www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po proprietary-back-doors.ru.po


From: Pavel Kharitonov
Subject: www/proprietary/po proprietary-back-doors.ru.po
Date: Tue, 22 Dec 2015 17:24:03 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     Pavel Kharitonov <ineiev>       15/12/22 17:24:03

Modified files:
        proprietary/po : proprietary-back-doors.ru.po 

Log message:
        Update.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.30&r2=1.31

Patches:
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-back-doors.ru.po        22 Dec 2015 12:11:16 -0000      1.30
+++ proprietary-back-doors.ru.po        22 Dec 2015 17:24:03 -0000      1.31
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "POT-Creation-Date: 2015-12-22 12:08+0000\n"
-"PO-Revision-Date: 2015-12-11 17:34+0000\n"
+"PO-Revision-Date: 2015-12-22 17:34+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
 "Language: ru\n"
@@ -46,6 +46,10 @@
 "are-out-to-get-you/\">allowed anyone (not just Dell) to remotely authorize "
 "any software to run</a> on the computer."
 msgstr ""
+"У компьютеров Dell, поставлявшихся с Windows, 
был несуразный корневой сертификат, <a "
+"href=\"http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-";
+"are-out-to-get-you/\">позволявший кому угодно (не 
только Dell) санкционировать "
+"на расстоянии выполнение любых 
программ</a> на компьютере."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -54,10 +58,14 @@
 "remote-hijacking-baidu-wrote-code-google-made\">can &ldquo;upload "
 "files&rdquo; as well as forcibly install apps</a>."
 msgstr ""
+"В несвободной библиотеке Baidu, Moplus, есть 
лазейка, с помощью которой <a href="
+"\"https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-";
+"remote-hijacking-baidu-wrote-code-google-made\">можно 
&ldquo;высылать "
+"файлы на сервер&rdquo;, а также принудительно 
устанавливать приложения</a>."
 
 #. type: Content of: <ul><li><p>
 msgid "It is used by 14,000 Android applications."
-msgstr ""
+msgstr "Она применяется в 14000 приложениях Android."
 
 #. type: Content of: <ul><li><p>
 msgid ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]