www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-microsoft.es.html po/ma...


From: GNUN
Subject: www/proprietary malware-microsoft.es.html po/ma...
Date: Wed, 22 Nov 2017 06:30:57 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/11/22 06:30:57

Modified files:
        proprietary    : malware-microsoft.es.html 
        proprietary/po : malware-microsoft.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.43&r2=1.44

Patches:
Index: malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- malware-microsoft.es.html   8 Nov 2017 12:01:57 -0000       1.44
+++ malware-microsoft.es.html   22 Nov 2017 11:30:57 -0000      1.45
@@ -307,7 +307,15 @@
 Windows 10, llamada «Creators Update», Windows elevó la vigilancia al 
máximo
 <a
 
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
-ajustando por defecto el nivel de telemetría a «Completo»</a>.</p></li>
+ajustando por defecto el nivel de telemetría a «Completo»</a>.</p>
+
+<p>El <a
+href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level";>nivel
+de telemetría «Completo»</a> permite a los ingenieros de Microsoft acceder,
+entre otras cosas, a claves de registro <a
+href="https://technet.microsoft.com/en-us/library/cc939702.aspx";>que
+contienen información sensible, como la contraseña de inicio de sesión del
+administrador</a>.</p></li>
 
 <li><p>Los archivos DRM de Windows <a
 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>pueden
@@ -541,7 +549,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2017/11/08 12:01:57 $
+$Date: 2017/11/22 11:30:57 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- po/malware-microsoft.es-en.html     8 Nov 2017 12:01:57 -0000       1.43
+++ po/malware-microsoft.es-en.html     22 Nov 2017 11:30:57 -0000      1.44
@@ -278,7 +278,15 @@
 Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the
 surveillance <a
 
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
-by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p></li>
+    by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p>
+
+<p>The <a
+href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level";>
+ &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows
+ engineers to access, among other things, registry keys
+ <a href="https://technet.microsoft.com/en-us/library/cc939702.aspx";>which
+ can contain sensitive information like administrator's login
+ password</a>.</p></li>
 
 <li><p>Windows DRM
 files <a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>can
@@ -478,7 +486,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/11/08 12:01:57 $
+$Date: 2017/11/22 11:30:57 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]