[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www proprietary/all.fr.html proprietary/malware...
From: |
GNUN |
Subject: |
www proprietary/all.fr.html proprietary/malware... |
Date: |
Thu, 15 Jul 2021 05:33:33 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/07/15 05:33:33
Modified files:
proprietary : all.fr.html malware-microsoft.fr.html
potential-malware.fr.html
proprietary-insecurity.fr.html
proprietary-manipulation.fr.html
proprietary.fr.html
proprietary/po : all.fr-en.html malware-microsoft.fr-en.html
potential-malware.fr-en.html
proprietary-censorship.fr-en.html
proprietary-insecurity.fr-en.html
proprietary-manipulation.fr-en.html
proprietary.fr-en.html
server : body-include-1.fr.html
server/po : body-include-1.fr.po sitemap.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.fr.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.fr.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-manipulation.fr.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.fr-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.fr-en.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.fr-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/server/body-include-1.fr.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/body-include-1.fr.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.fr-en.html?cvsroot=www&r1=1.329&r2=1.330
Patches:
Index: proprietary/all.fr.html
===================================================================
RCS file: /web/www/www/proprietary/all.fr.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/all.fr.html 4 Jul 2021 19:29:43 -0000 1.17
+++ proprietary/all.fr.html 15 Jul 2021 09:33:32 -0000 1.18
@@ -47,6 +47,40 @@
<div class="column-limit" id="all-malware"></div>
<ul class="blurbs">
+<!--#set var='ADD' value='2021-07-15' -->
+<!--#set var='PUB' value='2021-07-09' -->
+<li><small class='date-tag'>Ajout : <!--#echo encoding='none' var='ADD' -->
+ – Dernière référence : <!--#echo encoding='none' var='PUB' -->
+</small>
+ <p>Une vulnérabilité détectée récemment dans Microsoft Windows <a
+href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">permet
+à des pirates d'avoir accès au système d'exploitation</a> pour installer des
+programmes, voir et supprimer des données et même créer de nouveaux comptes
+utilisateurs avec tous les droits.</p>
+
+ <p>L'entreprise de recherche en sécurité a divulgué accidentellement des
+instructions sur la manière d'exploiter cette faille, mais les utilisateurs
+de Windows attendent toujours que Microsoft la corrige â si jamais ils la
+corrigent.</p>
+
+ <p><small>(Notez que cet article utilise le terme « <a
+href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
+escient.)</small></p>
+ </li>
+
+<!--#set var='ADD' value='2021-07-15' -->
+<!--#set var='PUB' value='2021-07-05' -->
+<li><small class='date-tag'>Ajout : <!--#echo encoding='none' var='ADD' -->
+ – Dernière référence : <!--#echo encoding='none' var='PUB' -->
+</small>
+ <p>Des publicitaires sont en train d'expérimenter une technique de
manipulation
+mentale consistant à <a
+href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">altérer
+les rêves</a> pour promouvoir un produit. D'après eux, cette « incubation
+ciblée des rêves » est censée provoquer chez le sujet des « rêves de
+réactivation ».</p>
+ </li>
+
<!--#set var='ADD' value='2021-07-04' -->
<!--#set var='PUB' value='2021-06-22' -->
<li><small class='date-tag'>Ajout : <!--#echo encoding='none' var='ADD' -->
@@ -3101,7 +3135,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2021/07/04 19:29:43 $
+$Date: 2021/07/15 09:33:32 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary/malware-microsoft.fr.html 13 Jun 2021 11:59:14 -0000
1.117
+++ proprietary/malware-microsoft.fr.html 15 Jul 2021 09:33:32 -0000
1.118
@@ -228,6 +228,28 @@
que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
<ul class="blurbs">
+ <li id="M202107090">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Une vulnérabilité détectée récemment dans Microsoft Windows <a
+href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">permet
+à des pirates d'avoir accès au système d'exploitation</a> pour installer des
+programmes, voir et supprimer des données et même créer de nouveaux comptes
+utilisateurs avec tous les droits.</p>
+
+ <p>L'entreprise de recherche en sécurité a divulgué accidentellement des
+instructions sur la manière d'exploiter cette faille, mais les utilisateurs
+de Windows attendent toujours que Microsoft la corrige â si jamais ils la
+corrigent.</p>
+
+ <p><small>(Notez que cet article utilise le terme « <a
+href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
+escient.)</small></p>
+ </li>
+
<li id="M202103050">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1160,7 +1182,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2021/06/13 11:59:14 $
+$Date: 2021/07/15 09:33:32 $
<!-- timestamp end -->
</p>
Index: proprietary/potential-malware.fr.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.fr.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/potential-malware.fr.html 1 Jun 2021 09:43:54 -0000
1.24
+++ proprietary/potential-malware.fr.html 15 Jul 2021 09:33:32 -0000
1.25
@@ -59,6 +59,20 @@
<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
+ <li id="M202107050">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Des publicitaires sont en train d'expérimenter une technique de
manipulation
+mentale consistant à <a
+href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">altérer
+les rêves</a> pour promouvoir un produit. D'après eux, cette « incubation
+ciblée des rêves » est censée provoquer chez le sujet des « rêves de
+réactivation ».</p>
+ </li>
+
<li id="M201903280">
<!--#set var="DATE" value='<small class="date-tag">
@@ -234,7 +248,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2021/06/01 09:43:54 $
+$Date: 2021/07/15 09:33:32 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary/proprietary-insecurity.fr.html 30 Jun 2021 18:29:45 -0000
1.131
+++ proprietary/proprietary-insecurity.fr.html 15 Jul 2021 09:33:32 -0000
1.132
@@ -79,6 +79,28 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202107090">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Une vulnérabilité détectée récemment dans Microsoft Windows <a
+href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">permet
+à des pirates d'avoir accès au système d'exploitation</a> pour installer des
+programmes, voir et supprimer des données et même créer de nouveaux comptes
+utilisateurs avec tous les droits.</p>
+
+ <p>L'entreprise de recherche en sécurité a divulgué accidentellement des
+instructions sur la manière d'exploiter cette faille, mais les utilisateurs
+de Windows attendent toujours que Microsoft la corrige â si jamais ils la
+corrigent.</p>
+
+ <p><small>(Notez que cet article utilise le terme « <a
+href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
+escient.)</small></p>
+ </li>
+
<li id="M202106030">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1440,7 +1462,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2021/06/30 18:29:45 $
+$Date: 2021/07/15 09:33:32 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-manipulation.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-manipulation.fr.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/proprietary-manipulation.fr.html 4 Jul 2021 19:29:43
-0000 1.22
+++ proprietary/proprietary-manipulation.fr.html 15 Jul 2021 09:33:32
-0000 1.23
@@ -74,6 +74,20 @@
<div class="column-limit" id="proprietary-manipulation"></div>
<ul class="blurbs">
+ <li id="M202107050">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Des publicitaires sont en train d'expérimenter une technique de
manipulation
+mentale consistant à <a
+href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">altérer
+les rêves</a> pour promouvoir un produit. D'après eux, cette « incubation
+ciblée des rêves » est censée provoquer chez le sujet des « rêves de
+réactivation ».</p>
+ </li>
+
<li id="M202106220">
<!--#set var="DATE" value='<small class="date-tag">
@@ -285,7 +299,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2021/07/04 19:29:43 $
+$Date: 2021/07/15 09:33:32 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- proprietary/proprietary.fr.html 4 Jul 2021 07:33:26 -0000 1.232
+++ proprietary/proprietary.fr.html 15 Jul 2021 09:33:32 -0000 1.233
@@ -102,9 +102,9 @@
<hr class="thin" />
</div>
-<p>En juin 2021, les pages de ce répertoire dénombraient à peu près 500
cas de
-fonctionnalités malveillante (appuyés par plus de 600 références), mais il
y
-en a sûrement des milliers d'autres dont nous ne savons rien.</p>
+<p>En juillet 2021, les pages de ce répertoire dénombraient à peu près 500
cas
+de fonctionnalités malveillante (appuyés par plus de 610 références), mais
+il y en a sûrement des milliers d'autres dont nous ne savons rien.</p>
<p>Si vous voulez être informé des nouvelles rubriques ou autres changements,
abonnez-vous à la <a
@@ -197,6 +197,42 @@
<h3 id="latest">Ajouts récents</h3>
<ul class="blurbs">
+ <li id="M202107090">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Une vulnérabilité détectée récemment dans Microsoft Windows <a
+href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">permet
+à des pirates d'avoir accès au système d'exploitation</a> pour installer des
+programmes, voir et supprimer des données et même créer de nouveaux comptes
+utilisateurs avec tous les droits.</p>
+
+ <p>L'entreprise de recherche en sécurité a divulgué accidentellement des
+instructions sur la manière d'exploiter cette faille, mais les utilisateurs
+de Windows attendent toujours que Microsoft la corrige â si jamais ils la
+corrigent.</p>
+
+ <p><small>(Notez que cet article utilise le terme « <a
+href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
+escient.)</small></p>
+ </li>
+
+ <li id="M202107050">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Des publicitaires sont en train d'expérimenter une technique de
manipulation
+mentale consistant à <a
+href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">altérer
+les rêves</a> pour promouvoir un produit. D'après eux, cette « incubation
+ciblée des rêves » est censée provoquer chez le sujet des « rêves de
+réactivation ».</p>
+ </li>
+
<li id="M202106220">
<!--#set var="DATE" value='<small class="date-tag">
@@ -252,34 +288,6 @@
activités. Certaines de ces applis traquent les utilisateurs sur différentes
plateformes.</p>
</li>
-
- <li id="M202106030">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2021-06</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">L'appli
-TikTok pour smartphone collecte des informations et identifiants
-biométriques</a>. Son éditeur récupère tout ce qui est à sa portée et
fait
-ce qu'il veut avec.</p>
- </li>
-
- <li id="M202004131">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2020-04</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p>Google, Apple et Microsoft (ainsi que d'autres, probablement) <a
-href="https://www.lifewire.com/wifi-positioning-system-1683343">enregistrent
-les points d'accès wifi et les coordonnées GPS des gens</a>, ce qui permet
-de les localiser précisément même si le GPS est éteint, ceci sans leur
-consentement et en utilisant le logiciel privateur installé dans leur
-téléphone. Même si on leur demandait la permission, cela ne légitimerait
pas
-nécessairement cette pratique.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">Voir plus…</a></p>
@@ -359,7 +367,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2021/07/04 07:33:26 $
+$Date: 2021/07/15 09:33:32 $
<!-- timestamp end -->
</p>
Index: proprietary/po/all.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/all.fr-en.html 4 Jul 2021 07:33:28 -0000 1.13
+++ proprietary/po/all.fr-en.html 15 Jul 2021 09:33:32 -0000 1.14
@@ -42,6 +42,32 @@
<div class="column-limit" id="all-malware"></div>
<ul class="blurbs">
+<!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-09'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
+ <p>A newly found Microsoft Windows vulnerability <a
+
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
+ can allow crackers to remotely gain access to the operating system</a>
+ and install programs, view and delete data, or even create new user
+ accounts with full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
+<!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-05'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
+ <p><a
+
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
+ Advertising companies are experimenting to manipulate people's
+ minds</a>, and impose a new way of advertising by altering their
+ dreams. This “targeted dream incubation” would trigger
+ “refreshing dreams” of the product, according to the
+ companies.</p>
+ </li>
+
<!--#set var='ADD' value='2021-07-04' --><!--#set var='PUB' value='2021-06-22'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Peloton company which produces treadmills recently <a
href="https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/">locked
@@ -2289,7 +2315,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 07:33:28 $
+$Date: 2021/07/15 09:33:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary/po/malware-microsoft.fr-en.html 13 Jun 2021 11:59:15 -0000
1.107
+++ proprietary/po/malware-microsoft.fr-en.html 15 Jul 2021 09:33:32 -0000
1.108
@@ -200,6 +200,24 @@
bugs.</p>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
+
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
+ can allow crackers to remotely gain access to the operating system</a>
+ and install programs, view and delete data, or even create new user
+ accounts with full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<li id="M202103050">
<!--#set var="DATE" value='<small class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -953,7 +971,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/13 11:59:15 $
+$Date: 2021/07/15 09:33:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/potential-malware.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.fr-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/potential-malware.fr-en.html 1 Jun 2021 09:44:00 -0000
1.22
+++ proprietary/po/potential-malware.fr-en.html 15 Jul 2021 09:33:32 -0000
1.23
@@ -54,6 +54,18 @@
<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
+ <li id="M202107050">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
+ Advertising companies are experimenting to manipulate people's
+ minds</a>, and impose a new way of advertising by altering their
+ dreams. This “targeted dream incubation” would trigger
+ “refreshing dreams” of the product, according to the
+ companies.</p>
+ </li>
+
<li id="M201903280">
<!--#set var="DATE" value='<small class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -193,7 +205,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:44:00 $
+$Date: 2021/07/15 09:33:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-censorship.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.fr-en.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary/po/proprietary-censorship.fr-en.html 1 Jun 2021 09:44:00
-0000 1.37
+++ proprietary/po/proprietary-censorship.fr-en.html 15 Jul 2021 09:33:32
-0000 1.38
@@ -50,7 +50,7 @@
<p>One kind of malicious functionality is censorship of what
users can access. Here are examples of programs which do this.
We have a <a
-href="/proprietary/proprietary-jails.html#about-page">separate
+href="/proprietary/proprietary-jails.html">separate
list of proprietary systems that censor installation</a> of
application programs (we call them “jails”).</p>
@@ -212,7 +212,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:44:00 $
+$Date: 2021/07/15 09:33:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary/po/proprietary-insecurity.fr-en.html 30 Jun 2021 18:29:45
-0000 1.118
+++ proprietary/po/proprietary-insecurity.fr-en.html 15 Jul 2021 09:33:32
-0000 1.119
@@ -71,6 +71,24 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
+
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
+ can allow crackers to remotely gain access to the operating system</a>
+ and install programs, view and delete data, or even create new user
+ accounts with full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<li id="M202106030">
<!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1140,7 +1158,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/30 18:29:45 $
+$Date: 2021/07/15 09:33:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-manipulation.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.fr-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-manipulation.fr-en.html 4 Jul 2021 07:33:30
-0000 1.18
+++ proprietary/po/proprietary-manipulation.fr-en.html 15 Jul 2021 09:33:33
-0000 1.19
@@ -68,6 +68,18 @@
<div class="column-limit" id="proprietary-manipulation"></div>
<ul class="blurbs">
+ <li id="M202107050">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
+ Advertising companies are experimenting to manipulate people's
+ minds</a>, and impose a new way of advertising by altering their
+ dreams. This “targeted dream incubation” would trigger
+ “refreshing dreams” of the product, according to the
+ companies.</p>
+ </li>
+
<li id="M202106220">
<!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -236,7 +248,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 07:33:30 $
+$Date: 2021/07/15 09:33:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary/po/proprietary.fr-en.html 4 Jul 2021 07:33:30 -0000
1.217
+++ proprietary/po/proprietary.fr-en.html 15 Jul 2021 09:33:33 -0000
1.218
@@ -96,8 +96,8 @@
<hr class="thin" />
</div>
-<p>As of June, 2021, the pages in this directory list around 500
-instances of malicious functionalities (with more than 600 references to
+<p>As of July, 2021, the pages in this directory list around 500
+instances of malicious functionalities (with more than 610 references to
back them up), but there are surely thousands more we don't know about.</p>
<p>If you want to be notified when we add new items or make other changes,
@@ -186,6 +186,36 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
+
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
+ can allow crackers to remotely gain access to the operating system</a>
+ and install programs, view and delete data, or even create new user
+ accounts with full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
+ <li id="M202107050">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
+ Advertising companies are experimenting to manipulate people's
+ minds</a>, and impose a new way of advertising by altering their
+ dreams. This “targeted dream incubation” would trigger
+ “refreshing dreams” of the product, according to the
+ companies.</p>
+ </li>
+
<li id="M202106220">
<!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -230,28 +260,6 @@
track user activities. Some of these applications are tracking users
across different platforms.</p>
</li>
-
- <li id="M202106030">
- <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok
- apps collect biometric identifiers and biometric information from
- users' smartphones</a>. The company behind it does whatever it wants
- and collects whatever data it can.</p>
- </li>
-
- <li id="M202004131">
- <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google, Apple, and Microsoft (and probably some other companies)
- <a href="https://www.lifewire.com/wifi-positioning-system-1683343">are
- collecting people's access points and GPS coordinates (which can
- identify people's precise location) even if their GPS is turned
- off</a>, without the person's consent, using proprietary software
- implemented in person's smartphone. Though merely asking for permission
- would not necessarily legitimize this.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -314,7 +322,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 07:33:30 $
+$Date: 2021/07/15 09:33:33 $
<!-- timestamp end -->
</p>
</div>
Index: server/body-include-1.fr.html
===================================================================
RCS file: /web/www/www/server/body-include-1.fr.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- server/body-include-1.fr.html 15 Jul 2021 07:02:48 -0000 1.48
+++ server/body-include-1.fr.html 15 Jul 2021 09:33:33 -0000 1.49
@@ -13,10 +13,11 @@
<div class="message">
<p>
<!--#echo encoding='none' var='fr_link' -->
-Your donation helps us lead the journey to freedom for all computer
-users. Help us maximize our summer fundraising goal by donating before July
-19 — Every contribution will be matched dollar for dollar by generous
-donors up to USD 11,000. <span class="highlight">Read more ></span>
+Votre don nous aide à conduire tous les utilisateurs de l'informatique vers
+la liberté. Aidez-nous à optimiser le résultat de notre appel de fonds en
+faisant un don avant le 19 juillet. Chaque contribution sera abondée de la
+même somme par de généreux donateurs jusqu'à 11 000 $. <span
+class="highlight">En savoir plus ></span>
<!--#echo
encoding='none' var='a_close' -->
</p>
@@ -50,7 +51,7 @@
<!--#echo encoding="none" var="a_close" -->
<!--#echo encoding='none' var="d_val" -->
</div>
- <span class="goal">USD 11,000</span>
+ <span class="goal">11Â 000Â $</span>
</div>
</div>
<!-- .progresswidget -->
Index: server/po/body-include-1.fr.po
===================================================================
RCS file: /web/www/www/server/po/body-include-1.fr.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- server/po/body-include-1.fr.po 15 Jul 2021 09:18:56 -0000 1.51
+++ server/po/body-include-1.fr.po 15 Jul 2021 09:33:33 -0000 1.52
@@ -34,8 +34,8 @@
"Votre don nous aide à conduire tous les utilisateurs de l'informatique vers "
"la liberté. Aidez-nous à optimiser le résultat de notre appel de fonds en "
"faisant un don avant le 19 juillet. Chaque contribution sera abondée de la "
-"même somme par de généreux donateurs jusqu'à 11 000 $. <span
class=\"highlight"
-"\">En savoir plus ></span>"
+"même somme par de généreux donateurs jusqu'à 11 000 $. <span class="
+"\"highlight\">En savoir plus ></span>"
#. type: Content of: <div><div>
msgid "<span class=\"goal\">USD 11,000</span>"
Index: server/po/sitemap.fr-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.fr-en.html,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- server/po/sitemap.fr-en.html 12 Jul 2021 19:00:46 -0000 1.329
+++ server/po/sitemap.fr-en.html 15 Jul 2021 09:33:33 -0000 1.330
@@ -456,7 +456,7 @@
<dt><a href="/fun/jokes/hap-bash.html">hap-bash.html</a></dt>
<dd>Happiness is a Bash Prompt</dd>
<dt><a href="/fun/jokes/happy-new-year.html">happy-new-year.html</a></dt>
- <dd>Happy New Year in 4 languages</dd>
+ <dd>Happy New Year in four languages</dd>
<dt><a
href="/fun/jokes/hello_world_patent.html">hello_world_patent.html</a></dt>
<dd>The YAAS Foundation Patent Suit</dd>
<dt><a href="/fun/jokes/helloworld.html">helloworld.html</a></dt>
@@ -474,7 +474,7 @@
<dt><a href="/fun/jokes/luser-vs-rms.html">luser-vs-rms.html</a></dt>
<dd>Luser vs RMS</dd>
<dt><a href="/fun/jokes/merry-xmas.html">merry-xmas.html</a></dt>
- <dd>Merry Christmas in 4 languages</dd>
+ <dd>Merry Christmas in four languages</dd>
<dt><a href="/fun/jokes/microsoft-church.html">microsoft-church.html</a></dt>
<dd>Microsoft and the Church</dd>
<dt><a href="/fun/jokes/midnight.dreary.html">midnight.dreary.html</a></dt>
@@ -530,7 +530,7 @@
<dt><a href="/fun/jokes/users-lightbulb.html">users-lightbulb.html</a></dt>
<dd>How many GNU/Linux users are needed to change a light bulb?</dd>
<dt><a href="/fun/jokes/vaxorcist.html">vaxorcist.html</a></dt>
- <dd>THE VAXORCIST</dd>
+ <dd>The VAXorcist</dd>
<dt><a href="/fun/jokes/vi.song.html">vi.song.html</a></dt>
<dd>Addicted to <code>vi</code></dd>
<dt><a href="/fun/jokes/vim-songs.html">vim-songs.html</a></dt>
@@ -2090,7 +2090,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/12 19:00:46 $
+$Date: 2021/07/15 09:33:33 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www proprietary/all.fr.html proprietary/malware...,
GNUN <=