Post

Visualizzazione dei post da dicembre, 2022

Linux Encryption. How to create private key with openssl tool, and extract a relative public key, for sharing.

Immagine
  Linux Encryption. How to create private key with openssl tool, and extract a relative public key, for sharing. #linux #administration #openssl #cybersecurity #encryption #cryptography #privatekey #publickey

Cyber Security / Ethical Hacking. How to find anomalies in Syn/Acknowledge message of Protocol TCP, to prevent FLOOD Attack (DDOS).

Immagine
  Cyber Security / Ethical Hacking. How to find anomalies in Syn/Acknowledge message of Protocol TCP, to prevent FLOOD Attack (DDOS). #tcp #ddos #hacking #cybersecurity #wireshark #prevent #monitoring

Oracle Administration. How to check CPU and Memory usage by user.

Immagine
  Oracle Administration. How to check CPU and Memory usage by user. #oracle #dba #database #plsql #sql #database #administration #cpu #memory

C Language on Linux. How to use clock of machine.

Immagine
  C Language on Linux. How to use clock of machine. #c #gcc #language #programming #clock #linux #unix

Postgresql Administration. The pageinspect module provides functions that allow you to inspect the contents of database pages at a low level.

Immagine
  Postgresql Administration. The pageinspect module provides functions that allow you to inspect the contents of database pages at a low level. #pageinspect #postgresql #dba #sql #pgplsql #administration #database #query #lowlevel

Linux Administration. How to show the TimeZone of the machine.

Immagine
  Linux Administration. How to show the TimeZone of the machine. #timezone #linux #administration #shell #bash #timedatectl

Cyber Security . How to Recognize an attack DDOS with Wireshark.

Immagine
  Cyber Security . How to Recognize an attack DDOS with Wireshark. #cybersecurity #ethicalhacking #hacking #ddos #attack #wireshark #sniffer

C Language and Mathematics. How to calculation the projectile trajectory.

Immagine
  C Language and Mathematics. How to calculation the projectile trajectory. #c #language #mathematics #physics #linux #gcc

Linux Encryption by Shell.

Immagine
  Linux Encryption by Shell. How to encrypt the text file. Steps: 1) cat on file; 2) pipe on shuf (Permutation); 3) pipe on openssl for encryption at aes-256 bit. #linux #encryption #cryptography