www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy po/right-to-read.translist right...


From: GNUN
Subject: www/philosophy po/right-to-read.translist right...
Date: Thu, 21 Dec 2017 08:59:35 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/12/21 08:59:35

Modified files:
        philosophy/po  : right-to-read.translist 
Added files:
        philosophy     : right-to-read.zh-cn.html 
        philosophy/po  : right-to-read.zh-cn-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.zh-cn.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.translist?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.zh-cn-en.html?cvsroot=www&rev=1.1

Patches:
Index: po/right-to-read.translist
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.translist,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/right-to-read.translist  12 Apr 2016 15:42:10 -0000      1.15
+++ po/right-to-read.translist  21 Dec 2017 13:59:35 -0000      1.16
@@ -28,6 +28,7 @@
 <span dir="ltr"><a lang="sv" hreflang="sv" 
href="/philosophy/right-to-read.sv.html">svenska</a>&nbsp;[sv]</span> &nbsp;
 <span dir="ltr"><a lang="tr" hreflang="tr" 
href="/philosophy/right-to-read.tr.html">Türkçe</a>&nbsp;[tr]</span> &nbsp;
 <span dir="ltr"><a lang="uk" hreflang="uk" 
href="/philosophy/right-to-read.uk.html">українська</a>&nbsp;[uk]</span>
 &nbsp;
+<span dir="ltr"><a lang="zh-cn" hreflang="zh-cn" 
href="/philosophy/right-to-read.zh-cn.html">简体中文</a>&nbsp;[zh-cn]</span>
 &nbsp;
 </p>
 </div>' -->
 <link rel="alternate" type="text/html" href="/philosophy/right-to-read.html" 
hreflang="x-default" />
@@ -57,4 +58,5 @@
 <link rel="alternate" type="text/html" lang="sv" hreflang="sv" 
href="/philosophy/right-to-read.sv.html" title="svenska" />
 <link rel="alternate" type="text/html" lang="tr" hreflang="tr" 
href="/philosophy/right-to-read.tr.html" title="Türkçe" />
 <link rel="alternate" type="text/html" lang="uk" hreflang="uk" 
href="/philosophy/right-to-read.uk.html" title="українська" />
+<link rel="alternate" type="text/html" lang="zh-cn" hreflang="zh-cn" 
href="/philosophy/right-to-read.zh-cn.html" title="简体中文" />
 <!-- end translist file -->

Index: right-to-read.zh-cn.html
===================================================================
RCS file: right-to-read.zh-cn.html
diff -N right-to-read.zh-cn.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ right-to-read.zh-cn.html    21 Dec 2017 13:59:34 -0000      1.1
@@ -0,0 +1,385 @@
+<!--#set var="ENGLISH_PAGE" value="/philosophy/right-to-read.en.html" -->
+
+<!--#include virtual="/server/header.zh-cn.html" -->
+<!-- Parent-Version: 1.79 -->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>阅读的权利 - GNU工程 - 自由软件基金会</title>
+<style type="text/css" media="print,screen"><!--
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns >
+ p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
+-->
+</style>
+
+<!--#include virtual="/philosophy/po/right-to-read.translist" -->
+<!--#include virtual="/server/banner.zh-cn.html" -->
+<h2 class="center">阅读的权利</h2>
+
+<p class="byline center">
+<a href="http://www.stallman.org/";><strong>Richard Stallman</strong></a> 
著</p>
+<p class="center">
+<em>本文出现于1997年2月出版的<cite>ACM通讯</cite>(卷40,第2号)。</em></p>
+<hr class="thin" />
+
+<div class="article">
+<blockquote class="info center"><p>
+            本文来自<cite>通往Tycho<sup><a
+href="#TransNote1">1</a></sup>之路</cite>,月球革命祖å…
ˆçš„一部文集,于2096年发表于月之城<sup><a
+href="#TransNote2">2</a></sup>。
+</p></blockquote>
+
+<div class="columns">
+<p>
+对Dan Halbert来说,通往Tycho之路始于大学&mdash;当Lissa
+Lenz问他借电脑的时候。她的电脑坏了,而且如果她不借一部电脑,她的期中项目就过不了å
…³ã€‚除了Dan,她就没人敢问了。</p>
+
+<p>
+这让Dan进退两难。他不得不帮忙&mdash;但是如果把电脑借给她,她就可能看他的书。除了让å
…¶ä»–人看你
的书是要坐好多年牢的事之外,一有这个念头本身就够让他吃惊的了。和所有人一æ
 
·ï¼Œä»–从小学起就被教育:分享书籍是错误而且令人厌恶的事&mdash;只有盗版è€
…才会干的事。</p>
+
+<p>
+况且,他也不大可能躲开SPA&mdash;软件保护局&mdash;的追踪。在软件课程中,Dan曾经学到过每本书都带有版权监控,它会向授权中心汇报何时何地谁在读。(当局利用这个信息来抓获盗版è€
…,但也会向零售商兜售个人å…
´è¶£æ¦‚况。)当下次他的电脑联网时,授权中心就会知道了。他,作为电脑所有è€
…,会受到最严厉的惩罚&mdash;因为没有努力避免犯罪。</p>
+
+<p>
+当然,Lissa不是必
然要看他的书。她可能只是想用电脑写完期中项目。但是Dan知道她来自一个中产阶级家庭,而且å‡
 ä¹Žæ— æ³•è´Ÿæ‹…学费,更不必说再支付阅读费了。阅
读他的书可能是她能够毕业的唯一途径。他了解这个情
况;他自己也不得不借钱来支付所有要读的研究论文。(阅
读费的十分之一是给论文作者的;由于Dan的目标是学术ç 
”究,他也希望自己的ç 
”究论文,如果被频繁引用,会带来足够归还贷款的收å…
¥ã€‚)</p>
+</div>
+<div class="column-limit"></div>
+
+<div class="columns">
+<p>
+以后,Dan可能会了解到曾经有一个年代,任何人都可以去图书馆é˜
…读期刊文章、乃至书籍而无
需付费。还曾经有过没有政府拨款的独立学者,他们有的阅
读了几
千页的资料。但是在20世纪90年代,商业的和非盈利的期刊出版社都开始了付费查é˜
…。到2047年,学术文献的免费查阅仅仅
存在于渺茫的记忆中了。</p>
+
+<p>
+当然,有一些手段可以绕过SPA和授权中心。它们自然是非法的。Dan学软件时有一个同学,Frank
+Martucci,他搞到一个违禁的调试工å…
·ï¼Œå¹¶åœ¨è¯»ä¹¦æ—¶ç”¨å®ƒè·³è¿‡ç‰ˆæƒç›‘控代ç 
ã€‚但是他把这件事讲给太多的朋友听了,å…
¶ä¸­ä¸€ä¸ªä¸ºäº†å¥–金向SPA举报了他(背负重债的学生很容易受到诱惑而背叛)。2047年,Frank进了监狱,不是å›
 ä¸ºç›—读,而是因为拥有调试器。</p>
+
+<p>
+以后,Dan可能会了解到曾经有一个时代,人人都可以拥有调试工å
…·ã€‚那时还有装有自由调试工具的å…
‰ç›˜ï¼Œç”šè‡³å¯ä»¥åˆ°ç½‘络上下载自由调试工å…
·ã€‚然而,普通用户开始使用调试工å…
·æ¥è·³è¿‡ç‰ˆæƒç›‘控,最终法官判定该工具实际
上主要用于跳过版权监控。这就意味着它们是非法的;该工å…
·çš„开发者也进了监狱。</p>
+
+<p>
+当然,程序员还是需要调试工具的,不过调试工å…
·ä¾›åº”商在2047年只销售带编号的版本,而且只卖给正式授权和有æ‹
…
保的程序员。Dan在软件课上使用的调试器被排除在特别的防火墙之外,所以它只能用于课å
 ‚练习。</p>
+
+<p>
+还可以通过安装修改版的系统内æ 
¸æ¥è·³è¿‡ç‰ˆæƒç›‘控。Dan最终可能会了解到在世纪之初,自由内
æ 
¸ã€ç”šè‡³æ˜¯æ•´ä¸ªè‡ªç”±æ“ä½œç³»ç»Ÿéƒ½æ˜¯å­˜åœ¨çš„。但是它们和调试器一æ
 ·éƒ½ä¸æ˜¯éžæ³•çš„&mdash;即使你不知道电脑的管理员密码,你
也可以安装一个。FBI或者Microsoft技术支持都不会告诉你
这些。</p>
+</div>
+<div class="column-limit"></div>
+
+<div class="columns">
+<p>
+Dan得出结论,他不能简单把电脑借给Lissa。但是他不能不帮她,å›
 
为他爱着她。每次和她交谈对他都如沐春风。既然她选择向他来求助,那么就可能意味着她也爱着他。</p>
+
+<p>
+Dan选择了让人意想不到的方式来解决这个难题&mdash;他把电脑借给她,并告诉她自己的密ç
 ã€‚è¿™æ 
·ï¼Œå¦‚æžœLissa看他的书,授权中心会以为是他在看书。这也是犯罪,但是SPA不会马上察觉。只有Lissa举报,他们才会知道。</p>
+
+<p>
+当然,如果学校发现他给了Lissa他的密ç 
ï¼Œé‚£ä¹ˆä»–们俩的学生生涯就落幕了,无论她用密ç 
å¹²äº†ä»€ä¹ˆã€‚学校的政策是任何干扰学校监控学生电脑使用情
况的活动都是纪律惩戒的理由。无论你
的所作所为是否有害都无关紧要&mdash;如果那样,管理者
就很难加罪于你。他们设定你从事了被禁止的活动,å…
·ä½“是什么活动,他们不需要知道。</p>
+
+<p>
+学生通常不会因
此被开除&mdash;不直接为这事儿。他们会被禁止使用学æ 
¡çš„计算机系统,这样他们最后所有学科都通不过。</p>
+
+<p>
+以后,Dan可能会了解到这æ 
·çš„大学政策只是从20世纪80年代才开始的,当时大量的高æ 
¡å­¦ç”Ÿå¼€å§‹ä½¿ç”¨ç”µè„‘。此前,大学的æ 
¡çºªæœ‰æ‰€ä¸åŒï¼›ä»–们惩戒有害的行为,而不是那些仅仅
引起怀疑的行为。</p>
+</div>
+<div class="column-limit"></div>
+
+<div class="columns">
+<p>
+Lissa没有向SPA举报Dan。他做出的帮助让他们步入了婚姻的殿å 
‚,也让他们质疑从小受到的å…
³äºŽç›—版的教育。他们夫妇开始阅读有关版权的历史、有å…
³è‹è”及其对拷贝的限制、甚至有å…
³ç¾Žå›½å®ªæ³•çš„起源。他们搬到了月之城,在这里他们找到和他们一æ
 ·è¿œç¦»SPA魔掌的同伴。当2026å¹´Tycho起义开始时,全面的阅
读权利很快成为其中心目的之一。</p>
+</div>
+
+<div class="announcement">
+<blockquote>
+<p><a href="http://defectivebydesign.org/ebooks.html";>请加入å…
³äºŽç”µå­ä¹¦ä¹‹å±é™©çš„邮件列表</a>。</p>
+</blockquote>
+</div>
+
+<div id="AuthorsNote">
+<h3>作者附记</h3>
+
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>这是一个假想的历史故
事,它大概是由将来的某个人写的。它描述的是生活在专制社会的Dan
+Halbert的青年时代,那是一个被不å…
¬æ­£åŠ¿åŠ›æ‰­æ›²çš„社会,他们使用&ldquo;盗版&rdquo;一词作为宣传
口号。所以该故
事也使用那个社会的术语。我尝试将该术语映射为更å…
·è§†è§‰æ•ˆæžœçš„类比。请参看<a
+href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>。
+</p>
+</div>
+<div class="column-limit"></div>
+</li>
+
+<li>
+<div class="reduced-width">
+<p>对租借或阅读书籍(以及å…
¶ä»–出版物)的计算机增强限制以DRM为著名,它是&ldquo;数字限制管理&rdquo;的简称。为了杜绝DRM,自由软件基金会建立了<a
+href="http://DefectiveByDesign.org";>设计性缺陷</a>运动。我们请求你
的支持。</p>
+
+<p>电子前哨基金会,一个和自由软件基金会无å…
³è”的独立组织,也开展了反对DRM的运动。</p>
+</div>
+<div class="column-limit"></div>
+</li>
+</ul>
+
+<blockquote class="info center">
+<p>以下注记自本文发表之后做了多次更新。</p>
+</blockquote>
+
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>
+针对阅
读权利的斗争已经展开。虽然我们逝去的自由可能需要50年才淡出视野,但是本文描述的大部分专制法律和实践已经被提出;å
…¶ä¸­ä¸€äº›å·²ç»åœ¨ç¾Žå›½å’Œå…
¶ä»–地区颁布为法律。在美国,1998年颁布的千禧年数字版权法(DMCA)明文赋予政府对叫做DRM的计算机增强限制的支持,该法案把发行ç
 
´è§£DRM程序的行为定为犯罪。欧盟在2001年颁布的命令中也强加
了类似的限制,其形式不是那么强烈。</p>
+
+<p>
+美国试图通过所谓&ldquo;自由贸易&rdquo;条约游说其他国家引å…
¥è¿™äº›æ¡ä¾‹ã€‚其实<a
+href="https://stallman.org/business-supremacy-treaties.html";>商业至上条约</a>对它们更合适,å›
 
为这些条例是设计来让商业统治名义上民主的国家。DMCA中将ç
 ´è§£DRM的程序犯罪化的政策只是此类条约中众多不å…
¬æ­£çš„政策之一,而这些条约已经推行到广泛的领域。</p>
+
+<p>
+美国已经将DMCA要求通过双边协议推广到澳大利亚、巴拿马、哥伦比亚和韩国,并且通过另一个条约,CAFTA,将å
…¶æŽ¨å¹¿åˆ°è¯¸å¦‚哥斯达黎加
之类的国家。奥巴马总统使用两个新提出的条约,TPP和TTIP,将该运动升级。TPP会向太平洋地区的12个国家推广DMCA,连带许多å
…
¶ä»–错误措施。TTIP会向欧洲推广类似的限制。所有这些条约必
须废除或撤销。</p>
+
+<p>
+甚至万维网联盟(W3C)也已经被笼罩在版权行业的阴影之下;它正处在批准DRM进å
…¥æ­£å¼ç½‘络规格的边缘。</p>
+</div>
+<div class="column-limit"></div>
+</li>
+
+<li>
+<div class="columns">
+<p class="emph-box">
+非自由软件倾向于带有<a 
href="/proprietary/">多种滥用功能</a>,从此可以得出<a
+href="/philosophy/free-software-even-more-important.html">你永远无
法相信非自由软件</a>的结论。我们必
须坚持只用自由软件,并拒绝非自由软件。</p>
+
+<p class="inline-block">
+对Windows
+Vista来说,微软承认它内
置了后门:微软可以使用它来强制安装
软件&ldquo;更新&rdquo;,即使用户想要的是降级。它还可以命令所有运行Vista的电脑拒绝执行指定的驱动。Vista对用户实施专制的主要目的是导å
…¥DRM,用户根本无法抗拒。当然,Windows
+10也好不到哪去。</p>
+</div>
+<div class="column-limit"></div>
+</li>
+
+<li>
+<div class="columns">
+<p>
+该故
事中讲到的一个问题直到2002年才成为现实。这就是FBI和微软Microsoft拥有ä½
 ç”µè„‘的管理员密码,而你却没有。</p>
+
+<p>
+倡导该方案的早期版本叫做&ldquo;可信计算&rdquo;和&ldquo;守护神&rdquo;,但是最后使用时,它被叫做&ldquo;安å
…¨å¯åŠ¨&rdquo;。</p>
+
+<p>
+微软拥有的并不真的是传统意义上的密码;它甚至不必
在终端输å…
¥ã€‚更准确地说,它是一个和保存在电脑里的另一个密钥对应的签名和密钥。这使得微软,可能还åŒ
…括其他和微软合作的网站,能够像拥有该电脑的用户一æ 
·å®Œå…
¨æŽ§åˆ¶è¯¥ç”µè„‘。微软可能在FBI要求时使用该控制:它已经<a
+href="/proprietary/malware-microsoft.html">向NSA展示Windows的安å…
¨æ¼æ´ž</a>以供其利用。</p>
+
+<p>
+安全启动可以设计为å…
è®¸ç”¨æˆ·æŒ‡å®šç­¾åå¯†é’¥å¹¶å†³å®šç»™å“ªä¸ªè½¯ä»¶ç­¾åã€‚实际
操作中,为Windows
+10设计的个人电脑只带有微软的密钥,电脑所有者可否安装å…
¶ä»–系统(比如GNU/Linux)由微软控制。我们称之为<em>受限制的启动</em>。</p>
+</div>
+<div class="column-limit"></div>
+</li>
+
+<li>
+<div class="columns">
+<p>
+在1997年,当本文首次发表时,SPA对小的网络服务提供商发出威胁,要求他们å
…è®¸SPA监控所有用户。大多数ISP在威胁下屈服了,因为他们无
法承担法律诉讼。其中一个ISP,加州奥克兰的Community
+ConneXion,拒绝该要求并真的起诉了。SPA后来放弃了该诉讼,但是DMCA又给了它想要的权力。</p>
+
+<p>
+SPA,实际是软件出版者
协会的缩写,已经被类似警察角色的商业软件联盟(BSA)代替。BSA今天还不是正式的警察;不过它扮演的就是非正式的警察。它使用让人想起前苏联的手段,邀请人们举报自己的同事和朋友。2001年在阿æ
 ¹å»·çš„BSA恐怖行动几乎毫不遮掩地威胁人们:分享软件者
会在监狱里被强暴。</p>
+</div>
+<div class="column-limit"></div>
+</li>
+
+<li>
+<div class="reduced-width">
+<p>
+本文描述的大学安全政策并非想象。例如,芝加
哥地区的一所大学的电脑登录界面会显示:</p>
+
+<blockquote><p>
+本系统仅
供授权用户使用。未经授权或越权使用该系统的人,å…
¶æ‰€æœ‰æ“ä½œéƒ½å¯èƒ½ä¼šè¢«ç³»ç»Ÿäººå‘˜ç›‘控和记录。为了监控系统滥用æƒ
…
况或在系统维护阶段,授权用户的操作也可能被监控。任何使用该系统的人都表明å
…
¶åŒæ„è¿™ç§ç›‘控,并已被告知如果监控发现有非法操作或违反学æ
 ¡è§„章的情况,系统人员会向æ 
¡æ–¹å’Œ/或执法单位提供监控证据。
+</p></blockquote>
+
+<p>
+这是对第四修正案的有趣解读:为了å…
é™¤ç¬¬å››ä¿®æ­£æ¡ˆèµ‹äºˆäººä»¬çš„权利,事å…
ˆæ–½åŽ‹è®©å¤§å¤šæ•°äººåŒæ„ã€‚</p>
+</div>
+</li>
+</ul>
+<div class="column-limit"></div>
+</div>
+
+<h3 id="BadNews">坏消息</h3>
+
+<div class="columns">
+<p>
+目前,阅
读权利的战斗正在针对我们进行。敌人有组织,而为我们没有。
+</p>
+
+<p>今天的商业电子书<a
+href="/philosophy/the-danger-of-ebooks.html">免除了读者享有的传
统自由</a>。亚马逊的电子书阅
读器,我称之为&ldquo;亚马逊骗局&rdquo;,因
为它为欺骗电子书读者丢弃传统阅
读自由而设计,它运行的软件展示了好几种<a
+href="/proprietary/malware-kindle-swindle.html">奥威尔式的功能<sup><a
+href="#TransNote3">3</a></sup></a>。有其中任何一个都应该完å…
¨æ‹’绝该产品:</p>
+
+<ul>
+<li><p>它监控用户的所有操作:报告用户在看哪本书、哪一页、用户何时高亮了文字以及用户做了什么注记。</p></li>
+
+<li><p>它带有DRM,用来阻止用户分享拷贝。</p></li>
+
+<li><p class="inline-block">它带有一个后门,亚马逊可以用它来删
除任何一本书。在2009年,它删
除了数千个乔治·奥威尔著的《1984》拷贝。</p></li>
+
+<li><p 
class="inline-block">如果这一切还不够奥威尔式,它还带有一个å…
¨å±€åŽé—¨ï¼Œäºšé©¬é€Šå¯ä»¥ç”¨å®ƒè¿œç¨‹æ›´æ”¹è½¯ä»¶ï¼Œå¹¶å¯¼å…¥ä»»æ„å…
¶ä»–形式的污秽之物。</p></li>
+</ul>
+
+<p>亚马逊的电子书发布也å…
·æœ‰åŽ‹è¿«æ€§ã€‚它确认用户身份并记录用户获取了什么书。它还要求用户同意一个反社会的合同,即用户不得和他人分享书籍拷贝。我的良知告诉我,即便我同意了这个合同,我也会做出相对不那么恶魔的事:我会违背该合同并和他人分享书籍拷贝;然而,如果要完å
…¨å–„意,我首先不会同意该合同。所以,我拒绝这æ 
·çš„合同,无论是对软件、电子书、音乐或其他任何东西。</p>
+
+<p>如果你
想要阻止这些坏消息并创建好消息,那么我们需要组织并战斗起来。请订é˜
…FSF的<a
+href="http://defectivebydesign.org";>设计性缺陷</a>运动并贡献一份力量。ä½
 å¯ä»¥<a
+href="http://www.fsf.org/associate";>加å…
¥FSF</a>来支持我们的普遍性工作。这里还有一份<a
+href="/help/help.html">加入我们工作的列表</a>。
+</p>
+</div>
+
+<h3 id="References">参考资料</h3>
+
+<ul>
+  
<li>管理&ldquo;白皮书&rdquo;:信息基础架构特别小组,知识产权[<a
+href="/philosophy/not-ipr.html">sic</a>]和国家信息基础架构:知识产权[sic]工作报告(1995)。</li>
+
+  <li><a
+href="http://www.wired.com/wired/archive/4.01/white.paper_pr.html";>å…
³äºŽç™½çš®ä¹¦çš„解释:版权豪夺</a>,Pamela
+Samuelson,连线(Wired),1996年1月</li>
+
+  <li><a 
href="http://www.law.duke.edu/boylesite/sold_out.htm";>售罄</a>,James
+Boyle,纽约时报,1996年3月31日版</li>
+
+  <li><a
+href="http://web.archive.org/web/20130508120533/http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html";>å
…¬å…±æ•°æ®è¿˜æ˜¯ç§äººæ•°æ®</a>,华盛顿邮报,1996å¹´11月4日版 </li>
+ 
+  <li><a
+href="https://web.archive.org/web/20151113122141/http://public-domain.org/";>å…
¬å…
±é¢†åŸŸçš„联合</a>&mdash;一个旨在反对和扭转版权与专利权力过度扩å¼
 çš„组织。</li>
+</ul>
+
+<h4>其他参阅资料</h4>
+
+<ul>
+       <li><a href="/philosophy/philosophy.html">GNU工程的哲学</a></li>
+       <li><a
+href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html";
+id="copy-protection">复制保护:只需说不</a>,由计算机世界发表。</li>
+</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">本文发表于<a
+href="http://shop.fsf.org/product/free-software-free-society/";><cite>自由软件,自由世界:Richard
+M. Stallman选集</cite></a>。</p></blockquote>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+<h3>译注</h3>
+<ol>
+<li id="TransNote1">Tycho,一个著名的月球环形山。</li>
+<li id="TransNote2">本文是一篇面向未来的科幻小品文。</li>
+<li
+id="TransNote3">Orweillian,奥威尔式的。指ç 
´åè‡ªç”±ã€å¼€æ”¾å’Œç¦åˆ©ç¤¾ä¼šçš„(行为)。Orwellian词源是英国小说家George
+Orwell(乔治·奥威尔)。该小说家著名作品有《Animal 
Farm》和《1984》等,都是影射前苏联的政治讽刺小说。</li>
+</ol></div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.zh-cn.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>请将有关自由软件基金会(FSF) &amp; 
GNU的一般性问题发送到<a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>。也可以通过<a
+href="/contact/">其他联系方法</a>联系自由软件基金会(FSF)。有å…
³å¤±æ•ˆé“¾æŽ¥æˆ–其他错误和建议,请发送邮件到<a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>。</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:address@hidden";>
+
+        &lt;address@hidden&gt;</a>.</p>
+
+        <p>For information on coordinating and submitting translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+若您想翻译本文,请参看<a
+href="/server/standards/README.translations.html">翻译须知</a>获取有å…
³åè°ƒå’Œæäº¤ç¿»è¯‘的相关事项。</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 1996, 2002, 2007, 2009, 2010, 2014, 2015, 2016 Richard
+Stallman</p>
+
+<p>本页面使用<a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
+Attribution-NoDerivatives 4.0 International License</a>授权。</p>
+
+<!--#include virtual="/server/bottom-notes.zh-cn.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+<b>翻译团队</b>:<a rel="team"
+href="https://savannah.gnu.org/projects/www-zh-cn/";>&lt;CTT&gt;</a>,2017。</div>
+
+<p class="unprintable"><!-- timestamp start -->
+最后更新:
+
+$Date: 2017/12/21 13:59:34 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>

Index: po/right-to-read.zh-cn-en.html
===================================================================
RCS file: po/right-to-read.zh-cn-en.html
diff -N po/right-to-read.zh-cn-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/right-to-read.zh-cn-en.html      21 Dec 2017 13:59:35 -0000      1.1
@@ -0,0 +1,552 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.79 -->
+<title>The Right to Read
+- GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns > p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
+--></style>
+<!--#include virtual="/philosophy/po/right-to-read.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2 class="center">The Right to Read</h2>
+
+<p class="byline center">
+by <a href="http://www.stallman.org/";><strong>Richard Stallman</strong></a></p>
+<p class="center">
+<em>This article appeared in the February 1997 issue
+of <cite>Communications of the ACM</cite> (Volume 40, Number
+2).</em></p>
+<hr class="thin" />
+
+<div class="article">
+<blockquote class="info center"><p>
+            From <cite>The Road To Tycho</cite>, a collection of
+            articles about the antecedents of the Lunarian
+            Revolution, published in Luna City in 2096.
+</p></blockquote>
+
+<div class="columns">
+<p>
+For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
+Lenz asked to borrow his computer.  Hers had broken down, and unless
+she could borrow another, she would fail her midterm project.  There
+was no one she dared ask, except Dan.</p>
+
+<p>
+This put Dan in a dilemma.  He had to help her&mdash;but if he lent
+her his computer, she might read his books.  Aside from the fact that
+you could go to prison for many years for letting someone else read
+your books, the very idea shocked him at first.  Like everyone, he had
+been taught since elementary school that sharing books was nasty and
+wrong&mdash;something that only pirates would do.</p>
+
+<p>
+And there wasn't much chance that the SPA&mdash;the Software
+Protection Authority&mdash;would fail to catch him.  In his software
+class, Dan had learned that each book had a copyright monitor that
+reported when and where it was read, and by whom, to Central
+Licensing.  (They used this information to catch reading pirates, but
+also to sell personal interest profiles to retailers.)  The next time
+his computer was networked, Central Licensing would find out.  He, as
+computer owner, would receive the harshest punishment&mdash;for not
+taking pains to prevent the crime.</p>
+
+<p>
+Of course, Lissa did not necessarily intend to read his books.  She
+might want the computer only to write her midterm.  But Dan knew she
+came from a middle-class family and could hardly afford the tuition,
+let alone her reading fees.  Reading his books might be the only way
+she could graduate.  He understood this situation; he himself had had
+to borrow to pay for all the research papers he read.  (Ten percent of those
+fees went to the researchers who wrote the papers; since Dan aimed for
+an academic career, he could hope that his own research papers, if
+frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
+
+<div class="columns">
+<p>
+Later on, Dan would learn there was a time when anyone could go to the
+library and read journal articles, and even books, without having to
+pay.  There were independent scholars who read thousands of pages
+without government library grants.  But in the 1990s, both commercial
+and nonprofit journal publishers had begun charging fees for access.
+By 2047, libraries offering free public access to scholarly literature
+were a dim memory.</p>
+
+<p>
+There were ways, of course, to get around the SPA and Central
+Licensing.  They were themselves illegal.  Dan had had a classmate in
+software, Frank Martucci, who had obtained an illicit debugging tool,
+and used it to skip over the copyright monitor code when reading
+books.  But he had told too many friends about it, and one of them
+turned him in to the SPA for a reward (students deep in debt were
+easily tempted into betrayal).  In 2047, Frank was in prison, not for
+pirate reading, but for possessing a debugger.</p>
+
+<p>
+Dan would later learn that there was a time when anyone could have
+debugging tools.  There were even free debugging tools available on CD
+or downloadable over the net.  But ordinary users started using them
+to bypass copyright monitors, and eventually a judge ruled that this
+had become their principal use in actual practice.  This meant they
+were illegal; the debuggers' developers were sent to prison.</p>
+
+<p>
+Programmers still needed debugging tools, of course, but debugger
+vendors in 2047 distributed numbered copies only, and only to
+officially licensed and bonded programmers.  The debugger Dan used in
+software class was kept behind a special firewall so that it could be
+used only for class exercises.</p>
+
+<p>
+It was also possible to bypass the copyright monitors by installing a
+modified system kernel.  Dan would eventually find out about the free
+kernels, even entire free operating systems, that had existed around
+the turn of the century.  But not only were they illegal, like
+debuggers&mdash;you could not install one if you had one, without
+knowing your computer's root password.  And neither
+the FBI nor
+Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
+
+<div class="columns">
+<p>
+Dan concluded that he couldn't simply lend Lissa his computer.  But he
+couldn't refuse to help her, because he loved her.  Every chance to
+speak with her filled him with delight.  And that she chose him to ask
+for help, that could mean she loved him too.</p>
+
+<p>
+Dan resolved the dilemma by doing something even more
+unthinkable&mdash;he lent her the computer, and told her his password.
+This way, if Lissa read his books, Central Licensing would think he
+was reading them.  It was still a crime, but the SPA would not
+automatically find out about it.  They would only find out if Lissa
+reported him.</p>
+
+<p>
+Of course, if the school ever found out that he had given Lissa his
+own password, it would be curtains for both of them as students,
+regardless of what she had used it for.  School policy was that any
+interference with their means of monitoring students' computer use was
+grounds for disciplinary action.  It didn't matter whether you did
+anything harmful&mdash;the offense was making it hard for the
+administrators to check on you.  They assumed this meant you were
+doing something else forbidden, and they did not need to know what it
+was.</p>
+
+<p>
+Students were not usually expelled for this&mdash;not directly.
+Instead they were banned from the school computer systems, and would
+inevitably fail all their classes.</p>
+
+<p>
+Later, Dan would learn that this kind of university policy started
+only in the 1980s, when university students in large numbers began
+using computers.  Previously, universities maintained a different
+approach to student discipline; they punished activities that were
+harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
+
+<div class="columns">
+<p>
+Lissa did not report Dan to the SPA.  His decision to help her led to
+their marriage, and also led them to question what they had been
+taught about piracy as children.  The couple began reading about the
+history of copyright, about the Soviet Union and its restrictions on
+copying, and even the original United States Constitution.  They moved
+to Luna, where they found others who had likewise gravitated away from
+the long arm of the SPA.  When the Tycho Uprising began in 2062, the
+universal right to read soon became one of its central aims.</p>
+</div>
+
+<div class="announcement">
+<blockquote>
+<p><a href="http://defectivebydesign.org/ebooks.html";>Join our mailing list 
about the dangers of e-books</a>.</p>
+</blockquote>
+</div>
+
+<div id="AuthorsNote">
+<h3>Author's Notes</h3>
+
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
+the future by someone else, describing Dan Halbert's youth under a
+repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
+propaganda. So it uses the terminology of that society.
+I have tried to project it forwards into something more visibly
+oppressive. See <a
+href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>.
+</p>
+</div>
+<div class="column-limit"></div>
+</li>
+
+<li>
+<div class="reduced-width">
+<p>Computer-enforced restrictions on lending or reading books (and other
+kinds of published works) are known as DRM, short for
+&ldquo;Digital Restrictions Management&rdquo;.  To
+eliminate DRM, the Free Software Foundation has
+established the <a href="http://DefectiveByDesign.org";>Defective by
+Design</a> campaign.  We ask for your support.</p>
+
+<p>The Electronic Frontier Foundation, a separate organization not
+related to the Free Software Foundation, also campaigns against
+DRM.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+</ul>
+
+<blockquote class="info center">
+<p>The following note has been updated several times since the first
+publication of the story.</p>
+</blockquote>
+
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>
+The battle for the right to read is already being fought.  Although it
+may take 50 years for our past freedoms to fade into obscurity, most
+of the specific repressive laws and practices described above have
+already been proposed; some have been enacted into law in the US and
+elsewhere.  In the US, the 1998 Digital Millennium Copyright Act
+(DMCA) gave explicit government backing to the
+computer-enforced restrictions known as DRM, by making the
+distribution of programs that can break DRM a crime.  The European
+Union imposed similar restrictions in a 2001 copyright directive, in a
+form not quite as strong.</p>
+
+<p>
+The US campaigns to impose such rules on the rest of the world through
+so-called &ldquo;free trade&rdquo; treaties.
+<a href="https://stallman.org/business-supremacy-treaties.html";>
+Business-supremacy treaties</a> is a more fitting term for them, since
+they are designed to give business dominion over nominally democratic
+states.  The DMCA's policy of criminalizing programs that
+break DRM is one of many unjust policies that these treaties impose
+across a wide range of fields.</p>
+
+<p>
+The US has imposed DMCA requirements on Australia, Panama, Colombia
+and South Korea through bilateral agreements, and on countries such as
+Costa Rica through another treaty, CAFTA.  Obama has escalated the
+campaign with two new proposed treaties, the TPP and the TTIP.  The
+TPP would impose the DMCA, along with many other wrongs, on 12
+countries on the Pacific Ocean.  The TTIP would impose similar
+strictures on Europe.  All these treaties must be defeated, or
+abolished.</p>
+
+<p>
+Even the World Wide Web Consortium has fallen under the shadow of the
+copyright industry; it is on the verge of approving a DRM system as an
+official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+
+<li>
+<div class="columns">
+<p class="emph-box">
+Nonfree software tends to have <a href="/proprietary/">abusive
+features of many kinds</a>, which lead to the conclusion that
+<a href="/philosophy/free-software-even-more-important.html">you can
+never trust a nonfree program</a>.  We must insist on free (libre)
+software only, and reject nonfree programs.</p>
+
+<p class="inline-block">
+With Windows Vista, Microsoft admitted it had built in a back door:
+Microsoft can use it to forcibly install software
+&ldquo;upgrades,&rdquo; even if users consider them rather to be
+downgrades.  It can also order all machines running Vista to refuse to
+run a certain device driver.  The main purpose of Vista's clampdown on
+users was to impose DRM that users can't overcome.  Of course, Windows
+10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
+
+<li>
+<div class="columns">
+<p>
+One of the ideas in the story was not proposed in reality until 2002.
+This is the idea that the FBI and Microsoft will keep the
+root passwords for your personal computers, and not let you have
+them.</p>
+
+<p>
+The proponents of this scheme gave early versions names such as
+&ldquo;trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as
+ultimately put into use, it is called &ldquo;secure boot&rdquo;.</p>
+
+<p>
+What Microsoft keeps is not exactly a password in the traditional
+sense; no person ever types it on a terminal.  Rather, it is a
+signature and encryption key that corresponds to a second key stored
+in your computer.  This enables Microsoft, and potentially any web
+sites that cooperate with Microsoft, the ultimate control over what
+the user can do on per own computer.  Microsoft is likely to use that
+control on behalf of the FBI when asked: it
+already <a href="/proprietary/malware-microsoft.html">shows
+the NSA security bugs in Windows</a> to exploit.</p>
+
+<p>
+Secure boot can be implemented in a way that permits the user to
+specify the signature key and decide what software to sign.  In
+practice, PCs designed for Windows 10 carry only Microsoft's key, and
+whether the machine's owner can install any other system (such as
+GNU/Linux) is under Microsoft's control.  We call this <em>restricted
+boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+
+<li>
+<div class="columns">
+<p>
+In 1997, when this story was first published, the SPA was
+threatening small Internet service providers, demanding they permit
+the SPA to monitor all users.  Most ISPs surrendered when
+threatened, because they could not afford to fight back in court.  One
+ISP, Community ConneXion in Oakland, California, refused the demand
+and was actually sued.  The SPA later dropped the suit,
+but the DMCA gave it the power it sought.</p>
+
+<p>
+The SPA, which actually stands for Software Publishers
+Association, has been replaced in its police-like role by the Business
+Software Alliance.  The BSA is not, today, an official
+police force; unofficially, it acts like one.  Using methods
+reminiscent of the erstwhile Soviet Union, it invites people to inform
+on their coworkers and friends.  A BSA terror campaign in
+Argentina in 2001 made slightly veiled threats that people sharing
+software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
+
+<li>
+<div class="reduced-width">
+<p>
+The university security policies described above are not imaginary.
+For example, a computer at one Chicago-area university displayed this
+message upon login:</p>
+
+<blockquote><p>
+This system is for the use of authorized users only.  Individuals using
+this computer system without authority or in the excess of their authority
+are subject to having all their activities on this system monitored and
+recorded by system personnel.  In the course of monitoring individuals
+improperly using this system or in the course of system maintenance, the
+activities of authorized user may also be monitored.  Anyone using this
+system expressly consents to such monitoring and is advised that if such
+monitoring reveals possible evidence of illegal activity or violation of
+University regulations system personnel may provide the evidence of such
+monitoring to University authorities and/or law enforcement officials.
+</p></blockquote>
+
+<p>
+This is an interesting approach to the Fourth Amendment: pressure most
+everyone to agree, in advance, to waive their rights under it.</p>
+</div>
+</li>
+</ul>
+<div class="column-limit"></div>
+</div>
+
+<h3 id="BadNews">Bad News</h3>
+
+<div class="columns">
+<p>
+The battle for the right to read is going against us so far.
+The enemy is organized, and we are not.
+</p>
+
+<p>Today's commercial
+e-books <a href="/philosophy/the-danger-of-ebooks.html"> abolish
+readers' traditional freedoms</a>.  Amazon's e-book reader product,
+which I call the &ldquo;Amazon Swindle&rdquo; because it's designed to
+swindle readers out of the traditional freedoms of readers of books,
+is run by software with several
+demonstrated <a href="/proprietary/malware-kindle-swindle.html">Orwellian
+functionalities</a>.  Any one of them calls for rejecting the product
+completely:</p>
+
+<ul>
+<li><p>It spies on everything the user does: it reports which book the
+user is reading, and which page, and it reports when the user highlights
+text, and any notes the user enters.</p></li>
+
+<li><p>It has DRM, which is intended to block users from
+sharing copies.</p></li>
+
+<li><p class="inline-block">It has a back door with which Amazon can remotely 
erase any book.
+In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
+
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is 
a universal
+back door with which Amazon can remotely change the software, and
+introduce any other form of nastiness.</p></li>
+</ul>
+
+<p>Amazon's e-book distribution is oppressive, too.  It identifies the
+user and records what books the user obtains.  It also requires users
+to agree to an antisocial contract that they won't share copies with
+others.  My conscience tells me that, if I had agreed to such a
+contract, the lesser evil would be to defy it and share copies anyway;
+however, to be entirely good, I should not agree to it in the first
+place.  Therefore, I refuse to agree to such contracts, whether for
+software, for e-books, for music, or for anything else.</p>
+
+<p>If we want to stop the bad news and create some good news, we need
+to organize and fight.  Subscribe to the
+FSF's <a href="http://defectivebydesign.org";> Defective by Design</a>
+campaign to lend a hand.  You
+can <a href="http://www.fsf.org/associate";>join the FSF</a> to support
+our work more generally.  There is also a <a href="/help/help.html">list of 
ways
+to participate in our work</a>.
+</p>
+</div>
+
+<h3 id="References">References</h3>
+
+<ul>
+  <li>The administration's &ldquo;White Paper&rdquo;: Information
+       Infrastructure Task Force, Intellectual Property [<a
+       href="/philosophy/not-ipr.html">sic</a>] and the
+       National Information Infrastructure: The Report of the Working
+       Group on Intellectual Property [sic] Rights (1995).</li>
+
+  <li><a href="http://www.wired.com/wired/archive/4.01/white.paper_pr.html";>An
+       explanation of the White Paper:
+       The Copyright Grab</a>, Pamela Samuelson, Wired, Jan. 1996</li>
+
+  <li><a href="http://www.law.duke.edu/boylesite/sold_out.htm";>Sold Out</a>,
+       James Boyle, New York Times, 31 March 1996</li>
+
+  <li><a 
href="http://web.archive.org/web/20130508120533/http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html";>Public
 Data or Private Data</a>, 
+       Washington Post, 4 Nov 1996. </li>
+ 
+  <li><a 
href="https://web.archive.org/web/20151113122141/http://public-domain.org/";>Union
 for the Public
+       Domain</a>&mdash;an organization which aims to resist and
+       reverse the overextension of copyright and patent powers.</li>
+</ul>
+
+<h4>Other Texts to Read</h4>
+
+<ul>
+       <li><a href="/philosophy/philosophy.html">Philosophy of the
+       GNU Project</a></li>
+       <li><a 
href="http://www.computerworld.com/article/2596679/networking/copy-protection--just-say-no.html";
+               id="copy-protection">Copy Protection: Just Say No</a>,
+               published in Computer World.</li>
+</ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:address@hidden";>
+        &lt;address@hidden&gt;</a>.</p>
+
+        <p>For information on coordinating and submitting translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 1996, 2002, 2007, 2009, 2010, 2014, 2015, 2016 Richard 
Stallman</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2017/12/21 13:59:35 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]