Post

Visualizzazione dei post da settembre, 2021

Perl is Language very clever. In thi example, show how to sum number to alphanumeric string. Perl is able to understand to add only numbers.

Immagine
Perl is Language very clever. In thi example, show how to sum number to alphanumeric string. Perl is able to understand to add only numbers. #perl #programming #clever #backend #research #developing #genoma #dna #bioinformatics #hacking

Postgresql Administration. An example of updates with calc.

Immagine
  Postgresql Administration. An example of updates with calc. #postgresql #dba #database #administration #query #pgsql #sql #aws #cloud #backend #tuning #migration

C++ Language. How to check unligned memory alloc of variables.

Immagine
C++ Language. How to check unligned memory alloc of variables. #c ++ #g ++ #c #gcc #programming #backend        

C++ and Encryption with XOR Logic.

Immagine
  C++ and Encryption with XOR Logic. An example. #c ++ #g ++ #c #gcc #xor #encryption #cryptographic #cybersecurity #ethicalhacking #backend      

Postgresql Administration. How to create table with check function, for field password.

Immagine
  Postgresql Administration. How to create table with check function, for field password. #postgresql #cybersecurity #dba #database #administration #query #sql #pgsql #aws #cloud #backend        

Ethical Hacking and testing Web Server Apache. Below, show a web server correctly configured, for avoid attack via browser.

Immagine
  Ethical Hacking and testing Web Server Apache. Below, show a web server correctly configured, for avoid attack via browser. An example. #ethicalhacking #cybersecurity #penetrationtesting #hacking #malware #ransomware

Postgresql Administation. How to create and use Temporary Table.

Immagine
  Postgresql Administation. How to create and use Temporary Table. #postgresql #temptable #dba #database #administrator #sql #query #pgsql #backend #aws #cloud        

Cyber Security. How to caption DNS call, with tool 'wireshark'.

Immagine
  Cyber Security. How to caption DNS call, with tool 'wireshark'. #cybersecurity #ethicalhacking #hacking #blockchain #deepweb #virus #malware #ransomware #penetrationtesting #sniffer      

Bash Language. How to use variable into script.

Immagine
  Bash Language. How to use variable into script. #bash #linux #programming #administrator #backend      

Perl Language and Markov Chain Example.

Immagine
Perl Language and Markov Chain Example. #perl #programming #mathematics #backend #encryption #genoma #bioinformatics #backend

Postgresql Administration. How to display execution plan query, for tuning query, indexes and others objects.

Immagine
  Postgresql Administration. How to display execution plan query, for tuning query, indexes and others objects. #postgresql #dba #database #administration #sql #pgsql #tuning #migration #aws #cloud

Ethical Hacking and Scanning Network for gathering Information Security Vulnerability, with tool 'nmap', under Windows

Immagine
  Ethical Hacking and Scanning Network for gathering Information Security Vulnerability, with tool 'nmap', under Windows. #nmap #cybersecurity #ethicalhacking #penetrationtesting #malware #ransomware #hacking

C Language with gcc compiler under Windows.

Immagine
C Language with gcc compiler under Windows. #gcc #c #windows #programming #shell #cmd

Mysql Administration. How to show Information Schema about Database of Users and Database System Default.

Immagine
  Mysql Administration. How to show Information Schema about Database of Users and Database System Default. #mysql #dba #database #administration #query #aws #cloud #migration #tuning      

Perl Language and foreach instruction.

Immagine
Perl Language and foreach instruction. An example. #perl #programming #backend #script

Cyber Security / Penetration Testing. How to perform a test for QR Codde app, if it can detect a threat about a malicious QR Code.

Immagine
  Cyber Security / Penetration Testing. How to perform a test for QR Codde app, if it can detect a threat about a malicious QR Code. #qrcode #ethicalhacking #cybersecurity #penetrationtesting #hacking #python #malware #virus #ransomware      

Sql Server Administration and How to Analyze Indexes, for Tuning.

Immagine
  Sql Server Administration and How to Analyze Indexes, for Tuning. #sqlserver #dba #database #sql #tsql #query #aws #cloud #azure #admiinistration #tuning #migration

Malware Analysis. In this example, show to analyze binary file with tool 'radare', to find a malicious code.

Immagine
  Malware Analysis. In this example, show to analyze binary file with tool 'radare', to find a malicious code. An example. #malware #ransomware #radare #reverseengineering #virus #cybersecurity #ethicalhacking #hacking @penetrationtesting

Mysql Administration. How to insert data by SQL file.

Immagine
  Mysql Administration. How to insert data by SQL file. #mysql #dba #administration #query #sql #database #migration #tuning      

C++ Language and Cyber Security. How to set boundary variable, for avoid attack exploit shellcode.

Immagine
  C++ Language and Cyber Security. How to set boundary variable, for avoid attack exploit shellcode. An example. #c ++ #g ++ #gcc #c # #programming #developer #cybersecurity #ethicalhacking #hacking #penetrationtesting #malware #spoofing #ransomware      

C++ Language and how to show dynamic allocation in byte about variable string.

Immagine
  C++ Language and how to show dynamic allocation in byte about variable string. #c #gcc #c ++ #g ++ #programming #developer #unix #linux #windows        

Sql Server Administration and DMV query for monitoring performance. An example.

Immagine
  Sql Server Administration and DMV query for monitoring performance. An example. #sqlserver #dba #query #tsql #monitoring #performance #cloud #aws #azure #database #administration

Ethical Hacking/Cyber Security. How to test malicious cert SSL for your site.

Immagine
  Ethical Hacking/Cyber Security. How to test malicious cert SSL for your site. An example. #ethicalhacking #cybersecurity #hacking #malware #ramsomware #ssl #deepweb #bitcoin #darknet #virus #cryptography      

Postgresql Administrator and Performance. Use pg_stat functions to show information about objects stored, wit_event_type and others useful information fo admin.

Immagine
  Postgresql Administrator and Performance. Use pg_stat functions to show information about objects stored, wit_event_type and others useful information fo admin. #dba #postgresql #pgsql #sql #backend #aws #cloud #query #database #administration #pg_stat #performance      

C Language and Mathematics Goldbach Conjecture.

Immagine
  C Language and Mathematics Goldbach Conjecture. An example. #c #gcc #mathematics #goldbach #programming #linux #unix #windows #backend #research #physics