[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Svnweb-commits] r722 - in windows7sins: branches/stable meta/objects tr
From: |
sysadmin |
Subject: |
[Svnweb-commits] r722 - in windows7sins: branches/stable meta/objects trunk trunk/c |
Date: |
Wed, 30 Sep 2009 15:37:20 -0400 |
Author: mattl
Date: Wed Sep 30 15:37:20 2009
New Revision: 722
Log:
updated privacy article with references
Modified:
windows7sins/branches/stable/privacy-more.html
windows7sins/branches/stable/privacy.html
windows7sins/meta/objects/privacy-more.html
windows7sins/meta/objects/privacy.html
windows7sins/trunk/base.inc
windows7sins/trunk/c/modal.css
windows7sins/trunk/c/sins.css
windows7sins/trunk/privacy-more.html
windows7sins/trunk/privacy.html
windows7sins/trunk/top.inc
Modified: windows7sins/branches/stable/privacy-more.html
==============================================================================
--- windows7sins/branches/stable/privacy-more.html Wed Sep 30 15:27:09
2009 (r721)
+++ windows7sins/branches/stable/privacy-more.html Wed Sep 30 15:37:20
2009 (r722)
@@ -1,5 +1,3 @@
-<p>Windows Genuine Advantage (WGA) is Microsoft's system for remotely checking
your computer. WGA scans various parts of your hard drive to reassure
Microsoft that you are running an "approved" version of Windows. WGA is
mandatory monitoring system and if Microsoft decides you are not "approved"
they can disable your computer's functionality. Currently Microsoft confirms
that WGA checks:</p>
-
<ul>
<li>Computer make and model</li>
<li>BIOS</li>
@@ -7,7 +5,6 @@
<li>A unique number assigned to your computer - Globally Unique Identifier or
GUID</li>
<li>Hard drive serial number</li>
<li>Region and language settings of the operating system</li>
-
<li>Operating system version</li>
<li>PC BIOS information (make, version, date)</li>
<li>PC manufacturer</li>
@@ -17,30 +14,43 @@
<li>Windows XP product ID</li>
</ul>
-<p>WGA has caused a number privacy related problems, including deletion of
software. WGA gets automatically updated as part of Microsoft's critical
update procedures, giving users little choice but to accept changes to the
systems Microsoft can monitor. Many have claimed that WGA is spyware, and
although Microsoft have denied such intent, they retain the power to decide
what counts as an invasion of your privacy.</p>
-
-<p>For Windows 7 they are changing the name of the product to Windows 7
Activation Technologies (WAT), but the functionality remains the same.</p>
+<p>WGA has caused a number privacy related problems, including
+deletion of software. WGA gets automatically updated as part of
+Microsoft's critical update procedures, giving users little choice but
+to accept changes to the systems Microsoft can monitor. Many have
+claimed that WGA is spyware, and although Microsoft have denied such
+intent, they retain the power to decide what counts as an invasion of
+your privacy.</p>
+
+<p>For Windows 7 they are changing the name of the product to Windows
+7 Activation Technologies (WAT), but the functionality remains the
+same.</p>
+
+<p>Microsoft's version of a "Trusted Computing" scheme is called "<a
+href="http://en.wikipedia.org/wiki/Next-Generation_Secure_Computing_Base">Palladium</a>".
Proprietary
+programs have included malicious features before, but Palladium would
+make it universal.</p>
-<p>Microsoft's version of a "Trusted Computing" scheme is called "Palladium".
Proprietary programs have included malicious features before, but Palladium
would make it universal.</p>
-
-<p>Hollywood and the record companies will use Palladium to ensure that
+<p>Hollywood and the record companies <a
href="http://en.wikipedia.org/wiki/Next-Generation_Secure_Computing_Base#Digital_Rights_Management">will
use Palladium to ensure</a> that
downloaded videos and music can be played only on one specified
computer and the sharing of 'authorized' files will be entirely
impossible.</p>
<p>Making sharing impossible is bad enough, but it gets worse. There are
-plans to use the same facility for email and documents--resulting in
-email that disappears in two weeks, or documents that can only be read
-on the computers in one company.</p>
-
-<p>Imagine if you get an email from your boss telling you to do something
-that you think is risky; a month later, when it backfires, you can't
-use the email to show that the decision was not yours. "Getting it in
-writing" doesn't protect you when the order is written in disappearing
-ink.</p>
-
-<p>Treacherous computing puts the existence of free operating systems and
-free applications at risk, because you may not be able to run them at
+<a href="http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html">plans to use the same
facility for email and documents</a>--resulting in
+email that disappears in two weeks, or <a
href="http://www.gnu.org/philosophy/no-word-attachments.html">documents that
can only be read
+on the computers</a> in one company.</p>
+
+<p>Imagine if you get an email from your boss telling you to do
+something that you think is risky; a month later, when it backfires,
+you can't use the email to show that the decision was not
+yours. "Getting it in writing" doesn't protect you when the order is
+written in disappearing ink.</p>
+
+<p><a
+href="http://news.cnet.com/Something-fishys-going-on/2010-7350_3-5844412.html">Treacherous
+computing</a> puts the existence of free operating systems and free
+applications at risk, because you may not be able to run them at
all. </p>
<p>Some versions of treacherous computing would require the operating
Modified: windows7sins/branches/stable/privacy.html
==============================================================================
--- windows7sins/branches/stable/privacy.html Wed Sep 30 15:27:09 2009
(r721)
+++ windows7sins/branches/stable/privacy.html Wed Sep 30 15:37:20 2009
(r722)
@@ -3,7 +3,20 @@
<p>Who should your computer take its orders from?</p>
<p>Most people think their computers should obey them, not obey
-someone else. Yet, with a plan they call "trusted computing" and
-software they call Windows Genuine Advantage, Microsoft and others are
-planning to make your next computer obey them instead of you, and this
-has serious consequences for your privacy.</p>
+someone else. Yet, with a plan they call "<a
+href="http://en.wikipedia.org/wiki/Trusted_Computing">trusted
+computing</a>" and software they call <a
+href="http://en.wikipedia.org/wiki/Windows_Genuine_Advantage">Windows
+Genuine Advantage</a>, Microsoft and others are planning to make your
+next computer obey them instead of you, and this has serious
+consequences for your privacy.</p>
+
+<p>Windows Genuine Advantage (WGA) is Microsoft's system for remotely
+checking your computer. WGA scans various parts of your hard drive to
+reassure Microsoft that you are running an "approved" version of
+Windows. WGA is mandatory monitoring system and if Microsoft decides
+you are not "approved" they can disable your computer's
+functionality. Currently <a
+href="http://www.microsoft.com/genuine/downloads/faq.aspx">Microsoft
+confirms that WGA checks</a>:</p>
+
Modified: windows7sins/meta/objects/privacy-more.html
==============================================================================
--- windows7sins/meta/objects/privacy-more.html Wed Sep 30 15:27:09 2009
(r721)
+++ windows7sins/meta/objects/privacy-more.html Wed Sep 30 15:37:20 2009
(r722)
@@ -1,5 +1,3 @@
-<p>Windows Genuine Advantage (WGA) is Microsoft's system for remotely checking
your computer. WGA scans various parts of your hard drive to reassure
Microsoft that you are running an "approved" version of Windows. WGA is
mandatory monitoring system and if Microsoft decides you are not "approved"
they can disable your computer's functionality. Currently Microsoft confirms
that WGA checks:</p>
-
<ul>
<li>Computer make and model</li>
<li>BIOS</li>
@@ -7,7 +5,6 @@
<li>A unique number assigned to your computer - Globally Unique Identifier or
GUID</li>
<li>Hard drive serial number</li>
<li>Region and language settings of the operating system</li>
-
<li>Operating system version</li>
<li>PC BIOS information (make, version, date)</li>
<li>PC manufacturer</li>
@@ -17,30 +14,43 @@
<li>Windows XP product ID</li>
</ul>
-<p>WGA has caused a number privacy related problems, including deletion of
software. WGA gets automatically updated as part of Microsoft's critical
update procedures, giving users little choice but to accept changes to the
systems Microsoft can monitor. Many have claimed that WGA is spyware, and
although Microsoft have denied such intent, they retain the power to decide
what counts as an invasion of your privacy.</p>
-
-<p>For Windows 7 they are changing the name of the product to Windows 7
Activation Technologies (WAT), but the functionality remains the same.</p>
+<p>WGA has caused a number privacy related problems, including
+deletion of software. WGA gets automatically updated as part of
+Microsoft's critical update procedures, giving users little choice but
+to accept changes to the systems Microsoft can monitor. Many have
+claimed that WGA is spyware, and although Microsoft have denied such
+intent, they retain the power to decide what counts as an invasion of
+your privacy.</p>
+
+<p>For Windows 7 they are changing the name of the product to Windows
+7 Activation Technologies (WAT), but the functionality remains the
+same.</p>
+
+<p>Microsoft's version of a "Trusted Computing" scheme is called "<a
+href="http://en.wikipedia.org/wiki/Next-Generation_Secure_Computing_Base">Palladium</a>".
Proprietary
+programs have included malicious features before, but Palladium would
+make it universal.</p>
-<p>Microsoft's version of a "Trusted Computing" scheme is called "Palladium".
Proprietary programs have included malicious features before, but Palladium
would make it universal.</p>
-
-<p>Hollywood and the record companies will use Palladium to ensure that
+<p>Hollywood and the record companies <a
href="http://en.wikipedia.org/wiki/Next-Generation_Secure_Computing_Base#Digital_Rights_Management">will
use Palladium to ensure</a> that
downloaded videos and music can be played only on one specified
computer and the sharing of 'authorized' files will be entirely
impossible.</p>
<p>Making sharing impossible is bad enough, but it gets worse. There are
-plans to use the same facility for email and documents--resulting in
-email that disappears in two weeks, or documents that can only be read
-on the computers in one company.</p>
-
-<p>Imagine if you get an email from your boss telling you to do something
-that you think is risky; a month later, when it backfires, you can't
-use the email to show that the decision was not yours. "Getting it in
-writing" doesn't protect you when the order is written in disappearing
-ink.</p>
-
-<p>Treacherous computing puts the existence of free operating systems and
-free applications at risk, because you may not be able to run them at
+<a href="http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html">plans to use the same
facility for email and documents</a>--resulting in
+email that disappears in two weeks, or <a
href="http://www.gnu.org/philosophy/no-word-attachments.html">documents that
can only be read
+on the computers</a> in one company.</p>
+
+<p>Imagine if you get an email from your boss telling you to do
+something that you think is risky; a month later, when it backfires,
+you can't use the email to show that the decision was not
+yours. "Getting it in writing" doesn't protect you when the order is
+written in disappearing ink.</p>
+
+<p><a
+href="http://news.cnet.com/Something-fishys-going-on/2010-7350_3-5844412.html">Treacherous
+computing</a> puts the existence of free operating systems and free
+applications at risk, because you may not be able to run them at
all. </p>
<p>Some versions of treacherous computing would require the operating
Modified: windows7sins/meta/objects/privacy.html
==============================================================================
--- windows7sins/meta/objects/privacy.html Wed Sep 30 15:27:09 2009
(r721)
+++ windows7sins/meta/objects/privacy.html Wed Sep 30 15:37:20 2009
(r722)
@@ -3,7 +3,20 @@
<p>Who should your computer take its orders from?</p>
<p>Most people think their computers should obey them, not obey
-someone else. Yet, with a plan they call "trusted computing" and
-software they call Windows Genuine Advantage, Microsoft and others are
-planning to make your next computer obey them instead of you, and this
-has serious consequences for your privacy.</p>
+someone else. Yet, with a plan they call "<a
+href="http://en.wikipedia.org/wiki/Trusted_Computing">trusted
+computing</a>" and software they call <a
+href="http://en.wikipedia.org/wiki/Windows_Genuine_Advantage">Windows
+Genuine Advantage</a>, Microsoft and others are planning to make your
+next computer obey them instead of you, and this has serious
+consequences for your privacy.</p>
+
+<p>Windows Genuine Advantage (WGA) is Microsoft's system for remotely
+checking your computer. WGA scans various parts of your hard drive to
+reassure Microsoft that you are running an "approved" version of
+Windows. WGA is mandatory monitoring system and if Microsoft decides
+you are not "approved" they can disable your computer's
+functionality. Currently <a
+href="http://www.microsoft.com/genuine/downloads/faq.aspx">Microsoft
+confirms that WGA checks</a>:</p>
+
Modified: windows7sins/trunk/base.inc
==============================================================================
--- windows7sins/trunk/base.inc Wed Sep 30 15:27:09 2009 (r721)
+++ windows7sins/trunk/base.inc Wed Sep 30 15:37:20 2009 (r722)
@@ -54,6 +54,13 @@
</div>
</div>
+
+ <?php include('js-dev.inc');
+
+ // include('js-live.inc');
+
+ ?>
+
</body>
</html>
Modified: windows7sins/trunk/c/modal.css
==============================================================================
--- windows7sins/trunk/c/modal.css Wed Sep 30 15:27:09 2009 (r721)
+++ windows7sins/trunk/c/modal.css Wed Sep 30 15:37:20 2009 (r722)
@@ -3,19 +3,19 @@
}
#facebox .tl {
- background:url(/i/tl.png) no-repeat;
+ background:url(/i/sprites.png) no-repeat; background-position: -10px -345px;
}
#facebox .tr {
- background:url(/i/tr.png) no-repeat;
+ background:url(/i/sprites.png) no-repeat; background-position: -10px -375px;
}
#facebox .bl {
- background:url(/i/bl.png) no-repeat;
+ background:url(/i/sprites.png) no-repeat;background-position: -10px -405px;
}
#facebox .br {
- background:url(/i/br.png) no-repeat;
+ background:url(/i/sprites.png) no-repeat; background-position: -10px -435px;
}
#facebox {
Modified: windows7sins/trunk/c/sins.css
==============================================================================
--- windows7sins/trunk/c/sins.css Wed Sep 30 15:27:09 2009 (r721)
+++ windows7sins/trunk/c/sins.css Wed Sep 30 15:37:20 2009 (r722)
@@ -7,10 +7,11 @@
#custom-doc { width:54.31em;*width:53em;min-width:706px; margin:auto;
text-align:left; padding-top: 34px; position: relative;}
#logo {
- background: url(/i/logo.png) no-repeat;
+ background: url(/i/sprites.png) no-repeat -10px -10px;
border: 0;
padding: 0;
margin: 0;
+
}
#logo a {
@@ -209,13 +210,11 @@
dt {font-size: 34px; font-weight: normal; line-height: 51px; color: #444;
text-transform: lowercase;}
-#badvista {width: 200px; height: 281px; margin: 30px; float: right;
background-image: url(/i/badvista.png); background-repeat: no-repeat;}
+#bill1{width: 160px; height: 236px; margin: 0px; float: right;
background-position: 38px -465px !important; background-image:
url(/i/sprites.png); }
-#bill1{width: 160px; height: 236px; margin: 0px; float: right;
background-image: url(/i/bill1.png);}
+#bill2{width: 132px; height: 164px; margin: 20px; float: left;
background-image: url(/i/sprites.png); background-position: 0px -166px
!important;}
-#bill2{width: 132px; height: 164px; margin: 20px; float: left;
background-image: url(/i/bill2.png);}
-
-#bill1, #bill2{background-repeat: no-repeat; background-position: top right;}
+#bill1, #bill2{background-repeat: no-repeat;}
#intern a img {border: 5px solid white;}
Modified: windows7sins/trunk/privacy-more.html
==============================================================================
--- windows7sins/trunk/privacy-more.html Wed Sep 30 15:27:09 2009
(r721)
+++ windows7sins/trunk/privacy-more.html Wed Sep 30 15:37:20 2009
(r722)
@@ -1,5 +1,3 @@
-<p>Windows Genuine Advantage (WGA) is Microsoft's system for remotely checking
your computer. WGA scans various parts of your hard drive to reassure
Microsoft that you are running an "approved" version of Windows. WGA is
mandatory monitoring system and if Microsoft decides you are not "approved"
they can disable your computer's functionality. Currently Microsoft confirms
that WGA checks:</p>
-
<ul>
<li>Computer make and model</li>
<li>BIOS</li>
@@ -7,7 +5,6 @@
<li>A unique number assigned to your computer - Globally Unique Identifier or
GUID</li>
<li>Hard drive serial number</li>
<li>Region and language settings of the operating system</li>
-
<li>Operating system version</li>
<li>PC BIOS information (make, version, date)</li>
<li>PC manufacturer</li>
@@ -17,30 +14,43 @@
<li>Windows XP product ID</li>
</ul>
-<p>WGA has caused a number privacy related problems, including deletion of
software. WGA gets automatically updated as part of Microsoft's critical
update procedures, giving users little choice but to accept changes to the
systems Microsoft can monitor. Many have claimed that WGA is spyware, and
although Microsoft have denied such intent, they retain the power to decide
what counts as an invasion of your privacy.</p>
-
-<p>For Windows 7 they are changing the name of the product to Windows 7
Activation Technologies (WAT), but the functionality remains the same.</p>
+<p>WGA has caused a number privacy related problems, including
+deletion of software. WGA gets automatically updated as part of
+Microsoft's critical update procedures, giving users little choice but
+to accept changes to the systems Microsoft can monitor. Many have
+claimed that WGA is spyware, and although Microsoft have denied such
+intent, they retain the power to decide what counts as an invasion of
+your privacy.</p>
+
+<p>For Windows 7 they are changing the name of the product to Windows
+7 Activation Technologies (WAT), but the functionality remains the
+same.</p>
+
+<p>Microsoft's version of a "Trusted Computing" scheme is called "<a
+href="http://en.wikipedia.org/wiki/Next-Generation_Secure_Computing_Base">Palladium</a>".
Proprietary
+programs have included malicious features before, but Palladium would
+make it universal.</p>
-<p>Microsoft's version of a "Trusted Computing" scheme is called "Palladium".
Proprietary programs have included malicious features before, but Palladium
would make it universal.</p>
-
-<p>Hollywood and the record companies will use Palladium to ensure that
+<p>Hollywood and the record companies <a
href="http://en.wikipedia.org/wiki/Next-Generation_Secure_Computing_Base#Digital_Rights_Management">will
use Palladium to ensure</a> that
downloaded videos and music can be played only on one specified
computer and the sharing of 'authorized' files will be entirely
impossible.</p>
<p>Making sharing impossible is bad enough, but it gets worse. There are
-plans to use the same facility for email and documents--resulting in
-email that disappears in two weeks, or documents that can only be read
-on the computers in one company.</p>
-
-<p>Imagine if you get an email from your boss telling you to do something
-that you think is risky; a month later, when it backfires, you can't
-use the email to show that the decision was not yours. "Getting it in
-writing" doesn't protect you when the order is written in disappearing
-ink.</p>
-
-<p>Treacherous computing puts the existence of free operating systems and
-free applications at risk, because you may not be able to run them at
+<a href="http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html">plans to use the same
facility for email and documents</a>--resulting in
+email that disappears in two weeks, or <a
href="http://www.gnu.org/philosophy/no-word-attachments.html">documents that
can only be read
+on the computers</a> in one company.</p>
+
+<p>Imagine if you get an email from your boss telling you to do
+something that you think is risky; a month later, when it backfires,
+you can't use the email to show that the decision was not
+yours. "Getting it in writing" doesn't protect you when the order is
+written in disappearing ink.</p>
+
+<p><a
+href="http://news.cnet.com/Something-fishys-going-on/2010-7350_3-5844412.html">Treacherous
+computing</a> puts the existence of free operating systems and free
+applications at risk, because you may not be able to run them at
all. </p>
<p>Some versions of treacherous computing would require the operating
Modified: windows7sins/trunk/privacy.html
==============================================================================
--- windows7sins/trunk/privacy.html Wed Sep 30 15:27:09 2009 (r721)
+++ windows7sins/trunk/privacy.html Wed Sep 30 15:37:20 2009 (r722)
@@ -3,7 +3,20 @@
<p>Who should your computer take its orders from?</p>
<p>Most people think their computers should obey them, not obey
-someone else. Yet, with a plan they call "trusted computing" and
-software they call Windows Genuine Advantage, Microsoft and others are
-planning to make your next computer obey them instead of you, and this
-has serious consequences for your privacy.</p>
+someone else. Yet, with a plan they call "<a
+href="http://en.wikipedia.org/wiki/Trusted_Computing">trusted
+computing</a>" and software they call <a
+href="http://en.wikipedia.org/wiki/Windows_Genuine_Advantage">Windows
+Genuine Advantage</a>, Microsoft and others are planning to make your
+next computer obey them instead of you, and this has serious
+consequences for your privacy.</p>
+
+<p>Windows Genuine Advantage (WGA) is Microsoft's system for remotely
+checking your computer. WGA scans various parts of your hard drive to
+reassure Microsoft that you are running an "approved" version of
+Windows. WGA is mandatory monitoring system and if Microsoft decides
+you are not "approved" they can disable your computer's
+functionality. Currently <a
+href="http://www.microsoft.com/genuine/downloads/faq.aspx">Microsoft
+confirms that WGA checks</a>:</p>
+
Modified: windows7sins/trunk/top.inc
==============================================================================
--- windows7sins/trunk/top.inc Wed Sep 30 15:27:09 2009 (r721)
+++ windows7sins/trunk/top.inc Wed Sep 30 15:37:20 2009 (r722)
@@ -6,41 +6,20 @@
<style type="text/css" media="screen">
- @import url(/c/combo.css);
- @import url(/c/sins.css);
- @import url(/c/modal.css);
+ <?php include('css-dev.inc');
+
+ // include('css-live.inc');
+
+ ?>
</style>
<style type="text/css" media="print">
- @import url(/c/print.css);
+ @import url(/c/print.min.css);
</style>
- <script src="/s/jquery1.3min.js" type="text/javascript"></script>
- <script src="/s/jquery.easing.1.3.js" type="text/javascript"></script>
- <script src="/s/jquery.easing.compatibility.js"
type="text/javascript"></script>
- <script type="text/javascript" src="/s/jqueryui.js"></script>
- <script type="text/javascript" src="/s/turn.js"></script>
- <script type="text/javascript"
src="/s/jquery.hoverIntent.minified.js"></script>
- <script src="/s/coda-slider.1.1.1.js" type="text/javascript"></script>
- <script type="text/javascript" src="/s/modal.js"></script>
- <script type="text/javascript"
src="/s/c/r/i/p/t/text-javascript.js"></script>
-
- <script type="text/javascript">
-
- jQuery(window).bind("load", function() {
- jQuery("div#slider1").codaSlider()
- });
-
- $(document).ready(function(){
- $( '#target' ).fold({directory: 'i', turnImage: 'fold.png'});
- jQuery('a[rel*=facebox]').facebox()
- });
-
- document.write('<link rel="stylesheet" href="/c/js.css" media="screen">');
-
- </script>
</head>
+<?php flush(); ?>
<body>
<a id="take-action-banner" href="http://meta.windows7sins.org/"><img
src="/i/band.png" alt="Do something"></a>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [Svnweb-commits] r722 - in windows7sins: branches/stable meta/objects trunk trunk/c,
sysadmin <=