www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www home.it.html distros/po/common-distros.it-e...


From: GNUN
Subject: www home.it.html distros/po/common-distros.it-e...
Date: Fri, 2 Jun 2017 11:29:10 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/06/02 11:29:09

Modified files:
        .              : home.it.html 
        distros/po     : common-distros.it-en.html common-distros.it.po 
        licenses/old-licenses: gpl-2.0-faq.it.html 
        licenses/old-licenses/po: gpl-2.0-faq.it-en.html 
                                  gpl-2.0-faq.it.po 
        po             : home.it-en.html home.it.po 
        proprietary    : malware-microsoft.it.html 
                         malware-mobiles.it.html proprietary-drm.it.html 
                         proprietary-insecurity.it.html 
                         proprietary-surveillance.it.html 
        proprietary/po : malware-microsoft.it-en.html 
                         malware-microsoft.it.po 
                         malware-mobiles.it-en.html 
                         malware-mobiles.it.po 
                         proprietary-drm.it-en.html 
                         proprietary-drm.it.po 
                         proprietary-insecurity.it-en.html 
                         proprietary-insecurity.it.po 
                         proprietary-surveillance.it-en.html 
                         proprietary-surveillance.it.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/home.it.html?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/common-distros.it-en.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/common-distros.it.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/old-licenses/gpl-2.0-faq.it.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/old-licenses/po/gpl-2.0-faq.it-en.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/old-licenses/po/gpl-2.0-faq.it.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.it-en.html?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.it.po?cvsroot=www&r1=1.610&r2=1.611
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.it.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.it.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.it.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.it.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-en.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-en.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.174&r2=1.175

Patches:
Index: home.it.html
===================================================================
RCS file: /web/www/www/home.it.html,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- home.it.html        27 May 2017 11:58:57 -0000      1.320
+++ home.it.html        2 Jun 2017 15:29:07 -0000       1.321
@@ -331,9 +331,9 @@
 
 <!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.it.html" -->
-<p id="sisters">The <a href="http://www.fsf.org/";>FSF</a> also has sister 
organizations in
-<a href="http://www.fsfe.org";>Europe</a>, <a
-href="http://www.fsfla.org/";>Latin America</a> and <a
+<p id="sisters">La <a href="http://www.fsf.org/";>FSF</a> ha organizzazioni 
omologhe in <a
+href="http://www.fsfe.org";>Europa</a>, <a
+href="http://www.fsfla.org/";>America Latina</a> e <a
 href="http://gnu.org.in/";>India</a>.</p>
 
 <!--#include virtual="/server/fs-gang.it.html" -->
@@ -407,7 +407,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultima modifica:
 
-$Date: 2017/05/27 11:58:57 $
+$Date: 2017/06/02 15:29:07 $
 
 <!-- timestamp end -->
 </p>

Index: distros/po/common-distros.it-en.html
===================================================================
RCS file: /web/www/www/distros/po/common-distros.it-en.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- distros/po/common-distros.it-en.html        29 Apr 2017 11:32:41 -0000      
1.44
+++ distros/po/common-distros.it-en.html        2 Jun 2017 15:29:07 -0000       
1.45
@@ -101,7 +101,7 @@
 the problem partly remains: the installer in some cases recommends
 these nonfree firmware files for the peripherals on the machine.</p>
 
-<p>Debian's wiki includes pages about installng nonfree firmware.</p>
+<p>Debian's wiki includes pages about installing nonfree firmware.</p>
 <!-- https://wiki.debian.org/ATIProprietary -->
 
 <h3 id="Fedora">Fedora</h3>
@@ -319,7 +319,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/04/29 11:32:41 $
+$Date: 2017/06/02 15:29:07 $
 <!-- timestamp end -->
 </p>
 </div>

Index: distros/po/common-distros.it.po
===================================================================
RCS file: /web/www/www/distros/po/common-distros.it.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- distros/po/common-distros.it.po     2 Jun 2017 15:16:17 -0000       1.118
+++ distros/po/common-distros.it.po     2 Jun 2017 15:29:07 -0000       1.119
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-20 15:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -227,9 +226,7 @@
 "problema in parte rimane irrisolto: la procedura di installazione in alcuni "
 "casi consiglia questi firmware non liberi per le periferiche sulla macchina."
 
-# | Debian's wiki includes pages about install{+i+}ng nonfree firmware.
 #. type: Content of: <p>
-#| msgid "Debian's wiki includes pages about installng nonfree firmware."
 msgid "Debian's wiki includes pages about installing nonfree firmware."
 msgstr ""
 "Il wiki di Debian contiene istruzioni su come installare software non libero."

Index: licenses/old-licenses/gpl-2.0-faq.it.html
===================================================================
RCS file: /web/www/www/licenses/old-licenses/gpl-2.0-faq.it.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- licenses/old-licenses/gpl-2.0-faq.it.html   26 Mar 2017 19:00:32 -0000      
1.25
+++ licenses/old-licenses/gpl-2.0-faq.it.html   2 Jun 2017 15:29:08 -0000       
1.26
@@ -28,7 +28,8 @@
 </p>
 
 <!-- Replace this list with the page's contents. -->
-<h4>Indice</h4>
+<h3 style="clear: both; padding: .3em 0; border-bottom: 1px solid #999">
+Indice</h3>
 
   <h4>Domande di base sulla GPL, il progetto GNU e la Free Software 
Foundation</h4>
 
@@ -418,7 +419,7 @@
 programma più grande, questa licenza è compatibile con la GPL? Posso
 combinare o linkare Q con un programma coperto da GPL?</a></li>
 
-    <li><a href="#OOPLang" name="TOCOOPLANG"> In un    linguaggio orientato 
agli
+    <li><a href="#OOPLang" name="TOCOOPLang"> In un    linguaggio orientato 
agli
 oggetti come Java, se utilizzo una    classe coperta dalla GPL senza
 modificarla, e ne creo una    sottoclasse, in che modo il programma
 risultante è affetto    dalla GPL?</a></li>
@@ -2355,8 +2356,8 @@
 accorgete di una violazione della GPL,    dovreste informarne gli
 sviluppatori del software coinvolto, i    quali sono o possono facilmente
 raggiungere i detentori dei    diritti d'autore. <a
-href="http://www.fsf.org/licenses/gpl-faq.html#ReportingViolation";>Altre
-informazioni su come trattare le violazioni della GPL</a>.
+href="#ReportingViolation">Altre informazioni su come trattare le violazioni
+della GPL</a>.
 </dd>
 
 
@@ -2379,8 +2380,8 @@
 In generale, la risposta è no--non è un obbligo legale. Per    essere più
 specifici, la risposta dipende da quali librerie    intendete usare e quali
 sono le rispettive licenze. La maggior    parte delle librerie di sistema
-sono coperte o dalla <a href=    "/copyleft/lesser.html">GNU Lesser GPL</a>,
-o dalla GPL con    un'esplicita eccezione che permette di collegare la
+sono coperte o dalla  <a href="/licenses/lgpl.html">GNU Lesser GPL</a>, o
+dalla GPL con    un'esplicita eccezione che permette di collegare la
 libreria ad    altri software qualsiasi sia la licenza con cui vengono
 rilasciati. Queste librerie possono essere usate in programmi    non liberi;
 ma nel caso della Lesser GPL, vi sono alcuni doveri    che dovete
@@ -2561,7 +2562,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/03/26 19:00:32 $
+$Date: 2017/06/02 15:29:08 $
 
 <!-- timestamp end -->
 </p>

Index: licenses/old-licenses/po/gpl-2.0-faq.it-en.html
===================================================================
RCS file: /web/www/www/licenses/old-licenses/po/gpl-2.0-faq.it-en.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- licenses/old-licenses/po/gpl-2.0-faq.it-en.html     26 Mar 2017 19:00:32 
-0000      1.20
+++ licenses/old-licenses/po/gpl-2.0-faq.it-en.html     2 Jun 2017 15:29:08 
-0000       1.21
@@ -20,7 +20,8 @@
 </p>
 
 <!-- Replace this list with the page's contents. -->
-<h4>Table of Contents</h4>
+<h3 style="clear: both; padding: .3em 0; border-bottom: 1px solid #999">
+Table of Contents</h3>
 
   <h4>Basic questions about the GPL, the GNU Project, and the Free
   Software Foundation</h4>
@@ -416,7 +417,7 @@
     GPL-compatible?  Can I combine or link Q with a GPL-covered
     program?</a></li>
 
-    <li><a href="#OOPLang" name="TOCOOPLANG"> In an object-oriented
+    <li><a href="#OOPLang" name="TOCOOPLang"> In an object-oriented
     language such as Java, if I use a class that is GPL'ed without
     modifying, and subclass it, in what way does the GPL affect the larger
     program?</a></li>
@@ -2305,8 +2306,7 @@
 see a violation of the GPL, you should inform the developers of the
 GPL-covered software involved.  They either are the copyright holders,
 or are connected with the copyright holders.  <a
-href="http://www.fsf.org/licenses/gpl-faq.html#ReportingViolation";>Learn
-more about reporting GPL violations.</a>
+href="#ReportingViolation">Learn more about reporting GPL violations.</a>
 </dd>
 
 
@@ -2329,7 +2329,7 @@
 In general, the answer is no&mdash;this is not a legal requirement.
 In specific, the answer depends on which libraries you want to use and
 what their licenses are.  Most system libraries either use
-the <a href="/copyleft/lesser.html">GNU Lesser GPL</a>, or use the GNU
+the <a href="/licenses/lgpl.html">GNU Lesser GPL</a>, or use the GNU
 GPL plus an exception permitting linking the library with anything.
 These libraries can be used in nonfree programs; but in the case of
 the Lesser GPL, it does have some requirements you must follow.
@@ -2482,7 +2482,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/03/26 19:00:32 $
+$Date: 2017/06/02 15:29:08 $
 <!-- timestamp end -->
 </p>
 </div>

Index: licenses/old-licenses/po/gpl-2.0-faq.it.po
===================================================================
RCS file: /web/www/www/licenses/old-licenses/po/gpl-2.0-faq.it.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- licenses/old-licenses/po/gpl-2.0-faq.it.po  2 Jun 2017 15:16:17 -0000       
1.42
+++ licenses/old-licenses/po/gpl-2.0-faq.it.po  2 Jun 2017 15:29:08 -0000       
1.43
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-17 08:56+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -959,15 +958,7 @@
 "incluso in un programma più grande, questa licenza è compatibile con la 
GPL? "
 "Posso combinare o linkare Q con un programma coperto da GPL?</a>"
 
-# | <a href=\"#OOPLang\" [-name=\"TOCOOPLANG\">-] {+name=\"TOCOOPLang\">+} In
-# | an object-oriented language such as Java, if I use a class that is GPL'ed
-# | without modifying, and subclass it, in what way does the GPL affect the
-# | larger program?</a>
-#. type: Content of: <ul><li>
-#| msgid ""
-#| "<a href=\"#OOPLang\" name=\"TOCOOPLANG\"> In an object-oriented language "
-#| "such as Java, if I use a class that is GPL'ed without modifying, and "
-#| "subclass it, in what way does the GPL affect the larger program?</a>"
+#. type: Content of: <ul><li>
 msgid ""
 "<a href=\"#OOPLang\" name=\"TOCOOPLang\"> In an object-oriented language "
 "such as Java, if I use a class that is GPL'ed without modifying, and "
@@ -4907,23 +4898,7 @@
 "<b><a href=\"#TOCWhoHasThePower\" name=\"WhoHasThePower\">Chi ha il potere "
 "di far valere la GPL?</a></b>"
 
-# | Since the GPL is a copyright license, the copyright holders of the
-# | software are the ones who have the power to enforce the GPL.  If you see a
-# | violation of the GPL, you should inform the developers of the GPL-covered
-# | software involved.  They either are the copyright holders, or are
-# | connected with the copyright holders.  <a
-# | 
[-href=\"http://www.fsf.org/licenses/gpl-faq.html#ReportingViolation\";>Learn-]
-# | {+href=\"#ReportingViolation\">Learn+} more about reporting GPL
-# | violations.</a>
-#. type: Content of: <dl><dd>
-#| msgid ""
-#| "Since the GPL is a copyright license, the copyright holders of the "
-#| "software are the ones who have the power to enforce the GPL.  If you see "
-#| "a violation of the GPL, you should inform the developers of the GPL-"
-#| "covered software involved.  They either are the copyright holders, or are "
-#| "connected with the copyright holders.  <a href=\"http://www.fsf.org/";
-#| "licenses/gpl-faq.html#ReportingViolation\">Learn more about reporting GPL "
-#| "violations.</a>"
+#. type: Content of: <dl><dd>
 msgid ""
 "Since the GPL is a copyright license, the copyright holders of the software "
 "are the ones who have the power to enforce the GPL.  If you see a violation "
@@ -4970,23 +4945,7 @@
 "programma su GNU/Linux, devo  rilasciarlo come software libero coperto dalla "
 "GPL o da qualche  altra licenza libera?</a></b>"
 
-# | In general, the answer is no&mdash;this is not a legal requirement.  In
-# | specific, the answer depends on which libraries you want to use and what
-# | their licenses are.  Most system libraries either use the <a
-# | [-href=\"/copyleft/lesser.html\">GNU-]
-# | {+href=\"/licenses/lgpl.html\">GNU+} Lesser GPL</a>, or use the GNU GPL
-# | plus an exception permitting linking the library with anything.  These
-# | libraries can be used in nonfree programs; but in the case of the Lesser
-# | GPL, it does have some requirements you must follow.
-#. type: Content of: <dl><dd>
-#| msgid ""
-#| "In general, the answer is no&mdash;this is not a legal requirement.  In "
-#| "specific, the answer depends on which libraries you want to use and what "
-#| "their licenses are.  Most system libraries either use the <a href=\"/"
-#| "copyleft/lesser.html\">GNU Lesser GPL</a>, or use the GNU GPL plus an "
-#| "exception permitting linking the library with anything.  These libraries "
-#| "can be used in nonfree programs; but in the case of the Lesser GPL, it "
-#| "does have some requirements you must follow."
+#. type: Content of: <dl><dd>
 msgid ""
 "In general, the answer is no&mdash;this is not a legal requirement.  In "
 "specific, the answer depends on which libraries you want to use and what "

Index: po/home.it-en.html
===================================================================
RCS file: /web/www/www/po/home.it-en.html,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- po/home.it-en.html  29 Apr 2017 11:32:42 -0000      1.135
+++ po/home.it-en.html  2 Jun 2017 15:29:08 -0000       1.136
@@ -323,7 +323,7 @@
 <p id="sisters">The <a href="http://www.fsf.org/";>FSF</a> also has sister
 organizations in <a href="http://www.fsfe.org";>Europe</a>, <a
 href="http://www.fsfla.org/";>Latin America</a> and <a
-href="http://fsf.org.in/";>India</a>.</p>
+href="http://gnu.org.in/";>India</a>.</p>
 
 <!--#include virtual="/server/fs-gang.html" -->
 
@@ -384,7 +384,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/04/29 11:32:42 $
+$Date: 2017/06/02 15:29:08 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/home.it.po
===================================================================
RCS file: /web/www/www/po/home.it.po,v
retrieving revision 1.610
retrieving revision 1.611
diff -u -b -r1.610 -r1.611
--- po/home.it.po       2 Jun 2017 15:16:17 -0000       1.610
+++ po/home.it.po       2 Jun 2017 15:29:08 -0000       1.611
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-27 11:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 # type: Content of: <title>
@@ -457,16 +456,7 @@
 msgstr " "
 
 # type: Content of: <table><tr><td><p>
-# | The <a href=\"http://www.fsf.org/\";>FSF</a> also has sister organizations
-# | in <a href=\"http://www.fsfe.org\";>Europe</a>, <a
-# | href=\"http://www.fsfla.org/\";>Latin America</a> and <a
-# | [-href=\"http://fsf.org.in/\";>India</a>.-]
-# | {+href=\"http://gnu.org.in/\";>India</a>.+}
 #. type: Content of: <p>
-#| msgid ""
-#| "The <a href=\"http://www.fsf.org/\";>FSF</a> also has sister organizations "
-#| "in <a href=\"http://www.fsfe.org\";>Europe</a>, <a href=\"http://www.fsfla.";
-#| "org/\">Latin America</a> and <a href=\"http://fsf.org.in/\";>India</a>."
 msgid ""
 "The <a href=\"http://www.fsf.org/\";>FSF</a> also has sister organizations in "
 "<a href=\"http://www.fsfe.org\";>Europe</a>, <a href=\"http://www.fsfla.org/";

Index: proprietary/malware-microsoft.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.it.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/malware-microsoft.it.html       11 May 2017 21:29:25 -0000      
1.23
+++ proprietary/malware-microsoft.it.html       2 Jun 2017 15:29:08 -0000       
1.24
@@ -118,6 +118,15 @@
 software proprietario di prestigio è immune da difetti.</p>
 
 <ul>
+
+<li>
+  <p>Attacchi che sfruttano difetti di Windows, sviluppati originariamente 
dalla
+NSA e poi trafugati dal gruppo Shadowbrokers, vengono ora usati per <a
+href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>colpire
+molti computer Windows</a> e richiedere un riscatto.
+       </p>
+</li>
+
     <li><p>Un <a
 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>bug
 di Internet Explorer ed Edge</a> permette a un malintenzionato di ottenere
@@ -505,7 +514,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/06/02 15:29:08 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-mobiles.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.it.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/malware-mobiles.it.html 11 May 2017 21:29:25 -0000      1.15
+++ proprietary/malware-mobiles.it.html 2 Jun 2017 15:29:08 -0000       1.16
@@ -62,12 +62,14 @@
 
 <h3 id="back-doors">Backdoor in dispositivi mobili</h3>
 <ul>
-  <li><p>La backdoor universale nei telefoni cellulari è effettivamente <a
+  <li id="back-door-microphone">
+    <p>La backdoor universale nei telefoni cellulari è effettivamente <a
 href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/";>
 usata per ascoltare attraverso i loro microfoni</a>.</p>
   </li>
 
-  <li><p>La maggior parte dei cellulari hanno una backdoor universale, che è 
stata
+  <li id="back-door-malicious">
+    <p>La maggior parte dei cellulari hanno una backdoor universale, che è 
stata
 usata per <a
 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>renderli
 malevoli</a>.</p>
@@ -158,6 +160,21 @@
 <ul>
 
 <li>
+  <p><a
+href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf";>Uno
+studio del 2015</a> ha trovato che il 90% delle più diffuse applicazioni
+Android proprietarie gratuite contenevano librerie per il tracciamento degli
+utenti, mentre nel caso delle applicazioni a pagamento la percentuale
+scendeva al 60%.</p>
+
+  <p>L'articolo fa confusione dato che usa &ldquo;free&rdquo; (NdT: libero, ma
+anche gratuito) per applicazioni che non sono in realtà <a
+href="/philosophy/free-sw.html">software libero</a>.  Usa anche la brutta
+parola &ldquo;monetizzare&rdquo;. Meglio dire &ldquo;sfruttare&rdquo; in
+questo e altri contesti.</p>
+</li>
+
+<li>
   <p>Uno studio ha trovato 234 applicazioni Android che tracciano gli utenti <a
 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/";>ascoltando
 ultrasuoni emessi da apparati installati nei negozi o da programmi
@@ -320,6 +337,20 @@
 
 <h3 id="drm">DRM in dispositivi mobili</h3>
 <ul>
+
+<li>
+<p>Google ora permette alle applicazioni Android di sapere se un dispositivo è
+controllato dall'utente come root, <a
+href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/";>e
+di rifiutare di installarsi in tal caso</a>.</p>
+
+<p>Aggiornamento: Google ha <i>intenzionalmente</i> modificato Android in modo
+che le applicazioni possano <a
+href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/";>capire
+se l'utente ha ottenuto privilegi di root e in quel caso rifiutarsi di
+essere eseguite</a>.</p>
+</li>
+
   <li>
   <p>L'iPhone 7 contiene DRM progettati per <a
 
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock";>
@@ -432,7 +463,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/06/02 15:29:08 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-drm.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.it.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/proprietary-drm.it.html 2 Apr 2017 10:30:43 -0000       1.10
+++ proprietary/proprietary-drm.it.html 2 Jun 2017 15:29:08 -0000       1.11
@@ -37,6 +37,23 @@
 </p>
 
 <ul>
+
+<li>
+<p>Google ora permette alle applicazioni Android di sapere se un dispositivo è
+controllato dall'utente come root, <a
+href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/";>e
+di rifiutare di installarsi in tal caso</a>. L'applicazione di Netflix usa
+questa possibilità per imporre l'uso dei DRM.</p>
+
+<p>Aggiornamento: Google ha <i>intenzionalmente</i> modificato Android in modo
+che le applicazioni possano <a
+href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/";>capire
+se l'utente ha ottenuto privilegi di root e in quel caso rifiutarsi di
+essere eseguite</a>. L'applicazione di Netflix è malware proprietario e non
+la si deve usare in ogni caso, ma questo non significa che il danno
+provocato da Google sia attenuato.</p>
+</li>
+
 <li><p>I file DRM di Windows <a
 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>possono
 essere usati per identificare chi naviga con Tor</a>. La vulnerabilità si
@@ -265,7 +282,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/04/02 10:30:43 $
+$Date: 2017/06/02 15:29:08 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.it.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/proprietary-insecurity.it.html  11 May 2017 21:29:25 -0000      
1.22
+++ proprietary/proprietary-insecurity.it.html  2 Jun 2017 15:29:08 -0000       
1.23
@@ -41,6 +41,15 @@
 cui sono ridotti gli utenti è la colpa del software proprietario.</p>
 
 <ul>
+
+<li>
+  <p>Attacchi che sfruttano difetti di Windows, sviluppati originariamente 
dalla
+NSA e poi trafugati dal gruppo Shadowbrokers, vengono ora usati per <a
+href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>colpire
+molti computer Windows</a> e richiedere un riscatto.
+       </p>
+</li>
+
 <li>
   <p>La backdoor delle CPU Intel, nota come &mdash;the Intel Management
 Engine&mdash;, ha avuto una <a
@@ -517,7 +526,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/06/02 15:29:08 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/proprietary-surveillance.it.html        23 May 2017 17:59:40 
-0000      1.35
+++ proprietary/proprietary-surveillance.it.html        2 Jun 2017 15:29:08 
-0000       1.36
@@ -341,6 +341,30 @@
 
 <ul>
 <li>
+  <p><a
+href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf";>Uno
+studio del 2015</a> ha trovato che il 90% delle più diffuse applicazioni
+Android proprietarie gratuite contenevano librerie per il tracciamento degli
+utenti, mentre nel caso delle applicazioni a pagamento la percentuale
+scendeva al 60%.</p>
+
+  <p>L'articolo fa confusione dato che usa &ldquo;free&rdquo; (NdT: libero, ma
+anche gratuito) per applicazioni che non sono in realtà <a
+href="/philosophy/free-sw.html">software libero</a>.  Usa anche la brutta
+parola &ldquo;monetizzare&rdquo;. Meglio dire &ldquo;sfruttare&rdquo; in
+questo e altri contesti.</p>
+</li>
+
+<li>
+  <p>Le applicazioni per BART <a
+href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/";>spiano
+gli utenti</a>.</p>
+  <p>Se si usassero applicazioni libere, gli utenti potrebbero <em>controllare
+con certezza</em> di non essere spiati.</p>
+  <p>Con applicazioni proprietarie, si può solo sperare.</p>
+</li>
+
+<li>
   <p>Uno studio ha trovato 234 applicazioni Android che tracciano gli utenti <a
 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/";>ascoltando
 ultrasuoni emessi da apparati installati nei negozi o da programmi
@@ -1401,7 +1425,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/05/23 17:59:40 $
+$Date: 2017/06/02 15:29:08 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-microsoft.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/malware-microsoft.it-en.html 11 May 2017 21:29:25 -0000      
1.23
+++ proprietary/po/malware-microsoft.it-en.html 2 Jun 2017 15:29:09 -0000       
1.24
@@ -105,6 +105,15 @@
   bugs.</p>
 
 <ul>
+
+<li>
+  <p>Exploits of bugs in Windows, which were developed by the NSA
+       and then leaked by the Shadowbrokers group, are now being used to
+       <a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>attack
 a great number
+       of Windows computers with ransomware</a>.
+       </p>
+</li>
+
     <li><p>A <a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>flaw
 in Internet Explorer and Edge</a>
     allows an attacker to retrieve Microsoft account credentials, if
     the user is tricked into visiting a malicious link.</p>
@@ -460,7 +469,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/06/02 15:29:09 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary/po/malware-microsoft.it.po      2 Jun 2017 15:16:18 -0000       
1.108
+++ proprietary/po/malware-microsoft.it.po      2 Jun 2017 15:29:09 -0000       
1.109
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-18 04:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/malware-mobiles.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/malware-mobiles.it-en.html   11 May 2017 21:29:25 -0000      
1.12
+++ proprietary/po/malware-mobiles.it-en.html   2 Jun 2017 15:29:09 -0000       
1.13
@@ -54,12 +54,14 @@
 
 <h3 id="back-doors">Mobile Back Doors</h3>
 <ul>
-  <li><p>The universal back door in portable phones <a
+  <li id="back-door-microphone">
+    <p>The universal back door in portable phones <a
     
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>is
     employed to listen through their microphones</a>.</p>
   </li>
 
-  <li><p>Most mobile phones have a universal back door, which has been
+  <li id="back-door-malicious">
+    <p>Most mobile phones have a universal back door, which has been
   used to <a
   
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
   turn them malicious</a>.</p>
@@ -145,6 +147,19 @@
 <ul>
 
 <li>
+  <p><a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf";>A 
study in 2015</a> found that 90% of the top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.</p>
+
+  <p>The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are not in fact
+  <a href="/philosophy/free-sw.html">free software</a>.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.</p>
+</li>
+
+<li>
   <p>A study found 234 Android apps that track users by
        <a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/";>listening
        to ultrasound from beacons placed in stores or played by TV 
programs</a>.
@@ -298,6 +313,17 @@
 
 <h3 id="drm">Mobile DRM</h3>
 <ul>
+
+<li>
+<p>Google now allows Android apps to detect whether a device has been
+rooted, <a 
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/";>and
 refuse to install
+if so</a>.</p>
+
+<p>Update: Google <i>intentionally</i> <a 
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/";>
+changed Android so that apps can detect rooted devices and refuse to
+run on them</a>.</p>
+</li>
+
   <li>
   <p>The iPhone 7 contains DRM specifically designed to <a
   
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock";>
@@ -389,7 +415,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/06/02 15:29:09 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/malware-mobiles.it.po        2 Jun 2017 15:16:18 -0000       
1.54
+++ proprietary/po/malware-mobiles.it.po        2 Jun 2017 15:29:09 -0000       
1.55
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-18 05:28+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-drm.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-drm.it-en.html   2 Apr 2017 10:30:43 -0000       
1.7
+++ proprietary/po/proprietary-drm.it-en.html   2 Jun 2017 15:29:09 -0000       
1.8
@@ -29,6 +29,20 @@
 </p>
 
 <ul>
+
+<li>
+<p>Google now allows Android apps to detect whether a device has been
+rooted, <a 
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/";>and
 refuse to install
+if so</a>. The Netflix app uses this ability to enforce DRM by refusing
+to install on rooted Android devices.</p>
+
+<p>Update: Google <i>intentionally</i> changed Android so that apps
+<a 
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/";>can
 detect rooted devices and refuse to
+run on them</a>. The Netflix app is proprietary malware, and one
+shouldn't use it. However, that does not make what Google has done
+any less wrong.</p>
+</li>
+
 <li><p>Windows DRM
 files <a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>can
 be used to identify people browsing through Tor</a>. The vulnerability
@@ -227,7 +241,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/04/02 10:30:43 $
+$Date: 2017/06/02 15:29:09 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-drm.it.po        2 Jun 2017 15:16:17 -0000       
1.30
+++ proprietary/po/proprietary-drm.it.po        2 Jun 2017 15:29:09 -0000       
1.31
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-18 05:28+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-insecurity.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-en.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-insecurity.it-en.html    11 May 2017 21:29:25 
-0000      1.21
+++ proprietary/po/proprietary-insecurity.it-en.html    2 Jun 2017 15:29:09 
-0000       1.22
@@ -35,6 +35,15 @@
 users helpless is what's culpable about proprietary software.</p>
 
 <ul>
+
+<li>
+  <p>Exploits of bugs in Windows, which were developed by the NSA
+       and then leaked by the Shadowbrokers group, are now being used to
+       <a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>attack
 a great number
+       of Windows computers with ransomware</a>.
+       </p>
+</li>
+
 <li>
   <p>Intel's CPU backdoor&mdash;the Intel Management Engine&mdash;had a
        <a 
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/";>major
 security
@@ -468,7 +477,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/06/02 15:29:09 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/proprietary-insecurity.it.po 2 Jun 2017 15:16:18 -0000       
1.102
+++ proprietary/po/proprietary-insecurity.it.po 2 Jun 2017 15:29:09 -0000       
1.103
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-18 04:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-surveillance.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-en.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-surveillance.it-en.html  23 May 2017 17:59:40 
-0000      1.32
+++ proprietary/po/proprietary-surveillance.it-en.html  2 Jun 2017 15:29:09 
-0000       1.33
@@ -323,6 +323,26 @@
 
 <ul>
 <li>
+  <p><a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf";>A 
study in 2015</a> found that 90% of the top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.</p>
+
+  <p>The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are not in fact
+  <a href="/philosophy/free-sw.html">free software</a>.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.</p>
+</li>
+
+<li>
+  <p>Apps for BART
+    <a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/";>snoop
 on users</a>.</p>
+  <p>With free software apps, users could <em>make sure</em> that they don't 
snoop.</p>
+  <p>With proprietary apps, one can only hope that they don't.</p>
+</li>
+
+<li>
   <p>A study found 234 Android apps that track users by
        <a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/";>listening
        to ultrasound from beacons placed in stores or played by TV 
programs</a>.
@@ -1325,7 +1345,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/05/23 17:59:40 $
+$Date: 2017/06/02 15:29:09 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary/po/proprietary-surveillance.it.po       2 Jun 2017 15:16:18 
-0000       1.174
+++ proprietary/po/proprietary-surveillance.it.po       2 Jun 2017 15:29:09 
-0000       1.175
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-05-26 18:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]