www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-webpages.ru.html propri...


From: GNUN
Subject: www/proprietary malware-webpages.ru.html propri...
Date: Sun, 14 Oct 2018 09:28:28 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/14 09:28:28

Modified files:
        proprietary    : malware-webpages.ru.html 
                         proprietary-interference.ru.html 
                         proprietary.ru.html 
        proprietary/po : malware-webpages.ru-en.html 
                         malware-webpages.ru.po 
                         proprietary-interference.ru-en.html 
                         proprietary-interference.ru.po 
                         proprietary.ru-en.html proprietary.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.ru.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.ru.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ru-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ru.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.81&r2=1.82

Patches:
Index: malware-webpages.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.ru.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- malware-webpages.ru.html    14 Oct 2018 09:58:12 -0000      1.10
+++ malware-webpages.ru.html    14 Oct 2018 13:28:27 -0000      1.11
@@ -79,7 +79,7 @@
 компьютера, чтобы вырабатывать 
криптовалюту. (Обращаем ваше внимание, что в
 статье зараженные программы называются 
&ldquo;системой управления
 контентом&rdquo;. Лучшим называнием было бы 
&ldquo;<a
-href="/philosophy/words-to-avoid.html#Content)">система 
редактирования
+href="/philosophy/words-to-avoid.html#Content">система 
редактирования
 сайтов</a>&rdquo;.)</p>
 
     <p>Поскольку &ldquo;майнер&rdquo; был 
несвободной программой на JavaScript,
@@ -287,7 +287,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/14 13:28:27 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-interference.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.ru.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-interference.ru.html    14 Oct 2018 09:58:12 -0000      1.25
+++ proprietary-interference.ru.html    14 Oct 2018 13:28:27 -0000      1.26
@@ -66,7 +66,7 @@
 компьютера, чтобы вырабатывать 
криптовалюту. (Обращаем ваше внимание, что в
 статье зараженные программы называются 
&ldquo;системой управления
 контентом&rdquo;. Лучшим называнием было бы 
&ldquo;<a
-href="/philosophy/words-to-avoid.html#Content)">система 
редактирования
+href="/philosophy/words-to-avoid.html#Content">система 
редактирования
 сайтов</a>&rdquo;.)</p>
 
     <p>Поскольку &ldquo;майнер&rdquo; был 
несвободной программой на JavaScript,
@@ -257,7 +257,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/14 13:28:27 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary.ru.html 14 Oct 2018 09:58:12 -0000      1.31
+++ proprietary.ru.html 14 Oct 2018 13:28:27 -0000      1.32
@@ -166,7 +166,7 @@
 компьютера, чтобы вырабатывать 
криптовалюту. (Обращаем ваше внимание, что в
 статье зараженные программы называются 
&ldquo;системой управления
 контентом&rdquo;. Лучшим называнием было бы 
&ldquo;<a
-href="/philosophy/words-to-avoid.html#Content)">система 
редактирования
+href="/philosophy/words-to-avoid.html#Content">система 
редактирования
 сайтов</a>&rdquo;.)</p>
 
     <p>Поскольку &ldquo;майнер&rdquo; был 
несвободной программой на JavaScript,
@@ -292,7 +292,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/14 13:28:27 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-webpages.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-webpages.ru-en.html      14 Oct 2018 09:58:12 -0000      1.10
+++ po/malware-webpages.ru-en.html      14 Oct 2018 13:28:28 -0000      1.11
@@ -70,7 +70,7 @@
     type of malware hijacks the computer's processor to mine a
     cryptocurrency. (Note that the article refers to the infected software
     as &ldquo;content management system&rdquo;. A better term would be
-    &ldquo;<a href="/philosophy/words-to-avoid.html#Content)">website
+    &ldquo;<a href="/philosophy/words-to-avoid.html#Content">website
     revision system</a>&rdquo;.)</p>
 
     <p>Since the miner was a nonfree JavaScript program,
@@ -255,7 +255,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/14 13:28:28 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-webpages.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/malware-webpages.ru.po   14 Oct 2018 13:20:50 -0000      1.23
+++ po/malware-webpages.ru.po   14 Oct 2018 13:28:28 -0000      1.24
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-14 11:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Webpages - GNU Project - Free Software Foundation"
@@ -115,23 +114,6 @@
 "репортерами, которые ею пользуются</a>."
 
 #. type: Content of: <ul><li><p>
-# | A cracker used an exploit in outdated software to <a
-# | 
href=\"https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito\";>
-# | inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This
-# | type of malware hijacks the computer's processor to mine a cryptocurrency.
-# | (Note that the article refers to the infected software as &ldquo;content
-# | management system&rdquo;. A better term would be &ldquo;<a
-# | href=\"/philosophy/words-to-avoid.html#Content[-)-]\">website revision
-# | system</a>&rdquo;.)
-#| msgid ""
-#| "A cracker used an exploit in outdated software to <a href=\"https://www.";
-#| "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
-#| "to-visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to "
-#| "visitors. This type of malware hijacks the computer's processor to mine a "
-#| "cryptocurrency. (Note that the article refers to the infected software as "
-#| "&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
-#| "href=\"/philosophy/words-to-avoid.html#Content)\">website revision "
-#| "system</a>&rdquo;.)"
 msgid ""
 "A cracker used an exploit in outdated software to <a href=\"https://www.";
 "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"

Index: po/proprietary-interference.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ru-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/proprietary-interference.ru-en.html      14 Oct 2018 09:58:12 -0000      
1.25
+++ po/proprietary-interference.ru-en.html      14 Oct 2018 13:28:28 -0000      
1.26
@@ -57,7 +57,7 @@
     type of malware hijacks the computer's processor to mine a
     cryptocurrency. (Note that the article refers to the infected software
     as &ldquo;content management system&rdquo;. A better term would be
-    &ldquo;<a href="/philosophy/words-to-avoid.html#Content)">website
+    &ldquo;<a href="/philosophy/words-to-avoid.html#Content">website
     revision system</a>&rdquo;.)</p>
 
     <p>Since the miner was a nonfree JavaScript program,
@@ -229,7 +229,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/14 13:28:28 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-interference.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ru.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- po/proprietary-interference.ru.po   14 Oct 2018 13:20:50 -0000      1.74
+++ po/proprietary-interference.ru.po   14 Oct 2018 13:28:28 -0000      1.75
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-14 11:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Interference - GNU Project - Free Software Foundation"
@@ -90,23 +89,6 @@
 "криптовалюту."
 
 #. type: Content of: <ul><li><p>
-# | A cracker used an exploit in outdated software to <a
-# | 
href=\"https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito\";>
-# | inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This
-# | type of malware hijacks the computer's processor to mine a cryptocurrency.
-# | (Note that the article refers to the infected software as &ldquo;content
-# | management system&rdquo;. A better term would be &ldquo;<a
-# | href=\"/philosophy/words-to-avoid.html#Content[-)-]\">website revision
-# | system</a>&rdquo;.)
-#| msgid ""
-#| "A cracker used an exploit in outdated software to <a href=\"https://www.";
-#| "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
-#| "to-visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to "
-#| "visitors. This type of malware hijacks the computer's processor to mine a "
-#| "cryptocurrency. (Note that the article refers to the infected software as "
-#| "&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
-#| "href=\"/philosophy/words-to-avoid.html#Content)\">website revision "
-#| "system</a>&rdquo;.)"
 msgid ""
 "A cracker used an exploit in outdated software to <a href=\"https://www.";
 "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"

Index: po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- po/proprietary.ru-en.html   14 Oct 2018 09:58:12 -0000      1.28
+++ po/proprietary.ru-en.html   14 Oct 2018 13:28:28 -0000      1.29
@@ -149,7 +149,7 @@
     type of malware hijacks the computer's processor to mine a
     cryptocurrency. (Note that the article refers to the infected software
     as &ldquo;content management system&rdquo;. A better term would be
-    &ldquo;<a href="/philosophy/words-to-avoid.html#Content)">website
+    &ldquo;<a href="/philosophy/words-to-avoid.html#Content">website
     revision system</a>&rdquo;.)</p>
 
     <p>Since the miner was a nonfree JavaScript program,
@@ -256,7 +256,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/14 13:28:28 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- po/proprietary.ru.po        14 Oct 2018 13:20:50 -0000      1.81
+++ po/proprietary.ru.po        14 Oct 2018 13:28:28 -0000      1.82
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-14 11:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -294,23 +293,6 @@
 msgstr "Последние добавления"
 
 #. type: Content of: <ul><li><p>
-# | A cracker used an exploit in outdated software to <a
-# | 
href=\"https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito\";>
-# | inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This
-# | type of malware hijacks the computer's processor to mine a cryptocurrency.
-# | (Note that the article refers to the infected software as &ldquo;content
-# | management system&rdquo;. A better term would be &ldquo;<a
-# | href=\"/philosophy/words-to-avoid.html#Content[-)-]\">website revision
-# | system</a>&rdquo;.)
-#| msgid ""
-#| "A cracker used an exploit in outdated software to <a href=\"https://www.";
-#| "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
-#| "to-visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to "
-#| "visitors. This type of malware hijacks the computer's processor to mine a "
-#| "cryptocurrency. (Note that the article refers to the infected software as "
-#| "&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
-#| "href=\"/philosophy/words-to-avoid.html#Content)\">website revision "
-#| "system</a>&rdquo;.)"
 msgid ""
 "A cracker used an exploit in outdated software to <a href=\"https://www.";
 "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]