[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/server/staging/proprietary proprietary.html...
From: |
Therese Godefroy |
Subject: |
www/server/staging/proprietary proprietary.html... |
Date: |
Wed, 3 Oct 2018 05:08:10 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/10/03 05:08:10
Modified files:
server/staging/proprietary: proprietary.html
server/staging/proprietary/rec: proprietary-stub.html
Log message:
Restyle the TOC.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/proprietary-stub.html?cvsroot=www&r1=1.9&r2=1.10
Patches:
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/proprietary.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary.html 3 Oct 2018 06:42:47 -0000 1.7
+++ proprietary.html 3 Oct 2018 09:08:10 -0000 1.8
@@ -12,24 +12,31 @@
<!--
.button { float: left; margin: .5em; }
.button a { display: inline-block; }
-
-div.toc ol { margin-bottom: 0; }
-div.toc ul li { list-style: none; margin-right: 1em; }
-div.toc ol li { margin: .5em 1em 0; }
-div.toc h3 {
- font-size: 1.2em;
- padding: .8em .83em 0;
- margin: 0 1.5% 1em;
+#TOC {
+ max-width: 100%;
+ padding: .5em 3% 2em;
+ margin: 2.5em auto;
+ background: #f5f5f5;
}
-.toc h3 span { font-weight: normal; }
-.list { padding-bottom: .5em; }
-.toc .left, .toc .left .list { float: left; }
-.toc .right, .toc .right .list { float: right; }
-div.toc .right h3,
- div.toc .right ul {text-align: right; }
+#TOC ul, #TOC ol { margin: 0; }
+#TOC ol li { margin: .5em 2em 0; }
+#TOC ul li { list-style: none; margin: .5em 0 0; }
+#TOC h3 { font-size: 1.2em; }
+#TOC h3 span { font-weight: normal; font-size: .83em; }
+#TOC .list { padding: 0 1em; }
+#TOC .left, #TOC .left .list { float: left; }
+#TOC .right, #TOC .right .list { float: right; text-align: right; }
+#TOC hr { margin: 2em 1em 1.5em; }
-->
-.toc .left { width: 55%; }
-.toc .right { width: 45%; }
+#TOC { width: 40em; }
+#TOC .left { width: 54.3%; }
+#TOC .right { width: 45.7%; }
address@hidden (max-width: 20em) {
+ #TOC .right, #TOC .right .list {
+ clear: left; float: left;
+ text-align: left;
+ }
+}
</style>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -65,7 +72,7 @@
instances of malicious functionalities (with close to 400 references to
back them up), but there are surely thousands more we don't know about.</p>
-<div class="toc" id="TOC">
+<div id="TOC">
<div class="left">
<div class="list">
<h3>Injustices</h3>
@@ -81,15 +88,15 @@
</ul>
</div>
<div class="list">
-<h3>Techniques <span>(1)</span></h3>
+<h3>Techniques <span>(<a href="#f1">1</a>)</span></h3>
<ul>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (2)</li>
- <li><a href="/proprietary/proprietary-drm.html">DRM</a> (3)</li>
- <li><a href="/proprietary/proprietary-jails.html">Jails</a> (4)</li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f2">2</a>)</li>
+ <li><a href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f3">3</a>)</li>
+ <li><a href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
- <li><a href="/proprietary/proprietary-tethers.html">Tethers</a> (5)</li>
- <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a> (6)</li>
- <li><a href="/proprietary/potential-malware.html">New developments</a></li>
+ <li><a href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f5">5</a>)</li>
+ <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f6">6</a>)</li>
+ <li><a href="/proprietary/potential-malware.html">In the pipe</a></li>
</ul>
</div>
</div>
@@ -118,7 +125,7 @@
<div style="clear:both"></div>
<hr />
<ol>
-<li>These are only a few of the techniques that are used to turn proprietary
+<li id="f1">These are only a few of the techniques that are used to turn
proprietary
software into malware. Each technique is tightly associatd with one or more
injustices. Back doors mean insecurity (and surveillance, most often),
tethers imply surveillance and insecurity, jails and tyrants are instruments
@@ -126,21 +133,22 @@
interference. We don't list each example of malware in all the categories it
belongs to.</li>
-<li id="backdoor"><em>Back door:</em> any piece of software that is
-running on your computer and listens for commands from someone else, who can
+<a id="backdoor"></a>
+<li id="f2"><em>Back door:</em> any piece of software that is
+running on your computer, and listens for commands from someone else who can
tell it to do things without asking your approval.</li>
-<li><em>Digital restrictions management, or “DRM”:</em>
+<li id="f3"><em>Digital restrictions management, or
“DRM”:</em>
functionalities designed to restrict what users can do with the data in their
computers.</li>
-<li><em>Jails:</em> systems that impose censorship on application
+<li id="f4"><em>Jails:</em> systems that impose censorship on application
programs.</li>
-<li><em>Tethers:</em> functionalities that require permanent (or very
+<li id="f5"><em>Tethers:</em> functionalities that require permanent (or
very
frequent) connection to a server.</li>
-<li><em>Tyrants:</em> systems that reject any operating system not
+<li id="f6"><em>Tyrants:</em> systems that reject any operating system
not
“authorized” by the manufacturer.</li>
</ol>
</div>
@@ -263,7 +271,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/03 06:42:47 $
+$Date: 2018/10/03 09:08:10 $
<!-- timestamp end -->
</p>
</div>
Index: rec/proprietary-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/proprietary-stub.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- rec/proprietary-stub.html 3 Oct 2018 06:42:47 -0000 1.9
+++ rec/proprietary-stub.html 3 Oct 2018 09:08:10 -0000 1.10
@@ -12,24 +12,31 @@
<!--
.button { float: left; margin: .5em; }
.button a { display: inline-block; }
-
-div.toc ol { margin-bottom: 0; }
-div.toc ul li { list-style: none; margin-right: 1em; }
-div.toc ol li { margin: .5em 1em 0; }
-div.toc h3 {
- font-size: 1.2em;
- padding: .8em .83em 0;
- margin: 0 1.5% 1em;
+#TOC {
+ max-width: 100%;
+ padding: .5em 3% 2em;
+ margin: 2.5em auto;
+ background: #f5f5f5;
}
-.toc h3 span { font-weight: normal; }
-.list { padding-bottom: .5em; }
-.toc .left, .toc .left .list { float: left; }
-.toc .right, .toc .right .list { float: right; }
-div.toc .right h3,
- div.toc .right ul {text-align: right; }
+#TOC ul, #TOC ol { margin: 0; }
+#TOC ol li { margin: .5em 2em 0; }
+#TOC ul li { list-style: none; margin: .5em 0 0; }
+#TOC h3 { font-size: 1.2em; }
+#TOC h3 span { font-weight: normal; font-size: .83em; }
+#TOC .list { padding: 0 1em; }
+#TOC .left, #TOC .left .list { float: left; }
+#TOC .right, #TOC .right .list { float: right; text-align: right; }
+#TOC hr { margin: 2em 1em 1.5em; }
-->
-.toc .left { width: 55%; }
-.toc .right { width: 45%; }
+#TOC { width: 40em; }
+#TOC .left { width: 54.3%; }
+#TOC .right { width: 45.7%; }
address@hidden (max-width: 20em) {
+ #TOC .right, #TOC .right .list {
+ clear: left; float: left;
+ text-align: left;
+ }
+}
</style>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -65,7 +72,7 @@
instances of malicious functionalities (with close to 400 references to
back them up), but there are surely thousands more we don't know about.</p>
-<div class="toc" id="TOC">
+<div id="TOC">
<div class="left">
<div class="list">
<h3>Injustices</h3>
@@ -81,15 +88,15 @@
</ul>
</div>
<div class="list">
-<h3>Techniques <span>(1)</span></h3>
+<h3>Techniques <span>(<a href="#f1">1</a>)</span></h3>
<ul>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (2)</li>
- <li><a href="/proprietary/proprietary-drm.html">DRM</a> (3)</li>
- <li><a href="/proprietary/proprietary-jails.html">Jails</a> (4)</li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f2">2</a>)</li>
+ <li><a href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f3">3</a>)</li>
+ <li><a href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
- <li><a href="/proprietary/proprietary-tethers.html">Tethers</a> (5)</li>
- <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a> (6)</li>
- <li><a href="/proprietary/potential-malware.html">New developments</a></li>
+ <li><a href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f5">5</a>)</li>
+ <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f6">6</a>)</li>
+ <li><a href="/proprietary/potential-malware.html">In the pipe</a></li>
</ul>
</div>
</div>
@@ -118,7 +125,7 @@
<div style="clear:both"></div>
<hr />
<ol>
-<li>These are only a few of the techniques that are used to turn proprietary
+<li id="f1">These are only a few of the techniques that are used to turn
proprietary
software into malware. Each technique is tightly associatd with one or more
injustices. Back doors mean insecurity (and surveillance, most often),
tethers imply surveillance and insecurity, jails and tyrants are instruments
@@ -126,21 +133,22 @@
interference. We don't list each example of malware in all the categories it
belongs to.</li>
-<li id="backdoor"><em>Back door:</em> any piece of software that is
-running on your computer and listens for commands from someone else, who can
+<a id="backdoor"></a>
+<li id="f2"><em>Back door:</em> any piece of software that is
+running on your computer, and listens for commands from someone else who can
tell it to do things without asking your approval.</li>
-<li><em>Digital restrictions management, or “DRM”:</em>
+<li id="f3"><em>Digital restrictions management, or
“DRM”:</em>
functionalities designed to restrict what users can do with the data in their
computers.</li>
-<li><em>Jails:</em> systems that impose censorship on application
+<li id="f4"><em>Jails:</em> systems that impose censorship on application
programs.</li>
-<li><em>Tethers:</em> functionalities that require permanent (or very
+<li id="f5"><em>Tethers:</em> functionalities that require permanent (or
very
frequent) connection to a server.</li>
-<li><em>Tyrants:</em> systems that reject any operating system not
+<li id="f6"><em>Tyrants:</em> systems that reject any operating system
not
“authorized” by the manufacturer.</li>
</ol>
</div>
@@ -213,7 +221,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/03 06:42:47 $
+$Date: 2018/10/03 09:08:10 $
<!-- timestamp end -->
</p>
</div>