- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 154字
- 2021-07-02 21:04:04
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows:
"In this particular case, the VM has been assigned an IP address of 192.168.204.132."
A block of code is set as follows:
[default]
f=open('exfiltrated_hex.txt','r')
hex_data=f.read()
ascii_data=hex_data.decode('hex')
print ascii_data
Any command-line input or output is written as follows:
# root@kali~# update-rc.d networking defaults
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "Clicking on the Next button takes you to the next screen."
Warnings or important notes appear in a box like this.
Tips and tricks appear like this.
- 黑客攻防從入門到精通(實戰秘笈版)
- Delphi程序設計基礎:教程、實驗、習題
- Visual C++實例精通
- 人人都懂設計模式:從生活中領悟設計模式(Python實現)
- 51單片機C語言開發教程
- Android應用案例開發大全(第二版)
- Training Systems Using Python Statistical Modeling
- Learning Jakarta Struts 1.2: a concise and practical tutorial
- 零基礎C語言學習筆記
- R語言:邁向大數據之路
- JavaScript設計模式與開發實踐
- C語言程序設計
- 數據庫基礎與應用實驗教程:Visual FoxPro 6.0
- Go語言Hyperledger區塊鏈開發實戰
- Learning WebRTC