linux

ftp

ciberseguridad

hacking

pentesting

hydra

consola

awk

comando

find

SSD

disco

Arch-Linux

principios-solid

buenas-practicas

codigo-limpio

dependency-inversion

ISP

liskov

open-closed

single-responsibility-principle