Changeset 473


Ignore:
Timestamp:
11/7/2008 8:27:07 AM (6 years ago)
Author:
lowjoel
Message:

Use tabs to separate our roles from our names.

Location:
branches/eraser6/Eraser
Files:
4 edited

Legend:

Unmodified
Added
Removed
  • branches/eraser6/Eraser/AboutForm.cs

    r472 r473  
    6767                "secure and easy way.\n\n" + 
    6868                "Eraser Development Team:\n" + 
    69                 "\u2022 Garrett Trant: Mentor\n" + 
    70                 "\u2022 Joel Low: Developer Lead\n" + 
    71                 "\u2022 Dennis van Lith: Designer\n" + 
    72                 "\u2022 Kasra Nasiri: Developer\n"); 
     69                "\u2022 Garrett Trant:      Mentor/Researcher\n" + 
     70                "\u2022 Joel Low:       Developer Lead\n" + 
     71                "\u2022 Dennis van Lith:        Designer\n" + 
     72                "\u2022 Kasra Nasiri:       Developer\n"); 
    7373 
    7474            //Create the About bitmap localised for the current version (sans scrolling 
  • branches/eraser6/Eraser/Strings.NL.resx

    r472 r473  
    118118    <value>System.Resources.ResXResourceWriter, System.Windows.Forms, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value> 
    119119  </resheader> 
    120   <data name="The Gutmann method used for overwriting is based on Peter Gutmann's paper \&quot;Secure Deletion of Data from Magnetic and Solid-State Memory\&quot;.\nThe Schneier 7-pass method is based on Bruce Schneier's algorithm using a Random Number Generator to wipe with random data.\nThe DoD 3-, 7- and N-pass method is based on the US Department of Defense's \&quot;National Industrial Security Program Operating Manual.\n\nAll the methods are selected to effectively remove magnetic remnants from the drive in a secure and easy way.\n\nEraser Development Team:\n\u2022 Garrett Trant: Mentor\n\u2022 Joel Low: Developer Lead\n\u2022 Dennis van Lith: Designer\n\u2022 Kasra Nasiri: Developer\n" xml:space="preserve"> 
     120  <data name="The Gutmann method used for overwriting is based on Peter Gutmann's paper \&quot;Secure Deletion of Data from Magnetic and Solid-State Memory\&quot;.\nThe Schneier 7-pass method is based on Bruce Schneier's algorithm using a Random Number Generator to wipe with random data.\nThe DoD 3-, 7- and N-pass method is based on the US Department of Defense's \&quot;National Industrial Security Program Operating Manual.\n\nAll the methods are selected to effectively remove magnetic remnants from the drive in a secure and easy way.\n\nEraser Development Team:\n\u2022 Garrett Trant:     Mentor/Researcher\n\u2022 Joel Low:     Developer Lead\n\u2022 Dennis van Lith:     Designer\n\u2022 Kasra Nasiri:      Developer\n" xml:space="preserve"> 
    121121    <value>(Untranslated)</value> 
    122122  </data> 
  • branches/eraser6/Eraser/Strings.en.resx

    r472 r473  
    118118    <value>System.Resources.ResXResourceWriter, System.Windows.Forms, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value> 
    119119  </resheader> 
    120   <data name="The Gutmann method used for overwriting is based on Peter Gutmann's paper \&quot;Secure Deletion of Data from Magnetic and Solid-State Memory\&quot;.\nThe Schneier 7-pass method is based on Bruce Schneier's algorithm using a Random Number Generator to wipe with random data.\nThe DoD 3-, 7- and N-pass method is based on the US Department of Defense's \&quot;National Industrial Security Program Operating Manual.\n\nAll the methods are selected to effectively remove magnetic remnants from the drive in a secure and easy way.\n\nEraser Development Team:\n\u2022 Garrett Trant: Mentor\n\u2022 Joel Low: Developer Lead\n\u2022 Dennis van Lith: Designer\n\u2022 Kasra Nasiri: Developer\n" xml:space="preserve"> 
    121     <value>The Gutmann method used for overwriting is based on Peter Gutmann's paper \"Secure Deletion of Data from Magnetic and Solid-State Memory\".\nThe Schneier 7-pass method is based on Bruce Schneier's algorithm using a Random Number Generator to wipe with random data.\nThe DoD 3-, 7- and N-pass method is based on the US Department of Defense's \"National Industrial Security Program Operating Manual.\n\nAll the methods are selected to effectively remove magnetic remnants from the drive in a secure and easy way.\n\nEraser Development Team:\n\u2022 Garrett Trant: Mentor\n\u2022 Joel Low: Developer Lead\n\u2022 Dennis van Lith: Designer\n\u2022 Kasra Nasiri: Developer\n</value> 
     120  <data name="The Gutmann method used for overwriting is based on Peter Gutmann's paper \&quot;Secure Deletion of Data from Magnetic and Solid-State Memory\&quot;.\nThe Schneier 7-pass method is based on Bruce Schneier's algorithm using a Random Number Generator to wipe with random data.\nThe DoD 3-, 7- and N-pass method is based on the US Department of Defense's \&quot;National Industrial Security Program Operating Manual.\n\nAll the methods are selected to effectively remove magnetic remnants from the drive in a secure and easy way.\n\nEraser Development Team:\n\u2022 Garrett Trant:     Mentor/Researcher\n\u2022 Joel Low:     Developer Lead\n\u2022 Dennis van Lith:     Designer\n\u2022 Kasra Nasiri:      Developer\n" xml:space="preserve"> 
     121    <value>(Untranslated)</value> 
    122122  </data> 
    123123  <data name="Eraser" xml:space="preserve"> 
  • branches/eraser6/Eraser/Strings.resx

    r472 r473  
    118118    <value>System.Resources.ResXResourceWriter, System.Windows.Forms, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value> 
    119119  </resheader> 
    120   <data name="The Gutmann method used for overwriting is based on Peter Gutmann's paper \&quot;Secure Deletion of Data from Magnetic and Solid-State Memory\&quot;.\nThe Schneier 7-pass method is based on Bruce Schneier's algorithm using a Random Number Generator to wipe with random data.\nThe DoD 3-, 7- and N-pass method is based on the US Department of Defense's \&quot;National Industrial Security Program Operating Manual.\n\nAll the methods are selected to effectively remove magnetic remnants from the drive in a secure and easy way.\n\nEraser Development Team:\n\u2022 Garrett Trant: Mentor\n\u2022 Joel Low: Developer Lead\n\u2022 Dennis van Lith: Designer\n\u2022 Kasra Nasiri: Developer\n" xml:space="preserve"> 
    121     <value>The Gutmann method used for overwriting is based on Peter Gutmann's paper \"Secure Deletion of Data from Magnetic and Solid-State Memory\".\nThe Schneier 7-pass method is based on Bruce Schneier's algorithm using a Random Number Generator to wipe with random data.\nThe DoD 3-, 7- and N-pass method is based on the US Department of Defense's \"National Industrial Security Program Operating Manual.\n\nAll the methods are selected to effectively remove magnetic remnants from the drive in a secure and easy way.\n\nEraser Development Team:\n\u2022 Garrett Trant: Mentor\n\u2022 Joel Low: Developer Lead\n\u2022 Dennis van Lith: Designer\n\u2022 Kasra Nasiri: Developer\n</value> 
     120  <data name="The Gutmann method used for overwriting is based on Peter Gutmann's paper \&quot;Secure Deletion of Data from Magnetic and Solid-State Memory\&quot;.\nThe Schneier 7-pass method is based on Bruce Schneier's algorithm using a Random Number Generator to wipe with random data.\nThe DoD 3-, 7- and N-pass method is based on the US Department of Defense's \&quot;National Industrial Security Program Operating Manual.\n\nAll the methods are selected to effectively remove magnetic remnants from the drive in a secure and easy way.\n\nEraser Development Team:\n\u2022 Garrett Trant:     Mentor/Researcher\n\u2022 Joel Low:     Developer Lead\n\u2022 Dennis van Lith:     Designer\n\u2022 Kasra Nasiri:      Developer\n" xml:space="preserve"> 
     121    <value>The Gutmann method used for overwriting is based on Peter Gutmann's paper \"Secure Deletion of Data from Magnetic and Solid-State Memory\".\nThe Schneier 7-pass method is based on Bruce Schneier's algorithm using a Random Number Generator to wipe with random data.\nThe DoD 3-, 7- and N-pass method is based on the US Department of Defense's \"National Industrial Security Program Operating Manual.\n\nAll the methods are selected to effectively remove magnetic remnants from the drive in a secure and easy way.\n\nEraser Development Team:\n\u2022 Garrett Trant:       Mentor/Researcher\n\u2022 Joel Low:     Developer Lead\n\u2022 Dennis van Lith:     Designer\n\u2022 Kasra Nasiri:      Developer\n</value> 
    122122  </data> 
    123123  <data name="Eraser" xml:space="preserve"> 
Note: See TracChangeset for help on using the changeset viewer.