #backend      

Python Language and Distribution Report Sales, extract from database MySql.

Immagine
  Python Language and Distribution Report Sales, extract from database MySql. #python #mysql #reporting #statistics #mathematics #database #dba #sql #unix #linux #backend #fullstack