白帽黑客

Before starting to talk about White, Grey and Black Hat Hackers we should learn the real meaning of the Hacker . Actually hacker is not a bad person or hacking is not a malicious action. Hacking simply means working with a specific electrical or digital device, service or system in an unusual way. Hackers are generally obsessed with what they are doing and mainly interested in computers, networks, digital systems, software, etc. Hacking is not a crime too. For example, we can call Bill Gates as hacker because of the high level of expertise for the Windows operating system with programming. But on the other side, Steve Jobs is not a hacker because he does not have any deep level of technical knowledge about the systems he works.

开始谈论白色,灰色和黑帽黑客之前,我们应该学习的真正意义上的Hacker 。 实际上,黑客不是一个坏人,或者黑客行为不是恶意行为。 黑客只是意味着以一种不寻常的方式使用特定的电气或数字设备,服务或系统。 黑客通常沉迷于自己的工作,并且主要对计算机,网络,数字系统,软件等感兴趣。黑客也不是犯罪。 例如,由于具有编程功能的Windows操作系统的高级专业知识,我们可以称呼Bill Gates为黑客。 但另一方面,史蒂夫·乔布斯(Steve Jobs)并不是黑客,因为他对所使用的系统没有任何深入的技术知识。

白帽黑客 (White Hat Hacking)

We have learned what is a hacker in the previous part and now we can define the White Hat Hacker. Hackers can have some good or bad behaviors. White Hat Hackers have good behaviors like protecting the given system, software, service against the Black Hat Hackers. As white hat hackers can provide protection against black hat hackers this can be accomplished in different ways.

在上一部分中,我们已经了解了什么是黑客,现在我们可以定义White Hat Hacker。 黑客的行为有好有坏。 白帽黑客具有良好的行为,如针对黑帽黑客保护给定的系统,软件和服务。 由于白帽黑客可以提供针对黑帽黑客的保护,因此可以通过不同的方式来实现。

  • Pentest made by white hat hackers in order to find vulnerabilities in a safe way and provide remediations.

    白帽黑客制作的Pentest ,旨在以安全的方式发现漏洞并提供补救措施。

  • System, Network, Application Hardening done by white hat hackers which will fortify the given system, network, application against the black hat hackers.

    System, Network, Application Hardening由白帽黑客完成,将针对黑帽黑客加强给定的系统,网络,应用程序。

  • Consultation is another service provided by white hackers that will provide insights about the hacking methods and prevention actions.

    Consultation是白人黑客提供的另一项服务,它将提供有关黑客方法和预防措施的见解。

白帽黑客证书 (Certificates for White Hat Hackers)

White Hat Hackers possess different skills for different purposes which are explained above. White Hat Hackers generally works for companies, governments or individuals as being good hackers. While requiring the White Hat Hackers to show their talent, experience in different ways. But the most feasible, easy and practical way is certifying their talent and experience. Security-related certifications are the best certification type for White Hat Hackers. There are a ton of security certifications to be certified but some of them are more reliable and well-known around the world. CEH, CISSP, CCN Security, OSCP are some of the popular and reliable certifications.

白帽黑客针对上述不同目的具有不同的技能。 白帽黑客通常是公司,政府或个人的好黑客。 在要求白帽黑客展示自己的才能时,需要以不同的方式进行体验。 但是,最可行,最简便,最实用的方法是证明其才能和经验。 与安全相关的认证是White Hat Hackers的最佳认证类型。 有大量的安全认证需要认证,但是其中一些更可靠,在世界范围内广为人知。 CEH,CISSP,CCN安全性,OCP是一些流行且可靠的认证。

  • CISSP is one of the most known and sacrificed certifications. CISSP has the broadest context for security certifications but generally do not dive into deep. But CISSP requires a lot of experience to tackle and solve the certification questions during the exam. CISSP generally required by security managers, security team leaders or security consultants.

    CISSP是最著名的认证之一。 CISSP具有最广泛的安全认证背景,但通常不会深入探讨。 但是CISSP需要大量经验来解决和解决考试中的认证问题。 CISSP通常由安全经理,安全团队负责人或安全顾问要求。

  • CEH is the entry-level security certification that will be used to newcomer White Hat Hackers. CEH is not a deep level like CISSP too and has less context and requires little or no experience to tackle with. Generally, junior, entry-level security professionals require CEH.CEH是入门级安全认证,将用于新来的White Hat Hackers。 CEH也不像CISSP那样深层次,并且上下文较少,需要或几乎没有经验来应对。 通常,初级,入门级安全专业人员需要CEH。
  • CCNP Security is the security certification for the Cisco products. But as a big certification authority, CCNP Security certification gained a lot popularity. CCNP安全性是Cisco产品的安全性认证。 但是,作为大型认证机构,CCNP安全认证获得了很大的普及。
  • OSCP is one of the most technical security certification. OSCP is a completely hands-on certification where real-world examples are solved and reported as a pentest report to gain certification. Pentesters, Vulnerability Researchers generally requires OCSP certification.OSCP是最技术性的安全认证之一。 OSCP是一个完全动手的认证,其中解决了实际示例,并以渗透测试报告的形式报告以获取认证。 渗透测试者,漏洞研究人员通常需要OCSP认证。
.u3b41debeac4015831d916571f0994eaa , .u3b41debeac4015831d916571f0994eaa .postImageUrl , .u3b41debeac4015831d916571f0994eaa .centered-text-area { min-height: 80px; position: relative; } .u3b41debeac4015831d916571f0994eaa , .u3b41debeac4015831d916571f0994eaa:hover , .u3b41debeac4015831d916571f0994eaa:visited , .u3b41debeac4015831d916571f0994eaa:active { border:0!important; } .u3b41debeac4015831d916571f0994eaa .clearfix:after { content: ""; display: table; clear: both; } .u3b41debeac4015831d916571f0994eaa { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #ECF0F1; box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -moz-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -o-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -webkit-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); } .u3b41debeac4015831d916571f0994eaa:active , .u3b41debeac4015831d916571f0994eaa:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #D35400; } .u3b41debeac4015831d916571f0994eaa .centered-text-area { width: 100%; position: relative; } .u3b41debeac4015831d916571f0994eaa .ctaText { border-bottom: 0 solid #fff; color: #3498DB; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u3b41debeac4015831d916571f0994eaa .postTitle { color: #27AE60; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u3b41debeac4015831d916571f0994eaa .ctaButton { background-color: #e6e6e6!important; color: #3498DB; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://www.poftut.com/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u3b41debeac4015831d916571f0994eaa:hover .ctaButton { background-color: #E67E22!important; } .u3b41debeac4015831d916571f0994eaa .centered-text { display: table; height: 80px; padding-left: 18px; top: 0; } .u3b41debeac4015831d916571f0994eaa .u3b41debeac4015831d916571f0994eaa-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u3b41debeac4015831d916571f0994eaa:after { content: ""; display: block; clear: both; }

LEARN MORE  Data Classification and Categorization with Benefits

.u3b41debeac4015831d916571f0994eaa , .u3b41debeac4015831d916571f0994eaa .postImageUrl , .u3b41debeac4015831d916571f0994eaa .centered-text-area { min-height: 80px; position: relative; } .u3b41debeac4015831d916571f0994eaa , .u3b41debeac4015831d916571f0994eaa:hover , .u3b41debeac4015831d916571f0994eaa:visited , .u3b41debeac4015831d916571f0994eaa:active { border:0!important; } .u3b41debeac4015831d916571f0994eaa .clearfix:after { content: ""; display: table; clear: both; } .u3b41debeac4015831d916571f0994eaa { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #ECF0F1; box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -moz-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -o-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -webkit-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); } .u3b41debeac4015831d916571f0994eaa:active , .u3b41debeac4015831d916571f0994eaa:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #D35400; } .u3b41debeac4015831d916571f0994eaa .centered-text-area { width: 100%; position: relative; } .u3b41debeac4015831d916571f0994eaa .ctaText { border-bottom: 0 solid #fff; color: #3498DB; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u3b41debeac4015831d916571f0994eaa .postTitle { color: #27AE60; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u3b41debeac4015831d916571f0994eaa .ctaButton { background-color: #e6e6e6!important; color: #3498DB; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://www.poftut.com/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u3b41debeac4015831d916571f0994eaa:hover .ctaButton { background-color: #E67E22!important; } .u3b41debeac4015831d916571f0994eaa .centered-text { display: table; height: 80px; padding-left: 18px; top: 0; } .u3b41debeac4015831d916571f0994eaa .u3b41debeac4015831d916571f0994eaa-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u3b41debeac4015831d916571f0994eaa:after { content: ""; display: block; clear: both; }

了解更多数据分类和分类的好处

黑帽黑客(Black Hat Hacker)

Black Hat Hackers the opposite position of the White Hat Hackers. Black Hat Hackers mainly attack, exploit, demolish their targets for different reasons. Black Hat Hackers generally require more experience and talent than White Hat Hackers. Here we will list some common motivation for Black Hat Hackers.

黑帽黑客与白帽黑客的立场相反。 黑帽黑客主要出于各种原因攻击,利用,破坏目标。 与白帽黑客相比,黑帽黑客通常需要更多的经验和才能。 在这里,我们将列出黑帽黑客的一些常见动机。

  • Personal Financial Gain to make money from the targets or third party supporters.

    通过目标或第三方支持者赚钱的Personal Financial Gain

  • Cyber Espionage is an attack-type that is sponsored by the states and governments for enemy states.

    Cyber Espionage是由州和政府为敌国赞助的一种攻击类型。

  • Fame is another reason a Black Hat Hacker can be famous arround the community, country or world.

    Fame是Black Hat Hacker可以在社区,国家或世界闻名的另一个原因。

灰色帽子黑客 (Grey Hat Hacker)

We have talked about the White Hat Hackers and Gray Hat Hackers but there is also an intermediate type Hacker. We call them Gray Hat Hacker where they are not so reliable where they provide some services to fight against the Black Hat Hackers. Gray Hat Hackers generally historical Black Hat Hackers where they do not be part of the crime but do not work in a regular or enterprise job. Gray Hat Hackers generally examine different vulnerabilities without an permission about the target. They can find some vulnerabilities where they do not exploit these vulnerabilities.

我们讨论过白帽黑客和灰帽黑客,但也有一个中间类型的黑客。 我们称它们为Gray Hat Hacker ,因为它们在提供一些服务来对抗Black Hat Gray Hat Hacker不太可靠。 Gray Hat Hacker通常是具有历史意义的Black Hat Hacker,它们不属于犯罪活动,但不能从事常规工作或企业工作。 Gray Hat Hacker通常在未经目标许可的情况下检查不同的漏洞。 他们可以找到一些漏洞,而无需利用这些漏洞。

5名著名的白帽黑客 (5 Famous White Hat Hackers)

Even Black Hat Hackers are famous in the IT world there are some White Hat Hackers which are famous with their war against the Back Hat Hackers.

甚至黑帽黑客在IT世界中也很出名,也有一些白帽黑客以与后帽黑客的对抗而闻名。

  • Tsutomu Shimomura is one of the most popular hackers who has a very impressive academic background. Shimomura worked in National Security Agency. He is very famous with the capturing of the one of the best Black Hat Hacker Kevin Mitnick.

    Tsutomu Shimomura是一位拥有令人印象深刻的学术背景的最受欢迎的黑客之一。 下村曾在国家安全局工作。 他以捕获最佳黑帽黑客之一Kevin Mitnick闻名。

  • Charlie Miller is another well known White Hack Hacker which has a Ph.D. in Mathematics and worked for National Security Agency. Miller is mainly worked on Apple systems like Macintosh, iPhone.

    Charlie Miller ( Charlie Miller是另一位著名的White Hack Hacker,拥有博士学位。 在数学领域工作,并在国家安全局工作。 Miller主要在Macintosh,iPhone等Apple系统上工作。

  • Greg Hoglund is not so much well known as Shimomura and Miller. He is experienced with software security and exposed a large vulnerability in World of Warcraft.

    Greg Hoglund ( Greg Hoglund )并不像下村(Shimomura)和米勒(Miller)那样知名。 他在软件安全方面经验丰富,并且在《魔兽世界》中暴露出一个很大的漏洞。

  • HD Moore is worked in classified projects for the U.S. Department of Defence. He is well known for the Metasploit Framework which is a penetration testing platform.

    HD Moore在美国国防部的机密项目中工作。 他以Metasploit框架(一个渗透测试平台)而闻名。

  • Dan Kaminsky is mainly worked for DNS security to prevent DNS and SSL based hacks He found critical security vulnerabilities about the DNS and SSL.

    Dan Kaminsky主要从事DNS安全方面的工作,以防止基于DNS和SSL的黑客入侵。他发现了有关DNS和SSL的严重安全漏洞。

.u36db760e4372b242d9552d6ce7c02f29 , .u36db760e4372b242d9552d6ce7c02f29 .postImageUrl , .u36db760e4372b242d9552d6ce7c02f29 .centered-text-area { min-height: 80px; position: relative; } .u36db760e4372b242d9552d6ce7c02f29 , .u36db760e4372b242d9552d6ce7c02f29:hover , .u36db760e4372b242d9552d6ce7c02f29:visited , .u36db760e4372b242d9552d6ce7c02f29:active { border:0!important; } .u36db760e4372b242d9552d6ce7c02f29 .clearfix:after { content: ""; display: table; clear: both; } .u36db760e4372b242d9552d6ce7c02f29 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #ECF0F1; box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -moz-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -o-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -webkit-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); } .u36db760e4372b242d9552d6ce7c02f29:active , .u36db760e4372b242d9552d6ce7c02f29:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #D35400; } .u36db760e4372b242d9552d6ce7c02f29 .centered-text-area { width: 100%; position: relative; } .u36db760e4372b242d9552d6ce7c02f29 .ctaText { border-bottom: 0 solid #fff; color: #3498DB; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u36db760e4372b242d9552d6ce7c02f29 .postTitle { color: #27AE60; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u36db760e4372b242d9552d6ce7c02f29 .ctaButton { background-color: #e6e6e6!important; color: #3498DB; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://www.poftut.com/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u36db760e4372b242d9552d6ce7c02f29:hover .ctaButton { background-color: #E67E22!important; } .u36db760e4372b242d9552d6ce7c02f29 .centered-text { display: table; height: 80px; padding-left: 18px; top: 0; } .u36db760e4372b242d9552d6ce7c02f29 .u36db760e4372b242d9552d6ce7c02f29-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u36db760e4372b242d9552d6ce7c02f29:after { content: ""; display: block; clear: both; }

LEARN MORE  What Is A Computer Virus?

.u36db760e4372b242d9552d6ce7c02f29 , .u36db760e4372b242d9552d6ce7c02f29 .postImageUrl , .u36db760e4372b242d9552d6ce7c02f29 .centered-text-area { min-height: 80px; position: relative; } .u36db760e4372b242d9552d6ce7c02f29 , .u36db760e4372b242d9552d6ce7c02f29:hover , .u36db760e4372b242d9552d6ce7c02f29:visited , .u36db760e4372b242d9552d6ce7c02f29:active { border:0!important; } .u36db760e4372b242d9552d6ce7c02f29 .clearfix:after { content: ""; display: table; clear: both; } .u36db760e4372b242d9552d6ce7c02f29 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #ECF0F1; box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -moz-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -o-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -webkit-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); } .u36db760e4372b242d9552d6ce7c02f29:active , .u36db760e4372b242d9552d6ce7c02f29:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #D35400; } .u36db760e4372b242d9552d6ce7c02f29 .centered-text-area { width: 100%; position: relative; } .u36db760e4372b242d9552d6ce7c02f29 .ctaText { border-bottom: 0 solid #fff; color: #3498DB; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u36db760e4372b242d9552d6ce7c02f29 .postTitle { color: #27AE60; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u36db760e4372b242d9552d6ce7c02f29 .ctaButton { background-color: #e6e6e6!important; color: #3498DB; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://www.poftut.com/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u36db760e4372b242d9552d6ce7c02f29:hover .ctaButton { background-color: #E67E22!important; } .u36db760e4372b242d9552d6ce7c02f29 .centered-text { display: table; height: 80px; padding-left: 18px; top: 0; } .u36db760e4372b242d9552d6ce7c02f29 .u36db760e4372b242d9552d6ce7c02f29-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u36db760e4372b242d9552d6ce7c02f29:after { content: ""; display: block; clear: both; }

了解更多什么是计算机病毒?

翻译自: https://www.poftut.com/what-is-white-hat-hacker/

白帽黑客

白帽黑客_什么是白帽黑客?相关推荐

  1. 美国有史以来最著名5大黑帽黑客和5大白帽黑客

    日前,国外媒体评选出美国有史以来最危险的五大计算机黑客.其评判标准:入狱:青春期作案:巨额收益或自我超级崇拜. 1.Kevin Mitnick(凯文?米特尼克) 米特尼克是黑客界响当当的人物,甚至他的 ...

  2. 【资源分享(免积分)】增长黑客_创业公司的用户与收入增长秘籍 - 范冰(高清版免费).pdf

    增长黑客_创业公司的用户与收入增长秘籍 - 范冰.pdf 高清版pdf,可以高清阅读,欢迎下载 链接:https://pan.baidu.com/s/1hRcLzR68WwBDnXp1xe_75Q 密 ...

  3. 可以不当什么“黑客”,但不要被“黑客”PUA

    不管你相信不相信,人的底线会越来越低,明天比今天低,明年比今年低,在计算机安全上也是如此. 我相信在远古时代,大家都是和平共处地使用光合作用,自给自足.突然,出现了一个家伙,既然你们都利用光合作用,那 ...

  4. 为什么黑客都用python-为什么黑客都用python Python在各领域都有着广

    说到都用,大家应该都不陌生,有人问黑客为什么喜欢用火狐,另外,还有人想问python是黑客语言吗,这到底是咋回事?事实上运用python成为黑客呢,小编为大家整理了为什么黑客都用python,跟我一起 ...

  5. 棱镜门事件的思考:黑客是什么,如何成为黑客?[更新:2015-05-09]

    [作者] 网名: 猪头三 站点: http://www.x86asm.com Email: pliceman_110@163.com QQ: 643439947 编程生涯: 2001-至今[14年] ...

  6. 3分钟告诉你如何成为一名黑客?|零基础到黑客入门指南,你只需要掌握这五点能力

    文章目录 什么是黑客? 成为一名黑客需要具备哪些能力? 第一点,了解黑客的思维方式 第二点,学习一门编程语言 第三点,学习网络安全基础知识 第四点,实战操作 第五点,懂法律,懂法律,懂法律! 说到黑客 ...

  7. 暴雪和黑客的战争三:黑客的反击

    暴雪在1.10补丁中加入hack检测机制,在某种程度上直接导致了原本和谐的D2X游戏黑客社群的分裂.一部分出于对检测机制的顾虑,停止更 新自己的作品,如d2hackit:另一部分则把他们的hack具有 ...

  8. 为什么黑客都用python-为什么黑客都用Python

    广告关闭 2017年12月,云+社区对外发布,从最开始的技术博客到现在拥有多个社区产品.未来,我们一起乘风破浪,创造无限可能. python 在数据分析.数据挖掘.人工智能.web开发等方面都大有发挥 ...

  9. ★黑客基地★ - 全球最大的黑客与安全技术门户

    [推荐]★黑客基地★ - 全球最大的黑客与安全技术门户 学黑客必去的网站"黑客基地": http://www.hackbase.com 如何学黑客技术并从事网络安全: http:/ ...

最新文章

  1. LeetCode 122. Best Time to Buy and Sell Stock II--贪心--Java,C++,Python解法
  2. 英国计算机系学生黑掉校长邮箱:倒闭学校,取消考试!
  3. 【转载】Java Cache系列之Cache概述和Simple Cache
  4. 【消息中间件】Spring整合RabbitMQ
  5. javafx sdk html 布局,JavaFX2开发教程
  6. ADO.NET开发总结(学习笔记)
  7. AI理论知识基础(21)-对变化建模-用差分方程-动力系统及常数解
  8. 经典 HTML5 Javascript 俄罗斯方块游戏
  9. 前端学习(1714):前端系列javascript之目录结构
  10. matlab模拟退火最小球覆盖,【模板】模拟退火 费马点以及最小球覆盖
  11. Linux之Bash_Script_Program_002
  12. HTML5期末大作业:大学生个人网站设计——我们的班级(7页) HTML+CSS+JavaScript 学生DW网页设计作业成品 html网页制作代码大全 html5网页设计作业代码
  13. 荣耀8鸿蒙刷机,华为荣耀平板s8-701w刷机记(示例代码)
  14. js 设置cookie和获取cookie
  15. 双色球和大乐透的随机选号并排列
  16. cef 前进后台 实现_使用CefSharp前端后台交换
  17. 小程序开发 tips——2
  18. execution(* com.xxx.*.*(..))
  19. SQLyog怎么导入mysql数据库
  20. 3DMax”——新手小白入门篇

热门文章

  1. 付宇泽20190919-2 功能测试
  2. ARM开发基础--指令,异常源及处理过程
  3. python小白社区_python3+pycharm社区版小白安装步骤
  4. gatling 之性能测试
  5. 使用matlab的MAT.H(c读取mat文件)
  6. RE0:从零开始的服务器生活(一):双硬盘双系统+无线网卡驱动+最简单的Ubuntu16.04 Nvidia显卡驱动设置
  7. 数论出题组比赛用题:签到题(待完善)
  8. 利用pyecharts显示微信好友性别比例
  9. keypad(键盘矩阵)指南
  10. 错误: Unknown class XXX in Interface Builder file