[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-amazon.es.html po/malwa...
From: |
GNUN |
Subject: |
www/proprietary malware-amazon.es.html po/malwa... |
Date: |
Mon, 2 Dec 2019 05:59:55 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/12/02 05:59:55
Modified files:
proprietary : malware-amazon.es.html
proprietary/po : malware-amazon.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.es.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es-en.html?cvsroot=www&r1=1.22&r2=1.23
Patches:
Index: malware-amazon.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.es.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- malware-amazon.es.html 23 Nov 2019 11:33:14 -0000 1.24
+++ malware-amazon.es.html 2 Dec 2019 10:59:54 -0000 1.25
@@ -227,7 +227,7 @@
<p>El videotimbre Ring (ahora Amazon) está diseñado de tal modo que el
fabricante (ahora Amazon) puede estar observando todo el tiempo. Ahora
resulta que <a
-href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">también
+href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">también
cualquier otro puede observar e incluso falsear vÃdeos</a>.</p>
<p>Es de suponer que la vulnerabilidad a terceros no es intencionada, y
@@ -344,7 +344,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/11/23 11:33:14 $
+$Date: 2019/12/02 10:59:54 $
<!-- timestamp end -->
</p>
Index: po/malware-amazon.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- po/malware-amazon.es-en.html 23 Nov 2019 11:33:14 -0000 1.22
+++ po/malware-amazon.es-en.html 2 Dec 2019 10:59:54 -0000 1.23
@@ -215,7 +215,8 @@
<li id="M201902270">
<p>The Ring (now Amazon) doorbell camera is designed so that the
manufacturer (now Amazon) can watch all the time. Now it turns out
- that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ that <a
+
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
@@ -313,7 +314,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/23 11:33:14 $
+$Date: 2019/12/02 10:59:54 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-amazon.es.html po/malwa...,
GNUN <=