[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-appliances.html malware...
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-appliances.html malware... |
Date: |
Sun, 17 Mar 2019 06:12:26 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 19/03/17 06:12:26
Modified files:
proprietary : malware-appliances.html malware-google.html
malware-microsoft.html malware-mobiles.html
proprietary-back-doors.html
proprietary-interference.html
proprietary-jails.html
proprietary-sabotage.html
proprietary-subscriptions.html
proprietary-surveillance.html
proprietary/workshop: mal.rec
Log message:
Fix fast-forwards reported by linc.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.59&r2=1.60
Patches:
Index: malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- malware-appliances.html 4 Mar 2019 08:28:43 -0000 1.73
+++ malware-appliances.html 17 Mar 2019 10:12:25 -0000 1.74
@@ -525,7 +525,7 @@
<li id="M201512074">
<p><a
-
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
Some D-Link routers</a> have a back door for changing settings in a
dlink of an eye.</p>
@@ -885,7 +885,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/04 08:28:43 $
+$Date: 2019/03/17 10:12:25 $
<!-- timestamp end -->
</p>
</div>
Index: malware-google.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-google.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- malware-google.html 9 Feb 2019 22:50:52 -0000 1.47
+++ malware-google.html 17 Mar 2019 10:12:25 -0000 1.48
@@ -86,7 +86,7 @@
<li id="M201103070">
<p>In Android, <a
-
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
Google has a back door to remotely delete apps</a>. (It was in a
program called GTalkService, which seems since then to have been
merged into Google Play.)</p>
@@ -467,7 +467,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/09 22:50:52 $
+$Date: 2019/03/17 10:12:25 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-microsoft.html 6 Mar 2019 09:06:12 -0000 1.94
+++ malware-microsoft.html 17 Mar 2019 10:12:25 -0000 1.95
@@ -114,7 +114,7 @@
<li id="M201112080.1">
<p>Windows 8 also has a back door for <a
-
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
remotely deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
@@ -216,7 +216,7 @@
<li id="M201608170">
<p> After <a
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the
download of Windows 10</a>
on computers that were running Windows 7 and 8, Microsoft <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
repeatedly switched on a flag that urged users to
“upgrade” to Windows 10</a> when they had turned
it off, in the hope that some day they would fail to say no.
@@ -360,7 +360,7 @@
<ul class="blurbs">
<li id="M201507150">
<p>Microsoft Office forces users <a
-
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
subscribe to Office 365 to be able to create/edit documents</a>.</p>
</li>
</ul>
@@ -505,7 +505,7 @@
<p>Spyware in older versions of Windows: <a
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user</a>. <a
-
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
+
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
Windows 8.1 snoops on local searches</a>. And there's a <a
href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA
key in Windows</a>, whose functions we don't know.</p>
@@ -531,7 +531,7 @@
<li id="M201210080">
<p><a
-
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
+
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html">
Windows 8 on “mobile devices” (now defunct) was a
jail</a>.</p>
</li>
@@ -618,7 +618,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/06 09:06:12 $
+$Date: 2019/03/17 10:12:25 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- malware-mobiles.html 9 Mar 2019 16:43:41 -0000 1.88
+++ malware-mobiles.html 17 Mar 2019 10:12:25 -0000 1.89
@@ -924,7 +924,7 @@
<ul class="blurbs">
<li id="M201210080">
<p><a
-
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
+
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html">
Windows 8 on “mobile devices” (now defunct) was a
jail</a>.</p>
</li>
@@ -998,7 +998,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/09 16:43:41 $
+$Date: 2019/03/17 10:12:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary-back-doors.html 6 Mar 2019 09:06:12 -0000 1.84
+++ proprietary-back-doors.html 17 Mar 2019 10:12:25 -0000 1.85
@@ -125,7 +125,7 @@
<li id="M201512074">
<p><a
-
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
Some D-Link routers</a> have a back door for changing settings in a
dlink of an eye.</p>
@@ -281,7 +281,7 @@
<li id="M201103070">
<p>In Android, <a
-
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
Google has a back door to remotely delete apps</a>. (It was in a
program called GTalkService, which seems since then to have been
merged into Google Play.)</p>
@@ -570,7 +570,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/06 09:06:12 $
+$Date: 2019/03/17 10:12:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-interference.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-interference.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary-interference.html 11 Feb 2019 12:38:00 -0000 1.50
+++ proprietary-interference.html 17 Mar 2019 10:12:25 -0000 1.51
@@ -147,7 +147,7 @@
<li id="M201608170">
<p> After <a
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the
download of Windows 10</a>
on computers that were running Windows 7 and 8, Microsoft <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
repeatedly switched on a flag that urged users to
“upgrade” to Windows 10</a> when they had turned
it off, in the hope that some day they would fail to say no.
@@ -261,7 +261,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/11 12:38:00 $
+$Date: 2019/03/17 10:12:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-jails.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-jails.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-jails.html 5 Jan 2019 11:26:11 -0000 1.37
+++ proprietary-jails.html 17 Mar 2019 10:12:25 -0000 1.38
@@ -195,7 +195,7 @@
<li id="M201210080">
<p><a
-
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
+
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html">
Windows 8 on “mobile devices” (now defunct) was a
jail</a>.</p>
</li>
@@ -266,7 +266,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:26:11 $
+$Date: 2019/03/17 10:12:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary-sabotage.html 20 Feb 2019 11:44:40 -0000 1.79
+++ proprietary-sabotage.html 17 Mar 2019 10:12:25 -0000 1.80
@@ -358,7 +358,7 @@
<li id="M201509220">
<p><a
-
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via
BIOS</a> on Windows installs. Note that the specific
sabotage method Lenovo used did not affect GNU/Linux; also, a
@@ -479,7 +479,7 @@
present it as a factual reference.</p>
<p>In 2014, <a
-
href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html">
+
href="https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html">
Oracle insisted on continuing this practice</a>.</p>
</li>
@@ -566,7 +566,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/20 11:44:40 $
+$Date: 2019/03/17 10:12:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-subscriptions.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-subscriptions.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-subscriptions.html 28 Feb 2019 21:46:58 -0000 1.25
+++ proprietary-subscriptions.html 17 Mar 2019 10:12:26 -0000 1.26
@@ -78,7 +78,7 @@
<li id="M201507150">
<p>Microsoft Office forces users <a
-
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
subscribe to Office 365 to be able to create/edit documents</a>.</p>
</li>
@@ -157,7 +157,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 21:46:58 $
+$Date: 2019/03/17 10:12:26 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- proprietary-surveillance.html 13 Mar 2019 10:49:13 -0000 1.251
+++ proprietary-surveillance.html 17 Mar 2019 10:12:26 -0000 1.252
@@ -336,7 +336,7 @@
<p>Spyware in older versions of Windows: <a
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user</a>. <a
-
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
+
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
Windows 8.1 snoops on local searches</a>. And there's a <a
href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA
key in Windows</a>, whose functions we don't know.</p>
@@ -419,7 +419,7 @@
<ul class="blurbs">
<li id="M201509220">
<p><a
-
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via
BIOS</a> on Windows installs. Note that the specific
sabotage method Lenovo used did not affect GNU/Linux; also, a
@@ -2207,7 +2207,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/13 10:49:13 $
+$Date: 2019/03/17 10:12:26 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- workshop/mal.rec 13 Mar 2019 10:49:14 -0000 1.59
+++ workshop/mal.rec 17 Mar 2019 10:12:26 -0000 1.60
@@ -2561,7 +2561,7 @@
Keywords: windows
Blurb: <p> After <a
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the
download of Windows 10</a>
+ on computers that were running Windows 7 and 8, Microsoft <a
-+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
++
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ repeatedly switched on a flag that urged users to
+ “upgrade” to Windows 10</a> when they had turned
+ it off, in the hope that some day they would fail to say no.
@@ -3204,7 +3204,7 @@
PubDate: 2015-12-07
Keywords: router dlink tplink
Blurb: <p><a
-+
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
++
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
+ Some D-Link routers</a> have a back door for changing settings in a
+ dlink of an eye.</p>
+
@@ -3507,7 +3507,7 @@
PubDate: 2015-09-22
Keywords: lenovo
Blurb: <p><a
-+
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
++
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+ Lenovo stealthily installed crapware and spyware via
+ BIOS</a> on Windows installs. Note that the specific
+ sabotage method Lenovo used did not affect GNU/Linux; also, a
@@ -3662,7 +3662,7 @@
PubDate: 2015-07-15
Keywords: office
Blurb: <p>Microsoft Office forces users <a
-+
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
++
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ subscribe to Office 365 to be able to create/edit documents</a>.</p>
Id: 201507030
@@ -4718,7 +4718,7 @@
Blurb: <p>Spyware in older versions of Windows: <a
+ href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
+ Windows Update snoops on the user</a>. <a
-+
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
++
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
+ Windows 8.1 snoops on local searches</a>. And there's a <a
+ href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA
+ key in Windows</a>, whose functions we don't know.</p>
@@ -4847,7 +4847,7 @@
+ present it as a factual reference.</p>
+
+ <p>In 2014, <a
-+
href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html">
++
href="https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html">
+ Oracle insisted on continuing this practice</a>.</p>
Id: 201212290
@@ -4975,7 +4975,7 @@
PubDate: 2012-10-08
Keywords: windows
Blurb: <p><a
-+
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
++
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html">
+ Windows 8 on “mobile devices” (now defunct) was a
+ jail</a>.</p>
@@ -5045,7 +5045,7 @@
PubDate: 2011-12-08
Keywords: back-doors install-delete windows
Blurb: <p>Windows 8 also has a back door for <a
-+
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
++
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ remotely deleting apps</a>.</p>
+
+ <p>You might well decide to let a security service that you trust
@@ -5127,7 +5127,7 @@
PubDate: 2010-06-25
Keywords: system android
Blurb: <p>In Android, <a
-+
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
++
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
+ Google has a back door to remotely delete apps</a>. (It was in a
+ program called GTalkService, which seems since then to have been
+ merged into Google Play.)</p>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-appliances.html malware...,
Therese Godefroy <=