www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary all.html malware-microsoft.html...


From: Ali Reza Hayati
Subject: www/proprietary all.html malware-microsoft.html...
Date: Thu, 15 Jul 2021 01:49:20 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     Ali Reza Hayati <arh>   21/07/15 01:49:20

Modified files:
        proprietary    : all.html malware-microsoft.html 
                         proprietary-insecurity.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Imposed some fixes

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.347&r2=1.348
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.348&r2=1.349

Patches:
Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- all.html    15 Jul 2021 05:47:04 -0000      1.25
+++ all.html    15 Jul 2021 05:49:20 -0000      1.26
@@ -47,7 +47,7 @@
 
     <p>The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
-    for Microsoft to fix it, if they fix it.</p>
+    for Microsoft to fix the flaw, if they fix it.</p>
 
     <p><small>Please note that the article
     wrongly refers to crackers as &ldquo<a
@@ -2301,7 +2301,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 05:47:04 $
+$Date: 2021/07/15 05:49:20 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-microsoft.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- malware-microsoft.html      15 Jul 2021 05:47:04 -0000      1.144
+++ malware-microsoft.html      15 Jul 2021 05:49:20 -0000      1.145
@@ -207,7 +207,7 @@
 
     <p>The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
-    for Microsoft to fix it, if they fix it.</p>
+    for Microsoft to fix the flaw, if they fix it.</p>
 
     <p><small>Please note that the article
     wrongly refers to crackers as &ldquo<a
@@ -967,7 +967,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 05:47:04 $
+$Date: 2021/07/15 05:49:20 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary-insecurity.html 15 Jul 2021 05:47:04 -0000      1.165
+++ proprietary-insecurity.html 15 Jul 2021 05:49:20 -0000      1.166
@@ -78,7 +78,7 @@
 
     <p>The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
-    for Microsoft to fix it, if they fix it.</p>
+    for Microsoft to fix the flaw, if they fix it.</p>
 
     <p><small>Please note that the article
     wrongly refers to crackers as &ldquo<a
@@ -1154,7 +1154,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 05:47:04 $
+$Date: 2021/07/15 05:49:20 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.347
retrieving revision 1.348
diff -u -b -r1.347 -r1.348
--- proprietary.html    15 Jul 2021 05:47:04 -0000      1.347
+++ proprietary.html    15 Jul 2021 05:49:20 -0000      1.348
@@ -193,7 +193,7 @@
 
     <p>The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
-    for Microsoft to fix it, if they fix it.</p>
+    for Microsoft to fix the flaw, if they fix it.</p>
 
     <p><small>Please note that the article
     wrongly refers to crackers as &ldquo<a
@@ -316,7 +316,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 05:47:04 $
+$Date: 2021/07/15 05:49:20 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.348
retrieving revision 1.349
diff -u -b -r1.348 -r1.349
--- workshop/mal.rec    15 Jul 2021 05:47:04 -0000      1.348
+++ workshop/mal.rec    15 Jul 2021 05:49:20 -0000      1.349
@@ -35,7 +35,7 @@
 +
 +   <p>The security research firm accidentally leaked instructions on
 +   how the flaw could be exploited but Windows users should still wait
-+   for Microsoft to fix it, if they fix it.</p>
++   for Microsoft to fix the flaw, if they fix it.</p>
 +
 +   <p><small>Please note that the article
 +   wrongly refers to crackers as &ldquo<a



reply via email to

[Prev in Thread] Current Thread [Next in Thread]