
上QQ阅读APP看书,第一时间看更新
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "We will go into the Metasploitable directory and select the .vmdk file"
A block of code is set as follows:
html, body, #map {
height: 100%;
margin: 0;
padding: 0
}
Any command-line input or output is written as follows:
-i eth0 -r 10.0.2.1/24
Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "If we go to Files | Downloads, we will see the file."
Warnings or important notes appear like this.
Tips and tricks appear like this.