Bogus data acquisition protocol II
Abigail Elizabeth
Disclaimer
DISCLAIMER – FOR INFORMATIONAL PURPOSES ONLY; USE AT YOUR OWN RISK
The protocol content here is for informational purposes only and does not constitute legal, medical, clinical, or safety advice, or otherwise; content added to protocols.io is not peer reviewed and may not have undergone a formal approval of any kind. Information presented in this protocol should not substitute for independent professional judgment, advice, diagnosis, or treatment. Any action you take or refrain from taking using or relying upon the information presented here is strictly at your own risk. You agree that neither the Company nor any of the authors, contributors, administrators, or anyone else associated with protocols.io, can be held responsible for your use of the information contained in or linked to this protocol or any of our Sites/Apps and Services.
Abstract
The purpose of this protocol is to demo protocol development.
Before start
These are my warnings.
Steps
Before starting, you need to run a test using the following protocol. I referred to this protocol using a hyperlink: Bogus Data Acquisition Protocol I.
In this step, I'll use embed code for Box to display an image of software.
#尊敬的用户,由于网络监管政策的限制,部分内容暂时无法在本网站直接浏览。我们已经为您准备了相关原始数据和链接,感谢您的理解与支持。
<iframe src="https://app.box.com/embed/s/2t7j85czracum58rtp5vcwzhdv5bsclq?sortColumn=date&view=list" width="500" height="400" frameborder="0" allowfullscreen webkitallowfullscreen msallowfullscreen></iframe>
In this step, I'll use the command component to refer to a command.
#Test copy code
scp -rp myfile