- Digital Forensics and Incident Response
- Gerard Johansen
- 199字
- 2021-07-02 18:49:41
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning. Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: The constituency can be defined either as a domain such as local.example.com or an organization name such as Acme Inc. and associated subsidiary organizations.
A block of code is set as follows:
rule PoisonIvy_Generic_3 {
meta:
description = "PoisonIvy RAT Generic Rule"
author = "Florian Roth"
date = "2015-05-14"
hash = "e1cbdf740785f97c93a0a7a01ef2614be792afcd"
strings:
$k1 = "Tiger324{" fullword ascii
Any command-line input or output is written as follows:
caine@caine~$ tcpdump -D
caine@caine~$ sudotcpdump -i ens33 -v
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "In order for F-Response to be able to acquire the necessary evidence, an agent has to be installed.by right-clicking on the system and choosing Install/Start F-Response"
- Java EE 6 企業(yè)級應用開發(fā)教程
- Arduino by Example
- Java入門很輕松(微課超值版)
- Spring Boot+Spring Cloud+Vue+Element項目實戰(zhàn):手把手教你開發(fā)權限管理系統
- 軟件測試項目實戰(zhàn)之性能測試篇
- PHP+MySQL+Dreamweaver動態(tài)網站開發(fā)實例教程
- Building a Quadcopter with Arduino
- Hands-On Functional Programming with TypeScript
- Mastering Adobe Captivate 7
- 3D Printing Designs:The Sun Puzzle
- C語言程序設計
- Learning Node.js for Mobile Application Development
- Jenkins 2.x實踐指南
- 中小企業(yè)網站建設與管理(靜態(tài)篇)
- Mastering Python for Data Science