[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-amazon.fr.html malware-...
From: |
GNUN |
Subject: |
www/proprietary malware-amazon.fr.html malware-... |
Date: |
Tue, 3 Dec 2019 04:59:28 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/12/03 04:59:28
Modified files:
proprietary : malware-amazon.fr.html
malware-appliances.fr.html
proprietary-insecurity.fr.html
proprietary/po : malware-amazon.fr-en.html
malware-appliances.fr-en.html
proprietary-insecurity.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.fr.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.fr.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr-en.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.83&r2=1.84
Patches:
Index: malware-amazon.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.fr.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- malware-amazon.fr.html 19 Nov 2019 07:01:46 -0000 1.31
+++ malware-amazon.fr.html 3 Dec 2019 09:59:28 -0000 1.32
@@ -222,8 +222,8 @@
<li id="M201902270">
<p>La sonnette vidéo de Ring est conçue pour que le fabricant (maintenant
Amazon) puisse regarder en permanence. En fait, il se trouve que <a
-href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">n'importe qui
-peut en faire autant, et peut également falsifier les vidéos</a>.</p>
+href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">n'importe
+qui peut en faire autant, et peut également falsifier les vidéos</a>.</p>
<p>La vulnérabilité à des attaques extérieures est vraisemblablement
involontaire et il est probable qu'Amazon la corrigera. Cependant nous ne
@@ -338,7 +338,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/11/19 07:01:46 $
+$Date: 2019/12/03 09:59:28 $
<!-- timestamp end -->
</p>
Index: malware-appliances.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.fr.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-appliances.fr.html 19 Nov 2019 07:01:47 -0000 1.75
+++ malware-appliances.fr.html 3 Dec 2019 09:59:28 -0000 1.76
@@ -82,8 +82,8 @@
<li id="M201902270">
<p>La sonnette vidéo de Ring est conçue pour que le fabricant (maintenant
Amazon) puisse regarder en permanence. En fait, il se trouve que <a
-href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">n'importe qui
-peut en faire autant, et peut également falsifier les vidéos</a>.</p>
+href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">n'importe
+qui peut en faire autant, et peut également falsifier les vidéos</a>.</p>
<p>La vulnérabilité à des attaques extérieures est vraisemblablement
involontaire et il est probable qu'Amazon la corrigera. Cependant nous ne
@@ -968,7 +968,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/11/19 07:01:47 $
+$Date: 2019/12/03 09:59:28 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary-insecurity.fr.html 19 Nov 2019 07:01:48 -0000 1.94
+++ proprietary-insecurity.fr.html 3 Dec 2019 09:59:28 -0000 1.95
@@ -137,8 +137,8 @@
<li id="M201902270">
<p>La sonnette vidéo de Ring est conçue pour que le fabricant (maintenant
Amazon) puisse regarder en permanence. En fait, il se trouve que <a
-href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">n'importe qui
-peut en faire autant, et peut également falsifier les vidéos</a>.</p>
+href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">n'importe
+qui peut en faire autant, et peut également falsifier les vidéos</a>.</p>
<p>La vulnérabilité à des attaques extérieures est vraisemblablement
involontaire et il est probable qu'Amazon la corrigera. Cependant nous ne
@@ -771,7 +771,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/11/19 07:01:48 $
+$Date: 2019/12/03 09:59:28 $
<!-- timestamp end -->
</p>
Index: po/malware-amazon.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/malware-amazon.fr-en.html 19 Nov 2019 07:01:50 -0000 1.25
+++ po/malware-amazon.fr-en.html 3 Dec 2019 09:59:28 -0000 1.26
@@ -215,7 +215,8 @@
<li id="M201902270">
<p>The Ring (now Amazon) doorbell camera is designed so that the
manufacturer (now Amazon) can watch all the time. Now it turns out
- that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ that <a
+
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
@@ -313,7 +314,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/19 07:01:50 $
+$Date: 2019/12/03 09:59:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-appliances.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr-en.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- po/malware-appliances.fr-en.html 19 Nov 2019 07:01:50 -0000 1.69
+++ po/malware-appliances.fr-en.html 3 Dec 2019 09:59:28 -0000 1.70
@@ -78,7 +78,8 @@
<li id="M201902270">
<p>The Ring (now Amazon) doorbell camera is designed so that the
manufacturer (now Amazon) can watch all the time. Now it turns out
- that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ that <a
+
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
@@ -931,7 +932,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/19 07:01:50 $
+$Date: 2019/12/03 09:59:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- po/proprietary-insecurity.fr-en.html 19 Nov 2019 07:01:52 -0000
1.83
+++ po/proprietary-insecurity.fr-en.html 3 Dec 2019 09:59:28 -0000
1.84
@@ -127,7 +127,8 @@
<li id="M201902270">
<p>The Ring (now Amazon) doorbell camera is designed so that the
manufacturer (now Amazon) can watch all the time. Now it turns out
- that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ that <a
+
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
@@ -727,7 +728,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/19 07:01:52 $
+$Date: 2019/12/03 09:59:28 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-amazon.fr.html malware-...,
GNUN <=