Post

Visualizzazione dei post da gennaio, 2022

C Language on Linux and Postgresql Database. Below, and example which how to perform a connection with code C.

Immagine
  C Language on Linux and Postgresql Database. Below, and example which how to perform a connection with code C. #c #gcc #dba #database #postgresql #pgsql #sql #query #aws #onpremise #linux #programming #cloud

Linux Administration / Network Analysis. In this example, show how to analyze route of a path, with 'traceroute' command, which display every router reached up, and possibly loose packets or address unattainable.

Immagine
  Linux Administration / Network Analysis. In this example, show how to analyze route of a path, with 'traceroute' command, which display every router reached up, and possibly loose packets or address unattainable. #linux #administration #server #backend #network #onpremise #aws

Sql Server Administration. How to handle date with 'dateadd' function.

Immagine
  Sql Server Administration. How to handle date with 'dateadd' function. An example. #sqlserver #sql #query #dateadd #dba #database #administration #backend #onpremise #aws #cloud

Ethical Hacking & C++ Linux. Below, show a piece of C++ code for simulate an attack to subdomain target. Tipology attack DNS Attack Brute Force.

Immagine
  Ethical Hacking & C++ Linux. Below, show a piece of C++ code for simulate an attack to subdomain target. Tipology attack DNS Attack Brute Force. #c #gcc #c ++ #g ++ #linux #ethicalhacking #hacking #cybersecurity #malware

Postgresql Administration. How to configure a Partion Table, by pgsql.

Immagine
  Postgresql Administration. How to configure a Partion Table, by pgsql. #postgresql #dba #database #administration #pgsql #sql #query #onpremise #aws #cloud #backend

Linux Administration. How to use the command 'cut', for selection fields on file text or configuration.

Immagine
Linux Administration. How to use the command 'cut', for selection fields on file text or configuration. #linux #administration #cut #server #onpremise #aws #cloud #backend

Ethical Hacking/Cyber Security. Below, describe the threat of a DNS Attack Spoof.

Immagine
  Ethical Hacking/Cyber Security. Below, describe the threat of a DNS Attack Spoof. #dnsspoof #hacking #spoof #dns #ethicalhacking #cybersecurity #malware