commit 5a9f754eaee9235c6afb8c98d8c0b31ccd75b308
parent 2b9a24802b303e7dbe7afd997abc9f87814861e6
Author: Jaromil <jaromil@dyne.org>
Date:   Wed, 26 Jan 2011 16:01:53 +0100
refinements to the website
Diffstat:
1 file changed, 38 insertions(+), 27 deletions(-)
diff --git a/doc/web/views/index.muse b/doc/web/views/index.muse
@@ -3,25 +3,29 @@
 
 <contents>
 
-* Tomb - RIP
+* Tomb - Crypto Undertaker
+
+<class name="logo">
+[[images/tomb_n_bats.png]]
+</class>
 
 
 <example>
-    .....                                                ..
- .H8888888h.  ~-.                                  . uW8"
- 888888888888x  `>        u.      ..    .     :    `t888
-X~     `?888888hx~  ...ue888b   .888: x888  x888.   8888   .
-'      x8.^"*88*"   888R Y888r ~`8888~'888X`?888f`  9888.z88N
- `-:- X8888x        888R I888>   X888  888X '888>   9888  888E
-      488888>       888R I888>   X888  888X '888>   9888  888E
-    .. `"88*        888R I888>   X888  888X '888>   9888  888E
-  x88888nX"      . u8888cJ888    X888  888X '888>   9888  888E
- !"*8888888n..  :   "*888*P"    "*88%""*88" '888!` .8888  888"
-'    "*88888888*      'Y"         `~    "    `"`    `%888*%"
-        ^"***"`                                        "`
-
-  a simple commandline tool to manage encrypted storage  v.0.9
-            http://tomb.dyne.org            by Jaromil @ dyne.org
+            .....                                                ..
+         .H8888888h.  ~-.                                  . uW8"
+         888888888888x  `>        u.      ..    .     :    `t888
+        X~     `?888888hx~  ...ue888b   .888: x888  x888.   8888   .
+        '      x8.^"*88*"   888R Y888r ~`8888~'888X`?888f`  9888.z88N
+         `-:- X8888x        888R I888>   X888  888X '888>   9888  888E
+              488888>       888R I888>   X888  888X '888>   9888  888E
+            .. `"88*        888R I888>   X888  888X '888>   9888  888E
+          x88888nX"      . u8888cJ888    X888  888X '888>   9888  888E
+         !"*8888888n..  :   "*888*P"    "*88%""*88" '888!` .8888  888"
+        '    "*88888888*      'Y"         `~    "    `"`    `%888*%"
+                ^"***"`                                        "`
+
+          a simple commandline tool to manage encrypted storage  v.0.9
+                                                 by Jaromil @ dyne.org
 </example>
 
 ** Introduction
@@ -51,34 +55,41 @@ We've felt the urgency of publishing Tomb for other operating systems
 than dyne:bolic since the current situation with [[http://en.wikipedia.org/wiki/TrueCrypt][TrueCrypt]] is far from
 optimal.  TrueCrypt makes use of statically linked libraries, its code
 is not hosted on CVS and is [[http://lists.freedesktop.org/archives/distributions/2008-October/000276.html][not considered free]] by GNU/Linux
-distributions because of liability reasons, see [[http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=364034][Debian]], [[https://bugs.edge.launchpad.net/ubuntu/+bug/109701][Ubuntu]][4],
-Suse[5], Gentoo[6] and Fedora[7].
+distributions because of liability reasons, see [[http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=364034][Debian]], [[https://bugs.edge.launchpad.net/ubuntu/+bug/109701][Ubuntu]],
+[[http://lists.opensuse.org/opensuse-buildservice/2008-10/msg00055.html][Suse]], [[http://bugs.gentoo.org/show_bug.cgi?id=241650][Gentoo]] and [[https://fedoraproject.org/wiki/ForbiddenItems#TrueCrypt][Fedora]].
 
 Seen from this perspective, Tomb is intended as a rewrite of most
-functionalities offered by TrueCrypt in a new application, confident
-it won't take much relying on previous experience and aiming at:
+functionality offered by TrueCrypt in a new application, confident it
+won't take much relying on previous experience and aiming at:
  
  - short and readable code, linking shared libs and common components 
  - easy graphical interface, simple for ad-hoc (DIY-deniable)
  - transparent and distributed development hosted using GIT
  - GNU General Public License v3
 
-[1] http://en.wikipedia.org/wiki/TrueCrypt
-[2] http://lists.freedesktop.org/archives/distributions/2008-October/000276.html
-[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=364034
-[4] https://bugs.edge.launchpad.net/ubuntu/+bug/109701
-[5] http://lists.opensuse.org/opensuse-buildservice/2008-10/msg00055.html
-[6] http://bugs.gentoo.org/show\_bug.cgi?id=241650
-[7] https://fedoraproject.org/wiki/ForbiddenItems#TrueCrypt
 
 *** How does it works
 
+
+Tombs are operated from a normal file browser or from the commandline.
+
+To open a tomb is sufficient to click on it, or use the command **tomb-open**
+
+[[images/monmort.png]]
+
+When a tomb is open your panel will have a little icon in the tray
+reminding you that a tomb is open, offering to explore it or close it.
+
 Tomb generates 'key files' and protects them with a password choosen
 by the user; the key files are then used to encrypt loop-back mounted
 partitions, like single files containing a filesystem inside: this way
 keys can be separated from data for safer transports when
 required.
 
+For more information on how to operate Tomb from the commandline, the
+backend tool **tomb** comes complete with a brief --help and a
+[[manual][manual page]].
+
 ** Downloads
 
 For licensing information see the [[http://www.gnu.org/copyleft/gpl.html][GNU General Public License]]