Skip to content

Commit 459ca57

Browse files
committed
Fix HTML H# headings
1 parent a878bff commit 459ca57

8 files changed

Lines changed: 51 additions & 50 deletions

_layouts/page.html

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,9 @@
44

55
<div class="page-header">
66
{% include ad.html %}
7-
<h2>{{ page.title }}
7+
<h1>{{ page.title }}
88
{% if page.subtitle %}<small>{{ page.subtitle }}</small>{% endif %}
9-
</h2>
9+
</h1>
10+
</div>
1011

1112
{{ content }}

_posts/2015-09-25-cleanerml.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ You can think of it as writing XML to delete files, but it is more powerful than
2424
* Operating system detection to discard OS-specific cleaners (such as Winamp) at runtime
2525
* XSD (XML Schema Definition) for validation
2626

27-
### Storage
27+
## Storage
2828

2929
During application startup, BleachBit looks for CleanerML files in a few standard locations:
3030

@@ -40,7 +40,7 @@ Most of these locations are also scanned for [winapp2.ini](/doc/winapp2ini.html)
4040
The diagnostics section of the application lists these directories.
4141

4242

43-
### Learning CleanerML
43+
## Learning CleanerML
4444

4545
To learn CleanerML so you can write your own cleaner, read these resources:
4646

@@ -49,11 +49,11 @@ To learn CleanerML so you can write your own cleaner, read these resources:
4949
* [Bonus cleaners](https://github.com/bleachbit/cleanerml)
5050
* [XSD (XML Schema Definition)](https://github.com/bleachbit/bleachbit/blob/master/doc/cleaner_markup_language.xsd) used for validation
5151

52-
### Finding files to delete
52+
## Finding files to delete
5353

5454
See [Finding files to delete](/cml/finding_files_to_delete.html).
5555

56-
### Matching files
56+
## Matching files
5757

5858
CleanerML allows several ways to match files:
5959

@@ -80,7 +80,7 @@ Another way to filter is using with **type**:
8080

8181
For more information, refer to the section [Learning](#learning-cleanerml).
8282

83-
### Actions
83+
## Actions
8484

8585
The **action** element is a child of the **option** element.
8686

@@ -107,7 +107,7 @@ Values for the **comand** attribute of the **action** element:
107107

108108
Actions take an optional **os** attribute to limit the action to certain operating systems.
109109

110-
### Operating system
110+
## Operating system
111111

112112
The optional attribute **os** limits the scope of an element to certain operating systems.
113113

@@ -128,19 +128,19 @@ Valid values for *os* are:
128128
* **unix**: Darwin, Linux, or any BSD
129129
* **windows**
130130

131-
### Running process
131+
## Running process
132132

133133
Set the *running* element to abort cleaning when an application is running. It accepts two attributes:
134134

135135
* **type**: required, either: **exe** for process name or **pathname** for a file on the file system
136136
* **os**: optional, any value for the operating system
137137

138-
### Variables
138+
## Variables
139139

140140
BleachBit supports expansion of a variety of variables: tilde (home), environment variables, and
141141
multi-value variables. For more information, see [Variables](/cml/variables.html).
142142

143-
### Sharing your cleaner
143+
## Sharing your cleaner
144144

145145
Of course, you may use your cleaner privately. If you wish to share it with others, see [Contribute Cleaner](/cml/contributing.html).
146146

_posts/2015-09-25-command-line-interface.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -13,45 +13,45 @@ Most anything you can do with the graphical user interface, you can do with Blea
1313

1414
This page includes some examples.
1515

16-
### Video
16+
## Video
1717

1818
This video introduces the command line interface for Microsoft Windows.
1919

2020
<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/Tdn81MXqcZo" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
2121

22-
### Microsoft Windows
22+
## Microsoft Windows
2323

2424
In Windows, use the executable `bleachbit_console.exe` to show the console output. The directory isn't added automatically to the path, so you use the full path `C:\Program Files (x86)\BleachBit\bleachbit_console.exe`. Where acceptable, it is best to substitute the environment variable `%ProgramFiles(x86)%` for `C:\Program Files (x86)\`.
2525

26-
### Linux
26+
## Linux
2727

2828
Running `bleachbit` (which is in the path) with arguments runs BleachBit in command line mode. Without arguments, BleachBit runs in graphical mode. The clipboard can only be cleaned under an X session (which is generally not available over SSH or in cron).
2929

30-
### Listing options
30+
## Listing options
3131

3232
To see a list of cleaners and their options, run:
3333

3434
`bleachbit --list-cleaners`
3535

3636
Aliases are `-l` and `--list`.
3737

38-
### Preview
38+
## Preview
3939

4040
To preview deleting Firefox cache, run:
4141

4242
`bleachbit --preview firefox.cache`
4343

4444
An alias is `--p`.
4545

46-
### Deleting files
46+
## Deleting files
4747

4848
When you are ready to delete files and make other permanent changes, replace ```--preview``` with ```--clean```. To delete Firefox cache, for example, run:
4949

5050
`bleachbit --clean firefox.vacuum`
5151

5252
An alias is `--c`.
5353

54-
### Including multiple cleaners and options
54+
## Including multiple cleaners and options
5555

5656
Preview and cleaning modes accept the same options for including and excluding cleaners and options.
5757

@@ -73,7 +73,7 @@ To enable all cleaners and options that do not have a warning, use ```--all-but-
7373

7474
`bleachbit --preview --all-but-warning firefox.cache`
7575

76-
### Excluding options
76+
## Excluding options
7777

7878
To except cleaning options, combine ```--except``` with inclusion options. The following previews all of Firefox except cookies.
7979

@@ -101,15 +101,15 @@ Notes:
101101
- `--except` does not accept wildcards.
102102
- `--except` was introduced after BleachBit 5.0.2.
103103

104-
### Overwriting files
104+
## Overwriting files
105105

106106
To overwrite the contents of files, so they cannot be undeleted later, add ```--overwrite```:
107107

108108
`bleachbit --overwrite --clean firefox.vacuum`
109109

110110
Without ```--overwrite```, BleachBit checks the configuration set in the graphical user interface.
111111

112-
### Shredding files
112+
## Shredding files
113113

114114
To shred any file, so its contents cannot be recovered, use `--shred`. While `--overwrite` refers to the files identified by `--clean`, the option `--shred` shreds any file anywhere. For example, this shreds one file named `yoga_emails.txt`:
115115

@@ -120,7 +120,7 @@ To shred all files under a directory, pass the name of the directory like this:
120120
`bleachbit --shred "C:\Microsoft Exchange\Top Secret Emails\"`
121121

122122

123-
### Wiping empty space
123+
## Wiping empty space
124124

125125
When files are [deleted without shredding](shred-files-and-wipe-disks.html), the contents might be recoverable from the disk's empty free space. To prevent recovery from empty space, you can wipe the empty space. Unlike wiping specific files, wiping empty space takes a long time.
126126

@@ -135,7 +135,7 @@ Wiping free empty space does not change how much free space is left, when the pr
135135
BleachBit 5.0.2 and earlier used `--wipe-free-space` instead of `--wipe-empty-space`.
136136

137137

138-
### cron example (Linux)
138+
## cron example (Linux)
139139

140140
To vacuum Firefox each night at 03:00, run this to edit cron jobs:
141141

@@ -145,7 +145,7 @@ and add this line:
145145

146146
`0 3 * * * bleachbit --clean firefox.vacuum`
147147

148-
### Windows Task Scheduler
148+
## Windows Task Scheduler
149149

150150
To vacuum Firefox each night at 03:00:
151151

_posts/2015-09-25-frequently-asked-questions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ order: 5
77
---
88

99
{% for faq in site.data.faqs.main %}
10-
### Q: {{ faq.question }}
10+
## Q: {{ faq.question }}
1111

1212
A: {{ faq.answer }}
1313

@@ -18,7 +18,7 @@ A: {{ faq.answer }}
1818
While these may not be asked, they are not common knowledge:
1919

2020
{% for faq in site.data.faqs.things_to_know %}
21-
### Q: {{ faq.question }}
21+
## Q: {{ faq.question }}
2222

2323
A: {{ faq.answer }}
2424

_posts/2015-09-25-shred-files-and-wipe-disks.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ order: 6
99
Normally when software deletes a file, only the "metadata" is erased: that means the complete contents often can easily be recovered, so BleachBit (and similar applications) offer secure erase features (also called secure wipe, secure overwriting, or file shredding) to permanently remove data. Some applications even advertise "advanced" erasure methods referencing important names in security such as Gutmann, the United States Department of Defense, and the NSA, but these references often mislead people to waste time on snake oil technological remedies while ignoring important basics. Any product or method suggesting a convenient, comprehensive solution to security is deceptive: convenience and security oppose each other. This guide will explain **how 1 pass is enough, but 35 passes are not enough.** Regardless of the tools you use, please read this guide carefully and completely.
1010

1111

12-
### Myths and legends
12+
## Myths and legends
1313

1414
Most of the confusion regarding the topic of data remanence (data left behind after it is deleted) is because of myths and urban legends. Before discussing what is true, let's preview what is not:
1515

@@ -22,7 +22,7 @@ Most of the confusion regarding the topic of data remanence (data left behind af
2222

2323
The details are explained below.
2424

25-
### What features does BleachBit have to securely wipe files?
25+
## What features does BleachBit have to securely wipe files?
2626

2727
Today BleachBit offers these features
2828

@@ -37,13 +37,13 @@ Because additional passes add no value and only offer a false sense of security
3737

3838
Unlike other cleaner applications, BleachBit shreds Internet history in Firefox without deleting the whole Firefox Places database.
3939

40-
### Are these features secure?
40+
## Are these features secure?
4141

4242
Concerned about the security of my house, once I asked a locksmith whether I should upgrade the standard lock on my front door. Not a good salesman, he replied, "Why bother? A burglar would just break the window."
4343

4444
Is driving a new car with air bags and a good crash test rating safe? Probably. How about when the car is operated by a 15-year old on a busy road at night while texting on his cell phone? Probably not. This analogy demonstrates two things. First, security is not black or white: there is always risk ranging from near (but not completely) zero to near 100%. Indeed, sometimes people even walk away from catastrophic car accidents. Second, the context is important: what is good in one situation is not good in another. Therefore, a better question is...
4545

46-
### How secure are BleachBit's methods?
46+
## How secure are BleachBit's methods?
4747

4848
When used appropriately, BleachBit's data wiping features are generally enough to hide traces of most data from most people.
4949

@@ -56,7 +56,7 @@ Even more important than asking how secure an application or technique is, start
5656

5757
The answers to these questions will lead you to the appropriate level of caution.
5858

59-
### Are multiple passes better than one pass?
59+
## Are multiple passes better than one pass?
6060

6161
Some applications offer "advanced" and "high security" erasure techniques such as Gutmann method (35 passes), Department of Defense (DOD) standard (7 passes), National Security Agency (NSA) "approved" (3 passes), etc. Introduced by a poor reading of Peter Gutmann's ancient paper, people incorrectly believe that overwriting the same data multiple times makes it more difficult to recover. Years after his original paper, Peter Gutmann himself tried to clear up the confusion caused by his original paper [[*](https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html#Epilogue)]:
6262

@@ -70,7 +70,7 @@ If recovery of data on modern media overwritten by a single pass were possible,
7070

7171
Second, shredding software which advertises these features often glosses over the application of the technique. **The DoD 5220.22-M standard was never intended be shred individual files or to wipe free disk space**: it was intended to wipe the entire hard drive causing a complete data loss including the operating system and all software, settings, and documents. Also, Department of Defense approves software shredding techniques only within the DoD: for storage devices released out of the Department of Defense, only mechanical destruction is approved. In other words, any software which shreds individual files or free disk space cannot be DOD or NSA compliant.
7272

73-
### Limits of shredding files and wiping free disk space
73+
## Limits of shredding files and wiping free disk space
7474

7575
Shredding individual files and free disk space has limited benefits for any cleaner application, including BleachBit. Once you understand the limits, you will know whether taking extra mitigation steps is worthwhile.
7676

@@ -90,7 +90,7 @@ However, wiping free disk space has several of its own challenges:
9090
2. File systems allocate space in fixed chunks called a block size, and many files do not use all the last block. A 5,000,000 byte file on a 4096 size block file system would use 1220 full blocks and 1 partial block with 2880 bytes. Say the file was deleted and a new file in the same place used 1024 bytes of the last block. That means 1856 bytes of the old file (0.03%) is not overwritten in what is called the "slack space" of the new file. Because cleaning slack space is tricky and realistically little useful data can be recovered from such tiny pieces (typically not more than 4096 bytes), BleachBit does not clean slack space when wiping free disk space. (Remember: BleachBit _does_ wipe slack when wiping individual files.)
9191
3. When an area of a modern hard drive is damaged, it automatically remaps the bad sector to a spare. The operating system and applications are unaware of the move, so wiping the drive ignores the damaged area. According to [DBAN](https://dban.org/), a powerful disk wiping tool, it does not erase remapped sectors and hidden areas.
9292

93-
### How to securely delete data
93+
## How to securely delete data
9494

9595
To permanently delete data, there is an order of progression with trade-offs of convenience and time vs privacy:
9696

@@ -102,7 +102,7 @@ To permanently delete data, there is an order of progression with trade-offs of
102102

103103
However, in practice things become more complicated.
104104

105-
### Keeping data private
105+
## Keeping data private
106106

107107
Here are some suggestions to keep your data private
108108

@@ -115,7 +115,7 @@ Here are some suggestions to keep your data private
115115
7. Don't assume you control all the data. Say you download a file from www.example.com: there may be records on your computer, your ISP, www.example.com's server, www.example.com's ISP, www.example.com's backup site, the Internet backbone, etc. Think about how much data is stored on your email server, Facebook account, etc.
116116
8. Don't use any computers because the Nosy Secret Agents may looking over your shoulder using Van Eck phreaking.
117117

118-
### Suggested reading
118+
## Suggested reading
119119

120120
* ["Data Remanence"](https://en.wikipedia.org/wiki/Data_remanence) (Wikipedia)
121121
* ["Gutmann method: criticism"](https://en.wikipedia.org/wiki/Gutmann_method#Criticism) (Wikipedia)

_posts/2015-09-30-install-on-linux.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ order: 1
77
---
88

99

10-
### Sources
10+
## Sources
1111

1212
Linux users have a few choices for installing BleachBit.
1313

@@ -22,41 +22,41 @@ Here is an example of this policy. Ubuntu Questing 25.10 (released October 2025)
2222
It is your choice to install from the distribution's repositories, but in case of any issues with the software, first check for a newer release.
2323

2424

25-
### Software dependencies
25+
## Software dependencies
2626

2727
BleachBit 5 requires GTK 3.24 and Python 3.8 or later.
2828

29-
### Signatures for .rpm and .deb packages
29+
## Signatures for .rpm and .deb packages
3030

3131
Starting after BleachBit 5.0.2, the .rpm and .deb packages will be signed with the same key. This will make it easier to verify the signatures.
3232

33-
### Ubuntu, Mint, and Debian
33+
## Ubuntu, Mint, and Debian
3434

35-
#### Graphical package manager
35+
### Graphical package manager
3636

3737
Double click on the downloaded installation package which has a name like `bleachbit_5.0.2-0_all_ubuntu2504.deb`. Then, follow the prompts. You may see a security warning about third-party packages, and you may need to enter your password to install BleachBit.
3838

39-
#### Command line
39+
### Command line
4040

4141
Install using the command line like this:
4242

4343
`sudo apt install bleachbit_5.0.2-0_all_ubuntu2504.deb`
4444

4545
Using apt is recommended over dpkg because it will automatically install dependencies.
4646

47-
### Fedora, Red Hat, CentOS
47+
## Fedora, Red Hat, CentOS
4848

49-
#### Graphical package manager
49+
### Graphical package manager
5050

5151
To install BleachBit using the graphical package manager, double click on the downloaded installation package which has a name like `bleachbit-5.0.2-1.1.fc43.noarch.rpm`. Then, follow the prompts.
5252

53-
#### Command line
53+
### Command line
5454

5555
Alternatively, install using the command line like this.
5656

5757
`sudo dnf install bleachbit-5.0.2-1.1.fc43.noarch.rpm`
5858

59-
### Digital signatures
59+
## Digital signatures
6060

6161
Verifying the digital signature protects you against file corruption and tampering.
6262

_posts/2015-09-30-install-on-windows.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ To install BleachBit, first [download BleachBit 5 for Windows](https://www.bleac
1010

1111
Using Windows 7? [Download BleachBit 4.6.2 for Windows 7](https://www.bleachbit.org/bleachbit-windows-7).
1212

13-
#### Standard Installation
13+
### Standard Installation
1414

1515
Most Windows users want the standard installation.
1616

@@ -20,7 +20,7 @@ Verify the installer comes from the verified publisher shown in the screenshot.
2020

2121
![BleachBit 4.6.2 Windows 10 User Access Control verified publisher](/images/windows-10-verified-publisher-certum.png)
2222

23-
#### Portable Use
23+
### Portable Use
2424

2525
While installation is the typical way of using BleachBit, some users prefer an alternative. They may
2626
want to put the application on a removable drive or use it on a system without system permission to
@@ -32,7 +32,7 @@ right-click on the `.zip` file and choose **Extract all files** which creates a
3232

3333
Do not double-click on the `.zip` file.
3434

35-
#### Silent Installation
35+
### Silent Installation
3636

3737
Silent installation is for advanced users or system administrators. This feature installs the
3838
application without any prompts from the user, and system administrators use it to automate the
@@ -58,7 +58,7 @@ insufficient privileges.
5858
The `/S` and `/NoDesktopShortcut` switches _are_ case-sensitive.
5959

6060

61-
#### After Installation
61+
### After Installation
6262

6363
After installation, review the [preference options](/doc/preferences.html) or skip
6464
to [general usage](/doc/general-usage.html).

index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: "BleachBit Documentation"
44
redirect_from: "/doc/install.html"
55
---
66

7-
### BleachBit
7+
# BleachBit
88

99
This is the manual for [BleachBit](https://www.bleachbit.org), a fast and safe system cleaner. By simply checking boxes, you can delete unnecessary files such as cache, logs, cookies, recently-used-files lists, and more.
1010

0 commit comments

Comments
 (0)