summaryrefslogtreecommitdiff
path: root/Meta/Websites/serenityos.org/happy/2nd/index.html
diff options
context:
space:
mode:
Diffstat (limited to 'Meta/Websites/serenityos.org/happy/2nd/index.html')
-rw-r--r--Meta/Websites/serenityos.org/happy/2nd/index.html10
1 files changed, 5 insertions, 5 deletions
diff --git a/Meta/Websites/serenityos.org/happy/2nd/index.html b/Meta/Websites/serenityos.org/happy/2nd/index.html
index a222968fda..d24920ea8b 100644
--- a/Meta/Websites/serenityos.org/happy/2nd/index.html
+++ b/Meta/Websites/serenityos.org/happy/2nd/index.html
@@ -149,7 +149,7 @@
Someone put together a CTF (Capture The Flag) challenge at the
36c3 computer security conference. I learned about this when
two exploits showed up (complete with write-ups!) on GitHub:
-
+
<a href="https://github.com/Fire30/CTF-WRITEUPS/tree/master/36c3_ctf/wisdom">one from Fire30</a> and <a href="https://github.com/braindead/ctf-writeups/tree/master/2019/36c3/wisdom">another one from braindead</a>.
<br><br>
This caught me by total surprise and I was a little bit disappointed
@@ -426,10 +426,10 @@
<i>Andreas Kling, 2020-10-10</i>
</p>
<p>
- <a href="https://github.com/awesomekling">GitHub</a> |
- <a href="https://youtube.com/c/AndreasKling">YouTube</a> |
- <a href="https://twitter.com/awesomekling">Twitter</a> |
- <a href="https://patreon.com/serenityos">Patreon</a> |
+ <a href="https://github.com/awesomekling">GitHub</a> |
+ <a href="https://youtube.com/c/AndreasKling">YouTube</a> |
+ <a href="https://twitter.com/awesomekling">Twitter</a> |
+ <a href="https://patreon.com/serenityos">Patreon</a> |
<a href="https://paypal.me/awesomekling">PayPal</a>
</p>
<script>