[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
all.html malware-microsoft.html potential-malware.html proprietar...
From: |
Diff Report |
Subject: |
all.html malware-microsoft.html potential-malware.html proprietar... |
Date: |
Fri, 16 Jul 2021 00:02:34 -0400 |
Modified:
all.html
malware-microsoft.html
potential-malware.html
proprietary-censorship.html
proprietary.html
proprietary-insecurity.html
proprietary-manipulation.html
diff -rNU2 all.html all.html
--- all.html 2021-07-05 04:04:13.712165504 +0000
+++ all.html 2021-07-16 04:02:34.137331685 +0000
@@ -43,4 +43,30 @@
<ul class="blurbs">
+<!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-09'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
+ <p>A newly found Microsoft Windows vulnerability <a
+
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
+ can allow crackers to remotely gain access to the operating system</a>
+ and install programs, view and delete data, or even create new user
+ accounts with full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
+<!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-05'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
+ <p><a
+
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
+ Advertising companies are experimenting to manipulate people's
+ minds</a>, and impose a new way of advertising by altering their
+ dreams. This “targeted dream incubation” would trigger
+ “refreshing dreams” of the product, according to the
+ companies.</p>
+ </li>
+
<!--#set var='ADD' value='2021-07-04' --><!--#set var='PUB' value='2021-06-22'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Peloton company which produces treadmills recently <a
@@ -2290,5 +2316,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 05:23:19 $
+$Date: 2021/07/15 07:18:30 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-microsoft.html malware-microsoft.html
--- malware-microsoft.html 2021-07-05 04:04:13.736165511 +0000
+++ malware-microsoft.html 2021-07-16 04:02:34.161331686 +0000
@@ -201,4 +201,22 @@
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
+
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
+ can allow crackers to remotely gain access to the operating system</a>
+ and install programs, view and delete data, or even create new user
+ accounts with full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<li id="M202103050">
<!--#set var="DATE" value='<small class="date-tag">2021-03</small>'
@@ -954,5 +972,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/13 08:13:32 $
+$Date: 2021/07/15 07:18:30 $
<!-- timestamp end -->
</p>
diff -rNU2 potential-malware.html potential-malware.html
--- potential-malware.html 2021-07-05 04:04:13.744165513 +0000
+++ potential-malware.html 2021-07-16 04:02:34.165331686 +0000
@@ -55,4 +55,16 @@
<ul class="blurbs">
+ <li id="M202107050">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
+ Advertising companies are experimenting to manipulate people's
+ minds</a>, and impose a new way of advertising by altering their
+ dreams. This “targeted dream incubation” would trigger
+ “refreshing dreams” of the product, according to the
+ companies.</p>
+ </li>
+
<li id="M201903280">
<!--#set var="DATE" value='<small class="date-tag">2019-03</small>'
@@ -194,5 +206,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:21:51 $
+$Date: 2021/07/15 07:13:04 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-censorship.html proprietary-censorship.html
--- proprietary-censorship.html 2021-07-05 04:04:13.752165515 +0000
+++ proprietary-censorship.html 2021-07-16 04:02:34.173331687 +0000
@@ -51,5 +51,5 @@
users can access. Here are examples of programs which do this.
We have a <a
-href="/proprietary/proprietary-jails.html#about-page">separate
+href="/proprietary/proprietary-jails.html">separate
list of proprietary systems that censor installation</a> of
application programs (we call them “jails”).</p>
@@ -213,5 +213,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:21:51 $
+$Date: 2021/07/15 07:11:54 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary.html proprietary.html
--- proprietary.html 2021-07-05 04:04:13.764165518 +0000
+++ proprietary.html 2021-07-16 04:02:34.181331687 +0000
@@ -97,6 +97,6 @@
</div>
-<p>As of June, 2021, the pages in this directory list around 500
-instances of malicious functionalities (with more than 600 references to
+<p>As of July, 2021, the pages in this directory list around 500
+instances of malicious functionalities (with more than 610 references to
back them up), but there are surely thousands more we don't know about.</p>
@@ -187,4 +187,34 @@
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
+
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
+ can allow crackers to remotely gain access to the operating system</a>
+ and install programs, view and delete data, or even create new user
+ accounts with full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
+ <li id="M202107050">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
+ Advertising companies are experimenting to manipulate people's
+ minds</a>, and impose a new way of advertising by altering their
+ dreams. This “targeted dream incubation” would trigger
+ “refreshing dreams” of the product, according to the
+ companies.</p>
+ </li>
+
<li id="M202106220">
<!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
@@ -231,26 +261,4 @@
across different platforms.</p>
</li>
-
- <li id="M202106030">
- <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok
- apps collect biometric identifiers and biometric information from
- users' smartphones</a>. The company behind it does whatever it wants
- and collects whatever data it can.</p>
- </li>
-
- <li id="M202004131">
- <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google, Apple, and Microsoft (and probably some other companies)
- <a href="https://www.lifewire.com/wifi-positioning-system-1683343">are
- collecting people's access points and GPS coordinates (which can
- identify people's precise location) even if their GPS is turned
- off</a>, without the person's consent, using proprietary software
- implemented in person's smartphone. Though merely asking for permission
- would not necessarily legitimize this.</p>
- </li>
</ul>
<p class="button right-align">
@@ -315,5 +323,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 05:23:19 $
+$Date: 2021/07/15 07:21:12 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-insecurity.html proprietary-insecurity.html
--- proprietary-insecurity.html 2021-07-05 04:04:13.768165520 +0000
+++ proprietary-insecurity.html 2021-07-16 04:02:34.189331687 +0000
@@ -72,4 +72,22 @@
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
+
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
+ can allow crackers to remotely gain access to the operating system</a>
+ and install programs, view and delete data, or even create new user
+ accounts with full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<li id="M202106030">
<!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
@@ -1141,5 +1159,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/28 13:40:29 $
+$Date: 2021/07/15 07:18:30 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-manipulation.html proprietary-manipulation.html
--- proprietary-manipulation.html 2021-07-05 04:04:13.776165522 +0000
+++ proprietary-manipulation.html 2021-07-16 04:02:34.193331688 +0000
@@ -69,4 +69,16 @@
<ul class="blurbs">
+ <li id="M202107050">
+ <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
+ Advertising companies are experimenting to manipulate people's
+ minds</a>, and impose a new way of advertising by altering their
+ dreams. This “targeted dream incubation” would trigger
+ “refreshing dreams” of the product, according to the
+ companies.</p>
+ </li>
+
<li id="M202106220">
<!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
@@ -237,5 +249,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 05:23:19 $
+$Date: 2021/07/15 07:13:04 $
<!-- timestamp end -->
</p>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- all.html malware-microsoft.html potential-malware.html proprietar...,
Diff Report <=