www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www home.fr.html manual/allgnupkgs.fr.html po/h...


From: GNUN
Subject: www home.fr.html manual/allgnupkgs.fr.html po/h...
Date: Thu, 11 Apr 2019 04:30:18 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/04/11 04:30:18

Modified files:
        .              : home.fr.html 
        manual         : allgnupkgs.fr.html 
        po             : home.fr-en.html home.fr.po 
        proprietary    : malware-appliances.fr.html 
                         proprietary-addictions.fr.html 
                         proprietary-insecurity.fr.html 
                         proprietary.fr.html 
        proprietary/po : malware-appliances.fr-en.html 
                         proprietary-addictions.fr-en.html 
                         proprietary-insecurity.fr-en.html 
                         proprietary.fr-en.html 
        server         : home-pkgblurbs.fr.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/home.fr.html?cvsroot=www&r1=1.385&r2=1.386
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.fr.html?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.fr-en.html?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.fr.po?cvsroot=www&r1=1.496&r2=1.497
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.fr.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.fr.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr-en.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.fr-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.fr.html?cvsroot=www&r1=1.136&r2=1.137

Patches:
Index: home.fr.html
===================================================================
RCS file: /web/www/www/home.fr.html,v
retrieving revision 1.385
retrieving revision 1.386
diff -u -b -r1.385 -r1.386
--- home.fr.html        10 Apr 2019 02:01:13 -0000      1.385
+++ home.fr.html        11 Apr 2019 08:30:16 -0000      1.386
@@ -303,16 +303,16 @@
 des <a href="/philosophy/free-sw.html">quatre libertés essentielles</a> :</p>
 
 <ul>
-<li>la liberté d'exécuter le programme comme il le souhaite, pour n'importe 
quel
-usage (liberté 0) ;</li>
-<li>The freedom to study how the program works, and change it so it does your
-computing as you wish (freedom 1). Access to the source code is a
-precondition for this.</li>
-<li>The freedom to redistribute copies so you can help others (freedom 2).</li>
-<li>The freedom to distribute copies of your modified versions to others
-(freedom 3).  By doing this you can give the whole community a chance to
-benefit from your changes.  Access to the source code is a precondition for
-this.</li>
+<li>la liberté de aire fonctionner le programme comme il le souhaite, pour
+n'importe quel usage (liberté 0) ;</li>
+<li>la liberté d'étudier le fonctionnement du programme et de le modifier 
pour
+qu'il fasse les opérations informatiques que vous souhaitez (liberté 1) ;
+une condition préalable est d'accéder au code source ;</li>
+<li>la liberté d'en redistribuer des copies pour aider les autres (liberté 
2) ;</li>
+<li>la liberté de distribuer des copies de vos versions modifiées aux autres
+(liberté 3) ; ce faisant, vous donnez à l'ensemble de la communauté une
+chance de beneficier de vos modifications ; une condition préalable est
+d'accéder au code source.</li>
 </ul>
 
 <p>Les développements de l'usage de la technologie et du réseau ont rendu ces
@@ -538,7 +538,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/04/10 02:01:13 $
+$Date: 2019/04/11 08:30:16 $
 
 <!-- timestamp end -->
 </p>

Index: manual/allgnupkgs.fr.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.fr.html,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- manual/allgnupkgs.fr.html   11 Apr 2019 07:00:31 -0000      1.121
+++ manual/allgnupkgs.fr.html   11 Apr 2019 08:30:16 -0000      1.122
@@ -781,8 +781,8 @@
 instantanée</b></big></a></td></tr>
 
 <tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
-    <td>A privacy-respecting communication program.  [<a
-href="/software/jami/">jami&nbsp;home</a>]</td></tr>
+    <td>Un programme de communication qui respecte la vie privée.  [<a
+href="/software/jami/">jami – accueil</a>]</td></tr>
 
 
 <tr>

Index: po/home.fr-en.html
===================================================================
RCS file: /web/www/www/po/home.fr-en.html,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- po/home.fr-en.html  16 Feb 2019 18:59:16 -0000      1.167
+++ po/home.fr-en.html  11 Apr 2019 08:30:17 -0000      1.168
@@ -281,13 +281,15 @@
 <ul>
 <li>The freedom to run the program as you wish,
      for any purpose (freedom 0).</li>
-<li>The freedom to study how the program works, and adapt it to your needs
-    (freedom 1).   Access to the source code is a precondition for this.</li>
-<li>The freedom to redistribute copies so you can help your neighbor
+<li>The freedom to study how the program works, and change it so it
+    does your computing as you wish (freedom 1). Access to the source
+    code is a precondition for this.</li>
+<li>The freedom to redistribute copies so you can help others
     (freedom 2).</li>
-<li>The freedom to improve the program, and release your improvements
-   to the public, so that the whole community benefits
-    (freedom 3).   Access to the source code is a precondition for this.</li>
+<li>The freedom to distribute copies of your modified versions
+    to others (freedom 3).  By doing this you can give the whole
+    community a chance to benefit from your changes.
+    Access to the source code is a precondition for this.</li>
 </ul>
 
 <p>Developments in technology and network use have made these freedoms
@@ -493,7 +495,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/16 18:59:16 $
+$Date: 2019/04/11 08:30:17 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/home.fr.po
===================================================================
RCS file: /web/www/www/po/home.fr.po,v
retrieving revision 1.496
retrieving revision 1.497
diff -u -b -r1.496 -r1.497
--- po/home.fr.po       11 Apr 2019 08:20:43 -0000      1.496
+++ po/home.fr.po       11 Apr 2019 08:30:17 -0000      1.497
@@ -18,7 +18,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-04-10 01:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 

Index: proprietary/malware-appliances.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.fr.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary/malware-appliances.fr.html      23 Mar 2019 11:39:11 -0000      
1.67
+++ proprietary/malware-appliances.fr.html      11 Apr 2019 08:30:17 -0000      
1.68
@@ -55,6 +55,18 @@
 <div class="column-limit" id="malware-appliances"></div>
 
 <ul class="blurbs">
+  <li id="M201903210">
+    <p>Le protocole « Conexus » de télémétrie, conçu par Medtronics, 
contient <a
+href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>deux
+vulnérabilités qui affectent plusieurs modèles de défibrillateurs
+implantables</a> et les appareils auxquels ils se connectent.</p>
+
+    <p>Ce protocole existe depuis 2006 et des vulnérabilités similaires ont 
été
+découvertes en 2008 dans un protocole de communication plus ancien de
+Medtronics. Cela montre qu'on ne peut pas faire confiance aux développeurs
+de logiciel privateur pour corriger les bogues de leurs programmes.</p>
+  </li>
+
   <li id="M201902270">
     <p>La sonnette vidéo de Ring est conçue pour que le fabricant (maintenant
 Amazon) puisse regarder en permanence. En fait, il se trouve que <a
@@ -937,7 +949,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/03/23 11:39:11 $
+$Date: 2019/04/11 08:30:17 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-addictions.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.fr.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/proprietary-addictions.fr.html  10 Mar 2019 19:30:07 -0000      
1.8
+++ proprietary/proprietary-addictions.fr.html  11 Apr 2019 08:30:17 -0000      
1.9
@@ -29,9 +29,12 @@
 de base</a>. Les développeurs exercent souvent ce pouvoir au détriment des
 utilisateurs qu'ils devraient servir.</p>
 
-<p>Voici des exemples de programmes privateurs qui leur ajoutent des
-fonctionnalités addictives pour amener les gens à les utiliser en
-permanence.</p>
+<p>Voici plusieurs exemples de logiciels privateurs qui contiennent des
+fonctionnalités addictives, ajoutées dans le but d'inciter les gens à les
+utiliser indéfiniment. Certains de ces programmes <a
+href="https://www.intelligenteconomist.com/economics-of-microtransactions";>piègent
+l'utilisateur pour lui faire payer avec de l'argent réel</a> le
+déverrouillage de fonctions prétendument intéressantes.</p>
 
 <div class="important">
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -222,7 +225,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/03/10 19:30:07 $
+$Date: 2019/04/11 08:30:17 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/proprietary-insecurity.fr.html  23 Mar 2019 11:39:11 -0000      
1.84
+++ proprietary/proprietary-insecurity.fr.html  11 Apr 2019 08:30:17 -0000      
1.85
@@ -61,6 +61,18 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M201903210">
+    <p>Le protocole « Conexus » de télémétrie, conçu par Medtronics, 
contient <a
+href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>deux
+vulnérabilités qui affectent plusieurs modèles de défibrillateurs
+implantables</a> et les appareils auxquels ils se connectent.</p>
+
+    <p>Ce protocole existe depuis 2006 et des vulnérabilités similaires ont 
été
+découvertes en 2008 dans un protocole de communication plus ancien de
+Medtronics. Cela montre qu'on ne peut pas faire confiance aux développeurs
+de logiciel privateur pour corriger les bogues de leurs programmes.</p>
+  </li>
+
   <li id="M201902270">
     <p>La sonnette vidéo de Ring est conçue pour que le fabricant (maintenant
 Amazon) puisse regarder en permanence. En fait, il se trouve que <a
@@ -697,7 +709,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/03/23 11:39:11 $
+$Date: 2019/04/11 08:30:17 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/proprietary.fr.html     9 Apr 2019 18:00:20 -0000       1.85
+++ proprietary/proprietary.fr.html     11 Apr 2019 08:30:17 -0000      1.86
@@ -156,6 +156,18 @@
 <h3 id="latest">Ajouts récents</h3>
 
 <ul class="blurbs">
+  <li id="M201903210">
+    <p>Le protocole « Conexus » de télémétrie, conçu par Medtronics, 
contient <a
+href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>deux
+vulnérabilités qui affectent plusieurs modèles de défibrillateurs
+implantables</a> et les appareils auxquels ils se connectent.</p>
+
+    <p>Ce protocole existe depuis 2006 et des vulnérabilités similaires ont 
été
+découvertes en 2008 dans un protocole de communication plus ancien de
+Medtronics. Cela montre qu'on ne peut pas faire confiance aux développeurs
+de logiciel privateur pour corriger les bogues de leurs programmes.</p>
+  </li>
+
   <li id="M201903280">
     <p>Les constructeurs automobiles ont sorti une liste de raisons astucieuses
 pour lesquelles ils sont <a
@@ -196,19 +208,6 @@
 d'offrir ce service pour les modèles anciens</a>, de sorte que si on essaie
 de réinstaller les réglages par défaut, la tablette devient 
inutilisable.</p>
   </li>
-
-  <li id="M201903201">
-    <p>Une étude portant sur 24 applis « santé » a montré que 19 
d'entre elles <a
-href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows";>envoient
-des données personnelles sensibles à des tiers</a>, qui peuvent les utiliser
-à des fins de publicité intrusive ou de discrimination contre les personnes
-qui ont des problèmes médicaux.</p>
-
-    <p>Lorsque l'utilisateur doit donner son « consentement », ce dernier 
est
-enfoui dans des conditions d'utilisation à rallonge, presque
-incompréhensibles. De toute façon, « consentir » à l'espionnage ne le
-légitime pas.</p>
-  </li>
 </ul>
 
 
@@ -288,7 +287,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/04/09 18:00:20 $
+$Date: 2019/04/11 08:30:17 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-appliances.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr-en.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/malware-appliances.fr-en.html        23 Mar 2019 11:39:11 
-0000      1.61
+++ proprietary/po/malware-appliances.fr-en.html        11 Apr 2019 08:30:17 
-0000      1.62
@@ -47,6 +47,19 @@
 <div class="column-limit" id="malware-appliances"></div>
 
 <ul class="blurbs">
+  <li id="M201903210">
+    <p>The Medtronics Conexus Telemetry Protocol has <a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>
+    two vulnerabilities that affect several models of implantable
+    defibrillators</a> and the devices they connect to.</p>
+
+    <p>This protocol has been around since 2006, and similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.</p>
+  </li>
+
   <li id="M201902270">
     <p>The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
@@ -896,7 +909,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/03/23 11:39:11 $
+$Date: 2019/04/11 08:30:17 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-addictions.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.fr-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-addictions.fr-en.html    10 Mar 2019 19:30:07 
-0000      1.7
+++ proprietary/po/proprietary-addictions.fr-en.html    11 Apr 2019 08:30:17 
-0000      1.8
@@ -24,7 +24,11 @@
 detriment of the users they ought to serve.</p>
 
 <p>Here are instances of proprietary programs that add addictive
-functionality to lure users into using it perpetually.</p>
+functionality to lure users into using it perpetually. Some of these
+programs also <a
+href="https://www.intelligenteconomist.com/economics-of-microtransactions";>trick
+users into paying real money</a> for unlocking features of alleged
+value.</p>
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -194,7 +198,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/03/10 19:30:07 $
+$Date: 2019/04/11 08:30:17 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary-insecurity.fr-en.html    23 Mar 2019 11:39:11 
-0000      1.73
+++ proprietary/po/proprietary-insecurity.fr-en.html    11 Apr 2019 08:30:17 
-0000      1.74
@@ -53,6 +53,19 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M201903210">
+    <p>The Medtronics Conexus Telemetry Protocol has <a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>
+    two vulnerabilities that affect several models of implantable
+    defibrillators</a> and the devices they connect to.</p>
+
+    <p>This protocol has been around since 2006, and similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.</p>
+  </li>
+
   <li id="M201902270">
     <p>The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
@@ -655,7 +668,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/03/23 11:39:11 $
+$Date: 2019/04/11 08:30:17 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/proprietary.fr-en.html       9 Apr 2019 18:00:20 -0000       
1.76
+++ proprietary/po/proprietary.fr-en.html       11 Apr 2019 08:30:17 -0000      
1.77
@@ -146,6 +146,19 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201903210">
+    <p>The Medtronics Conexus Telemetry Protocol has <a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>
+    two vulnerabilities that affect several models of implantable
+    defibrillators</a> and the devices they connect to.</p>
+
+    <p>This protocol has been around since 2006, and similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.</p>
+  </li>
+
   <li id="M201903280">
     <p>Car companies are coming up with a list of clever reasons why <a
     
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html";>
@@ -184,18 +197,6 @@
     turned off the server for old models</a>, so now if you try to
     reinstall the default settings, it bricks them instead.</p>
   </li>
-
-  <li id="M201903201">
-    <p>A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows";>
-    send sensitive personal data to third parties</a>, which can use it
-    for invasive advertising or discriminating against people in poor
-    medical condition.</p>
-
-    <p>Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.</p>
-  </li>
 </ul>
 
 
@@ -256,7 +257,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/09 18:00:20 $
+$Date: 2019/04/11 08:30:17 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/home-pkgblurbs.fr.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.fr.html,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- server/home-pkgblurbs.fr.html       11 Apr 2019 07:00:35 -0000      1.136
+++ server/home-pkgblurbs.fr.html       11 Apr 2019 08:30:17 -0000      1.137
@@ -2495,11 +2495,11 @@
 <!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
 <h4 id="jami">
   <a href="/software/jami/">Jami</a></h4><p>
-Jami is a program for universal communication which respects freedoms and
-privacy of its users. Jami uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.  <small>(<a
-href="/manual/manual.html#jami">doc</a>)</small></p>
+Jami est un logiciel de communication universelle qui respecte les libertés
+et la vie privée de ses utilisateurs. Il utilise des tables de hachage
+distribuées pour établir la communication. Cela évite les registres
+centralisés d'utilisateurs et le stockage des données
+personnelles. <small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
 
 <!--#endif -->
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->



reply via email to

[Prev in Thread] Current Thread [Next in Thread]