[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/server/staging/proprietary proprietary.html...
From: |
Therese Godefroy |
Subject: |
www/server/staging/proprietary proprietary.html... |
Date: |
Wed, 3 Oct 2018 02:42:47 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/10/03 02:42:47
Modified files:
server/staging/proprietary: proprietary.html
server/staging/proprietary/rec: proprietary-stub.html
Log message:
Use RMS' definition of 'back door'.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/proprietary-stub.html?cvsroot=www&r1=1.8&r2=1.9
Patches:
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/proprietary.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary.html 2 Oct 2018 21:50:21 -0000 1.6
+++ proprietary.html 3 Oct 2018 06:42:47 -0000 1.7
@@ -9,8 +9,6 @@
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary.translist" -->
<style type="text/css" media="print,screen">
-div.companies { float: right; margin-bottom: .5em; }
-div.malfunctions { max-width: 27em; }
<!--
.button { float: left; margin: .5em; }
.button a { display: inline-block; }
@@ -20,7 +18,6 @@
div.toc ol li { margin: .5em 1em 0; }
div.toc h3 {
font-size: 1.2em;
-
padding: .8em .83em 0;
margin: 0 1.5% 1em;
}
@@ -129,10 +126,9 @@
interference. We don't list each example of malware in all the categories it
belongs to.</li>
-<li><em>Back door:</em> any piece of software that (provides a way of |
is used for)
-reading or modifying files in the computer it is running on without the user's
-knowledge and explicit consent, whether this piece of software is documented
-or not.</li>
+<li id="backdoor"><em>Back door:</em> any piece of software that is
+running on your computer and listens for commands from someone else, who can
+tell it to do things without asking your approval.</li>
<li><em>Digital restrictions management, or “DRM”:</em>
functionalities designed to restrict what users can do with the data in their
@@ -267,7 +263,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/02 21:50:21 $
+$Date: 2018/10/03 06:42:47 $
<!-- timestamp end -->
</p>
</div>
Index: rec/proprietary-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/proprietary-stub.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- rec/proprietary-stub.html 2 Oct 2018 21:50:22 -0000 1.8
+++ rec/proprietary-stub.html 3 Oct 2018 06:42:47 -0000 1.9
@@ -126,10 +126,9 @@
interference. We don't list each example of malware in all the categories it
belongs to.</li>
-<li><em>Back door:</em> any piece of software that (provides a way of |
is used for)
-reading or modifying files in the computer it is running on, without the user's
-knowledge and explicit consent, whether this piece of software is documented
-or not.</li>
+<li id="backdoor"><em>Back door:</em> any piece of software that is
+running on your computer and listens for commands from someone else, who can
+tell it to do things without asking your approval.</li>
<li><em>Digital restrictions management, or “DRM”:</em>
functionalities designed to restrict what users can do with the data in their
@@ -214,7 +213,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/02 21:50:22 $
+$Date: 2018/10/03 06:42:47 $
<!-- timestamp end -->
</p>
</div>