www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-microsoft.de.po malw...


From: GNUN
Subject: www/proprietary/po malware-microsoft.de.po malw...
Date: Thu, 18 May 2017 00:30:13 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/05/18 00:30:12

Modified files:
        proprietary/po : malware-microsoft.de.po malware-microsoft.es.po 
                         malware-microsoft.fr.po malware-microsoft.it.po 
                         malware-microsoft.ja-diff.html 
                         malware-microsoft.ja.po malware-microsoft.pot 
                         malware-microsoft.ru.po 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.119&r2=1.120

Patches:
Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- malware-microsoft.de.po     8 May 2017 03:04:34 -0000       1.93
+++ malware-microsoft.de.po     18 May 2017 04:30:12 -0000      1.94
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
 "PO-Revision-Date: 2017-05-06 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -289,6 +290,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://";
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
 "username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
 "allows an attacker to retrieve Microsoft account credentials, if the user is "

Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- malware-microsoft.es.po     8 May 2017 11:27:38 -0000       1.91
+++ malware-microsoft.es.po     18 May 2017 04:30:12 -0000      1.92
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2017-05-08 13:26+0200\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
 "X-Generator: Poedit 1.6.10\n"
 
 #. type: Content of: <title>
@@ -264,6 +265,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://";
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
 "username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
 "allows an attacker to retrieve Microsoft account credentials, if the user is "

Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- malware-microsoft.fr.po     6 May 2017 21:12:19 -0000       1.104
+++ malware-microsoft.fr.po     18 May 2017 04:30:12 -0000      1.105
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
 "PO-Revision-Date: 2017-05-06 22:25+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -263,6 +264,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://";
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
 "username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
 "allows an attacker to retrieve Microsoft account credentials, if the user is "

Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- malware-microsoft.it.po     11 May 2017 21:29:25 -0000      1.106
+++ malware-microsoft.it.po     18 May 2017 04:30:12 -0000      1.107
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
 "PO-Revision-Date: 2017-05-11 22:39+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -258,6 +259,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://";
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
 "username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
 "allows an attacker to retrieve Microsoft account credentials, if the user is "

Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- malware-microsoft.ja-diff.html      6 May 2017 15:00:10 -0000       1.6
+++ malware-microsoft.ja-diff.html      18 May 2017 04:30:12 -0000      1.7
@@ -131,6 +131,15 @@
   bugs.&lt;/p&gt;</em></ins></span>
 
 &lt;ul&gt;
+
+<span class="inserted"><ins><em>&lt;li&gt;
+  &lt;p&gt;Exploits of bugs in Windows, which were developed by the NSA
+       and then leaked by the Shadowbrokers group, are now being used to
+       &lt;a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack
 a great number
+       of Windows computers with ransomware&lt;/a&gt;.
+       &lt;/p&gt;
+&lt;/li&gt;</em></ins></span>
+
     &lt;li&gt;&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in Internet Explorer and Edge&lt;/a&gt;
     allows an attacker to retrieve Microsoft account credentials, if
     the user is tricked into visiting a malicious link.&lt;/p&gt;
@@ -487,7 +496,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/05/06 15:00:10 $
+$Date: 2017/05/18 04:30:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- malware-microsoft.ja.po     6 May 2017 15:00:10 -0000       1.87
+++ malware-microsoft.ja.po     18 May 2017 04:30:12 -0000      1.88
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
 "PO-Revision-Date: 2016-12-20 14:57+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -265,6 +265,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://";
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
 "username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
 "allows an attacker to retrieve Microsoft account credentials, if the user is "

Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- malware-microsoft.pot       6 May 2017 15:00:10 -0000       1.52
+++ malware-microsoft.pot       18 May 2017 04:30:12 -0000      1.53
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -190,6 +190,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a "
+"href=\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/\";>attack
 "
+"a great number of Windows computers with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A <a "
 
"href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/\";>flaw
 "
 "in Internet Explorer and Edge</a> allows an attacker to retrieve Microsoft "

Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- malware-microsoft.ru.po     10 May 2017 14:10:30 -0000      1.133
+++ malware-microsoft.ru.po     18 May 2017 04:30:12 -0000      1.134
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
 "PO-Revision-Date: 2017-05-08 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -259,6 +260,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://";
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
 "username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
 "allows an attacker to retrieve Microsoft account credentials, if the user is "

Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary-insecurity.de.po        8 May 2017 03:04:35 -0000       1.76
+++ proprietary-insecurity.de.po        18 May 2017 04:30:12 -0000      1.77
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
 "PO-Revision-Date: 2017-05-06 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -92,6 +93,15 @@
 "beheben zu können</em>. Nutzer hilflos zu halten ist das verwerfliche an "
 "proprietärer Software."
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://";
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
 # Notizen:
 # 
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr
 #

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary-insecurity.fr.po        6 May 2017 21:12:19 -0000       1.93
+++ proprietary-insecurity.fr.po        18 May 2017 04:30:12 -0000      1.94
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
 "PO-Revision-Date: 2017-05-06 22:25+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -97,6 +98,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://";
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Intel's CPU backdoor&mdash;the Intel Management Engine&mdash;had a <a href="
 "\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-";
 "execution-bug-that-lurked-in-cpus-for-10-years/\">major security "

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary-insecurity.it.po        11 May 2017 21:29:25 -0000      1.100
+++ proprietary-insecurity.it.po        18 May 2017 04:30:12 -0000      1.101
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
 "PO-Revision-Date: 2017-05-11 23:05+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -94,6 +95,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://";
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Intel's CPU backdoor&mdash;the Intel Management Engine&mdash;had a <a href="
 "\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-";
 "execution-bug-that-lurked-in-cpus-for-10-years/\">major security "

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-insecurity.ja-diff.html 6 May 2017 15:00:10 -0000       1.6
+++ proprietary-insecurity.ja-diff.html 18 May 2017 04:30:12 -0000      1.7
@@ -49,8 +49,17 @@
 users helpless is what's culpable about proprietary 
software.&lt;/p&gt;</em></ins></span>
 
 &lt;ul&gt;
+
+&lt;li&gt;
+  <span class="inserted"><ins><em>&lt;p&gt;Exploits of bugs in Windows, which 
were developed by the NSA
+       and then leaked by the Shadowbrokers group, are now being used to
+       &lt;a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack
 a great number
+       of Windows computers with ransomware&lt;/a&gt;.
+       &lt;/p&gt;
+&lt;/li&gt;
+
 &lt;li&gt;
-  <span class="inserted"><ins><em>&lt;p&gt;Intel's CPU backdoor&mdash;the 
Intel Management Engine&mdash;had a
+  &lt;p&gt;Intel's CPU backdoor&mdash;the Intel Management Engine&mdash;had a
        &lt;a 
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/"&gt;major
 security
        vulnerability for 10 years&lt;/a&gt;.&lt;/p&gt;
 
@@ -482,7 +491,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/05/06 15:00:10 $
+$Date: 2017/05/18 04:30:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary-insecurity.ja.po        6 May 2017 15:00:10 -0000       1.79
+++ proprietary-insecurity.ja.po        18 May 2017 04:30:12 -0000      1.80
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -94,6 +94,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://";
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Intel's CPU backdoor&mdash;the Intel Management Engine&mdash;had a <a href="
 "\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-";
 "execution-bug-that-lurked-in-cpus-for-10-years/\">major security "

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary-insecurity.pot  6 May 2017 15:00:10 -0000       1.49
+++ proprietary-insecurity.pot  18 May 2017 04:30:12 -0000      1.50
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -68,6 +68,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a "
+"href=\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/\";>attack
 "
+"a great number of Windows computers with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Intel's CPU backdoor&mdash;the Intel Management Engine&mdash;had a <a "
 
"href=\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/\";>major
 "
 "security vulnerability for 10 years</a>."

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary-insecurity.ru.po        10 May 2017 14:30:06 -0000      1.119
+++ proprietary-insecurity.ru.po        18 May 2017 04:30:12 -0000      1.120
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
 "PO-Revision-Date: 2017-05-01 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -95,6 +96,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://";
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Intel's CPU backdoor&mdash;the Intel Management Engine&mdash;had a <a href="
 "\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-";
 "execution-bug-that-lurked-in-cpus-for-10-years/\">major security "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]