[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary all.html malware-apple.html pro...
From: |
Ali Reza Hayati |
Subject: |
www/proprietary all.html malware-apple.html pro... |
Date: |
Sun, 19 Dec 2021 02:04:25 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: Ali Reza Hayati <arh> 21/12/19 02:04:25
Modified files:
proprietary : all.html malware-apple.html
proprietary-insecurity.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Minor blurb fix
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.391&r2=1.392
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.399&r2=1.400
Patches:
Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- all.html 19 Dec 2021 07:01:00 -0000 1.69
+++ all.html 19 Dec 2021 07:04:24 -0000 1.70
@@ -43,11 +43,11 @@
<ul class="blurbs">
<!--#set var='ADD' value='2021-12-19' --><!--#set var='PUB' value='2021-11-11'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
- <p>Some researchers at Google <a
-
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
- a zero-day vulnerability on MacOS crackers used to target Hong Kong
- people visiting websites</a> for media outlets and pro-democracy
- labor and political group.</p>
+ <p>Some researchers at Google
+ <a
+ which crackers used to target people visiting the websites</a> of
+ a media outlet and a pro-democracy labor and political group in Hong
+ Kong.</p>
<p><small>Please note that the article wrongly refers
to crackers as “<a href="/philosophy/words-to-
@@ -2517,7 +2517,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/12/19 07:01:00 $
+$Date: 2021/12/19 07:04:24 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.html,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- malware-apple.html 19 Dec 2021 07:01:00 -0000 1.152
+++ malware-apple.html 19 Dec 2021 07:04:25 -0000 1.153
@@ -266,11 +266,11 @@
<li id="M202111110">
<!--#set var="DATE" value='<small class="date-tag">2021-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some researchers at Google <a
-
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
- a zero-day vulnerability on MacOS crackers used to target Hong Kong
- people visiting websites</a> for media outlets and pro-democracy
- labor and political group.</p>
+ <p>Some researchers at Google
+ <a
+ which crackers used to target people visiting the websites</a> of
+ a media outlet and a pro-democracy labor and political group in Hong
+ Kong.</p>
<p><small>Please note that the article wrongly refers
to crackers as “<a href="/philosophy/words-to-
@@ -1246,7 +1246,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/12/19 07:01:00 $
+$Date: 2021/12/19 07:04:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary-insecurity.html 19 Dec 2021 07:01:00 -0000 1.185
+++ proprietary-insecurity.html 19 Dec 2021 07:04:25 -0000 1.186
@@ -82,11 +82,11 @@
<li id="M202111110">
<!--#set var="DATE" value='<small class="date-tag">2021-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some researchers at Google <a
-
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
- a zero-day vulnerability on MacOS crackers used to target Hong Kong
- people visiting websites</a> for media outlets and pro-democracy
- labor and political group.</p>
+ <p>Some researchers at Google
+ <a
+ which crackers used to target people visiting the websites</a> of
+ a media outlet and a pro-democracy labor and political group in Hong
+ Kong.</p>
<p><small>Please note that the article wrongly refers
to crackers as “<a href="/philosophy/words-to-
@@ -1223,7 +1223,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/12/19 07:01:00 $
+$Date: 2021/12/19 07:04:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.391
retrieving revision 1.392
diff -u -b -r1.391 -r1.392
--- proprietary.html 19 Dec 2021 07:01:00 -0000 1.391
+++ proprietary.html 19 Dec 2021 07:04:25 -0000 1.392
@@ -191,11 +191,11 @@
<li id="M202111110">
<!--#set var="DATE" value='<small class="date-tag">2021-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some researchers at Google <a
-
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
- a zero-day vulnerability on MacOS crackers used to target Hong Kong
- people visiting websites</a> for media outlets and pro-democracy
- labor and political group.</p>
+ <p>Some researchers at Google
+ <a
+ which crackers used to target people visiting the websites</a> of
+ a media outlet and a pro-democracy labor and political group in Hong
+ Kong.</p>
<p><small>Please note that the article wrongly refers
to crackers as “<a href="/philosophy/words-to-
@@ -311,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/12/19 07:01:00 $
+$Date: 2021/12/19 07:04:25 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.399
retrieving revision 1.400
diff -u -b -r1.399 -r1.400
--- workshop/mal.rec 19 Dec 2021 07:01:00 -0000 1.399
+++ workshop/mal.rec 19 Dec 2021 07:04:25 -0000 1.400
@@ -31,11 +31,13 @@
Target: proprietary-insecurity.html proprietary-insecurity
Target: malware-apple.html insecurity
Keywords: Insecurity, Apple, MacOS
-Blurb: <p>Some researchers at Google <a
-+
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
-+ a zero-day vulnerability on MacOS crackers used to target Hong Kong
-+ people visiting websites</a> for media outlets and pro-democracy
-+ labor and political group.</p>
+Blurb: <p>Some researchers at Google
++ <a
+href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
+a zero-day vulnerability on MacOS,
++ which crackers used to target people visiting the websites</a> of
++ a media outlet and a pro-democracy labor and political group in Hong
++ Kong.</p>
+
+ <p><small>Please note that the article wrongly refers
+ to crackers as “<a href="/philosophy/words-to-
- www/proprietary all.html malware-apple.html pro...,
Ali Reza Hayati <=