- Penetration Testing with BackBox
- Stefan Umit Uygur
- 196字
- 2021-07-19 18:18:52
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text are shown as follows: "If we expand our imported data, we will be able to see the service listed under the ipproto tcp
item."
Any command-line input or output is written as follows:
ostendali@stefan:~$ whois example.com Domain: example.com Status: ok Created: 2009-06-16 11:47:34 Last Update: 2013-08-04 00:37:29 Expire Date: 2014-07-19 Registrant Name: Jack Ritcher Organization: Ritcher Inc ContactID: MRDD139374 Address: Via Spagna 52 - Rende 87036 CS IT Created: 2010-07-19 11:05:35 Last Update: 2010-07-19 11:05:34 Admin Contact Name: David Nassi Organization: David Nassi ContactID: DN10847
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Note that before the launch of the Metasploit console application, we will need to start the Postgres database that we can find in the BackBox menu's Services section."
推薦閱讀
- 綜合布線設計與施工(第2版)
- Solaris 10系統管理
- IP語音通信原理、設計及組網應用
- CSS3網頁設計從入門到精通(微課精編版)
- CSS網頁布局與瀏覽器兼容
- 信息系統項目管理
- Dreamweaver+Flash+Photoshop網頁設計從入門到精通(微課精編版)
- HIS內核設計之道:醫院信息系統規劃設計系統思維
- OpenStack云計算基礎架構平臺技術與應用
- 軟件定義網絡核心原理與應用實踐
- Dreamweaver+ASP動態網頁設計從新手到高手
- INSTANT Migration to HTML5 and CSS3 How-to
- 網站組建、管理與維護
- 矛與盾:黑客攻防命令大曝光
- 開源云計算平臺CloudStack實戰