[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www philosophy/can-you-trust.fr.html philosophy...
From: |
GNUN |
Subject: |
www philosophy/can-you-trust.fr.html philosophy... |
Date: |
Fri, 28 Oct 2016 17:27:38 +0000 (UTC) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 16/10/28 17:27:38
Modified files:
philosophy : can-you-trust.fr.html
philosophy/po : can-you-trust.fr-en.html can-you-trust.fr.po
proprietary : proprietary-insecurity.fr.html
proprietary/po : proprietary-insecurity.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/can-you-trust.fr.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.fr-en.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.fr.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.28&r2=1.29
Patches:
Index: philosophy/can-you-trust.fr.html
===================================================================
RCS file: /web/www/www/philosophy/can-you-trust.fr.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- philosophy/can-you-trust.fr.html 11 Dec 2015 11:27:32 -0000 1.80
+++ philosophy/can-you-trust.fr.html 28 Oct 2016 17:27:12 -0000 1.81
@@ -352,7 +352,7 @@
href="/server/standards/README.translations.html">guide de traduction</a>.</p>
</div>
-<p>Copyright © 2002, 2007, 2014, 2015 Richard Stallman</p>
+<p>Copyright © 2002, 2007, 2014, 2015, 2016 Richard Stallman</p>
<p>Cette page peut être utilisée suivant les conditions de la licence <a
rel="license"
@@ -370,7 +370,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2015/12/11 11:27:32 $
+$Date: 2016/10/28 17:27:12 $
<!-- timestamp end -->
</p>
Index: philosophy/po/can-you-trust.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/can-you-trust.fr-en.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- philosophy/po/can-you-trust.fr-en.html 11 Dec 2015 10:57:52 -0000
1.40
+++ philosophy/po/can-you-trust.fr-en.html 28 Oct 2016 17:27:32 -0000
1.41
@@ -217,7 +217,7 @@
you trying to copy music. “Malicious code” means code
installed by you to do what someone else doesn't want your machine to
do. “Spoofing” doesn't mean someone's fooling you, it means
-your fooling Palladium. And so on.</p></li>
+you're fooling Palladium. And so on.</p></li>
<li><p>
A previous statement by the Palladium developers stated the basic
@@ -297,7 +297,7 @@
information on coordinating and submitting translations of this article.</p>
</div>
-<p>Copyright © 2002, 2007, 2014, 2015 Richard Stallman</p>
+<p>Copyright © 2002, 2007, 2014, 2015, 2016 Richard Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -307,7 +307,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/12/11 10:57:52 $
+$Date: 2016/10/28 17:27:32 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/can-you-trust.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/can-you-trust.fr.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- philosophy/po/can-you-trust.fr.po 28 Oct 2016 17:15:29 -0000 1.61
+++ philosophy/po/can-you-trust.fr.po 28 Oct 2016 17:27:32 -0000 1.62
@@ -95,9 +95,9 @@
"operation may require explicit permission."
msgstr ""
"Dans le passé, il s'agissait d'incidents isolés. « L'informatique de "
-"confiance » les rendrait dominants. « L'informatique déloyale » "
-"<em>[Treacherous Computing]</em> est un nom plus approprié, parce que le "
-"projet est conçu pour s'assurer que votre ordinateur vous désobéira "
+"confiance » les rendrait dominants. « L'informatique déloyale » <em>"
+"[Treacherous Computing]</em> est un nom plus approprié, parce que le projet "
+"est conçu pour s'assurer que votre ordinateur vous désobéira "
"systématiquement. En fait, il est conçu pour que votre ordinateur ne puisse
"
"plus fonctionner comme ordinateur polyvalent. Chaque opération pourra exiger
"
"une permission explicite."
Index: proprietary/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/proprietary-insecurity.fr.html 7 Sep 2016 20:58:41 -0000
1.31
+++ proprietary/proprietary-insecurity.fr.html 28 Oct 2016 17:27:35 -0000
1.32
@@ -34,6 +34,13 @@
<ul>
<li>
+<p>Les réseaux 4G LTE sont extrêmement mal sécurisés. <a
+href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">Des
+tiers peuvent en prendre le contrôle et les utiliser pour des attaques de
+« l'homme du milieu »</a></p>
+</li>
+
+<li>
<p>à cause d'un défaut de sécurité, <a
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">il
est facile d'ouvrir les portes de 100 millions de voitures construites par
@@ -436,7 +443,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2016/09/07 20:58:41 $
+$Date: 2016/10/28 17:27:35 $
<!-- timestamp end -->
</p>
Index: proprietary/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-insecurity.fr-en.html 7 Sep 2016 20:58:41
-0000 1.28
+++ proprietary/po/proprietary-insecurity.fr-en.html 28 Oct 2016 17:27:38
-0000 1.29
@@ -28,6 +28,13 @@
<ul>
<li>
+<p>4G LTE phone networks are drastically insecure. They can be
+<a
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
+taken
+over by third parties and used for man-in-the-middle attacks</a>.</p>
+</li>
+
+<li>
<p>Due to weak security, <a
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
is easy to open the doors of 100 million cars built by Volkswagen</a>.</p>
</li>
@@ -380,7 +387,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/09/07 20:58:41 $
+$Date: 2016/10/28 17:27:38 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www philosophy/can-you-trust.fr.html philosophy...,
GNUN <=