www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po proprietary-insecurity.de.po...


From: GNUN
Subject: www/proprietary/po proprietary-insecurity.de.po...
Date: Sat, 24 Jun 2017 13:59:06 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/06/24 13:59:06

Modified files:
        proprietary/po : proprietary-insecurity.de.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.136&r2=1.137

Patches:
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary-insecurity.de.po        16 Jun 2017 08:01:33 -0000      1.81
+++ proprietary-insecurity.de.po        24 Jun 2017 17:59:06 -0000      1.82
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-06-16 07:56+0000\n"
+"POT-Creation-Date: 2017-06-24 17:56+0000\n"
 "PO-Revision-Date: 2017-05-06 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -162,6 +162,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The vulnerability allowed a cracker to access the computer's Intel Active "
+"Management Technology (AMT) <a href=\"https://arstechnica.com/";
+"security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-"
+"anyone-thought/\"> web interface with an empty password and gave "
+"administrative access</a> to access the computer's keyboard, mouse, monitor "
+"among other privileges."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "It does not help that in newer Intel processors, it is impossible to turn "
 "off the Intel Management Engine. Thus, even users who are proactive about "
 "their security can do nothing to protect themselves besides using machines "

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary-insecurity.fr.po        16 Jun 2017 18:57:57 -0000      1.103
+++ proprietary-insecurity.fr.po        24 Jun 2017 17:59:06 -0000      1.104
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-16 07:56+0000\n"
+"POT-Creation-Date: 2017-06-24 17:56+0000\n"
 "PO-Revision-Date: 2017-06-16 20:49+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-06-24 17:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -179,6 +180,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The vulnerability allowed a cracker to access the computer's Intel Active "
+"Management Technology (AMT) <a href=\"https://arstechnica.com/";
+"security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-"
+"anyone-thought/\"> web interface with an empty password and gave "
+"administrative access</a> to access the computer's keyboard, mouse, monitor "
+"among other privileges."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "It does not help that in newer Intel processors, it is impossible to turn "
 "off the Intel Management Engine. Thus, even users who are proactive about "
 "their security can do nothing to protect themselves besides using machines "

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary-insecurity.it.po        16 Jun 2017 08:01:33 -0000      1.109
+++ proprietary-insecurity.it.po        24 Jun 2017 17:59:06 -0000      1.110
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-16 07:56+0000\n"
+"POT-Creation-Date: 2017-06-24 17:56+0000\n"
 "PO-Revision-Date: 2017-06-09 23:35+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -158,6 +158,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The vulnerability allowed a cracker to access the computer's Intel Active "
+"Management Technology (AMT) <a href=\"https://arstechnica.com/";
+"security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-"
+"anyone-thought/\"> web interface with an empty password and gave "
+"administrative access</a> to access the computer's keyboard, mouse, monitor "
+"among other privileges."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "It does not help that in newer Intel processors, it is impossible to turn "
 "off the Intel Management Engine. Thus, even users who are proactive about "
 "their security can do nothing to protect themselves besides using machines "

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-insecurity.ja-diff.html 16 Jun 2017 08:01:33 -0000      1.11
+++ proprietary-insecurity.ja-diff.html 24 Jun 2017 17:59:06 -0000      1.12
@@ -93,6 +93,13 @@
        &lt;a 
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/"&gt;major
 security
        vulnerability for 10 years&lt;/a&gt;.&lt;/p&gt;
 
+  &lt;p&gt;The vulnerability allowed a cracker to access the computer's Intel 
Active
+      Management Technology
+      (AMT) &lt;a 
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/"&gt;
+      web interface with an empty password and gave administrative
+      access&lt;/a&gt; to access the computer's keyboard, mouse, monitor
+      among other privileges.&lt;/p&gt;
+
        &lt;p&gt;It does not help that in newer Intel processors, it is 
impossible
        to turn off the Intel Management Engine. Thus, even users who are 
        proactive about their security can do nothing to protect themselves 
@@ -521,7 +528,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/06/16 08:01:33 $
+$Date: 2017/06/24 17:59:06 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary-insecurity.ja.po        16 Jun 2017 08:01:33 -0000      1.84
+++ proprietary-insecurity.ja.po        24 Jun 2017 17:59:06 -0000      1.85
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-16 07:56+0000\n"
+"POT-Creation-Date: 2017-06-24 17:56+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -145,6 +145,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The vulnerability allowed a cracker to access the computer's Intel Active "
+"Management Technology (AMT) <a href=\"https://arstechnica.com/";
+"security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-"
+"anyone-thought/\"> web interface with an empty password and gave "
+"administrative access</a> to access the computer's keyboard, mouse, monitor "
+"among other privileges."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "It does not help that in newer Intel processors, it is impossible to turn "
 "off the Intel Management Engine. Thus, even users who are proactive about "
 "their security can do nothing to protect themselves besides using machines "

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary-insecurity.pot  16 Jun 2017 08:01:33 -0000      1.54
+++ proprietary-insecurity.pot  24 Jun 2017 17:59:06 -0000      1.55
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-16 07:56+0000\n"
+"POT-Creation-Date: 2017-06-24 17:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -117,6 +117,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The vulnerability allowed a cracker to access the computer's Intel Active "
+"Management Technology (AMT) <a "
+"href=\"https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/\";>
 "
+"web interface with an empty password and gave administrative access</a> to "
+"access the computer's keyboard, mouse, monitor among other privileges."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "It does not help that in newer Intel processors, it is impossible to turn "
 "off the Intel Management Engine. Thus, even users who are proactive about "
 "their security can do nothing to protect themselves besides using machines "

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary-insecurity.ru.po        16 Jun 2017 09:02:28 -0000      1.136
+++ proprietary-insecurity.ru.po        24 Jun 2017 17:59:06 -0000      1.137
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-16 07:56+0000\n"
+"POT-Creation-Date: 2017-06-24 17:56+0000\n"
 "PO-Revision-Date: 2017-06-12 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-06-24 17:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -176,6 +177,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The vulnerability allowed a cracker to access the computer's Intel Active "
+"Management Technology (AMT) <a href=\"https://arstechnica.com/";
+"security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-"
+"anyone-thought/\"> web interface with an empty password and gave "
+"administrative access</a> to access the computer's keyboard, mouse, monitor "
+"among other privileges."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "It does not help that in newer Intel processors, it is impossible to turn "
 "off the Intel Management Engine. Thus, even users who are proactive about "
 "their security can do nothing to protect themselves besides using machines "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]