[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www home.it.html planetfeeds.it.html philosophy...
From: |
GNUN |
Subject: |
www home.it.html planetfeeds.it.html philosophy... |
Date: |
Sat, 24 Oct 2015 21:59:06 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 15/10/24 21:59:06
Modified files:
. : home.it.html planetfeeds.it.html
philosophy : amazon.it.html
surveillance-vs-democracy.it.html
words-to-avoid.it.html
philosophy/po : amazon.it-en.html amazon.it.po
surveillance-vs-democracy.it-en.html
surveillance-vs-democracy.it.po
words-to-avoid.it-en.html words-to-avoid.it.po
po : home.it-en.html home.it.po planetfeeds.it.po
proprietary : malware-apple.it.html malware-microsoft.it.html
proprietary-back-doors.it.html
proprietary-censorship.it.html
proprietary-insecurity.it.html
proprietary-sabotage.it.html
proprietary-surveillance.it.html
proprietary-tyrants.it.html
proprietary/po : malware-apple.it-en.html malware-apple.it.po
malware-microsoft.it-en.html
malware-microsoft.it.po
proprietary-back-doors.it-en.html
proprietary-back-doors.it.po
proprietary-censorship.it-en.html
proprietary-censorship.it.po
proprietary-insecurity.it-en.html
proprietary-insecurity.it.po
proprietary-sabotage.it-en.html
proprietary-sabotage.it.po
proprietary-surveillance.it-en.html
proprietary-surveillance.it.po
proprietary-tyrants.it-en.html
proprietary-tyrants.it.po
server : sitemap.it.html
server/po : sitemap.it-en.html sitemap.it.po
software : software.it.html
software/po : software.it-en.html software.it.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/home.it.html?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/planetfeeds.it.html?cvsroot=www&r1=1.418&r2=1.419
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/amazon.it.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.it.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.it.html?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/amazon.it-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/amazon.it.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.it-en.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.it.po?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.it-en.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.it.po?cvsroot=www&r1=1.563&r2=1.564
http://web.cvs.savannah.gnu.org/viewcvs/www/po/planetfeeds.it.po?cvsroot=www&r1=1.588&r2=1.589
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.it.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.it.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.it.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.it.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.it.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.it.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.it.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.it.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/software/software.it.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/software.it-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/software.it.po?cvsroot=www&r1=1.162&r2=1.163
Patches:
Index: home.it.html
===================================================================
RCS file: /web/www/www/home.it.html,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- home.it.html 16 Oct 2015 20:00:40 -0000 1.286
+++ home.it.html 24 Oct 2015 21:58:57 -0000 1.287
@@ -152,10 +152,10 @@
riforma globale del copyright</a> con <a
href="http://www.laquadrature.net/en/">LQDN</a>.</li>
-<li>Support the efforts on net neutrality in Europe, <a
-href="http://www.savetheinternet.com" title="Net neutrality in the United
-States of America">in the USA</a> and <a href="http://saveournet.ca/"
-title="Net neutrality in Canada">in Canada</a>.</li>
+<li>Sostenete gli sforzi per preservare la neutralità della rete in Europa, <a
+href="http://www.savetheinternet.com" title="Neutralità della rete negli
+USA">negli USA</a> e <a href="http://saveournet.ca/" title="Neutralità della
+rete in Canada">in Canada</a>.</li>
<li><strong>Lottate contro i brevetti sul software:</strong> a livello <a
href="http://www.endsoftpatents.org">mondiale</a> e <a
@@ -268,7 +268,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultima modifica:
-$Date: 2015/10/16 20:00:40 $
+$Date: 2015/10/24 21:58:57 $
<!-- timestamp end -->
</p>
Index: planetfeeds.it.html
===================================================================
RCS file: /web/www/www/planetfeeds.it.html,v
retrieving revision 1.418
retrieving revision 1.419
diff -u -b -r1.418 -r1.419
--- planetfeeds.it.html 22 Oct 2015 04:59:18 -0000 1.418
+++ planetfeeds.it.html 24 Oct 2015 21:58:58 -0000 1.419
@@ -1,15 +1,11 @@
<!-- Autogenerated by planetrss.pl 1.13 -->
<p><a href='http://savannah.gnu.org/forum/forum.php?forum_id=8381'>
-GNU Parallel 20151022 ('Liquid Water') released</a>: GNU Parallel 20151022
('Liquid Water') has been released. It is available
-for download at: http://ftp.gnu.org/gnu/parallel/ Haiku of the month...
+GNU Parallel 20151022 disponibile</a>
<a
href='http://savannah.gnu.org/forum/forum.php?forum_id=8381'> <em>leggi
tutto...</em></a></p>
<p><a
href='http://heronsperch.blogspot.com/2015/10/still-waiting-on-you-apple.html'>
-Still waiting on you, Apple...</a>: Back in July Apple promised to open source
Swift. :) Well, Apple? What's
-going on? Is this still the plan, Apple?</p>
+Ancora in attesa di Apple...</a> </p>
<p><a href='http://dustycloud.org/blog/hitchhikers-guide-to-data-formats/'>
-Hitchhiker's guide to data formats</a>: Just thinking out loud this morning on
what data formats there are and how
-they work with the world: * XML: 2000's hippest technology. Combines a
-clear, par...
+La Guida Galattica ai formati di dati</a>
<a
href='http://dustycloud.org/blog/hitchhikers-guide-to-data-formats/'> <em>leggi
tutto...</em></a></p>
Index: philosophy/amazon.it.html
===================================================================
RCS file: /web/www/www/philosophy/amazon.it.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- philosophy/amazon.it.html 29 Aug 2015 21:29:07 -0000 1.37
+++ philosophy/amazon.it.html 24 Oct 2015 21:58:58 -0000 1.38
@@ -207,8 +207,8 @@
<p>
Da parte sua, Amazon sta facendo anche <a
-href="http://www.salon.com/tech/log/1999/10/28/amazon/">altre cose
-odiose</a> presso un altro tribunale. </p>
+href="https://web.archive.org/web/20140610154715/http://www.salon.com/1999/10/28/amazon_3/">altre
+cose odiose</a> presso un altro tribunale. </p>
<p>
Si veda <a href="http://progfree.org">http://progfree.org/</a> oppure <a
@@ -301,7 +301,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/08/29 21:29:07 $
+$Date: 2015/10/24 21:58:58 $
<!-- timestamp end -->
</p>
Index: philosophy/surveillance-vs-democracy.it.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.it.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- philosophy/surveillance-vs-democracy.it.html 24 Sep 2015 17:59:07
-0000 1.14
+++ philosophy/surveillance-vs-democracy.it.html 24 Oct 2015 21:58:58
-0000 1.15
@@ -39,7 +39,7 @@
href="/philosophy/free-software-even-more-important.html">come sostengo da
30 anni</a>, è il primo passo per assumere il controllo delle nostre
esistenze digitali. Non possiamo fidarci del software non libero; la NSA <a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
+href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">
sfrutta</a> e addirittura <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">crea</a>
debolezze nel software non libero per invadere i nostri computer e
@@ -550,7 +550,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/09/24 17:59:07 $
+$Date: 2015/10/24 21:58:58 $
<!-- timestamp end -->
</p>
Index: philosophy/words-to-avoid.it.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.it.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- philosophy/words-to-avoid.it.html 24 Sep 2015 17:59:07 -0000 1.77
+++ philosophy/words-to-avoid.it.html 24 Oct 2015 21:58:58 -0000 1.78
@@ -853,8 +853,8 @@
software. Essi parlano di "industrie" di sviluppo del software e tentano
così di argomentare che queste dovrebbero essere soggette ai monopoli dei
brevetti. <a
-href="http://web.archive.org/web/20071222001014/http://www.swpat.ffii.org/papers/europarl0309/"
-title="versione archiviata di http://swpat.ffii.org/papers/europarl0309/">Il
+href="https://web.archive.org/web/20071211112325/http://eupat.ffii.org/papers/europarl0309/"
+title="versione archiviata di http://eupat.ffii.org/papers/europarl0309/">Il
Parlamento Europeo, respingendo i brevetti software nel 2003, ha stabilito
con votazione che "industria" è "produzione automatica di beni
materiali"</a>.</p>
@@ -1027,7 +1027,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/09/24 17:59:07 $
+$Date: 2015/10/24 21:58:58 $
<!-- timestamp end -->
</p>
Index: philosophy/po/amazon.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/amazon.it-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- philosophy/po/amazon.it-en.html 29 Aug 2015 21:29:07 -0000 1.22
+++ philosophy/po/amazon.it-en.html 24 Oct 2015 21:58:58 -0000 1.23
@@ -199,7 +199,7 @@
<p>
On the side, Amazon is doing
-<a href="http://www.salon.com/tech/log/1999/10/28/amazon/">other
+<a
href="https://web.archive.org/web/20140610154715/http://www.salon.com/1999/10/28/amazon_3/">other
obnoxious things</a> in another courtroom, too.</p>
<p>
@@ -272,7 +272,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/08/29 21:29:07 $
+$Date: 2015/10/24 21:58:58 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/amazon.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/amazon.it.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- philosophy/po/amazon.it.po 24 Oct 2015 21:46:00 -0000 1.36
+++ philosophy/po/amazon.it.po 24 Oct 2015 21:58:59 -0000 1.37
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 18:56+0000\n"
"X-Generator: Poedit 1.5.4\n"
# type: Content of: <title>
@@ -463,15 +462,7 @@
"sul successo del boicottaggio ad Amazon</a>. "
# type: Content of: <p>
-# | On the side, Amazon is doing <a
-# | [-href=\"http://www.salon.com/tech/log/1999/10/28/amazon/\">other-]
-# |
{+href=\"https://web.archive.org/web/20140610154715/http://www.salon.com/1999/10/28/amazon_3/\">other+}
-# | obnoxious things</a> in another courtroom, too.
-#. type: Content of: <p>
-#| msgid ""
-#| "On the side, Amazon is doing <a href=\"http://www.salon.com/tech/"
-#| "log/1999/10/28/amazon/\">other obnoxious things</a> in another courtroom, "
-#| "too."
+#. type: Content of: <p>
msgid ""
"On the side, Amazon is doing <a href=\"https://web.archive.org/"
"web/20140610154715/http://www.salon.com/1999/10/28/amazon_3/\">other "
Index: philosophy/po/surveillance-vs-democracy.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- philosophy/po/surveillance-vs-democracy.it-en.html 24 Sep 2015 17:59:07
-0000 1.16
+++ philosophy/po/surveillance-vs-democracy.it-en.html 24 Oct 2015 21:58:59
-0000 1.17
@@ -36,7 +36,7 @@
I've advocated for 30 years</a>, is the first step in taking control
of our digital lives, and that includes preventing surveillance. We
can't trust nonfree software; the NSA
-<a
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a>
+<a
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">uses</a>
and
even <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
security weaknesses in nonfree software to invade our own computers
@@ -521,7 +521,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/09/24 17:59:07 $
+$Date: 2015/10/24 21:58:59 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/surveillance-vs-democracy.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- philosophy/po/surveillance-vs-democracy.it.po 24 Oct 2015 21:46:00
-0000 1.58
+++ philosophy/po/surveillance-vs-democracy.it.po 24 Oct 2015 21:58:59
-0000 1.59
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-17 10:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -82,32 +81,7 @@
"democratico sullo stato, dobbiamo ridurre la sorveglianza fino a un punto in "
"cui tutti gli informatori sappiano che non possono essere scoperti."
-# | Using free/libre software, <a
-# | href=\"/philosophy/free-software-even-more-important.html\">as I've
-# | advocated for 30 years</a>, is the first step in taking control of our
-# | digital lives, and that includes preventing surveillance. We can't trust
-# | nonfree software; the NSA <a
-# |
[-href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">uses</a>-]
-# |
{+href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/\">uses</a>+}
-# | and even <a
-# |
href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
-# | security weaknesses in nonfree software to invade our own computers and
-# | routers. Free software gives us control of our own computers, but <a
-# | href=\"http://www.wired.com/opinion/2013/10/149481/\">that won't protect
-# | our privacy once we set foot on the Internet</a>.
-#. type: Content of: <p>
-#| msgid ""
-#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
-#| "important.html\">as I've advocated for 30 years</a>, is the first step in "
-#| "taking control of our digital lives, and that includes preventing "
-#| "surveillance. We can't trust nonfree software; the NSA <a href=\"http://"
-#| "blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-"
-#| "ever-trust-microsoft-again/index.htm\">uses</a> and even <a href=\"http://"
-#| "www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"
-#| "\">creates</a> security weaknesses in nonfree software to invade our own "
-#| "computers and routers. Free software gives us control of our own "
-#| "computers, but <a href=\"http://www.wired.com/opinion/2013/10/149481/"
-#| "\">that won't protect our privacy once we set foot on the Internet</a>."
+#. type: Content of: <p>
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated for 30 years</a>, is the first step in "
Index: philosophy/po/words-to-avoid.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.it-en.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- philosophy/po/words-to-avoid.it-en.html 24 Sep 2015 17:59:08 -0000
1.70
+++ philosophy/po/words-to-avoid.it-en.html 24 Oct 2015 21:58:59 -0000
1.71
@@ -952,7 +952,7 @@
advocates of software patents. They call software development
“industry” and then try to argue that this means it should
be subject to patent
-monopolies. <a
href="http://web.archive.org/web/20071222001014/http://www.swpat.ffii.org/papers/europarl0309/"
title="archived version of http://swpat.ffii.org/papers/europarl0309/"> The
+monopolies. <a
href="https://web.archive.org/web/20071211112325/http://eupat.ffii.org/papers/europarl0309/"
title="archived version of http://eupat.ffii.org/papers/europarl0309/"> The
European Parliament, rejecting software patents in 2003, voted to
define “industry” as “automated production of
material goods.”</a></p>
@@ -1106,7 +1106,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/09/24 17:59:08 $
+$Date: 2015/10/24 21:58:59 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/words-to-avoid.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.it.po,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- philosophy/po/words-to-avoid.it.po 24 Oct 2015 21:46:00 -0000 1.178
+++ philosophy/po/words-to-avoid.it.po 24 Oct 2015 21:58:59 -0000 1.179
@@ -17,7 +17,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 18:56+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -230,8 +229,8 @@
#. type: Content of: <p>
msgid "“<a href=\"#SharingEconomy\">Sharing economy</a>” |"
msgstr ""
-"“<a href=\"#SharingEconomy\">Economia di condivisione (Sharing "
-"economy)</a>” |"
+"“<a href=\"#SharingEconomy\">Economia di condivisione (Sharing economy)"
+"</a>” |"
#. type: Content of: <p>
msgid "“<a href=\"#Skype\">Skype</a>” |"
@@ -1905,9 +1904,9 @@
"your privacy, try one of the <a href=\"https://libreplanet.org/wiki/Group:"
"Skype_Replacement\"> numerous free Skype replacements</a>."
msgstr ""
-"Non usate il neologismo “skypare” per indicare una "
-"(video)chiamata via Internet. Skype è solo uno dei tanti programmi per "
-"questo scopo, e per di più è software proprietario e <a href=\"/philosophy/"
+"Non usate il neologismo “skypare” per indicare una (video)"
+"chiamata via Internet. Skype è solo uno dei tanti programmi per questo "
+"scopo, e per di più è software proprietario e <a href=\"/philosophy/"
"proprietary/proprietary-surveillance.html#SpywareInSkype\"> spia i propri "
"utenti</a>. Per effettuare (video)chiamate via Internet in un modo che "
"rispetti la vostra libertà e la vostra privacy, usate uno dei tanti <a href="
@@ -1933,28 +1932,7 @@
"software esistono, e molte di queste sviluppano software libero e non, ma "
"quelle che sviluppano software libero non sono come fabbriche."
-# | The term “industry” is being used as propaganda by advocates
-# | of software patents. They call software development
-# | “industry” and then try to argue that this means it should be
-# | subject to patent monopolies. <a
-# |
[-href=\"http://web.archive.org/web/20071222001014/http://www.swpat.ffii.org/papers/europarl0309/\"-]
-# |
{+href=\"https://web.archive.org/web/20071211112325/http://eupat.ffii.org/papers/europarl0309/\"+}
-# | title=\"archived version of
-# | [-http://swpat.ffii.org/papers/europarl0309/\">-]
-# | {+http://eupat.ffii.org/papers/europarl0309/\">+} The European Parliament,
-# | rejecting software patents in 2003, voted to define “industry”
-# | as “automated production of material goods.”</a>
-#. type: Content of: <p>
-#| msgid ""
-#| "The term “industry” is being used as propaganda by advocates "
-#| "of software patents. They call software development “"
-#| "industry” and then try to argue that this means it should be "
-#| "subject to patent monopolies. <a href=\"http://web.archive.org/"
-#| "web/20071222001014/http://www.swpat.ffii.org/papers/europarl0309/\" title="
-#| "\"archived version of http://swpat.ffii.org/papers/europarl0309/\"> The "
-#| "European Parliament, rejecting software patents in 2003, voted to define "
-#| "“industry” as “automated production of material goods."
-#| "”</a>"
+#. type: Content of: <p>
msgid ""
"The term “industry” is being used as propaganda by advocates of "
"software patents. They call software development “industry” and "
Index: po/home.it-en.html
===================================================================
RCS file: /web/www/www/po/home.it-en.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- po/home.it-en.html 23 Sep 2015 18:29:52 -0000 1.117
+++ po/home.it-en.html 24 Oct 2015 21:58:59 -0000 1.118
@@ -151,7 +151,7 @@
<li>Support the efforts on net neutrality in Europe,
<a href="http://www.savetheinternet.com" title="Net
neutrality in the United States of America">in the USA</a>
-and <a href="http://www.neutrality.ca" title="Net neutrality in
+and <a href="http://saveournet.ca/" title="Net neutrality in
Canada">in Canada</a>.</li>
<li><strong>Fight against software patents:</strong>
@@ -253,7 +253,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/09/23 18:29:52 $
+$Date: 2015/10/24 21:58:59 $
<!-- timestamp end -->
</p>
</div>
Index: po/home.it.po
===================================================================
RCS file: /web/www/www/po/home.it.po,v
retrieving revision 1.563
retrieving revision 1.564
diff -u -b -r1.563 -r1.564
--- po/home.it.po 24 Oct 2015 21:46:00 -0000 1.563
+++ po/home.it.po 24 Oct 2015 21:58:59 -0000 1.564
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 19:55+0000\n"
"X-Generator: Poedit 1.5.4\n"
# type: Content of: <title>
@@ -338,17 +337,7 @@
"copyright</a> con <a href=\"http://www.laquadrature.net/en/\">LQDN</a>."
# type: Content of: <div><p>
-# | Support the efforts on net neutrality in Europe, <a
-# | href=\"http://www.savetheinternet.com\" title=\"Net neutrality in the
-# | United States of America\">in the USA</a> and <a
-# | [-href=\"http://www.neutrality.ca\"-] {+href=\"http://saveournet.ca/\"+}
-# | title=\"Net neutrality in Canada\">in Canada</a>.
#. type: Content of: <div><div><div><ul><li>
-#| msgid ""
-#| "Support the efforts on net neutrality in Europe, <a href=\"http://www."
-#| "savetheinternet.com\" title=\"Net neutrality in the United States of "
-#| "America\">in the USA</a> and <a href=\"http://www.neutrality.ca\" title="
-#| "\"Net neutrality in Canada\">in Canada</a>."
msgid ""
"Support the efforts on net neutrality in Europe, <a href=\"http://www."
"savetheinternet.com\" title=\"Net neutrality in the United States of America"
Index: po/planetfeeds.it.po
===================================================================
RCS file: /web/www/www/po/planetfeeds.it.po,v
retrieving revision 1.588
retrieving revision 1.589
diff -u -b -r1.588 -r1.589
--- po/planetfeeds.it.po 24 Oct 2015 21:46:01 -0000 1.588
+++ po/planetfeeds.it.po 24 Oct 2015 21:59:00 -0000 1.589
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-15 04:57+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <p><a>
@@ -59,12 +58,7 @@
"going on? Is this still the plan, Apple?"
msgstr " "
-# | <a
-# | [-href='http://dustycloud.org/blog/minimalist-distributed-bugtracker/'>-]
-# | {+href='http://dustycloud.org/blog/hitchhikers-guide-to-data-formats/'>+}
#. type: Content of: <p><a>
-#| msgid ""
-#| "<a href='http://dustycloud.org/blog/minimalist-distributed-bugtracker/'>"
msgid ""
"<a href='http://dustycloud.org/blog/hitchhikers-guide-to-data-formats/'>"
msgstr ""
Index: proprietary/malware-apple.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.it.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/malware-apple.it.html 10 Oct 2015 14:59:26 -0000 1.7
+++ proprietary/malware-apple.it.html 24 Oct 2015 21:59:00 -0000 1.8
@@ -71,23 +71,46 @@
<h3 id="back-doors">Backdoor di Apple</h3>
<ul>
- <li><p>L'iPhone ha una backdoor <a
+<li><p>
+Mac OS X ha avuto per 4 anni una <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+backdoor locale</a> intenzionale, che gli utenti potevano sfruttare per
+ottenere privilegi di amministratore.
+</p></li>
+
+<li><p>L'iPhone ha una backdoor <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">che
permette ad Apple di disinstallare a distanza applicazioni</a> che reputa
“inappropriate”. Jobs disse che è giusto che Apple abbia questo
-potere perché di Apple ci si può fidare, eccome.</p>
- </li>
+potere perché di Apple ci si può fidare, eccome.
+</p></li>
- <li><p>L'iPhone ha una backdoor per <a
+<li><p>L'iPhone ha una backdoor per <a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">la
formattazione a distanza</a>. Non è sempre abilitata, ma gli utenti vengono
-spinti ad abilitarla a loro insaputa.</p>
- </li>
+spinti ad abilitarla a loro insaputa.
+</p></li>
</ul>
<h3 id="censorship">Censura di Apple</h3>
<ul>
<li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"> ha eliminato
+un programma dal suo App Store</a> perché i suoi sviluppatori hanno osato
+disassemblare alcuni degli iGadget.
+</p></li>
+
+<li><p>
+Apple ha rifiutato un'app che mostrava dove sono avvenuti gli attacchi
+omicidi di droni statunitensi, adducendo varie scuse. Ogni volta che gli
+sviluppatori sistemavano un “problema”, Apple ne trovava un
+altro. Dopo il quinto rifiuto, Apple ha ammesso che stava censurando
+l'applicazione <a
+href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">solo
+per il tema di cui trattava</a>.
+</p></li>
+
+<li><p>
Nel 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">proibisce
le applicazioni</a> che sostengono il diritto all'aborto o che aiuterebbero
@@ -283,9 +306,9 @@
<li><p>Gli iGadget sono dispositivi tiranni: non permettono l'installazione
di
sistemi operativi diversi o modificati. Esiste una versione di Android per
gli iGadget, ma installarla richiede <a
-href="http://www.idroidproject.org/wiki/Status">trovare un bug o
-“exploit”</a> che renda possibile l'installazione di un sistema
-operativo diverso.</p>
+href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status">trovare
+un bug o “exploit”</a> che renda possibile l'installazione di un
+sistema operativo diverso.</p>
</li>
</ul>
<div class="translators-notes">
@@ -364,7 +387,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/10/10 14:59:26 $
+$Date: 2015/10/24 21:59:00 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-microsoft.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.it.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/malware-microsoft.it.html 10 Oct 2015 14:59:26 -0000
1.10
+++ proprietary/malware-microsoft.it.html 24 Oct 2015 21:59:02 -0000
1.11
@@ -113,11 +113,11 @@
</p></li>
<li><p><a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
+href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">Microsoft
informa l'NSA sui bug di Windows prima di sistemarli</a>.</p></li>
<li><p><a
-href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">Microsoft
+href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/">Microsoft
ha smesso di rilasciare aggiornamenti di sicurezza per Windows XP a tutti
meno che a quei pochi utenti disposti a pagare cifre esorbitanti</a>.</p>
@@ -298,7 +298,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/10/10 14:59:26 $
+$Date: 2015/10/24 21:59:02 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.it.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/proprietary-back-doors.it.html 26 Aug 2015 21:57:42 -0000
1.4
+++ proprietary/proprietary-back-doors.it.html 24 Oct 2015 21:59:02 -0000
1.5
@@ -17,6 +17,21 @@
software proprietario.</p>
<ul>
+<li><p>
+Mac OS X ha avuto per 4 anni una <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+backdoor locale</a> intenzionale.
+</p></li>
+
+<li><p>
+Alcuni utenti segnalano che <a
+href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+Microsoft li sta obbligando a sostituire Windows 7 e 8</a> con Windows 10,
+che spia tutto.</p>
+
+<p>
+Sembra che questo sfrutti una backdoor in Windows 7 e 8.
+</p></li>
<li>
<p>La maggior parte dei cellulari hanno una backdoor universale, che è stata
@@ -285,7 +300,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/08/26 21:57:42 $
+$Date: 2015/10/24 21:59:02 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-censorship.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.it.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/proprietary-censorship.it.html 10 Oct 2015 14:59:27 -0000
1.3
+++ proprietary/proprietary-censorship.it.html 24 Oct 2015 21:59:02 -0000
1.4
@@ -21,6 +21,22 @@
<ul>
<li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"> ha eliminato
+un programma dal suo App Store</a> perché i suoi sviluppatori hanno osato
+disassemblare alcuni degli iGadget.
+</p></li>
+
+<li><p>
+Apple ha rifiutato un'app che mostrava dove sono avvenuti gli attacchi
+omicidi di droni statunitensi, adducendo varie scuse. Ogni volta che gli
+sviluppatori sistemavano un “problema”, Apple ne trovava un
+altro. Dopo il quinto rifiuto, Apple ha ammesso che stava censurando
+l'applicazione <a
+href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">solo
+per il tema di cui trattava</a>.
+</p></li>
+
+<li><p>
Nel 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">proibisce
le applicazioni</a> che sostengono il diritto all'aborto o che aiuterebbero
@@ -115,7 +131,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/10/10 14:59:27 $
+$Date: 2015/10/24 21:59:02 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.it.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/proprietary-insecurity.it.html 10 Oct 2015 14:59:27 -0000
1.8
+++ proprietary/proprietary-insecurity.it.html 24 Oct 2015 21:59:02 -0000
1.9
@@ -26,31 +26,60 @@
ripararle</em>.</p>
<ul>
+<li>
+<p>
+I braccialetti per il monitoraggio della forma fisica di FitBit hanno <a
+href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+una vulnerabilità Bluetooth</a> che permette ai malintenzionati di inviare
+malware ai dispositivi, che in seguito possono infettare computer e altri
+dispositivi simili con cui entrano in contatto.
+</p>
+</li>
+
+<li>
+<p>
+Le funzioni di “cifratura nativa” dei dischi usano firmware
+proprietario per cifrare, e sono pertanto inaffidabili. I dischi “My
+Passport” di Western Digital <a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">hanno
+una back door</a>.
+</p>
+</li>
+
+<li>
+<p>
+Mac OS X ha avuto per 4 anni una <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+backdoor locale</a> intenzionale, che gli utenti potevano sfruttare per
+ottenere privilegi di amministratore.
+</p>
+</li>
<li>
<p>Alcuni ricercatori in materia di sicurezza hanno scoperto <a
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
falle nei dispositivi diagnostici</a> usati per il monitoraggio e
l'assicurazione dei veicoli e hanno dimostrato di poter prendere il
-controllo di un'auto o un camion con un semplice SMS.</p>
+controllo di un'auto o un camion con un semplice SMS.
+</p>
</li>
- <li>
- <p>
- Alcuni cracker sono riusciti a <a
+<li>
+<p>
+Alcuni cracker sono riusciti a <a
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">prendere
il controllo di un'auto</a> “connected car” Jeep.
- <br/>Hanno dimostrato di essere in grado di conoscere la posizione
dell'auto, di
+<br/>Hanno dimostrato di essere in grado di conoscere la posizione dell'auto,
di
avviare o fermare il motore, di attivare e disattivare i freni e altro.
- </p>
- <p>
- Si può ipotizzare che anche Chrysler e la NSA possano fare lo stesso.
- </p>
- <p>
- Se si possiede un'automobile che contiene tra i suoi componenti un
telefono
+</p>
+<p>
+Si può ipotizzare che anche Chrysler e la NSA possano fare lo stesso.
+</p>
+<p>
+Se si possiede un'automobile che contiene tra i suoi componenti un telefono
cellulare, è opportuno considerare se disattivarlo.
- </p>
- </li>
+</p>
+</li>
<li>
<p>
@@ -271,7 +300,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/10/10 14:59:27 $
+$Date: 2015/10/24 21:59:02 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-sabotage.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.it.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-sabotage.it.html 13 Oct 2015 22:27:42 -0000
1.6
+++ proprietary/proprietary-sabotage.it.html 24 Oct 2015 21:59:02 -0000
1.7
@@ -18,28 +18,31 @@
<ul>
<li><p>
-Lenovo <a
-href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-ha alterato il BIOS dei computer che vende</a> per assicurarsi che il suo
-spyware sia presente su qualsiasi sistema Windows installato sui quei
-computer, anche dopo una formattazione.
-</p></li>
+Alcuni utenti segnalano che <a
+href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+Microsoft li sta obbligando a sostituire Windows 7 e 8</a> con Windows 10,
+che spia tutto.</p>
-<li><p>
-Microsoft sta ripetutamente <a
-href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
-sollecitando molti utenti ad installare Windows 10</a>.
+<p>
+Sembra che questo sfrutti una backdoor in Windows 7 e 8.
</p></li>
<li><p>
<a
-href="https://www.techdirt.com/articles/20150812/11395231925/lenovo-busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml">
+href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo ha installato di nascosto software indesiderato tramite il BIOS</a>
sui suoi dispositivi Windows. Lo specifico metodo usato da Lenovo non aveva
conseguenze per chi eseguiva GNU/Linux; tra l'altro, un'installazione
“pulita” di Windows non è mai davvero pulita a causa del <a
href="/proprietary/malware-microsoft.html">malware preinstallato da
-Microsoft</a>.</p></li>
+Microsoft</a>.
+</p></li>
+
+<li><p>
+Microsoft sta ripetutamente <a
+href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
+sollecitando molti utenti ad installare Windows 10</a>.
+</p></li>
<li><p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
@@ -62,7 +65,7 @@
<li><p>
<a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
+href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">Microsoft
informa l'NSA sui bug di Windows prima di sistemarli</a>.
</p></li>
@@ -86,7 +89,7 @@
<li><p>
<a
-href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">Microsoft
+href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/">Microsoft
ha smesso di rilasciare aggiornamenti di sicurezza per Windows XP a tutti
meno che a quei pochi utenti disposti a pagare cifre esorbitanti</a>.</p>
@@ -260,7 +263,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/10/13 22:27:42 $
+$Date: 2015/10/24 21:59:02 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/proprietary-surveillance.it.html 10 Oct 2015 14:59:27
-0000 1.10
+++ proprietary/proprietary-surveillance.it.html 24 Oct 2015 21:59:02
-0000 1.11
@@ -33,6 +33,14 @@
<li><a href="#SpywareInTVSets">Spyware nei giocattoli</a></li>
</ul>
</li>
+ <li><a href="#SpywareAtLowLevel">Spyware a basso livello</a>
+ <ul>
+ <li><a href="#SpywareInBIOS">Spyware nel BIOS</a></li>
+
+ <!-- <li>
+<a href="#SpywareInFirmware">Spyware in Firmware</a></li> -->
+</ul>
+ </li>
<li><a href="#SpywareAtWork">Spyware sul lavoro</a>
<ul>
<li><a href="#SpywareInSkype">Spyware in Skype</a></li>
@@ -334,6 +342,15 @@
</div>
<ul>
+ <li><p>Secondo Edward Snowden, <a
href="http://www.bbc.com/news/uk-34444233">le
+agenzie possono prendere il controllo degli smartphone</a> inviando SMS
+nascosti che permettono loro di accendere e spegnere il dispositivo,
+ascoltare il microfono, recuperare informazioni di geolocalizzazione dal
+GPS, fare foto, leggere i messaggi, leggere lo storico delle chiamate, della
+posizione geografica e della navigazione web, leggere la rubrica. Questo
+malware è progettato per mascherarsi dai tentativi di investigazione.</p>
+ </li>
+
<li><p>Alcuni telefoni Samsung sono venduti con applicazioni preinstallate
che <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">gli
utenti non possono cancellare</a>, e queste applicazioni inviano così tanti
@@ -468,6 +485,35 @@
</li>
</ul>
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware a basso livello</h3>
+ <span class="anchor-reference-id">(<a
+href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware nel BIOS</h4>
+ <span class="anchor-reference-id">(<a
+href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
+href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo ha installato di nascosto software indesiderato tramite il BIOS</a>
+sui suoi dispositivi Windows. Lo specifico metodo usato da Lenovo non aveva
+conseguenze per chi eseguiva GNU/Linux; tra l'altro, un'installazione
+“pulita” di Windows non è mai davvero pulita a causa del <a
+href="/proprietary/malware-microsoft.html">malware preinstallato da
+Microsoft</a>.
+</p></li>
+</ul>
+
<!-- #SpywareAtWork -->
<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
@@ -786,7 +832,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/10/10 14:59:27 $
+$Date: 2015/10/24 21:59:02 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-tyrants.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.it.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary/proprietary-tyrants.it.html 18 Apr 2015 21:59:58 -0000
1.2
+++ proprietary/proprietary-tyrants.it.html 24 Oct 2015 21:59:02 -0000
1.3
@@ -29,9 +29,9 @@
<li>
<p>Tutti i vari iGadget di Apple sono dispositivi tiranni. Esiste una versione
di Android compatibile, ma installarla richiede di <a
-href="http://www.idroidproject.org/wiki/Status">trovare un bug o
-“exploit”</a> che renda possibile l'installazione di un sistema
-operativo diverso.
+href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status">trovare
+un bug o “exploit”</a> che renda possibile l'installazione di un
+sistema operativo diverso.
</p>
</li>
@@ -109,7 +109,7 @@
<!-- Regarding copyright, in general, standalone pages (as opposed to
files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ be under CC BY-ND 4.0. Please do NOT change or remove this
without talking with the webmasters or licensing team first.
Please make sure the copyright date is consistent with the
document. For web pages, it is ok to list just the latest year the
@@ -126,9 +126,8 @@
<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
<p>Questa pagina è distribuita secondo i termini della licenza <a
rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.it">Creative
-Commons Attribuzione - Non opere derivate 3.0 Stati Uniti</a> (CC BY-ND
-3.0).</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative Commons
+Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0).</p>
<!--#include virtual="/server/bottom-notes.it.html" -->
<div class="translators-credits">
@@ -139,7 +138,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/04/18 21:59:58 $
+$Date: 2015/10/24 21:59:02 $
<!-- timestamp end -->
</p>
Index: proprietary/po/malware-apple.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/malware-apple.it-en.html 10 Oct 2015 14:59:27 -0000
1.7
+++ proprietary/po/malware-apple.it-en.html 24 Oct 2015 21:59:03 -0000
1.8
@@ -61,23 +61,45 @@
<h3 id="back-doors">Apple Back Doors</h3>
<ul>
- <li><p>The iPhone has a back door <a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
- that allows Apple to remotely delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's OK for Apple to have this
- power because of course we can trust Apple.</p>
- </li>
+<li><p>
+Mac OS X had an
+<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p></li>
- <li><p>The iPhone has a back door for <a
-
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
- remote wipe</a>. It's not always enabled, but users are led into
- enabling it without understanding.</p>
- </li>
+<li><p>The iPhone has a back door <a
+href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+that allows Apple to remotely delete apps</a> which Apple considers
+“inappropriate”. Jobs said it's OK for Apple to have this
+power because of course we can trust Apple.
+</p></li>
+
+<li><p>The iPhone has a back door for <a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into
+enabling it without understanding.
+</p></li>
</ul>
<h3 id="censorship">Apple Censorship</h3>
<ul>
<li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+banned a program from the App Store</a> because its developers
+committed the enormity of disassembling some iThings.
+</p></li>
+
+<li><p>
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one “problem”, Apple complained about another.
+After the fifth rejection,
+Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
+it was censoring the app based on the subject matter</a>.
+</p></li>
+
+<li><p>
As of 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
rights or would help women find abortions</a>.</p>
@@ -257,7 +279,7 @@
<li><p>The iThings are tyrant devices: they do not permit
installing a different or modified operating system. There is a
port of Android to the iThings, but installing it
- requires <a href="http://www.idroidproject.org/wiki/Status">
+ requires <a
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status">
finding a bug or “exploit”</a> to make it possible to
install a different system.</p>
</li>
@@ -320,7 +342,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/10 14:59:27 $
+$Date: 2015/10/24 21:59:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/malware-apple.it.po 24 Oct 2015 21:46:01 -0000 1.24
+++ proprietary/po/malware-apple.it.po 24 Oct 2015 21:59:03 -0000 1.25
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 14:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -566,20 +565,7 @@
"Apple <a href=\"http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"
"\">non permette agli utenti di installare versioni precedenti di iOS</a>."
-# | The iThings are tyrant devices: they do not permit installing a different
-# | or modified operating system. There is a port of Android to the iThings,
-# | but installing it requires <a
-# | [-href=\"http://www.idroidproject.org/wiki/Status\">-]
-# |
{+href=\"https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status\">+}
-# | finding a bug or “exploit”</a> to make it possible to install
-# | a different system.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "The iThings are tyrant devices: they do not permit installing a different "
-#| "or modified operating system. There is a port of Android to the iThings, "
-#| "but installing it requires <a href=\"http://www.idroidproject.org/wiki/"
-#| "Status\"> finding a bug or “exploit”</a> to make it possible "
-#| "to install a different system."
+#. type: Content of: <ul><li><p>
msgid ""
"The iThings are tyrant devices: they do not permit installing a different or "
"modified operating system. There is a port of Android to the iThings, but "
Index: proprietary/po/malware-microsoft.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/po/malware-microsoft.it-en.html 10 Oct 2015 14:59:27 -0000
1.11
+++ proprietary/po/malware-microsoft.it-en.html 24 Oct 2015 21:59:03 -0000
1.12
@@ -94,10 +94,10 @@
repeatedly nagging many users to install Windows 10</a>.
</p></li>
- <li><p><a
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
+ <li><p><a
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">
Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
- <li><p><a
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">
+ <li><p><a
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/">
Microsoft cut off security fixes for Windows XP, except to some big users
that pay exorbitantly.</a></p>
@@ -250,7 +250,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/10 14:59:27 $
+$Date: 2015/10/24 21:59:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/malware-microsoft.it.po 24 Oct 2015 21:46:02 -0000
1.39
+++ proprietary/po/malware-microsoft.it.po 24 Oct 2015 21:59:03 -0000
1.40
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-17 10:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -206,15 +205,7 @@
"technology/2015/sep/11/microsoft-downloading-windows-1\"> sollecitando molti "
"utenti ad installare Windows 10</a>."
-# | <a
-# |
[-href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">-]
-# |
{+href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/\">+}
-# | Microsoft informs the NSA of bugs in Windows before fixing them.</a>
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-"
-#| "can-any-company-ever-trust-microsoft-again/index.htm\"> Microsoft informs "
-#| "the NSA of bugs in Windows before fixing them.</a>"
+#. type: Content of: <ul><li><p>
msgid ""
"<a href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-"
"company-ever-trust-microsoft-again-3569376/\"> Microsoft informs the NSA of "
@@ -224,17 +215,7 @@
"company-ever-trust-microsoft-again-3569376/\">Microsoft informa l'NSA sui "
"bug di Windows prima di sistemarli</a>."
-# | <a
-# |
[-href=\"http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm\">-]
-# |
{+href=\"http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/\">+}
-# | Microsoft cut off security fixes for Windows XP, except to some big users
-# | that pay exorbitantly.</a>
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://blogs.computerworlduk.com/open-enterprise/2014/04/"
-#| "windows-xp-end-of-an-era-end-of-an-error/index.htm\"> Microsoft cut off "
-#| "security fixes for Windows XP, except to some big users that pay "
-#| "exorbitantly.</a>"
+#. type: Content of: <ul><li><p>
msgid ""
"<a href=\"http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-"
"end-of-an-era-end-of-an-error-3569489/\"> Microsoft cut off security fixes "
Index: proprietary/po/proprietary-back-doors.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-back-doors.it-en.html 26 Aug 2015 21:57:42
-0000 1.4
+++ proprietary/po/proprietary-back-doors.it-en.html 24 Oct 2015 21:59:03
-0000 1.5
@@ -10,6 +10,19 @@
<p>Here are examples of demonstrated back doors in proprietary software.</p>
<ul>
+<li><p>
+Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>.
+</p></li>
+
+<li><p>
+Users report <a
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+Microsoft is forcing them to replace Windows 7 and 8 with
+all-spying Windows 10</a>.</p>
+
+<p>
+This seems to involve use of a back door in Windows 7 and 8.
+</p></li>
<li>
<p>Most mobile phones have a universal back door, which has been used to
@@ -246,7 +259,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/08/26 21:57:42 $
+$Date: 2015/10/24 21:59:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-back-doors.it.po 24 Oct 2015 21:46:02 -0000
1.17
+++ proprietary/po/proprietary-back-doors.it.po 24 Oct 2015 21:59:03 -0000
1.18
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-17 09:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary-censorship.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/proprietary-censorship.it-en.html 10 Oct 2015 14:59:28
-0000 1.3
+++ proprietary/po/proprietary-censorship.it-en.html 24 Oct 2015 21:59:03
-0000 1.4
@@ -17,6 +17,21 @@
<ul>
<li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+banned a program from the App Store</a> because its developers
+committed the enormity of disassembling some iThings.
+</p></li>
+
+<li><p>
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one “problem”, Apple complained about another.
+After the fifth rejection,
+Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
+it was censoring the app based on the subject matter</a>.
+</p></li>
+
+<li><p>
As of 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
rights or would help women find abortions</a>.</p>
@@ -91,7 +106,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/10 14:59:28 $
+$Date: 2015/10/24 21:59:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-censorship.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary-censorship.it.po 24 Oct 2015 21:46:02 -0000
1.10
+++ proprietary/po/proprietary-censorship.it.po 24 Oct 2015 21:59:04 -0000
1.11
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 14:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary-insecurity.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-insecurity.it-en.html 10 Oct 2015 14:59:28
-0000 1.8
+++ proprietary/po/proprietary-insecurity.it-en.html 24 Oct 2015 21:59:04
-0000 1.9
@@ -20,31 +20,58 @@
deliberately, and <em>the users are helpless to fix them</em>.</p>
<ul>
+<li>
+<p>
+FitBit fitness trackers <a
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+have a Bluetooth vulnerability</a> that allows
+attackers to send malware to the devices, which can subsequently spread
+to computers and other FitBit trackers that interact with them.
+</p>
+</li>
+
+<li>
+<p>
+“Self-encrypting” disk drives do the encryption with proprietary
+firmware so you can't trust it. Western Digital's “My Passport”
+drives
+<a
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have
a back door</a>.
+</p>
+</li>
+
+<li>
+<p>
+Mac OS X had an
+<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p>
+</li>
<li>
<p>Security researchers discovered a
<a
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
vulnerability in diagnostic dongles used for vehicle tracking and
insurance</a> that let them take remote control of a car or
-lorry using an SMS.</p>
+lorry using an SMS.
+</p>
</li>
- <li>
- <p>
- Crackers were able to
- <a
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">take
remote control of the Jeep</a>
- “connected car”.
- <br/>They could track the car, start or stop the engine, and
- activate or deactivate the brakes, and more.
- </p>
- <p>
- I expect that Chrysler and the NSA can do this too.
- </p>
- <p>
- If I ever own a car, and it contains a portable phone, I will
- deactivate that.
- </p>
- </li>
+<li>
+<p>
+Crackers were able to
+<a
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">take
remote control of the Jeep</a>
+“connected car”.
+<br/>They could track the car, start or stop the engine, and
+activate or deactivate the brakes, and more.
+</p>
+<p>
+I expect that Chrysler and the NSA can do this too.
+</p>
+<p>
+If I ever own a car, and it contains a portable phone, I will
+deactivate that.
+</p>
+</li>
<li>
<p>
@@ -233,7 +260,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/10 14:59:28 $
+$Date: 2015/10/24 21:59:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/proprietary-insecurity.it.po 24 Oct 2015 21:46:02 -0000
1.38
+++ proprietary/po/proprietary-insecurity.it.po 24 Oct 2015 21:59:04 -0000
1.39
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-19 13:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary-sabotage.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-sabotage.it-en.html 13 Oct 2015 22:27:42
-0000 1.6
+++ proprietary/po/proprietary-sabotage.it-en.html 24 Oct 2015 21:59:04
-0000 1.7
@@ -13,25 +13,27 @@
<ul>
<li><p>
-Lenovo <a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-has sabotaged the BIOS of the machines they sell</a> to make
-sure their
-spyware is present on every Windows system that is installed on them -
-even after formatting the disks.
-</p></li>
+Users report <a
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+Microsoft is forcing them to replace Windows 7 and 8 with
+all-spying Windows 10</a>.</p>
-<li><p>
-Microsoft is <a
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
-repeatedly nagging many users to install Windows 10</a>.
+<p>
+This seems to involve use of a back door in Windows 7 and 8.
</p></li>
<li><p>
-<a
href="https://www.techdirt.com/articles/20150812/11395231925/lenovo-busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml">
-Lenovo stealthily installed crapware via BIOS</a> on Windows installs.
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
Note that the specific sabotage method Lenovo used did not affect
GNU/Linux; also, a “clean” Windows install is not really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.</p></li>
+puts in its own malware</a>.
+</p></li>
+
+<li><p>
+Microsoft is <a
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
+repeatedly nagging many users to install Windows 10</a>.
+</p></li>
<li><p>Vizio
<a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
@@ -50,7 +52,7 @@
</p></li>
<li><p>
-<a
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
+<a
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">Microsoft
informs the NSA of bugs in Windows before fixing them.</a>
</p></li>
@@ -71,7 +73,7 @@
</p></li>
<li><p>
-<a
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">Microsoft
+<a
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/">Microsoft
cut off security fixes for Windows XP, except to some big
users that pay exorbitantly.</a></p>
@@ -216,7 +218,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/13 22:27:42 $
+$Date: 2015/10/24 21:59:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary-sabotage.it.po 24 Oct 2015 21:46:03 -0000
1.23
+++ proprietary/po/proprietary-sabotage.it.po 24 Oct 2015 21:59:04 -0000
1.24
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-17 08:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -58,24 +57,7 @@
msgid "This seems to involve use of a back door in Windows 7 and 8."
msgstr "Sembra che questo sfrutti una backdoor in Windows 7 e 8."
-# | <a
-# |
[-href=\"https://www.techdirt.com/articles/20150812/11395231925/lenovo-busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml\">-]
-# |
{+href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">+}
-# | Lenovo stealthily installed crapware {+and spyware+} via BIOS</a> on
-# | Windows installs. Note that the specific sabotage method Lenovo used did
-# | not affect GNU/Linux; also, a “clean” Windows install is not
-# | really clean since <a
-# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
-# | malware</a>.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"https://www.techdirt.com/articles/20150812/11395231925/lenovo-"
-#| "busted-stealthily-installing-crapware-via-bios-fresh-windows-installs."
-#| "shtml\"> Lenovo stealthily installed crapware via BIOS</a> on Windows "
-#| "installs. Note that the specific sabotage method Lenovo used did not "
-#| "affect GNU/Linux; also, a “clean” Windows install is not "
-#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
-#| "\">Microsoft puts in its own malware</a>."
+#. type: Content of: <ul><li><p>
msgid ""
"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
@@ -137,15 +119,7 @@
"deleted-music-ipods-rivals-steve-jobs\">ha cancellato dagli iPod la musica "
"scaricata da negozi di musica digitale che fanno concorrenza a iTunes</a>."
-# | <a
-# |
[-href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">Microsoft-]
-# |
{+href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/\">Microsoft+}
-# | informs the NSA of bugs in Windows before fixing them.</a>
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-"
-#| "can-any-company-ever-trust-microsoft-again/index.htm\">Microsoft informs "
-#| "the NSA of bugs in Windows before fixing them.</a>"
+#. type: Content of: <ul><li><p>
msgid ""
"<a href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-"
"company-ever-trust-microsoft-again-3569376/\">Microsoft informs the NSA of "
@@ -187,17 +161,7 @@
"of-hardware-hackers/\">sabotare chip alternativi compatibili</a> così da "
"impedirne il funzionamento."
-# | <a
-# |
[-href=\"http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm\">Microsoft-]
-# |
{+href=\"http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/\">Microsoft+}
-# | cut off security fixes for Windows XP, except to some big users that pay
-# | exorbitantly.</a>
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://blogs.computerworlduk.com/open-enterprise/2014/04/"
-#| "windows-xp-end-of-an-era-end-of-an-error/index.htm\">Microsoft cut off "
-#| "security fixes for Windows XP, except to some big users that pay "
-#| "exorbitantly.</a>"
+#. type: Content of: <ul><li><p>
msgid ""
"<a href=\"http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-"
"end-of-an-era-end-of-an-error-3569489/\">Microsoft cut off security fixes "
Index: proprietary/po/proprietary-surveillance.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary-surveillance.it-en.html 10 Oct 2015 14:59:28
-0000 1.10
+++ proprietary/po/proprietary-surveillance.it-en.html 24 Oct 2015 21:59:04
-0000 1.11
@@ -29,6 +29,12 @@
<li><a href="#SpywareInToys">Spyware in Toys</a></li>
</ul>
</li>
+ <li><a href="#SpywareAtLowLevel">Spyware at Low Level</a>
+ <ul>
+ <li><a href="#SpywareInBIOS">Spyware in BIOS</a></li>
+ <!-- <li><a href="#SpywareInFirmware">Spyware in Firmware</a></li> -->
+ </ul>
+ </li>
<li><a href="#SpywareAtWork">Spyware at Work</a>
<ul>
<li><a href="#SpywareInSkype">Spyware in Skype</a></li>
@@ -319,6 +325,15 @@
</div>
<ul>
+ <li><p>According to Edward Snowden,
+ <a href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a>
+ by sending hidden text messages which enable them to turn the phones
+ on and off, listen to the microphone, retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history, and read the contact list. This malware is designed to
+ disguise itself from investigation.</p>
+ </li>
+
<li><p>Samsung phones come with
<a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
and they send so much data that their transmission is a
@@ -448,6 +463,32 @@
</ul>
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
<!-- #SpywareAtWork -->
<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
@@ -733,7 +774,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/10 14:59:28 $
+$Date: 2015/10/24 21:59:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/proprietary-surveillance.it.po 24 Oct 2015 21:46:03
-0000 1.42
+++ proprietary/po/proprietary-surveillance.it.po 24 Oct 2015 21:59:04
-0000 1.43
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-17 08:55+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -82,17 +81,11 @@
msgid "<a href=\"#SpywareInToys\">Spyware in Toys</a>"
msgstr "<a href=\"#SpywareInTVSets\">Spyware nei giocattoli</a>"
-# | <a [-href=\"#SpywareAtHome\">Spyware-]
-# | {+href=\"#SpywareAtLowLevel\">Spyware+} at [-Home</a>-] {+Low Level</a>+}
#. type: Content of: <div><ul><li>
-#| msgid "<a href=\"#SpywareAtHome\">Spyware at Home</a>"
msgid "<a href=\"#SpywareAtLowLevel\">Spyware at Low Level</a>"
msgstr "<a href=\"#SpywareAtLowLevel\">Spyware a basso livello</a>"
-# | <a [-href=\"#SpywareInMacOS\">Spyware-]
-# | {+href=\"#SpywareInBIOS\">Spyware+} in [-MacOS</a>-] {+BIOS</a>+}
#. type: Content of: <div><ul><li><ul><li>
-#| msgid "<a href=\"#SpywareInMacOS\">Spyware in MacOS</a>"
msgid "<a href=\"#SpywareInBIOS\">Spyware in BIOS</a>"
msgstr "<a href=\"#SpywareInBIOS\">Spyware nel BIOS</a>"
@@ -904,19 +897,11 @@
"Barbie <a href=\"http://www.mirror.co.uk/news/technology-science/technology/"
"wi-fi-spy-barbie-records-childrens-5177673\">spia bambini e adulti</a>."
-# | Spyware at [-Home-] {+Low Level+}
#. type: Content of: <div><h3>
-#| msgid "Spyware at Home"
msgid "Spyware at Low Level"
msgstr "Spyware a basso livello"
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareAtHome\">#SpywareAtHome</a>)</span>-]
-# | {+href=\"#SpywareAtLowLevel\">#SpywareAtLowLevel</a>)</span>+}
-#. type: Content of: <div>
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareAtHome"
-#| "\">#SpywareAtHome</a>)</span>"
+#. type: Content of: <div>
msgid ""
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareAtLowLevel"
"\">#SpywareAtLowLevel</a>)</span>"
@@ -924,19 +909,11 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareAtLowLevel"
"\">#SpywareAtLowLevel</a>)</span>"
-# | Spyware in [-MacOS-] {+BIOS+}
#. type: Content of: <div><h4>
-#| msgid "Spyware in MacOS"
msgid "Spyware in BIOS"
msgstr "Spyware nel BIOS"
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInMacOS\">#SpywareInMacOS</a>)</span>-]
-# | {+href=\"#SpywareInBIOS\">#SpywareInBIOS</a>)</span>+}
-#. type: Content of: <div>
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMacOS"
-#| "\">#SpywareInMacOS</a>)</span>"
+#. type: Content of: <div>
msgid ""
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInBIOS"
"\">#SpywareInBIOS</a>)</span>"
Index: proprietary/po/proprietary-tyrants.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary/po/proprietary-tyrants.it-en.html 18 Apr 2015 21:59:59
-0000 1.2
+++ proprietary/po/proprietary-tyrants.it-en.html 24 Oct 2015 21:59:04
-0000 1.3
@@ -25,7 +25,7 @@
<li>
<p>The Apple iThings are tyrant devices. There is a port of Android
to the iThings, but installing it
-requires <a href="http://www.idroidproject.org/wiki/Status"> finding a
+requires <a
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status">
finding a
bug or “exploit”</a> to make it possible to install a
different system.
</p>
@@ -89,7 +89,7 @@
<!-- Regarding copyright, in general, standalone pages (as opposed to
files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ be under CC BY-ND 4.0. Please do NOT change or remove this
without talking with the webmasters or licensing team first.
Please make sure the copyright date is consistent with the
document. For web pages, it is ok to list just the latest year the
@@ -107,14 +107,14 @@
<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
<!--#include virtual="/server/bottom-notes.html" -->
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/04/18 21:59:59 $
+$Date: 2015/10/24 21:59:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tyrants.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-tyrants.it.po 24 Oct 2015 21:46:03 -0000
1.6
+++ proprietary/po/proprietary-tyrants.it.po 24 Oct 2015 21:59:05 -0000
1.7
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 18:56+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -55,18 +54,7 @@
"Apple <a href=\"http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"
"\">non permette agli utenti di installare versioni precedenti di iOS</a>."
-# | The Apple iThings are tyrant devices. There is a port of Android to the
-# | iThings, but installing it requires <a
-# | [-href=\"http://www.idroidproject.org/wiki/Status\">-]
-# |
{+href=\"https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status\">+}
-# | finding a bug or “exploit”</a> to make it possible to install
-# | a different system.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "The Apple iThings are tyrant devices. There is a port of Android to the "
-#| "iThings, but installing it requires <a href=\"http://www.idroidproject."
-#| "org/wiki/Status\"> finding a bug or “exploit”</a> to make it "
-#| "possible to install a different system."
+#. type: Content of: <ul><li><p>
msgid ""
"The Apple iThings are tyrant devices. There is a port of Android to the "
"iThings, but installing it requires <a href=\"https://web.archive.org/"
@@ -162,12 +150,7 @@
msgid "Copyright © 2014, 2015 Free Software Foundation, Inc."
msgstr "Copyright © 2014, 2015 Free Software Foundation, Inc."
-# || No change detected. The change might only be in amounts of spaces.
#. type: Content of: <div><p>
-#| msgid ""
-#| "This page is licensed under a <a rel=\"license\" href=\"http://"
-#| "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
-#| "NoDerivatives 4.0 International License</a>."
msgid ""
"This page is licensed under a <a rel=\"license\" href=\"http://"
"creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
Index: server/sitemap.it.html
===================================================================
RCS file: /web/www/www/server/sitemap.it.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- server/sitemap.it.html 23 Oct 2015 17:03:16 -0000 1.36
+++ server/sitemap.it.html 24 Oct 2015 21:59:05 -0000 1.37
@@ -828,8 +828,8 @@
<dt><a href="/licenses/200104_seminar.html">200104_seminar.html</a></dt>
<dd>FSF Seminar: Detailed Study and Analysis of GPL and LGPL</dd>
<dt><a href="/licenses/210104_seminar.html">210104_seminar.html</a></dt>
- <dd>FSF Seminar: GPL Compliance Case Studies and Legal Ethics in Free
Software
-Licensing</dd>
+ <dd>Seminario della FSF: Casi di studio sul rispetto della GPL ed etica
legale
+nelle licenze di software libero</dd>
<dt><a
href="/licenses/agpl-3.0-standalone.html">agpl-3.0-standalone.html</a></dt>
<dd>GNU Affero General Public License</dd>
<dt><a href="/licenses/agpl-3.0.html">agpl-3.0.html</a></dt>
@@ -1789,7 +1789,7 @@
<dt><a href="/software/reliability.html">reliability.html</a></dt>
<dd>Il software libero è più affidabile!</dd>
<dt><a href="/software/repo-criteria.html">repo-criteria.html</a></dt>
- <dd>GNU ethical repository criteria</dd>
+ <dd>Criteri etici per i repository di GNU</dd>
<dt><a href="/software/year2000-list.html">year2000-list.html</a></dt>
<dd>List GNU Software and Year 2000 Problems</dd>
<dt><a href="/software/year2000.html">year2000.html</a></dt>
@@ -1993,7 +1993,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/10/23 17:03:16 $
+$Date: 2015/10/24 21:59:05 $
<!-- timestamp end -->
</p>
Index: server/po/sitemap.it-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.it-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- server/po/sitemap.it-en.html 10 Oct 2015 14:59:29 -0000 1.17
+++ server/po/sitemap.it-en.html 24 Oct 2015 21:59:05 -0000 1.18
@@ -826,7 +826,8 @@
<dt><a href="/licenses/200104_seminar.html">200104_seminar.html</a></dt>
<dd>FSF Seminar: Detailed Study and Analysis of GPL and LGPL</dd>
<dt><a href="/licenses/210104_seminar.html">210104_seminar.html</a></dt>
- <dd>FSF Seminar: Case Study and Legal Ethics</dd>
+ <dd>FSF Seminar: GPL
+Compliance Case Studies and Legal Ethics in Free Software Licensing</dd>
<dt><a
href="/licenses/agpl-3.0-standalone.html">agpl-3.0-standalone.html</a></dt>
<dd>GNU Affero General Public License</dd>
<dt><a href="/licenses/agpl-3.0.html">agpl-3.0.html</a></dt>
@@ -1686,6 +1687,8 @@
<dd>Recent Software Releases</dd>
<dt><a href="/software/reliability.html">reliability.html</a></dt>
<dd>Free Software is More Reliable!</dd>
+ <dt><a href="/software/repo-criteria.html">repo-criteria.html</a></dt>
+ <dd>GNU ethical repository criteria</dd>
<dt><a href="/software/year2000-list.html">year2000-list.html</a></dt>
<dd>List GNU Software and Year 2000 Problems</dd>
<dt><a href="/software/year2000.html">year2000.html</a></dt>
@@ -1876,7 +1879,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/10 14:59:29 $
+$Date: 2015/10/24 21:59:05 $
<!-- timestamp end -->
</p>
</div>
Index: server/po/sitemap.it.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.it.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- server/po/sitemap.it.po 24 Oct 2015 21:46:01 -0000 1.51
+++ server/po/sitemap.it.po 24 Oct 2015 21:59:05 -0000 1.52
@@ -14,7 +14,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-17 17:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: software/software.it.html
===================================================================
RCS file: /web/www/www/software/software.it.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- software/software.it.html 13 Mar 2015 23:26:59 -0000 1.74
+++ software/software.it.html 24 Oct 2015 21:59:05 -0000 1.75
@@ -135,7 +135,10 @@
<p>Se state scrivendo un nuovo programma e vorreste farlo diventare un
pacchetto GNU ufficiale, utilizzate il <a
-href="/help/evaluation.html">modulo di richiesta</a> apposito.</p>
+href="/help/evaluation.html">modulo di richiesta</a> apposito. Quando
+scegliete il servizio di hosting che volete usare per il vostro progetto,
+non dimenticate <a href="/software/repo-criteria.html">i nostri criteri
+etici</a>.</p>
<p>Se siete i responsabili o gli sviluppatori di un pacchetto GNU, recente o
meno, troverete utile il nostro breve <a
@@ -266,7 +269,7 @@
<!-- Regarding copyright, in general, standalone pages (as opposed to
files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ be under CC BY-ND 4.0. Please do NOT change or remove this
without talking with the webmasters or licensing team first.
Please make sure the copyright date is consistent with the
document. For web pages, it is ok to list just the latest year the
@@ -283,9 +286,8 @@
<p>Copyright © 2015 Free Software Foundation, Inc.</p>
<p>Questa pagina è distribuita secondo i termini della licenza <a
rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.it">Creative
-Commons Attribuzione - Non opere derivate 3.0 Stati Uniti</a> (CC BY-ND
-3.0).</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative Commons
+Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0).</p>
<!--#include virtual="/server/bottom-notes.it.html" -->
<div class="translators-credits">
@@ -297,7 +299,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/03/13 23:26:59 $
+$Date: 2015/10/24 21:59:05 $
<!-- timestamp end -->
</p>
Index: software/po/software.it-en.html
===================================================================
RCS file: /web/www/www/software/po/software.it-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- software/po/software.it-en.html 13 Mar 2015 23:26:59 -0000 1.34
+++ software/po/software.it-en.html 24 Oct 2015 21:59:06 -0000 1.35
@@ -128,10 +128,13 @@
packages and helping with development, see the <a
href="/help/help.html">GNU help wanted</a> page.</p>
-<p>If you're writing a new program and would like to make your software
-an official GNU package, see the <a
-href="/help/evaluation.html">evaluation information and submission
-form</a>.</p>
+<p>If you're writing a new program and would like to make your
+ software an official GNU package, see
+ the <a href="/help/evaluation.html">evaluation information and
+ submission form</a>. Refer to
+ the <a href="/software/repo-criteria.html">ethical repository
+ criteria</a> for guidance choosing a hosting service for your
+ project.</p>
<p>If you're maintaining or developing a GNU package, whether newly
dubbed or of long standing, this short list of <a
@@ -296,7 +299,7 @@
<!-- Regarding copyright, in general, standalone pages (as opposed to
files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ be under CC BY-ND 4.0. Please do NOT change or remove this
without talking with the webmasters or licensing team first.
Please make sure the copyright date is consistent with the
document. For web pages, it is ok to list just the latest year the
@@ -314,14 +317,14 @@
<p>Copyright © 2015 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
<!--#include virtual="/server/bottom-notes.html" -->
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/03/13 23:26:59 $
+$Date: 2015/10/24 21:59:06 $
<!-- timestamp end -->
</p>
</div>
Index: software/po/software.it.po
===================================================================
RCS file: /web/www/www/software/po/software.it.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- software/po/software.it.po 24 Oct 2015 21:46:01 -0000 1.162
+++ software/po/software.it.po 24 Oct 2015 21:59:06 -0000 1.163
@@ -13,7 +13,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 17:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
# type: Content of: <title>
@@ -283,16 +282,7 @@
"aiutare nello sviluppo, potete dare uno sguardo alla pagina delle <a href=\"/"
"help/help.html\">richieste di aiuto</a>."
-# | If you're writing a new program and would like to make your software an
-# | official GNU package, see the <a href=\"/help/evaluation.html\">evaluation
-# | information and submission form</a>. {+Refer to the <a
-# | href=\"/software/repo-criteria.html\">ethical repository criteria</a> for
-# | guidance choosing a hosting service for your project.+}
-#. type: Content of: <p>
-#| msgid ""
-#| "If you're writing a new program and would like to make your software an "
-#| "official GNU package, see the <a href=\"/help/evaluation.html"
-#| "\">evaluation information and submission form</a>."
+#. type: Content of: <p>
msgid ""
"If you're writing a new program and would like to make your software an "
"official GNU package, see the <a href=\"/help/evaluation.html\">evaluation "
@@ -515,12 +505,7 @@
msgid "Copyright © 2015 Free Software Foundation, Inc."
msgstr "Copyright © 2015 Free Software Foundation, Inc."
-# || No change detected. The change might only be in amounts of spaces.
#. type: Content of: <div><p>
-#| msgid ""
-#| "This page is licensed under a <a rel=\"license\" href=\"http://"
-#| "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
-#| "NoDerivatives 4.0 International License</a>."
msgid ""
"This page is licensed under a <a rel=\"license\" href=\"http://"
"creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www home.it.html planetfeeds.it.html philosophy...,
GNUN <=