[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-google.fr.html malware-...
From: |
GNUN |
Subject: |
www/proprietary malware-google.fr.html malware-... |
Date: |
Thu, 18 May 2017 12:29:15 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/05/18 12:29:14
Modified files:
proprietary : malware-google.fr.html
malware-microsoft.fr.html
proprietary-insecurity.fr.html
proprietary/po : malware-google.fr-en.html
malware-microsoft.fr-en.html
malware-mobiles.fr.po proprietary-drm.fr.po
proprietary-insecurity.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.fr.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.37&r2=1.38
Patches:
Index: malware-google.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.fr.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- malware-google.fr.html 1 May 2017 18:29:42 -0000 1.10
+++ malware-google.fr.html 18 May 2017 16:29:14 -0000 1.11
@@ -212,6 +212,20 @@
<h3 id="drm">DRM</h3>
<ul>
+
+<li>
+<p>Google permet maintenant aux applis Android de détecter si un appareil a
été
+« rooté » et <a
+href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">de
+refuser de s'installer si c'est le cas</a>.</p>
+
+<p>Mise à jour : Google a modifié <i>intentionnellement</i> Android pour que
+les applis <a
+href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/">puissent
+détecter les appareils rootés et refuser de fonctionner sur ces
+derniers</a>.</p>
+</li>
+
<li>
<p>Chrome <a
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html">met
@@ -316,7 +330,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2017/05/01 18:29:42 $
+$Date: 2017/05/18 16:29:14 $
<!-- timestamp end -->
</p>
Index: malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- malware-microsoft.fr.html 6 May 2017 21:30:03 -0000 1.46
+++ malware-microsoft.fr.html 18 May 2017 16:29:14 -0000 1.47
@@ -122,6 +122,16 @@
que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
<ul>
+
+<li>
+ <p>Des exploits utilisant certains bogues de Windows, développés par la NSA
+puis divulgués par le groupe Shadowbrokers, servent maintenant à <a
+href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attaquer
+un grand nombre d'ordinateurs sous Windows avec un logiciel de
+rançon<cite>[ransomware]</cite></a>.
+ </p>
+</li>
+
<li><p>Une <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">faille
d'Internet Explorer et Edge</a> permet à un attaquant de récupérer les
@@ -519,7 +529,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2017/05/06 21:30:03 $
+$Date: 2017/05/18 16:29:14 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary-insecurity.fr.html 6 May 2017 21:30:04 -0000 1.43
+++ proprietary-insecurity.fr.html 18 May 2017 16:29:14 -0000 1.44
@@ -42,6 +42,16 @@
privateur.</p>
<ul>
+
+<li>
+ <p>Des exploits utilisant certains bogues de Windows, développés par la NSA
+puis divulgués par le groupe Shadowbrokers, servent maintenant à <a
+href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attaquer
+un grand nombre d'ordinateurs sous Windows avec un logiciel de
+rançon<cite>[ransomware]</cite></a>.
+ </p>
+</li>
+
<li>
<p>La porte dérobée des processeurs Intel â <cite>Intel Management
Engine</cite>Â â a eu <a
@@ -531,7 +541,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2017/05/06 21:30:04 $
+$Date: 2017/05/18 16:29:14 $
<!-- timestamp end -->
</p>
Index: po/malware-google.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-google.fr-en.html 1 May 2017 18:29:42 -0000 1.9
+++ po/malware-google.fr-en.html 18 May 2017 16:29:14 -0000 1.10
@@ -186,6 +186,17 @@
<h3 id="drm">Google DRM</h3>
<ul>
+
+<li>
+<p>Google now allows Android apps to detect whether a device has been
+rooted, <a
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and
refuse to install
+if so</a>.</p>
+
+<p>Update: Google <i>intentionally</i> changed Android so that apps
+<a
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/">can
detect rooted devices and refuse to
+run on them</a>.</p>
+</li>
+
<li>
<p>Chrome <a
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html">implements
DRM</a>. So does Chromium, through nonfree software that is
@@ -266,7 +277,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/01 18:29:42 $
+$Date: 2017/05/18 16:29:14 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- po/malware-microsoft.fr-en.html 6 May 2017 21:30:04 -0000 1.44
+++ po/malware-microsoft.fr-en.html 18 May 2017 16:29:14 -0000 1.45
@@ -105,6 +105,15 @@
bugs.</p>
<ul>
+
+<li>
+ <p>Exploits of bugs in Windows, which were developed by the NSA
+ and then leaked by the Shadowbrokers group, are now being used to
+ <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
+ of Windows computers with ransomware</a>.
+ </p>
+</li>
+
<li><p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and Edge</a>
allows an attacker to retrieve Microsoft account credentials, if
the user is tricked into visiting a malicious link.</p>
@@ -460,7 +469,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/06 21:30:04 $
+$Date: 2017/05/18 16:29:14 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- po/malware-mobiles.fr.po 18 May 2017 16:05:47 -0000 1.51
+++ po/malware-mobiles.fr.po 18 May 2017 16:29:14 -0000 1.52
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 05:28+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -634,10 +635,21 @@
"de s'installer si c'est le cas</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"Update: Google <i>intentionally</i> changed Android so that apps <a href="
-"\"https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-"
-"devices-are-banned-170515/\">can detect rooted devices and refuse to run on "
+# | Update: Google <i>intentionally</i> {+<a
+# |
href=\"https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/\">+}
+# | changed Android so that apps [-<a
+# |
href=\"https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/\">can-]
+# | {+can+} detect rooted devices and refuse to run on them</a>.
+#, fuzzy
+#| msgid ""
+#| "Update: Google <i>intentionally</i> changed Android so that apps <a href="
+#| "\"https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-"
+#| "devices-are-banned-170515/\">can detect rooted devices and refuse to run "
+#| "on them</a>."
+msgid ""
+"Update: Google <i>intentionally</i> <a href=\"https://torrentfreak.com/"
+"netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/\"> "
+"changed Android so that apps can detect rooted devices and refuse to run on "
"them</a>."
msgstr ""
"Mise à jour : Google a modifié <i>intentionnellement</i> Android pour que "
Index: po/proprietary-drm.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/proprietary-drm.fr.po 18 May 2017 16:05:47 -0000 1.25
+++ po/proprietary-drm.fr.po 18 May 2017 16:29:14 -0000 1.26
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-05-18 05:28+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -90,11 +91,23 @@
"de s'installer si c'est le cas</a>."
#. type: Content of: <ul><li><p>
+# | Update: Google <i>intentionally</i> changed Android so that apps <a
+# |
href=\"https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/\">can
+# | detect rooted devices and refuse to run on them</a>. {+The Netflix app is
+# | proprietary malware, and one shouldn't use it. However, that does not make
+# | what Google has done any less wrong.+}
+#, fuzzy
+#| msgid ""
+#| "Update: Google <i>intentionally</i> changed Android so that apps <a href="
+#| "\"https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-"
+#| "devices-are-banned-170515/\">can detect rooted devices and refuse to run "
+#| "on them</a>."
msgid ""
"Update: Google <i>intentionally</i> changed Android so that apps <a href="
"\"https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-"
"devices-are-banned-170515/\">can detect rooted devices and refuse to run on "
-"them</a>."
+"them</a>. The Netflix app is proprietary malware, and one shouldn't use it. "
+"However, that does not make what Google has done any less wrong."
msgstr ""
"Mise à jour : Google a modifié <i>intentionnellement</i> Android pour que "
"les applis <a href=\"https://torrentfreak.com/netflix-use-of-google-drm-"
Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- po/proprietary-insecurity.fr-en.html 6 May 2017 21:30:04 -0000
1.37
+++ po/proprietary-insecurity.fr-en.html 18 May 2017 16:29:14 -0000
1.38
@@ -35,6 +35,15 @@
users helpless is what's culpable about proprietary software.</p>
<ul>
+
+<li>
+ <p>Exploits of bugs in Windows, which were developed by the NSA
+ and then leaked by the Shadowbrokers group, are now being used to
+ <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
+ of Windows computers with ransomware</a>.
+ </p>
+</li>
+
<li>
<p>Intel's CPU backdoor—the Intel Management Engine—had a
<a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security
@@ -468,7 +477,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/06 21:30:04 $
+$Date: 2017/05/18 16:29:14 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-google.fr.html malware-...,
GNUN <=