www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-microsoft.de.po malw...


From: GNUN
Subject: www/proprietary/po malware-microsoft.de.po malw...
Date: Sun, 21 Aug 2016 15:58:08 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/08/21 15:58:08

Modified files:
        proprietary/po : malware-microsoft.de.po malware-microsoft.es.po 
                         malware-microsoft.fr.po malware-microsoft.it.po 
                         malware-microsoft.ja.po malware-microsoft.pot 
                         malware-microsoft.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.75&r2=1.76

Patches:
Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-microsoft.de.po     20 Aug 2016 21:28:21 -0000      1.54
+++ malware-microsoft.de.po     21 Aug 2016 15:58:07 -0000      1.55
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2016-08-20 21:25+0000\n"
+"POT-Creation-Date: 2016-08-21 15:55+0000\n"
 "PO-Revision-Date: 2016-06-16 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: www-de <address@hidden>\n"
@@ -227,7 +227,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
-"username-password-and-other-logins/\">flaw Internet Explorer and Edge</a>, "
+"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
 "allows an attacker to retrieve Microsoft account credentials, if the user is "
 "tricked into visiting a malicious link."
 msgstr ""

Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-microsoft.es.po     20 Aug 2016 21:28:22 -0000      1.54
+++ malware-microsoft.es.po     21 Aug 2016 15:58:07 -0000      1.55
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2016-08-20 21:25+0000\n"
+"POT-Creation-Date: 2016-08-21 15:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -217,7 +217,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
-"username-password-and-other-logins/\">flaw Internet Explorer and Edge</a>, "
+"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
 "allows an attacker to retrieve Microsoft account credentials, if the user is "
 "tricked into visiting a malicious link."
 msgstr ""

Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-microsoft.fr.po     20 Aug 2016 21:28:22 -0000      1.56
+++ malware-microsoft.fr.po     21 Aug 2016 15:58:07 -0000      1.57
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2016-08-20 21:25+0000\n"
+"POT-Creation-Date: 2016-08-21 15:55+0000\n"
 "PO-Revision-Date: 2016-07-23 21:40+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -214,7 +214,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
-"username-password-and-other-logins/\">flaw Internet Explorer and Edge</a>, "
+"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
 "allows an attacker to retrieve Microsoft account credentials, if the user is "
 "tricked into visiting a malicious link."
 msgstr ""

Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- malware-microsoft.it.po     20 Aug 2016 21:28:22 -0000      1.67
+++ malware-microsoft.it.po     21 Aug 2016 15:58:07 -0000      1.68
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2016-08-20 21:25+0000\n"
+"POT-Creation-Date: 2016-08-21 15:55+0000\n"
 "PO-Revision-Date: 2016-07-30 18:13+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -211,7 +211,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
-"username-password-and-other-logins/\">flaw Internet Explorer and Edge</a>, "
+"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
 "allows an attacker to retrieve Microsoft account credentials, if the user is "
 "tricked into visiting a malicious link."
 msgstr ""

Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- malware-microsoft.ja.po     20 Aug 2016 21:28:22 -0000      1.55
+++ malware-microsoft.ja.po     21 Aug 2016 15:58:08 -0000      1.56
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2016-08-20 21:25+0000\n"
+"POT-Creation-Date: 2016-08-21 15:55+0000\n"
 "PO-Revision-Date: 2016-07-12 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -205,7 +205,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
-"username-password-and-other-logins/\">flaw Internet Explorer and Edge</a>, "
+"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
 "allows an attacker to retrieve Microsoft account credentials, if the user is "
 "tricked into visiting a malicious link."
 msgstr ""

Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- malware-microsoft.pot       20 Aug 2016 21:28:22 -0000      1.31
+++ malware-microsoft.pot       21 Aug 2016 15:58:08 -0000      1.32
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2016-08-20 21:25+0000\n"
+"POT-Creation-Date: 2016-08-21 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -156,7 +156,7 @@
 msgid ""
 "A <a "
 
"href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/\";>flaw
 "
-"Internet Explorer and Edge</a>, allows an attacker to retrieve Microsoft "
+"in Internet Explorer and Edge</a> allows an attacker to retrieve Microsoft "
 "account credentials, if the user is tricked into visiting a malicious link."
 msgstr ""
 

Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-microsoft.ru.po     21 Aug 2016 09:28:17 -0000      1.75
+++ malware-microsoft.ru.po     21 Aug 2016 15:58:08 -0000      1.76
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2016-08-20 21:25+0000\n"
+"POT-Creation-Date: 2016-08-21 15:55+0000\n"
 "PO-Revision-Date: 2016-08-21 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-21 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -203,9 +204,20 @@
 msgstr "Уязвимость"
 
 #. type: Content of: <ul><li><p>
+# | A <a
+# | 
href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/\";>flaw
+# | {+in+} Internet Explorer and Edge</a>[-,-] allows an attacker to retrieve
+# | Microsoft account credentials, if the user is tricked into visiting a
+# | malicious link.
+#, fuzzy
+#| msgid ""
+#| "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
+#| "username-password-and-other-logins/\">flaw Internet Explorer and Edge</"
+#| "a>, allows an attacker to retrieve Microsoft account credentials, if the "
+#| "user is tricked into visiting a malicious link."
 msgid ""
 "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
-"username-password-and-other-logins/\">flaw Internet Explorer and Edge</a>, "
+"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
 "allows an attacker to retrieve Microsoft account credentials, if the user is "
 "tricked into visiting a malicious link."
 msgstr ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]