[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-appliances.es.html prop...
From: |
GNUN |
Subject: |
www/proprietary malware-appliances.es.html prop... |
Date: |
Tue, 3 Dec 2019 05:29:23 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/12/03 05:29:23
Modified files:
proprietary : malware-appliances.es.html
proprietary-insecurity.es.html
proprietary/po : malware-appliances.es-en.html
proprietary-insecurity.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.es.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.7&r2=1.8
Patches:
Index: malware-appliances.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.es.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- malware-appliances.es.html 23 Nov 2019 11:33:14 -0000 1.3
+++ malware-appliances.es.html 3 Dec 2019 10:29:22 -0000 1.4
@@ -86,7 +86,7 @@
<p>El videotimbre Ring (ahora Amazon) está diseñado de tal modo que el
fabricante (ahora Amazon) puede estar observando todo el tiempo. Ahora
resulta que <a
-href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">también
+href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">también
cualquier otro puede observar e incluso falsear vÃdeos</a>.</p>
<p>Es de suponer que la vulnerabilidad a terceros no es intencionada, e que
@@ -959,7 +959,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/11/23 11:33:14 $
+$Date: 2019/12/03 10:29:22 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-insecurity.es.html 23 Nov 2019 11:33:14 -0000 1.8
+++ proprietary-insecurity.es.html 3 Dec 2019 10:29:22 -0000 1.9
@@ -138,8 +138,8 @@
<p>El videotimbre Ring (ahora Amazon) está diseñado de tal modo que el
fabricante (ahora Amazon) puede estar observando todo el tiempo. Ahora
resulta que <a
-href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">cualquier
-otra persona también puede observar e incluso falsear vÃdeos</a>.</p>
+href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">también
+cualquier otro puede observar e incluso falsear vÃdeos</a>.</p>
<p>Es de suponer que la vulnerabilidad a terceros no es intencionada, y
probablemente Amazon lo solucionará. Sin embargo, no contamos con que Amazon
@@ -772,7 +772,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/11/23 11:33:14 $
+$Date: 2019/12/03 10:29:22 $
<!-- timestamp end -->
</p>
Index: po/malware-appliances.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/malware-appliances.es-en.html 23 Nov 2019 11:33:14 -0000 1.3
+++ po/malware-appliances.es-en.html 3 Dec 2019 10:29:23 -0000 1.4
@@ -78,7 +78,8 @@
<li id="M201902270">
<p>The Ring (now Amazon) doorbell camera is designed so that the
manufacturer (now Amazon) can watch all the time. Now it turns out
- that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ that <a
+
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
@@ -931,7 +932,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/23 11:33:14 $
+$Date: 2019/12/03 10:29:23 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/proprietary-insecurity.es-en.html 23 Nov 2019 11:33:15 -0000
1.7
+++ po/proprietary-insecurity.es-en.html 3 Dec 2019 10:29:23 -0000
1.8
@@ -127,7 +127,8 @@
<li id="M201902270">
<p>The Ring (now Amazon) doorbell camera is designed so that the
manufacturer (now Amazon) can watch all the time. Now it turns out
- that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ that <a
+
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
@@ -727,7 +728,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/23 11:33:15 $
+$Date: 2019/12/03 10:29:23 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-appliances.es.html prop...,
GNUN <=