[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-microsoft.es.html po/ma...
From: |
GNUN |
Subject: |
www/proprietary malware-microsoft.es.html po/ma... |
Date: |
Wed, 22 Nov 2017 06:30:57 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/11/22 06:30:57
Modified files:
proprietary : malware-microsoft.es.html
proprietary/po : malware-microsoft.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.43&r2=1.44
Patches:
Index: malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- malware-microsoft.es.html 8 Nov 2017 12:01:57 -0000 1.44
+++ malware-microsoft.es.html 22 Nov 2017 11:30:57 -0000 1.45
@@ -307,7 +307,15 @@
Windows 10, llamada «Creators Update», Windows elevó la vigilancia al
máximo
<a
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
-ajustando por defecto el nivel de telemetrÃa a «Completo»</a>.</p></li>
+ajustando por defecto el nivel de telemetrÃa a «Completo»</a>.</p>
+
+<p>El <a
+href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">nivel
+de telemetrÃa «Completo»</a> permite a los ingenieros de Microsoft acceder,
+entre otras cosas, a claves de registro <a
+href="https://technet.microsoft.com/en-us/library/cc939702.aspx">que
+contienen información sensible, como la contraseña de inicio de sesión del
+administrador</a>.</p></li>
<li><p>Los archivos DRM de Windows <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">pueden
@@ -541,7 +549,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2017/11/08 12:01:57 $
+$Date: 2017/11/22 11:30:57 $
<!-- timestamp end -->
</p>
Index: po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- po/malware-microsoft.es-en.html 8 Nov 2017 12:01:57 -0000 1.43
+++ po/malware-microsoft.es-en.html 22 Nov 2017 11:30:57 -0000 1.44
@@ -278,7 +278,15 @@
Windows 10, called the “Creators Update,” Windows maximized the
surveillance <a
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
-by force setting the telemetry mode to “Full”</a>.</p></li>
+ by force setting the telemetry mode to “Full”</a>.</p>
+
+<p>The <a
+href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">
+ “Full” telemetry mode</a> allows Microsoft Windows
+ engineers to access, among other things, registry keys
+ <a href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
+ can contain sensitive information like administrator's login
+ password</a>.</p></li>
<li><p>Windows DRM
files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
@@ -478,7 +486,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/11/08 12:01:57 $
+$Date: 2017/11/22 11:30:57 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-microsoft.es.html po/ma...,
GNUN <=