[Midnightbsd-cvs] www [597] trunk: bootstrap

laffer1 at midnightbsd.org laffer1 at midnightbsd.org
Fri Apr 17 20:07:22 EDT 2015


Revision: 597
          http://svnweb.midnightbsd.org/www/?rev=597
Author:   laffer1
Date:     2015-04-17 20:07:22 -0400 (Fri, 17 Apr 2015)
Log Message:
-----------
bootstrap

Modified Paths:
--------------
    trunk/footer.html
    trunk/index.html
    trunk/menu.html

Modified: trunk/footer.html
===================================================================
--- trunk/footer.html	2015-04-17 23:48:55 UTC (rev 596)
+++ trunk/footer.html	2015-04-18 00:07:22 UTC (rev 597)
@@ -1,6 +1,9 @@
 	<footer>
+		<div class="row">
 			<div class="horiz"><blockquote><hr /></blockquote></div>
 			<div class="clear"></div>
+		</div>
+		<div class="row">
 			<div id="footer">
 				<blockquote>
 					<p>
@@ -69,7 +72,8 @@
 </script>
 <!-- End Google Analytics -->
 		<!-- END GOOGLE -->
+		</div>
 	</footer>
 
-<script type="text/javascript" src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/jquery.min.js"></script>
-<script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.4/js/bootstrap.min.js"></script>
+	<script type="text/javascript" src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/jquery.min.js"></script>
+	<script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.4/js/bootstrap.min.js"></script>

Modified: trunk/index.html
===================================================================
--- trunk/index.html	2015-04-17 23:48:55 UTC (rev 596)
+++ trunk/index.html	2015-04-18 00:07:22 UTC (rev 597)
@@ -18,112 +18,98 @@
                 <meta name="alexaVerifyID" content="pP_-WGlPDrDVXvxAfGsMp0R52to">
 		<meta name="norton-safeweb-site-verification" content="x64m9skk6r62zazbxrrr16abm5i2xrk35q73q63fjbpkfuezh8lkdndy9hfplpxtllur8ryfprpp7cv6sl3cxgv1o1uy2t7e1ms36p5p0fte91e8wsiwx3783pehcbdx" />
 	</head>
+	
 	<body>
 		<div class="container">
-		<div id="globe">
-			<div id="header">
-				<h1 title="MidnightBSD Home">
-				<a href="./" title="MidnightBSD Home">MidnightBSD: The BSD For Everyone</a>
-			</h1>
-		</div>
+			<div id="globe" class="row">
+				<div id="header" class="col-md-12">
+					<h1 title="MidnightBSD Home">
+						<a href="./" title="MidnightBSD Home">MidnightBSD: The BSD For Everyone</a>
+					</h1>
+				</div>
 <!--#include virtual="/menu.html"-->
 		<div class="clear">
 		</div>
-		<div id="welcomebox">
-			<div class="clear">
+		<div id="welcomebox" class="row">
+			<div class="clear"></div>
+			<div class="col-md-8">
+				<div id="welcome" class="jumbotron">
+					<h2>Welcome to MidnightBSD</h2>
+					<blockquote>
+						<p>
+							MidnightBSD is a new BSD-derived operating system developed 
+							with desktop users in mind. 
+							It includes all the software you'd expect for your daily tasks 
+							— email, web browsing, word processing, gaming, and much 
+							more.
+						</p>
+						<p>
+							With a small community of dedicated developers, MidnightBSD 
+							strives to create an easy-to-use operating system everyone can 
+							use, freely. Available for x86, AMD64 and as Virtual Machines.
+						</p>
+					</blockquote>
+				</div>
 			</div>
-			<div id="welcome" class="jumbotron">
-				<h2>Welcome to MidnightBSD</h2>
-				<blockquote>
-					<p>
-						MidnightBSD is a new BSD-derived operating system developed with desktop users in mind. It includes all the software you'd expect for your daily tasks — email, web browsing, word processing, gaming, and much more.
-					</p>
-					<p>
-						With a small community of dedicated developers, MidnightBSD strives to create an easy-to-use operating system everyone can use, freely. Available for x86, AMD64 and as Virtual Machines.
-					</p>
-				</blockquote>
-			</div>
-			<div id="getbox">
+			<div id="getbox" class="col-md-4">
 				<div id="gettext">
-					<h2>
-					<a href="download/">
-						Get MidnightBSD
-					</a>
-				</h2>
-				<h3>
-					Latest Release - 0.5.2
-				</h3>
-				<div id="getcd">
-					<a href="download/" title="Get MidnightBSD">
-					</a>
+					<h2><a href="download/">Get MidnightBSD</a></h2>
+					<h3>Latest Release - 0.5.2</h3>
+					<div id="getcd"><a href="download/" title="Get MidnightBSD"></a></div>
+					<div class="clear"></div>
+					<h4><a href="notes/">Release Notes</a></h4>
 				</div>
-				<div class="clear">
-				</div>
-				<h4>
-				<a href="notes/">
-					Release Notes
-				</a>
-			</h4>
+			</div>
 		</div>
+		<div class="clear">
 	</div>
-</div>
-<div class="clear">
-</div>
-<div id="gravity" style="padding-top: 10px;">
-	<div id="news">
-		<h2>
-		<a href="news/">
-			News »
-		</a>
-	</h2>
+
+	<div id="gravity" style="padding-top: 10px;" class="row">
+		<div id="news" class="col-md-4">
+			<h2><a href="news/">News »</a></h2>
 <!--#include file="mbsdblogsum.inc"-->
-</div>
-<div id="security">
-	<h2>
-	<a href="security/">
-		Security »
-	</a>
-</h2>
-<blockquote>
-	<p class="date">
-		March 19, 2015
-	</p>
-	<p class="update">
-		0.5.10 RELEASE <br> OpenSSL Security update <br> A malformed elliptic curve private key file could cause a use-after-free condition in the d2i_ECPrivateKey function. [CVE-2015-0209] <br> An attempt to compare ASN.1 boolean types will cause the ASN1_TYPE_cmp function to crash with an invalid read. [CVE-2015-0286] <br> Reusing a structure in ASN.1 parsing may allow an attacker to cause memory corruption via an invalid write. [CVE-2015-0287] <br> The function X509_to_X509_REQ will crash with a NULL pointer dereference if the certificate key is invalid. [CVE-2015-0288] <br> The PKCS#7 parsing code does not handle missing outer ContentInfo correctly. [CVE-2015-0289] <br> A malicious client can trigger an OPENSSL_assert in servers that both support SSLv2 and enable export cipher suites by sending a specially crafted SSLv2 CLIENT-MASTER-KEY message. [CVE-2015-0293] 
-	</p>
-	<p class="more">
-	<a href="security/#a20150319">
-		Read more ...
-	</a>
-	</p>
-</blockquote>
-<blockquote>
-	<p class="date">
-		February 25, 2015
-	</p>
-	<p class="update">
-		0.5.9 RELEASE <br> Fix two security vulnerabilities. <br> 1. BIND servers which are configured to perform DNSSEC validation and which are using managed keys (which occurs implicitly when using "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit unpredictable behavior due to the use of an improperly initialized variable. <br> CVE-2015-1349 <br> 2. An integer overflow in computing the size of IGMPv3 data buffer can result in a buffer which is too small for the requested operation. <br> This can result in a DOS attack.
-	</p>
-	<p class="more">
-	<a href="security/#aa20150225">
-		Read more ...
-	</a>
-	<p>
-</blockquote>
-</div>
-<div id="tweets">
-	<a class="twitter-timeline" href="https://twitter.com/midnightbsd" data-widget-id="340874433373806593">
-		Tweets by @midnightbsd
-	</a>
-<script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script> 
-</div>
+		</div>
 
-	<div>
-		<p>View available <a href="mports/">mports</a></p>
+		<div id="security" class="col-md-4">
+			<h2><a href="security/">Security »</a></h2>
+			<blockquote>
+			<p class="date">March 19, 2015</p>
+			<p class="update">
+				0.5.10 RELEASE <br> OpenSSL Security update <br> A malformed elliptic curve 
+				private key file could cause a use-after-free condition in the d2i_ECPrivateKey 
+				function. [CVE-2015-0209] <br> An attempt to compare ASN.1 boolean types will 
+				cause the ASN1_TYPE_cmp function to crash with an invalid read. [CVE-2015-0286] 
+				<br> Reusing a structure in ASN.1 parsing may allow an attacker to cause memory 
+				corruption via an invalid write. [CVE-2015-0287] <br> The function X509_to_X509_REQ 
+				will crash with a NULL pointer dereference if the certificate key is invalid. 
+				[CVE-2015-0288] <br> The PKCS#7 parsing code does not handle missing outer 
+				ContentInfo correctly. [CVE-2015-0289] <br> A malicious client can trigger an 
+				OPENSSL_assert in servers that both support SSLv2 and enable export cipher 
+				suites by sending a specially crafted SSLv2 CLIENT-MASTER-KEY message. [CVE-2015-0293] 
+			</p>
+			<p class="more"><a href="security/#a20150319">Read more ...</a></p>
+			</blockquote>
+			<blockquote>
+				<p class="date">February 25, 2015</p>
+				<p class="update">0.5.9 RELEASE <br> Fix two security vulnerabilities. <br> 1. BIND servers which are configured to perform DNSSEC validation and which are using managed keys (which occurs implicitly when using "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit unpredictable behavior due to the use of an improperly initialized variable. <br> CVE-2015-1349 <br> 2. An integer overflow in computing the size of IGMPv3 data buffer can result in a buffer which is too small for the requested operation. <br> This can result in a DOS attack.</p>
+				<p class="more">
+					<a href="security/#aa20150225">Read more ...</a>
+				</p>
+			</blockquote>
+		</div>
+
+		<div id="tweets" class="col-md-4">
+			<a class="twitter-timeline" href="https://twitter.com/midnightbsd" data-widget-id="340874433373806593">
+			Tweets by @midnightbsd
+			</a>
+			<script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script> 
+		
+			<p>View available <a href="mports/">mports</a></p>
+		</div>
 	</div>
+
+	<!--#include virtual="/footer.html"-->
 </div>
-<!--#include virtual="/footer.html"-->
 
-</div>
 </body>
 </html>

Modified: trunk/menu.html
===================================================================
--- trunk/menu.html	2015-04-17 23:48:55 UTC (rev 596)
+++ trunk/menu.html	2015-04-18 00:07:22 UTC (rev 597)
@@ -1,4 +1,5 @@
-	<div class="menu">
+	<div class="row">
+		<div class="menu">
 				<ul>
 					<li><a href="/">home</a>
 						<ul>
@@ -46,7 +47,7 @@
 							<li><a href="http://www.midnightbsd.org/opengrok/"> openGrok</a></li>
 							<li><a href="/magus/"> magus</a></li>
 							<li><a href="https://www.openhub.net/p/mnbsd"> Open HUB</a></li>
-<li><a href="http://ds9.midnightbsd.org:8060/"> FishEye</a></li>
+							<li><a href="http://ds9.midnightbsd.org:8060/"> FishEye</a></li>
 						</ul>
 					</li>
 				</ul>
@@ -61,4 +62,5 @@
 					</li>
 				</ul>
 			</div>
+		</div>
 	</header>



More information about the Midnightbsd-cvs mailing list