From 8f309cdbbe0173e04486cece1dabfffba2b29165 Mon Sep 17 00:00:00 2001
From: "Mark A. Yoder" <Mark.A.Yoder@Rose-Hulman.edu>
Date: Fri, 20 Sep 2024 16:33:45 -0400
Subject: [PATCH] Added more shell-sessions

---
 books/beaglebone-cookbook/11misc/misc.rst | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/books/beaglebone-cookbook/11misc/misc.rst b/books/beaglebone-cookbook/11misc/misc.rst
index f2d98c6b..c4ac9b10 100644
--- a/books/beaglebone-cookbook/11misc/misc.rst
+++ b/books/beaglebone-cookbook/11misc/misc.rst
@@ -218,7 +218,7 @@ By default the image we are running doesn't allow a root login.
 You can always sudo from debian, but sometimes it's nice to login as root. 
 Here's how to setup root so you can login from your host without a password.
 
-.. code-block:: bash
+.. code-block:: shell-session
     
     host$ ssh bone
 
@@ -334,7 +334,7 @@ https://serverfault.com/questions/362529/how-can-i-sniff-the-traffic-of-remote-m
 First login to the Beagle and install tcpdump. Use your Beagle's 
 IP address.  
 
-.. code-block:: 
+.. code-block:: shell-session
 
     host$ ssh 192.168.7.2
     bone$ sudo apt update
@@ -343,7 +343,7 @@ IP address.
 
 Next, create a named pipe and have wireshark read from it.
 
-.. code-block:: 
+.. code-block:: shell-session
 
     host$ mkfifo /tmp/remote
     host$ wireshark -k -i /tmp/remote
-- 
GitLab