Post

Ethical Hacking and Scanning with tool 'nmap', in modality 'stealth'.

Immagine
  Ethical Hacking and Scanning with tool 'nmap', in modality 'stealth'. An example. #cybersecurity #ethicalhacking #hacking #nmap #penetrationtesting #malware #virus #Ransomware

Sql Server Administration and In Memory Optimized. How to create a table with memory optimized.

Immagine
  Sql Server Administration and In Memory Optimized. How to create a table with memory optimized. #inmemory #optimized #sqlserver #sql #query #tsql #dba #database #administration #backend #server #aws #cloud

Mysql Administration. How to create a Stored Procedure for paging result, with 'while' instruction

Immagine
  Mysql Administration. How to create a Stored Procedure for paging result, with 'while' instruction. #mysql #dba #database #administration #aws #cloud #onpremise #query #stored #sql #backend #server

Postgresql Administration. How to insert data by STDIN command.

Immagine
  Postgresql Administration. How to insert data by STDIN command. #stdin #postgresql #sql #pgsql #dba #database #administration #tuning #migration #query        

Perl Language. How to create a package for reuse.

Immagine
Perl Language. How to create a package for reuse. #perl #programming #script #linux #windows #server #aws #cloud #backend        

Sql Server Administration. How to find Session ID and gathering information about it.

Immagine
Sql Server Administration. How to find Session ID and gathering information about it. #sqlserver #sql #dba #database #tsql #query #administrator #aws #cloud #tuning #migration

Postgresql Administration How to use CTE query.

Immagine
Postgresql Administration How to use CTE query. #postgresql #cte #query #dba #database #administration #pgsql