[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy/po can-you-trust.fa.po
From: |
Abbas Esmaeeli Someeh |
Subject: |
www/philosophy/po can-you-trust.fa.po |
Date: |
Thu, 05 Mar 2009 14:06:31 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: Abbas Esmaeeli Someeh <esmaeeli> 09/03/05 14:06:31
Added files:
philosophy/po : can-you-trust.fa.po
Log message:
Initial version
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.fa.po?cvsroot=www&rev=1.1
Patches:
Index: can-you-trust.fa.po
===================================================================
RCS file: can-you-trust.fa.po
diff -N can-you-trust.fa.po
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ can-you-trust.fa.po 5 Mar 2009 14:06:28 -0000 1.1
@@ -0,0 +1,175 @@
+# Persian translation of http://www.gnu.org/philosophy/can-you-trust.html
+# Copyright (C) 2009 Free Software Foundation, Inc.
+# This file is distributed under the same license as the can-you-trust.html
page.
+# Aidin Gharibnavaz <aidin.vf at gmail.com>, 2009.
+#
+msgid ""
+msgstr ""
+"Project-Id-Version: can-you-trust.html\n"
+"POT-Creation-Date: 2009-01-07 04:27-0500\n"
+"PO-Revision-Date: 2009-03-05 17:33+0330\n"
+"Last-Translator: Abbas Esmaeeli Some'eh <address@hidden>\n"
+"Language-Team: Persian <address@hidden>\n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=utf-8\n"
+"Content-Transfer-Encoding: 8bit\n"
+
+# type: Content of: <title>
+msgid "Can You Trust Your Computer? - GNU Project - Free Software Foundation
(FSF)"
+msgstr "Ø¢Ûا Ù
ÛâتÙاÙÛد ب٠کاÙ
Ù¾ÛÙتر Ø®Ùد اعتÙ
اد
Ú©ÙÛØ¯Ø - پرÙÚÙ Ú¯ÙÙ - بÙÛاد ÙرÙ
âاÙزارÙØ§Û Ø¢Ø²Ø§Ø¯"
+
+# type: Content of: <h2>
+msgid "Can You Trust Your Computer?"
+msgstr "Ø¢Ûا Ù
ÛâتÙاÙÛد ب٠کاÙ
Ù¾ÛÙتر Ø®Ùد اعتÙ
اد
Ú©ÙÛدØ"
+
+# type: Content of: <p>
+msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgstr "ÙÙشتÙÙ <a href=\"http://www.stallman.org/\">رÛÚارد
استاÙÙ
Ù</a>"
+
+# type: Content of: <p>
+msgid "Who should your computer take its orders from? Most people think their
computers should obey them, not obey someone else. With a plan they call
“trusted computing”, large media corporations (including the movie
companies and record companies), together with computer companies such as
Microsoft and Intel, are planning to make your computer obey them instead of
you. (Microsoft's version of this scheme is called “Palladium”.)
Proprietary programs have included malicious features before, but this plan
would make it universal."
+msgstr "کاÙ
Ù¾ÛÙتر Ø´Ù
ا باÛد دستÙراتش را از ÚÙ
Ú©Ø³Û Ø¯Ø±ÛاÙت Ú©ÙØ¯Ø Ø§ØºÙب Ù
ردÙ
Ùکر Ù
ÛâÚ©ÙÙد Ú©Ù
کاÙ
Ù¾ÛÙتر Ø¢ÙÙا باÛد از Ø¢Ùا٠اطاعت Ú©ÙØ¯Ø Ù ÙÙ
شخص دÛگرÛ. شرکتâÙØ§Û ØªÙÙÛد Ú©ÙÙدÙ٠رساÙÙ (شاÙ
٠شرکتâÙØ§Û ÙÛÙÙ
Ø³Ø§Ø²Û Ù Ø¶Ø¨Ø· صدا) ب٠ÙÙ
راÙ
شرکتâÙØ§Û Ú©Ø§Ù
Ù¾ÛÙØªØ±Û ÙÙ
اÙÙد Ù
اÛکرÙساÙت Ù
اÛÙتÙØ Ø·Ø±ØÛ Ø¨Ø§ ÙاÙ
”Ù
Øاسبات٠Ùاب٠اطÙ
ÛÙآ رÛختÙâاÙد. Ùد٠اÛÙ Ø·Ø±Ø Ø§Û٠است Ú©Ù
Ú©Ø§Ø±Û Ú©ÙÙد کاÙ
Ù¾ÛÙتر Ø´Ù
ا از Ø¢Ùا٠اطاعت Ú©ÙØ¯Ø Ù
Ù٠از Ø´Ù
ا. (ÙسخÙâØ§Û Ú©Ù Ù
اÛکرÙساÙت از اÛ٠طرØ
تÙÛ٠کرد٠است ”پاÙادÛÙÙ
“ ÙاÙ
Ûد٠Ù
ÛâØ´Ùد.) ÙرÙ
âاÙزارÙØ§Û Ø§Ø®ØªØµØ§ØµÛ Ù¾ÛØ´ از اÛÙ
ÙÛز اÛÙ ÙابÙÛت بداÙدÛشاÙ٠را در Ø®Ùد داشتÙدØ
اÙ
ا اÛÙ Ø·Ø±Ø Ø¢Ù Ø±Ø§ ÙراگÛر Ø®ÙاÙد کرد."
+
+# type: Content of: <p>
+msgid "Proprietary software means, fundamentally, that you don't control what
it does; you can't study the source code, or change it. It's not surprising
that clever businessmen find ways to use their control to put you at a
disadvantage. Microsoft has done this several times: one version of Windows
was designed to report to Microsoft all the software on your hard disk; a
recent “security” upgrade in Windows Media Player required users to
agree to new restrictions. But Microsoft is not alone: the KaZaa music-sharing
software is designed so that KaZaa's business partner can rent out the use of
your computer to their clients. These malicious features are often secret, but
even once you know about them it is hard to remove them, since you don't have
the source code."
+msgstr "ÙرÙ
âاÙزار Ø§Ø®ØªØµØ§ØµÛ Ø¯Ø± بÙÛاد Ø®Ùد ب٠اÛÙ
Ù
عÙÛ Ø§Ø³Øª Ú©Ù Ø´Ù
ا ÙÙ
ÛâتÙاÙÛد Ú©Ø§Ø±Û Ø±Ø§ Ú©Ù ÙرÙ
âاÙزار اÙجاÙ
Ù
ÛâدÙد Ú©Ùتر٠کÙÛØ¯Ø ÙÙ
ÛâتÙاÙÛد کد Ù
Ùبع آ٠را Ù
طاÙع٠کÙÛد Ù Ûا
تغÛÛر دÙÛد. Ø¬Ø§Û Ø´Ú¯ÙØªÛ ÙÛست ک٠تجار زÛرک
رÙØ´âÙاÛÛ Ø±Ø§ Ù
ÛâÛابÙد ک٠از Ú©Ùتر٠خÙÛØ´
استÙاد٠کÙÙد تا Ø´Ù
ا را در ÙضعÛØªÛ ÙاÙ
ساعد
Ùرار دÙÙد. Ù
اÛکرÙساÙت ÚÙدÛ٠بار اÛ٠کار را
اÙجاÙ
داد٠است: ÛÚ©Û Ø§Ø² ÙسخÙâÙØ§Û ÙÛÙدÙز بÙ
اÛÙ Ù
ÙظÙر طراØÛ Ø´Ø¯Ù Ø¨Ùد ک٠تÙ
اÙ
ÙرÙ
âاÙزارÙØ§Û Ù
ÙجÙد بر رÙÛ Ø¯Ûسک سخت Ø´Ù
ا را ب٠Ù
اÛکرÙساÙت گزارش Ú©ÙØ¯Ø Ø§Ø®Ûرا ÛÚ©Û Ø§Ø² ب٠رÙز
رساÙÛâÙØ§Û ”اÙ
ÙÛتۓ در Windows Media Player از
کاربرا٠Ù
ÛâØ®ÙاÙد Ú©Ù Ù
ÙاÙÙت Ø®Ùد را با Ù
ØدÙدÛتâÙØ§Û Ø¬Ø¯Ûد اعÙاÙ
دارÙد. اÙ
ا Ù
اÛکرÙساÙت در اÛ٠کار تÙÙا ÙÛست: ÙرÙ
âاÙزار
ب٠اشتراکâÚ¯Ø°Ø§Ø±Û Ù
ÙسÛÙÛÙ KaZaa ب٠گÙÙÙâاÛ
طراØÛ Ø´Ø¯Ù ØªØ§ شرÛÚ© ØªØ¬Ø§Ø±Û KaZaa بتÙاÙد از کاÙ
Ù¾ÛÙتر Ø´Ù
ا سÙØ¡ استÙاد٠کÙد. اÛÙ ÙابÙÛتâÙاÛ
بداÙدÛشاÙÙ Ù
عÙ
ÙÙا Ø³Ø±Û Ùگ٠داشت٠Ù
ÛâØ´ÙÙدØ
اÙ
ا ØØªÛ Ø§Ú¯Ø± Ø´Ù
ا از Ø¢ÙÙا اطÙاع داشت٠باشÛد بÙ
Ø³Ø®ØªÛ Ù
ÛâتÙاÙÛد ØØ°Ùشا٠کÙÛØ¯Ø Úرا ک٠کد Ù
Ùبع
را در اختÛار ÙدارÛد."
+
+# type: Content of: <p>
+msgid "In the past, these were isolated incidents. “Trusted
computing” would make it pervasive. “Treacherous computing”
is a more appropriate name, because the plan is designed to make sure your
computer will systematically disobey you. In fact, it is designed to stop your
computer from functioning as a general-purpose computer. Every operation may
require explicit permission."
+msgstr "در گذشتÙØ Ø§ÛÙÙا تÙÙا در Ù
ÙØ§Ø±Ø¯Û Ø®Ø§Øµ
ÙجÙد داشتÙد. اÙ
ا ”Ù
Øاسبات٠Ùاب٠اطÙ
ÛÙآ Ù
ÛâتÙاÙد آ٠را ÙراگÛر Ú©Ùد. ”Ù
Øاسبات Ø®ÛاÙت کاراÙÙ“ ÙاÙ
Ù
ÙاسبâØªØ±Û Ø§Ø³Øª
Úرا ک٠در ØÙÛÙت اÛÙ Ø·Ø±Ø Ø¨Ø¯ÛÙ Ù
ÙظÙر طراØÛ Ø´Ø¯Ù
است تا اطÙ
ÛÙا٠Øاص٠کÙد کاÙ
Ù¾ÛÙتر از Ø´Ù
ا
اطاعت ÙØ®ÙاÙد کرد. در ØÙÛÙØªØ Ø§ÛÙ Ø·Ø±Ø Ø¨Ø±Ø§Û
جÙÙÚ¯ÛØ±Û Ø§Ø² عÙ
Ùکرد کاÙ
Ù¾ÛÙتر Ø´Ù
ا ب٠عÙÙا٠ÛÚ©
کاÙ
Ù¾ÛÙتر ÚÙد Ù
ÙظÙر٠پدÛد Ø¢Ù
د٠است. Ùر عÙ
ÙÛ
اØتÛاج ب٠اجازÙ٠صرÛØ Ø®ÙاÙد داشت."
+
+# type: Content of: <p>
+msgid "The technical idea underlying treacherous computing is that the
computer includes a digital encryption and signature device, and the keys are
kept secret from you. Proprietary programs will use this device to control
which other programs you can run, which documents or data you can access, and
what programs you can pass them to. These programs will continually download
new authorization rules through the Internet, and impose those rules
automatically on your work. If you don't allow your computer to obtain the new
rules periodically from the Internet, some capabilities will automatically
cease to function."
+msgstr "اÛدÙ٠تکÙÛÚ©Û٠پشت٠Ù
Øاسبات Ø®ÛاÙت
کاراÙ٠اÛ٠است ک٠کاÙ
Ù¾ÛÙتر شاÙ
٠سختâاÙزارÛ
رÙ
Ø²Ú¯Ø°Ø§Ø±Û Ù Ø§Ù
ضا شد٠باشد ٠اÛÙ Ú©ÙÛدÙا از
دسترس Ø´Ù
ا دÙر Ùگ٠داشت٠شÙÙد. برÙاÙ
ÙâÙاÛ
Ø§Ø®ØªØµØ§ØµÛ Ø§Ø² اÛ٠سختâاÙزار Ø¨Ø±Ø§Û Ú©Ùتر٠برÙاÙ
ÙâÙاÛÛ Ú©Ù Ø´Ù
ا Ù
ÛâتÙاÙÛد اجرا Ú©ÙÛØ¯Ø Ù
ستÙدات ٠اطÙØ§Ø¹Ø§ØªÛ Ú©Ù Ù
ÛâتÙاÙÛد ب٠آÙâÙا
Ø¯Ø³ØªØ±Ø³Û Ø¯Ø§Ø´ØªÙ Ø¨Ø§Ø´Ûد ٠برÙاÙ
ÙâÙاÛÛ Ú©Ù Ù
ÛâتÙاÙÛد اÛ٠اطÙاعات را درÙÙشا٠ب٠کار
Ú¯ÛرÛØ¯Ø Ø§Ø³ØªÙاد٠خÙاÙÙد کرد. اÛ٠برÙاÙ
ÙâÙا
ب٠طÙر Ù¾ÛÙست٠ÙÙاÙÛÙ Ù
ربÙØ· ب٠اختÛارات
کاربر را از اÛÙترÙت درÛاÙت کرد٠٠آ٠را بÙ
صÙرت Ø®Ùدکار ب٠کار Ø´Ù
ا اعÙ
ا٠Ù
ÛâÚ©ÙÙد. اگر Ø´Ù
ا ب٠کاÙ
Ù¾ÛÙتر Ø®Ùد اجازÙ٠درÛاÙت ÙÙاÙÛ٠جدÛد
را ب٠صÙرت دÙرÙâØ§Û ÙدÙÛØ¯Ø Ø¨Ø¹Ø¶Û Ø§Ø²
تÙاÙاÛÛâÙØ§Û Ø¢Ù Ø¨Ù Ø·Ùر Ø®Ùدکار Ù
تÙÙÙ Ø®ÙاÙÙد
شد."
+
+# type: Content of: <p>
+msgid "Of course, Hollywood and the record companies plan to use treacherous
computing for “DRM” (Digital Restrictions Management), so that
downloaded videos and music can be played only on one specified computer.
Sharing will be entirely impossible, at least using the authorized files that
you would get from those companies. You, the public, ought to have both the
freedom and the ability to share these things. (I expect that someone will
find a way to produce unencrypted versions, and to upload and share them, so
DRM will not entirely succeed, but that is no excuse for the system.)"
+msgstr "Úرا Ú©Ù ÙÙØ ÙاÙÛÙÙد ٠شرکتâÙØ§Û Ø¶Ø¨Ø· صدا
در Ùظر دارÙد ک٠از Ù
Øاسبات Ø®ÛاÙت کاراÙÙ
Ø¨Ø±Ø§Û “DRM” (Ù
دÛرÛت Ù
ØدÙدÛتâÙاÛ
دÛجÛتاÙÛ) استÙاد٠کÙÙد. بÙابراÛÙ ÙÛÙÙ
âÙا Ù
Ù
ÙسÛÙÛâÙØ§Û Ø¯Ø§ÙÙÙد شد٠تÙÙا Ù
ÛâتÙاÙÙد بر
رÙÛ ÛÚ© کاÙ
Ù¾ÛÙتر Ù
شخص اجرا Ø´ÙÙد. بÙ
اشتراکâÚ¯Ø°Ø§Ø±Û Ø¨Ù Ø·Ùر کاÙ
٠غÛر Ù
Ù
Ú©Ù Ø®ÙاÙد
Ø´Ø¯Ø Ø¯Ø³Øª Ú©Ù
Ø¨Ø±Ø§Û ÙاÛÙâÙØ§Û Ø±Ù
ز Ú¯Ø°Ø§Ø±Û Ø´Ø¯ÙâاÛ
Ú©Ù Ø´Ù
ا از آ٠شرکتâÙا درÛاÙت Ù
ÛâÚ©ÙÛد. Ø´Ù
اØ
عÙ
ÙÙ
Ù
ردÙ
Ø Ø¨Ø§Ûد اÛÙ Ø¢Ø²Ø§Ø¯Û Ù ØªÙاÙاÛÛ Ø±Ø§
داشت٠باشÛد ک٠اÛÙ ÙاÛÙâÙا را ب٠اشتراک
بگذارÛد. (اÙتظار Ù
ÛâرÙد Ú©Ù Ø´Ø®ØµÛ Ø¨ØªÙاÙد رÙØ´Û
بÛابد Ú©Ù ÙسخÙâÙØ§Û Ø±Ù
Ø²Ú¯Ø°Ø§Ø±Û Ùشد٠را تÙÙÛد
Ú©ÙØ¯Ø Ø¢ÙÙا را آپÙÙد کرد٠٠ب٠اشتراک بگذاردØ
ب٠اÛ٠ترتÛب DRM ب٠طÙر کاÙ
Ù Ù
ÙÙÙ ÙØ®ÙاÙد شدØ
اÙ
ا اÛ٠اÙ
ر ب٠طÙر کاÙ
٠سÛستÙ
را تبرئ٠ÙÙ
ÛâÚ©Ùد.)"
+
+# type: Content of: <p>
+msgid "Making sharing impossible is bad enough, but it gets worse. There are
plans to use the same facility for email and documents—resulting in email
that disappears in two weeks, or documents that can only be read on the
computers in one company."
+msgstr "غÛر Ù
Ù
ک٠کردÙ٠ب٠اشتراکâÚ¯Ø°Ø§Ø±Û Ø¨Ù
Ø®ÙØ¯Û Ø®Ùد بد ÙØ³ØªØ Ø§Ù
ا بدتر ÙÛز Ø®ÙاÙد شد.
اÛدÙâÙاÛÛ ÙجÙد دارد ک٠بتÙا٠از اÛÙ Ø·Ø±Ø Ø¯Ø±
اÛÙ
ÛÙâÙا ٠دÛگر Ù
ستÙدات استÙاد٠کرد —
ÙتÛج٠اÛÙ
ÛÙâÙاÛÛ Ø®ÙاÙÙد بÙد ک٠در Ø·Ù٠دÙ
ÙÙت٠ÙاپدÛد Ù
ÛâØ´ÙÙد. Ûا Ù
ستÙØ¯Ø§ØªÛ Ú©Ù ØªÙÙا بر
رÙÛ Ú©Ø§Ù
Ù¾ÛÙترÙØ§Û Ø´Ø±Ú©Øª Ùاب٠خÙاÙد٠ÙستÙد."
+
+# type: Content of: <p>
+msgid "Imagine if you get an email from your boss telling you to do something
that you think is risky; a month later, when it backfires, you can't use the
email to show that the decision was not yours. “Getting it in
writing” doesn't protect you when the order is written in disappearing
ink."
+msgstr "Ùرض Ú©ÙÛد Ú©Ù Ø´Ù
ا از رئÛس Ø®Ùد اÛÙ
ÛÙÛ
درÛاÙت Ù
ÛâÚ©ÙÛد ک٠در آ٠از Ø´Ù
ا Ø®Ùاست٠شد٠عÙ
ÙÛ Ø±Ø§ ک٠از Ùظر Ø´Ù
ا پرÙ
خاطر٠است اÙجاÙ
دÙÛد
Ø ÛÚ© Ù
Ø§Ù Ø¨Ø¹Ø¯Ø ÙÙگاÙ
Û Ú©Ù ÙتÛجÙÙ Ù
عکÙس ب٠دست
Ø¢Ù
Ø¯Ø ÙÙ
ÛâتÙاÙÛد از آ٠اÛÙ
Û٠استÙاد٠کÙÛد
تا ثابت Ú©ÙÛد اÛ٠تصÙ
ÛÙ
را Ø´Ù
ا ÙگرÙتÙâاÛد.
ÙÙگاÙ
Û Ú©Ù Ø¯Ø³ØªÙرات با جÙÙØ±Û Ùگاشت٠شد٠باشÙد
Ú©Ù ÙاپدÛد Ù
ÛâØ´ÙØ¯Ø ”دستÙر کتبۓ ÙÙ
ÛâتÙاÙد از Ø´Ù
ا ØÙاظت Ú©Ùد."
+
+# type: Content of: <p>
+msgid "Imagine if you get an email from your boss stating a policy that is
illegal or morally outrageous, such as to shred your company's audit documents,
or to allow a dangerous threat to your country to move forward unchecked.
Today you can send this to a reporter and expose the activity. With
treacherous computing, the reporter won't be able to read the document; her
computer will refuse to obey her. Treacherous computing becomes a paradise for
corruption."
+msgstr "تصÙر Ú©ÙÛد اÛÙ
ÛÙÛ Ø§Ø² رئÛس Ø®Ùد درÛاÙت Ù
ÛâÚ©ÙÛد Ú©Ù ÙÙØ¹Û Ø®Ø· Ù
Ø´Û ØºÛر ÙاÙÙÙÛ Ù Ûا غÛر
اخÙاÙÛ Ø±Ø§ تعÛÛÙ Ù
ÛâÚ©Ùد. ÙÙ
اÙÙد از بÛ٠بردÙ
اسÙاد Ø¨Ø§Ø²Ø±Ø³Û Ø´Ø±Ú©ØªØ Ù Ûا اÛ٠ک٠ب٠ÛÚ© تÙدÛد
خطرÙاک Ø¨Ø±Ø§Û Ú©Ø´Ùر Ø®Ùدتا٠اجازÙ٠عبÙر بدÙÙ
Ø¨Ø±Ø±Ø³Û Ø¨Ø¯Ùد. اÙ
رÙز٠شÙ
ا Ù
ÛâتÙاÙÛد اÛÙ ÙاÙ
Ù
را ب٠ÛÚ© خبرÙگار ارائ٠داد٠٠اÛÙ ÙعاÙÛتâÙا
را اÙشا Ú©ÙÛد. با استÙاد٠از Ù
Øاسبات Ø®ÛاÙت
کاراÙÙØ Ø®Ø¨Ø±Ùگار ÙÙ
ÛâتÙاÙد سÙد را Ù
طاÙعÙ
Ú©ÙØ¯Ø Ú©Ø§Ù
Ù¾ÛÙترش از ا٠اطاعت ÙÙ
ÛâÚ©Ùد. Ù
Øاسبات Ø®ÛاÙت کاراÙ٠بÙØ´ØªÛ Ø¨Ø±Ø§Û Ùساد Ø®ÙاÙد
بÙد."
+
+# type: Content of: <p>
+msgid "Word processors such as Microsoft Word could use treacherous computing
when they save your documents, to make sure no competing word processors can
read them. Today we must figure out the secrets of Word format by laborious
experiments in order to make free word processors read Word documents. If Word
encrypts documents using treacherous computing when saving them, the free
software community won't have a chance of developing software to read
them—and if we could, such programs might even be forbidden by the
Digital Millennium Copyright Act."
+msgstr "ÙرÙ
âاÙزارÙØ§Û Ù¾Ø±Ø¯Ø§Ø²Ø´ سÙد ÙÙ
اÙÙد Microsoft
Word Ù
ÛâتÙاÙÙد ÙÙگاÙ
Û Ú©Ù Ø´Ù
ا سÙØ¯Û Ø±Ø§ ذخÛر٠Ù
ÛâÚ©ÙÛØ¯Ø Ø§Ø² Ù
Øاسبات Ø®ÛاÙت کاراÙ٠استÙادÙ
Ú©ÙÙد تا اطÙ
ÛÙا٠Øاص٠ÙÙ
اÛÙد Ú©Ù ÙرÙ
âاÙزارÙØ§Û Ù¾Ø±Ø¯Ø§Ø²Ø´ سÙد٠رÙÛب ÙÙ
ÛâتÙاÙÙد
Ø¢ÙÙا را بخÙاÙÙد. اÙ
رÙز٠Ù
ا باÛد با استÙادÙ
از آزÙ
اÛشات سخت Ù Ù
شک٠رازÙØ§Û Ù
ستÙدات رÙ
Ø²Ú¯Ø°Ø§Ø±Û Ø´Ø¯ÙÙ Word را Ú©Ø´Ù Ú©ÙÛÙ
تا بتÙاÙÛÙ
ÙرÙ
âاÙزارÙØ§Û Ù¾Ø±Ø¯Ø§Ø²Ø´ سÙد را ب٠گÙÙÙâØ§Û Ø·Ø±Ø§ØÛ
Ú©ÙÛÙ
تا Ù
ستÙدات Word را بخÙاÙÙد. اگر Word از Ù
Øاسبات Ø®ÛاÙت کاراÙÙ Ø¨Ø±Ø§Û Ø±Ù
ز Ú¯Ø°Ø§Ø±Û Ù
ستÙدات
استÙاد٠کÙØ¯Ø Ø¬Ø§Ù
عÙÙ ÙرÙ
âاÙزار آزاد شاÙسÛ
Ø¨Ø±Ø§Û ØªÙسعÙÙ ÙرÙ
âاÙØ²Ø§Ø±Û Ú©Ù Ø¨ØªÙاÙد Ø¢ÙÙا را
بخÙاÙد ÙØ®ÙاÙد داشت — Ù ØØªÛ Ø§Ú¯Ø± Ù
ÛâتÙاÙستÛÙ
Ø ÚÙÛÙ ÙرÙ
âاÙزارÙاÛÛ Ø§Ø² طرÙ
Digital Millennium Copyright Act Ù
Ù
ÙÙع اعÙاÙ
Ù
ÛâشدÙد."
+
+# type: Content of: <p>
+msgid "Programs that use treacherous computing will continually download new
authorization rules through the Internet, and impose those rules automatically
on your work. If Microsoft, or the US government, does not like what you said
in a document you wrote, they could post new instructions telling all computers
to refuse to let anyone read that document. Each computer would obey when it
downloads the new instructions. Your writing would be subject to 1984-style
retroactive erasure. You might be unable to read it yourself."
+msgstr "برÙاÙ
ÙâÙاÛÛ Ú©Ù Ø§Ø² Ù
Øاسبات Ø®ÛاÙت
کاراÙ٠استÙاد٠Ù
ÛâÚ©ÙÙد Ù
ÛâتÙاÙÙد ب٠طÙر
Ù¾ÛÙست٠ÙÙاÙÛ٠جدÛد Ù
ربÙط٠ب٠اختÛارات
کاربر را از اÛÙترÙت درÛاÙت کرد٠٠ب٠طÙر
Ø®Ùدکار ب٠کار Ø´Ù
ا اعÙ
ا٠کÙÙد. اگر Ù
اÛکرÙساÙØªØ Ù Ûا دÙÙت اÛاÙات Ù
تØدÙØ Ø¢ÙÚÙ Ø´Ù
ا
در سÙد Ø®Ùد ÙÙشتÙâاÛد را دÙست Ùداشت٠باشÙدØ
Ù
ÛâتÙاÙÙد دستÙØ±Ø§ØªÛ Ø±Ø§ ارسا٠کÙÙد ک٠تÙ
اÙ
کاÙ
Ù¾ÛÙترÙا از Ø®ÙاÙد آ٠سÙد سرباز زÙÙد. Ùر
کاÙ
Ù¾ÛÙØªØ±Ø ÙÙگاÙ
Û Ú©Ù Ø¯Ø³ØªÙرات جدÛد را درÛاÙت
Ú©Ùد از آ٠اطاعت Ø®ÙاÙد ÙÙ
Ùد. ÙÙشتÙÙ Ø´Ù
ا Ù
Ù
Ú©Ù
است دستخÙØ´ ساÙسÙرÙاÛÛ Ø¨Ù Ø³Ø¨Ú© Û±Û¹Û¸Û´ Ø´Ùد. Ù
Ù
Ú©Ù
است ØØªÛ Ø®Ùد Ø´Ù
ا ÙÙ
ÙتÙاÙÛد آ٠را بخÙاÙÛد."
+
+# type: Content of: <p>
+msgid "You might think you can find out what nasty things a treacherous
computing application does, study how painful they are, and decide whether to
accept them. It would be short-sighted and foolish to accept, but the point is
that the deal you think you are making won't stand still. Once you come to
depend on using the program, you are hooked and they know it; then they can
change the deal. Some applications will automatically download upgrades that
will do something different—and they won't give you a choice about
whether to upgrade."
+msgstr "Ù
Ù
ک٠است تصÙر Ú©ÙÛد Ú©Ù Ù
ÛâتÙاÙÛد Ù
Ùارد
ÙاÙ
طبÙع٠ÛÚ© ÙرÙ
âاÙزار خائ٠را Ù¾Ûدا Ú©ÙÛØ¯Ø Ù
Ûزا٠رÙجâØ¢Ùر بÙد٠آÙÙا را Ù
طاÙع٠کÙÛØ¯Ø Ù
تصÙ
ÛÙ
بگÛرÛد ک٠آÛا ÙبÙÙشا٠کÙÛد Ûا Ø®Ûر. اÛÙ
تصÙر سطØÛ ÙگراÙ٠٠ابÙÙاÙ٠است. ÙکتÙ٠اصÙÛ
اÛÙجاست Ú©Ù ÙØ±Ø§Ø±Ø¯Ø§Ø¯Û Ú©Ù Ø¯Ø± Øا٠اÙ
ضا کردÙØ´
ÙستÛد پاÛدار ÙØ®ÙاÙد بÙد. ÙÙگاÙ
Û Ú©Ù Ø¨Ù
استÙاد٠از برÙاÙ
Ù Ùابست٠شدÛØ¯Ø Ø¨Ù Ø¯Ø§Ù
اÙتادÙâاÛد ٠آÙÙا اÛ٠را Ù
ÛâداÙÙØ¯Ø Ù¾Ø³ از
Ø¢Ù Ù
ÛâتÙاÙÙد Ùرارداد را تغÛÛر دÙÙد. تعدادÛ
از ÙرÙ
âاÙزارÙا ب٠طÙر Ø®Ùدکار ب٠رÙز
رساÙÛâÙاÛÛ Ø±Ø§ داÙÙÙد Ø®ÙاÙÙد کرد ک٠اعÙ
ا٠Ù
تÙاÙØªÛ Ø±Ø§ اÙجاÙ
Ù
ÛâدÙÙد — ٠آÙÙا ب٠شÙ
ا
اجازÙ٠اÙتخاب در Ù
Ùرد ب٠رÙز Ø¢ÙØ±Û Ø±Ø§
ÙØ®ÙاÙÙد داد."
+
+# type: Content of: <p>
+msgid "Today you can avoid being restricted by proprietary software by not
using it. If you run GNU/Linux or another free operating system, and if you
avoid installing proprietary applications on it, then you are in charge of what
your computer does. If a free program has a malicious feature, other
developers in the community will take it out, and you can use the corrected
version. You can also run free application programs and tools on non-free
operating systems; this falls short of fully giving you freedom, but many users
do it."
+msgstr "اÙ
رÙز٠با استÙاد٠Ùکرد٠از ÙرÙ
âاÙزار
Ø§Ø®ØªØµØ§ØµÛ Ù
ÛâتÙاÙÛد از Ù
ØدÙد شد٠ب٠ÙسÛÙÙÙ
آ٠اجتÙاب Ú©ÙÛد. اگر از Ú¯ÙÙ/ÙÛÙÙکس Ù Ûا سÛستÙ
âعاÙ
٠آزاد دÛÚ¯Ø±Û Ø§Ø³ØªÙاد٠کÙÛد Ù ÙرÙ
âاÙزارÙØ§Û Ø§Ø®ØªØµØ§ØµÛ Ø±Ø§ ب٠رÙÛ Ø¢Ù Ùصب ÙÚ©ÙÛØ¯Ø Ù
ÛâتÙاÙÛد اختÛار Ø¢ÙÚ٠کاÙ
Ù¾ÛÙترتا٠اÙجاÙ
Ù
ÛâدÙد را داشت٠باشÛد. اگر ÙرÙ
âاÙزار آزادÛ
Ø¯Ø§Ø±Ø§Û ÙابÙÛت بداÙدÛشاÙ٠باشدØ
تÙسعÙâدÙÙدگا٠دÛگر در جاÙ
ع٠آ٠را ØØ°Ù
Ø®ÙاÙÙد کرد Ù Ø´Ù
ا Ù
ÛâتÙاÙÛد از ÙسخÙ٠اصÙاØ
شد٠استÙاد٠کÙÛد. ÙÙ
ÚÙÛÙ Ø´Ù
ا Ù
ÛâتÙاÙÛد ÙرÙ
âاÙزارÙØ§Û Ø¢Ø²Ø§Ø¯ را بر رÙÛ Ø³ÛستÙ
âعاÙ
ÙâÙاÛ
غÛر آزاد اجرا Ú©ÙÛØ¯Ø Ø§Û٠اÙ
ر ب٠شÙ
ا Ø¢Ø²Ø§Ø¯Û Ú©Ø§Ù
٠اعطا ÙÙ
ÛâÚ©ÙØ¯Ø Ø§Ù
ا بسÛØ§Ø±Û Ø§Ø² کاربرا٠اÛÙ
کار را اÙجاÙ
Ù
ÛâدÙÙد."
+
+# type: Content of: <p>
+msgid "Treacherous computing puts the existence of free operating systems and
free applications at risk, because you may not be able to run them at all.
Some versions of treacherous computing would require the operating system to be
specifically authorized by a particular company. Free operating systems could
not be installed. Some versions of treacherous computing would require every
program to be specifically authorized by the operating system developer. You
could not run free applications on such a system. If you did figure out how,
and told someone, that could be a crime."
+msgstr "Ù
Øاسبات Ø®ÛاÙتâکاراÙÙ Ù
ÙجÙدÛت ÙرÙ
âاÙزار آزاد را با خطر Ù
Ùاج٠Ù
ÛâÚ©ÙØ¯Ø Úرا Ú©Ù
Ù
Ù
ک٠است Ø´Ù
ا ÙتÙاÙÛد Ø¢ÙÙا را اجرا Ú©ÙÛد. بعضÛ
از ÙسخÙâÙØ§Û Ù
Øاسبات Ø®ÛاÙتâکاراÙ٠ب٠سÛستÙ
âعاÙ
ÙÛ Ø§ØتÛاج دارÙد ک٠تÙسط شرکت خاصÛ
تاÛÛد شد٠باشد. سÛستÙ
âعاÙ
ÙâÙØ§Û Ø¢Ø²Ø§Ø¯ ÙÙ
ÛâتÙاÙÙد Ùصب Ø´ÙÙد. Ø¨Ø¹Ø¶Û Ø§Ø² ÙسخÙâÙØ§Û Ù
Øاسبات Ø®ÛاÙتâکاراÙ٠اØتÛاج دارÙد ک٠تÙ
اÙ
ÙرÙ
âاÙزارÙا تÙسط تÙسعÙâدÙÙدÙ٠سÛستÙ
âعاÙ
٠تاÛÛد شد٠باشÙد. Ø´Ù
ا ÙÙ
ÛâتÙاÙÛد ÙرÙ
âاÙزارÙØ§Û Ø¢Ø²Ø§Ø¯ را رÙÛ ÚÙÛ٠سÛستÙ
Û Ø§Ø¬Ø±Ø§
Ú©ÙÛد. اگر Ø´Ù
ا Ù
تÙج٠بشÙÛد Ú©Ù ÚØ·Ùر Ù
ÛâتÙاÙ
اÛ٠کار را اÙجاÙ
داد ٠ب٠دÛگرا٠بگÙÛÛØ¯Ø Ù
رتکب جÙاÛت شدÙâاÛد."
+
+# type: Content of: <p>
+msgid "There are proposals already for US laws that would require all
computers to support treacherous computing, and to prohibit connecting old
computers to the Internet. The CBDTPA (we call it the Consume But Don't Try
Programming Act) is one of them. But even if they don't legally force you to
switch to treacherous computing, the pressure to accept it may be enormous.
Today people often use Word format for communication, although this causes
several sorts of problems (see <a
href=\"/philosophy/no-word-attachments.html\">“We Can Put an End to Word
Attachments”</a>). If only a treacherous computing machine can read the
latest Word documents, many people will switch to it, if they view the
situation only in terms of individual action (take it or leave it). To oppose
treacherous computing, we must join together and confront the situation as a
collective choice."
+msgstr "Ù¾ÛØ´ÙÙØ§Ø¯Ø§ØªÛ Ø¨Ø±Ø§Û ÙاÙÙÙ Ø§Ø³Ø§Ø³Û Ø§ÛاÙات Ù
تØد٠ÙجÙد دارد Ù
بÙÛ Ø¨Ø± اÛÙک٠تÙ
اÙ
کاÙ
Ù¾ÛÙترÙا باÛد از Ù
Øاسبات Ø®ÛاÙتâکاراÙÙ
پشتÛباÙÛ Ú©ÙÙØ¯Ø Ù Ú©Ø§Ù
Ù¾ÛÙترÙØ§Û ÙدÛÙ
Û ØÙ
اتصا٠ب٠اÛÙترÙت را Ùداشت٠باشÙد. CBDTPA (Ù
ا Ø¢Ù
را «استÙاد٠کÙÛد اÙ
ا برÙاÙ
ÙâÙÙÛØ³Û ÙÚ©ÙÛد» Ù
ÛâÙاÙ
ÛÙ
) ÛÚ©Û Ø§Ø² اÛÙâÙا است. اÙ
ا ØØªÛ Ø§Ú¯Ø±
Ø¢ÙÙا Ø´Ù
ا را ب٠طÙر ÙاÙÙÙÛ Ù
جبÙر ب٠استÙادÙ
از Ù
Øاسبات Ø®ÛاÙتâکاراÙÙ ÙÚ©ÙÙØ¯Ø Ùشار براÛ
ÙبÙ٠کرد٠آ٠Ù
ÛâتÙاÙد زÛاد باشد. اÙ
رÙز٠Ù
ردÙ
از ÙاÙب Word Ø¨Ø±Ø§Û Ø§Ø±ØªØ¨Ø§Ø· استÙاد٠Ù
ÛâÚ©ÙÙد.
اÛ٠اÙ
ر ÙÛز Ù
ÛâتÙاÙد بسÛار Ù
شک٠آÙرÛ٠باشد
(<a href=\"/philosophy/no-word-attachments.html\">”Ù
ا Ù
ÛâتÙاÙÛÙ
ب٠پÛÙستâÙØ§Û Word پاÛا٠دÙÛÙ
“</a>
را ببÛÙÛد.) اگر تÙÙا Ù
اشÛÙÛ Ú©Ù Ø§Ø² Ù
Øاسبات
Ø®ÛاÙتâکاراÙ٠پشتÛباÙÛ Ù
ÛâÚ©Ùد بتÙاÙد Ù
ستÙدات Word را بخÙاÙØ¯Ø Ù Ø§Ú¯Ø± اشخاص اÛÙ Ù
ÙÙعÛت
را تÙÙا ب٠صÙرت Ø´Ø®ØµÛ Ø¯Ø± Ùظر بگÛرÙد (بگÛرش Ûا
رÙاÛØ´ Ú©Ù)Ø Ø¨Ø³ÛØ§Ø±Û Ø§Ø² Ù
ردÙ
ب٠آ٠رÙÛ Ø®ÙاÙÙد
Ø¢Ùرد. Ø¨Ø±Ø§Û Ù
خاÙÙت با Ù
Øاسبات Ø®ÛاÙتâکاراÙÙØ
Ù
ا باÛد ب٠ÛکدÛگر بپÛÙÙدÛÙ
٠با اÛÙ Ù
ÙÙعÛت
ب٠عÙÙا٠ÛÚ© اÙتخاب اجتÙ
Ø§Ø¹Û Ø¨Ø±Ø®Ùرد Ú©ÙÛÙ
."
+
+# type: Content of: <p>
+msgid "For further information about treacherous computing, see <a
href=\"http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html\">http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html</a>."
+msgstr "Ø¨Ø±Ø§Û Ø§Ø·Ùاعات بÛشتر در Ù
Ùرد Ù
Øاسبات
Ø®ÛاÙتâکاراÙÙØ <a
href=\"http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html\">http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html</a>
را ببÛÙÛد."
+
+# type: Content of: <p>
+msgid "To block treacherous computing will require large numbers of citizens
to organize. We need your help! The <a href=\"http://www.eff.org\">Electronic
Frontier Foundation</a> and <a href=\"http://www.publicknowledge.org\">Public
Knowledge</a> are campaigning against treacherous computing, and so is the
FSF-sponsored Digital Speech Project. Please visit these Web sites so you can
sign up to support their work."
+msgstr "Ø¨Ø±Ø§Û Ù
تÙÙ٠ساخت٠Ù
Øاسبات
Ø®ÛاÙتâکاراÙ٠باÛد تعداد زÛØ§Ø¯Û Ø§Ø² Ø´ÙرÙÙداÙ
را سازÙ
اÙدÙÛ Ú©ÙÛÙ
. Ù
ا ب٠کÙ
Ú© Ø´Ù
ا اØتÛاج
دارÛÙ
! <a href=\"http://www.eff.org\">بÛÙاد Ùشکر
اÙکترÙÙÛÚ©Û</a> Ù <a
href=\"http://www.publicknowledge.org\">آگاÙÛ Ø¹Ù
ÙÙ
Û</a> Ù ÙÙ
ÚÙÛ٠پرÙÚÙ٠سخÙراÙÛ Ø¯ÛجÛتاÙÛ Ú©Ù ØªÙسط بÙÛاد
ÙرÙ
âاÙزارÙØ§Û Ø¢Ø²Ø§Ø¯ ØÙ
اÛت Ù
ÛâØ´ÙØ¯Ø Ø¨Ø± عÙÛÙ Ù
Øاسبات Ø®ÛاÙتâکاراÙÙ Ù
بارز٠Ù
ÛâÚ©ÙÙد. ÙØ·Ùا
از اÛÙ ÙبâساÛتâÙا دÛد٠کÙÛد تا بتÙاÙÛد عضÙ
شد٠٠از کارشا٠ØÙ
اÛت Ú©ÙÛد."
+
+# type: Content of: <p>
+msgid "You can also help by writing to the public affairs offices of Intel,
IBM, HP/Compaq, or anyone you have bought a computer from, explaining that you
don't want to be pressured to buy “trusted” computing systems so
you don't want them to produce any. This can bring consumer power to bear. If
you do this on your own, please send copies of your letters to the
organizations above."
+msgstr "ÙÙ
ÚÙÛÙ Ù
ÛâتÙاÙÛد ب٠ادارÙâÙØ§Û Ø¹Ø§Ù
اÙÙ
ÙÙع٠ÙÙ
اÙÙد IntelØ IBMØ HP/Compaq Ù Ûا Ùر شخص دÛگرÛ
ک٠از ا٠کاÙ
Ù¾ÛÙتر Ù
ÛâخرÛد ÙاÙ
Ù ÙÙشت٠Ù
تÙضÛØ Ø¯ÙÛد Ú©Ù ÙÙ
ÛâØ®ÙاÙÛد Ù
جبÙر ب٠خرÛد
سÛستÙ
âÙØ§Û Ø¨Ù ÙÙ
را٠Ù
Øاسبات ”Ùاب٠اطÙ
ÛÙآ باشÛد بÙابراÛÙ ÙÙ
ÛâØ®ÙاÙÛد ک٠آÙÙا
ÚÙÛ٠سÛستÙ
âÙاÛÛ ØªÙÙÛد Ú©ÙÙد. اÛ٠اÙ
ر Ù
ÛâتÙاÙد Ù
Ùجب Ø§Ø¹Ø·Ø§Û Ùدرت ب٠Ù
Ø´ØªØ±Û Ø´Ùد. اگر Ø´Ù
ا Ø®Ùدتا٠اÛ٠کار را اÙجاÙ
Ù
ÛâدÙÛØ¯Ø ÙØ·Ùا Ú©Ù¾Û
ÙاÙ
ÙâÙØ§Û Ø®Ùد را ب٠سازÙ
اÙâÙØ§Û ÙاÙ
بردÙ
ارسا٠کÙÛد."
+
+# type: Content of: <h3>
+msgid "Postscripts"
+msgstr "Ù¾ÛâÙÙشت"
+
+# type: Content of: <ol><li>
+msgid "The GNU Project distributes the GNU Privacy Guard, a program that
implements public-key encryption and digital signatures, which you can use to
send secure and private email. It is useful to explore how GPG differs from
treacherous computing, and see what makes one helpful and the other so
dangerous."
+msgstr "پرÙÚÙ Ú¯ÙÙ GNU Privacy Guard را Ù
Ùتشر ساخت٠است.
برÙاÙ
ÙâØ§Û Ú©Ù Ø±Ù
Ø²Ú¯Ø°Ø§Ø±Û Ú©ÙÛد٠عÙ
ÙÙ
Û Ù Ø§Ù
ضاÛ
دÛجÛتاÙÛ Ø±Ø§ Ù¾ÛادÙâØ³Ø§Ø²Û Ù
ÛâÚ©Ùد Ù Ø´Ù
ا Ù
ÛâتÙاÙÛد از Ø¢Ù Ø¨Ø±Ø§Û Ø§Ø±Ø³Ø§Ù ÙاÙ
ÙÙ
اÙکترÙÙÛÚ©Û٠اÙ
٠٠خصÙØµÛ Ø§Ø³ØªÙاد٠کÙÛد. Ø®Ùب
است ک٠در Ù
Ùرد ÚÚ¯ÙÙÚ¯Û ØªÙاÙت Ù
Ûا٠Ù
Øاسبات
Ø®ÛاÙتâکاراÙÙ Ù GPG صØبت Ú©ÙÛÙ
٠ببÛÙÛÙ
Ú©Ù ÚÙ
ÚÛØ²Û Ø¨Ø§Ø¹Ø« Ù
ÙÛد بÙد٠ÛÚ©Û Ù Ø®Ø·Ø±ÙØ§Ú©Û Ø¯ÛÚ¯Ø±Û Ù
ÛâØ´Ùد."
+
+# type: Content of: <ol><li><p>
+msgid "When someone uses GPG to send you an encrypted document, and you use
GPG to decode it, the result is an unencrypted document that you can read,
forward, copy, and even re-encrypt to send it securely to someone else. A
treacherous computing application would let you read the words on the screen,
but would not let you produce an unencrypted document that you could use in
other ways. GPG, a free software package, makes security features available to
the users; they use it. Treacherous computing is designed to impose
restrictions on the users; it uses them."
+msgstr "ÙÙگاÙ
Û Ú©Ù Ø´Ø®ØµÛ Ø§Ø² GPG Ø¨Ø±Ø§Û Ø§Ø±Ø³Ø§Ù ÛÚ© سÙد
رÙ
Ø²Ú¯Ø°Ø§Ø±Û Ø´Ø¯Ù Ø§Ø³ØªÙاد٠Ù
ÛâÚ©ÙØ¯Ø Ù Ø´Ù
ا آ٠را رÙ
زگشاÛÛ Ù
ÛâÚ©ÙÛØ¯Ø ÙتÛج٠سÙØ¯Û Ø¨Ø¯Ù٠رÙ
ز Ø®ÙاÙد
بÙد Ú©Ù Ø´Ù
ا Ù
ÛâتÙاÙÛد آ٠را بخÙاÙÛØ¯Ø Ø§Ø±Ø³Ø§Ù
Ú©ÙÛØ¯Ø Ú©Ù¾Û Ú©ÙÛد Ù ØØªÛ Ø¯Ùبار٠رÙ
Ø²Ú¯Ø°Ø§Ø±Û Ú©ÙÛد
تا ب٠صÙرت اÙ
٠ب٠دست شخص دÛÚ¯Ø±Û Ø¨Ø±Ø³Ø§ÙÛد. در Ù
Øاسبات Ø®ÛاÙتâکاراÙÙ ÙرÙ
âاÙزار ب٠شÙ
ا
اجاز٠Ù
ÛâدÙد Ú©Ù Ú©ÙÙ
ات را بر رÙÛ ØµÙØÙ ÙÙ
اÛØ´
بخÙاÙÛØ¯Ø Ø§Ù
ا اجاز٠ÙÙ
ÛâدÙد تا سÙØ¯Û Ø±Ù
Ø²Ú¯Ø°Ø§Ø±Û Ùشد٠تÙÙÛد Ú©ÙÛد تا بتÙاÙÛد از آ٠در
کارÙØ§Û Ø¯ÛÚ¯Ø±Û Ø¨Ùر٠ببرÛد. GPG Ú©Ù ÛÚ© بستÙÙ ÙرÙ
âاÙØ²Ø§Ø±Û Ø¢Ø²Ø§Ø¯ Ø§Ø³ØªØ ÙابÙÛتâÙØ§Û Ø§Ù
ÙÛØªÛ Ø±Ø§
Ø¨Ø±Ø§Û Ú©Ø§Ø±Ø¨Ø±Ø§Ù Ø¨Ù Ø§Ø±Ù
غا٠Ù
ÛâØ¢ÙØ±Ø¯Ø Ú©Ø§Ø±Ø¨Ø±Ø§Ù Ø§Ø²
ÙرÙ
âاÙزار سÙد Ù
ÛâجÙÛÙد. Ù
Øاسبات Ø®ÛاÙت
کاراÙ٠طراØÛ Ø´Ø¯Ù Ø§Ø³Øª تا ب٠کاربرا٠Ù
ØدÙدÛتâÙاÛÛ Ø±Ø§ اعÙ
ا٠کÙØ¯Ø ÙرÙ
âاÙزار از
کاربرا٠سÙد Ù
ÛâجÙÛد."
+
+# type: Content of: <ol><li>
+msgid "The supporters of treacherous computing focus their discourse on its <a
name=\"beneficial\">beneficial uses</a>. What they say is often correct, just
not important."
+msgstr "ØاÙ
Ûا٠Ù
Øاسبات Ø®ÛاÙتâکاراÙ٠سخÙاÙ
Ø®Ùد را بر رÙÛ <a name=\"beneficial\">استÙادÙâÙØ§Û Ù
ÙÛد</a> از Ø¢Ù Ù
تÙ
رکز Ù
ÛâÚ©ÙÙد. Ø¢ÙÚ٠آÙا٠Ù
ÛâÚ¯ÙÛÙد غاÙبا صØÛØ Ø§Ø³ØªØ Ø§Ù
ا Ø¯Ø§Ø±Ø§Û Ø§ÙÙ
Ûت
ÙÛست."
+
+# type: Content of: <ol><li><p>
+msgid "Like most hardware, treacherous computing hardware can be used for
purposes which are not harmful. But these uses can be implemented in other
ways, without treacherous computing hardware. The principal difference that
treacherous computing makes for users is the nasty consequence: rigging your
computer to work against you."
+msgstr "ÙÙ
اÙÙد اغÙب سختâاÙزارÙاØ
سختâاÙزارÙØ§Û Ù
Øاسبات Ø®ÛاÙتâکاراÙÙ ÙÛز Ù
ÛâتÙاÙÙد Ø¨Ø±Ø§Û Ø§ÙداÙÛ Ú©Ù Ù
ضر ÙÛستÙد Ù
Ùرد
استÙاد٠Ùرار Ú¯ÛرÙد. اÙ
ا اÛÙ Ù
Ùارد استÙاد٠Ù
ÛâتÙاÙد با رÙØ´âÙØ§Û Ø¯ÛÚ¯Ø±Û ØºÛر از Ù
Øاسبات
Ø®ÛاÙتâکاراÙÙ ÙÛز صÙرت Ú¯Ûرد. تÙاÙت عÙ
دÙâاÛ
Ú©Ù ÙجÙد دارد در Ù¾ÛاÙ
دÙØ§Û ÙاÙ
طبÙØ¹Û Ø§Ø³Øª Ú©Ù Ù
Øاسبات Ø®ÛاÙتâکاراÙÙ Ø¨Ø±Ø§Û Ú©Ø§Ø±Ø¨Ø±Ø§Ù Ø¨Ù Ø§Ø±Ù
غا٠Ù
ÛâØ¢Ùرد: ÙرÛب داد٠کاÙ
Ù¾ÛÙتر تا بر عÙÛÙ
Ø´Ù
ا عÙ
Ù Ú©Ùد."
+
+# type: Content of: <ol><li><p>
+msgid "What they say is true, and what I say is true. Put them together and
what do you get? Treacherous computing is a plan to take away our freedom,
while offering minor benefits to distract us from what we would lose."
+msgstr "Ø¢ÙÚ٠آÙا٠Ù
ÛâÚ¯ÙÛÙد صØÛØ Ø§Ø³ØªØ Ù Ø¢ÙÚÙ Ù
Ù
Ù
ÛâÚ¯ÙÛÙ
صØÛØ Ø§Ø³Øª. Ø¢ÙÙا را در Ú©Ùار ÙÙ
بگذارÛد Ù ÚÙ ÙتÛجÙâØ§Û Ø®ÙاÙÛد گرÙØªØ Ù
Øاسبات
Ø®ÛاÙتâکاراÙ٠طرØÛ Ø§Ø³Øª Ø¨Ø±Ø§Û Ø§Ø² بÛ٠بردÙ
Ø¢Ø²Ø§Ø¯Û Ù
Ø§Ø Ù Ø¨Ø§ ارائÙÙ ØªØ¹Ø¯Ø§Ø¯Û ÙÙائد Ù
ÙÛد
Ú©ÙÚÚ© Ø³Ø¹Û Ø¯Ø± Ù
ÙØر٠کرد٠اÙکار Ù
ا از Ø¢ÙÚ٠از
دست Ø®ÙاÙÛÙ
داد Ù
ÛâÚ©Ùد."
+
+# type: Content of: <ol><li>
+msgid "Microsoft presents palladium as a security measure, and claims that it
will protect against viruses, but this claim is evidently false. A
presentation by Microsoft Research in October 2002 stated that one of the
specifications of palladium is that existing operating systems and applications
will continue to run; therefore, viruses will continue to be able to do all the
things that they can do today."
+msgstr "Ù
اÛکرÙساÙت پاÙادÛÙÙ
را ب٠عÙÙا٠ÛÚ©
اÙداÙ
اÙ
ÙÛØªÛ Ù
عرÙÛ Ú©Ø±Ø¯Ù Ù Ø§Ø¯Ø¹Ø§ Ù
ÛâÚ©Ùد Ú©Ù
ØÙØ§Ø¸Û Ø¨Ø± عÙÛÙ ÙÛرÙسâÙا Ø®ÙاÙد بÙØ¯Ø Ø§Ù
ا اÛÙ
ادعا آشکارا اشتبا٠است. Microsoft Research در اکتبر
Û²Û°Û°Û² اسÙاÛدÙØ§Û ÙÙ
اÛØ´Û Ø±Ø§ Ù
Ùتشر کرد٠ک٠ÙشاÙ
Ù
ÛâدÙد ÛÚ©Û Ø§Ø² خصÙصÛات پاÙادÛÙÙ
اÛ٠است Ú©Ù
سÛستÙ
âعاÙ
ÙâÙا Ù ÙرÙ
âاÙزارÙØ§Û Ù
ÙجÙد ÙÙ
ÚÙا٠اجرا Ù
ÛâØ´ÙÙØ¯Ø Ø¨ÙابراÛÙØ ÙÛرÙسâÙا ÙÙ
ÚÙا٠Ùادر Ø®ÙاÙÙد بÙد تÙ
اÙ
اعÙ
اÙÛ Ø±Ø§ ک٠اÙ
رÙز٠اÙجاÙ
Ù
ÛâدÙÙØ¯Ø Ø§Ø¯Ø§Ù
٠دÙÙد."
+
+# type: Content of: <ol><li><p>
+msgid "When Microsoft speaks of “security” in connection with
palladium, they do not mean what we normally mean by that word: protecting your
machine from things you do not want. They mean protecting your copies of data
on your machine from access by you in ways others do not want. A slide in the
presentation listed several types of secrets palladium could be used to keep,
including “third party secrets” and “user
secrets”—but it put “user secrets” in quotation marks,
recognizing that this somewhat of an absurdity in the context of palladium."
+msgstr "ÙÙگاÙ
Û Ú©Ù Ù
اÛکرÙساÙت دربارÙÙ ”اÙ
ÙÛت“ Ù
رتبط با پاÙادÛÙÙ
سخ٠Ù
ÛâÚ¯ÙÛØ¯Ø Ù
ÙظÙرش Ø¢Ù ÚÛØ²Û ÙÛست Ú©Ù Ù
ا Ù
عÙ
ÙÙا ب٠عÙÙا٠Ù
عÙÛ Ø§ÛÙ Ú©ÙÙ
٠ب٠کار Ù
ÛâبرÛÙ
: Ù
ØاÙظت از کاÙ
Ù¾ÛÙتر Ø®ÙÛØ´ در Ù
Ùاب٠آÙÚÙ ÙÙ
ÛâØ®ÙاÙÛÙ
. Ù
ÙظÙر
Ø¢ÙÙا Ù
ØاÙظت از ÙØÙÙÙ Ø¯Ø³ØªØ±Ø³Û Ø´Ù
ا ب٠کپÛ
اطÙاعات بر رÙÛ Ú©Ø§Ù
Ù¾ÛÙتر Ø®ÙدتاÙØ Ø¨Ù
رÙØ´âÙاÛÛ Ú©Ù Ø¢Ùا٠ÙÙ
ÛâپسÙدÙد است. ÛÚ©Û Ø§Ø²
اسÙاÛدÙØ§Û ÙÙ
اÛØ´Û Ø§ÙÙاع Ø§Ø³Ø±Ø§Ø±Û Ø±Ø§ Ú©Ù
پاÙادÛÙÙ
Ù
ÛâتÙاÙد Ù
ØاÙظت Ú©Ùد ÙÛست کردÙ
است. ÙÙ
اÙÙد ”اسرار شخص ثاÙØ«“ Ù
”اسرار کاربر“ — اÙ
ا ”اسرار
کاربر“ را در Ú¯ÛÙÙ
Ù Ùرار Ù
ÛâدÙØ¯Ø Ù Ø§ÛÙ
تصدÛÙÛ Ø¨Ø±Ø§Û Ù
ضØÚ© بÙد٠اÛ٠اÙ
ر در Ù
تÙ
پاÙادÛÙÙ
است."
+
+# type: Content of: <ol><li><p>
+msgid "The presentation made frequent use of other terms that we frequently
associate with the context of security, such as “attack”,
“malicious code”, “spoofing”, as well as
“trusted”. None of them means what it normally means.
“Attack” doesn't mean someone trying to hurt you, it means you
trying to copy music. “Malicious code” means code installed by you
to do what someone else doesn't want your machine to do.
“Spoofing” doesn't mean someone fooling you, it means you fooling
palladium. And so on."
+msgstr "اسÙاÛدÙØ§Û ÙÙ
اÛØ´Û Ø¨Ù Ø·Ùر Ù
کرر از Ú©ÙÙ
اتÛ
ÙÙ
ÚÙÙ ”ØÙ
ÙÙ“Ø ”کد بداÙدÛشاÙÙ“Ø
”Ú©ÙاÙâبردارۓ Ú©Ù Ù
ا Ù
عÙ
ÙÙا Ø¢ÙÙا را با
اÙ
ÙÛت Ù
رتبط Ù
ÛâداÙÛÙ
Ù ÙÙ
ÛÙØ·Ùر ”Ùاب٠اطÙ
ÛÙآ استÙاد٠کردÙâاست. ÙÛÚâکداÙ
از
Ø¢ÙÙا Ù
عÙØ§Û Ù
عÙ
ÙÙ Ø®Ùد را ÙدارÙد. ”ØÙ
ÙÙ“
ب٠Ù
عÙØ§Û Ø§ÛÙÚ©Ù Ø´Ø®ØµÛ Ø³Ø¹Û Ø¯Ø± آسÛب رساÙد٠ب٠شÙ
ا را Ø¯Ø§Ø±Ø¯Ø ÙÛست. ب٠اÛÙ Ù
عÙÛ Ø§Ø³Øª Ú©Ù Ø´Ù
ا سعÛ
در Ú©Ù¾Û Ú©Ø±Ø¯Ù Ù
ÙسÛÙÛ Ø¯Ø§Ø±Ûد. ”کد
بداÙدÛشاÙÙ“ ÛعÙÛ Ø´Ù
ا Ú©Ø¯Û Ø±Ø§ Ùصب
کردÙâاÛد تا Ú©Ø§Ø±Û Ø±Ø§ اÙجاÙ
دÙÛد ک٠دÛگرا٠ÙÙ
ÛâØ®ÙاÙÙد کاÙ
Ù¾ÛÙتر Ø´Ù
ا Ùادر ب٠اÙجاÙ
Ø¢Ù
باشد. ”Ú©ÙاÙâبردارۓ ب٠اÛÙ Ù
عÙÛ ÙÛست
Ú©Ù Ø´Ø®ØµÛ Ø´Ù
ا را ÙرÛب دÙØ¯Ø Ø¨Ù Ø§ÛÙ Ù
عÙÛ Ø§Ø³Øª Ú©Ù
Ø´Ù
ا پاÙادÛÙÙ
را ÙرÛب دÙÛد. ٠ب٠ÙÙ
Û٠ترتÛب."
+
+# type: Content of: <ol><li>
+msgid "A previous statement by the palladium developers stated the basic
premise that whoever developed or collected information should have total
control of how you use it. This would represent a revolutionary overturn of
past ideas of ethics and of the legal system, and create an unprecedented
system of control. The specific problems of these systems are no accident;
they result from the basic goal. It is the goal we must reject."
+msgstr "بÛاÙÛÙÙ Ù¾ÛØ´ÛÙ٠تÙسعÙâدÙÙدگاÙ
پاÙادÛÙÙ
اÛÙ ÙضÛÙÙ Ø§Ø³Ø§Ø³Û Ø±Ø§ بÛا٠Ù
ÛâÚ©Ùد Ú©Ù
Ùر Ø´Ø®ØµÛ Ú©Ù Ø§Ø·Ùاعات را جÙ
ع Ø¢ÙØ±Û Ù Ûا تÙسعÙ
داد٠باÛد Ú©Ùتر٠کاÙ
Ù ÙØÙÙ٠استÙاد٠از آ٠را
در اختÛار داشت٠باشد. اÛ٠اÙ
ر Ù
ÛâتÙاÙد
بÛاÙگر ÙÙØ¹Û Ø§ÙÙÙاب در عÙاÛد اخÙاÙÛ Ú¯Ø°Ø´ØªÙ Ù
سÛستÙ
ØÙÙÙÛ Ø¨Ùد٠٠ÙÙØ¹Û Ø³ÛستÙ
Ú©ÙترÙ
بÛâسابÙ٠را پدÛد Ø¢Ùرد. Ù
Ø´Ú©Ùات خاص اÛÙ Ú¯ÙÙÙ
سÛستÙ
âÙا اتÙاÙÛ ÙÛستÙØ¯Ø Ø§Ø² Ùد٠اصÙÛ Ø¢ÙÙا
ÙØ§Ø´Û Ù
ÛâØ´ÙÙد. ٠اÛÙ ÙدÙÛ Ø§Ø³Øª Ú©Ù Ù
ا ÙباÛد
بپذÛرÛÙ
."
+
+# type: Content of: <h4>
+msgid "This essay is published in <a
href=\"http://shop.fsf.org/product/free-software-free-society/\"><cite>Free
Software, Free Society: The Selected Essays of Richard M. Stallman</cite></a>"
+msgstr "اÛÙ Ù
ÙاÙ٠در <a
href=\"http://shop.fsf.org/product/free-software-free-society/\"><cite>ÙرÙ
âاÙزار Ø¢Ø²Ø§Ø¯Ø Ø¬Ø§Ù
عÙ٠آزاد: Ù
Ùتخب Ù
ÙاÙات
رÛÚارد استاÙÙ
Ù</cite></a> Ù
Ùتشر شد٠است."
+
+# type: Content of: <div>
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
+msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
+msgstr " "
+
+# type: Content of: <div><p>
+msgid "Please send FSF & GNU inquiries to <a
href=\"mailto:address@hidden"><em>address@hidden</em></a>. There are also <a
href=\"/contact/\">other ways to contact</a> the FSF. <br /> Please send
broken links and other corrections (or suggestions) to <a
href=\"mailto:address@hidden"><em>address@hidden</em></a>."
+msgstr "ÙØ·Ùا سÙاÙات ٠پرسشâÙØ§Û Ø®Ùد در رابط٠با
Ú¯Ù٠٠بÙÛاد ÙرÙ
âاÙزارÙØ§Û Ø¢Ø²Ø§Ø¯ را ب٠<a
href=\"mailto:address@hidden"><em>address@hidden</em></a> ارسا٠کÙÛد.
ÙÙ
ÚÙÛÙ <a href=\"/contact/\">راÙâÙØ§Û Ø¯ÛÚ¯Ø±Û Ø¨Ø±Ø§Û ØªÙ
اس</a> با بÙÛاد ÙرÙ
âاÙزارÙØ§Û Ø¢Ø²Ø§Ø¯ ÙجÙد دارد.
<br /> ÙØ·Ùا ÙÛÙÚ©âÙØ§Û Ø®Ø±Ø§Ø¨ Ù Ûا Ù
Ø´Ú©Ùات دÛگر Ûا
Ù¾ÛØ´ÙÙادات Ø®Ùد را ب٠<a
href=\"mailto:address@hidden"><em>address@hidden</em></a> ارسا٠کÙÛد."
+
+# type: Content of: <div><p>
+msgid "Please see the <a
href=\"/server/standards/README.translations.html\">Translations README</a> for
information on coordinating and submitting translations of this article."
+msgstr "ÙØ·Ùا Ø¨Ø±Ø§Û Ø§Ø·Ùاعات بÛشتر جÙت ÙÙ
اÙÙÚ¯Û Ù
ارسا٠ترجÙ
ÙâÙØ§Û Ø§ÛÙ Ù
ÙاÙ٠صÙØÙÙ <a
href=\"/server/standards/README.translations.html\">راÙÙÙ
Ø§Û ØªØ±Ø¬Ù
ÙâÙا</a> را ببÛÙÛد."
+
+# type: Content of: <div><p>
+msgid "Copyright © 2002, 2007 Richard Stallman"
+msgstr "Copyright © 2002, 2007 Richard Stallman"
+
+# type: Content of: <div><p>
+msgid "Verbatim copying and distribution of this entire article are permitted
worldwide, without royalty, in any medium, provided this notice, and the
copyright notice, are preserved."
+msgstr "ÙسخÙâØ¨Ø±Ø¯Ø§Ø±Û Ú©ÙÙ
٠ب٠کÙÙ
٠٠تÙزÛع Ú©Ù
اÛÙ Ù
ÙاÙ٠در سراسر جÙا٠٠در Ùر رساÙÙâاÛØ
بدÙ٠پرداخت Ø٠اÙ
تÛاز Ù
جاز Ù
ÛâØ¨Ø§Ø´Ø¯Ø Ø¨Ù
Ø´Ø±Ø·Û Ú©Ù Ø§Û٠اعÙاÙ/Ø٠اÙ
تÛاز ØÙظ Ø´Ùد."
+
+# type: Content of: <div><div>
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.
+msgid "*GNUN-SLOT: TRANSLATOR'S CREDITS*"
+msgstr " "
+
+# type: Content of: <div><p>
+#. timestamp start
+msgid "Updated:"
+msgstr "آخرÛ٠ب٠رÙز رساÙÛ:"
+
+# type: Content of: <div><h4>
+msgid "Translations of this page"
+msgstr "ترجÙ
ÙâÙØ§Û Ø¯Ûگر اÛ٠صÙØÙ"
+
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy/po can-you-trust.fa.po,
Abbas Esmaeeli Someeh <=