[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary all.fr.html malware-microsoft.f...
From: |
GNUN |
Subject: |
www/proprietary all.fr.html malware-microsoft.f... |
Date: |
Mon, 5 Dec 2022 08:31:42 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 22/12/05 08:31:42
Modified files:
proprietary : all.fr.html malware-microsoft.fr.html
proprietary-insecurity.fr.html
proprietary.fr.html
proprietary/po : all.fr-en.html malware-microsoft.fr-en.html
proprietary-insecurity.fr-en.html
proprietary.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.fr.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr-en.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.263&r2=1.264
Patches:
Index: all.fr.html
===================================================================
RCS file: /web/www/www/proprietary/all.fr.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- all.fr.html 4 Dec 2022 11:30:30 -0000 1.70
+++ all.fr.html 5 Dec 2022 13:31:39 -0000 1.71
@@ -59,6 +59,20 @@
installées...</a></strong></p>
<ul class="blurbs">
+<!--#set var='ADD' value='2022-12-05' -->
+<!--#set var='PUB' value='2022-10-14' -->
+<li><small class='date-tag'>Ajoutâ¯: <!--#echo encoding='none' var='ADD' -->
+ – Dernière référenceâ¯: <!--#echo encoding='none' var='PUB' -->
+</small>
+ <p><a
+href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">Le
+chiffrement de Microsoft est faible</a> et vulnérable.</p>
+
+ <p>Le chiffrement est un domaine délicat où il est facile de se planter.
Il est
+judicieux d'exiger un logiciel de chiffrement qui soit (1) libre et (2)
+audité par des spécialistes.</p>
+ </li>
+
<!--#set var='ADD' value='2022-12-03' -->
<!--#set var='PUB' value='2022-11-30' -->
<li><small class='date-tag'>Ajoutâ¯: <!--#echo encoding='none' var='ADD' -->
@@ -4033,7 +4047,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2022/12/04 11:30:30 $
+$Date: 2022/12/05 13:31:39 $
<!-- timestamp end -->
</p>
Index: malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- malware-microsoft.fr.html 26 Nov 2022 13:00:49 -0000 1.129
+++ malware-microsoft.fr.html 5 Dec 2022 13:31:40 -0000 1.130
@@ -264,6 +264,21 @@
que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
<ul class="blurbs">
+ <li id="M202210140">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2022-10</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">Le
+chiffrement de Microsoft est faible</a> et vulnérable.</p>
+
+ <p>Le chiffrement est un domaine délicat où il est facile de se planter.
Il est
+judicieux d'exiger un logiciel de chiffrement qui soit (1) libre et (2)
+audité par des spécialistes.</p>
+ </li>
+
<li id="M202202090">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1246,7 +1261,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2022/11/26 13:00:49 $
+$Date: 2022/12/05 13:31:40 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- proprietary-insecurity.fr.html 26 Nov 2022 13:00:49 -0000 1.149
+++ proprietary-insecurity.fr.html 5 Dec 2022 13:31:40 -0000 1.150
@@ -124,6 +124,21 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202210140">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2022-10</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">Le
+chiffrement de Microsoft est faible</a> et vulnérable.</p>
+
+ <p>Le chiffrement est un domaine délicat où il est facile de se planter.
Il est
+judicieux d'exiger un logiciel de chiffrement qui soit (1) libre et (2)
+audité par des spécialistes.</p>
+ </li>
+
<li id="M202208240">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1653,7 +1668,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2022/11/26 13:00:49 $
+$Date: 2022/12/05 13:31:40 $
<!-- timestamp end -->
</p>
Index: proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary.fr.html 4 Dec 2022 11:30:30 -0000 1.276
+++ proprietary.fr.html 5 Dec 2022 13:31:40 -0000 1.277
@@ -241,6 +241,21 @@
installées...</a></strong></p>
<ul class="blurbs">
+ <li id="M202210140">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2022-10</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">Le
+chiffrement de Microsoft est faible</a> et vulnérable.</p>
+
+ <p>Le chiffrement est un domaine délicat où il est facile de se planter.
Il est
+judicieux d'exiger un logiciel de chiffrement qui soit (1) libre et (2)
+audité par des spécialistes.</p>
+ </li>
+
<li id="M202211300">
<!--#set var="DATE" value='<small class="date-tag">
@@ -388,22 +403,6 @@
<p><small>(Notez que cet article utilise le terme «â¯hackersâ¯Â» Ã
mauvais
escient.)</small></p>
</li>
-
- <li id="M202208070">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2022-08</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p>Certaines imprimantes Epson sont programmées pour <a
-href="https://hardware.slashdot.org/story/22/08/07/0350244/epson-programs-some-printers-to-stop-operating-claiming-danger-of-ink-spills">arrêter
-de fonctionner quand elles ont imprimé un nombre prédéterminé de pages</a>,
-sous prétexte que les tampons encreurs sont saturés d'encre. Cela constitue
-une atteinte inacceptable à la liberté de l'utilisateur d'utiliser son
-imprimante comme il le souhaite et à son <a
-href="https://fighttorepair.substack.com/p/citing-danger-of-ink-spills-epson">droit
-de la réparer</a>.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">Voir plus…</a></p>
@@ -483,7 +482,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2022/12/04 11:30:30 $
+$Date: 2022/12/05 13:31:40 $
<!-- timestamp end -->
</p>
Index: po/all.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr-en.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- po/all.fr-en.html 4 Dec 2022 11:30:32 -0000 1.66
+++ po/all.fr-en.html 5 Dec 2022 13:31:41 -0000 1.67
@@ -50,6 +50,17 @@
to detect once installed...</a></strong></p>
<ul class="blurbs">
+<!--#set var='ADD' value='2022-12-05' --><!--#set var='PUB' value='2022-10-14'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ The Microsoft Office encryption is weak</a>, and susceptible to
+ attack.</p>
+
+ <p>Encryption is a tricky field, and easy to mess up. It is wise
+ to insist on encryption software that is (1) free software and (2)
+ studied by experts.</p>
+ </li>
+
<!--#set var='ADD' value='2022-12-03' --><!--#set var='PUB' value='2022-11-30'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p><a href="https://www.techarp.com/mobile/apple-china-limit-airdrop/">
Obeying a demand by the Chinese government, Apple restricted the
@@ -2963,7 +2974,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/12/04 11:30:32 $
+$Date: 2022/12/05 13:31:41 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- po/malware-microsoft.fr-en.html 26 Nov 2022 13:00:50 -0000 1.118
+++ po/malware-microsoft.fr-en.html 5 Dec 2022 13:31:41 -0000 1.119
@@ -234,6 +234,19 @@
bugs.</p>
<ul class="blurbs">
+ <li id="M202210140">
+ <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ The Microsoft Office encryption is weak</a>, and susceptible to
+ attack.</p>
+
+ <p>Encryption is a tricky field, and easy to mess up. It is wise
+ to insist on encryption software that is (1) free software and (2)
+ studied by experts.</p>
+ </li>
+
<li id="M202202090">
<!--#set var="DATE" value='<small class="date-tag">2022-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1027,7 +1040,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/11/26 13:00:50 $
+$Date: 2022/12/05 13:31:41 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- po/proprietary-insecurity.fr-en.html 26 Nov 2022 13:00:50 -0000
1.139
+++ po/proprietary-insecurity.fr-en.html 5 Dec 2022 13:31:41 -0000
1.140
@@ -113,6 +113,19 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202210140">
+ <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ The Microsoft Office encryption is weak</a>, and susceptible to
+ attack.</p>
+
+ <p>Encryption is a tricky field, and easy to mess up. It is wise
+ to insist on encryption software that is (1) free software and (2)
+ studied by experts.</p>
+ </li>
+
<li id="M202208240">
<!--#set var="DATE" value='<small class="date-tag">2022-08</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1317,7 +1330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/11/26 13:00:50 $
+$Date: 2022/12/05 13:31:41 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- po/proprietary.fr-en.html 4 Dec 2022 11:30:32 -0000 1.263
+++ po/proprietary.fr-en.html 5 Dec 2022 13:31:41 -0000 1.264
@@ -225,6 +225,19 @@
to detect once installed...</a></strong></p>
<ul class="blurbs">
+ <li id="M202210140">
+ <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ The Microsoft Office encryption is weak</a>, and susceptible to
+ attack.</p>
+
+ <p>Encryption is a tricky field, and easy to mess up. It is wise
+ to insist on encryption software that is (1) free software and (2)
+ studied by experts.</p>
+ </li>
+
<li id="M202211300">
<!--#set var="DATE" value='<small class="date-tag">2022-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -354,19 +367,6 @@
<p><small>Please note that the article wrongly refers
to crackers as “hackers.”</small></p>
</li>
-
- <li id="M202208070">
- <!--#set var="DATE" value='<small class="date-tag">2022-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Some Epson printers are programmed to <a
-
href="https://hardware.slashdot.org/story/22/08/07/0350244/epson-programs-some-printers-to-stop-operating-claiming-danger-of-ink-spills">
- stop working after they have printed a predetermined number
- of pages</a>, on the pretext that ink pads become saturated
- with ink. This constitutes an unacceptable infringement on
- users' freedom to use their printers as they wish, and on their <a
-
href="https://fighttorepair.substack.com/p/citing-danger-of-ink-spills-epson">
- right to repair them</a>.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -429,7 +429,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/12/04 11:30:32 $
+$Date: 2022/12/05 13:31:41 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary all.fr.html malware-microsoft.f...,
GNUN <=