Post

Visualizzazione dei post da luglio, 2021

Perl Language and TCP Client/Server application.

Immagine
  Perl Language and TCP Client/Server application. #perl #netcat #nc #tcp #client #server #backend #CyberSecurity #ethicalhacking #programming #developer #linux #unix      

Cyber Security / Penetration Testing on Sql Server. How to perform with 'lyris_listmanager_weak_pass'.

Immagine
  Cyber Security / Penetration Testing on Sql Server. How to perform with 'lyris_listmanager_weak_pass'. An example. #penetrationtesting #cybersecurity #ethicalhacking #hacking #sqlserver #msfconsole #ramsomware #malware      

Ethical Hacker / Cyber Security. How to perform a penetration testing under Windows OS, with tool 'nmap'. An example of intensive scanning with 'SYN Stealth' technique.

Immagine
  Ethical Hacker / Cyber Security. How to perform a penetration testing under Windows OS, with tool 'nmap'. An example of intensive scanning with 'SYN Stealth' technique. #penetrationtesting #cybersecurity #hacking #ethicalhacking #malware #virus #ramsomware

PowerShell commands. In this example, use command 'get-content', for search string in txt file.

Immagine
  PowerShell commands. In this example, use command 'get-content', for search string in txt file. #powershell #windows #system #administrator #cybersecurity #ethicalhacker #dba #database

Linux Administration. Bash command 'sed' for search and replace in real time.

Immagine
  Linux Administration. Bash command 'sed' for search and replace in real time. #linux #administrator #sed #awk #migration #dba #database #backend #aws #cloud #shell #bash      

Ethical Hacking/Cyber Security. How to redirect output System Command to log file txt.

Immagine
  Ethical Hacking/Cyber Security. How to redirect output System Command to log file txt. An example. #ethicalhacking #hacking #cybersecurity #blackhat #malware #ramsomware #bitcoin #blockchain #deepweb #virus #backend #penetrationtesting

Integration Services 2019/ETL. How to extract data.

Immagine
  Integration Services 2019/ETL. How to extract data. An example. #etl #sqlserver #sql #query #businessintelligence #dba #database #tsql #backend #visualstudio #vs #integration #services
Immagine
  Visual Studio C++ and Sql Server extraction data. An example. #vs #visualstudio #windows #programming #developer #sqlserver #tsql #c ++ #c #backend

Penetration Testing /Ethical Hacking. How to test port 445 with tool 'nmap'.

Immagine
  Penetration Testing /Ethical Hacking. How to test port 445 with tool 'nmap'. An example. #penetrationtesting #ethicalhacking #penetration #tester #cybersecurity #malware #ramsomware #bitcoin #blockchain #darknet #deepweb #hacking      

C++ Language and math application for compute circle area.

Immagine
  C++ Language and math application for compute circle area. #c ++ #g ++ #gcc #c #mathematics #area #circle #backend #programming #developer      

Perl Language and hash table, how to handle .

Immagine
Perl Language and hash table, how to handle . An example. #perl #hash #table #programming #developer #backend      

Reverse Engineering with x64dbg, free tool under Windows. Below an example analysis of DLL files.

Immagine
Reverse Engineering with x64dbg, free tool under Windows. Below an example analysis of DLL files. #reverseengineering #reverse #engineering #cybersecurity #forensic #ethicalhacking #hacking #malware #ramsomware

Perl Language and Postgresql Migration&Normalization. Below a code Perl for search & Replace strings, extracts by Postgres Database.

Immagine
  Perl Language and Postgresql Migration&Normalization. Below a code Perl for search & Replace strings, extracts by Postgres Database. #perl #postgresql #dba #database #administartion #query #plsql #pgsql #migration #normalization #aws      

Sql Server Administration and Transact Sql with variable.

Immagine
  Sql Server Administration and Transact Sql with variable. #sqlserver #tsql #dba #database #administration #query #sql #aws #rds      

Python Language and NumPy Library for handling matrix.

Immagine
  Python Language and NumPy Library for handling matrix. #python #numpy #matrix #mathematics #backend #programming      

Python Language and Cryptography with Algorithm SHA-256.

Immagine
  Python Language and Cryptography with Algorithm SHA-256. #python #encryption #cryptography #algorithm #cybersecurity #backend #ethicalhacking #bancking #finance    

Sql Server Administration. How to view 'Locks Transactions', after execution of query.

Immagine
  Sql Server Administration. How to view 'Locks Transactions', after execution of query. #sqlserver #dba #locks #transaction #database #query #tsql #backend #aws      

Perl Language and caption signal by systems. An example.

Immagine
  Perl Language and caption signal by systems. An example. #perl #programming #developer #unix #linux #backend #cybersecurity #ethicalhacking      

Malware Anlysis for new type of infection. Let's talk about 'Fileless Malware', is a type of malicious software that uses legitimate programs to infect a computer. Below a schema.

Immagine
  Malware Anlysis for new type of infection. Let's talk about 'Fileless Malware', is a type of malicious software that uses legitimate programs to infect a computer. Below a schema. #malware #analyst #ethicalhacking #cybersecurity #virus #ramsomware #hacking      

C++ Linux Language and handling array like a const.

Immagine
  C++ Linux Language and handling array like a const. #c ++ #g ++ #c #gcc #array #const #backend #programming #developer      

Postgresql Administration and handling Extensions. Below, show how to display extensions installed into database.

Immagine
  Postgresql Administration and handling Extensions. Below, show how to display extensions installed into database. #dba #postgresql #psql #pgsql #database #aws #cloud #query #backend      

Ethical Hacking and Python Script for exploit, through file wav. This example has the purpose of making it clear, how even things we use every day can be a vehicle for viruses.

Immagine
  Ethical Hacking and Python Script for exploit, through file wav. This example has the purpose of making it clear, how even things we use every day can be a vehicle for viruses. #ethicalhacking #cybersecurity #script #python #ddos #exploit #malware #hacking #backend #ramsomware      

Perl Language and Netcat comunications. Below, an example of script for comunication by terminal.

Immagine
  Perl Language and Netcat comunications. Below, an example of script for comunication by terminal. #aws #cloud #backend #cybersecurity #ethicalhacking #hacking #perl #netcat #nc #programming #systems #engineering      

Ethical Hacking / Malware 'Process Ghosting', how to . Below, the detail how to infect machines by new malware in object.

Immagine
  Ethical Hacking / Malware 'Process Ghosting', how to . Below, the detail how to infect machines by new malware in object. #ethicalhacking #processgosthing #hacking #malware #blackhat #bitcoin #blockchain #virus #ramsomware #cybersecurity    

Python and Database MySql. How to connect script Python to Mysql, with library 'mysql.connect'.

Immagine
  Python and Database MySql. How to connect script Python to Mysql, with library 'mysql.connect'. #python #mysql #script #database #dba #query #administrator #aws #cloud #backend