www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-sabotage.html malwa...


From: Therese Godefroy
Subject: www/proprietary proprietary-sabotage.html malwa...
Date: Wed, 10 Oct 2018 03:28:25 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/10/10 03:28:25

Modified files:
        proprietary    : proprietary-sabotage.html 
                         malware-microsoft.html 

Log message:
        Reword #windows10-forcing (RT #1116894).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.80&r2=1.81

Patches:
Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary-sabotage.html   9 Oct 2018 12:22:09 -0000       1.62
+++ proprietary-sabotage.html   10 Oct 2018 07:28:25 -0000      1.63
@@ -201,8 +201,9 @@
     href="/proprietary/proprietary-back-doors.html#windows-update">
     universal back door</a>. Not only did the unwanted downloads <a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>
-    use up much needed resources</a>, but many of the people who let
-    installation proceed found out that this &ldquo;upgrade&rdquo; was in fact 
a <a
+    jeopardize important operations in regions of the world with poor
+    connectivity</a>, but many of the people who let installation proceed
+    found out that this &ldquo;upgrade&rdquo; was in fact a <a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
     downgrade</a>.</p>
   </li>
@@ -519,7 +520,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:22:09 $
+$Date: 2018/10/10 07:28:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- malware-microsoft.html      9 Oct 2018 12:22:09 -0000       1.80
+++ malware-microsoft.html      10 Oct 2018 07:28:25 -0000      1.81
@@ -290,8 +290,9 @@
     href="/proprietary/proprietary-back-doors.html#windows-update">
     universal back door</a>. Not only did the unwanted downloads <a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>
-    use up much needed resources</a>, but many of the people who let
-    installation proceed found out that this &ldquo;upgrade&rdquo; was in fact 
a <a
+    jeopardize important operations in regions of the world with poor
+    connectivity</a>, but many of the people who let installation proceed
+    found out that this &ldquo;upgrade&rdquo; was in fact a <a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
     downgrade</a>.</p>
   </li>
@@ -616,7 +617,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:22:09 $
+$Date: 2018/10/10 07:28:25 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]