www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary malware-microsof...


From: Therese Godefroy
Subject: www/server/staging/proprietary malware-microsof...
Date: Wed, 26 Sep 2018 16:08:14 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/09/26 16:08:14

Modified files:
        server/staging/proprietary: malware-microsoft.html 

Log message:
        Another fix.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/malware-microsoft.html?cvsroot=www&r1=1.7&r2=1.8

Patches:
Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/malware-microsoft.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- malware-microsoft.html      26 Sep 2018 20:06:19 -0000      1.7
+++ malware-microsoft.html      26 Sep 2018 20:08:14 -0000      1.8
@@ -279,7 +279,7 @@
     
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
     silently download&hellip; the whole of Windows 10!</a>. Apparently,
     this was done through a <a
-    href="/proprietary/proprietary-back-doors#windows-update">
+    href="#windows-update">
     universal back door</a>. Not only did the unwanted downloads <a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>
     use up much needed resources</a>, but many of the people who let
@@ -597,7 +597,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/26 20:06:19 $
+$Date: 2018/09/26 20:08:14 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]