[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-games.ru.po malware-...
From: |
Ineiev |
Subject: |
www/proprietary/po malware-games.ru.po malware-... |
Date: |
Sun, 14 Oct 2018 05:53:52 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: Ineiev <ineiev> 18/10/14 05:53:49
Modified files:
proprietary/po : malware-games.ru.po malware-webpages.ru.po
proprietary-interference.ru.po
proprietary.ru.po
Log message:
Update.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ru.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.77&r2=1.78
Patches:
Index: malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-games.ru.po 14 Oct 2018 09:30:25 -0000 1.34
+++ malware-games.ru.po 14 Oct 2018 09:53:49 -0000 1.35
@@ -8,7 +8,7 @@
msgstr ""
"Project-Id-Version: malware-games.html\n"
"POT-Creation-Date: 2018-10-14 09:26+0000\n"
-"PO-Revision-Date: 2018-10-08 16:08+0000\n"
+"PO-Revision-Date: 2018-10-14 16:08+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
"Language: ru\n"
@@ -88,6 +88,11 @@
"systems-with-\"> included a “miner”</a>, i.e. an executable that "
"hijacks the CPU in users' computers to mine a cryptocurrency."
msgstr ""
+"ÐеÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð²Ð¸Ð´ÐµÐ¾Ð¸Ð³Ñа, доÑÑÑÐ¿Ð½Ð°Ñ ÑеÑез
неÑвободнÑй ÐºÐ»Ð¸ÐµÐ½Ñ Steam, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> ÑодеÑжала “майнеÑа”</a>, Ñ.е.
пÑогÑаммÑ, "
+"коÑоÑÐ°Ñ Ð·Ð°Ñ
ваÑÑвала пÑоÑеÑÑÐ¾Ñ Ð²
компÑÑÑеÑе полÑзоваÑелÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑаÑÑ "
+"кÑипÑовалÑÑÑ."
#. type: Content of: <ul><li><p>
msgid ""
Index: malware-webpages.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-webpages.ru.po 14 Oct 2018 09:30:26 -0000 1.19
+++ malware-webpages.ru.po 14 Oct 2018 09:53:49 -0000 1.20
@@ -125,6 +125,15 @@
"href=\"/philosophy/words-to-avoid.html#Content)\">website revision system</"
"a>”.)"
msgstr ""
+"ÐзломÑик воÑполÑзовалÑÑ Ð±ÑеÑÑÑ Ð²
необновленной пÑогÑамме Ð´Ð»Ñ <a href="
+"\"https://www.pcmag.com/news/360968/400-websites-secretly-served-"
+"cryptocurrency-miners-to-visito\"> вÑÑавки
“майнеÑа” на "
+"ÑÑÑаниÑаÑ
ÑайÑа</a>, пеÑедаваемÑÑ
поÑеÑиÑелÑм. Такого Ñода вÑедоноÑнÑе "
+"пÑогÑÐ°Ð¼Ð¼Ñ Ð·Ð°Ñ
ваÑÑваÑÑ Ð¿ÑоÑеÑÑоÑ
компÑÑÑеÑа, ÑÑÐ¾Ð±Ñ Ð²ÑÑабаÑÑваÑÑ
кÑипÑовалÑÑÑ. "
+"(ÐбÑаÑаем ваÑе внимание, ÑÑо в ÑÑаÑÑе
заÑаженнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°Ð·ÑваÑÑÑÑ “"
+"ÑиÑÑемой ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½ÑенÑом”. ÐÑÑÑим
назÑванием бÑло Ð±Ñ “<a "
+"href=\"/philosophy/words-to-avoid.html#Content)\">ÑиÑÑема
ÑедакÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ "
+"ÑайÑов</a>”.)"
#. type: Content of: <ul><li><p>
msgid ""
@@ -134,6 +143,12 @@
"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
"block JavaScript miners</a> are also available."
msgstr ""
+"ÐоÑколÑÐºÑ “майнеє бÑл неÑвободной
пÑогÑаммой на JavaScript, "
+"поÑеÑиÑели не бÑли Ð±Ñ Ð¿Ð¾Ð´Ð²ÐµÑженÑ
злоÑпоÑÑеблениÑ, еÑли Ð±Ñ Ð¾Ð½Ð¸ пÑименÑли <a "
+"href=\"/software/librejs/index.html\">LibreJS</a>. ÐÑÑÑ Ñакже
ÑаÑÑиÑÐµÐ½Ð¸Ñ "
+"бÑаÑзеÑов, <a
href=\"https://www.cnet.com/how-to/how-to-stop-sites-from-"
+"using-your-cpu-to-mine-coins/\"> ÑозданнÑе ÑпеÑиалÑно
Ð´Ð»Ñ Ð±Ð»Ð¾ÐºÐ¸Ñовки "
+"майнеÑов на JavaScript</a>."
#. type: Content of: <ul><li><p>
msgid ""
Index: proprietary-interference.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ru.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary-interference.ru.po 14 Oct 2018 09:30:26 -0000 1.70
+++ proprietary-interference.ru.po 14 Oct 2018 09:53:49 -0000 1.71
@@ -8,7 +8,7 @@
msgstr ""
"Project-Id-Version: proprietary-interference.html\n"
"POT-Creation-Date: 2018-10-14 09:26+0000\n"
-"PO-Revision-Date: 2018-10-05 06:11+0000\n"
+"PO-Revision-Date: 2018-10-14 06:11+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
"Language: ru\n"
@@ -83,6 +83,11 @@
"systems-with-\"> included a “miner”</a>, i.e. an executable that "
"hijacks the CPU in users' computers to mine a cryptocurrency."
msgstr ""
+"ÐеÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð²Ð¸Ð´ÐµÐ¾Ð¸Ð³Ñа, доÑÑÑÐ¿Ð½Ð°Ñ ÑеÑез
неÑвободнÑй ÐºÐ»Ð¸ÐµÐ½Ñ Steam, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> ÑодеÑжала “майнеÑа”</a>, Ñ.е.
пÑогÑаммÑ, "
+"коÑоÑÐ°Ñ Ð·Ð°Ñ
ваÑÑвала пÑоÑеÑÑÐ¾Ñ Ð²
компÑÑÑеÑе полÑзоваÑелÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑаÑÑ "
+"кÑипÑовалÑÑÑ."
#. type: Content of: <ul><li><p>
msgid ""
@@ -95,6 +100,15 @@
"href=\"/philosophy/words-to-avoid.html#Content)\">website revision system</"
"a>”.)"
msgstr ""
+"ÐзломÑик воÑполÑзовалÑÑ Ð±ÑеÑÑÑ Ð²
необновленной пÑогÑамме Ð´Ð»Ñ <a href=\"https://www."
+"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
+"visito\"> вÑÑавки “майнеÑа” на ÑÑÑаниÑаÑ
ÑайÑа</a>, пеÑедаваемÑÑ
поÑеÑиÑелÑм. "
+"Такого Ñода вÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð·Ð°Ñ
ваÑÑваÑÑ Ð¿ÑоÑеÑÑÐ¾Ñ ÐºÐ¾Ð¼Ð¿ÑÑÑеÑа, ÑÑÐ¾Ð±Ñ "
+"вÑÑабаÑÑваÑÑ ÐºÑипÑовалÑÑÑ. (ÐбÑаÑаем ваÑе
внимание, ÑÑо в ÑÑаÑÑе заÑаженнÑе
пÑогÑÐ°Ð¼Ð¼Ñ "
+"назÑваÑÑÑÑ "
+"“ÑиÑÑемой ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½ÑенÑом”.
ÐÑÑÑим назÑванием бÑло Ð±Ñ “<a "
+"href=\"/philosophy/words-to-avoid.html#Content)\">ÑиÑÑема
ÑедакÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ ÑайÑов</"
+"a>”.)"
#. type: Content of: <ul><li><p>
msgid ""
@@ -104,6 +118,12 @@
"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
"block JavaScript miners</a> are also available."
msgstr ""
+"ÐоÑколÑÐºÑ “майнеє бÑл неÑвободной
пÑогÑаммой на JavaScript, "
+"поÑеÑиÑели не бÑли Ð±Ñ Ð¿Ð¾Ð´Ð²ÐµÑженÑ
злоÑпоÑÑеблениÑ, еÑли Ð±Ñ Ð¾Ð½Ð¸ пÑименÑли "
+"<a href=\"/software/librejs/index.html"
+"\">LibreJS</a>. ÐÑÑÑ Ñакже ÑаÑÑиÑÐµÐ½Ð¸Ñ Ð±ÑаÑзеÑов,
<a href=\"https://www.cnet.com/"
+"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\">
ÑозданнÑе ÑпеÑиалÑно "
+"Ð´Ð»Ñ Ð±Ð»Ð¾ÐºÐ¸Ñовки майнеÑов на JavaScript</a>."
#. type: Content of: <ul><li><p>
msgid ""
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary.ru.po 14 Oct 2018 09:30:26 -0000 1.77
+++ proprietary.ru.po 14 Oct 2018 09:53:49 -0000 1.78
@@ -304,6 +304,15 @@
"href=\"/philosophy/words-to-avoid.html#Content)\">website revision system</"
"a>”.)"
msgstr ""
+"ÐзломÑик воÑполÑзовалÑÑ Ð±ÑеÑÑÑ Ð²
необновленной пÑогÑамме Ð´Ð»Ñ <a href="
+"\"https://www.pcmag.com/news/360968/400-websites-secretly-served-"
+"cryptocurrency-miners-to-visito\"> вÑÑавки
“майнеÑа” на "
+"ÑÑÑаниÑаÑ
ÑайÑа</a>, пеÑедаваемÑÑ
поÑеÑиÑелÑм. Такого Ñода вÑедоноÑнÑе "
+"пÑогÑÐ°Ð¼Ð¼Ñ Ð·Ð°Ñ
ваÑÑваÑÑ Ð¿ÑоÑеÑÑоÑ
компÑÑÑеÑа, ÑÑÐ¾Ð±Ñ Ð²ÑÑабаÑÑваÑÑ
кÑипÑовалÑÑÑ. "
+"(ÐбÑаÑаем ваÑе внимание, ÑÑо в ÑÑаÑÑе
заÑаженнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°Ð·ÑваÑÑÑÑ “"
+"ÑиÑÑемой ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½ÑенÑом”. ÐÑÑÑим
назÑванием бÑло Ð±Ñ “<a "
+"href=\"/philosophy/words-to-avoid.html#Content)\">ÑиÑÑема
ÑедакÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ "
+"ÑайÑов</a>”.)"
#. type: Content of: <ul><li><p>
msgid ""
@@ -313,6 +322,12 @@
"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
"block JavaScript miners</a> are also available."
msgstr ""
+"ÐоÑколÑÐºÑ “майнеє бÑл неÑвободной
пÑогÑаммой на JavaScript, "
+"поÑеÑиÑели не бÑли Ð±Ñ Ð¿Ð¾Ð´Ð²ÐµÑженÑ
злоÑпоÑÑеблениÑ, еÑли Ð±Ñ Ð¾Ð½Ð¸ пÑименÑли <a "
+"href=\"/software/librejs/index.html\">LibreJS</a>. ÐÑÑÑ Ñакже
ÑаÑÑиÑÐµÐ½Ð¸Ñ "
+"бÑаÑзеÑов, <a
href=\"https://www.cnet.com/how-to/how-to-stop-sites-from-"
+"using-your-cpu-to-mine-coins/\"> ÑозданнÑе ÑпеÑиалÑно
Ð´Ð»Ñ Ð±Ð»Ð¾ÐºÐ¸Ñовки "
+"майнеÑов на JavaScript</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -321,6 +336,11 @@
"systems-with-\"> included a “miner”</a>, i.e. an executable that "
"hijacks the CPU in users' computers to mine a cryptocurrency."
msgstr ""
+"ÐеÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð²Ð¸Ð´ÐµÐ¾Ð¸Ð³Ñа, доÑÑÑÐ¿Ð½Ð°Ñ ÑеÑез
неÑвободнÑй ÐºÐ»Ð¸ÐµÐ½Ñ Steam, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> ÑодеÑжала “майнеÑа”</a>, Ñ.е.
пÑогÑаммÑ, "
+"коÑоÑÐ°Ñ Ð·Ð°Ñ
ваÑÑвала пÑоÑеÑÑÐ¾Ñ Ð²
компÑÑÑеÑе полÑзоваÑелÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑаÑÑ "
+"кÑипÑовалÑÑÑ."
#. type: Content of: <ul><li><p>
msgid ""
@@ -462,8 +482,8 @@
#~ msgstr ""
#~ "Ðдна из веÑÑий Windows 10 <a
href=\"https://www.ghacks.net/2018/09/12/"
#~ "microsoft-intercepting-firefox-chrome-installation-on-windows-10/\"> "
-#~ "ÑаÑÐ¿ÐµÐºÐ°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей, еÑли они
пÑÑаÑÑÑÑ ÑÑÑановиÑÑ Firefox (или Chrome)"
-#~ "</a>."
+#~ "ÑаÑÐ¿ÐµÐºÐ°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей, еÑли они
пÑÑаÑÑÑÑ ÑÑÑановиÑÑ Firefox (или "
+#~ "Chrome)</a>."
#~ msgid ""
#~ "Learn how <a href=\"https://www.huffingtonpost.com/joseph-farrell/the-"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary/po malware-games.ru.po malware-...,
Ineiev <=