diff options
Diffstat (limited to 'Meta/Websites/serenityos.org/happy/2nd/index.html')
-rw-r--r-- | Meta/Websites/serenityos.org/happy/2nd/index.html | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/Meta/Websites/serenityos.org/happy/2nd/index.html b/Meta/Websites/serenityos.org/happy/2nd/index.html index a222968fda..d24920ea8b 100644 --- a/Meta/Websites/serenityos.org/happy/2nd/index.html +++ b/Meta/Websites/serenityos.org/happy/2nd/index.html @@ -149,7 +149,7 @@ Someone put together a CTF (Capture The Flag) challenge at the 36c3 computer security conference. I learned about this when two exploits showed up (complete with write-ups!) on GitHub: - + <a href="https://github.com/Fire30/CTF-WRITEUPS/tree/master/36c3_ctf/wisdom">one from Fire30</a> and <a href="https://github.com/braindead/ctf-writeups/tree/master/2019/36c3/wisdom">another one from braindead</a>. <br><br> This caught me by total surprise and I was a little bit disappointed @@ -426,10 +426,10 @@ <i>Andreas Kling, 2020-10-10</i> </p> <p> - <a href="https://github.com/awesomekling">GitHub</a> | - <a href="https://youtube.com/c/AndreasKling">YouTube</a> | - <a href="https://twitter.com/awesomekling">Twitter</a> | - <a href="https://patreon.com/serenityos">Patreon</a> | + <a href="https://github.com/awesomekling">GitHub</a> | + <a href="https://youtube.com/c/AndreasKling">YouTube</a> | + <a href="https://twitter.com/awesomekling">Twitter</a> | + <a href="https://patreon.com/serenityos">Patreon</a> | <a href="https://paypal.me/awesomekling">PayPal</a> </p> <script> |