www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/words-to-avoid.fr.html philosoph...


From: GNUN
Subject: www philosophy/words-to-avoid.fr.html philosoph...
Date: Tue, 24 Nov 2020 09:31:42 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/11/24 09:31:42

Modified files:
        philosophy     : words-to-avoid.fr.html 
        philosophy/po  : words-to-avoid.fr-en.html 
        proprietary    : malware-microsoft.fr.html 
                         proprietary-back-doors.fr.html 
        proprietary/po : malware-microsoft.fr-en.html 
                         proprietary-back-doors.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.fr.html?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.fr-en.html?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.84&r2=1.85

Patches:
Index: philosophy/words-to-avoid.fr.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.fr.html,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- philosophy/words-to-avoid.fr.html   15 Nov 2020 10:30:38 -0000      1.197
+++ philosophy/words-to-avoid.fr.html   24 Nov 2020 14:31:41 -0000      1.198
@@ -851,7 +851,7 @@
 L'expérience montre que souvent ces produits <a
 
href="http://www.locusmag.com/Perspectives/2015/09/cory-doctorow-what-if-people-were-sensors-not-things-to-be-sensed/";>espionnent
 effectivement leurs utilisateurs</a> ; ils sont également conçus pour <a
-href="http://ieet.org/index.php/IEET/more/rinesi20150806";>donner aux gens
+href="https://archive.ieet.org/articles/rinesi20150806.html";>donner aux gens
 des conseils biaisés</a>. De plus, le fabricant peut <a
 href="/proprietary/proprietary-sabotage.html">saboter le produit</a> en
 arrêtant le serveur dont il dépend.</p>
@@ -1489,7 +1489,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/11/15 10:30:38 $
+$Date: 2020/11/24 14:31:41 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/words-to-avoid.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.fr-en.html,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- philosophy/po/words-to-avoid.fr-en.html     15 Nov 2020 10:30:39 -0000      
1.114
+++ philosophy/po/words-to-avoid.fr-en.html     24 Nov 2020 14:31:41 -0000      
1.115
@@ -871,7 +871,7 @@
 <a
 
href="http://www.locusmag.com/Perspectives/2015/09/cory-doctorow-what-if-people-were-sensors-not-things-to-be-sensed/";>
 spy on their users</a>.  They are also tailor-made for 
-<a href="http://ieet.org/index.php/IEET/more/rinesi20150806";>giving
+<a href="https://archive.ieet.org/articles/rinesi20150806.html";>giving
 people biased advice</a>.  In addition, the manufacturer can <a
 href="/proprietary/proprietary-sabotage.html"> sabotage the
 product</a> by turning off the server it depends on.</p>
@@ -1418,7 +1418,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/15 10:30:39 $
+$Date: 2020/11/24 14:31:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary/malware-microsoft.fr.html       17 Nov 2020 11:30:47 -0000      
1.100
+++ proprietary/malware-microsoft.fr.html       24 Nov 2020 14:31:41 -0000      
1.101
@@ -95,11 +95,11 @@
 un changement aux utilisateurs, quel qu'il soit</a>.</p>
 
     <p>Ceci a été <a
-href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>décrit
+href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want";>décrit
 en 2007</a> pour XP et Vista et il semble que Microsoft ait utilisé la même
 méthode pour <a
 href="/proprietary/malware-microsoft.html#windows10-forcing">imposer une
-régression vers Windows 10</a> aux ordinateurs sous Windows 7 et 8.</p>
+régression vers Windows 10</a> aux ordinateurs sous Windows 7 et 8.</p>
 
     <p>Dans Windows 10, la porte dérobée universelle n'est plus cachée ; 
toutes les
 « mises à jour » seront <a
@@ -776,7 +776,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/11/17 11:30:47 $
+$Date: 2020/11/24 14:31:41 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary/proprietary-back-doors.fr.html  23 Nov 2020 14:35:43 -0000      
1.92
+++ proprietary/proprietary-back-doors.fr.html  24 Nov 2020 14:31:42 -0000      
1.93
@@ -554,11 +554,11 @@
 un changement aux utilisateurs, quel qu'il soit</a>.</p>
 
     <p>Ceci a été <a
-href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>décrit
+href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want";>décrit
 en 2007</a> pour XP et Vista et il semble que Microsoft ait utilisé la même
 méthode pour <a
 href="/proprietary/malware-microsoft.html#windows10-forcing">imposer une
-régression vers Windows 10</a> aux ordinateurs sous Windows 7 et 8.</p>
+régression vers Windows 10</a> aux ordinateurs sous Windows 7 et 8.</p>
 
     <p>Dans Windows 10, la porte dérobée universelle n'est plus cachée ; 
toutes les
 « mises à jour » seront <a
@@ -771,7 +771,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2020/11/23 14:35:43 $
+$Date: 2020/11/24 14:31:42 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary/po/malware-microsoft.fr-en.html 17 Nov 2020 11:30:48 -0000      
1.93
+++ proprietary/po/malware-microsoft.fr-en.html 24 Nov 2020 14:31:42 -0000      
1.94
@@ -88,7 +88,7 @@
     any change whatsoever can be imposed on the users</a>.</p>
 
     <p>This was <a
-    href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
+    
href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
     reported in 2007</a> for XP and Vista, and it seems
     that Microsoft used the same method to push the <a
     href="/proprietary/malware-microsoft.html#windows10-forcing">
@@ -745,7 +745,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/17 11:30:48 $
+$Date: 2020/11/24 14:31:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/po/proprietary-back-doors.fr-en.html    23 Nov 2020 14:35:46 
-0000      1.84
+++ proprietary/po/proprietary-back-doors.fr-en.html    24 Nov 2020 14:31:42 
-0000      1.85
@@ -542,7 +542,7 @@
     any change whatsoever can be imposed on the users</a>.</p>
 
     <p>This was <a
-    href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
+    
href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
     reported in 2007</a> for XP and Vista, and it seems
     that Microsoft used the same method to push the <a
     href="/proprietary/malware-microsoft.html#windows10-forcing">
@@ -738,7 +738,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/23 14:35:46 $
+$Date: 2020/11/24 14:31:42 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]