aboutsummaryrefslogtreecommitdiff
path: root/docs/gnulinux/grub_hardening.md
diff options
context:
space:
mode:
Diffstat (limited to 'docs/gnulinux/grub_hardening.md')
-rw-r--r--docs/gnulinux/grub_hardening.md4
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/gnulinux/grub_hardening.md b/docs/gnulinux/grub_hardening.md
index cf0ef67f..9c1a819d 100644
--- a/docs/gnulinux/grub_hardening.md
+++ b/docs/gnulinux/grub_hardening.md
@@ -77,7 +77,7 @@ remember and easier to crack. Diceware passphrases are harder to crack
because of far higher entropy (there are many words available to use,
but only about 50 commonly used symbols in pass*words*).
-\-->
+-->
The GRUB password can be entered in two ways:
- plaintext
@@ -105,7 +105,7 @@ As enabling password protection as above means that you have to input it
on every single boot, we will make one menu entry work without it.
Remember that we will have GPG signing active, thus a potential attacker
will not be able to boot an arbitrary operating system. We do this by
-adding option **\--unrestricted** to a menuentry definition:
+adding option **--unrestricted** to a menuentry definition:
menuentry 'Load Operating System (incl. fully encrypted disks) [o]' --hotkey='o' --unrestricted {
...