VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/doc/html/VeraCrypt Hidden Operating System.html
diff options
context:
space:
mode:
Diffstat (limited to 'doc/html/VeraCrypt Hidden Operating System.html')
-rw-r--r--doc/html/VeraCrypt Hidden Operating System.html2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/html/VeraCrypt Hidden Operating System.html b/doc/html/VeraCrypt Hidden Operating System.html
index 03ba1679..346e73e6 100644
--- a/doc/html/VeraCrypt Hidden Operating System.html
+++ b/doc/html/VeraCrypt Hidden Operating System.html
@@ -96,7 +96,7 @@ Hidden Volume</a>. The outer volume should contain some sensitive-looking files
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
To summarize, there will be three passwords in total. Two of them can be revealed to an attacker (for the decoy system and for the outer volume). The third password, for the hidden system, must remain secret.</div>
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
-<img src="Beginner's Tutorial_Image_034.png" alt="Example Layout of System Drive Containing Hidden Operating System" width="604" height="225"></div>
+<img src="Beginner's Tutorial_Image_034.png" alt="Example Layout of System Drive Containing Hidden Operating System"></div>
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
<em style="text-align:left">Example Layout of System Drive Containing Hidden Operating System</em></div>
<p>&nbsp;</p>