Post

Visualizzazione dei post da agosto, 2021

Euclid's Theorem in C Language for Encryption.

Immagine
  Euclid's Theorem in C Language for Encryption. #mathematics #c #gcc #programming #backend #euclid #encryption #cryptography      

Sql Server Administration. Have you problem with slow query? ..look Tempdb. When I have an issue with tempdb filling up the first thing that I usually do is try to figure out exactly what the space has been allocated to.

Immagine
  Sql Server Administration. Have you problem with slow query? ..look Tempdb. When I have an issue with tempdb filling up the first thing that I usually do is try to figure out exactly what the space has been allocated to. Below an example. #sqlserver #dba #tsql      

Ethical Hacking / Cyber Security. ICMP

Immagine
  Ethical Hacking / Cyber Security. #icmp #ethicalhacking #cybersecurity #hacking #penetrationtesting #vapt #osint #backend #server #cloud #aws #malware #ramsomware #deepweb      

Ethical Hacking / Penetration Testing. An example of simulation MITM Attack, with 'ettercap' tool.

Immagine
  Ethical Hacking / Penetration Testing. An example of simulation MITM Attack, with 'ettercap' tool. #mitm #ethicalhacking #hacking #cybersecurity #ettercap #penetrationtesting #malware #blackhat #ramsoware #deepweb      

Postgresql Migration. How to import Database with file 'sql' and psql command.

Immagine
  Postgresql Migration. How to import Database with file 'sql' and psql command. #postgresql #psql #pgsql #dba #database #query #sql #backend #aws #migration #cloud      

Mysql Migration. How to export database with tool 'Workbench'.

Immagine
  Mysql Migration. How to export database with tool 'Workbench'. #mysql #dba #database #query #migration #tuning #export #administration #aws #cloud #backend #server      

Perl Language and and Catch Signal Handler.

Immagine
  Perl Language and and Catch Signal Handler. An example. #perl #backend #catch #signal #handler #unix #linux #windows #developer #programming #server      

Ethical Hacking / Shellcode creation with Python script. The shellcode is fundamental for testing exploit.

Immagine
  Ethical Hacking / Shellcode creation with Python script. The shellcode is fundamental for testing exploit. #shellcode #exploit #cybersecurity #malware #hacking #ethicalhacking #penetrationtesting #backend #aws #cloud #vm #PT #VAPT      

C Language and lenght function for string.

Immagine
  C Language and lenght function for string. #c #gcc #lenght #backend #function #posix #unix #linux      

Sql Server Administration. How to create a large table with a 'while' instruction of T-SQL.

Immagine
  Sql Server Administration. How to create a large table with a 'while' instruction of T-SQL. #sqlserver #dba #database #query #tsql #aws #cloud #backend #administration #tuning #migration

Linux Administration. How to show the text file, and add number line for every row, with command 'ln'.

Immagine
  Linux Administration. How to show the text file, and add number line for every row, with command 'ln'. #linux #administration #backend #shell #bash #txt #ln #script #aws #cloud #server      

Postgresql Administration. An example of query 'not in'.

Immagine
  Postgresql Administration. An example of query 'not in'. #sql #pgsql #plsql #postgresql #dba #database #query #backend #aws #cloud #migration #tuning      

Ethical Hacking / Cyber Security. How to intercept Hijacking Attack, with tool 'tcpdump', and technique MITM.

Immagine
  Ethical Hacking / Cyber Security. How to intercept Hijacking Attack, with tool 'tcpdump', and technique MITM. An example. #ethicalhacking #mitm #tcpdump #hijacking #cybersecurity #hacking #blackhat #backend #malware #ramsomware #osint      

Python Language and Cryptography. Below, an example of encryption with class 'affine'.

Immagine
  Python Language and Cryptography. Below, an example of encryption with class 'affine'. #encryption #python #cryptography #backend #cybersecurity #ethicalhacking #hacking #malware #osint      

Postgresql Administration. How to create a Os Function for list files in directory.

Immagine
  Postgresql Administration. How to create a Os Function for list files in directory. #postgresql #plsql #pgsql #linux #files #backend #dba #database #aws #cloud #server #query #administration      

Ethical Hacking/Cyber Security. How to gathering information about a site, with Linux command shell.

Immagine
  Ethical Hacking/Cyber Security. How to gathering information about a site, with Linux command shell. An example. #ethicalhacking #cybersecurity #penetrationtesting #linux #malware #virus #hacking #ramsomware #bitcoin #blockchain #deepweb      

Perl Language and Normalize string.

Immagine
  Perl Language and Normalize string. An example. #perl #utf #backend #normalize #string #programming #develoepr #ethicalhacker #cybersecurity #dba #database