www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-insecurity.html mal...


From: Ali Reza Hayati
Subject: www/proprietary proprietary-insecurity.html mal...
Date: Thu, 15 Jul 2021 01:47:04 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     Ali Reza Hayati <arh>   21/07/15 01:47:04

Modified files:
        proprietary    : proprietary-insecurity.html 
                         malware-microsoft.html proprietary.html 
                         all.html 
        proprietary/workshop: mal.rec 

Log message:
        Added item about Microsoft Windows security flaw (www-discuss 
2021-07-12)

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.346&r2=1.347
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.347&r2=1.348

Patches:
Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- proprietary-insecurity.html 28 Jun 2021 13:40:29 -0000      1.164
+++ proprietary-insecurity.html 15 Jul 2021 05:47:04 -0000      1.165
@@ -71,6 +71,20 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202107090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+
+    <p>The security research firm accidentally leaked instructions on
+    how the flaw could be exploited but Windows users should still wait
+    for Microsoft to fix it, if they fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202106030">
     <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1140,7 +1154,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/28 13:40:29 $
+$Date: 2021/07/15 05:47:04 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-microsoft.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- malware-microsoft.html      13 Jun 2021 08:13:32 -0000      1.143
+++ malware-microsoft.html      15 Jul 2021 05:47:04 -0000      1.144
@@ -200,6 +200,20 @@
   bugs.</p>
 
 <ul class="blurbs">
+  <li id="M202107090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+
+    <p>The security research firm accidentally leaked instructions on
+    how the flaw could be exploited but Windows users should still wait
+    for Microsoft to fix it, if they fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202103050">
     <!--#set var="DATE" value='<small class="date-tag">2021-03</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -953,7 +967,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/13 08:13:32 $
+$Date: 2021/07/15 05:47:04 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.346
retrieving revision 1.347
diff -u -b -r1.346 -r1.347
--- proprietary.html    4 Jul 2021 05:23:19 -0000       1.346
+++ proprietary.html    15 Jul 2021 05:47:04 -0000      1.347
@@ -186,6 +186,20 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202107090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+
+    <p>The security research firm accidentally leaked instructions on
+    how the flaw could be exploited but Windows users should still wait
+    for Microsoft to fix it, if they fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202106220">
     <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -240,18 +254,6 @@
     users' smartphones</a>. The company behind it does whatever it wants
     and collects whatever data it can.</p>
   </li>
-
-  <li id="M202004131">
-    <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p>Google, Apple, and Microsoft (and probably some other companies)
-    <a href="https://www.lifewire.com/wifi-positioning-system-1683343";>are
-    collecting people's access points and GPS coordinates (which can
-    identify people's precise location) even if their GPS is turned
-    off</a>, without the person's consent, using proprietary software
-    implemented in person's smartphone. Though merely asking for permission
-    would not necessarily legitimize this.</p>
-  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">More items&hellip;</a></p>
@@ -314,7 +316,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/04 05:23:19 $
+$Date: 2021/07/15 05:47:04 $
 <!-- timestamp end -->
 </p>
 </div>

Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- all.html    4 Jul 2021 05:23:19 -0000       1.24
+++ all.html    15 Jul 2021 05:47:04 -0000      1.25
@@ -42,6 +42,18 @@
 <div class="column-limit" id="all-malware"></div>
 
 <ul class="blurbs">
+<!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-09' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
+    <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+
+    <p>The security research firm accidentally leaked instructions on
+    how the flaw could be exploited but Windows users should still wait
+    for Microsoft to fix it, if they fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
 <!--#set var='ADD' value='2021-07-04' --><!--#set var='PUB' value='2021-06-22' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Peloton company which produces treadmills recently <a
     
href="https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/";>locked
@@ -2289,7 +2301,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/04 05:23:19 $
+$Date: 2021/07/15 05:47:04 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.347
retrieving revision 1.348
diff -u -b -r1.347 -r1.348
--- workshop/mal.rec    4 Jul 2021 05:23:20 -0000       1.347
+++ workshop/mal.rec    15 Jul 2021 05:47:04 -0000      1.348
@@ -24,6 +24,23 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
+Added: 2021-07-15
+Id: 202107090
+RT: www-discuss 2021-07-12
+PubDate: 2021-07-09
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-microsoft.html insecurity
+Keywords: Insecurity, Microsoft, Windows, Security
+Blurb: <p>A newly found Microsoft Windows vulnerability <a rights.</p>
++
++   <p>The security research firm accidentally leaked instructions on
++   how the flaw could be exploited but Windows users should still wait
++   for Microsoft to fix it, if they fix it.</p>
++
++   <p><small>Please note that the article
++   wrongly refers to crackers as &ldquo<a
++   
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+
 Added: 2021-07-04
 Id: 202106220
 RT: 1735538 (www-discuss 2021-06-30)



reply via email to

[Prev in Thread] Current Thread [Next in Thread]