[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-webpages.ru.html propri...
From: |
GNUN |
Subject: |
www/proprietary malware-webpages.ru.html propri... |
Date: |
Sun, 14 Oct 2018 09:28:28 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/14 09:28:28
Modified files:
proprietary : malware-webpages.ru.html
proprietary-interference.ru.html
proprietary.ru.html
proprietary/po : malware-webpages.ru-en.html
malware-webpages.ru.po
proprietary-interference.ru-en.html
proprietary-interference.ru.po
proprietary.ru-en.html proprietary.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.ru.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.ru.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ru-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ru.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.81&r2=1.82
Patches:
Index: malware-webpages.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.ru.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- malware-webpages.ru.html 14 Oct 2018 09:58:12 -0000 1.10
+++ malware-webpages.ru.html 14 Oct 2018 13:28:27 -0000 1.11
@@ -79,7 +79,7 @@
компÑÑÑеÑа, ÑÑÐ¾Ð±Ñ Ð²ÑÑабаÑÑваÑÑ
кÑипÑовалÑÑÑ. (ÐбÑаÑаем ваÑе внимание, ÑÑо в
ÑÑаÑÑе заÑаженнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°Ð·ÑваÑÑÑÑ
“ÑиÑÑемой ÑпÑавлениÑ
конÑенÑом”. ÐÑÑÑим назÑванием бÑло бÑ
“<a
-href="/philosophy/words-to-avoid.html#Content)">ÑиÑÑема
ÑедакÑиÑованиÑ
+href="/philosophy/words-to-avoid.html#Content">ÑиÑÑема
ÑедакÑиÑованиÑ
ÑайÑов</a>”.)</p>
<p>ÐоÑколÑÐºÑ “майнеє бÑл
неÑвободной пÑогÑаммой на JavaScript,
@@ -287,7 +287,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/14 13:28:27 $
<!-- timestamp end -->
</p>
Index: proprietary-interference.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.ru.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-interference.ru.html 14 Oct 2018 09:58:12 -0000 1.25
+++ proprietary-interference.ru.html 14 Oct 2018 13:28:27 -0000 1.26
@@ -66,7 +66,7 @@
компÑÑÑеÑа, ÑÑÐ¾Ð±Ñ Ð²ÑÑабаÑÑваÑÑ
кÑипÑовалÑÑÑ. (ÐбÑаÑаем ваÑе внимание, ÑÑо в
ÑÑаÑÑе заÑаженнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°Ð·ÑваÑÑÑÑ
“ÑиÑÑемой ÑпÑавлениÑ
конÑенÑом”. ÐÑÑÑим назÑванием бÑло бÑ
“<a
-href="/philosophy/words-to-avoid.html#Content)">ÑиÑÑема
ÑедакÑиÑованиÑ
+href="/philosophy/words-to-avoid.html#Content">ÑиÑÑема
ÑедакÑиÑованиÑ
ÑайÑов</a>”.)</p>
<p>ÐоÑколÑÐºÑ “майнеє бÑл
неÑвободной пÑогÑаммой на JavaScript,
@@ -257,7 +257,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/14 13:28:27 $
<!-- timestamp end -->
</p>
Index: proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary.ru.html 14 Oct 2018 09:58:12 -0000 1.31
+++ proprietary.ru.html 14 Oct 2018 13:28:27 -0000 1.32
@@ -166,7 +166,7 @@
компÑÑÑеÑа, ÑÑÐ¾Ð±Ñ Ð²ÑÑабаÑÑваÑÑ
кÑипÑовалÑÑÑ. (ÐбÑаÑаем ваÑе внимание, ÑÑо в
ÑÑаÑÑе заÑаженнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°Ð·ÑваÑÑÑÑ
“ÑиÑÑемой ÑпÑавлениÑ
конÑенÑом”. ÐÑÑÑим назÑванием бÑло бÑ
“<a
-href="/philosophy/words-to-avoid.html#Content)">ÑиÑÑема
ÑедакÑиÑованиÑ
+href="/philosophy/words-to-avoid.html#Content">ÑиÑÑема
ÑедакÑиÑованиÑ
ÑайÑов</a>”.)</p>
<p>ÐоÑколÑÐºÑ “майнеє бÑл
неÑвободной пÑогÑаммой на JavaScript,
@@ -292,7 +292,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/14 13:28:27 $
<!-- timestamp end -->
</p>
Index: po/malware-webpages.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-webpages.ru-en.html 14 Oct 2018 09:58:12 -0000 1.10
+++ po/malware-webpages.ru-en.html 14 Oct 2018 13:28:28 -0000 1.11
@@ -70,7 +70,7 @@
type of malware hijacks the computer's processor to mine a
cryptocurrency. (Note that the article refers to the infected software
as “content management system”. A better term would be
- “<a href="/philosophy/words-to-avoid.html#Content)">website
+ “<a href="/philosophy/words-to-avoid.html#Content">website
revision system</a>”.)</p>
<p>Since the miner was a nonfree JavaScript program,
@@ -255,7 +255,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/14 13:28:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-webpages.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/malware-webpages.ru.po 14 Oct 2018 13:20:50 -0000 1.23
+++ po/malware-webpages.ru.po 14 Oct 2018 13:28:28 -0000 1.24
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-14 11:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Webpages - GNU Project - Free Software Foundation"
@@ -115,23 +114,6 @@
"ÑепоÑÑеÑами, коÑоÑÑе ÐµÑ Ð¿Ð¾Ð»ÑзÑÑÑÑÑ</a>."
#. type: Content of: <ul><li><p>
-# | A cracker used an exploit in outdated software to <a
-# |
href=\"https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito\">
-# | inject a “miner” in web pages</a> served to visitors. This
-# | type of malware hijacks the computer's processor to mine a cryptocurrency.
-# | (Note that the article refers to the infected software as “content
-# | management system”. A better term would be “<a
-# | href=\"/philosophy/words-to-avoid.html#Content[-)-]\">website revision
-# | system</a>”.)
-#| msgid ""
-#| "A cracker used an exploit in outdated software to <a href=\"https://www."
-#| "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
-#| "to-visito\"> inject a “miner” in web pages</a> served to "
-#| "visitors. This type of malware hijacks the computer's processor to mine a "
-#| "cryptocurrency. (Note that the article refers to the infected software as "
-#| "“content management system”. A better term would be “<a "
-#| "href=\"/philosophy/words-to-avoid.html#Content)\">website revision "
-#| "system</a>”.)"
msgid ""
"A cracker used an exploit in outdated software to <a href=\"https://www."
"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
Index: po/proprietary-interference.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ru-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/proprietary-interference.ru-en.html 14 Oct 2018 09:58:12 -0000
1.25
+++ po/proprietary-interference.ru-en.html 14 Oct 2018 13:28:28 -0000
1.26
@@ -57,7 +57,7 @@
type of malware hijacks the computer's processor to mine a
cryptocurrency. (Note that the article refers to the infected software
as “content management system”. A better term would be
- “<a href="/philosophy/words-to-avoid.html#Content)">website
+ “<a href="/philosophy/words-to-avoid.html#Content">website
revision system</a>”.)</p>
<p>Since the miner was a nonfree JavaScript program,
@@ -229,7 +229,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/14 13:28:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-interference.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ru.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- po/proprietary-interference.ru.po 14 Oct 2018 13:20:50 -0000 1.74
+++ po/proprietary-interference.ru.po 14 Oct 2018 13:28:28 -0000 1.75
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-14 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Interference - GNU Project - Free Software Foundation"
@@ -90,23 +89,6 @@
"кÑипÑовалÑÑÑ."
#. type: Content of: <ul><li><p>
-# | A cracker used an exploit in outdated software to <a
-# |
href=\"https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito\">
-# | inject a “miner” in web pages</a> served to visitors. This
-# | type of malware hijacks the computer's processor to mine a cryptocurrency.
-# | (Note that the article refers to the infected software as “content
-# | management system”. A better term would be “<a
-# | href=\"/philosophy/words-to-avoid.html#Content[-)-]\">website revision
-# | system</a>”.)
-#| msgid ""
-#| "A cracker used an exploit in outdated software to <a href=\"https://www."
-#| "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
-#| "to-visito\"> inject a “miner” in web pages</a> served to "
-#| "visitors. This type of malware hijacks the computer's processor to mine a "
-#| "cryptocurrency. (Note that the article refers to the infected software as "
-#| "“content management system”. A better term would be “<a "
-#| "href=\"/philosophy/words-to-avoid.html#Content)\">website revision "
-#| "system</a>”.)"
msgid ""
"A cracker used an exploit in outdated software to <a href=\"https://www."
"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
Index: po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- po/proprietary.ru-en.html 14 Oct 2018 09:58:12 -0000 1.28
+++ po/proprietary.ru-en.html 14 Oct 2018 13:28:28 -0000 1.29
@@ -149,7 +149,7 @@
type of malware hijacks the computer's processor to mine a
cryptocurrency. (Note that the article refers to the infected software
as “content management system”. A better term would be
- “<a href="/philosophy/words-to-avoid.html#Content)">website
+ “<a href="/philosophy/words-to-avoid.html#Content">website
revision system</a>”.)</p>
<p>Since the miner was a nonfree JavaScript program,
@@ -256,7 +256,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/14 13:28:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- po/proprietary.ru.po 14 Oct 2018 13:20:50 -0000 1.81
+++ po/proprietary.ru.po 14 Oct 2018 13:28:28 -0000 1.82
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-14 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -294,23 +293,6 @@
msgstr "ÐоÑледние добавлениÑ"
#. type: Content of: <ul><li><p>
-# | A cracker used an exploit in outdated software to <a
-# |
href=\"https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito\">
-# | inject a “miner” in web pages</a> served to visitors. This
-# | type of malware hijacks the computer's processor to mine a cryptocurrency.
-# | (Note that the article refers to the infected software as “content
-# | management system”. A better term would be “<a
-# | href=\"/philosophy/words-to-avoid.html#Content[-)-]\">website revision
-# | system</a>”.)
-#| msgid ""
-#| "A cracker used an exploit in outdated software to <a href=\"https://www."
-#| "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
-#| "to-visito\"> inject a “miner” in web pages</a> served to "
-#| "visitors. This type of malware hijacks the computer's processor to mine a "
-#| "cryptocurrency. (Note that the article refers to the infected software as "
-#| "“content management system”. A better term would be “<a "
-#| "href=\"/philosophy/words-to-avoid.html#Content)\">website revision "
-#| "system</a>”.)"
msgid ""
"A cracker used an exploit in outdated software to <a href=\"https://www."
"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-webpages.ru.html propri...,
GNUN <=