File tree Expand file tree Collapse file tree 1 file changed +4
-4
lines changed Expand file tree Collapse file tree 1 file changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -66,25 +66,25 @@ To run ThreatByte application locally, you can follow these steps:
66
66
67
67
## Docker
68
68
69
- Alternatively, you can use Docker to run ThreatByteLand . Ensure you have Docker installed on your system.
69
+ Alternatively, you can use Docker to run ThreatByte . Ensure you have Docker installed on your system.
70
70
71
71
1. **Build the Docker image:**
72
72
73
73
```
74
- docker build -t threatbyteland .
74
+ docker build -t threatbyte .
75
75
```
76
76
77
77
2. **Run the Docker container:**
78
78
79
79
```
80
- docker run -p 5000:5000 threatbyteland
80
+ docker run -p 5000:5000 threatbyte
81
81
```
82
82
83
83
3. **Access the application in your web browser at `http://localhost:5000`.**
84
84
85
85
## Features
86
86
87
- The ThreatByteLand application aims to represent a simple online sharing platform. Currently it has the following features:
87
+ The ThreatByte application aims to represent a simple online sharing platform. Currently it has the following features:
88
88
89
89
- **User Authentication:** Users can sign up, log in, and log out.
90
90
- **Dashboard:** Users have a personalized dashboard to view and manage their uploaded files.
You can’t perform that action at this time.
0 commit comments