diff --git a/docs/images/nobody_know_you_are_a_dog.webp b/docs/images/nobody_know_you_are_a_dog.webp
index e29605d..7ad2988 100644
Binary files a/docs/images/nobody_know_you_are_a_dog.webp and b/docs/images/nobody_know_you_are_a_dog.webp differ
diff --git a/docs/setup/set_up_build_environments.md b/docs/setup/set_up_build_environments.md
index 0b96384..075360e 100644
--- a/docs/setup/set_up_build_environments.md
+++ b/docs/setup/set_up_build_environments.md
@@ -136,7 +136,7 @@ m-a -qi prepare
apt autoremove -qy
mount /media/cdrom0
cd /media/cdrom0 && sh ./VBoxLinuxAdditions.run
-usermod -a -G vboxsf cherry
+usermod -a -G vboxsf «username»
```
You will need to do another `m-a prepare` and to reinstall it after a
@@ -167,7 +167,7 @@ to
```ini
autologin-guest=false
-autologin-user=cherry
+autologin-user=«username»
autologin-user-timeout=0
```
@@ -229,7 +229,7 @@ hostname && domainname -s && hostnamectl status
And if need be, set them with
```bash
-fn=reaction.la
+fn=«example.com»
domainname -b $fn
hostnamectl set-hostname $fn
```
@@ -238,7 +238,7 @@ Your /etc/hosts file should contain
```text
127.0.0.1 localhost
-127.0.0.1 reaction.la
+127.0.0.1 «example.com»
# The following lines are desirable for IPv6 capable hosts
::1 ip6-localhost ip6-loopback
fe00::0 ip6-localnet
@@ -330,7 +330,7 @@ apt autoremove -qy
Then you click on the autorun.sh in the cdrom through the gui.
```bash
-usermod -a -G vboxsf cherry
+usermod -a -G vboxsf «username»
```
## Setting up OpenWrt in VirtualBox
@@ -575,7 +575,7 @@ On an actual server, it is advisable to enable passwordless sudo for one user.
issue the command `visudo` and edit the sudoers file to contain the line:
``` default
-cherry ALL=(ALL) NOPASSWD:ALL
+«username» ALL=(ALL) NOPASSWD:ALL
```
That user can now sudo any root command, with no password login nor
@@ -808,9 +808,9 @@ ssh-keygen -t ed25519 -f ssh_host_ed25519_key
(I don't trust the other key algorithms, because I suspect the NSA has been up to cleverness with the details of the implementation.)
On windows, your secret key should be in `%HOMEPATH%/.ssh`, on linux
-in `/home/cherry/.ssh`, as is your config file for your ssh client, listing
+in `/home/«username»/.ssh`, as is your config file for your ssh client, listing
the keys for hosts. The public keys of your authorized keys are in
-`/home/cherry/.ssh/authorized_keys`, enabling you to login from afar as
+`/home/«username»/.ssh/authorized_keys`, enabling you to login from afar as
that user over the internet. The linux system for remote login is a cleaner
and simpler system that the multitude of mysterious, complicated, and
failure prone facilities for remote windows login, which is a major reason
@@ -1106,7 +1106,7 @@ rsync -aAXvzP --delete remote_host:~/name .
To make sure the files are truly identical:
```bash
-rsync -aAXvzc --delete reaction.la:~/name .
+rsync -aAXvzc --delete «example.com»:~/name .
```
`rsync, ssh, git` and so forth know how to logon from the
@@ -1208,7 +1208,7 @@ The sites-available directory looks like
```default
000-default.conf
- reaction.la.conf
+ «example.com».conf
default-ssl.conf
```
@@ -1216,37 +1216,37 @@ The sites enabled directory looks like
```default
000-default.conf -> ../sites-available/000-default.conf
- reaction.la-le-ssl.conf
- reaction.la.conf
+ «example.com»-le-ssl.conf
+ «example.com».conf
```
-And the contents of reaction.la.conf are (before the https thingly has
+And the contents of «example.com».conf are (before the https thingly has
worked its magic)
```default