Cerca
Heus ací els resultats de la cerca.
Noms de pàgina coincidents:
- Sesión1: Docker
- Sesión 2: Docker
- Sesión 3 : swarm
- Sesión 4 : swarm (ELK+TIG)
- Sesión 5: vagrant, ansible
- Sesión 6 : ansible
- Sesión 7: Seguridad, Prometheus
- Sesión 8 : kubernetes
- Sesión 9 : kubernetes, Jenkins
- Sesión 10 Jenkins
- Sesión 11 Jenkins
- Sesión 12 : k8s (traefik)
- sesión 13 ELK
- sesión 14 OpenStack
- Sesión 15 examen
- Sesión 16 prometheus on kubernetes
- Ethical Hacker : sesión 1
- Ethical Hacker : sesión 2
- Ethical Hacker : sesión 3
- Ethical Hacker : sesión 4
- Ethical Hacker : sesión 5
- Apuntes SinCara Extras IPSec
- Lab Module 0 : Integrate ShellGPT in Parrot Security Machine
- Lab Module 02: Footprinting and Reconnaissance
- Lab Modulo 03
- Lab Modulo 04
- Lab Modulo 05
- Apuntes SinCara sesión 1
- Lab Module 06: Sytem hacking
- Lab Module 07
- Lab Module 08: Perform Active Sniffing
- Apuntes SinCara sesión 2
- Lab Module 09: Social Engineering
- Apuntes SinCara sesion 3
- Lab Module 10
- Lab Modulo 11 - Session Hijacking
- Lab Module 12: Perform Intrusion Detection using Various Tools
- Lab Module 13
- Apuntes SinCara sesión 4
- Lab Module 18 IoT and OT Hacking
- Lab Module 19 Cloud Computing
- Lab Module 20 Cryptography
- Apuntes SinCara sesión 5
Resultats de text complet:
- Ethical Hacker : sesión 4 @info:cursos:pue:ethical-hacker
- = Ethical Hacker : sesión 4 * [[info:cursos:pue:ethical-hacker:sesion4]] == clase * Modulo 14 * Modulo 15 * Modulo 16 * Modulo 17 == Modulo 14: Hacking Web A... n ánimo de lucro * proyectos relacionados con seguridad * Coraza - ModSecurity - set reglas pr
- Apuntes SinCara Extras systemd @info:cursos:pue:ethical-hacker:extras
- a Extras systemd == Consideraciones iniciales * Se presenta el 30 de abril de 2010, por Lennart Poetterig * SystemD es un sistema de inicio y administración de servicios. * Reemplaza los sistemas de inicio trad... o SysV init o Upstart (de Canonical / Ubuntu) * Se enfoca en la eficiencia, la rapidez y la robustez
- 1.7 Four magic letters: CRUD @info:cursos:pue:python-pcpp1:m4
- to gather all new facts and tools and glue all these pieces into one functional block. You already kno... mounted on top of the TCP stack and how the HTTP server is able to do much more for us than just stor... nd funny videos. In fact, a properly trained web server can be a very **effective and convenient gateway** to very complicated and heavy databases or other services designed for storing and proce
- 1.2 How to use sockets in Python @info:cursos:pue:python-pcpp1:m4
- = 1.2 How to use sockets in Python == How to fetch a document from a server using Python We are going to write our first program making use of network sockets. Of course, we'll harness Python for this purpose. Here are our goals: * we wa
- 1.1 SQLite @info:cursos:pue:python-pcpp1:m5
- = 1.1 SQLite == What is a database? Nowadays, social applications such as Facebook, Twitter, and Insta... ay many people create new accounts, and existing users add or share different content. You’ve surely noticed that the data sent to those applications are still available after a few days, or even years. Do you know how that’s p
- 2.6 Abstract classes @info:cursos:pue:python-pcpp1:m1
- = 2.6 Abstract classes Python is considered to be a very flexible programming language, but that doesn’t mean that there are no controls to impose a set of functionalities or an order in a class hierarchy. When you develop a system in a group of programmers, it would be useful to have some means of establishing requirement
- 3.1 PEP 8 – Introduction @info:cursos:pue:python-pcpp1:m2
- may adopt their own style guidelines (in which case such project-specific guidelines may be favored o... ntions provided for by PEP 8, especially in the case of any conflicts, or backwards-compatibility issu... This is a quote from Ralph Waldo Emerson’s essay “Self-Reliance” where Emerson urges readers to be consistent in their beliefs and practices. In our case, it means we must not forget about one simple but
- 2.1 Python core syntax @info:cursos:pue:python-pcpp1:m1
- ormulate expressions using algebraic symbols representing operators, or to get a number of elements in a sequence or dictionary. We are able to add two or m... rator, but on respective data types. Now, we'll use the same function ''len()'' to get a number of el... operators when applied to our objects, so we can use core operators on our objects. Let's imagine the
- 1.6 Making life easier with the requests module @info:cursos:pue:python-pcpp1:m4
- rney – we know enough to communicate with the web service using JSON as an information carrier. Unfort... knowledge needs to be supplemented – we need a **server serving** a web **service** (sorry for all these serv..., we weren't able to avoid them) and we also nee
- 4.1 PEP 257 – Docstring Conventions @info:cursos:pue:python-pcpp1:m2
- outlines the **conventions**, best practices, and semantics (not laws or regulations!) associated with... ngs contain? - How should Python docstrings be used? == What are docstrings? A docstring is "a stri... gs are Python **documentation strings** that are used in the class, module, function, and method defin... ncluding you) to remember and understand the purpose, operation, and capabilities of particular code b
- Lab Module 18 IoT and OT Hacking @info:cursos:pue:ethical-hacker:sesion5
- Online Footprinting Tools - Launch any web browser, go to https://www.whois.com/whois (here, we are... okup page appears; type www.oasis-open.org in the search field and click SEARCH. \\ {{:info:cursos:pue:ethical-hacker:sesion5:pasted:20250221-011744.png?500}} - Oasis is an
- Apuntes SinCara sesión 1 @info:cursos:pue:ethical-hacker:sesion1
- = Apuntes SinCara sesión 1 == Modulo 01 * El CIO (Director de Información), es el gerente de sistema... esponsable de TI). Reporta directamente al CEO, y se encarga directamente de las estrategias de la org... r los objetivos planificados. * El CSO (Chief Security Officer) es el responsable de la seguridad de la organización. Al CSO a veces se le denomina re
- 5.1 Metaprogramming @info:cursos:pue:python-pcpp1:m1
- = 5.1 Metaprogramming == Introduction to metaclasses Metaprogramming is a programming technique in whi... protocol. It may look like syntactic sugar, because in many cases metaprogramming allows programmers to minimize the number of lines of code to express a... . But the truth is that this technique could be used for tool preparation; those tools could be appli
- Apuntes SinCara Extras Privacidad @info:cursos:pue:ethical-hacker:extras
- Frontier Foundation * https://ssd.eff.org/ - Consejos, herramientas y procedimientos de autodefensa de vigilancia para comunicaciones en línea más seguras. * https://sec.eff.org/ - Security Education Companion, un recurso gratuito para educadores de seguridad digital.
- 2.8 Composition vs Inheritance - two ways to the same destination @info:cursos:pue:python-pcpp1:m1
- ing the inheritance concept when modeling our classes to represent real-life issues. Inheritance is a great concept, one of the most important foundations... ming that models a tight relation between two classes: the base class and the derived class, called a subclass. The result of this relation is a subclass
- LPIC2 2021 Sesión 3 (2021-02-09) - procesos, kernel, systemd/systemv, modulos @info:cursos:pue:lpic2-2021