Post

Visualizzazione dei post da dicembre, 2020

Postgresql Database Administration. How to use a 'foreign key' in the table.

Immagine
  Postgresql Database Administration. How to use a 'foreign key' in the table. Example. #postgresql #dba #database #sql #foreignkey #backend #fullstack #reporting #normalization #integration      

Ethical Hacking / Cyber Security. In this exmaple, show how does it work 'netcat' tool, for connection remote host by shell. The same work, that's what malware uses.

Immagine
  Ethical Hacking / Cyber Security. In this exmaple, show how does it work 'netcat' tool, for connection remote host by shell. The same work, that's what malware uses. Simulation. An example. #ethicalhacking #cybersecurity #penetrationtesting #osint #hacking #malware #unix #linux        

Business Intelligence. How to build a report, connect to database SqlServer, with tool 'Reporting Services' an Visual Studio.

Immagine
  Business Intelligence. How to build a report, connect to database SqlServer, with tool 'Reporting Services' an Visual Studio. An example. #sqlserver #reporting #businessintelligence #database #sql #dba      

Unix/Linux Administration and Mail Server. In this example, set an instruction for sendmail server, for discard an address domain SPAM.

Immagine
  Unix/Linux Administration and Mail Server. In this example, set an instruction for sendmail server, for discard an address domain SPAM. Below an example. #sendmail #unix #linux #administration #spam #rules #backend #network #cybersecurity #ethicalhacking #shell #bash #fullstack      

Ethical Hacking / Cyber Security. IDS (Intrusion Detection Systems). How to detect a ping towards my host, by another machine. The ping simulates an attack DDos, that it uses SYN and ACKflags of TCP protocol.

Immagine
  Ethical Hacking / Cyber Security. IDS (Intrusion Detection Systems). How to detect a ping towards my host, by another machine. The ping simulates an attack DDos, that it uses SYN and ACKflags of TCP protocol. Example. #tcp #ethicalhacking #cybersecurity #blackhat #ddos #ping      

Mysql Server Administration. How to set primary key when creating the table, and set engine InnoDb.

Immagine
  Mysql Server Administration. How to set primary key when creating the table, and set engine InnoDb. Example. #mysql #innodb #query #sql #dba #database #primarykey #backend #reporting #administration #systems #fullstack      

Perl Language and BioInformatics. In this example, find a bit of string into file DNA Strings.

Immagine
  Perl Language and BioInformatics. In this example, find a bit of string into file DNA Strings. #dna #bioinformatics #perl #strings #sed #awk #grep #unix #linux #shell #bash #script #backend #research #fullstack #mathematics #physics

Microsoft Business Intelligence. How to develop project Integration Services (DTS-Data Transormation Service), for import data by csv file into database.

Immagine
  Microsoft Business Intelligence. How to develop project Integration Services (DTS-Data Transormation Service), for import data by csv file into database. Below an example. #mssqlserver #sqlserver #businessintelligence #reporting #dts #sql #dba #database #windows #datatransform      

Postgresql and Math conversions. In this example, show how to convert Binary number to decimal , and convert Hexadecimal to decimal.

Immagine
  Postgresql and Math conversions. In this example, show how to convert Binary number to decimal , and convert Hexadecimal to decimal. #postgresql #dba #database #sql #query #bigdata #reporting #businessintelligence #pipeline #mathematics #binary #hexadecimal #psql #pgsql      

Linux Administration and script. In this example, I have implemented the command which can be entered in script bash, for retrieve the host live in the network.

Immagine
  Linux Administration and script. In this example, I have implemented the command which can be entered in script bash, for retrieve the host live in the network. Below an example. #network #script #bash #shell #ping #ethicalhacking #hacking #backend #administration #linux #unix      

Python Language and Sql Server. In the example, show how to connect to Sql Server, through library pymssql, and extract the data.

Immagine
  Python Language and Sql Server. In the example, show how to connect to Sql Server, through library pymssql, and extract the data. #pymssql #python #sqlserver #tsql #sql #database #dba #reporting #windows #linux #systemengineering #administration #systems #backend #server #sql      

C++ Language. How to handle parallel array.

Immagine
  C++ Language. How to handle parallel array. Example. #c ++ #g ++ #gcc #c #programming #mathematics #array #list #backend #research #physics #fullstack #unix #linux #parallel      

Sql Server Administration. How to Enumerate filesystem, through Stored Procedures 'xp_cmdshell'.

Immagine
  Sql Server Administration. How to Enumerate filesystem, through Stored Procedures 'xp_cmdshell'. Example. #xp_cmdshell #storedprocedures #sqlserver #sql #dba #database #administration #cybersecurity #backend #sp      

Ethical Hacking / Cyber Security. How to scan map targets into file txt, by tool of Cyber Security 'nmap'.

Immagine
  Ethical Hacking / Cyber Security. How to scan map targets into file txt, by tool of Cyber Security 'nmap'. Below an example. #nmap #script #scanning #osint #ethicalhacking #cybersecurity #penetrationtesting #unix #linux #exploit #malware #shellcode      

How to use command 'awk' in Linux Administration.

Immagine
  How to use command 'awk' in Linux Administration. Example. #awk #linux #unix #administration #script #pipeline #shell #bash #bigdata #sql #database #dba      

How to configure ODBC for connect Python with Sql Server.

Immagine
How to configure ODBC for connect Python with Sql Server. Below an example. #sqlserver #odbc #administration #systemadministration #adtabase #python #pyodbc        

Postgresql and how to use 'case when' in the query.

Immagine
  Postgresql and how to use 'case when' in the query. Below an example. #sql #postgresql #database #casewhen #conditional #dba #bigadata #reporting #pipeline #backend #businessintelligence #psql #pgsql      

Reverse Engineering. How to dump in Hex format, an binary file.

Immagine
  Reverse Engineering. How to dump in Hex format, an binary file. Example. #reverse #reversengineering #hacking #blackbox #blackhat #ethicalhacking #c #assembler #assembly #hex #research #backend #osint #lowlevel      

C++ Language. How to handle file JSON.

Immagine
  C++ Language. How to handle file JSON. Below an example. #c ++ #c #gcc #g ++ #oop #backend #json #sql #bigdata #pipeline #database #hacking #ethicalhacking #cybersecurity      

Linux Administration and bash script example, where print name of user.

Immagine
  Linux Administration and bash script example, where print name of user. #linux #unix #bash #shell #script #administration #backend #bashscript