diff --git a/index-lab.adoc b/index-lab.adoc
index 36687da..3a25954 100644
--- a/index-lab.adoc
+++ b/index-lab.adoc
@@ -18,9 +18,7 @@ Apostolos rootApostolos@swarmlab.io
.Lab docs
****
-*Internet of Things*. Is as a networked interconnection of devices in everyday use that are often equippedwith ubiquitous mechanism.
-
-The Internet of Things (IoT) is based on processing of large amount of data in order to provide useful service. Along with physical objects, the IoT is composed of embedded software, electronics and sensors.
+*Internet of Things*. Is as a networked interconnection of devices in everyday use that are often equippedwith ubiquitous mechanism. The Internet of Things (IoT) is based on processing of large amount of data in order to provide useful service. Along with physical objects, the IoT is composed of embedded software, electronics and sensors.
*Security* is defined as a set of mechanisms to protect sensitive data from vulnerable attacks and to guaranteeconfidentiality, integrity and authenticity of data.
****
diff --git a/index-lab.adoc.html b/index-lab.adoc.html
index 41211db..630d8a8 100644
--- a/index-lab.adoc.html
+++ b/index-lab.adoc.html
@@ -486,10 +486,7 @@ body.book #toc,body.book #preamble,body.book h1.sect0,body.book .sect1>h2{page-b
Lab docs
-
Internet of Things. Is as a networked interconnection of devices in everyday use that are often equippedwith ubiquitous mechanism.
-
-
-
The Internet of Things (IoT) is based on processing of large amount of data in order to provide useful service. Along with physical objects, the IoT is composed of embedded software, electronics and sensors.
+
Internet of Things. Is as a networked interconnection of devices in everyday use that are often equippedwith ubiquitous mechanism. The Internet of Things (IoT) is based on processing of large amount of data in order to provide useful service. Along with physical objects, the IoT is composed of embedded software, electronics and sensors.
Security is defined as a set of mechanisms to protect sensitive data from vulnerable attacks and to guaranteeconfidentiality, integrity and authenticity of data.
@@ -715,7 +712,7 @@ This tutorial demonstrates some common
nmap port scanning scena