www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary all.html malware-apple.html pro...


From: Ali Reza Hayati
Subject: www/proprietary all.html malware-apple.html pro...
Date: Sun, 19 Dec 2021 02:04:25 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     Ali Reza Hayati <arh>   21/12/19 02:04:25

Modified files:
        proprietary    : all.html malware-apple.html 
                         proprietary-insecurity.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Minor blurb fix

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.391&r2=1.392
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.399&r2=1.400

Patches:
Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- all.html    19 Dec 2021 07:01:00 -0000      1.69
+++ all.html    19 Dec 2021 07:04:24 -0000      1.70
@@ -43,11 +43,11 @@
 
 <ul class="blurbs">
 <!--#set var='ADD' value='2021-12-19' --><!--#set var='PUB' value='2021-11-11' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
-    <p>Some researchers at Google <a
-    
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users";>found
-    a zero-day vulnerability on MacOS crackers used to target Hong Kong
-    people visiting websites</a> for media outlets and pro-democracy
-    labor and political group.</p>
+    <p>Some researchers at Google
+  <a
+  which crackers used to target people visiting the websites</a> of
+  a media outlet and a pro-democracy labor and political group in Hong
+  Kong.</p>
 
     <p><small>Please note that the article     wrongly refers
     to crackers as &ldquo;<a     href="/philosophy/words-to-
@@ -2517,7 +2517,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/12/19 07:01:00 $
+$Date: 2021/12/19 07:04:24 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-apple.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.html,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- malware-apple.html  19 Dec 2021 07:01:00 -0000      1.152
+++ malware-apple.html  19 Dec 2021 07:04:25 -0000      1.153
@@ -266,11 +266,11 @@
   <li id="M202111110">
     <!--#set var="DATE" value='<small class="date-tag">2021-11</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p>Some researchers at Google <a
-    
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users";>found
-    a zero-day vulnerability on MacOS crackers used to target Hong Kong
-    people visiting websites</a> for media outlets and pro-democracy
-    labor and political group.</p>
+    <p>Some researchers at Google
+  <a
+  which crackers used to target people visiting the websites</a> of
+  a media outlet and a pro-democracy labor and political group in Hong
+  Kong.</p>
 
     <p><small>Please note that the article     wrongly refers
     to crackers as &ldquo;<a     href="/philosophy/words-to-
@@ -1246,7 +1246,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/12/19 07:01:00 $
+$Date: 2021/12/19 07:04:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary-insecurity.html 19 Dec 2021 07:01:00 -0000      1.185
+++ proprietary-insecurity.html 19 Dec 2021 07:04:25 -0000      1.186
@@ -82,11 +82,11 @@
   <li id="M202111110">
     <!--#set var="DATE" value='<small class="date-tag">2021-11</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p>Some researchers at Google <a
-    
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users";>found
-    a zero-day vulnerability on MacOS crackers used to target Hong Kong
-    people visiting websites</a> for media outlets and pro-democracy
-    labor and political group.</p>
+    <p>Some researchers at Google
+  <a
+  which crackers used to target people visiting the websites</a> of
+  a media outlet and a pro-democracy labor and political group in Hong
+  Kong.</p>
 
     <p><small>Please note that the article     wrongly refers
     to crackers as &ldquo;<a     href="/philosophy/words-to-
@@ -1223,7 +1223,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/12/19 07:01:00 $
+$Date: 2021/12/19 07:04:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.391
retrieving revision 1.392
diff -u -b -r1.391 -r1.392
--- proprietary.html    19 Dec 2021 07:01:00 -0000      1.391
+++ proprietary.html    19 Dec 2021 07:04:25 -0000      1.392
@@ -191,11 +191,11 @@
   <li id="M202111110">
     <!--#set var="DATE" value='<small class="date-tag">2021-11</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p>Some researchers at Google <a
-    
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users";>found
-    a zero-day vulnerability on MacOS crackers used to target Hong Kong
-    people visiting websites</a> for media outlets and pro-democracy
-    labor and political group.</p>
+    <p>Some researchers at Google
+  <a
+  which crackers used to target people visiting the websites</a> of
+  a media outlet and a pro-democracy labor and political group in Hong
+  Kong.</p>
 
     <p><small>Please note that the article     wrongly refers
     to crackers as &ldquo;<a     href="/philosophy/words-to-
@@ -311,7 +311,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/12/19 07:01:00 $
+$Date: 2021/12/19 07:04:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.399
retrieving revision 1.400
diff -u -b -r1.399 -r1.400
--- workshop/mal.rec    19 Dec 2021 07:01:00 -0000      1.399
+++ workshop/mal.rec    19 Dec 2021 07:04:25 -0000      1.400
@@ -31,11 +31,13 @@
 Target: proprietary-insecurity.html proprietary-insecurity
 Target: malware-apple.html insecurity
 Keywords: Insecurity, Apple, MacOS
-Blurb: <p>Some researchers at Google <a
-+   
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users";>found
-+   a zero-day vulnerability on MacOS crackers used to target Hong Kong
-+   people visiting websites</a> for media outlets and pro-democracy
-+   labor and political group.</p>
+Blurb: <p>Some researchers at Google
++ <a
+href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users";>found
+a zero-day vulnerability on MacOS,
++ which crackers used to target people visiting the websites</a> of
++ a media outlet and a pro-democracy labor and political group in Hong
++ Kong.</p>
 +
 +   <p><small>Please note that the article     wrongly refers
 +   to crackers as &ldquo;<a     href="/philosophy/words-to-



reply via email to

[Prev in Thread] Current Thread [Next in Thread]