VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/Translations/Language.el.xml
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2015-02-09 14:01:28 +0100
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2015-02-10 12:45:33 +0100
commit1eb8aec9fa1530eaec4c16d2a06b911ab2ad2c11 (patch)
treeb330246282695464e12dd3bccd2f8168511c997d /Translations/Language.el.xml
parent2b8aa2df16c70bcf0bd0b79428f4af8cec17e2a6 (diff)
downloadVeraCrypt-1eb8aec9fa1530eaec4c16d2a06b911ab2ad2c11.tar.gz
VeraCrypt-1eb8aec9fa1530eaec4c16d2a06b911ab2ad2c11.zip
Language: update German translation (contributed by H.S.)
Diffstat (limited to 'Translations/Language.el.xml')
0 files changed, 0 insertions, 0 deletions
/tr> -rw-r--r--doc/html/Additional Security Requirements and Precautions.html2
-rw-r--r--doc/html/Authenticity and Integrity.html2
-rw-r--r--doc/html/Authors.html2
-rw-r--r--doc/html/Avoid Third-Party File Extensions.html85
-rw-r--r--doc/html/BCH_Logo_30x30.pngbin0 -> 1918 bytes-rw-r--r--doc/html/BC_Logo_30x30.pngbin0 -> 4097 bytes-rw-r--r--doc/html/BLAKE2s-256.html (renamed from doc/html/RIPEMD-160.html)18
-rw-r--r--doc/html/Beginner's Tutorial.html50
-rw-r--r--doc/html/Beginner's Tutorial_Image_001.jpgbin72868 -> 59697 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_002.jpgbin97433 -> 114362 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_003.jpgbin45726 -> 47468 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_004.jpgbin60635 -> 63558 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_005.jpgbin67538 -> 60862 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_007.jpgbin60251 -> 114490 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_008.jpgbin44347 -> 48785 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_009.jpgbin36014 -> 47999 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_010.jpgbin65196 -> 72885 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_011.jpgbin58346 -> 59578 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_012.jpgbin18934 -> 13553 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_013.jpgbin21278 -> 23085 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_014.jpgbin76689 -> 62898 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_015.jpgbin76354 -> 62228 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_016.jpgbin69892 -> 63027 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_017.jpgbin77042 -> 64296 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_018.jpgbin34325 -> 31649 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_019.jpgbin36310 -> 35689 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_020.jpgbin79449 -> 66095 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_021.jpgbin45484 -> 72301 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_022.jpgbin79812 -> 67323 bytes-rw-r--r--doc/html/Beginner's Tutorial_Image_023.gifbin2313 -> 11592 bytes-rw-r--r--doc/html/Camellia.html2
-rw-r--r--doc/html/Cascades.html27
-rw-r--r--doc/html/Changing Passwords and Keyfiles.html2
-rw-r--r--doc/html/Choosing Passwords and Keyfiles.html2
-rw-r--r--doc/html/Command Line Usage.html88
-rw-r--r--doc/html/CompilingGuidelineLinux.html314
-rw-r--r--doc/html/CompilingGuidelineWin.html1225
-rw-r--r--doc/html/CompilingGuidelineWin/AddNewSystemVar.jpgbin0 -> 71100 bytes-rw-r--r--doc/html/CompilingGuidelineWin/CertVerifyFails.jpgbin0 -> 15443 bytes-rw-r--r--doc/html/CompilingGuidelineWin/CertificateCannotBeVerified.jpgbin0 -> 87022 bytes-rw-r--r--doc/html/CompilingGuidelineWin/DistributionPackageDamaged.jpgbin0 -> 10581 bytes-rw-r--r--doc/html/CompilingGuidelineWin/DownloadVS2010.jpgbin0 -> 167558 bytes-rw-r--r--doc/html/CompilingGuidelineWin/DownloadVS2019.jpgbin0 -> 231800 bytes-rw-r--r--doc/html/CompilingGuidelineWin/DownloadVSBuildTools.jpgbin0 -> 187788 bytes-rw-r--r--doc/html/CompilingGuidelineWin/NasmCommandLine.jpgbin0 -> 27541 bytes-rw-r--r--doc/html/CompilingGuidelineWin/RegeditPermissions-1.jpgbin0 -> 42281 bytes-rw-r--r--doc/html/CompilingGuidelineWin/RegeditPermissions-2.jpgbin0 -> 82730 bytes-rw-r--r--doc/html/CompilingGuidelineWin/RegeditPermissions-3.jpgbin0 -> 48073 bytes-rw-r--r--doc/html/CompilingGuidelineWin/RegeditPermissions-4.jpgbin0 -> 20213 bytes-rw-r--r--doc/html/CompilingGuidelineWin/SelectAdvancedSystemSettings.jpgbin0 -> 142348 bytes-rw-r--r--doc/html/CompilingGuidelineWin/SelectEnvironmentVariables.jpgbin0 -> 41283 bytes-rw-r--r--doc/html/CompilingGuidelineWin/SelectPathVariable.jpgbin0 -> 71894 bytes-rw-r--r--doc/html/CompilingGuidelineWin/SelectThisPC.jpgbin0 -> 50245 bytes-rw-r--r--doc/html/CompilingGuidelineWin/VS2010BuildSolution.jpgbin0 -> 59737 bytes-rw-r--r--doc/html/CompilingGuidelineWin/VS2010Win32Config.jpgbin0 -> 167454 bytes-rw-r--r--doc/html/CompilingGuidelineWin/VS2010X64Config.jpgbin0 -> 149165 bytes-rw-r--r--doc/html/CompilingGuidelineWin/VS2019ARM64Config.jpgbin0 -> 58551 bytes-rw-r--r--doc/html/CompilingGuidelineWin/VS2019BuildSolution.jpgbin0 -> 49572 bytes-rw-r--r--doc/html/CompilingGuidelineWin/YasmCommandLine.jpgbin0 -> 33328 bytes-rw-r--r--doc/html/CompilingGuidelineWin/gzipCommandLine.jpgbin0 -> 28217 bytes-rw-r--r--doc/html/CompilingGuidelineWin/upxCommandLine.jpgbin0 -> 52807 bytes-rw-r--r--doc/html/CompilingGuidelines.html47
-rw-r--r--doc/html/Contact.html2
-rw-r--r--doc/html/Contributed Resources.html2
-rw-r--r--doc/html/Conversion_Guide_VeraCrypt_1.26_and_Later.html100
-rw-r--r--doc/html/Converting TrueCrypt volumes and partitions.html12
-rw-r--r--doc/html/Converting TrueCrypt volumes and partitions_truecrypt_convertion.jpgbin65251 -> 57456 bytes-rw-r--r--doc/html/Creating New Volumes.html4
-rw-r--r--doc/html/Data Leaks.html9
-rw-r--r--doc/html/Default Mount Parameters.html8
-rw-r--r--doc/html/Default Mount Parameters_VeraCrypt_password_using_default_parameters.pngbin21924 -> 7767 bytes-rw-r--r--doc/html/Defragmenting.html2
-rw-r--r--doc/html/Digital Signatures.html37
-rw-r--r--doc/html/Disclaimers.html2
-rw-r--r--doc/html/Documentation.html19
-rw-r--r--doc/html/Donation.html148
-rw-r--r--doc/html/Donation_Bank.html117
-rw-r--r--doc/html/Donation_VC_BTC_Sigwit.pngbin0 -> 24361 bytes-rw-r--r--doc/html/Donation_VeraCrypt_Bitcoin.pngbin4396 -> 0 bytes-rw-r--r--doc/html/Donation_VeraCrypt_BitcoinCash.pngbin0 -> 24904 bytes-rw-r--r--doc/html/Donation_VeraCrypt_Bitcoin_small.pngbin0 -> 5917 bytes-rw-r--r--doc/html/Donation_VeraCrypt_Ethereum.pngbin0 -> 29006 bytes-rw-r--r--doc/html/Donation_VeraCrypt_Litecoin.pngbin0 -> 6010 bytes-rw-r--r--doc/html/Donation_VeraCrypt_Monero.pngbin0 -> 7674 bytes-rw-r--r--doc/html/Donation_donate.gifbin0 -> 1714 bytes-rw-r--r--doc/html/Donation_donate_PLN.gifbin0 -> 2893 bytes-rw-r--r--doc/html/EMV Smart Cards.html87
-rw-r--r--doc/html/Encryption Algorithms.html62
-rw-r--r--doc/html/Encryption Scheme.html6
-rw-r--r--doc/html/Ethereum_Logo_19x30.pngbin0 -> 891 bytes-rw-r--r--doc/html/FAQ.html59
-rw-r--r--doc/html/Favorite Volumes.html7
-rw-r--r--doc/html/Hardware Acceleration.html2
-rw-r--r--doc/html/Hash Algorithms.html6
-rw-r--r--doc/html/Header Key Derivation.html27
-rw-r--r--doc/html/Hibernation File.html2
-rw-r--r--doc/html/Hidden Operating System.html2
-rw-r--r--doc/html/Hidden Volume.html2
-rw-r--r--doc/html/Home_VeraCrypt_Default_Mount_Parameters.pngbin12035 -> 4281 bytes-rw-r--r--doc/html/Home_VeraCrypt_menu_Default_Mount_Parameters.pngbin6484 -> 7542 bytes-rw-r--r--doc/html/Home_tibitDonateButton.pngbin627 -> 0 bytes-rw-r--r--doc/html/Hot Keys.html2
-rw-r--r--doc/html/How to Back Up Securely.html2
-rw-r--r--doc/html/Incompatibilities.html2
-rw-r--r--doc/html/Introduction.html2
-rw-r--r--doc/html/Issues and Limitations.html20
-rw-r--r--doc/html/Journaling File Systems.html2
-rw-r--r--doc/html/Keyfiles in VeraCrypt.html22
-rw-r--r--doc/html/Keyfiles in VeraCrypt_Image_040.gifbin26435 -> 27857 bytes-rw-r--r--doc/html/Keyfiles.html235
-rw-r--r--doc/html/Kuznyechik.html2
-rw-r--r--doc/html/LTC_Logo_30x30.pngbin0 -> 1756 bytes-rw-r--r--doc/html/Language Packs.html6
-rw-r--r--doc/html/Legal Information.html14
-rw-r--r--doc/html/Main Program Window.html2
-rw-r--r--doc/html/Malware.html2
-rw-r--r--doc/html/Memory Dump Files.html2
-rw-r--r--doc/html/Miscellaneous.html2
-rw-r--r--doc/html/Modes of Operation.html2
-rw-r--r--doc/html/Monero_Logo_30x30.pngbin0 -> 1169 bytes-rw-r--r--doc/html/Mounting VeraCrypt Volumes.html2
-rw-r--r--doc/html/Multi-User Environment.html2
-rw-r--r--doc/html/Normal Dismount vs Force Dismount.html77
-rw-r--r--doc/html/Notation.html2
-rw-r--r--doc/html/Paging File.html2
-rw-r--r--doc/html/Parallelization.html2
-rw-r--r--doc/html/Personal Iterations Multiplier (PIM).html30
-rw-r--r--doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step1.pngbin39609 -> 18135 bytes-rw-r--r--doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step2.pngbin41198 -> 19573 bytes-rw-r--r--doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step1.pngbin24371 -> 12473 bytes-rw-r--r--doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step2.pngbin25515 -> 16840 bytes-rw-r--r--doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.pngbin24449 -> 7935 bytes-rw-r--r--doc/html/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step2.pngbin26195 -> 11261 bytes-rw-r--r--doc/html/Physical Security.html2
-rw-r--r--doc/html/Pipelining.html2
-rw-r--r--doc/html/Plausible Deniability.html2
-rw-r--r--doc/html/Portable Mode.html2
-rw-r--r--doc/html/Preface.html2
-rw-r--r--doc/html/Program Menu.html18
-rw-r--r--doc/html/Protection of Hidden Volumes.html12
-rw-r--r--doc/html/Protection of Hidden Volumes_Image_027.jpgbin36561 -> 37304 bytes-rw-r--r--doc/html/Protection of Hidden Volumes_Image_028.jpgbin64939 -> 69802 bytes-rw-r--r--doc/html/Protection of Hidden Volumes_Image_029.jpgbin77621 -> 64842 bytes-rw-r--r--doc/html/Protection of Hidden Volumes_Image_030.jpgbin33805 -> 28439 bytes-rw-r--r--doc/html/Protection of Hidden Volumes_Image_031.jpgbin57124 -> 64679 bytes-rw-r--r--doc/html/Random Number Generator.html6
-rw-r--r--doc/html/Reallocated Sectors.html2
-rw-r--r--doc/html/References.html2
-rw-r--r--doc/html/Release Notes.html697
-rw-r--r--doc/html/Removable Medium Volume.html4
-rw-r--r--doc/html/Removing Encryption.html2
-rw-r--r--doc/html/SHA-256.html2
-rw-r--r--doc/html/SHA-512.html2
-rw-r--r--doc/html/Security Model.html2
-rw-r--r--doc/html/Security Requirements and Precautions.html4
-rw-r--r--doc/html/Security Requirements for Hidden Volumes.html2
-rw-r--r--doc/html/Security Tokens & Smart Cards.html4
-rw-r--r--doc/html/Serpent.html2
-rw-r--r--doc/html/Sharing over Network.html2
-rw-r--r--doc/html/Source Code.html2
-rw-r--r--doc/html/Standard Compliance.html2
-rw-r--r--doc/html/Streebog.html2
-rw-r--r--doc/html/Supported Operating Systems.html31
-rw-r--r--doc/html/Supported Systems for System Encryption.html12
-rw-r--r--doc/html/System Encryption.html16
-rw-r--r--doc/html/System Favorite Volumes.html2
-rw-r--r--doc/html/Technical Details.html11
-rw-r--r--doc/html/Trim Operation.html25
-rw-r--r--doc/html/Troubleshooting.html2
-rw-r--r--doc/html/TrueCrypt Support.html7
-rw-r--r--doc/html/TrueCrypt Support_truecrypt_mode_gui.jpgbin37924 -> 36423 bytes-rw-r--r--doc/html/Twofish.html2
-rw-r--r--doc/html/Unencrypted Data in RAM.html6
-rw-r--r--doc/html/Uninstalling VeraCrypt.html2
-rw-r--r--doc/html/Using VeraCrypt Without Administrator Privileges.html2
-rw-r--r--doc/html/VeraCrypt Background Task.html2
-rw-r--r--doc/html/VeraCrypt Hidden Operating System.html4
-rw-r--r--doc/html/VeraCrypt License.html38
-rw-r--r--doc/html/VeraCrypt Memory Protection.html106
-rw-r--r--doc/html/VeraCrypt RAM Encryption.html158
-rw-r--r--doc/html/VeraCrypt Rescue Disk.html102
-rw-r--r--doc/html/VeraCrypt System Files.html2
-rw-r--r--doc/html/VeraCrypt Volume Format Specification.html2
-rw-r--r--doc/html/VeraCrypt Volume.html2
-rw-r--r--doc/html/Volume Clones.html2
-rw-r--r--doc/html/Wear-Leveling.html2
-rw-r--r--doc/html/Whirlpool.html2
-rw-r--r--doc/html/flag-au-small.pngbin0 -> 1111 bytes-rw-r--r--doc/html/flag-au.pngbin0 -> 1557 bytes-rw-r--r--doc/html/flag-eu-small.pngbin0 -> 935 bytes-rw-r--r--doc/html/flag-eu.pngbin0 -> 1727 bytes-rw-r--r--doc/html/flag-gb-small.pngbin0 -> 1081 bytes-rw-r--r--doc/html/flag-gb.pngbin0 -> 2029 bytes-rw-r--r--doc/html/flag-nz-small.pngbin0 -> 783 bytes-rw-r--r--doc/html/flag-nz.pngbin0 -> 1494 bytes-rw-r--r--doc/html/flag-us-small.pngbin0 -> 1029 bytes-rw-r--r--doc/html/flag-us.pngbin0 -> 1147 bytes-rw-r--r--doc/html/liberapay_donate.svg2
-rw-r--r--doc/html/paypal_30x30.pngbin0 -> 1274 bytes-rw-r--r--doc/html/ru/AES.html58
-rw-r--r--doc/html/ru/Acknowledgements.html60
-rw-r--r--doc/html/ru/Additional Security Requirements and Precautions.html52
-rw-r--r--doc/html/ru/Authenticity and Integrity.html54
-rw-r--r--doc/html/ru/Authors.html44
-rw-r--r--doc/html/ru/Avoid Third-Party File Extensions.html85
-rw-r--r--doc/html/ru/BCH_Logo_30x30.pngbin0 -> 1918 bytes-rw-r--r--doc/html/ru/BC_Logo_30x30.pngbin0 -> 4097 bytes-rw-r--r--doc/html/ru/BLAKE2s-256.html59
-rw-r--r--doc/html/ru/Beginner's Tutorial.html244
-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_001.pngbin0 -> 8841 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_002.pngbin0 -> 64537 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_003.pngbin0 -> 62196 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_004.pngbin0 -> 62571 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_005.pngbin0 -> 11623 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_007.pngbin0 -> 62627 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_008.pngbin0 -> 60665 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_009.pngbin0 -> 58962 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_010.pngbin0 -> 60725 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_011.pngbin0 -> 60105 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_012.pngbin0 -> 2135 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_013.pngbin0 -> 56606 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_014.pngbin0 -> 9202 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_015.pngbin0 -> 9034 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_016.pngbin0 -> 13171 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_017.pngbin0 -> 9448 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_018.pngbin0 -> 4925 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_019.pngbin0 -> 5315 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_020.pngbin0 -> 9680 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_021.pngbin0 -> 19898 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_022.pngbin0 -> 10053 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_023.pngbin0 -> 2209 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_024.pngbin0 -> 9985 bytes-rw-r--r--doc/html/ru/Beginner's Tutorial_Image_034.pngbin0 -> 5849 bytes-rw-r--r--doc/html/ru/Camellia.html48
-rw-r--r--doc/html/ru/Cascades.html91
-rw-r--r--doc/html/ru/Changing Passwords and Keyfiles.html56
-rw-r--r--doc/html/ru/Choosing Passwords and Keyfiles.html60
-rw-r--r--doc/html/ru/Command Line Usage.html325
-rw-r--r--doc/html/ru/CompilingGuidelineLinux.html314
-rw-r--r--doc/html/ru/CompilingGuidelineWin.html1224
-rw-r--r--doc/html/ru/CompilingGuidelines.html47
-rw-r--r--doc/html/ru/Contact.html54
-rw-r--r--doc/html/ru/Contributed Resources.html65
-rw-r--r--doc/html/ru/Conversion_Guide_VeraCrypt_1.26_and_Later.html101
-rw-r--r--doc/html/ru/Converting TrueCrypt volumes and partitions.html52
-rw-r--r--doc/html/ru/Converting TrueCrypt volumes and partitions_truecrypt_convertion.pngbin0 -> 8581 bytes-rw-r--r--doc/html/ru/Creating New Volumes.html139
-rw-r--r--doc/html/ru/Data Leaks.html91
-rw-r--r--doc/html/ru/Default Mount Parameters.html54
-rw-r--r--doc/html/ru/Default Mount Parameters_VeraCrypt_password_using_default_parameters.pngbin0 -> 5283 bytes-rw-r--r--doc/html/ru/Defragmenting.html53
-rw-r--r--doc/html/ru/Digital Signatures.html122
-rw-r--r--doc/html/ru/Disclaimers.html55
-rw-r--r--doc/html/ru/Documentation.html161
-rw-r--r--doc/html/ru/Donation.html122
-rw-r--r--doc/html/ru/Donation_Bank.html117
-rw-r--r--doc/html/ru/Donation_VC_BTC_Sigwit.pngbin0 -> 24361 bytes-rw-r--r--doc/html/ru/Donation_VeraCrypt_BitcoinCash.pngbin0 -> 24904 bytes-rw-r--r--doc/html/ru/Donation_VeraCrypt_Bitcoin_small.pngbin0 -> 5917 bytes-rw-r--r--doc/html/ru/Donation_VeraCrypt_Ethereum.pngbin0 -> 29006 bytes-rw-r--r--doc/html/ru/Donation_VeraCrypt_Litecoin.pngbin0 -> 6010 bytes-rw-r--r--doc/html/ru/Donation_VeraCrypt_Monero.pngbin0 -> 7674 bytes-rw-r--r--doc/html/ru/Donation_donate.gifbin0 -> 1714 bytes-rw-r--r--doc/html/ru/Donation_donate_CHF.gifbin0 -> 1734 bytes-rw-r--r--doc/html/ru/Donation_donate_Dollars.gifbin0 -> 1788 bytes-rw-r--r--doc/html/ru/Donation_donate_Euros.gifbin0 -> 1744 bytes-rw-r--r--doc/html/ru/Donation_donate_GBP.gifbin0 -> 1766 bytes-rw-r--r--doc/html/ru/Donation_donate_PLN.gifbin0 -> 2893 bytes-rw-r--r--doc/html/ru/Donation_donate_YEN.gifbin0 -> 1765 bytes-rw-r--r--doc/html/ru/EMV Smart Cards.html85
-rw-r--r--doc/html/ru/Encryption Algorithms.html270
-rw-r--r--doc/html/ru/Encryption Scheme.html105
-rw-r--r--doc/html/ru/Ethereum_Logo_19x30.pngbin0 -> 891 bytes-rw-r--r--doc/html/ru/FAQ.html911
-rw-r--r--doc/html/ru/Favorite Volumes.html133
-rw-r--r--doc/html/ru/Hardware Acceleration.html87
-rw-r--r--doc/html/ru/Hash Algorithms.html62
-rw-r--r--doc/html/ru/Header Key Derivation.html104
-rw-r--r--doc/html/ru/Hibernation File.html85
-rw-r--r--doc/html/ru/Hidden Operating System.html51
-rw-r--r--doc/html/ru/Hidden Volume.html123
-rw-r--r--doc/html/ru/Home_VeraCrypt_Default_Mount_Parameters.pngbin0 -> 2176 bytes-rw-r--r--doc/html/ru/Home_VeraCrypt_menu_Default_Mount_Parameters.pngbin0 -> 4897 bytes-rw-r--r--doc/html/ru/Home_facebook_veracrypt.pngbin0 -> 868 bytes-rw-r--r--doc/html/ru/Home_reddit.pngbin0 -> 1456 bytes-rw-r--r--doc/html/ru/Home_utilities-file-archiver-3.pngbin0 -> 2186 bytes-rw-r--r--doc/html/ru/Hot Keys.html41
-rw-r--r--doc/html/ru/How to Back Up Securely.html137
-rw-r--r--doc/html/ru/Incompatibilities.html95
-rw-r--r--doc/html/ru/Introduction.html75
-rw-r--r--doc/html/ru/Issues and Limitations.html176
-rw-r--r--doc/html/ru/Journaling File Systems.html53
-rw-r--r--doc/html/ru/Keyfiles in VeraCrypt.html296
-rw-r--r--doc/html/ru/Keyfiles in VeraCrypt_Image_040.pngbin0 -> 5096 bytes-rw-r--r--doc/html/ru/Keyfiles.html111
-rw-r--r--doc/html/ru/Kuznyechik.html45
-rw-r--r--doc/html/ru/LTC_Logo_30x30.pngbin0 -> 1756 bytes-rw-r--r--doc/html/ru/Language Packs.html55
-rw-r--r--doc/html/ru/Legal Information.html67
-rw-r--r--doc/html/ru/Main Program Window.html136
-rw-r--r--doc/html/ru/Malware.html73
-rw-r--r--doc/html/ru/Memory Dump Files.html72
-rw-r--r--doc/html/ru/Miscellaneous.html48
-rw-r--r--doc/html/ru/Modes of Operation.html134
-rw-r--r--doc/html/ru/Monero_Logo_30x30.pngbin0 -> 1169 bytes-rw-r--r--doc/html/ru/Mounting VeraCrypt Volumes.html79
-rw-r--r--doc/html/ru/Multi-User Environment.html62
-rw-r--r--doc/html/ru/Normal Dismount vs Force Dismount.html77
-rw-r--r--doc/html/ru/Notation.html89
-rw-r--r--doc/html/ru/Paging File.html88
-rw-r--r--doc/html/ru/Parallelization.html62
-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM).html144
-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step1.pngbin0 -> 8551 bytes-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step2.pngbin0 -> 8852 bytes-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step1.pngbin0 -> 9228 bytes-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step2.pngbin0 -> 9494 bytes-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.pngbin0 -> 6027 bytes-rw-r--r--doc/html/ru/Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step2.pngbin0 -> 6853 bytes-rw-r--r--doc/html/ru/Physical Security.html67
-rw-r--r--doc/html/ru/Pipelining.html60
-rw-r--r--doc/html/ru/Plausible Deniability.html93
-rw-r--r--doc/html/ru/Portable Mode.html100
-rw-r--r--doc/html/ru/Preface.html43
-rw-r--r--doc/html/ru/Program Menu.html281
-rw-r--r--doc/html/ru/Protection of Hidden Volumes.html145
-rw-r--r--doc/html/ru/Protection of Hidden Volumes_Image_027.pngbin0 -> 5606 bytes-rw-r--r--doc/html/ru/Protection of Hidden Volumes_Image_028.pngbin0 -> 9612 bytes-rw-r--r--doc/html/ru/Protection of Hidden Volumes_Image_029.pngbin0 -> 10946 bytes-rw-r--r--doc/html/ru/Protection of Hidden Volumes_Image_030.pngbin0 -> 6189 bytes-rw-r--r--doc/html/ru/Protection of Hidden Volumes_Image_031.pngbin0 -> 9409 bytes-rw-r--r--doc/html/ru/Random Number Generator.html119
-rw-r--r--doc/html/ru/Reallocated Sectors.html58
-rw-r--r--doc/html/ru/References.html238
-rw-r--r--doc/html/ru/Release Notes.html1179
-rw-r--r--doc/html/ru/Removable Medium Volume.html67
-rw-r--r--doc/html/ru/Removing Encryption.html93
-rw-r--r--doc/html/ru/SHA-256.html45
-rw-r--r--doc/html/ru/SHA-512.html45
-rw-r--r--doc/html/ru/Security Model.html159
-rw-r--r--doc/html/ru/Security Requirements and Precautions.html95
-rw-r--r--doc/html/ru/Security Requirements for Hidden Volumes.html253
-rw-r--r--doc/html/ru/Security Tokens & Smart Cards.html44
-rw-r--r--doc/html/ru/Serpent.html64
-rw-r--r--doc/html/ru/Sharing over Network.html66
-rw-r--r--doc/html/ru/Source Code.html54
-rw-r--r--doc/html/ru/Standard Compliance.html48
-rw-r--r--doc/html/ru/Streebog.html46
-rw-r--r--