Post

Visualizzazione dei post da aprile, 2021

C++ Language and how to pass variable value, via pointer. An example.

Immagine
  C++ Language and how to pass variable value, via pointer. An example. #c #gcc #c ++ #g ++ #programming #developer #unix #linux #backend #fullstack #kernel      

C Language and vprintf function, for to format data output . An example.

Immagine
  C Language and vprintf function, for to format data output . An example. #c #gcc #unix #linux #backend #vprintf #fullstack #developer #programming      

Sql Server Administration. How to create a simply view.

Immagine
  Sql Server Administration. How to create a simply view. #view #dba #database #tsql #sql #query #sqlserver #aws #cloud #backend #fullstack      

Mysql Administration and shell linux. In this example, show how to launch a query by shell, on database Mysql.

Immagine
  Mysql Administration and shell linux. In this example, show how to launch a query by shell, on database Mysql. #mysql #shell #linux #administration #dba #engineering #database #tuning #migration #backend #fullstack #aws #cloud      

Mysql Administration. An example of simply create and update.

Immagine
  Mysql Administration. An example of simply create and update. #mysql #administration #dba #database #aws #cloud #query #backend #fullstack      

Reverse Engineering / Cyber Security. In this example, search bug software with 'Ghidra' tool reverse engineering.

Immagine
  Reverse Engineering / Cyber Security. In this example, search bug software with 'Ghidra' tool reverse engineering. #reverseengineering #reverse #engineering #cybersecurity #ethicahacking #shellcode #malware #analyst #backend #fullstack

Reverse Engineering with Radare2 tool. In thi example, show how to determine the block size of disassembly code.

Immagine
  Reverse Engineering with Radare2 tool. In thi example, show how to determine the block size of disassembly code. #radare2 #reverse #engineering #ReverseEngineering #ethicalhacking #hacking #malware #analyst #cybersecurity #research      

Sql Server Administration and Foreign Key on column. In this example, show how to create a foreing key on table.

Immagine
  Sql Server Administration and Foreign Key on column. In this example, show how to create a foreing key on table. #sqlserver #dba #database #tsql #query #aws #cloud #backend #foreignkey #fullstack #sql      

Cyber Security / Ethical Hacking for retrieve information of network, with 'nmap' tool and ping Acknowledge method.

Immagine
  Cyber Security / Ethical Hacking for retrieve information of network, with 'nmap' tool and ping Acknowledge method. #nmap #cybersecurity #ethicalhacking #penetrationtesting #backend #fullstack #osint #hacking #ethicalhacker #penetrationtester      

C++ developing fo MySql Database. An example fo extract data.

Immagine
  C++ developing fo MySql Database. An example fo extract data. #mysql #sql #dba #database #aws #cloud #c ++ #g ++ #gcc #c #programming #developer #backend #fullstack      

Penetration Testing and Metasploit tool. In this example, show how to use 'msfvenom' for create a payload, for malware analysis.

Immagine
  Penetration Testing and Metasploit tool. In this example, show how to use 'msfvenom' for create a payload, for malware analysis. #penetrationtesting #vapt #msfconsole #msfvenom #metasploit #exploit #ethicalhacking #cybersecurity #backend #fullstack #osint #malware #aws #cloud      

PostgreSQL Administration and Python. How to extract data by Database through script python in shell. I use library psycopg2

Immagine
  PostgreSQL Administration and Python. How to extract data by Database through script python in shell. I use library psycopg2. #python #psycopg2 #dba #database #postgresql #pgsql #plsql #sql #backend #fullstack #aws #cloud      

Reverse Engineering, How to. Working on Ghidra Tool, for disassembly binary file.

Immagine
  Reverse Engineering, How to. Working on Ghidra Tool, for disassembly binary file. #reverseengineering #reverse #engineering #disassembly #cybersecurity #forensic #ethicalhacker #hacking #malware #backend #osint #fullstack

Linux Administration. How to use 'OR' operator in merge with 'grep' command, on file txt.

Immagine
  Linux Administration. How to use 'OR' operator in merge with 'grep' command, on file txt. #linux #unix #backend #fullstack #or #logic #boolean #aws #cloud #database #migration #pipe #bigdata #grep      

Mysql Administration and Stored Procedures. In this example, show how to create a stored for update.

Immagine
  Mysql Administration and Stored Procedures. In this example, show how to create a stored for update. #mysql #administration #dba #database #aws #update #stored #backend #fullstack #query #sql      

C Language Unix/Linux and Garbage collector. In this example, show hoe to handle the garbage memory, with function 'GC_MALLOC'.

Immagine
  C Language Unix/Linux and Garbage collector. In this example, show hoe to handle the garbage memory, with function 'GC_MALLOC'. #c #gcc #unix #linux #kernel #gc_malloc #malloc #garbage #backend #fullstack #programming #developer    

PostgreSQL Administration. How to use clause 'WITH' and inner join , together.

Immagine
  PostgreSQL Administration. How to use clause 'WITH' and inner join , together. #postgresql #dba #psql #pgsql #administration #database #query #aws #cloud #backend #fullstack      

Reverse Engineering with 'Ghidra' Tool. In this example, show how to jump to target address hexadecimal.

Immagine
  Reverse Engineering with 'Ghidra' Tool. In this example, show how to jump to target address hexadecimal. #ghidra #intelligence #reversengineering #malware #hacking #ethicalhacking #cybersecurity #osint

Reverse Engineering with Radare2 tool, under Unix-like OS. An example, show how to disassembly a binary file, for search instruction which require the password.

Immagine
  Reverse Engineering with Radare2 tool, under Unix-like OS. An example, show how to disassembly a binary file, for search instruction which require the password. #reverseengineering #reverse #engineering #malware #hacking #ethicalhacking #cybersecurity #osint #radare2 #disass      

Reverse Engineering with Ghidra Tool. In this example, show how to study reverse code of binary program compiled with Visual Studio.

Immagine
  Reverse Engineering with Ghidra Tool. In this example, show how to study reverse code of binary program compiled with Visual Studio. #reverseengineering #reverse #hacking #ethicalhacking #cybersecurity #malware #ghidra #backend #fullstack #osint #intelligence

C++ Language and SDL2 library for Fractal application.

Immagine
  C++ Language and SDL2 library for Fractal application. C++ and Mathematics/Physics Applications . #c ++ #g ++ #c #gcc #fractal #mathematics #physics #research #sdl #sdl2 #backend #fullstack #programming #developer