www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy/po right-to-read.fr.po


From: Therese Godefroy
Subject: www/philosophy/po right-to-read.fr.po
Date: Thu, 30 Jun 2016 09:40:59 +0000 (UTC)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 16/06/30 09:40:59

Modified files:
        philosophy/po  : right-to-read.fr.po 

Log message:
        Update.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.fr.po?cvsroot=www&r1=1.97&r2=1.98

Patches:
Index: right-to-read.fr.po
===================================================================
RCS file: /webcvs/www/www/philosophy/po/right-to-read.fr.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- right-to-read.fr.po 30 Jun 2016 09:30:21 -0000      1.97
+++ right-to-read.fr.po 30 Jun 2016 09:40:59 -0000      1.98
@@ -10,14 +10,13 @@
 msgstr ""
 "Project-Id-Version: right-to-read.html\n"
 "POT-Creation-Date: 2016-06-30 09:25+0000\n"
-"PO-Revision-Date: 2016-06-26 21:36+0200\n"
+"PO-Revision-Date: 2016-06-30 11:39+0200\n"
 "Last-Translator: Sébastien Poher <sbphr @T volted.net>\n"
 "Language-Team: French <address@hidden>\n"
 "Language: fr\n"
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-06-30 09:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -37,19 +36,12 @@
 "a>"
 
 #. type: Content of: <p>
-# | <em>This article appeared in the February 1997 issue of
-# | [-<strong>Communications-] {+<cite>Communications+} of the
-# | [-ACM</strong>-] {+ACM</cite>+} (Volume 40, Number 2).</em>
-#, fuzzy
-#| msgid ""
-#| "<em>This article appeared in the February 1997 issue of "
-#| "<strong>Communications of the ACM</strong> (Volume 40, Number 2).</em>"
 msgid ""
-"<em>This article appeared in the February 1997 issue of <cite>Communications "
-"of the ACM</cite> (Volume 40, Number 2).</em>"
+"<em>This article appeared in the February 1997 issue of Communications of "
+"the ACM</cite> (Volume 40, Number 2).</em>"
 msgstr ""
-"<em>Cet article a été publié dans la parution de février 1997 de </"
-"em>Communications of the ACM<em> (volume 40, numéro 2).</em>"
+"<em>Cet article a été publié dans la parution de février 1997 de "
+"<cite>Communications of the ACM</cite> (volume 40, numéro 2).</em>"
 
 #. type: Content of: <blockquote><p>
 msgid ""
@@ -205,24 +197,6 @@
 "pour les exercices du cours."
 
 #. type: Content of: <p>
-# | It was also possible to bypass the copyright monitors by installing a
-# | modified system kernel.  Dan would eventually find out about the free
-# | kernels, even entire free operating systems, that had existed around the
-# | turn of the century.  But not only were they illegal, like
-# | debuggers&mdash;you could not install one if you had one, without knowing
-# | your computer's root password.  And neither the [-<abbr title=\"Federal
-# | Bureau of Investigation\">FBI</abbr>-] {+FBI+} nor Microsoft Support would
-# | tell you that.
-#, fuzzy
-#| msgid ""
-#| "It was also possible to bypass the copyright monitors by installing a "
-#| "modified system kernel.  Dan would eventually find out about the free "
-#| "kernels, even entire free operating systems, that had existed around the "
-#| "turn of the century.  But not only were they illegal, like "
-#| "debuggers&mdash;you could not install one if you had one, without knowing "
-#| "your computer's root password.  And neither the <abbr title=\"Federal "
-#| "Bureau of Investigation\">FBI</abbr> nor Microsoft Support would tell you "
-#| "that."
 msgid ""
 "It was also possible to bypass the copyright monitors by installing a "
 "modified system kernel.  Dan would eventually find out about the free "
@@ -238,8 +212,8 @@
 "avaient existé au tournant du siècle. Mais non seulement étaient-ils "
 "illégaux, comme les débogueurs, mais vous ne pouviez en installer un, si "
 "vous en aviez un, sans connaître le mot de passe administrateur de votre "
-"ordinateur. Or, ni le <abbr title=\"Federal Bureau of Investigation\">FBI</"
-"abbr> ni l'Aide technique Microsoft ne vous le révèlerait."
+"ordinateur. Or, ni le FBI ni l'Aide technique Microsoft ne vous le "
+"révèlerait."
 
 #. type: Content of: <p>
 msgid ""
@@ -473,15 +447,6 @@
 "de similaire à la DMCA en 2003."
 
 #. type: Content of: <div><ul><li><p>
-# | One of the ideas in the story was not proposed in reality until 2002. 
-# | This is the idea that the [-<abbr>FBI</abbr>-] {+FBI+} and Microsoft will
-# | keep the root passwords for your personal computers, and not let you have
-# | them.
-#, fuzzy
-#| msgid ""
-#| "One of the ideas in the story was not proposed in reality until 2002.  "
-#| "This is the idea that the <abbr>FBI</abbr> and Microsoft will keep the "
-#| "root passwords for your personal computers, and not let you have them."
 msgid ""
 "One of the ideas in the story was not proposed in reality until 2002.  This "
 "is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -492,26 +457,6 @@
 "(root) de vos ordinateurs et ne vous permettraient pas de les obtenir."
 
 #. type: Content of: <div><ul><li><p>
-# | The proponents of this scheme have given it names such as &ldquo;trusted
-# | computing&rdquo; and &ldquo;Palladium&rdquo;.  We call it <a
-# | href=\"/philosophy/can-you-trust.html\">&ldquo;treacherous
-# | computing&rdquo;</a> because the effect is to make your computer obey
-# | companies even to the extent of disobeying and defying you.  This was
-# | implemented in 2007 as part of <a href=\"http://badvista.org/\";>Windows
-# | Vista</a>; we expect Apple to do something similar.  In this scheme, it is
-# | the manufacturer that keeps the secret code, but the [-<abbr>FBI</abbr>-]
-# | {+FBI+} would have little trouble getting it.
-#, fuzzy
-#| msgid ""
-#| "The proponents of this scheme have given it names such as &ldquo;trusted "
-#| "computing&rdquo; and &ldquo;Palladium&rdquo;.  We call it <a href=\"/"
-#| "philosophy/can-you-trust.html\">&ldquo;treacherous computing&rdquo;</a> "
-#| "because the effect is to make your computer obey companies even to the "
-#| "extent of disobeying and defying you.  This was implemented in 2007 as "
-#| "part of <a href=\"http://badvista.org/\";>Windows Vista</a>; we expect "
-#| "Apple to do something similar.  In this scheme, it is the manufacturer "
-#| "that keeps the secret code, but the <abbr>FBI</abbr> would have little "
-#| "trouble getting it."
 msgid ""
 "The proponents of this scheme have given it names such as &ldquo;trusted "
 "computing&rdquo; and &ldquo;Palladium&rdquo;.  We call it <a href=\"/"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]