Post

Visualizzazione dei post da ottobre, 2021

Ethical Hacking and Scanning with tool 'nmap', in modality 'stealth'.

Immagine
  Ethical Hacking and Scanning with tool 'nmap', in modality 'stealth'. An example. #cybersecurity #ethicalhacking #hacking #nmap #penetrationtesting #malware #virus #Ransomware

Sql Server Administration and In Memory Optimized. How to create a table with memory optimized.

Immagine
  Sql Server Administration and In Memory Optimized. How to create a table with memory optimized. #inmemory #optimized #sqlserver #sql #query #tsql #dba #database #administration #backend #server #aws #cloud

Mysql Administration. How to create a Stored Procedure for paging result, with 'while' instruction

Immagine
  Mysql Administration. How to create a Stored Procedure for paging result, with 'while' instruction. #mysql #dba #database #administration #aws #cloud #onpremise #query #stored #sql #backend #server

Postgresql Administration. How to insert data by STDIN command.

Immagine
  Postgresql Administration. How to insert data by STDIN command. #stdin #postgresql #sql #pgsql #dba #database #administration #tuning #migration #query        

Perl Language. How to create a package for reuse.

Immagine
Perl Language. How to create a package for reuse. #perl #programming #script #linux #windows #server #aws #cloud #backend        

Sql Server Administration. How to find Session ID and gathering information about it.

Immagine
Sql Server Administration. How to find Session ID and gathering information about it. #sqlserver #sql #dba #database #tsql #query #administrator #aws #cloud #tuning #migration

Postgresql Administration How to use CTE query.

Immagine
Postgresql Administration How to use CTE query. #postgresql #cte #query #dba #database #administration #pgsql

C++ Language. How to handle vector of numbers.

Immagine
  C++ Language. How to handle vector of numbers. An example. #c #gcc #g ++ #c ++ #programming #vector #backend

Linux Administration. How to find file with filter on user. An example.

Immagine
  Linux Administration. How to find file with filter on user. An example. #find #linux #bash #script #programming #administration #aws #cloud #onpremise

Sql Server Administration. How to create an Index Clustered.

Immagine
Sql Server Administration. How to create an Index Clustered. #sqlserver #administration #sql #tsql #query #clustered #dba

Linux Administration. In this example, show how to use 'dmesg' command, for display ring buffer messages.

Immagine
  Linux Administration. In this example, show how to use 'dmesg' command, for display ring buffer messages. #linux #administration #dmesg #datacenter #aws #cloud #server #kernel

Python Language and Sql Server. How to connect and show data with 'pyodbc' and 'pandas' library.

Immagine
Python Language and Sql Server. How to connect and show data with 'pyodbc' and 'pandas' library. #python #sqlserver #connect #pandas #pyodbc #sql #dba #database #odbc

Postgresql Administration. How to create index with B-Tree Algorithm.

Immagine
  Postgresql Administration. How to create index with B-Tree Algorithm. #postgresql #administration #pgsql #sql #query #tuning

Ethical Hacking and DDOS Defence. How to Analize the datagram caught with tshark.

Immagine
Ethical Hacking and DDOS Defence. How to Analize the datagram caught with tshark. #ethicalhacking #cybersecurity #ddos #ransomware #malware #hacking #tshark #network  

MySql Database Tuning. How to perform an Analysis of Statement.

Immagine
  MySql Database Tuning. How to perform an Analysis of Statement. #mysql #database #dba #administrator #tuning #sql #query

Cyber Security and Threat Model. Threat modeling is a method for optimize the Cyber Security of network Company. These method, use an approach flow chart for gathering information, identify breach and mitigate effects of cyber-attacks.

Immagine
  Cyber Security and Threat Model. Threat modeling is a method for optimize the Cyber Security of network Company. These method, use an approach flow chart for gathering information, identify breach and mitigate effects of cyber-attacks. #threat #model #cybersecurity #hacking

Sql Server Administration. An example of Window Function.

Immagine
  Sql Server Administration. An example of Window Function. #sqlserver #dba #database #administration #query #tsql #window #backend #aws #rds #cloud #onpremise

Mysql Administrator. How to create Stored Procedure and show how to use.

Immagine
  Mysql Administrator. How to create Stored Procedure and show how to use. #mysql #dba #database #administrator #stored #procedure #query #sql #backend #aws #cloud #onpremise