www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-appliances.es.html prop...


From: GNUN
Subject: www/proprietary malware-appliances.es.html prop...
Date: Tue, 3 Dec 2019 05:29:23 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/12/03 05:29:23

Modified files:
        proprietary    : malware-appliances.es.html 
                         proprietary-insecurity.es.html 
        proprietary/po : malware-appliances.es-en.html 
                         proprietary-insecurity.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.es.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.7&r2=1.8

Patches:
Index: malware-appliances.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.es.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- malware-appliances.es.html  23 Nov 2019 11:33:14 -0000      1.3
+++ malware-appliances.es.html  3 Dec 2019 10:29:22 -0000       1.4
@@ -86,7 +86,7 @@
     <p>El videotimbre Ring (ahora Amazon) está diseñado de tal modo que el
 fabricante (ahora Amazon) puede estar observando todo el tiempo. Ahora
 resulta que <a
-href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>también
+href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>también
 cualquier otro puede observar e incluso falsear vídeos</a>.</p>
 
     <p>Es de suponer que la vulnerabilidad a terceros no es intencionada, e que
@@ -959,7 +959,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/11/23 11:33:14 $
+$Date: 2019/12/03 10:29:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-insecurity.es.html      23 Nov 2019 11:33:14 -0000      1.8
+++ proprietary-insecurity.es.html      3 Dec 2019 10:29:22 -0000       1.9
@@ -138,8 +138,8 @@
     <p>El videotimbre Ring (ahora Amazon) está diseñado de tal modo que el
 fabricante (ahora Amazon) puede estar observando todo el tiempo. Ahora
 resulta que <a
-href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>cualquier
-otra persona también puede observar e incluso falsear vídeos</a>.</p>
+href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>también
+cualquier otro puede observar e incluso falsear vídeos</a>.</p>
 
     <p>Es de suponer que la vulnerabilidad a terceros no es intencionada, y
 probablemente Amazon lo solucionará. Sin embargo, no contamos con que Amazon
@@ -772,7 +772,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/11/23 11:33:14 $
+$Date: 2019/12/03 10:29:22 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-appliances.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/malware-appliances.es-en.html    23 Nov 2019 11:33:14 -0000      1.3
+++ po/malware-appliances.es-en.html    3 Dec 2019 10:29:23 -0000       1.4
@@ -78,7 +78,8 @@
   <li id="M201902270">
     <p>The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
-    that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
+    that <a
+    
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
     anyone else can also watch, and fake videos too</a>.</p>
 
     <p>The third party vulnerability is presumably
@@ -931,7 +932,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/23 11:33:14 $
+$Date: 2019/12/03 10:29:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/proprietary-insecurity.es-en.html        23 Nov 2019 11:33:15 -0000      
1.7
+++ po/proprietary-insecurity.es-en.html        3 Dec 2019 10:29:23 -0000       
1.8
@@ -127,7 +127,8 @@
   <li id="M201902270">
     <p>The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
-    that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
+    that <a
+    
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
     anyone else can also watch, and fake videos too</a>.</p>
 
     <p>The third party vulnerability is presumably
@@ -727,7 +728,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/23 11:33:15 $
+$Date: 2019/12/03 10:29:23 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]