Cerca
Heus ací els resultats de la cerca.
Noms de pàgina coincidents:
- DevOps
- Curso PUE DevOps 2022
- Ethical Hacker
- Google Cloud Associate Cloud Enginer (234)
- LPIC1 (PUE)
- LPIC2 (PUE Incompleto)
- LPIC2 (PUE 2021)
- Curso python PUE 2022
- Curso python (PCPP1) PUE 2023
- Sesión1: Docker
- Sesión 2: Docker
- Sesión 3 : swarm
- Sesión 4 : swarm (ELK+TIG)
- Sesión 5: vagrant, ansible
- Sesión 6 : ansible
- Sesión 7: Seguridad, Prometheus
- Sesión 8 : kubernetes
- Sesión 9 : kubernetes, Jenkins
- Sesión 10 Jenkins
- Sesión 11 Jenkins
- Sesión 12 : k8s (traefik)
- sesión 13 ELK
- sesión 14 OpenStack
- Sesión 15 examen
- Sesión 16 prometheus on kubernetes
- DevOps Sesión 0 (2022-02-00)
- DevOps Sesión 1 (2022-02-09) Docker
- DevOps Sesión 2 (2022-02-14) Docker
- DevOps Sesión 3 (2022-02-16) Docker
- DevOps Sesión 4 (2022-02-21) Traefik, Swarm
- DevOps Sesión 5 (2022-02-23) Swarm
- DevOps Sesión 6 (2022-02-28) k8s
- DevOps Sesión 7 (2022-03-02) k8s
- DevOps Sesión 8 (2022-03-07) k8s
- DevOps Sesión 9 (2022-03-09) Vagrant
- DevOps Sesión 10 (2022-03-14) Vagrant + Packer
- DevOps Sesión 11 (2022-03-16) Ansible
- DevOps Sesión 12 (2022-03-21)
- DevOps Sesión 13 (2022-03-23) Ansible
- DevOps Sesión 14 (2022-03-28) Ansible + ELK
- DevOps Sesión 15 (2022-03-30) ELK
- Ethical Hacker : extras
- Ethical Hacker : sesión 1
- Ethical Hacker : sesión 2
- Ethical Hacker : sesión 3
- Ethical Hacker : sesión 4
- Ethical Hacker : sesión 5
- Ethical Hacker : shellgpt
- Google Cloud Associate Cloud Enginer Sesión 0 (2022-11-00)
- Google Cloud Associate Cloud Enginer Sesión 1 (2022-11-14)
- Google Cloud Associate Cloud Enginer Sesión 2 (2022-11-16)
- Architecting with Google Compute Engine Sesión 3 (2022-11-21)
- Google Cloud Associate Cloud Enginer Sesión 4 (2022-11-23)
- Google Cloud Associate Cloud Enginer Sesión 5 (2022-11-28)
- 101.1 Determinar y configurar parámetros de hardware
- 103.1 - línea de comando
- 103.2 - filtros
- flujos, pipes y redirecciones
- 103.5 Crear, monitorizar y destruir procesos
- 103.6 - Modificar las prioridades de ejecución de procesos
- Expresiones Regulares
- LPIC2 2021 Sesión 0: Preparativos (2021-02-02)
- LPIC2 2021 Sesión 1 (2021-02-02) - Utils info
- LPIC2 2021 Sesión 2 (2021-02-04) - info, procesos, logs, hard
- LPIC2 2021 Sesión 3 (2021-02-09) - procesos, kernel, systemd/systemv, modulos
- LPIC2 2021 Sesión 4 (2021-02-11) - systemd, journal
- LPIC2 2021 Sesión 5 (2021-02-16) - discos
- LPIC2 2021 Sesión 6 (2021-02-18) - lvm
- LPIC2 2021 Sesión 7 (2021-02-23) - raid, networking
- LPIC2 2021 Sesión 8 (2021-02-25)
- LPIC2 2021 Sesión 9 (2021-03-02)
- LPIC2 2021 Sesión 10 (2021-03-04)
- LPIC2 2021 Sesión 11 (2021-03-09)
- LPIC2 2021 Sesión 12 (2021-03-11)
- LPIC2 2021 Sesión 13 (2021-03-16)
- LPIC2 2021 Sesión 14 (2021-03-18)
- LPIC2 2021 Sesión 15 (2021-03-23)
- Python Sesión 0 (2022-05-00)
- Python Sesión 1 (2022-05-24)
- Python Sesión 9 (2022-06-21)
- Apuntes SinCara Extras
- Apuntes SinCara Extras IPSec
- Apuntes SinCara Extras Privacidad
- Apuntes SinCara Extras systemd
- Apuntes SinCara Extras XSS, CSRF y SSRF
- Lab Module 0 : Integrate ShellGPT in Parrot Security Machine
- Lab Module 02: Footprinting and Reconnaissance
- Lab Modulo 03
- Lab Modulo 04
- Lab Modulo 05
- Apuntes SinCara sesión 1
- Lab Module 06: Sytem hacking
- Lab Module 07
- Lab Module 08: Perform Active Sniffing
- Apuntes SinCara sesión 2
- Lab Module 09: Social Engineering
- Apuntes SinCara sesion 3
- Lab Module 10
- Lab Modulo 11 - Session Hijacking
- Lab Module 12: Perform Intrusion Detection using Various Tools
- Lab Module 13
- Apuntes SinCara sesión 4
- Lab Module 18 IoT and OT Hacking
- Lab Module 19 Cloud Computing
- Lab Module 20 Cryptography
- Apuntes SinCara sesión 5
- configuracion red avanzada
- configuración básica de red
- dhcp
- 1.1 Classes, Instances, Attributes, Methods — introduction
- 1.2 Working with class and instance data – instance variables
- 2.1 Python core syntax
- 2.2 Inheritance and polymorphism — Inheritance as a pillar of OOP
- 2.3 Extended function argument syntax
- 2.4 Decorators
- 2.5 Different faces of Python methods
- 2.6 Abstract classes
- 2.7 Encapsulation
- 2.8 Composition vs Inheritance - two ways to the same destination
- 2.9 Inheriting properties from built-in classes
- 3.1 Advanced techniques of creating and serving exceptions
- 4.1 Shallow and deep copy operations
- 4.2 Serialization of Python objects using the pickle module
- 4.3 Making Python objects persistent using the shelve module
- 5.1 Metaprogramming
- 1.1 What is PEP?
- 2.1 PEP 20 – The Zen of Python
- 3.1 PEP 8 – Introduction
- 4.1 PEP 257 – Docstring Conventions
- Python Professional Course Series: GUI Programming
- 1.2 Let TkInter speak!
- 1.3 Settling widgets in the window's interior
- 1.4 Coloring your widgets
- 1.5 A simple GUI application
- 1.6 Events and how to handle them
- 1.7 Visiting widgets’ properties
- 1.8 Interacting with widget methods
- 1.9 Looking at variables
- 2.1 A small lexicon of widgets - Part 1
- 2.2 A small lexicon of widgets - Part 2
- 2.3 A small lexicon of widgets - Part 3
- 2.4 Shaping the main window and conversing with the user
- 2.5 Working with the Canvas
- 1.1 Python Professional Course Series: RESTful APIs
- 1.2 How to use sockets in Python
- 1.3 JSON – our new friend
- 1.4 Talking to JSON in Python
- 1.5 What is XML and why do we prefer to use JSON?
- 1.6 Making life easier with the requests module
- 1.7 Four magic letters: CRUD
- 2.1 Python Professional Course Series: Lab & Assessment
- 1.1 SQLite
- 2.1 File processing - XML files
- 3.1 The CSV module in Python
- 4.1 Logging in Python
- 5.1 The configparser module
Resultats de text complet:
- Ethical Hacker : sesión 4 @info:cursos:pue:ethical-hacker
- = Ethical Hacker : sesión 4 * [[info:cursos:pue:ethical-hacker:sesion4]] == clase * Modulo 14 *... logearse en una web * same-site * command injection * shell * html * file * LDAP injection * XSS en comentarios (tipo 2) * ev... para saber si es correcto o no * XXE * invocación desde XML a una petición de fichero/recur
- 1.1 SQLite @info:cursos:pue:python-pcpp1:m5
- ocial applications such as Facebook, Twitter, and Instagram are very popular. Every day many people cr... Do you know how that’s possible? Data is simply information about users, the contents of their posts, and comments. The data are all kinds of information that we can send to the application. Dur... visible to other users. Sent data should be saved in some place that can be easily accessed. This plac
- 4.1 PEP 257 – Docstring Conventions @info:cursos:pue:python-pcpp1:m2
- ed with documenting Python code using docstrings. In short, it tries to answer the following two quest... string literal that occurs as the first statement in a module, function, class, or method definition. ... _'' special attribute of that object." (PEP 257) In other words, docstrings are Python **documentation strings** that are used in the class, module, function, and method definitio
- 3.1 PEP 8 – Introduction @info:cursos:pue:python-pcpp1:m2
- = 3.1 PEP 8 – Introduction As mentioned earlier, PEP 8 is a document that provides coding conventions ... ng projects may adopt their own style guidelines (in which case such project-specific guidelines may b... the conventions provided for by PEP 8, especially in the case of any conflicts, or backwards-compatibi... , additional conventions are being identified and included in it, and at the same time some old conven
- Apuntes SinCara Extras systemd @info:cursos:pue:ethical-hacker:extras
- Apuntes SinCara Extras systemd == Consideraciones iniciales * Se presenta el 30 de abril de 2010, por Lennart Poetterig * SystemD es un sistema de inicio y administración de servicios. * Reemplaza los sistemas de inicio tradicionales como SysV init o Upstart (de Canonical / Ubuntu) * Se enfoca en la eficiencia, la
- 5.1 Metaprogramming @info:cursos:pue:python-pcpp1:m1
- = 5.1 Metaprogramming == Introduction to metaclasses Metaprogramming is a programming technique in which computer programs have the ability to modif... tion story, but the idea was born and implemented in the early 1960s. For Python, code modifications ... tocol. It may look like syntactic sugar, because in many cases metaprogramming allows programmers to
- 2.9 Inheriting properties from built-in classes @info:cursos:pue:python-pcpp1:m1
- = 2.9 Inheriting properties from built-in classes Python gives you the ability to create a class that inherits properties from any Python built-in class in order to get a new class that can enrich the paren
- Apuntes SinCara sesión 1 @info:cursos:pue:ethical-hacker:sesion1
- ara sesión 1 == Modulo 01 * El CIO (Director de Información), es el gerente de sistemas o director de tecnologías de la información (responsable de TI). Reporta directament... ación que están alineadas con la tecnología de la información para lograr los objetivos planificados. ... ativa. * El CISO (Director de Seguridad de la Información) es el director de seguridad de la infor
- 2.1 PEP 20 – The Zen of Python @info:cursos:pue:python-pcpp1:m2
- rote this 19-line poem on the Python mailing list in 1999, and it became entry #20 in the Python Enhancement Proposals in 2004. It’s one of the //Easter eggs// (i.e., hidden, secret messages or features) included in the Python interpreter. Now let’s see t
- 2.2 Inheritance and polymorphism — Inheritance as a pillar of OOP @info:cursos:pue:python-pcpp1:m1
- = 2.2 Inheritance and polymorphism — Inheritance as a pillar of OOP Inheritance is one of the fundamental concepts of object oriented program... ses (parents) and their subclasses (descendants). Inheritance creates a class hierarchy. Any object bo
- 2.1 Python core syntax @info:cursos:pue:python-pcpp1:m1
- tions that allow us to operate on strings, lists, integers, and floats. It’s natural for us to formula... senting operators, or to get a number of elements in a sequence or dictionary. We are able to add two or more strings together, which results in the strings’ concatenation; we are able to add integers and we know what the result should be, all do
- 3.1 Advanced techniques of creating and serving exceptions @info:cursos:pue:python-pcpp1:m1
- ced techniques of creating and serving exceptions In this module, we'll talk about Python exceptions –... am that disrupts the normal flow of the program's instructions. Plan for the module: * short introduction to exceptions; * review of the named attributes of exception objects; * introduction to chained exceptions; * analysis of
- Lab Module 18 IoT and OT Hacking @info:cursos:pue:ethical-hacker:sesion5
- arious Footprinting Techniques === Task 1: Gather Information using Online Footprinting Tools - Laun... main Lookup page appears; type www.oasis-open.org in the search field and click SEARCH. \\ {{:info:cursos:pue:ethical-hacker:sesion5:pasted:20250221-01174... 5.0 standard, which represents a significant leap in the refinement and capability of the messaging pr
- 1.7 Four magic letters: CRUD @info:cursos:pue:python-pcpp1:m4
- xisting/malformed address We’ve reached the point in which we are ready to gather all new facts and tools and glue all these pieces into one functional block. You already know how HTTP... store and publish fancy images and funny videos. In fact, a properly trained web server can be a very... ther services designed for storing and processing information. Moreover, the structure of the database
- 1.2 Working with class and instance data – instance variables @info:cursos:pue:python-pcpp1:m1
- = 1.2 Working with class and instance data – instance variables == Instance variables This kind of variable exists when and only when it is explicitl... o an object. This can be done during the object's initialization, performed by the __init__ method, or
- LPIC2 2021 Sesión 3 (2021-02-09) - procesos, kernel, systemd/systemv, modulos @info:cursos:pue:lpic2-2021
- Lab Module 0 : Integrate ShellGPT in Parrot Security Machine @info:cursos:pue:ethical-hacker:sesion1