www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-microsoft.de.html po/ma...


From: GNUN
Subject: www/proprietary malware-microsoft.de.html po/ma...
Date: Tue, 23 Aug 2016 01:28:04 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/08/23 01:28:04

Modified files:
        proprietary    : malware-microsoft.de.html 
Added files:
        proprietary/po : malware-microsoft.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.de.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&rev=1.1

Patches:
Index: malware-microsoft.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.de.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- malware-microsoft.de.html   20 Jun 2016 02:30:20 -0000      1.13
+++ malware-microsoft.de.html   23 Aug 2016 01:28:03 -0000      1.14
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-microsoft.de.po">
+ https://www.gnu.org/proprietary/po/malware-microsoft.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-microsoft.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-microsoft.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-06-24" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-microsoft.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -17,6 +22,7 @@
 </style>
 
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Microsofts Software ist Schadsoftware</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -440,7 +446,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Aktualisierung:
 
-$Date: 2016/06/20 02:30:20 $
+$Date: 2016/08/23 01:28:03 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-microsoft.de-diff.html
===================================================================
RCS file: po/malware-microsoft.de-diff.html
diff -N po/malware-microsoft.de-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-microsoft.de-diff.html   23 Aug 2016 01:28:04 -0000      1.1
@@ -0,0 +1,370 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-microsoft.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;title&gt;Microsoft's Software Is Malware
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-microsoft.translist" --&gt;
+&lt;style type="text/css" media="print,screen"&gt;
+&lt;!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+--&gt;
+&lt;/style&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+
+&lt;h2&gt;Microsoft's Software is Malware&lt;/h2&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary
+malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;div class="highlight-para"&gt;
+&lt;p&gt;
+&lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+This page explains how Microsoft software is malware.
+&lt;/p&gt;
+
+&lt;p&gt;
+Malware and nonfree software are two different issues.  The difference
+between &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt; and
+nonfree software is in
+&lt;a href="/philosophy/free-software-even-more-important.html"&gt;
+whether the users have control of the program or vice versa&lt;/a&gt;.  It's
+not directly a question of what the program &lt;em&gt;does&lt;/em&gt; when it
+runs.  However, in practice nonfree software is often malware,
+because the developer's awareness that the users would be powerless to fix
+any malicious functionalities tempts the developer to impose some.
+&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div class="toc"&gt;
+&lt;div class="malfunctions"&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;strong&gt;Type&nbsp;of malware&lt;/strong&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
+&lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
+<span class="removed"><del><strong>&lt;!--&lt;li&gt;&lt;a 
href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;--&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;li&gt;&lt;a 
href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+&lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
+    management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can do with the data in their computers.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+    that impose censorship on application programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    that reject any operating system not &ldquo;authorized&rdquo; by the
+    manufacturer.&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+
+&lt;h3 id="back-doors"&gt;Microsoft Back Doors&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
+  Microsoft has already backdoored its disk 
encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft Windows has a universal back door through which 
&lt;a 
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+  any change whatsoever can be imposed on the users&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;More information on when &lt;a 
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+  this was used&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;In Windows 10, the universal back door is no longer hidden; all 
&ldquo;upgrades&rdquo; will be
+  &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
 and immediately imposed&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+  Windows 8 also has a back door for remotely deleting 
apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;You might well decide to let a security service that you trust
+  remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
+  But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
+  should have the right to decide who (if anyone) to trust in this 
way.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Windows 8's back doors are so gaping that &lt;a 
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;
+  the German government has decided it can't be 
trusted&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 <span class="inserted"><ins><em>id="insecurity"&gt;Microsoft 
Insecurity&lt;/h3&gt;
+
+&lt;ul&gt;
+    &lt;li&gt;&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in Internet Explorer and Edge&lt;/a&gt;
+    allows an attacker to retrieve Microsoft account credentials, if
+    the user is tricked into visiting a malicious link.&lt;/p&gt;
+    &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3</em></ins></span> id="sabotage"&gt;Microsoft Sabotage&lt;/h3&gt;
+
+&lt;p&gt;The wrongs in this section are not precisely malware, since they do
+not involve making the program that runs in a way that hurts the user.
+But they are a lot like malware, since they are technical Microsoft
+actions that harm to the users of specific Microsoft software.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Once Microsoft has tricked a user into accepting 
installation
+   of Windows
+   10, &lt;a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
+   find that they are denied the option to cancel or even postpone the
+   imposed date of installation&lt;/a&gt;.
+   &lt;/p&gt;
+   &lt;p&gt;This demonstrates what we've said for years: using proprietary
+   software means letting someone have power over you, and you're
+   going to get screwed sooner or later.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft
+  has &lt;a 
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake"&gt;desupported
+  all future Intel CPUs for Windows 7 and 8&lt;/a&gt;. Those machines will
+  be stuck with the nastier Windows 10.
+  &lt;a 
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825"&gt;
+  AMD and Qualcomm CPUs, too&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;Of course, Windows 7 and 8 are unethical too, because they are
+  proprietary software.  But this example of Microsoft's wielding its
+  power demonstrates the power it holds.
+  &lt;/p&gt;
+  &lt;p&gt;Free software developers also stop maintaining old versions of
+  their programs, but this is not unfair to users because the
+  users of free software have control over it.  If it is important
+  enough to you, you and other users can hire someone to support
+  the old version on your future platforms.
+  &lt;/p&gt;&lt;/li&gt;
+
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Microsoft
+    is &lt;a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
+    forcibly
+    pushing&lt;/a&gt; &lt;a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;Windows
+    update to its version 10&lt;/a&gt;, ignoring the flag on Windows 7 or 8
+    that you could set to not upgrade.  This reaffirms the presence of
+    a &lt;a href="/proprietary/proprietary-back-doors.html"&gt;universal
+    back door in Windows&lt;/a&gt; 7 and 8.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Windows 10 &ldquo;upgrades&rdquo; &lt;a
+      
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"&gt;
+      delete applications&lt;/a&gt; without asking 
permission.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;&lt;p&gt;
+  Microsoft is &lt;a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
+  repeatedly nagging many users to install Windows 10&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/"&gt;
+  Microsoft informs the NSA of bugs in Windows before fixing 
them.&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"&gt;
+  Microsoft cut off security fixes for Windows XP, except to some big users
+  that pay exorbitantly.&lt;/a&gt;&lt;/p&gt;
+
+  &lt;p&gt;Microsoft is going to
+  &lt;a 
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/"&gt;
+  cut off support for some Internet Explorer versions&lt;/a&gt; in the same 
way.&lt;/p&gt;
+
+  &lt;p&gt;A person or company has the right to cease to work on a
+  particular program; the wrong here is Microsoft does this after having
+  made the users dependent on Microsoft, because they are not free to ask
+  anyone else to work on the program for them.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="interference"&gt;Microsoft Interference&lt;/h3&gt;
+
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+
+&lt;li&gt;&lt;p&gt;Microsoft <span class="inserted"><ins><em>has
+started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging
+users obnoxiously and repeatedly to install Windows 
10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft</em></ins></span>
+      &lt;a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
+        tricking
+        users&lt;/a&gt; &lt;a
+href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
+into replacing Windows 7 with Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft has made companies' Windows machines managed by 
the
+company's
+sysadmins &lt;a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
+users to complain to the sysadmins about not &ldquo;upgrading&rdquo; to Windows
+10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Microsoft Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;
+  &lt;a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"&gt;
+  Windows 10 comes with 13 screens of snooping options&lt;/a&gt;, all enabled 
by default,
+  and turning them off would be daunting to most users.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  Windows 10 &lt;a 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
+  ships with default settings that show no regard for the
+  privacy of its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo;
+  to snoop on the users' files, text input, voice input,
+  location info, contacts, calendar records and web browsing
+  history, as well as automatically connecting the machines to open
+  hotspots and showing targeted ads.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  &lt;a 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
+  Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if a 
user
+  turns off its Bing search and Cortana features, and activates the
+  privacy-protection settings.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose a
+  &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full disk
+  encryption &lt;a 
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
+  gives Microsoft a key&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Thus, Windows is overt malware in regard to surveillance,
+  as in other issues.&lt;/p&gt;
+
+  &lt;p&gt;We can suppose Microsoft look at users' files for the US government 
on
+  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
+  look at users' files for the Chinese government on demand?&lt;/p&gt;
+
+  &lt;p&gt;The unique &ldquo;advertising ID&rdquo; for each user enables other 
companies to
+  track the browsing of each specific user.&lt;/p&gt;
+
+  &lt;p&gt;It's as if Microsoft has deliberately chosen to make Windows 10
+  maximally evil on every dimension; to make a grab for total power
+  over anyone that doesn't drop Windows now.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html"&gt;
+  Windows 10 requires users to give permission for total snooping&lt;/a&gt;,
+  including their files, their commands, their text input, and their
+  voice input.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;Spyware in Windows: &lt;a
+href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
+  Windows Update snoops on the user.&lt;/a&gt;
+  &lt;a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175"&gt;
+  Windows 8.1 snoops on local searches.&lt;/a&gt; And there's a
+  &lt;a href="http://www.marketoracle.co.uk/Article40836.html"&gt;
+  secret NSA key in Windows&lt;/a&gt;, whose functions we don't 
know.&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  &lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+  Microsoft SkyDrive allows the NSA to directly examine users' 
data.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="drm"&gt;Microsoft DRM&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM (digital restrictions mechanisms) in Windows&lt;/a&gt;, introduced to
+  cater to &lt;a 
href="/proprietary/proprietary-drm.html#bluray"&gt;Bluray&lt;/a&gt; disks.
+  (The article also talks about how the same malware would later be introduced
+  in MacOS.)&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="jails"&gt;Microsoft Jails&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown"&gt;
+  Windows 8 on &ldquo;mobile devices&rdquo; is a jail&lt;/a&gt;: it censors the
+  user's choice of application programs.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="tyrants"&gt;Microsoft Tyrants&lt;/h3&gt;
+&lt;ul&gt;
+<span class="inserted"><ins><em>&lt;li&gt;
+&lt;p&gt;Microsoft accidentally left a way for users to install GNU/Linux
+on Windows RT tablets, but now it has &lt;a
+href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/"&gt;
+&ldquo;fixed&rdquo; the &ldquo;error&rdquo;&lt;/a&gt;. Those arrogant
+bastards call this &ldquo;protecting&rdquo; the users.  The article
+talks of installing &ldquo;Linux&rdquo;, but the context shows it is
+really &lt;a href="/gnu/linux-and-gnu.html"&gt;GNU/Linux&lt;/a&gt; that users
+install.
+&lt;/p&gt;
+&lt;/li&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;
+  Mobile devices that come with Windows 8 are tyrants&lt;/a&gt;: they block
+  users from installing other or modified operating 
systems.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;p&gt;As this page shows, if you do want to clean your computer of malware,
+the first software to delete is Windows.&lt;/p&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016 Free Software Foundation, 
Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2016/08/23 01:28:04 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]