Trucs et astuces pour le SSH
Loading
0 %
Key | Action |
---|---|
K or space | Play / Pause |
M | Mute / Unmute |
C | Select next subtitles |
A | Select next audio track |
V | Show slide in full page or toggle automatic source change |
left arrow | Seek 5s backward |
right arrow | Seek 5s forward |
shift + left arrow or J | Seek 10s backward |
shift + right arrow or L | Seek 10s forward |
control + left arrow | Seek 60s backward |
control + right arrow | Seek 60s forward |
shift + down arrow | Decrease volume |
shift + up arrow | Increase volume |
shift + coma | Decrease playback speed |
shift + dot or shift + semicolon | Increase playback speed |
end | Seek to end |
beginning | Seek to beginning |
You can right click on slides to open the menu
Share this media
Information on this media
Links:
Creation date:
July 8th, 2015, 9:22 a.m.Add date:
July 9th, 2015, 12:50 p.m.Number of views:
228Speaker:
Axel Beckert (Debian)License:
CC BY SA v4Visibility:
This media is publishedOther media in the channel "Sécurité"
203 viewsAnalyse forensic d'un serveur web LinuxJuly 9th, 2015
200 viewsDocker, conteneurs, sécurité : où en est-on ?July 9th, 2015
140 views$HOME sweet $HOMEJuly 9th, 2015
81 viewsLet's talk about SELKSJuly 9th, 2015
122 views, 2 this monthMISP Le partage d'IOC malware sans tourner autour du potJuly 9th, 2015
101 views, 1 this monthFIR - Réponse sur Incidents RapideJuly 9th, 2015