Post

Visualizzazione dei post da febbraio, 2022

Ethical Hacking. How to test LSASS on your System Windows, with tool 'metasploit'.

Immagine
  Ethical Hacking. How to test LSASS on your System Windows, with tool 'metasploit'. An example. #metasploit #ethicalhacking #cybersecurity #hacking #lsass #malware #ransomware

Sql Server Administration. How to perform Backup full + differential.

Immagine
  Sql Server Administration. How to perform Backup full + differential. #sqlserver #sql #tsql #backup #server #administration #dba #query #cloud #aws #onpremise

C Language and Cryptography.In this example, show hot to convert an ASCII string into binary number, and then I create a key that you can use for cryptography.

Immagine
 C Language and Cryptography.In this example, show hot to convert an ASCII string into binary number, and then I create a key that you can use for cryptography. #c #gcc #linux #cryptography #cybersecurity #ethicalhacking  

Linux Scripting. In this example, show how to build a script code, in bash, for list files in folder and then, write report in text file.

Immagine
  Linux Scripting. In this example, show how to build a script code, in bash, for list files in folder and then, write report in text file. #linux #script #bash #administrator #backend #onpremise #aws #cloud

Ethical Hacking/ Cyber Security. How it is performed an attack Swap Sim.

Immagine
  Ethical Hacking/ Cyber Security. How it is performed an attack Swap Sim. #ethicalhacking #cybersecurity #hacking #malware #phishing #ransomware