www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-amazon.es.html po/malwa...


From: GNUN
Subject: www/proprietary malware-amazon.es.html po/malwa...
Date: Mon, 2 Dec 2019 05:59:55 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/12/02 05:59:55

Modified files:
        proprietary    : malware-amazon.es.html 
        proprietary/po : malware-amazon.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.es.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es-en.html?cvsroot=www&r1=1.22&r2=1.23

Patches:
Index: malware-amazon.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.es.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- malware-amazon.es.html      23 Nov 2019 11:33:14 -0000      1.24
+++ malware-amazon.es.html      2 Dec 2019 10:59:54 -0000       1.25
@@ -227,7 +227,7 @@
     <p>El videotimbre Ring (ahora Amazon) está diseñado de tal modo que el
 fabricante (ahora Amazon) puede estar observando todo el tiempo. Ahora
 resulta que <a
-href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>también
+href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>también
 cualquier otro puede observar e incluso falsear vídeos</a>.</p>
 
     <p>Es de suponer que la vulnerabilidad a terceros no es intencionada, y
@@ -344,7 +344,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/11/23 11:33:14 $
+$Date: 2019/12/02 10:59:54 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-amazon.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- po/malware-amazon.es-en.html        23 Nov 2019 11:33:14 -0000      1.22
+++ po/malware-amazon.es-en.html        2 Dec 2019 10:59:54 -0000       1.23
@@ -215,7 +215,8 @@
   <li id="M201902270">
     <p>The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
-    that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
+    that <a
+    
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
     anyone else can also watch, and fake videos too</a>.</p>
 
     <p>The third party vulnerability is presumably
@@ -313,7 +314,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/23 11:33:14 $
+$Date: 2019/12/02 10:59:54 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]