[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy proprietary.html
From: |
Pavel Kharitonov |
Subject: |
www/philosophy proprietary.html |
Date: |
Fri, 30 May 2014 05:25:04 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: Pavel Kharitonov <ineiev> 14/05/30 05:25:04
Modified files:
philosophy : proprietary.html
Log message:
Reorganize lists RT #914789.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary.html?cvsroot=www&r1=1.17&r2=1.18
Patches:
Index: proprietary.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary.html 25 Apr 2014 20:33:30 -0000 1.17
+++ proprietary.html 30 May 2014 05:25:02 -0000 1.18
@@ -4,6 +4,14 @@
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/philosophy/po/proprietary.translist" -->
<!--#include virtual="/server/banner.html" -->
+<style type="text/css" media="print,screen">
+div.companies { float: right; margin-bottom: .5em; }
+div.malfunctions { max-width: 27em; }
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style>
<h2>Proprietary Software</h2>
<p>Proprietary software, nonfree software, means software that doesn't
@@ -15,7 +23,7 @@
injustice often leads to further injustice.</p>
<p>Power corrupts, so the proprietary program's developer is tempted
-to design the program to mistreat its users —that is, to make
+to design the program to mistreat its users—that is, to make
it <em>malware</em>. (Malware means software whose functioning
mistreats the user.) Of course, the developer usually does not do
this out of malice, but rather to put the users at a disadvantage.
@@ -25,18 +33,25 @@
it is standard practice. Modern proprietary software is software for
suckers!</p>
-<p>Here are examples of widely used proprietary programs that are known to
-be malware. They are organized by the type of malicious functionality.</p>
+<div class="toc">
+<div class="companies">
+<ul>
+ <li><strong>Company or type of product</strong></li>
+ <li><a href="/philosophy/malware-apple.html">Apple Malware</a></li>
+ <li><a href="/philosophy/malware-microsoft.html">Microsoft Malware</a></li>
+ <li><a href="/philosophy/malware-mobiles.html">Malware in mobile
devices</a></li>
+ <li><a href="/philosophy/malware-kindle-swindle.html">Malware in the Amazon
+ Swindle</a></li>
+</ul>
+</div>
+<div class="malfunctions">
<ul>
-<li><a href="/philosophy/proprietary-back-doors.html">Proprietary back
- doors</a></li>
-<li><a href="/philosophy/proprietary-insecurity.html">Proprietary
- insecurity</a></li>
-<li><a href="/philosophy/proprietary-sabotage.html">Proprietary
- sabotage</a></li>
-<li><a href="/philosophy/proprietary-surveillance.html">Proprietary
- surveillance</a></li>
+<li style="white-space: nowrap"><strong>Type of malware</strong></li>
+<li><a href="/philosophy/proprietary-back-doors.html">Back doors</a></li>
+<li><a href="/philosophy/proprietary-insecurity.html">Insecurity</a></li>
+<li><a href="/philosophy/proprietary-sabotage.html">Sabotage</a></li>
+<li><a href="/philosophy/proprietary-surveillance.html">Surveillance</a></li>
<li><a href="/philosophy/proprietary-drm.html">Digital restrictions
management</a> or “DRM” means functionalities designed
to restrict what users can do with the data in their computers.</li>
@@ -46,18 +61,8 @@
that reject any operating system not “authorized” by the
manufacturer.</li>
</ul>
-
-<p>These pages present some of the same examples, organized by
-specific companies or systems:</p>
-
-<ul>
- <li><a href="/philosophy/malware-apple.html">Apple's software is
malware</a></li>
- <li><a href="/philosophy/malware-microsoft.html">Microsoft's software is
- malware</a></li>
- <li><a href="/philosophy/malware-mobiles.html">Malware in mobile
devices</a></li>
- <li><a href="/philosophy/malware-kindle-swindle.html">Malware in the Amazon
- Swindle</a></li>
-</ul>
+</div>
+</div>
<p>Users of proprietary software are defenseless against these forms
of mistreatment. The way to avoid them is by insisting on
@@ -123,7 +128,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/04/25 20:33:30 $
+$Date: 2014/05/30 05:25:02 $
<!-- timestamp end -->
</p>
</div>
- www/philosophy proprietary.html,
Pavel Kharitonov <=