diff options
author | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2020-08-03 23:33:19 +0200 |
---|---|---|
committer | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2020-08-03 23:34:42 +0200 |
commit | c8b501062d31afb37168f676fa3168ad8b1e9007 (patch) | |
tree | e30e5041ad165edb656380952de03d36488aa137 | |
parent | ac87f561a8de8e26701244698f54954017715ab5 (diff) | |
download | VeraCrypt-c8b501062d31afb37168f676fa3168ad8b1e9007.tar.gz VeraCrypt-c8b501062d31afb37168f676fa3168ad8b1e9007.zip |
Documentation: remove size specifiers for images in HTML files
-rw-r--r-- | doc/chm/VeraCrypt User Guide.chm | bin | 1914674 -> 1914532 bytes | |||
-rw-r--r-- | doc/html/Beginner's Tutorial.html | 42 | ||||
-rw-r--r-- | doc/html/Converting TrueCrypt volumes and partitions.html | 2 | ||||
-rw-r--r-- | doc/html/Default Mount Parameters.html | 6 | ||||
-rw-r--r-- | doc/html/Personal Iterations Multiplier (PIM).html | 12 | ||||
-rw-r--r-- | doc/html/Protection of Hidden Volumes.html | 10 | ||||
-rw-r--r-- | doc/html/TrueCrypt Support.html | 2 | ||||
-rw-r--r-- | doc/html/VeraCrypt Hidden Operating System.html | 2 |
8 files changed, 38 insertions, 38 deletions
diff --git a/doc/chm/VeraCrypt User Guide.chm b/doc/chm/VeraCrypt User Guide.chm Binary files differindex 4a8ae925..5816a08e 100644 --- a/doc/chm/VeraCrypt User Guide.chm +++ b/doc/chm/VeraCrypt User Guide.chm diff --git a/doc/html/Beginner's Tutorial.html b/doc/html/Beginner's Tutorial.html index d127b993..e9cbf134 100644 --- a/doc/html/Beginner's Tutorial.html +++ b/doc/html/Beginner's Tutorial.html @@ -39,11 +39,11 @@ <h4>STEP 1:</h4> <p>If you have not done so, download and install VeraCrypt. Then launch VeraCrypt by double-clicking the file VeraCrypt.exe or by clicking the VeraCrypt shortcut in your Windows Start menu.</p> <h4>STEP 2:</h4> -<p><img src="Beginner's Tutorial_Image_001.jpg" alt="" width="579" height="498"><br> +<p><img src="Beginner's Tutorial_Image_001.jpg" alt=""><br> <br> The main VeraCrypt window should appear. Click <strong>Create Volume </strong>(marked with a red rectangle for clarity).</p> <h4>STEP 3:</h4> -<p><img src="Beginner's Tutorial_Image_002.jpg" alt="" width="616" height="410"><br> +<p><img src="Beginner's Tutorial_Image_002.jpg" alt=""><br> <br> The VeraCrypt Volume Creation Wizard window should appear.<br> <br> @@ -53,13 +53,13 @@ In this step you need to choose where you wish the VeraCrypt volume to be create As the option is selected by default, you can just click <strong>Next</strong>.</p> <p>Note: In the following steps, the screenshots will show only the right-hand part of the Wizard window.</p> <h4>STEP 4:</h4> -<p><img src="Beginner's Tutorial_Image_003.jpg" alt="" width="371" height="333"><br> +<p><img src="Beginner's Tutorial_Image_003.jpg" alt=""><br> <br> In this step you need to choose whether to create a standard or hidden VeraCrypt volume. In this tutorial, we will choose the former option and create a standard VeraCrypt volume.<br> <br> As the option is selected by default, you can just click <strong>Next</strong>.</p> <h4>STEP 5:</h4> -<p><img src="Beginner's Tutorial_Image_004.jpg" alt="" width="363" height="336"><br> +<p><img src="Beginner's Tutorial_Image_004.jpg" alt=""><br> <br> In this step you have to specify where you wish the VeraCrypt volume (file container) to be created. Note that a VeraCrypt container is just like any normal file. It can be, for example, moved or deleted as any normal file. It also needs a filename, which you will choose in the next step.<br> @@ -68,7 +68,7 @@ Click <strong>Select File</strong>.<br> <br> The standard Windows file selector should appear (while the window of the VeraCrypt Volume Creation Wizard remains open in the background).</p> <h4>STEP 6:</h4> -<p><img src="Beginner's Tutorial_Image_005.jpg" alt="" width="720" height="452"><br> +<p><img src="Beginner's Tutorial_Image_005.jpg" alt=""><br> <br> In this tutorial, we will create our VeraCrypt volume in the folder F<em>:\Data\ </em> and the filename of the volume (container) will be <em>MyVolume.hc </em>(as can be seen in the screenshot above). You may, of course, choose any other filename and location you like (for example, on a USB memory stick). Note that the file @@ -85,23 +85,23 @@ The file selector window should disappear.<br> In the following steps, we will return to the VeraCrypt Volume Creation Wizard.</p> <p>* Note that after you copy existing unencrypted files to a VeraCrypt volume, you should securely erase (wipe) the original unencrypted files. There are software tools that can be used for the purpose of secure erasure (many of them are free).</p> <h4>STEP 7:</h4> -<p><img src="Beginner's Tutorial_Image_007.jpg" alt="" width="360" height="335"><br> +<p><img src="Beginner's Tutorial_Image_007.jpg" alt=""><br> <br> In the Volume Creation Wizard window, click <strong>Next</strong>.</p> <h4>STEP 8:</h4> -<p><img src="Beginner's Tutorial_Image_008.jpg" alt="" width="359" height="331"><br> +<p><img src="Beginner's Tutorial_Image_008.jpg" alt=""><br> <br> Here you can choose an encryption algorithm and a hash algorithm for the volume. If you are not sure what to select here, you can use the default settings and click <strong>Next </strong>(for more information, see chapters <a href="Encryption Algorithms.html"> <em>Encryption Algorithms</em></a> and <a href="Hash%20Algorithms.html"> <em>Hash Algorithms</em></a>).</p> <h4>STEP 9:</h4> -<p><img src="Beginner's Tutorial_Image_009.jpg" alt="" width="369" height="332"><br> +<p><img src="Beginner's Tutorial_Image_009.jpg" alt=""><br> <br> Here we specify that we wish the size of our VeraCrypt container to be 250 megabyte. You may, of course, specify a different size. After you type the desired size in the input field (marked with a red rectangle), click <strong>Next</strong>.</p> <h4>STEP 10:</h4> -<p><img src="Beginner's Tutorial_Image_010.jpg" alt="" width="372" height="368"><br> +<p><img src="Beginner's Tutorial_Image_010.jpg" alt=""><br> <br> This is one of the most important steps. Here you have to choose a good volume password. Read carefully the information displayed in the Wizard window about what is considered a good password.<br> <br> @@ -109,7 +109,7 @@ After you choose a good password, type it in the first input field. Then re-type <strong>Next</strong>.</p> <p>Note: The button <strong>Next </strong>will be disabled until passwords in both input fields are the same.</p> <h4>STEP 11:</h4> -<p><img src="Beginner's Tutorial_Image_011.jpg" alt="" width="365" height="368"><br> +<p><img src="Beginner's Tutorial_Image_011.jpg" alt=""><br> <br> Move your mouse as randomly as possible within the Volume Creation Wizard window at least until the randomness indicator becomes green. The longer you move the mouse, the better (moving the mouse for at least 30 seconds is recommended). This significantly increases the cryptographic strength of the encryption keys (which increases security).<br> @@ -120,11 +120,11 @@ Volume creation should begin. VeraCrypt will now create a file called <em>MyVolu </em>in the folder F<em>:\Data\ </em>(as we specified in Step 6). This file will be a VeraCrypt container (it will contain the encrypted VeraCrypt volume). Depending on the size of the volume, the volume creation may take a long time. After it finishes, the following dialog box will appear:<br> <br> -<img src="Beginner's Tutorial_Image_012.jpg" alt="" width="398" height="171"><br> +<img src="Beginner's Tutorial_Image_012.jpg" alt=""><br> <br> Click <strong>OK </strong>to close the dialog box.</p> <h4>STEP 12:</h4> -<p><img src="Beginner's Tutorial_Image_013.jpg" alt="" width="361" height="333"><br> +<p><img src="Beginner's Tutorial_Image_013.jpg" alt=""><br> <br> We have just successfully created a VeraCrypt volume (file container). In the VeraCrypt Volume Creation Wizard window, click <strong>Exit</strong>.<br> @@ -133,19 +133,19 @@ The Wizard window should disappear.<br> <br> In the remaining steps, we will mount the volume we just created. We will return to the main VeraCrypt window (which should still be open, but if it is not, repeat Step 1 to launch VeraCrypt and then continue from Step 13.)</p> <h4>STEP 13:</h4> -<p><img src="Beginner's Tutorial_Image_014.jpg" alt="" width="579" height="498"><br> +<p><img src="Beginner's Tutorial_Image_014.jpg" alt=""><br> <br> Select a drive letter from the list (marked with a red rectangle). This will be the drive letter to which the VeraCrypt container will be mounted.<br> <br> Note: In this tutorial, we chose the drive letter M, but you may of course choose any other available drive letter.</p> <h4>STEP 14:</h4> -<p><img src="Beginner's Tutorial_Image_015.jpg" alt="" width="579" height="498"><br> +<p><img src="Beginner's Tutorial_Image_015.jpg" alt=""><br> <br> Click <strong>Select File</strong>.<br> <br> The standard file selector window should appear.</p> <h4>STEP 15:</h4> -<p><img src="Beginner's Tutorial_Image_016.jpg" alt="" width="625" height="453"><br> +<p><img src="Beginner's Tutorial_Image_016.jpg" alt=""><br> <br> In the file selector, browse to the container file (which we created in Steps 6-12) and select it. Click <strong>Open </strong>(in the file selector window).<br> @@ -154,15 +154,15 @@ The file selector window should disappear.<br> <br> In the following steps, we will return to the main VeraCrypt window.</p> <h4>STEP 16:</h4> -<p><img src="Beginner's Tutorial_Image_017.jpg" alt="" width="579" height="498"><br> +<p><img src="Beginner's Tutorial_Image_017.jpg" alt=""><br> <br> In the main VeraCrypt window, click <strong>Mount</strong>. Password prompt dialog window should appear.</p> <h4>STEP 17:</h4> -<p><img src="Beginner's Tutorial_Image_018.jpg" alt="" width="499" height="205"><br> +<p><img src="Beginner's Tutorial_Image_018.jpg" alt=""><br> <br> Type the password (which you specified in Step 10) in the password input field (marked with a red rectangle).</p> <h4>STEP 18:</h4> -<p><img src="Beginner's Tutorial_Image_019.jpg" alt="" width="499" height="205"><br> +<p><img src="Beginner's Tutorial_Image_019.jpg" alt=""><br> <br> Select the PRF algorithm that was used during the creation of the volume (SHA-512 is the default PRF used by VeraCrypt). If you don’t remember which PRF was used, just leave it set to “autodetection” but the mounting process will take more time. Click <strong>OK</strong> after entering the password.<br> @@ -170,7 +170,7 @@ Select the PRF algorithm that was used during the creation of the volume (SHA-51 VeraCrypt will now attempt to mount the volume. If the password is incorrect (for example, if you typed it incorrectly), VeraCrypt will notify you and you will need to repeat the previous step (type the password again and click <strong>OK</strong>). If the password is correct, the volume will be mounted.</p> <h4>FINAL STEP:</h4> -<p><img src="Beginner's Tutorial_Image_020.jpg" alt="" width="579" height="498"><br> +<p><img src="Beginner's Tutorial_Image_020.jpg" alt=""><br> <br> We have just successfully mounted the container as a virtual disk M:<br> <br> @@ -182,7 +182,7 @@ If you open a file stored on a VeraCrypt volume, for example, in media player, t <p>You can also browse to the mounted volume the way you normally browse to any other types of volumes. For example, by opening the ‘<em>Computer</em>’ (or ‘<em>My Computer</em>’) list and double clicking the corresponding drive letter (in this case, it is the letter M).<br> <br> -<img src="Beginner's Tutorial_Image_021.jpg" alt="" width="406" height="264"><br> +<img src="Beginner's Tutorial_Image_021.jpg" alt=""><br> <br> You can copy files (or folders) to and from the VeraCrypt volume just as you would copy them to any normal disk (for example, by simple drag-and-drop operations). Files that are being read or copied from the encrypted VeraCrypt volume are automatically decrypted on the fly in RAM (memory). Similarly, files that are being written or copied to the VeraCrypt volume are automatically encrypted on the fly in RAM (right before they are written to the disk).<br> @@ -192,7 +192,7 @@ Note that VeraCrypt never saves any decrypted data to a disk – it only sto again, you have to mount the volume. To do so, repeat Steps 13-18.</p> <p>If you want to close the volume and make files stored on it inaccessible, either restart your operating system or dismount the volume. To do so, follow these steps:<br> <br> -<img src="Beginner's Tutorial_Image_022.jpg" alt="" width="579" height="498"><br> +<img src="Beginner's Tutorial_Image_022.jpg" alt=""><br> <br> Select the volume from the list of mounted volumes in the main VeraCrypt window (marked with a red rectangle in the screenshot above) and then click <strong>Dismount </strong>(also marked with a red rectangle in the screenshot above). To make files stored on the volume accessible again, you will have to mount the volume. To do so, repeat Steps 13-18.</p> diff --git a/doc/html/Converting TrueCrypt volumes and partitions.html b/doc/html/Converting TrueCrypt volumes and partitions.html index 324c8c53..f3720bba 100644 --- a/doc/html/Converting TrueCrypt volumes and partitions.html +++ b/doc/html/Converting TrueCrypt volumes and partitions.html @@ -38,6 +38,6 @@ <ul> <li>Change Volume Password </li><li>Set Header Key Derivation Algorithm </li><li>Add/Remove key files </li><li>Remove all key files </li></ul> <p>“TrueCrypt Mode” must be checked in the dialog as show below:</p> -<p> <img src="Converting TrueCrypt volumes and partitions_truecrypt_convertion.jpg" alt="" width="511" height="436"></p> +<p> <img src="Converting TrueCrypt volumes and partitions_truecrypt_convertion.jpg" alt=""></p> <p><strong>Note: </strong>Converting system partitions encrypted with TrueCrypt is not supported.</p> </div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/Default Mount Parameters.html b/doc/html/Default Mount Parameters.html index 899c4280..730b2249 100644 --- a/doc/html/Default Mount Parameters.html +++ b/doc/html/Default Mount Parameters.html @@ -36,14 +36,14 @@ <h2>Default Mount Parameters</h2> <p>Starting from version 1.0f-2, it is possible to specify the PRF algorithm and the TrueCrypt mode that will be selected by default in the password dialog.</p> <p>As show below, select the entry "Default Mount Parameters" under the menu "Settings":</p> -<p><img src="Home_VeraCrypt_menu_Default_Mount_Parameters.png" alt="Menu Default Mount Parameters" width="241" height="254"></p> +<p><img src="Home_VeraCrypt_menu_Default_Mount_Parameters.png" alt="Menu Default Mount Parameters"></p> <p> </p> <p>The following dialog will be displayed:</p> -<p><img src="Home_VeraCrypt_Default_Mount_Parameters.png" alt="Default Mount Parameters Dialog" width="267" height="144"></p> +<p><img src="Home_VeraCrypt_Default_Mount_Parameters.png" alt="Default Mount Parameters Dialog"></p> <p>Make your modifications and then click OK.</p> <p>The chosen values are then written to VeraCrypt main configuration file (Configuration.xml) making them persistent.</p> <p>All subsequent password request dialogs will use the default values chosen previously. For example, if in the Default Mount Parameters dialog you check TrueCrypt Mode and you select SHA-512 as a PRF, then subsequent password dialogs will look like:<br> -<img src="Default Mount Parameters_VeraCrypt_password_using_default_parameters.png" alt="Mount Password Dialog using default values" width="499" height="205"></p> +<img src="Default Mount Parameters_VeraCrypt_password_using_default_parameters.png" alt="Mount Password Dialog using default values"></p> <p> </p> <p><strong>Note:</strong> The default mount parameters can be overridden by the <a href="Command%20Line%20Usage.html">Command Line</a> switches <strong>/tc</strong> and <strong>/hash</strong> which always take precedence.</p> diff --git a/doc/html/Personal Iterations Multiplier (PIM).html b/doc/html/Personal Iterations Multiplier (PIM).html index e2b5ab9e..2c2f746d 100644 --- a/doc/html/Personal Iterations Multiplier (PIM).html +++ b/doc/html/Personal Iterations Multiplier (PIM).html @@ -76,10 +76,10 @@ Motivations behind using a custom PIM value can be:<br> <table style="margin-left:auto; margin-right:auto"> <tbody> <tr> -<td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.png" alt="" width="499" height="205"></td> +<td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.png" alt=""></td> </tr> <tr> -<td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step2.png" alt="" width="499" height="205"></td> +<td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step2.png" alt=""></td> </tr> </tbody> </table> @@ -91,11 +91,11 @@ Motivations behind using a custom PIM value can be:<br> <caption><strong>Normal volume case</strong></caption> <tbody> <tr> -<td style="text-align:center"><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step1.png" alt="" width="511" height="436"></td> +<td style="text-align:center"><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step1.png" alt=""></td> </tr> <tr> <td> -<p><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step2.png" alt="" width="511" height="436"></p> +<p><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step2.png" alt=""></p> </td> </tr> </tbody> @@ -105,10 +105,10 @@ Motivations behind using a custom PIM value can be:<br> <caption><strong>System encryption case</strong></caption> <tbody> <tr> -<td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step1.png" alt="" width="501" height="426"></td> +<td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step1.png" alt=""></td> </tr> <tr> -<td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step2.png" alt="" width="501" height="426"></td> +<td><img src="Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step2.png" alt=""></td> </tr> </tbody> </table> diff --git a/doc/html/Protection of Hidden Volumes.html b/doc/html/Protection of Hidden Volumes.html index 7d489d56..f36c4bcc 100644 --- a/doc/html/Protection of Hidden Volumes.html +++ b/doc/html/Protection of Hidden Volumes.html @@ -46,7 +46,7 @@ hidden volume</a>, you may <em style="text-align:left">read</em> data stored on When mounting an outer volume, type in its password and before clicking <em style="text-align:left"> OK, </em>click <em style="text-align:left">Mount Options</em>:</div> <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> -<img src="Protection of Hidden Volumes_Image_027.jpg" alt="VeraCrypt GUI" width="499" height="205"></div> +<img src="Protection of Hidden Volumes_Image_027.jpg" alt="VeraCrypt GUI"></div> <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> </div> <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> @@ -55,7 +55,7 @@ In the <em style="text-align:left">Mount Options </em>dialog window, enable the OK </em>and, in the main password entry dialog, click <em style="text-align:left"> OK</em>.</div> <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> -<img src="Protection of Hidden Volumes_Image_028.jpg" alt="Mounting with hidden protection" width="432" height="402"></div> +<img src="Protection of Hidden Volumes_Image_028.jpg" alt="Mounting with hidden protection"></div> <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> <br style="text-align:left"> <br style="text-align:left"> @@ -72,7 +72,7 @@ As soon as a write operation to the hidden volume area is denied/prevented (to p <a href="VeraCrypt%20Background%20Task.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> VeraCrypt Background Task</a>). Furthermore, the type of the mounted outer volume displayed in the main window changes to '<em style="text-align:left">Outer(!)</em> ':</div> <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> -<img src="Protection of Hidden Volumes_Image_029.jpg" alt="VeraCrypt GUI" width="579" height="498"></div> +<img src="Protection of Hidden Volumes_Image_029.jpg" alt="VeraCrypt GUI"></div> <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> <br style="text-align:left"> <br style="text-align:left"> @@ -94,7 +94,7 @@ A confirmation message box saying that hidden volume is being protected is displ In the <em style="text-align:left">Volume Properties </em>dialog, the field <em style="text-align:left"> Hidden Volume Protected </em>says '<em style="text-align:left">Yes</em>': </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> The type of the mounted outer volume is <em style="text-align:left">Outer</em>: </li></ol> -<p><img src="Protection of Hidden Volumes_Image_030.jpg" alt="VeraCrypt GUI" width="579" height="232"></p> +<p><img src="Protection of Hidden Volumes_Image_030.jpg" alt="VeraCrypt GUI"></p> <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> <em style="text-align:left"><br style="text-align:left"> <strong style="text-align:left">Important: You are the only person who can mount your outer volume with the hidden volume protection enabled (since nobody else knows your hidden volume password). When an adversary asks you to mount an outer volume, you of course @@ -110,7 +110,7 @@ Unencrypted Data in RAM</a>).</strong></em> <br style="text-align:left"> <em style="text-align:left">Mount Options </em>dialog window is automatically disabled after a mount attempt is completed, no matter whether it is successful or not (all hidden volumes that are already being protected will, of course, continue to be protected). Therefore, you need to check that option <em style="text-align:left">each </em>time you attempt to mount the outer volume (if you wish the hidden volume to be protected):<br style="text-align:left"> <br style="text-align:left"> -<img src="Protection of Hidden Volumes_Image_031.jpg" alt="VeraCrypt GUI" width="432" height="402"></div> +<img src="Protection of Hidden Volumes_Image_031.jpg" alt="VeraCrypt GUI"></div> <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> <br style="text-align:left"> If you want to mount an outer volume and protect a hidden volume within using cached passwords, then follow these steps: Hold down the diff --git a/doc/html/TrueCrypt Support.html b/doc/html/TrueCrypt Support.html index a259773b..739590a6 100644 --- a/doc/html/TrueCrypt Support.html +++ b/doc/html/TrueCrypt Support.html @@ -35,7 +35,7 @@ <div class="wikidoc"> <h1>TrueCrypt Support</h1> <p>Starting from version 1.0f, VeraCrypt supports loading TrueCrypt volumes and partitions, both normal and hidden. In order to activate this, you have to check “TrueCrypt Mode” in the password prompt dialog as shown below.</p> -<p><img src="TrueCrypt Support_truecrypt_mode_gui.jpg" alt="TrueCrypt mode" width="499" height="205"></p> +<p><img src="TrueCrypt Support_truecrypt_mode_gui.jpg" alt="TrueCrypt mode"></p> <p><strong>Note:</strong> Only volumes and partitions created using TrueCrypt versions <strong>6.x</strong> and <strong>7.x</strong> are supported.</p> </div><div class="ClearBoth"></div></body></html>
\ No newline at end of file diff --git a/doc/html/VeraCrypt Hidden Operating System.html b/doc/html/VeraCrypt Hidden Operating System.html index 03ba1679..346e73e6 100644 --- a/doc/html/VeraCrypt Hidden Operating System.html +++ b/doc/html/VeraCrypt Hidden Operating System.html @@ -96,7 +96,7 @@ Hidden Volume</a>. The outer volume should contain some sensitive-looking files <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> To summarize, there will be three passwords in total. Two of them can be revealed to an attacker (for the decoy system and for the outer volume). The third password, for the hidden system, must remain secret.</div> <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> -<img src="Beginner's Tutorial_Image_034.png" alt="Example Layout of System Drive Containing Hidden Operating System" width="604" height="225"></div> +<img src="Beginner's Tutorial_Image_034.png" alt="Example Layout of System Drive Containing Hidden Operating System"></div> <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> <em style="text-align:left">Example Layout of System Drive Containing Hidden Operating System</em></div> <p> </p> |