Post

Ethical Hacking and old alive undernet 'IRC'.

Immagine
  Ethical Hacking and old alive undernet 'IRC'. #irc #ethicalhacking #programming #cybersecurity #hacking #oldnetwork #dinosaurs #linux #unix      

C++ and Permutaions Statistics.

Immagine
  C++ and Permutaions Statistics. Below an example. #c ++ #g ++ #gcc #c #statistics #mathematics #programming #permutation #datamining #neuralweight #backend #research #cryptography #encryption #cybersecurity #ethicalhacking      

Postgresql Administration. How to manage two tables, which are the same, as if they were different.

Immagine
  Postgresql Administration. How to manage two tables, which are the same, as if they were different. Example. #postgresql #dba #database #sql #query #bigdata #crosstable #join #unix #linux #psql #pgsql    

Forensic / Ethical Hacking. In this example use tool open source Volatility Framework , for analyze use of memory about program and device.

Immagine
  Forensic / Ethical Hacking. In this example use tool open source Volatility Framework , for analyze use of memory about program and device. #forensic #python #ethicalhacking #malware #volatility #memory #cybersecurity #vol #unix #linux #kali #scanning #shell #bash      

Perl Language and connection to Mysql Database, with extraction data.

Immagine
  Perl Language and connection to Mysql Database, with extraction data. #perl #reporting #mysql #dbi #dba #sql #query #bigdata #unix #linux #shell #bash #database      

Ethical Hacking and analyze traffic to search trojan/malware, between host and remote.

Immagine
  Ethical Hacking and analyze traffic to search trojan/malware, between host and remote. Example. #trojan #malware #ethicalhacking #cybersecurity #penetrationtesting #hacking #sniffer #network #ransomware #tcpdump #telnet      

Perl Language and split array in single variable.

Immagine
Perl Language and split array in single variable. Example. #perl #array #string #backend #fullstack #bioinformatics #research #reporting #unix #linux #shell #bash