The following typographical conventions are used in this book:
- Italic
Indicates new terms, URLs, email addresses, filenames, file extensions, pathnames, directories, daemons, programs, and Unix utilities.
-
Constant width
Indicates commands, options, switches, variables, attributes, keys, functions, types, classes, namespaces, methods, modules, properties, parameters, values, objects, events, event handlers, XML tags, HTML tags, macros, the contents of files, or the output from commands.
-
Constant width bold
Shows commands or other text that should be typed literally by the user.
-
Constant width italic
Shows text that should be replaced with user-supplied values.
- Color
The second color is used to indicate a cross-reference within the text.
The thermometer icons, found next to each hack, indicate the relative complexity of the hack:
Get Network Security Hacks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.