www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-microsoft.de-diff.ht...


From: GNUN
Subject: www/proprietary/po malware-microsoft.de-diff.ht...
Date: Wed, 10 Oct 2018 03:58:37 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/10 03:58:36

Modified files:
        proprietary/po : malware-microsoft.de-diff.html 
                         malware-microsoft.de.po malware-microsoft.es.po 
                         malware-microsoft.fr.po 
                         malware-microsoft.it-diff.html 
                         malware-microsoft.it.po 
                         malware-microsoft.ja-diff.html 
                         malware-microsoft.ja.po malware-microsoft.pot 
                         malware-microsoft.ru.po 
                         proprietary-sabotage.de.po 
                         proprietary-sabotage.fr.po 
                         proprietary-sabotage.it-diff.html 
                         proprietary-sabotage.it.po 
                         proprietary-sabotage.ja-diff.html 
                         proprietary-sabotage.ja.po 
                         proprietary-sabotage.pot 
                         proprietary-sabotage.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.142&r2=1.143

Patches:
Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-microsoft.de-diff.html      9 Oct 2018 12:28:17 -0000       1.14
+++ malware-microsoft.de-diff.html      10 Oct 2018 07:58:35 -0000      1.15
@@ -414,8 +414,9 @@
     href="/proprietary/proprietary-back-doors.html#windows-update"&gt;
     universal back door&lt;/a&gt;. Not only did</em></ins></span> the <span 
class="removed"><del><strong>users dependent on Microsoft, 
because</strong></del></span> <span class="inserted"><ins><em>unwanted 
downloads &lt;a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/"&gt;
-    use up much needed resources&lt;/a&gt;, but many of the people who let
-    installation proceed found out that this &ldquo;upgrade&rdquo; was in fact 
a &lt;a
+    jeopardize important operations in regions of the world with poor
+    connectivity&lt;/a&gt;, but many of the people who let installation proceed
+    found out that this &ldquo;upgrade&rdquo; was in fact a &lt;a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     downgrade&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -870,7 +871,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 07:58:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- malware-microsoft.de.po     7 Oct 2018 19:58:31 -0000       1.123
+++ malware-microsoft.de.po     10 Oct 2018 07:58:35 -0000      1.124
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -655,10 +655,11 @@
 "Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
 "doors.html#windows-update\"> universal back door</a>. Not only did the "
 "unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/";
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this &ldquo;"
-"upgrade&rdquo; was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-";
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this &ldquo;upgrade&rdquo; was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-";
+"unwanted-window-1782666146\"> downgrade</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- malware-microsoft.es.po     7 Oct 2018 19:58:31 -0000       1.120
+++ malware-microsoft.es.po     10 Oct 2018 07:58:35 -0000      1.121
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -614,10 +614,11 @@
 "Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
 "doors.html#windows-update\"> universal back door</a>. Not only did the "
 "unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/";
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this &ldquo;"
-"upgrade&rdquo; was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-";
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this &ldquo;upgrade&rdquo; was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-";
+"unwanted-window-1782666146\"> downgrade</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- malware-microsoft.fr.po     8 Oct 2018 17:12:34 -0000       1.136
+++ malware-microsoft.fr.po     10 Oct 2018 07:58:35 -0000      1.137
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
 "PO-Revision-Date: 2018-10-08 19:03+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-10 07:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -520,6 +521,35 @@
 "permettre aux utilisateurs de le faire."
 
 #. type: Content of: <ul><li><p>
+# | In its efforts to trick users of Windows 7 and 8 into installing
+# | all-spying Windows 10 against their will, Microsoft forced their computers
+# | to <a
+# | 
href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1\";>
+# | silently download&hellip; the whole of Windows 10</a>! Apparently, this
+# | was done through a <a
+# | href=\"/proprietary/proprietary-back-doors.html#windows-update\">
+# | universal back door</a>. Not only did the unwanted downloads <a
+# | 
href=\"https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/\";>
+# | [-use up much needed resources</a>,-] {+jeopardize important operations in
+# | regions of the world with poor connectivity</a>,+} but many of the people
+# | who let installation proceed found out that this &ldquo;upgrade&rdquo; was
+# | in fact a <a
+# | 
href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\";>
+# | downgrade</a>.
+#, fuzzy
+#| msgid ""
+#| "In its efforts to trick users of Windows 7 and 8 into installing all-"
+#| "spying Windows 10 against their will, Microsoft forced their computers to "
+#| "<a href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-";
+#| "downloading-windows-1\"> silently download&hellip; the whole of Windows "
+#| "10</a>! Apparently, this was done through a <a href=\"/proprietary/"
+#| "proprietary-back-doors.html#windows-update\"> universal back door</a>. "
+#| "Not only did the unwanted downloads <a href=\"https://www.theregister.co.";
+#| "uk/2016/06/03/windows_10_upgrade_satellite_link/\"> use up much needed "
+#| "resources</a>, but many of the people who let installation proceed found "
+#| "out that this &ldquo;upgrade&rdquo; was in fact a <a href=\"http://";
+#| "gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-"
+#| "window-1782666146\"> downgrade</a>."
 msgid ""
 "In its efforts to trick users of Windows 7 and 8 into installing all-spying "
 "Windows 10 against their will, Microsoft forced their computers to <a href="
@@ -528,10 +558,11 @@
 "Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
 "doors.html#windows-update\"> universal back door</a>. Not only did the "
 "unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/";
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this &ldquo;"
-"upgrade&rdquo; was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-";
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this &ldquo;upgrade&rdquo; was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-";
+"unwanted-window-1782666146\"> downgrade</a>."
 msgstr ""
 "Parmi les pièges que Microsoft a tendus aux utilisateurs de Windows 7 et 8 "
 "pour qu'ils installent Windows 10 contre leur gré, il y a eu le <a href="

Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- malware-microsoft.it-diff.html      9 Oct 2018 12:28:17 -0000       1.13
+++ malware-microsoft.it-diff.html      10 Oct 2018 07:58:35 -0000      1.14
@@ -428,8 +428,9 @@
     href="/proprietary/proprietary-back-doors.html#windows-update"&gt;
     universal back door&lt;/a&gt;. Not only did the unwanted downloads &lt;a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/"&gt;
-    use up much needed resources&lt;/a&gt;, but many of the people who let
-    installation proceed found out</em></ins></span> that <span 
class="inserted"><ins><em>this &ldquo;upgrade&rdquo; was in fact a &lt;a
+    jeopardize important operations in regions of the world with poor
+    connectivity&lt;/a&gt;, but many of the people who let installation proceed
+    found out</em></ins></span> that <span class="inserted"><ins><em>this 
&ldquo;upgrade&rdquo; was in fact a &lt;a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     downgrade&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -864,7 +865,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 07:58:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- malware-microsoft.it.po     7 Oct 2018 19:58:31 -0000       1.128
+++ malware-microsoft.it.po     10 Oct 2018 07:58:35 -0000      1.129
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:06+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -609,10 +609,11 @@
 "Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
 "doors.html#windows-update\"> universal back door</a>. Not only did the "
 "unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/";
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this &ldquo;"
-"upgrade&rdquo; was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-";
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this &ldquo;upgrade&rdquo; was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-";
+"unwanted-window-1782666146\"> downgrade</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- malware-microsoft.ja-diff.html      9 Oct 2018 12:28:17 -0000       1.24
+++ malware-microsoft.ja-diff.html      10 Oct 2018 07:58:35 -0000      1.25
@@ -370,8 +370,9 @@
     href="/proprietary/proprietary-back-doors.html#windows-update"&gt;
     universal back door&lt;/a&gt;. Not only did the unwanted downloads &lt;a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/"&gt;
-    use up much needed resources&lt;/a&gt;, but many of the people who let
-    installation proceed found out that this &ldquo;upgrade&rdquo; was in fact 
a &lt;a
+    jeopardize important operations in regions of the world with poor
+    connectivity&lt;/a&gt;, but many of the people who let installation proceed
+    found out that this &ldquo;upgrade&rdquo; was in fact a &lt;a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     downgrade&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -833,7 +834,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 07:58:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-microsoft.ja.po     7 Oct 2018 19:58:31 -0000       1.103
+++ malware-microsoft.ja.po     10 Oct 2018 07:58:35 -0000      1.104
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:57+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -521,10 +521,11 @@
 "Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
 "doors.html#windows-update\"> universal back door</a>. Not only did the "
 "unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/";
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this &ldquo;"
-"upgrade&rdquo; was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-";
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this &ldquo;upgrade&rdquo; was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-";
+"unwanted-window-1782666146\"> downgrade</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- malware-microsoft.pot       7 Oct 2018 19:58:31 -0000       1.68
+++ malware-microsoft.pot       10 Oct 2018 07:58:35 -0000      1.69
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -367,9 +367,9 @@
 "href=\"/proprietary/proprietary-back-doors.html#windows-update\"> universal "
 "back door</a>. Not only did the unwanted downloads <a "
 
"href=\"https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/\";>
 "
-"use up much needed resources</a>, but many of the people who let "
-"installation proceed found out that this &ldquo;upgrade&rdquo; was in fact a "
-"<a "
+"jeopardize important operations in regions of the world with poor "
+"connectivity</a>, but many of the people who let installation proceed found "
+"out that this &ldquo;upgrade&rdquo; was in fact a <a "
 
"href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\";>
 "
 "downgrade</a>."
 msgstr ""

Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- malware-microsoft.ru.po     8 Oct 2018 07:58:03 -0000       1.177
+++ malware-microsoft.ru.po     10 Oct 2018 07:58:36 -0000      1.178
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
 "PO-Revision-Date: 2018-10-08 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-10 07:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -511,6 +512,35 @@
 "позволить делать это пользователям."
 
 #. type: Content of: <ul><li><p>
+# | In its efforts to trick users of Windows 7 and 8 into installing
+# | all-spying Windows 10 against their will, Microsoft forced their computers
+# | to <a
+# | 
href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1\";>
+# | silently download&hellip; the whole of Windows 10</a>! Apparently, this
+# | was done through a <a
+# | href=\"/proprietary/proprietary-back-doors.html#windows-update\">
+# | universal back door</a>. Not only did the unwanted downloads <a
+# | 
href=\"https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/\";>
+# | [-use up much needed resources</a>,-] {+jeopardize important operations in
+# | regions of the world with poor connectivity</a>,+} but many of the people
+# | who let installation proceed found out that this &ldquo;upgrade&rdquo; was
+# | in fact a <a
+# | 
href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\";>
+# | downgrade</a>.
+#, fuzzy
+#| msgid ""
+#| "In its efforts to trick users of Windows 7 and 8 into installing all-"
+#| "spying Windows 10 against their will, Microsoft forced their computers to "
+#| "<a href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-";
+#| "downloading-windows-1\"> silently download&hellip; the whole of Windows "
+#| "10</a>! Apparently, this was done through a <a href=\"/proprietary/"
+#| "proprietary-back-doors.html#windows-update\"> universal back door</a>. "
+#| "Not only did the unwanted downloads <a href=\"https://www.theregister.co.";
+#| "uk/2016/06/03/windows_10_upgrade_satellite_link/\"> use up much needed "
+#| "resources</a>, but many of the people who let installation proceed found "
+#| "out that this &ldquo;upgrade&rdquo; was in fact a <a href=\"http://";
+#| "gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-"
+#| "window-1782666146\"> downgrade</a>."
 msgid ""
 "In its efforts to trick users of Windows 7 and 8 into installing all-spying "
 "Windows 10 against their will, Microsoft forced their computers to <a href="
@@ -519,10 +549,11 @@
 "Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
 "doors.html#windows-update\"> universal back door</a>. Not only did the "
 "unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/";
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this &ldquo;"
-"upgrade&rdquo; was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-";
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this &ldquo;upgrade&rdquo; was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-";
+"unwanted-window-1782666146\"> downgrade</a>."
 msgstr ""
 "В своих попытках обманом заставить 
пользователей Windows 7 и 8 установить "
 "всешпионящую Windows 10 против их воли Microsoft 
принуждала их компьютеры <a "

Index: proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary-sabotage.de.po  7 Oct 2018 21:58:26 -0000       1.101
+++ proprietary-sabotage.de.po  10 Oct 2018 07:58:36 -0000      1.102
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-07 21:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
 "PO-Revision-Date: 2018-08-29 02:40+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -394,10 +394,11 @@
 "Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
 "doors.html#windows-update\"> universal back door</a>. Not only did the "
 "unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/";
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this &ldquo;"
-"upgrade&rdquo; was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-";
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this &ldquo;upgrade&rdquo; was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-";
+"unwanted-window-1782666146\"> downgrade</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary-sabotage.fr.po  8 Oct 2018 17:12:34 -0000       1.108
+++ proprietary-sabotage.fr.po  10 Oct 2018 07:58:36 -0000      1.109
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-07 21:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
 "PO-Revision-Date: 2018-10-08 19:03+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-10 07:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -370,6 +371,35 @@
 "autres fabricants</a>."
 
 #. type: Content of: <ul><li><p>
+# | In its efforts to trick users of Windows 7 and 8 into installing
+# | all-spying Windows 10 against their will, Microsoft forced their computers
+# | to <a
+# | 
href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1\";>
+# | silently download&hellip; the whole of Windows 10</a>! Apparently, this
+# | was done through a <a
+# | href=\"/proprietary/proprietary-back-doors.html#windows-update\">
+# | universal back door</a>. Not only did the unwanted downloads <a
+# | 
href=\"https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/\";>
+# | [-use up much needed resources</a>,-] {+jeopardize important operations in
+# | regions of the world with poor connectivity</a>,+} but many of the people
+# | who let installation proceed found out that this &ldquo;upgrade&rdquo; was
+# | in fact a <a
+# | 
href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\";>
+# | downgrade</a>.
+#, fuzzy
+#| msgid ""
+#| "In its efforts to trick users of Windows 7 and 8 into installing all-"
+#| "spying Windows 10 against their will, Microsoft forced their computers to "
+#| "<a href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-";
+#| "downloading-windows-1\"> silently download&hellip; the whole of Windows "
+#| "10</a>! Apparently, this was done through a <a href=\"/proprietary/"
+#| "proprietary-back-doors.html#windows-update\"> universal back door</a>. "
+#| "Not only did the unwanted downloads <a href=\"https://www.theregister.co.";
+#| "uk/2016/06/03/windows_10_upgrade_satellite_link/\"> use up much needed "
+#| "resources</a>, but many of the people who let installation proceed found "
+#| "out that this &ldquo;upgrade&rdquo; was in fact a <a href=\"http://";
+#| "gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-"
+#| "window-1782666146\"> downgrade</a>."
 msgid ""
 "In its efforts to trick users of Windows 7 and 8 into installing all-spying "
 "Windows 10 against their will, Microsoft forced their computers to <a href="
@@ -378,10 +408,11 @@
 "Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
 "doors.html#windows-update\"> universal back door</a>. Not only did the "
 "unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/";
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this &ldquo;"
-"upgrade&rdquo; was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-";
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this &ldquo;upgrade&rdquo; was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-";
+"unwanted-window-1782666146\"> downgrade</a>."
 msgstr ""
 "Parmi les pièges que Microsoft a tendus aux utilisateurs de Windows 7 et 8 "
 "pour qu'ils installent Windows 10 contre leur gré, il y a eu le <a href="

Index: proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-sabotage.it-diff.html   9 Oct 2018 12:28:17 -0000       1.16
+++ proprietary-sabotage.it-diff.html   10 Oct 2018 07:58:36 -0000      1.17
@@ -241,8 +241,9 @@
     href="/proprietary/proprietary-back-doors.html#windows-update"&gt;
     universal back door&lt;/a&gt;. Not only did the unwanted downloads &lt;a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/"&gt;
-    use up much needed resources&lt;/a&gt;, but many of the people who let
-    installation proceed found out that this &ldquo;upgrade&rdquo; was in fact 
a &lt;a
+    jeopardize important operations in regions of the world with poor
+    connectivity&lt;/a&gt;, but many of the people who let installation proceed
+    found out that this &ldquo;upgrade&rdquo; was in fact a &lt;a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     downgrade&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -686,7 +687,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 07:58:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary-sabotage.it.po  7 Oct 2018 21:58:26 -0000       1.94
+++ proprietary-sabotage.it.po  10 Oct 2018 07:58:36 -0000      1.95
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-07 21:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
 "PO-Revision-Date: 2017-07-06 22:45+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -354,10 +354,11 @@
 "Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
 "doors.html#windows-update\"> universal back door</a>. Not only did the "
 "unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/";
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this &ldquo;"
-"upgrade&rdquo; was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-";
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this &ldquo;upgrade&rdquo; was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-";
+"unwanted-window-1782666146\"> downgrade</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-sabotage.ja-diff.html   9 Oct 2018 12:28:17 -0000       1.20
+++ proprietary-sabotage.ja-diff.html   10 Oct 2018 07:58:36 -0000      1.21
@@ -227,8 +227,9 @@
     href="/proprietary/proprietary-back-doors.html#windows-update"&gt;
     universal back door&lt;/a&gt;. Not only did the unwanted downloads &lt;a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/"&gt;
-    use up much needed resources&lt;/a&gt;, but many of the people who let
-    installation proceed found out that this &ldquo;upgrade&rdquo; was in fact 
a &lt;a
+    jeopardize important operations in regions of the world with poor
+    connectivity&lt;/a&gt;, but many of the people who let installation proceed
+    found out that this &ldquo;upgrade&rdquo; was in fact a &lt;a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     downgrade&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -672,7 +673,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 07:58:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-sabotage.ja.po  7 Oct 2018 21:58:26 -0000       1.86
+++ proprietary-sabotage.ja.po  10 Oct 2018 07:58:36 -0000      1.87
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-07 21:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
 "PO-Revision-Date: 2017-01-04 10:15+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -292,10 +292,11 @@
 "Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
 "doors.html#windows-update\"> universal back door</a>. Not only did the "
 "unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/";
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this &ldquo;"
-"upgrade&rdquo; was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-";
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this &ldquo;upgrade&rdquo; was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-";
+"unwanted-window-1782666146\"> downgrade</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary-sabotage.pot    7 Oct 2018 21:58:26 -0000       1.54
+++ proprietary-sabotage.pot    10 Oct 2018 07:58:36 -0000      1.55
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-07 21:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -261,9 +261,9 @@
 "href=\"/proprietary/proprietary-back-doors.html#windows-update\"> universal "
 "back door</a>. Not only did the unwanted downloads <a "
 
"href=\"https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/\";>
 "
-"use up much needed resources</a>, but many of the people who let "
-"installation proceed found out that this &ldquo;upgrade&rdquo; was in fact a "
-"<a "
+"jeopardize important operations in regions of the world with poor "
+"connectivity</a>, but many of the people who let installation proceed found "
+"out that this &ldquo;upgrade&rdquo; was in fact a <a "
 
"href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\";>
 "
 "downgrade</a>."
 msgstr ""

Index: proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary-sabotage.ru.po  8 Oct 2018 07:58:03 -0000       1.142
+++ proprietary-sabotage.ru.po  10 Oct 2018 07:58:36 -0000      1.143
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-07 21:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
 "PO-Revision-Date: 2018-10-08 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-10 07:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -365,6 +366,35 @@
 "производителей</a>."
 
 #. type: Content of: <ul><li><p>
+# | In its efforts to trick users of Windows 7 and 8 into installing
+# | all-spying Windows 10 against their will, Microsoft forced their computers
+# | to <a
+# | 
href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1\";>
+# | silently download&hellip; the whole of Windows 10</a>! Apparently, this
+# | was done through a <a
+# | href=\"/proprietary/proprietary-back-doors.html#windows-update\">
+# | universal back door</a>. Not only did the unwanted downloads <a
+# | 
href=\"https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/\";>
+# | [-use up much needed resources</a>,-] {+jeopardize important operations in
+# | regions of the world with poor connectivity</a>,+} but many of the people
+# | who let installation proceed found out that this &ldquo;upgrade&rdquo; was
+# | in fact a <a
+# | 
href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\";>
+# | downgrade</a>.
+#, fuzzy
+#| msgid ""
+#| "In its efforts to trick users of Windows 7 and 8 into installing all-"
+#| "spying Windows 10 against their will, Microsoft forced their computers to "
+#| "<a href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-";
+#| "downloading-windows-1\"> silently download&hellip; the whole of Windows "
+#| "10</a>! Apparently, this was done through a <a href=\"/proprietary/"
+#| "proprietary-back-doors.html#windows-update\"> universal back door</a>. "
+#| "Not only did the unwanted downloads <a href=\"https://www.theregister.co.";
+#| "uk/2016/06/03/windows_10_upgrade_satellite_link/\"> use up much needed "
+#| "resources</a>, but many of the people who let installation proceed found "
+#| "out that this &ldquo;upgrade&rdquo; was in fact a <a href=\"http://";
+#| "gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-"
+#| "window-1782666146\"> downgrade</a>."
 msgid ""
 "In its efforts to trick users of Windows 7 and 8 into installing all-spying "
 "Windows 10 against their will, Microsoft forced their computers to <a href="
@@ -373,10 +403,11 @@
 "Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
 "doors.html#windows-update\"> universal back door</a>. Not only did the "
 "unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/";
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this &ldquo;"
-"upgrade&rdquo; was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-";
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this &ldquo;upgrade&rdquo; was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-";
+"unwanted-window-1782666146\"> downgrade</a>."
 msgstr ""
 "В своих попытках обманом заставить 
пользователей Windows 7 и 8 установить "
 "всешпионящую Windows 10 против их воли Microsoft 
принуждала их компьютеры <a "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]