www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy malware-apple.html malware-kindl...


From: Navaneeth
Subject: www/philosophy malware-apple.html malware-kindl...
Date: Fri, 30 May 2014 06:49:37 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     Navaneeth <navaneeths52>        14/05/30 06:49:36

Modified files:
        philosophy     : malware-apple.html malware-kindle-swindle.html 
                         malware-microsoft.html malware-mobiles.html 
                         proprietary-back-doors.html 
                         proprietary-drm.html 
                         proprietary-insecurity.html 
                         proprietary-jails.html 
                         proprietary-sabotage.html 
                         proprietary-surveillance.html 
                         proprietary-tyrants.html 

Log message:
        Add new link to /philosophy/proprietary.html (RT #919321)

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-apple.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-kindle-swindle.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-microsoft.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-mobiles.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-back-doors.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-drm.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-insecurity.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-jails.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-sabotage.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-surveillance.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-tyrants.html?cvsroot=www&r1=1.7&r2=1.8

Patches:
Index: malware-apple.html
===================================================================
RCS file: /web/www/www/philosophy/malware-apple.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- malware-apple.html  12 May 2014 13:00:17 -0000      1.8
+++ malware-apple.html  30 May 2014 06:49:30 -0000      1.9
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Apple's Operating Systems Are Malware</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -141,7 +143,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/12 13:00:17 $
+$Date: 2014/05/30 06:49:30 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-kindle-swindle.html
===================================================================
RCS file: /web/www/www/philosophy/malware-kindle-swindle.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-kindle-swindle.html 22 Apr 2014 15:54:18 -0000      1.5
+++ malware-kindle-swindle.html 30 May 2014 06:49:31 -0000      1.6
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in the Kindle Swindle</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>We refer to this product as the 
 <a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
 because it has <a href="/philosophy/proprietary-drm.html">Digital restrictions
@@ -100,7 +102,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/04/22 15:54:18 $
+$Date: 2014/05/30 06:49:31 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-microsoft.html
===================================================================
RCS file: /web/www/www/philosophy/malware-microsoft.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-microsoft.html      24 May 2014 11:58:29 -0000      1.12
+++ malware-microsoft.html      30 May 2014 06:49:32 -0000      1.13
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Microsoft's Software is Malware</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -149,7 +151,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/24 11:58:29 $
+$Date: 2014/05/30 06:49:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-mobiles.html
===================================================================
RCS file: /web/www/www/philosophy/malware-mobiles.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-mobiles.html        24 May 2014 11:40:47 -0000      1.4
+++ malware-mobiles.html        30 May 2014 06:49:33 -0000      1.5
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in Mobile Devices</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -148,7 +150,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/24 11:40:47 $
+$Date: 2014/05/30 06:49:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-back-doors.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-back-doors.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary-back-doors.html 23 May 2014 00:35:17 -0000      1.18
+++ proprietary-back-doors.html 30 May 2014 06:49:33 -0000      1.19
@@ -5,6 +5,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Back Doors</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>Here are examples of demonstrated back doors in proprietary software.</p>
 
 <ul>
@@ -189,7 +191,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/23 00:35:17 $
+$Date: 2014/05/30 06:49:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-drm.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-drm.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-drm.html        13 Apr 2014 15:00:55 -0000      1.8
+++ proprietary-drm.html        30 May 2014 06:49:33 -0000      1.9
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary DRM</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>Here are examples of proprietary programs and systems that
 implement <em>digital restrictions management</em> (DRM):
 functionalities designed intentionally to restrict what users can do.
@@ -148,7 +150,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/04/13 15:00:55 $
+$Date: 2014/05/30 06:49:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-insecurity.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-insecurity.html 26 May 2014 11:19:15 -0000      1.26
+++ proprietary-insecurity.html 30 May 2014 06:49:33 -0000      1.27
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Insecurity</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>This page lists clearly established cases of insecurity in
 proprietary software that has grave consequences or is otherwise
 noteworthy.</p>
@@ -174,7 +176,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/26 11:19:15 $
+$Date: 2014/05/30 06:49:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-jails.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-jails.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-jails.html      12 Apr 2014 12:40:36 -0000      1.11
+++ proprietary-jails.html      30 May 2014 06:49:34 -0000      1.12
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Jails</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>Here are examples of proprietary systems that are
 <em>jails</em>&mdash;they do not allow the user to freely install
 applications.  The <a href="http://i.imgur.com/ZRViDum.jpg";>image of
@@ -103,7 +105,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/04/12 12:40:36 $
+$Date: 2014/05/30 06:49:34 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-sabotage.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-sabotage.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-sabotage.html   23 May 2014 00:42:52 -0000      1.20
+++ proprietary-sabotage.html   30 May 2014 06:49:34 -0000      1.21
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Sabotage</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>Here are examples of proprietary software that has something
 worse than a back door.</p>
 
@@ -151,7 +153,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/23 00:42:52 $
+$Date: 2014/05/30 06:49:34 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-surveillance.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-surveillance.html       23 May 2014 03:50:10 -0000      1.30
+++ proprietary-surveillance.html       30 May 2014 06:49:34 -0000      1.31
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Surveillance</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>Clearly established cases of proprietary software that spies on or
 tracks users:</p>
 
@@ -224,7 +226,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/23 03:50:10 $
+$Date: 2014/05/30 06:49:34 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-tyrants.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-tyrants.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-tyrants.html    12 Apr 2014 12:40:42 -0000      1.7
+++ proprietary-tyrants.html    30 May 2014 06:49:34 -0000      1.8
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Tyrants</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>A <em>tyrant</em> device is one that refuses to allow users to
 install a different operating system or a modified operating
 system.  These devices have measures to block execution of anything
@@ -106,7 +108,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/04/12 12:40:42 $
+$Date: 2014/05/30 06:49:34 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]