From 94ab37be01d8b206f9136233babc4f7d37ceb5bc Mon Sep 17 00:00:00 2001 From: sspencerwire Date: Wed, 21 Feb 2024 15:42:06 -0600 Subject: [PATCH] Minor wording and sentence structure changes --- docs/labs/security/lab3-auditing_the_system.md | 6 +++++- docs/labs/security/lab9-cryptography.md | 8 ++++---- 2 files changed, 9 insertions(+), 5 deletions(-) diff --git a/docs/labs/security/lab3-auditing_the_system.md b/docs/labs/security/lab3-auditing_the_system.md index ec5c952196..426be27979 100644 --- a/docs/labs/security/lab3-auditing_the_system.md +++ b/docs/labs/security/lab3-auditing_the_system.md @@ -532,7 +532,11 @@ Running Tripwire in this mode (integrity check mode) compares the current file s Tripwire’s report files, are a collection of rule violations discovered during an integrity check. -There are several methods of viewing the Tripwire report file. You could have been viewing it while the integrity check was running, you could view it in the form of an e-mail automatically sent to you, or you could view it using the “twprint” command provided with the Tripwire package. +There are several ways to view a Tripwire report file: + +- during integrity check +- in the form of an email automatically sent to you +- using the `twprint` command provided with the Tripwire package !!! note diff --git a/docs/labs/security/lab9-cryptography.md b/docs/labs/security/lab9-cryptography.md index 7795e8462d..2fd1cfeae3 100644 --- a/docs/labs/security/lab9-cryptography.md +++ b/docs/labs/security/lab9-cryptography.md @@ -702,7 +702,7 @@ Most Linux systems out of the box already have the OpenSSH server configured and ### Creating host keys -Your SSH server already has host keys that it uses. Those keys were generated when your system was first installed. In this exercise you will learn how to create host-type keys for your server, but you wont use the keys. +Your SSH server already has host keys that it uses. Those keys were generated when your system was first installed. In this exercise, you will learn how to create host-type keys for your server, but you wont use the keys. #### To generate host keys for your server @@ -727,7 +727,7 @@ Your SSH server already has host keys that it uses. Those keys were generated wh !!! Question - What do you need to do to make the sshd daemon use the host key that you just generated? + What must you do to make the sshd daemon use the host key that you just generated? 3. View the fingerprint of the key you created above. Type: @@ -838,7 +838,7 @@ usage: ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-B bind_interface] !!! Question "Questions" - Was the user ying able to remotely reboot serverPR? Why can't ying remotely reboot serverPR? + Was user ying able to reboot serverPR remotely? Why can't ying remotely reboot serverPR? 7. From serverXY, try remotely viewing the status of the `sshd` service running on serverPR as the user `ying`. Type: @@ -928,7 +928,7 @@ usage: scp [-346BCpqrTv] [-c cipher] [-F ssh_config] [-i identity_file] !!! Question "Questions" - What is the slight but very important difference between the variations of the 2 previous commands? And what is the result of each command? + What is the slight but significant difference between the variations of the 2 previous commands? And what is the result of each command? - `scp -r ying@localhost:/home/ying/ ying_home_directory_on_serverPR`