www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-amazon.html malware-app...


From: Therese Godefroy
Subject: www/proprietary malware-amazon.html malware-app...
Date: Sun, 1 Dec 2019 16:57:01 -0500 (EST)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/12/01 16:57:01

Modified files:
        proprietary    : malware-amazon.html malware-appliances.html 
                         proprietary-insecurity.html 
        proprietary/workshop: mal.rec 

Log message:
        Fix an obsolete link (RT #1454195).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.178&r2=1.179

Patches:
Index: malware-amazon.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-amazon.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- malware-amazon.html 18 Nov 2019 10:27:57 -0000      1.31
+++ malware-amazon.html 1 Dec 2019 21:57:00 -0000       1.32
@@ -215,7 +215,8 @@
   <li id="M201902270">
     <p>The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
-    that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
+    that <a
+    
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
     anyone else can also watch, and fake videos too</a>.</p>
 
     <p>The third party vulnerability is presumably
@@ -313,7 +314,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/18 10:27:57 $
+$Date: 2019/12/01 21:57:00 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- malware-appliances.html     18 Nov 2019 10:27:57 -0000      1.84
+++ malware-appliances.html     1 Dec 2019 21:57:00 -0000       1.85
@@ -78,7 +78,8 @@
   <li id="M201902270">
     <p>The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
-    that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
+    that <a
+    
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
     anyone else can also watch, and fake videos too</a>.</p>
 
     <p>The third party vulnerability is presumably
@@ -931,7 +932,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/18 10:27:57 $
+$Date: 2019/12/01 21:57:00 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary-insecurity.html 18 Nov 2019 10:27:57 -0000      1.113
+++ proprietary-insecurity.html 1 Dec 2019 21:57:00 -0000       1.114
@@ -127,7 +127,8 @@
   <li id="M201902270">
     <p>The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
-    that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
+    that <a
+    
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
     anyone else can also watch, and fake videos too</a>.</p>
 
     <p>The third party vulnerability is presumably
@@ -727,7 +728,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/18 10:27:57 $
+$Date: 2019/12/01 21:57:00 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- workshop/mal.rec    16 Nov 2019 12:53:49 -0000      1.178
+++ workshop/mal.rec    1 Dec 2019 21:57:01 -0000       1.179
@@ -1211,7 +1211,8 @@
 Keywords: ring
 Blurb: <p>The Ring (now Amazon) doorbell camera is designed so that the
 +   manufacturer (now Amazon) can watch all the time. Now it turns out
-+   that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
++   that <a
++   
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
 +   anyone else can also watch, and fake videos too</a>.</p>
 +
 +   <p>The third party vulnerability is presumably



reply via email to

[Prev in Thread] Current Thread [Next in Thread]