[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy/po can-you-trust.ar.po
From: |
Hossam Hossny |
Subject: |
www/philosophy/po can-you-trust.ar.po |
Date: |
Mon, 08 Dec 2008 05:45:00 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: Hossam Hossny <mbf> 08/12/08 05:45:00
Added files:
philosophy/po : can-you-trust.ar.po
Log message:
newly translated into Arabic
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.ar.po?cvsroot=www&rev=1.1
Patches:
Index: can-you-trust.ar.po
===================================================================
RCS file: can-you-trust.ar.po
diff -N can-you-trust.ar.po
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ can-you-trust.ar.po 8 Dec 2008 05:44:57 -0000 1.1
@@ -0,0 +1,178 @@
+# translation of can-you-trust.po to Arabic
+# SOME DESCRIPTIVE TITLE
+# Copyright (C) 2008 Free Software Foundation, Inc.
+# This file is distributed under the same license as the PACKAGE package.
+#
+# OsamaKhalid <address@hidden>, 2008.
+# OsamaKhalid <address@hidden>, 2008.
+msgid ""
+msgstr ""
+"Project-Id-Version: can-you-trust\n"
+"POT-Creation-Date: 2008-08-25 16:25-0300\n"
+"PO-Revision-Date: 2008-12-08 07:33+0200\n"
+"Last-Translator: Hossam Hossny <address@hidden>\n"
+"Language-Team: Arabic\n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Transfer-Encoding: 8bit\n"
+"X-Generator: KBabel 1.11.4\n"
+
+# type: Content of: <title>
+msgid "Can You Trust Your Computer? - GNU Project - Free Software Foundation
(FSF)"
+msgstr "Ù٠تستطÙع اÙÙØ«Ù٠بØاسÙبÙØ - Ù
شرÙع جÙÙ -
Ù
ؤسسة اÙبرÙ
جÙات اÙØرة (Ø¥Ù‌إس‌Ø¥Ù)"
+
+# type: Content of: <h2>
+msgid "Can You Trust Your Computer?"
+msgstr "Ù٠تستطÙع اÙÙØ«Ù٠بØاسÙبÙØ"
+
+# type: Content of: <p>
+msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgstr "بÙÙÙ
<a href=\"http://www.stallman.org/\">رÙتشارد ستاÙÙ
اÙ</a>"
+
+# type: Content of: <p>
+msgid "Who should your computer take its orders from? Most people think their
computers should obey them, not obey someone else. With a plan they call
“trusted computing”, large media corporations (including the movie
companies and record companies), together with computer companies such as
Microsoft and Intel, are planning to make your computer obey them instead of
you. (Microsoft's version of this scheme is called “Palladium”.)
Proprietary programs have included malicious features before, but this plan
would make it universal."
+msgstr "Ù
ÙÙ Ù
ÙÙ Ùجب Ø£Ù Ùأخذ ØاسÙب٠اÙØ£ÙاÙ
رØ
Ø£Ùثر اÙÙاس ÙعتÙدÙ٠أ٠ØÙاسÙبÙÙ
Ùجب Ø£Ù
تطÙعÙÙ
Ø Ùا أ٠تطÙع أ٠شخص آخر. Ù٠اÙÙ
خطط ÙسÙ
ÙÙÙ ”اÙØÙسبة اÙÙ
ÙØ«ÙÙØ©“Ø Ø§ÙÙ
ؤسسات
اÙإعÙاÙ
ÙØ© اÙÙبÙرة (بÙ
ا ÙÙ Ø°Ù٠شرÙات اÙØ£ÙÙاÙ
ÙشرÙات اÙتسجÙÙ)Ø Ù
عا Ù
ع شرÙات اÙØاسÙب Ù
Ø«Ù Ù
اÙÙرÙسÙÙت ÙØ¥ÙتÙØ ÙخططÙÙ Ùجع٠ØاسÙب٠ÙØ·ÙعÙÙ
بدÙا Ù
ÙÙ. (Ùسخة Ù
اÙÙرÙسÙÙت Ù
٠اÙÙ
خطط تسÙ
Ù
”اÙØراسة“.) اÙبراÙ
ج اÙاØتÙارÙØ© ضÙÙ
ÙÙت
Ù
زاÙا ضارة Ù
Ù ÙبÙØ ÙÙÙ Ùذ٠اÙخطة سÙ٠تجعÙÙ
عاÙÙ
Ùا."
+
+# type: Content of: <p>
+msgid "Proprietary software means, fundamentally, that you don't control what
it does; you can't study the source code, or change it. It's not surprising
that clever businessmen find ways to use their control to put you at a
disadvantage. Microsoft has done this several times: one version of Windows
was designed to report to Microsoft all the software on your hard disk; a
recent “security” upgrade in Windows Media Player required users to
agree to new restrictions. But Microsoft is not alone: the KaZaa music-sharing
software is designed so that KaZaa's business partner can rent out the use of
your computer to their clients. These malicious features are often secret, but
even once you know about them it is hard to remove them, since you don't have
the source code."
+msgstr "اÙبرÙ
جÙات اÙاØتÙارÙØ© تعÙÙØ Ø£Ø³Ø§Ø³Ø§Ø Ø£ÙÙ
Ùا تستطÙع اÙتØÙÙ
بÙ
ا تÙعÙØ Ùا تستطÙع دراسة
اÙØ´ÙÙرة اÙÙ
صدرÙØ©Ø Ø£Ù ØªØºÙÙرÙا. ÙÙس Ù
Ùاجئا Ø£Ù
رجا٠اÙأعÙ
ا٠اÙأذÙÙاء ÙجدÙ٠طر٠ÙتسخÙر تØÙÙ
ÙÙ
ÙÙضع٠ÙÙ Ùرطة. ÙاÙ
ت Ù
اÙÙرÙسÙÙت بÙذا Ù
رات
عدÙد: Ø£Øد Ùسخ ÙÙÙدÙز صÙÙ
ÙÙ
ت ÙإبÙاغ Ù
اÙÙرÙسÙÙت ع٠Ù٠اÙبرÙ
جÙات عÙÙ Ùرص٠اÙصÙبØ
ÙتطÙÙر ”Ø£Ù
آ ØدÙØ« ÙÙ ÙÙÙدÙز Ù
ÙدÙا
بÙاÙر ÙطاÙب اÙÙ
ستخدÙ
Ù٠باÙÙ
ÙاÙÙØ© عÙÙ Ù
عÙÙÙات جدÙدة. ÙÙÙ Ù
اÙÙرÙسÙÙت ÙÙست ÙØÙدة: برÙ
جÙات Ùازا ÙÙ
شارÙØ© اÙÙ
ÙسÙÙÙ Ù
ÙصÙ
ÙÙ
Ø© ÙÙستطÙع
شرÙÙ Ùازا تأجÙر استخداÙ
ØاسÙب٠ÙعÙ
ÙائÙÙ
.
Ùذ٠اÙÙ
زاÙا اÙضارة عادة Ù
ا تÙÙ٠سرÙØ©Ø ÙÙÙ
Øت٠عÙدÙ
ا تعر٠عÙÙا Ù
٠اÙصعب إزاÙتÙØ§Ø Ø·Ø§ÙÙ
ا
ÙÙت Ùا تÙ
Ù٠اÙØ´ÙÙرة اÙÙ
صدرÙØ©."
+
+# type: Content of: <p>
+msgid "In the past, these were isolated incidents. “Trusted
computing” would make it pervasive. “Treacherous computing”
is a more appropriate name, because the plan is designed to make sure your
computer will systematically disobey you. In fact, it is designed to stop your
computer from functioning as a general-purpose computer. Every operation may
require explicit permission."
+msgstr "Ù٠اÙÙ
اضÙØ ÙاÙت Ùذ٠اÙØÙادث Ù
عزÙÙØ©.
”اÙØÙسبة اÙÙ
ÙØ«ÙÙØ©“ سÙ٠تجعÙÙا Ù
ÙخترÙØ©. ”اÙØÙسبة اÙغادرة“ اسÙ
Ø£Ùثر Ù
ÙائÙ
Ø©Ø Ùأ٠اÙخطة Ù
ÙعدÙØ© ÙÙتأÙد Ø£Ù ØاسÙبÙ
سÙÙ ÙعصÙÙ ÙظاÙ
Ùا. Ù٠اÙØÙÙÙØ©Ø ÙÙ Ù
صÙ
ÙÙ
Ø©
ÙØ¥ÙÙا٠ØاسÙب٠ع٠Ù
ÙÙ
Ùت٠ÙØاسÙب أغراض عاÙ
Ø©.
Ù٠عÙ
ÙÙØ© Ùد تتطÙب إذ٠صرÙØ."
+
+# type: Content of: <p>
+msgid "The technical idea underlying treacherous computing is that the
computer includes a digital encryption and signature device, and the keys are
kept secret from you. Proprietary programs will use this device to control
which other programs you can run, which documents or data you can access, and
what programs you can pass them to. These programs will continually download
new authorization rules through the Internet, and impose those rules
automatically on your work. If you don't allow your computer to obtain the new
rules periodically from the Internet, some capabilities will automatically
cease to function."
+msgstr "اÙÙÙرة اÙتÙÙÙØ© تØت اÙØÙسبة اÙغادرة ÙÙ
أ٠اÙØاسÙب ÙتضÙ
٠تشÙÙر رÙÙ
Ù ÙتÙÙÙع جÙازØ
ÙاÙÙ
ÙاتÙØ ØªØ¨Ù٠سرÙØ© عÙÙ. اÙبراÙ
ج
اÙاØتÙارÙØ© سÙ٠تستخدÙ
Ùذا اÙجÙاز ÙÙتØÙÙ
باÙبراÙ
ج اÙأخر٠اÙت٠تستطÙع تشغÙÙÙØ§Ø ÙباÙÙ
ستÙدات ÙاÙبÙاÙات اÙت٠تصÙÙا Ø¥ÙÙÙاØ
ÙباÙبراÙ
ج اÙت٠تÙ
تد Ø¥ÙÙÙا. Ùذ٠اÙبرÙ
جÙات
سÙ٠تستÙ
ر Ù٠تÙزÙÙ ÙÙاعد تÙÙÙض جدÙدة عبر
اÙØ¥ÙترÙØªØ ÙÙرض Ùذ٠اÙÙÙاعد تÙÙائÙا عÙ٠عÙ
ÙÙ. إذا ÙÙ
تسÙ
Ø ÙØاسÙب٠باÙÙصÙ٠إÙÙ ÙÙاعد
جدÙدة دÙرÙا Ù
٠اÙØ¥ÙترÙØªØ Ø¨Ø¹Ø¶ اÙØ¥Ù
ÙاÙÙات
سÙ٠تÙطع تÙÙائÙا Ù
٠اÙÙ
ÙÙ
Ø©."
+
+# type: Content of: <p>
+msgid "Of course, Hollywood and the record companies plan to use treacherous
computing for “DRM” (Digital Restrictions Management), so that
downloaded videos and music can be played only on one specified computer.
Sharing will be entirely impossible, at least using the authorized files that
you would get from those companies. You, the public, ought to have both the
freedom and the ability to share these things. (I expect that someone will
find a way to produce unencrypted versions, and to upload and share them, so
DRM will not entirely succeed, but that is no excuse for the system.)"
+msgstr "باÙØ·Ø¨Ø¹Ø ÙÙÙÙÙÙد ÙشرÙات اÙتسجÙ٠تخطط
ÙاستخداÙ
اÙØÙسبة اÙغادرة ٔد٠آر Ø¥Ù
“
(إدارة اÙÙÙÙد اÙرÙÙ
ÙØ©)Ø ÙÙÙذا اÙÙÙدÙÙ ÙاÙÙ
ÙسÙÙ٠اÙÙ
ÙزÙÙØ© ÙÙ
Ù٠تشغÙÙÙا ÙÙØ· عÙÙ ÙÙع Ù
Øدد Ù
٠اÙØÙاسÙب. اÙتشار٠سÙÙÙÙ Ù
ستØÙ٠تÙ
اÙ
Ø§Ø Ø¹Ù٠اÙØ£Ù٠باستخداÙ
اÙÙ
ÙÙات اÙÙ
ÙÙÙÙضة
اÙت٠تجÙبÙا Ù
٠تÙ٠اÙشرÙات. Ø£ÙتÙ
Ø Ø§ÙعاÙ
Ø©Ø
Ùجب أ٠تÙ
تÙÙÙا ÙÙا اÙØرÙØ© ÙاÙÙابÙÙØ© ÙÙ
شارÙØ© Ùذ٠اÙأشÙاء. (أتÙÙع أ٠أØدÙÙ
سÙÙ ÙبØØ«
ع٠طرÙÙØ© ÙØ¥Ùتاج Ùسخ غÙر Ù
Ø´ÙÙØ±Ø©Ø ÙرÙعÙا ÙÙ
شارÙتÙØ§Ø ÙÙÙذا Ù٠تÙØ¬Ø Ø§ÙÙÙÙد اÙرÙÙ
ÙØ©
إطÙاÙØ§Ø ÙÙÙ Ùذا ÙÙس عذرا ÙÙÙظاÙ
.)"
+
+# type: Content of: <p>
+msgid "Making sharing impossible is bad enough, but it gets worse. There are
plans to use the same facility for email and documents—resulting in email
that disappears in two weeks, or documents that can only be read on the
computers in one company."
+msgstr "جع٠اÙÙ
شارÙØ© Ù
ستØÙÙØ© سÙئ ÙÙاÙØ©Ø ÙÙÙÙا
تتج٠إÙ٠اÙأسÙØ£. ÙÙجد خطط ÙاستخداÙ
ÙÙس
سÙÙÙØ© اÙبرÙد اÙØ¥ÙÙترÙÙÙ ÙاÙÙ
ستÙدات—تÙتج برÙد Ø¥ÙÙترÙÙÙ ÙختÙÙ ÙÙ
أسبÙعÙÙØ Ø£Ù Ù
ستÙدات ÙÙ
ÙÙ ÙراءتÙا عÙÙ
اÙØÙاسÙب Ù٠شرÙØ© ÙاØدة."
+
+# type: Content of: <p>
+msgid "Imagine if you get an email from your boss telling you to do something
that you think is risky; a month later, when it backfires, you can't use the
email to show that the decision was not yours. “Getting it in
writing” doesn't protect you when the order is written in disappearing
ink."
+msgstr "تخÙÙ Ù٠تÙÙÙت برÙدا Ø¥ÙÙترÙÙÙا Ù
Ù
رئÙسÙÙ Ùخبر٠بعÙ
Ù Ø´ÙØ¡ تظ٠أÙÙ Ø®Ø·Ø±Ø Ùبعد
Ø´ÙØ±Ø Ø¹ÙدÙ
ا تشتعÙØ Ùا تستطÙع استخداÙ
اÙبرÙد
اÙØ¥ÙÙرتÙÙÙ ÙإظÙار أ٠اÙÙرار ÙÙ
ÙÙÙ ÙرارÙ.
”اÙØصÙ٠عÙÙ٠ع٠طرÙÙاÙÙتابة“ ÙÙ ÙØÙ
ÙÙ
عÙدÙ
ا ÙÙتب اÙØ·Ùب بØبر Ù
ÙختÙÙ."
+
+# type: Content of: <p>
+msgid "Imagine if you get an email from your boss stating a policy that is
illegal or morally outrageous, such as to shred your company's audit documents,
or to allow a dangerous threat to your country to move forward unchecked.
Today you can send this to a reporter and expose the activity. With
treacherous computing, the reporter won't be able to read the document; her
computer will refuse to obey her. Treacherous computing becomes a paradise for
corruption."
+msgstr "تخÙÙ Ù٠تÙÙÙت برÙدا Ø¥ÙÙترÙÙÙا Ù
Ù
رئÙسÙÙ ÙÙر سÙاسة غÙر ÙاÙÙÙÙØ© Ø£Ù Ù
ÙاÙÙØ©
ÙÙأخÙاÙØ Ù
ث٠تÙ
زÙÙ Ù
ستÙدات اÙشرÙØ© اÙÙ
اÙÙØ©Ø
أ٠اÙسÙ
Ø§Ø Ø¨Ù
رÙر Ù
خاطر تÙدد دÙÙت٠بدÙÙ
تدÙÙÙ. اÙÙÙÙ
تستطÙع إرسا٠Ùذا ÙÙ
راسÙØ©
ÙتعرÙض اÙÙشاط. Ù
ع اÙØÙسبة اÙØºØ§Ø¯Ø±Ø©Ø Ø§ÙÙ
راسÙØ© Ù٠تÙÙÙ Ùادرة عÙÙ Ùراءة اÙÙ
ستÙدØ
ØاسÙبÙا سÙÙ ÙرÙض طاعتÙا. اÙØÙسبة اÙغادرة
ØªØµØ¨Ø Ø¬ÙØ© اÙÙساد."
+
+# type: Content of: <p>
+msgid "Word processors such as Microsoft Word could use treacherous computing
when they save your documents, to make sure no competing word processors can
read them. Today we must figure out the secrets of Word format by laborious
experiments in order to make free word processors read Word documents. If Word
encrypts documents using treacherous computing when saving them, the free
software community won't have a chance of developing software to read
them—and if we could, such programs might even be forbidden by the
Digital Millennium Copyright Act."
+msgstr "Ù
عاÙجات اÙÙصÙص Ù
Ø«Ù Ù
اÙÙرÙسÙÙت ÙرÙد ÙÙ
Ù٠أ٠تستخدÙ
اÙØÙسبة اÙغادرة عÙدÙ
ا تØÙظ Ù
ستÙداتÙØ ÙتأÙد Ù
٠أÙا Ù
عاÙج ÙÙÙ
ات ÙستطÙع
ÙتØÙا. اÙÙÙÙ
Ùجب ترÙÙÙ
Ùس٠اÙÙرÙد اÙسر٠عÙ
طرÙ٠تجربة شاÙØ© ÙÙ Øا٠جع٠Ù
Øرر ÙÙÙ
ات Øر
ÙÙرأ Ù
ستÙدات ÙرÙد. Ù٠أ٠تشÙÙر Ù
ستÙدات ÙرÙد
تÙ
باستخداÙ
اÙØÙسبة اÙغادرة عÙد ØÙظÙØ§Ø Ù
جتÙ
ع اÙبرÙ
جÙات اÙØرة ÙÙ ÙÙ
تÙÙ Ùرصة ÙتطÙÙر برÙ
جÙات ÙÙراءتÙا— ÙÙ٠استطعÙØ§Ø Ù
Ø«Ù ÙØ°Ù
اÙبراÙ
ج Ùد تØظر ع٠طرÙÙ ÙاÙÙÙ ØÙÙ٠اÙØ£ÙÙÙØ©
اÙرÙÙ
ÙØ©."
+
+# type: Content of: <p>
+msgid "Programs that use treacherous computing will continually download new
authorization rules through the Internet, and impose those rules automatically
on your work. If Microsoft, or the US government, does not like what you said
in a document you wrote, they could post new instructions telling all computers
to refuse to let anyone read that document. Each computer would obey when it
downloads the new instructions. Your writing would be subject to 1984-style
retroactive erasure. You might be unable to read it yourself."
+msgstr "اÙبراÙ
ج اÙت٠تستخدÙ
اÙØÙسبة اÙغادرة
سÙ٠تستÙ
ر Ù٠تÙزÙÙ ÙÙاعد تÙÙÙض جدÙدة Ù
Ù
Ø®Ùا٠اÙØ¥ÙترÙØªØ ÙÙرض Ùذ٠اÙÙÙاعد تÙÙائÙا
عÙ٠عÙ
ÙÙ. Ù٠أ٠Ù
اÙÙرÙسÙÙØªØ Ø£Ù Ø§ÙØÙÙÙ
Ø© اÙØ£Ù
رÙÙÙØ©Ø Ùا تØب Ù
ا ÙÙت٠ÙÙ Ù
ستÙد ÙتبتÙØ
ÙستطÙعÙ٠إرسا٠تعÙÙÙ
ات جدÙدة تخبر ÙÙ
اÙØÙاسÙب رÙض اÙسÙ
Ø§Ø Ùأ٠شخص بÙراءة Ùذ٠اÙÙ
ستÙد. ÙÙ ØاسÙب سÙÙ ÙØ·ÙعÙÙ
عÙد تÙزÙ٠اÙتعÙÙÙ
ات اÙجدÙدة. Ùتابت٠سÙ٠تÙÙ٠خاضعة ÙأسÙÙب 1984
Ù٠اÙÙ
Ø٠اÙرجعÙ. Ùد تÙÙ٠غÙر Ùادر عÙÙ
ÙراءتÙا بÙÙسÙ."
+
+# type: Content of: <p>
+msgid "You might think you can find out what nasty things a treacherous
computing application does, study how painful they are, and decide whether to
accept them. It would be short-sighted and foolish to accept, but the point is
that the deal you think you are making won't stand still. Once you come to
depend on using the program, you are hooked and they know it; then they can
change the deal. Some applications will automatically download upgrades that
will do something different—and they won't give you a choice about
whether to upgrade."
+msgstr "Ùد تعتÙد Ø£Ù٠تستطÙع Ø¥Ùجاد اÙأشÙاء
اÙÙذرة اÙت٠تÙÙÙ
بÙا تطبÙÙات اÙØÙسبة
اÙØºØ§Ø¯Ø±Ø©Ø Ùتدرس Ù
د٠أÙÙ
ÙØ§Ø ÙتÙرÙر ÙÙÙ
ا ÙÙ
ÙبÙتÙا. سÙÙÙÙ Ùصر Ùظر ÙØÙ
اÙØ© ÙÙ ÙبÙتÙØ§Ø ÙÙÙ
اÙÙ
Ùصد Ù٠أ٠اÙÙضÙØ© اÙت٠تعتÙد Ø£Ù٠تÙعÙÙا
Ù٠تبÙÙ ÙاÙÙØ©. عÙدÙ
ا ÙØÙ٠اÙاعتÙ
اد عÙÙ
استخدÙ
اÙبرÙاÙ
Ø¬Ø Ø£Ùت Ù
ÙÙÙب ÙÙÙ
ÙعرÙÙÙ Ø°ÙÙØ
ÙÙ
Ù Ø«Ù
ÙستطÙعÙ٠تغÙÙر اÙÙضÙØ©. بعض اÙتطبÙÙات
سÙ٠تÙز٠تÙÙائÙا ترÙÙات سÙ٠تÙÙÙ
بعÙ
Ù Ù
ختÙÙ—ÙÙÙ ÙعطÙ٠اÙØ®Ùار ØÙ٠اÙترÙÙØ©."
+
+# type: Content of: <p>
+msgid "Today you can avoid being restricted by proprietary software by not
using it. If you run GNU/Linux or another free operating system, and if you
avoid installing proprietary applications on it, then you are in charge of what
your computer does. If a free program has a malicious feature, other
developers in the community will take it out, and you can use the corrected
version. You can also run free application programs and tools on non-free
operating systems; this falls short of fully giving you freedom, but many users
do it."
+msgstr "اÙÙÙÙ
تستطÙع تجاÙز أ٠تÙÙÙ Ù
ÙÙÙÙدا
بÙاسطة اÙبرÙ
جÙات اÙاØتÙارÙØ© ع٠طرÙ٠عدÙ
استخداÙ
Ùا. Ù٠شغÙÙت جÙÙ/ÙÙÙÙس Ø£Ù ÙظاÙ
تشغÙÙ
Øر Ø¢Ø®Ø±Ø ÙÙ٠تجاÙزت تثبÙت تطبÙÙات اØتÙارÙØ©
عÙÙÙØ§Ø ØÙÙÙا Ø£Ùت Ù
ÙÙÙ٠بÙ
ا ÙÙعÙÙ ØاسÙبÙ. ÙÙ
أ٠برÙاÙ
جا ØرÙا ÙدÙÙ Ù
Ùزة Ø¶Ø§Ø±Ø©Ø Ù
Ø·ÙرÙÙ
آخرÙÙ Ù٠اÙÙ
جتÙ
ع سÙÙ ÙخرجÙÙÙØ§Ø ÙتستطÙع
استخداÙ
اÙÙسخة اÙصØÙØØ©. تستطÙع Ø£Ùضا تشغÙÙ
براÙ
ج تطبÙÙØ© ÙأدÙات Øرة عÙ٠أÙظÙ
Ø© اÙتشغÙÙ
غÙر اÙØØ±Ø©Ø Ùذا Ùشغ٠ØÙÙز صغÙر Ù
٠إعطائÙ
اÙØرÙØ© اÙÙاÙ
ÙØ©Ø ÙÙÙ ÙØ«Ùر Ù
٠اÙÙ
ستخدÙ
ÙÙ
ÙÙعÙÙÙ Ø°ÙÙ."
+
+# type: Content of: <p>
+msgid "Treacherous computing puts the existence of free operating systems and
free applications at risk, because you may not be able to run them at all.
Some versions of treacherous computing would require the operating system to be
specifically authorized by a particular company. Free operating systems could
not be installed. Some versions of treacherous computing would require every
program to be specifically authorized by the operating system developer. You
could not run free applications on such a system. If you did figure out how,
and told someone, that could be a crime."
+msgstr "اÙØÙسبة اÙغادرة تضع ÙجÙد ÙظاÙ
تشغÙÙ Øر
ÙتطبÙÙات Øرة ÙÙ Ø®Ø·Ø±Ø Ø¨Ø³Ø¨Ø¨ Ø£ÙÙا Ùد تتعذر عÙ
اÙعÙ
٠أصÙا. بعض إصدارات اÙØÙسبة اÙغادرة
ستطاÙب ÙظاÙ
اÙتشغÙ٠بأ٠ÙÙÙÙ Ù
صرØا بشÙÙ Ù
Øدد Ù
٠شرÙØ© Ù
Øددة. Ø£ÙظÙ
Ø© اÙتشغÙ٠اÙØرة ÙÙ ÙÙ
Ù٠تثبÙتÙا. بعض إصدارات اÙØÙسبة اÙغادرة سÙÙ
تطاÙب Ù٠برÙاÙ
ج Ø£Ù ÙÙÙÙ Ù
صرØا بشÙÙ Ù
Øدد Ù
Ù Ù
Ø·Ùر ÙظاÙ
اÙتشغÙÙ. Ùا تستطÙع تشغÙ٠برÙ
جÙات
Øرة عÙÙ ÙظاÙ
ÙÙذا. إذا اÙتشÙت اÙÙÙÙÙØ©
ÙأخبرتÙا أ٠أØØ¯Ø ÙÙ
Ù٠أ٠تÙÙ٠جرÙÙ
Ø©."
+
+# type: Content of: <p>
+msgid "There are proposals already for US laws that would require all
computers to support treacherous computing, and to prohibit connecting old
computers to the Internet. The CBDTPA (we call it the Consume But Don't Try
Programming Act) is one of them. But even if they don't legally force you to
switch to treacherous computing, the pressure to accept it may be enormous.
Today people often use Word format for communication, although this causes
several sorts of problems (see <a
href=\"/philosophy/no-word-attachments.html\">“We Can Put an End to Word
Attachments”</a>). If only a treacherous computing machine can read the
latest Word documents, many people will switch to it, if they view the
situation only in terms of individual action (take it or leave it). To oppose
treacherous computing, we must join together and confront the situation as a
collective choice."
+msgstr "ÙÙجد Ø·Ùبات باÙÙع٠Ù٠اÙÙاÙÙ٠اÙØ£Ù
رÙÙÙ
سÙ٠تطاÙب Ù٠اÙØÙاسÙب بدعÙ
اÙØÙسبة
اÙØºØ§Ø¯Ø±Ø©Ø ÙÙÙ
Ùع إتصا٠اÙØÙاسÙب اÙÙدÙÙ
Ø©
باÙØ¥ÙترÙت.
اÙسÙ‌بÙ‌دÙ‌تÙ‌بÙ‌Ø¥Ù (ÙسÙ
ÙÙ
ÙاÙÙ٠استÙÙÙ ÙÙÙÙ Ùا تجرب) ÙاØد Ù
ÙÙا. ÙÙÙÙ
Øت٠ÙÙ ÙÙ
ÙÙزÙ
ÙÙ ÙاÙÙÙÙا باÙتØÙÙ٠إÙÙ
اÙØÙسبة اÙØºØ§Ø¯Ø±Ø©Ø Ø§Ùضغط ÙÙبÙÙÙا Ùد ÙÙÙÙ
ÙائÙا. اÙÙÙÙ
اÙÙاس عادة ÙستخدÙ
ÙÙ Ùس٠ÙÙرد
ÙÙاتصاÙØ Ø¹Ù٠اÙرغÙ
Ù
٠أسباب Ø£ÙÙاÙ
اÙÙ
شاÙÙ
اÙعدÙدة (راجع <a
href=\"/philosophy/no-word-attachments.html\">”ÙستطÙع Ùضع
ÙÙاÙØ© ÙÙ
رÙÙات ÙÙرد“</a>). إذا استطاع ÙÙØ·
جÙاز اÙØÙسبة اÙغادرة Ùراءة آخر Ù
ستÙدات
ÙÙØ±Ø¯Ø Ø§ÙÙØ«Ùر Ù
٠اÙÙاس سÙØÙÙÙÙ ÙÙØ Ø¥Ø°Ø§ أخذÙا
اÙÙضع Ù
Ù Ù
ÙØ·Ù٠تصرÙÙ ÙرÙد (خذÙا أ٠اترÙÙا).
ÙÙ
عارضة اÙØÙسبة اÙØºØ§Ø¯Ø±Ø©Ø Ùجب Ø£Ù ÙÙضÙ
Ù
عا ÙÙ
ÙاجÙØ© اÙÙضع ÙØ®Ùار جÙ
اعÙ."
+
+# type: Content of: <p>
+msgid "For further information about treacherous computing, see <a
href=\"http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html\">http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html</a>."
+msgstr "ÙÙ
زÙد Ù
٠اÙÙ
عÙÙÙ
ات ØÙ٠اÙØÙسبة
اÙØºØ§Ø¯Ø±Ø©Ø Ø±Ø§Ø¬Ø¹ <a
href=\"http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html\">http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html</a>."
+
+# type: Content of: <p>
+msgid "To block treacherous computing will require large numbers of citizens
to organize. We need your help! The <a href=\"http://www.eff.org\">Electronic
Frontier Foundation</a> and <a href=\"http://www.publicknowledge.org\">Public
Knowledge</a> are campaigning against treacherous computing, and so is the
FSF-sponsored Digital Speech Project. Please visit these Web sites so you can
sign up to support their work."
+msgstr "Ù
Ùع اÙØÙسبة اÙغادرة سÙØ·Ùب عددا ÙبÙرا Ù
٠اÙÙ
ÙاطÙÙÙ ÙÙÙتظÙ
Ùا. ÙØتاج Ù
ساعدتÙ! <a
href=\"http://www.eff.org\">Ù
ؤسسة اÙØد اÙØ¥ÙÙترÙÙÙ</a> Ù<a
href=\"http://www.publicknowledge.org\">اÙÙ
عرÙØ© اÙعاÙ
Ø©</a> ØÙ
ÙتÙÙ ÙÙ
عارضة اÙØÙسبة اÙØºØ§Ø¯Ø±Ø©Ø ÙØ°ÙÙ Ù
شرÙع
اÙتعبÙر اÙرÙÙ
٠اÙÙ
دعÙÙ
بÙاسطة
Ø¥Ù‌إس‌Ø¥Ù. Ù
Ù ÙضÙ٠زر Ù
ÙاÙعÙÙ
ÙتتÙ
ÙÙ Ù
Ù
اÙتسجÙÙ ÙدعÙ
عÙ
ÙÙÙ
."
+
+# type: Content of: <p>
+msgid "You can also help by writing to the public affairs offices of Intel,
IBM, HP/Compaq, or anyone you have bought a computer from, explaining that you
don't want to be pressured to buy “trusted” computing systems so
you don't want them to produce any. This can bring consumer power to bear. If
you do this on your own, please send copies of your letters to the
organizations above."
+msgstr "تستطÙع Ø£Ùضا اÙÙ
ساعدة ع٠طرÙ٠اÙÙتابة
Ø¥ÙÙ Ù
Ùاتب اÙعÙاÙات اÙعاÙ
Ø© Ù٠إÙتÙØ Ø£Ù
Ø¢Ù‌بÙ‌Ø¥Ù
Ø Ø£Ù Ø¥ØªØ´‌بÙ/ÙÙÙ
باÙØ Ø£Ù Ø£Ù
شخص اشترÙت Ù
ÙÙ ØاسÙØ¨Ø§Ø ÙØ¶Ø Ù٠أÙÙ Ùا ترÙد Ø£Ù
تجبر عÙ٠شراء Ø£ÙظÙ
Ø© اÙØÙسبة ”اÙÙ
ÙØ«ÙÙØ©“ Ùذا Ùا ترÙد Ù
ÙÙÙ
Ø¥Ùتاج Ø£Ù Ù
ÙÙا.
Ùذا Ùد ÙجÙب ÙÙØ© اÙزبÙÙ ÙÙتعبÙر. إذا ÙعÙت Ø°ÙÙ
عÙ٠أÙ
ÙاÙÙØ Ù
Ù ÙضÙ٠أرس٠Ùسخا Ù
٠اÙرسائÙ
Ø¥Ù٠اÙÙ
ÙظÙ
ات أعÙاÙ."
+
+# type: Content of: <h3>
+msgid "Postscripts"
+msgstr "Ù
ÙØÙات"
+
+# type: Content of: <ol><li>
+msgid "The GNU Project distributes the GNU Privacy Guard, a program that
implements public-key encryption and digital signatures, which you can use to
send secure and private email. It is useful to explore how GPG differs from
treacherous computing, and see what makes one helpful and the other so
dangerous."
+msgstr "Ù
شرÙع جÙÙ ÙÙزع Øراسة خصÙصÙØ© جÙÙØ
اÙبرÙاÙ
ج اÙØ°Ù ÙتعاÙ
Ù Ù
ع Ù
ÙاتÙØ Ø§ÙتشÙÙر
اÙعاÙ
Ø© ÙاÙتÙاÙÙع اÙرÙÙ
ÙØ©Ø Ø§Ùت٠تستطÙع
استخداÙ
Ùا Ùإرسا٠برÙد Ø¥ÙÙترÙÙ٠آÙ
Ù Ùخاص. Ù
Ù
اÙÙ
ÙÙد استÙشا٠ÙÙÙ ÙختÙ٠جÙ‌بÙ‌إ٠عÙ
اÙØÙسبة اÙØºØ§Ø¯Ø±Ø©Ø Ùتدر٠أÙÙÙ
ا Ùجع٠اÙØ´ÙØ¡ Ù
ÙÙد ÙاÙآخر خطر جدا."
+
+# type: Content of: <ol><li><p>
+msgid "When someone uses GPG to send you an encrypted document, and you use
GPG to decode it, the result is an unencrypted document that you can read,
forward, copy, and even re-encrypt to send it securely to someone else. A
treacherous computing application would let you read the words on the screen,
but would not let you produce an unencrypted document that you could use in
other ways. GPG, a free software package, makes security features available to
the users; they use it. Treacherous computing is designed to impose
restrictions on the users; it uses them."
+msgstr "عÙدÙ
ا ÙستخدÙ
Ø£Øد جÙ‌بÙ‌ج٠ÙإرساÙ
Ù
ستÙد Ù
Ø´ÙØ±Ø ÙتستطÙع استخداÙ
جÙ‌بÙ‌جÙ
ÙÙÙÙØ Ø§ÙÙاتج Ù
ستÙد غÙر Ù
Ø´Ùر تستطÙع ÙراءتÙØ
ÙتÙ
رÙرÙØ ÙÙسخÙØ ÙØت٠إعادة تشÙÙر٠ÙإرساÙÙ
بأÙ
ا٠إÙ٠شخص آخر. تطبÙ٠اÙØÙسبة اÙغادرة
سÙÙ Ùدع٠تÙرأ اÙÙÙÙ
ات عÙ٠اÙØ´Ø§Ø´Ø©Ø ÙÙÙ ÙÙ
Ùدع٠تÙÙد Ù
ستÙد غÙر Ù
Ø´Ùر تستطÙع استخداÙ
Ù
بطر٠أخرÙ. جÙ‌بÙ‌جÙØ ØزÙ
Ø© برÙ
جÙات
ØØ±Ø©Ø ØªØ¬Ø¹Ù Ù
زاÙا اÙØ£Ù
ا٠Ù
تاØØ© ÙÙÙ
ستخدÙ
ÙÙØ ÙÙ
ÙستخدÙ
ÙÙÙ. اÙØÙسبة اÙغادرة Ù
صÙ
Ù
Ø© ÙÙرض ÙÙÙد
عÙ٠اÙÙ
ستخدÙ
ÙÙØ Ù٠تستخدÙ
ÙÙ
."
+
+# type: Content of: <ol><li>
+msgid "The supporters of treacherous computing focus their discourse on its <a
name=\"beneficial\">beneficial uses</a>. What they say is often correct, just
not important."
+msgstr "داعÙ
٠اÙØÙسبة اÙغادرة ÙرÙزÙÙ ØدÙØ«ÙÙ
عÙÙ <a name=\"beneficial\">استخداÙ
اتÙا اÙÙ
ÙÙدة</a>. Ù
ا
ÙÙÙÙÙÙ٠عادة صØÙØØ ÙÙÙ٠غÙر Ù
ÙÙ
."
+
+# type: Content of: <ol><li><p>
+msgid "Like most hardware, treacherous computing hardware can be used for
purposes which are not harmful. But these uses can be implemented in other
ways, without treacherous computing hardware. The principal difference that
treacherous computing makes for users is the nasty consequence: rigging your
computer to work against you."
+msgstr "Ù
Ø«Ù Ù
عظÙ
اÙØ¹ØªØ§Ø¯Ø Ø¹ØªØ§Ø¯ اÙØÙسبة اÙغادرة
ÙÙ
Ù٠أ٠ÙستخدÙ
Ùأعراض غÙر ضارة. ÙÙÙ ÙØ°Ù
اÙاستخداÙ
ات ÙÙ
Ù٠تأدÙتÙا بطر٠أخرÙØ Ø¨Ø¯ÙÙ
عتاد اÙØÙسبة اÙغادرة. اÙÙر٠اÙرئÙس٠أÙ
اÙØÙسبة اÙغادرة تجع٠اÙÙ
ستخدÙ
ÙÙ Ù٠اÙØ£ÙÙ
ÙØ©
اÙÙذرة: اÙتÙاعب بØاسÙب٠ÙÙعÙ
٠ضدÙ."
+
+# type: Content of: <ol><li><p>
+msgid "What they say is true, and what I say is true. Put them together and
what do you get? Treacherous computing is a plan to take away our freedom,
while offering minor benefits to distract us from what we would lose."
+msgstr "Ù
ا ÙÙÙÙÙÙ٠صØÙØØ ÙÙ
ا اÙÙÙ٠صØÙØ. ضعÙÙ
Ù
عا ÙÙ
اذا تØصÙØ Ø§ÙØÙسبة اÙغادرة Ù٠خطة Ùأخذ
ØرÙتÙØ§Ø Ø£Ø«Ùاء تÙدÙÙ
Ù
ÙاÙع ضئÙÙØ© ÙصرÙÙا عÙ
ا
ÙÙÙد."
+
+# type: Content of: <ol><li>
+msgid "Microsoft presents palladium as a security measure, and claims that it
will protect against viruses, but this claim is evidently false. A
presentation by Microsoft Research in October 2002 stated that one of the
specifications of palladium is that existing operating systems and applications
will continue to run; therefore, viruses will continue to be able to do all the
things that they can do today."
+msgstr "Ù
اÙÙÙرÙسÙÙت تÙدÙ
اÙØراسة ÙÙ
عÙار Ø£Ù
اÙØ
Ùتدع٠أÙÙا ستØÙ
٠ضد اÙÙÙرÙØ³Ø§ØªØ ÙÙÙ Ùذا
اÙادعاء خاطئ بشÙÙ ÙاضØ. عرض ÙأبØاث Ù
اÙÙرÙسÙÙت Ù٠أÙتÙبر 2002 Ø£Øا٠ÙاØدة Ù
٠بÙÙد
اÙØراسة Ø¥ÙÙ ÙجÙد Ø£ÙظÙ
Ø© تشغÙÙ ÙتطبÙÙات
ستÙاص٠اÙعÙ
ÙØ ÙØ°ÙÙØ Ø§ÙÙÙرÙسات سÙ٠تÙاصÙ
اÙÙدرة عÙÙ Ùع٠ÙÙ Ø´ÙØ¡ تستطÙع ÙعÙ٠اÙÙÙÙ
."
+
+# type: Content of: <ol><li><p>
+msgid "When Microsoft speaks of “security” in connection with
palladium, they do not mean what we normally mean by that word: protecting your
machine from things you do not want. They mean protecting your copies of data
on your machine from access by you in ways others do not want. A slide in the
presentation listed several types of secrets palladium could be used to keep,
including “third party secrets” and “user
secrets”—but it put “user secrets” in quotation marks,
recognizing that this somewhat of an absurdity in the context of palladium."
+msgstr "عÙدÙ
ا تتØدث Ù
اÙÙرÙسÙÙت ع٠”اÙØ£Ù
آ Ù
رتبطا باÙØØ±Ø§Ø³Ø©Ø Ùا تعÙÙ Ù
ا ÙعÙÙÙ
عادة بÙذ٠اÙÙÙÙ
Ø©: ØÙ
اÙØ© جÙاز٠Ù
٠اÙأشÙاء
اÙت٠Ùا ترÙدÙا. ÙعÙÙÙ ØÙ
اÙØ© ÙÙسخ٠Ù
Ù
اÙبÙاÙات عÙÙ ØاسÙب٠Ù٠أ٠تÙص٠بÙاسطت٠بطرÙ
Ùا ÙرÙدÙا اÙآخرÙÙ. شرÙØØ© ÙÙ Ùذا اÙعرض أدرجت
Ø£ÙÙاع عدÙدة ÙÙØراسة اÙسرÙØ© ÙÙ
Ù٠أ٠تستخدÙ
Ù٠اÙتÙÙÙØ¯Ø Ø¨Ù
ا ÙÙ Ø°ÙÙ ”أسرار اÙطرÙ
اÙثاÙØ«“ ٔأسرار اÙÙ
ستخدÙ
“—ÙÙÙÙا تضع ”أسرار اÙÙ
ستخدÙ
“
بÙ٠عÙاÙ
ت٠اÙØªØ¨Ø§Ø³Ø Ø¨Ù
ا ÙÙØ٠أ٠Ùذا Ø´ÙØ¡ Ù
Ù
اÙعبث بسÙا٠اÙØراسة."
+
+# type: Content of: <ol><li><p>
+msgid "The presentation made frequent use of other terms that we frequently
associate with the context of security, such as “attack”,
“malicious code”, “spoofing”, as well as
“trusted”. None of them means what it normally means.
“Attack” doesn't mean someone trying to hurt you, it means you
trying to copy music. “Malicious code” means code installed by you
to do what someone else doesn't want your machine to do.
“Spoofing” doesn't mean someone fooling you, it means you fooling
palladium. And so on."
+msgstr "اÙعرض جع٠اÙاستخداÙ
اÙاعتÙاد٠ÙÙبÙÙد
اÙأخر٠اÙت٠ÙربطÙا عادة Ù
ع سÙا٠اÙØ£Ù
اÙØ Ù
Ø«Ù
”ÙجÙÙ
“Ø Ù”Ø´ÙÙرة ضارة“Ø
ٔخداع“Ø Ø¨Ø§ÙإضاÙØ© Ø¥ÙÙ ”Ù
ÙØ«ÙÙ“.
Ùا Ø´ÙØ¡ Ù
ÙÙا ÙعÙÙ Ù
ا ÙعÙ٠عادة. ”اÙÙجÙÙ
“ Ùا ÙعÙ٠أ٠أØدا ÙØاÙ٠إÙذاءÙØ ÙعÙ٠أÙÙ
تØاÙÙ Ùسخ Ù
ÙسÙÙÙ. ”اÙØ´ÙÙرة اÙضارة“
تعÙ٠اÙØ´ÙÙرة اÙÙ
ثبتة بÙاسطت٠ÙÙÙÙاÙ
بشÙØ¡
Ùا ÙÙد شخص آخر Ù
Ù ØاسÙب٠أ٠ÙÙÙÙ
بÙ.
”اÙخداع“ Ùا ÙعÙ٠أ٠أØدا ÙØاÙÙ Ù
غاÙÙتÙØ ÙعÙ٠أÙ٠تغاÙ٠اÙØراسة. ÙÙÙذا
دÙاÙÙÙ."
+
+# type: Content of: <ol><li>
+msgid "A previous statement by the palladium developers stated the basic
premise that whoever developed or collected information should have total
control of how you use it. This would represent a revolutionary overturn of
past ideas of ethics and of the legal system, and create an unprecedented
system of control. The specific problems of these systems are no accident;
they result from the basic goal. It is the goal we must reject."
+msgstr "إعÙا٠ساب٠Ù
Ù Ù
Ø·Ùر٠اÙØراسة Ùضع اÙÙعد
اÙأساس٠أ٠أ٠شخص ÙØ·Ùر Ø£Ù ÙجÙ
ع Ù
عÙÙÙ
ات Ùجب
Ø£Ù ÙÙ
تÙ٠اÙتØÙÙ
اÙÙاÙ
٠بÙÙÙÙØ© استخداÙ
Ùا.
Ùذا سÙÙ
ث٠اÙÙاÙبا Ø«ÙرÙا عÙ٠اÙØ£ÙÙار اÙÙ
اضÙØ© ØÙ٠اÙÙÙسÙØ© اÙأخÙاÙÙØ© ÙاÙÙظاÙ
اÙÙاÙÙÙÙØ ÙÙÙشئ ÙظاÙ
تØÙÙ
ÙرÙد. اÙÙ
Ø´ÙÙØ©
اÙخاصة بÙذ٠اÙØ£ÙظÙ
Ø© ÙÙست Ù
صادÙØ©Ø Ùتجت عÙ
اÙÙد٠اÙأساس. اÙÙد٠اÙØ°Ù Ùجب Ø£Ù ÙرÙضÙ."
+
+# type: Content of: <h4>
+msgid "This essay is published in <a href=\"/doc/book13.html\"><cite>Free
Software, Free Society: The Selected Essays of Richard M. Stallman</cite></a>"
+msgstr "Ùذ٠اÙÙصÙØØ© ÙÙشرت ÙÙ <a
href=\"/doc/book13.html\"><cite>Ù
جتÙ
ع اÙبرÙ
جÙات اÙØرة:
ÙØµØ§Ø¦Ø Ù
ÙتÙاة Ù
٠رÙتشارد Ø¥Ù
. ستاÙÙ
اÙ</cite></a>"
+
+# type: Content of: <div>
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
+msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
+msgstr " "
+
+# type: Content of: <div><p>
+msgid "Please send FSF & GNU inquiries to <a
href=\"mailto:address@hidden"><em>address@hidden</em></a>. There are also <a
href=\"/contact/\">other ways to contact</a> the FSF. <br /> Please send
broken links and other corrections (or suggestions) to <a
href=\"mailto:address@hidden"><em>address@hidden</em></a>."
+msgstr "Ù
Ù ÙضÙ٠أرس٠ÙØ¥Ù‌إس‌Ø¥Ù
ÙÙاستÙسارات جÙÙ Ù<a
href=\"mailto:address@hidden"><em>address@hidden</em></a>. ÙÙجد Ø£Ùضا <a
href=\"/contact/\">طر٠أخر٠ÙÙاتصاÙ</a>
باÙØ¥Ù‌إس‌Ø¥Ù. <br /> Ù
Ù ÙضÙ٠أرسÙاÙÙصÙات
اÙÙ
ÙÙطعة Ùأ٠تصØÙØات أ٠اÙتراØات Ø¥ÙÙ
<ahref=\"mailto:address@hidden"><em>address@hidden</em></a>."
+
+# type: Content of: <div><p>
+msgid "Please see the <a
href=\"/server/standards/README.translations.html\">Translations README</a> for
information on coordinating and submitting translations of this article."
+msgstr "Ù
Ù ÙضÙ٠راجع <a
href=\"/server/standards/README.translations.html\">ترجÙ
ات
اÙرأÙÙ</a> ÙÙ
عÙÙÙ
ات ØÙ٠تÙسÙÙ ÙتسÙÙÙ
ترجÙ
ات
Ùذ٠اÙÙ
ÙاÙØ©."
+
+# type: Content of: <div><p>
+msgid "Copyright © 2002, 2007 Richard Stallman"
+msgstr "ØÙÙ٠اÙÙشر © 2002Ø 2007 رÙتشارد ستÙÙ
اÙ"
+
+# type: Content of: <div><p>
+msgid "Verbatim copying and distribution of this entire article are permitted
worldwide, without royalty, in any medium, provided this notice, and the
copyright notice, are preserved."
+msgstr "اÙÙسخ ÙاÙتÙزÙع اÙØرÙÙ ÙÙ
دخÙØ© اÙÙ
Ùا٠Ù
Ùجازة ÙÙ Ù٠أÙØاء اÙعاÙÙ
Ø Ø¨Ø¯Ù٠أرباØØ Ù٠أÙ
ÙسÙØ·Ø Ù
ع Ùضع Ùذ٠اÙÙ
ÙاØظة Ù٠عÙ٠اÙاعتبار."
+
+# type: Content of: <div><div>
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.
+msgid "*GNUN-SLOT: TRANSLATOR'S CREDITS*"
+msgstr "تÙ
ت اÙترجÙ
Ø© بÙاسطة <a
href=\"mailto:address@hidden"><em>أساÙ
Ø© خاÙد</em></a><br />.ÙرÙÙ
اÙترجÙ
Ø© اÙعربÙØ© بإشرا٠<a
href=\"http://www.cruised.net/\"><em>ØساÙ
ØسÙÙ</em></a>."
+
+# type: Content of: <div><p>
+#. timestamp start
+msgid "Updated:"
+msgstr "ØÙدÙثت:"
+
+# type: Content of: <div><h4>
+msgid "Translations of this page"
+msgstr "ترجÙ
ات Ùذ٠اÙصÙØØ©"
+
- www/philosophy/po can-you-trust.ar.po,
Hossam Hossny <=