adding old articles from rtd contributors

This commit is contained in:
Cristian Ditaputratama 2023-05-26 05:27:01 +07:00
parent cd97a77f42
commit 5d9ac64a3a
Signed by: ditatompel
GPG key ID: 31D3D06D77950979
102 changed files with 232 additions and 852 deletions

Binary file not shown.

Before

Width:  |  Height:  |  Size: 47 KiB

After

Width:  |  Height:  |  Size: 50 KiB

View file

@ -4,17 +4,17 @@ hb:
# js_bundle_name: main # the JS bundle name.
# css_bundle_name: main # the CSS bundle name.
header:
brand: HB # the brand name, leave it empty to use site's title.
logo_bg: '#712cf9' # logo background color, used by logo with transparent background.
# brand: HB # the brand name, leave it empty to use site's title.
# logo_bg: '#712cf9' # logo background color, used by logo with transparent background.
# see https://hbstack.dev/en/docs/modules/socials/.
socials:
github: hbstack
twitter: razonyang
github: ditatompel
twitter: ditatompel
footer:
# see https://hbstack.dev/en/docs/modules/socials/.
socials:
github: hbstack
twitter: razonyang
github: ditatompel
twitter: ditatompel
blog:
paginate: 12 # paginate.
# post_thumbnail: false # whether to show the thumbnails.
@ -53,7 +53,7 @@ pwa:
manifest:
background_color: '#712cf9'
theme_color: '#712cf9'
short_name: 'HB Theme'
short_name: 'ditatompel Insights'
# see https://hugomods.com/en/docs/search/#site-parameters
search:

View file

@ -1,11 +0,0 @@
---
title: HB 主题模板
# menu:
# main:
# name: 主页
# weight: 1
# params:
# icon:
# vendor: bs
# name: house
---

View file

@ -1,5 +1,5 @@
---
title: 博客
title: Blog
menu:
main:
identifier: blog

Binary file not shown.

Before

Width:  |  Height:  |  Size: 54 KiB

View file

@ -1,18 +0,0 @@
---
title: "Example Post with an Featured Image"
date: 2022-02-04T20:26:48+08:00
draft: false
featured: true
series:
- Guide
categories:
- Posts
tags:
- Featured Image
authors:
- razonyang
---
The example post with an featured image.
<!--more-->

View file

@ -1,18 +0,0 @@
---
title: "带有特色图片的示例文章"
date: 2022-02-04T20:26:48+08:00
draft: false
featured: true
series:
- 指南
categories:
- 文章
tags:
- 特色图片
authors:
- razonyang
---
一篇带有特色图片的示例文章。
<!--more-->

View file

@ -1,7 +0,0 @@
---
title: Featured Post without Image
Featured: true
date: 2022-09-10
---
A sample for showing how carousel handle featured posts that without images.

View file

@ -1,7 +0,0 @@
---
title: Featured Post without Image
Featured: true
date: 2022-09-10
---
A sample for showing how carousel handle featured posts that without images.

Binary file not shown.

After

Width:  |  Height:  |  Size: 46 KiB

View file

@ -0,0 +1,62 @@
---
title: "Macos Is Not The Same Family Tree With Linux, It Never Been"
date: 2019-05-14T04:13:23+07:00
lastmod:
draft: false
description: MacOS isn't associated with Linux in any way. What we call macOS nowadays is operating system developed by NeXT.Inc called NeXTstep and it based from BSD
noindex: false
featured: false
pinned: false
# comments: false
series:
# -
categories:
- TIL
tags:
- MacOS
- Apple
- Linux
- BSD
images:
# -
# menu:
# main:
# weight: 100
# params:
# icon:
# vendor: bs
# name: book
# color: '#e24d0e'
authors:
- mr-morningstar
---
Many people think that MacOS is *"Modified Linux"* with a beautiful interface. The truth is: **MacOS isn't associated with Linux in any way**. What we call macOS nowadays is operating system developed by NeXT.Inc in 1980s called NeXTstep.
<!--more-->
![Unix History, source: Wikipedia](unix-history.jpg "Image source: Wikipedia")
## Origin
**Steve Jobs** as the founder of NeXT ask his chief of software development, **Avie Tevanian** to **create a new multitasking OS based on BSD Mach kernel** (which Avie had developed it). It introduced the idea of the [Dock](https://en.wikipedia.org/wiki/Dock_(computing)) (carried through [OpenStep](https://en.wikipedia.org/wiki/OpenStep) and into today's [macOS](https://en.wikipedia.org/wiki/MacOS?ref=rtd.ditatompel.com)) and the [Shelf](https://en.wikipedia.org/wiki/Shelf_(computing)). At that time, NeXTSTEP introduced or innovated a large number of other GUI concepts which became common in other operating systems.
## First Web Browser, Web Server, and App Store
{{< youtube TIrTh80Z8jw >}}
in 1990, [Tim Berners-Lee](https://en.wikipedia.org/wiki/Tim_Berners-Lee) use NeXT Computer to run the world's first Web browser and first Web Server.. In 1997 Apple purchased NeXT. The founder promised to merge software from NeXT with Apple's hardware platforms, eventually resulting in macOS, iOS, watchOS, and tvOS. These operating systems are completely based upon the NeXTSTEP and OPENSTEP foundation. The first-ever **app store** also run on NeXTSTEP.
> _1990 CERN: A Joint proposal for a hypertext system is presented to the management. Mike Sendall buys a NeXT cube for evaluation, and gives it to **Tim Berners-Lee**. Tim's prototype implementation on NeXTStep is made in the space of a few months, thanks to the qualities of the NeXTStep software development system. This prototype offers **WYSIWYG** browsing/authoring! Current Web browsers used in "surfing the Internet" are mere passive windows, depriving the user of the possibility to contribute. During some sessions in the CERN cafeteria, Tim and I try to find a catching name for the system. I was determined that the name should not yet again be taken from Greek mythology. Tim proposes "World-Wide Web". I like this very much, except that it is difficult to pronounce in French..._
>
> — [Robert Cailliau](https://en.wikipedia.org/wiki/Robert_Cailliau), 2 November 1995
## MacOS != Linux
The modern Mac operating system is therefore based on a kernel from BSD, with a lots of Apple proprietary software running on top of it. On the other hand, Linux was developed totally independently. The GNU tools have been in development since as early as 1983, but the Linux kernel wasn't written until 1991, with the first GNU/Linux distros following in 1992. NeXTstep, by contrast, was released on 18 September 1989. Nothing based on Linux got to that point for several more years.
So no, macOS is not the same family tree with Linux. Mac is Unix and Linux is Unix-like, both of these operating systems are the product of the hard work of a lot of very intelligent people but they are completely independent of one another.
## References
* [https://en.wikipedia.org/wiki/NeXT](https://en.wikipedia.org/wiki/NeXT)
* [https://en.wikipedia.org/wiki/NeXTSTEP](https://en.wikipedia.org/wiki/NeXTSTEP)
* [https://www.quora.com/Is-it-true-that-Mac-OS-is-basically-just-a-pretty-Linux](https://www.quora.com/Is-it-true-that-Mac-OS-is-basically-just-a-pretty-Linux)

Binary file not shown.

After

Width:  |  Height:  |  Size: 393 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 150 KiB

View file

@ -0,0 +1,115 @@
---
title: "Moar Anonimity Stuff by Anonymous"
date: 2011-06-11T20:35:47+07:00
lastmod:
draft: false
description: This document is designed to give you a basic tool kit for protecting your identity while performing anonymous activities. It is not designed or intended for use as a toolkit for breaking the law, and any use in that fashion is condemned.
noindex: false
featured: false
pinned: false
# comments: false
series:
# -
categories:
- Thoughts
tags:
- Privacy
- Anonymous
images:
# -
# menu:
# main:
# weight: 100
# params:
# icon:
# vendor: bs
# name: book
# color: '#e24d0e'
authors:
- mr-morningstar
---
This document is designed to give you a **basic tool kit for protecting your identity while performing anonymous activities**. It is **not designed or intended** for use as a toolkit for breaking the law, and any use in that fashion is condemned. Any contributions both technical and social would be appreciated.
<!--more-->
## Technical and social security in communications
If you need to make private calls do not use a contract mobile phone or *landline*. Even if you replace the SIM chip in a mobile it can still be tracked back to you. Inserting a new SIM chip will change the number of the phone, but not the MAC address. This is the underlying device ID on the *frame relay network*. If you need to talk to people regularly in a private environment then use external phones, (be aware that most phone boxes are tagged by the police in certain areas due to drug dealing, so might not be as anonymous as you think).
The only way to truly guarantee your identity remains secret is to use cheap (cheap enough to throw away) pay as you go mobile phones. Buy these with cash. When you buy them do not look up at any cameras and disguise your face. Surveillance cameras in shops are usually mounted above eye level, but to not assume that this will be the case.
If you are buying something that you don't want to be traceable, wear something that disguises your features and breaks up the shape of your face. *Face recognition software works by creating a map of your features as distances between selected points*, i.e. the distance between your eyes, the width of your eyes, the distance from your brow to the tip of your nose, from your nose to you lips, etc. The more of this you can break up the better, but you also dont want to look so extreme that resemble a criminal robbing a bank, or indeed the shop itself.
Also getting someone else to buy the phones for you, for instance a homeless person is another useful strategy if you can be sure that the buyer is not themselves a target of surveillance. Learn the signs of hard drug use as many homeless people will be hard drug users, and that will increase the likely hood that they are also drug runners, and make them less trustworthy. This is not prejudice, but based on experience.
A drug runner acts as the middle man between the dealer and the buyer, and takes groups of drug users to predetermined place. Drug runners will often be identifiable as putting themselves forward to do you a favour. On the whole if you are approached by a homeless person they are either a stinger (someone selling empty or wraps, or counterfeit drugs) or a runner. Either way you will attract attention, and you will also probably lose your money. Learn to remember distinctive characteristics of the people you see on the streets. Homeless people will often ware the same cloths, hats, etc. from day to day. Do not go back to the same person, but instead stake out potentials.
An easy way to do this is by simply giving a beggar, busker, or big issue vendor a small amount of money. This will allow you leeway to start a conversation and asses any risk. Understanding the mentality of a drug addict takes practice, they will either be eager to leave [because they have made their target amount of money, usually the cost of a snow ball], or they will keep you talking and spin out a bleeding heart story, often about needing to makes a certain amount of cash to get into a hostel, or buy food.
This is most likely not true, all hostels in this country are free and there are a lot of food distribution centres. You can usually tell a genuine homeless person by the state of their hands, which will be dirty, although people in hostels might not wash or bath, its actually quite difficult to keep your hands really dirty, and rough. Also truly homeless people will more than likely have a bag of cloths and bedding (Contrary to popular belief homeless people do not hide bedding as it is too valuable). Also a lack of track marks on someones arms is not an indicator that they do not use and traffic narcotics. A lot of homeless people hit up in the main vein in the groin precisely so that they can wear t-shirts during the summer.
If you are going to use a homeless person you are better off choosing clean looking, slightly overweight, and possibly foreign man selling the big issue. They are less likely to be a runner, and therefore less likely to be under surveillance.
Really heavy drinkers will also usually be barred from most shops anyway, or have ASBO's against them for most major central commercial districts, they are likely to be stopped and will definitely point a finger in your direction to avoid arrest, this will draw attention to you.
Also beware of homeless shoplifters as they are simply not to be trusted. If you are buying the phone off them directly it will probably be stolen and they are likely to be under surveillance for that very reason.
*This is information is presented as is, and is based upon personal experience in the UK*, and for the basis of identifying reliable contacts that can be used in the UK homeless community.
## Mobile Apparatus
If you can, try to buy an activated phone with time on it. There are a number of ways that you can do this. On has been outlined above. Homeless big issue vendors will often have mobiles which they will be willing to sell (Make sure that there is actually air time on the phone). Note that this apparatus will most likely have been used to contact drug dealers. Familiarise yourself with the main methods the means of evaluating the amount of air time available on the main networks for pay as you go networks for the country that you are operating in. This will most likely be a set of numbers, do not trust apps that count available minutes as these can be reset.
## Managing data communications
Using free wireless locations such as book stores, Starbucks, McDonald's directly **should be avoided**. It is the first place that people will look for you because the signal origination point will be tracked to that location, also they will have cameras. If you must use those services, do so from a spot that is within range, possibly from a parked vehicle, and only for short periods to send and receive mail. Small portable Wi-Fi devices are also useful for this if you can swap them out frequently. Try to get devices that use memory cards as this makes it easier to store data directly onto them for reasons explained in the next paragraph.
If you need to swap out machines make sure that you clean the machine first, both physically, and eradicate the data, then dispose of it. The easiest way to do this is to minimize the amount of data that is stored on the machines drive. *Use a memory dongle as a virtual drive for data*, and use a login directory for all other services such as temporary internet files. Most modern operating systems will do this by default if you provide a user logon, which will allow you to clean the data by using drive wiping software to overwrite the data partition for that user. Do not simply delete the user directory. This will only remove the file descriptor, but not the data. Top make the data unrecoverable you need to use a utility to overwrite each disk sector used by the file and directory structure. Using windows have a lot of convenience for removability, but is inherently insecure. The following link will give you the software you need for that OS. **Disk Wipe 5.1** is freeware, and does not need installing. You simply need to download it and execute it: [https://www.bestfreewaredownload.com/freeware/t-free-disk-wipe-freeware-rdtawfxk.html](https://www.bestfreewaredownload.com/freeware/t-free-disk-wipe-freeware-rdtawfxk.html). If you are using Linux then Wipe is a good utility: [http://sourceforge.net/projects/wipe/files/](http://sourceforge.net/projects/wipe/files/). Mac users can get a freeware utility from [http://www.supershareware.com/disk-wipe-for-mac-free/](http://www.supershareware.com/disk-wipe-for-mac-free/).
**Try to use disposable dongles** rather than Wi-Fi enabled laptops. The Wi-Fi can easily be disabled on a machine, and the dongle used in its place. This means that the **MAC address layer will reside with the dongle**, and **not the machine**, and will allow you to swap out connection devices rather than the whole machine which is costly and dangerous as it draws attention to you.
## Data Security
The best way to insure that any data that falls into the wrong hands can't be accessed is to use an encryption utility such as **PGP** (Pretty Good Privacy) which is available on most machines. It will most likely come as a compressed file like a .zip or .gz file, and you may need the relevant utility to open it. Latter versions of windows have ZIP compatibility built into the file browser [Windows Vista onwards] but an unzipped is easy to get hold of and free.
PGP is a public private key encryption utility that also comes with a file shredder, this does the same job as a disk wiper, but for a single file and is an easy way to create encrypted documents, and shred the originals. Information on how to use the software can be found at: [http://www.pgpi.org/doc/](http://www.pgpi.org/doc/).
## Microphones and Communications
The following links give detailed information about how sensitive microphone technology works and are good links for other technical resources.
* [https://www.wisegeek.com/what-is-a-directional-microphone.htm](https://www.wisegeek.com/what-is-a-directional-microphone.htm)
* [http://en.wikipedia.org/wiki/Microphone](http://en.wikipedia.org/wiki/Microphone)
Outside communication is easy to pry on through directional sensitive microphones. There are several types, but three basically recognisable ones:
**Parabolic microphones**: This type uses a reflective dish in the same way as a radio telescope to amplify the incoming noise and focus it into one place where the actual microphone capsule is placed. They are often controlled by a laptop computer, but are available as hand held highly portable devices.
**Shotgun**: This type is an inherently directional and sensitive microphone, so named due to its length. They are usually hand held using and grip mounted and used with a sighting device.
**Laser Microphones**: These fire a laser beam at a window [or other sound surface] and use the disrupted returning beam to record the sound. These require a site to site level deployment to work as physics dictates that a beam cannot be returned at an angle.
**Personal Microphones**: These are devices that are usually placed in an object such as a pen or any object large enough to contain both the microphone capsule and the transmitter. Frequently these will be digital and scrambled so as to protect the output from covert hostiles working against both you and the people monitoring you conversations.
## Basic Anonymous Communications Protocols
**Nothing can totally guarantee that what you are saying will remain private**, but you can **minimize** the risk of monitoring by hostiles. Most forms of covert listening devices require a stationary target, or one that can be tracked through a space by a number of hostiles with listening devices coordination surveillance. This does not include personal microphones, which are planted on the target and generally have a rage of between 1.5 and 3 Km. The receiver does not have to be large for such a device, and could easily be something the sizes of a cigarette packet or an MP3 player.
To prevent being listened to by external directional devices chose urban spaces, and randomly vary them, if someone knows where you are going to be [i.e. if you go to the same place to make a call] then they can easily set up a listening operation. An open space such as a park is actually easy to monitor because it provides a boundary where hostiles can deploy listening equipment.
If you are involved in any operation where you will be performing activities that hostiles might wish to listen in on be careful with personal possessions. Limit the number of items that you carry, and be aware of the origin of those items, i.e. do not pick up pens from hotel rooms, or carry around gifts from people that you do not know and trust. If you are offered things like pens accept them, but get rid of them, or at the very least examine then carefully. Refusing a simple offer of a free pen by someone like a car rental clerk will simply arouse suspicion.
## Internet Browsing
When browsing the internet be aware that **your activities are usually tracked by sites** such as Facebook for marketing purposes, but as we have seen through "Metal Gear" **there is an effort on the part of security companies to obtain information on the use of social networking sites, and it is very probable that they are already acquiring Facebook data**. If your using Google Chrome a plug in exists that will prevent Facebook from obtaining data about where you click through called "Facebook Disconnect" which will do the job. Simply click the "Spanner" icon in the far right corner->Tools->Extensions at the bottom of the screen is a link "Get more extensions »" Click on that, find the tool and press install.
## Protecting Your Friends and Contacts List
Why do this: To avoid unfriendly or hostiles from gaining information about friends and contacts, although this won't stop a determined hacker it will protect you from idle mischief makers getting their hands on your list of friends and using them to discredit you, harass then, or generally sent rude or abusive messages to people you know. **Remember that Facebook is a social site and you probably have sensitive contacts about your family**.
In Facebook go to Account Settings->Privacy Settings
On the “Choose your privacy settings” Page you will see a blue highlighted link
Go to the “See your friend list” setting and set it to "only me"
Another option is to create a new email account [Microsoft Live allows you to have multiple account connected to one main account] then use that account for Anonymous Activities. Again, though this is slightly more secure, a determined hacker can still get you real identity from your email address. Measures to prevent this will be covered in detail when I have more time, or when other people start posting information. Thank you
*****
From now on any technical information that can be show to be valid [That can be replicated, or is accompanied by some form of proof via a link will automatically be included in this document. I cannot guarantee that everything will be 100% accurate as I do not have all platforms on which to test every surjection, but if another Anon says that it works, backs it up with evidence, thats good enough. I do this only in the hope that it is useful.
This great article written by : Anonymous on [http://anoncentral.tumblr.com/post/11733497886/moar-anonimity-stuff-by-anonymous](http://anoncentral.tumblr.com/post/11733497886/moar-anonimity-stuff-by-anonymous).

View file

@ -0,0 +1,43 @@
---
title: "Plex Data Breach 2022 Exposes Emails, Usernames and Encrypted Passwords"
date: 2022-08-29T04:53:11+07:00
lastmod:
draft: false
description: Plex discovered that a third-party was able to access a limited subset of their user data that includes emails, usernames, and encrypted passwords
noindex: false
featured: false
pinned: false
# comments: false
series:
- Data Breach
categories:
- Security
tags:
- Plex
images:
# -
# menu:
# main:
# weight: 100
# params:
# icon:
# vendor: bs
# name: book
# color: '#e24d0e'
authors:
- mr-morningstar
---
A few days ago, I received an email from Plex (an American streaming media service and a clientserver media player platform) informing me that they had a data leak. They ask their users to be aware of an incident involving their Plex account information.
<!--more-->
## What happened?
They discovered suspicious activity on one of their databases and immediately began an investigation and it does appear that a third-party was able to access a limited subset of data that includes emails, usernames, and encrypted passwords. According to Plex, even though all account passwords that could have been accessed were hashed and salted and secured in accordance with best practices, out of an abundance of caution they suggest all Plex accounts to have their Plex account password reset. Rest assured that credit card and other payment data are not stored on their servers at all and were not affected in this incident.
## What they're already doing?
They already addressed the method that this third-party employed to gain access to the system, and they're doing additional reviews to ensure that the security of all of their systems is further hardened to prevent future incursions. While the account passwords were secured in accordance with best practices, they suggest all Plex users to reset their password.
## What we can do?
Long story short, they kindly request that we should reset our Plex account password immediately. When doing so, there's a checkbox to *"Sign out connected devices after password change."* This will additionally sign out all of your devices (including any Plex Media Server we own) and require you to sign back in with your new password. This may be a headache, but recommend to increased security. For further account protection, they also recommend enabling [two-factor authentication](https://support.plex.tv/articles/two-factor-authentication/) on your Plex account if you haven't already done so. They have created a support article with step-by-step instructions on [how to reset your Plex password](https://support.plex.tv/articles/account-requires-password-reset/).

Binary file not shown.

Before

Width:  |  Height:  |  Size: 360 KiB

View file

@ -1,123 +0,0 @@
---
title: "Tutorial"
# linkTitle:
date: 2023-03-31T11:47:31+08:00
draft: false
description:
noindex: false
pinned: true
nav_weight: 1000
# nav_icon:
# vendor: bootstrap
# name: toggles
# color: '#e24d0e'
series:
- Tutorial
categories:
- Content
tags:
- Shortcode
- Code Block
- KaTex
- Mermaid
- Math
- Diagram
images:
# menu:
# main:
# weight: 100
# params:
# icon:
# vendor: bs
# name: book
# color: '#e24d0e'
authors:
- razonyang
- hugomods
---
A simple tutorial that offers samples and code snippets show how to create rich content, please refer to the [documentations](https://hbstack.dev/en/) for more usage.
<!--more-->
## Installation
**Please note that this theme requires Go installation the newest extended Hugo version.**
Please check out the [installation](https://hbstack.dev/en/docs/getting-started/installation/) section.
## Create Content
```sh
hugo new blog/new-post/index.md
```
The created content is in draft stage, you'll need to publish the content by removing the `draft` or setting the `draft` as `true` on front matter. Learn on on [content](https://hbstack.dev/en/docs/content/).
## Code Block
````markdown
```[lang]
CODE
```
````
{{% bootstrap/collapse "[lang]" %}}
Replace `[lang]` with corresponding language identifier, such as `js`, `php`, `go`, `html` and so on.
{{% /bootstrap/collapse %}}
```js
console.log('Hello world!')
```
### Code Syntax Highlighting Styles
HB offers dozens of syntax highlighting styles, find more on [syntax highlighting styles modules](https://hbstack.dev/en/docs/modules/syntax-highlighting/).
Import the desired style module and restart the Hugo server (load module's assets fully) to preview.
{{< bootstrap/config-toggle hugo >}}
module:
imports:
- path: github.com/hbstack/syntax-highlighting/styles/github-dark
{{< /bootstrap/config-toggle >}}
## KaTex
````markdown
```katex
MATH
```
````
```katex
f(x) = \int_{-\infty}^\infty\hat f(\xi)\,e^{2 \pi i \xi x}\,d\xi
```
Read more on [KaTex Usage](https://hugomods.com/en/docs/content/katex/#usage).
## Mermaid
````markdown
```mermaid
DIAGRAM
```
````
```mermaid
graph TD;
A-->B;
A-->C;
B-->D;
C-->D;
```
Read more on [Mermaid Usage](https://hugomods.com/en/docs/content/mermaid/#usage).
## Shortcodes
Learn more on [shortcodes](https://hbstack.dev/en/docs/content/shortcodes/).
## Deployment
See [deployment](https://hbstack.dev/en/docs/deployment/) for deploying your site.

View file

@ -1,130 +0,0 @@
---
title: "指南"
# linkTitle:
date: 2023-03-31T11:47:31+08:00
draft: false
description:
noindex: false
pinned: true
nav_weight: 1000
# nav_icon:
# vendor: bootstrap
# name: toggles
# color: '#e24d0e'
series:
- Tutorial
categories:
- Content
tags:
- Shortcode
- Code Block
- KaTex
- Mermaid
- Math
- Diagram
images:
# menu:
# main:
# weight: 100
# params:
# icon:
# vendor: bs
# name: book
# color: '#e24d0e'
authors:
- razonyang
- hugomods
---
本教程提供简单的示例和代码段,以展示如何创建富文本,更多用法请查阅[文档](https://hbstack.dev/zh-hans/)。
<!--more-->
## 安装
**请注意本主题需要安装 Go 和最新的扩展版 Hugo。**
详情请阅读[安装](https://hbstack.dev/zh-hans/docs/getting-started/installation)一文。
## 新增内容
```sh
hugo new blog/new-post/index.md
```
新创建的内容处于草稿状态,发布时需要移除 `draft`参数或者将其设为 `false`
{{< bootstrap/alert >}}
{{% markdownify %}}
请指定 `--buildDrafts` (`-D`) 标识以预览草稿,如 `hugo server --gc -D --disableFastRender`
> **npm run dev** 默认会构建草稿内容。
{{% /markdownify %}}
{{< /bootstrap/alert >}}
## 代码块
````markdown
```[lang]
CODE
```
````
{{% bootstrap/collapse "[lang]" %}}
请将 `[lang]` 替换为对应的语言标识,如 `js`、`php`、`go`、`html` 等。
{{% /bootstrap/collapse %}}
```js
console.log('Hello world!')
```
### 代码高亮样式
HB 提供了数十个代码高亮样式,详情请参阅[代码高亮样式模块](https://hbstack.dev/zh-hans/docs/modules/syntax-highlighting/)。
导入对应的样式模块,并重启 Hugo 服务器以完整地载入模块的资源。
{{< bootstrap/config-toggle hugo >}}
module:
imports:
- path: github.com/hbstack/syntax-highlighting/styles/github-dark
{{< /bootstrap/config-toggle >}}
## KaTex
````markdown
```katex
MATH
```
````
```katex
f(x) = \int_{-\infty}^\infty\hat f(\xi)\,e^{2 \pi i \xi x}\,d\xi
```
Read more on [KaTex Usage](https://hugomods.com/en/docs/content/katex/#usage).
## Mermaid
````markdown
```mermaid
DIAGRAM
```
````
```mermaid
graph TD;
A-->B;
A-->C;
B-->D;
C-->D;
```
Read more on [Mermaid Usage](https://hugomods.com/en/docs/content/mermaid/#usage).
## 短代码
详情请参阅[短代码](https://hbstack.dev/zh-hans/docs/content/shortcodes/)。
## 部署
领请参阅[部署](https://hbstack.dev/zh-hans/docs/deployment/)以部署你的站点。

View file

@ -1,5 +1,5 @@
---
title: 分类
title: Categories
menu:
main:
parent: blog
@ -8,5 +8,5 @@ menu:
vendor: bs
name: folder
color: orange
description: 所有分类。
description: All of categories.
---

View file

@ -1,12 +0,0 @@
---
title: Docs
menu:
main:
weight: 1
params:
icon:
vendor: bs
name: book
---
The example of Docs layout.

View file

@ -1,12 +0,0 @@
---
title: 文档
menu:
main:
weight: 1
params:
icon:
vendor: bs
name: book
---
The example of Docs layout.

View file

@ -1,9 +0,0 @@
---
title: Installation Guide
linkTitle: Installation
nav_icon:
vendor: bs
name: cloud-download
color: green
nav_weight: 2
---

View file

@ -1,9 +0,0 @@
---
title: 安装指南
linkTitle: 安装
nav_icon:
vendor: bs
name: cloud-download
color: green
nav_weight: 2
---

View file

@ -1,4 +0,0 @@
---
title: Install on Linux
linkTitle: Linux
---

View file

@ -1,4 +0,0 @@
---
title: 安装到 Linux
linkTitle: Linux
---

View file

@ -1,19 +0,0 @@
---
date: 2022-09-04T22:42:23+08:00
title: Install on Arch Linux
linkTitle: Arch Linux
series:
- Guide
categories:
- Installation
tags:
- Linux
- Arch Linux
images:
- https://archlinux.org/static/logos/archlinux-logo-light-90dpi.d36c53534a2b.png?width=600&height=199
featured: true
authors:
- razonyang
---
This guide show you how to install on Arch Linux.

View file

@ -1,19 +0,0 @@
---
date: 2022-09-04T22:42:23+08:00
title: 安装到 Arch Linux
linkTitle: Arch Linux
series:
- 指南
categories:
- 安装
tags:
- Linux
- Arch Linux
images:
- https://archlinux.org/static/logos/archlinux-logo-light-90dpi.d36c53534a2b.png?width=600&height=199
featured: true
authors:
- razonyang
---
This guide show you how to install on Arch Linux.

Binary file not shown.

Before

Width:  |  Height:  |  Size: 366 KiB

View file

@ -1,18 +0,0 @@
---
date: 2022-10-16T22:42:23+08:00
title: Install on Ubuntu
linkTitle: Ubuntu
series:
- Guide
categories:
- Installation
tags:
- Linux
- Ubuntu
images:
featured: true
authors:
- razonyang
---
This guide show you how to install on Ubuntu.

View file

@ -1,18 +0,0 @@
---
date: 2022-10-16T22:42:23+08:00
title: 安装到 Ubuntu
linkTitle: Ubuntu
series:
- 指南
categories:
- 安装
tags:
- Linux
- Ubuntu
images:
featured: true
authors:
- razonyang
---
This guide show you how to install on Ubuntu.

View file

@ -1,18 +0,0 @@
---
date: 2022-09-06T22:42:23+08:00
title: Install on Windows
linkTitle: Windows
series:
- Guide
categories:
- Installation
tags:
- Windows
images:
- https://storage.googleapis.com/webdesignledger.pub.network/WDL/6f050e39-windows_10_logoblue.svg-copy_windows.jpg?width=1280&height=620
featured: true
authors:
- razonyang
---
This guide show you how to install on Windows.

View file

@ -1,18 +0,0 @@
---
date: 2022-09-06T22:42:23+08:00
title: 安装到 Windows 系统
linkTitle: Windows
series:
- 指南
categories:
- 安装
tags:
- Windows
images:
- https://storage.googleapis.com/webdesignledger.pub.network/WDL/6f050e39-windows_10_logoblue.svg-copy_windows.jpg?width=1280&height=620
featured: true
authors:
- razonyang
---
This guide show you how to install on Windows.

View file

@ -1,23 +0,0 @@
---
date: 2022-03-06T22:42:23+08:00
title: Introduction
nav_weight: 1
series:
- Guide
nav_icon:
vendor: bs
name: book
color: indigo
authors:
- razonyang
---
A fast, responsive and feature-rich Hugo theme for blog and documentations site.
<!--more-->
## Greeting
```sh
echo "Hi there"
```

View file

@ -1,21 +0,0 @@
---
date: 2022-03-06T22:42:23+08:00
title: 简介
nav_weight: 1
series:
- 指南
nav_icon:
vendor: bs
name: book
color: indigo
authors:
- razonyang
---
一个可用于博客和文档站点的快速、响应式和功能丰富的 Hugo 主题。
## Greeting
```sh
echo "Hi there"
```

View file

@ -1,10 +0,0 @@
---
title: Examples
menu:
main:
weight: 3
params:
icon:
vendor: bs
name: card-list
---

View file

@ -1,10 +0,0 @@
---
title: 示例
menu:
main:
weight: 3
params:
icon:
vendor: bs
name: card-list
---

View file

@ -1,8 +0,0 @@
---
title: "Gallery Homepage Example"
date: 2023-04-06T13:50:51+08:00
draft: false
layout: gallery
---
The example of gallery homepage layout.

View file

@ -1,8 +0,0 @@
---
title: "图库主页示例"
date: 2023-04-06T13:50:51+08:00
draft: false
layout: gallery
---
图库主页布局示例。

View file

@ -1,20 +0,0 @@
---
title: "Landing Page Example"
date: 2023-04-06T01:44:59+08:00
draft: false
layout: landing
---
# Landing Page Example
This theme offers a simple landing page layout which consist of three parts: header, body and footer, the body is the content itself.
## How to Use it?
Specify the `layout` as `landing` on the front matter.
{{< bs/config-toggle >}}
layout: landing
{{< /bs/config-toggle >}}
And then writing the content with [Markdown](https://hbstack.dev/en/docs/content/markdown-syntax/) and [shortcodes](https://hbstack.dev/en/docs/content/shortcodes/).

View file

@ -1,20 +0,0 @@
---
title: "落地页示例"
date: 2023-04-06T01:44:59+08:00
draft: false
layout: landing
---
# 落地页示例
本主题提供一个简单的落地页布局,其由三部分组成:头部,主体和尾部,主体为内容其本身。
## 怎么使用?
于内容前言中指定 `layout``landing`
{{< bs/config-toggle >}}
layout: landing
{{< /bs/config-toggle >}}
然后以 [Markdown](https://hbstack.dev/zh-hans/docs/content/markdown-syntax/) 和[短代码](https://hbstack.dev/zh-hans/docs/content/shortcodes/)编写内容即可。

View file

@ -1,10 +0,0 @@
---
title: Gallery
menu:
main:
weight: 2
params:
icon:
vendor: fas
name: images
---

View file

@ -1,10 +0,0 @@
---
title: 图库
menu:
main:
weight: 2
params:
icon:
vendor: fas
name: images
---

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.9 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.9 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.2 MiB

View file

@ -1,22 +0,0 @@
---
title: "Dogs"
date: 2022-01-01T16:16:05+08:00
resources:
- src: 20220104000000.jpg
params:
author: Ilargian Faus
source: Pexels
- src: 20220103000000.jpg
params:
author: Alexandra Novitskaya
source: Pexels
- src: 20220102000000.jpg
params:
author: Goochie Poochie Grooming
source: Pexels
- src: 20220101000000.jpg
params:
author: Simona Kidrič
source: Pexels
---

View file

@ -1,26 +0,0 @@
---
title: "狗"
date: 2022-01-01T16:16:05+08:00
resources:
- src: 20220104000000.jpg
params:
author: Ilargian Faus
source: Pexels
- src: 20220103000000.jpg
params:
author: Alexandra Novitskaya
source: Pexels
- src: 20220104000000.jpg
params:
author: Alexandra Novitskaya
source: Pexels
- src: 20220102000000.jpg
params:
author: Goochie Poochie Grooming
source: Pexels
- src: 20220101000000.jpg
params:
author: Simona Kidrič
source: Pexels
---

Binary file not shown.

Before

Width:  |  Height:  |  Size: 913 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 6.1 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.7 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 913 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 236 KiB

View file

@ -1,6 +0,0 @@
---
title: "Rainbow"
date: 2022-01-01T16:16:05+08:00
resources:
---

View file

@ -1,6 +0,0 @@
---
title: "彩虹"
date: 2022-01-01T16:16:05+08:00
resources:
---

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.2 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.7 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 151 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.3 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 283 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.7 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 474 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 733 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.1 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 4.2 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 933 KiB

View file

@ -1,54 +0,0 @@
---
title: Sunrise
date: 2022-01-01T00:00:00+08:00
description: Sunrise Photos
resources:
- src: 20240405000000.jpg
params:
author: Hernan Pauccara
source: Pexels
- src: 20220111000000.jpg
params:
author: Joel Holland
source: Pexels
- src: 20220110000000.jpg
params:
author: Rachel Cook
source: Unsplash
- src: 20220109000000.jpg
params:
author: Quang Nguyen Vinh
source: Pexels
- src: 20220108000000.jpg
params:
author: Johannes Plenio
source: Pexels
- src: 20220107000000.jpg
params:
author: Anand Dandekar
source: Pexels
- src: 20220106000000.jpg
params:
author: Nuno Obey
source: Pexels
- src: 20220105000000.jpg
params:
author: Pixabay
source: Pexels
- src: 20220104000000.jpg
params:
author: Rahul Pandit
source: Pexels
- src: 20220103000000.jpg
params:
author: Pixabay
source: Pexels
- src: 20220102000000.jpg
params:
author: Tetyana Kovyrina
source: Pexels
- src: 20220101000000.jpg
params:
author: Arthur Ogleznev
source: Pexels
---

View file

@ -1,54 +0,0 @@
---
title: Sunrise
date: 2022-01-01T00:00:00+08:00
description: Sunrise Photos
resources:
- src: 20240405000000.jpg
params:
author: Hernan Pauccara
source: Pexels
- src: 20220111000000.jpg
params:
author: Joel Holland
source: Pexels
- src: 20220110000000.jpg
params:
author: Rachel Cook
source: Unsplash
- src: 20220109000000.jpg
params:
author: Quang Nguyen Vinh
source: Pexels
- src: 20220108000000.jpg
params:
author: Johannes Plenio
source: Pexels
- src: 20220107000000.jpg
params:
author: Anand Dandekar
source: Pexels
- src: 20220106000000.jpg
params:
author: Nuno Obey
source: Pexels
- src: 20220105000000.jpg
params:
author: Pixabay
source: Pexels
- src: 20220104000000.jpg
params:
author: Rahul Pandit
source: Pexels
- src: 20220103000000.jpg
params:
author: Pixabay
source: Pexels
- src: 20220102000000.jpg
params:
author: Tetyana Kovyrina
source: Pexels
- src: 20220101000000.jpg
params:
author: Arthur Ogleznev
source: Pexels
---

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.7 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.6 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.8 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.1 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.9 MiB

View file

@ -1,30 +0,0 @@
---
title: "Textures"
date: 2023-01-01T16:16:05+08:00
resources:
- src: 20230106000000.jpg
params:
author: Suzy Hazelwood
source: Pexels
- src: 20230105000000.jpg
params:
author: Matheus Natan
source: Pexels
- src: 20230104000000.jpg
params:
author: Velroy Fernandes
source: Pexels
- src: 20230103000000.jpg
params:
author: Karolina Grabowska
source: Pexels
- src: 20230102000000.jpg
params:
author: Aleksandr Slobodianyk
source: Pexels
- src: 20230101000000.jpg
params:
author: Anni Roenkae
source: Pexels
---

View file

@ -1,30 +0,0 @@
---
title: "Textures"
date: 2022-01-01T16:16:05+08:00
resources:
- src: 20230106000000.jpg
params:
author: Suzy Hazelwood
source: Pexels
- src: 20230105000000.jpg
params:
author: Matheus Natan
source: Pexels
- src: 20230104000000.jpg
params:
author: Velroy Fernandes
source: Pexels
- src: 20230103000000.jpg
params:
author: Karolina Grabowska
source: Pexels
- src: 20230102000000.jpg
params:
author: Aleksandr Slobodianyk
source: Pexels
- src: 20230101000000.jpg
params:
author: Anni Roenkae
source: Pexels
---

File diff suppressed because one or more lines are too long

View file

@ -0,0 +1 @@
{"Target":"css/hb.6a3ec1d207c320dd5d0a7f22036754e4e32227245b742ef58ad9f1e593e0a698.css","MediaType":"text/css","Data":{"Integrity":"sha256-aj7B0gfDIN1dCn8iA2dU5OMiJyRbdC71itnx5ZPgppg="}}

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.6 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 3.2 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 3.6 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 3.7 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 414 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.5 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.8 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.6 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 791 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.1 KiB

Some files were not shown because too many files have changed in this diff Show more