[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www home.it.html distros/po/common-distros.it-e...
From: |
GNUN |
Subject: |
www home.it.html distros/po/common-distros.it-e... |
Date: |
Fri, 2 Jun 2017 11:29:10 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/06/02 11:29:09
Modified files:
. : home.it.html
distros/po : common-distros.it-en.html common-distros.it.po
licenses/old-licenses: gpl-2.0-faq.it.html
licenses/old-licenses/po: gpl-2.0-faq.it-en.html
gpl-2.0-faq.it.po
po : home.it-en.html home.it.po
proprietary : malware-microsoft.it.html
malware-mobiles.it.html proprietary-drm.it.html
proprietary-insecurity.it.html
proprietary-surveillance.it.html
proprietary/po : malware-microsoft.it-en.html
malware-microsoft.it.po
malware-mobiles.it-en.html
malware-mobiles.it.po
proprietary-drm.it-en.html
proprietary-drm.it.po
proprietary-insecurity.it-en.html
proprietary-insecurity.it.po
proprietary-surveillance.it-en.html
proprietary-surveillance.it.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/home.it.html?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/common-distros.it-en.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/common-distros.it.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/old-licenses/gpl-2.0-faq.it.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/old-licenses/po/gpl-2.0-faq.it-en.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/old-licenses/po/gpl-2.0-faq.it.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.it-en.html?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.it.po?cvsroot=www&r1=1.610&r2=1.611
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.it.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.it.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.it.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.it.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-en.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-en.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.174&r2=1.175
Patches:
Index: home.it.html
===================================================================
RCS file: /web/www/www/home.it.html,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- home.it.html 27 May 2017 11:58:57 -0000 1.320
+++ home.it.html 2 Jun 2017 15:29:07 -0000 1.321
@@ -331,9 +331,9 @@
<!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.it.html" -->
-<p id="sisters">The <a href="http://www.fsf.org/">FSF</a> also has sister
organizations in
-<a href="http://www.fsfe.org">Europe</a>, <a
-href="http://www.fsfla.org/">Latin America</a> and <a
+<p id="sisters">La <a href="http://www.fsf.org/">FSF</a> ha organizzazioni
omologhe in <a
+href="http://www.fsfe.org">Europa</a>, <a
+href="http://www.fsfla.org/">America Latina</a> e <a
href="http://gnu.org.in/">India</a>.</p>
<!--#include virtual="/server/fs-gang.it.html" -->
@@ -407,7 +407,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultima modifica:
-$Date: 2017/05/27 11:58:57 $
+$Date: 2017/06/02 15:29:07 $
<!-- timestamp end -->
</p>
Index: distros/po/common-distros.it-en.html
===================================================================
RCS file: /web/www/www/distros/po/common-distros.it-en.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- distros/po/common-distros.it-en.html 29 Apr 2017 11:32:41 -0000
1.44
+++ distros/po/common-distros.it-en.html 2 Jun 2017 15:29:07 -0000
1.45
@@ -101,7 +101,7 @@
the problem partly remains: the installer in some cases recommends
these nonfree firmware files for the peripherals on the machine.</p>
-<p>Debian's wiki includes pages about installng nonfree firmware.</p>
+<p>Debian's wiki includes pages about installing nonfree firmware.</p>
<!-- https://wiki.debian.org/ATIProprietary -->
<h3 id="Fedora">Fedora</h3>
@@ -319,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/04/29 11:32:41 $
+$Date: 2017/06/02 15:29:07 $
<!-- timestamp end -->
</p>
</div>
Index: distros/po/common-distros.it.po
===================================================================
RCS file: /web/www/www/distros/po/common-distros.it.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- distros/po/common-distros.it.po 2 Jun 2017 15:16:17 -0000 1.118
+++ distros/po/common-distros.it.po 2 Jun 2017 15:29:07 -0000 1.119
@@ -14,7 +14,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-20 15:55+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -227,9 +226,7 @@
"problema in parte rimane irrisolto: la procedura di installazione in alcuni "
"casi consiglia questi firmware non liberi per le periferiche sulla macchina."
-# | Debian's wiki includes pages about install{+i+}ng nonfree firmware.
#. type: Content of: <p>
-#| msgid "Debian's wiki includes pages about installng nonfree firmware."
msgid "Debian's wiki includes pages about installing nonfree firmware."
msgstr ""
"Il wiki di Debian contiene istruzioni su come installare software non libero."
Index: licenses/old-licenses/gpl-2.0-faq.it.html
===================================================================
RCS file: /web/www/www/licenses/old-licenses/gpl-2.0-faq.it.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- licenses/old-licenses/gpl-2.0-faq.it.html 26 Mar 2017 19:00:32 -0000
1.25
+++ licenses/old-licenses/gpl-2.0-faq.it.html 2 Jun 2017 15:29:08 -0000
1.26
@@ -28,7 +28,8 @@
</p>
<!-- Replace this list with the page's contents. -->
-<h4>Indice</h4>
+<h3 style="clear: both; padding: .3em 0; border-bottom: 1px solid #999">
+Indice</h3>
<h4>Domande di base sulla GPL, il progetto GNU e la Free Software
Foundation</h4>
@@ -418,7 +419,7 @@
programma più grande, questa licenza è compatibile con la GPL? Posso
combinare o linkare Q con un programma coperto da GPL?</a></li>
- <li><a href="#OOPLang" name="TOCOOPLANG"> In un linguaggio orientato
agli
+ <li><a href="#OOPLang" name="TOCOOPLang"> In un linguaggio orientato
agli
oggetti come Java, se utilizzo una classe coperta dalla GPL senza
modificarla, e ne creo una sottoclasse, in che modo il programma
risultante è affetto dalla GPL?</a></li>
@@ -2355,8 +2356,8 @@
accorgete di una violazione della GPL, dovreste informarne gli
sviluppatori del software coinvolto, i quali sono o possono facilmente
raggiungere i detentori dei diritti d'autore. <a
-href="http://www.fsf.org/licenses/gpl-faq.html#ReportingViolation">Altre
-informazioni su come trattare le violazioni della GPL</a>.
+href="#ReportingViolation">Altre informazioni su come trattare le violazioni
+della GPL</a>.
</dd>
@@ -2379,8 +2380,8 @@
In generale, la risposta è no--non è un obbligo legale. Per essere più
specifici, la risposta dipende da quali librerie intendete usare e quali
sono le rispettive licenze. La maggior parte delle librerie di sistema
-sono coperte o dalla <a href= "/copyleft/lesser.html">GNU Lesser GPL</a>,
-o dalla GPL con un'esplicita eccezione che permette di collegare la
+sono coperte o dalla <a href="/licenses/lgpl.html">GNU Lesser GPL</a>, o
+dalla GPL con un'esplicita eccezione che permette di collegare la
libreria ad altri software qualsiasi sia la licenza con cui vengono
rilasciati. Queste librerie possono essere usate in programmi non liberi;
ma nel caso della Lesser GPL, vi sono alcuni doveri che dovete
@@ -2561,7 +2562,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2017/03/26 19:00:32 $
+$Date: 2017/06/02 15:29:08 $
<!-- timestamp end -->
</p>
Index: licenses/old-licenses/po/gpl-2.0-faq.it-en.html
===================================================================
RCS file: /web/www/www/licenses/old-licenses/po/gpl-2.0-faq.it-en.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- licenses/old-licenses/po/gpl-2.0-faq.it-en.html 26 Mar 2017 19:00:32
-0000 1.20
+++ licenses/old-licenses/po/gpl-2.0-faq.it-en.html 2 Jun 2017 15:29:08
-0000 1.21
@@ -20,7 +20,8 @@
</p>
<!-- Replace this list with the page's contents. -->
-<h4>Table of Contents</h4>
+<h3 style="clear: both; padding: .3em 0; border-bottom: 1px solid #999">
+Table of Contents</h3>
<h4>Basic questions about the GPL, the GNU Project, and the Free
Software Foundation</h4>
@@ -416,7 +417,7 @@
GPL-compatible? Can I combine or link Q with a GPL-covered
program?</a></li>
- <li><a href="#OOPLang" name="TOCOOPLANG"> In an object-oriented
+ <li><a href="#OOPLang" name="TOCOOPLang"> In an object-oriented
language such as Java, if I use a class that is GPL'ed without
modifying, and subclass it, in what way does the GPL affect the larger
program?</a></li>
@@ -2305,8 +2306,7 @@
see a violation of the GPL, you should inform the developers of the
GPL-covered software involved. They either are the copyright holders,
or are connected with the copyright holders. <a
-href="http://www.fsf.org/licenses/gpl-faq.html#ReportingViolation">Learn
-more about reporting GPL violations.</a>
+href="#ReportingViolation">Learn more about reporting GPL violations.</a>
</dd>
@@ -2329,7 +2329,7 @@
In general, the answer is no—this is not a legal requirement.
In specific, the answer depends on which libraries you want to use and
what their licenses are. Most system libraries either use
-the <a href="/copyleft/lesser.html">GNU Lesser GPL</a>, or use the GNU
+the <a href="/licenses/lgpl.html">GNU Lesser GPL</a>, or use the GNU
GPL plus an exception permitting linking the library with anything.
These libraries can be used in nonfree programs; but in the case of
the Lesser GPL, it does have some requirements you must follow.
@@ -2482,7 +2482,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/03/26 19:00:32 $
+$Date: 2017/06/02 15:29:08 $
<!-- timestamp end -->
</p>
</div>
Index: licenses/old-licenses/po/gpl-2.0-faq.it.po
===================================================================
RCS file: /web/www/www/licenses/old-licenses/po/gpl-2.0-faq.it.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- licenses/old-licenses/po/gpl-2.0-faq.it.po 2 Jun 2017 15:16:17 -0000
1.42
+++ licenses/old-licenses/po/gpl-2.0-faq.it.po 2 Jun 2017 15:29:08 -0000
1.43
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-17 08:56+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -959,15 +958,7 @@
"incluso in un programma più grande, questa licenza è compatibile con la
GPL? "
"Posso combinare o linkare Q con un programma coperto da GPL?</a>"
-# | <a href=\"#OOPLang\" [-name=\"TOCOOPLANG\">-] {+name=\"TOCOOPLang\">+} In
-# | an object-oriented language such as Java, if I use a class that is GPL'ed
-# | without modifying, and subclass it, in what way does the GPL affect the
-# | larger program?</a>
-#. type: Content of: <ul><li>
-#| msgid ""
-#| "<a href=\"#OOPLang\" name=\"TOCOOPLANG\"> In an object-oriented language "
-#| "such as Java, if I use a class that is GPL'ed without modifying, and "
-#| "subclass it, in what way does the GPL affect the larger program?</a>"
+#. type: Content of: <ul><li>
msgid ""
"<a href=\"#OOPLang\" name=\"TOCOOPLang\"> In an object-oriented language "
"such as Java, if I use a class that is GPL'ed without modifying, and "
@@ -4907,23 +4898,7 @@
"<b><a href=\"#TOCWhoHasThePower\" name=\"WhoHasThePower\">Chi ha il potere "
"di far valere la GPL?</a></b>"
-# | Since the GPL is a copyright license, the copyright holders of the
-# | software are the ones who have the power to enforce the GPL. If you see a
-# | violation of the GPL, you should inform the developers of the GPL-covered
-# | software involved. They either are the copyright holders, or are
-# | connected with the copyright holders. <a
-# |
[-href=\"http://www.fsf.org/licenses/gpl-faq.html#ReportingViolation\">Learn-]
-# | {+href=\"#ReportingViolation\">Learn+} more about reporting GPL
-# | violations.</a>
-#. type: Content of: <dl><dd>
-#| msgid ""
-#| "Since the GPL is a copyright license, the copyright holders of the "
-#| "software are the ones who have the power to enforce the GPL. If you see "
-#| "a violation of the GPL, you should inform the developers of the GPL-"
-#| "covered software involved. They either are the copyright holders, or are "
-#| "connected with the copyright holders. <a href=\"http://www.fsf.org/"
-#| "licenses/gpl-faq.html#ReportingViolation\">Learn more about reporting GPL "
-#| "violations.</a>"
+#. type: Content of: <dl><dd>
msgid ""
"Since the GPL is a copyright license, the copyright holders of the software "
"are the ones who have the power to enforce the GPL. If you see a violation "
@@ -4970,23 +4945,7 @@
"programma su GNU/Linux, devo rilasciarlo come software libero coperto dalla "
"GPL o da qualche altra licenza libera?</a></b>"
-# | In general, the answer is no—this is not a legal requirement. In
-# | specific, the answer depends on which libraries you want to use and what
-# | their licenses are. Most system libraries either use the <a
-# | [-href=\"/copyleft/lesser.html\">GNU-]
-# | {+href=\"/licenses/lgpl.html\">GNU+} Lesser GPL</a>, or use the GNU GPL
-# | plus an exception permitting linking the library with anything. These
-# | libraries can be used in nonfree programs; but in the case of the Lesser
-# | GPL, it does have some requirements you must follow.
-#. type: Content of: <dl><dd>
-#| msgid ""
-#| "In general, the answer is no—this is not a legal requirement. In "
-#| "specific, the answer depends on which libraries you want to use and what "
-#| "their licenses are. Most system libraries either use the <a href=\"/"
-#| "copyleft/lesser.html\">GNU Lesser GPL</a>, or use the GNU GPL plus an "
-#| "exception permitting linking the library with anything. These libraries "
-#| "can be used in nonfree programs; but in the case of the Lesser GPL, it "
-#| "does have some requirements you must follow."
+#. type: Content of: <dl><dd>
msgid ""
"In general, the answer is no—this is not a legal requirement. In "
"specific, the answer depends on which libraries you want to use and what "
Index: po/home.it-en.html
===================================================================
RCS file: /web/www/www/po/home.it-en.html,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- po/home.it-en.html 29 Apr 2017 11:32:42 -0000 1.135
+++ po/home.it-en.html 2 Jun 2017 15:29:08 -0000 1.136
@@ -323,7 +323,7 @@
<p id="sisters">The <a href="http://www.fsf.org/">FSF</a> also has sister
organizations in <a href="http://www.fsfe.org">Europe</a>, <a
href="http://www.fsfla.org/">Latin America</a> and <a
-href="http://fsf.org.in/">India</a>.</p>
+href="http://gnu.org.in/">India</a>.</p>
<!--#include virtual="/server/fs-gang.html" -->
@@ -384,7 +384,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/04/29 11:32:42 $
+$Date: 2017/06/02 15:29:08 $
<!-- timestamp end -->
</p>
</div>
Index: po/home.it.po
===================================================================
RCS file: /web/www/www/po/home.it.po,v
retrieving revision 1.610
retrieving revision 1.611
diff -u -b -r1.610 -r1.611
--- po/home.it.po 2 Jun 2017 15:16:17 -0000 1.610
+++ po/home.it.po 2 Jun 2017 15:29:08 -0000 1.611
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-27 11:55+0000\n"
"X-Generator: Poedit 1.5.4\n"
# type: Content of: <title>
@@ -457,16 +456,7 @@
msgstr " "
# type: Content of: <table><tr><td><p>
-# | The <a href=\"http://www.fsf.org/\">FSF</a> also has sister organizations
-# | in <a href=\"http://www.fsfe.org\">Europe</a>, <a
-# | href=\"http://www.fsfla.org/\">Latin America</a> and <a
-# | [-href=\"http://fsf.org.in/\">India</a>.-]
-# | {+href=\"http://gnu.org.in/\">India</a>.+}
#. type: Content of: <p>
-#| msgid ""
-#| "The <a href=\"http://www.fsf.org/\">FSF</a> also has sister organizations "
-#| "in <a href=\"http://www.fsfe.org\">Europe</a>, <a href=\"http://www.fsfla."
-#| "org/\">Latin America</a> and <a href=\"http://fsf.org.in/\">India</a>."
msgid ""
"The <a href=\"http://www.fsf.org/\">FSF</a> also has sister organizations in "
"<a href=\"http://www.fsfe.org\">Europe</a>, <a href=\"http://www.fsfla.org/"
Index: proprietary/malware-microsoft.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.it.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/malware-microsoft.it.html 11 May 2017 21:29:25 -0000
1.23
+++ proprietary/malware-microsoft.it.html 2 Jun 2017 15:29:08 -0000
1.24
@@ -118,6 +118,15 @@
software proprietario di prestigio è immune da difetti.</p>
<ul>
+
+<li>
+ <p>Attacchi che sfruttano difetti di Windows, sviluppati originariamente
dalla
+NSA e poi trafugati dal gruppo Shadowbrokers, vengono ora usati per <a
+href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">colpire
+molti computer Windows</a> e richiedere un riscatto.
+ </p>
+</li>
+
<li><p>Un <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">bug
di Internet Explorer ed Edge</a> permette a un malintenzionato di ottenere
@@ -505,7 +514,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/06/02 15:29:08 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-mobiles.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.it.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/malware-mobiles.it.html 11 May 2017 21:29:25 -0000 1.15
+++ proprietary/malware-mobiles.it.html 2 Jun 2017 15:29:08 -0000 1.16
@@ -62,12 +62,14 @@
<h3 id="back-doors">Backdoor in dispositivi mobili</h3>
<ul>
- <li><p>La backdoor universale nei telefoni cellulari è effettivamente <a
+ <li id="back-door-microphone">
+ <p>La backdoor universale nei telefoni cellulari è effettivamente <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/">
usata per ascoltare attraverso i loro microfoni</a>.</p>
</li>
- <li><p>La maggior parte dei cellulari hanno una backdoor universale, che è
stata
+ <li id="back-door-malicious">
+ <p>La maggior parte dei cellulari hanno una backdoor universale, che è
stata
usata per <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">renderli
malevoli</a>.</p>
@@ -158,6 +160,21 @@
<ul>
<li>
+ <p><a
+href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">Uno
+studio del 2015</a> ha trovato che il 90% delle più diffuse applicazioni
+Android proprietarie gratuite contenevano librerie per il tracciamento degli
+utenti, mentre nel caso delle applicazioni a pagamento la percentuale
+scendeva al 60%.</p>
+
+ <p>L'articolo fa confusione dato che usa “free” (NdT: libero, ma
+anche gratuito) per applicazioni che non sono in realtà <a
+href="/philosophy/free-sw.html">software libero</a>. Usa anche la brutta
+parola “monetizzare”. Meglio dire “sfruttare” in
+questo e altri contesti.</p>
+</li>
+
+<li>
<p>Uno studio ha trovato 234 applicazioni Android che tracciano gli utenti <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">ascoltando
ultrasuoni emessi da apparati installati nei negozi o da programmi
@@ -320,6 +337,20 @@
<h3 id="drm">DRM in dispositivi mobili</h3>
<ul>
+
+<li>
+<p>Google ora permette alle applicazioni Android di sapere se un dispositivo è
+controllato dall'utente come root, <a
+href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">e
+di rifiutare di installarsi in tal caso</a>.</p>
+
+<p>Aggiornamento: Google ha <i>intenzionalmente</i> modificato Android in modo
+che le applicazioni possano <a
+href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/">capire
+se l'utente ha ottenuto privilegi di root e in quel caso rifiutarsi di
+essere eseguite</a>.</p>
+</li>
+
<li>
<p>L'iPhone 7 contiene DRM progettati per <a
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">
@@ -432,7 +463,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/06/02 15:29:08 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-drm.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.it.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/proprietary-drm.it.html 2 Apr 2017 10:30:43 -0000 1.10
+++ proprietary/proprietary-drm.it.html 2 Jun 2017 15:29:08 -0000 1.11
@@ -37,6 +37,23 @@
</p>
<ul>
+
+<li>
+<p>Google ora permette alle applicazioni Android di sapere se un dispositivo è
+controllato dall'utente come root, <a
+href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">e
+di rifiutare di installarsi in tal caso</a>. L'applicazione di Netflix usa
+questa possibilità per imporre l'uso dei DRM.</p>
+
+<p>Aggiornamento: Google ha <i>intenzionalmente</i> modificato Android in modo
+che le applicazioni possano <a
+href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/">capire
+se l'utente ha ottenuto privilegi di root e in quel caso rifiutarsi di
+essere eseguite</a>. L'applicazione di Netflix è malware proprietario e non
+la si deve usare in ogni caso, ma questo non significa che il danno
+provocato da Google sia attenuato.</p>
+</li>
+
<li><p>I file DRM di Windows <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">possono
essere usati per identificare chi naviga con Tor</a>. La vulnerabilità si
@@ -265,7 +282,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2017/04/02 10:30:43 $
+$Date: 2017/06/02 15:29:08 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.it.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/proprietary-insecurity.it.html 11 May 2017 21:29:25 -0000
1.22
+++ proprietary/proprietary-insecurity.it.html 2 Jun 2017 15:29:08 -0000
1.23
@@ -41,6 +41,15 @@
cui sono ridotti gli utenti è la colpa del software proprietario.</p>
<ul>
+
+<li>
+ <p>Attacchi che sfruttano difetti di Windows, sviluppati originariamente
dalla
+NSA e poi trafugati dal gruppo Shadowbrokers, vengono ora usati per <a
+href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">colpire
+molti computer Windows</a> e richiedere un riscatto.
+ </p>
+</li>
+
<li>
<p>La backdoor delle CPU Intel, nota come —the Intel Management
Engine—, ha avuto una <a
@@ -517,7 +526,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/06/02 15:29:08 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/proprietary-surveillance.it.html 23 May 2017 17:59:40
-0000 1.35
+++ proprietary/proprietary-surveillance.it.html 2 Jun 2017 15:29:08
-0000 1.36
@@ -341,6 +341,30 @@
<ul>
<li>
+ <p><a
+href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">Uno
+studio del 2015</a> ha trovato che il 90% delle più diffuse applicazioni
+Android proprietarie gratuite contenevano librerie per il tracciamento degli
+utenti, mentre nel caso delle applicazioni a pagamento la percentuale
+scendeva al 60%.</p>
+
+ <p>L'articolo fa confusione dato che usa “free” (NdT: libero, ma
+anche gratuito) per applicazioni che non sono in realtà <a
+href="/philosophy/free-sw.html">software libero</a>. Usa anche la brutta
+parola “monetizzare”. Meglio dire “sfruttare” in
+questo e altri contesti.</p>
+</li>
+
+<li>
+ <p>Le applicazioni per BART <a
+href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">spiano
+gli utenti</a>.</p>
+ <p>Se si usassero applicazioni libere, gli utenti potrebbero <em>controllare
+con certezza</em> di non essere spiati.</p>
+ <p>Con applicazioni proprietarie, si può solo sperare.</p>
+</li>
+
+<li>
<p>Uno studio ha trovato 234 applicazioni Android che tracciano gli utenti <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">ascoltando
ultrasuoni emessi da apparati installati nei negozi o da programmi
@@ -1401,7 +1425,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2017/05/23 17:59:40 $
+$Date: 2017/06/02 15:29:08 $
<!-- timestamp end -->
</p>
Index: proprietary/po/malware-microsoft.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/malware-microsoft.it-en.html 11 May 2017 21:29:25 -0000
1.23
+++ proprietary/po/malware-microsoft.it-en.html 2 Jun 2017 15:29:09 -0000
1.24
@@ -105,6 +105,15 @@
bugs.</p>
<ul>
+
+<li>
+ <p>Exploits of bugs in Windows, which were developed by the NSA
+ and then leaked by the Shadowbrokers group, are now being used to
+ <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
+ of Windows computers with ransomware</a>.
+ </p>
+</li>
+
<li><p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and Edge</a>
allows an attacker to retrieve Microsoft account credentials, if
the user is tricked into visiting a malicious link.</p>
@@ -460,7 +469,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/06/02 15:29:09 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary/po/malware-microsoft.it.po 2 Jun 2017 15:16:18 -0000
1.108
+++ proprietary/po/malware-microsoft.it.po 2 Jun 2017 15:29:09 -0000
1.109
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-18 04:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/malware-mobiles.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/malware-mobiles.it-en.html 11 May 2017 21:29:25 -0000
1.12
+++ proprietary/po/malware-mobiles.it-en.html 2 Jun 2017 15:29:09 -0000
1.13
@@ -54,12 +54,14 @@
<h3 id="back-doors">Mobile Back Doors</h3>
<ul>
- <li><p>The universal back door in portable phones <a
+ <li id="back-door-microphone">
+ <p>The universal back door in portable phones <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
employed to listen through their microphones</a>.</p>
</li>
- <li><p>Most mobile phones have a universal back door, which has been
+ <li id="back-door-malicious">
+ <p>Most mobile phones have a universal back door, which has been
used to <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
turn them malicious</a>.</p>
@@ -145,6 +147,19 @@
<ul>
<li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as “free”,
+ but most of them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses the ugly word “monetize”. A good replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p>
+</li>
+
+<li>
<p>A study found 234 Android apps that track users by
<a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.
@@ -298,6 +313,17 @@
<h3 id="drm">Mobile DRM</h3>
<ul>
+
+<li>
+<p>Google now allows Android apps to detect whether a device has been
+rooted, <a
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and
refuse to install
+if so</a>.</p>
+
+<p>Update: Google <i>intentionally</i> <a
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/">
+changed Android so that apps can detect rooted devices and refuse to
+run on them</a>.</p>
+</li>
+
<li>
<p>The iPhone 7 contains DRM specifically designed to <a
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">
@@ -389,7 +415,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/06/02 15:29:09 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/malware-mobiles.it.po 2 Jun 2017 15:16:18 -0000
1.54
+++ proprietary/po/malware-mobiles.it.po 2 Jun 2017 15:29:09 -0000
1.55
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-18 05:28+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary-drm.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-drm.it-en.html 2 Apr 2017 10:30:43 -0000
1.7
+++ proprietary/po/proprietary-drm.it-en.html 2 Jun 2017 15:29:09 -0000
1.8
@@ -29,6 +29,20 @@
</p>
<ul>
+
+<li>
+<p>Google now allows Android apps to detect whether a device has been
+rooted, <a
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and
refuse to install
+if so</a>. The Netflix app uses this ability to enforce DRM by refusing
+to install on rooted Android devices.</p>
+
+<p>Update: Google <i>intentionally</i> changed Android so that apps
+<a
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/">can
detect rooted devices and refuse to
+run on them</a>. The Netflix app is proprietary malware, and one
+shouldn't use it. However, that does not make what Google has done
+any less wrong.</p>
+</li>
+
<li><p>Windows DRM
files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
be used to identify people browsing through Tor</a>. The vulnerability
@@ -227,7 +241,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/04/02 10:30:43 $
+$Date: 2017/06/02 15:29:09 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-drm.it.po 2 Jun 2017 15:16:17 -0000
1.30
+++ proprietary/po/proprietary-drm.it.po 2 Jun 2017 15:29:09 -0000
1.31
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-18 05:28+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary-insecurity.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-en.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-insecurity.it-en.html 11 May 2017 21:29:25
-0000 1.21
+++ proprietary/po/proprietary-insecurity.it-en.html 2 Jun 2017 15:29:09
-0000 1.22
@@ -35,6 +35,15 @@
users helpless is what's culpable about proprietary software.</p>
<ul>
+
+<li>
+ <p>Exploits of bugs in Windows, which were developed by the NSA
+ and then leaked by the Shadowbrokers group, are now being used to
+ <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
+ of Windows computers with ransomware</a>.
+ </p>
+</li>
+
<li>
<p>Intel's CPU backdoor—the Intel Management Engine—had a
<a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security
@@ -468,7 +477,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/06/02 15:29:09 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/proprietary-insecurity.it.po 2 Jun 2017 15:16:18 -0000
1.102
+++ proprietary/po/proprietary-insecurity.it.po 2 Jun 2017 15:29:09 -0000
1.103
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-18 04:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary-surveillance.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-en.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-surveillance.it-en.html 23 May 2017 17:59:40
-0000 1.32
+++ proprietary/po/proprietary-surveillance.it-en.html 2 Jun 2017 15:29:09
-0000 1.33
@@ -323,6 +323,26 @@
<ul>
<li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as “free”,
+ but most of them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses the ugly word “monetize”. A good replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p>
+</li>
+
+<li>
+ <p>Apps for BART
+ <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em> that they don't
snoop.</p>
+ <p>With proprietary apps, one can only hope that they don't.</p>
+</li>
+
+<li>
<p>A study found 234 Android apps that track users by
<a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.
@@ -1325,7 +1345,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/23 17:59:40 $
+$Date: 2017/06/02 15:29:09 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary/po/proprietary-surveillance.it.po 2 Jun 2017 15:16:18
-0000 1.174
+++ proprietary/po/proprietary-surveillance.it.po 2 Jun 2017 15:29:09
-0000 1.175
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-26 18:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www home.it.html distros/po/common-distros.it-e...,
GNUN <=