VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/doc/html/How to Back Up Securely.html
diff options
context:
space:
mode:
Diffstat (limited to 'doc/html/How to Back Up Securely.html')
-rw-r--r--doc/html/How to Back Up Securely.html6
1 files changed, 3 insertions, 3 deletions
diff --git a/doc/html/How to Back Up Securely.html b/doc/html/How to Back Up Securely.html
index 5f6282d9..aabb6a29 100644
--- a/doc/html/How to Back Up Securely.html
+++ b/doc/html/How to Back Up Securely.html
@@ -10,7 +10,7 @@
</head>
<body>
-<div>
+<div>
<a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
</div>
@@ -27,7 +27,7 @@
<div>
<p>
-<a href="Documentation.html">Documentation</a>
+<a href="Documentation.html">Documentation</a>
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
<a href="How%20to%20Back%20Up%20Securely.html">How to Back Up Securely</a>
</p></div>
@@ -109,4 +109,4 @@ If the operating system that you want to back up is installed in a hidden VeraCr
algorithm and the algorithm is later broken (for example, due to advances in cryptanalysis), the attacker might be able to decrypt his copies of the volume. The probability that three distinct encryption algorithms will be broken is significantly lower than
the probability that only one of them will be broken.</p>
</div>
-</div><div class="ClearBoth"></div></body></html> \ No newline at end of file
+</div><div class="ClearBoth"></div></body></html>