From ef4d840d7b5deeaca7b03b2e335de98fe01236c9 Mon Sep 17 00:00:00 2001 From: abhinavis2005 Date: Thu, 23 May 2024 00:09:39 +0530 Subject: [PATCH] minor change --- config.toml | 4 ++-- content/posts/2024-05-22-Philosophy.md | 2 +- templates/blog-page.html | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/config.toml b/config.toml index 3338897..b718df1 100644 --- a/config.toml +++ b/config.toml @@ -18,8 +18,8 @@ highlight_code = false highlight_theme = "gruvbox-dark" [slugify] -paths = "on" -taxonomies = "on" +paths = "off" +taxonomies = "off" anchors = "on" [link_checker] diff --git a/content/posts/2024-05-22-Philosophy.md b/content/posts/2024-05-22-Philosophy.md index 12fcfa6..943fb5b 100644 --- a/content/posts/2024-05-22-Philosophy.md +++ b/content/posts/2024-05-22-Philosophy.md @@ -43,7 +43,7 @@ When laws seem to interfere with free speech, do the good guys who speak their m Part of this drive results in an ultimately beneficial co-evolution of security through competition between attacking hackers and defending hackers. Just as the speedy gazelle adapted from being chased by the cheetah, and the cheetah became even faster from chasing the gazelle, the competition between hackers provides computer users with better and stronger security, as well as more complex and sophisticated attack techniques. -The introduction and progression of intrusion detection systems (IDSs) is a prime example of this co-evolutionary process. The defending hackers create IDSs to add to their arsenal, while the attacking hackers develop IDS-evasion techniques, which are eventually compensated for in bigger and better IDS products. The net result of this interaction is positive, as it produces smarter people, improved security, more stable software, inventive problem-solving techniques, and even a new economy +The introduction and progression of intrusion detection systems (IDSs) is a prime example of this co-evolutionary process. The defending hackers create IDSs to add to their arsenal, while the attacking hackers develop IDS-evasion techniques, which are eventually compensated for in bigger and better IDS products. The net result of this interaction is positive, as it produces smarter people, improved security, more stable software, inventive problem-solving techniques, and even a new economy. diff --git a/templates/blog-page.html b/templates/blog-page.html index 29598fa..923c3d6 100644 --- a/templates/blog-page.html +++ b/templates/blog-page.html @@ -40,7 +40,7 @@

Table of contents

{% if page.taxonomies.tags %} {% for tag in page.taxonomies.tags %} - /{{ tag }}/ + /{{ tag }}/ {% endfor %} {% endif %}