[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary-sabotage.html malwa...
From: |
Therese Godefroy |
Subject: |
www/proprietary proprietary-sabotage.html malwa... |
Date: |
Wed, 10 Oct 2018 03:28:25 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/10/10 03:28:25
Modified files:
proprietary : proprietary-sabotage.html
malware-microsoft.html
Log message:
Reword #windows10-forcing (RT #1116894).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.80&r2=1.81
Patches:
Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary-sabotage.html 9 Oct 2018 12:22:09 -0000 1.62
+++ proprietary-sabotage.html 10 Oct 2018 07:28:25 -0000 1.63
@@ -201,8 +201,9 @@
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
- use up much needed resources</a>, but many of the people who let
- installation proceed found out that this “upgrade” was in fact
a <a
+ jeopardize important operations in regions of the world with poor
+ connectivity</a>, but many of the people who let installation proceed
+ found out that this “upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
@@ -519,7 +520,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 12:22:09 $
+$Date: 2018/10/10 07:28:25 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- malware-microsoft.html 9 Oct 2018 12:22:09 -0000 1.80
+++ malware-microsoft.html 10 Oct 2018 07:28:25 -0000 1.81
@@ -290,8 +290,9 @@
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
- use up much needed resources</a>, but many of the people who let
- installation proceed found out that this “upgrade” was in fact
a <a
+ jeopardize important operations in regions of the world with poor
+ connectivity</a>, but many of the people who let installation proceed
+ found out that this “upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
@@ -616,7 +617,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 12:22:09 $
+$Date: 2018/10/10 07:28:25 $
<!-- timestamp end -->
</p>
</div>