[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary-insecurity.html mal...
From: |
Ali Reza Hayati |
Subject: |
www/proprietary proprietary-insecurity.html mal... |
Date: |
Thu, 15 Jul 2021 01:47:04 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: Ali Reza Hayati <arh> 21/07/15 01:47:04
Modified files:
proprietary : proprietary-insecurity.html
malware-microsoft.html proprietary.html
all.html
proprietary/workshop: mal.rec
Log message:
Added item about Microsoft Windows security flaw (www-discuss
2021-07-12)
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.346&r2=1.347
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.347&r2=1.348
Patches:
Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- proprietary-insecurity.html 28 Jun 2021 13:40:29 -0000 1.164
+++ proprietary-insecurity.html 15 Jul 2021 05:47:04 -0000 1.165
@@ -71,6 +71,20 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix it, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as &ldquo<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<li id="M202106030">
<!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1140,7 +1154,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/28 13:40:29 $
+$Date: 2021/07/15 05:47:04 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- malware-microsoft.html 13 Jun 2021 08:13:32 -0000 1.143
+++ malware-microsoft.html 15 Jul 2021 05:47:04 -0000 1.144
@@ -200,6 +200,20 @@
bugs.</p>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix it, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as &ldquo<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<li id="M202103050">
<!--#set var="DATE" value='<small class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -953,7 +967,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/13 08:13:32 $
+$Date: 2021/07/15 05:47:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.346
retrieving revision 1.347
diff -u -b -r1.346 -r1.347
--- proprietary.html 4 Jul 2021 05:23:19 -0000 1.346
+++ proprietary.html 15 Jul 2021 05:47:04 -0000 1.347
@@ -186,6 +186,20 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix it, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as &ldquo<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<li id="M202106220">
<!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -240,18 +254,6 @@
users' smartphones</a>. The company behind it does whatever it wants
and collects whatever data it can.</p>
</li>
-
- <li id="M202004131">
- <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google, Apple, and Microsoft (and probably some other companies)
- <a href="https://www.lifewire.com/wifi-positioning-system-1683343">are
- collecting people's access points and GPS coordinates (which can
- identify people's precise location) even if their GPS is turned
- off</a>, without the person's consent, using proprietary software
- implemented in person's smartphone. Though merely asking for permission
- would not necessarily legitimize this.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -314,7 +316,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 05:23:19 $
+$Date: 2021/07/15 05:47:04 $
<!-- timestamp end -->
</p>
</div>
Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- all.html 4 Jul 2021 05:23:19 -0000 1.24
+++ all.html 15 Jul 2021 05:47:04 -0000 1.25
@@ -42,6 +42,18 @@
<div class="column-limit" id="all-malware"></div>
<ul class="blurbs">
+<!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-09'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
+ <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix it, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as &ldquo<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<!--#set var='ADD' value='2021-07-04' --><!--#set var='PUB' value='2021-06-22'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Peloton company which produces treadmills recently <a
href="https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/">locked
@@ -2289,7 +2301,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 05:23:19 $
+$Date: 2021/07/15 05:47:04 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.347
retrieving revision 1.348
diff -u -b -r1.347 -r1.348
--- workshop/mal.rec 4 Jul 2021 05:23:20 -0000 1.347
+++ workshop/mal.rec 15 Jul 2021 05:47:04 -0000 1.348
@@ -24,6 +24,23 @@
#### Please don't remove the blank line after this marker! ####
# ADD NEW BLURB HERE
+Added: 2021-07-15
+Id: 202107090
+RT: www-discuss 2021-07-12
+PubDate: 2021-07-09
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-microsoft.html insecurity
+Keywords: Insecurity, Microsoft, Windows, Security
+Blurb: <p>A newly found Microsoft Windows vulnerability <a rights.</p>
++
++ <p>The security research firm accidentally leaked instructions on
++ how the flaw could be exploited but Windows users should still wait
++ for Microsoft to fix it, if they fix it.</p>
++
++ <p><small>Please note that the article
++ wrongly refers to crackers as &ldquo<a
++
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+
Added: 2021-07-04
Id: 202106220
RT: 1735538 (www-discuss 2021-06-30)
- www/proprietary proprietary-insecurity.html mal...,
Ali Reza Hayati <=