From 5e1fffa87191c3566bcbe20c6e8d29d5f21651d5 Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Sat, 13 May 2017 17:34:16 +0200 Subject: Add HTML documentation. --- doc/html/Malware.html | 61 +++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 61 insertions(+) create mode 100644 doc/html/Malware.html (limited to 'doc/html/Malware.html') diff --git a/doc/html/Malware.html b/doc/html/Malware.html new file mode 100644 index 00000000..b45d69fc --- /dev/null +++ b/doc/html/Malware.html @@ -0,0 +1,61 @@ + + + + +VeraCrypt - Free Open source disk encryption with strong security for the Paranoid + + + + + + +
+VeraCrypt +
+ + + +
+

+Documentation +>> +Security Requirements and Precautions +>> +Malware +

+ +
+

Malware

+
+The term 'malware' refers collectively to all types of malicious software, such as computer viruses, Trojan horses, spyware, or generally any piece of software (including VeraCrypt or an operating system component) that has been altered, prepared, or can be + controlled, by an attacker. Some kinds of malware are designed e.g. to log keystrokes, including typed passwords (such captured passwords are then either sent to the attacker over the Internet or saved to an unencrypted local drive from which the attacker + might be able to read it later, when he or she gains physical access to the computer). If you use VeraCrypt on a computer infected with any kind of malware, VeraCrypt may become unable to secure data on the computer.* Therefore, you must +not use VeraCrypt on such a computer.
+
+It is important to note that VeraCrypt is encryption software, +not anti-malware software. It is your responsibility to prevent malware from running on the computer. If you do not, VeraCrypt may become unable to secure data on the computer.
+
+There are many rules that you should follow to help prevent malware from running on your computer. Among the most important rules are the following: Keep your operating system, Internet browser, and other critical software, up-to-date. In Windows XP or later, + turn on DEP for all programs.** Do not open suspicious email attachments, especially executable files, even if they appear to have been sent by your relatives or friends (their computers might be infected with malware sending malicious emails from their computers/accounts + without their knowledge). Do not follow suspicious links contained in emails or on websites (even if the email/website appears to be harmless or trustworthy). Do not visit any suspicious websites. Do not download or install any suspicious software. Consider + using good, trustworthy, anti-malware software.
+


+

+
+

* In this section (Malware), the phrase "data on the computer" means data on internal and external storage devices/media (including removable devices and network + drives) connected to the computer.
+** DEP stands for Data Execution Prevention. For more information about DEP, please visit + +https://support.microsoft.com/kb/875352 and +http://technet.microsoft.com/en-us/library/cc700810.aspx.

+
\ No newline at end of file -- cgit v1.2.3