www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-microsoft.ru.po prop...


From: Pavel Kharitonov
Subject: www/proprietary/po malware-microsoft.ru.po prop...
Date: Sun, 21 Aug 2016 18:06:07 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     Pavel Kharitonov <ineiev>       16/08/21 18:06:07

Modified files:
        proprietary/po : malware-microsoft.ru.po 
                         proprietary-insecurity.ru.po 

Log message:
        Defuzzify.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.81&r2=1.82

Patches:
Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-microsoft.ru.po     21 Aug 2016 15:58:08 -0000      1.76
+++ malware-microsoft.ru.po     21 Aug 2016 18:06:07 -0000      1.77
@@ -209,7 +209,6 @@
 # | {+in+} Internet Explorer and Edge</a>[-,-] allows an attacker to retrieve
 # | Microsoft account credentials, if the user is tricked into visiting a
 # | malicious link.
-#, fuzzy
 #| msgid ""
 #| "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
 #| "username-password-and-other-logins/\">flaw Internet Explorer and Edge</"

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary-insecurity.ru.po        21 Aug 2016 16:58:32 -0000      1.81
+++ proprietary-insecurity.ru.po        21 Aug 2016 18:06:07 -0000      1.82
@@ -87,7 +87,6 @@
 # | {+in+} Internet Explorer and Edge</a>[-,-] allows an attacker to retrieve
 # | Microsoft account credentials, if the user is tricked into visiting a
 # | malicious link.
-#, fuzzy
 #| msgid ""
 #| "A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-";
 #| "username-password-and-other-logins/\">flaw Internet Explorer and Edge</"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]