Post

Linux Administration. How to search target in log Journal of Operating System.

Immagine
  Linux Administration. How to search target in log Journal of Operating System. #linux #administration #backend #aws #server #onpremise #journal #grep

Postgresql Administration. How to set TimeZone by Now() function in cast.

Immagine
  Postgresql Administration. How to set TimeZone by Now() function in cast. #postgresql #pgsql #query #dba #database #administration #backend

Sql Server Administration/ T-SQL. How to determine multiply conditions in having instruction.

Immagine
  Sql Server Administration/ T-SQL. How to determine multiply conditions in having instruction. #sql #sqlserver #dba #database #tsql #query #backend #administration

Ethical Hacking. How to test LSASS on your System Windows, with tool 'metasploit'.

Immagine
  Ethical Hacking. How to test LSASS on your System Windows, with tool 'metasploit'. An example. #metasploit #ethicalhacking #cybersecurity #hacking #lsass #malware #ransomware

Sql Server Administration. How to perform Backup full + differential.

Immagine
  Sql Server Administration. How to perform Backup full + differential. #sqlserver #sql #tsql #backup #server #administration #dba #query #cloud #aws #onpremise

C Language and Cryptography.In this example, show hot to convert an ASCII string into binary number, and then I create a key that you can use for cryptography.

Immagine
 C Language and Cryptography.In this example, show hot to convert an ASCII string into binary number, and then I create a key that you can use for cryptography. #c #gcc #linux #cryptography #cybersecurity #ethicalhacking  

Linux Scripting. In this example, show how to build a script code, in bash, for list files in folder and then, write report in text file.

Immagine
  Linux Scripting. In this example, show how to build a script code, in bash, for list files in folder and then, write report in text file. #linux #script #bash #administrator #backend #onpremise #aws #cloud