Post

Visualizzazione dei post da giugno, 2021

Windows Admin/Powershell How to. Below, two example for monitoring Systems.

Immagine
  Windows Admin/Powershell How to. Below, two example for monitoring Systems. #powershell #windows #administrator #script #systems #engineering #aws #cloud

MySql Administration. How to create an Index with Hash Algorithm.

Immagine
  MySql Administration. How to create an Index with Hash Algorithm. #hash #aglorithm #mysql #administration #dba #index #database #aws #cloud #backend #query      

Python and Geolocalization. Ethical Hacking. Below an example of tool in python , for retrieving localization by IP address.

Immagine
Python and Geolocalization. Ethical Hacking. Below an example of tool in python , for retrieving localization by IP address. #python #geolocalization #cybersecurity #osint #hacking #blackhat #ethicalhacking #backend      

BlockChain, how it is structured.

Immagine
  BlockChain, how it is structured. Below an example. #blockchain #bitcoin #hacking #cybersecurity #cryptography #hash #darknet #deepweb #ethicalhacking #backend      

C Language and System Calls. In this example, show how to call System API in Linux.

Immagine
  C Language and System Calls. In this example, show how to call System API in Linux. #c #gcc #api #linux #kernel #programming #developer #backend #system #calls      

Ethical Hacking / Cyber Security. XSS Malware Analysis. Below an example intercepted by 'NoScript' plugin fo Tor-Browser, which show an attempt of Attack Script XSS.All this by simply opening a site. The danger isn't just email.

Immagine
  Ethical Hacking / Cyber Security. XSS Malware Analysis. Below an example intercepted by 'NoScript' plugin fo Tor-Browser, which show an attempt of Attack Script XSS.All this by simply opening a site. The danger isn't just email. #xss #ramsomware #malware #cybersecurity #hacking      

Perl Language and Wmi Library Interface of Windows OS. Below an example of extraction data by System Operating.

Immagine
  Perl Language and Wmi Library Interface of Windows OS. Below an example of extraction data by System Operating. #perl #windows #ethicalhacking #hacking #cybersecurity #programming #developer #backend #aws #cloud #systems #engineering

Mysql Administration and JSON data. Below, an example how to handling json table and data.

Immagine
  Mysql Administration and JSON data. Below, an example how to handling json table and data. #mysql #administration #dba #database #json #aws #cloud #backend #query      

Ethical Hacking / Forensic/ Osint. How to investigate transaction of blockchain, with tool 'orbit'. #ethicalhacking #osint #hacking #bitcoin #blockchain #deepweb #darknet #forensic #cybersecurity #osint #malware

Immagine
  Ethical Hacking / Forensic/ Osint. How to investigate transaction of blockchain, with tool 'orbit'. #ethicalhacking #osint #hacking #bitcoin #blockchain #deepweb #darknet #forensic #cybersecurity #osint #malware    

Penetration Testin/Ethical Hacking. In this example, show how to test fingerprint of OS and ports on the VM.

Immagine
  Penetration Testin/Ethical Hacking. In this example, show how to test fingerprint of OS and ports on the VM. #penetrationtesting #penetration #tester #blackhat #hacking #ethicalhacking #cybersecurity #fingerprint #vm #aws #cloud #malware #ramsomware      

Python Language and Postgresql. How to build a simple script for extract data from Postgresql Database.

Immagine
  Python Language and Postgresql. How to build a simple script for extract data from Postgresql Database. #python #postgresql #database #etl #script #pgsql #plsql #extraction #query #dba #aws #cloud #backend #sql      

How it is implemented BlockChain Structure.

Immagine
  How it is implemented BlockChain Structure. #blockchain #cybersecurity #penetrationtesting #hacking #ethicalhacking #bitcoin #darknet #deepweb #network #mining      

Postgresql and Partitioning Data. Below an example of partitioning of table.

Immagine
  Postgresql and Partitioning Data. Below an example of partitioning of table. #postgresql #postgres #pgsql #aws #cloud #partitioning #table #data #plsql #dba #database #query      

Perl Language and forensic Analysis of System Operating.

Immagine
  Perl Language and forensic Analysis of System Operating. #perl #forensic #linux #penetrationtesting #cybersecurity #programming #backend #malware #ramsomware      

Python Language and handling array with 'numpy' library.

Immagine
  Python Language and handling array with 'numpy' library. #python #numpy #array #programming #developer #backend        

Sql Server Administration. How to enable 'xp_cmdshell', for control the SystemInfo.

Immagine
  Sql Server Administration. How to enable 'xp_cmdshell', for control the SystemInfo. #sqlserver #administration #xp_cmdshell #systeminfo #sql #dba #database #query #tsql #wmi      

Ethical Hacking and Reverse TCP technique. Below an example how to perform an reverse shell caption command, by terminal to terminal.

Immagine
  Ethical Hacking and Reverse TCP technique. Below an example how to perform an reverse shell caption command, by terminal to terminal. #ethicalhacking #hacking #tcp #reverse #shell #malware #cybersecurity #penetrationtesting #MITM #sniffer #scanner #linux      

Python Language ans Sympy Library, for resolve mathematics expressions. Below an example.

Immagine
  Python Language ans Sympy Library, for resolve mathematics expressions. Below an example. #python #numpy #sympy #programming #developer #backend

Perl Language and work on Genoma file string. In this example, show how to manipulate stream of string, with a script of Perl.

Immagine
Perl Language and work on Genoma file string. In this example, show how to manipulate stream of string, with a script of Perl. #genoma #research #perl #programming #science #biology #backend

Linux Administration and 'sar' command. The 'sar' command is useful for collect, report, or save system activity information, about use of all device. It's very useful for reporting and support for System Engineering, Database Administration and Cyber Security.

Immagine
  Linux Administration and 'sar' command. The 'sar' command is useful for collect, report, or save system activity information, about use of all device. It's very useful for reporting and support for System Engineering, Database Administration and Cyber Security. #linux #sar #dba      

C Language and Enumeration Class. An example of how to use.

Immagine
  C Language and Enumeration Class. An example of how to use. #enum #c #gcc #vector #array #programming #developer #backend      

Sql Server Administration. An example how to use 'having' command, into the 'group by' instruction.

Immagine
  Sql Server Administration. An example how to use 'having' command, into the 'group by' instruction. #sqlserver #administration #dba #having #groupby #query #tsql #aws #cloud #backend #database      

Ethical Hacking and Ramsoware Malware. Below, show in details how to develop the path of infection about a Ramsomware Virus.

Immagine
  Ethical Hacking and Ramsoware Malware. Below, show in details how to develop the path of infection about a Ramsomware Virus. #ramsomware #virus #ethicalhacking #hacking #malware #cybersecurity #osint #backend #aws #cloud #hacker #darknet #deepweb #bitcoin #blockchain      

Python Language and Mathematics Solutions for palyndrome numbers.

Immagine
Python Language and Mathematics Solutions for palyndrome numbers. An example. #python #mathematics #palyndrome #backend #programming #developer #maths      

Postgresql Administration and Indexs. How to creat an index and measure timing, by console.

Immagine
  Postgresql Administration and Indexs. How to creat an index and measure timing, by console. #postgresql #dba #administration #aws #rds #cloud #pgsql #plsql #index #database #query #backend