www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/can-you-trust.fr.html philosophy...


From: GNUN
Subject: www philosophy/can-you-trust.fr.html philosophy...
Date: Fri, 28 Oct 2016 17:27:38 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/10/28 17:27:38

Modified files:
        philosophy     : can-you-trust.fr.html 
        philosophy/po  : can-you-trust.fr-en.html can-you-trust.fr.po 
        proprietary    : proprietary-insecurity.fr.html 
        proprietary/po : proprietary-insecurity.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/can-you-trust.fr.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.fr-en.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.fr.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.28&r2=1.29

Patches:
Index: philosophy/can-you-trust.fr.html
===================================================================
RCS file: /web/www/www/philosophy/can-you-trust.fr.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- philosophy/can-you-trust.fr.html    11 Dec 2015 11:27:32 -0000      1.80
+++ philosophy/can-you-trust.fr.html    28 Oct 2016 17:27:12 -0000      1.81
@@ -352,7 +352,7 @@
 href="/server/standards/README.translations.html">guide de traduction</a>.</p>
 </div>
 
-<p>Copyright &copy; 2002, 2007, 2014, 2015 Richard Stallman</p>
+<p>Copyright &copy; 2002, 2007, 2014, 2015, 2016 Richard Stallman</p>
   
 <p>Cette page peut être utilisée suivant les conditions de la licence <a
 rel="license"
@@ -370,7 +370,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/12/11 11:27:32 $
+$Date: 2016/10/28 17:27:12 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/can-you-trust.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/can-you-trust.fr-en.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- philosophy/po/can-you-trust.fr-en.html      11 Dec 2015 10:57:52 -0000      
1.40
+++ philosophy/po/can-you-trust.fr-en.html      28 Oct 2016 17:27:32 -0000      
1.41
@@ -217,7 +217,7 @@
 you trying to copy music.  &ldquo;Malicious code&rdquo; means code
 installed by you to do what someone else doesn't want your machine to
 do.  &ldquo;Spoofing&rdquo; doesn't mean someone's fooling you, it means
-your fooling Palladium.  And so on.</p></li>
+you're fooling Palladium.  And so on.</p></li>
 
 <li><p>
 A previous statement by the Palladium developers stated the basic
@@ -297,7 +297,7 @@
 information on coordinating and submitting translations of this article.</p>
 </div>
 
-<p>Copyright &copy; 2002, 2007, 2014, 2015 Richard Stallman</p>
+<p>Copyright &copy; 2002, 2007, 2014, 2015, 2016 Richard Stallman</p>
   
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -307,7 +307,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/12/11 10:57:52 $
+$Date: 2016/10/28 17:27:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/can-you-trust.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/can-you-trust.fr.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- philosophy/po/can-you-trust.fr.po   28 Oct 2016 17:15:29 -0000      1.61
+++ philosophy/po/can-you-trust.fr.po   28 Oct 2016 17:27:32 -0000      1.62
@@ -95,9 +95,9 @@
 "operation may require explicit permission."
 msgstr ""
 "Dans le passé, il s'agissait d'incidents isolés. « L'informatique de "
-"confiance » les rendrait dominants. « L'informatique déloyale » "
-"<em>[Treacherous Computing]</em> est un nom plus approprié, parce que le "
-"projet est conçu pour s'assurer que votre ordinateur vous désobéira "
+"confiance » les rendrait dominants. « L'informatique déloyale » <em>"
+"[Treacherous Computing]</em> est un nom plus approprié, parce que le projet "
+"est conçu pour s'assurer que votre ordinateur vous désobéira "
 "systématiquement. En fait, il est conçu pour que votre ordinateur ne puisse 
"
 "plus fonctionner comme ordinateur polyvalent. Chaque opération pourra exiger 
"
 "une permission explicite."

Index: proprietary/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/proprietary-insecurity.fr.html  7 Sep 2016 20:58:41 -0000       
1.31
+++ proprietary/proprietary-insecurity.fr.html  28 Oct 2016 17:27:35 -0000      
1.32
@@ -34,6 +34,13 @@
 
 <ul>
 <li>
+<p>Les réseaux 4G LTE sont extrêmement mal sécurisés. <a
+href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/";>Des
+tiers peuvent en prendre le contrôle et les utiliser pour des attaques de
+« l'homme du milieu »</a></p>
+</li>
+
+<li>
 <p>À cause d'un défaut de sécurité, <a
 
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844";>il
 est facile d'ouvrir les portes de 100 millions de voitures construites par
@@ -436,7 +443,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2016/09/07 20:58:41 $
+$Date: 2016/10/28 17:27:35 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-insecurity.fr-en.html    7 Sep 2016 20:58:41 
-0000       1.28
+++ proprietary/po/proprietary-insecurity.fr-en.html    28 Oct 2016 17:27:38 
-0000      1.29
@@ -28,6 +28,13 @@
 
 <ul>
 <li>
+<p>4G LTE phone networks are drastically insecure. They can be
+<a 
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/";>
+taken
+over by third parties and used for man-in-the-middle attacks</a>.</p>
+</li>
+
+<li>
 <p>Due to weak security, <a 
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844";>it
 is easy to open the doors of 100 million cars built by Volkswagen</a>.</p>
 </li>
@@ -380,7 +387,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/09/07 20:58:41 $
+$Date: 2016/10/28 17:27:38 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]