From eed17ea92b1191a7ecaa7e7c55822b1eeb8198f1 Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Sat, 26 Apr 2025 18:47:32 +0900 Subject: [PATCH] Documentation: remove reference to veracrypt.fr/code git repository. Use Code.html for Source Code menu --- doc/html/AES.html | 2 +- doc/html/Acknowledgements.html | 2 +- .../Additional Security Requirements and Precautions.html | 2 +- doc/html/Authenticity and Integrity.html | 2 +- doc/html/Authors.html | 2 +- doc/html/Avoid Third-Party File Extensions.html | 2 +- doc/html/BLAKE2s-256.html | 2 +- doc/html/Beginner's Tutorial.html | 2 +- doc/html/Camellia.html | 2 +- doc/html/Cascades.html | 2 +- doc/html/Changing Passwords and Keyfiles.html | 2 +- doc/html/Choosing Passwords and Keyfiles.html | 2 +- doc/html/Command Line Usage.html | 2 +- doc/html/CompilingGuidelineLinux.html | 2 +- doc/html/CompilingGuidelineWin.html | 2 +- doc/html/CompilingGuidelines.html | 2 +- doc/html/Contact.html | 2 +- doc/html/Contributed Resources.html | 2 +- doc/html/Conversion_Guide_VeraCrypt_1.26_and_Later.html | 2 +- doc/html/Converting TrueCrypt volumes and partitions.html | 2 +- doc/html/Creating New Volumes.html | 2 +- doc/html/Data Leaks.html | 2 +- doc/html/Default Mount Parameters.html | 2 +- doc/html/Defragmenting.html | 2 +- doc/html/Digital Signatures.html | 2 +- doc/html/Disclaimers.html | 2 +- doc/html/Documentation.html | 2 +- doc/html/Donation.html | 2 +- doc/html/Donation_Bank.html | 2 +- doc/html/EMV Smart Cards.html | 2 +- doc/html/Encryption Algorithms.html | 2 +- doc/html/Encryption Scheme.html | 2 +- doc/html/FAQ.html | 2 +- doc/html/Favorite Volumes.html | 2 +- doc/html/Hardware Acceleration.html | 2 +- doc/html/Hash Algorithms.html | 2 +- doc/html/Header Key Derivation.html | 2 +- doc/html/Hibernation File.html | 2 +- doc/html/Hidden Operating System.html | 2 +- doc/html/Hidden Volume.html | 2 +- doc/html/Hot Keys.html | 2 +- doc/html/How to Back Up Securely.html | 2 +- doc/html/Incompatibilities.html | 2 +- doc/html/Introduction.html | 2 +- doc/html/Issues and Limitations.html | 2 +- doc/html/Journaling File Systems.html | 2 +- doc/html/Keyfiles in VeraCrypt.html | 2 +- doc/html/Keyfiles.html | 2 +- doc/html/Kuznyechik.html | 2 +- doc/html/Language Packs.html | 2 +- doc/html/Legal Information.html | 2 +- doc/html/Main Program Window.html | 2 +- doc/html/Malware.html | 2 +- doc/html/Memory Dump Files.html | 2 +- doc/html/Miscellaneous.html | 2 +- doc/html/Modes of Operation.html | 2 +- doc/html/Mounting VeraCrypt Volumes.html | 2 +- doc/html/Multi-User Environment.html | 2 +- doc/html/Normal Unmount vs Force Unmount.html | 2 +- doc/html/Notation.html | 2 +- doc/html/Paging File.html | 2 +- doc/html/Parallelization.html | 2 +- doc/html/Personal Iterations Multiplier (PIM).html | 2 +- doc/html/Physical Security.html | 2 +- doc/html/Pipelining.html | 2 +- doc/html/Plausible Deniability.html | 2 +- doc/html/Portable Mode.html | 2 +- doc/html/Preface.html | 2 +- doc/html/Program Menu.html | 2 +- doc/html/Protection of Hidden Volumes.html | 2 +- doc/html/Random Number Generator.html | 2 +- doc/html/Reallocated Sectors.html | 2 +- doc/html/References.html | 2 +- doc/html/Release Notes.html | 2 +- doc/html/Removable Medium Volume.html | 2 +- doc/html/Removing Encryption.html | 2 +- doc/html/SHA-256.html | 2 +- doc/html/SHA-512.html | 2 +- doc/html/Security Model.html | 2 +- doc/html/Security Requirements and Precautions.html | 2 +- doc/html/Security Requirements for Hidden Volumes.html | 2 +- doc/html/Security Tokens & Smart Cards.html | 2 +- doc/html/Serpent.html | 2 +- doc/html/Sharing over Network.html | 2 +- doc/html/Source Code.html | 5 ++--- doc/html/Standard Compliance.html | 2 +- doc/html/Streebog.html | 2 +- doc/html/Supported Operating Systems.html | 2 +- doc/html/Supported Systems for System Encryption.html | 2 +- doc/html/System Encryption.html | 2 +- doc/html/System Favorite Volumes.html | 2 +- doc/html/Technical Details.html | 2 +- doc/html/Trim Operation.html | 2 +- doc/html/Troubleshooting.html | 2 +- doc/html/TrueCrypt Support.html | 2 +- doc/html/Twofish.html | 2 +- doc/html/Unencrypted Data in RAM.html | 2 +- doc/html/Uninstalling VeraCrypt.html | 2 +- .../Using VeraCrypt Without Administrator Privileges.html | 2 +- doc/html/VeraCrypt Background Task.html | 2 +- doc/html/VeraCrypt Hidden Operating System.html | 2 +- doc/html/VeraCrypt License.html | 2 +- doc/html/VeraCrypt Memory Protection.html | 2 +- doc/html/VeraCrypt RAM Encryption.html | 2 +- doc/html/VeraCrypt Rescue Disk.html | 2 +- doc/html/VeraCrypt System Files.html | 2 +- doc/html/VeraCrypt Volume Format Specification.html | 2 +- doc/html/VeraCrypt Volume.html | 2 +- doc/html/Volume Clones.html | 2 +- doc/html/Wear-Leveling.html | 2 +- doc/html/Whirlpool.html | 2 +- doc/html/ru/AES.html | 2 +- doc/html/ru/Acknowledgements.html | 2 +- .../ru/Additional Security Requirements and Precautions.html | 2 +- doc/html/ru/Authenticity and Integrity.html | 2 +- doc/html/ru/Authors.html | 2 +- doc/html/ru/Avoid Third-Party File Extensions.html | 2 +- doc/html/ru/BLAKE2s-256.html | 2 +- doc/html/ru/Beginner's Tutorial.html | 2 +- doc/html/ru/Camellia.html | 2 +- doc/html/ru/Cascades.html | 2 +- doc/html/ru/Changing Passwords and Keyfiles.html | 2 +- doc/html/ru/Choosing Passwords and Keyfiles.html | 2 +- doc/html/ru/Command Line Usage.html | 2 +- doc/html/ru/CompilingGuidelineLinux.html | 2 +- doc/html/ru/CompilingGuidelineWin.html | 2 +- doc/html/ru/CompilingGuidelines.html | 2 +- doc/html/ru/Contact.html | 2 +- doc/html/ru/Contributed Resources.html | 2 +- doc/html/ru/Conversion_Guide_VeraCrypt_1.26_and_Later.html | 2 +- doc/html/ru/Converting TrueCrypt volumes and partitions.html | 2 +- doc/html/ru/Creating New Volumes.html | 2 +- doc/html/ru/Data Leaks.html | 2 +- doc/html/ru/Default Mount Parameters.html | 2 +- doc/html/ru/Defragmenting.html | 2 +- doc/html/ru/Digital Signatures.html | 2 +- doc/html/ru/Disclaimers.html | 2 +- doc/html/ru/Documentation.html | 2 +- doc/html/ru/Donation.html | 2 +- doc/html/ru/Donation_Bank.html | 2 +- doc/html/ru/EMV Smart Cards.html | 2 +- doc/html/ru/Encryption Algorithms.html | 2 +- doc/html/ru/Encryption Scheme.html | 2 +- doc/html/ru/FAQ.html | 2 +- doc/html/ru/Favorite Volumes.html | 2 +- doc/html/ru/Hardware Acceleration.html | 2 +- doc/html/ru/Hash Algorithms.html | 2 +- doc/html/ru/Header Key Derivation.html | 2 +- doc/html/ru/Hibernation File.html | 2 +- doc/html/ru/Hidden Operating System.html | 2 +- doc/html/ru/Hidden Volume.html | 2 +- doc/html/ru/Hot Keys.html | 2 +- doc/html/ru/How to Back Up Securely.html | 2 +- doc/html/ru/Incompatibilities.html | 2 +- doc/html/ru/Introduction.html | 2 +- doc/html/ru/Issues and Limitations.html | 2 +- doc/html/ru/Journaling File Systems.html | 2 +- doc/html/ru/Keyfiles in VeraCrypt.html | 2 +- doc/html/ru/Keyfiles.html | 2 +- doc/html/ru/Kuznyechik.html | 2 +- doc/html/ru/Language Packs.html | 2 +- doc/html/ru/Legal Information.html | 2 +- doc/html/ru/Main Program Window.html | 2 +- doc/html/ru/Malware.html | 2 +- doc/html/ru/Memory Dump Files.html | 2 +- doc/html/ru/Miscellaneous.html | 2 +- doc/html/ru/Modes of Operation.html | 2 +- doc/html/ru/Mounting VeraCrypt Volumes.html | 2 +- doc/html/ru/Multi-User Environment.html | 2 +- doc/html/ru/Normal Unmount vs Force Unmount.html | 2 +- doc/html/ru/Notation.html | 2 +- doc/html/ru/Paging File.html | 2 +- doc/html/ru/Parallelization.html | 2 +- doc/html/ru/Personal Iterations Multiplier (PIM).html | 2 +- doc/html/ru/Physical Security.html | 2 +- doc/html/ru/Pipelining.html | 2 +- doc/html/ru/Plausible Deniability.html | 2 +- doc/html/ru/Portable Mode.html | 2 +- doc/html/ru/Preface.html | 2 +- doc/html/ru/Program Menu.html | 2 +- doc/html/ru/Protection of Hidden Volumes.html | 2 +- doc/html/ru/Random Number Generator.html | 2 +- doc/html/ru/Reallocated Sectors.html | 2 +- doc/html/ru/References.html | 2 +- doc/html/ru/Release Notes.html | 2 +- doc/html/ru/Removable Medium Volume.html | 2 +- doc/html/ru/Removing Encryption.html | 2 +- doc/html/ru/SHA-256.html | 2 +- doc/html/ru/SHA-512.html | 2 +- doc/html/ru/Security Model.html | 2 +- doc/html/ru/Security Requirements and Precautions.html | 2 +- doc/html/ru/Security Requirements for Hidden Volumes.html | 2 +- doc/html/ru/Security Tokens & Smart Cards.html | 2 +- doc/html/ru/Serpent.html | 2 +- doc/html/ru/Sharing over Network.html | 2 +- doc/html/ru/Source Code.html | 5 ++--- doc/html/ru/Standard Compliance.html | 2 +- doc/html/ru/Streebog.html | 2 +- doc/html/ru/Supported Operating Systems.html | 2 +- doc/html/ru/Supported Systems for System Encryption.html | 2 +- doc/html/ru/System Encryption.html | 2 +- doc/html/ru/System Favorite Volumes.html | 2 +- doc/html/ru/Technical Details.html | 2 +- doc/html/ru/Trim Operation.html | 2 +- doc/html/ru/Troubleshooting.html | 2 +- doc/html/ru/TrueCrypt Support.html | 2 +- doc/html/ru/Twofish.html | 2 +- doc/html/ru/Unencrypted Data in RAM.html | 2 +- doc/html/ru/Uninstalling VeraCrypt.html | 2 +- .../ru/Using VeraCrypt Without Administrator Privileges.html | 2 +- doc/html/ru/VeraCrypt Background Task.html | 2 +- doc/html/ru/VeraCrypt Hidden Operating System.html | 2 +- doc/html/ru/VeraCrypt License.html | 2 +- doc/html/ru/VeraCrypt Memory Protection.html | 2 +- doc/html/ru/VeraCrypt RAM Encryption.html | 2 +- doc/html/ru/VeraCrypt Rescue Disk.html | 2 +- doc/html/ru/VeraCrypt System Files.html | 2 +- doc/html/ru/VeraCrypt Volume Format Specification.html | 2 +- doc/html/ru/VeraCrypt Volume.html | 2 +- doc/html/ru/Volume Clones.html | 2 +- doc/html/ru/Wear-Leveling.html | 2 +- doc/html/ru/Whirlpool.html | 2 +- doc/html_zh-cn/AES.html | 2 +- doc/html_zh-cn/Acknowledgements.html | 2 +- .../Additional Security Requirements and Precautions.html | 2 +- doc/html_zh-cn/Authenticity and Integrity.html | 2 +- doc/html_zh-cn/Authors.html | 2 +- doc/html_zh-cn/Avoid Third-Party File Extensions.html | 2 +- doc/html_zh-cn/BLAKE2s-256.html | 2 +- doc/html_zh-cn/Beginner's Tutorial.html | 2 +- doc/html_zh-cn/Camellia.html | 2 +- doc/html_zh-cn/Cascades.html | 2 +- doc/html_zh-cn/Changing Passwords and Keyfiles.html | 2 +- doc/html_zh-cn/Choosing Passwords and Keyfiles.html | 2 +- doc/html_zh-cn/Command Line Usage.html | 2 +- doc/html_zh-cn/CompilingGuidelineLinux.html | 2 +- doc/html_zh-cn/CompilingGuidelineWin.html | 2 +- doc/html_zh-cn/CompilingGuidelines.html | 2 +- doc/html_zh-cn/Contact.html | 2 +- doc/html_zh-cn/Contributed Resources.html | 2 +- .../Conversion_Guide_VeraCrypt_1.26_and_Later.html | 2 +- .../Converting TrueCrypt volumes and partitions.html | 2 +- doc/html_zh-cn/Creating New Volumes.html | 2 +- doc/html_zh-cn/Data Leaks.html | 2 +- doc/html_zh-cn/Default Mount Parameters.html | 2 +- doc/html_zh-cn/Defragmenting.html | 2 +- doc/html_zh-cn/Digital Signatures.html | 2 +- doc/html_zh-cn/Disclaimers.html | 2 +- doc/html_zh-cn/Documentation.html | 2 +- doc/html_zh-cn/Donation.html | 2 +- doc/html_zh-cn/Donation_Bank.html | 2 +- doc/html_zh-cn/EMV Smart Cards.html | 2 +- doc/html_zh-cn/Encryption Algorithms.html | 2 +- doc/html_zh-cn/Encryption Scheme.html | 2 +- doc/html_zh-cn/FAQ.html | 2 +- doc/html_zh-cn/Favorite Volumes.html | 2 +- doc/html_zh-cn/Hardware Acceleration.html | 2 +- doc/html_zh-cn/Hash Algorithms.html | 2 +- doc/html_zh-cn/Header Key Derivation.html | 2 +- doc/html_zh-cn/Hibernation File.html | 2 +- doc/html_zh-cn/Hidden Operating System.html | 2 +- doc/html_zh-cn/Hidden Volume.html | 2 +- doc/html_zh-cn/Hot Keys.html | 2 +- doc/html_zh-cn/How to Back Up Securely.html | 2 +- doc/html_zh-cn/Incompatibilities.html | 2 +- doc/html_zh-cn/Introduction.html | 2 +- doc/html_zh-cn/Issues and Limitations.html | 2 +- doc/html_zh-cn/Journaling File Systems.html | 2 +- doc/html_zh-cn/Keyfiles in VeraCrypt.html | 2 +- doc/html_zh-cn/Keyfiles.html | 2 +- doc/html_zh-cn/Kuznyechik.html | 2 +- doc/html_zh-cn/Language Packs.html | 2 +- doc/html_zh-cn/Legal Information.html | 2 +- doc/html_zh-cn/Main Program Window.html | 2 +- doc/html_zh-cn/Malware.html | 2 +- doc/html_zh-cn/Memory Dump Files.html | 2 +- doc/html_zh-cn/Miscellaneous.html | 2 +- doc/html_zh-cn/Modes of Operation.html | 2 +- doc/html_zh-cn/Mounting VeraCrypt Volumes.html | 2 +- doc/html_zh-cn/Multi-User Environment.html | 2 +- doc/html_zh-cn/Normal Unmount vs Force Unmount.html | 2 +- doc/html_zh-cn/Notation.html | 2 +- doc/html_zh-cn/Paging File.html | 2 +- doc/html_zh-cn/Parallelization.html | 2 +- doc/html_zh-cn/Personal Iterations Multiplier (PIM).html | 2 +- doc/html_zh-cn/Physical Security.html | 2 +- doc/html_zh-cn/Pipelining.html | 2 +- doc/html_zh-cn/Plausible Deniability.html | 2 +- doc/html_zh-cn/Portable Mode.html | 2 +- doc/html_zh-cn/Preface.html | 2 +- doc/html_zh-cn/Program Menu.html | 2 +- doc/html_zh-cn/Protection of Hidden Volumes.html | 2 +- doc/html_zh-cn/Random Number Generator.html | 2 +- doc/html_zh-cn/Reallocated Sectors.html | 2 +- doc/html_zh-cn/References.html | 2 +- doc/html_zh-cn/Release Notes.html | 2 +- doc/html_zh-cn/Removable Medium Volume.html | 2 +- doc/html_zh-cn/Removing Encryption.html | 2 +- doc/html_zh-cn/SHA-256.html | 2 +- doc/html_zh-cn/SHA-512.html | 2 +- doc/html_zh-cn/Security Model.html | 2 +- doc/html_zh-cn/Security Requirements and Precautions.html | 2 +- doc/html_zh-cn/Security Requirements for Hidden Volumes.html | 2 +- doc/html_zh-cn/Security Tokens & Smart Cards.html | 2 +- doc/html_zh-cn/Serpent.html | 2 +- doc/html_zh-cn/Sharing over Network.html | 2 +- doc/html_zh-cn/Source Code.html | 5 ++--- doc/html_zh-cn/Standard Compliance.html | 2 +- doc/html_zh-cn/Streebog.html | 2 +- doc/html_zh-cn/Supported Operating Systems.html | 2 +- doc/html_zh-cn/Supported Systems for System Encryption.html | 2 +- doc/html_zh-cn/System Encryption.html | 2 +- doc/html_zh-cn/System Favorite Volumes.html | 2 +- doc/html_zh-cn/Technical Details.html | 2 +- doc/html_zh-cn/Trim Operation.html | 2 +- doc/html_zh-cn/Troubleshooting.html | 2 +- doc/html_zh-cn/TrueCrypt Support.html | 2 +- doc/html_zh-cn/Twofish.html | 2 +- doc/html_zh-cn/Unencrypted Data in RAM.html | 2 +- doc/html_zh-cn/Uninstalling VeraCrypt.html | 2 +- .../Using VeraCrypt Without Administrator Privileges.html | 2 +- doc/html_zh-cn/VeraCrypt Background Task.html | 2 +- doc/html_zh-cn/VeraCrypt Hidden Operating System.html | 2 +- doc/html_zh-cn/VeraCrypt License.html | 2 +- doc/html_zh-cn/VeraCrypt Memory Protection.html | 2 +- doc/html_zh-cn/VeraCrypt RAM Encryption.html | 2 +- doc/html_zh-cn/VeraCrypt Rescue Disk.html | 2 +- doc/html_zh-cn/VeraCrypt System Files.html | 2 +- doc/html_zh-cn/VeraCrypt Volume Format Specification.html | 2 +- doc/html_zh-cn/VeraCrypt Volume.html | 2 +- doc/html_zh-cn/Volume Clones.html | 2 +- doc/html_zh-cn/Wear-Leveling.html | 2 +- doc/html_zh-cn/Whirlpool.html | 2 +- 333 files changed, 336 insertions(+), 339 deletions(-) diff --git a/doc/html/AES.html b/doc/html/AES.html index 3481a189..d3945c59 100644 --- a/doc/html/AES.html +++ b/doc/html/AES.html @@ -17,7 +17,7 @@