[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-appliances.fr.html prop...
From: |
GNUN |
Subject: |
www/proprietary malware-appliances.fr.html prop... |
Date: |
Tue, 19 Sep 2017 05:29:10 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/09/19 05:29:10
Modified files:
proprietary : malware-appliances.fr.html
proprietary-insecurity.fr.html
proprietary/po : malware-appliances.fr-en.html
proprietary-insecurity.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.fr.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr-en.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.47&r2=1.48
Patches:
Index: malware-appliances.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.fr.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- malware-appliances.fr.html 12 Sep 2017 09:04:56 -0000 1.28
+++ malware-appliances.fr.html 19 Sep 2017 09:29:09 -0000 1.29
@@ -38,7 +38,15 @@
équipements.</p>
<ul>
-
+<li>
+ <p>La mauvaise sécurisation de beaucoup d'appareils de l'Internet des
dangers
+permet aux <a
+href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">fournisseurs
+de services d'espionner les gens qui les utilisent</a>.</p>
+ <p>Ne vous laissez pas avoir, rejetez tous ces objets dangereux.</p>
+ <p>C'est dommage que l'article utilise le terme « <a
+href="/philosophy/words-to-avoid.html#Monetize">monétiser</a> ».</p>
+</li>
<li>
<p>Dans certaines voitures, Tesla a utilisé une porte dérobée universelle
pour
<a
@@ -696,7 +704,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2017/09/12 09:04:56 $
+$Date: 2017/09/19 09:29:09 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary-insecurity.fr.html 12 Sep 2017 09:04:57 -0000 1.54
+++ proprietary-insecurity.fr.html 19 Sep 2017 09:29:09 -0000 1.55
@@ -43,11 +43,19 @@
<ul>
<li>
+ <p>La mauvaise sécurisation de beaucoup d'appareils de l'Internet des
dangers
+permet aux <a
+href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">fournisseurs
+de services d'espionner les gens qui les utilisent</a>.</p>
+ <p>Ne vous laissez pas avoir, rejetez tous ces objets dangereux.</p>
+ <p>C'est dommage que l'article utilise le terme « <a
+href="/philosophy/words-to-avoid.html#Monetize">monétiser</a> ».</p>
+</li>
+<li>
<p>Siri, Alexa et tous les autres systèmes de commande vocale peuvent être
piratés par des programmes qui <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">envoient
-les commandes sous forme d'ultrasons inaudibles par les humains</a>.
- </p>
+les commandes sous forme d'ultrasons inaudibles par les humains</a>.</p>
</li>
<li id="break-security-smarttv">
@@ -131,7 +139,7 @@
<li>
<p>Lorsque le lave-vaisselle désinfecteur de Miele <a
href="https://motherboard.vice.com/fr/article/un-lave-vaisselle-connecte-permet-dacceder-au-reseau-informatique-des-hopitaux">se
-connecte à l'Internet des Dangers, sa sécurisation est en-dessous de
+connecte à l'Internet des dangers, sa sécurisation est en-dessous de
tout</a>.</p>
<p>Par exemple, un cracker aurait la possibilité d'accéder au système de
@@ -596,7 +604,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2017/09/12 09:04:57 $
+$Date: 2017/09/19 09:29:09 $
<!-- timestamp end -->
</p>
Index: po/malware-appliances.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr-en.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- po/malware-appliances.fr-en.html 12 Sep 2017 09:04:57 -0000 1.27
+++ po/malware-appliances.fr-en.html 19 Sep 2017 09:29:10 -0000 1.28
@@ -31,7 +31,14 @@
<p>Here are examples of malware in appliances.</p>
<ul>
-
+<li>
+ <p>The bad security in many Internet of Stings devices
+ allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people that use them</a>.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
+ <p>It is unfortunate that the article uses the
+ term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+</li>
<li>
<p>Tesla used a universal backdoor in its software to limit customers to
using just <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
@@ -632,7 +639,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/09/12 09:04:57 $
+$Date: 2017/09/19 09:29:10 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- po/proprietary-insecurity.fr-en.html 12 Sep 2017 09:04:57 -0000
1.47
+++ po/proprietary-insecurity.fr-en.html 19 Sep 2017 09:29:10 -0000
1.48
@@ -36,9 +36,20 @@
<ul>
<li>
+ <p>The bad security in many Internet of Stings devices
+ allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people that use them</a>.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
+ <p>It is unfortunate that the article uses the term <a
+ href="/philosophy/words-to-avoid.html#Monetize">
+ “monetize”</a>.</p>
+</li>
+<li>
<p>Siri, Alexa, and all the other voice-control systems can be
- <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs that play commands in ultrasound that humans can't hear</a>.
- </p>
+ <a
+href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
+ hijacked by programs that play commands in ultrasound that humans can't
+ hear</a>.</p>
</li>
<li id="break-security-smarttv">
@@ -526,7 +537,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/09/12 09:04:57 $
+$Date: 2017/09/19 09:29:10 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-appliances.fr.html prop...,
GNUN <=