[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www proprietary/malware-in-online-conferencing....
From: |
GNUN |
Subject: |
www proprietary/malware-in-online-conferencing.... |
Date: |
Fri, 16 Apr 2021 14:01:08 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/04/16 14:01:08
Modified files:
proprietary : malware-in-online-conferencing.ru.html
proprietary-insecurity.ru.html
proprietary.ru.html
proprietary/po : malware-in-online-conferencing.ru-en.html
malware-in-online-conferencing.ru.po
proprietary-insecurity.ru-en.html
proprietary-insecurity.ru.po
proprietary.ru-en.html proprietary.ru.po
server : sitemap.ru.html
server/po : sitemap.ru-en.html sitemap.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-in-online-conferencing.ru.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.210&r2=1.211
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.ru-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.ru.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.495&r2=1.496
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.ru.html?cvsroot=www&r1=1.479&r2=1.480
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.ru-en.html?cvsroot=www&r1=1.281&r2=1.282
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.ru.po?cvsroot=www&r1=1.634&r2=1.635
Patches:
Index: proprietary/malware-in-online-conferencing.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-in-online-conferencing.ru.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/malware-in-online-conferencing.ru.html 15 Mar 2021 13:39:17
-0000 1.4
+++ proprietary/malware-in-online-conferencing.ru.html 16 Apr 2021 18:01:02
-0000 1.5
@@ -71,6 +71,20 @@
<div class="column-limit" id="malware-in-online-conferencing"></div>
<ul class="blurbs">
+ <li id="M202104090">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-04</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>ÐÑÑледоваÑели ÑаÑкÑÑли ÑÑзвимоÑÑÑ
нÑлевого Ð´Ð½Ñ Ð² Zoom, коÑоÑÑÑ <a
+href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">можно
+пÑименÑÑÑ Ð´Ð»Ñ Ð·Ð°Ð¿ÑÑка аÑак иÑполнениÑ
кода на ÑаÑÑÑоÑнии</a>. ÐÑÑледоваÑели
+пÑодемонÑÑÑиÑовали ÑÐµÐ¿Ñ Ð°Ñаки из ÑÑеÑ
оÑибок, коÑоÑÐ°Ñ Ð¿Ñивела к иÑполнениÑ
+кода на подопÑÑной маÑине — без
какого-либо взаимодейÑÑÐ²Ð¸Ñ Ñ
+полÑзоваÑелем.</p>
+ </li>
+
<li id="M202012190">
<!--#set var="DATE" value='<small class="date-tag">
@@ -243,7 +257,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2021/03/15 13:39:17 $
+$Date: 2021/04/16 18:01:02 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary/proprietary-insecurity.ru.html 16 Mar 2021 19:32:39 -0000
1.109
+++ proprietary/proprietary-insecurity.ru.html 16 Apr 2021 18:01:02 -0000
1.110
@@ -83,6 +83,20 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202104090">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-04</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>ÐÑÑледоваÑели ÑаÑкÑÑли ÑÑзвимоÑÑÑ
нÑлевого Ð´Ð½Ñ Ð² Zoom, коÑоÑÑÑ <a
+href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">можно
+пÑименÑÑÑ Ð´Ð»Ñ Ð·Ð°Ð¿ÑÑка аÑак иÑполнениÑ
кода на ÑаÑÑÑоÑнии</a>. ÐÑÑледоваÑели
+пÑодемонÑÑÑиÑовали ÑÐµÐ¿Ñ Ð°Ñаки из ÑÑеÑ
оÑибок, коÑоÑÐ°Ñ Ð¿Ñивела к иÑполнениÑ
+кода на подопÑÑной маÑине — без
какого-либо взаимодейÑÑÐ²Ð¸Ñ Ñ
+полÑзоваÑелем.</p>
+ </li>
+
<li id="M202103090">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1346,7 +1360,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2021/03/16 19:32:39 $
+$Date: 2021/04/16 18:01:02 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.210
retrieving revision 1.211
diff -u -b -r1.210 -r1.211
--- proprietary/proprietary.ru.html 12 Apr 2021 08:04:24 -0000 1.210
+++ proprietary/proprietary.ru.html 16 Apr 2021 18:01:02 -0000 1.211
@@ -201,6 +201,20 @@
<h3 id="latest">ÐоÑледние добавлениÑ</h3>
<ul class="blurbs">
+ <li id="M202104090">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-04</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>ÐÑÑледоваÑели ÑаÑкÑÑли ÑÑзвимоÑÑÑ
нÑлевого Ð´Ð½Ñ Ð² Zoom, коÑоÑÑÑ <a
+href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">можно
+пÑименÑÑÑ Ð´Ð»Ñ Ð·Ð°Ð¿ÑÑка аÑак иÑполнениÑ
кода на ÑаÑÑÑоÑнии</a>. ÐÑÑледоваÑели
+пÑодемонÑÑÑиÑовали ÑÐµÐ¿Ñ Ð°Ñаки из ÑÑеÑ
оÑибок, коÑоÑÐ°Ñ Ð¿Ñивела к иÑполнениÑ
+кода на подопÑÑной маÑине — без
какого-либо взаимодейÑÑÐ²Ð¸Ñ Ñ
+полÑзоваÑелем.</p>
+ </li>
+
<li id="M202102160">
<!--#set var="DATE" value='<small class="date-tag">
@@ -272,22 +286,6 @@
href="/philosophy/words-to-avoid.html#Hacker">“Ñ
акеÑÑ”</a>
невеÑно иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑениÑ
взломÑиков.</small></p>
</li>
-
- <li id="M202010282">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2020-10</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p>ÐÑоизводиÑели ÑелевизоÑов движÑÑÑÑ Ðº
пÑоизводÑÑÐ²Ñ ÑолÑко “ÑмнÑÑ
”
-ÑелевизоÑов (а в иÑ
ÑоÑÑав вÑ
одÑÑ
пÑогÑаммÑ-ÑпионÑ), Ñак ÑÑо <a
-href="https://frame.work/blog/in-defense-of-dumb-tvs">ÑепеÑÑ Ð¾ÑенÑ
ÑÑÑдно
-найÑи ÑелевизоÑ, коÑоÑÑй Ð±Ñ Ð½Ðµ Ñпионил за
вами</a>.</p>
-
- <p>ÐÑÑ
одиÑ, ÑÑ
ема пÑедпÑиÑÑÐ¸Ñ ÑÑиÑ
пÑоизводиÑелей — не вÑпÑÑкаÑÑ
-ÑелевизоÑÑ Ð¸ пÑодаваÑÑ Ð¸Ñ
за денÑги, а
ÑобиÑаÑÑ Ð²Ð°Ñи лиÑнÑе даннÑе и
-(возможно) Ñ Ð²Ñгодой пеÑедаваÑÑ Ð¸Ñ
дÑÑгим.</p>
- </li>
</ul>
</div>
@@ -369,7 +367,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2021/04/12 08:04:24 $
+$Date: 2021/04/16 18:01:02 $
<!-- timestamp end -->
</p>
Index: proprietary/po/malware-in-online-conferencing.ru-en.html
===================================================================
RCS file:
/web/www/www/proprietary/po/malware-in-online-conferencing.ru-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/malware-in-online-conferencing.ru-en.html 15 Mar 2021
13:39:23 -0000 1.4
+++ proprietary/po/malware-in-online-conferencing.ru-en.html 16 Apr 2021
18:01:03 -0000 1.5
@@ -65,6 +65,17 @@
<div class="column-limit" id="malware-in-online-conferencing"></div>
<ul class="blurbs">
+ <li id="M202104090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A zero-day vulnerability in Zoom which <a
+
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
+ be used to launch remote code execution (RCE) attacks</a> has been
+ disclosed by researchers. The researchers demonstrated a three-bug
+ attack chain that caused an RCE on a target machine, and all without
+ any form of user interaction.</p>
+ </li>
+
<li id="M202012190">
<!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -202,7 +213,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/15 13:39:23 $
+$Date: 2021/04/16 18:01:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-in-online-conferencing.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-in-online-conferencing.ru.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/malware-in-online-conferencing.ru.po 16 Apr 2021 17:31:23
-0000 1.6
+++ proprietary/po/malware-in-online-conferencing.ru.po 16 Apr 2021 18:01:03
-0000 1.7
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-16 17:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Online Conferencing - GNU Project - Free Software Foundation"
@@ -101,6 +100,12 @@
"attack chain that caused an RCE on a target machine, and all without any "
"form of user interaction."
msgstr ""
+"ÐÑÑледоваÑели ÑаÑкÑÑли ÑÑзвимоÑÑÑ
нÑлевого Ð´Ð½Ñ Ð² Zoom, коÑоÑÑÑ <a href="
+"\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-"
+"code-execution-without-user-input/\">можно пÑименÑÑÑ Ð´Ð»Ñ
запÑÑка аÑак "
+"иÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ ÐºÐ¾Ð´Ð° на ÑаÑÑÑоÑнии</a>.
ÐÑÑледоваÑели пÑодемонÑÑÑиÑовали ÑÐµÐ¿Ñ "
+"аÑаки из ÑÑеÑ
оÑибок, коÑоÑÐ°Ñ Ð¿Ñивела к
иÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ ÐºÐ¾Ð´Ð° на подопÑÑной "
+"маÑине — без какого-либо
взаимодейÑÑÐ²Ð¸Ñ Ñ Ð¿Ð¾Ð»ÑзоваÑелем."
#. type: Content of: <div><div><ul><li><p>
msgid ""
Index: proprietary/po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary/po/proprietary-insecurity.ru-en.html 16 Mar 2021 19:32:41
-0000 1.108
+++ proprietary/po/proprietary-insecurity.ru-en.html 16 Apr 2021 18:01:03
-0000 1.109
@@ -76,6 +76,17 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202104090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A zero-day vulnerability in Zoom which <a
+
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
+ be used to launch remote code execution (RCE) attacks</a> has been
+ disclosed by researchers. The researchers demonstrated a three-bug
+ attack chain that caused an RCE on a target machine, and all without
+ any form of user interaction.</p>
+ </li>
+
<li id="M202103090">
<!--#set var="DATE" value='<small class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1076,7 +1087,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/16 19:32:41 $
+$Date: 2021/04/16 18:01:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- proprietary/po/proprietary-insecurity.ru.po 16 Apr 2021 17:31:23 -0000
1.285
+++ proprietary/po/proprietary-insecurity.ru.po 16 Apr 2021 18:01:03 -0000
1.286
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-16 17:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -129,6 +128,12 @@
"attack chain that caused an RCE on a target machine, and all without any "
"form of user interaction."
msgstr ""
+"ÐÑÑледоваÑели ÑаÑкÑÑли ÑÑзвимоÑÑÑ
нÑлевого Ð´Ð½Ñ Ð² Zoom, коÑоÑÑÑ <a href="
+"\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-"
+"code-execution-without-user-input/\">можно пÑименÑÑÑ Ð´Ð»Ñ
запÑÑка аÑак "
+"иÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ ÐºÐ¾Ð´Ð° на ÑаÑÑÑоÑнии</a>.
ÐÑÑледоваÑели пÑодемонÑÑÑиÑовали ÑÐµÐ¿Ñ "
+"аÑаки из ÑÑеÑ
оÑибок, коÑоÑÐ°Ñ Ð¿Ñивела к
иÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ ÐºÐ¾Ð´Ð° на подопÑÑной "
+"маÑине — без какого-либо
взаимодейÑÑÐ²Ð¸Ñ Ñ Ð¿Ð¾Ð»ÑзоваÑелем."
#. type: Content of: <div><div><ul><li><p>
msgid ""
Index: proprietary/po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- proprietary/po/proprietary.ru-en.html 16 Apr 2021 05:31:06 -0000
1.207
+++ proprietary/po/proprietary.ru-en.html 16 Apr 2021 18:01:03 -0000
1.208
@@ -186,6 +186,17 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M202104090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A zero-day vulnerability in Zoom which <a
+
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
+ be used to launch remote code execution (RCE) attacks</a> has been
+ disclosed by researchers. The researchers demonstrated a three-bug
+ attack chain that caused an RCE on a target machine, and all without
+ any form of user interaction.</p>
+ </li>
+
<li id="M202102160">
<!--#set var="DATE" value='<small class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -242,19 +253,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202010282">
- <!--#set var="DATE" value='<small class="date-tag">2020-10</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>TV manufacturers are turning to produce only
- “Smart” TV sets (which include spyware) that <a
- href="https://frame.work/blog/in-defense-of-dumb-tvs">it's now very
- hard to find a TV that doesn't spy on you</a>.</p>
-
- <p>It appears that those manufacturers business model is not to produce
- TV and sell them for money, but to collect your personal data and
- (possibly) hand over them to others for benefit.</p>
- </li>
</ul>
</div>
@@ -317,7 +315,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/16 05:31:06 $
+$Date: 2021/04/16 18:01:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.495
retrieving revision 1.496
diff -u -b -r1.495 -r1.496
--- proprietary/po/proprietary.ru.po 16 Apr 2021 17:31:27 -0000 1.495
+++ proprietary/po/proprietary.ru.po 16 Apr 2021 18:01:03 -0000 1.496
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-16 17:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -348,6 +347,12 @@
"attack chain that caused an RCE on a target machine, and all without any "
"form of user interaction."
msgstr ""
+"ÐÑÑледоваÑели ÑаÑкÑÑли ÑÑзвимоÑÑÑ
нÑлевого Ð´Ð½Ñ Ð² Zoom, коÑоÑÑÑ <a href="
+"\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-"
+"code-execution-without-user-input/\">можно пÑименÑÑÑ Ð´Ð»Ñ
запÑÑка аÑак "
+"иÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ ÐºÐ¾Ð´Ð° на ÑаÑÑÑоÑнии</a>.
ÐÑÑледоваÑели пÑодемонÑÑÑиÑовали ÑÐµÐ¿Ñ "
+"аÑаки из ÑÑеÑ
оÑибок, коÑоÑÐ°Ñ Ð¿Ñивела к
иÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ ÐºÐ¾Ð´Ð° на подопÑÑной "
+"маÑине — без какого-либо
взаимодейÑÑÐ²Ð¸Ñ Ñ Ð¿Ð¾Ð»ÑзоваÑелем."
#. type: Content of: <div><ul><li><p>
msgid ""
Index: server/sitemap.ru.html
===================================================================
RCS file: /web/www/www/server/sitemap.ru.html,v
retrieving revision 1.479
retrieving revision 1.480
diff -u -b -r1.479 -r1.480
--- server/sitemap.ru.html 16 Apr 2021 17:01:05 -0000 1.479
+++ server/sitemap.ru.html 16 Apr 2021 18:01:04 -0000 1.480
@@ -1867,7 +1867,7 @@
</span>
<dl>
<dt><a href="/proprietary/all.html">all.html</a></dt>
- <dd>All Items in the Malware Section</dd>
+ <dd>ÐÑе ÑÑаÑÑи Ñаздела вÑедоноÑнÑÑ
пÑогÑамм</dd>
<dt><a href="/proprietary/malware-adobe.html">malware-adobe.html</a></dt>
<dd>ÐÑогÑÐ°Ð¼Ð¼Ñ Adobe вÑедоноÑнÑ</dd>
<dt><a href="/proprietary/malware-amazon.html">malware-amazon.html</a></dt>
@@ -2266,7 +2266,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2021/04/16 17:01:05 $
+$Date: 2021/04/16 18:01:04 $
<!-- timestamp end -->
</p>
Index: server/po/sitemap.ru-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.ru-en.html,v
retrieving revision 1.281
retrieving revision 1.282
diff -u -b -r1.281 -r1.282
--- server/po/sitemap.ru-en.html 8 Apr 2021 17:03:14 -0000 1.281
+++ server/po/sitemap.ru-en.html 16 Apr 2021 18:01:04 -0000 1.282
@@ -1727,6 +1727,8 @@
Proprietary Software Is Often Malware<span class="gnun-split"></span>
</span>
<dl>
+ <dt><a href="/proprietary/all.html">all.html</a></dt>
+ <dd>All Items in the Malware Section</dd>
<dt><a href="/proprietary/malware-adobe.html">malware-adobe.html</a></dt>
<dd>Adobe's Software is Malware</dd>
<dt><a href="/proprietary/malware-amazon.html">malware-amazon.html</a></dt>
@@ -2088,7 +2090,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/08 17:03:14 $
+$Date: 2021/04/16 18:01:04 $
<!-- timestamp end -->
</p>
</div>
Index: server/po/sitemap.ru.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.ru.po,v
retrieving revision 1.634
retrieving revision 1.635
diff -u -b -r1.634 -r1.635
--- server/po/sitemap.ru.po 16 Apr 2021 17:49:54 -0000 1.634
+++ server/po/sitemap.ru.po 16 Apr 2021 18:01:07 -0000 1.635
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-16 16:55+0000\n"
#. type: Content of: <title>
msgid "Site map of www.gnu.org - GNU Project - Free Software Foundation"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www proprietary/malware-in-online-conferencing....,
GNUN <=