Post

Cyber Security and tool WireShark, for Traffic Analysis.

Immagine
  Cyber Security and tool WireShark, for Traffic Analysis. #wireshark #sniffer #network #ethicalhacker #hacking #trafficaanalysis #backend #malware #ransomware #virus #trojan    

C++ Language and "chrono" Library. In this example, show how to handle time system.

Immagine
  C++ Language and "chrono" Library. In this example, show how to handle time system. #c ++ #c #gcc #g ++ #programming #linux #backend #unix    

Postgresql Administration. How to search Class Object Index in the database.

Immagine
  Postgresql Administration. How to search Class Object Index in the database. #postgresql #dba #administration #pg_class #database #backend #aws #onpremise #sql #pgsql

Bash Scripting for Cyber Security and System Admin Linux. In this example, show the useful command 'trap', that execute the next command on exit signal.

Immagine
  Bash Scripting for Cyber Security and System Admin Linux. In this example, show the useful command 'trap', that execute the next command on exit signal. #bash #shell #script #programming #backend #ethicalhacker #cybersecurity #linux #sysadmin    

Sql Server Administration - T-SQL. An example how to use over partion for complex calculations.

Immagine
  Sql Server Administration - T-SQL. An example how to use over partion for complex calculations. #sqlserver #tsql #query #dba #sql #database #administration #backend #aws #cloud #onpremise #overpartition

C Language Linux. How to create a Static Library.

Immagine
  C Language Linux. How to create a Static Library. #c #gcc #library #static #programming #backend #linux

Perl Language and Bioinformatics. An example how to search a string for manipulation.

Immagine
  Perl Language and Bioinformatics. An example how to search a string for manipulation. #perl #programming #bioinformatics #grep #data #stream #dna #rna #research #backend #sed