Post

Blockchain is a robust and interesting technology, but is not free from cyber attack, especially for code errors. Below an example.

Immagine
Blockchain is a robust and interesting technology, but is not free from cyber attack, especially for code errors. Below an example. #blockchain #programming #hacking #cybersecurity #ethicalhacking #malware #osint #backend #aws #cloud #bitcoin      

C Language and Binary Search Elements. In this example, show how to search an element in array, with method binary tree.

Immagine
  C Language and Binary Search Elements. In this example, show how to search an element in array, with method binary tree. #c #gcc #binary #search #btree #programming #developer #unix #linux #backend      

Python Language and how to create reporting with file Excel, to do Business Intelligence.

Immagine
  Python Language and how to create reporting with file Excel, to do Business Intelligence. #python #numpy #pandas #businessintelligence #reporting #backend

Postgresql and Pentaho Tool ETL, for extraction and manipulation data. An example.

Immagine
  Postgresql and Pentaho Tool ETL, for extraction and manipulation data. An example. #PostgreSQL #pentaho #etl #extraction #manipulation #migration #reporting #businessintelligence #pgsql #plsql #dba #database #aws #cloud #rds      

BlockChain and IPFS (InterPlanetary File System). How to blockchain use IPFS for communication and storing.

Immagine
  BlockChain and IPFS (InterPlanetary File System). How to blockchain use IPFS for communication and storing. #blockchain #ipfs #storing #communication #ethicalhacking #hacking #cybersecurity #malware #ramsomware #aws #cloud      

C Language and Obfuscation code, for to get around fingerprint and scan tool. An example how to do work polymorphic Virus.

Immagine
  C Language and Obfuscation code, for to get around fingerprint and scan tool. An example how to do work polymorphic Virus. #c #gcc #obfs #obfuscation #programming #developer #ethicalhacking #cybersecurity #malware #polymorphic #virus #fingerprint #ramsoware      

Perl Language and CyberSecurity. In this example, show how to print a content of clipboard of Windows OS.

Immagine
  Perl Language and CyberSecurity. In this example, show how to print a content of clipboard of Windows OS. #perl #clipboard #cybersecurity #ethicalhacking #hacking #ethicalhacker #windows