[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-mobiles.fr.po
From: |
Therese Godefroy |
Subject: |
www/proprietary/po malware-mobiles.fr.po |
Date: |
Sun, 30 Jul 2017 04:32:32 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 17/07/30 04:32:32
Modified files:
proprietary/po : malware-mobiles.fr.po
Log message:
Update.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.67&r2=1.68
Patches:
Index: malware-mobiles.fr.po
===================================================================
RCS file: /webcvs/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- malware-mobiles.fr.po 30 Jul 2017 08:01:32 -0000 1.67
+++ malware-mobiles.fr.po 30 Jul 2017 08:32:31 -0000 1.68
@@ -8,14 +8,13 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"POT-Creation-Date: 2017-07-29 21:25+0000\n"
-"PO-Revision-Date: 2017-07-28 22:57+0200\n"
+"PO-Revision-Date: 2017-07-30 10:30+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
"Language: fr\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-07-29 21:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -178,16 +177,6 @@
"dérobée de Samsung</a> permet l'accès à n'importe quel fichier du
système."
#. type: Content of: <ul><li><p>
-# | In Android, <a
-# |
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">
-# | Google has a back door to remotely delete [-apps.</a> (It-] {+apps</a>
-# | (it+} is in a program called GTalkService).
-#, fuzzy
-#| msgid ""
-#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
-#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
-#| "has a back door to remotely delete apps.</a> (It is in a program called "
-#| "GTalkService)."
msgid ""
"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
@@ -260,15 +249,6 @@
"bogue dans le micrologiciel <cite>[firmware]</cite> non libre de Broadcom."
#. type: Content of: <ul><li><p>
-# | Samsung phones <a
-# |
href=\"https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/\">have
-# | a security hole that allows an SMS message to install ransom[-e-]ware</a>.
-#, fuzzy
-#| msgid ""
-#| "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/"
-#| "sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-"
-#| "attacks/\">have a security hole that allows an SMS message to install "
-#| "ransomeware</a>."
msgid ""
"Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
@@ -325,6 +305,11 @@
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
msgstr ""
+"Certains téléphones portables <a href=\"http://www.prnewswire.com/news-"
+"releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-"
+"personally-identifiable-information-pii-without-user-consent-or-"
+"disclosure-300362844.html\">sont vendus avec un logiciel espion qui envoie "
+"une masse de données en Chine</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -367,11 +352,8 @@
"à leur vie privée."
#. type: Content of: <ul><li><dl><dt>
-# | [-<em>SurfEasy</em>-]{+SurfEasy+}
-#, fuzzy
-#| msgid "<em>SurfEasy</em>"
msgid "SurfEasy"
-msgstr "<em>SurfEasy</em>"
+msgstr "SurfEasy"
#. type: Content of: <ul><li><dl><dd>
msgid ""
@@ -382,11 +364,8 @@
"l'utilisateur et à lui envoyer des pubs ciblées."
#. type: Content of: <ul><li><dl><dt>
-# | [-<em>sFly-]{+sFly+} Network [-Booster</em>-] {+Booster+}
-#, fuzzy
-#| msgid "<em>sFly Network Booster</em>"
msgid "sFly Network Booster"
-msgstr "<em>sFly Network Booster</em>"
+msgstr "sFly Network Booster"
#. type: Content of: <ul><li><dl><dd>
msgid ""
@@ -398,11 +377,8 @@
"l'utilisateur."
#. type: Content of: <ul><li><dl><dt>
-# | [-<em>DroidVPN-]{+DroidVPN+} and [-TigerVPN</em>-] {+TigerVPN+}
-#, fuzzy
-#| msgid "<em>DroidVPN and TigerVPN</em>"
msgid "DroidVPN and TigerVPN"
-msgstr "<em>DroidVPN et TigerVPN</em>"
+msgstr "DroidVPN et TigerVPN"
#. type: Content of: <ul><li><dl><dd>
msgid ""
@@ -414,11 +390,8 @@
"confirmé."
#. type: Content of: <ul><li><dl><dt>
-# | [-<em>HideMyAss</em>-]{+HideMyAss+}
-#, fuzzy
-#| msgid "<em>HideMyAss</em>"
msgid "HideMyAss"
-msgstr "<em>HideMyAss</em>"
+msgstr "HideMyAss"
#. type: Content of: <ul><li><dl><dd>
msgid ""
@@ -429,11 +402,8 @@
"détaillés et peut les transmettre au gouvernement britannique sur sa
demande."
#. type: Content of: <ul><li><dl><dt>
-# | [-<em>VPN-]{+VPN+} Services [-HotspotShield</em>-] {+HotspotShield+}
-#, fuzzy
-#| msgid "<em>VPN Services HotspotShield</em>"
msgid "VPN Services HotspotShield"
-msgstr "<em>Service VPN HotspotShield</em>"
+msgstr "Service VPN HotspotShield"
#. type: Content of: <ul><li><dl><dd>
msgid ""
@@ -444,15 +414,12 @@
msgstr ""
"Injecte du code JavaScript dans les pages HTML renvoyées aux utilisateurs. "
"Le but avoué de cette injection est d'afficher des pubs. Cette appli utilise
"
-"cinq bibliothèques de traçage environ. En outre, elle redirige le trafic de
"
+"cinq bibliothèques de pistage environ. En outre, elle redirige le trafic de "
"l'utilisateur par valueclick.com (un site de publicité)."
#. type: Content of: <ul><li><dl><dt>
-# | [-<em>WiFi-]{+WiFi+} Protector [-VPN</em>-] {+VPN+}
-#, fuzzy
-#| msgid "<em>WiFi Protector VPN</em>"
msgid "WiFi Protector VPN"
-msgstr "<em>WiFi Protector</em>"
+msgstr "WiFi Protector"
#. type: Content of: <ul><li><dl><dd>
msgid ""
@@ -461,8 +428,8 @@
"version of the app does JavaScript injection for tracking and display ads."
msgstr ""
"Injecte du code JavaScript dans les pages HTML et utilise également cinq "
-"bibliothèques de traçage. Ses développeurs ont confirmé que l'injection
de "
-"JavaScript par la version gratuite de l'appli sert au traçage et à "
+"bibliothèques de pistage. Ses développeurs ont confirmé que l'injection de
"
+"JavaScript par la version gratuite de l'appli sert au pistage et à "
"l'affichage de pubs."
#. type: Content of: <ul><li><p>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary/po malware-mobiles.fr.po,
Therese Godefroy <=