www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary rec/proprietary-...


From: Therese Godefroy
Subject: www/server/staging/proprietary rec/proprietary-...
Date: Fri, 5 Oct 2018 14:08:38 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/10/05 14:08:38

Modified files:
        server/staging/proprietary/rec: proprietary-stub.html 
        server/staging/proprietary: proprietary.html 

Log message:
        Reformat the TOC as a table.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/proprietary-stub.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary.html?cvsroot=www&r1=1.10&r2=1.11

Patches:

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/proprietary.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary.html    3 Oct 2018 10:33:13 -0000       1.10
+++ proprietary.html    5 Oct 2018 18:08:38 -0000       1.11
@@ -12,33 +12,23 @@
 <!--
 .button { float: left; margin: .5em; }
 .button a { display: inline-block; }
-#TOC {
-   max-width: 94%;
-   padding: .5em 3% 2em;
+table#TOC {
+   display: block;
+   max-width: 100%;
+   overflow: auto;
    margin: 2.5em auto;
    background: #f5f5f5;
 }
-#TOC ul, #TOC ol { margin: 0; }
-#TOC ol li { margin: .5em 2em 0; }
-#TOC ul li { list-style: none; margin: .5em 0 0; }
-#TOC h3 { font-size: 1.2em; }
-#TOC h3 span { font-weight: normal; font-size: .83em; }
-#TOC .list { padding: 0 1em; }
-#TOC .left, #TOC .left .list { float: left; }
-#TOC .right, #TOC .right .list { float: right; text-align: right; }
-#TOC hr { margin: 2em 1em 1.5em; }
+#TOC th { font-size: 1.1em; }
+#TOC th, #TOC td { padding: .7em; text-align: center; }
+#TOC ul { padding-bottom: .5em; }
+#TOC ul li { margin: .5em 0; list-style: none; }
+#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 -->
 </style>
 <style type="text/css" media="print,screen">
 #TOC { width: 40em; }
-#TOC .left { width: 54.3%; }
-#TOC .right { width: 45.7%; }
address@hidden (max-width: 20em) {
-   #TOC .right, #TOC .right .list {
-     clear: left; float: left;
-     text-align: left;
-   }
-}
 </style>
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Software Is Often Malware</h2>
@@ -74,86 +64,73 @@
 instances of malicious functionalities (with close to 400 references to
 back them up), but there are surely thousands more we don't know about.</p>
 
-<div id="TOC">
-<div class="left">
-<div class="list">
-<h3>Injustices</h3>
-<ul>
+<table id="TOC">
+ <tr>
+  <th>Injustices or techniques</td>
+  <th>Products or companies</td>
+ </tr>
+ <tr>
+  <td>
+   <ul>
  <li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li>
- <li><a href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+    <li><a href="/proprietary/proprietary-coverups.html">Coverup</a></li>
  <li><a href="/proprietary/proprietary-deception.html">Deception</a></li>
  <li><a 
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
  <li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
  <li><a href="/proprietary/proprietary-interference.html">Interference</a></li>
  <li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
  <li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
-</ul>
-</div>
-<div class="list">
-<h3>Techniques&nbsp;<span>(<a href="#f1">1</a>)</span></h3>
-<ul>
- <li><a href="/proprietary/proprietary-back-doors.html">Back 
doors</a>&nbsp;(<a href="#f2">2</a>)</li>
- <li><a href="/proprietary/proprietary-drm.html">DRM</a>&nbsp;(<a 
href="#f3">3</a>)</li>
- <li><a href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(<a 
href="#f4">4</a>)</li>
+   </ul>
+   <ul>
+    <li><a href="/proprietary/proprietary-back-doors.html">Back 
doors</a>&nbsp;(<a href="#f1">1</a>)</li>
+    <li><a href="/proprietary/proprietary-drm.html">DRM</a>&nbsp;(<a 
href="#f2">2</a>)</li>
+    <li><a href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(<a 
href="#f3">3</a>)</li>
  <li><a 
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
- <li><a href="/proprietary/proprietary-tethers.html">Tethers</a>&nbsp;(<a 
href="#f5">5</a>)</li>
- <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>&nbsp;(<a 
href="#f6">6</a>)</li>
+    <li><a href="/proprietary/proprietary-tethers.html">Tethers</a>&nbsp;(<a 
href="#f4">4</a>)</li>
+    <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>&nbsp;(<a 
href="#f5">5</a>)</li>
  <li><a href="/proprietary/potential-malware.html">In the pipe</a></li>
-</ul>
-</div>
-</div>
-<div class="right">
-<div class="list">
-<h3>Companies</h3>
-<ul>
- <li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
- <li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a href="/proprietary/malware-google.html">Google</a></li>
- <li><a href="/proprietary/malware-microsoft.html">Microsoft</a></li>
-</ul>
-</div> 
-<div class="list">
-<h3>Products</h3>
-<ul>
+   </ul>
+  </td>
+  <td>
+   <ul>
  <li><a href="/proprietary/malware-appliances.html">Appliances</a></li>
  <li><a href="/proprietary/malware-cars.html">Cars</a></li>
  <li><a href="/proprietary/malware-games.html">Games</a></li>
  <li><a href="/proprietary/malware-mobiles.html">Mobiles</a></li>
  <li><a href="/proprietary/malware-webpages.html">Webpages</a></li>
-</ul>
-</div>
-</div>
-<div style="clear:both"></div>
-<hr />
-<ol>
-<li id="f1">These are only a few of the techniques that are used to turn 
proprietary
-software into malware. Each technique is tightly associatd with one or more
-injustices. Back doors mean insecurity (and surveillance, most often),
-tethers imply surveillance and insecurity, jails and tyrants are instruments
-of censorship, DRM does censorship and/or sabotage, and subscriptions imply
-interference. We don't list each example of malware in all the categories it
-belongs&nbsp;to.</li>
-
-<a id="backdoor"></a>
-<li id="f2"><a id="backdoor"></a><em>Back door:</em>&nbsp; any piece of 
software that is
-running on your computer, and listens for commands from someone else who can
-tell it to do things without asking your approval.</li>
-
-<li id="f3"><em>Digital restrictions management, or 
&ldquo;DRM&rdquo;:</em>&nbsp;
-functionalities designed to restrict what users can do with the data in their
-computers.</li>
-
-<li id="f4"><em>Jails:</em>&nbsp; systems that impose censorship on application
-programs.</li>
-
-<li id="f5"><em>Tethers:</em>&nbsp; functionalities that require permanent (or 
very
-frequent) connection to a server.</li>
-
-<li id="f6"><em>Tyrants:</em>&nbsp; systems that reject any operating system 
not
-&ldquo;authorized&rdquo; by the manufacturer.</li>
-</ol>
-</div>
+   </ul>
+   <ul>
+    <li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
+    <li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
+    <li><a href="/proprietary/malware-apple.html">Apple</a></li>
+    <li><a href="/proprietary/malware-google.html">Google</a></li>
+    <li><a href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+   </ul>
+  </td>
+ </tr>
+ <tr>
+  <td colspan="2">
+   <ol>
+    <li id="f1"><em>Back door:</em>&nbsp; any piece of software that is
+     running on your computer, and listens for commands from someone
+     else who can tell it to do things without asking your approval.</li>
+
+    <li id="f2"><em>Digital restrictions management, or
+     &ldquo;DRM&rdquo;:</em>&nbsp; functionalities designed to restrict
+     what users can do with the data in their computers.</li>
+
+    <li id="f3"><em>Jail:</em>&nbsp; system that imposes censorship on
+     application programs.</li>
+
+    <li id="f4"><em>Tether:</em>&nbsp; functionality that requires
+     permanent (or very frequent) connection to a server.</li>
+
+    <li id="f5"><em>Tyrant:</em>&nbsp; system that rejects any operating
+     system not &ldquo;authorized&rdquo; by the manufacturer.</li>
+   </ol>
+  </td>
+ </tr>
+</table>
 
 <p>Users of proprietary software are defenseless against these forms
 of mistreatment.  The way to avoid them is by insisting on
@@ -273,7 +250,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/03 10:33:13 $
+$Date: 2018/10/05 18:08:38 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]