www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.es.html malware-k...


From: GNUN
Subject: www/proprietary malware-apple.es.html malware-k...
Date: Fri, 06 May 2016 08:10:33 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/05/06 08:10:33

Modified files:
        proprietary    : malware-apple.es.html 
                         malware-kindle-swindle.es.html 
                         malware-mobiles.es.html 
                         proprietary-censorship.es.html 
        proprietary/po : malware-apple.es-en.html 
                         malware-kindle-swindle.es-en.html 
                         malware-mobiles.es-en.html 
                         proprietary-censorship.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-kindle-swindle.es.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.es.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-kindle-swindle.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.es-en.html?cvsroot=www&r1=1.8&r2=1.9

Patches:
Index: malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- malware-apple.es.html       24 Apr 2016 17:57:37 -0000      1.24
+++ malware-apple.es.html       6 May 2016 08:10:30 -0000       1.25
@@ -19,8 +19,8 @@
 <!--#include virtual="/server/banner.es.html" -->
 <h2>Los sistemas operativos de Apple son <cite>malware</cite></h2>
 
-<p><a href="/philosophy/proprietary/">Más ejemplos de <cite>malware</cite> en
-el software privativo</a></p>
+<p><a href="/proprietary/proprietary.html">Más ejemplos de 
<cite>malware</cite>
+en el software privativo</a></p>
 
 <div class="highlight-para">
 <p>
@@ -195,7 +195,7 @@
 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>
 Una «actualización» del  <cite>firmware</cite> de Apple desactivó los 
iPhone
 que habían sido desbloqueados</a>. La «actualización» también desactivó 
las
-aplicaciones que <a href="/philosophy/proprietary-jails.html">la censura de
+aplicaciones que <a href="/proprietary/proprietary-jails.html">la censura de
 Apple</a> no aprueba. Al parecer, todo esto fue intencionado.</p>
   </li>
 
@@ -458,7 +458,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2016/04/24 17:57:37 $
+$Date: 2016/05/06 08:10:30 $
 
 <!-- timestamp end -->
 </p>

Index: malware-kindle-swindle.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-kindle-swindle.es.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-kindle-swindle.es.html      29 Jun 2015 08:28:51 -0000      1.5
+++ malware-kindle-swindle.es.html      6 May 2016 08:10:30 -0000       1.6
@@ -18,8 +18,8 @@
 <!--#include virtual="/server/banner.es.html" -->
 <h2><cite>Malware</cite> en el Kindle Swindle</h2>
 
-<a href="/philosophy/proprietary/proprietary.html">Más ejemplos de
-<cite>malware</cite> en el software privativo</a>
+<a href="/proprietary/proprietary.html">Más ejemplos de <cite>malware</cite>
+en el software privativo</a>
 
 <p>Nos referimos a este producto como el <a
 href="/philosophy/why-call-it-the-swindle.html">Swindle de Amazon</a> porque
@@ -170,7 +170,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES";>Creative
@@ -186,7 +186,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2015/06/29 08:28:51 $
+$Date: 2016/05/06 08:10:30 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- malware-mobiles.es.html     20 Mar 2016 12:27:53 -0000      1.8
+++ malware-mobiles.es.html     6 May 2016 08:10:30 -0000       1.9
@@ -19,8 +19,8 @@
 <!--#include virtual="/server/banner.es.html" -->
 <h2><cite>Malware</cite> en los dispositivos móviles</h2>
 
-<p><a href="/philosophy/proprietary/proprietary.html">Más ejemplos de
-<cite>malware</cite> en el software privativo</a></p>
+<p><a href="/proprietary/proprietary.html">Más ejemplos de 
<cite>malware</cite>
+en el software privativo</a></p>
 
 <div class="highlight-para">
 <p>
@@ -46,10 +46,9 @@
 </div>
 
 <p>Estos son ejemplos de la presencia de <em>malware</em> en los dispositivos
-móviles. Véase también la <a
-href="/philosophy/proprietary/malware-apple.html"> página de programas
-dañinos de Apple</a>, donde se mencionan las funcionalidades maliciosas
-específicas de las iCosas de Apple.</p>
+móviles. Véase también la <a href="/proprietary/malware-apple.html"> página
+de programas dañinos de Apple</a>, donde se mencionan las funcionalidades
+maliciosas específicas de las iCosas de Apple.</p>
 
 <div class="toc">
 <div class="malfunctions">
@@ -84,7 +83,8 @@
   <li><p>La puerta trasera universal en los teléfonos móviles <a
 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/";>se
 emplea para convertirlos en dispositivos de escucha a través de sus
-micrófonos</a>.</p></li>
+micrófonos</a>.</p>
+  </li>
 
   <li><p>La mayoría de los teléfonos móviles tienen una puerta trasera 
universal que
 ha sido utilizada para <a
@@ -99,9 +99,8 @@
 almacenados en el dispositivo.</p>
   </li>
 
-  <li><p><a 
href="/philosophy/proprietary/proprietary-back-doors.html#samsung"> La
-puerta trasera de Samsung</a> permite el acceso a cualquier archivo del
-sistema.</p>
+  <li><p><a href="/proprietary/proprietary-back-doors.html#samsung"> La puerta
+trasera de Samsung</a> permite el acceso a cualquier archivo del sistema.</p>
   </li>
 
   <li>
@@ -111,13 +110,12 @@
 un programa llamado GTalkService).
   </p>
 
-  <p>
-  Google también puede <a
-href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>instalar
+<p>Google también puede <a
+href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
+title="en la Wayback Machine (archivado el 20 de mayo de 2015)">instalar
 aplicaciones por la fuerza y remotamente</a> a través de GTalkService (que
 al parecer se fusionó con Google Play después que se escribió ese
-artículo). Se trata en fin de cuentas de una puerta trasera universal.
-  </p>
+artículo). Se trata en fin de cuentas de una puerta trasera universal. </p>
 
   <p>
   Si bien hasta el momento Google no ha <em>ejercido</em> este poder de manera
@@ -237,10 +235,10 @@
 
 <h3 id="jails">Los móviles como prisiones</h3>
 <ul>
-  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";> 
Los
+  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>Los
 dispositivos móviles con Windows 8 son tiranos</a>. <a
-href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
-Windows 8 en los «dispositivos móviles» es una prisión.</a></p>
+href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>Windows
+8 en los «dispositivos móviles» es una prisión.</a></p>
   </li>
 </ul>
 
@@ -327,7 +325,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2016/03/20 12:27:53 $
+$Date: 2016/05/06 08:10:30 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-censorship.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.es.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-censorship.es.html      4 Apr 2016 08:29:20 -0000       1.10
+++ proprietary-censorship.es.html      6 May 2016 08:10:30 -0000       1.11
@@ -12,9 +12,9 @@
 
 <p>Se presentan aquí ejemplos de sistemas privativos que imponen la censura
 bloqueando el acceso de los usuarios a algunas funciones. Tenemos también
-una <a href="/philosophy/proprietary/proprietary-jails.html">lista de
-sistemas privativos que censuran la instalación</a> de programas de
-aplicación (los llamamos «prisiones»).</p>
+una <a href="/proprietary/proprietary-jails.html">lista de sistemas
+privativos que censuran la instalación</a> de programas de aplicación (los
+llamamos «prisiones»).</p>
 
 <p>Vender productos que están diseñados como plataformas para que una empresa
 imponga la censura debería estar prohibido por ley, pero no es así.</p>
@@ -148,7 +148,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2016/04/04 08:29:20 $
+$Date: 2016/05/06 08:10:30 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/malware-apple.es-en.html 24 Apr 2016 11:00:20 -0000      1.18
+++ po/malware-apple.es-en.html 6 May 2016 08:10:32 -0000       1.19
@@ -12,7 +12,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Apple's Operating Systems Are Malware</h2>
 
-<p><a href="/philosophy/proprietary/">Other examples of proprietary 
malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
 <div class="highlight-para">
 <p>
@@ -170,7 +170,7 @@
   <li><p><a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>
   An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
   unlocked.</a>  The &ldquo;upgrade&rdquo; also deactivated applications
-  not approved by <a href="/philosophy/proprietary-jails.html">Apple
+  not approved by <a href="/proprietary/proprietary-jails.html">Apple
   censorship</a>.  All this was apparently intentional.</p>
   </li>
 
@@ -401,7 +401,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/04/24 11:00:20 $
+$Date: 2016/05/06 08:10:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-kindle-swindle.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-kindle-swindle.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/malware-kindle-swindle.es-en.html        29 Jun 2015 08:28:53 -0000      
1.3
+++ po/malware-kindle-swindle.es-en.html        6 May 2016 08:10:32 -0000       
1.4
@@ -12,7 +12,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in the Kindle Swindle</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
 <p>We refer to this product as the
 <a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
@@ -137,7 +137,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -147,7 +147,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/06/29 08:28:53 $
+$Date: 2016/05/06 08:10:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/malware-mobiles.es-en.html       20 Mar 2016 12:27:53 -0000      1.6
+++ po/malware-mobiles.es-en.html       6 May 2016 08:10:32 -0000       1.7
@@ -12,7 +12,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in Mobile Devices</h2>
 
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
 malware</a></p>
 
 <div class="highlight-para">
@@ -35,7 +35,7 @@
 </div>
 
 <p>Here are examples of malware in mobile devices.  See also
-the <a href="/philosophy/malware-apple.html">the Apple malware
+the <a href="/proprietary/malware-apple.html">the Apple malware
 page</a> for malicious functionalities specific to the Apple iThings.</p>
 
 <div class="toc">
@@ -62,9 +62,10 @@
 
 <h3 id="back-doors">Mobile Back Doors</h3>
 <ul>
-  <li><p>The universal back door in portable phones 
-      <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/";>
-      is employed to listen through their microphones</a>.</p></li>
+  <li><p>The universal back door in portable phones <a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>is
+    employed to listen through their microphones</a>.</p>
+  </li>
 
   <li><p>Most mobile phones have a universal back door, which has been
   used to <a
@@ -78,7 +79,7 @@
   device.</p>
   </li>
 
-  <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+  <li><p><a href="/proprietary/proprietary-back-doors.html#samsung">
   Samsung's back door</a> provides access to any file on the system.</p>
   </li>
 
@@ -89,13 +90,11 @@
   called GTalkService).
   </p>
 
-  <p>
-  Google can
-  also <a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>forcibly
-  and remotely install apps</a> through GTalkService (which seems, since
-  that article, to have been merged into Google Play).  This adds up to
-  a universal back door.
-  </p>
+<p>Google can also <a
+href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
+title="at the Wayback Machine (archived May 20, 2015)">forcibly and remotely
+install apps</a> through GTalkService (which seems, since that article, to have
+been merged into Google Play).  This adds up to a universal back door. </p>
 
   <p>
   Although Google's <em>exercise</em> of this power has not been
@@ -208,10 +207,11 @@
 
 <h3 id="jails">Mobile Jails</h3>
 <ul>
-  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
-  Mobile devices that come with Windows 8 are tyrants</a>. <a
-  
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
-  Windows 8 on &ldquo;mobile devices&rdquo; is a jail.</a></p>
+  <li><p><a
+  href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>Mobile
+  devices that come with Windows 8 are tyrants</a>. <a
+  
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>Windows
+  8 on &ldquo;mobile devices&rdquo; is a jail.</a></p>
   </li>
 </ul>
 
@@ -279,7 +279,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/03/20 12:27:53 $
+$Date: 2016/05/06 08:10:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-censorship.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.es-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-censorship.es-en.html        4 Apr 2016 08:29:21 -0000       
1.8
+++ po/proprietary-censorship.es-en.html        6 May 2016 08:10:32 -0000       
1.9
@@ -7,7 +7,7 @@
 
 <p>Here are examples of proprietary systems that impose censorship on
 what their users can access. We have a <a
-href="/philosophy/proprietary/proprietary-jails.html">separate
+href="/proprietary/proprietary-jails.html">separate
 list of proprietary systems that censor installation</a> of
 application programs (we call them &ldquo;jails&rdquo;.)</p>
 
@@ -123,7 +123,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/04/04 08:29:21 $
+$Date: 2016/05/06 08:10:32 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]