www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary all.html malware-mobiles.html m...


From: Therese Godefroy
Subject: www/proprietary all.html malware-mobiles.html m...
Date: Sun, 25 Jul 2021 01:52:33 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 21/07/25 01:52:33

Modified files:
        proprietary    : all.html malware-mobiles.html 
                         malware-webpages.html 
                         proprietary-interference.html 
                         proprietary-surveillance.html 
        proprietary/workshop: mal.rec 

Log message:
        Fix forward loops.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.401&r2=1.402
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.355&r2=1.356

Patches:
Index: all.html
===================================================================
RCS file: /webcvs/www/www/proprietary/all.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- all.html    15 Jul 2021 07:18:30 -0000      1.32
+++ all.html    25 Jul 2021 05:52:32 -0000      1.33
@@ -1307,7 +1307,7 @@
 
 <!--#set var='ADD' value='2019-08-03' --><!--#set var='PUB' value='2019-07-08' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Many unscrupulous mobile-app developers keep finding ways to <a
-    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
+    
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
     bypass user's settings</a>, regulations, and privacy-enhancing features
     of the operating system, in order to gather as much private data as
     they possibly can.</p>
@@ -2174,7 +2174,7 @@
     visitors wouldn't have been affected if they had used <a
     href="/software/librejs/index.html">LibreJS</a>. Some
     browser extensions that <a
-    
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
+    
href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
     specifically block JavaScript miners</a> are also available.</p>
   </li>
 
@@ -2315,7 +2315,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 07:18:30 $
+$Date: 2021/07/25 05:52:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- malware-mobiles.html        22 Jun 2021 06:36:52 -0000      1.155
+++ malware-mobiles.html        25 Jul 2021 05:52:32 -0000      1.156
@@ -766,7 +766,7 @@
     <!--#set var="DATE" value='<small class="date-tag">2019-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
     <p>Many unscrupulous mobile-app developers keep finding ways to <a
-    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
+    
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
     bypass user's settings</a>, regulations, and privacy-enhancing features
     of the operating system, in order to gather as much private data as
     they possibly can.</p>
@@ -1590,7 +1590,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/22 06:36:52 $
+$Date: 2021/07/25 05:52:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-webpages.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-webpages.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- malware-webpages.html       1 Jun 2021 09:21:51 -0000       1.37
+++ malware-webpages.html       25 Jul 2021 05:52:32 -0000      1.38
@@ -116,7 +116,7 @@
     visitors wouldn't have been affected if they had used <a
     href="/software/librejs/index.html">LibreJS</a>. Some
     browser extensions that <a
-    
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
+    
href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
     specifically block JavaScript miners</a> are also available.</p>
   </li>
 
@@ -310,7 +310,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/01 09:21:51 $
+$Date: 2021/07/25 05:52:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-interference.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-interference.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary-interference.html       28 Jun 2021 06:49:45 -0000      1.78
+++ proprietary-interference.html       25 Jul 2021 05:52:32 -0000      1.79
@@ -248,7 +248,7 @@
     visitors wouldn't have been affected if they had used <a
     href="/software/librejs/index.html">LibreJS</a>. Some
     browser extensions that <a
-    
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
+    
href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
     specifically block JavaScript miners</a> are also available.</p>
   </li>
 
@@ -443,7 +443,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/28 06:49:45 $
+$Date: 2021/07/25 05:52:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.401
retrieving revision 1.402
diff -u -b -r1.401 -r1.402
--- proprietary-surveillance.html       3 Jul 2021 08:11:07 -0000       1.401
+++ proprietary-surveillance.html       25 Jul 2021 05:52:32 -0000      1.402
@@ -1282,7 +1282,7 @@
     <!--#set var="DATE" value='<small class="date-tag">2019-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
     <p>Many unscrupulous mobile-app developers keep finding ways to <a
-    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
+    
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
     bypass user's settings</a>, regulations, and privacy-enhancing features
     of the operating system, in order to gather as much private data as
     they possibly can.</p>
@@ -3496,7 +3496,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/03 08:11:07 $
+$Date: 2021/07/25 05:52:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.355
retrieving revision 1.356
diff -u -b -r1.355 -r1.356
--- workshop/mal.rec    15 Jul 2021 07:18:30 -0000      1.355
+++ workshop/mal.rec    25 Jul 2021 05:52:33 -0000      1.356
@@ -1954,7 +1954,7 @@
 Target: malware-mobiles.html surveillance
 Keywords:
 Blurb: <p>Many unscrupulous mobile-app developers keep finding ways to <a
-+   
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
++   
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
 +   bypass user's settings</a>, regulations, and privacy-enhancing features
 +   of the operating system, in order to gather as much private data as
 +   they possibly can.</p>
@@ -3184,7 +3184,7 @@
 +   visitors wouldn't have been affected if they had used <a
 +   href="/software/librejs/index.html">LibreJS</a>. Some
 +   browser extensions that <a
-+   
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
++   
href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
 +   specifically block JavaScript miners</a> are also available.</p>
 
 Added: 2018-10-11



reply via email to

[Prev in Thread] Current Thread [Next in Thread]