[Midnightbsd-cvs] www [597] trunk: bootstrap
laffer1 at midnightbsd.org
laffer1 at midnightbsd.org
Fri Apr 17 20:07:22 EDT 2015
Revision: 597
http://svnweb.midnightbsd.org/www/?rev=597
Author: laffer1
Date: 2015-04-17 20:07:22 -0400 (Fri, 17 Apr 2015)
Log Message:
-----------
bootstrap
Modified Paths:
--------------
trunk/footer.html
trunk/index.html
trunk/menu.html
Modified: trunk/footer.html
===================================================================
--- trunk/footer.html 2015-04-17 23:48:55 UTC (rev 596)
+++ trunk/footer.html 2015-04-18 00:07:22 UTC (rev 597)
@@ -1,6 +1,9 @@
<footer>
+ <div class="row">
<div class="horiz"><blockquote><hr /></blockquote></div>
<div class="clear"></div>
+ </div>
+ <div class="row">
<div id="footer">
<blockquote>
<p>
@@ -69,7 +72,8 @@
</script>
<!-- End Google Analytics -->
<!-- END GOOGLE -->
+ </div>
</footer>
-<script type="text/javascript" src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/jquery.min.js"></script>
-<script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.4/js/bootstrap.min.js"></script>
+ <script type="text/javascript" src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/jquery.min.js"></script>
+ <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.4/js/bootstrap.min.js"></script>
Modified: trunk/index.html
===================================================================
--- trunk/index.html 2015-04-17 23:48:55 UTC (rev 596)
+++ trunk/index.html 2015-04-18 00:07:22 UTC (rev 597)
@@ -18,112 +18,98 @@
<meta name="alexaVerifyID" content="pP_-WGlPDrDVXvxAfGsMp0R52to">
<meta name="norton-safeweb-site-verification" content="x64m9skk6r62zazbxrrr16abm5i2xrk35q73q63fjbpkfuezh8lkdndy9hfplpxtllur8ryfprpp7cv6sl3cxgv1o1uy2t7e1ms36p5p0fte91e8wsiwx3783pehcbdx" />
</head>
+
<body>
<div class="container">
- <div id="globe">
- <div id="header">
- <h1 title="MidnightBSD Home">
- <a href="./" title="MidnightBSD Home">MidnightBSD: The BSD For Everyone</a>
- </h1>
- </div>
+ <div id="globe" class="row">
+ <div id="header" class="col-md-12">
+ <h1 title="MidnightBSD Home">
+ <a href="./" title="MidnightBSD Home">MidnightBSD: The BSD For Everyone</a>
+ </h1>
+ </div>
<!--#include virtual="/menu.html"-->
<div class="clear">
</div>
- <div id="welcomebox">
- <div class="clear">
+ <div id="welcomebox" class="row">
+ <div class="clear"></div>
+ <div class="col-md-8">
+ <div id="welcome" class="jumbotron">
+ <h2>Welcome to MidnightBSD</h2>
+ <blockquote>
+ <p>
+ MidnightBSD is a new BSD-derived operating system developed
+ with desktop users in mind.
+ It includes all the software you'd expect for your daily tasks
+ — email, web browsing, word processing, gaming, and much
+ more.
+ </p>
+ <p>
+ With a small community of dedicated developers, MidnightBSD
+ strives to create an easy-to-use operating system everyone can
+ use, freely. Available for x86, AMD64 and as Virtual Machines.
+ </p>
+ </blockquote>
+ </div>
</div>
- <div id="welcome" class="jumbotron">
- <h2>Welcome to MidnightBSD</h2>
- <blockquote>
- <p>
- MidnightBSD is a new BSD-derived operating system developed with desktop users in mind. It includes all the software you'd expect for your daily tasks — email, web browsing, word processing, gaming, and much more.
- </p>
- <p>
- With a small community of dedicated developers, MidnightBSD strives to create an easy-to-use operating system everyone can use, freely. Available for x86, AMD64 and as Virtual Machines.
- </p>
- </blockquote>
- </div>
- <div id="getbox">
+ <div id="getbox" class="col-md-4">
<div id="gettext">
- <h2>
- <a href="download/">
- Get MidnightBSD
- </a>
- </h2>
- <h3>
- Latest Release - 0.5.2
- </h3>
- <div id="getcd">
- <a href="download/" title="Get MidnightBSD">
- </a>
+ <h2><a href="download/">Get MidnightBSD</a></h2>
+ <h3>Latest Release - 0.5.2</h3>
+ <div id="getcd"><a href="download/" title="Get MidnightBSD"></a></div>
+ <div class="clear"></div>
+ <h4><a href="notes/">Release Notes</a></h4>
</div>
- <div class="clear">
- </div>
- <h4>
- <a href="notes/">
- Release Notes
- </a>
- </h4>
+ </div>
</div>
+ <div class="clear">
</div>
-</div>
-<div class="clear">
-</div>
-<div id="gravity" style="padding-top: 10px;">
- <div id="news">
- <h2>
- <a href="news/">
- News »
- </a>
- </h2>
+
+ <div id="gravity" style="padding-top: 10px;" class="row">
+ <div id="news" class="col-md-4">
+ <h2><a href="news/">News »</a></h2>
<!--#include file="mbsdblogsum.inc"-->
-</div>
-<div id="security">
- <h2>
- <a href="security/">
- Security »
- </a>
-</h2>
-<blockquote>
- <p class="date">
- March 19, 2015
- </p>
- <p class="update">
- 0.5.10 RELEASE <br> OpenSSL Security update <br> A malformed elliptic curve private key file could cause a use-after-free condition in the d2i_ECPrivateKey function. [CVE-2015-0209] <br> An attempt to compare ASN.1 boolean types will cause the ASN1_TYPE_cmp function to crash with an invalid read. [CVE-2015-0286] <br> Reusing a structure in ASN.1 parsing may allow an attacker to cause memory corruption via an invalid write. [CVE-2015-0287] <br> The function X509_to_X509_REQ will crash with a NULL pointer dereference if the certificate key is invalid. [CVE-2015-0288] <br> The PKCS#7 parsing code does not handle missing outer ContentInfo correctly. [CVE-2015-0289] <br> A malicious client can trigger an OPENSSL_assert in servers that both support SSLv2 and enable export cipher suites by sending a specially crafted SSLv2 CLIENT-MASTER-KEY message. [CVE-2015-0293]
- </p>
- <p class="more">
- <a href="security/#a20150319">
- Read more ...
- </a>
- </p>
-</blockquote>
-<blockquote>
- <p class="date">
- February 25, 2015
- </p>
- <p class="update">
- 0.5.9 RELEASE <br> Fix two security vulnerabilities. <br> 1. BIND servers which are configured to perform DNSSEC validation and which are using managed keys (which occurs implicitly when using "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit unpredictable behavior due to the use of an improperly initialized variable. <br> CVE-2015-1349 <br> 2. An integer overflow in computing the size of IGMPv3 data buffer can result in a buffer which is too small for the requested operation. <br> This can result in a DOS attack.
- </p>
- <p class="more">
- <a href="security/#aa20150225">
- Read more ...
- </a>
- <p>
-</blockquote>
-</div>
-<div id="tweets">
- <a class="twitter-timeline" href="https://twitter.com/midnightbsd" data-widget-id="340874433373806593">
- Tweets by @midnightbsd
- </a>
-<script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script>
-</div>
+ </div>
- <div>
- <p>View available <a href="mports/">mports</a></p>
+ <div id="security" class="col-md-4">
+ <h2><a href="security/">Security »</a></h2>
+ <blockquote>
+ <p class="date">March 19, 2015</p>
+ <p class="update">
+ 0.5.10 RELEASE <br> OpenSSL Security update <br> A malformed elliptic curve
+ private key file could cause a use-after-free condition in the d2i_ECPrivateKey
+ function. [CVE-2015-0209] <br> An attempt to compare ASN.1 boolean types will
+ cause the ASN1_TYPE_cmp function to crash with an invalid read. [CVE-2015-0286]
+ <br> Reusing a structure in ASN.1 parsing may allow an attacker to cause memory
+ corruption via an invalid write. [CVE-2015-0287] <br> The function X509_to_X509_REQ
+ will crash with a NULL pointer dereference if the certificate key is invalid.
+ [CVE-2015-0288] <br> The PKCS#7 parsing code does not handle missing outer
+ ContentInfo correctly. [CVE-2015-0289] <br> A malicious client can trigger an
+ OPENSSL_assert in servers that both support SSLv2 and enable export cipher
+ suites by sending a specially crafted SSLv2 CLIENT-MASTER-KEY message. [CVE-2015-0293]
+ </p>
+ <p class="more"><a href="security/#a20150319">Read more ...</a></p>
+ </blockquote>
+ <blockquote>
+ <p class="date">February 25, 2015</p>
+ <p class="update">0.5.9 RELEASE <br> Fix two security vulnerabilities. <br> 1. BIND servers which are configured to perform DNSSEC validation and which are using managed keys (which occurs implicitly when using "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit unpredictable behavior due to the use of an improperly initialized variable. <br> CVE-2015-1349 <br> 2. An integer overflow in computing the size of IGMPv3 data buffer can result in a buffer which is too small for the requested operation. <br> This can result in a DOS attack.</p>
+ <p class="more">
+ <a href="security/#aa20150225">Read more ...</a>
+ </p>
+ </blockquote>
+ </div>
+
+ <div id="tweets" class="col-md-4">
+ <a class="twitter-timeline" href="https://twitter.com/midnightbsd" data-widget-id="340874433373806593">
+ Tweets by @midnightbsd
+ </a>
+ <script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script>
+
+ <p>View available <a href="mports/">mports</a></p>
+ </div>
</div>
+
+ <!--#include virtual="/footer.html"-->
</div>
-<!--#include virtual="/footer.html"-->
-</div>
</body>
</html>
Modified: trunk/menu.html
===================================================================
--- trunk/menu.html 2015-04-17 23:48:55 UTC (rev 596)
+++ trunk/menu.html 2015-04-18 00:07:22 UTC (rev 597)
@@ -1,4 +1,5 @@
- <div class="menu">
+ <div class="row">
+ <div class="menu">
<ul>
<li><a href="/">home</a>
<ul>
@@ -46,7 +47,7 @@
<li><a href="http://www.midnightbsd.org/opengrok/"> openGrok</a></li>
<li><a href="/magus/"> magus</a></li>
<li><a href="https://www.openhub.net/p/mnbsd"> Open HUB</a></li>
-<li><a href="http://ds9.midnightbsd.org:8060/"> FishEye</a></li>
+ <li><a href="http://ds9.midnightbsd.org:8060/"> FishEye</a></li>
</ul>
</li>
</ul>
@@ -61,4 +62,5 @@
</li>
</ul>
</div>
+ </div>
</header>
More information about the Midnightbsd-cvs
mailing list