www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/malware-apple.fr.html philosophy...


From: GNUN
Subject: www philosophy/malware-apple.fr.html philosophy...
Date: Fri, 30 May 2014 09:58:18 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     14/05/30 09:58:18

Modified files:
        philosophy     : malware-apple.fr.html 
                         malware-kindle-swindle.fr.html 
                         malware-microsoft.fr.html 
                         malware-mobiles.fr.html 
                         proprietary-back-doors.fr.html 
                         proprietary-drm.fr.html 
                         proprietary-insecurity.fr.html 
                         proprietary-jails.fr.html 
                         proprietary-sabotage.fr.html 
                         proprietary-surveillance.fr.html 
                         proprietary-tyrants.fr.html proprietary.fr.html 
        philosophy/po  : malware-apple.fr-en.html malware-apple.fr.po 
                         malware-kindle-swindle.fr-en.html 
                         malware-kindle-swindle.fr.po 
                         malware-microsoft.fr-en.html 
                         malware-microsoft.fr.po 
                         malware-mobiles.fr-en.html 
                         malware-mobiles.fr.po 
                         proprietary-back-doors.fr-en.html 
                         proprietary-back-doors.fr.po 
                         proprietary-drm.fr-en.html 
                         proprietary-drm.fr.po 
                         proprietary-insecurity.fr-en.html 
                         proprietary-insecurity.fr.po 
                         proprietary-jails.fr-en.html 
                         proprietary-jails.fr.po 
                         proprietary-sabotage.fr-en.html 
                         proprietary-surveillance.fr-en.html 
                         proprietary-tyrants.fr-en.html 
                         proprietary-tyrants.fr.po 
                         proprietary.fr-en.html proprietary.fr.po 
        server/gnun/compendia: compendium.fr.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-apple.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-kindle-swindle.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-microsoft.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/malware-mobiles.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-back-doors.fr.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-drm.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-insecurity.fr.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-jails.fr.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-sabotage.fr.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-surveillance.fr.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-tyrants.fr.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary.fr.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/malware-apple.fr-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/malware-apple.fr.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/malware-kindle-swindle.fr-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/malware-kindle-swindle.fr.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/malware-microsoft.fr.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/malware-mobiles.fr.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary-drm.fr-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary-drm.fr.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary-jails.fr-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary-jails.fr.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary-tyrants.fr-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary-tyrants.fr.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary.fr-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/proprietary.fr.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/server/gnun/compendia/compendium.fr.po?cvsroot=www&r1=1.59&r2=1.60

Patches:
Index: philosophy/malware-apple.fr.html
===================================================================
RCS file: /web/www/www/philosophy/malware-apple.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/malware-apple.fr.html    29 May 2014 16:59:35 -0000      1.2
+++ philosophy/malware-apple.fr.html    30 May 2014 09:58:05 -0000      1.3
@@ -11,6 +11,9 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Malveillance des systèmes d'exploitation Apple</h2>
 
+<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+le logiciel privateur</a>
+
 <p>
 Un logiciel est dit « malveillant » lorsque son fonctionnement a été 
conçu
 pour traiter l'utilisateur de manière inéquitable ou lui faire du tort
@@ -169,7 +172,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/05/29 16:59:35 $
+$Date: 2014/05/30 09:58:05 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/malware-kindle-swindle.fr.html
===================================================================
RCS file: /web/www/www/philosophy/malware-kindle-swindle.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/malware-kindle-swindle.fr.html   29 May 2014 16:29:50 -0000      
1.2
+++ philosophy/malware-kindle-swindle.fr.html   30 May 2014 09:58:05 -0000      
1.3
@@ -10,6 +10,9 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Malveillance du Kindle Swindle</h2>
 
+<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+le logiciel privateur</a>
+
 <p>Nous appelons ce produit « <a
 href="/philosophy/why-call-it-the-swindle.html">Swindle d'Amazon</a> »<a
 id="TransNote1-rev" href="#TransNote1"><sup>1</sup></a> parce qu'il a un
@@ -125,7 +128,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/05/29 16:29:50 $
+$Date: 2014/05/30 09:58:05 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/philosophy/malware-microsoft.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/malware-microsoft.fr.html        29 May 2014 16:59:35 -0000      
1.2
+++ philosophy/malware-microsoft.fr.html        30 May 2014 09:58:05 -0000      
1.3
@@ -10,6 +10,9 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Malveillance des logiciels Microsoft</h2>
 
+<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+le logiciel privateur</a>
+
 <p>
 Un logiciel est dit « malveillant » lorsque son fonctionnement a été 
conçu
 pour traiter l'utilisateur de manière inéquitable ou lui faire du tort
@@ -180,7 +183,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/05/29 16:59:35 $
+$Date: 2014/05/30 09:58:05 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/philosophy/malware-mobiles.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/malware-mobiles.fr.html  29 May 2014 16:59:35 -0000      1.2
+++ philosophy/malware-mobiles.fr.html  30 May 2014 09:58:06 -0000      1.3
@@ -10,6 +10,9 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Malveillance des appareils mobiles</h2>
 
+<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+le logiciel privateur</a>
+
 <p>
 Un logiciel est dit « malveillant » lorsque son fonctionnement a été 
conçu
 pour traiter l'utilisateur de manière inéquitable ou lui faire du tort
@@ -185,7 +188,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/05/29 16:59:35 $
+$Date: 2014/05/30 09:58:06 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-back-doors.fr.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- philosophy/proprietary-back-doors.fr.html   28 May 2014 17:28:26 -0000      
1.18
+++ philosophy/proprietary-back-doors.fr.html   30 May 2014 09:58:06 -0000      
1.19
@@ -11,6 +11,9 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Portes dérobées du logiciel privateur</h2>
 
+<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+le logiciel privateur</a>
+
 <p>Voici des exemples de portes dérobées documentées dans des logiciels
 privateurs.</p>
 
@@ -228,7 +231,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/05/28 17:28:26 $
+$Date: 2014/05/30 09:58:06 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/proprietary-drm.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-drm.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/proprietary-drm.fr.html  28 May 2014 17:28:26 -0000      1.2
+++ philosophy/proprietary-drm.fr.html  30 May 2014 09:58:06 -0000      1.3
@@ -10,6 +10,9 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>DRM du logiciel privateur</h2>
 
+<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+le logiciel privateur</a>
+
 <p>Voici des exemples de programmes et de systèmes privateurs qui mettent en
 œuvre la <em>gestion numérique des restrictions</em> (<abbr title="Digital
 Restrictions Management">DRM</abbr>), autrement dit des fonctionnalités
@@ -176,7 +179,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/05/28 17:28:26 $
+$Date: 2014/05/30 09:58:06 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-insecurity.fr.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- philosophy/proprietary-insecurity.fr.html   28 May 2014 17:28:27 -0000      
1.14
+++ philosophy/proprietary-insecurity.fr.html   30 May 2014 09:58:06 -0000      
1.15
@@ -10,6 +10,9 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Insécurité du logiciel privateur</h2>
 
+<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+le logiciel privateur</a>
+
 <p>Cette page répertorie des failles de sécurité de logiciels privateurs,
 failles clairement établies qui ont des conséquences graves ou méritent
 d'être mentionnées pour d'autres raisons. </p>
@@ -210,7 +213,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/05/28 17:28:27 $
+$Date: 2014/05/30 09:58:06 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/proprietary-jails.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-jails.fr.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- philosophy/proprietary-jails.fr.html        29 May 2014 17:27:59 -0000      
1.7
+++ philosophy/proprietary-jails.fr.html        30 May 2014 09:58:06 -0000      
1.8
@@ -10,6 +10,9 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Prisons du logiciel privateur</h2>
 
+<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+le logiciel privateur</a>
+
 <p>Voici des exemples de systèmes privateurs qui sont de véritables
 <em>prisons</em> dans la mesure où ils n'autorisent pas l'utilisateur à
 installer librement des applications. Une <a
@@ -129,7 +132,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/05/29 17:27:59 $
+$Date: 2014/05/30 09:58:06 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-sabotage.fr.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- philosophy/proprietary-sabotage.fr.html     23 May 2014 19:58:01 -0000      
1.20
+++ philosophy/proprietary-sabotage.fr.html     30 May 2014 09:58:07 -0000      
1.21
@@ -10,6 +10,9 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Sabotage privateur</h2>
 
+<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+le logiciel privateur</a>
+
 <p>Voici des exemples de logiciels privateurs qui ont des caractéristiques
 encore pires qu'une porte dérobée.</p>
 
@@ -185,7 +188,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/05/23 19:58:01 $
+$Date: 2014/05/30 09:58:07 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-surveillance.fr.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- philosophy/proprietary-surveillance.fr.html 23 May 2014 19:58:01 -0000      
1.29
+++ philosophy/proprietary-surveillance.fr.html 30 May 2014 09:58:08 -0000      
1.30
@@ -11,6 +11,9 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Surveillance par le logiciel privateur</h2>
 
+<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+le logiciel privateur</a>
+
 <p>Cas clairement établis de logiciels privateurs espionnant l'utilisateur ou
 le suivant à la trace.</p>
 
@@ -275,7 +278,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/05/23 19:58:01 $
+$Date: 2014/05/30 09:58:08 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/proprietary-tyrants.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-tyrants.fr.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- philosophy/proprietary-tyrants.fr.html      12 Apr 2014 13:57:27 -0000      
1.4
+++ philosophy/proprietary-tyrants.fr.html      30 May 2014 09:58:08 -0000      
1.5
@@ -1,17 +1,18 @@
-
+<!--#set var="ENGLISH_PAGE" value="/philosophy/proprietary-tyrants.en.html" -->
 
 <!--#include virtual="/server/header.fr.html" -->
 <!-- Parent-Version: 1.77 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
- <!--#set var="ENGLISH_PAGE" value="/philosophy/proprietary-tyrants.en.html" 
-->
-
 <title>Tyrans privateurs - Projet GNU - Free Software Foundation</title>
 
 <!--#include virtual="/philosophy/po/proprietary-tyrants.translist" -->
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Tyrans privateurs</h2>
 
+<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+le logiciel privateur</a>
+
 <p>Un appareil <em>tyran</em> a comme particularité de refuser aux 
utilisateurs
 le droit d'installer un système d'exploitation différent ou modifié. Ces
 appareils ont des dispositifs destinés à bloquer l'exécution de systèmes
@@ -133,7 +134,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/04/12 13:57:27 $
+$Date: 2014/05/30 09:58:08 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/proprietary.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary.fr.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- philosophy/proprietary.fr.html      29 May 2014 17:27:59 -0000      1.12
+++ philosophy/proprietary.fr.html      30 May 2014 09:58:08 -0000      1.13
@@ -7,6 +7,16 @@
 <title>Logiciel privateur - Projet GNU - Free Software Foundation </title>
 
 <!--#include virtual="/philosophy/po/proprietary.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+div.companies { float: right; margin-bottom: .5em; }
+div.malfunctions { max-width: 27em; }
+
+</style>
+
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Logiciel privateur</h2>
 
@@ -32,18 +42,27 @@
 pratique courante de nos jours. Le logiciel privateur moderne est fait pour
 les gogos.</p>
 
-<p>Voici des exemples de programmes privateurs largement utilisés qui sont
-connus pour être malveillants. Ils sont classés par type de fonctionnalité
-malveillante.</p>
+<div class="toc">
+<div class="companies">
+<ul>
+  <li><strong>Société ou type de produit</strong></li>
+  <li><a href="/philosophy/malware-apple.html">Malveillance d'Apple</a></li>
+  <li><a href="/philosophy/malware-microsoft.html">Malveillance de 
Microsoft</a></li>
+  <li><a
+href="/philosophy/malware-mobiles.html">Malveillance des appareils 
mobiles</a></li>
+  <li><a
+href="/philosophy/malware-kindle-swindle.html">Malveillance du 
<cite>Swindle</cite>
+d'Amazon</a><a id="TransNote1-rev" href="#TransNote1"><sup>1</sup></a></li>
+</ul>
+</div>
 
+<div class="malfunctions">
 <ul>
-<li><a href="/philosophy/proprietary-back-doors.html">Portes dérobées du
-logiciel privateur</a></li>
-<li><a href="/philosophy/proprietary-insecurity.html">Insécurité du logiciel
-privateur</a></li>
-<li><a href="/philosophy/proprietary-sabotage.html">Sabotage privateur</a></li>
-<li><a href="/philosophy/proprietary-surveillance.html">Surveillance par le
-logiciel privateur</a></li>
+<li><strong>Type de malveillance</strong></li>
+<li><a href="/philosophy/proprietary-back-doors.html">Portes 
dérobées</a></li>
+<li><a href="/philosophy/proprietary-insecurity.html">Insécurité</a></li>
+<li><a href="/philosophy/proprietary-sabotage.html">Sabotage</a></li>
+<li><a href="/philosophy/proprietary-surveillance.html">Surveillance</a></li>
 <li>« <a href="/philosophy/proprietary-drm.html">Gestion numérique des
 restrictions </a> » ou « <abbr title="Digital Restriction
 Management">DRM</abbr> » – fonctionnalités conçues pour limiter ce que 
les
@@ -53,21 +72,8 @@
 <li><a href="/philosophy/proprietary-tyrants.html">Tyrans</a> – systèmes qui
 rejettent tout système d'exploitation non « autorisé » par le 
fabricant.</li>
 </ul>
-
-<p>Les pages ci-dessous présentent quelques-uns de ces exemples, classés par
-éditeur ou par système.</p>
-
-<ul>
-  <li><a href="/philosophy/malware-apple.html">Malveillance des logiciels
-Apple</a></li>
-  <li><a href="/philosophy/malware-microsoft.html">Malveillance des logiciels
-Microsoft</a></li>
-  <li><a href="/philosophy/malware-mobiles.html">Malveillance des appareils
-mobiles</a></li>
-  <li><a href="/philosophy/malware-kindle-swindle.html">Malveillance du
-<cite>Swindle</cite> d'Amazon</a><a id="TransNote1-rev"
-href="#TransNote1"><sup>1</sup></a></li>
-</ul>
+</div>
+</div>
 
 <p>Les utilisateurs de logiciel privateur sont sans défense contre ces formes
 d'abus. La seule manière de les éviter est d'exiger du <a
@@ -155,7 +161,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/05/29 17:27:59 $
+$Date: 2014/05/30 09:58:08 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/malware-apple.fr-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- philosophy/po/malware-apple.fr-en.html      28 May 2014 17:28:27 -0000      
1.1
+++ philosophy/po/malware-apple.fr-en.html      30 May 2014 09:58:10 -0000      
1.2
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Apple's Operating Systems Are Malware</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -141,7 +143,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/28 17:28:27 $
+$Date: 2014/05/30 09:58:10 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/malware-apple.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/malware-apple.fr.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/malware-apple.fr.po   30 May 2014 09:25:57 -0000      1.6
+++ philosophy/po/malware-apple.fr.po   30 May 2014 09:58:11 -0000      1.7
@@ -214,9 +214,6 @@
 "corrections ou suggestions peuvent être signalés à <a href=\"mailto:";
 "address@hidden">&lt;address@hidden&gt;</a>."
 
-#
-#
-#
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: philosophy/po/malware-kindle-swindle.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/malware-kindle-swindle.fr-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- philosophy/po/malware-kindle-swindle.fr-en.html     28 May 2014 17:28:28 
-0000      1.1
+++ philosophy/po/malware-kindle-swindle.fr-en.html     30 May 2014 09:58:11 
-0000      1.2
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in the Kindle Swindle</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>We refer to this product as the 
 <a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
 because it has <a href="/philosophy/proprietary-drm.html">Digital restrictions
@@ -100,7 +102,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/28 17:28:28 $
+$Date: 2014/05/30 09:58:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/malware-kindle-swindle.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/malware-kindle-swindle.fr.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/malware-kindle-swindle.fr.po  30 May 2014 09:25:57 -0000      
1.6
+++ philosophy/po/malware-kindle-swindle.fr.po  30 May 2014 09:58:11 -0000      
1.7
@@ -127,9 +127,6 @@
 "corrections ou suggestions peuvent être signalés à <a href=\"mailto:";
 "address@hidden">&lt;address@hidden&gt;</a>."
 
-#
-#
-#
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: philosophy/po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/malware-microsoft.fr-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- philosophy/po/malware-microsoft.fr-en.html  28 May 2014 17:28:28 -0000      
1.1
+++ philosophy/po/malware-microsoft.fr-en.html  30 May 2014 09:58:11 -0000      
1.2
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Microsoft's Software is Malware</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -149,7 +151,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/28 17:28:28 $
+$Date: 2014/05/30 09:58:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/malware-microsoft.fr.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/malware-microsoft.fr.po       30 May 2014 09:25:57 -0000      
1.6
+++ philosophy/po/malware-microsoft.fr.po       30 May 2014 09:58:11 -0000      
1.7
@@ -244,9 +244,6 @@
 "corrections ou suggestions peuvent être signalés à <a href=\"mailto:";
 "address@hidden">&lt;address@hidden&gt;</a>."
 
-#
-#
-#
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: philosophy/po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/malware-mobiles.fr-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- philosophy/po/malware-mobiles.fr-en.html    28 May 2014 17:28:29 -0000      
1.1
+++ philosophy/po/malware-mobiles.fr-en.html    30 May 2014 09:58:11 -0000      
1.2
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in Mobile Devices</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -148,7 +150,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/28 17:28:29 $
+$Date: 2014/05/30 09:58:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/malware-mobiles.fr.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/malware-mobiles.fr.po 30 May 2014 09:25:57 -0000      1.6
+++ philosophy/po/malware-mobiles.fr.po 30 May 2014 09:58:11 -0000      1.7
@@ -241,9 +241,6 @@
 "corrections ou suggestions peuvent être signalés à <a href=\"mailto:";
 "address@hidden">&lt;address@hidden&gt;</a>."
 
-#
-#
-#
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: philosophy/po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- philosophy/po/proprietary-back-doors.fr-en.html     23 May 2014 19:58:03 
-0000      1.12
+++ philosophy/po/proprietary-back-doors.fr-en.html     30 May 2014 09:58:12 
-0000      1.13
@@ -5,6 +5,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Back Doors</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>Here are examples of demonstrated back doors in proprietary software.</p>
 
 <ul>
@@ -189,7 +191,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/23 19:58:03 $
+$Date: 2014/05/30 09:58:12 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary-back-doors.fr.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- philosophy/po/proprietary-back-doors.fr.po  30 May 2014 09:25:57 -0000      
1.35
+++ philosophy/po/proprietary-back-doors.fr.po  30 May 2014 09:58:12 -0000      
1.36
@@ -285,9 +285,6 @@
 "corrections ou suggestions peuvent être signalés à <a href=\"mailto:";
 "address@hidden">&lt;address@hidden&gt;</a>."
 
-#
-#
-#
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: philosophy/po/proprietary-drm.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary-drm.fr-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- philosophy/po/proprietary-drm.fr-en.html    19 Apr 2014 13:00:26 -0000      
1.1
+++ philosophy/po/proprietary-drm.fr-en.html    30 May 2014 09:58:12 -0000      
1.2
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary DRM</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>Here are examples of proprietary programs and systems that
 implement <em>digital restrictions management</em> (DRM):
 functionalities designed intentionally to restrict what users can do.
@@ -148,7 +150,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/04/19 13:00:26 $
+$Date: 2014/05/30 09:58:12 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/proprietary-drm.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary-drm.fr.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/proprietary-drm.fr.po 30 May 2014 09:25:58 -0000      1.6
+++ philosophy/po/proprietary-drm.fr.po 30 May 2014 09:58:12 -0000      1.7
@@ -188,9 +188,6 @@
 "corrections ou suggestions peuvent être signalés à <a href=\"mailto:";
 "address@hidden">&lt;address@hidden&gt;</a>."
 
-#
-#
-#
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: philosophy/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- philosophy/po/proprietary-insecurity.fr-en.html     27 May 2014 11:13:07 
-0000      1.11
+++ philosophy/po/proprietary-insecurity.fr-en.html     30 May 2014 09:58:12 
-0000      1.12
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Insecurity</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>This page lists clearly established cases of insecurity in
 proprietary software that has grave consequences or is otherwise
 noteworthy.</p>
@@ -174,7 +176,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/27 11:13:07 $
+$Date: 2014/05/30 09:58:12 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary-insecurity.fr.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- philosophy/po/proprietary-insecurity.fr.po  30 May 2014 09:25:58 -0000      
1.35
+++ philosophy/po/proprietary-insecurity.fr.po  30 May 2014 09:58:12 -0000      
1.36
@@ -243,9 +243,6 @@
 "corrections ou suggestions peuvent être signalés à <a href=\"mailto:";
 "address@hidden">&lt;address@hidden&gt;</a>."
 
-#
-#
-#
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: philosophy/po/proprietary-jails.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary-jails.fr-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/proprietary-jails.fr-en.html  12 Apr 2014 13:59:36 -0000      
1.6
+++ philosophy/po/proprietary-jails.fr-en.html  30 May 2014 09:58:13 -0000      
1.7
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Jails</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>Here are examples of proprietary systems that are
 <em>jails</em>&mdash;they do not allow the user to freely install
 applications.  The <a href="http://i.imgur.com/ZRViDum.jpg";>image of
@@ -103,7 +105,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/04/12 13:59:36 $
+$Date: 2014/05/30 09:58:13 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/proprietary-jails.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary-jails.fr.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- philosophy/po/proprietary-jails.fr.po       30 May 2014 09:25:58 -0000      
1.16
+++ philosophy/po/proprietary-jails.fr.po       30 May 2014 09:58:13 -0000      
1.17
@@ -115,9 +115,6 @@
 "corrections ou suggestions peuvent être signalés à <a href=\"mailto:";
 "address@hidden">&lt;address@hidden&gt;</a>."
 
-#
-#
-#
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: philosophy/po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- philosophy/po/proprietary-sabotage.fr-en.html       23 May 2014 19:58:04 
-0000      1.17
+++ philosophy/po/proprietary-sabotage.fr-en.html       30 May 2014 09:58:13 
-0000      1.18
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Sabotage</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>Here are examples of proprietary software that has something
 worse than a back door.</p>
 
@@ -151,7 +153,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/23 19:58:04 $
+$Date: 2014/05/30 09:58:13 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- philosophy/po/proprietary-surveillance.fr-en.html   23 May 2014 19:58:04 
-0000      1.22
+++ philosophy/po/proprietary-surveillance.fr-en.html   30 May 2014 09:58:13 
-0000      1.23
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Surveillance</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>Clearly established cases of proprietary software that spies on or
 tracks users:</p>
 
@@ -224,7 +226,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/05/23 19:58:04 $
+$Date: 2014/05/30 09:58:13 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/proprietary-tyrants.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary-tyrants.fr-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- philosophy/po/proprietary-tyrants.fr-en.html        12 Apr 2014 13:59:37 
-0000      1.4
+++ philosophy/po/proprietary-tyrants.fr-en.html        30 May 2014 09:58:13 
-0000      1.5
@@ -6,6 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Tyrants</h2>
 
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+
 <p>A <em>tyrant</em> device is one that refuses to allow users to
 install a different operating system or a modified operating
 system.  These devices have measures to block execution of anything
@@ -106,7 +108,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/04/12 13:59:37 $
+$Date: 2014/05/30 09:58:13 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/proprietary-tyrants.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary-tyrants.fr.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- philosophy/po/proprietary-tyrants.fr.po     30 May 2014 09:25:58 -0000      
1.9
+++ philosophy/po/proprietary-tyrants.fr.po     30 May 2014 09:58:13 -0000      
1.10
@@ -111,9 +111,6 @@
 "corrections ou suggestions peuvent être signalés à <a href=\"mailto:";
 "address@hidden">&lt;address@hidden&gt;</a>."
 
-#
-#
-#
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: philosophy/po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary.fr-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- philosophy/po/proprietary.fr-en.html        27 Apr 2014 14:29:29 -0000      
1.10
+++ philosophy/po/proprietary.fr-en.html        30 May 2014 09:58:13 -0000      
1.11
@@ -3,6 +3,14 @@
 <title>Proprietary Software
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/philosophy/po/proprietary.translist" -->
+<style type="text/css" media="print,screen">
+div.companies { float: right; margin-bottom: .5em; }
+div.malfunctions { max-width: 27em; }
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style>
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Software</h2>
 
@@ -15,7 +23,7 @@
 injustice often leads to further injustice.</p>
 
 <p>Power corrupts, so the proprietary program's developer is tempted
-to design the program to mistreat its users &mdash;that is, to make
+to design the program to mistreat its users&mdash;that is, to make
 it <em>malware</em>.  (Malware means software whose functioning
 mistreats the user.)  Of course, the developer usually does not do
 this out of malice, but rather to put the users at a disadvantage.
@@ -25,18 +33,25 @@
 it is standard practice.  Modern proprietary software is software for
 suckers!</p>
 
-<p>Here are examples of widely used proprietary programs that are known to 
-be malware. They are organized by the type of malicious functionality.</p>
+<div class="toc">
+<div class="companies">
+<ul>
+  <li><strong>Company or type of product</strong></li>
+  <li><a href="/philosophy/malware-apple.html">Apple Malware</a></li>
+  <li><a href="/philosophy/malware-microsoft.html">Microsoft Malware</a></li>
+  <li><a href="/philosophy/malware-mobiles.html">Malware in mobile 
devices</a></li>
+  <li><a href="/philosophy/malware-kindle-swindle.html">Malware in the Amazon
+  Swindle</a></li>
+</ul>
+</div>
 
+<div class="malfunctions">
 <ul>
-<li><a href="/philosophy/proprietary-back-doors.html">Proprietary back
-    doors</a></li>
-<li><a href="/philosophy/proprietary-insecurity.html">Proprietary
-    insecurity</a></li>
-<li><a href="/philosophy/proprietary-sabotage.html">Proprietary
-    sabotage</a></li>
-<li><a href="/philosophy/proprietary-surveillance.html">Proprietary
-    surveillance</a></li>
+<li><strong>Type&nbsp;of malware</strong></li>
+<li><a href="/philosophy/proprietary-back-doors.html">Back doors</a></li>
+<li><a href="/philosophy/proprietary-insecurity.html">Insecurity</a></li>
+<li><a href="/philosophy/proprietary-sabotage.html">Sabotage</a></li>
+<li><a href="/philosophy/proprietary-surveillance.html">Surveillance</a></li>
 <li><a href="/philosophy/proprietary-drm.html">Digital restrictions
     management</a> or &ldquo;DRM&rdquo; means functionalities designed
     to restrict what users can do with the data in their computers.</li>
@@ -46,18 +61,8 @@
     that reject any operating system not &ldquo;authorized&rdquo; by the 
     manufacturer.</li>
 </ul>
-
-<p>These pages present some of the same examples, organized by
-specific companies or systems:</p>
-
-<ul>
-  <li><a href="/philosophy/malware-apple.html">Apple's software is 
malware</a></li>
-  <li><a href="/philosophy/malware-microsoft.html">Microsoft's software is
-  malware</a></li>
-  <li><a href="/philosophy/malware-mobiles.html">Malware in mobile 
devices</a></li>
-  <li><a href="/philosophy/malware-kindle-swindle.html">Malware in the Amazon
-  Swindle</a></li>
-</ul>
+</div>
+</div>
 
 <p>Users of proprietary software are defenseless against these forms
 of mistreatment.  The way to avoid them is by insisting on
@@ -123,7 +128,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/04/27 14:29:29 $
+$Date: 2014/05/30 09:58:13 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/proprietary.fr.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- philosophy/po/proprietary.fr.po     30 May 2014 09:25:59 -0000      1.32
+++ philosophy/po/proprietary.fr.po     30 May 2014 09:58:14 -0000      1.33
@@ -200,9 +200,6 @@
 "corrections ou suggestions peuvent être signalés à <a href=\"mailto:";
 "address@hidden">&lt;address@hidden&gt;</a>."
 
-#
-#
-#
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality

Index: server/gnun/compendia/compendium.fr.po
===================================================================
RCS file: /web/www/www/server/gnun/compendia/compendium.fr.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- server/gnun/compendia/compendium.fr.po      30 May 2014 06:59:26 -0000      
1.59
+++ server/gnun/compendia/compendium.fr.po      30 May 2014 09:58:14 -0000      
1.60
@@ -250,6 +250,8 @@
 "<a href=\"/philosophy/proprietary.html\">Other examples of proprietary "
 "malware</a>"
 msgstr ""
+"<a href=\"/philosophy/proprietary.html\">Autres exemples de malveillance "
+"dans le logiciel privateur</a>"
 
 #. type: Content of: <blockquote><p>
 msgid "Media Contact: Free Software Foundation"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]