Learn Ethical Hacking from Scratch
上QQ阅读APP看书,第一时间看更新

Conventions used

There are a number of text conventions used throughout this book.

CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "We will go into the Metasploitable directory and select the .vmdk file"

A block of code is set as follows:

html, body, #map {
height: 100%;
margin: 0;
padding: 0
}

Any command-line input or output is written as follows:

-i eth0 -r 10.0.2.1/24

Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "If we go to Files | Downloads, we will see the file."

Warnings or important notes appear like this.
Tips and tricks appear like this.