George Kadianakis commited on 2013-08-07 17:37:50
Zeige 5 geänderte Dateien mit 6 Einfügungen und 6 Löschungen.
... | ... |
@@ -198,7 +198,7 @@ IP address. If you must work with DOC and/or PDF files, we strongly |
198 | 198 |
recommend either using a disconnected computer, downloading the free <a |
199 | 199 |
href="https://www.virtualbox.org/">VirtualBox</a> and using it with a <a |
200 | 200 |
href="http://virtualboxes.org/">virtual machine image</a> with networking |
201 |
-disabled, or using <a href="http://tails.boum.org/">Tails</a>. |
|
201 |
+disabled, or using <a href="https://tails.boum.org/">Tails</a>. |
|
202 | 202 |
Under no circumstances is it safe to use <a |
203 | 203 |
href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent |
204 | 204 |
and Tor</a> together, however.</p> |
... | ... |
@@ -328,7 +328,7 @@ your non-Tor IP address. If you must work with DOC and/or PDF files, we |
328 | 328 |
strongly recommend either using a disconnected computer, |
329 | 329 |
downloading the free <a href="https://www.virtualbox.org/">VirtualBox</a> and |
330 | 330 |
using it with a <a href="http://virtualboxes.org/">virtual machine image</a> |
331 |
-with networking disabled, or using <a href="http://tails.boum.org/">Tails</a>. |
|
331 |
+with networking disabled, or using <a href="https://tails.boum.org/">Tails</a>. |
|
332 | 332 |
Under no circumstances is it safe to use |
333 | 333 |
<a href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent |
334 | 334 |
and Tor</a> together, however. |
... | ... |
@@ -58,9 +58,9 @@ |
58 | 58 |
--> |
59 | 59 |
<td> |
60 | 60 |
<div class="project"> |
61 |
- <a href="http://tails.boum.org/"><img |
|
61 |
+ <a href="https://tails.boum.org/"><img |
|
62 | 62 |
src="$(IMGROOT)/icon-Tails.jpg" alt="Tails Icon"></a> |
63 |
- <h3><a href="http://tails.boum.org/">Tails</a></h3> |
|
63 |
+ <h3><a href="https://tails.boum.org/">Tails</a></h3> |
|
64 | 64 |
<p>Live CD/USB distribution preconfigured to use Tor safely.</p> |
65 | 65 |
</div> |
66 | 66 |
</td> |
... | ... |
@@ -109,7 +109,7 @@ href="https://stem.torproject.org/">Stem</a></div> |
109 | 109 |
</div></div> |
110 | 110 |
|
111 | 111 |
<div class="projectbox"> |
112 |
-<a href="http://tails.boum.org/"><img class="icon" |
|
112 |
+<a href="https://tails.boum.org/"><img class="icon" |
|
113 | 113 |
src="$(IMGROOT)/icon-Tails.jpg" alt="Tails Icon" width="75" |
114 | 114 |
height="75"></a> |
115 | 115 |
<div class="projectdesc"><div class="name"><a |
... | ... |
@@ -510,7 +510,7 @@ has taken place. This adversary motivates our |
510 | 510 |
|
511 | 511 |
An adversary with arbitrary code execution typically has more power, though. |
512 | 512 |
It can be quite hard to really significantly limit the capabilities of such an |
513 |
-adversary. <a class="ulink" href="http://tails.boum.org/contribute/design/" target="_top">The Tails system</a> can |
|
513 |
+adversary. <a class="ulink" href="https://tails.boum.org/contribute/design/" target="_top">The Tails system</a> can |
|
514 | 514 |
provide some defense against this adversary through the use of readonly media |
515 | 515 |
and frequent reboots, but even this can be circumvented on machines without |
516 | 516 |
Secure Boot through the use of BIOS rootkits. |
517 | 517 |