From c8b501062d31afb37168f676fa3168ad8b1e9007 Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Mon, 3 Aug 2020 23:33:19 +0200 Subject: Documentation: remove size specifiers for images in HTML files --- doc/html/VeraCrypt Hidden Operating System.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'doc/html/VeraCrypt Hidden Operating System.html') diff --git a/doc/html/VeraCrypt Hidden Operating System.html b/doc/html/VeraCrypt Hidden Operating System.html index 03ba1679..346e73e6 100644 --- a/doc/html/VeraCrypt Hidden Operating System.html +++ b/doc/html/VeraCrypt Hidden Operating System.html @@ -96,7 +96,7 @@ Hidden Volume. The outer volume should contain some sensitive-looking files
To summarize, there will be three passwords in total. Two of them can be revealed to an attacker (for the decoy system and for the outer volume). The third password, for the hidden system, must remain secret.
-Example Layout of System Drive Containing Hidden Operating System
+Example Layout of System Drive Containing Hidden Operating System
Example Layout of System Drive Containing Hidden Operating System

 

-- cgit v1.2.3