[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary all.html malware-microsoft.html...
|
From: |
Rob Musial |
|
Subject: |
www/proprietary all.html malware-microsoft.html... |
|
Date: |
Thu, 23 May 2024 11:36:09 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: Rob Musial <robmusial> 24/05/23 11:36:08
Modified files:
proprietary : all.html malware-microsoft.html
proprietary-interference.html proprietary.html
Log message:
added new entry per RT #2049696 and www-discuss
(Microsoft showing ads in Windows) using item-create
then fixed missing link with malgen. targetd for
proprietary-interference.html and malware-microsoft.html
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.html?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.518&r2=1.519
Patches:
Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- all.html 13 Apr 2024 10:46:02 -0000 1.217
+++ all.html 23 May 2024 15:36:08 -0000 1.218
@@ -59,6 +59,21 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
+<!--#set var='ADD' value='2024-05-23' -->
+<!--#set var='PUB' value='2004-03-15' -->
+<li><small class='date-tag'>Added: <span class="gnun-split"></span>
+<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
+— Latest reference: <span class="gnun-split"></span><!--#echo
+encoding='none' var='PUB' --></small>
+ <p><a
+ their web browser</a>, Microsoft Edge, and their search engine, Microsoft
+ Bing. When users launch the Google Chrome browser Microsoft injects
+ a pop up advertisement in the corner of the screen advising users to
+ switch to Bing. Microsoft also imported users Chrome browsing data
+ without their knowledge or consent.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2024-04-07' -->
<!--#set var='PUB' value='2024-03-11' -->
<li><small class='date-tag'>Added: <span class="gnun-split"></span>
@@ -5069,7 +5084,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/04/13 10:46:02 $
+$Date: 2024/05/23 15:36:08 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- malware-microsoft.html 6 Apr 2024 11:36:45 -0000 1.182
+++ malware-microsoft.html 23 May 2024 15:36:08 -0000 1.183
@@ -522,6 +522,18 @@
you and other users can hire someone to support the old version on
your future platforms.</p>
</li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in malware-microsoft.html. -->
+ <li id="M200403150">
+ <!--#set var="DATE" value='<small class="date-tag">2004-03</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+ their web browser</a>, Microsoft Edge, and their search engine, Microsoft
+ Bing. When users launch the Google Chrome browser Microsoft injects
+ a pop up advertisement in the corner of the screen advising users to
+ switch to Bing. Microsoft also imported users Chrome browsing data
+ without their knowledge or consent.</p>
+ </li>
</ul>
@@ -1199,7 +1211,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/04/06 11:36:45 $
+$Date: 2024/05/23 15:36:08 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-interference.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.html,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary-interference.html 20 Jan 2024 14:52:21 -0000 1.105
+++ proprietary-interference.html 23 May 2024 15:36:08 -0000 1.106
@@ -527,6 +527,18 @@
change the user's initial web page, and default search engine, to
Yahoo</a> unless the user intervenes to stop it.</p>
</li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-interference.html. -->
+ <li id="M200403150">
+ <!--#set var="DATE" value='<small class="date-tag">2004-03</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+ their web browser</a>, Microsoft Edge, and their search engine, Microsoft
+ Bing. When users launch the Google Chrome browser Microsoft injects
+ a pop up advertisement in the corner of the screen advising users to
+ switch to Bing. Microsoft also imported users Chrome browsing data
+ without their knowledge or consent.</p>
+ </li>
</ul>
</div>
@@ -588,7 +600,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/20 14:52:21 $
+$Date: 2024/05/23 15:36:08 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.518
retrieving revision 1.519
diff -u -b -r1.518 -r1.519
--- proprietary.html 13 Apr 2024 10:46:03 -0000 1.518
+++ proprietary.html 23 May 2024 15:36:08 -0000 1.519
@@ -233,6 +233,18 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+ <li id="M200403150">
+ <!--#set var="DATE" value='<small class="date-tag">2004-03</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+ their web browser</a>, Microsoft Edge, and their search engine, Microsoft
+ Bing. When users launch the Google Chrome browser Microsoft injects
+ a pop up advertisement in the corner of the screen advising users to
+ switch to Bing. Microsoft also imported users Chrome browsing data
+ without their knowledge or consent.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
<li id="M202403110">
<!--#set var="DATE" value='<small class="date-tag">2024-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -305,19 +317,6 @@
violation”.</p></li>
</ul>
</li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202311300">
- <!--#set var="DATE" value='<small class="date-tag">2023-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
- and ARM based computers shipped with UEFI are potentially vulnerable
- to a design omission called LogoFAIL</a>. A cracker can replace the
- BIOS logo with a fake one that contains malicious code. Users can't
- fix this omission because it is in the nonfree UEFI firmware that
- users can't replace.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -380,7 +379,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/04/13 10:46:03 $
+$Date: 2024/05/23 15:36:08 $
<!-- timestamp end -->
</p>
</div>
- www/proprietary all.html malware-microsoft.html...,
Rob Musial <=