From 7f98e95fb4315e888b5db93284a1d30b9fd10495 Mon Sep 17 00:00:00 2001 From: Sun Knudsen Date: Fri, 25 Dec 2020 10:08:11 -0500 Subject: [PATCH] Fixed wrong code block types --- .../README.md | 2 +- .../README.md | 8 ++++---- .../README.md | 2 +- 3 files changed, 6 insertions(+), 6 deletions(-) diff --git a/how-to-configure-hardened-raspberry-pi-os-server/README.md b/how-to-configure-hardened-raspberry-pi-os-server/README.md index f55d986..c0a869d 100644 --- a/how-to-configure-hardened-raspberry-pi-os-server/README.md +++ b/how-to-configure-hardened-raspberry-pi-os-server/README.md @@ -31,7 +31,7 @@ When asked for file in which to save key, enter `pi`. When asked for passphrase, use output from `openssl rand -base64 24` (and store passphrase in password manager). -```shell +```console $ mkdir -p ~/.ssh $ cd ~/.ssh diff --git a/how-to-configure-strongswan-client-on-headless-debian-based-linux-computer/README.md b/how-to-configure-strongswan-client-on-headless-debian-based-linux-computer/README.md index bb9956c..05fd01c 100644 --- a/how-to-configure-strongswan-client-on-headless-debian-based-linux-computer/README.md +++ b/how-to-configure-strongswan-client-on-headless-debian-based-linux-computer/README.md @@ -76,7 +76,7 @@ EOF #### Generate client cert -``` +```console $ openssl genrsa -out $STRONGSWAN_CLIENT_NAME.key 4096 Generating RSA private key, 4096 bit long modulus ............................++ @@ -389,7 +389,7 @@ systemctl restart strongswan ### Step 10: confirm strongSwan client is connected -```shell +```console $ ipsec status Security Associations (1 up, 0 connecting): ikev2[1]: ESTABLISHED 3 minutes ago, 10.0.1.248[bob@vpn-server.com]...185.193.126.203[vpn-server.com] @@ -432,7 +432,7 @@ su - Replace `10.0.2.171` with IP assigned to strongSwan client by strongSwan server (see [step 10](#step-10-confirm-strongswan-client-is-connected)). -```shell +```console $ cat /var/lib/misc/dnsmasq.leases | grep "10.0.2.171" | awk '{print $2}' 7a:a7:9f:c0:9d:b0 ``` @@ -471,7 +471,7 @@ systemctl restart strongswan ### Step 20: confirm strongSwan client has IP `10.0.2.2` -```shell +```console $ ipsec status Security Associations (1 up, 0 connecting): ikev2[1]: ESTABLISHED 3 minutes ago, 10.0.1.248[bob@vpn-server.com]...185.193.126.203[vpn-server.com] diff --git a/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos/README.md b/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos/README.md index ac4148c..fd945b6 100644 --- a/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos/README.md +++ b/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos/README.md @@ -130,7 +130,7 @@ EOF ### Step 8: reboot and confirm hostname and MAC address have been spoofed -```shell +```console # Spoofed hostname $ scutil --get HostName Gatlins-MacBook-Pro