<div id="step-1a" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step1a-install-wizard.png"
alt="Step 1.A: Install Wizard" /></p>
<div class="section-intro">
<h2><em>#2</em> Make your keys</h2>
-<p><img style="float:right; width:400px; margin:0 0 20px 20px;" src="../static/img/en/screenshots/step2a-01-make-keypair.png" alt="A robot with a head shaped like a key holding a private and a public key"/></p>
+<p class="float medium"><img src="../static/img/en/screenshots/step2a-01-make-keypair.png" alt="A robot with a head shaped like a key holding a private and a public key"/></p>
<p>To use the GnuPG system, you'll need a public key and a private key (known
together as a keypair). Each is a long string of randomly generated numbers
<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="step-2a" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step2a-02-make-keypair.png"
alt="Step 2.A: Make your Keypair" /></p>
-<br />
-<p><img
+
+<p class="large"><img
src="../static/img/en/screenshots/step2a-03-make-keypair.png"
alt="Step 2.A: Set your passphrase" /></p>
<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="step-2b" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step2b-04-upload-and-certificate.png"
alt="Step 2.B: Send to server and generate a certificate" /></p>
<div id="step-3a" class="step">
<div class="sidebar">
-<p><img src="../static/img/en/screenshots/step3a-open-key-manager.png"
+<p class="large"><img src="../static/img/en/screenshots/step3a-open-key-manager.png"
alt="Step 3.A: Email Menu" /></p>
-<br />
-<p><img src="../static/img/en/screenshots/step3a-import-from-file.png"
+
+<p class="large"><img src="../static/img/en/screenshots/step3a-import-from-file.png"
alt="Step 3.A: Import From File" /></p>
-<br />
-<p><img src="../static/img/en/screenshots/step3a-success.png"
+
+<p class="large"><img src="../static/img/en/screenshots/step3a-success.png"
alt="Step 3.A: Success" /></p>
-<br />
-<p><img src="../static/img/en/screenshots/step3a-troubleshoot.png"
+
+<p class="large"><img src="../static/img/en/screenshots/step3a-troubleshoot.png"
alt="Step 3.A: Troubleshoot" /></p>
</div><!-- /.sidebar -->
<div class="main">
<div class="section-intro">
<h2><em>#4</em> Try it out!</h2>
-<p><img style="float:right; width:250px; margin:0 0 20px 20px;" src="../static/img/en/screenshots/section3-try-it-out.png" alt="Illustration of a person in a house with a cat connected to a server"/></p>
+<p class="float small"><img src="../static/img/en/screenshots/section3-try-it-out.png" alt="Illustration of a person in a house with a cat connected to a server"/></p>
<p>Now you'll try a test correspondence with an FSF computer program named Edward,
who knows how to use encryption. Except where noted, these are the same
steps you'd follow when corresponding with a real, live person.</p>
may take a long time to respond, or not respond at all. We're sorry about
this and we're working hard to fix it. Your key will still work even without
testing with Edward.</p> -->
+
+<div style="clear: both"></div>
</div><!-- End .section-intro -->
<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="step-4a" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step4a-send-key-to-Edward.png"
alt="Step 4.A Send key to Edward." /></p>
<div id="step-4b" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step4b-option1-verify-key.png"
alt="Step 4.B Option 1. Verify key" /></p>
-<br />
-<p><img
+
+<p class="large"><img
src="../static/img/en/screenshots/step4b-option2-import-key.png"
alt="Step 4.B Option 2. Import key" /></p>
</div><!-- /.sidebar -->
<div id="step-4c" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step4c-Edward-response.png"
alt="Step 4.C Edward's response" /></p>
<div class="section-intro">
<h2><em>#5</em> Learn about the Web of Trust</h2>
-<p><img style="float:right; width:250px; margin:0 0 20px 20px;" src="../static/img/en/screenshots/section5-web-of-trust.png" alt="Illustration of keys all interconnected with a web of lines"/></p>
+<p class="float small"><img src="../static/img/en/screenshots/section5-web-of-trust.png" alt="Illustration of keys all interconnected with a web of lines"/></p>
<p>Email encryption is a powerful technology, but it has a weakness:
it requires a way to verify that a person's public key is actually
<div id="step-5a" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step5a-key-properties.png"
alt="Section 5: trusting a key" /></p>
<div id="step-6a" class="step">
<div class="sidebar">
-<p><img
+<p class="medium"><img
src="../static/img/en/screenshots/section6-01-use-it-well.png"
alt="Section 6: Use it Well (1)" /></p>
<div id="step-6b" class="step">
<div class="sidebar">
-<p><img
+<p class="medium"><img
src="../static/img/en/screenshots/section6-02-use-it-well.png"
alt="Section 6: Use it Well (2)" /></p>