mirror of
https://github.com/dongdigua/dongdigua.github.io
synced 2024-11-23 23:53:10 +08:00
cleanup learned cheatsheet, weird half explained
This commit is contained in:
parent
15b5cdc6ed
commit
c68ad1ef73
@ -6,11 +6,6 @@
|
||||
** deletion
|
||||
| key | usage |
|
||||
|-------+------------------------|
|
||||
| x | 删除光标所在处单词 |
|
||||
| de | 删除到本单词末尾 |
|
||||
| db | 删除到前一个单词 |
|
||||
| d$ | 删除光标位置到本行结束 |
|
||||
| d0 | 删除光标位置到本行开头 |
|
||||
|
||||
** edit
|
||||
| key | usage |
|
||||
@ -19,26 +14,22 @@
|
||||
| "{register}y/p | 向/从寄存器拷贝 |
|
||||
|
||||
** movement
|
||||
| key | usage |
|
||||
|------------+-----------------------------|
|
||||
| w | 下一个单词 |
|
||||
| e | 单词尾 |
|
||||
| b | 单词头 |
|
||||
| 0/$ | 行首/尾 |
|
||||
| H/M/L | 当前页面可见顶部/中间/底部 |
|
||||
| <num> G | 跳转到第几行 |
|
||||
| C-u(f)/d | 上/下翻页 |
|
||||
| f/F <char> | 在一行中向后/前跳到某个字符 |
|
||||
| % | 到对应括号 |
|
||||
| {} | 段落跳转 |
|
||||
| key | usage |
|
||||
|----------+----------------------------|
|
||||
| w/e | 下一个单词/单词尾 |
|
||||
| b | 单词头 |
|
||||
| H/M/L | 当前页面可见顶部/中间/底部 |
|
||||
| C-u(f)/d | 上/下翻页 |
|
||||
| % | 到对应括号 |
|
||||
| {} | 段落跳转 |
|
||||
| g ; | goto last change |
|
||||
| g */# | 正/反查找光标下的词 |
|
||||
| g d/D | 跳转到本地/全局定义 |
|
||||
|
||||
** visual
|
||||
| key | usage | next |
|
||||
|-----+--------------+------------------------|
|
||||
| V | 行选择 | |
|
||||
| C-v | 矩形区域选择 | S-i 插入, esc 批量执行 |
|
||||
| v | | movement |
|
||||
| | | |
|
||||
|
||||
|
||||
** file/split
|
||||
@ -63,9 +54,7 @@
|
||||
** normal
|
||||
| key | usage |
|
||||
|---------+---------------------|
|
||||
| C-s | 搜索 |
|
||||
| M-% | 替换 |
|
||||
| C-_ | [[https://linuxtoy.org/archives/emacs-undo-tree.html][undo/redo]] |
|
||||
| M-; | 区域切换注释 |
|
||||
| C-x C-; | 行切换注释 |
|
||||
| C-y | paste to minibuffer |
|
||||
|
@ -12,6 +12,8 @@
|
||||
** [[http://www.qiusir.com/][qiusir]] :rssub:
|
||||
** [[http://www.yinwang.org/][王垠]]
|
||||
** [[http://ruanyifeng.com/blog/][阮一峰]] :rssub:
|
||||
** [[http://www.hackdig.com/][黑客技术]] :hacker:
|
||||
really good website, butt, no rss
|
||||
** [[https://shakaianee.top/][易姐]]
|
||||
** [[https://blog.stdio.io/1385][King's way]]
|
||||
** [[https://floooh.github.io/2021/12/17/cycle-stepped-z80.html][floooh]] :c:
|
||||
|
@ -9,7 +9,8 @@ emacs pyim
|
||||
** Emacs transparent
|
||||
probably wayfire?
|
||||
** Authorization required, but no authorization protocol specified
|
||||
=sudo -E=
|
||||
*** =sudo -E=
|
||||
*** lxpolkit(directly execute) or polkit-gnome(prettier)
|
||||
** cannot start sway on lightdm
|
||||
in =/etc/lightdm/lightdm.conf= uncomment =sessions-directory= line
|
||||
but still not stable, and it can't remenber which DE you used last time
|
||||
@ -31,6 +32,9 @@ add =seat seat0 xcursor_theme Oxygen_White= in sway comfig file
|
||||
**** [[https://www.reddit.com/r/swaywm/comments/r85e9g/touchpad_gestures/]]
|
||||
**** [[https://www.reddit.com/r/swaywm/comments/px5vmw/how_are_you_configuring_touchpad_gestures/]]
|
||||
**** [[https://www.reddit.com/r/swaywm/comments/em0jnx/can_sway_handle_threefour_finger_touchpad_gestures/]]
|
||||
** notify-send don't work
|
||||
mako, a notification daemon
|
||||
|
||||
|
||||
* Ref
|
||||
** [[https://coda.world/sway-explore-and-giveup][Sway: 从尝试到放弃]]
|
||||
|
@ -1,8 +1,23 @@
|
||||
#+TITLE: Something About MGLNDD Scans
|
||||
#+OPTIONS: toc:nil \n:t
|
||||
|
||||
* [[https://stretchoid.com/][stretchoid opt-out]]
|
||||
this domain's workers are comstantly scanning the WHOLE internet
|
||||
* [[https://isc.sans.edu/diary/MGLNDD_%2A+Scans/28458][SANS internet storm center diary]]
|
||||
about the scanner and IP range
|
||||
** [[https://cybersafenv.org/2022/03/20/mglndd-scans-sun-mar-20th/][repost on cybersafenv]]
|
||||
* [[http://www.hackdig.com/04/hack-81133.htm][知名网络空间普查与网络测绘组织研究报告 第一期-组织名录篇]]
|
||||
* [[https://www.bilibili.com/read/cv16357621][my post on bilibili]]
|
||||
* [[https://github.com/dongdigua/portscan-listener/blob/main/log/some_strange_logs.md][my listener and some other logs]]
|
||||
* [[https://zhuanlan.zhihu.com/p/67186794][zhihu:repost-translation: 如何建立一个基本的蜜罐]]
|
||||
the original post is gone
|
||||
#+BEGIN_QUOTE
|
||||
您还可以开始执行DNS和WHOIS查找,以找出每次扫描背后的人员。
|
||||
在这个简短的样本中,我找到了一个伪“研究员”:107.170.202.111解析为“zg-0301f-15.stretchoid.com”。根据他们的网站:
|
||||
...
|
||||
Stretchoid不能识别他们是谁。他们没有确定他们正在做什么或为什么他们在161 / udp扫描我的蜜罐。
|
||||
(端口161 / udp是为简单的网络管理协议(SNMP)保留的,并且经常容易受到攻击。)
|
||||
是的,他们把“malicious”拼错了 - 因此它可能不会出现在谷歌搜索“stretchoid and malicious”的结果中。
|
||||
#+END_QUOTE
|
||||
* [[https://www.digitalocean.com/community/questions/why-is-digital-ocean-showing-in-my-router-connecting-to-a-ps4][Why is Digital Ocean showing in my router, connecting to a PS4?]]
|
||||
* [[https://www.ironcastle.net/mglndd-scans-sun-mar-20th/][on ironcastle, but deleted]]
|
||||
|
Loading…
Reference in New Issue
Block a user