VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/doc/chm/VeraCrypt.hhp
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2022-03-22 00:13:52 +0100
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2022-03-22 00:56:54 +0100
commit69a9c6b3943db402a11bf2609c4778ab08628a76 (patch)
tree83c2209da2e7c7d269239bbaaba4e650d26f28fc /doc/chm/VeraCrypt.hhp
parent165df2188e71c419378e4c70c388a7f4d54921b5 (diff)
downloadVeraCrypt-69a9c6b3943db402a11bf2609c4778ab08628a76.tar.gz
VeraCrypt-69a9c6b3943db402a11bf2609c4778ab08628a76.zip
Update release notes for 1.26.0 and set its date to March 21st 2022
Diffstat (limited to 'doc/chm/VeraCrypt.hhp')
-rw-r--r--doc/chm/VeraCrypt.hhp2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/chm/VeraCrypt.hhp b/doc/chm/VeraCrypt.hhp
index c6c7f5d1..3f66edd0 100644
--- a/doc/chm/VeraCrypt.hhp
+++ b/doc/chm/VeraCrypt.hhp
@@ -12,70 +12,71 @@ Title=VeraCrypt User Guide
[FILES]
Acknowledgements.html
Additional Security Requirements and Precautions.html
AES.html
arrow_right.gif
Authenticity and Integrity.html
Authors.html
bank_30x30.png
BC_Logo_30x30.png
BCH_Logo_48x30.png
Beginner's Tutorial.html
Beginner's Tutorial_Image_001.jpg
Beginner's Tutorial_Image_002.jpg
Beginner's Tutorial_Image_003.jpg
Beginner's Tutorial_Image_004.jpg
Beginner's Tutorial_Image_005.jpg
Beginner's Tutorial_Image_007.jpg
Beginner's Tutorial_Image_008.jpg
Beginner's Tutorial_Image_009.jpg
Beginner's Tutorial_Image_010.jpg
Beginner's Tutorial_Image_011.jpg
Beginner's Tutorial_Image_012.jpg
Beginner's Tutorial_Image_013.jpg
Beginner's Tutorial_Image_014.jpg
Beginner's Tutorial_Image_015.jpg
Beginner's Tutorial_Image_016.jpg
Beginner's Tutorial_Image_017.jpg
Beginner's Tutorial_Image_018.jpg
Beginner's Tutorial_Image_019.jpg
Beginner's Tutorial_Image_020.jpg
Beginner's Tutorial_Image_021.jpg
Beginner's Tutorial_Image_022.jpg
Beginner's Tutorial_Image_023.gif
Beginner's Tutorial_Image_024.gif
Beginner's Tutorial_Image_034.png
+BLAKE2s-256.html
Camellia.html
Cascades.html
Changing Passwords and Keyfiles.html
Choosing Passwords and Keyfiles.html
Command Line Usage.html
Contact.html
Contributed Resources.html
Converting TrueCrypt volumes and partitions.html
Converting TrueCrypt volumes and partitions_truecrypt_convertion.jpg
Creating New Volumes.html
Data Leaks.html
Default Mount Parameters.html
Default Mount Parameters_VeraCrypt_password_using_default_parameters.png
Defragmenting.html
Digital Signatures.html
Disclaimers.html
Documentation.html
Donation.html
Donation_donate.gif
Donation_donate_CHF.gif
Donation_donate_Dollars.gif
Donation_donate_Euros.gif
Donation_donate_GBP.gif
Donation_donate_PLN.gif
Donation_donate_YEN.gif
Donation_VeraCrypt_Bitcoin_small.png
Donation_VeraCrypt_BitcoinCash.png
Donation_VeraCrypt_Litecoin.png
Donation_VeraCrypt_Monero.png
Encryption Algorithms.html
Encryption Scheme.html
FAQ.html
Favorite Volumes.html
flattr-badge-large.png
gf2_mul.gif
@@ -109,71 +110,70 @@ Malware.html
Memory Dump Files.html
Miscellaneous.html
Modes of Operation.html
Monero_Logo_30x30.png
Mounting VeraCrypt Volumes.html
Multi-User Environment.html
Notation.html
Paging File.html
Parallelization.html
paypal_30x30.png
Personal Iterations Multiplier (PIM).html
Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step1.png
Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_Step2.png
Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step1.png
Personal Iterations Multiplier (PIM)_VeraCrypt_ChangePIM_System_Step2.png
Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step1.png
Personal Iterations Multiplier (PIM)_VeraCrypt_UsePIM_Step2.png
Physical Security.html
Pipelining.html
Plausible Deniability.html
Portable Mode.html
Preface.html
Program Menu.html
Protection of Hidden Volumes.html
Protection of Hidden Volumes_Image_027.jpg
Protection of Hidden Volumes_Image_028.jpg
Protection of Hidden Volumes_Image_029.jpg
Protection of Hidden Volumes_Image_030.jpg
Protection of Hidden Volumes_Image_031.jpg
Random Number Generator.html
Reallocated Sectors.html
References.html
Release Notes.html
Removable Medium Volume.html
Removing Encryption.html
-RIPEMD-160.html
Security Model.html
Security Requirements and Precautions.html
Security Requirements for Hidden Volumes.html
Security Tokens & Smart Cards.html
Serpent.html
SHA-256.html
SHA-512.html
Sharing over Network.html
Source Code.html
Standard Compliance.html
Streebog.html
styles.css
Supported Operating Systems.html
Supported Systems for System Encryption.html
System Encryption.html
System Favorite Volumes.html
Technical Details.html
Trim Operation.html
Troubleshooting.html
TrueCrypt Support.html
TrueCrypt Support_truecrypt_mode_gui.jpg
twitter_veracrypt.PNG
Twofish.html
Unencrypted Data in RAM.html
Uninstalling VeraCrypt.html
Using VeraCrypt Without Administrator Privileges.html
VeraCrypt Background Task.html
VeraCrypt Hidden Operating System.html
VeraCrypt License.html
VeraCrypt Rescue Disk.html
VeraCrypt System Files.html
VeraCrypt Volume Format Specification.html
VeraCrypt Volume.html
VeraCrypt128x128.png
Volume Clones.html