[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/server/staging/proprietary rec/proprietary-...
From: |
Therese Godefroy |
Subject: |
www/server/staging/proprietary rec/proprietary-... |
Date: |
Fri, 5 Oct 2018 14:08:38 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/10/05 14:08:38
Modified files:
server/staging/proprietary/rec: proprietary-stub.html
server/staging/proprietary: proprietary.html
Log message:
Reformat the TOC as a table.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/proprietary-stub.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/proprietary.html?cvsroot=www&r1=1.10&r2=1.11
Patches:
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/proprietary.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary.html 3 Oct 2018 10:33:13 -0000 1.10
+++ proprietary.html 5 Oct 2018 18:08:38 -0000 1.11
@@ -12,33 +12,23 @@
<!--
.button { float: left; margin: .5em; }
.button a { display: inline-block; }
-#TOC {
- max-width: 94%;
- padding: .5em 3% 2em;
+table#TOC {
+ display: block;
+ max-width: 100%;
+ overflow: auto;
margin: 2.5em auto;
background: #f5f5f5;
}
-#TOC ul, #TOC ol { margin: 0; }
-#TOC ol li { margin: .5em 2em 0; }
-#TOC ul li { list-style: none; margin: .5em 0 0; }
-#TOC h3 { font-size: 1.2em; }
-#TOC h3 span { font-weight: normal; font-size: .83em; }
-#TOC .list { padding: 0 1em; }
-#TOC .left, #TOC .left .list { float: left; }
-#TOC .right, #TOC .right .list { float: right; text-align: right; }
-#TOC hr { margin: 2em 1em 1.5em; }
+#TOC th { font-size: 1.1em; }
+#TOC th, #TOC td { padding: .7em; text-align: center; }
+#TOC ul { padding-bottom: .5em; }
+#TOC ul li { margin: .5em 0; list-style: none; }
+#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 40em; }
-#TOC .left { width: 54.3%; }
-#TOC .right { width: 45.7%; }
address@hidden (max-width: 20em) {
- #TOC .right, #TOC .right .list {
- clear: left; float: left;
- text-align: left;
- }
-}
</style>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -74,86 +64,73 @@
instances of malicious functionalities (with close to 400 references to
back them up), but there are surely thousands more we don't know about.</p>
-<div id="TOC">
-<div class="left">
-<div class="list">
-<h3>Injustices</h3>
-<ul>
+<table id="TOC">
+ <tr>
+ <th>Injustices or techniques</td>
+ <th>Products or companies</td>
+ </tr>
+ <tr>
+ <td>
+ <ul>
<li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li>
- <li><a href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+ <li><a href="/proprietary/proprietary-coverups.html">Coverup</a></li>
<li><a href="/proprietary/proprietary-deception.html">Deception</a></li>
<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
<li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
<li><a href="/proprietary/proprietary-interference.html">Interference</a></li>
<li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
-</ul>
-</div>
-<div class="list">
-<h3>Techniques <span>(<a href="#f1">1</a>)</span></h3>
-<ul>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f2">2</a>)</li>
- <li><a href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f3">3</a>)</li>
- <li><a href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f4">4</a>)</li>
+ </ul>
+ <ul>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li>
+ <li><a href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
- <li><a href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f5">5</a>)</li>
- <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f6">6</a>)</li>
+ <li><a href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
+ <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
<li><a href="/proprietary/potential-malware.html">In the pipe</a></li>
-</ul>
-</div>
-</div>
-<div class="right">
-<div class="list">
-<h3>Companies</h3>
-<ul>
- <li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
- <li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a href="/proprietary/malware-google.html">Google</a></li>
- <li><a href="/proprietary/malware-microsoft.html">Microsoft</a></li>
-</ul>
-</div>
-<div class="list">
-<h3>Products</h3>
-<ul>
+ </ul>
+ </td>
+ <td>
+ <ul>
<li><a href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a href="/proprietary/malware-cars.html">Cars</a></li>
<li><a href="/proprietary/malware-games.html">Games</a></li>
<li><a href="/proprietary/malware-mobiles.html">Mobiles</a></li>
<li><a href="/proprietary/malware-webpages.html">Webpages</a></li>
-</ul>
-</div>
-</div>
-<div style="clear:both"></div>
-<hr />
-<ol>
-<li id="f1">These are only a few of the techniques that are used to turn
proprietary
-software into malware. Each technique is tightly associatd with one or more
-injustices. Back doors mean insecurity (and surveillance, most often),
-tethers imply surveillance and insecurity, jails and tyrants are instruments
-of censorship, DRM does censorship and/or sabotage, and subscriptions imply
-interference. We don't list each example of malware in all the categories it
-belongs to.</li>
-
-<a id="backdoor"></a>
-<li id="f2"><a id="backdoor"></a><em>Back door:</em> any piece of
software that is
-running on your computer, and listens for commands from someone else who can
-tell it to do things without asking your approval.</li>
-
-<li id="f3"><em>Digital restrictions management, or
“DRM”:</em>
-functionalities designed to restrict what users can do with the data in their
-computers.</li>
-
-<li id="f4"><em>Jails:</em> systems that impose censorship on application
-programs.</li>
-
-<li id="f5"><em>Tethers:</em> functionalities that require permanent (or
very
-frequent) connection to a server.</li>
-
-<li id="f6"><em>Tyrants:</em> systems that reject any operating system
not
-“authorized” by the manufacturer.</li>
-</ol>
-</div>
+ </ul>
+ <ul>
+ <li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a href="/proprietary/malware-google.html">Google</a></li>
+ <li><a href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ </ul>
+ </td>
+ </tr>
+ <tr>
+ <td colspan="2">
+ <ol>
+ <li id="f1"><em>Back door:</em> any piece of software that is
+ running on your computer, and listens for commands from someone
+ else who can tell it to do things without asking your approval.</li>
+
+ <li id="f2"><em>Digital restrictions management, or
+ “DRM”:</em> functionalities designed to restrict
+ what users can do with the data in their computers.</li>
+
+ <li id="f3"><em>Jail:</em> system that imposes censorship on
+ application programs.</li>
+
+ <li id="f4"><em>Tether:</em> functionality that requires
+ permanent (or very frequent) connection to a server.</li>
+
+ <li id="f5"><em>Tyrant:</em> system that rejects any operating
+ system not “authorized” by the manufacturer.</li>
+ </ol>
+ </td>
+ </tr>
+</table>
<p>Users of proprietary software are defenseless against these forms
of mistreatment. The way to avoid them is by insisting on
@@ -273,7 +250,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/03 10:33:13 $
+$Date: 2018/10/05 18:08:38 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/server/staging/proprietary rec/proprietary-...,
Therese Godefroy <=