linux
ftp
ciberseguridad
hacking
pentesting
hydra
consola
awk
comando
find
SSD
disco
Arch-Linux
principios-solid
buenas-practicas
codigo-limpio
dependency-inversion
ISP
liskov
open-closed
single-responsibility-principle