[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] contribute.html research.html - make valid xhtml
Update of /home2/or/cvsroot/website
In directory moria.mit.edu:/tmp/cvs-serv10900
Modified Files:
contribute.html research.html
Log Message:
contribute.html research.html - make valid xhtml
Index: contribute.html
===================================================================
RCS file: /home2/or/cvsroot/website/contribute.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -d -r1.44 -r1.45
--- contribute.html 16 May 2005 07:35:41 -0000 1.44
+++ contribute.html 16 May 2005 13:01:03 -0000 1.45
@@ -116,7 +116,7 @@
<li>We need somebody to <a
href="http://en.wikipedia.org/wiki/Fuzz_testing">fuzz</a> Tor. Are there
good libraries out there for what we want? What are the first steps? Win
-fame by getting credit when we put out a new release because of you!
+fame by getting credit when we put out a new release because of you!</li>
<li>Server CPU load is high because clients keep asking to make new
circuits, which uses public key crypto. Possible defenses include:
using helper nodes (fixed entry nodes); rate limiting the number of
Index: research.html
===================================================================
RCS file: /home2/or/cvsroot/website/research.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -d -r1.17 -r1.18
--- research.html 16 May 2005 07:35:41 -0000 1.17
+++ research.html 16 May 2005 13:01:03 -0000 1.18
@@ -49,7 +49,6 @@
<p>We need people to attack the system, quantify defenses,
etc. See the "security project-lets" section of the <a
href="contribute.html">contribute</a> page.</p>
-</p>
</div><!-- #main -->
</div>