From 0e0c502b8ede2e06f318b5915007498fe1c86a32 Mon Sep 17 00:00:00 2001 From: Pekka Helenius Date: Wed, 15 Aug 2018 12:12:00 +0300 Subject: [PATCH] H5: Fix more links --- exercises/h5.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exercises/h5.md b/exercises/h5.md index 6cab49b..18033d6 100644 --- a/exercises/h5.md +++ b/exercises/h5.md @@ -1434,7 +1434,7 @@ cd 1. We shall connect to the server computer (running Ubuntu) and then install the required package with command sequence 'sudo apt-get update && sudo apt-get install -y install sysstat' -2. Run [shell-based sysstat script](https://github.com/Fincer-altego/basics-of-a-linux-server-school-course-/blob/master/sysstat_command.sh) which runs sar and pidstat commands two days with 20 second intervals. +2. Run [shell-based sysstat script](https://github.com/Fincer/linux_server_setup/blob/master/scripts/sysstat_command.sh) which runs sar and pidstat commands two days with 20 second intervals. **NOTE!** The script could have been opmitized more for the real requirements for the server environment (statistics interval, collection period, etc.) @@ -1910,7 +1910,7 @@ More about Port Knocking technique: Program [arp-scan](https://www.blackmoreops.com/2015/12/31/use-arp-scan-to-find-hidden-devices-in-your-network/) can be used in limited scale to scan a MAC address (OSI model layer 2, Data Link Layer) in a network. -Unique MAC address of a network interface (network card) can programmatically be spoofed with [these Arch Wiki instructions](https://wiki.archlinux.org/index.php/MAC_address_spoofing#Method_1:_systemd-networkd) or with my [Spoof MAC Address shell script](https://github.com/Fincer-altego/basics-of-a-linux-server-school-course-/blob/master/spoof_mac_address.sh). +Unique MAC address of a network interface (network card) can programmatically be spoofed with [these Arch Wiki instructions](https://wiki.archlinux.org/index.php/MAC_address_spoofing#Method_1:_systemd-networkd) or with my [Spoof MAC Address shell script](https://github.com/Fincer/linux_server_setup/blob/master/scripts/spoof_mac_address.sh). Sample results of ARP Scan.