- Kali Linux 2018:Windows Penetration Testing
- Wolf Halton Bo Weaver
- 165字
- 2021-06-24 18:22:30
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "This produces a fast scan-the T stands for Timing (from 1 to 5), and the default timing is -T3."
A block of code is set as follows:
html, body, #map {
height: 100%;
margin: 0;
padding: 0
}
Any command-line input or output is written as follows:
nmap -v -sn 192.168.0.0/16 10.0.0.0/8
nmap -v -iR 10000 -Pn -p 80
Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Open the Terminal from the icon on the top bar or by clicking on the menu links:
Application | Accessories | Terminal".
Warnings or important notes appear like this.
Tips and tricks appear like this.
推薦閱讀
- Linux運維之道(第3版)
- Mastering vRealize Operations Manager(Second Edition)
- Linux內核完全注釋(20周年版·第2版)
- Persistence in PHP with the Doctrine ORM
- 精解Windows 8
- Ubuntu Linux操作系統
- Linux集群和自動化運維
- Implementing Azure DevOps Solutions
- STM32庫開發實戰指南:基于STM32F4
- 注冊表應用完全DIY
- 完美應用RHEL 8
- 深入淺出Node.js
- 從實踐中學習Kali Linux無線網絡滲透測試
- Django Project Blueprints
- Windows 8實戰從入門到精通(超值版)