[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po proprietary-insecurity.de.po...
From: |
GNUN |
Subject: |
www/proprietary/po proprietary-insecurity.de.po... |
Date: |
Sat, 24 Jun 2017 13:59:06 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/06/24 13:59:06
Modified files:
proprietary/po : proprietary-insecurity.de.po
proprietary-insecurity.fr.po
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.136&r2=1.137
Patches:
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary-insecurity.de.po 16 Jun 2017 08:01:33 -0000 1.81
+++ proprietary-insecurity.de.po 24 Jun 2017 17:59:06 -0000 1.82
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-06-16 07:56+0000\n"
+"POT-Creation-Date: 2017-06-24 17:56+0000\n"
"PO-Revision-Date: 2017-05-06 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -162,6 +162,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The vulnerability allowed a cracker to access the computer's Intel Active "
+"Management Technology (AMT) <a href=\"https://arstechnica.com/"
+"security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-"
+"anyone-thought/\"> web interface with an empty password and gave "
+"administrative access</a> to access the computer's keyboard, mouse, monitor "
+"among other privileges."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"It does not help that in newer Intel processors, it is impossible to turn "
"off the Intel Management Engine. Thus, even users who are proactive about "
"their security can do nothing to protect themselves besides using machines "
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary-insecurity.fr.po 16 Jun 2017 18:57:57 -0000 1.103
+++ proprietary-insecurity.fr.po 24 Jun 2017 17:59:06 -0000 1.104
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-16 07:56+0000\n"
+"POT-Creation-Date: 2017-06-24 17:56+0000\n"
"PO-Revision-Date: 2017-06-16 20:49+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-06-24 17:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -179,6 +180,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The vulnerability allowed a cracker to access the computer's Intel Active "
+"Management Technology (AMT) <a href=\"https://arstechnica.com/"
+"security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-"
+"anyone-thought/\"> web interface with an empty password and gave "
+"administrative access</a> to access the computer's keyboard, mouse, monitor "
+"among other privileges."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"It does not help that in newer Intel processors, it is impossible to turn "
"off the Intel Management Engine. Thus, even users who are proactive about "
"their security can do nothing to protect themselves besides using machines "
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary-insecurity.it.po 16 Jun 2017 08:01:33 -0000 1.109
+++ proprietary-insecurity.it.po 24 Jun 2017 17:59:06 -0000 1.110
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-16 07:56+0000\n"
+"POT-Creation-Date: 2017-06-24 17:56+0000\n"
"PO-Revision-Date: 2017-06-09 23:35+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -158,6 +158,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The vulnerability allowed a cracker to access the computer's Intel Active "
+"Management Technology (AMT) <a href=\"https://arstechnica.com/"
+"security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-"
+"anyone-thought/\"> web interface with an empty password and gave "
+"administrative access</a> to access the computer's keyboard, mouse, monitor "
+"among other privileges."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"It does not help that in newer Intel processors, it is impossible to turn "
"off the Intel Management Engine. Thus, even users who are proactive about "
"their security can do nothing to protect themselves besides using machines "
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-insecurity.ja-diff.html 16 Jun 2017 08:01:33 -0000 1.11
+++ proprietary-insecurity.ja-diff.html 24 Jun 2017 17:59:06 -0000 1.12
@@ -93,6 +93,13 @@
<a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security
vulnerability for 10 years</a>.</p>
+ <p>The vulnerability allowed a cracker to access the computer's Intel
Active
+ Management Technology
+ (AMT) <a
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
+ web interface with an empty password and gave administrative
+ access</a> to access the computer's keyboard, mouse, monitor
+ among other privileges.</p>
+
<p>It does not help that in newer Intel processors, it is
impossible
to turn off the Intel Management Engine. Thus, even users who are
proactive about their security can do nothing to protect themselves
@@ -521,7 +528,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/06/16 08:01:33 $
+$Date: 2017/06/24 17:59:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary-insecurity.ja.po 16 Jun 2017 08:01:33 -0000 1.84
+++ proprietary-insecurity.ja.po 24 Jun 2017 17:59:06 -0000 1.85
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-16 07:56+0000\n"
+"POT-Creation-Date: 2017-06-24 17:56+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -145,6 +145,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The vulnerability allowed a cracker to access the computer's Intel Active "
+"Management Technology (AMT) <a href=\"https://arstechnica.com/"
+"security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-"
+"anyone-thought/\"> web interface with an empty password and gave "
+"administrative access</a> to access the computer's keyboard, mouse, monitor "
+"among other privileges."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"It does not help that in newer Intel processors, it is impossible to turn "
"off the Intel Management Engine. Thus, even users who are proactive about "
"their security can do nothing to protect themselves besides using machines "
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary-insecurity.pot 16 Jun 2017 08:01:33 -0000 1.54
+++ proprietary-insecurity.pot 24 Jun 2017 17:59:06 -0000 1.55
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-16 07:56+0000\n"
+"POT-Creation-Date: 2017-06-24 17:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -117,6 +117,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The vulnerability allowed a cracker to access the computer's Intel Active "
+"Management Technology (AMT) <a "
+"href=\"https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/\">
"
+"web interface with an empty password and gave administrative access</a> to "
+"access the computer's keyboard, mouse, monitor among other privileges."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"It does not help that in newer Intel processors, it is impossible to turn "
"off the Intel Management Engine. Thus, even users who are proactive about "
"their security can do nothing to protect themselves besides using machines "
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary-insecurity.ru.po 16 Jun 2017 09:02:28 -0000 1.136
+++ proprietary-insecurity.ru.po 24 Jun 2017 17:59:06 -0000 1.137
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-16 07:56+0000\n"
+"POT-Creation-Date: 2017-06-24 17:56+0000\n"
"PO-Revision-Date: 2017-06-12 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-06-24 17:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -176,6 +177,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The vulnerability allowed a cracker to access the computer's Intel Active "
+"Management Technology (AMT) <a href=\"https://arstechnica.com/"
+"security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-"
+"anyone-thought/\"> web interface with an empty password and gave "
+"administrative access</a> to access the computer's keyboard, mouse, monitor "
+"among other privileges."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"It does not help that in newer Intel processors, it is impossible to turn "
"off the Intel Management Engine. Thus, even users who are proactive about "
"their security can do nothing to protect themselves besides using machines "