[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary all.html malware-apple.html pro...
From: |
Ali Reza Hayati |
Subject: |
www/proprietary all.html malware-apple.html pro... |
Date: |
Sun, 19 Dec 2021 02:13:39 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: Ali Reza Hayati <arh> 21/12/19 02:13:39
Modified files:
proprietary : all.html malware-apple.html
proprietary-insecurity.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Final blurb fix. I really should check the local files before pushing
them on servver
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.393&r2=1.394
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.401&r2=1.402
Patches:
Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- all.html 19 Dec 2021 07:08:51 -0000 1.71
+++ all.html 19 Dec 2021 07:13:39 -0000 1.72
@@ -43,16 +43,14 @@
<ul class="blurbs">
<!--#set var='ADD' value='2021-12-19' --><!--#set var='PUB' value='2021-11-11'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
- <p>Some researchers at Google <a href="https://www.vice.com/en/article/
-
93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
+ <p>Some researchers at Google <a
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
a zero-day vulnerability on MacOS,
which crackers used to target people visiting the websites</a> of
a media outlet and a pro-democracy labor and political group in Hong
Kong.</p>
<p><small>Please note that the article wrongly refers
- to crackers as “<a href="/philosophy/words-to-
- avoid.html#Hacker">hackers</a>”.</small></p>
+ to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
<!--#set var='ADD' value='2021-11-19' --><!--#set var='PUB' value='2021-10-25'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
@@ -2518,7 +2516,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/12/19 07:08:51 $
+$Date: 2021/12/19 07:13:39 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- malware-apple.html 19 Dec 2021 07:08:52 -0000 1.154
+++ malware-apple.html 19 Dec 2021 07:13:39 -0000 1.155
@@ -266,16 +266,14 @@
<li id="M202111110">
<!--#set var="DATE" value='<small class="date-tag">2021-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some researchers at Google <a href="https://www.vice.com/en/article/
-
93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
+ <p>Some researchers at Google <a
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
a zero-day vulnerability on MacOS,
which crackers used to target people visiting the websites</a> of
a media outlet and a pro-democracy labor and political group in Hong
Kong.</p>
<p><small>Please note that the article wrongly refers
- to crackers as “<a href="/philosophy/words-to-
- avoid.html#Hacker">hackers</a>”.</small></p>
+ to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
<li id="M202107180">
@@ -1247,7 +1245,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/12/19 07:08:52 $
+$Date: 2021/12/19 07:13:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary-insecurity.html 19 Dec 2021 07:08:52 -0000 1.187
+++ proprietary-insecurity.html 19 Dec 2021 07:13:39 -0000 1.188
@@ -82,16 +82,14 @@
<li id="M202111110">
<!--#set var="DATE" value='<small class="date-tag">2021-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some researchers at Google <a href="https://www.vice.com/en/article/
-
93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
+ <p>Some researchers at Google <a
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
a zero-day vulnerability on MacOS,
which crackers used to target people visiting the websites</a> of
a media outlet and a pro-democracy labor and political group in Hong
Kong.</p>
<p><small>Please note that the article wrongly refers
- to crackers as “<a href="/philosophy/words-to-
- avoid.html#Hacker">hackers</a>”.</small></p>
+ to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
<li id="M202108170">
@@ -1224,7 +1222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/12/19 07:08:52 $
+$Date: 2021/12/19 07:13:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.393
retrieving revision 1.394
diff -u -b -r1.393 -r1.394
--- proprietary.html 19 Dec 2021 07:08:52 -0000 1.393
+++ proprietary.html 19 Dec 2021 07:13:39 -0000 1.394
@@ -191,16 +191,14 @@
<li id="M202111110">
<!--#set var="DATE" value='<small class="date-tag">2021-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some researchers at Google <a href="https://www.vice.com/en/article/
-
93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
+ <p>Some researchers at Google <a
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
a zero-day vulnerability on MacOS,
which crackers used to target people visiting the websites</a> of
a media outlet and a pro-democracy labor and political group in Hong
Kong.</p>
<p><small>Please note that the article wrongly refers
- to crackers as “<a href="/philosophy/words-to-
- avoid.html#Hacker">hackers</a>”.</small></p>
+ to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
<li id="M202110250">
@@ -312,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/12/19 07:08:52 $
+$Date: 2021/12/19 07:13:39 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.401
retrieving revision 1.402
diff -u -b -r1.401 -r1.402
--- workshop/mal.rec 19 Dec 2021 07:08:52 -0000 1.401
+++ workshop/mal.rec 19 Dec 2021 07:13:39 -0000 1.402
@@ -31,16 +31,14 @@
Target: proprietary-insecurity.html proprietary-insecurity
Target: malware-apple.html insecurity
Keywords: Insecurity, Apple, MacOS
-Blurb: <p>Some researchers at Google <a href="https://www.vice.com/en/article/
-+
93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
+Blurb: <p>Some researchers at Google <a
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
+ a zero-day vulnerability on MacOS,
+ which crackers used to target people visiting the websites</a> of
+ a media outlet and a pro-democracy labor and political group in Hong
+ Kong.</p>
+
+ <p><small>Please note that the article wrongly refers
-+ to crackers as “<a href="/philosophy/words-to-
-+ avoid.html#Hacker">hackers</a>”.</small></p>
++ to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
Added: 2021-11-19
Id: 202110250