随笔分类 -  翻译练习

摘要:来源【Post-installation steps for Linux】 Post-installation steps for Linux Estimated reading time: 11 minutes This section contains optional procedures f 阅读全文
posted @ 2017-11-08 10:38 镜花-水月 阅读(1105) 评论(0) 推荐(0) 编辑
摘要:恢复内容开始 【官方文档】 Install Docker Estimated reading time: 8 minutes Docker is available in two editions: Community Edition (CE) and Enterprise Edition (EE) 阅读全文
posted @ 2017-11-07 15:54 镜花-水月 阅读(304) 评论(0) 推荐(0) 编辑
摘要:来源【维基百科-wannacray】 WannaCry ransomware attack From Wikipedia, the free encyclopedia The WannaCry ransomware attack was a May 2017 worldwide cyberattac 阅读全文
posted @ 2017-10-30 20:44 镜花-水月 阅读(985) 评论(0) 推荐(0) 编辑
摘要:【来源】 ‘坏兔子’勒索软件潜入俄罗斯,乌克兰 By Raj Samani and Christiaan Beek on Oct 24, 2017 This post was researched and written by Christiaan Beek, Tim Hux, David Marc 阅读全文
posted @ 2017-10-28 20:55 镜花-水月 阅读(720) 评论(0) 推荐(0) 编辑
摘要:CISSP官方学习指南(第七版)中文版也已经出版了,看了电子书没前言,翻一下,哈哈 Whenever we look toward the future, we have to first look back and think about where we came from. Back in 1 阅读全文
posted @ 2017-10-26 16:12 镜花-水月 阅读(1075) 评论(0) 推荐(0) 编辑
摘要:来源:【exploit-db】 SearchSploit – The Manual SearchSploit – The Manual SearchSploit – The Manual SearchSploit – The Manual Table of Contents What is Sear 阅读全文
posted @ 2017-10-23 22:10 镜花-水月 阅读(1010) 评论(0) 推荐(0) 编辑
摘要:来源:【exploit-db】 Exploit Database Statistics 来源:【exploit-db】 Exploit Database Statistics 来源:【exploit-db】 Exploit Database Statistics 来源:【exploit-db】 Ex 阅读全文
posted @ 2017-10-23 00:17 镜花-水月 阅读(394) 评论(0) 推荐(0) 编辑
摘要:来源:【exploit-db】 History of Exploit-DB 来源:【exploit-db】 History of Exploit-DB 来源:【exploit-db】 History of Exploit-DB 来源:【exploit-db】 History of Exploit-D 阅读全文
posted @ 2017-10-22 03:00 镜花-水月 阅读(321) 评论(0) 推荐(0) 编辑
摘要:exploit-db 阅读全文
posted @ 2017-10-21 16:45 镜花-水月 阅读(807) 评论(0) 推荐(0) 编辑

点击右上角即可分享
微信分享提示