www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary.es.html po/propriet...


From: GNUN
Subject: www/proprietary proprietary.es.html po/propriet...
Date: Tue, 22 Sep 2015 08:27:46 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     15/09/22 08:27:46

Modified files:
        proprietary    : proprietary.es.html 
        proprietary/po : proprietary.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.3&r2=1.4

Patches:
Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary.es.html 30 Jun 2015 10:58:02 -0000      1.5
+++ proprietary.es.html 22 Sep 2015 08:27:45 -0000      1.6
@@ -47,39 +47,36 @@
 <div class="companies">
 <ul>
   <li><strong>Empresa o tipo de producto</strong></li>
-  <li><a href="/philosophy/proprietary/malware-apple.html"> El
-<cite>malware</cite> de Apple</a></li>
-  <li><a href="/philosophy/proprietary/malware-microsoft.html">El
-<cite>malware</cite> de Microsoft</a></li>
-  <li><a 
href="/philosophy/proprietary/malware-mobiles.html"><cite>Malware</cite>
-en los dispositivos móviles</a></li>
-  <li><a
-href="/philosophy/proprietary/malware-kindle-swindle.html"><cite>Malware</cite>
-en el Swindle de Amazon</a></li>
+  <li><a href="/proprietary/malware-apple.html">El <cite>malware</cite> de
+Apple</a></li>
+  <li><a href="/proprietary/malware-microsoft.html">El <cite>malware</cite> de
+Microsoft</a></li>
+  <li><a href="/proprietary/malware-mobiles.html"><cite>Malware</cite> en los
+dispositivos móviles</a></li>
+  <li><a href="/proprietary/malware-kindle-swindle.html"><cite>Malware</cite> 
en
+el Swindle de Amazon</a></li>
+  <li><a href="/proprietary/proprietary-deception.html">Compañías 
tramposas</a>
+que ocultan sus intenciones.</li>
 </ul>
 </div>
 
 <div class="malfunctions">
 <ul>
 <li><strong>Tipo de <cite>malware</cite></strong></li>
-<li><a href="/philosophy/proprietary/proprietary-back-doors.html">Puertas
-traseras</a></li>
-<li><a 
href="/philosophy/proprietary/proprietary-censorship.html">Censura</a></li>
-<li><a
-href="/philosophy/proprietary/proprietary-insecurity.html">Inseguridad</a></li>
-<li><a 
href="/philosophy/proprietary/proprietary-sabotage.html">Sabotaje</a></li>
-<li><a href="/philosophy/proprietary-interference.html">Intromisión</a></li>
-<li><a
-href="/philosophy/proprietary/proprietary-surveillance.html">Vigilancia</a></li>
-<li><a href="/philosophy/proprietary/proprietary-drm.html">Gestión digital de
+<li><a href="/proprietary/proprietary-back-doors.html">Puertas 
traseras</a></li>
+<li><a href="/proprietary/proprietary-censorship.html">Censura</a></li>
+<li><a href="/proprietary/proprietary-insecurity.html">Inseguridad</a></li>
+<li><a href="/proprietary/proprietary-sabotage.html">Sabotaje</a></li>
+<li><a href="/proprietary/proprietary-interference.html">Intromisión</a></li>
+<li><a href="/proprietary/proprietary-surveillance.html">Vigilancia</a></li>
+<li><a href="/proprietary/proprietary-drm.html">Gestión digital de
 restricciones</a> o <abbr title="Digital Restrictions
 Management">«DRM»</abbr>: se refiere a funciones diseñadas para restringir
 lo que los usuarios pueden hacer con los datos en sus ordenadores.</li>
-<li><a href="/philosophy/proprietary/proprietary-jails.html">Prisiones</a>:
-sistemas que imponen la censura en los programas de aplicación.</li>
-<li><a href="/philosophy/proprietary/proprietary-tyrants.html">Tiranos</a>:
-sistemas que rechazan cualquier sistema operativo no esté «autorizado» por
-el fabricante.</li>
+<li><a href="/proprietary/proprietary-jails.html">Prisiones</a>: sistemas que
+imponen la censura en los programas de aplicación.</li>
+<li><a href="/proprietary/proprietary-tyrants.html">Tiranos</a>: sistemas que
+rechazan cualquier sistema operativo no esté «autorizado» por el 
fabricante.</li>
 </ul>
 </div>
 </div>
@@ -166,7 +163,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2015/06/30 10:58:02 $
+$Date: 2015/09/22 08:27:45 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/proprietary.es-en.html   30 Jun 2015 10:58:03 -0000      1.3
+++ po/proprietary.es-en.html   22 Sep 2015 08:27:46 -0000      1.4
@@ -41,29 +41,30 @@
 <div class="companies">
 <ul>
   <li><strong>Company or type of product</strong></li>
-  <li><a href="/philosophy/malware-apple.html">Apple Malware</a></li>
-  <li><a href="/philosophy/malware-microsoft.html">Microsoft Malware</a></li>
-  <li><a href="/philosophy/malware-mobiles.html">Malware in mobile 
devices</a></li>
-  <li><a href="/philosophy/malware-kindle-swindle.html">Malware in the Amazon
+  <li><a href="/proprietary/malware-apple.html">Apple Malware</a></li>
+  <li><a href="/proprietary/malware-microsoft.html">Microsoft Malware</a></li>
+  <li><a href="/proprietary/malware-mobiles.html">Malware in mobile 
devices</a></li>
+  <li><a href="/proprietary/malware-kindle-swindle.html">Malware in the Amazon
   Swindle</a></li>
+  <li><a href="/proprietary/proprietary-deception.html">Deceptive 
companies</a> masking their intentions.</li>
 </ul>
 </div>
 
 <div class="malfunctions">
 <ul>
 <li><strong>Type&nbsp;of malware</strong></li>
-<li><a href="/philosophy/proprietary-back-doors.html">Back doors</a></li>
-<li><a 
href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li>
-<li><a href="/philosophy/proprietary-insecurity.html">Insecurity</a></li>
-<li><a href="/philosophy/proprietary-sabotage.html">Sabotage</a></li>
-<li><a href="/philosophy/proprietary-interference.html">Interference</a></li>
-<li><a href="/philosophy/proprietary-surveillance.html">Surveillance</a></li>
-<li><a href="/philosophy/proprietary-drm.html">Digital restrictions
+<li><a href="/proprietary/proprietary-back-doors.html">Back doors</a></li>
+<li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+<li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
+<li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+<li><a href="/proprietary/proprietary-interference.html">Interference</a></li>
+<li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+<li><a href="/proprietary/proprietary-drm.html">Digital restrictions
     management</a> or &ldquo;DRM&rdquo; means functionalities designed
     to restrict what users can do with the data in their computers.</li>
-<li><a href="/philosophy/proprietary-jails.html">Jails</a>&mdash;systems
+<li><a href="/proprietary/proprietary-jails.html">Jails</a>&mdash;systems
     that impose censorship on application programs.</li>
-<li><a href="/philosophy/proprietary-tyrants.html">Tyrants</a>&mdash;systems
+<li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.</li>
 </ul>
@@ -134,7 +135,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/06/30 10:58:03 $
+$Date: 2015/09/22 08:27:46 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]