www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary proprietary.html...


From: Therese Godefroy
Subject: www/server/staging/proprietary proprietary.html...
Date: Wed, 3 Oct 2018 05:08:10 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/10/03 05:08:10

Modified files:
        server/staging/proprietary: proprietary.html 
        server/staging/proprietary/rec: proprietary-stub.html 

Log message:
        Restyle the TOC.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/proprietary-stub.html?cvsroot=www&r1=1.9&r2=1.10

Patches:
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/proprietary.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary.html    3 Oct 2018 06:42:47 -0000       1.7
+++ proprietary.html    3 Oct 2018 09:08:10 -0000       1.8
@@ -12,24 +12,31 @@
 <!--
 .button { float: left; margin: .5em; }
 .button a { display: inline-block; }
-
-div.toc ol { margin-bottom: 0; }
-div.toc ul li { list-style: none; margin-right: 1em; }
-div.toc ol li { margin: .5em 1em 0; }
-div.toc h3 {
-   font-size: 1.2em;
-   padding: .8em .83em 0;
-   margin: 0 1.5% 1em;
+#TOC {
+   max-width: 100%;
+   padding: .5em 3% 2em;
+   margin: 2.5em auto;
+   background: #f5f5f5;
 }
-.toc h3 span { font-weight: normal; }
-.list { padding-bottom: .5em; }
-.toc .left, .toc .left .list { float: left; }
-.toc .right, .toc .right .list { float: right; }
-div.toc .right h3,
- div.toc .right ul {text-align: right; }
+#TOC ul, #TOC ol { margin: 0; }
+#TOC ol li { margin: .5em 2em 0; }
+#TOC ul li { list-style: none; margin: .5em 0 0; }
+#TOC h3 { font-size: 1.2em; }
+#TOC h3 span { font-weight: normal; font-size: .83em; }
+#TOC .list { padding: 0 1em; }
+#TOC .left, #TOC .left .list { float: left; }
+#TOC .right, #TOC .right .list { float: right; text-align: right; }
+#TOC hr { margin: 2em 1em 1.5em; }
 -->
-.toc .left {  width: 55%; }
-.toc .right { width: 45%; }
+#TOC { width: 40em; }
+#TOC .left { width: 54.3%; }
+#TOC .right { width: 45.7%; }
address@hidden (max-width: 20em) {
+   #TOC .right, #TOC .right .list {
+     clear: left; float: left;
+     text-align: left;
+   }
+}
 </style>
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Software Is Often Malware</h2>
@@ -65,7 +72,7 @@
 instances of malicious functionalities (with close to 400 references to
 back them up), but there are surely thousands more we don't know about.</p>
 
-<div class="toc" id="TOC">
+<div id="TOC">
 <div class="left">
 <div class="list">
 <h3>Injustices</h3>
@@ -81,15 +88,15 @@
 </ul>
 </div>
 <div class="list">
-<h3>Techniques&nbsp;<span>(1)</span></h3>
+<h3>Techniques&nbsp;<span>(<a href="#f1">1</a>)</span></h3>
 <ul>
- <li><a href="/proprietary/proprietary-back-doors.html">Back 
doors</a>&nbsp;(2)</li>
- <li><a href="/proprietary/proprietary-drm.html">DRM</a>&nbsp;(3)</li>
- <li><a href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(4)</li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back 
doors</a>&nbsp;(<a href="#f2">2</a>)</li>
+ <li><a href="/proprietary/proprietary-drm.html">DRM</a>&nbsp;(<a 
href="#f3">3</a>)</li>
+ <li><a href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(<a 
href="#f4">4</a>)</li>
  <li><a 
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
- <li><a href="/proprietary/proprietary-tethers.html">Tethers</a>&nbsp;(5)</li>
- <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>&nbsp;(6)</li>
- <li><a href="/proprietary/potential-malware.html">New developments</a></li>
+ <li><a href="/proprietary/proprietary-tethers.html">Tethers</a>&nbsp;(<a 
href="#f5">5</a>)</li>
+ <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>&nbsp;(<a 
href="#f6">6</a>)</li>
+ <li><a href="/proprietary/potential-malware.html">In the pipe</a></li>
 </ul>
 </div>
 </div>
@@ -118,7 +125,7 @@
 <div style="clear:both"></div>
 <hr />
 <ol>
-<li>These are only a few of the techniques that are used to turn proprietary
+<li id="f1">These are only a few of the techniques that are used to turn 
proprietary
 software into malware. Each technique is tightly associatd with one or more
 injustices. Back doors mean insecurity (and surveillance, most often),
 tethers imply surveillance and insecurity, jails and tyrants are instruments
@@ -126,21 +133,22 @@
 interference. We don't list each example of malware in all the categories it
 belongs&nbsp;to.</li>
 
-<li id="backdoor"><em>Back door:</em>&nbsp; any piece of software that is
-running on your computer and listens for commands from someone else, who can
+<a id="backdoor"></a>
+<li id="f2"><em>Back door:</em>&nbsp; any piece of software that is
+running on your computer, and listens for commands from someone else who can
 tell it to do things without asking your approval.</li>
 
-<li><em>Digital restrictions management, or &ldquo;DRM&rdquo;:</em>&nbsp;
+<li id="f3"><em>Digital restrictions management, or 
&ldquo;DRM&rdquo;:</em>&nbsp;
 functionalities designed to restrict what users can do with the data in their
 computers.</li>
 
-<li><em>Jails:</em>&nbsp; systems that impose censorship on application
+<li id="f4"><em>Jails:</em>&nbsp; systems that impose censorship on application
 programs.</li>
 
-<li><em>Tethers:</em>&nbsp; functionalities that require permanent (or very
+<li id="f5"><em>Tethers:</em>&nbsp; functionalities that require permanent (or 
very
 frequent) connection to a server.</li>
 
-<li><em>Tyrants:</em>&nbsp; systems that reject any operating system not
+<li id="f6"><em>Tyrants:</em>&nbsp; systems that reject any operating system 
not
 &ldquo;authorized&rdquo; by the manufacturer.</li>
 </ol>
 </div>
@@ -263,7 +271,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/03 06:42:47 $
+$Date: 2018/10/03 09:08:10 $
 <!-- timestamp end -->
 </p>
 </div>

Index: rec/proprietary-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/proprietary-stub.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- rec/proprietary-stub.html   3 Oct 2018 06:42:47 -0000       1.9
+++ rec/proprietary-stub.html   3 Oct 2018 09:08:10 -0000       1.10
@@ -12,24 +12,31 @@
 <!--
 .button { float: left; margin: .5em; }
 .button a { display: inline-block; }
-
-div.toc ol { margin-bottom: 0; }
-div.toc ul li { list-style: none; margin-right: 1em; }
-div.toc ol li { margin: .5em 1em 0; }
-div.toc h3 {
-   font-size: 1.2em;
-   padding: .8em .83em 0;
-   margin: 0 1.5% 1em;
+#TOC {
+   max-width: 100%;
+   padding: .5em 3% 2em;
+   margin: 2.5em auto;
+   background: #f5f5f5;
 }
-.toc h3 span { font-weight: normal; }
-.list { padding-bottom: .5em; }
-.toc .left, .toc .left .list { float: left; }
-.toc .right, .toc .right .list { float: right; }
-div.toc .right h3,
- div.toc .right ul {text-align: right; }
+#TOC ul, #TOC ol { margin: 0; }
+#TOC ol li { margin: .5em 2em 0; }
+#TOC ul li { list-style: none; margin: .5em 0 0; }
+#TOC h3 { font-size: 1.2em; }
+#TOC h3 span { font-weight: normal; font-size: .83em; }
+#TOC .list { padding: 0 1em; }
+#TOC .left, #TOC .left .list { float: left; }
+#TOC .right, #TOC .right .list { float: right; text-align: right; }
+#TOC hr { margin: 2em 1em 1.5em; }
 -->
-.toc .left {  width: 55%; }
-.toc .right { width: 45%; }
+#TOC { width: 40em; }
+#TOC .left { width: 54.3%; }
+#TOC .right { width: 45.7%; }
address@hidden (max-width: 20em) {
+   #TOC .right, #TOC .right .list {
+     clear: left; float: left;
+     text-align: left;
+   }
+}
 </style>
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Software Is Often Malware</h2>
@@ -65,7 +72,7 @@
 instances of malicious functionalities (with close to 400 references to
 back them up), but there are surely thousands more we don't know about.</p>
 
-<div class="toc" id="TOC">
+<div id="TOC">
 <div class="left">
 <div class="list">
 <h3>Injustices</h3>
@@ -81,15 +88,15 @@
 </ul>
 </div>
 <div class="list">
-<h3>Techniques&nbsp;<span>(1)</span></h3>
+<h3>Techniques&nbsp;<span>(<a href="#f1">1</a>)</span></h3>
 <ul>
- <li><a href="/proprietary/proprietary-back-doors.html">Back 
doors</a>&nbsp;(2)</li>
- <li><a href="/proprietary/proprietary-drm.html">DRM</a>&nbsp;(3)</li>
- <li><a href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(4)</li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back 
doors</a>&nbsp;(<a href="#f2">2</a>)</li>
+ <li><a href="/proprietary/proprietary-drm.html">DRM</a>&nbsp;(<a 
href="#f3">3</a>)</li>
+ <li><a href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(<a 
href="#f4">4</a>)</li>
  <li><a 
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
- <li><a href="/proprietary/proprietary-tethers.html">Tethers</a>&nbsp;(5)</li>
- <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>&nbsp;(6)</li>
- <li><a href="/proprietary/potential-malware.html">New developments</a></li>
+ <li><a href="/proprietary/proprietary-tethers.html">Tethers</a>&nbsp;(<a 
href="#f5">5</a>)</li>
+ <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>&nbsp;(<a 
href="#f6">6</a>)</li>
+ <li><a href="/proprietary/potential-malware.html">In the pipe</a></li>
 </ul>
 </div>
 </div>
@@ -118,7 +125,7 @@
 <div style="clear:both"></div>
 <hr />
 <ol>
-<li>These are only a few of the techniques that are used to turn proprietary
+<li id="f1">These are only a few of the techniques that are used to turn 
proprietary
 software into malware. Each technique is tightly associatd with one or more
 injustices. Back doors mean insecurity (and surveillance, most often),
 tethers imply surveillance and insecurity, jails and tyrants are instruments
@@ -126,21 +133,22 @@
 interference. We don't list each example of malware in all the categories it
 belongs&nbsp;to.</li>
 
-<li id="backdoor"><em>Back door:</em>&nbsp; any piece of software that is
-running on your computer and listens for commands from someone else, who can
+<a id="backdoor"></a>
+<li id="f2"><em>Back door:</em>&nbsp; any piece of software that is
+running on your computer, and listens for commands from someone else who can
 tell it to do things without asking your approval.</li>
 
-<li><em>Digital restrictions management, or &ldquo;DRM&rdquo;:</em>&nbsp;
+<li id="f3"><em>Digital restrictions management, or 
&ldquo;DRM&rdquo;:</em>&nbsp;
 functionalities designed to restrict what users can do with the data in their
 computers.</li>
 
-<li><em>Jails:</em>&nbsp; systems that impose censorship on application
+<li id="f4"><em>Jails:</em>&nbsp; systems that impose censorship on application
 programs.</li>
 
-<li><em>Tethers:</em>&nbsp; functionalities that require permanent (or very
+<li id="f5"><em>Tethers:</em>&nbsp; functionalities that require permanent (or 
very
 frequent) connection to a server.</li>
 
-<li><em>Tyrants:</em>&nbsp; systems that reject any operating system not
+<li id="f6"><em>Tyrants:</em>&nbsp; systems that reject any operating system 
not
 &ldquo;authorized&rdquo; by the manufacturer.</li>
 </ol>
 </div>
@@ -213,7 +221,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/03 06:42:47 $
+$Date: 2018/10/03 09:08:10 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]