[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] contribute.html research.html - make valid xhtml



Update of /home2/or/cvsroot/website
In directory moria.mit.edu:/tmp/cvs-serv10900

Modified Files:
	contribute.html research.html 
Log Message:
contribute.html research.html - make valid xhtml


Index: contribute.html
===================================================================
RCS file: /home2/or/cvsroot/website/contribute.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -d -r1.44 -r1.45
--- contribute.html	16 May 2005 07:35:41 -0000	1.44
+++ contribute.html	16 May 2005 13:01:03 -0000	1.45
@@ -116,7 +116,7 @@
 <li>We need somebody to <a
 href="http://en.wikipedia.org/wiki/Fuzz_testing";>fuzz</a> Tor. Are there
 good libraries out there for what we want? What are the first steps? Win
-fame by getting credit when we put out a new release because of you!
+fame by getting credit when we put out a new release because of you!</li>
 <li>Server CPU load is high because clients keep asking to make new
 circuits, which uses public key crypto. Possible defenses include:
 using helper nodes (fixed entry nodes); rate limiting the number of

Index: research.html
===================================================================
RCS file: /home2/or/cvsroot/website/research.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -d -r1.17 -r1.18
--- research.html	16 May 2005 07:35:41 -0000	1.17
+++ research.html	16 May 2005 13:01:03 -0000	1.18
@@ -49,7 +49,6 @@
 <p>We need people to attack the system, quantify defenses,
 etc. See the "security project-lets" section of the <a
 href="contribute.html">contribute</a> page.</p>
-</p>
 
   </div><!-- #main -->
 </div>