[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www proprietary/malware-apple.fr.html proprieta...
From: |
GNUN |
Subject: |
www proprietary/malware-apple.fr.html proprieta... |
Date: |
Tue, 12 Jan 2016 12:15:00 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 16/01/12 12:15:00
Modified files:
proprietary : malware-apple.fr.html malware-microsoft.fr.html
proprietary-back-doors.fr.html
proprietary-surveillance.fr.html
proprietary/po : malware-apple.fr-en.html
malware-microsoft.fr-en.html
proprietary-back-doors.fr-en.html
proprietary-surveillance.fr-en.html
server : sitemap.fr.html
server/po : sitemap.fr-en.html sitemap.fr.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.fr.html?cvsroot=www&r1=1.282&r2=1.283
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.fr-en.html?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.fr.po?cvsroot=www&r1=1.332&r2=1.333
Patches:
Index: proprietary/malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/malware-apple.fr.html 1 Dec 2015 20:27:54 -0000 1.13
+++ proprietary/malware-apple.fr.html 12 Jan 2016 12:14:48 -0000 1.14
@@ -270,6 +270,11 @@
<h3 id="drm">DRM</h3>
<ul>
<li><p><a
+href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017">
+Apple utilise un logiciel à DRM pour empêcher les gens de charger un iTruc
+avec un cable USB générique</a>.</p></li>
+
+ <li><p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
Le <abbr title="Digital Restrictions Management">DRM</abbr> (dispositif de
gestion numérique des restrictions) de MacOS</a>. Cet article porte
@@ -395,7 +400,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2015, 2016 Free Software Foundation, Inc.</p>
<p>Cette page peut être utilisée suivant les conditions de la licence <a
rel="license"
@@ -413,7 +418,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2015/12/01 20:27:54 $
+$Date: 2016/01/12 12:14:48 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/malware-microsoft.fr.html 17 Oct 2015 12:28:41 -0000
1.11
+++ proprietary/malware-microsoft.fr.html 12 Jan 2016 12:14:48 -0000
1.12
@@ -72,6 +72,11 @@
<h3 id="back-doors">Portes dérobées</h3>
<ul>
+ <li><p><a
+href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+Microsoft a déjà implémenté une porte dérobée dans le chiffrement des
+disques</a>.</p></li>
+
<li><p>Microsoft Windows a une porte dérobée universelle qui permet <a
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263">d'imposer
un changement aux utilisateurs, quel qu'il soit</a>.</p>
@@ -290,7 +295,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016 Free Software Foundation, Inc.</p>
<p>Cette page peut être utilisée suivant les conditions de la licence <a
rel="license"
@@ -308,7 +313,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2015/10/17 12:28:41 $
+$Date: 2016/01/12 12:14:48 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/proprietary-back-doors.fr.html 22 Dec 2015 16:58:22 -0000
1.11
+++ proprietary/proprietary-back-doors.fr.html 12 Jan 2016 12:14:49 -0000
1.12
@@ -17,7 +17,29 @@
<p>Voici des exemples de portes dérobées documentées dans des logiciels
privateurs.</p>
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<ul>
+ <li><p><a
+href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+Microsoft a déjà mis une porte dérobée dans le chiffrement des
disques</a>.</p></li>
+
+ <li><p>Les sal…applis <a
+href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+rassemblent une grande variété de données sur leurs utilisateurs, ainsi que
+sur les amis et associés de leurs utilisateurs</a>.</p>
+
+ <p>Pire, cela se fait au moyen de réseaux publicitaires qui combinent
les
+données rassemblées par diverses sal…applis et divers sites créés
par
+différentes sociétés.</p>
+
+ <p>Ils utilisent ces données pour inciter les gens à faire des achats
et font
+la chasse aux « baleines » qu'ils peuvent amener à faire de grosses
+dépenses. Ils utilisent aussi une porte dérobée afin de manipuler le
+déroulement du jeu pour des joueurs particuliers.</p>
+
+ <p>Bien que l'article décrive des jeux gratuits, les jeux payants
peuvent
+utiliser la même tactique.</p>
+ </li>
<li>
<p>Les ordinateurs Dell vendus avec Windows avaient un certificat racine
bidon
qui <a
@@ -322,7 +344,7 @@
href="/server/standards/README.translations.html">guide de traduction</a>.</p>
</div>
-<p>Copyright © 2014-2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014-2016 Free Software Foundation, Inc.</p>
<p>Cette page peut être utilisée suivant les conditions de la licence <a
rel="license"
@@ -340,7 +362,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2015/12/22 16:58:22 $
+$Date: 2016/01/12 12:14:49 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/proprietary-surveillance.fr.html 12 Dec 2015 13:34:26
-0000 1.27
+++ proprietary/proprietary-surveillance.fr.html 12 Jan 2016 12:14:51
-0000 1.28
@@ -59,12 +59,14 @@
<li><a href="#SpywareInTVSets">Téléviseurs</a></li>
</ul>
</li>
+ <li><a href="#SpywareAtPlay">Espions dans les jeux</a></li>
<li><a href="#SpywareOnTheWeb">Espions sur le web</a>
<ul>
<li><a href="#SpywareInChrome">Chrome</a></li>
<li><a href="#SpywareInFlash">Flash</a></li>
</ul>
</li>
+ <li><a href="#SpywareInChrome">Espions partout</a></li>
</ul>
</div>
@@ -112,6 +114,13 @@
</div>
<ul>
+ <li><p><a
+href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+Microsoft a déjà mis une porte dérobée dans le chiffrement des
disques</a>.</p></li>
+
+ <li>Il semble que <a
+href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/">
+Windows 10 rapporte à Microsoft quelles applications sont en
service</a>.</li>
<li><p>Une mise à jour régressive de Windows 10 a supprimé des
applications servant
à détecter la surveillance. Puis une autre a inséré un programme
d'espionnage tous azimuths. Les utilisateurs s'en sont rendus compte, alors
@@ -776,8 +785,44 @@
</li>
</ul>
+<!-- #SpywareAtPlay -->
+<div class="big-section">
+ <h3 id="SpywareAtPlay">Espions dans les jeux</h3>
+ <span class="anchor-reference-id">(<a
+href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>De nombreuses <a
+href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+consoles de jeu espionnent leurs utilisateurs et envoient sur
+Internet</a>… jusqu'Ã leur poids.</p>
+
+ <p>Une console de jeu est un ordinateur. Vous ne pouvez pas faire
confiance Ã
+un ordinateur équipé d'un système d'exploitation non libre.</p>
+ </li>
+
+ <li><p>Les sal…applis <a
+href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+rassemblent une grande variété de données sur leurs utilisateurs, ainsi que
+sur les amis et associés de leurs utilisateurs</a>.</p>
+
+ <p>Pire, cela se fait au moyen de réseaux publicitaires qui combinent
les
+données rassemblées par diverses sal…applis et divers sites créés
par
+différentes sociétés.</p>
+
+ <p>Ils utilisent ces données pour inciter les gens à faire des achats
et font
+la chasse aux « baleines » qu'ils peuvent amener à faire de grosses
+dépenses. Ils utilisent aussi une porte dérobée afin de manipuler le
+déroulement du jeu pour des joueurs particuliers.</p>
+
+ <p>Bien que cet article décrive des jeux gratuits, les jeux payants
pouvent
+utiliser la même tactique.</p>
+ </li>
+</ul>
+
<!-- #SpywareOnTheWeb -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnTheWeb">Espions sur le web</h3>
<span class="anchor-reference-id">(<a
@@ -802,7 +847,7 @@
<li><p>Les pages qui contiennent des boutons <cite>Like</cite> <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
permettent à Facebook de pister les visiteurs de ces pages</a>, même ceux
-qui n'ont pas de compte Facebook. </p>
+qui n'ont pas de compte Facebook.</p>
</li>
<li><p>De nombreux sites dénoncent leurs visiteurs aux réseaux
publicitaires qui
@@ -832,6 +877,7 @@
</li>
</ul>
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-subsection">
<h4 id="SpywareInChrome">Chrome</h4>
<span class="anchor-reference-id">(<a
@@ -869,6 +915,22 @@
<p>Une autre méthode de profilage fait usage de <a
href="/philosophy/javascript-trap.html">code JavaScript</a>. </p>
+<!-- #SpywareEverywhere -->
+<div class="big-section">
+ <h3 id="SpywareEverywhere">Espions partout</h3>
+ <span class="anchor-reference-id">(<a
+href="#SpywareEverywhere">#SpywareEverywhere</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
+href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+Les appareils d'Intel seront capables d'écouter la voix en permanence, même
+« à l'arrêt »</a>.</p>
+ </li>
+</ul>
+
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -931,7 +993,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2015, 2016 Free Software Foundation, Inc.</p>
<p>Cette page peut être utilisée suivant les conditions de la licence <a
rel="license"
@@ -949,7 +1011,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2015/12/12 13:34:26 $
+$Date: 2016/01/12 12:14:51 $
<!-- timestamp end -->
</p>
Index: proprietary/po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/malware-apple.fr-en.html 1 Dec 2015 20:27:54 -0000
1.12
+++ proprietary/po/malware-apple.fr-en.html 12 Jan 2016 12:14:53 -0000
1.13
@@ -236,6 +236,11 @@
<h3 id="drm">Apple DRM</h3>
<ul>
<li><p><a
+
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017">
+ Apple uses DRM software to prevent people from charging an iThing with a
+ generic USB cable</a>.</p></li>
+
+ <li><p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
DRM (digital restrictions mechanisms) in MacOS</a>. This article
focuses on the fact that a new model of Macbook introduced a requirement
@@ -344,7 +349,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2015, 2016 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -354,7 +359,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/12/01 20:27:54 $
+$Date: 2016/01/12 12:14:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/po/malware-microsoft.fr-en.html 17 Oct 2015 12:28:42 -0000
1.11
+++ proprietary/po/malware-microsoft.fr-en.html 12 Jan 2016 12:14:54 -0000
1.12
@@ -60,6 +60,9 @@
<h3 id="back-doors">Microsoft Back Doors</h3>
<ul>
+ <li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ Microsoft has already backdoored its disk encryption</a>.</p></li>
+
<li><p>Microsoft Windows has a universal back door through which <a
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263">
any change whatsoever can be imposed on the users</a>.</p>
@@ -240,7 +243,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -250,7 +253,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/17 12:28:42 $
+$Date: 2016/01/12 12:14:54 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/po/proprietary-back-doors.fr-en.html 22 Dec 2015 16:58:23
-0000 1.11
+++ proprietary/po/proprietary-back-doors.fr-en.html 12 Jan 2016 12:14:55
-0000 1.12
@@ -9,7 +9,27 @@
<p>Here are examples of demonstrated back doors in proprietary software.</p>
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<ul>
+ <li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ Microsoft has already backdoored its disk encryption</a>.</p></li>
+
+ <li><p>Modern gratis game cr…apps
+ <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users and their users'
+ friends and associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that merge the data
+ collected by various cr…apps and sites made by different
+ companies.</p>
+
+ <p>They use this data to manipulate people to buy things, and hunt
+ for “whales” who can be led to spend a lot of money. They
+ also use a back door to manipulate the game play for specific
players.</p>
+
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p>
+ </li>
<li>
<p>Dell computers, shipped with Windows, had a bogus root
certificate that
@@ -281,7 +301,7 @@
of this article.</p>
</div>
-<p>Copyright © 2014-2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014-2016 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -291,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/12/22 16:58:23 $
+$Date: 2016/01/12 12:14:55 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-surveillance.fr-en.html 12 Dec 2015 13:34:27
-0000 1.24
+++ proprietary/po/proprietary-surveillance.fr-en.html 12 Jan 2016 12:14:56
-0000 1.25
@@ -52,12 +52,14 @@
<li><a href="#SpywareInTVSets">Spyware in TV Sets</a></li>
</ul>
</li>
+ <li><a href="#SpywareAtPlay">Spyware at Play</a></li>
<li><a href="#SpywareOnTheWeb">Spyware on the Web</a>
<ul>
<li><a href="#SpywareInChrome">Spyware in Chrome</a></li>
<li><a href="#SpywareInFlash">Spyware in Flash</a></li>
</ul>
</li>
+ <li><a href="#SpywareEverywhere">Spyware Everywhere</a></li>
</ul>
</div><!-- /class="toc" -->
@@ -107,6 +109,13 @@
</div>
<ul>
+ <li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ Microsoft has already backdoored its disk encryption</a>.</p></li>
+
+ <li>It appears
+ <a
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/">
+ Windows 10 sends data to Microsoft about what applications are
+ running</a>.</li>
<li><p>A downgrade to Windows 10 deleted surveillance-detection
applications. Then another downgrade inserted a general spying
program. Users noticed this and complained, so Microsoft
@@ -707,10 +716,42 @@
</li>
</ul>
+<!-- #SpywareAtPlay -->
+<div class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at Play</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report to the
+ internet</a>— even what their users weigh.</p>
+
+ <p>A game console is a computer, and you can't trust a computer with
+ a nonfree operating system.</p>
+ </li>
+
+ <li><p>Modern gratis game cr…apps
+ <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users and their users'
+ friends and associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that merge the data
+ collected by various cr…apps and sites made by different
+ companies.</p>
+
+ <p>They use this data to manipulate people to buy things, and hunt
+ for “whales” who can be led to spend a lot of money. They
+ also use a back door to manipulate the game play for specific
players.</p>
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p>
+ </li>
+</ul>
<!-- #SpywareOnTheWeb -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
@@ -760,6 +801,7 @@
</li>
</ul>
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-subsection">
<h4 id="SpywareInChrome">Spyware in Chrome</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
@@ -792,6 +834,20 @@
<p><a href="/philosophy/javascript-trap.html">Javascript code</a>
is another method of “fingerprinting” devices.</p>
+
+<!-- #SpywareEverywhere -->
+<div class="big-section">
+ <h3 id="SpywareEverywhere">Spyware Everywhere</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareEverywhere">#SpywareEverywhere</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will be able to listen for speech all the time, even when
“off.”</a></p>
+ </li>
+</ul>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -839,7 +895,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2015, 2016 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -849,7 +905,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/12/12 13:34:27 $
+$Date: 2016/01/12 12:14:56 $
<!-- timestamp end -->
</p>
</div>
Index: server/sitemap.fr.html
===================================================================
RCS file: /web/www/www/server/sitemap.fr.html,v
retrieving revision 1.282
retrieving revision 1.283
diff -u -b -r1.282 -r1.283
--- server/sitemap.fr.html 10 Jan 2016 18:03:02 -0000 1.282
+++ server/sitemap.fr.html 12 Jan 2016 12:14:57 -0000 1.283
@@ -1922,7 +1922,7 @@
<dd>Thank GNUs, 2014</dd>
<dt><a href="/thankgnus/2015supporters.html">2015supporters.html</a></dt>
<dd>Thank GNUs, 2015</dd>
- <dt><a href="/thankgnus/2016supporters.html">2016supporters.html</a></dt>
+ <dt><a href="/thankgnus/2006supporters.html">2016supporters.html</a></dt>
<dd>Thank GNUs, 2016</dd>
<dt><a href="/thankgnus/thankgnus.old.html">thankgnus.old.html</a></dt>
<dd>Old Thanks GNUs</dd>
@@ -2044,7 +2044,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2016/01/10 18:03:02 $
+$Date: 2016/01/12 12:14:57 $
<!-- timestamp end -->
</p>
Index: server/po/sitemap.fr-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.fr-en.html,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- server/po/sitemap.fr-en.html 1 Jan 2016 18:02:27 -0000 1.174
+++ server/po/sitemap.fr-en.html 12 Jan 2016 12:14:59 -0000 1.175
@@ -1789,6 +1789,8 @@
<dd>Thank GNUs, 2014</dd>
<dt><a href="/thankgnus/2015supporters.html">2015supporters.html</a></dt>
<dd>Thank GNUs, 2015</dd>
+ <dt><a href="/thankgnus/2016supporters.html">2016supporters.html</a></dt>
+ <dd>Thank GNUs, 2016</dd>
<dt><a href="/thankgnus/thankgnus.old.html">thankgnus.old.html</a></dt>
<dd>Old Thanks GNUs</dd>
</dl>
@@ -1895,7 +1897,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/01/01 18:02:27 $
+$Date: 2016/01/12 12:14:59 $
<!-- timestamp end -->
</p>
</div>
Index: server/po/sitemap.fr.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.fr.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- server/po/sitemap.fr.po 12 Jan 2016 11:34:33 -0000 1.332
+++ server/po/sitemap.fr.po 12 Jan 2016 12:14:59 -0000 1.333
@@ -4814,8 +4814,8 @@
msgid ""
"FSF's Position on W3 Consortium “Royalty-Free” Patent Policy"
msgstr ""
-"Position de la FSF sur la politique de brevets « libres de droits » "
-"<cite>[royalty-free]</cite> du W3 Consortium"
+"Position de la FSF sur la politique de brevets « libres de droits »
<cite>"
+"[royalty-free]</cite> du W3 Consortium"
#. type: Content of: <div><dl><dd><dl><dt>
msgid "<a href=\"/philosophy/wassenaar.html\">wassenaar.html</a>"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www proprietary/malware-apple.fr.html proprieta...,
GNUN <=