Cerca
Heus ací els resultats de la cerca.
Noms de pàgina coincidents:
- DevOps
- Curso PUE DevOps 2022
- Ethical Hacker
- Google Cloud Associate Cloud Enginer (234)
- LPIC1 (PUE)
- LPIC2 (PUE Incompleto)
- LPIC2 (PUE 2021)
- Curso python PUE 2022
- Curso python (PCPP1) PUE 2023
- Sesión1: Docker
- Sesión 2: Docker
- Sesión 3 : swarm
- Sesión 4 : swarm (ELK+TIG)
- Sesión 5: vagrant, ansible
- Sesión 6 : ansible
- Sesión 7: Seguridad, Prometheus
- Sesión 8 : kubernetes
- Sesión 9 : kubernetes, Jenkins
- Sesión 10 Jenkins
- Sesión 11 Jenkins
- Sesión 12 : k8s (traefik)
- sesión 13 ELK
- sesión 14 OpenStack
- Sesión 15 examen
- Sesión 16 prometheus on kubernetes
- DevOps Sesión 0 (2022-02-00)
- DevOps Sesión 1 (2022-02-09) Docker
- DevOps Sesión 2 (2022-02-14) Docker
- DevOps Sesión 3 (2022-02-16) Docker
- DevOps Sesión 4 (2022-02-21) Traefik, Swarm
- DevOps Sesión 5 (2022-02-23) Swarm
- DevOps Sesión 6 (2022-02-28) k8s
- DevOps Sesión 7 (2022-03-02) k8s
- DevOps Sesión 8 (2022-03-07) k8s
- DevOps Sesión 9 (2022-03-09) Vagrant
- DevOps Sesión 10 (2022-03-14) Vagrant + Packer
- DevOps Sesión 11 (2022-03-16) Ansible
- DevOps Sesión 12 (2022-03-21)
- DevOps Sesión 13 (2022-03-23) Ansible
- DevOps Sesión 14 (2022-03-28) Ansible + ELK
- DevOps Sesión 15 (2022-03-30) ELK
- Ethical Hacker : extras
- Ethical Hacker : sesión 1
- Ethical Hacker : sesión 2
- Ethical Hacker : sesión 3
- Ethical Hacker : sesión 4
- Ethical Hacker : sesión 5
- Ethical Hacker : shellgpt
- Google Cloud Associate Cloud Enginer Sesión 0 (2022-11-00)
- Google Cloud Associate Cloud Enginer Sesión 1 (2022-11-14)
- Google Cloud Associate Cloud Enginer Sesión 2 (2022-11-16)
- Architecting with Google Compute Engine Sesión 3 (2022-11-21)
- Google Cloud Associate Cloud Enginer Sesión 4 (2022-11-23)
- Google Cloud Associate Cloud Enginer Sesión 5 (2022-11-28)
- 101.1 Determinar y configurar parámetros de hardware
- 103.1 - línea de comando
- 103.2 - filtros
- flujos, pipes y redirecciones
- 103.5 Crear, monitorizar y destruir procesos
- 103.6 - Modificar las prioridades de ejecución de procesos
- Expresiones Regulares
- LPIC2 2021 Sesión 0: Preparativos (2021-02-02)
- LPIC2 2021 Sesión 1 (2021-02-02) - Utils info
- LPIC2 2021 Sesión 2 (2021-02-04) - info, procesos, logs, hard
- LPIC2 2021 Sesión 3 (2021-02-09) - procesos, kernel, systemd/systemv, modulos
- LPIC2 2021 Sesión 4 (2021-02-11) - systemd, journal
- LPIC2 2021 Sesión 5 (2021-02-16) - discos
- LPIC2 2021 Sesión 6 (2021-02-18) - lvm
- LPIC2 2021 Sesión 7 (2021-02-23) - raid, networking
- LPIC2 2021 Sesión 8 (2021-02-25)
- LPIC2 2021 Sesión 9 (2021-03-02)
- LPIC2 2021 Sesión 10 (2021-03-04)
- LPIC2 2021 Sesión 11 (2021-03-09)
- LPIC2 2021 Sesión 12 (2021-03-11)
- LPIC2 2021 Sesión 13 (2021-03-16)
- LPIC2 2021 Sesión 14 (2021-03-18)
- LPIC2 2021 Sesión 15 (2021-03-23)
- Python Sesión 0 (2022-05-00)
- Python Sesión 1 (2022-05-24)
- Python Sesión 9 (2022-06-21)
- Apuntes SinCara Extras
- Apuntes SinCara Extras IPSec
- Apuntes SinCara Extras Privacidad
- Apuntes SinCara Extras systemd
- Apuntes SinCara Extras XSS, CSRF y SSRF
- Lab Module 0 : Integrate ShellGPT in Parrot Security Machine
- Lab Module 02: Footprinting and Reconnaissance
- Lab Modulo 03
- Lab Modulo 04
- Lab Modulo 05
- Apuntes SinCara sesión 1
- Lab Module 06: Sytem hacking
- Lab Module 07
- Lab Module 08: Perform Active Sniffing
- Apuntes SinCara sesión 2
- Lab Module 09: Social Engineering
- Apuntes SinCara sesion 3
- Lab Module 10
- Lab Modulo 11 - Session Hijacking
- Lab Module 12: Perform Intrusion Detection using Various Tools
- Lab Module 13
- Apuntes SinCara sesión 4
- Lab Module 18 IoT and OT Hacking
- Lab Module 19 Cloud Computing
- Lab Module 20 Cryptography
- Apuntes SinCara sesión 5
- configuracion red avanzada
- configuración básica de red
- dhcp
- 1.1 Classes, Instances, Attributes, Methods — introduction
- 1.2 Working with class and instance data – instance variables
- 2.1 Python core syntax
- 2.2 Inheritance and polymorphism — Inheritance as a pillar of OOP
- 2.3 Extended function argument syntax
- 2.4 Decorators
- 2.5 Different faces of Python methods
- 2.6 Abstract classes
- 2.7 Encapsulation
- 2.8 Composition vs Inheritance - two ways to the same destination
- 2.9 Inheriting properties from built-in classes
- 3.1 Advanced techniques of creating and serving exceptions
- 4.1 Shallow and deep copy operations
- 4.2 Serialization of Python objects using the pickle module
- 4.3 Making Python objects persistent using the shelve module
- 5.1 Metaprogramming
- 1.1 What is PEP?
- 2.1 PEP 20 – The Zen of Python
- 3.1 PEP 8 – Introduction
- 4.1 PEP 257 – Docstring Conventions
- Python Professional Course Series: GUI Programming
- 1.2 Let TkInter speak!
- 1.3 Settling widgets in the window's interior
- 1.4 Coloring your widgets
- 1.5 A simple GUI application
- 1.6 Events and how to handle them
- 1.7 Visiting widgets’ properties
- 1.8 Interacting with widget methods
- 1.9 Looking at variables
- 2.1 A small lexicon of widgets - Part 1
- 2.2 A small lexicon of widgets - Part 2
- 2.3 A small lexicon of widgets - Part 3
- 2.4 Shaping the main window and conversing with the user
- 2.5 Working with the Canvas
- 1.1 Python Professional Course Series: RESTful APIs
- 1.2 How to use sockets in Python
- 1.3 JSON – our new friend
- 1.4 Talking to JSON in Python
- 1.5 What is XML and why do we prefer to use JSON?
- 1.6 Making life easier with the requests module
- 1.7 Four magic letters: CRUD
- 2.1 Python Professional Course Series: Lab & Assessment
- 1.1 SQLite
- 2.1 File processing - XML files
- 3.1 The CSV module in Python
- 4.1 Logging in Python
- 5.1 The configparser module
Resultats de text complet:
- Ethical Hacker : sesión 4 @info:cursos:pue:ethical-hacker
- * OWASP - [[https://owasp.org]] * asociación sin ánimo de lucro * proyectos relacionados con s... server and the complete information about the domain such as its registration details, name servers, I... arget organization. DNS zone data include DNS domain names, computer names, IP addresses, domain mail servers, service records, etc. - Use tools such as
- 4.1 PEP 257 – Docstring Conventions @info:cursos:pue:python-pcpp1:m2
- ed with documenting Python code using docstrings. In short, it tries to answer the following two questions: - What should Python docstrings contain? - How should Python docstrings be used? == Wh... string literal that occurs as the first statement in a module, function, class, or method definition. ... _'' special attribute of that object." (PEP 257) In other words, docstrings are Python **documentatio
- 1.1 SQLite @info:cursos:pue:python-pcpp1:m5
- our account data, consisting of email address, login, and password, and when you add new posts you sen... visible to other users. Sent data should be saved in some place that can be easily accessed. This plac... e, which is a set of information stored on a disk in a computer system. Access to the database is poss... le Database, Microsoft SQL Server, IBM DB2 Later in this course, we'll focus mainly on the SQLite sys
- 3.1 PEP 8 – Introduction @info:cursos:pue:python-pcpp1:m2
- ng projects may adopt their own style guidelines (in which case such project-specific guidelines may b... the conventions provided for by PEP 8, especially in the case of any conflicts, or backwards-compatibi... nal conventions are being identified and included in it, and at the same time some old conventions are... d discouraged from being followed. == The Hobgoblin of Little Minds ”A foolish consistency is the hob
- 2.3 A small lexicon of widgets - Part 3 @info:cursos:pue:python-pcpp1:m3
- first one is just a widget, while the second is, in fact, a **set of cooperating widgets**. The ''En... :pasted:20231228-112626.png}} Our sample program in the editor shows you how to use an **observable v... submenu) * if you want to have such a menu within your Tkinter application, you have to: * **cr... ck which displays the About dialog; * line 9: main window creation (nothing special at all) * line
- 1.7 Four magic letters: CRUD @info:cursos:pue:python-pcpp1:m4
- xisting/malformed address We’ve reached the point in which we are ready to gather all new facts and to... store and publish fancy images and funny videos. In fact, a properly trained web server can be a very... , it may be a simple relational database residing in a single file, or on the contrary, a huge, distri... or. Thanks to it, very different programs written in very different technologies can utilize shared da
- 2.1 PEP 20 – The Zen of Python @info:cursos:pue:python-pcpp1:m2
- rote this 19-line poem on the Python mailing list in 1999, and it became entry #20 in the Python Enhancement Proposals in 2004. It’s one of the //Easter eggs// (i.e., hidden, secret messages or features) included in the Python interpreter. Now let’s see the magic.
- 2.1 File processing - XML files @info:cursos:pue:python-pcpp1:m5
- 2.1 File processing - XML files == XML processing in Python Python is commonly used to process various... rammer, you'll have to read or create a data file in the XML format. Soon, doing that will be a piece ... ferent, because it's parsed into a tree structure in which each node is an object. * **xml.sax** – S... nym for “Simple API for XML”. SAX is an interface in Python for event-driven XML document analysis. Un
- 4.1 Logging in Python @info:cursos:pue:python-pcpp1:m5
- = 4.1 Logging in Python == Logging in Python The Python Standard Library provides a useful module called ''logging'' to log events occurring in the application. Logs are most often used to find... something goes wrong, you'll be able to determine in which browsers the problem is occurring. In Pyth
- 2.4 Decorators @info:cursos:pue:python-pcpp1:m1
- thout directly modifying it. Decorators are used in: * the validation of arguments; * the modifi... st functions we could think of. We'll decorate it in a moment. <code python> def simple_hello(): ... he whole code should look like the code presented in the right pane. When you run the code, the resul... her lines? Where is the simplicity or convenience in this approach? Well … we could say … you should
- 3.1 Advanced techniques of creating and serving exceptions @info:cursos:pue:python-pcpp1:m1
- ced techniques of creating and serving exceptions In this module, we'll talk about Python exceptions –... ay vary across different Python versions.)) built-in exceptions, and they can be represented in the form of a tree-shaped hierarchy. The reason for this i... lock to surround the "problematic" piece of code. In effect, when the exception is raised, execution i
- 5.1 Metaprogramming @info:cursos:pue:python-pcpp1:m1
- lasses Metaprogramming is a programming technique in which computer programs have the ability to modif... tion story, but the idea was born and implemented in the early 1960s. For Python, code modifications ... tocol. It may look like syntactic sugar, because in many cases metaprogramming allows programmers to ... he number of lines of code to express a solution, in turn reducing development time. But the truth is
- Lab Module 18 IoT and OT Hacking @info:cursos:pue:ethical-hacker:sesion5
- we are using Mozilla Firefox). - The Whois Domain Lookup page appears; type www.oasis-open.org in the search field and click SEARCH. \\ {{:info:cursos:... 5.0 standard, which represents a significant leap in the refinement and capability of the messaging pr... s, displaying the following information, as shown in the screenshots: Domain Information, Registrant C
- 3.1 The CSV module in Python @info:cursos:pue:python-pcpp1:m5
- = 3.1 The CSV module in Python == The CSV module in Python The CSV (Comma Separated Values) format is one of the most popular... nd the popular Excel offer data import and export in this format. The CSV file is a plain text file with the .csv extension. A typical file contains comm
- 1.2 How to use sockets in Python @info:cursos:pue:python-pcpp1:m4
- = 1.2 How to use sockets in Python == How to fetch a document from a server using Python We are going ... function and **fetches the root document** (the main HTML document of the WWW site) of the specified s... - **receive the server's response** (it will contain the requested root document of the site) - **cl... 0108-104229.png }} === Importing a socket We are in need - we need a socket. How do we obtain a socke
- LPIC2 2021 Sesión 3 (2021-02-09) - procesos, kernel, systemd/systemv, modulos @info:cursos:pue:lpic2-2021
- Lab Module 0 : Integrate ShellGPT in Parrot Security Machine @info:cursos:pue:ethical-hacker:sesion1