diff --git a/content/from-0-to-buffer-overflow-by-projects/episode-2-reverse-engineering-of-vigenere-cisco(reverse-engineering)-program.md b/content/from-0-to-buffer-overflow-by-projects/episode-2-guessing-source-code-(reverse-engineering)-program.md
similarity index 99%
rename from content/from-0-to-buffer-overflow-by-projects/episode-2-reverse-engineering-of-vigenere-cisco(reverse-engineering)-program.md
rename to content/from-0-to-buffer-overflow-by-projects/episode-2-guessing-source-code-(reverse-engineering)-program.md
index 8bc743d..179f22c 100644
--- a/content/from-0-to-buffer-overflow-by-projects/episode-2-reverse-engineering-of-vigenere-cisco(reverse-engineering)-program.md
+++ b/content/from-0-to-buffer-overflow-by-projects/episode-2-guessing-source-code-(reverse-engineering)-program.md
@@ -35,16 +35,6 @@ $ which packettracer
/usr/local/bin/packettracer
```
-
-In order to redo same commands as me you could also download it from my repository
-
-```
-wget https://github.com/gogo2464/packet-tracer-linux-8.2.1.0118-archive/releases/edit/untagged-4b7b9f96a74e3408a5b2
-cd packet-tracer-linux-8.2.1.0118-disassembly
-sudo apt-get install --reinstall libxcb-xinerama0 --yes
-```
-
-
Find the file `PacketTracer` with: `ls /opt/pt/bin`.
The file `packettracer` provides running commands:
@@ -94,6 +84,14 @@ Router#
In any cisco router you could run as well. It fits with the output of the program.
+In order to redo same commands as me you could also download it from my repository
+
+```
+wget https://github.com/gogo2464/packet-tracer-linux-8.2.1.0118-archive/releases/download/packet-tracer-linux-8.2.1.0118/pt.tar
+tar -xvf pt.tar
+cd pt.tar
+cd pt
+```
### 2.1: static analysis: looking for symbols (exercice)
diff --git a/content/from-0-to-crypto-by-projects/episode-2-proof-demonstration.md b/content/from-0-to-crypto-by-projects/episode-2-proof-demonstration.md
index 13f9236..4aa2c4c 100644
--- a/content/from-0-to-crypto-by-projects/episode-2-proof-demonstration.md
+++ b/content/from-0-to-crypto-by-projects/episode-2-proof-demonstration.md
@@ -9,7 +9,7 @@ draft: false
According to the documentation and as it is mentionned that type 7 is an hashing algorithm.
-A secure hash algorithm is an hash algorithm so that there does not exist a function `$$ f(enc) $$` so that `$$ f(enc) = original_plaintext $$`.
+A secure hash algorithm is an hash algorithm so that there does not exist a function `$ f(enc) $` so that `$ f(enc) = original_plaintext $`.
## 1 - Analysis under mathematical thinking
diff --git a/themes/hello-4s3ti/layouts/_default/baseof.html b/themes/hello-4s3ti/layouts/_default/baseof.html
index 399a30b..ff3d164 100644
--- a/themes/hello-4s3ti/layouts/_default/baseof.html
+++ b/themes/hello-4s3ti/layouts/_default/baseof.html
@@ -9,7 +9,7 @@
{{ end }}
-
+
diff --git a/themes/hello-4s3ti/layouts/partials/head.html b/themes/hello-4s3ti/layouts/partials/head.html
index b53c9f7..0677ac1 100644
--- a/themes/hello-4s3ti/layouts/partials/head.html
+++ b/themes/hello-4s3ti/layouts/partials/head.html
@@ -96,3 +96,20 @@
{{- if .Site.Config.Services.GoogleAnalytics.ID }}
{{ template "_internal/google_analytics.html" . }}
{{- end}}
+
+
+
+
+
+
+
+
+
\ No newline at end of file