README.md in shodanz-2.0.1 vs README.md in shodanz-2.0.2

- old
+ new

@@ -287,24 +287,24 @@ #### Search Search across a variety of data sources for exploits and use facets to get summary information. ```ruby -client.search("python") # Search for Snek vulns. -client.search(post: 22) # Port number for the affected service if the exploit is remote. -client.search(type: "shellcode") # A category of exploit to search for. -client.search(osvdb: "100007") # Open Source Vulnerability Database ID for the exploit. +client.exploits_api.search("python") # Search for python vulns. +client.exploits_api.search(port: 22) # Port number for the affected service if the exploit is remote. +client.exploits_api.search(type: "shellcode") # A category of exploit to search for. +client.exploits_api.search(osvdb: "100007") # Open Source Vulnerability Database ID for the exploit. ``` #### Count This method behaves identical to the Exploits API `search` method with the difference that it doesn't return any results. ```ruby -client.count("python") # Count Snek vulns. -client.count(port: 22) # Port number for the affected service if the exploit is remote. -client.count(type: "shellcode") # A category of exploit to search for. -client.count(osvdb: "100007") # Open Source Vulnerability Database ID for the exploit. +client.exploits_api.count("python") # Count python vulns. +client.exploits_api.count(port: 22) # Port number for the affected service if the exploit is remote. +client.exploits_api.count(type: "shellcode") # A category of exploit to search for. +client.exploits_api.count(osvdb: "100007") # Open Source Vulnerability Database ID for the exploit. ``` ## License The gem is available as open source under the terms of the [MIT License](http://opensource.org/licenses/MIT).