From 8f309cdbbe0173e04486cece1dabfffba2b29165 Mon Sep 17 00:00:00 2001 From: "Mark A. Yoder" <Mark.A.Yoder@Rose-Hulman.edu> Date: Fri, 20 Sep 2024 16:33:45 -0400 Subject: [PATCH] Added more shell-sessions --- books/beaglebone-cookbook/11misc/misc.rst | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/books/beaglebone-cookbook/11misc/misc.rst b/books/beaglebone-cookbook/11misc/misc.rst index f2d98c6b..c4ac9b10 100644 --- a/books/beaglebone-cookbook/11misc/misc.rst +++ b/books/beaglebone-cookbook/11misc/misc.rst @@ -218,7 +218,7 @@ By default the image we are running doesn't allow a root login. You can always sudo from debian, but sometimes it's nice to login as root. Here's how to setup root so you can login from your host without a password. -.. code-block:: bash +.. code-block:: shell-session host$ ssh bone @@ -334,7 +334,7 @@ https://serverfault.com/questions/362529/how-can-i-sniff-the-traffic-of-remote-m First login to the Beagle and install tcpdump. Use your Beagle's IP address. -.. code-block:: +.. code-block:: shell-session host$ ssh 192.168.7.2 bone$ sudo apt update @@ -343,7 +343,7 @@ IP address. Next, create a named pipe and have wireshark read from it. -.. code-block:: +.. code-block:: shell-session host$ mkfifo /tmp/remote host$ wireshark -k -i /tmp/remote -- GitLab