Post

Visualizzazione dei post da maggio, 2021

Cyber Security / Ethical Hacking. A simulation of attack DDOS, and gathering information about it, through the sniffer/tool 'tcpdump'.

Immagine
  Cyber Security / Ethical Hacking. A simulation of attack DDOS, and gathering information about it, through the sniffer/tool 'tcpdump'. #ddos #attack #hacking #ethicalhacking #cybersecurity #malware #ramsomware #penetrationtesting      

C++ and the Cryptography. In this example, encrypt the string in numbers, through the function.

Immagine
  C++ and the Cryptography. In this example, encrypt the string in numbers, through the function. #c ++ #g ++ #c #gcc #encryption #cryptography #programming #developer #backend #fullstack      

Database Administration and how to choice the typology of indexs.

Immagine
  Database Administration and how to choice the typology of indexs. #index #dba #database #administrator #sqlserver #mysql #postgresql #backend #fullstack #aws #cloud #query #tsql #pgsql #psql      

Sql Server and Full Backup Management.

Immagine
  Sql Server and Full Backup Management. #backup #restore #disaster #recovery #sqlserver #sql #dba #database #query #aws #cloud #administration      

C++ Language and class declaration. In this example show a simply class how to function.

Immagine
  C++ Language and class declaration. In this example show a simply class how to function. #c ++ #g ++ #c #gcc #programming #developer #backend #fullstack #unix #linux      

C Language and how to create a new library by source code.

Immagine
  C Language and how to create a new library by source code. #c #gcc #ar #programming #backend #fullstack #unix #linux #shell #bash      

Postgresql Administration. How to create a function, an example.

Immagine
Postgresql Administration. How to create a function, an example. #postgresql #function #administration #dba #aws #cloud #sql #query #pgsql #plsql #backend #fullstack      

C Language programming. In this example show how to print conversion of string in bytes.

Immagine
C Language programming. In this example show how to print conversion of string in bytes. #c #gcc #programming #hexadecimal #bytes #backend #fullstack    

Sql Server Administration. How to calc day of current year.

Immagine
  Sql Server Administration. How to calc day of current year. #sqlserver #sql #tsql #dba #database #query #backend #fullstack #aws #cloud      

Ethical Hcking and how to dump traffic of network. In this example, show how to do dump traffic of network, with tool 'tcpdump'.

Immagine
Ethical Hcking and how to dump traffic of network. In this example, show how to do dump traffic of network, with tool 'tcpdump'. #tcpdump #ethicalhacking #hacking #vapt #penetrationtesting #network #dump #malware #cloud #aws        

Postgresql Administration and Performance Analysis Tool. In this example show how to use 'iostat' tool, for provides summary information about I/O activity and load on block devices in the system.

Immagine
  Postgresql Administration and Performance Analysis Tool. In this example show how to use 'iostat' tool, for provides summary information about I/O activity and load on block devices in the system. #postgresql #sql #pgsql #plsql #query #dba #database #aws #cloud      

C Language Unix/Linux with gcc compiler. In this example, show how to create assembly code by C source code.

Immagine
  C Language Unix/Linux with gcc compiler. In this example, show how to create assembly code by C source code. #c #gcc #asm #assembler #assembly #programming #backend #fullstack #unix #linux      

MySql Server Administration. How to import CSV file.

Immagine
  MySql Server Administration. How to import CSV file. #mysql #csv #dba #database #backend #fullstack #query #aws #cloud #sql

thical Hacking/ Penetration Testing. Below, show how to test web server with tool 'netcat', for retrieving useful data.

Immagine
  Ethical Hacking/ Penetration Testing. Below, show how to test web server with tool 'netcat', for retrieving useful data. #nc #netcat #penetrationtester #penetrationtesting #ethicalhacking #hacking #cybersecurity      

Linux Administration and to understand 'umask' command. Umask, or the user file-creation mode, is a Linux command that is used to assign the default file/folder permission or for change it. Below an example.

Immagine
  Linux Administration and to understand 'umask' command. Umask, or the user file-creation mode, is a Linux command that is used to assign the default file/folder permission or for change it. Below an example. #umask #linux #administration #systemsengineering #backend      

MySql Administration. Below, show the Max Size TableSpace for InnoDb Engine, for a correct configuration.

Immagine
  MySql Administration. Below, show the Max Size TableSpace for InnoDb Engine, for a correct configuration. #mysql #dba #database #engine #innodb #tablesize #backend #fullstack #aws #cloud #query      

Ethical Hacking - XSS (Cross Site Scripting) Attack. In this example, show how the hackers create the evil script for site. This example does not work, it is for educational purposes only.

Immagine
  Ethical Hacking - XSS (Cross Site Scripting) Attack. In this example, show how the hackers create the evil script for site. This example does not work, it is for educational purposes only. #ethicalhacking #xss #crosssitescripting #attack #hacking #cybersecurity #malware      

Perl Language and OTP password. In this example, show how to create a program for generate OTP password.

Immagine
  Perl Language and OTP password. In this example, show how to create a program for generate OTP password. #perl #otp #programming #script #unix #linux #backend #fullstack #cybersecurity #ethicalhacking #hacking

C++ Language and function all purpose. In this example, show how to calc rating power, with function. #c++ #g++ #gcc #c #programming #function #void #backend #fullstack #unix #linux

Immagine
  C++ Language and function all purpose. In this example, show how to calc rating power, with function. #c ++ #g ++ #gcc #c #programming #function #void #backend #fullstack #unix #linux      

Sql Server Administration. In this example, show a nested query.

Immagine
Sql Server Administration. In this example, show a nested query. #sqlserver #dba #database #query #tsql #nested #aws #cloud #backend #fullstack      

Ethical Hacking and the explanation about Cross-Site Scripting (XSS) attacks, which are a type of injection malware.

Immagine
  Ethical Hacking and the explanation about Cross-Site Scripting (XSS) attacks, which are a type of injection malware. #xss #malware #ethicalhacking #attack #crosssitescript #injection #cybersecurity #hacking #penetrationtesting #ransomware #vapt        

Sql Server Administration. How to work with multiple tables. An example.

Immagine
  Sql Server Administration. How to work with multiple tables. An example. #sqlserver #sql #tsql #union #backend #fullstack #aws #cloud #dba #database #administration #query      

Reverse Engineering with Radare2. In this example, show how to search plaintext password.

Immagine
  Reverse Engineering with Radare2. In this example, show how to search plaintext password. #reverseengineering #radare2 #reverse #Engineering #malware #hacking #ethicalhacking #cybersecurity #aws #cloud #unix #linux #backend #fullstack