www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary/rec README apple...


From: Therese Godefroy
Subject: www/server/staging/proprietary/rec README apple...
Date: Sun, 16 Sep 2018 15:29:13 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/09/16 15:29:13

Modified files:
        server/staging/proprietary/rec: README apple-stub.html 
                                        google-stub.html 
                                        microsoft-stub.html 

Log message:
        Reorganize alphabetically; add 'latest additions' section.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/README?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/apple-stub.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/google-stub.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/microsoft-stub.html?cvsroot=www&r1=1.1&r2=1.2

Patches:
Index: README
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/README,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- README      16 Sep 2018 10:23:37 -0000      1.3
+++ README      16 Sep 2018 19:29:13 -0000      1.4
@@ -38,9 +38,9 @@
 
 Progress as of Sept 16, 2018:
 
-Total:   358 blurbs  extracted from all pages in proprietary-*, + pages in
+Total:   363 blurbs  extracted from all pages in proprietary-*, + pages in
                      malware-* that have been tagged so far.
-Tagged:  162 blurbs
+Tagged:  194 blurbs
 
 Completely tagged pages:
          malware-adobe
@@ -50,7 +50,10 @@
          malware-cars
          malware-games
          malware-google
+         malware-microsoft
+         malware-webpages
          proprietary-back-doors
+         potential-malware
 
 Many thanks for your help!
 

Index: apple-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/apple-stub.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- apple-stub.html     14 Sep 2018 21:12:47 -0000      1.1
+++ apple-stub.html     16 Sep 2018 19:29:13 -0000      1.2
@@ -37,23 +37,23 @@
 <div class="summary" style="margin-top: 2em">
 <h3>Type&nbsp;of malware</h3>
 <ul>
-<li><a href="#back-doors">Back doors</a></li>
-<li><a href="#censorship">Censorship</a></li>
-<li><a href="#insecurity">Insecurity</a></li>
-<li><a href="#pressuring">Pressuring</a></li>
-<li><a href="#sabotage">Sabotage</a></li>
-<li><a href="#interference">Interference</a></li>
-<li><a href="#surveillance">Surveillance</a></li>
-<li><a href="#incompatibility">Incompatibility</a></li>
-<li><a href="#drm">Digital restrictions
-    management</a> or &ldquo;DRM&rdquo; means functionalities designed
+  <li><a href="#back-doors">Back doors</a></li>
+  <li><a href="#censorship">Censorship</a></li>
+  <li><a href="#deception">Deception</a></li>
+  <li><a href="#drm">Digital restrictions
+    management</a> or &ldquo;DRM&rdquo;&mdash;functionalities designed
     to restrict what users can do with the data in their computers.</li>
-<li><a href="#jails">Jails</a>&mdash;systems
+  <li><a href="#incompatibility">Incompatibility</a></li>
+  <li><a href="#insecurity">Insecurity</a></li>
+  <li><a href="#interference">Interference</a></li>
+  <li><a href="#jails">Jails</a>&mdash;systems
     that impose censorship on application programs.</li>
-<li><a href="#tyrants">Tyrants</a>&mdash;systems
+  <li><a href="#pressuring">Pressuring</a></li>
+  <li><a href="#sabotage">Sabotage</a></li>
+  <li><a href="#surveillance">Surveillance</a></li>
+  <li><a href="#tyrants">Tyrants</a>&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.</li>
-<li><a href="#deception">Deception</a></li>
 </ul>
 </div>
 
@@ -67,6 +67,20 @@
 section for more information.</p>
 <!-- INSERT censorship.list -->
 
+<h3 id="deception">Apple Deception</h3>
+<!-- INSERT deception.list -->
+
+<h3 id="drm">Apple DRM</h3>
+<!-- INSERT appleDRM.list -->
+
+<h3 id="incompatibility">Apple Incompatibility</h3>
+
+<p>In this section, we list characteristics of Apple programs that block or
+hinder users from switching to any alternative program&mdash;and, in
+particular, from switching to free software which can liberate the device
+the software runs on.</p>
+<!-- INSERT incompatibility.list -->
+
 <h3 id="insecurity">Apple Insecurity</h3>
 
 <p>These bugs are/were not intentional, so unlike the rest of the file
@@ -81,31 +95,6 @@
 interference.</p>
 <!-- INSERT interference.list -->
 
-<h3 id="pressuring">Apple Pressuring</h3>
-
-<p>Proprietary companies can take advantage of their customers by imposing 
arbitrary limits to their use of the software.  This section reports examples 
of hard sell and other unjust commercial tactics by Apple.</p>
-<!-- INSERT pressuring.list -->
-
-<h3 id="sabotage">Apple Sabotage</h3>
-
-<p>These are situations in which Apple employs its power over users
-to directly intervene in ways that harm them or block their work.</p>
-<!-- INSERT sabotage.list -->
-
-<h3 id="surveillance">Apple Surveillance</h3>
-<!-- INSERT surveillance.list -->
-
-<h3 id="incompatibility">Apple Incompatibility</h3>
-
-<p>In this section, we list characteristics of Apple programs that block or
-hinder users from switching to any alternative program&mdash;and, in
-particular, from switching to free software which can liberate the device
-the software runs on.</p>
-<!-- INSERT incompatibility.list -->
-
-<h3 id="drm">Apple DRM</h3>
-<!-- INSERT appleDRM.list -->
-
 <h3 id="jails">Apple Jails</h3>
 
 <p><a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046";>
@@ -129,12 +118,23 @@
 <h4>Examples of censorship by Apple jails</h4>
 <!-- INSERT jails.list -->
 
+<h3 id="pressuring">Apple Pressuring</h3>
+
+<p>Proprietary companies can take advantage of their customers by imposing 
arbitrary limits to their use of the software.  This section reports examples 
of hard sell and other unjust commercial tactics by Apple.</p>
+<!-- INSERT pressuring.list -->
+
+<h3 id="sabotage">Apple Sabotage</h3>
+
+<p>These are situations in which Apple employs its power over users
+to directly intervene in ways that harm them or block their work.</p>
+<!-- INSERT sabotage.list -->
+
+<h3 id="surveillance">Apple Surveillance</h3>
+<!-- INSERT surveillance.list -->
+
 <h3 id="tyrants">Apple Tyrants</h3>
 <!-- INSERT tyrants.list -->
 
-<h3 id="deception">Apple Deception</h3>
-<!-- INSERT deception.list -->
-
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -192,7 +192,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/14 21:12:47 $
+$Date: 2018/09/16 19:29:13 $
 <!-- timestamp end -->
 </p>
 </div>

Index: google-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/google-stub.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- google-stub.html    14 Sep 2018 21:12:47 -0000      1.1
+++ google-stub.html    16 Sep 2018 19:29:13 -0000      1.2
@@ -36,24 +36,23 @@
 </div>
 
 <div class="summary" style="margin-top: 2em">
-    <h3><strong>Type&nbsp;of malware</strong></h3>
-    <ul>
+<h3><strong>Type&nbsp;of malware</strong></h3>
+<ul>
       <li><a href="#back-doors">Back doors</a></li>
       <li><a href="#censorship">Censorship</a></li>
-      <li><a href="#insecurity">Insecurity</a></li>
-      <!--<li><a href="#pressuring">Pressuring</a></li>-->
-      <li><a href="#sabotage">Sabotage</a></li>
-      <li><a href="#surveillance">Surveillance</a></li>
+<!--<li><a href="#deception">Deception</a></li>-->
       <li><a href="#drm">Digital restrictions
-         management</a> or &ldquo;DRM&rdquo; means functionalities designed
+    management</a> or &ldquo;DRM&rdquo;&mdash;functionalities designed
        to restrict what users can do with the data in their computers.</li>
-      <!--<li><a href="#jails">Jails</a>&mdash;systems
+  <li><a href="#insecurity">Insecurity</a></li>
+<!--<li><a href="#jails">Jails</a>&mdash;systems
          that impose censorship on application programs.</li>-->
+  <li><a href="#sabotage">Sabotage</a></li>
+  <li><a href="#surveillance">Surveillance</a></li>
       <li><a href="#tyrants">Tyrants</a>&mdash;systems
        that reject any operating system not &ldquo;authorized&rdquo; by the
        manufacturer.</li>
-      <!--<li><a href="#deception">Deception</a></li>-->
-    </ul>
+</ul>
 </div>
 
 <h3 id="back-doors">Google Back Doors</h3>
@@ -144,7 +143,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/14 21:12:47 $
+$Date: 2018/09/16 19:29:13 $
 <!-- timestamp end -->
 </p>
 </div>

Index: microsoft-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/microsoft-stub.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- microsoft-stub.html 14 Sep 2018 21:12:47 -0000      1.1
+++ microsoft-stub.html 16 Sep 2018 19:29:13 -0000      1.2
@@ -39,27 +39,30 @@
 <div class="summary" style="margin-top: 2em">
 <h3>Type&nbsp;of malware</h3>
 <ul>
-<li><a href="#back-doors">Back doors</a></li>
+  <li><a href="#back-doors">Back doors</a></li>
 <!--<li><a href="#censorship">Censorship</a></li>-->
-<li><a href="#insecurity">Insecurity</a></li>
-<li><a href="#sabotage">Sabotage</a></li>
-<li><a href="#interference">Interference</a></li>
-<li><a href="#surveillance">Surveillance</a></li>
-<li><a href="#drm">Digital restrictions
-    management</a> or &ldquo;DRM&rdquo; means functionalities designed
+  <li><a href="#drm">Digital restrictions
+    management</a> or &ldquo;DRM&rdquo;&mdash;functionalities designed
     to restrict what users can do with the data in their computers.</li>
-<li><a href="#jails">Jails</a>&mdash;systems
+  <li><a href="#insecurity">Insecurity</a></li>
+  <li><a href="#interference">Interference</a></li>
+  <li><a href="#jails">Jails</a>&mdash;systems
     that impose censorship on application programs.</li>
-<li><a href="#tyrants">Tyrants</a>&mdash;systems
+  <li><a href="#sabotage">Sabotage</a></li>
+  <li><a href="#subscriptions">Subscriptions</a></li>
+  <li><a href="#surveillance">Surveillance</a></li>
+  <li><a href="#tyrants">Tyrants</a>&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.</li>
-<li><a href="#subscriptions">Subscriptions</a></li>
 </ul>
 </div>
 
 <h3 id="back-doors">Microsoft Back Doors</h3>
 <!-- INSERT back-doors.list -->
 
+<h3 id="drm">Microsoft DRM</h3>
+<!-- INSERT drm.list -->
+
 <h3 id="insecurity">Microsoft Insecurity</h3>
 
 <p>These bugs are/were not intentional, so unlike the rest of the file
@@ -68,6 +71,16 @@
   bugs.</p>
 <!-- INSERT insecurity.list -->
 
+<h3 id="interference">Microsoft Interference</h3>
+
+<p>Various proprietary programs often mess up the user's system. They are like 
sabotage, but they are not grave enough to qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
+interference.</p>
+<!-- INSERT interference.list -->
+
+<h3 id="jails">Microsoft Jails</h3>
+<!-- INSERT jails.list -->
+
 <h3 id="sabotage">Microsoft Sabotage</h3>
 
 <p>The wrongs in this section are not precisely malware, since they do
@@ -76,28 +89,15 @@
 actions that harm to the users of specific Microsoft software.</p>
 <!-- INSERT sabotage.list -->
 
-<h3 id="interference">Microsoft Interference</h3>
-
-<p>Various proprietary programs often mess up the user's system. They are like 
sabotage, but they are not grave enough to qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
-interference.</p>
-<!-- INSERT interference.list -->
+<h3 id="subscriptions">Microsoft Subscriptions</h3>
+<!-- INSERT subscriptions.list -->
 
 <h3 id="surveillance">Microsoft Surveillance</h3>
 <!-- INSERT surveillance.list -->
 
-<h3 id="drm">Microsoft DRM</h3>
-<!-- INSERT drm.list -->
-
-<h3 id="jails">Microsoft Jails</h3>
-<!-- INSERT jails.list -->
-
 <h3 id="tyrants">Microsoft Tyrants</h3>
 <!-- INSERT tyrants.list -->
 
-<h3 id="subscriptions">Microsoft Subscriptions</h3>
-<!-- INSERT subscriptions.list -->
-
 <p>As this page shows, if you do want to clean your computer of malware,
 the first software to delete is Windows.</p>
 
@@ -158,7 +158,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/14 21:12:47 $
+$Date: 2018/09/16 19:29:13 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]