Typographie pluxml

Rédigé par paul Aucun commentaire
Classé dans : Linux-admin Mots clés : aucun

Below is just about everything you’ll need to style in the theme. Check the source code to see the many embedded elements within paragraphs.


Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, test link adipiscing elit. This is strong. Nullam dignissim convallis est. Quisque aliquam. This is emphasized. Donec faucibus. Nunc iaculis suscipit dui. 53 = 125. Water is H2O. Nam sit amet sem. Aliquam libero nisi, imperdiet at, tincidunt nec, gravida vehicula, nisl. The New York Times (That’s a citation). Underline. Maecenas ornare tortor. Donec sed tellus eget sapien fringilla nonummy. Mauris a ante. Suspendisse quam sem, consequat at, commodo vitae, feugiat in, nunc. Morbi imperdiet augue quis tellus.

HTML and CSS are our tools. Mauris a ante. Suspendisse quam sem, consequat at, commodo vitae, feugiat in, nunc. Morbi imperdiet augue quis tellus. Praesent mattis, massa quis luctus fermentum, turpis mi volutpat justo, eu volutpat enim diam eget metus. To copy a file type COPY filename. Dinner’s at 5:00. Let’s make that 7. This text has been struck.


List Types

Definition List

Definition List Title
This is a definition list division.
Definition
An exact statement or description of the nature, scope, or meaning of something: our definition of what constitutes poetry.

Ordered List

  1. List Item 1
  2. List Item 2
    1. Nested list item A
    2. Nested list item B
  3. List Item 3

Unordered List

  • List Item 1
  • List Item 2
    • Nested list item A
    • Nested list item B
  • List Item 3

Table

Table Header 1 Table Header 2 Table Header 3
Division 1 Division 2 Division 3
Division 1 Division 2 Division 3
Division 1 Division 2 Division 3

Preformatted Text

Typographically, preformatted text is not the same thing as code. Sometimes, a faithful execution of the text requires preformatted text that may not have anything to do with code. Most browsers use Courier and that’s a good default — with one slight adjustment, Courier 10 Pitch over regular Courier for Linux users. For example:

"Beware the Jabberwock, my son!
    The jaws that bite, the claws that catch!
Beware the Jubjub bird, and shun
    The frumious Bandersnatch!"

Code

Code can be presented inline, like <?php echo "This is my first static page"; ?>, or within a <pre> block. Because we have more specific typographic needs for code, we’ll specify Consolas and Monaco ahead of the browser-defined monospace font.


#container {
 float: left;
 margin: 0 -240px 0 0;
 width: 100%;
}

Blockquotes

Let’s keep it simple. Italics are good to help set it off from the body text (and italic Georgia is lovely at this size). Be sure to style the citation.

Good afternoon, gentlemen. I am a HAL 9000 computer. I became operational at the H.A.L. plant in Urbana, Illinois on the 12th of January 1992. My instructor was Mr. Langley, and he taught me to sing a song. If you’d like to hear it I can sing it for you.

HAL 9000

And here’s a bit of trailing text.

rules v4

Rédigé par paul Aucun commentaire
Classé dans : Linux-admin Mots clés : aucun
################################################################################ The MIT License# Copyright 2012-2014 Jakub Jirutka .################################################################################ @author Jakub Jirutka # @version 1.3.1# @date 2014-01-28################################################################################# 1. COMMON HEADER                                                            ##                                                                             ## This section is a generic header that should be suitable for most hosts.    ################################################################################*filter# Base policy:INPUT DROP [0:0]:FORWARD DROP [0:0]:OUTPUT ACCEPT [0:0]# Don't attempt to firewall internal traffic on the loopback device.-A INPUT -i lo -j ACCEPT# Continue connections that are already established or related to an established # connection.-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT# Drop non-conforming packets, such as malformed headers, etc.-A INPUT -m conntrack --ctstate INVALID -j DROP# Block remote packets claiming to be from a loopback address.-A INPUT -s 127.0.0.0/8 ! -i lo -j DROP# Drop all packets that are going to broadcast, multicast or anycast address.-A INPUT -m addrtype --dst-type BROADCAST -j DROP-A INPUT -m addrtype --dst-type MULTICAST -j DROP-A INPUT -m addrtype --dst-type ANYCAST -j DROP-A INPUT -d 224.0.0.0/4 -j DROP# Chain for preventing SSH brute-force attacks.# Permits 10 new connections within 5 minutes from a single host then drops # incomming connections from that host. Beyond a burst of 100 connections we # log at up 1 attempt per second to prevent filling of logs.-N SSHBRUTE-A SSHBRUTE -m recent --name SSH --set-A SSHBRUTE -m recent --name SSH --update --seconds 300 --hitcount 10 -m limit --limit 1/second --limit-burst 100 -j LOG --log-prefix "iptables[SSH-brute]: "-A SSHBRUTE -m recent --name SSH --update --seconds 300 --hitcount 10 -j DROP-A SSHBRUTE -j ACCEPT# Chain for preventing ping flooding - up to 6 pings per second from a single # source, again with log limiting. Also prevents us from ICMP REPLY flooding # some victim when replying to ICMP ECHO from a spoofed source.-N ICMPFLOOD-A ICMPFLOOD -m recent --set --name ICMP --rsource-A ICMPFLOOD -m recent --update --seconds 1 --hitcount 6 --name ICMP --rsource --rttl -m limit --limit 1/sec --limit-burst 1 -j LOG --log-prefix "iptables[ICMP-flood]: "-A ICMPFLOOD -m recent --update --seconds 1 --hitcount 6 --name ICMP --rsource --rttl -j DROP-A ICMPFLOOD -j ACCEPT################################################################################ 2. HOST SPECIFIC RULES                                                      ##                                                                             ## This section is a good place to enable your host-specific services.         ## ! DO NOT FORGOT TO COPY THESE RULES TO firewall.ip6tables TO ALLOW IPV6 !   ################################################################################# Accept HTTP and HTTPS#-A INPUT -p tcp -m multiport --dports 80,443 --syn -m conntrack --ctstate NEW -j ACCEPT################################################################################ 3. GENERAL RULES                                                            ##                                                                             ## This section contains general rules that should be suitable for most hosts. ################################################################################# Accept worldwide access to SSH and use SSHBRUTE chain for preventing # brute-force attacks.#-A INPUT -p tcp --dport 22 --syn -m conntrack --ctstate NEW -j SSHBRUTE# Permit useful IMCP packet types.# Note: RFC 792 states that all hosts MUST respond to ICMP ECHO requests.# Blocking these can make diagnosing of even simple faults much more tricky.# Real security lies in locking down and hardening all services, not by hiding.-A INPUT -p icmp --icmp-type 0  -m conntrack --ctstate NEW -j ACCEPT-A INPUT -p icmp --icmp-type 3  -m conntrack --ctstate NEW -j ACCEPT-A INPUT -p icmp --icmp-type 8  -m conntrack --ctstate NEW -j ICMPFLOOD-A INPUT -p icmp --icmp-type 11 -m conntrack --ctstate NEW -j ACCEPT# Do not log packets that are going to ports used by SMB # (Samba / Windows Sharing).-A INPUT -p udp -m multiport --dports 135,445 -j DROP-A INPUT -p udp --dport 137:139 -j DROP-A INPUT -p udp --sport 137 --dport 1024:65535 -j DROP-A INPUT -p tcp -m multiport --dports 135,139,445 -j DROP# Do not log packets that are going to port used by UPnP protocol.-A INPUT -p udp --dport 1900 -j DROP# Do not log late replies from nameservers.-A INPUT -p udp --sport 53 -j DROP# Good practise is to explicately reject AUTH traffic so that it fails fast.-A INPUT -p tcp --dport 113 --syn -m conntrack --ctstate NEW -j REJECT --reject-with tcp-reset# Prevent DOS by filling log files.-A INPUT -m limit --limit 1/second --limit-burst 100 -j LOG --log-prefix "iptables[DOS]: "COMMIT################################################################################ 4. HOST SPECIFIC NAT RULES                                                  ##                                                                             ## Uncomment this section if you want to use NAT table, e.g. for port          ## forwarding, redirect, masquerade...                                         #################################################################################*nat# Base policy#:PREROUTING ACCEPT [0:0]#:POSTROUTING ACCEPT [0:0]#:OUTPUT ACCEPT [0:0]# Redirect port 21 to local port 2121#-A PREROUTING -i eth0 -p tcp --dport 21 -j REDIRECT --to-port 2121# Forward port 8080 to port 80 on host 192.168.1.10#-A PREROUTING -i eth0 -p tcp --dport 8080 -j DNAT --to-destination 192.168.1.10:80#COMMIT

Fil RSS des articles de cette catégorie