Cerca
Heus ací els resultats de la cerca.
Noms de pàgina coincidents:
Resultats de text complet:
- Ethical Hacker : sesión 4 @info:cursos:pue:ethical-hacker
- * OWASP - [[https://owasp.org]] * asociación sin ánimo de lucro * proyectos relacionados con s... = Task 1: Perform Web Application Reconnaissance using Nmap and Telnet - Perform a Whois lookup to ga... 51.png?500}} ==== Task 2: Perform Web Spidering using OWASP ZAP - In the Terminal window, type zapro... : Perform Web Application Vulnerability Scanning using SmartScanner - SmartScanner window appears. In
- 3.1 PEP 8 – Introduction @info:cursos:pue:python-pcpp1:m2
- PEP 8 style guidelines. The online tool is built using Flask, Twitter Bootstrap, and the PEP8 module (t... ons related to such things as: * indentation, using tabs and spaces; * line length, line breaks, a... you want to improve readability) are allowed if using parentheses/brackets/braces: <code python ❌> # ... locks of code more easily. In the same fashion, using too many blank lines in your code will make it l
- 2.1 File processing - XML files @info:cursos:pue:python-pcpp1:m5
- = 2.1 File processing - XML files == XML processing in Python Python is commonly used to process various types of data. Per... plementation of the Document Object Model (DOM). Using the DOM, the approach to an XML document is slig... e above modules, analyzing a simple XML document using this module requires more work. In this course,
- Lab Module 20 Cryptography @info:cursos:pue:ethical-hacker:sesion5
- = Lab Module 20 Cryptography With the increasing adoption of the Internet for business and personal communication, securing sensitive information such... t numbers, and private messages is becoming increasingly important, and yet, more difficult to achieve.... ties. Thus, data security is critical to online businesses and privacy of communication. Cryptography
- Python Professional Course Series: GUI Programming @info:cursos:pue:python-pcpp1:m3
- to it was usually thick and stiff. It's not surprising that the light pen didn't conquer the market. T... ce to utilize. The user's answer was given by pressing a set of allowed keys. Simple? Simple. From our ... . == Widgets The user interacts with the GUI by using gestures: a mouse's movements, clicks targeting ... Touch screens may offer something more: tapping (single or double or even more complex), swiping, and
- Lab Module 18 IoT and OT Hacking @info:cursos:pue:ethical-hacker:sesion5
- oT and OT Hacking == Lab 1: Perform Footprinting using Various Footprinting Techniques === Task 1: Gather Information using Online Footprinting Tools - Launch any web bro... go to https://www.whois.com/whois (here, we are using Mozilla Firefox). - The Whois Domain Lookup pa... gather additional information on a target device using the following Shodan filters: - Search for M
- 2.1 PEP 20 – The Zen of Python @info:cursos:pue:python-pcpp1:m2
- adjusted to the specificity** of your project. Using a plane to transport yourself to a nearby shop c... mple one, especially in the case of the latter causing misunderstanding, doubt, or misinterpretation. You should avoid those. On the other hand, complex is... ll be good, but anything beyond that becomes confusing and unreadable. Even though you can actually ha
- 4.1 Logging in Python @info:cursos:pue:python-pcpp1:m5
- eful to you or other programmers. An example of using your own logs can be any Internet system. When u... t of the course, you'll learn how to create logs using the logging module. See what this module offers and start using it to become a better programmer. == The Logger... gged. It's worth mentioning that loggers created using the name argument have the ''NOTSET'' level set
- 1.1 SQLite @info:cursos:pue:python-pcpp1:m5
- oftware? == How to work with an SQLite database using Python You've probably already used the standard... at will allow you to create amazing applications using SQLite databases. Can you guess what it’s called... : The sqlite3 module has been available in Python since version 2.5. == sqlite3 – creating a database As we already said, the SQLite database is a single file, which is saved on your computer. Each fi
- 5.1 The configparser module @info:cursos:pue:python-pcpp1:m5
- tion with these services requires authentication using data such as a login and password, or simply an ... ailable in the Python standard library. To start using it, we need to import the appropriate module: <... In a moment, you'll learn how to read this data using the ''configparser'' module. **NOTE**: The whit... ing and end of keys and values is removed. == Parsing the configuration file Parsing the configuration
- Apuntes SinCara sesión 1 @info:cursos:pue:ethical-hacker:sesion1
- = Apuntes SinCara sesión 1 == Modulo 01 * El CIO (Director de Información), es el gerente de sistemas... * La IA abarca no sólo las protecciones digitales sino también las técnicas físicas. Estas protecciones... ros de scans.io y consultar en estos directamente sin dejar rastros de tus búsquedas en las webs o tool... a.html - Distintas fuentes de Inteligencia * OSINT: * https://intelx.io/ - Buscador OSINT
- 4.1 PEP 257 – Docstring Conventions @info:cursos:pue:python-pcpp1:m2
- ations!) associated with documenting Python code using docstrings. In short, it tries to answer the fol... n be accessed by reading the source code, and by using the ''__doc__'' attribute or the ''help()'' function.| |The main purpose of comments is increasing the readability and understandability of the cod... he code's whys and hows, as this will make the reusing of and contributing to code much easier. So, we
- Ethical Hacker
- ]] * [[info:cursos:pue:ethical-hacker:sesion1:sincara]] * [[info:cursos:pue:ethical-hacker:sesi... ]] * [[info:cursos:pue:ethical-hacker:sesion2:sincara]] * [[info:cursos:pue:ethical-hacker:sesi... ]] * [[info:cursos:pue:ethical-hacker:sesion3:sincara]] * [[info:cursos:pue:ethical-hacker:sesi... ]] * [[info:cursos:pue:ethical-hacker:sesion4:sincara]] * [[info:cursos:pue:ethical-hacker:sesi
- 3.1 The CSV module in Python @info:cursos:pue:python-pcpp1:m5
- . However, for commercial projects, we recommend using an excellent library called ''pandas''. We encou... writing data in CSV format. Reading data is done using the ''reader'' object, while writing is done using the ''writer'' object. First, we'll take a closer look at reading data using the reader object. The ''reader'' function retu
- Lab Module 06: Sytem hacking @info:cursos:pue:ethical-hacker:sesion2
- ive Online Attack to Crack the System’s Password using Responder - ''sudo responder -I eth0'' -> capt... hash === Task 2: Gain Access to a Remote System using Reverse Shell Generator ==== cmd * ''docker ru... rivileges === Task 1: Escalate Privileges by Bypassing UAC and Exploiting Sticky Keys * PENDIENTE ==... Task 1: User System Monitoring and Surveillance using Spyrix === Task 2: Maintain Persistence by Modif
- LPIC2 2021 Sesión 3 (2021-02-09) - procesos, kernel, systemd/systemv, modulos @info:cursos:pue:lpic2-2021