[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-webpages.html
From: |
Félicien PILLOT |
Subject: |
www/proprietary malware-webpages.html |
Date: |
Sat, 29 Jul 2017 17:17:00 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: FĂ©licien PILLOT <felandral> 17/07/29 17:17:00
Modified files:
proprietary : malware-webpages.html
Log message:
Validation fix
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.html?cvsroot=www&r1=1.4&r2=1.5
Patches:
Index: malware-webpages.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-webpages.html 29 Jul 2017 21:12:19 -0000 1.4
+++ malware-webpages.html 29 Jul 2017 21:17:00 -0000 1.5
@@ -67,7 +67,6 @@
tracking libraries. Developers of this app have confirmed that the
non-premium version of the app does JavaScript injection for tracking
the user and displaying ads.</dd>
- </ul>
</dl>
<li>
<p>E-books can contain JavaScript code, and
@@ -133,7 +132,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/07/29 21:12:19 $
+$Date: 2017/07/29 21:17:00 $
<!-- timestamp end -->
</p>
</div>