[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-microsoft.de.po malw...
From: |
GNUN |
Subject: |
www/proprietary/po malware-microsoft.de.po malw... |
Date: |
Thu, 18 May 2017 00:30:13 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/05/18 00:30:12
Modified files:
proprietary/po : malware-microsoft.de.po malware-microsoft.es.po
malware-microsoft.fr.po malware-microsoft.it.po
malware-microsoft.ja-diff.html
malware-microsoft.ja.po malware-microsoft.pot
malware-microsoft.ru.po
proprietary-insecurity.de.po
proprietary-insecurity.fr.po
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.119&r2=1.120
Patches:
Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- malware-microsoft.de.po 8 May 2017 03:04:34 -0000 1.93
+++ malware-microsoft.de.po 18 May 2017 04:30:12 -0000 1.94
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
"PO-Revision-Date: 2017-05-06 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -289,6 +290,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-"
"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
"allows an attacker to retrieve Microsoft account credentials, if the user is "
Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- malware-microsoft.es.po 8 May 2017 11:27:38 -0000 1.91
+++ malware-microsoft.es.po 18 May 2017 04:30:12 -0000 1.92
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2017-05-08 13:26+0200\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
"X-Generator: Poedit 1.6.10\n"
#. type: Content of: <title>
@@ -264,6 +265,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-"
"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
"allows an attacker to retrieve Microsoft account credentials, if the user is "
Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- malware-microsoft.fr.po 6 May 2017 21:12:19 -0000 1.104
+++ malware-microsoft.fr.po 18 May 2017 04:30:12 -0000 1.105
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
"PO-Revision-Date: 2017-05-06 22:25+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -263,6 +264,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-"
"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
"allows an attacker to retrieve Microsoft account credentials, if the user is "
Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- malware-microsoft.it.po 11 May 2017 21:29:25 -0000 1.106
+++ malware-microsoft.it.po 18 May 2017 04:30:12 -0000 1.107
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
"PO-Revision-Date: 2017-05-11 22:39+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -258,6 +259,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-"
"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
"allows an attacker to retrieve Microsoft account credentials, if the user is "
Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- malware-microsoft.ja-diff.html 6 May 2017 15:00:10 -0000 1.6
+++ malware-microsoft.ja-diff.html 18 May 2017 04:30:12 -0000 1.7
@@ -131,6 +131,15 @@
bugs.</p></em></ins></span>
<ul>
+
+<span class="inserted"><ins><em><li>
+ <p>Exploits of bugs in Windows, which were developed by the NSA
+ and then leaked by the Shadowbrokers group, are now being used to
+ <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
+ of Windows computers with ransomware</a>.
+ </p>
+</li></em></ins></span>
+
<li><p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and Edge</a>
allows an attacker to retrieve Microsoft account credentials, if
the user is tricked into visiting a malicious link.</p>
@@ -487,7 +496,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/06 15:00:10 $
+$Date: 2017/05/18 04:30:12 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- malware-microsoft.ja.po 6 May 2017 15:00:10 -0000 1.87
+++ malware-microsoft.ja.po 18 May 2017 04:30:12 -0000 1.88
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
"PO-Revision-Date: 2016-12-20 14:57+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -265,6 +265,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-"
"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
"allows an attacker to retrieve Microsoft account credentials, if the user is "
Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- malware-microsoft.pot 6 May 2017 15:00:10 -0000 1.52
+++ malware-microsoft.pot 18 May 2017 04:30:12 -0000 1.53
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -190,6 +190,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a "
+"href=\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/\">attack
"
+"a great number of Windows computers with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A <a "
"href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/\">flaw
"
"in Internet Explorer and Edge</a> allows an attacker to retrieve Microsoft "
Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- malware-microsoft.ru.po 10 May 2017 14:10:30 -0000 1.133
+++ malware-microsoft.ru.po 18 May 2017 04:30:12 -0000 1.134
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
"PO-Revision-Date: 2017-05-08 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -259,6 +260,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-"
"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
"allows an attacker to retrieve Microsoft account credentials, if the user is "
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary-insecurity.de.po 8 May 2017 03:04:35 -0000 1.76
+++ proprietary-insecurity.de.po 18 May 2017 04:30:12 -0000 1.77
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
"PO-Revision-Date: 2017-05-06 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -92,6 +93,15 @@
"beheben zu können</em>. Nutzer hilflos zu halten ist das verwerfliche an "
"proprietärer Software."
+#. type: Content of: <ul><li><p>
+msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
# Notizen:
#
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr
#
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary-insecurity.fr.po 6 May 2017 21:12:19 -0000 1.93
+++ proprietary-insecurity.fr.po 18 May 2017 04:30:12 -0000 1.94
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
"PO-Revision-Date: 2017-05-06 22:25+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -97,6 +98,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Intel's CPU backdoor—the Intel Management Engine—had a <a href="
"\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-"
"execution-bug-that-lurked-in-cpus-for-10-years/\">major security "
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary-insecurity.it.po 11 May 2017 21:29:25 -0000 1.100
+++ proprietary-insecurity.it.po 18 May 2017 04:30:12 -0000 1.101
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
"PO-Revision-Date: 2017-05-11 23:05+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -94,6 +95,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Intel's CPU backdoor—the Intel Management Engine—had a <a href="
"\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-"
"execution-bug-that-lurked-in-cpus-for-10-years/\">major security "
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-insecurity.ja-diff.html 6 May 2017 15:00:10 -0000 1.6
+++ proprietary-insecurity.ja-diff.html 18 May 2017 04:30:12 -0000 1.7
@@ -49,8 +49,17 @@
users helpless is what's culpable about proprietary
software.</p></em></ins></span>
<ul>
+
+<li>
+ <span class="inserted"><ins><em><p>Exploits of bugs in Windows, which
were developed by the NSA
+ and then leaked by the Shadowbrokers group, are now being used to
+ <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
+ of Windows computers with ransomware</a>.
+ </p>
+</li>
+
<li>
- <span class="inserted"><ins><em><p>Intel's CPU backdoor—the
Intel Management Engine—had a
+ <p>Intel's CPU backdoor—the Intel Management Engine—had a
<a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security
vulnerability for 10 years</a>.</p>
@@ -482,7 +491,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/06 15:00:10 $
+$Date: 2017/05/18 04:30:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary-insecurity.ja.po 6 May 2017 15:00:10 -0000 1.79
+++ proprietary-insecurity.ja.po 18 May 2017 04:30:12 -0000 1.80
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -94,6 +94,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Intel's CPU backdoor—the Intel Management Engine—had a <a href="
"\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-"
"execution-bug-that-lurked-in-cpus-for-10-years/\">major security "
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary-insecurity.pot 6 May 2017 15:00:10 -0000 1.49
+++ proprietary-insecurity.pot 18 May 2017 04:30:12 -0000 1.50
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -68,6 +68,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a "
+"href=\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/\">attack
"
+"a great number of Windows computers with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Intel's CPU backdoor—the Intel Management Engine—had a <a "
"href=\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/\">major
"
"security vulnerability for 10 years</a>."
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary-insecurity.ru.po 10 May 2017 14:30:06 -0000 1.119
+++ proprietary-insecurity.ru.po 18 May 2017 04:30:12 -0000 1.120
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-05-06 14:56+0000\n"
+"POT-Creation-Date: 2017-05-18 04:26+0000\n"
"PO-Revision-Date: 2017-05-01 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 04:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -95,6 +96,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Intel's CPU backdoor—the Intel Management Engine—had a <a href="
"\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-"
"execution-bug-that-lurked-in-cpus-for-10-years/\">major security "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary/po malware-microsoft.de.po malw...,
GNUN <=