www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-back-doors.fr.html ...


From: GNUN
Subject: www/proprietary proprietary-back-doors.fr.html ...
Date: Tue, 22 Dec 2015 16:58:23 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     15/12/22 16:58:23

Modified files:
        proprietary    : proprietary-back-doors.fr.html 
        proprietary/po : proprietary-back-doors.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.10&r2=1.11

Patches:
Index: proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-back-doors.fr.html      12 Dec 2015 13:34:26 -0000      1.10
+++ proprietary-back-doors.fr.html      22 Dec 2015 16:58:22 -0000      1.11
@@ -19,6 +19,20 @@
 
 <ul>
   <li>
+    <p>Les ordinateurs Dell vendus avec Windows avaient un certificat racine 
bidon
+qui <a
+href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/";>
+permettait à n'importe qui (pas seulement à Dell) d'autoriser à distance
+l'exécution de n'importe quel programme</a>.</p>
+  </li>
+  <li>
+    <p>La bibliothèque Android privatrice de Baidu (Moplus) a une porte 
dérobée qui
+<a
+href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made";>
+peut « uploader des fichiers » et aussi installer des applis de 
force</a>.</p>
+    <p>Elle est utilisée par 14 000 applications Android.</p>
+  </li>
+  <li>
     <p>Microsoft <a
 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
 attaque les ordinateurs sous Windows 7 et 8</a> en modifiant un drapeau
@@ -326,7 +340,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/12/12 13:34:26 $
+$Date: 2015/12/22 16:58:22 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/proprietary-back-doors.fr-en.html        12 Dec 2015 13:34:27 -0000      
1.10
+++ po/proprietary-back-doors.fr-en.html        22 Dec 2015 16:58:23 -0000      
1.11
@@ -11,6 +11,20 @@
 
 <ul>
   <li>
+    <p>Dell computers, shipped with Windows, had a bogus root
+      certificate that
+      <a 
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/";>allowed
+      anyone (not just Dell) to remotely authorize any software to
+      run</a> on the computer.</p>
+  </li>
+  <li>
+    <p>Baidu's proprietary Android library, Moplus, has a back door
+      that <a 
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made";>can
+      &ldquo;upload files&rdquo; as well as forcibly install
+      apps</a>.</p>
+    <p>It is used by 14,000 Android applications.</p>
+  </li>
+  <li>
     <p>Microsoft
     is <a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>attacking
     computers that run Windows 7 and 8</a>, switching on a flag that
@@ -277,7 +291,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/12/12 13:34:27 $
+$Date: 2015/12/22 16:58:23 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]