www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-appliances.html malware...


From: Therese Godefroy
Subject: www/proprietary malware-appliances.html malware...
Date: Sun, 17 Mar 2019 06:12:26 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/03/17 06:12:26

Modified files:
        proprietary    : malware-appliances.html malware-google.html 
                         malware-microsoft.html malware-mobiles.html 
                         proprietary-back-doors.html 
                         proprietary-interference.html 
                         proprietary-jails.html 
                         proprietary-sabotage.html 
                         proprietary-subscriptions.html 
                         proprietary-surveillance.html 
        proprietary/workshop: mal.rec 

Log message:
        Fix fast-forwards reported by linc.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.59&r2=1.60

Patches:
Index: malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- malware-appliances.html     4 Mar 2019 08:28:43 -0000       1.73
+++ malware-appliances.html     17 Mar 2019 10:12:25 -0000      1.74
@@ -525,7 +525,7 @@
 
   <li id="M201512074">
     <p><a
-    
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html";>
+    
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html";>
     Some D-Link routers</a> have a back door for changing settings in a
     dlink of an eye.</p>
 
@@ -885,7 +885,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/03/04 08:28:43 $
+$Date: 2019/03/17 10:12:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-google.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-google.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- malware-google.html 9 Feb 2019 22:50:52 -0000       1.47
+++ malware-google.html 17 Mar 2019 10:12:25 -0000      1.48
@@ -86,7 +86,7 @@
 
   <li id="M201103070">
     <p>In Android, <a
-    
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
+    
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html";>
     Google has a back door to remotely delete apps</a>. (It was in a
     program called GTalkService, which seems since then to have been
     merged into Google Play.)</p>
@@ -467,7 +467,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/09 22:50:52 $
+$Date: 2019/03/17 10:12:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-microsoft.html      6 Mar 2019 09:06:12 -0000       1.94
+++ malware-microsoft.html      17 Mar 2019 10:12:25 -0000      1.95
@@ -114,7 +114,7 @@
 
   <li id="M201112080.1">
     <p>Windows 8 also has a back door for <a
-    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
+    
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html";>
     remotely deleting apps</a>.</p>
 
     <p>You might well decide to let a security service that you trust
@@ -216,7 +216,7 @@
   <li id="M201608170">
     <p> After <a 
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the 
download of Windows 10</a>
     on computers that were running Windows 7 and 8, Microsoft <a
-    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
+    
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
     repeatedly switched on a flag that urged users to
     &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned
     it off, in the hope that some day they would fail to say no.
@@ -360,7 +360,7 @@
 <ul class="blurbs">
   <li id="M201507150">
     <p>Microsoft Office forces users <a
-    
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
+    
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
     subscribe to Office 365 to be able to create/edit documents</a>.</p>
   </li>
 </ul>
@@ -505,7 +505,7 @@
     <p>Spyware in older versions of Windows: <a
     href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
     Windows Update snoops on the user</a>. <a
-    
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
+    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
     Windows 8.1 snoops on local searches</a>. And there's a <a
     href="http://www.marketoracle.co.uk/Article40836.html";> secret NSA
     key in Windows</a>, whose functions we don't know.</p>
@@ -531,7 +531,7 @@
 
   <li id="M201210080">
     <p><a
-    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
+    
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html";>
     Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
     jail</a>.</p>
   </li>
@@ -618,7 +618,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/03/06 09:06:12 $
+$Date: 2019/03/17 10:12:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- malware-mobiles.html        9 Mar 2019 16:43:41 -0000       1.88
+++ malware-mobiles.html        17 Mar 2019 10:12:25 -0000      1.89
@@ -924,7 +924,7 @@
 <ul class="blurbs">
   <li id="M201210080">
     <p><a
-    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
+    
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html";>
     Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
     jail</a>.</p>
   </li>
@@ -998,7 +998,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/03/09 16:43:41 $
+$Date: 2019/03/17 10:12:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-back-doors.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary-back-doors.html 6 Mar 2019 09:06:12 -0000       1.84
+++ proprietary-back-doors.html 17 Mar 2019 10:12:25 -0000      1.85
@@ -125,7 +125,7 @@
 
   <li id="M201512074">
     <p><a
-    
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html";>
+    
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html";>
     Some D-Link routers</a> have a back door for changing settings in a
     dlink of an eye.</p>
 
@@ -281,7 +281,7 @@
 
   <li id="M201103070">
     <p>In Android, <a
-    
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
+    
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html";>
     Google has a back door to remotely delete apps</a>. (It was in a
     program called GTalkService, which seems since then to have been
     merged into Google Play.)</p>
@@ -570,7 +570,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/03/06 09:06:12 $
+$Date: 2019/03/17 10:12:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-interference.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-interference.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary-interference.html       11 Feb 2019 12:38:00 -0000      1.50
+++ proprietary-interference.html       17 Mar 2019 10:12:25 -0000      1.51
@@ -147,7 +147,7 @@
   <li id="M201608170">
     <p> After <a 
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the 
download of Windows 10</a>
     on computers that were running Windows 7 and 8, Microsoft <a
-    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
+    
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
     repeatedly switched on a flag that urged users to
     &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned
     it off, in the hope that some day they would fail to say no.
@@ -261,7 +261,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/11 12:38:00 $
+$Date: 2019/03/17 10:12:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-jails.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-jails.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-jails.html      5 Jan 2019 11:26:11 -0000       1.37
+++ proprietary-jails.html      17 Mar 2019 10:12:25 -0000      1.38
@@ -195,7 +195,7 @@
 
   <li id="M201210080">
     <p><a
-    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
+    
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html";>
     Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
     jail</a>.</p>
   </li>
@@ -266,7 +266,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/05 11:26:11 $
+$Date: 2019/03/17 10:12:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary-sabotage.html   20 Feb 2019 11:44:40 -0000      1.79
+++ proprietary-sabotage.html   17 Mar 2019 10:12:25 -0000      1.80
@@ -358,7 +358,7 @@
 
   <li id="M201509220">
     <p><a
-    
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
+    
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
     Lenovo stealthily installed crapware and spyware via
     BIOS</a> on Windows installs.  Note that the specific
     sabotage method Lenovo used did not affect GNU/Linux; also, a
@@ -479,7 +479,7 @@
     present it as a factual reference.</p>
 
     <p>In 2014, <a
-    
href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html";>
+    
href="https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html";>
     Oracle insisted on continuing this practice</a>.</p>
   </li>
 
@@ -566,7 +566,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/20 11:44:40 $
+$Date: 2019/03/17 10:12:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-subscriptions.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-subscriptions.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-subscriptions.html      28 Feb 2019 21:46:58 -0000      1.25
+++ proprietary-subscriptions.html      17 Mar 2019 10:12:26 -0000      1.26
@@ -78,7 +78,7 @@
 
   <li id="M201507150">
     <p>Microsoft Office forces users <a
-    
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
+    
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
     subscribe to Office 365 to be able to create/edit documents</a>.</p>
   </li>
 
@@ -157,7 +157,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/28 21:46:58 $
+$Date: 2019/03/17 10:12:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- proprietary-surveillance.html       13 Mar 2019 10:49:13 -0000      1.251
+++ proprietary-surveillance.html       17 Mar 2019 10:12:26 -0000      1.252
@@ -336,7 +336,7 @@
     <p>Spyware in older versions of Windows: <a
     href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
     Windows Update snoops on the user</a>. <a
-    
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
+    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
     Windows 8.1 snoops on local searches</a>. And there's a <a
     href="http://www.marketoracle.co.uk/Article40836.html";> secret NSA
     key in Windows</a>, whose functions we don't know.</p>
@@ -419,7 +419,7 @@
 <ul class="blurbs">
   <li id="M201509220">
     <p><a
-    
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
+    
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
     Lenovo stealthily installed crapware and spyware via
     BIOS</a> on Windows installs.  Note that the specific
     sabotage method Lenovo used did not affect GNU/Linux; also, a
@@ -2207,7 +2207,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/03/13 10:49:13 $
+$Date: 2019/03/17 10:12:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- workshop/mal.rec    13 Mar 2019 10:49:14 -0000      1.59
+++ workshop/mal.rec    17 Mar 2019 10:12:26 -0000      1.60
@@ -2561,7 +2561,7 @@
 Keywords: windows
 Blurb: <p> After <a 
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the 
download of Windows 10</a>
 +   on computers that were running Windows 7 and 8, Microsoft <a
-+   
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
++   
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
 +   repeatedly switched on a flag that urged users to
 +   &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned
 +   it off, in the hope that some day they would fail to say no.
@@ -3204,7 +3204,7 @@
 PubDate: 2015-12-07
 Keywords: router dlink tplink
 Blurb: <p><a
-+   
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html";>
++   
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html";>
 +   Some D-Link routers</a> have a back door for changing settings in a
 +   dlink of an eye.</p>
 + 
@@ -3507,7 +3507,7 @@
 PubDate: 2015-09-22
 Keywords: lenovo
 Blurb: <p><a
-+   
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
++   
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
 +   Lenovo stealthily installed crapware and spyware via
 +   BIOS</a> on Windows installs.  Note that the specific
 +   sabotage method Lenovo used did not affect GNU/Linux; also, a
@@ -3662,7 +3662,7 @@
 PubDate: 2015-07-15
 Keywords: office
 Blurb: <p>Microsoft Office forces users <a
-+   
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
++   
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
 +   subscribe to Office 365 to be able to create/edit documents</a>.</p>
 
 Id: 201507030
@@ -4718,7 +4718,7 @@
 Blurb: <p>Spyware in older versions of Windows: <a
 +   href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
 +   Windows Update snoops on the user</a>. <a
-+   
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
++   
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
 +   Windows 8.1 snoops on local searches</a>. And there's a <a
 +   href="http://www.marketoracle.co.uk/Article40836.html";> secret NSA
 +   key in Windows</a>, whose functions we don't know.</p>
@@ -4847,7 +4847,7 @@
 +   present it as a factual reference.</p>
 + 
 +   <p>In 2014, <a
-+   
href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html";>
++   
href="https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html";>
 +   Oracle insisted on continuing this practice</a>.</p>
 
 Id: 201212290
@@ -4975,7 +4975,7 @@
 PubDate: 2012-10-08
 Keywords: windows
 Blurb: <p><a
-+   
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
++   
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html";>
 +   Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
 +   jail</a>.</p>
 
@@ -5045,7 +5045,7 @@
 PubDate: 2011-12-08
 Keywords: back-doors install-delete windows
 Blurb: <p>Windows 8 also has a back door for <a
-+   
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
++   
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html";>
 +   remotely deleting apps</a>.</p>
 + 
 +   <p>You might well decide to let a security service that you trust
@@ -5127,7 +5127,7 @@
 PubDate: 2010-06-25
 Keywords: system android
 Blurb: <p>In Android, <a
-+   
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
++   
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html";>
 +   Google has a back door to remotely delete apps</a>. (It was in a
 +   program called GTalkService, which seems since then to have been
 +   merged into Google Play.)</p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]