www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-amazon.fr.html malware-...


From: GNUN
Subject: www/proprietary malware-amazon.fr.html malware-...
Date: Tue, 3 Dec 2019 04:59:28 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/12/03 04:59:28

Modified files:
        proprietary    : malware-amazon.fr.html 
                         malware-appliances.fr.html 
                         proprietary-insecurity.fr.html 
        proprietary/po : malware-amazon.fr-en.html 
                         malware-appliances.fr-en.html 
                         proprietary-insecurity.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.fr.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.fr.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr-en.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.83&r2=1.84

Patches:
Index: malware-amazon.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.fr.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- malware-amazon.fr.html      19 Nov 2019 07:01:46 -0000      1.31
+++ malware-amazon.fr.html      3 Dec 2019 09:59:28 -0000       1.32
@@ -222,8 +222,8 @@
   <li id="M201902270">
     <p>La sonnette vidéo de Ring est conçue pour que le fabricant (maintenant
 Amazon) puisse regarder en permanence. En fait, il se trouve que <a
-href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>n'importe qui
-peut en faire autant, et peut également falsifier les vidéos</a>.</p>
+href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>n'importe
+qui peut en faire autant, et peut également falsifier les vidéos</a>.</p>
 
     <p>La vulnérabilité à des attaques extérieures est vraisemblablement
 involontaire et il est probable qu'Amazon la corrigera. Cependant nous ne
@@ -338,7 +338,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/11/19 07:01:46 $
+$Date: 2019/12/03 09:59:28 $
 
 <!-- timestamp end -->
 </p>

Index: malware-appliances.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.fr.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-appliances.fr.html  19 Nov 2019 07:01:47 -0000      1.75
+++ malware-appliances.fr.html  3 Dec 2019 09:59:28 -0000       1.76
@@ -82,8 +82,8 @@
   <li id="M201902270">
     <p>La sonnette vidéo de Ring est conçue pour que le fabricant (maintenant
 Amazon) puisse regarder en permanence. En fait, il se trouve que <a
-href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>n'importe qui
-peut en faire autant, et peut également falsifier les vidéos</a>.</p>
+href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>n'importe
+qui peut en faire autant, et peut également falsifier les vidéos</a>.</p>
 
     <p>La vulnérabilité à des attaques extérieures est vraisemblablement
 involontaire et il est probable qu'Amazon la corrigera. Cependant nous ne
@@ -968,7 +968,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/11/19 07:01:47 $
+$Date: 2019/12/03 09:59:28 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary-insecurity.fr.html      19 Nov 2019 07:01:48 -0000      1.94
+++ proprietary-insecurity.fr.html      3 Dec 2019 09:59:28 -0000       1.95
@@ -137,8 +137,8 @@
   <li id="M201902270">
     <p>La sonnette vidéo de Ring est conçue pour que le fabricant (maintenant
 Amazon) puisse regarder en permanence. En fait, il se trouve que <a
-href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>n'importe qui
-peut en faire autant, et peut également falsifier les vidéos</a>.</p>
+href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>n'importe
+qui peut en faire autant, et peut également falsifier les vidéos</a>.</p>
 
     <p>La vulnérabilité à des attaques extérieures est vraisemblablement
 involontaire et il est probable qu'Amazon la corrigera. Cependant nous ne
@@ -771,7 +771,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/11/19 07:01:48 $
+$Date: 2019/12/03 09:59:28 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-amazon.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/malware-amazon.fr-en.html        19 Nov 2019 07:01:50 -0000      1.25
+++ po/malware-amazon.fr-en.html        3 Dec 2019 09:59:28 -0000       1.26
@@ -215,7 +215,8 @@
   <li id="M201902270">
     <p>The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
-    that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
+    that <a
+    
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
     anyone else can also watch, and fake videos too</a>.</p>
 
     <p>The third party vulnerability is presumably
@@ -313,7 +314,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/19 07:01:50 $
+$Date: 2019/12/03 09:59:28 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-appliances.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr-en.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- po/malware-appliances.fr-en.html    19 Nov 2019 07:01:50 -0000      1.69
+++ po/malware-appliances.fr-en.html    3 Dec 2019 09:59:28 -0000       1.70
@@ -78,7 +78,8 @@
   <li id="M201902270">
     <p>The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
-    that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
+    that <a
+    
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
     anyone else can also watch, and fake videos too</a>.</p>
 
     <p>The third party vulnerability is presumably
@@ -931,7 +932,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/19 07:01:50 $
+$Date: 2019/12/03 09:59:28 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- po/proprietary-insecurity.fr-en.html        19 Nov 2019 07:01:52 -0000      
1.83
+++ po/proprietary-insecurity.fr-en.html        3 Dec 2019 09:59:28 -0000       
1.84
@@ -127,7 +127,8 @@
   <li id="M201902270">
     <p>The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
-    that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
+    that <a
+    
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
     anyone else can also watch, and fake videos too</a>.</p>
 
     <p>The third party vulnerability is presumably
@@ -727,7 +728,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/19 07:01:52 $
+$Date: 2019/12/03 09:59:28 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]