[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary-back-doors.fr.html ...
From: |
GNUN |
Subject: |
www/proprietary proprietary-back-doors.fr.html ... |
Date: |
Tue, 22 Dec 2015 16:58:23 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 15/12/22 16:58:23
Modified files:
proprietary : proprietary-back-doors.fr.html
proprietary/po : proprietary-back-doors.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.10&r2=1.11
Patches:
Index: proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-back-doors.fr.html 12 Dec 2015 13:34:26 -0000 1.10
+++ proprietary-back-doors.fr.html 22 Dec 2015 16:58:22 -0000 1.11
@@ -19,6 +19,20 @@
<ul>
<li>
+ <p>Les ordinateurs Dell vendus avec Windows avaient un certificat racine
bidon
+qui <a
+href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">
+permettait à n'importe qui (pas seulement à Dell) d'autoriser à distance
+l'exécution de n'importe quel programme</a>.</p>
+ </li>
+ <li>
+ <p>La bibliothèque Android privatrice de Baidu (Moplus) a une porte
dérobée qui
+<a
+href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+peut « uploader des fichiers » et aussi installer des applis de
force</a>.</p>
+ <p>Elle est utilisée par 14 000 applications Android.</p>
+ </li>
+ <li>
<p>Microsoft <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
attaque les ordinateurs sous Windows 7 et 8</a> en modifiant un drapeau
@@ -326,7 +340,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2015/12/12 13:34:26 $
+$Date: 2015/12/22 16:58:22 $
<!-- timestamp end -->
</p>
Index: po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/proprietary-back-doors.fr-en.html 12 Dec 2015 13:34:27 -0000
1.10
+++ po/proprietary-back-doors.fr-en.html 22 Dec 2015 16:58:23 -0000
1.11
@@ -11,6 +11,20 @@
<ul>
<li>
+ <p>Dell computers, shipped with Windows, had a bogus root
+ certificate that
+ <a
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">allowed
+ anyone (not just Dell) to remotely authorize any software to
+ run</a> on the computer.</p>
+ </li>
+ <li>
+ <p>Baidu's proprietary Android library, Moplus, has a back door
+ that <a
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">can
+ “upload files” as well as forcibly install
+ apps</a>.</p>
+ <p>It is used by 14,000 Android applications.</p>
+ </li>
+ <li>
<p>Microsoft
is <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">attacking
computers that run Windows 7 and 8</a>, switching on a flag that
@@ -277,7 +291,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/12/12 13:34:27 $
+$Date: 2015/12/22 16:58:23 $
<!-- timestamp end -->
</p>
</div>