surf article & new themeing plus XHTML 4

This commit is contained in:
anonymous 2020-03-22 00:35:46 -04:00
parent 75d22cacea
commit f34d79e0e2
6 changed files with 25 additions and 22 deletions

View File

@ -24,7 +24,6 @@
</ol>
<hr/>
<div class="footer">
<p><b>This article was created on [DATE]</b></p>
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 licence to be accepted.</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -9,7 +9,7 @@
<h1>Online Spyware Classification Project Article Catalog</h1>
<p>
<a href="../index.html>Back to Home</a><br>
<a href="../articles/index_es.html">Spanish Catalog</a><br>
<a href="../articles/index_es.html">Spanish Catalog</a><br>
<a href="../articles/index2.html">Unfinished Articles</a><br>
</p>
<p>All of the articles on this website are available here! If you want to edit any of these articles, or contribute your own articles, contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
@ -17,6 +17,7 @@
<h2>Web Browsers</h2>
<a href="../articles/browsers.html">Comparison between web browsers</a><br><br>
<a href="../articles/surf.xhtml">Surf</a><br>
<a href="../articles/iron.html">SRWare Iron</a><br>
<a href="../articles/slimjet.html">Slimjet</a><br>
<a href="../articles/chrome.html">Google Chrome</a>

View File

@ -17,6 +17,7 @@
Surf <b><span class="green">makes no unsolicited requests at all.</span></b>
It is also fully libre software under the expat license. It was tested in conjuction with tabbed, another piece of software developed by the same people for use with surf, it adds support for tabs. From a privacy standpoint, this browser is an excellent choice.
</p>
<p>Surf requires proxychains to connect to Tor, as it only supports HTTP proxies, not SOCKS (which is what Tor uses).</p>
<hr/>
<h4>Sources:</h4>
<ol>
@ -24,7 +25,6 @@
</ol>
<hr/>
<div class="footer">
<p><b>This article was created on 7/10/2019</b></p>
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 licence to be accepted.</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 License"/></a>

View File

@ -1,16 +1,19 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="style.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
</head>
<body>
<h1>Contact</h1>
<p>
My E-Mail is <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a><br>
My XMPP is spyware@openxmpp.org<br>
</p>
</body>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<title>Contact - Spyware Watchdog</title>
<link rel="stylesheet" href="style2.css"/>
</head>
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Home</a></div>
<h1>Contact</h1>
<p>
XMPP MUC (Recommended clients: Dino, Profanity or PSI+ in that order): spyware@conference.nuegia.net<br/>
Git Repo: <a href="https://codeberg.org/TheShadow/SpywareWatchdog">codeberg.org/TheShadow/SpywareWatchdog</a><br/>
</p>
<br/>
</div>
</body>
</html>

View File

@ -7,7 +7,7 @@
</head>
<body>
<h1>Online Spyware Classification Project - Frequently Asked Questions</h1>
<p><a href="/">Back to Home</a></p>
<p><a href="../index.html">Back to Home</a></p>
<h2>What is spyware?</h2>
<p>
Spyware is a classification of programs which collect information about their users. Any program which collects any kind of information about its users is spyware. Programs are held in contempt (guilty until proven innocent) when evaluating spyware features. Spyware features include but are not limited to unavailable source code, telemetry of any kind, presistent user identities, network connectivity, and information collection on users, such as asking for a telephone number.
@ -60,7 +60,7 @@ You can support this website by submitting or translating articles and referring
</p>
<h2>How do I submit articles to this website?</h2>
<p>
Articles can be submitted by emailing me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a>. Any article that is submitted must follow the article style guide and the spyware criteria guide correctly to be accepted into the website. If you want to make changes to an article please download and edit that article, and resubmit your version of the article in an email, explaining what the changes are and why you made those changes. If your version of the article is conforming to the article style guide and spyware criteria guide and has justified changes it will be accepted as a replacement to the previous article. Your submissions will be manually reveiwed and added to the website at this time. I will reply to all submissions explaining if the submission was accepted or not, and if the submission was declined, why it was declined.
Articles can be submitted by doing a pull request at the <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a> or contacting us via the XMPP at spyware@conference.nuegia.net. Any article that is submitted must follow the article style guide and the spyware criteria guide correctly to be accepted into the website. If you want to make changes to an article please download and edit that article, and resubmit your version of the article in an email, explaining what the changes are and why you made those changes. If your version of the article is conforming to the article style guide and spyware criteria guide and has justified changes it will be accepted as a replacement to the previous article. Your submissions will be manually reveiwed and added to the website at this time. I will reply to all submissions explaining if the submission was accepted or not, and if the submission was declined, why it was declined.
</p>
<h2>What language do the submissions need to be in?</h2>
<p>
@ -68,7 +68,7 @@ Any language should be fine. Currently there are only English and Spanish articl
</p>
<h2>I want to amend/change the style guide and/or the spyware classification guide.</h2>
<p>
Send an email to me at <a href="mailto:spyware@aaathats3as.com">spyware@aaathats3as.com</a> with a new version of the guide in question, detailing the changes you have made and the reasons for these changes. If I agree with these changes then I will either replace the current document(s) with your version(s) or edit the document(s) myself to incorporate the new ideas, and send you a follow-up email explaining what I did. If I disagree with you, I will send you an email explaining why I don't want to amend/change the guide(s) in such a way.
Submitting a pull request at the <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>, or contacting us via the XMPP at spyware@conference.nuegia.net with a new version of the guide in question, detailing the changes you have made and the reasons for these changes. If I agree with these changes then I will either replace the current document(s) with your version(s) or edit the document(s) myself to incorporate the new ideas, and send you a follow-up email explaining what I did. If I disagree with you, I will send you an email explaining why I don't want to amend/change the guide(s) in such a way.
</p>
<h2>Spyware and Software Licensing</h2>
<p>

View File

@ -18,7 +18,7 @@
<p>The goal of this website is to classify spyware programs, so that users can be aware that they are installing spyware. Most modern programs that people use today contain malicious spyware features, such as any form of telemetry or information collection of users. This website contains articles on popular programs and internet services explaining spyware features, so that potential users can be aware of the information they may be giving away by downloading or using spyware, using easy to understand ratings and detailed explanations and proofs of how the features of these programs can spy on the user.</p>
<h2><a href="articles/index.html">Browse Articles</a></h2>
<a href="articles/index_es.html">Browse Spanish Articles</a><br>
<a href="http://spywaxy77egeozv2.onion/">Deep Web Mirror</a><br>
<s><a href="">Deep Web Mirror</a></s> (Out of order)<br>
<a href="articles/index2.html">Browse Unfinished Articles</a><br>
<a href="guides/faq.html">Frequently Asked Questions</a><br>
<a href="extra.html">Extra Content</a><br>