Compare commits
6 Commits
Author | SHA1 | Date | |
---|---|---|---|
bc9b85e23b | |||
bbeff69a10 | |||
8293415fbd | |||
3c3fe48672 | |||
f8c9d7bf10 | |||
8ad7fd5fed |
@ -6,6 +6,7 @@
|
||||
<div class="image">{% if post.image %}<img src="{% if site.featured-image-source %}{{ post.image | prepend: site.featured-image-source | absolute_url }}{% else %}{{ "" | absolute_url }}/assets/images/{{ post.image }}{% endif %}" alt="" />{% endif %}</div>
|
||||
<div class="content">
|
||||
<h2><a href="{{ post.url | relative_url }}" class="link">{{ post.title }}</a></h2>
|
||||
<p class="h5">{{ post.date | date: '%B %d, %Y' }}</p>
|
||||
<p>{{ post.description }}</p>
|
||||
</div>
|
||||
</section>
|
||||
|
@ -71,7 +71,7 @@
|
||||
<p>
|
||||
A grounded and principled understanding of the cybersecurity domain can ensure
|
||||
your organisation is not liable to any unwanted security threats. We provide
|
||||
structured training.
|
||||
structured training taliored to your threat model.
|
||||
</p>
|
||||
</li>
|
||||
</ul>
|
||||
|
@ -35,6 +35,7 @@
|
||||
{{ item.title }}
|
||||
{% if item.layout %}</a>{% endif %}
|
||||
</h2>
|
||||
<p class="h5">{{ item.date | date: '%B %d, %Y' }}</p>
|
||||
<p>{{ item.description }}</p>
|
||||
</div>
|
||||
</section>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
layout: post
|
||||
title: Our Founding Principles
|
||||
description: Autonomic Co-operative And Our Core Values.
|
||||
description: Autonomic Co-operative And Our Core Values
|
||||
image: pic01.jpg
|
||||
category: values
|
||||
date: 2017-10-03
|
||||
|
@ -107,6 +107,7 @@ h4 {
|
||||
h5 {
|
||||
font-size: 0.8em;
|
||||
line-height: 1.5em;
|
||||
font-style: italic;
|
||||
}
|
||||
|
||||
.h6,
|
||||
|
Reference in New Issue
Block a user