From b0a444db8710bb5bd66aafb86cd9f010403ca536 Mon Sep 17 00:00:00 2001 From: Sometimes_Puzzled Date: Fri, 7 Jun 2024 12:59:15 -0700 Subject: [PATCH] Update _index.md --- content/_index.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/content/_index.md b/content/_index.md index 0d6d6b7..1ef44fd 100755 --- a/content/_index.md +++ b/content/_index.md @@ -16,10 +16,10 @@ CVEX is an executable that runs a software exploit and outputs relevant data in ### How to run CVEX with access to source code 1. Pull from the GitHub Container Registry (GHCR): -  a. 'docker pull ghcr.io/ucsb-seclab/NAME_OF_CONTAINER:TAG' -  b. for example, 'docker pull ghcr.io/ucsb-seclab/demo/client:latest' +  a. `docker pull ghcr.io/ucsb-seclab/NAME_OF_CONTAINER:TAG` +  b. for example, `docker pull ghcr.io/ucsb-seclab/demo/client:latest`   c. go to the github linked to the CVEX and pull the docker-compose file, -     then run using the command 'docker compose up' +     then run using the command `docker compose up`   d. check each container's README for more details, and [for help on ghcr](https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry#pulling-container-images) 2. Or (for v2 only): pull from the Github and run as instructed in the README