[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary.es.html po/propriet...
From: |
GNUN |
Subject: |
www/proprietary proprietary.es.html po/propriet... |
Date: |
Tue, 22 Sep 2015 08:27:46 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 15/09/22 08:27:46
Modified files:
proprietary : proprietary.es.html
proprietary/po : proprietary.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.3&r2=1.4
Patches:
Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary.es.html 30 Jun 2015 10:58:02 -0000 1.5
+++ proprietary.es.html 22 Sep 2015 08:27:45 -0000 1.6
@@ -47,39 +47,36 @@
<div class="companies">
<ul>
<li><strong>Empresa o tipo de producto</strong></li>
- <li><a href="/philosophy/proprietary/malware-apple.html"> El
-<cite>malware</cite> de Apple</a></li>
- <li><a href="/philosophy/proprietary/malware-microsoft.html">El
-<cite>malware</cite> de Microsoft</a></li>
- <li><a
href="/philosophy/proprietary/malware-mobiles.html"><cite>Malware</cite>
-en los dispositivos móviles</a></li>
- <li><a
-href="/philosophy/proprietary/malware-kindle-swindle.html"><cite>Malware</cite>
-en el Swindle de Amazon</a></li>
+ <li><a href="/proprietary/malware-apple.html">El <cite>malware</cite> de
+Apple</a></li>
+ <li><a href="/proprietary/malware-microsoft.html">El <cite>malware</cite> de
+Microsoft</a></li>
+ <li><a href="/proprietary/malware-mobiles.html"><cite>Malware</cite> en los
+dispositivos móviles</a></li>
+ <li><a href="/proprietary/malware-kindle-swindle.html"><cite>Malware</cite>
en
+el Swindle de Amazon</a></li>
+ <li><a href="/proprietary/proprietary-deception.html">CompañÃas
tramposas</a>
+que ocultan sus intenciones.</li>
</ul>
</div>
<div class="malfunctions">
<ul>
<li><strong>Tipo de <cite>malware</cite></strong></li>
-<li><a href="/philosophy/proprietary/proprietary-back-doors.html">Puertas
-traseras</a></li>
-<li><a
href="/philosophy/proprietary/proprietary-censorship.html">Censura</a></li>
-<li><a
-href="/philosophy/proprietary/proprietary-insecurity.html">Inseguridad</a></li>
-<li><a
href="/philosophy/proprietary/proprietary-sabotage.html">Sabotaje</a></li>
-<li><a href="/philosophy/proprietary-interference.html">Intromisión</a></li>
-<li><a
-href="/philosophy/proprietary/proprietary-surveillance.html">Vigilancia</a></li>
-<li><a href="/philosophy/proprietary/proprietary-drm.html">Gestión digital de
+<li><a href="/proprietary/proprietary-back-doors.html">Puertas
traseras</a></li>
+<li><a href="/proprietary/proprietary-censorship.html">Censura</a></li>
+<li><a href="/proprietary/proprietary-insecurity.html">Inseguridad</a></li>
+<li><a href="/proprietary/proprietary-sabotage.html">Sabotaje</a></li>
+<li><a href="/proprietary/proprietary-interference.html">Intromisión</a></li>
+<li><a href="/proprietary/proprietary-surveillance.html">Vigilancia</a></li>
+<li><a href="/proprietary/proprietary-drm.html">Gestión digital de
restricciones</a> o <abbr title="Digital Restrictions
Management">«DRM»</abbr>: se refiere a funciones diseñadas para restringir
lo que los usuarios pueden hacer con los datos en sus ordenadores.</li>
-<li><a href="/philosophy/proprietary/proprietary-jails.html">Prisiones</a>:
-sistemas que imponen la censura en los programas de aplicación.</li>
-<li><a href="/philosophy/proprietary/proprietary-tyrants.html">Tiranos</a>:
-sistemas que rechazan cualquier sistema operativo no esté «autorizado» por
-el fabricante.</li>
+<li><a href="/proprietary/proprietary-jails.html">Prisiones</a>: sistemas que
+imponen la censura en los programas de aplicación.</li>
+<li><a href="/proprietary/proprietary-tyrants.html">Tiranos</a>: sistemas que
+rechazan cualquier sistema operativo no esté «autorizado» por el
fabricante.</li>
</ul>
</div>
</div>
@@ -166,7 +163,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2015/06/30 10:58:02 $
+$Date: 2015/09/22 08:27:45 $
<!-- timestamp end -->
</p>
Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/proprietary.es-en.html 30 Jun 2015 10:58:03 -0000 1.3
+++ po/proprietary.es-en.html 22 Sep 2015 08:27:46 -0000 1.4
@@ -41,29 +41,30 @@
<div class="companies">
<ul>
<li><strong>Company or type of product</strong></li>
- <li><a href="/philosophy/malware-apple.html">Apple Malware</a></li>
- <li><a href="/philosophy/malware-microsoft.html">Microsoft Malware</a></li>
- <li><a href="/philosophy/malware-mobiles.html">Malware in mobile
devices</a></li>
- <li><a href="/philosophy/malware-kindle-swindle.html">Malware in the Amazon
+ <li><a href="/proprietary/malware-apple.html">Apple Malware</a></li>
+ <li><a href="/proprietary/malware-microsoft.html">Microsoft Malware</a></li>
+ <li><a href="/proprietary/malware-mobiles.html">Malware in mobile
devices</a></li>
+ <li><a href="/proprietary/malware-kindle-swindle.html">Malware in the Amazon
Swindle</a></li>
+ <li><a href="/proprietary/proprietary-deception.html">Deceptive
companies</a> masking their intentions.</li>
</ul>
</div>
<div class="malfunctions">
<ul>
<li><strong>Type of malware</strong></li>
-<li><a href="/philosophy/proprietary-back-doors.html">Back doors</a></li>
-<li><a
href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li>
-<li><a href="/philosophy/proprietary-insecurity.html">Insecurity</a></li>
-<li><a href="/philosophy/proprietary-sabotage.html">Sabotage</a></li>
-<li><a href="/philosophy/proprietary-interference.html">Interference</a></li>
-<li><a href="/philosophy/proprietary-surveillance.html">Surveillance</a></li>
-<li><a href="/philosophy/proprietary-drm.html">Digital restrictions
+<li><a href="/proprietary/proprietary-back-doors.html">Back doors</a></li>
+<li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+<li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
+<li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+<li><a href="/proprietary/proprietary-interference.html">Interference</a></li>
+<li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+<li><a href="/proprietary/proprietary-drm.html">Digital restrictions
management</a> or “DRM” means functionalities designed
to restrict what users can do with the data in their computers.</li>
-<li><a href="/philosophy/proprietary-jails.html">Jails</a>—systems
+<li><a href="/proprietary/proprietary-jails.html">Jails</a>—systems
that impose censorship on application programs.</li>
-<li><a href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems
+<li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems
that reject any operating system not “authorized” by the
manufacturer.</li>
</ul>
@@ -134,7 +135,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/06/30 10:58:03 $
+$Date: 2015/09/22 08:27:46 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary proprietary.es.html po/propriet...,
GNUN <=