[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-microsoft.de-diff.ht...
From: |
GNUN |
Subject: |
www/proprietary/po malware-microsoft.de-diff.ht... |
Date: |
Wed, 10 Oct 2018 03:58:37 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/10 03:58:36
Modified files:
proprietary/po : malware-microsoft.de-diff.html
malware-microsoft.de.po malware-microsoft.es.po
malware-microsoft.fr.po
malware-microsoft.it-diff.html
malware-microsoft.it.po
malware-microsoft.ja-diff.html
malware-microsoft.ja.po malware-microsoft.pot
malware-microsoft.ru.po
proprietary-sabotage.de.po
proprietary-sabotage.fr.po
proprietary-sabotage.it-diff.html
proprietary-sabotage.it.po
proprietary-sabotage.ja-diff.html
proprietary-sabotage.ja.po
proprietary-sabotage.pot
proprietary-sabotage.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.142&r2=1.143
Patches:
Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-microsoft.de-diff.html 9 Oct 2018 12:28:17 -0000 1.14
+++ malware-microsoft.de-diff.html 10 Oct 2018 07:58:35 -0000 1.15
@@ -414,8 +414,9 @@
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did</em></ins></span> the <span
class="removed"><del><strong>users dependent on Microsoft,
because</strong></del></span> <span class="inserted"><ins><em>unwanted
downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
- use up much needed resources</a>, but many of the people who let
- installation proceed found out that this “upgrade” was in fact
a <a
+ jeopardize important operations in regions of the world with poor
+ connectivity</a>, but many of the people who let installation proceed
+ found out that this “upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
@@ -870,7 +871,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 07:58:35 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- malware-microsoft.de.po 7 Oct 2018 19:58:31 -0000 1.123
+++ malware-microsoft.de.po 10 Oct 2018 07:58:35 -0000 1.124
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -655,10 +655,11 @@
"Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
"doors.html#windows-update\"> universal back door</a>. Not only did the "
"unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/"
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this “"
-"upgrade” was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-"
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this “upgrade” was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-"
+"unwanted-window-1782666146\"> downgrade</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- malware-microsoft.es.po 7 Oct 2018 19:58:31 -0000 1.120
+++ malware-microsoft.es.po 10 Oct 2018 07:58:35 -0000 1.121
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -614,10 +614,11 @@
"Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
"doors.html#windows-update\"> universal back door</a>. Not only did the "
"unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/"
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this “"
-"upgrade” was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-"
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this “upgrade” was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-"
+"unwanted-window-1782666146\"> downgrade</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- malware-microsoft.fr.po 8 Oct 2018 17:12:34 -0000 1.136
+++ malware-microsoft.fr.po 10 Oct 2018 07:58:35 -0000 1.137
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
"PO-Revision-Date: 2018-10-08 19:03+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-10 07:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -520,6 +521,35 @@
"permettre aux utilisateurs de le faire."
#. type: Content of: <ul><li><p>
+# | In its efforts to trick users of Windows 7 and 8 into installing
+# | all-spying Windows 10 against their will, Microsoft forced their computers
+# | to <a
+# |
href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1\">
+# | silently download… the whole of Windows 10</a>! Apparently, this
+# | was done through a <a
+# | href=\"/proprietary/proprietary-back-doors.html#windows-update\">
+# | universal back door</a>. Not only did the unwanted downloads <a
+# |
href=\"https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/\">
+# | [-use up much needed resources</a>,-] {+jeopardize important operations in
+# | regions of the world with poor connectivity</a>,+} but many of the people
+# | who let installation proceed found out that this “upgrade” was
+# | in fact a <a
+# |
href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\">
+# | downgrade</a>.
+#, fuzzy
+#| msgid ""
+#| "In its efforts to trick users of Windows 7 and 8 into installing all-"
+#| "spying Windows 10 against their will, Microsoft forced their computers to "
+#| "<a href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-"
+#| "downloading-windows-1\"> silently download… the whole of Windows "
+#| "10</a>! Apparently, this was done through a <a href=\"/proprietary/"
+#| "proprietary-back-doors.html#windows-update\"> universal back door</a>. "
+#| "Not only did the unwanted downloads <a href=\"https://www.theregister.co."
+#| "uk/2016/06/03/windows_10_upgrade_satellite_link/\"> use up much needed "
+#| "resources</a>, but many of the people who let installation proceed found "
+#| "out that this “upgrade” was in fact a <a href=\"http://"
+#| "gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-"
+#| "window-1782666146\"> downgrade</a>."
msgid ""
"In its efforts to trick users of Windows 7 and 8 into installing all-spying "
"Windows 10 against their will, Microsoft forced their computers to <a href="
@@ -528,10 +558,11 @@
"Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
"doors.html#windows-update\"> universal back door</a>. Not only did the "
"unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/"
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this “"
-"upgrade” was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-"
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this “upgrade” was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-"
+"unwanted-window-1782666146\"> downgrade</a>."
msgstr ""
"Parmi les pièges que Microsoft a tendus aux utilisateurs de Windows 7 et 8 "
"pour qu'ils installent Windows 10 contre leur gré, il y a eu le <a href="
Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- malware-microsoft.it-diff.html 9 Oct 2018 12:28:17 -0000 1.13
+++ malware-microsoft.it-diff.html 10 Oct 2018 07:58:35 -0000 1.14
@@ -428,8 +428,9 @@
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
- use up much needed resources</a>, but many of the people who let
- installation proceed found out</em></ins></span> that <span
class="inserted"><ins><em>this “upgrade” was in fact a <a
+ jeopardize important operations in regions of the world with poor
+ connectivity</a>, but many of the people who let installation proceed
+ found out</em></ins></span> that <span class="inserted"><ins><em>this
“upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
@@ -864,7 +865,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 07:58:35 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- malware-microsoft.it.po 7 Oct 2018 19:58:31 -0000 1.128
+++ malware-microsoft.it.po 10 Oct 2018 07:58:35 -0000 1.129
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:06+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -609,10 +609,11 @@
"Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
"doors.html#windows-update\"> universal back door</a>. Not only did the "
"unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/"
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this “"
-"upgrade” was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-"
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this “upgrade” was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-"
+"unwanted-window-1782666146\"> downgrade</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- malware-microsoft.ja-diff.html 9 Oct 2018 12:28:17 -0000 1.24
+++ malware-microsoft.ja-diff.html 10 Oct 2018 07:58:35 -0000 1.25
@@ -370,8 +370,9 @@
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
- use up much needed resources</a>, but many of the people who let
- installation proceed found out that this “upgrade” was in fact
a <a
+ jeopardize important operations in regions of the world with poor
+ connectivity</a>, but many of the people who let installation proceed
+ found out that this “upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
@@ -833,7 +834,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 07:58:35 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-microsoft.ja.po 7 Oct 2018 19:58:31 -0000 1.103
+++ malware-microsoft.ja.po 10 Oct 2018 07:58:35 -0000 1.104
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
"PO-Revision-Date: 2016-12-20 14:57+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -521,10 +521,11 @@
"Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
"doors.html#windows-update\"> universal back door</a>. Not only did the "
"unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/"
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this “"
-"upgrade” was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-"
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this “upgrade” was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-"
+"unwanted-window-1782666146\"> downgrade</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- malware-microsoft.pot 7 Oct 2018 19:58:31 -0000 1.68
+++ malware-microsoft.pot 10 Oct 2018 07:58:35 -0000 1.69
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -367,9 +367,9 @@
"href=\"/proprietary/proprietary-back-doors.html#windows-update\"> universal "
"back door</a>. Not only did the unwanted downloads <a "
"href=\"https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/\">
"
-"use up much needed resources</a>, but many of the people who let "
-"installation proceed found out that this “upgrade” was in fact a "
-"<a "
+"jeopardize important operations in regions of the world with poor "
+"connectivity</a>, but many of the people who let installation proceed found "
+"out that this “upgrade” was in fact a <a "
"href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\">
"
"downgrade</a>."
msgstr ""
Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- malware-microsoft.ru.po 8 Oct 2018 07:58:03 -0000 1.177
+++ malware-microsoft.ru.po 10 Oct 2018 07:58:36 -0000 1.178
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-07 19:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
"PO-Revision-Date: 2018-10-08 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-10 07:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -511,6 +512,35 @@
"позволиÑÑ Ð´ÐµÐ»Ð°ÑÑ ÑÑо полÑзоваÑелÑм."
#. type: Content of: <ul><li><p>
+# | In its efforts to trick users of Windows 7 and 8 into installing
+# | all-spying Windows 10 against their will, Microsoft forced their computers
+# | to <a
+# |
href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1\">
+# | silently download… the whole of Windows 10</a>! Apparently, this
+# | was done through a <a
+# | href=\"/proprietary/proprietary-back-doors.html#windows-update\">
+# | universal back door</a>. Not only did the unwanted downloads <a
+# |
href=\"https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/\">
+# | [-use up much needed resources</a>,-] {+jeopardize important operations in
+# | regions of the world with poor connectivity</a>,+} but many of the people
+# | who let installation proceed found out that this “upgrade” was
+# | in fact a <a
+# |
href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\">
+# | downgrade</a>.
+#, fuzzy
+#| msgid ""
+#| "In its efforts to trick users of Windows 7 and 8 into installing all-"
+#| "spying Windows 10 against their will, Microsoft forced their computers to "
+#| "<a href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-"
+#| "downloading-windows-1\"> silently download… the whole of Windows "
+#| "10</a>! Apparently, this was done through a <a href=\"/proprietary/"
+#| "proprietary-back-doors.html#windows-update\"> universal back door</a>. "
+#| "Not only did the unwanted downloads <a href=\"https://www.theregister.co."
+#| "uk/2016/06/03/windows_10_upgrade_satellite_link/\"> use up much needed "
+#| "resources</a>, but many of the people who let installation proceed found "
+#| "out that this “upgrade” was in fact a <a href=\"http://"
+#| "gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-"
+#| "window-1782666146\"> downgrade</a>."
msgid ""
"In its efforts to trick users of Windows 7 and 8 into installing all-spying "
"Windows 10 against their will, Microsoft forced their computers to <a href="
@@ -519,10 +549,11 @@
"Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
"doors.html#windows-update\"> universal back door</a>. Not only did the "
"unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/"
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this “"
-"upgrade” was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-"
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this “upgrade” was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-"
+"unwanted-window-1782666146\"> downgrade</a>."
msgstr ""
"Ð ÑвоиÑ
попÑÑкаÑ
обманом заÑÑавиÑÑ
полÑзоваÑелей Windows 7 и 8 ÑÑÑановиÑÑ "
"вÑеÑпионÑÑÑÑ Windows 10 пÑоÑив иÑ
воли Microsoft
пÑинÑждала иÑ
компÑÑÑеÑÑ <a "
Index: proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary-sabotage.de.po 7 Oct 2018 21:58:26 -0000 1.101
+++ proprietary-sabotage.de.po 10 Oct 2018 07:58:36 -0000 1.102
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-07 21:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
"PO-Revision-Date: 2018-08-29 02:40+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -394,10 +394,11 @@
"Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
"doors.html#windows-update\"> universal back door</a>. Not only did the "
"unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/"
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this “"
-"upgrade” was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-"
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this “upgrade” was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-"
+"unwanted-window-1782666146\"> downgrade</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary-sabotage.fr.po 8 Oct 2018 17:12:34 -0000 1.108
+++ proprietary-sabotage.fr.po 10 Oct 2018 07:58:36 -0000 1.109
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-07 21:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
"PO-Revision-Date: 2018-10-08 19:03+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-10 07:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -370,6 +371,35 @@
"autres fabricants</a>."
#. type: Content of: <ul><li><p>
+# | In its efforts to trick users of Windows 7 and 8 into installing
+# | all-spying Windows 10 against their will, Microsoft forced their computers
+# | to <a
+# |
href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1\">
+# | silently download… the whole of Windows 10</a>! Apparently, this
+# | was done through a <a
+# | href=\"/proprietary/proprietary-back-doors.html#windows-update\">
+# | universal back door</a>. Not only did the unwanted downloads <a
+# |
href=\"https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/\">
+# | [-use up much needed resources</a>,-] {+jeopardize important operations in
+# | regions of the world with poor connectivity</a>,+} but many of the people
+# | who let installation proceed found out that this “upgrade” was
+# | in fact a <a
+# |
href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\">
+# | downgrade</a>.
+#, fuzzy
+#| msgid ""
+#| "In its efforts to trick users of Windows 7 and 8 into installing all-"
+#| "spying Windows 10 against their will, Microsoft forced their computers to "
+#| "<a href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-"
+#| "downloading-windows-1\"> silently download… the whole of Windows "
+#| "10</a>! Apparently, this was done through a <a href=\"/proprietary/"
+#| "proprietary-back-doors.html#windows-update\"> universal back door</a>. "
+#| "Not only did the unwanted downloads <a href=\"https://www.theregister.co."
+#| "uk/2016/06/03/windows_10_upgrade_satellite_link/\"> use up much needed "
+#| "resources</a>, but many of the people who let installation proceed found "
+#| "out that this “upgrade” was in fact a <a href=\"http://"
+#| "gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-"
+#| "window-1782666146\"> downgrade</a>."
msgid ""
"In its efforts to trick users of Windows 7 and 8 into installing all-spying "
"Windows 10 against their will, Microsoft forced their computers to <a href="
@@ -378,10 +408,11 @@
"Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
"doors.html#windows-update\"> universal back door</a>. Not only did the "
"unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/"
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this “"
-"upgrade” was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-"
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this “upgrade” was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-"
+"unwanted-window-1782666146\"> downgrade</a>."
msgstr ""
"Parmi les pièges que Microsoft a tendus aux utilisateurs de Windows 7 et 8 "
"pour qu'ils installent Windows 10 contre leur gré, il y a eu le <a href="
Index: proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-sabotage.it-diff.html 9 Oct 2018 12:28:17 -0000 1.16
+++ proprietary-sabotage.it-diff.html 10 Oct 2018 07:58:36 -0000 1.17
@@ -241,8 +241,9 @@
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
- use up much needed resources</a>, but many of the people who let
- installation proceed found out that this “upgrade” was in fact
a <a
+ jeopardize important operations in regions of the world with poor
+ connectivity</a>, but many of the people who let installation proceed
+ found out that this “upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
@@ -686,7 +687,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 07:58:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary-sabotage.it.po 7 Oct 2018 21:58:26 -0000 1.94
+++ proprietary-sabotage.it.po 10 Oct 2018 07:58:36 -0000 1.95
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-07 21:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
"PO-Revision-Date: 2017-07-06 22:45+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -354,10 +354,11 @@
"Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
"doors.html#windows-update\"> universal back door</a>. Not only did the "
"unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/"
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this “"
-"upgrade” was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-"
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this “upgrade” was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-"
+"unwanted-window-1782666146\"> downgrade</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-sabotage.ja-diff.html 9 Oct 2018 12:28:17 -0000 1.20
+++ proprietary-sabotage.ja-diff.html 10 Oct 2018 07:58:36 -0000 1.21
@@ -227,8 +227,9 @@
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
- use up much needed resources</a>, but many of the people who let
- installation proceed found out that this “upgrade” was in fact
a <a
+ jeopardize important operations in regions of the world with poor
+ connectivity</a>, but many of the people who let installation proceed
+ found out that this “upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
@@ -672,7 +673,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 07:58:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-sabotage.ja.po 7 Oct 2018 21:58:26 -0000 1.86
+++ proprietary-sabotage.ja.po 10 Oct 2018 07:58:36 -0000 1.87
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-07 21:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
"PO-Revision-Date: 2017-01-04 10:15+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -292,10 +292,11 @@
"Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
"doors.html#windows-update\"> universal back door</a>. Not only did the "
"unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/"
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this “"
-"upgrade” was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-"
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this “upgrade” was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-"
+"unwanted-window-1782666146\"> downgrade</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary-sabotage.pot 7 Oct 2018 21:58:26 -0000 1.54
+++ proprietary-sabotage.pot 10 Oct 2018 07:58:36 -0000 1.55
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-07 21:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -261,9 +261,9 @@
"href=\"/proprietary/proprietary-back-doors.html#windows-update\"> universal "
"back door</a>. Not only did the unwanted downloads <a "
"href=\"https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/\">
"
-"use up much needed resources</a>, but many of the people who let "
-"installation proceed found out that this “upgrade” was in fact a "
-"<a "
+"jeopardize important operations in regions of the world with poor "
+"connectivity</a>, but many of the people who let installation proceed found "
+"out that this “upgrade” was in fact a <a "
"href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\">
"
"downgrade</a>."
msgstr ""
Index: proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary-sabotage.ru.po 8 Oct 2018 07:58:03 -0000 1.142
+++ proprietary-sabotage.ru.po 10 Oct 2018 07:58:36 -0000 1.143
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-07 21:56+0000\n"
+"POT-Creation-Date: 2018-10-10 07:55+0000\n"
"PO-Revision-Date: 2018-10-08 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-10 07:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -365,6 +366,35 @@
"пÑоизводиÑелей</a>."
#. type: Content of: <ul><li><p>
+# | In its efforts to trick users of Windows 7 and 8 into installing
+# | all-spying Windows 10 against their will, Microsoft forced their computers
+# | to <a
+# |
href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1\">
+# | silently download… the whole of Windows 10</a>! Apparently, this
+# | was done through a <a
+# | href=\"/proprietary/proprietary-back-doors.html#windows-update\">
+# | universal back door</a>. Not only did the unwanted downloads <a
+# |
href=\"https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/\">
+# | [-use up much needed resources</a>,-] {+jeopardize important operations in
+# | regions of the world with poor connectivity</a>,+} but many of the people
+# | who let installation proceed found out that this “upgrade” was
+# | in fact a <a
+# |
href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\">
+# | downgrade</a>.
+#, fuzzy
+#| msgid ""
+#| "In its efforts to trick users of Windows 7 and 8 into installing all-"
+#| "spying Windows 10 against their will, Microsoft forced their computers to "
+#| "<a href=\"https://www.theguardian.com/technology/2015/sep/11/microsoft-"
+#| "downloading-windows-1\"> silently download… the whole of Windows "
+#| "10</a>! Apparently, this was done through a <a href=\"/proprietary/"
+#| "proprietary-back-doors.html#windows-update\"> universal back door</a>. "
+#| "Not only did the unwanted downloads <a href=\"https://www.theregister.co."
+#| "uk/2016/06/03/windows_10_upgrade_satellite_link/\"> use up much needed "
+#| "resources</a>, but many of the people who let installation proceed found "
+#| "out that this “upgrade” was in fact a <a href=\"http://"
+#| "gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-"
+#| "window-1782666146\"> downgrade</a>."
msgid ""
"In its efforts to trick users of Windows 7 and 8 into installing all-spying "
"Windows 10 against their will, Microsoft forced their computers to <a href="
@@ -373,10 +403,11 @@
"Apparently, this was done through a <a href=\"/proprietary/proprietary-back-"
"doors.html#windows-update\"> universal back door</a>. Not only did the "
"unwanted downloads <a href=\"https://www.theregister.co.uk/2016/06/03/"
-"windows_10_upgrade_satellite_link/\"> use up much needed resources</a>, but "
-"many of the people who let installation proceed found out that this “"
-"upgrade” was in fact a <a href=\"http://gizmodo.com/woman-wins-10-000-"
-"from-microsoft-after-unwanted-window-1782666146\"> downgrade</a>."
+"windows_10_upgrade_satellite_link/\"> jeopardize important operations in "
+"regions of the world with poor connectivity</a>, but many of the people who "
+"let installation proceed found out that this “upgrade” was in "
+"fact a <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-"
+"unwanted-window-1782666146\"> downgrade</a>."
msgstr ""
"Ð ÑвоиÑ
попÑÑкаÑ
обманом заÑÑавиÑÑ
полÑзоваÑелей Windows 7 и 8 ÑÑÑановиÑÑ "
"вÑеÑпионÑÑÑÑ Windows 10 пÑоÑив иÑ
воли Microsoft
пÑинÑждала иÑ
компÑÑÑеÑÑ <a "